{"id":"CVE-2026-23324","summary":"can: usb: etas_es58x: correctly anchor the urb in the read bulk callback","details":"In the Linux kernel, the following vulnerability has been resolved:\n\ncan: usb: etas_es58x: correctly anchor the urb in the read bulk callback\n\nWhen submitting an urb, that is using the anchor pattern, it needs to be\nanchored before submitting it otherwise it could be leaked if\nusb_kill_anchored_urbs() is called.  This logic is correctly done\nelsewhere in the driver, except in the read bulk callback so do that\nhere also.","modified":"2026-04-02T13:12:21.487202Z","published":"2026-03-25T10:27:17.476Z","database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23324.json"},"references":[{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"},{"type":"WEB","url":"https://git.kernel.org/stable/c/18eee279e9b5bff0db1aca9475ae4bc12804f05c"},{"type":"WEB","url":"https://git.kernel.org/stable/c/2185ea6e4ebcb61d1224dc7d187c59723cb5ad59"},{"type":"WEB","url":"https://git.kernel.org/stable/c/5eaad4f768266f1f17e01232ffe2ef009f8129b7"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b878444519fa03a3edd287d1963cf79ef78be2f1"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b8f9ca88253574638bcff38900a4c28d570b1919"},{"type":"WEB","url":"https://git.kernel.org/stable/c/f6e90c113c92e83fc0963d5e60e16b0e8a268981"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/23xxx/CVE-2026-23324.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23324"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"8537257874e949a59c834cecfd5a063e11b64b0b"},{"fixed":"2185ea6e4ebcb61d1224dc7d187c59723cb5ad59"},{"fixed":"f6e90c113c92e83fc0963d5e60e16b0e8a268981"},{"fixed":"b878444519fa03a3edd287d1963cf79ef78be2f1"},{"fixed":"18eee279e9b5bff0db1aca9475ae4bc12804f05c"},{"fixed":"b8f9ca88253574638bcff38900a4c28d570b1919"},{"fixed":"5eaad4f768266f1f17e01232ffe2ef009f8129b7"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23324.json"}},{"package":{"name":"Kernel","ecosystem":"Linux"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"5.13.0"},{"fixed":"6.1.167"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.2.0"},{"fixed":"6.6.130"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.7.0"},{"fixed":"6.12.77"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.13.0"},{"fixed":"6.18.17"}]},{"type":"ECOSYSTEM","events":[{"introduced":"6.19.0"},{"fixed":"6.19.7"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-23324.json"}}],"schema_version":"1.7.5"}