Impact
In the Linux kernel, the f_tcm USB target driver can dereference a pointer that is expected to reference a nexus structure, "tpg->tpg_nexus", without verifying that it is non‑NULL. When a USB host sends a Bulk‑Only Transport command during the brief race window before the nexus is fully established or immediately after it is dropped, the driver dereferences a NULL pointer, causing a kernel panic. The effect is a local denial of service that brings the kernel process table to an unrecoverable state.
Affected Systems
The flaw exists in the Linux kernel’s USB target driver across all releases in which the f_tcm gadget is enabled. The affected vendor is Linux; the impact is on all Linux kernel versions that contain the unpatched gadget, regardless of distribution. No specific version numbers are provided in this advisory.
Risk and Exploitability
The vulnerability is exploitable only by a malicious or misconfigured USB host that can send BOT commands during the race window. Because it is a local kernel panic, physical access to the device is required. The EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog, but its impact is high enough that any attack that succeeds will bring the system down. The missing null checks contrast with correctly handled functions such as usbg_submit_command, so the attack vector is an unguarded path in the driver.
OpenCVE Enrichment