Home

Description

In the Linux kernel, the following vulnerability has been resolved: tty: serial: ip22zilog: Use platform device for probing After commit 84a9582fd203 ("serial: core: Start managing serial controllers to enable runtime PM") serial drivers need to provide a device in struct uart_port.dev otherwise an oops happens. To fix this issue for ip22zilog driver switch driver to a platform driver and setup the serial device in sgi-ip22 code.

PUBLISHED Reserved 2025-12-16 | Published 2025-12-16 | Updated 2025-12-16 | Assigner Linux

Product status

Default status
unaffected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 460e0dc9af2d7790d5194c6743d79f9b77b58836
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 77a196ca904d66c8372aa8fbfc1c4ae3a66dee2e
affected

1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 (git) before 3fc36ae6abd263a5cbf93b2f5539eccc1fc753f7
affected

Default status
affected

6.12.58 (semver)
unaffected

6.17.8 (semver)
unaffected

6.18 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/460e0dc9af2d7790d5194c6743d79f9b77b58836

git.kernel.org/...c/77a196ca904d66c8372aa8fbfc1c4ae3a66dee2e

git.kernel.org/...c/3fc36ae6abd263a5cbf93b2f5539eccc1fc753f7

cve.org (CVE-2025-68311)

nvd.nist.gov (CVE-2025-68311)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.