Impact
A race condition occurs in the Linux kernel’s UFS core suspend logic when the pending RTC work routine continues to run while the system enters suspend. The delayed work handler can be executing during a clock‑gating operation, causing the update RTC function to trigger an asynchronous SError interrupt that results in a kernel panic. The crash brings the entire system down, representing a denial‑of‑service condition for services running on the affected host.
Affected Systems
All Linux kernel builds that implement the original UFS core suspend routine are susceptible. No specific version list is supplied, so any kernel containing this code path is potentially vulnerable.
Risk and Exploitability
The CVSS score of 5.5 indicates a moderate severity. The flaw can lead to a complete system crash. Exploitation requires privileged kernel execution that triggers a suspend operation while UFS RTC work is active, which would likely need an attacker with sufficient access or the ability to manipulate power‑state transitions. Because the defect is confined to a race condition and is not publicly exploited, the perceived risk is low to moderate and the flaw is not listed in the CISA KEV catalog.
OpenCVE Enrichment