VYPR
Unrated severityNVD Advisory· Published Dec 22, 2025· Updated Apr 15, 2026

CVE-2025-68328

CVE-2025-68328

Description

In the Linux kernel, the following vulnerability has been resolved:

firmware: stratix10-svc: fix bug in saving controller data

Fix the incorrect usage of platform_set_drvdata and dev_set_drvdata. They both are of the same data and overrides each other. This resulted in the rmmod of the svc driver to fail and throw a kernel panic for kthread_stop and fifo free.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel's stratix10-svc driver, incorrect use of platform_set_drvdata and dev_set_drvdata causes a kernel panic on driver removal.

Vulnerability

Overview

In the Linux kernel's stratix10-svc firmware driver, a bug was introduced by incorrectly using both platform_set_drvdata and dev_set_drvdata to store the same controller data. Because these two functions operate on different device structures but were given the same pointer, one call overwrites the other, leading to a mismatch between the stored data and the actual driver state [1][2][3].

Exploitation

Conditions

The vulnerability is triggered when the stratix10-svc driver is unloaded via rmmod. The corrupted driver data causes the removal path to attempt stopping a kernel thread (kthread_stop) and freeing a FIFO that were never properly initialized or have already been freed, resulting in a kernel panic. No special privileges are required beyond the ability to load and unload the driver module, which typically requires root access.

Impact

A local attacker with the ability to unload the stratix10-svc driver can trigger a kernel panic, leading to a denial of service (system crash). The panic occurs during the driver's cleanup routine, making the system unavailable until reboot.

Mitigation

The fix has been applied to the Linux kernel stable tree in commits [1], [2], and [3], which correct the driver data storage by using only one of the two set functions. Users should update their kernel to a version containing these commits or apply the appropriate backport.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.