Impact
The Linux kernel CAN gs_usb driver had a null pointer dereference that could be triggered during a failed USB request block (URB) resubmit when a short read occurred and the network device had not yet been assigned. The dereference could cause a kernel crash, resulting in a denial‑of‑service. The weakness is classified as CWE‑476.
Affected Systems
Affected versions include Linux kernel 6.12.68, 6.18.8, 6.6.122, and the 6.19rc7 release. Distributions shipping any of these kernels are vulnerable until the commit that removes the dereference is applied.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity, and the EPSS score of less than 1% suggests a low likelihood of exploitation. The vulnerability is not listed in CISA’s KEV catalog. Based on the description, it is inferred that exploitation would likely require local or physical access to a machine, such as injection of a malicious USB payload or manipulation of a CAN gs_usb operation. Such local exploitation could lead to a system crash, disrupting availability.
OpenCVE Enrichment