Description
In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw88: fix device leak on probe failure

Driver core holds a reference to the USB interface and its parent USB
device while the interface is bound to a driver and there is no need to
take additional references unless the structures are needed after
disconnect.

This driver takes a reference to the USB device during probe but does
not to release it on all probe errors (e.g. when descriptor parsing
fails).

Drop the redundant device reference to fix the leak, reduce cargo
culting, make it easier to spot drivers where an extra reference is
needed, and reduce the risk of further memory leaks.
Published: 2026-04-24
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

In the Linux kernel, the rtw88 USB Wi‑Fi driver holds a reference to the USB device during probe but does not release it when probe errors occur, such as descriptor parsing failures. This results in a memory/resource leak that persists until the module is unloaded or the system is rebooted. The bug does not provide an attacker with code execution or direct confidentiality breach, but repeated leaks could weaken system stability or lead to a denial of service over an extended period.

Affected Systems

The vulnerability affects any Linux system that uses the rtw88 driver in the kernel. This is common on systems with Wi‑Fi hardware that relies on the rtw88 module; the impact applies to all kernel releases prior to the patch that removes the redundant reference.

Risk and Exploitability

The CVSS score of 5.5 indicates moderate severity, and the EPSS score of less than 1 % suggests a very low probability of exploitation observed in the field. The vulnerability is not listed in the CISA KEV catalog, reinforcing its lower priority relative to high‑profile exploits. Based on the description, the likely attack vector is a probe failure during driver initialization, which requires local/device-level interaction and is unlikely to lead to further escalation.

Generated by OpenCVE AI on April 29, 2026 at 21:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a version that includes the rtw88 reference‑release patch, ensuring that the driver no longer retains USB device references on probe failures.
  • After the kernel upgrade, reboot the system to unload any pre‑existing instances of the rtw88 driver and flush the leaked resources.
  • If an immediate kernel update is not possible, temporarily blacklist the rtw88 module (e.g., add a blacklist entry or remove the driver from the initramfs) to prevent its loading until the kernel can be patched.

Generated by OpenCVE AI on April 29, 2026 at 21:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-6238-1 linux security update
History

Wed, 29 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Mon, 27 Apr 2026 14:15:00 +0000


Mon, 27 Apr 2026 11:30:00 +0000


Sat, 25 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-911
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Fri, 24 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: wifi: rtw88: fix device leak on probe failure Driver core holds a reference to the USB interface and its parent USB device while the interface is bound to a driver and there is no need to take additional references unless the structures are needed after disconnect. This driver takes a reference to the USB device during probe but does not to release it on all probe errors (e.g. when descriptor parsing fails). Drop the redundant device reference to fix the leak, reduce cargo culting, make it easier to spot drivers where an extra reference is needed, and reduce the risk of further memory leaks.
Title wifi: rtw88: fix device leak on probe failure
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-11T22:12:00.312Z

Reserved: 2026-03-09T15:48:24.122Z

Link: CVE-2026-31604

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-24T15:16:39.627

Modified: 2026-04-29T19:21:26.807

Link: CVE-2026-31604

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-24T00:00:00Z

Links: CVE-2026-31604 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T21:45:20Z

Weaknesses