CVE-2025-38277
MEDIUMLinux Kernel < 6.1.142 - Use of Uninitialized Resource
Title source: ruleDescription
In the Linux kernel, the following vulnerability has been resolved: mtd: nand: ecc-mxic: Fix use of uninitialized variable ret If ctx->steps is zero, the loop processing ECC steps is skipped, and the variable ret remains uninitialized. It is later checked and returned, which leads to undefined behavior and may cause unpredictable results in user space or kernel crashes. This scenario can be triggered in edge cases such as misconfigured geometry, ECC engine misuse, or if ctx->steps is not validated after initialization. Initialize ret to zero before the loop to ensure correct and safe behavior regardless of the ctx->steps value. Found by Linux Verification Center (linuxtesting.org) with SVACE.
References (6)
Scores
CVSS v3
5.5
EPSS
0.0003
EPSS Percentile
7.2%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Details
CWE
CWE-908
Status
published
Products (6)
debian/debian_linux
11.0
linux/Kernel
5.18.0 - 6.1.142linux
linux/Kernel
6.13.0 - 6.15.3linux
linux/Kernel
6.2.0 - 6.6.94linux
linux/Kernel
6.7.0 - 6.12.34linux
linux/linux_kernel
5.18 - 6.1.142
Published
Jul 10, 2025
Tracked Since
Feb 18, 2026