Impact
A bug in the Linux kernel’s USB gadget HID driver causes the character device (cdev) to be reinitialized while it is still in use. The buggy code invokes cdev_init again on an existing cdev that may still have open references, leading to memory corruption and an 'oops' kernel crash. This vulnerability can result in denial-of-service by crashing the system. The weakness is a classic Resource Management error (CWE-413).
Affected Systems
All Linux kernel builds that include the f_hid gadget driver without the patch. The affected code is part of the usb: gadget subsystem; specific kernel versions are not enumerated in the provided data, so any kernel that has shipped the unpatched f_hid module may be vulnerable.
Risk and Exploitability
The EPSS score of less than 1% indicates a very low likelihood of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. The CVSS score of 5.5 reflects medium severity. Exploitation would likely require local access to a system that hosts a USB gadget using the f_hid driver and would exploit the reinitialization bug to corrupt kernel memory, potentially crashing the system. The attack vector is local, based on manipulating the bind/unbind sequence of the HID gadget device.
OpenCVE Enrichment
Debian DSA