CVE-2026-23061
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
04/02/2026
Última modificación:
04/02/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
can: kvaser_usb: kvaser_usb_read_bulk_callback(): fix URB memory leak<br />
<br />
Fix similar memory leak as in commit 7352e1d5932a ("can: gs_usb:<br />
gs_usb_receive_bulk_callback(): fix URB memory leak").<br />
<br />
In kvaser_usb_set_{,data_}bittiming() -> kvaser_usb_setup_rx_urbs(), the<br />
URBs for USB-in transfers are allocated, added to the dev->rx_submitted<br />
anchor and submitted. In the complete callback<br />
kvaser_usb_read_bulk_callback(), the URBs are processed and resubmitted. In<br />
kvaser_usb_remove_interfaces() the URBs are freed by calling<br />
usb_kill_anchored_urbs(&dev->rx_submitted).<br />
<br />
However, this does not take into account that the USB framework unanchors<br />
the URB before the complete function is called. This means that once an<br />
in-URB has been completed, it is no longer anchored and is ultimately not<br />
released in usb_kill_anchored_urbs().<br />
<br />
Fix the memory leak by anchoring the URB in the<br />
kvaser_usb_read_bulk_callback() to the dev->rx_submitted anchor.



