Impact
The bug occurs in the Linux kernel's cdns3 USB driver. When the gadget start routine fails, the DRD hardware remains in gadget mode while the software state stays INACTIVE. Switching to host mode through sysfs then leads the role switch function to skip required cleanup, leaving the controller in an invalid state. The resulting synchronous external abort in xhci_gen_setup() causes a kernel crash. This crash essentially terminates the system or requires a reboot, representing a denial‑of‑service condition for environments that rely on USB role switching or DRD hardware.
Affected Systems
All Linux kernel configurations that include the cdns3 USB controller driver are affected. The kernel repository does not specify version ranges for this vulnerability, so any kernel containing the unpatched cdns3 driver is potentially impacted.
Risk and Exploitability
The CVSS score of 7.0 indicates high severity, and the EPSS score is not available, implying limited public exploitation data. The vulnerability can be triggered by a failure in the gadget start routine, an event that may be difficult to control externally. Nonetheless, the flaw leads directly to a system crash whenever a role switch is attempted after the failure, representing a local denial‑of‑service condition. The lack of a CISA KEV listing does not diminish this risk for devices using this controller.
OpenCVE Enrichment
Debian DLA
Debian DSA