CVE-2023-54159
BaseFortify
Publication date: 2025-12-24
Last updated on: 2025-12-29
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's usb mtu3 driver. When handling a qmu transfer interrupt, the code unlocks a lock before returning a request. If another thread simultaneously handles a disconnect event and disables an endpoint, it may lock the same lock and free the qmu ring. This can cause the interrupt handler to access a NULL pointer (gpd), potentially leading to a kernel panic (crash). The fix involves checking the gpd value before handling it to avoid this kernel panic.
How can this vulnerability impact me? :
This vulnerability can cause a kernel panic in the Linux system, leading to a system crash or instability. This can disrupt normal operations, cause data loss, or require a system reboot, impacting system availability and reliability.