VYPR
Unrated severityNVD Advisory· Published May 8, 2026· Updated May 12, 2026

CVE-2026-43427

CVE-2026-43427

Description

In the Linux kernel, the following vulnerability has been resolved:

usb: class: cdc-wdm: fix reordering issue in read code path

Quoting the bug report:

Due to compiler optimization or CPU out-of-order execution, the desc->length update can be reordered before the memmove. If this happens, wdm_read() can see the new length and call copy_to_user() on uninitialized memory. This also violates LKMM data race rules [1].

Fix it by using WRITE_ONCE and memory barriers.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A memory ordering bug in the Linux cdc-wdm driver allows reading uninitialized memory due to reordered length updates.

Vulnerability: cdc-wdm Read Reordering

The Linux kernel's cdc-wdm driver contains a data race in the read code path. The desc->length update and the subsequent memmove are not properly ordered, meaning a compiler optimization or CPU out-of-order execution can cause desc->length to be stored before the data is moved. This violates the Linux Kernel Memory Model (LKMM) rules on data races [1].

Exploitation

An attacker who can interact with the device (e.g., via USB) may exploit this race condition. The wdm_read() function could observe the new desc->length value and call copy_to_user() on memory that has not yet been initialized with the new data, leading to exposure of kernel memory contents. No special privileges are required beyond access to the device file.

Impact

Successful exploitation could result in information disclosure, leaking sensitive kernel memory to an unprivileged user. The severity is dependent on the content of the leaked memory, but it undermines the confidentiality guarantees of the kernel.

Mitigation

The fix was applied in mainline and backported to stable kernels using WRITE_ONCE and explicit memory barriers to ensure correct ordering [2][3][4]. Users should update their kernel to include these patches.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.