{"id":"CVE-2026-31672","summary":"wifi: rt2x00usb: fix devres lifetime","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rt2x00usb: fix devres lifetime\n\nUSB drivers bind to USB interfaces and any device managed resources\nshould have their lifetime tied to the interface rather than parent USB\ndevice. This avoids issues like memory leaks when drivers are unbound\nwithout their devices being physically disconnected (e.g. on probe\ndeferral or configuration changes).\n\nFix the USB anchor lifetime so that it is released on driver unbind.","modified":"2026-04-25T04:20:39.617429Z","published":"2026-04-24T14:45:19.725Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/31xxx/CVE-2026-31672.json","cna_assigner":"Linux"},"references":[{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"},{"type":"WEB","url":"https://git.kernel.org/stable/c/15b233e33b35b927bd8d0044c15325564ea1ba24"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1de5c76bf40e9cdeebf54662f63011fb10fa452f"},{"type":"WEB","url":"https://git.kernel.org/stable/c/25369b22223d1c56e42a0cd4ac9137349d5a898e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/64a457f6afbf15f984d95201a9a1e71eed3f9dd1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/65518a6965d527c53013947031f26754f6a4f6af"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b245db719bc7e57abf48bd5701662b270c3880f7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c99f198841b41735796e2ddfcd573783fb552eb9"},{"type":"WEB","url":"https://git.kernel.org/stable/c/e360d15fcb1e819eef49e3d4434d8050542eed16"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/31xxx/CVE-2026-31672.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-31672"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"8b4c0009313f3d42e2540e3e1f776097dd0db73d"},{"fixed":"64a457f6afbf15f984d95201a9a1e71eed3f9dd1"},{"fixed":"65518a6965d527c53013947031f26754f6a4f6af"},{"fixed":"15b233e33b35b927bd8d0044c15325564ea1ba24"},{"fixed":"1de5c76bf40e9cdeebf54662f63011fb10fa452f"},{"fixed":"b245db719bc7e57abf48bd5701662b270c3880f7"},{"fixed":"e360d15fcb1e819eef49e3d4434d8050542eed16"},{"fixed":"c99f198841b41735796e2ddfcd573783fb552eb9"},{"fixed":"25369b22223d1c56e42a0cd4ac9137349d5a898e"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-31672.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"4.7.0"},{"fixed":"5.10.253"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.11.0"},{"fixed":"5.15.203"}]},{"type":"ECOSYSTEM","events":[{"introduced":"5.16.0"},{"fixed":"6.1.169"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.135"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.82"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.18.23"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.19.0"},{"fixed":"6.19.13"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-31672.json"}}],"schema_version":"1.7.5"}