Impact
The Linux kernel bug triggers I2C transfers while the Renesas I2C controller is already suspended, producing kernel warnings and potentially failing timed communications such as those from embedded RTC modules. The weakness arises from an incorrect ordering of sleep callbacks that allows runtime power management to disable the controller before all I2C activity ceases, leading to device instability or denial of service during suspend cycles. Based on the description, the weakness appears to be a flow‑control issue, which is often classified as CWE‑676.
Affected Systems
The issue impacts systems running the Renesas I2C driver on platforms such as the Renesas RZ/G3E, where the kernel version does not include the commit that moves suspend handling to the NOIRQ phase. Users should verify whether their kernel build contains commit 53326135d0e0 or the equivalent patch.
Risk and Exploitability
With an EPSS score below 1 % and no listing in the CISA KEV catalog, active exploitation is unlikely. The vulnerability is purely internal; an attacker would need privileged or physical access to manipulate the host’s suspend sequence. While an exploit is not presently available, the operational impact could be significant for deployments relying on uninterrupted I2C communication during suspend.
OpenCVE Enrichment
Debian DSA