In the Linux kernel, the following vulnerability has been resolved:
pinctrl: at91: Fix possible out-of-boundary access
at91_gpio_probe() doesn't check that given OF alias is not available or
something went wrong when trying to get it. This might have consequences
when accessing gpio_chips array with that value as an index. Note, that
BUG() can be compiled out and hence won't actually perform the required
checks.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
18 Dec 2025, 16:44
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-125 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.1 |
| CPE | cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
|
| References | () https://git.kernel.org/stable/c/264a5cf0c422e65c94447a1ebebfac7c92690670 - Patch | |
| References | () https://git.kernel.org/stable/c/288c39286f759314ee8fb3a80a858179b4f306da - Patch | |
| References | () https://git.kernel.org/stable/c/2ecafe59668d2506a68459a9d169ebe41a147a41 - Patch | |
| References | () https://git.kernel.org/stable/c/762ef7d1e6eefad9896560bfcb9bcf7f1b6df9c1 - Patch | |
| References | () https://git.kernel.org/stable/c/db5665cbfd766db7d8cd0e5fd6e3c0b412916774 - Patch | |
| References | () https://git.kernel.org/stable/c/e02e12d6a7ab76c83849a4122785650dc7edef65 - Patch | |
| References | () https://git.kernel.org/stable/c/eb435bc4c74acbb286cec773deac13d117d3ef39 - Patch | |
| References | () https://git.kernel.org/stable/c/f1c1fdc41fbf7e308ced9c86f3f66345a3f6f478 - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory, Mailing List | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List | |
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
10 Jul 2025, 13:17
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
10 Jul 2025, 08:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-10 08:15
Updated : 2025-12-18 16:44
NVD link : CVE-2025-38286
Mitre link : CVE-2025-38286
CVE.ORG link : CVE-2025-38286
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read
