CVE-2026-23037

critical

Description

In the Linux kernel, the following vulnerability has been resolved: can: etas_es58x: allow partial RX URB allocation to succeed When es58x_alloc_rx_urbs() fails to allocate the requested number of URBs but succeeds in allocating some, it returns an error code. This causes es58x_open() to return early, skipping the cleanup label 'free_urbs', which leads to the anchored URBs being leaked. As pointed out by maintainer Vincent Mailhol, the driver is designed to handle partial URB allocation gracefully. Therefore, partial allocation should not be treated as a fatal error. Modify es58x_alloc_rx_urbs() to return 0 if at least one URB has been allocated, restoring the intended behavior and preventing the leak in es58x_open().

References

https://git.kernel.org/stable/c/ba45e3d6b02c97dbb4578fbae7027fd66f3caa10

https://git.kernel.org/stable/c/b1979778e98569c1e78c2c7f16bb24d76541ab00

https://git.kernel.org/stable/c/6c5124a60989051799037834f0a1a4b428718157

https://git.kernel.org/stable/c/611e839d2d552416b498ed5593e10670f61fcd4d

Details

Source: Mitre, NVD

Published: 2026-01-31

Updated: 2026-01-31

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical

EPSS

EPSS: 0.00018