CVE-2025-40222
BaseFortify
Publication date: 2025-12-04
Last updated on: 2025-12-04
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| renesas | rz_t2h | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's serial driver for Renesas RZ/T2H hardware. It involves incorrect handling of a register called overrun_reg for the RSCI port type. The code mistakenly treats overrun_reg as an index into an array when it is actually a memory offset, causing out-of-bounds memory access. This leads to invalid register access warnings and potential instability or crashes in the kernel when handling serial port receive errors.
How can this vulnerability impact me? :
The vulnerability can cause the Linux kernel to access memory outside of intended bounds, which may lead to kernel warnings, instability, or crashes. This can affect system reliability and potentially cause denial of service on affected devices using the RZ/T2H serial driver.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring system logs for warnings related to invalid register access in the sh-sci serial driver, specifically messages like 'WARNING: CPU: 0 PID: 0 at drivers/tty/serial/sh-sci.c:522 sci_serial_in'. You can check the kernel log using the command: dmesg | grep -i 'sci_serial_in' or dmesg | grep -i 'sh-sci'. Additionally, monitoring for WARN messages related to FIFO overrun handling in the serial driver may help detect the issue.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation involves updating the Linux kernel to a version where the vulnerability is fixed, as the issue is resolved by correcting the RSCI FIFO overrun handling in the sh-sci serial driver. Avoid using affected serial port types or disable the affected serial driver if possible until a patched kernel is applied. There are no configuration workarounds mentioned, so applying the official fix is the recommended step.