Fixed
Created: Aug 17, 2025
Updated: Aug 28, 2025
Resolved Date: Aug 28, 2025
Found In Version: 10.22.33.1
Severity: Standard
Applicable for: Wind River Linux LTS 22
Component/s: Kernel
In the Linux kernel, the following vulnerability has been resolved:EOL][EOL]pinctrl: qcom: msm: mark certain pins as invalid for interrupts[EOL][EOL]On some platforms, the UFS-reset pin has no interrupt logic in TLMM but[EOL]is nevertheless registered as a GPIO in the kernel. This enables the[EOL]user-space to trigger a BUG() in the pinctrl-msm driver by running, for[EOL]example: `gpiomon -c 0 113` on RB2.[EOL][EOL]The exact culprit is requesting pins whose intr_detection_width setting[EOL]is not 1 or 2 for interrupts. This hits a BUG() in[EOL]msm_gpio_irq_set_type(). Potentially crashing the kernel due to an[EOL]invalid request from user-space is not optimal, so let's go through the[EOL]pins and mark those that would fail the check as invalid for the irq chip[EOL]as we should not even register them as available irqs.[EOL][EOL]This function can be extended if we determine that there are more[EOL]corner-cases like this.
CREATE(Triage):(User=pbi-cn) [CVE-2025-38516 (https://nvd.nist.gov/vuln/detail/CVE-2025-38516)