CVE-2026-23347
Published: March 29, 2026Last modified: April 9, 2026
Description
In the Linux kernel, the following vulnerability has been resolved: can: usb: f81604: correctly anchor the urb in the read bulk callback When submitting an urb, that is using the anchor pattern, it needs to be anchored before submitting it otherwise it could be leaked if usb_kill_anchored_urbs() is called. This logic is correctly done elsewhere in the driver, except in the read bulk callback so do that here also.
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 5.5 |
| Attack Vector | LOCAL |
| Attack complexity | LOW |
| Privileges required | LOW |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | NONE |
| Integrity impact | NONE |
| Availability impact | HIGH |
| Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H |
Status
| Product | Release | Package | Status |
|---|---|---|---|
| Alpaquita Linux | 23 LTS | linux-lts | Not affected (6.1.33-r0) |
| 25 LTS | linux-lts | Fixed (6.12.80-r0) | |
| Stream | linux-lts | Fixed (6.12.80-r0) |
References
- https://git.kernel.org/stable/c/54ee74307165b348b2fddcd7942eb48fb4ee1237
- https://git.kernel.org/stable/c/7724645c4792914cd07f36718816c5369cc57970
- https://git.kernel.org/stable/c/952caa5da10bed22be09612433964f6877ba0dde
- https://git.kernel.org/stable/c/c001214e12202338425d6dda5d2a1919d674282d
- https://git.kernel.org/stable/c/f6d80b104f904a6da922907394eec66d3e2ffc57