Linux Kernel Vulnerability in GPIO Management by Vendor
CVE-2025-21783

Currently unrated

Key Information:

Vendor
Linux
Status
Vendor
CVE Published:
27 February 2025

Summary

A flaw in the Linux kernel's GPIO subsystem enables a crash scenario when the gpiochip_get_ngpios() function is called without proper initialization of gpiodev. This situation arises in cases like bgpio_init() where the necessary components are not ready, resulting in a NULL pointer dereference when logging messages. The solution involves substituting the chip_() macros with dev_() macros to prevent potential crashes during runtime, enhancing the stability and security of the Linux kernel.

Affected Version(s)

Linux 55b2395e4e92adc492c6b30ac109eb78250dcd9d < 4d9b2b62e1136d10f661ec4c0c268140b6f74f4f

Linux 55b2395e4e92adc492c6b30ac109eb78250dcd9d

Linux 55b2395e4e92adc492c6b30ac109eb78250dcd9d < 189fb76215e479c10731baabb50f1a352d2078f5

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.