Impact
In the Linux kernel’s mlx5e IPsec driver, a scheduling violation occurs when the driver attempts to query a MAC address from the hardware while executing in an atomic context. The function used can sleep, which is disallowed in atomic context, causing the kernel to trigger a BUG and crash. The patch replaces the hardware query with a direct copy of the MAC address from the device structure, eliminating the sleep operation and preventing the fault. The fixed flaw was reported as "scheduling while atomic" and the crash would interrupt service on the host machine.
Affected Systems
The issue affects all Linux kernel installations that include the mlx5e driver with IPsec support and use the kernel before the fix is applied. No precise version range is specified, but the fix resides in the stable kernel tree, so any kernel that has not incorporated the commit would remain vulnerable. The material specific to vendor devices is not mentioned in the advisory.
Risk and Exploitability
The bug results in a local kernel panic, which is a severe denial‑of‑service condition. Though the CVSS score is not provided, the impact is high. No EPSS score is available and the vulnerability is not listed in CISA's KEV catalog. There is no explicit enumeration of access requirements or attack vectors in the advisory, so it is unclear what privileges or conditions are needed to trigger the crash. Consequently, the risk is considered severe, but the potential exploitability cannot be precisely quantified based on the available data.
OpenCVE Enrichment