usb: usbtmc: Flush anchored URBs in usbtmc_release

Summary

CVECVE-2026-31758
StatePUBLISHED
AssignerLinux
Source PriorityCVE Program / NVD first with legacy fallback
Published2026-05-01 15:16:38 UTC
Updated2026-05-03 07:16:19 UTC
DescriptionIn the Linux kernel, the following vulnerability has been resolved: usb: usbtmc: Flush anchored URBs in usbtmc_release When calling usbtmc_release, pending anchored URBs must be flushed or killed to prevent use-after-free errors (e.g. in the HCD giveback path). Call usbtmc_draw_down() to allow anchored URBs to be completed.

Risk And Classification

Primary CVSS: v3.1 7.8 HIGH from 416baaa9-dc9f-4396-8d5f-8c081fb06d67

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS: 0.000240000 probability, percentile 0.068220000 (date 2026-05-02)


VersionSourceTypeScoreSeverityVector
3.1416baaa9-dc9f-4396-8d5f-8c081fb06d67Secondary7.8HIGHCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
3.1CNADECLARED7.8HIGHCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CVSS v3.1 Breakdown

Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Vendor Declared Affected Products

SourceVendorProductVersionPlatforms
CNA Linux Linux affected 4f3c8d6eddc272b386464524235440a418ed2029 959ef329071136e4335b54822fe2f607659b4569 git Not specified
CNA Linux Linux affected 4f3c8d6eddc272b386464524235440a418ed2029 e189d443767f7cd390c52f2e122e1fc41c7562d6 git Not specified
CNA Linux Linux affected 4f3c8d6eddc272b386464524235440a418ed2029 7fa8f61bab3fb75b5deba8a0f3abb74dc5068d9f git Not specified
CNA Linux Linux affected 4f3c8d6eddc272b386464524235440a418ed2029 95e09b07e50290254b28b8395509473104518f8c git Not specified
CNA Linux Linux affected 4f3c8d6eddc272b386464524235440a418ed2029 d13318dec0c1e0e2ac16f8ecbd522db14cea4bb1 git Not specified
CNA Linux Linux affected 4f3c8d6eddc272b386464524235440a418ed2029 977b632db51d231dec0bc571089a5c2402674139 git Not specified
CNA Linux Linux affected 4f3c8d6eddc272b386464524235440a418ed2029 d40198de50232e04c14c6e2092e896766c95ea48 git Not specified
CNA Linux Linux affected 4f3c8d6eddc272b386464524235440a418ed2029 8a768552f7a8276fb9e01d49773d2094ace7c8f1 git Not specified
CNA Linux Linux affected 4.19 Not specified
CNA Linux Linux unaffected 4.19 semver Not specified
CNA Linux Linux unaffected 5.10.253 5.10.* semver Not specified
CNA Linux Linux unaffected 5.15.203 5.15.* semver Not specified
CNA Linux Linux unaffected 6.1.168 6.1.* semver Not specified
CNA Linux Linux unaffected 6.6.134 6.6.* semver Not specified
CNA Linux Linux unaffected 6.12.81 6.12.* semver Not specified
CNA Linux Linux unaffected 6.18.22 6.18.* semver Not specified
CNA Linux Linux unaffected 6.19.12 6.19.* semver Not specified
CNA Linux Linux unaffected 7.0 * original_commit_for_fix Not specified

References

ReferenceSourceLinkTags
git.kernel.org/stable/c/8a768552f7a8276fb9e01d49773d2094ace7c8f1 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/d40198de50232e04c14c6e2092e896766c95ea48 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/7fa8f61bab3fb75b5deba8a0f3abb74dc5068d9f 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/959ef329071136e4335b54822fe2f607659b4569 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/d13318dec0c1e0e2ac16f8ecbd522db14cea4bb1 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/977b632db51d231dec0bc571089a5c2402674139 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/e189d443767f7cd390c52f2e122e1fc41c7562d6 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/95e09b07e50290254b28b8395509473104518f8c 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report