CVE-2026-43275
Awaiting Analysis Awaiting Analysis - Queue
UFS Core Exception Handling Race Condition in Linux Kernel

Publication date: 2026-05-06

Last updated on: 2026-05-06

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: core: Flush exception handling work when RPM level is zero Ensure that the exception event handling work is explicitly flushed during suspend when the runtime power management level is set to UFS_PM_LVL_0. When the RPM level is zero, the device power mode and link state both remain active. Previously, the UFS core driver bypassed flushing exception event handling jobs in this configuration. This created a race condition where the driver could attempt to access the host controller to handle an exception after the system had already entered a deep power-down state, resulting in a system crash. Explicitly flush this work and disable auto BKOPs before the suspend callback proceeds. This guarantees that pending exception tasks complete and prevents illegal hardware access during the power-down sequence.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-06
Last Modified
2026-05-06
Generated
2026-05-07
AI Q&A
2026-05-06
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the Linux kernel's UFS core driver related to how it handles exception event work during runtime power management (RPM) when the RPM level is zero.

When the RPM level is zero, the device power mode and link state remain active, but previously the driver bypassed flushing exception event handling jobs in this state.

This caused a race condition where the driver might try to access the host controller to handle an exception after the system had already entered a deep power-down state, which could lead to a system crash.

The fix ensures that exception event handling work is explicitly flushed during suspend when RPM level is zero, preventing illegal hardware access and system crashes.


How can this vulnerability impact me? :

This vulnerability can cause system crashes due to a race condition in the UFS core driver when handling exceptions during power management.

If exploited or triggered, it could lead to instability or unexpected shutdowns of systems running affected Linux kernels, potentially causing data loss or service interruptions.


What immediate steps should I take to mitigate this vulnerability?

The vulnerability is resolved by ensuring that exception event handling work is explicitly flushed during suspend when the runtime power management (RPM) level is zero (UFS_PM_LVL_0).

To mitigate this vulnerability, ensure your Linux kernel is updated to a version that includes the fix where the UFS core driver flushes exception handling work and disables auto BKOPs before the suspend callback proceeds.

This update prevents race conditions that could cause system crashes by guaranteeing that pending exception tasks complete and preventing illegal hardware access during power-down sequences.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart