net: usb: kalmia: validate USB endpoints

Summary

CVECVE-2026-23365
StatePUBLISHED
AssignerLinux
Source PriorityCVE Program / NVD first with legacy fallback
Published2026-03-25 11:16:35 UTC
Updated2026-04-18 09:16:21 UTC
DescriptionIn the Linux kernel, the following vulnerability has been resolved: net: usb: kalmia: validate USB endpoints The kalmia driver should validate that the device it is probing has the proper number and types of USB endpoints it is expecting before it binds to it. If a malicious device were to not have the same urbs the driver will crash later on when it blindly accesses these endpoints.

Risk And Classification

EPSS: 0.000320000 probability, percentile 0.090980000 (date 2026-04-18)

Vendor Declared Affected Products

SourceVendorProductVersionPlatforms
CNA Linux Linux affected d40261236e8e278cb1936cb5e934262971692b10 ff675bc5b3e8c356f9d993d65d0bae6ed0dc7459 git Not specified
CNA Linux Linux affected d40261236e8e278cb1936cb5e934262971692b10 185050b47df3d41e49f20ad01beea2e7b9cddaa7 git Not specified
CNA Linux Linux affected d40261236e8e278cb1936cb5e934262971692b10 28a380bfa5bc7f6a9380b85e8eab919ee6ac1701 git Not specified
CNA Linux Linux affected d40261236e8e278cb1936cb5e934262971692b10 12c0243de0aee0ab27cc00932fd5edae65c1e3a2 git Not specified
CNA Linux Linux affected d40261236e8e278cb1936cb5e934262971692b10 51c20ea5f1555a984c041b0dbf56f00d41b9e652 git Not specified
CNA Linux Linux affected d40261236e8e278cb1936cb5e934262971692b10 011684cd18349aa4c52167c8ac37a0524169f48c git Not specified
CNA Linux Linux affected d40261236e8e278cb1936cb5e934262971692b10 7bfda1a0be4caec3263753d567678451cef73a85 git Not specified
CNA Linux Linux affected d40261236e8e278cb1936cb5e934262971692b10 c58b6c29a4c9b8125e8ad3bca0637e00b71e2693 git Not specified
CNA Linux Linux affected 3.0 Not specified
CNA Linux Linux unaffected 3.0 semver Not specified
CNA Linux Linux unaffected 5.10.253 5.10.* semver Not specified
CNA Linux Linux unaffected 5.15.203 5.15.* semver Not specified
CNA Linux Linux unaffected 6.1.167 6.1.* semver Not specified
CNA Linux Linux unaffected 6.6.130 6.6.* semver Not specified
CNA Linux Linux unaffected 6.12.77 6.12.* semver Not specified
CNA Linux Linux unaffected 6.18.17 6.18.* semver Not specified
CNA Linux Linux unaffected 6.19.7 6.19.* semver Not specified
CNA Linux Linux unaffected 7.0 * original_commit_for_fix Not specified

References

ReferenceSourceLinkTags
git.kernel.org/stable/c/ff675bc5b3e8c356f9d993d65d0bae6ed0dc7459 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/011684cd18349aa4c52167c8ac37a0524169f48c 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/12c0243de0aee0ab27cc00932fd5edae65c1e3a2 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/51c20ea5f1555a984c041b0dbf56f00d41b9e652 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/185050b47df3d41e49f20ad01beea2e7b9cddaa7 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/28a380bfa5bc7f6a9380b85e8eab919ee6ac1701 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/7bfda1a0be4caec3263753d567678451cef73a85 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
git.kernel.org/stable/c/c58b6c29a4c9b8125e8ad3bca0637e00b71e2693 416baaa9-dc9f-4396-8d5f-8c081fb06d67 git.kernel.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report