Executive Summary

Informations
Name CVE-2025-37815 First vendor Publication 2025-05-08
Vendor Cve Last vendor Modification 2025-05-08

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

In the Linux kernel, the following vulnerability has been resolved:

misc: microchip: pci1xxxx: Fix Kernel panic during IRQ handler registration

Resolve kernel panic while accessing IRQ handler associated with the generated IRQ. This is done by acquiring the spinlock and storing the current interrupt state before handling the interrupt request using generic_handle_irq.

A previous fix patch was submitted where 'generic_handle_irq' was replaced with 'handle_nested_irq'. However, this change also causes the kernel panic where after determining which GPIO triggered the interrupt and attempting to call handle_nested_irq with the mapped IRQ number, leads to a failure in locating the registered handler.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37815

Sources (Detail)

https://git.kernel.org/stable/c/1263d5f581908602c618c6665e683c4436383a09
https://git.kernel.org/stable/c/12cc2193f2b9548e8ea5fbce8201b44158222edf
https://git.kernel.org/stable/c/18eb77c75ed01439f96ae5c0f33461eb5134b907
https://git.kernel.org/stable/c/4e02059dc91068bc5017b8546f9ec3b930f6d6a6
https://git.kernel.org/stable/c/62957f58ab3aa7fa792dc6ff3575624062539a4d
Source Url

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2025-05-27 02:57:27
  • First insertion