CVE-2026-23031
BaseFortify
Publication date: 2026-01-31
Last updated on: 2026-04-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux_kernel | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory leak in the Linux kernel's gs_usb driver related to USB-in transfer URBs (USB Request Blocks). When URBs are completed, they are unanchored by the USB framework before the completion callback is called, causing them not to be properly released in the gs_can_close() function. This leads to a memory leak because the URBs are not freed as expected. The fix involves re-anchoring the URB in the completion callback to ensure proper cleanup.
How can this vulnerability impact me? :
The memory leak caused by this vulnerability can lead to increased memory usage over time, potentially causing system instability or degraded performance in systems using the affected Linux kernel gs_usb driver. This could affect devices relying on USB CAN interfaces by exhausting system memory resources.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Linux kernel to a version that includes the fix for the gs_usb_receive_bulk_callback() URB memory leak. This fix involves properly anchoring the URB in the callback to prevent memory leaks. Until the update is applied, consider limiting or disabling the use of the gs_usb driver if possible to reduce exposure.