CVE-2026-23334
Description
In the Linux kernel, the following vulnerability has been resolved:
can: usb: f81604: handle short interrupt urb messages properly
If an interrupt urb is received that is not the correct length, properly detect it and don't attempt to treat the data as valid.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Linux kernel f81604 USB CAN driver improperly handles short interrupt URB messages, potentially leading to data corruption or system instability.
Vulnerability
Overview
CVE-2026-23334 is a medium-severity vulnerability in the Linux kernel's f81604 USB CAN driver. The driver fails to properly validate the length of received interrupt URB (USB Request Block) messages. When an interrupt URB with an incorrect length is received, the driver attempts to treat the data as valid rather than detecting the short message and discarding it [1][2].
Exploitation
An attacker with physical access to a USB port could potentially craft a malicious USB device or exploit an existing device to send malformed interrupt URBs to the system. The attack requires no special privileges beyond the ability to interact with the USB subsystem, but physical proximity or the ability to connect a malicious device is necessary [3].
Impact
If exploited, this flaw could lead to memory corruption or undefined behavior in the kernel CAN subsystem. The CVSS v3 score of 5.5 (Medium) reflects the potential for denial of service or information disclosure, though proof-of-concept code has not been publicly disclosed [4].
Mitigation
The vulnerability has been patched in the Linux kernel through multiple stable commits [1][2][3][4]. Users are advised to update their kernel to a version containing these fixes. No workarounds are available beyond ensuring the USB CAN device is from a trusted source.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
9cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 8 more
- cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=6.5.1,<6.6.130
- cpe:2.3:o:linux:linux_kernel:6.5:-:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
- cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- git.kernel.org/stable/c/36ead57443146e6b730ce1f48ca3e9b17e19a3d2nvdPatch
- git.kernel.org/stable/c/66615e6293388f75a56226d1216fd9cfb3d95e05nvdPatch
- git.kernel.org/stable/c/7299b1b39a255f6092ce4ec0b65f66e9d6a357afnvdPatch
- git.kernel.org/stable/c/9b740ff5bc649575a5e14ca8ee54e3dd5010aaf0nvdPatch
- git.kernel.org/stable/c/c5d69da6c919648838734097861e979677eedcdenvdPatch
News mentions
0No linked articles in our index yet.