VYPR
Unrated severityNVD Advisory· Published Dec 23, 2025· Updated Apr 15, 2026

CVE-2025-68342

CVE-2025-68342

Description

In the Linux kernel, the following vulnerability has been resolved:

can: gs_usb: gs_usb_receive_bulk_callback(): check actual_length before accessing data

The URB received in gs_usb_receive_bulk_callback() contains a struct gs_host_frame. The length of the data after the header depends on the gs_host_frame hf::flags and the active device features (e.g. time stamping).

Introduce a new function gs_usb_get_minimum_length() and check that we have at least received the required amount of data before accessing it. Only copy the data to that skb that has actually been received.

[mkl: rename gs_usb_get_minimum_length() -> +gs_usb_get_minimum_rx_length()]

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's gs_usb CAN driver, a missing length check in the URB receive callback could lead to out-of-bounds access.

Vulnerability

Overview

CVE-2025-68342 is a flaw in the Linux kernel's gs_usb CAN driver. In the function gs_usb_receive_bulk_callback(), the driver processes USB receive callback, the code did not verify that the received URB contained enough data before accessing the gs_host_frame structure and its payload. The required length depends on flags and device features such as hardware timestamping. An attacker able to send a crafted USB packet to a system using this driver could trigger an out-of-bounds read or write.

Exploitation

Exploitation requires physical or logical access to the USB bus to send a malformed URB to the gs_usb device. No authentication is needed beyond the ability to communicate with the USB device. The driver now includes a new helper function gs_usb_get_minimum_rx_length() to compute the minimum expected length and rejects any URB that falls short, preventing access to uninitialized or out-of-bounds memory [1][2].

Impact

A successful exploit could allow an attacker to read sensitive kernel memory or corrupt kernel data structures, potentially leading to a denial of service (system crash) or, in some cases, privilege escalation. The vulnerability is in the CAN subsystem, which is often used in automotive and industrial environments, making it a target for local or adjacent attackers.

Mitigation

The fix has been applied to the Linux kernel stable tree via commits [1], [2], [3], and [4]. Users should update to a kernel version containing these patches. No workaround is available other than disabling the gs_usb driver if it is not needed.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.