Impact
The flaw resides in the AMD DNA accelerator driver within the Linux kernel. An application that issues a query IOCTL while the kernel is performing an auto‑suspend can cause a deadlock. The driver holds a device lock and then requests a runtime resume, but the suspend routine also needs that lock. Because each side waits for the other, the system stalls. This results in a denial of service: the affected device and potentially the entire system become unresponsive when the device is queried during suspend. The weakness corresponds to the locking misuse identified by CWE‑413.
Affected Systems
Affected systems are all Linux distributions running a kernel that includes the accel/amdxdna driver before the fix. The advisory lists the generic Linux kernel CPE and does not narrow to specific releases, meaning any kernel with this component is vulnerable until the patch is applied. Administrators of Linux servers, workstations, or embedded devices should verify whether their kernel contains this driver and whether a patched version is available.
Risk and Exploitability
The CVSS score is not supplied, but the EPSS indicates less than 1 % probability of exploitation, and the vulnerability is not listed in the CISA KEV catalog. The attack requires local execution: an attacker must be able to run code that can send the IOCTL to the device while the kernel is suspending. While this suggests a limited attack surface, a compromised or malicious application could trigger the deadlock, especially on systems that rely on power‑management features. The availability impact is immediate once the deadlock occurs, and no privilege escalation is required.
OpenCVE Enrichment