net: usb: kalmia: validate USB endpoints
Summary
| CVE | CVE-2026-23365 |
|---|---|
| State | PUBLISHED |
| Assigner | Linux |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-03-25 11:16:35 UTC |
| Updated | 2026-04-18 09:16:21 UTC |
| Description | In the Linux kernel, the following vulnerability has been resolved: net: usb: kalmia: validate USB endpoints The kalmia driver should validate that the device it is probing has the proper number and types of USB endpoints it is expecting before it binds to it. If a malicious device were to not have the same urbs the driver will crash later on when it blindly accesses these endpoints. |
Risk And Classification
EPSS: 0.000320000 probability, percentile 0.090980000 (date 2026-04-18)
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Linux | Linux | affected d40261236e8e278cb1936cb5e934262971692b10 ff675bc5b3e8c356f9d993d65d0bae6ed0dc7459 git | Not specified |
| CNA | Linux | Linux | affected d40261236e8e278cb1936cb5e934262971692b10 185050b47df3d41e49f20ad01beea2e7b9cddaa7 git | Not specified |
| CNA | Linux | Linux | affected d40261236e8e278cb1936cb5e934262971692b10 28a380bfa5bc7f6a9380b85e8eab919ee6ac1701 git | Not specified |
| CNA | Linux | Linux | affected d40261236e8e278cb1936cb5e934262971692b10 12c0243de0aee0ab27cc00932fd5edae65c1e3a2 git | Not specified |
| CNA | Linux | Linux | affected d40261236e8e278cb1936cb5e934262971692b10 51c20ea5f1555a984c041b0dbf56f00d41b9e652 git | Not specified |
| CNA | Linux | Linux | affected d40261236e8e278cb1936cb5e934262971692b10 011684cd18349aa4c52167c8ac37a0524169f48c git | Not specified |
| CNA | Linux | Linux | affected d40261236e8e278cb1936cb5e934262971692b10 7bfda1a0be4caec3263753d567678451cef73a85 git | Not specified |
| CNA | Linux | Linux | affected d40261236e8e278cb1936cb5e934262971692b10 c58b6c29a4c9b8125e8ad3bca0637e00b71e2693 git | Not specified |
| CNA | Linux | Linux | affected 3.0 | Not specified |
| CNA | Linux | Linux | unaffected 3.0 semver | Not specified |
| CNA | Linux | Linux | unaffected 5.10.253 5.10.* semver | Not specified |
| CNA | Linux | Linux | unaffected 5.15.203 5.15.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.1.167 6.1.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.6.130 6.6.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.12.77 6.12.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.18.17 6.18.* semver | Not specified |
| CNA | Linux | Linux | unaffected 6.19.7 6.19.* semver | Not specified |
| CNA | Linux | Linux | unaffected 7.0 * original_commit_for_fix | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| git.kernel.org/stable/c/ff675bc5b3e8c356f9d993d65d0bae6ed0dc7459 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/011684cd18349aa4c52167c8ac37a0524169f48c | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/12c0243de0aee0ab27cc00932fd5edae65c1e3a2 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/51c20ea5f1555a984c041b0dbf56f00d41b9e652 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/185050b47df3d41e49f20ad01beea2e7b9cddaa7 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/28a380bfa5bc7f6a9380b85e8eab919ee6ac1701 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/7bfda1a0be4caec3263753d567678451cef73a85 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| git.kernel.org/stable/c/c58b6c29a4c9b8125e8ad3bca0637e00b71e2693 | 416baaa9-dc9f-4396-8d5f-8c081fb06d67 | git.kernel.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.