VYPR
Unrated severityNVD Advisory· Published Mar 25, 2026· Updated Apr 18, 2026

CVE-2026-23298

CVE-2026-23298

Description

In the Linux kernel, the following vulnerability has been resolved:

can: ucan: Fix infinite loop from zero-length messages

If a broken ucan device gets a message with the message length field set to 0, then the driver will loop for forever in ucan_read_bulk_callback(), hanging the system. If the length is 0, just skip the message and go on to the next one.

This has been fixed in the kvaser_usb driver in the past in commit 0c73772cd2b8 ("can: kvaser_usb: leaf: Fix potential infinite loop in command parsers"), so there must be some broken devices out there like this somewhere.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's ucan CAN driver, a zero-length message from a malicious device causes an infinite loop, leading to a system hang.

Vulnerability

Description

In the Linux kernel's ucan CAN driver (drivers/net/can/usb/ucan.c), the ucan_read_bulk_callback() function processes incoming USB messages from a CAN device. If a device sends a message with the length field set to 0, the driver enters an infinite loop because it does not validate the length before processing. This bug is analogous to a previously fixed issue in the kvaser_usb driver (commit 0c73772cd2b8), indicating that similar broken devices exist in the field [1][2][3][4].

Exploitation

Conditions

An attacker must have a USB CAN device that can send crafted messages with a zero-length field. This could be achieved through physical access to the USB port or by compromising a legitimate device to inject malicious packets. No authentication is required; the driver implicitly trusts the message length provided by the device. The vulnerability is triggered when the driver receives such a message in the bulk callback, causing an infinite loop that consumes CPU resources.

Impact

Successful exploitation results in a denial of service (DoS) by hanging the entire system. The infinite loop prevents the CPU from executing other tasks, effectively freezing the machine. This can lead to loss of availability for any services running on the affected system.

Mitigation

The fix has been applied to the Linux kernel stable tree via commits [1][2][3][4]. Users should update to a kernel version that includes these commits. No workaround is documented; the driver must be patched to skip zero-length messages.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

8

News mentions

0

No linked articles in our index yet.