CVE-2025-38516
Severity CVSS v4.0:
Pending analysis
Type:
CWE-476
NULL Pointer Dereference
Publication date:
16/08/2025
Last modified:
07/01/2026
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
pinctrl: qcom: msm: mark certain pins as invalid for interrupts<br />
<br />
On some platforms, the UFS-reset pin has no interrupt logic in TLMM but<br />
is nevertheless registered as a GPIO in the kernel. This enables the<br />
user-space to trigger a BUG() in the pinctrl-msm driver by running, for<br />
example: `gpiomon -c 0 113` on RB2.<br />
<br />
The exact culprit is requesting pins whose intr_detection_width setting<br />
is not 1 or 2 for interrupts. This hits a BUG() in<br />
msm_gpio_irq_set_type(). Potentially crashing the kernel due to an<br />
invalid request from user-space is not optimal, so let&#39;s go through the<br />
pins and mark those that would fail the check as invalid for the irq chip<br />
as we should not even register them as available irqs.<br />
<br />
This function can be extended if we determine that there are more<br />
corner-cases like this.
Impact
Base Score 3.x
5.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 3.14 (including) | 5.4.296 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.5 (including) | 5.10.240 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (including) | 5.15.189 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (including) | 6.1.146 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.2 (including) | 6.6.99 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.7 (including) | 6.12.39 (excluding) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.13 (including) | 6.15.7 (excluding) |
| cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:* | ||
| cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:* | ||
| cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1d57f7132662e96aace3b8a000616efde289aae1
- https://git.kernel.org/stable/c/275605a8b48002fe98675a5c06f3e39c09067ff2
- https://git.kernel.org/stable/c/3f8fc02c2582c1dfad1785e9c7bc8b4e1521af0a
- https://git.kernel.org/stable/c/6a89563ccf9cd0d745e2291302878a061508573f
- https://git.kernel.org/stable/c/93712205ce2f1fb047739494c0399a26ea4f0890
- https://git.kernel.org/stable/c/97c9c7daeeb00c6e1d5e84084041f79c2d2dce22
- https://git.kernel.org/stable/c/cb4b08a095b1fa4b3fca782757517e4e9a917d8e
- https://git.kernel.org/stable/c/cc145e02d6b8494c48f91958d52fa76b7e577f7b
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html



