Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6pcx-mjxw-6w72

Опубликовано: 25 мар. 2026
Источник: github
Github: Не прошло ревью

Описание

In the Linux kernel, the following vulnerability has been resolved:

can: usb: etas_es58x: correctly anchor the urb in the read bulk callback

When submitting an urb, that is using the anchor pattern, it needs to be anchored before submitting it otherwise it could be leaked if usb_kill_anchored_urbs() is called. This logic is correctly done elsewhere in the driver, except in the read bulk callback so do that here also.

In the Linux kernel, the following vulnerability has been resolved:

can: usb: etas_es58x: correctly anchor the urb in the read bulk callback

When submitting an urb, that is using the anchor pattern, it needs to be anchored before submitting it otherwise it could be leaked if usb_kill_anchored_urbs() is called. This logic is correctly done elsewhere in the driver, except in the read bulk callback so do that here also.

EPSS

Процентиль: 7%
0.00024
Низкий

Связанные уязвимости

msrc
1 день назад

can: usb: etas_es58x: correctly anchor the urb in the read bulk callback

EPSS

Процентиль: 7%
0.00024
Низкий