Impact
The kernel bug causes a USB gadget network device to outlive the gadget device that owns it. When the gadget unbinds, the net_device object remains registered in sysfs under a path that no longer exists, producing a dangling symlink. This leaves an orphaned kernel object that is never deallocated during the normal cycle, leaving the system with an inconsistent device tree.
Affected Systems
All Linux kernel builds that include the f_subset gadget driver before the commit that introduces device_move. No specific version ranges are provided, but any kernel that contains the buggy gadget module is impacted.
Risk and Exploitability
EPSS data is not available and the vulnerability is not listed in CISA KEV. The likely attack vector is local: a user or process that can trigger the USB gadget bind/unbind cycle may interact with the orphaned net_device. Based on the description, it is inferred that exploitation could lead to resource leaks or a denial of service if the dangling object is accessed or freed again, though no public exploits exist and the overall risk remains unclear.
OpenCVE Enrichment