Description
In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: f_subset: Fix unbalanced refcnt in geth_free

geth_alloc() increments the reference count, but geth_free() fails to
decrement it. This prevents the configuration of attributes via configfs
after unlinking the function.

Decrement the reference count in geth_free() to ensure proper cleanup.
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability stems from an unbalanced reference count within the USB gadget subset implementation. The geth_alloc() routine correctly increments the reference counter for a gadget function, but the corresponding geth_free() routine fails to decrement it. This oversight leaves an orphaned reference count that prevents the function’s configuration from being properly cleaned up via configfs, potentially leading to resource exhaustion and kernel instability. The improper reference handling could cause the remaining reference to linger until the system reboots or until further operations trigger a kernel panic, effectively disabling the USB gadget subsystem until a remedy is applied.

Affected Systems

All Linux kernel releases that include the usb:gadget:f_subset controller and do not incorporate the fix (commits referenced in the advisory). Specific affected versions are not enumerated in the CVE data, so any prior to the patch that uses this gadget function is considered vulnerable.

Risk and Exploitability

The CVSS score is not disclosed and EPSS data is unavailable. The vulnerability is not listed in CISA’s KEV catalog, indicating that no widespread exploitation has been reported. The likely attack requires the ability to manipulate the gadget configuration through configfs, which is typically available to privileged (root) users or processes that can attach a USB device. An attacker with such privileges could repeatedly unlink and re‑attach gadget functions, gradually exhausting system resources or triggering a kernel crash. Remote exploitation from an untrusted USB device is not explicitly supported by the data but is plausible if the device can inject the configuration changes. Overall, the risk remains moderate due to the lack of publicly known exploits and the high privilege requirement.

Generated by OpenCVE AI on May 9, 2026 at 03:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the kernel to a version that includes the commit series 23e4851 or later, which restores the missing decrement in geth_free()
  • Disable the f_subset USB gadget function if it is not required for your system’s operation
  • Restrict access to the gadget’s configfs entries to trusted users only to prevent accidental or malicious manipulation

Generated by OpenCVE AI on May 9, 2026 at 03:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 02:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-399

Sat, 09 May 2026 00:15:00 +0000


Fri, 08 May 2026 18:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-399

Fri, 08 May 2026 14:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: usb: gadget: f_subset: Fix unbalanced refcnt in geth_free geth_alloc() increments the reference count, but geth_free() fails to decrement it. This prevents the configuration of attributes via configfs after unlinking the function. Decrement the reference count in geth_free() to ensure proper cleanup.
Title usb: gadget: f_subset: Fix unbalanced refcnt in geth_free
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T13:37:20.663Z

Reserved: 2026-05-01T14:12:56.003Z

Link: CVE-2026-43343

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T14:16:44.300

Modified: 2026-05-08T14:16:44.300

Link: CVE-2026-43343

cve-icon Redhat

Severity :

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43343 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T03:30:24Z

Weaknesses