Description
In the Linux kernel, the following vulnerability has been resolved:

can: gs_usb: gs_usb_receive_bulk_callback(): unanchor URL on usb_submit_urb() error

In commit 7352e1d5932a ("can: gs_usb: gs_usb_receive_bulk_callback(): fix
URB memory leak"), the URB was re-anchored before usb_submit_urb() in
gs_usb_receive_bulk_callback() to prevent a leak of this URB during
cleanup.

However, this patch did not take into account that usb_submit_urb() could
fail. The URB remains anchored and
usb_kill_anchored_urbs(&parent->rx_submitted) in gs_can_close() loops
infinitely since the anchor list never becomes empty.

To fix the bug, unanchor the URB when an usb_submit_urb() error occurs,
also print an info message.
Published: 2026-02-04
Score: 5.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via infinite loop in the CAN bus USB driver
Action: Apply Patch
AI Analysis

Impact

The vulnerability arises when the GS USB driver attempts to submit a USB Request Block (URB) and the operation fails. The code fails to unanchor the URB, so the kernel’s anchored list never becomes empty. During driver cleanup, usb_kill_anchored_urbs() enters an infinite loop, consuming CPU and preventing the driver from releasing resources. This flaw can result in a service interruption or kernel lock‑up in systems that use the CAN bus subsystem.

Affected Systems

Affected systems are Linux kernel users with the gs_usb driver, specifically kernel releases 6.12.67, 6.18.7, and 6.19 rc6, as well as any kernel built from the same source that includes the same driver code.

Risk and Exploitability

The CVSS score of 5.5 indicates moderate severity, and the EPSS score of less than 1% suggests a low likelihood of exploitation in the wild. The flaw is not listed in CISA’s KEV catalog. An attacker would need to interact with the CAN USB subsystem, likely with kernel‑level privileges or via an application that triggers the driver’s cleanup, such as closing a device file. While no public exploit is known, the infinite loop could be triggered by malformed or failed CAN USB requests, making it a viable denial‑of‑service vector in environments where the CAN bus is used.

Generated by OpenCVE AI on April 17, 2026 at 23:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Linux kernel to a release that includes the fix for gs_usb_receive_bulk_callback() (e.g., a kernel newer than 6.12.67 that incorporates commit 7352e1d5932a).
  • If an immediate kernel upgrade is not possible, disable the gs_usb CAN USB driver or unload the CAN subsystem modules to prevent the fault from being triggered.
  • Reboot the system after applying the patch or after disabling the driver to clear any existing anchored URBs and restore normal operation.

Generated by OpenCVE AI on April 17, 2026 at 23:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 09:15:00 +0000


Wed, 18 Mar 2026 13:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-835
CPEs cpe:2.3:o:linux:linux_kernel:6.12.67:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.18.7:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.19:rc6:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


Fri, 06 Feb 2026 16:45:00 +0000


Thu, 05 Feb 2026 12:15:00 +0000


Wed, 04 Feb 2026 16:30:00 +0000

Type Values Removed Values Added
Description In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bulk_callback(): unanchor URL on usb_submit_urb() error In commit 7352e1d5932a ("can: gs_usb: gs_usb_receive_bulk_callback(): fix URB memory leak"), the URB was re-anchored before usb_submit_urb() in gs_usb_receive_bulk_callback() to prevent a leak of this URB during cleanup. However, this patch did not take into account that usb_submit_urb() could fail. The URB remains anchored and usb_kill_anchored_urbs(&parent->rx_submitted) in gs_can_close() loops infinitely since the anchor list never becomes empty. To fix the bug, unanchor the URB when an usb_submit_urb() error occurs, also print an info message.
Title can: gs_usb: gs_usb_receive_bulk_callback(): unanchor URL on usb_submit_urb() error
First Time appeared Linux
Linux linux Kernel
CPEs cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Vendors & Products Linux
Linux linux Kernel
References

Subscriptions

Linux Linux Kernel
cve-icon MITRE

Status: PUBLISHED

Assigner: Linux

Published:

Updated: 2026-04-18T08:57:15.950Z

Reserved: 2026-01-13T15:37:45.960Z

Link: CVE-2026-23082

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2026-02-04T17:16:19.060

Modified: 2026-04-18T09:16:13.530

Link: CVE-2026-23082

cve-icon Redhat

Severity :

Publid Date: 2026-02-04T00:00:00Z

Links: CVE-2026-23082 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T23:45:25Z

Weaknesses