Impact
The vulnerability is a circular locking dependency in the Linux kernel’s uinput subsystem that can be triggered when a force‑feedback gamepad queues an effect. A lock ordering cycle—ff mutex → udev mutex → input mutex → dev mutex → ff mutex—produces a lockdep warning that signals a violation of kernel lock ordering rules. The CVE description does not report a kernel deadlock, but the presence of the warning and the nature of the cycle suggests the possibility that the system could become unresponsive if the cycle were to occur during normal operation. This flaw is a concurrency weakness classified under CWE-667 and CWE-833.
Affected Systems
All Linux kernel releases are affected, from the 2.6.19 branch through the current 7.0 series including all release candidates (rc1 through rc7). The kernel CPE list includes every kernel version, indicating that any install of the kernel without the patch is potentially vulnerable.
Risk and Exploitability
The CVSS score of 7.8 reflects a high severity availability impact. The EPSS score is below 1%, and the vulnerability is not in the CISA KEV catalog, indicating a low exploitation probability. The flaw can be triggered by local use of a force‑feedback device such as a gamepad using uinput, or by a process that can drive the device. If the lock ordering cycle were to occur under normal operation, it could potentially lead to a deadlock and a local denial of service, but the CVE description does not confirm that a deadlock occurs. The fix replaces the udev mutex acquisition with a spinlock (state_lock) that breaks the circular dependency, restoring safe lock ordering.
OpenCVE Enrichment
Debian DLA
Debian DSA