Description
In the Linux kernel, the following vulnerability has been resolved:

net: mctp: fix device leak on probe failure

Driver core holds a reference to the USB interface and its parent USB
device while the interface is bound to a driver and there is no need to
take additional references unless the structures are needed after
disconnect.

This driver takes a reference to the USB device during probe but does
not to release it on probe failures.

Drop the redundant device reference to fix the leak, reduce cargo
culting, make it easier to spot drivers where an extra reference is
needed, and reduce the risk of further memory leaks.
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

In the Linux kernel the MCTP driver retains an unnecessary reference to a USB device during the probe routine and fails to release it on probe failure. The result is a resource leak that can gradually accumulate until memory pressure causes system instability. The weakness corresponds to missing resource recovery and logical error. The vulnerability does not provide direct code execution but can degrade system reliability and availability over time.

Affected Systems

The flaw exists in the Linux kernel's MCTP driver, affecting all kernel releases that include the buggy driver prior to the published fix. The vendor is the Linux kernel project and the affected product is the Linux kernel itself. No exact version numbers are supplied, so any kernel version before the patch should be treated as vulnerable.

Risk and Exploitability

The risk of exploitation is moderate because the leak can lead to memory exhaustion. Because it is a kernel-level driver, the attack vector is local; a local user with the ability to probe MCTP devices could trigger the leak repeatedly. There is no evidence of remote exploitation or elevated privileges being required beyond local access. The EPSS score is not available and the vulnerability is not listed in CISA KEV. The CVSS score is not provided, but the impact is limited to resource depletion rather than immediate confidentiality or integrity compromise.

Generated by OpenCVE AI on May 9, 2026 at 05:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply kernel update that includes the fixed MCTP driver
  • If an update is not immediately possible, disable the MCTP driver to prevent further probe failures from leaking resources
  • Monitor kernel logs and memory usage for repeated MCTP probe failures and signs of memory exhaustion

Generated by OpenCVE AI on May 9, 2026 at 05:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 04:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-404

Sat, 09 May 2026 00:15:00 +0000


Fri, 08 May 2026 18:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-404

Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: net: mctp: fix device leak on probe failure Driver core holds a reference to the USB interface and its parent USB device while the interface is bound to a driver and there is no need to take additional references unless the structures are needed after disconnect. This driver takes a reference to the USB device during probe but does not to release it on probe failures. Drop the redundant device reference to fix the leak, reduce cargo culting, make it easier to spot drivers where an extra reference is needed, and reduce the risk of further memory leaks.
Title net: mctp: fix device leak on probe failure
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T14:21:25.193Z

Reserved: 2026-05-01T14:12:56.006Z

Link: CVE-2026-43375

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:16:48.650

Modified: 2026-05-08T15:16:48.650

Link: CVE-2026-43375

cve-icon Redhat

Severity :

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43375 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T05:30:16Z

Weaknesses