CVE-2025-68236
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-12-16

Last updated on: 2025-12-18

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: ufs-qcom: Fix UFS OCP issue during UFS power down (PC=3) According to UFS specifications, the power-off sequence for a UFS device includes: - Sending an SSU command with Power_Condition=3 and await a response. - Asserting RST_N low. - Turning off REF_CLK. - Turning off VCC. - Turning off VCCQ/VCCQ2. As part of ufs shutdown, after the SSU command completion, asserting hardware reset (HWRST) triggers the device firmware to wake up and execute its reset routine. This routine initializes hardware blocks and takes a few milliseconds to complete. During this time, the ICCQ draws a large current. This large ICCQ current may cause issues for the regulator which is supplying power to UFS, because the turn off request from UFS driver to the regulator framework will be immediately followed by low power mode(LPM) request by regulator framework. This is done by framework because UFS which is the only client is requesting for disable. So if the rail is still in the process of shutting down while ICCQ exceeds LPM current thresholds, and LPM mode is activated in hardware during this state, it may trigger an overcurrent protection (OCP) fault in the regulator. To prevent this, a 10ms delay is added after asserting HWRST. This allows the reset operation to complete while power rails remain active and in high-power mode. Currently there is no way for Host to query whether the reset is completed or not and hence this the delay is based on experiments with Qualcomm UFS controllers across multiple UFS vendors.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-16
Last Modified
2025-12-18
Generated
2026-05-07
AI Q&A
2025-12-16
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves the UFS (Universal Flash Storage) power-down sequence in the Linux kernel, specifically related to Qualcomm UFS controllers. During the shutdown process, after sending a power-off command and asserting a hardware reset, the device firmware wakes up and executes a reset routine that causes a large current draw (ICCQ). This high current can cause the power regulator to trigger an overcurrent protection (OCP) fault because the regulator is simultaneously trying to enter low power mode while the current exceeds thresholds. The vulnerability is addressed by adding a 10ms delay after asserting the hardware reset to allow the reset routine to complete while power rails remain active, preventing the OCP fault.


How can this vulnerability impact me? :

This vulnerability can cause an overcurrent protection (OCP) fault in the power regulator supplying the UFS device during shutdown. Such faults may lead to unexpected power interruptions or hardware instability during the power-down sequence of UFS devices, potentially causing device malfunctions or data integrity issues during shutdown.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, ensure that the Linux kernel version you are using includes the fix that adds a 10ms delay after asserting the hardware reset (HWRST) during UFS power down. This delay allows the reset operation to complete while power rails remain active and in high-power mode, preventing overcurrent protection (OCP) faults. Updating your kernel to a version with this fix is the immediate step to take.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart