CVE-2025-68746
Use-After-Free in Linux Tegra210 QSPI Timeout Handling
Publication date: 2025-12-24
Last updated on: 2025-12-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability occurs in the Linux kernel's tegra210-quad SPI driver. When the CPU running the QSPI interrupt handler is very busy, the IRQ thread may not run before a transfer timeout occurs. During timeout handling, pending transfers are cleaned up and marked as failed, but the curr_xfer field still points to stale memory. This can cause issues because the system may reference invalid data. The fix involves clearing curr_xfer to NULL upon timeout and checking this condition when the IRQ thread runs, as well as clearing interrupts on failure to allow new interrupts to be processed.
How can this vulnerability impact me? :
This vulnerability can lead to the system referencing stale memory after a transfer timeout, which may cause instability or unexpected behavior in the SPI communication on affected devices. It could result in failed data transfers or system errors related to the SPI interface, especially under high CPU load conditions.
What immediate steps should I take to mitigate this vulnerability?
Apply the patch or update to the fixed version of the Linux kernel that addresses the spi: tegra210-quad timeout handling issue. This fix clears the curr_xfer field upon timeout and ensures interrupts are cleared on failure to prevent stale memory references and allow new interrupts to run properly.