Spinlock Vulnerability in Xilinx GPIO Driver for Linux Kernel
CVE-2025-21684

5.5MEDIUM

Key Information:

Vendor
Linux
Status
Vendor
CVE Published:
9 February 2025

Summary

The Xilinx GPIO Driver for the Linux kernel has a vulnerability where irq_chip functions can be incorrectly called in a raw spinlock context. This required the internal locking mechanism to also utilize a raw spinlock. The issue has led to problematic wait contexts that can result in system instability or unwanted behavior during interrupt handling. The fix ensures that the driver correctly handles lock acquisition and context management, enhancing the reliability and security of the GPIO interface.

Affected Version(s)

Linux a32c7caea292c4d1e417eae6e5a348d187546acf

Linux a32c7caea292c4d1e417eae6e5a348d187546acf < 9c035105c5537d2ecad6b9415e9417a1ffbd0a62

Linux a32c7caea292c4d1e417eae6e5a348d187546acf < 9860370c2172704b6b4f0075a0c2a29fd84af96a

References

CVSS V3.1

Score:
5.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.