Description
In the Linux kernel, the following vulnerability has been resolved:

usb: xhci: Fix memory leak in xhci_disable_slot()

xhci_alloc_command() allocates a command structure and, when the
second argument is true, also allocates a completion structure.
Currently, the error handling path in xhci_disable_slot() only frees
the command structure using kfree(), causing the completion structure
to leak.

Use xhci_free_command() instead of kfree(). xhci_free_command() correctly
frees both the command structure and the associated completion structure.
Since the command structure is allocated with zero-initialization,
command->in_ctx is NULL and will not be erroneously freed by
xhci_free_command().

This bug was found using an experimental static analysis tool we are
developing. The tool is based on the LLVM framework and is specifically
designed to detect memory management issues. It is currently under
active development and not yet publicly available, but we plan to
open-source it after our research is published.

The bug was originally detected on v6.13-rc1 using our static analysis
tool, and we have verified that the issue persists in the latest mainline
kernel.

We performed build testing on x86_64 with allyesconfig using GCC=11.4.0.
Since triggering these error paths in xhci_disable_slot() requires specific
hardware conditions or abnormal state, we were unable to construct a test
case to reliably trigger these specific error paths at runtime.
Published: 2026-05-08
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a memory leak in the Linux kernel’s USB XHCI driver. During the cleanup path of xhci_disable_slot() only the command structure is freed, leaving the completion structure allocated. This persistent leak can cause gradual memory exhaustion and ultimately a denial of service. The weakness is categorized as an excessive resource allocation flaw (CWE‑763).

Affected Systems

The bug appears in the core Linux kernel, affecting any distribution that runs an unpatched kernel with XHCI driver support. It first surfaced in the 6.13‑rc1 release and continues to exist in the latest mainline kernel versions until the applied patch. All systems that employ USB XHCI controllers are potentially impacted.

Risk and Exploitability

The CVSS score of 5.5 indicates medium severity. The EPSS score is below 1 % and the vulnerability is not listed in CISA KEV, pointing to a low probability of widespread exploitation. Based on the description, it is inferred that exploiting the flaw requires triggering a specific error path in xhci_disable_slot(), which likely demands particular hardware conditions or a corrupted USB device state. Consequently the practical risk for ordinary users is low, but systems heavily exposed to USB device changes or custom hardware could still experience memory exhaustion and service disruption.

Generated by OpenCVE AI on May 9, 2026 at 16:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply a patched Linux kernel that includes the XHCI memory leak fix (the commit that replaces kfree() with xhci_free_command()).
  • If a kernel upgrade cannot be performed immediately, disable the XHCI controller in the BIOS/UEFI or remove USB devices that trigger the error path to reduce the likelihood of the leak occurring.
  • Monitor system memory usage and review vendor security advisories for updates that address the issue, applying any supplemental patches or mitigations they recommend.

Generated by OpenCVE AI on May 9, 2026 at 16:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Sat, 09 May 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-763
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Low


Fri, 08 May 2026 18:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Fri, 08 May 2026 14:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: usb: xhci: Fix memory leak in xhci_disable_slot() xhci_alloc_command() allocates a command structure and, when the second argument is true, also allocates a completion structure. Currently, the error handling path in xhci_disable_slot() only frees the command structure using kfree(), causing the completion structure to leak. Use xhci_free_command() instead of kfree(). xhci_free_command() correctly frees both the command structure and the associated completion structure. Since the command structure is allocated with zero-initialization, command->in_ctx is NULL and will not be erroneously freed by xhci_free_command(). This bug was found using an experimental static analysis tool we are developing. The tool is based on the LLVM framework and is specifically designed to detect memory management issues. It is currently under active development and not yet publicly available, but we plan to open-source it after our research is published. The bug was originally detected on v6.13-rc1 using our static analysis tool, and we have verified that the issue persists in the latest mainline kernel. We performed build testing on x86_64 with allyesconfig using GCC=11.4.0. Since triggering these error paths in xhci_disable_slot() requires specific hardware conditions or abnormal state, we were unable to construct a test case to reliably trigger these specific error paths at runtime.
Title usb: xhci: Fix memory leak in xhci_disable_slot()
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-05-08T14:22:03.985Z

Reserved: 2026-05-01T14:12:56.009Z

Link: CVE-2026-43432

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T15:16:55.470

Modified: 2026-05-08T15:16:55.470

Link: CVE-2026-43432

cve-icon Redhat

Severity : Low

Publid Date: 2026-05-08T00:00:00Z

Links: CVE-2026-43432 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T16:30:37Z

Weaknesses