Impact
The vulnerability is a race condition between nand_lock/unlock and other NAND operations in the Linux kernel's MTD rawnand implementation. When the device lock is not held, lock_region directives can concurrently issue PIO commands that interfere with background erase/write tasks performed by UBI/UBIFS. These races create cmd_pending conflicts on the NAND controller, potentially leading to corrupted writes, data loss, or temporary loss of controller service. The weakness is a concurrency flaw (CWE‑820) that affects the integrity and availability of devices using NAND flash storage.
Affected Systems
All Linux systems whose kernel includes the MTD rawnand driver and that use NAND flash storage are affected. The CNA vendor list only references Linux:Linux, and no specific kernel version is provided, so any kernel containing this code path is potentially vulnerable until the patch is applied.
Risk and Exploitability
The CVSS base score is 5.5, indicating moderate severity. The EPSS score is under 1 %, suggesting a low likelihood of widespread exploitation. The vulnerability is not listed in CISA's KEV catalog. Attackers would need to trigger simultaneous NAND operations such as concurrent UBI/UBIFS background erasures and active nand_lock/unlock calls, which is most likely achievable by a local user with sufficient privileges to manipulate storage or by a malicious application. The race is local and would not provide remote code execution but could be used to cause data corruption or a denial of service. The fix requires re‑entering the device lock during lock/unlock, preventing the race.
OpenCVE Enrichment