Impact
A kernel bug in the IPA driver caused the event ring index field to remain unprogrammed for IPA controllers of version 5.0 and higher. Because the index was not set, GSI channels could not signal transfer completions, and the kernel function gsi_channel_trans_quiesce() would wait forever for a bounce that never arrived. This manifests as a system hang during runtime suspend, system suspend, or remoteproc stop operations, effectively disabling IPA‑based data paths.
Affected Systems
The flaw exists in the Linux kernel’s IPA driver for any distribution that ships a kernel version lacking the fix. All implementations that support IPA controllers v5.0 or later are potentially affected until the code is updated to program the correct CH_ERINDEX field.
Risk and Exploitability
The vulnerability is an internal kernel defect that can lead to a system hang when running certain operations such as runtime suspend, system suspend, or remoteproc stop. No public exploit is known. Based on the description, it is inferred that an attacker with local or privileged access who can trigger these operations could induce a denial‑of‑service state. The CVSS score of 5.5 indicates moderate impact. With EPSS not available and not listed in KEV, the likelihood of exploitation is uncertain but can arise if such conditions are met.
OpenCVE Enrichment