CVE-2025-37815

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-37815
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-37815.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-37815
Downstream
Related
Published
2025-05-08T06:26:11Z
Modified
2025-10-16T00:56:25.935631Z
Summary
misc: microchip: pci1xxxx: Fix Kernel panic during IRQ handler registration
Details

In the Linux kernel, the following vulnerability has been resolved:

misc: microchip: pci1xxxx: Fix Kernel panic during IRQ handler registration

Resolve kernel panic while accessing IRQ handler associated with the generated IRQ. This is done by acquiring the spinlock and storing the current interrupt state before handling the interrupt request using generichandleirq.

A previous fix patch was submitted where 'generichandleirq' was replaced with 'handlenestedirq'. However, this change also causes the kernel panic where after determining which GPIO triggered the interrupt and attempting to call handlenestedirq with the mapped IRQ number, leads to a failure in locating the registered handler.

References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
79aef6187e16b2d32307c8ff610e9e04f7f86e1f
Fixed
1263d5f581908602c618c6665e683c4436383a09
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
25692750c0259c5b65afec467d97201a485e8a00
Fixed
62957f58ab3aa7fa792dc6ff3575624062539a4d
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
47d3749ec0cb56b7b98917c190a8c10cb54216fd
Fixed
12cc2193f2b9548e8ea5fbce8201b44158222edf
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
194f9f94a5169547d682e9bbcc5ae6d18a564735
Fixed
4e02059dc91068bc5017b8546f9ec3b930f6d6a6
Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
194f9f94a5169547d682e9bbcc5ae6d18a564735
Fixed
18eb77c75ed01439f96ae5c0f33461eb5134b907

Affected versions

v6.*

v6.1.125
v6.1.126
v6.1.127
v6.1.128
v6.1.129
v6.1.130
v6.1.131
v6.1.132
v6.1.133
v6.1.134
v6.1.135
v6.12.10
v6.12.11
v6.12.12
v6.12.13
v6.12.14
v6.12.15
v6.12.16
v6.12.17
v6.12.18
v6.12.19
v6.12.20
v6.12.21
v6.12.22
v6.12.23
v6.12.24
v6.12.25
v6.13
v6.13-rc4
v6.13-rc5
v6.13-rc6
v6.13-rc7
v6.14
v6.14-rc1
v6.14-rc2
v6.14-rc3
v6.14-rc4
v6.14-rc5
v6.14-rc6
v6.14-rc7
v6.14.1
v6.14.2
v6.14.3
v6.14.4
v6.15-rc1
v6.6.72
v6.6.73
v6.6.74
v6.6.75
v6.6.76
v6.6.77
v6.6.78
v6.6.79
v6.6.80
v6.6.81
v6.6.82
v6.6.83
v6.6.84
v6.6.85
v6.6.86
v6.6.87
v6.6.88

Linux / Kernel

Package

Name
Kernel

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.1.136
Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.6.89
Type
ECOSYSTEM
Events
Introduced
6.7.0
Fixed
6.12.26
Type
ECOSYSTEM
Events
Introduced
6.13.0
Fixed
6.14.5