CVE-2025-68773
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-13

Last updated on: 2026-01-19

Assigner: kernel.org

Description
In the Linux kernel, the following vulnerability has been resolved: spi: fsl-cpm: Check length parity before switching to 16 bit mode Commit fc96ec826bce ("spi: fsl-cpm: Use 16 bit mode for large transfers with even size") failed to make sure that the size is really even before switching to 16 bit mode. Until recently the problem went unnoticed because kernfs uses a pre-allocated bounce buffer of size PAGE_SIZE for reading EEPROM. But commit 8ad6249c51d0 ("eeprom: at25: convert to spi-mem API") introduced an additional dynamically allocated bounce buffer whose size is exactly the size of the transfer, leading to a buffer overrun in the fsl-cpm driver when that size is odd. Add the missing length parity verification and remain in 8 bit mode when the length is not even.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-13
Last Modified
2026-01-19
Generated
2026-05-07
AI Q&A
2026-01-14
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
linux linux_kernel *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-UNKNOWN
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is in the Linux kernel's fsl-cpm SPI driver. It occurs because the driver switches to 16-bit mode for SPI transfers assuming the transfer size is even, but it does not verify that the size is actually even. A recent change introduced a dynamically allocated bounce buffer sized exactly to the transfer length, which can be odd. This leads to a buffer overrun when the size is odd because the driver incorrectly uses 16-bit mode without checking length parity. The fix adds a check to ensure the length is even before switching to 16-bit mode, otherwise it stays in 8-bit mode.


How can this vulnerability impact me? :

This vulnerability can cause a buffer overrun in the fsl-cpm SPI driver when handling SPI transfers of odd length sizes. Buffer overruns can lead to memory corruption, which may cause system instability, crashes, or potentially allow an attacker to execute arbitrary code or escalate privileges depending on the context in which the driver is used.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, update the Linux kernel to a version that includes the fix for the fsl-cpm SPI driver, which adds length parity verification before switching to 16 bit mode. This prevents buffer overruns caused by odd-sized transfers. Until the update is applied, avoid using SPI transfers with odd sizes on affected hardware.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart