{"id":"CVE-2025-40005","summary":"spi: cadence-quadspi: Implement refcount to handle unbind during busy","details":"In the Linux kernel, the following vulnerability has been resolved:\n\nspi: cadence-quadspi: Implement refcount to handle unbind during busy\n\ndriver support indirect read and indirect write operation with\nassumption no force device removal(unbind) operation. However\nforce device removal(removal) is still available to root superuser.\n\nUnbinding driver during operation causes kernel crash. This changes\nensure driver able to handle such operation for indirect read and\nindirect write by implementing refcount to track attached devices\nto the controller and gracefully wait and until attached devices\nremove operation completed before proceed with removal operation.","modified":"2026-04-02T12:48:14.303074Z","published":"2025-10-20T15:26:52.315Z","related":["CGA-hm8r-9w5m-w23v","SUSE-SU-2025:21040-1","SUSE-SU-2025:21052-1","SUSE-SU-2025:21056-1","SUSE-SU-2025:21064-1","SUSE-SU-2025:21080-1","SUSE-SU-2025:21147-1","SUSE-SU-2025:21180-1","SUSE-SU-2025:4057-1","SUSE-SU-2025:4128-1","SUSE-SU-2025:4132-1","SUSE-SU-2025:4140-1","SUSE-SU-2025:4141-1","SUSE-SU-2025:4301-1","openSUSE-SU-2025:20091-1"],"database_specific":{"cna_assigner":"Linux","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40005.json"},"references":[{"type":"WEB","url":"https://git.kernel.org/stable/c/56787f4a75907ae99b5f5842b756fa68e2482f6d"},{"type":"WEB","url":"https://git.kernel.org/stable/c/65ed52200080eafce3eead05cf22ce01238defca"},{"type":"WEB","url":"https://git.kernel.org/stable/c/7446284023e8ef694fb392348185349c773eefb3"},{"type":"WEB","url":"https://git.kernel.org/stable/c/8df235f768cea7a5829cb02525622646eb0df5f5"},{"type":"WEB","url":"https://git.kernel.org/stable/c/b7ec8a2b094a33d0464958c2cbf75b8f229098b0"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/40xxx/CVE-2025-40005.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-40005"},{"type":"PACKAGE","url":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","events":[{"introduced":"a314f6367787ee1d767df9a2120f17e4511144d0"},{"fixed":"56787f4a75907ae99b5f5842b756fa68e2482f6d"},{"fixed":"8df235f768cea7a5829cb02525622646eb0df5f5"},{"fixed":"65ed52200080eafce3eead05cf22ce01238defca"},{"fixed":"b7ec8a2b094a33d0464958c2cbf75b8f229098b0"},{"fixed":"7446284023e8ef694fb392348185349c773eefb3"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-40005.json"}}],"schema_version":"1.7.5"}