Impact
The vulnerability exists in the Renesas USB3 gadget driver. The GET_STATUS and SET/CLEAR_FEATURE request handlers extract the endpoint number from the host‑supplied wIndex without validating that the number of endpoints matches the device’s actual count. This oversight can cause a pointer dereference in kernel space based on an out‑of‑range index, leading to a kernel panic or other crash. The result is a loss of the gadget’s functionality and a denial of service to the device.
Affected Systems
All Linux kernel distributions that ship the renesas_usb3 gadget driver are affected. The flaw applies to kernel releases prior to the commit that introduces endpoint index validation; specific affected kernel versions are not enumerated in the advisory.
Risk and Exploitability
The CVSS score of 5.5 places this issue in the medium severity range. The EPSS score is below 1 %, indicating a low likelihood that this vulnerability will be exploited in the wild. It is not listed in the CISA KEV catalog. Based on the description, it is inferred that an attacker could trigger the flaw by sending a USB control request with an invalid wIndex value to the gadget device from a USB host; a successful exploit would cause a kernel crash and a temporary loss of the device’s functionality.
OpenCVE Enrichment
Debian DSA