CVE-2026-43275
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
06/05/2026
Última modificación:
06/05/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
scsi: ufs: core: Flush exception handling work when RPM level is zero<br />
<br />
Ensure that the exception event handling work is explicitly flushed during<br />
suspend when the runtime power management level is set to UFS_PM_LVL_0.<br />
<br />
When the RPM level is zero, the device power mode and link state both<br />
remain active. Previously, the UFS core driver bypassed flushing exception<br />
event handling jobs in this configuration. This created a race condition<br />
where the driver could attempt to access the host controller to handle an<br />
exception after the system had already entered a deep power-down state,<br />
resulting in a system crash.<br />
<br />
Explicitly flush this work and disable auto BKOPs before the suspend<br />
callback proceeds. This guarantees that pending exception tasks complete<br />
and prevents illegal hardware access during the power-down sequence.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/5d186731bc335cc049d4e57ab9f563cfab95593e
- https://git.kernel.org/stable/c/78d8e2d6352e8317686ee3a44811ac14c415a57d
- https://git.kernel.org/stable/c/aa8d68d97c7f0ef966e51afc17fdbdc372700edf
- https://git.kernel.org/stable/c/aac2fee7513dd25042a616f86a1469b4858d2c5c
- https://git.kernel.org/stable/c/ab71c146c135f9af1614ef0fc29a0a3b84f1a373
- https://git.kernel.org/stable/c/d5c3a1a13f97355c397f9439d79cb04b182958a3
- https://git.kernel.org/stable/c/f8ef441811ec413717f188f63d99182f30f0f08e



