CVE-2026-43255
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
06/05/2026
Última modificación:
06/05/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
wifi: libertas: fix WARNING in usb_tx_block<br />
<br />
The function usb_tx_block() submits cardp->tx_urb without ensuring that<br />
any previous transmission on this URB has completed. If a second call<br />
occurs while the URB is still active (e.g. during rapid firmware loading),<br />
usb_submit_urb() detects the active state and triggers a warning:<br />
&#39;URB submitted while active&#39;.<br />
<br />
Fix this by enforcing serialization: call usb_kill_urb() before<br />
submitting the new request. This ensures the URB is idle and safe to reuse.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/2902a9b4415a6bafc9b1e5dd360f065d757a0bb7
- https://git.kernel.org/stable/c/3308c7504e093b22e91a4468470309cee2e26b83
- https://git.kernel.org/stable/c/498525d8358d6d20918787e59736d5b6a021e9fd
- https://git.kernel.org/stable/c/5bfb25495e391a1be0db94b15715174fa06b93a1
- https://git.kernel.org/stable/c/948a39c95d0f8d73722910f8cdb7b6e3e9206232
- https://git.kernel.org/stable/c/b82073564373e68c6ae3a96039fae14cd002a496
- https://git.kernel.org/stable/c/d66676e6ca96bf8680f869a9bd6573b26c634622
- https://git.kernel.org/stable/c/fc188b44547dea4e7350833171982a6312befde9



