Impact
The vulnerability in the Linux kernel’s kvaser_usb driver allows unanchored USB Request Blocks (URBs) to persist after completion, causing a memory leak. Over time this leak can consume kernel memory, potentially leading to resource exhaustion and a crash or degraded system performance. The flaw is a classic memory management weakness (CWE‑401).
Affected Systems
All Linux kernel versions that include the kvaser_usb driver are affected, including the 6.19 release candidates cited in the CPE entries. The issue exists in any kernel that ships the unpatched code, regardless of the specific patch level beyond the ones listed.
Risk and Exploitability
The CVSS score of 5.5 indicates a medium risk, but the EPSS score of less than 1% suggests a very low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Inferred attack scenarios involve a malicious or improperly configured USB CAN device that repeatedly triggers high‑frequency transfers, creating the circumstances for the URB memory leak. The attack requires physical or remote control over a USB subsystem that loads the kvaser_usb driver, and it can result in a denial of service rather than code execution or privilege escalation.
OpenCVE Enrichment
Debian DLA
Debian DSA
Ubuntu USN