In the Linux kernel, the following vulnerability has been resolved:
pinctrl: qcom: msm: mark certain pins as invalid for interrupts
On some platforms, the UFS-reset pin has no interrupt logic in TLMM but
is nevertheless registered as a GPIO in the kernel. This enables the
user-space to trigger a BUG() in the pinctrl-msm driver by running, for
example: `gpiomon -c 0 113` on RB2.
The exact culprit is requesting pins whose intr_detection_width setting
is not 1 or 2 for interrupts. This hits a BUG() in
msm_gpio_irq_set_type(). Potentially crashing the kernel due to an
invalid request from user-space is not optimal, so let's go through the
pins and mark those that would fail the check as invalid for the irq chip
as we should not even register them as available irqs.
This function can be extended if we determine that there are more
corner-cases like this.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
07 Jan 2026, 17:45
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-476 | |
| CPE | cpe:2.3:o:linux:linux_kernel:6.16:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc1:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.16:rc4:*:*:*:*:*:* |
|
| First Time |
Linux
Debian Debian debian Linux Linux linux Kernel |
|
| References | () https://git.kernel.org/stable/c/1d57f7132662e96aace3b8a000616efde289aae1 - Patch | |
| References | () https://git.kernel.org/stable/c/275605a8b48002fe98675a5c06f3e39c09067ff2 - Patch | |
| References | () https://git.kernel.org/stable/c/3f8fc02c2582c1dfad1785e9c7bc8b4e1521af0a - Patch | |
| References | () https://git.kernel.org/stable/c/6a89563ccf9cd0d745e2291302878a061508573f - Patch | |
| References | () https://git.kernel.org/stable/c/93712205ce2f1fb047739494c0399a26ea4f0890 - Patch | |
| References | () https://git.kernel.org/stable/c/97c9c7daeeb00c6e1d5e84084041f79c2d2dce22 - Patch | |
| References | () https://git.kernel.org/stable/c/cb4b08a095b1fa4b3fca782757517e4e9a917d8e - Patch | |
| References | () https://git.kernel.org/stable/c/cc145e02d6b8494c48f91958d52fa76b7e577f7b - Patch | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory, Mailing List | |
| References | () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
03 Nov 2025, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
18 Aug 2025, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
16 Aug 2025, 11:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-08-16 11:15
Updated : 2026-01-07 17:45
NVD link : CVE-2025-38516
Mitre link : CVE-2025-38516
CVE.ORG link : CVE-2025-38516
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-476
NULL Pointer Dereference
