Impact
In the Linux kernel, a bug in the uacce device driver’s cleanup logic can cause the system to freeze when a failure in cdev_device_add is not handled properly. Specifically, if cdev_device_add fails, the driver internally frees cdev memory, and a subsequent call to cdev_device_del in the cleanup routine attempts to delete a freed object, resulting in a hang error. This flaw may be exploited by code that triggers the driver’s load or unload sequence, leading to local denial of service.
Affected Systems
The flaw affects Linux kernel versions that include the uacce driver with the buggy cleanup logic. Known affected releases are Linux kernel 6.19 Release Candidate 1 through RC6. It is likely that other kernel releases built before the patch commit are also vulnerable, but no further specific version information is available.
Risk and Exploitability
The CVSS score is 5.5, indicating moderate severity, while the EPSS score is below 1 percent, showing a very low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. The attack vector is inferred to be local, requiring an attacker to run or load the vulnerable uacce driver on the affected system. If the flaw is triggered, the kernel will hang, causing a denial of service until the system is rebooted or the driver is unloaded.
OpenCVE Enrichment
Debian DLA
Debian DSA
Ubuntu USN