CVE-2025-37815 (GCVE-0-2025-37815)
Vulnerability from cvelistv5
Published
2025-05-08 06:26
Modified
2025-05-26 05:21
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: misc: microchip: pci1xxxx: Fix Kernel panic during IRQ handler registration Resolve kernel panic while accessing IRQ handler associated with the generated IRQ. This is done by acquiring the spinlock and storing the current interrupt state before handling the interrupt request using generic_handle_irq. A previous fix patch was submitted where 'generic_handle_irq' was replaced with 'handle_nested_irq'. However, this change also causes the kernel panic where after determining which GPIO triggered the interrupt and attempting to call handle_nested_irq with the mapped IRQ number, leads to a failure in locating the registered handler.
Impacted products
Vendor Product Version
Linux Linux Version: 79aef6187e16b2d32307c8ff610e9e04f7f86e1f
Version: 25692750c0259c5b65afec467d97201a485e8a00
Version: 47d3749ec0cb56b7b98917c190a8c10cb54216fd
Version: 194f9f94a5169547d682e9bbcc5ae6d18a564735
Version: 194f9f94a5169547d682e9bbcc5ae6d18a564735
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/misc/mchp_pci1xxxx/mchp_pci1xxxx_gpio.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "1263d5f581908602c618c6665e683c4436383a09",
              "status": "affected",
              "version": "79aef6187e16b2d32307c8ff610e9e04f7f86e1f",
              "versionType": "git"
            },
            {
              "lessThan": "62957f58ab3aa7fa792dc6ff3575624062539a4d",
              "status": "affected",
              "version": "25692750c0259c5b65afec467d97201a485e8a00",
              "versionType": "git"
            },
            {
              "lessThan": "12cc2193f2b9548e8ea5fbce8201b44158222edf",
              "status": "affected",
              "version": "47d3749ec0cb56b7b98917c190a8c10cb54216fd",
              "versionType": "git"
            },
            {
              "lessThan": "4e02059dc91068bc5017b8546f9ec3b930f6d6a6",
              "status": "affected",
              "version": "194f9f94a5169547d682e9bbcc5ae6d18a564735",
              "versionType": "git"
            },
            {
              "lessThan": "18eb77c75ed01439f96ae5c0f33461eb5134b907",
              "status": "affected",
              "version": "194f9f94a5169547d682e9bbcc5ae6d18a564735",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/misc/mchp_pci1xxxx/mchp_pci1xxxx_gpio.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "6.13"
            },
            {
              "lessThan": "6.13",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.136",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.89",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.26",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.14.*",
              "status": "unaffected",
              "version": "6.14.5",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.15",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.136",
                  "versionStartIncluding": "6.1.125",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.89",
                  "versionStartIncluding": "6.6.72",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.26",
                  "versionStartIncluding": "6.12.10",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.14.5",
                  "versionStartIncluding": "6.13",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.15",
                  "versionStartIncluding": "6.13",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: microchip: pci1xxxx: Fix Kernel panic during IRQ handler registration\n\nResolve kernel panic while accessing IRQ handler associated with the\ngenerated IRQ. This is done by acquiring the spinlock and storing the\ncurrent interrupt state before handling the interrupt request using\ngeneric_handle_irq.\n\nA previous fix patch was submitted where \u0027generic_handle_irq\u0027 was\nreplaced with \u0027handle_nested_irq\u0027. However, this change also causes\nthe kernel panic where after determining which GPIO triggered the\ninterrupt and attempting to call handle_nested_irq with the mapped\nIRQ number, leads to a failure in locating the registered handler."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-26T05:21:27.757Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/1263d5f581908602c618c6665e683c4436383a09"
        },
        {
          "url": "https://git.kernel.org/stable/c/62957f58ab3aa7fa792dc6ff3575624062539a4d"
        },
        {
          "url": "https://git.kernel.org/stable/c/12cc2193f2b9548e8ea5fbce8201b44158222edf"
        },
        {
          "url": "https://git.kernel.org/stable/c/4e02059dc91068bc5017b8546f9ec3b930f6d6a6"
        },
        {
          "url": "https://git.kernel.org/stable/c/18eb77c75ed01439f96ae5c0f33461eb5134b907"
        }
      ],
      "title": "misc: microchip: pci1xxxx: Fix Kernel panic during IRQ handler registration",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2025-37815",
    "datePublished": "2025-05-08T06:26:11.402Z",
    "dateReserved": "2025-04-16T04:51:23.946Z",
    "dateUpdated": "2025-05-26T05:21:27.757Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-37815\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-05-08T07:15:52.730\",\"lastModified\":\"2025-05-08T14:39:09.683\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nmisc: microchip: pci1xxxx: Fix Kernel panic during IRQ handler registration\\n\\nResolve kernel panic while accessing IRQ handler associated with the\\ngenerated IRQ. This is done by acquiring the spinlock and storing the\\ncurrent interrupt state before handling the interrupt request using\\ngeneric_handle_irq.\\n\\nA previous fix patch was submitted where \u0027generic_handle_irq\u0027 was\\nreplaced with \u0027handle_nested_irq\u0027. However, this change also causes\\nthe kernel panic where after determining which GPIO triggered the\\ninterrupt and attempting to call handle_nested_irq with the mapped\\nIRQ number, leads to a failure in locating the registered handler.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: misc: microchip: pci1xxxx: Se corrige el p\u00e1nico del kernel durante el registro del controlador de IRQ. Se resuelve el p\u00e1nico del kernel al acceder al controlador de IRQ asociado con la IRQ generada. Esto se logra adquiriendo el bloqueo de giro y almacenando el estado actual de la interrupci\u00f3n antes de procesar la solicitud de interrupci\u00f3n mediante generic_handle_irq. Se envi\u00f3 un parche de correcci\u00f3n anterior donde \u0027generic_handle_irq\u0027 se reemplaz\u00f3 por \u0027handle_nested_irq\u0027. Sin embargo, este cambio tambi\u00e9n causa el p\u00e1nico del kernel, que, tras determinar qu\u00e9 GPIO activ\u00f3 la interrupci\u00f3n e intentar llamar a handle_nested_irq con el n\u00famero de IRQ asignado, provoca un error al localizar el controlador registrado.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/1263d5f581908602c618c6665e683c4436383a09\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/12cc2193f2b9548e8ea5fbce8201b44158222edf\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/18eb77c75ed01439f96ae5c0f33461eb5134b907\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/4e02059dc91068bc5017b8546f9ec3b930f6d6a6\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/62957f58ab3aa7fa792dc6ff3575624062539a4d\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…