CVE-2023-53523
BaseFortify
Publication date: 2025-10-01
Last updated on: 2026-04-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's gs_usb device driver for CAN bus communication. When the driver is unloaded before the interface is shut down, a race condition can happen where the USB device still queues CAN frames to send to the host after the driver has killed pending USB requests. The hardware timestamp function was initialized too late, causing a NULL pointer dereference when processing these queued frames. The fix involves initializing the timestamp function before submitting USB requests and converting the timestamp setup from per channel to per device to avoid this issue.
How can this vulnerability impact me? :
This vulnerability can cause a NULL pointer dereference in the Linux kernel, which may lead to a kernel crash or system instability when the gs_usb driver is unloaded improperly. This can disrupt CAN bus communication and potentially cause denial of service on systems relying on this driver for CAN network operations.
What immediate steps should I take to mitigate this vulnerability?
Unload or avoid unbinding the gs_usb device driver before the interface is properly shut down. Ensure that the gs_usb_timestamp_init() function is called before submitting any URBs to the device, which is addressed in the fixed version of the Linux kernel. Updating the Linux kernel to a version that includes this fix will mitigate the vulnerability.