CVE-2025-68222
BaseFortify
Publication date: 2025-12-16
Last updated on: 2025-12-18
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| nxp | s32g3 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is in the Linux kernel's pinctrl driver for the NXP S32G3 platform. The issue arises because the s32_pinctrl_desc structure is allocated with devm_kmalloc() but not all its fields are initialized. Specifically, the num_custom_params field is uninitialized and later used in pinconf_generic_parse_dt_config(), which can cause intermittent allocation errors and parsing failures when probing certain devices like i2c-imx. This leads to errors and failures in dependent drivers due to uninitialized memory usage. The fix involves changing the allocation to devm_kzalloc(), which zero-initializes the structure, preventing these errors.
How can this vulnerability impact me? :
This vulnerability can cause intermittent allocation errors and parsing failures in the Linux kernel's pinctrl driver on affected hardware. As a result, dependent drivers, such as those for I2C adapters, may fail to initialize or operate correctly, leading to hardware communication issues or device malfunctions on systems using the affected NXP S32G3 platform.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking the system logs for specific error messages related to pinctrl and i2c-imx probing failures. Look for warnings such as 'WARNING: CPU: 0 PID: ... at mm/page_alloc.c' and messages indicating parse failures like 's32g-siul2-pinctrl ... could not parse node property' and 'failed writing register: -6'. You can use commands like 'dmesg | grep pinctrl' or 'journalctl -k | grep pinctrl' to find these messages in the kernel logs.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation is to update the Linux kernel to a version where the s32_pinctrl_desc structure is properly initialized using devm_kzalloc() instead of devm_kmalloc() in the s32_pinctrl_probe() function. This ensures that uninitialized fields are zeroed out, preventing the allocation errors and parse failures. Until an update is applied, monitoring for the error messages and avoiding affected hardware configurations may help reduce impact.