Bug 2365017 (CVE-2025-37815) - CVE-2025-37815 kernel: misc: microchip: pci1xxxx: Fix Kernel panic during IRQ handler registration
Summary: CVE-2025-37815 kernel: misc: microchip: pci1xxxx: Fix Kernel panic during IRQ...
Keywords:
Status: NEW
Alias: CVE-2025-37815
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-05-08 07:01 UTC by OSIDB Bzimport
Modified: 2025-05-08 11:49 UTC (History)
4 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-05-08 07:01:44 UTC
In the Linux kernel, the following vulnerability has been resolved:

misc: microchip: pci1xxxx: Fix Kernel panic during IRQ handler registration

Resolve kernel panic while accessing IRQ handler associated with the
generated IRQ. This is done by acquiring the spinlock and storing the
current interrupt state before handling the interrupt request using
generic_handle_irq.

A previous fix patch was submitted where 'generic_handle_irq' was
replaced with 'handle_nested_irq'. However, this change also causes
the kernel panic where after determining which GPIO triggered the
interrupt and attempting to call handle_nested_irq with the mapped
IRQ number, leads to a failure in locating the registered handler.

Comment 1 Avinash Hanwate 2025-05-08 11:46:27 UTC
Upstream advisory:
https://lore.kernel.org/linux-cve-announce/2025050818-CVE-2025-37815-7882@gregkh/T


Note You need to log in before you can comment on or make changes to this bug.