The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-43343

CVE-2026-43343: Linux Kernel USB Gadget Vulnerability

CVE-2026-43343 is a reference count imbalance flaw in the Linux Kernel's USB gadget f_subset driver that prevents proper cleanup after unlinking functions. This article covers the technical details, affected versions, and mitigation.

Published: May 18, 2026

CVE-2026-43343 Overview

CVE-2026-43343 is a reference counting flaw in the Linux kernel's USB gadget subsystem, specifically in the f_subset function driver. The geth_alloc() function increments a reference count, but the matching geth_free() function fails to decrement it. This imbalance prevents reconfiguration of attributes through configfs after the function is unlinked. A local low-privileged attacker who can interact with USB gadget configfs entries can trigger resource exhaustion and availability impact.

Critical Impact

A local authenticated user can exhaust kernel resources by repeatedly allocating and freeing USB gadget Ethernet subset functions, leading to denial of service through reference count leakage.

Affected Products

  • Linux Kernel (multiple stable branches, see vendor commits)
  • Linux Kernel 7.0-rc1 through 7.0-rc6
  • Systems with CONFIG_USB_F_SUBSET enabled

Discovery Timeline

  • 2026-05-08 - CVE-2026-43343 published to NVD
  • 2026-05-18 - Last updated in NVD database

Technical Details for CVE-2026-43343

Vulnerability Analysis

The vulnerability resides in drivers/usb/gadget/function/f_subset.c, which implements the CDC Subset Ethernet function for USB gadgets. The function exposes its configuration through configfs, allowing userspace to compose USB gadget devices dynamically.

When geth_alloc() is invoked, it acquires a reference on an underlying kernel object as part of the allocation lifecycle. The companion geth_free() routine is responsible for releasing the function instance but does not call the corresponding decrement routine. Each allocate-then-free cycle leaks one reference, leaving the object pinned.

The practical effect is that configfs attribute writes targeting the function fail after unlinking, because the stale reference keeps the object in a state that blocks reconfiguration. Repeated cycles can accumulate references and exhaust associated kernel resources.

Root Cause

The root cause is an unbalanced reference count between paired allocation and free routines [CWE-Other]. The fix adds the missing decrement in geth_free() to ensure symmetric reference handling and proper cleanup of the function instance.

Attack Vector

Exploitation requires local access with privileges to write to USB gadget configfs entries, typically /sys/kernel/config/usb_gadget/. An attacker creates the geth function instance, removes it, and repeats the sequence to leak references. The impact is limited to availability, with no confidentiality or integrity compromise. No verified public proof-of-concept exists. Refer to the upstream commits listed in the Linux Kernel Stable Tree for technical details of the fix.

Detection Methods for CVE-2026-43343

Indicators of Compromise

  • Repeated creation and removal of geth function instances under /sys/kernel/config/usb_gadget/*/functions/
  • Failed configfs attribute writes returning -EBUSY or similar errors after function unlinking
  • Gradual increase in kernel slab usage attributable to USB gadget function objects

Detection Strategies

  • Audit configfs operations targeting usb_gadget paths through Linux audit subsystem rules monitoring openat and write syscalls on those paths
  • Track kernel reference counts and slab allocations for USB gadget objects using /proc/slabinfo to identify abnormal growth
  • Correlate non-root or service-account access to USB gadget configfs with subsequent kernel resource anomalies

Monitoring Recommendations

  • Enable kernel audit rules for write operations under /sys/kernel/config/usb_gadget/
  • Monitor dmesg for warnings related to f_subset or geth function lifecycle
  • Alert on processes repeatedly creating and destroying USB gadget functions within short time windows

How to Mitigate CVE-2026-43343

Immediate Actions Required

  • Apply the upstream Linux kernel patches referenced in the vendor advisories to all affected kernel branches
  • Restrict access to USB gadget configfs paths to root and trusted system services only
  • Unload the usb_f_gadget_subset module on systems that do not require CDC Subset Ethernet gadget functionality

Patch Information

The fix decrements the reference count in geth_free() to balance the increment performed by geth_alloc(). Patches have been backported across multiple stable trees. See the upstream commits: Kernel Git Commit 23e4851c, Kernel Git Commit 3d436670, Kernel Git Commit 3f5bfc55, Kernel Git Commit 75776a05, Kernel Git Commit a932b171, Kernel Git Commit caa27923, Kernel Git Commit cc8ec610, and Kernel Git Commit d7d70240.

Workarounds

  • Blacklist the usb_f_gadget_subset kernel module on systems where the CDC Subset Ethernet gadget is not needed
  • Apply strict filesystem permissions on /sys/kernel/config/usb_gadget/ to limit which users and services can create gadget functions
  • Disable CONFIG_USB_F_SUBSET when rebuilding kernels for environments that do not require this function driver
bash
# Configuration example: blacklist the affected module and restrict configfs access
echo "blacklist usb_f_gadget_subset" | sudo tee /etc/modprobe.d/blacklist-f_subset.conf
sudo chmod 700 /sys/kernel/config/usb_gadget
sudo chown root:root /sys/kernel/config/usb_gadget

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeOther

  • Vendor/TechLinux Kernel

  • SeverityMEDIUM

  • CVSS Score5.5

  • EPSS Probability0.03%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • NVD-CWE-Other
  • Vendor Resources
  • Kernel Git Commit 23e4851c

  • Kernel Git Commit 3d436670

  • Kernel Git Commit 3f5bfc55

  • Kernel Git Commit 75776a05

  • Kernel Git Commit a932b171

  • Kernel Git Commit caa27923

  • Kernel Git Commit cc8ec610

  • Kernel Git Commit d7d70240
  • Related CVEs
  • CVE-2026-43307: Linux Kernel FIFO Read Overflow Vulnerability

  • CVE-2026-43352: Linux Kernel DMA Ring Abort Vulnerability

  • CVE-2026-43308: Linux Kernel BUG Error Vulnerability

  • CVE-2026-43348: Linux Kernel Memory Mapping Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the Most Advanced Cybersecurity Platform

See how the world’s most intelligent, autonomous cybersecurity platform can protect your organization today and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English