CVE-2025-68316
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's SCSI UFS core driver. After the DME Link Startup, the error return value can be 0 (SUCCESS) or 1 (FAILURE). However, the driver probe function expects a negative value to indicate an error. Because the failure code is 1 (not negative), the probe incorrectly considers the operation successful even though it failed. Later, when the driver is removed, this invalid state causes a kernel oops (crash). The issue arises because callers of ufshcd_init() do not expect a non-negative error code.
How can this vulnerability impact me? :
This vulnerability can cause the Linux kernel to incorrectly treat a failed driver probe as successful, leading to an invalid driver state. When the driver is removed, this invalid state can cause a kernel oops (crash), potentially leading to system instability or downtime.