In the Linux kernel, the following vulnerability has been resolved:
can: usb: etas_es58x: correctly anchor the urb in the read bulk callback
When submitting an urb, that is using the anchor pattern, it needs to be
anchored before submitting it otherwise it could be leaked if
usb_kill_anchored_urbs() is called. This logic is correctly done
elsewhere in the driver, except in the read bulk callback so do that
here also.
CVE-2026-23324
NONE
EPSS 0.03%
Updated Mar 25, 2026
Linux
https://git.kernel.org/stable/c/18eee279e9b5bff0db1aca9475ae4bc12804f05c
416baaa9-dc9f-4396-8d5f-8c081fb06d67
https://git.kernel.org/stable/c/2185ea6e4ebcb61d1224dc7d187c59723cb5ad59
416baaa9-dc9f-4396-8d5f-8c081fb06d67
https://git.kernel.org/stable/c/5eaad4f768266f1f17e01232ffe2ef009f8129b7
416baaa9-dc9f-4396-8d5f-8c081fb06d67
https://git.kernel.org/stable/c/b878444519fa03a3edd287d1963cf79ef78be2f1
416baaa9-dc9f-4396-8d5f-8c081fb06d67
https://git.kernel.org/stable/c/b8f9ca88253574638bcff38900a4c28d570b1919
416baaa9-dc9f-4396-8d5f-8c081fb06d67
https://git.kernel.org/stable/c/f6e90c113c92e83fc0963d5e60e16b0e8a268981
416baaa9-dc9f-4396-8d5f-8c081fb06d67
CVE Details
CVE ID
CVE-2026-23324
Published Date
Mar 25, 2026
Vendor
Linux
Severity
NONE
Exploit Prediction (EPSS)
Probability of Exploit
0.03%
Likelihood of exploitation in next 30 days
Percentile:
9.2th percentile (higher than 9.2% of all CVEs)
Standard patching cycle
Impact
Minimal impact
Source
View Advisory