CVE-2025-68236
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves the UFS (Universal Flash Storage) power-down sequence in the Linux kernel, specifically related to Qualcomm UFS controllers. During the shutdown process, after sending a power-off command and asserting a hardware reset, the device firmware wakes up and executes a reset routine that causes a large current draw (ICCQ). This high current can cause the power regulator to trigger an overcurrent protection (OCP) fault because the regulator is simultaneously trying to enter low power mode while the current exceeds thresholds. The vulnerability is addressed by adding a 10ms delay after asserting the hardware reset to allow the reset routine to complete while power rails remain active, preventing the OCP fault.
How can this vulnerability impact me? :
This vulnerability can cause an overcurrent protection (OCP) fault in the power regulator supplying the UFS device during shutdown. Such faults may lead to unexpected power interruptions or hardware instability during the power-down sequence of UFS devices, potentially causing device malfunctions or data integrity issues during shutdown.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that the Linux kernel version you are using includes the fix that adds a 10ms delay after asserting the hardware reset (HWRST) during UFS power down. This delay allows the reset operation to complete while power rails remain active and in high-power mode, preventing overcurrent protection (OCP) faults. Updating your kernel to a version with this fix is the immediate step to take.