Impact
The vulnerability originates from a race condition in the MHI stack’s auto_queue feature, which can trigger a NULL pointer dereference when the QRTR client driver’s structures are accessed before they are fully initialized. When this race occurs during system boot, the driver can crash, rendering the system unbootable and causing a denial of service. The issue exists only for IPCR DL channels and would impact any kernel that includes the QRTR driver and the MHI stack.
Affected Systems
The affected product is the Linux kernel. No specific kernel version range is listed; the vulnerability applies to any configuration that enables the MHI auto_queue feature for IPCR DL channels.
Risk and Exploitability
The CVSS score is not specified, and the EPSS score is unavailable, so the exact risk level cannot be quantified. KEV is not listed. The likely attack vector is during the boot process when the QRTR driver initializes; an attacker would need local privileged or kernel‑mode access to influence driver initialization or to trigger the race. Because the crash occurs before normal operation, the exploit would result in a denial of service rather than privilege escalation. The absence of publicly available exploits suggests the risk is primarily theoretical until the kernel update is applied.
OpenCVE Enrichment