Impact
The vulnerability is a memory leak in the Linux kernel’s USB XHCI driver. During the cleanup path of xhci_disable_slot() only the command structure is freed, leaving the completion structure allocated. This persistent leak can cause gradual memory exhaustion and ultimately a denial of service. The weakness is categorized as an excessive resource allocation flaw (CWE‑763).
Affected Systems
The bug appears in the core Linux kernel, affecting any distribution that runs an unpatched kernel with XHCI driver support. It first surfaced in the 6.13‑rc1 release and continues to exist in the latest mainline kernel versions until the applied patch. All systems that employ USB XHCI controllers are potentially impacted.
Risk and Exploitability
The CVSS score of 5.5 indicates medium severity. The EPSS score is below 1 % and the vulnerability is not listed in CISA KEV, pointing to a low probability of widespread exploitation. Based on the description, it is inferred that exploiting the flaw requires triggering a specific error path in xhci_disable_slot(), which likely demands particular hardware conditions or a corrupted USB device state. Consequently the practical risk for ordinary users is low, but systems heavily exposed to USB device changes or custom hardware could still experience memory exhaustion and service disruption.
OpenCVE Enrichment