Impact
The libertas Wi‑Fi driver in the Linux kernel contains a flaw in usb_tx_block where a USB request block (URB) is submitted without first ensuring that the previous transmission on that URB has completed. Re‑submitting an active URB triggers a warning: "URB submitted while active." This warning indicates a failure to serialize USB traffic and could lead to driver instability or a denial of service if repeated during rapid firmware loading or busy USB activity. No explicit crash or integrity compromise is documented in the advisory; the impact is limited to potential service disruption of the wireless adapter.
Affected Systems
All Linux kernel releases that ship the unpatched libertas Wi‑Fi driver are affected. The advisory does not list specific kernel versions; therefore any distribution distribution or custom kernel that includes the libertas module without the commit that adds usb_kill_urb before usb_submit_urb may be vulnerable.
Risk and Exploitability
The advisory does not provide a CVSS score and the EPSS is not available. The vulnerability is not listed in CISA KEV and no public exploits are known. The risk is primarily limited to repeated warnings that could destabilize the driver under rapid firmware reloads or heavy USB traffic. Patch remains the recommended mitigation.
OpenCVE Enrichment