Impact
The aqc111 USB driver in the Linux kernel performs a power‑management write operation while handling a suspend callback. This action triggers a runtime PM resume that never completes, causing the task to block the networking lock and freeze the entire network stack. The result is a denial of network service for the affected system. The flaw is classified as a resource acquisition or use problem (CWE‑833).
Affected Systems
Any Linux kernel that includes the unchanged aqc111 driver is vulnerable. All distributions shipping a kernel with this driver module, without the patch, are at risk. The vulnerability applies across the Linux kernel project and its variants. No specific kernel release series is listed, so pending existence of the code implies broad coverage.
Risk and Exploitability
Exploit probability is reported as less than 1 % and the issue is not listed as a known exploited vulnerability. The vector is inferred as local; an attacker would need to manage the USB bus or provoke a suspend cycle on a connected aqc111 device inside the physical environment of the target. If successful, the impact would be a loss of network connectivity until the system is rebooted or the lock released. The overall risk is moderate due to the low likelihood yet critical effect on availability.
OpenCVE Enrichment