VYPR
Unrated severityNVD Advisory· Published Dec 16, 2025· Updated Apr 15, 2026

CVE-2025-68311

CVE-2025-68311

Description

In the Linux kernel, the following vulnerability has been resolved:

tty: serial: ip22zilog: Use platform device for probing

After commit 84a9582fd203 ("serial: core: Start managing serial controllers to enable runtime PM") serial drivers need to provide a device in struct uart_port.dev otherwise an oops happens. To fix this issue for ip22zilog driver switch driver to a platform driver and setup the serial device in sgi-ip22 code.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The ip22zilog serial driver lacked a proper device in struct uart_port, causing an oops after commit 84a9582fd203; it is fixed by switching to a platform driver.

Vulnerability

A change in Linux kernel commit 84a9582fd203 ("serial: core: Start managing serial controllers to enable runtime PM") requires all serial drivers to provide a valid device pointer in struct uart_port.dev. The ip22zilog driver, used on SGI IP22 systems, did not fulfill this requirement, leading to a kernel NULL-pointer dereference (oops) when the serial core tried to access the device for runtime power management operations. [1]

Exploitation

The vulnerability is triggered during normal system operation on any SGI IP22 (Indy/Indigo2) machine using the ip22zilog serial ports. No special authentication or network access is needed—the oops occurs the moment the serial core interacts with the port, such as during boot or when a serial console or getty process opens the device. The bug is a driver-level oversight, not a remotely triggerable condition. [2]

Impact

An attacker with local access or the ability to influence serial port usage (e.g., via physical console) could deliberately trigger the oops, causing a denial of service (system crash). However, the more common impact is that any user or automated process using the serial ports will encounter an unexpected kernel panic, rendering the system unusable until a patched kernel is deployed. There is no evidence of privilege escalation or data corruption.

Mitigation

The fix introduces a platform driver for ip22zilog and sets up the serial device in the SGI IP22 platform code, ensuring that uart_port.dev is properly initialized. The patch is committed in the Linux kernel stable tree (commit 3fc36ae6abd2) and should be applied to any affected kernel version. Users are advised to update to a kernel containing this fix. No workaround is available beyond avoiding serial port use on unpatched systems.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.