CVE-2025-68236

MEDIUM
中文标题:
(暂无数据)
英文标题:
scsi: ufs: ufs-qcom: Fix UFS OCP issue during UFS power down (PC=3)
CVSS分数: -1.0
发布时间: 2025-12-16 14:08:30
漏洞类型: (暂无数据)
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v2
漏洞描述
中文描述:

(暂无数据)

英文描述:

In the Linux kernel, the following vulnerability has been resolved: scsi: ufs: ufs-qcom: Fix UFS OCP issue during UFS power down (PC=3) According to UFS specifications, the power-off sequence for a UFS device includes: - Sending an SSU command with Power_Condition=3 and await a response. - Asserting RST_N low. - Turning off REF_CLK. - Turning off VCC. - Turning off VCCQ/VCCQ2. As part of ufs shutdown, after the SSU command completion, asserting hardware reset (HWRST) triggers the device firmware to wake up and execute its reset routine. This routine initializes hardware blocks and takes a few milliseconds to complete. During this time, the ICCQ draws a large current. This large ICCQ current may cause issues for the regulator which is supplying power to UFS, because the turn off request from UFS driver to the regulator framework will be immediately followed by low power mode(LPM) request by regulator framework. This is done by framework because UFS which is the only client is requesting for disable. So if the rail is still in the process of shutting down while ICCQ exceeds LPM current thresholds, and LPM mode is activated in hardware during this state, it may trigger an overcurrent protection (OCP) fault in the regulator. To prevent this, a 10ms delay is added after asserting HWRST. This allows the reset operation to complete while power rails remain active and in high-power mode. Currently there is no way for Host to query whether the reset is completed or not and hence this the delay is based on experiments with Qualcomm UFS controllers across multiple UFS vendors.

CWE类型:
(暂无数据)
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
Linux Linux 82783759e88beee69b710806e45acbb2fc589801 - - cpe:2.3:a:linux:linux:82783759e88beee69b710806e45acbb2fc589801:*:*:*:*:*:*:*
Linux Linux 5.12 - - cpe:2.3:a:linux:linux:5.12:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
CVSS评分详情
-1.0
LOW
CVSS向量: NOT_EXTRACTED
CVSS版本: NOT_EXTRACTED
机密性
N/A
完整性
N/A
可用性
N/A
时间信息
发布时间:
2025-12-16 14:08:30
修改时间:
2026-01-02 15:34:30
创建时间:
2026-01-12 02:12:29
更新时间:
2026-01-12 02:28:12
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2025-68236 2026-01-04 02:04:25 2026-01-12 02:12:29
NVD nvd_CVE-2025-68236 2025-12-19 03:25:38 2026-01-12 02:28:12
版本与语言
当前版本: v2
主要语言: EN
支持语言:
EN
安全公告
暂无安全公告信息
变更历史
v2 NVD
2026-01-12 02:28:12
data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • data_sources: ['cve'] -> ['cve', 'nvd']