CVE-2026-23058
Memory Leak in Linux Kernel ems_usb USB Bulk Callback
Publication date: 2026-02-04
Last updated on: 2026-02-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux_kernel | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory leak in the Linux kernel's ems_usb driver, specifically in the ems_usb_read_bulk_callback() function. The issue arises because USB Request Blocks (URBs) are unanchored by the USB framework before the completion callback is called, causing them not to be properly released in the ems_usb_close() function. As a result, memory allocated for these URBs is not freed, leading to a memory leak.
The fix involves anchoring the URB again within the ems_usb_read_bulk_callback() function to ensure that the URBs remain tracked and are properly freed when the device is closed.
How can this vulnerability impact me? :
This memory leak can cause the system to consume increasing amounts of memory over time when using the ems_usb driver, potentially leading to degraded system performance or instability. In environments where the affected USB device is frequently used, this could result in resource exhaustion, causing crashes or requiring system reboots.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know