Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-23161
PUBLISHED
More InfoOfficial Page
Assigner-Linux
Assigner Org ID-416baaa9-dc9f-4396-8d5f-8c081fb06d67
View Known Exploited Vulnerability (KEV) details
Published At-01 May, 2025 | 12:55
Updated At-02 Jan, 2026 | 15:28
Rejected At-
▼CVE Numbering Authority (CNA)
PCI: vmd: Make vmd_dev::cfg_lock a raw_spinlock_t type

In the Linux kernel, the following vulnerability has been resolved: PCI: vmd: Make vmd_dev::cfg_lock a raw_spinlock_t type The access to the PCI config space via pci_ops::read and pci_ops::write is a low-level hardware access. The functions can be accessed with disabled interrupts even on PREEMPT_RT. The pci_lock is a raw_spinlock_t for this purpose. A spinlock_t becomes a sleeping lock on PREEMPT_RT, so it cannot be acquired with disabled interrupts. The vmd_dev::cfg_lock is accessed in the same context as the pci_lock. Make vmd_dev::cfg_lock a raw_spinlock_t type so it can be used with interrupts disabled. This was reported as: BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48 Call Trace: rt_spin_lock+0x4e/0x130 vmd_pci_read+0x8d/0x100 [vmd] pci_user_read_config_byte+0x6f/0xe0 pci_read_config+0xfe/0x290 sysfs_kf_bin_read+0x68/0x90 [bigeasy: reword commit message] Tested-off-by: Luis Claudio R. Goncalves <lgoncalv@redhat.com> [kwilczynski: commit log] [bhelgaas: add back report info from https://lore.kernel.org/lkml/20241218115951.83062-1-ryotkkr98@gmail.com/]

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/pci/controller/vmd.c
Default Status
unaffected
Versions
Affected
  • From 185a383ada2e7794b0e82e040223e741b24d2bf8 before c250262d6485ca333e9821f85b07eb383ec546b1 (git)
  • From 185a383ada2e7794b0e82e040223e741b24d2bf8 before c2968c812339593ac6e2bdd5cc3adabe3f05fa53 (git)
  • From 185a383ada2e7794b0e82e040223e741b24d2bf8 before 13e5148f70e81991acbe0bab5b1b50ba699116e7 (git)
  • From 185a383ada2e7794b0e82e040223e741b24d2bf8 before 5c3cfcf0b4bf43530788b08a8eaf7896ec567484 (git)
  • From 185a383ada2e7794b0e82e040223e741b24d2bf8 before 2358046ead696ca5c7c628d6c0e2c6792619a3e5 (git)
  • From 185a383ada2e7794b0e82e040223e741b24d2bf8 before 20d0a9062c031068fa39f725a32f182b709b5525 (git)
  • From 185a383ada2e7794b0e82e040223e741b24d2bf8 before 18056a48669a040bef491e63b25896561ee14d90 (git)
Vendor
Linux Kernel Organization, IncLinux
Product
Linux
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Program Files
  • drivers/pci/controller/vmd.c
Default Status
affected
Versions
Affected
  • 4.5
Unaffected
  • From 0 before 4.5 (semver)
  • From 5.15.181 through 5.15.* (semver)
  • From 6.1.135 through 6.1.* (semver)
  • From 6.6.88 through 6.6.* (semver)
  • From 6.12.24 through 6.12.* (semver)
  • From 6.13.12 through 6.13.* (semver)
  • From 6.14.3 through 6.14.* (semver)
  • From 6.15 through * (original_commit_for_fix)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://git.kernel.org/stable/c/c250262d6485ca333e9821f85b07eb383ec546b1
N/A
https://git.kernel.org/stable/c/c2968c812339593ac6e2bdd5cc3adabe3f05fa53
N/A
https://git.kernel.org/stable/c/13e5148f70e81991acbe0bab5b1b50ba699116e7
N/A
https://git.kernel.org/stable/c/5c3cfcf0b4bf43530788b08a8eaf7896ec567484
N/A
https://git.kernel.org/stable/c/2358046ead696ca5c7c628d6c0e2c6792619a3e5
N/A
https://git.kernel.org/stable/c/20d0a9062c031068fa39f725a32f182b709b5525
N/A
https://git.kernel.org/stable/c/18056a48669a040bef491e63b25896561ee14d90
N/A
Hyperlink: https://git.kernel.org/stable/c/c250262d6485ca333e9821f85b07eb383ec546b1
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/c2968c812339593ac6e2bdd5cc3adabe3f05fa53
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/13e5148f70e81991acbe0bab5b1b50ba699116e7
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/5c3cfcf0b4bf43530788b08a8eaf7896ec567484
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/2358046ead696ca5c7c628d6c0e2c6792619a3e5
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/20d0a9062c031068fa39f725a32f182b709b5525
Resource: N/A
Hyperlink: https://git.kernel.org/stable/c/18056a48669a040bef491e63b25896561ee14d90
Resource: N/A
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html
N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html
Resource: N/A
Details not found