Impact
The flaw lies in the Linux kernel media subsystem where asynchronous connections are bound to hardware devices. When an async connection matches a firmware node and the sub-device is registered, a failure in the notification logic can leave the async connection in an inconsistent state. The implementation may dereference an uninitialized or stale kernel pointer, which can cause a kernel crash or potentially provide a foothold for arbitrary memory corruption. The documented updates address the possibility of dereferencing a non‑initialized field and incorrectly removing entries from connection lists on error paths.
Affected Systems
All running Linux kernels that ship the upstream media v4l2‑async code before the patch. The specific affected kernel versions are not enumerated in the advisory, but any distribution using a kernel build prior to the commit cited in the reference URLs would be vulnerable.
Risk and Exploitability
Because the advisory does not provide a CVSS or EPSS score, the precise exploitability is unknown. However, the vulnerability’s root cause is a kernel pointer dereference that can lead to a kernel panic. The attack vector likely requires the ability to cause a failed async match, which implies either a local user with access to the media subsystem or a compromised device driver. The KEV status is not listed, indicating no known widespread exploitation instances.
OpenCVE Enrichment