VYPR
Medium severity5.5NVD Advisory· Published Mar 25, 2026· Updated Apr 23, 2026

CVE-2026-23334

CVE-2026-23334

Description

In the Linux kernel, the following vulnerability has been resolved:

can: usb: f81604: handle short interrupt urb messages properly

If an interrupt urb is received that is not the correct length, properly detect it and don't attempt to treat the data as valid.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Linux kernel f81604 USB CAN driver improperly handles short interrupt URB messages, potentially leading to data corruption or system instability.

Vulnerability

Overview

CVE-2026-23334 is a medium-severity vulnerability in the Linux kernel's f81604 USB CAN driver. The driver fails to properly validate the length of received interrupt URB (USB Request Block) messages. When an interrupt URB with an incorrect length is received, the driver attempts to treat the data as valid rather than detecting the short message and discarding it [1][2].

Exploitation

An attacker with physical access to a USB port could potentially craft a malicious USB device or exploit an existing device to send malformed interrupt URBs to the system. The attack requires no special privileges beyond the ability to interact with the USB subsystem, but physical proximity or the ability to connect a malicious device is necessary [3].

Impact

If exploited, this flaw could lead to memory corruption or undefined behavior in the kernel CAN subsystem. The CVSS v3 score of 5.5 (Medium) reflects the potential for denial of service or information disclosure, though proof-of-concept code has not been publicly disclosed [4].

Mitigation

The vulnerability has been patched in the Linux kernel through multiple stable commits [1][2][3][4]. Users are advised to update their kernel to a version containing these fixes. No workarounds are available beyond ensuring the USB CAN device is from a trusted source.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

9
  • Linux/Kernel9 versions
    cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*+ 8 more
    • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*range: >=6.5.1,<6.6.130
    • cpe:2.3:o:linux:linux_kernel:6.5:-:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc1:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc2:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc3:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc4:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc5:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc6:*:*:*:*:*:*
    • cpe:2.3:o:linux:linux_kernel:7.0:rc7:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.