CVE-2026-23080

In the Linux kernel, the following vulnerability has been resolved: can: mcba_usb: mcba_usb_read_bulk_callback(): fix URB memory leak Fix similar memory leak as in commit 7352e1d5932a ("can: gs_usb: gs_usb_receive_bulk_callback(): fix URB memory leak"). In mcba_usb_probe() -> mcba_usb_start(), the URBs for USB-in transfers are allocated, added to the priv->rx_submitted anchor and submitted. In the complete callback mcba_usb_read_bulk_callback(), the URBs are processed and resubmitted. In mcba_usb_close() -> mcba_urb_unlink() the URBs are freed by calling usb_kill_anchored_urbs(&priv->rx_submitted). However, this does not take into account that the USB framework unanchors the URB before the complete function is called. This means that once an in-URB has been completed, it is no longer anchored and is ultimately not released in usb_kill_anchored_urbs(). Fix the memory leak by anchoring the URB in the mcba_usb_read_bulk_callback()to the priv->rx_submitted anchor.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*

History

18 Mar 2026, 13:48

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CWE CWE-401
CPE cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:*
First Time Linux
Linux linux Kernel
Summary
  • (es) En el kernel de Linux, la siguiente vulnerabilidad ha sido resuelta: can: mcba_usb: mcba_usb_read_bulk_callback(): corrige la fuga de memoria de URB Corrige una fuga de memoria similar a la del commit 7352e1d5932a ('can: gs_usb: gs_usb_receive_bulk_callback(): corrige la fuga de memoria de URB'). En mcba_usb_probe() -> mcba_usb_start(), los URB para transferencias USB de entrada se asignan, se añaden al ancla priv->rx_submitted y se envían. En la función de callback de completado mcba_usb_read_bulk_callback(), los URB se procesan y se reenvían. En mcba_usb_close() -> mcba_urb_unlink(), los URB se liberan llamando a usb_kill_anchored_urbs(&priv->rx_submitted). Sin embargo, esto no tiene en cuenta que el framework USB desancla el URB antes de que se llame a la función de completado. Esto significa que una vez que un URB de entrada ha sido completado, ya no está anclado y finalmente no se libera en usb_kill_anchored_urbs(). Corrige la fuga de memoria anclando el URB en mcba_usb_read_bulk_callback() al ancla priv->rx_submitted.
References () https://git.kernel.org/stable/c/179f6f0cf5ae489743273b7c1644324c0c477ea9 - () https://git.kernel.org/stable/c/179f6f0cf5ae489743273b7c1644324c0c477ea9 - Patch
References () https://git.kernel.org/stable/c/59153b6388e05609144ad56a9b354e9100a91983 - () https://git.kernel.org/stable/c/59153b6388e05609144ad56a9b354e9100a91983 - Patch
References () https://git.kernel.org/stable/c/710a7529fb13c5a470258ff5508ed3c498d54729 - () https://git.kernel.org/stable/c/710a7529fb13c5a470258ff5508ed3c498d54729 - Patch
References () https://git.kernel.org/stable/c/8b34c611a4feb81921bc4728c091e4e3ba0270c0 - () https://git.kernel.org/stable/c/8b34c611a4feb81921bc4728c091e4e3ba0270c0 - Patch
References () https://git.kernel.org/stable/c/94c9f6f7b953f6382fef4bdc48c046b861b8868f - () https://git.kernel.org/stable/c/94c9f6f7b953f6382fef4bdc48c046b861b8868f - Patch
References () https://git.kernel.org/stable/c/b5a1ccdc63b71d93a69a6b72f7a3f3934293ea60 - () https://git.kernel.org/stable/c/b5a1ccdc63b71d93a69a6b72f7a3f3934293ea60 - Patch
References () https://git.kernel.org/stable/c/d374d715e338dfc3804aaa006fa6e470ffebb264 - () https://git.kernel.org/stable/c/d374d715e338dfc3804aaa006fa6e470ffebb264 - Patch

06 Feb 2026, 17:16

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/59153b6388e05609144ad56a9b354e9100a91983 -
  • () https://git.kernel.org/stable/c/8b34c611a4feb81921bc4728c091e4e3ba0270c0 -
  • () https://git.kernel.org/stable/c/b5a1ccdc63b71d93a69a6b72f7a3f3934293ea60 -

04 Feb 2026, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-04 17:16

Updated : 2026-03-18 13:48


NVD link : CVE-2026-23080

Mitre link : CVE-2026-23080

CVE.ORG link : CVE-2026-23080


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime