CVE-2025-37901 (GCVE-0-2025-37901)
Vulnerability from cvelistv5
Published
2025-05-20 15:21
Modified
2025-05-26 05:23
Severity ?
Summary
In the Linux kernel, the following vulnerability has been resolved: irqchip/qcom-mpm: Prevent crash when trying to handle non-wake GPIOs On Qualcomm chipsets not all GPIOs are wakeup capable. Those GPIOs do not have a corresponding MPM pin and should not be handled inside the MPM driver. The IRQ domain hierarchy is always applied, so it's required to explicitly disconnect the hierarchy for those. The pinctrl-msm driver marks these with GPIO_NO_WAKE_IRQ. qcom-pdc has a check for this, but irq-qcom-mpm is currently missing the check. This is causing crashes when setting up interrupts for non-wake GPIOs: root@rb1:~# gpiomon -c gpiochip1 10 irq: IRQ159: trimming hierarchy from :soc@0:interrupt-controller@f200000-1 Unable to handle kernel paging request at virtual address ffff8000a1dc3820 Hardware name: Qualcomm Technologies, Inc. Robotics RB1 (DT) pc : mpm_set_type+0x80/0xcc lr : mpm_set_type+0x5c/0xcc Call trace: mpm_set_type+0x80/0xcc (P) qcom_mpm_set_type+0x64/0x158 irq_chip_set_type_parent+0x20/0x38 msm_gpio_irq_set_type+0x50/0x530 __irq_set_trigger+0x60/0x184 __setup_irq+0x304/0x6bc request_threaded_irq+0xc8/0x19c edge_detector_setup+0x260/0x364 linereq_create+0x420/0x5a8 gpio_ioctl+0x2d4/0x6c0 Fix this by copying the check for GPIO_NO_WAKE_IRQ from qcom-pdc.c, so that MPM is removed entirely from the hierarchy for non-wake GPIOs.
Impacted products
Vendor Product Version
Linux Linux Version: a6199bb514d8a63f61c2a22c1f912376e14d0fb2
Version: a6199bb514d8a63f61c2a22c1f912376e14d0fb2
Version: a6199bb514d8a63f61c2a22c1f912376e14d0fb2
Version: a6199bb514d8a63f61c2a22c1f912376e14d0fb2
Version: a6199bb514d8a63f61c2a22c1f912376e14d0fb2
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Linux",
          "programFiles": [
            "drivers/irqchip/irq-qcom-mpm.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "lessThan": "45aced97f01d5ab14c8a2a60f6748f18c501c3f5",
              "status": "affected",
              "version": "a6199bb514d8a63f61c2a22c1f912376e14d0fb2",
              "versionType": "git"
            },
            {
              "lessThan": "dfbaecf7e38f5e9bfa5e47a1e525ffbb58bab8cf",
              "status": "affected",
              "version": "a6199bb514d8a63f61c2a22c1f912376e14d0fb2",
              "versionType": "git"
            },
            {
              "lessThan": "f102342360950b56959e5fff4a874ea88ae13758",
              "status": "affected",
              "version": "a6199bb514d8a63f61c2a22c1f912376e14d0fb2",
              "versionType": "git"
            },
            {
              "lessThan": "d5c10448f411a925dd59005785cb971f0626e032",
              "status": "affected",
              "version": "a6199bb514d8a63f61c2a22c1f912376e14d0fb2",
              "versionType": "git"
            },
            {
              "lessThan": "38a05c0b87833f5b188ae43b428b1f792df2b384",
              "status": "affected",
              "version": "a6199bb514d8a63f61c2a22c1f912376e14d0fb2",
              "versionType": "git"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "Linux",
          "programFiles": [
            "drivers/irqchip/irq-qcom-mpm.c"
          ],
          "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
          "vendor": "Linux",
          "versions": [
            {
              "status": "affected",
              "version": "5.18"
            },
            {
              "lessThan": "5.18",
              "status": "unaffected",
              "version": "0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.1.*",
              "status": "unaffected",
              "version": "6.1.138",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.6.*",
              "status": "unaffected",
              "version": "6.6.90",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.12.*",
              "status": "unaffected",
              "version": "6.12.28",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "6.14.*",
              "status": "unaffected",
              "version": "6.14.6",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "*",
              "status": "unaffected",
              "version": "6.15",
              "versionType": "original_commit_for_fix"
            }
          ]
        }
      ],
      "cpeApplicability": [
        {
          "nodes": [
            {
              "cpeMatch": [
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.1.138",
                  "versionStartIncluding": "5.18",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.6.90",
                  "versionStartIncluding": "5.18",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.12.28",
                  "versionStartIncluding": "5.18",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.14.6",
                  "versionStartIncluding": "5.18",
                  "vulnerable": true
                },
                {
                  "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
                  "versionEndExcluding": "6.15",
                  "versionStartIncluding": "5.18",
                  "vulnerable": true
                }
              ],
              "negate": false,
              "operator": "OR"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nirqchip/qcom-mpm: Prevent crash when trying to handle non-wake GPIOs\n\nOn Qualcomm chipsets not all GPIOs are wakeup capable. Those GPIOs do not\nhave a corresponding MPM pin and should not be handled inside the MPM\ndriver. The IRQ domain hierarchy is always applied, so it\u0027s required to\nexplicitly disconnect the hierarchy for those. The pinctrl-msm driver marks\nthese with GPIO_NO_WAKE_IRQ. qcom-pdc has a check for this, but\nirq-qcom-mpm is currently missing the check. This is causing crashes when\nsetting up interrupts for non-wake GPIOs:\n\n root@rb1:~# gpiomon -c gpiochip1 10\n   irq: IRQ159: trimming hierarchy from :soc@0:interrupt-controller@f200000-1\n   Unable to handle kernel paging request at virtual address ffff8000a1dc3820\n   Hardware name: Qualcomm Technologies, Inc. Robotics RB1 (DT)\n   pc : mpm_set_type+0x80/0xcc\n   lr : mpm_set_type+0x5c/0xcc\n   Call trace:\n    mpm_set_type+0x80/0xcc (P)\n    qcom_mpm_set_type+0x64/0x158\n    irq_chip_set_type_parent+0x20/0x38\n    msm_gpio_irq_set_type+0x50/0x530\n    __irq_set_trigger+0x60/0x184\n    __setup_irq+0x304/0x6bc\n    request_threaded_irq+0xc8/0x19c\n    edge_detector_setup+0x260/0x364\n    linereq_create+0x420/0x5a8\n    gpio_ioctl+0x2d4/0x6c0\n\nFix this by copying the check for GPIO_NO_WAKE_IRQ from qcom-pdc.c, so that\nMPM is removed entirely from the hierarchy for non-wake GPIOs."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-05-26T05:23:21.116Z",
        "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
        "shortName": "Linux"
      },
      "references": [
        {
          "url": "https://git.kernel.org/stable/c/45aced97f01d5ab14c8a2a60f6748f18c501c3f5"
        },
        {
          "url": "https://git.kernel.org/stable/c/dfbaecf7e38f5e9bfa5e47a1e525ffbb58bab8cf"
        },
        {
          "url": "https://git.kernel.org/stable/c/f102342360950b56959e5fff4a874ea88ae13758"
        },
        {
          "url": "https://git.kernel.org/stable/c/d5c10448f411a925dd59005785cb971f0626e032"
        },
        {
          "url": "https://git.kernel.org/stable/c/38a05c0b87833f5b188ae43b428b1f792df2b384"
        }
      ],
      "title": "irqchip/qcom-mpm: Prevent crash when trying to handle non-wake GPIOs",
      "x_generator": {
        "engine": "bippy-1.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
    "assignerShortName": "Linux",
    "cveId": "CVE-2025-37901",
    "datePublished": "2025-05-20T15:21:36.062Z",
    "dateReserved": "2025-04-16T04:51:23.965Z",
    "dateUpdated": "2025-05-26T05:23:21.116Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-37901\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2025-05-20T16:15:26.453\",\"lastModified\":\"2025-05-21T20:25:16.407\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In the Linux kernel, the following vulnerability has been resolved:\\n\\nirqchip/qcom-mpm: Prevent crash when trying to handle non-wake GPIOs\\n\\nOn Qualcomm chipsets not all GPIOs are wakeup capable. Those GPIOs do not\\nhave a corresponding MPM pin and should not be handled inside the MPM\\ndriver. The IRQ domain hierarchy is always applied, so it\u0027s required to\\nexplicitly disconnect the hierarchy for those. The pinctrl-msm driver marks\\nthese with GPIO_NO_WAKE_IRQ. qcom-pdc has a check for this, but\\nirq-qcom-mpm is currently missing the check. This is causing crashes when\\nsetting up interrupts for non-wake GPIOs:\\n\\n root@rb1:~# gpiomon -c gpiochip1 10\\n   irq: IRQ159: trimming hierarchy from :soc@0:interrupt-controller@f200000-1\\n   Unable to handle kernel paging request at virtual address ffff8000a1dc3820\\n   Hardware name: Qualcomm Technologies, Inc. Robotics RB1 (DT)\\n   pc : mpm_set_type+0x80/0xcc\\n   lr : mpm_set_type+0x5c/0xcc\\n   Call trace:\\n    mpm_set_type+0x80/0xcc (P)\\n    qcom_mpm_set_type+0x64/0x158\\n    irq_chip_set_type_parent+0x20/0x38\\n    msm_gpio_irq_set_type+0x50/0x530\\n    __irq_set_trigger+0x60/0x184\\n    __setup_irq+0x304/0x6bc\\n    request_threaded_irq+0xc8/0x19c\\n    edge_detector_setup+0x260/0x364\\n    linereq_create+0x420/0x5a8\\n    gpio_ioctl+0x2d4/0x6c0\\n\\nFix this by copying the check for GPIO_NO_WAKE_IRQ from qcom-pdc.c, so that\\nMPM is removed entirely from the hierarchy for non-wake GPIOs.\"},{\"lang\":\"es\",\"value\":\"En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: irqchip/qcom-mpm: Evita un bloqueo al intentar gestionar GPIO sin activaci\u00f3n. En los chipsets Qualcomm, no todos los GPIO tienen capacidad de activaci\u00f3n. Estos GPIO no tienen un pin MPM correspondiente y no deben gestionarse dentro del controlador MPM. La jerarqu\u00eda del dominio IRQ siempre se aplica, por lo que es necesario desconectarla expl\u00edcitamente. El controlador pinctrl-msm los marca con GPIO_NO_WAKE_IRQ. qcom-pdc cuenta con una comprobaci\u00f3n para esto, pero irq-qcom-mpm actualmente no la tiene. Esto est\u00e1 causando fallos al configurar interrupciones para GPIO que no son de activaci\u00f3n: root@rb1:~# gpiomon -c gpiochip1 10 irq: IRQ159: recortar jerarqu\u00eda de :soc@0:interrupt-controller@f200000-1 No se puede manejar la solicitud de paginaci\u00f3n del n\u00facleo en la direcci\u00f3n virtual ffff8000a1dc3820 Nombre del hardware: Qualcomm Technologies, Inc. Robotics RB1 (DT) pc: mpm_set_type+0x80/0xcc lr: mpm_set_type+0x5c/0xcc Rastreo de llamadas: mpm_set_type+0x80/0xcc (P) qcom_mpm_set_type+0x64/0x158 irq_chip_set_type_parent+0x20/0x38 msm_gpio_irq_set_type+0x50/0x530 Solucione esto copiando la comprobaci\u00f3n de GPIO_NO_WAKE_IRQ desde qcom-pdc.c, de modo que MPM se elimine por completo de la jerarqu\u00eda para los GPIO que no son de activaci\u00f3n.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://git.kernel.org/stable/c/38a05c0b87833f5b188ae43b428b1f792df2b384\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/45aced97f01d5ab14c8a2a60f6748f18c501c3f5\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/d5c10448f411a925dd59005785cb971f0626e032\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/dfbaecf7e38f5e9bfa5e47a1e525ffbb58bab8cf\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"},{\"url\":\"https://git.kernel.org/stable/c/f102342360950b56959e5fff4a874ea88ae13758\",\"source\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…