{"id":"CVE-2026-23307","summary":"can: ems_usb: ems_usb_read_bulk_callback(): check the proper length of a message","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ncan: ems_usb: ems_usb_read_bulk_callback(): check the proper length of a message\n\nWhen looking at the data in a USB urb, the actual_length is the size of\nthe buffer passed to the driver, not the transfer_buffer_length which is\nset by the driver as the max size of the buffer.\n\nWhen parsing the messages in ems_usb_read_bulk_callback() properly check\nthe size both at the beginning of parsing the message to make sure it is\nbig enough for the expected structure, and at the end of the message to\nmake sure we don't overflow past the end of the buffer for the next\nmessage.","modified":"2026-04-02T13:12:20.693460Z","published":"2026-03-25T10:27:02.746Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23307.json","cna_assigner":"Linux"},"references":[{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1818974e1b5ef200e27f144c8cb8a246420bb54d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/18f75b9cbdc3703f15965425ab69dee509b07785"},{"type":"WEB","url":"https://git.kernel.org/stable/c/1cf469026d4a2308eaa91d04dca4a900d07a5c2e"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2833e13e2b099546abf5d40a483b4eb04ddd1f7b"},{"type":"WEB","url":"https://git.kernel.org/stable/c/38a01c9700b0dcafe97dfa9dc7531bf4a245deff"},{"type":"WEB","url":"https://git.kernel.org/stable/c/c703bbf8e9b4947e111c88d2ed09236a6772a471"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23307.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23307"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"702171adeed3607ee9603ec30ce081411e36ae42"},{"fixed":"c703bbf8e9b4947e111c88d2ed09236a6772a471"},{"fixed":"1818974e1b5ef200e27f144c8cb8a246420bb54d"},{"fixed":"18f75b9cbdc3703f15965425ab69dee509b07785"},{"fixed":"1cf469026d4a2308eaa91d04dca4a900d07a5c2e"},{"fixed":"2833e13e2b099546abf5d40a483b4eb04ddd1f7b"},{"fixed":"38a01c9700b0dcafe97dfa9dc7531bf4a245deff"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23307.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"2.6.32"},{"fixed":"6.1.167"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.130"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.77"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.18.17"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.19.0"},{"fixed":"6.19.7"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23307.json"}}],"schema_version":"1.7.5"}