SB20260325144 - Uncontrolled Recursion in Linux kernel net usb driver
Published: March 25, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Uncontrolled Recursion (CVE-ID: CVE-2026-23312)
The vulnerability allows a remote attacker to cause a denial of service.
The vulnerability exists due to improper input validation in the kaweth USB driver when handling USB endpoints during device probing. A remote attacker can connect a malicious USB device with invalid or unexpected endpoint configurations to cause a denial of service.
Exploitation does not require authentication or user interaction beyond physically connecting the device; however, the attack vector is considered remote as it targets kernel-level USB subsystem handling.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/stable/c/0aae18e4638a7c1c579df92bc6edc36cedfaaa8c
- https://git.kernel.org/stable/c/2795fc06e7652c0ba299d936c584d5e08b6b57a1
- https://git.kernel.org/stable/c/4b063c002ca759d1b299988ee23f564c9609c875
- https://git.kernel.org/stable/c/72f90f481c6a059680b9b976695d4cfb04fba1f3
- https://git.kernel.org/stable/c/7c7ebf5e45d2504d92ea294ac3828d58586491df
- https://git.kernel.org/stable/c/f33e80d195a003b384620ee240f69092b519146b