CVE-2026-43275
UFS Core Exception Handling Race Condition in Linux Kernel
Publication date: 2026-05-06
Last updated on: 2026-05-06
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Linux kernel's UFS core driver related to how it handles exception event work during runtime power management (RPM) when the RPM level is zero.
When the RPM level is zero, the device power mode and link state remain active, but previously the driver bypassed flushing exception event handling jobs in this state.
This caused a race condition where the driver might try to access the host controller to handle an exception after the system had already entered a deep power-down state, which could lead to a system crash.
The fix ensures that exception event handling work is explicitly flushed during suspend when RPM level is zero, preventing illegal hardware access and system crashes.
How can this vulnerability impact me? :
This vulnerability can cause system crashes due to a race condition in the UFS core driver when handling exceptions during power management.
If exploited or triggered, it could lead to instability or unexpected shutdowns of systems running affected Linux kernels, potentially causing data loss or service interruptions.
What immediate steps should I take to mitigate this vulnerability?
The vulnerability is resolved by ensuring that exception event handling work is explicitly flushed during suspend when the runtime power management (RPM) level is zero (UFS_PM_LVL_0).
To mitigate this vulnerability, ensure your Linux kernel is updated to a version that includes the fix where the UFS core driver flushes exception handling work and disables auto BKOPs before the suspend callback proceeds.
This update prevents race conditions that could cause system crashes by guaranteeing that pending exception tasks complete and preventing illegal hardware access during power-down sequences.