Impact
The Linux kernel’s uacce driver manages device isolation by creating sysfs entries when callback functions for reading or writing isolation thresholds are present. A logic error caused the driver to attempt to use a callback even when it was absent, leading the kernel to dereference a null pointer and crash. The crash results in a denial‑of‑service condition that brings the entire system down, with no data loss but an interruption of availability.
Affected Systems
All Linux kernel configurations that ship the uacce driver before the fix, specifically kernel 6.19 release candidates rc1 through rc6 and any derivative kernels that have not applied the patch. Any distribution that retains the unpatched code will be affected until the kernel is updated to the fixed version.
Risk and Exploitability
The CVSS score of 5.5 rates the vulnerability as moderate. EPSS below 1% indicates a low current exploitation likelihood. The attack vector is local, requiring the ability to register a device that loads the uacce driver or to write to its sysfs interfaces. Since the flaw manifests when the driver creates entries for nonexistent callbacks, a user with root or local device‑management privileges could trigger it. No exploits are recorded in the KEV catalog; the risk is operational rather than financial.
OpenCVE Enrichment
Debian DSA