usb: renesas_usbhs: fix use-after-free in ISR during device removal
Summary
| CVE | CVE-2026-43426 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-08 15:16:54 UTC |
| Updated | 2026-05-12 14:10:27 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: usb: renesas_usbhs: fix use-after-free in ISR during device removal In usbhs_remove(), the driver frees resources (including the pipe array) while the interrupt handler (usbhs_interrupt) is still registered. If an interrupt fires after usbhs_pipe_remove() but before the driver is fully unbound, the ISR may access freed memory, causing a use-after-free. Fix this by calling devm_free_irq() before freeing resources. This ensures the interrupt handler is both disabled and synchronized (waits for any running ISR to complete) before usbhs_pipe_remove() is called. |
Risk And Classification
EPSS: 0.000240000 probability, percentile 0.070360000 (date 2026-05-12)
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected f1407d5c66240b33d11a7f1a41d55ccf6a9d7647 c7012fc73dab4829404fedeeaa8531f12ac8545f git | Not specified |
| CNA | Linux | Linux | affected f1407d5c66240b33d11a7f1a41d55ccf6a9d7647 51afaf919bbaacdd9cc9e146033ae0a743a42dd7 git | Not specified |
| CNA | Linux | Linux | affected f1407d5c66240b33d11a7f1a41d55ccf6a9d7647 1899edac312ef17a7234851686e8a703f56d0a84 git | Not specified |
| CNA | Linux | Linux | affected f1407d5c66240b33d11a7f1a41d55ccf6a9d7647 9c6159d5b72d5fc265cce5da04f27d730b552e69 git | Not specified |
| CNA | Linux | Linux | affected f1407d5c66240b33d11a7f1a41d55ccf6a9d7647 6287e0c01ccb818e7214f88d885ffb7c9e81b0e0 git | Not specified |
| CNA | Linux | Linux | affected f1407d5c66240b33d11a7f1a41d55ccf6a9d7647 0b7d11fd6e742ecc0b1eca44b4f0b93140c74bae git | Not specified |
| CNA | Linux | Linux | affected f1407d5c66240b33d11a7f1a41d55ccf6a9d7647 6ffe44f022c95b1b29c691d2169c5abc046f7580 git | Not specified |
| CNA | Linux | Linux | affected f1407d5c66240b33d11a7f1a41d55ccf6a9d7647 3cbc242b88c607f55da3d0d0d336b49bf1e20412 git | Not specified |
| CNA | Linux | Linux | affected 3.0 | Not specified |
| CNA | Linux | Linux | unaffected 3.0 semver | Not specified |
| CNA | Linux | Linux | unaffected 5.10.253 5.10.* semver | Not specified |
| CNA | Linux | Linux | unaffected 5.15.203 5.15.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.1.167 6.1.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.130 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.78 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.19 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19.9 6.19.* semver | Not specified |
| CNA | Linux | Linux | unaffected 7.0 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/6287e0c01ccb818e7214f88d885ffb7c9e81b0e0 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/3cbc242b88c607f55da3d0d0d336b49bf1e20412 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/51afaf919bbaacdd9cc9e146033ae0a743a42dd7 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/0b7d11fd6e742ecc0b1eca44b4f0b93140c74bae | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/1899edac312ef17a7234851686e8a703f56d0a84 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/9c6159d5b72d5fc265cce5da04f27d730b552e69 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/6ffe44f022c95b1b29c691d2169c5abc046f7580 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/c7012fc73dab4829404fedeeaa8531f12ac8545f | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.