Description
In the Linux kernel, the following vulnerability has been resolved:

usb: misc: usbio: Fix URB memory leak on submit failure

When usb_submit_urb() fails in usbio_probe(), the previously allocated
URB is never freed, causing a memory leak.

Fix this by jumping to err_free_urb label to properly release the URB
on the error path.
Published: 2026-05-01
Score: 5.5 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A failure in the usb_submit_urb() routine during the usbio_probe() sequence can cause a previously allocated USB Request Block (URB) to remain allocated because the error path does not free the memory. This memory leak can accumulate over time and consume kernel RAM, potentially leading to a denial‑of‑service scenario where the kernel runs out of memory or must swap unexpectedly. The weakness is a classic resource‑management flaw that violates proper cleanup semantics for dynamically allocated kernel objects.

Affected Systems

The vulnerability is present in the Linux kernel itself, affecting all kernel releases that include the usbio driver code prior to the patch referenced in the provided commits. No specific kernel version range is listed, so any system running an unpatched Linux kernel is potentially impacted.

Risk and Exploitability

The CVSS score is 5.5, and the EPSS score is not available, so the exact quantitative risk cannot be derived from the data. The vulnerability is not listed in CISA KEV, suggesting no known widespread exploitation. However, because the flaw can be triggered during normal USB device initialization, an attacker with local privilege or the ability to force a device probe could repeatedly trigger the leak, leading to gradual memory exhaustion. The likely attack vector is local; the flaw is manifested during driver initialization, implying that a privileged process that can cause usbio_probe() to run under error conditions can exploit it.

Generated by OpenCVE AI on May 2, 2026 at 11:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Linux kernel update that includes the usbio memory‑leak fix, which addresses the identified resource‑management weaknesses (CWE‑401, CWE‑772).
  • If an immediate kernel upgrade is not possible, isolate or disable usbio hardware or drivers that trigger probe failures to prevent repeated memory leaks, ensuring that the device initialization does not exercise the vulnerable error path.
  • Implement kernel‑level monitoring of memory allocation and URB counts; set alerts for abnormal growth during USB device initialization to detect potential exploitation early.

Generated by OpenCVE AI on May 2, 2026 at 11:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 02 May 2026 00:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-772
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Moderate


Fri, 01 May 2026 23:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Fri, 01 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: usb: misc: usbio: Fix URB memory leak on submit failure When usb_submit_urb() fails in usbio_probe(), the previously allocated URB is never freed, causing a memory leak. Fix this by jumping to err_free_urb label to properly release the URB on the error path.
Title usb: misc: usbio: Fix URB memory leak on submit failure
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-01T14:14:47.659Z

Reserved: 2026-03-09T15:48:24.139Z

Link: CVE-2026-31757

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-01T15:16:38.700

Modified: 2026-05-01T15:24:14.893

Link: CVE-2026-31757

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-05-01T00:00:00Z

Links: CVE-2026-31757 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T23:30:06Z

Weaknesses