CVE-2026-23307 — Buffer Access with Incorrect Length Value in Linux
Severity
5.5MEDIUM
No vectorEPSS
0.0%
top 89.21%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 25
Description
In the Linux kernel, the following vulnerability has been resolved:
can: ems_usb: ems_usb_read_bulk_callback(): check the proper length of a message
When looking at the data in a USB urb, the actual_length is the size of
the buffer passed to the driver, not the transfer_buffer_length which is
set by the driver as the max size of the buffer.
When parsing the messages in ems_usb_read_bulk_callback() properly check
the size both at the beginning of parsing the message to make sure it is
big enou…
Affected Packages5 packages
▶CVEListV5linux/linux702171adeed3607ee9603ec30ce081411e36ae42 — c703bbf8e9b4947e111c88d2ed09236a6772a471+6
🔴Vulnerability Details
3OSV▶
CVE-2026-23307: In the Linux kernel, the following vulnerability has been resolved: can: ems_usb: ems_usb_read_bulk_callback(): check the proper length of a message W↗2026-03-25
GHSA▶
GHSA-hg9v-crxc-wx3j: In the Linux kernel, the following vulnerability has been resolved:
can: ems_usb: ems_usb_read_bulk_callback(): check the proper length of a message↗2026-03-25
📋Vendor Advisories
3Red Hat
▶
Microsoft
▶
Debian▶
CVE-2026-23307: linux - In the Linux kernel, the following vulnerability has been resolved: can: ems_us...↗2026