Impact
The vulnerability stems from the kernel USB driver for the 8dev CAN device not anchoring URBs in the read bulk callback, causing the URBs to remain unfreed after completion. The unfreed URBs create a memory leak; the CVE description does not specify any resulting system effects such as degraded performance or kernel panic. The weakness is a classic memory corruption flaw (CWE-401).
Affected Systems
The issue is present in the Linux kernel, specifically in the 6.19 release candidate series (rc1 through rc6). Any installations using these kernel versions could be affected if the usb_8dev driver is loaded and used for CAN over USB devices.
Risk and Exploitability
The CVSS score is 5.5, indicating moderate severity, while the EPSS score is below 1%, demonstrating a very low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. The exact attack vector is not specified in the CVE, but it might involve interaction with the USB subsystem, possibly requiring a malicious USB device.
OpenCVE Enrichment
Debian DLA
Debian DSA
Ubuntu USN