Description
In the Linux kernel, the following vulnerability has been resolved:

can: usb: etas_es58x: correctly anchor the urb in the read bulk callback

When submitting an urb, that is using the anchor pattern, it needs to be
anchored before submitting it otherwise it could be leaked if
usb_kill_anchored_urbs() is called. This logic is correctly done
elsewhere in the driver, except in the read bulk callback so do that
here also.
Published: 2026-03-25
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the USB subsystem of the Linux kernel, specifically the etas_es58x driver. An URB that is supposed to be anchored is not anchored in the read bulk callback, which means that if usb_kill_anchored_urbs() is later invoked the URB can be leaked. This misuse of the anchor mechanism can lead to an uncontrolled resource leak; over time an attacker could exhaust kernel memory or file descriptors, resulting in a denial‑of‑service condition for legitimate users. The weakness corresponds to CWE‑772, representing an improper release of a resource.

Affected Systems

Only Linux kernel implementations that include the etas_es58x USB driver are affected. The issue was present before the recent commit that introduced the fix, and it applies to all kernel releases that have not yet incorporated this change. Systems running the kernel at the time of the CVE ingress will be vulnerable unless the kernel has been updated with the appropriate patch.

Risk and Exploitability

With an EPSS score below 1 % and no listing in the CISA KEV catalog, the likelihood of widespread exploitation is currently low. Nevertheless, the defect is exploitable by an entity that can trigger the read bulk callback – typically a local user with a malicious USB device or an attacker who has already compromised the machine. The attack would not provide privilege escalation but could disrupt services by depleting kernel resources. The impact is limited to denial of service rather than data exfiltration or code execution.

Generated by OpenCVE AI on March 26, 2026 at 13:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that includes the commit that anchors the URB in the read bulk callback.
  • If an update is not immediately possible, disable or remove the etas_es58x USB driver until the kernel can be patched.
  • Monitor system logs for indications of repeated usb_kill_anchored_urbs() activity and for signs of memory exhaustion.
  • Apply any vendor-provided workarounds or patches as they become available.

Generated by OpenCVE AI on March 26, 2026 at 13:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 09:15:00 +0000


Thu, 26 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416
CWE-778

Thu, 26 Mar 2026 00:15:00 +0000


Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416
CWE-778

Wed, 25 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: can: usb: etas_es58x: correctly anchor the urb in the read bulk callback When submitting an urb, that is using the anchor pattern, it needs to be anchored before submitting it otherwise it could be leaked if usb_kill_anchored_urbs() is called. This logic is correctly done elsewhere in the driver, except in the read bulk callback so do that here also.
Title can: usb: etas_es58x: correctly anchor the urb in the read bulk callback
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-18T08:57:57.249Z

Reserved: 2026-01-13T15:37:45.996Z

Link: CVE-2026-23324

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-25T11:16:29.377

Modified: 2026-04-18T09:16:18.870

Link: CVE-2026-23324

cve-icon Redhat

Severity :

Publid Date: 2026-03-25T00:00:00Z

Links: CVE-2026-23324 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:49:47Z

Weaknesses