Impact
The Linux kernel's dummy-hcd driver contains a race condition between a USB reset and driver unbind that can cause a null pointer dereference in the usb_gadget_udc_reset routine, resulting in a kernel panic. This flaw manifests as an addressing exception that leads to a loss of availability for the affected system. The underlying weakness is a synchronization error that allows concurrent threads to manipulate shared state inconsistently, as evidenced by Syzbot testing. The crash renders the host device unresponsive until reboot, giving attackers a significant denial‑of‑service vector.
Affected Systems
All Linux kernel builds that include the dummy-hcd gadget driver and are affected by the race condition, with no explicit version bounds in the report. The vulnerability was addressed in recent commits to the kernel source seen in the referenced Git history. Systems running unpatched kernels should be considered affected.
Risk and Exploitability
The CVSS score is not provided, but the impact of a kernel panic assigns a high severity. EPSS is not available and the vulnerability is not listed in CISA KEV, so there is no known exploitation data, yet the ease of reproducing the race with a crafted USB reset suggests a moderate to high exploitation probability for a local attacker with sufficient privileges to trigger the reset or unbind. The attack vector appears to be local or possibly remote if USB interfaces can be manipulated over a networked host controller. Administrators should treat this as a high‑risk issue until a kernel update is applied.
OpenCVE Enrichment