CVE-2025-38262

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
09/07/2025
Last modified:
17/07/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> tty: serial: uartlite: register uart driver in init<br /> <br /> When two instances of uart devices are probing, a concurrency race can<br /> occur. If one thread calls uart_register_driver function, which first<br /> allocates and assigns memory to &amp;#39;uart_state&amp;#39; member of uart_driver<br /> structure, the other instance can bypass uart driver registration and<br /> call ulite_assign. This calls uart_add_one_port, which expects the uart<br /> driver to be fully initialized. This leads to a kernel panic due to a<br /> null pointer dereference:<br /> <br /> [ 8.143581] BUG: kernel NULL pointer dereference, address: 00000000000002b8<br /> [ 8.156982] #PF: supervisor write access in kernel mode<br /> [ 8.156984] #PF: error_code(0x0002) - not-present page<br /> [ 8.156986] PGD 0 P4D 0<br /> ...<br /> [ 8.180668] RIP: 0010:mutex_lock+0x19/0x30<br /> [ 8.188624] Call Trace:<br /> [ 8.188629] ? __die_body.cold+0x1a/0x1f<br /> [ 8.195260] ? page_fault_oops+0x15c/0x290<br /> [ 8.209183] ? __irq_resolve_mapping+0x47/0x80<br /> [ 8.209187] ? exc_page_fault+0x64/0x140<br /> [ 8.209190] ? asm_exc_page_fault+0x22/0x30<br /> [ 8.209196] ? mutex_lock+0x19/0x30<br /> [ 8.223116] uart_add_one_port+0x60/0x440<br /> [ 8.223122] ? proc_tty_register_driver+0x43/0x50<br /> [ 8.223126] ? tty_register_driver+0x1ca/0x1e0<br /> [ 8.246250] ulite_probe+0x357/0x4b0 [uartlite]<br /> <br /> To prevent it, move uart driver registration in to init function. This<br /> will ensure that uart_driver is always registered when probe function<br /> is called.

Impact