CVE-2026-23307
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
25/03/2026
Última modificación:
25/03/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
can: ems_usb: ems_usb_read_bulk_callback(): check the proper length of a message<br />
<br />
When looking at the data in a USB urb, the actual_length is the size of<br />
the buffer passed to the driver, not the transfer_buffer_length which is<br />
set by the driver as the max size of the buffer.<br />
<br />
When parsing the messages in ems_usb_read_bulk_callback() properly check<br />
the size both at the beginning of parsing the message to make sure it is<br />
big enough for the expected structure, and at the end of the message to<br />
make sure we don&#39;t overflow past the end of the buffer for the next<br />
message.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/1818974e1b5ef200e27f144c8cb8a246420bb54d
- https://git.kernel.org/stable/c/18f75b9cbdc3703f15965425ab69dee509b07785
- https://git.kernel.org/stable/c/1cf469026d4a2308eaa91d04dca4a900d07a5c2e
- https://git.kernel.org/stable/c/2833e13e2b099546abf5d40a483b4eb04ddd1f7b
- https://git.kernel.org/stable/c/38a01c9700b0dcafe97dfa9dc7531bf4a245deff
- https://git.kernel.org/stable/c/c703bbf8e9b4947e111c88d2ed09236a6772a471



