Impact
The vulnerability involves a dangling reference count on the USB interface used by the NFC PN533 driver in the Linux kernel. When the device is disconnected, the driver fails to release the reference that was taken during probe, leaving a stray count. Based on the description, such an unresolved reference can lead the kernel to operate on freed or invalid memory, potentially causing a kernel crash and resulting in a denial‑of‑service.
Affected Systems
All versions of the Linux kernel that contain the pn533 NFC driver before the patch are potentially affected. No precise kernel release is listed, so any deployment that includes the original probe implementation is at risk.
Risk and Exploitability
The EPSS score is below 1% and the vulnerability is not listed in the CISA KEV catalog, indicating a low probability of exploitation in the wild. The flaw requires local access to a system with the NFC device; the attacker would need to physically or virtually disconnect the device to trigger the failing reference count. The likely attack vector is local device disconnection, making external exploitation unlikely. The potential impact if exploited is a kernel crash that could render the system unusable until reboot.
OpenCVE Enrichment