Description
In the Linux kernel, the following vulnerability has been resolved:

can: usb: etas_es58x: correctly anchor the urb in the read bulk callback

When submitting an urb, that is using the anchor pattern, it needs to be
anchored before submitting it otherwise it could be leaked if
usb_kill_anchored_urbs() is called. This logic is correctly done
elsewhere in the driver, except in the read bulk callback so do that
here also.
Published: 2026-03-25
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Apply Patch
AI Analysis

Impact

The flaw is in the Linux kernel USB driver for etas_es58x. When an URB that should be anchored is processed in the read bulk callback, it is not anchored before submission. If usb_kill_anchored_urbs is later invoked, the URB can be leaked, causing an unreleased kernel resource. This improper release leads to a resource leak that could allow an attacker to consume kernel memory or other resources until the system becomes unresponsive. The vulnerability corresponds to CWE-772: Improper Release of Resource after Effective Lifetime.

Affected Systems

All Linux kernel releases that include the etas_es58x USB driver and have not applied the fix are affected. The vulnerable code is present in kernel versions preceding the commit that introduced the anchor logic; relevant releases include 5.13 and the 7.0 development releases (RC1 through RC7).

Risk and Exploitability

The CVSS score of 5.5 indicates a medium severity vulnerability. The EPSS score is below 1 %, and the issue is not listed in the CISA KEV catalog, suggesting a low likelihood of widespread exploitation. Based on the description, it is inferred that the attack vector would be local and would require an attacker to interact with the USB device to trigger the read bulk callback, which may be achievable by plugging a malicious device or by compromising the host.

Generated by OpenCVE AI on April 29, 2026 at 00:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Linux kernel to a version that contains the commit anchoring the URB in the read bulk callback.
  • If an immediate kernel upgrade is not possible, disable or remove the etas_es58x driver module to eliminate the vulnerability.
  • Continuously monitor logs for usb_kill_anchored_urbs activity and for signs of memory exhaustion that could indicate exploitation.

Generated by OpenCVE AI on April 29, 2026 at 00:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-4561-1 linux-6.1 security update
Debian DSA Debian DSA DSA-6238-1 linux security update
Debian DSA Debian DSA DSA-6243-1 linux security update
History

Thu, 23 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:o:linux:linux_kernel:5.13:-:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Sat, 18 Apr 2026 09:15:00 +0000


Thu, 26 Mar 2026 12:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416
CWE-778

Thu, 26 Mar 2026 00:15:00 +0000


Wed, 25 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-416
CWE-778

Wed, 25 Mar 2026 10:45:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: can: usb: etas_es58x: correctly anchor the urb in the read bulk callback When submitting an urb, that is using the anchor pattern, it needs to be anchored before submitting it otherwise it could be leaked if usb_kill_anchored_urbs() is called. This logic is correctly done elsewhere in the driver, except in the read bulk callback so do that here also.
Title can: usb: etas_es58x: correctly anchor the urb in the read bulk callback
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-18T08:57:57.249Z

Reserved: 2026-01-13T15:37:45.996Z

Link: CVE-2026-23324

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-03-25T11:16:29.377

Modified: 2026-04-23T21:05:15.090

Link: CVE-2026-23324

cve-icon Redhat

Severity :

Publid Date: 2026-03-25T00:00:00Z

Links: CVE-2026-23324 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T00:45:26Z

Weaknesses