Spinlock Vulnerability in Xilinx GPIO Driver for Linux Kernel
CVE-2025-21684
Summary
The Xilinx GPIO Driver for the Linux kernel has a vulnerability where irq_chip functions can be incorrectly called in a raw spinlock context. This required the internal locking mechanism to also utilize a raw spinlock. The issue has led to problematic wait contexts that can result in system instability or unwanted behavior during interrupt handling. The fix ensures that the driver correctly handles lock acquisition and context management, enhancing the reliability and security of the GPIO interface.
Affected Version(s)
Linux a32c7caea292c4d1e417eae6e5a348d187546acf
Linux a32c7caea292c4d1e417eae6e5a348d187546acf < 9c035105c5537d2ecad6b9415e9417a1ffbd0a62
Linux a32c7caea292c4d1e417eae6e5a348d187546acf < 9860370c2172704b6b4f0075a0c2a29fd84af96a
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved