CVE-2025-68328
Description
In the Linux kernel, the following vulnerability has been resolved:
firmware: stratix10-svc: fix bug in saving controller data
Fix the incorrect usage of platform_set_drvdata and dev_set_drvdata. They both are of the same data and overrides each other. This resulted in the rmmod of the svc driver to fail and throw a kernel panic for kthread_stop and fifo free.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
In the Linux kernel's stratix10-svc driver, incorrect use of platform_set_drvdata and dev_set_drvdata causes a kernel panic on driver removal.
Vulnerability
Overview
In the Linux kernel's stratix10-svc firmware driver, a bug was introduced by incorrectly using both platform_set_drvdata and dev_set_drvdata to store the same controller data. Because these two functions operate on different device structures but were given the same pointer, one call overwrites the other, leading to a mismatch between the stored data and the actual driver state [1][2][3].
Exploitation
Conditions
The vulnerability is triggered when the stratix10-svc driver is unloaded via rmmod. The corrupted driver data causes the removal path to attempt stopping a kernel thread (kthread_stop) and freeing a FIFO that were never properly initialized or have already been freed, resulting in a kernel panic. No special privileges are required beyond the ability to load and unload the driver module, which typically requires root access.
Impact
A local attacker with the ability to unload the stratix10-svc driver can trigger a kernel panic, leading to a denial of service (system crash). The panic occurs during the driver's cleanup routine, making the system unavailable until reboot.
Mitigation
The fix has been applied to the Linux kernel stable tree in commits [1], [2], and [3], which correct the driver data storage by using only one of the two set functions. Users should update their kernel to a version containing these commits or apply the appropriate backport.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- git.kernel.org/stable/c/354fb03002da0970d337f0d3edbeb46cc4fa6f41nvd
- git.kernel.org/stable/c/60ab1851614e6007344042b66da6e31d1cc26cb3nvd
- git.kernel.org/stable/c/71796c91ee8e33faf4434a9e210b5063c28ea907nvd
- git.kernel.org/stable/c/9d0a330abd9e49bcebf6307aac185081bde49a43nvd
- git.kernel.org/stable/c/b359df793f609b1efce31dadfe6883ec73852619nvd
- git.kernel.org/stable/c/bd226fa02ed6db6fce0fae010802f0950fd14fb9nvd
- git.kernel.org/stable/c/d0fcf70c680e4d1669fcb3a8632f41400b9a73c2nvd
News mentions
0No linked articles in our index yet.