Описание
In the Linux kernel, the following vulnerability has been resolved:
can: usb: etas_es58x: correctly anchor the urb in the read bulk callback
When submitting an urb, that is using the anchor pattern, it needs to be anchored before submitting it otherwise it could be leaked if usb_kill_anchored_urbs() is called. This logic is correctly done elsewhere in the driver, except in the read bulk callback so do that here also.
In the Linux kernel, the following vulnerability has been resolved:
can: usb: etas_es58x: correctly anchor the urb in the read bulk callback
When submitting an urb, that is using the anchor pattern, it needs to be anchored before submitting it otherwise it could be leaked if usb_kill_anchored_urbs() is called. This logic is correctly done elsewhere in the driver, except in the read bulk callback so do that here also.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2026-23324
- https://git.kernel.org/stable/c/18eee279e9b5bff0db1aca9475ae4bc12804f05c
- https://git.kernel.org/stable/c/2185ea6e4ebcb61d1224dc7d187c59723cb5ad59
- https://git.kernel.org/stable/c/5eaad4f768266f1f17e01232ffe2ef009f8129b7
- https://git.kernel.org/stable/c/b878444519fa03a3edd287d1963cf79ef78be2f1
- https://git.kernel.org/stable/c/b8f9ca88253574638bcff38900a4c28d570b1919
- https://git.kernel.org/stable/c/f6e90c113c92e83fc0963d5e60e16b0e8a268981
EPSS
CVE ID
Связанные уязвимости
can: usb: etas_es58x: correctly anchor the urb in the read bulk callback
EPSS