Impact
A race condition (CWE‑367) between the gether_disconnect() and eth_stop() functions in the Linux kernel’s USB gadget u_ether driver can trigger a NULL pointer dereference. When eth_stop() runs concurrently while gether_disconnect() clears an endpoint descriptor, the driver fails to detect that the endpoint has been removed and attempts to dereference the cleared descriptor. This causes a kernel crash, and because eth_stop() holds the dev->lock during the dereference, the thread executing gether_disconnect() cannot acquire the same lock and spins forever, resulting in a hardlockup. The system becomes unresponsive until a reboot restores normal operation.
Affected Systems
The vulnerability affects all Linux kernel releases that include the unmodified u_ether USB gadget driver, specifically the core Linux kernel. The affected vendor is Linux and the product is the Linux kernel across all supported distributions that ship the kernel with this driver before the commit that moves the clearing of dev->port_usb to the start of gether_disconnect()
Risk and Exploitability
The CVSS score of 5.5 denotes moderate severity. With no EPSS score available and the issue not present in the CISA KEV catalog, the specific exploitation probability remains uncertain. However, the required conditions—a local user able to activate the u_ether driver and attach a USB Ethernet gadget—are plausible in many environments. Because the flaw leads to a hardlockup that requires a reboot, the primary impact is denial of service.
OpenCVE Enrichment
Debian DLA
Debian DSA