CVE-2026-43231
Awaiting Analysis Awaiting Analysis - Queue
Memory Leak in Linux Kernel radio-keene Driver

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: media: radio-keene: fix memory leak in error path Fix a memory leak in usb_keene_probe(). The v4l2 control handler is initialized and controls are added, but if v4l2_device_register() or video_register_device() fails afterward, the handler was never freed, leaking memory. Add v4l2_ctrl_handler_free() call in the err_v4l2 error path to ensure the control handler is properly freed for all error paths after it is initialized.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
linux_kernel linux_kernel *
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability described is a memory leak in the Linux kernel's media radio-keene component. It involves improper freeing of resources in error paths during device registration. There is no information provided about any impact on data confidentiality, integrity, or availability that would relate to compliance with standards such as GDPR or HIPAA.

Therefore, based on the provided information, there is no indication that this vulnerability directly affects compliance with common standards and regulations like GDPR or HIPAA.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability is a memory leak in the Linux kernel's media radio-keene driver related to error handling in usb_keene_probe().

To mitigate this vulnerability, you should update your Linux kernel to a version that includes the fix where v4l2_ctrl_handler_free() is properly called in the error path to free the control handler.


Can you explain this vulnerability to me?

This vulnerability is a memory leak in the Linux kernel's media subsystem, specifically in the radio-keene driver. When the usb_keene_probe() function initializes the v4l2 control handler and adds controls, if subsequent calls to v4l2_device_register() or video_register_device() fail, the control handler is not freed properly. This causes a memory leak because the allocated resources are not released in the error path.

The fix involves adding a call to v4l2_ctrl_handler_free() in the error handling path to ensure that the control handler is freed properly whenever an error occurs after initialization.


How can this vulnerability impact me? :

This vulnerability can lead to a memory leak in the Linux kernel when using the affected media driver. Over time, repeated failures in device registration could cause the system to consume more memory than necessary, potentially leading to degraded system performance or instability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart