Description
In the Linux kernel, the following vulnerability has been resolved:

can: etas_es58x: allow partial RX URB allocation to succeed

When es58x_alloc_rx_urbs() fails to allocate the requested number of
URBs but succeeds in allocating some, it returns an error code.
This causes es58x_open() to return early, skipping the cleanup label
'free_urbs', which leads to the anchored URBs being leaked.

As pointed out by maintainer Vincent Mailhol, the driver is designed
to handle partial URB allocation gracefully. Therefore, partial
allocation should not be treated as a fatal error.

Modify es58x_alloc_rx_urbs() to return 0 if at least one URB has been
allocated, restoring the intended behavior and preventing the leak
in es58x_open().
Published: 2026-01-31
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Resource Leak/Denial of Service
Action: Apply patch
AI Analysis

Impact

The Linux kernel driver for the CAN device etas_es58x incorrectly treats partial allocation of USB Request Blocks (URBs) as a fatal error, allowing some URBs to remain allocated when the driver opens its interface. This results in a memory leak that can accumulate over time, potentially exhausting system resources and leading to a denial of service if the kernel runs out of memory for subsequent URB allocations.

Affected Systems

Both Linux kernel variants that include the etas_es58x CAN driver are affected. No specific kernel version numbers are listed in the advisory, so all kernels containing the older implementation should be considered vulnerable until the patch is applied.

Risk and Exploitability

The EPSS score of less than 1% indicates a very low probability of exploitation. No exploits are publicly known, and the vulnerability has not been listed in the CISA KEV catalog. Because the issue results in a resource leak that could grow over time, an attacker who can repeatedly trigger the driver’s URB allocation path has the potential to exhaust kernel memory, leading to a denial of service. The severity is therefore primarily limited to systems that repeatedly use the etas_es58x driver or have high‑load USB environments.

Generated by OpenCVE AI on April 18, 2026 at 14:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Identify and apply the kernel patch that changes es58x_alloc_rx_urbs() to return success when at least one URB is allocated, preventing the leak.
  • Rebuild and install the updated kernel, ensuring the etas_es58x driver is loaded from the new image.
  • If a newer kernel release is available that includes the fix, upgrade the system to that kernel as an alternative to applying the patch.

Generated by OpenCVE AI on April 18, 2026 at 14:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4476-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6126-1 linux security update
Debian DSA Debian DSA DSA-6127-1 linux security update
Ubuntu USN Ubuntu USN USN-8162-1 Linux kernel (NVIDIA Tegra) vulnerabilities
Ubuntu USN Ubuntu USN USN-8180-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-8180-2 Linux kernel (FIPS) vulnerabilities
Ubuntu USN Ubuntu USN USN-8186-1 Linux kernel (Real-time) vulnerabilities
Ubuntu USN Ubuntu USN USN-8187-1 Linux kernel (NVIDIA) vulnerabilities
Ubuntu USN Ubuntu USN USN-8188-1 Linux kernel (HWE) vulnerabilities
History

Sat, 18 Apr 2026 14:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-401

Fri, 06 Feb 2026 16:45:00 +0000


Tue, 03 Feb 2026 00:15:00 +0000


Sat, 31 Jan 2026 12:00:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: can: etas_es58x: allow partial RX URB allocation to succeed When es58x_alloc_rx_urbs() fails to allocate the requested number of URBs but succeeds in allocating some, it returns an error code. This causes es58x_open() to return early, skipping the cleanup label 'free_urbs', which leads to the anchored URBs being leaked. As pointed out by maintainer Vincent Mailhol, the driver is designed to handle partial URB allocation gracefully. Therefore, partial allocation should not be treated as a fatal error. Modify es58x_alloc_rx_urbs() to return 0 if at least one URB has been allocated, restoring the intended behavior and preventing the leak in es58x_open().
Title can: etas_es58x: allow partial RX URB allocation to succeed
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-02-09T08:37:31.963Z

Reserved: 2026-01-13T15:37:45.943Z

Link: CVE-2026-23037

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-01-31T12:16:07.010

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-23037

cve-icon Redhat

Severity :

Publid Date: 2026-01-31T00:00:00Z

Links: CVE-2026-23037 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T14:30:02Z

Weaknesses