CVE-2026-23061
Memory Leak in Linux Kernel kvaser_usb USB Bulk Callback
Publication date: 2026-02-04
Last updated on: 2026-03-13
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | 6.19 |
| linux | linux_kernel | From 3.8 (inc) to 5.10.249 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.199 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 6.1.162 (exc) |
| linux | linux_kernel | From 6.2 (inc) to 6.6.122 (exc) |
| linux | linux_kernel | From 6.7 (inc) to 6.12.68 (exc) |
| linux | linux_kernel | From 6.13 (inc) to 6.18.8 (exc) |
| linux | linux_kernel | 6.19 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-401 | The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailable for reallocation and reuse. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a memory leak in the Linux kernel's kvaser_usb driver. Specifically, the issue occurs in the function kvaser_usb_read_bulk_callback(), where USB Request Blocks (URBs) are processed and resubmitted. The problem arises because the USB framework unanchors the URB before the completion callback is called, causing the URB to no longer be anchored and thus not released properly. This leads to a memory leak as the URBs are not freed as intended.
The fix involves anchoring the URB again within the kvaser_usb_read_bulk_callback() function to ensure it is properly tracked and released later by usb_kill_anchored_urbs().
How can this vulnerability impact me? :
This memory leak vulnerability can cause increased memory usage in the system running the affected Linux kernel with the kvaser_usb driver. Over time, this could lead to resource exhaustion, degraded system performance, or even system instability or crashes if the leaked memory accumulates significantly.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is a memory leak in the kvaser_usb driver in the Linux kernel related to URB handling. To mitigate this vulnerability, you should update your Linux kernel to a version that includes the fix for this issue.
The fix involves properly anchoring the URB in the kvaser_usb_read_bulk_callback() function to ensure that URBs are correctly released and do not leak memory.