CVE-2025-68238
Description
In the Linux kernel, the following vulnerability has been resolved:
mtd: rawnand: cadence: fix DMA device NULL pointer dereference
The DMA device pointer dma_dev was being dereferenced before ensuring that cdns_ctrl->dmac is properly initialized.
Move the assignment of dma_dev after successfully acquiring the DMA channel to ensure the pointer is valid before use.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A NULL pointer dereference in the Linux kernel's Cadence NAND driver occurs when the DMA device pointer is used before DMA channel initialization.
Root
Cause In the Cadence raw NAND controller driver (drivers/mtd/nand/raw/cadence-nand-controller.c), the DMA device pointer dma_dev was being dereferenced before verifying that the DMA channel (cdns_ctrl->dmac) had been successfully acquired. This ordering flaw leads to a NULL pointer dereference when the DMA channel acquisition fails or is not yet complete.
Exploitation
An attacker would need local access to the system and the ability to trigger the NAND controller initialization path, typically through mounting a filesystem on a NAND device or performing NAND operations. No special privileges are required beyond the ability to interact with the MTD subsystem. The vulnerability manifests during the probe or DMA setup phase.
Impact
A successful exploit results in a kernel NULL pointer dereference, causing a system crash (denial of service). In some configurations, this could potentially be leveraged for privilege escalation if the attacker can control the dereferenced pointer, though the primary impact is system instability.
Mitigation
The fix moves the assignment of dma_dev to after the DMA channel is successfully acquired, ensuring the pointer is valid before use. This patch has been backported to stable kernel trees as commits [1][2][3]. Users should update to the latest stable kernel version containing the fix.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- git.kernel.org/stable/c/0c2a43cb43786011b48eeab6093db14888258c6bnvd
- git.kernel.org/stable/c/0c635241a62f2f5da1b48bfffae226d1f86a76efnvd
- git.kernel.org/stable/c/2178b0255eae108bb10e5e99658b28641bc06f43nvd
- git.kernel.org/stable/c/5c56bf214af85ca042bf97f8584aab2151035840nvd
- git.kernel.org/stable/c/9c58c64ec41290c12490ca7e1df45013fbbb41fdnvd
- git.kernel.org/stable/c/b146e0b085d9d6bfe838e0a15481cba7d093c67fnvd
- git.kernel.org/stable/c/e282a4fdf3c6ee842a720010a8b5f7d77bedd126nvd
News mentions
0No linked articles in our index yet.