Impact
The vulnerability arises in the USB NCM gadget driver of the Linux kernel. The function ncm_set_alt originally held a mutex to prevent race conditions with configfs. However, the mutex lock path calls might‑sleep, which is disallowed in an atomic context. This discrepancy can trigger a kernel fault, causing the system to panic or crash when a USB gadget configuration is changed. The weakness is a race condition that can lead to denial of service; an attacker with local or privileged access to the USB gadget subsystem could force an improper sleep call, resulting in an unavailable or compromised system.
Affected Systems
Affected are all Linux kernel releases that include the unpatched f_ncm driver code. The fix was introduced in the commit referenced by the advisory's diff links. Any deployed kernel prior to those changes, regardless of distribution, inherits this bug. The vulnerability does not apply to modern kernels that have incorporated the corrected implementation, where the mutex reference has been removed and a boolean flag manages connection state.
Risk and Exploitability
Because the flaw manifests under an atomic context and requires manipulating the USB gadget configuration, it is a local-user or privileged-level denial of service scenario. The CVSS score is 7.0, the EPSS score is 0.00017 (indicating very low exploitation probability), and it is not listed in the CISA KEV catalog. Attackers would need to trigger the buggy ncm_set_alt path, typically via a configured USB gadget device. No publicly known exploits exist, so the risk is primarily theoretical, contingent upon the presence of the unpatched driver.
OpenCVE Enrichment