CVE-2025-68773
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
13/01/2026
Last modified:
19/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
spi: fsl-cpm: Check length parity before switching to 16 bit mode<br />
<br />
Commit fc96ec826bce ("spi: fsl-cpm: Use 16 bit mode for large transfers<br />
with even size") failed to make sure that the size is really even<br />
before switching to 16 bit mode. Until recently the problem went<br />
unnoticed because kernfs uses a pre-allocated bounce buffer of size<br />
PAGE_SIZE for reading EEPROM.<br />
<br />
But commit 8ad6249c51d0 ("eeprom: at25: convert to spi-mem API")<br />
introduced an additional dynamically allocated bounce buffer whose size<br />
is exactly the size of the transfer, leading to a buffer overrun in<br />
the fsl-cpm driver when that size is odd.<br />
<br />
Add the missing length parity verification and remain in 8 bit mode<br />
when the length is not even.
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1417927df8049a0194933861e9b098669a95c762
- https://git.kernel.org/stable/c/3dd6d01384823e1bd8602873153d6fc4337ac4fe
- https://git.kernel.org/stable/c/743cebcbd1b2609ec5057ab474979cef73d1b681
- https://git.kernel.org/stable/c/837a23a11e0f734f096c7c7b0778d0e625e3dc87
- https://git.kernel.org/stable/c/9c34a4a2ead00979d203a8c16bea87f0ef5291d8
- https://git.kernel.org/stable/c/be0b613198e6bfa104ad520397cab82ad3ec1771
- https://git.kernel.org/stable/c/c8f1d35076b78df61ace737e41cc1f4b7b63236c



