In the Linux kernel, the following vulnerability has been resolved:
can: mcba_usb: mcba_usb_read_bulk_callback(): fix URB memory leak
Fix similar memory leak as in commit 7352e1d5932a ("can: gs_usb:
gs_usb_receive_bulk_callback(): fix URB memory leak").
In mcba_usb_probe() -> mcba_usb_start(), the URBs for USB-in transfers are
allocated, added to the priv->rx_submitted anchor and submitted. In the
complete callback mcba_usb_read_bulk_callback(), the URBs are processed and
resubmitted. In mcba_usb_close() -> mcba_urb_unlink() the URBs are freed by
calling usb_kill_anchored_urbs(&priv->rx_submitted).
However, this does not take into account that the USB framework unanchors
the URB before the complete function is called. This means that once an
in-URB has been completed, it is no longer anchored and is ultimately not
released in usb_kill_anchored_urbs().
Fix the memory leak by anchoring the URB in the
mcba_usb_read_bulk_callback()to the priv->rx_submitted anchor.
References
Configurations
Configuration 1 (hide)
|
History
18 Mar 2026, 13:48
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
| CWE | CWE-401 | |
| CPE | cpe:2.3:o:linux:linux_kernel:6.19:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.19:rc3:*:*:*:*:*:* |
|
| First Time |
Linux
Linux linux Kernel |
|
| Summary |
|
|
| References | () https://git.kernel.org/stable/c/179f6f0cf5ae489743273b7c1644324c0c477ea9 - Patch | |
| References | () https://git.kernel.org/stable/c/59153b6388e05609144ad56a9b354e9100a91983 - Patch | |
| References | () https://git.kernel.org/stable/c/710a7529fb13c5a470258ff5508ed3c498d54729 - Patch | |
| References | () https://git.kernel.org/stable/c/8b34c611a4feb81921bc4728c091e4e3ba0270c0 - Patch | |
| References | () https://git.kernel.org/stable/c/94c9f6f7b953f6382fef4bdc48c046b861b8868f - Patch | |
| References | () https://git.kernel.org/stable/c/b5a1ccdc63b71d93a69a6b72f7a3f3934293ea60 - Patch | |
| References | () https://git.kernel.org/stable/c/d374d715e338dfc3804aaa006fa6e470ffebb264 - Patch |
06 Feb 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
04 Feb 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-04 17:16
Updated : 2026-03-18 13:48
NVD link : CVE-2026-23080
Mitre link : CVE-2026-23080
CVE.ORG link : CVE-2026-23080
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-401
Missing Release of Memory after Effective Lifetime
