{"api_version":"1","generated_at":"2026-04-19T01:13:10+00:00","cve":"CVE-2026-23324","urls":{"html":"https://cve.report/CVE-2026-23324","api":"https://cve.report/api/cve/CVE-2026-23324.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-23324","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-23324"},"summary":{"title":"can: usb: etas_es58x: correctly anchor the urb in the read bulk callback","description":"In the Linux kernel, the following vulnerability has been resolved:\n\ncan: usb: etas_es58x: correctly anchor the urb in the read bulk callback\n\nWhen submitting an urb, that is using the anchor pattern, it needs to be\nanchored before submitting it otherwise it could be leaked if\nusb_kill_anchored_urbs() is called.  This logic is correctly done\nelsewhere in the driver, except in the read bulk callback so do that\nhere also.","state":"PUBLISHED","assigner":"Linux","published_at":"2026-03-25 11:16:29","updated_at":"2026-04-18 09:16:18"},"problem_types":[],"metrics":[],"references":[{"url":"https://git.kernel.org/stable/c/f6e90c113c92e83fc0963d5e60e16b0e8a268981","name":"https://git.kernel.org/stable/c/f6e90c113c92e83fc0963d5e60e16b0e8a268981","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/b8f9ca88253574638bcff38900a4c28d570b1919","name":"https://git.kernel.org/stable/c/b8f9ca88253574638bcff38900a4c28d570b1919","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/7a0171b4921ad443fee5ed4fcb9d99fa4776edac","name":"https://git.kernel.org/stable/c/7a0171b4921ad443fee5ed4fcb9d99fa4776edac","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/18eee279e9b5bff0db1aca9475ae4bc12804f05c","name":"https://git.kernel.org/stable/c/18eee279e9b5bff0db1aca9475ae4bc12804f05c","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/b878444519fa03a3edd287d1963cf79ef78be2f1","name":"https://git.kernel.org/stable/c/b878444519fa03a3edd287d1963cf79ef78be2f1","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/2185ea6e4ebcb61d1224dc7d187c59723cb5ad59","name":"https://git.kernel.org/stable/c/2185ea6e4ebcb61d1224dc7d187c59723cb5ad59","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://git.kernel.org/stable/c/5eaad4f768266f1f17e01232ffe2ef009f8129b7","name":"https://git.kernel.org/stable/c/5eaad4f768266f1f17e01232ffe2ef009f8129b7","refsource":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-23324","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-23324","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 8537257874e949a59c834cecfd5a063e11b64b0b 7a0171b4921ad443fee5ed4fcb9d99fa4776edac git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 8537257874e949a59c834cecfd5a063e11b64b0b 2185ea6e4ebcb61d1224dc7d187c59723cb5ad59 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 8537257874e949a59c834cecfd5a063e11b64b0b f6e90c113c92e83fc0963d5e60e16b0e8a268981 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 8537257874e949a59c834cecfd5a063e11b64b0b b878444519fa03a3edd287d1963cf79ef78be2f1 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 8537257874e949a59c834cecfd5a063e11b64b0b 18eee279e9b5bff0db1aca9475ae4bc12804f05c git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 8537257874e949a59c834cecfd5a063e11b64b0b b8f9ca88253574638bcff38900a4c28d570b1919 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 8537257874e949a59c834cecfd5a063e11b64b0b 5eaad4f768266f1f17e01232ffe2ef009f8129b7 git","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"affected 5.13","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 5.13 semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 5.15.203 5.15.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.1.167 6.1.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.6.130 6.6.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.12.77 6.12.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.18.17 6.18.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 6.19.7 6.19.* semver","platforms":[]},{"source":"CNA","vendor":"Linux","product":"Linux","version":"unaffected 7.0 * original_commit_for_fix","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"23324","cve":"CVE-2026-23324","epss":"0.000320000","percentile":"0.090980000","score_date":"2026-04-18","updated_at":"2026-04-19 00:10:43"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Linux","programFiles":["drivers/net/can/usb/etas_es58x/es58x_core.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"lessThan":"7a0171b4921ad443fee5ed4fcb9d99fa4776edac","status":"affected","version":"8537257874e949a59c834cecfd5a063e11b64b0b","versionType":"git"},{"lessThan":"2185ea6e4ebcb61d1224dc7d187c59723cb5ad59","status":"affected","version":"8537257874e949a59c834cecfd5a063e11b64b0b","versionType":"git"},{"lessThan":"f6e90c113c92e83fc0963d5e60e16b0e8a268981","status":"affected","version":"8537257874e949a59c834cecfd5a063e11b64b0b","versionType":"git"},{"lessThan":"b878444519fa03a3edd287d1963cf79ef78be2f1","status":"affected","version":"8537257874e949a59c834cecfd5a063e11b64b0b","versionType":"git"},{"lessThan":"18eee279e9b5bff0db1aca9475ae4bc12804f05c","status":"affected","version":"8537257874e949a59c834cecfd5a063e11b64b0b","versionType":"git"},{"lessThan":"b8f9ca88253574638bcff38900a4c28d570b1919","status":"affected","version":"8537257874e949a59c834cecfd5a063e11b64b0b","versionType":"git"},{"lessThan":"5eaad4f768266f1f17e01232ffe2ef009f8129b7","status":"affected","version":"8537257874e949a59c834cecfd5a063e11b64b0b","versionType":"git"}]},{"defaultStatus":"affected","product":"Linux","programFiles":["drivers/net/can/usb/etas_es58x/es58x_core.c"],"repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","vendor":"Linux","versions":[{"status":"affected","version":"5.13"},{"lessThan":"5.13","status":"unaffected","version":"0","versionType":"semver"},{"lessThanOrEqual":"5.15.*","status":"unaffected","version":"5.15.203","versionType":"semver"},{"lessThanOrEqual":"6.1.*","status":"unaffected","version":"6.1.167","versionType":"semver"},{"lessThanOrEqual":"6.6.*","status":"unaffected","version":"6.6.130","versionType":"semver"},{"lessThanOrEqual":"6.12.*","status":"unaffected","version":"6.12.77","versionType":"semver"},{"lessThanOrEqual":"6.18.*","status":"unaffected","version":"6.18.17","versionType":"semver"},{"lessThanOrEqual":"6.19.*","status":"unaffected","version":"6.19.7","versionType":"semver"},{"lessThanOrEqual":"*","status":"unaffected","version":"7.0","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"5.15.203","versionStartIncluding":"5.13","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.1.167","versionStartIncluding":"5.13","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.6.130","versionStartIncluding":"5.13","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.12.77","versionStartIncluding":"5.13","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.18.17","versionStartIncluding":"5.13","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"6.19.7","versionStartIncluding":"5.13","vulnerable":true},{"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndExcluding":"7.0","versionStartIncluding":"5.13","vulnerable":true}],"negate":false,"operator":"OR"}]}],"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\ncan: usb: etas_es58x: correctly anchor the urb in the read bulk callback\n\nWhen submitting an urb, that is using the anchor pattern, it needs to be\nanchored before submitting it otherwise it could be leaked if\nusb_kill_anchored_urbs() is called.  This logic is correctly done\nelsewhere in the driver, except in the read bulk callback so do that\nhere also."}],"providerMetadata":{"dateUpdated":"2026-04-18T08:57:57.249Z","orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux"},"references":[{"url":"https://git.kernel.org/stable/c/7a0171b4921ad443fee5ed4fcb9d99fa4776edac"},{"url":"https://git.kernel.org/stable/c/2185ea6e4ebcb61d1224dc7d187c59723cb5ad59"},{"url":"https://git.kernel.org/stable/c/f6e90c113c92e83fc0963d5e60e16b0e8a268981"},{"url":"https://git.kernel.org/stable/c/b878444519fa03a3edd287d1963cf79ef78be2f1"},{"url":"https://git.kernel.org/stable/c/18eee279e9b5bff0db1aca9475ae4bc12804f05c"},{"url":"https://git.kernel.org/stable/c/b8f9ca88253574638bcff38900a4c28d570b1919"},{"url":"https://git.kernel.org/stable/c/5eaad4f768266f1f17e01232ffe2ef009f8129b7"}],"title":"can: usb: etas_es58x: correctly anchor the urb in the read bulk callback","x_generator":{"engine":"bippy-1.2.0"}}},"cveMetadata":{"assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","assignerShortName":"Linux","cveId":"CVE-2026-23324","datePublished":"2026-03-25T10:27:17.476Z","dateReserved":"2026-01-13T15:37:45.996Z","dateUpdated":"2026-04-18T08:57:57.249Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-03-25 11:16:29","lastModifiedDate":"2026-04-18 09:16:18","problem_types":[],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"23324","Ordinal":"1","Title":"can: usb: etas_es58x: correctly anchor the urb in the read bulk ","CVE":"CVE-2026-23324","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"23324","Ordinal":"1","NoteData":"In the Linux kernel, the following vulnerability has been resolved:\n\ncan: usb: etas_es58x: correctly anchor the urb in the read bulk callback\n\nWhen submitting an urb, that is using the anchor pattern, it needs to be\nanchored before submitting it otherwise it could be leaked if\nusb_kill_anchored_urbs() is called.  This logic is correctly done\nelsewhere in the driver, except in the read bulk callback so do that\nhere also.","Type":"Description","Title":"can: usb: etas_es58x: correctly anchor the urb in the read bulk "}]}}}