{"id":"CVE-2026-43429","summary":"USB: usbtmc: Use usb_bulk_msg_killable() with user-specified timeouts","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: usbtmc: Use usb_bulk_msg_killable() with user-specified timeouts\n\nThe usbtmc driver accepts timeout values specified by the user in an\nioctl command, and uses these timeouts for some usb_bulk_msg() calls.\nSince the user can specify arbitrarily long timeouts and\nusb_bulk_msg() uses unkillable waits, call usb_bulk_msg_killable()\ninstead to avoid the possibility of the user hanging a kernel thread\nindefinitely.","modified":"2026-05-22T03:55:11.789913775Z","published":"2026-05-08T14:22:01.739Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/43xxx/CVE-2026-43429.json","cna_assigner":"Linux"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/0535f84cb94c9d8bcba0a2a5b3fac81b7d97235d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/39bd4097292fd8564cf2cfba9356f8ab11e38d12"},{"type":"WEB","url":"https://git.kernel.org/stable/c/6cb7dc91f057dd8ce44f6caa2995d8e22784ed0a"},{"type":"WEB","url":"https://git.kernel.org/stable/c/72c0a063489be183cfb99e7050aaef503bdb6449"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7784caa413a89487dd14dd5c41db8753483b2acb"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7fa72c369c23c27d1f64883c1e276af950557fb1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/d4f1c45bdff3f393f9ab7e76795901c442b9eb76"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e14a0dcdf468c3ad616bb06696c7c64c36e736d8"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/43xxx/CVE-2026-43429.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-43429"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"048c6d88a0214757926f264823829e79154fcd4f"},{"fixed":"e14a0dcdf468c3ad616bb06696c7c64c36e736d8"},{"fixed":"7fa72c369c23c27d1f64883c1e276af950557fb1"},{"fixed":"72c0a063489be183cfb99e7050aaef503bdb6449"},{"fixed":"39bd4097292fd8564cf2cfba9356f8ab11e38d12"},{"fixed":"0535f84cb94c9d8bcba0a2a5b3fac81b7d97235d"},{"fixed":"6cb7dc91f057dd8ce44f6caa2995d8e22784ed0a"},{"fixed":"d4f1c45bdff3f393f9ab7e76795901c442b9eb76"},{"fixed":"7784caa413a89487dd14dd5c41db8753483b2acb"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-43429.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.19.0"},{"fixed":"5.10.253"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.203"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.167"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.130"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.78"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.18.19"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.19.0"},{"fixed":"6.19.9"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-43429.json"}}],"schema_version":"1.7.5"}