CVE-2026-43432
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
08/05/2026
Última modificación:
08/05/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
usb: xhci: Fix memory leak in xhci_disable_slot()<br />
<br />
xhci_alloc_command() allocates a command structure and, when the<br />
second argument is true, also allocates a completion structure.<br />
Currently, the error handling path in xhci_disable_slot() only frees<br />
the command structure using kfree(), causing the completion structure<br />
to leak.<br />
<br />
Use xhci_free_command() instead of kfree(). xhci_free_command() correctly<br />
frees both the command structure and the associated completion structure.<br />
Since the command structure is allocated with zero-initialization,<br />
command->in_ctx is NULL and will not be erroneously freed by<br />
xhci_free_command().<br />
<br />
This bug was found using an experimental static analysis tool we are<br />
developing. The tool is based on the LLVM framework and is specifically<br />
designed to detect memory management issues. It is currently under<br />
active development and not yet publicly available, but we plan to<br />
open-source it after our research is published.<br />
<br />
The bug was originally detected on v6.13-rc1 using our static analysis<br />
tool, and we have verified that the issue persists in the latest mainline<br />
kernel.<br />
<br />
We performed build testing on x86_64 with allyesconfig using GCC=11.4.0.<br />
Since triggering these error paths in xhci_disable_slot() requires specific<br />
hardware conditions or abnormal state, we were unable to construct a test<br />
case to reliably trigger these specific error paths at runtime.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/078b446efc0f5e496c31bccb72b98af979963a83
- https://git.kernel.org/stable/c/1e800e26d54ccf2ddf2ea6d6cbe021c804d8aa62
- https://git.kernel.org/stable/c/2e2baa8fb5aa4d080cbfeb84c51eff797529f413
- https://git.kernel.org/stable/c/46aea90763832cd6e9b0c2e1c00e6a9512156d4b
- https://git.kernel.org/stable/c/6288baf0c8c4dcfbf206773aede9c1f2269cec28
- https://git.kernel.org/stable/c/807e4fb5140c73eb5dba1e399a990db5c1f3cdf8
- https://git.kernel.org/stable/c/c1c8550e70401159184130a1afc6261db01fc0ce
- https://git.kernel.org/stable/c/c65f1b840ab8ce72ba68f1b63bab7960f8fdfa89



