CVE-2025-37815 – “Microchip PCI1xxxx Linux Kernel IRQ Handler Registration Vulnerability”

The following table lists the changes that have been made to the
CVE-2025-37815 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by 416baaa9-dc9f-4396-8d5f-8c081fb06d67

    May. 08, 2025

    Action Type Old Value New Value
    Added Description In the Linux kernel, the following vulnerability has been resolved:

    misc: microchip: pci1xxxx: Fix Kernel panic during IRQ handler registration

    Resolve kernel panic while accessing IRQ handler associated with the
    generated IRQ. This is done by acquiring the spinlock and storing the
    current interrupt state before handling the interrupt request using
    generic_handle_irq.

    A previous fix patch was submitted where ‘generic_handle_irq’ was
    replaced with ‘handle_nested_irq’. However, this change also causes
    the kernel panic where after determining which GPIO triggered the
    interrupt and attempting to call handle_nested_irq with the mapped
    IRQ number, leads to a failure in locating the registered handler.

    Added Reference https://git.kernel.org/stable/c/1263d5f581908602c618c6665e683c4436383a09
    Added Reference https://git.kernel.org/stable/c/12cc2193f2b9548e8ea5fbce8201b44158222edf
    Added Reference https://git.kernel.org/stable/c/18eb77c75ed01439f96ae5c0f33461eb5134b907
    Added Reference https://git.kernel.org/stable/c/4e02059dc91068bc5017b8546f9ec3b930f6d6a6
    Added Reference https://git.kernel.org/stable/c/62957f58ab3aa7fa792dc6ff3575624062539a4d
Share the Post:

Related Posts