Impact
The flaw is in the Linux kernel USB driver for etas_es58x. When an URB that should be anchored is processed in the read bulk callback, it is not anchored before submission. If usb_kill_anchored_urbs is later invoked, the URB can be leaked, causing an unreleased kernel resource. This improper release leads to a resource leak that could allow an attacker to consume kernel memory or other resources until the system becomes unresponsive. The vulnerability corresponds to CWE-772: Improper Release of Resource after Effective Lifetime.
Affected Systems
All Linux kernel releases that include the etas_es58x USB driver and have not applied the fix are affected. The vulnerable code is present in kernel versions preceding the commit that introduced the anchor logic; relevant releases include 5.13 and the 7.0 development releases (RC1 through RC7).
Risk and Exploitability
The CVSS score of 5.5 indicates a medium severity vulnerability. The EPSS score is below 1 %, and the issue is not listed in the CISA KEV catalog, suggesting a low likelihood of widespread exploitation. Based on the description, it is inferred that the attack vector would be local and would require an attacker to interact with the USB device to trigger the read bulk callback, which may be achievable by plugging a malicious device or by compromising the host.
OpenCVE Enrichment
Debian DLA
Debian DSA