CVE-2025-68167
Description
In the Linux kernel, the following vulnerability has been resolved:
gpiolib: fix invalid pointer access in debugfs
If the memory allocation in gpiolib_seq_start() fails, the s->private field remains uninitialized and is later dereferenced without checking in gpiolib_seq_stop(). Initialize s->private to NULL before calling kzalloc() and check it before dereferencing it.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Linux kernel gpiolib debugfs has invalid pointer dereference on memory allocation failure, causing a crash.
Root
Cause In the Linux kernel's gpiolib debugfs interface, the gpiolib_seq_start() function allocates memory for the private data using kzalloc(). If this allocation fails, the s->private field is left uninitialized. The subsequent gpiolib_seq_stop() function dereferences s->private without checking for NULL, leading to an invalid pointer access and potential kernel crash [1].
Exploitation
An attacker would need to trigger the debugfs read sequence on the gpiolib debugfs file, typically requiring local access to the system. The failure of the memory allocation could be induced by exhausting system memory, a condition that may be achievable from user space by consuming memory resources. No authentication is required beyond the ability to read debugfs files, which often requires root privileges or specific capabilities.
Impact
A successful exploitation results in a kernel NULL pointer dereference, leading to a system crash (denial of service). There is no indication of privilege escalation or information disclosure. The vulnerability is considered medium severity.
Mitigation
The fix initializes s->private to NULL before the allocation and adds a NULL check before dereferencing it in gpiolib_seq_stop(). The patch has been applied to the Linux kernel stable tree as commit 3c91c8f424d3e44c8645ab765a38773e58afb07d [1]. Users should update to a kernel version including this fix.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.