Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: can: usb: etas_es58x: correctly anchor the urb in the read bulk callback When submitting an urb, that is using the anchor pattern, it needs to be anchored before submitting it otherwise it could be leaked if usb_kill_anchored_urbs() is called. This logic is correctly done elsewhere in the driver, except in the read bulk callback so do that here also.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 5.13.1, < 5.15.203 |
References
- https://git.kernel.org/stable/c/18eee279e9b5bff0db1aca9475ae4bc12804f05cPatch
- https://git.kernel.org/stable/c/2185ea6e4ebcb61d1224dc7d187c59723cb5ad59Patch
- https://git.kernel.org/stable/c/5eaad4f768266f1f17e01232ffe2ef009f8129b7Patch
- https://git.kernel.org/stable/c/7a0171b4921ad443fee5ed4fcb9d99fa4776edacPatch
- https://git.kernel.org/stable/c/b878444519fa03a3edd287d1963cf79ef78be2f1Patch
- https://git.kernel.org/stable/c/b8f9ca88253574638bcff38900a4c28d570b1919Patch
- https://git.kernel.org/stable/c/f6e90c113c92e83fc0963d5e60e16b0e8a268981Patch
FAQ
What is CVE-2026-23324?
CVE-2026-23324 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In the Linux kernel, the following vulnerability has been resolved: can: usb: etas_es58x: correctly anchor the urb in the read bulk callback When submitting an urb, that is using the anchor pattern,...
How severe is CVE-2026-23324?
CVE-2026-23324 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-23324?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.