CVE-2025-21645
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
19/01/2025
Last modified:
03/11/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
platform/x86/amd/pmc: Only disable IRQ1 wakeup where i8042 actually enabled it<br />
<br />
Wakeup for IRQ1 should be disabled only in cases where i8042 had<br />
actually enabled it, otherwise "wake_depth" for this IRQ will try to<br />
drop below zero and there will be an unpleasant WARN() logged:<br />
<br />
kernel: atkbd serio0: Disabling IRQ1 wakeup source to avoid platform firmware bug<br />
kernel: ------------[ cut here ]------------<br />
kernel: Unbalanced IRQ 1 wake disable<br />
kernel: WARNING: CPU: 10 PID: 6431 at kernel/irq/manage.c:920 irq_set_irq_wake+0x147/0x1a0<br />
<br />
The PMC driver uses DEFINE_SIMPLE_DEV_PM_OPS() to define its dev_pm_ops<br />
which sets amd_pmc_suspend_handler() to the .suspend, .freeze, and<br />
.poweroff handlers. i8042_pm_suspend(), however, is only set as<br />
the .suspend handler.<br />
<br />
Fix the issue by call PMC suspend handler only from the same set of<br />
dev_pm_ops handlers as i8042_pm_suspend(), which currently means just<br />
the .suspend handler.<br />
<br />
To reproduce this issue try hibernating (S4) the machine after a fresh boot<br />
without putting it into s2idle first.<br />
<br />
[ij: edited the commit message.]
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.15.95 (including) | 5.16 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.1.11 (including) | 6.1.140 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2.1 (including) | 6.6.72 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.10 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.2:-:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.2:rc6:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.2:rc7:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.2:rc8:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/5cc621085e2b7a9b1905a98f8e5a86bb4aea2016
- https://git.kernel.org/stable/c/ab47d72b736e78d3c2370b26e0bfc46eb0918391
- https://git.kernel.org/stable/c/b25778c87a6bce40c31e92364f08aa6240309e25
- https://git.kernel.org/stable/c/dd410d784402c5775f66faf8b624e85e41c38aaf
- https://lists.debian.org/debian-lts-announce/2025/08/msg00010.html



