CVE-2025-71154

In the Linux kernel, the following vulnerability has been resolved: net: usb: rtl8150: fix memory leak on usb_submit_urb() failure In async_set_registers(), when usb_submit_urb() fails, the allocated async_req structure and URB are not freed, causing a memory leak. The completion callback async_set_reg_cb() is responsible for freeing these allocations, but it is only called after the URB is successfully submitted and completes (successfully or with error). If submission fails, the callback never runs and the memory is leaked. Fix this by freeing both the URB and the request structure in the error path when usb_submit_urb() fails.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.10:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.10:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.10:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.10:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*

History

26 Feb 2026, 20:30

Type Values Removed Values Added
CWE CWE-401
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:3.10:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.10:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.10:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.10:rc7:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.10:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:3.10:rc6:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
References () https://git.kernel.org/stable/c/12cab1191d9890097171156d06bfa8d31f1e39c8 - () https://git.kernel.org/stable/c/12cab1191d9890097171156d06bfa8d31f1e39c8 - Patch
References () https://git.kernel.org/stable/c/151403e903840c9cf06754097b6732c14f26c532 - () https://git.kernel.org/stable/c/151403e903840c9cf06754097b6732c14f26c532 - Patch
References () https://git.kernel.org/stable/c/2f966186b99550e3c665dbfb87b8314e30acea02 - () https://git.kernel.org/stable/c/2f966186b99550e3c665dbfb87b8314e30acea02 - Patch
References () https://git.kernel.org/stable/c/4bd4ea3eb326608ffc296db12c105f92dc2f2190 - () https://git.kernel.org/stable/c/4bd4ea3eb326608ffc296db12c105f92dc2f2190 - Patch
References () https://git.kernel.org/stable/c/6492ad6439ff1a479fc94dc6052df3628faed8b6 - () https://git.kernel.org/stable/c/6492ad6439ff1a479fc94dc6052df3628faed8b6 - Patch
References () https://git.kernel.org/stable/c/a4e2442d3c48355a84463342f397134f149936d7 - () https://git.kernel.org/stable/c/a4e2442d3c48355a84463342f397134f149936d7 - Patch
References () https://git.kernel.org/stable/c/db2244c580540306d60ce783ed340190720cd429 - () https://git.kernel.org/stable/c/db2244c580540306d60ce783ed340190720cd429 - Patch

23 Jan 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-23 15:16

Updated : 2026-02-26 20:30


NVD link : CVE-2025-71154

Mitre link : CVE-2025-71154

CVE.ORG link : CVE-2025-71154


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime