CVE-2025-68734
Description
In the Linux kernel, the following vulnerability has been resolved:
isdn: mISDN: hfcsusb: fix memory leak in hfcsusb_probe()
In hfcsusb_probe(), the memory allocated for ctrl_urb gets leaked when setup_instance() fails with an error code. Fix that by freeing the urb before freeing the hw structure. Also change the error paths to use the goto ladder style.
Compile tested only. Issue found using a prototype static analysis tool.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A memory leak in the Linux kernel's hfcsusb driver where ctrl_urb is not freed if setup_instance() fails, leading to resource exhaustion.
The vulnerability resides in the hfcsusb_probe() function within the Linux kernel's ISDN subsystem (drivers/isdn/hfcsusb.c). When the probe function is called, it allocates memory for a control URB (ctrl_urb) via usb_alloc_urb(). If the subsequent call to setup_instance() fails and returns an error code, the function returns directly without freeing the previously allocated ctrl_urb. This causes a memory leak [1].
The leak can be triggered during device enumeration when a USB ISDN adapter handled by this driver is plugged in but the internal setup routine fails (e.g., due to hardware issues or resource constraints). No special privileges or authentication are required; an unprivileged user or automated system could cause the leak by repeatedly connecting a faulty or maliciously crafted USB device that triggers the error path [1].
An attacker who can repeatedly cause the probe failure can exhaust kernel memory over time, potentially leading to denial of service (system instability or crash). The impact is limited to memory exhaustion; there is no evidence of code execution or privilege escalation from this specific leak [1].
The fix has been applied in the mainline Linux kernel and backported to stable releases via commits such as 475032fa2bb8, 03695541b334, 3f7c72bc73c4, and 6dce43433e06 [1][2][3][4]. The patch ensures that ctrl_urb is freed before the error return, and converts the error paths to use a goto ladder style for consistency. Users should update their kernel to a version containing the fix or apply the patch manually.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- git.kernel.org/stable/c/03695541b3349bc40bf5d6563d44d6147fb20260nvd
- git.kernel.org/stable/c/3f7c72bc73c4e542fde14cce017549d8a0b61a3cnvd
- git.kernel.org/stable/c/3f978e3f1570155a1327ffa25f60968bc7b9398fnvd
- git.kernel.org/stable/c/475032fa2bb82ffb592c321885e917e39f47357fnvd
- git.kernel.org/stable/c/6dce43433e0635e7b00346bc937b69ce48ea71bbnvd
- git.kernel.org/stable/c/adb7577e23a431fc53aa1b6107733c0d751015fbnvd
- git.kernel.org/stable/c/b70c24827e11fdc71465f9207e974526fb457bb9nvd
- git.kernel.org/stable/c/ea7936304ed74ab7f965d17f942a173ce91a5ca8nvd
News mentions
0No linked articles in our index yet.