Impact
The stratix10-rsu driver in the Linux kernel has a NULL pointer dereference that is triggered when Remote System Update (RSU) is disabled. When the driver attempts to create a secure thread after failing to send an asynchronous message, it dereferences a freed channel, causing a kernel panic. The result is a catastrophic system crash that brings the affected device down, effectively a denial‑of‑service.
Affected Systems
This flaw affects any Linux kernel built for the SoCFPGA Stratix 10 SoCDK platform, specifically versions using the stratix10-rsu driver where RSU is disabled. The advisory references kernel 6.19.0‑rc8‑yocto-standard+, but the issue is present in all earlier builds that include the vulnerable driver.
Risk and Exploitability
The vulnerability is local; an attacker must be able to operate the device with RSU disabled and load the driver. No remote exploitation path is reported. The EPSS score is not available and the flaw is not listed in the CISA KEV catalog, indicating a lower probability of widespread exploitation. Nevertheless, any local user capable of manipulating the firmware or triggering the driver can cause a deterministic kernel panic, which results in an immediate reboot or halt until a fresh firmware image is loaded.
OpenCVE Enrichment