CVE-2025-38277

Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
10/07/2025
Last modified:
18/12/2025

Description

In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mtd: nand: ecc-mxic: Fix use of uninitialized variable ret<br /> <br /> If ctx-&gt;steps is zero, the loop processing ECC steps is skipped,<br /> and the variable ret remains uninitialized. It is later checked<br /> and returned, which leads to undefined behavior and may cause<br /> unpredictable results in user space or kernel crashes.<br /> <br /> This scenario can be triggered in edge cases such as misconfigured<br /> geometry, ECC engine misuse, or if ctx-&gt;steps is not validated<br /> after initialization.<br /> <br /> Initialize ret to zero before the loop to ensure correct and safe<br /> behavior regardless of the ctx-&gt;steps value.<br /> <br /> Found by Linux Verification Center (linuxtesting.org) with SVACE.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 5.18 (including) 6.1.142 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.2 (including) 6.6.94 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.7 (including) 6.12.34 (excluding)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 6.13 (including) 6.15.3 (excluding)
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*