Impact
The vulnerability arises from a race condition in the USB gadget UVC driver that can cause a NULL pointer dereference during power‑management suspend/resume cycles. When the PM subsystem freezes or resumes, the unbind thread nullifies the gadget pointer while the V4L2 release path still attempts to access it, triggering a kernel panic. The attack compromises system availability by causing a total reboot or need for operator intervention.
Affected Systems
All Linux kernel installations that include the USB gadget UVC subsystem are affected, regardless of kernel version until the patch that introduces the func_unbound flag and mutex is applied. There is no product version isolation beyond the Linux kernel itself.
Risk and Exploitability
The problem is highly disruptive, as the kernel crash can be invoked simply by forcing a suspend/resume transition on a device that uses the UVC gadget. EPSS data is unavailable and the vulnerability is not listed in the CISA KEV catalog, but the inherent nature of a kernel panic indicates a high risk of denial of service. The CVSS score is not provided in the data, but the impact is equivalent to a critical severity. Attackers would need to trigger a PM transition while the gadget is bound; this is feasible on a compromised or privileged host. The fix restores proper synchronization and safe shutdown of the device, preventing the null dereference.
OpenCVE Enrichment
Debian DLA
Debian DSA