Linux Kernel Vulnerability in GPIO Management by Vendor
CVE-2025-21783
Summary
A flaw in the Linux kernel's GPIO subsystem enables a crash scenario when the gpiochip_get_ngpios() function is called without proper initialization of gpiodev. This situation arises in cases like bgpio_init() where the necessary components are not ready, resulting in a NULL pointer dereference when logging messages. The solution involves substituting the chip_() macros with dev_() macros to prevent potential crashes during runtime, enhancing the stability and security of the Linux kernel.
Affected Version(s)
Linux 55b2395e4e92adc492c6b30ac109eb78250dcd9d < 4d9b2b62e1136d10f661ec4c0c268140b6f74f4f
Linux 55b2395e4e92adc492c6b30ac109eb78250dcd9d
Linux 55b2395e4e92adc492c6b30ac109eb78250dcd9d < 189fb76215e479c10731baabb50f1a352d2078f5
References
Timeline
Vulnerability published
Vulnerability Reserved