{"api_version":"1","generated_at":"2026-05-12T00:56:20+00:00","cve":"CVE-2026-43375","urls":{"html":"https://cve.report/CVE-2026-43375","api":"https://cve.report/api/cve/CVE-2026-43375.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-43375","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-43375"},"summary":{"title":"net: mctp: fix device leak on probe failure","description":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mctp: fix device leak on probe failure\n\nDriver core holds a reference to the USB interface and its parent USB\ndevice while the interface is bound to a driver and there is no need to\ntake additional references unless the structures are needed after\ndisconnect.\n\nThis driver takes a reference to the USB device during probe but does\nnot to release it on probe failures.\n\nDrop the redundant device reference to fix the leak, reduce cargo\nculting, make it easier to spot drivers where an extra reference is\nneeded, and reduce the risk of further memory leaks.","state":"PUBLISHED","assigner":"Linux","published_at":"2026-05-08 15:16:48","updated_at":"2026-05-08 15:16:48"},"problem_types":[],"metrics":[],"references":[{"url":"https://git.kernel.org/stable/c/ec9538f9b5cd1db5e8c612aa636b6119b6355c5d","name":"https://git.kernel.org/stable/c/ec9538f9b5cd1db5e8c612aa636b6119b6355c5d","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/3224990fb16a831aabc50b67c74f5d0074ce80dd","name":"https://git.kernel.org/stable/c/3224990fb16a831aabc50b67c74f5d0074ce80dd","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/224a0d284c3caf1951302d1744a714784febed71","name":"https://git.kernel.org/stable/c/224a0d284c3caf1951302d1744a714784febed71","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-43375","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-43375","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 0791c0327a6e4e7691d6fc5ad334c215de04dcc9 3224990fb16a831aabc50b67c74f5d0074ce80dd git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 0791c0327a6e4e7691d6fc5ad334c215de04dcc9 ec9538f9b5cd1db5e8c612aa636b6119b6355c5d git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 0791c0327a6e4e7691d6fc5ad334c215de04dcc9 224a0d284c3caf1951302d1744a714784febed71 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 6.15","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.15 semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.18.19 6.18.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.19.9 6.19.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 7.0 * original_commit_for_fix","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"43375","cve":"CVE-2026-43375","epss":"0.000170000","percentile":"0.041290000","score_date":"2026-05-11","updated_at":"2026-05-12 00:01:18"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Linux","programFiles":["drivers/net/mctp/mctp-usb.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"lessThan":"3224990fb16a831aabc50b67c74f5d0074ce80dd","status":"affected","version":"0791c0327a6e4e7691d6fc5ad334c215de04dcc9","versionType":"git"},{"lessThan":"ec9538f9b5cd1db5e8c612aa636b6119b6355c5d","status":"affected","version":"0791c0327a6e4e7691d6fc5ad334c215de04dcc9","versionType":"git"},{"lessThan":"224a0d284c3caf1951302d1744a714784febed71","status":"affected","version":"0791c0327a6e4e7691d6fc5ad334c215de04dcc9","versionType":"git"}]},{"defaultStatus":"affected","product":"Linux","programFiles":["drivers/net/mctp/mctp-usb.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"status":"affected","version":"6.15"},{"lessThan":"6.15","status":"unaffected","version":"0","versionType":"semver"},{"lessThanOrEqual":"6.18.*","status":"unaffected","version":"6.18.19","versionType":"semver"},{"lessThanOrEqual":"6.19.*","status":"unaffected","version":"6.19.9","versionType":"semver"},{"lessThanOrEqual":"*","status":"unaffected","version":"7.0","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.18.19","versionStartIncluding":"6.15","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.19.9","versionStartIncluding":"6.15","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"7.0","versionStartIncluding":"6.15","vulnerable":true}],"negate":false,"operator":"OR"}]}],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mctp: fix device leak on probe failure\n\nDriver core holds a reference to the USB interface and its parent USB\ndevice while the interface is bound to a driver and there is no need to\ntake additional references unless the structures are needed after\ndisconnect.\n\nThis driver takes a reference to the USB device during probe but does\nnot to release it on probe failures.\n\nDrop the redundant device reference to fix the leak, reduce cargo\nculting, make it easier to spot drivers where an extra reference is\nneeded, and reduce the risk of further memory leaks."}],"providerMetadata":{"dateUpdated":"2026-05-08T14:21:25.193Z","orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux"},"references":[{"url":"https://git.kernel.org/stable/c/3224990fb16a831aabc50b67c74f5d0074ce80dd"},{"url":"https://git.kernel.org/stable/c/ec9538f9b5cd1db5e8c612aa636b6119b6355c5d"},{"url":"https://git.kernel.org/stable/c/224a0d284c3caf1951302d1744a714784febed71"}],"title":"net: mctp: fix device leak on probe failure","x_generator":{"engine":"bippy-1.2.0"}}},"cveMetadata":{"assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","assignerShortName":"Linux","cveId":"CVE-2026-43375","datePublished":"2026-05-08T14:21:25.193Z","dateReserved":"2026-05-01T14:12:56.006Z","dateUpdated":"2026-05-08T14:21:25.193Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-08 15:16:48","lastModifiedDate":"2026-05-08 15:16:48","problem_types":[],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"43375","Ordinal":"1","Title":"net: mctp: fix device leak on probe failure","CVE":"CVE-2026-43375","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"43375","Ordinal":"1","NoteData":"In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mctp: fix device leak on probe failure\n\nDriver core holds a reference to the USB interface and its parent USB\ndevice while the interface is bound to a driver and there is no need to\ntake additional references unless the structures are needed after\ndisconnect.\n\nThis driver takes a reference to the USB device during probe but does\nnot to release it on probe failures.\n\nDrop the redundant device reference to fix the leak, reduce cargo\nculting, make it easier to spot drivers where an extra reference is\nneeded, and reduce the risk of further memory leaks.","Type":"Description","Title":"net: mctp: fix device leak on probe failure"}]}}}