Impact
The f_ncm USB gadget driver in the Linux kernel can allow a network device to outlive its parent gadget device when the gadget is disconnected. The persistent net_device leaves dangling sysfs links, which in turn triggers a null pointer dereference in kernel space and can cause a system crash. This failure results in a denial‑of‑service condition that would appear as a kernel panic or OOPS. The underlying weakness is an improper resource handling without proper synchronization, consistent with CWE‑825, and can lead to memory corruption and crash.
Affected Systems
All Linux kernel builds that contain the f_ncm driver and have not yet integrated the device_move patch are affected. The advisory does not list specific kernel versions, so any installation of a kernel that ships with the f_ncm module remains vulnerable until an updated image is deployed.
Risk and Exploitability
The CVSS score of 5.5 indicates moderate severity. The EPSS score is currently unavailable and the vulnerability is not listed in CISA's KEV catalog. The likely attack vector is a local or physical attacker who can trigger USB gadget bind/unbind cycles or forcibly reconnect the gadget device to exercise this code path. No publicly documented exploits exist, but an attacker capable of inducing the conditions could crash the kernel and disrupt service.
OpenCVE Enrichment