Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

CVE-2026-43275

Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
06/05/2026
Última modificación:
06/05/2026

Descripción

*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> scsi: ufs: core: Flush exception handling work when RPM level is zero<br /> <br /> Ensure that the exception event handling work is explicitly flushed during<br /> suspend when the runtime power management level is set to UFS_PM_LVL_0.<br /> <br /> When the RPM level is zero, the device power mode and link state both<br /> remain active. Previously, the UFS core driver bypassed flushing exception<br /> event handling jobs in this configuration. This created a race condition<br /> where the driver could attempt to access the host controller to handle an<br /> exception after the system had already entered a deep power-down state,<br /> resulting in a system crash.<br /> <br /> Explicitly flush this work and disable auto BKOPs before the suspend<br /> callback proceeds. This guarantees that pending exception tasks complete<br /> and prevents illegal hardware access during the power-down sequence.

Impacto