CVE-2026-23155 (GCVE-0-2026-23155)

Vulnerability from cvelistv5 – Published: 2026-02-14 16:01 – Updated: 2026-02-14 16:01
VLAI?
Title
can: gs_usb: gs_usb_receive_bulk_callback(): fix error message
Summary
In the Linux kernel, the following vulnerability has been resolved: can: gs_usb: gs_usb_receive_bulk_callback(): fix error message Sinc commit 79a6d1bfe114 ("can: gs_usb: gs_usb_receive_bulk_callback(): unanchor URL on usb_submit_urb() error") a failing resubmit URB will print an info message. In the case of a short read where netdev has not yet been assigned, initialize as NULL to avoid dereferencing an undefined value. Also report the error value of the failed resubmit.
Severity ?
No CVSS data available.
Assigner
Impacted products
Vendor Product Version
Linux Linux Affected: aa8a8866c533a150be4763bcb27993603bd5426c , < aed58a28ea71a0d7d0947190fab1e3f4daa1d4a5 (git)
Affected: ce4352057fc5a986c76ece90801b9755e7c6e56c , < 923379f1d7e3af8ccbf11edbbcf41f1bb3e9cfe6 (git)
Affected: c610b550ccc0438d456dfe1df9f4f36254ccaae3 , < 8986cdf52f86208df9c7887fee23365b5d37da26 (git)
Affected: c3edc14da81a8d8398682f6e4ab819f09f37c0b7 , < 713ba826ae114ab339c9a1b31e209bebdadb0ac9 (git)
Affected: 79a6d1bfe1148bc921b8d7f3371a7fbce44e30f7 , < 494fc029f662c331e06b7c2031deff3c64200eed (git)
Create a notification for this product.
    Linux Linux Affected: 6.6.122 , < 6.6.123 (semver)
Affected: 6.12.68 , < 6.12.69 (semver)
Affected: 6.18.8 , < 6.18.9 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/net/can/usb/gs_usb.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "aed58a28ea71a0d7d0947190fab1e3f4daa1d4a5",
              "status": "affected",
              "version": "aa8a8866c533a150be4763bcb27993603bd5426c",
              "versionType": "git"
            },
            {
              "lessThan": "923379f1d7e3af8ccbf11edbbcf41f1bb3e9cfe6",
              "status": "affected",
              "version": "ce4352057fc5a986c76ece90801b9755e7c6e56c",
              "versionType": "git"
            },
            {
              "lessThan": "8986cdf52f86208df9c7887fee23365b5d37da26",
              "status": "affected",
              "version": "c610b550ccc0438d456dfe1df9f4f36254ccaae3",
              "versionType": "git"
            },
            {
              "lessThan": "713ba826ae114ab339c9a1b31e209bebdadb0ac9",
              "status": "affected",
              "version": "c3edc14da81a8d8398682f6e4ab819f09f37c0b7",
              "versionType": "git"
            },
            {
              "lessThan": "494fc029f662c331e06b7c2031deff3c64200eed",
              "status": "affected",
              "version": "79a6d1bfe1148bc921b8d7f3371a7fbce44e30f7",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/net/can/usb/gs_usb.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "6.6.123",
              "status": "affected",
              "version": "6.6.122",
              "versionType": "semver"
            },
            {
              "lessThan": "6.12.69",
              "status": "affected",
              "version": "6.12.68",
              "versionType": "semver"
            },
            {
              "lessThan": "6.18.9",
              "status": "affected",
              "version": "6.18.8",
              "versionType": "semver"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.123",
                  "versionStartIncluding": "6.6.122",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.69",
                  "versionStartIncluding": "6.12.68",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.18.9",
                  "versionStartIncluding": "6.18.8",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: gs_usb: gs_usb_receive_bulk_callback(): fix error message\n\nSinc commit 79a6d1bfe114 (\"can: gs_usb: gs_usb_receive_bulk_callback():\nunanchor URL on usb_submit_urb() error\") a failing resubmit URB will print\nan info message.\n\nIn the case of a short read where netdev has not yet been assigned,\ninitialize as NULL to avoid dereferencing an undefined value. Also report\nthe error value of the failed resubmit."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-14T16:01:22.429Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/aed58a28ea71a0d7d0947190fab1e3f4daa1d4a5"
        },
        {
          "url": "https://git.kernel.org/stable/c/923379f1d7e3af8ccbf11edbbcf41f1bb3e9cfe6"
        },
        {
          "url": "https://git.kernel.org/stable/c/8986cdf52f86208df9c7887fee23365b5d37da26"
        },
        {
          "url": "https://git.kernel.org/stable/c/713ba826ae114ab339c9a1b31e209bebdadb0ac9"
        },
        {
          "url": "https://git.kernel.org/stable/c/494fc029f662c331e06b7c2031deff3c64200eed"
        }
      ],
      "title": "can: gs_usb: gs_usb_receive_bulk_callback(): fix error message",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2026-23155",
    "datePublished": "2026-02-14T16:01:22.429Z",
    "dateReserved": "2026-01-13T15:37:45.977Z",
    "dateUpdated": "2026-02-14T16:01:22.429Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2026-23155\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2026-02-14T16:15:55.653\",\"lastModified\":\"2026-02-14T16:15:55.653\",\"vulnStatus\":\"Received\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\ncan: gs_usb: gs_usb_receive_bulk_callback(): fix error message\\n\\nSinc commit 79a6d1bfe114 (\\\"can: gs_usb: gs_usb_receive_bulk_callback():\\nunanchor URL on usb_submit_urb() error\\\") a failing resubmit URB will print\\nan info message.\\n\\nIn the case of a short read where netdev has not yet been assigned,\\ninitialize as NULL to avoid dereferencing an undefined value. Also report\\nthe error value of the failed resubmit.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/494fc029f662c331e06b7c2031deff3c64200eed\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/713ba826ae114ab339c9a1b31e209bebdadb0ac9\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/8986cdf52f86208df9c7887fee23365b5d37da26\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/923379f1d7e3af8ccbf11edbbcf41f1bb3e9cfe6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/aed58a28ea71a0d7d0947190fab1e3f4daa1d4a5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…