VYPR
Medium severity5.5NVD Advisory· Published Apr 24, 2026· Updated Apr 29, 2026

CVE-2026-31604

CVE-2026-31604

Description

In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw88: fix device leak on probe failure

Driver core holds a reference to the USB interface and its parent USB device while the interface is bound to a driver and there is no need to take additional references unless the structures are needed after disconnect.

This driver takes a reference to the USB device during probe but does not to release it on all probe errors (e.g. when descriptor parsing fails).

Drop the redundant device reference to fix the leak, reduce cargo culting, make it easier to spot drivers where an extra reference is needed, and reduce the risk of further memory leaks.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's rtw88 driver, a USB device reference leak occurs on probe failure, potentially leading to memory exhaustion.

Vulnerability

CVE-2026-31604 is a memory leak vulnerability in the rtw88 wireless driver in the Linux kernel. During probe, the driver takes an extra reference to the USB device via usb_get_dev(), but fails to release it on all error paths (e.g., when descriptor parsing fails). This results in a persistent device reference that prevents proper cleanup.

Exploitation

The vulnerability is triggered by inserting a Realtek USB WiFi adapter that is compatible with the rtw88 driver, but whose probe fails due to malformed descriptors or other issues. No special privileges are required; physical access or the ability to connect a USB device is sufficient. The attack surface is limited to systems with the rtw88 driver loaded.

Impact

An attacker who can repeatedly trigger probe failures could exhaust kernel memory, leading to denial of service. The CVSS score is 5.5 (Medium) with low attack complexity and no user interaction required, but availability impact is limited.

Mitigation

The fix drops the redundant usb_get_dev() call, as the driver core already holds a reference while the driver is bound. The patch was applied to the stable kernel trees in April 2026 [1]. Users should update to a kernel containing the commit to resolve the leak.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1
  • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
    Range: >=6.2,<6.6.136

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.