Home

Description

In the Linux kernel, the following vulnerability has been resolved: mailbox: zynqmp-ipi: Fix SGI cleanup on unbind The driver incorrectly determines SGI vs SPI interrupts by checking IRQ number < 16, which fails with dynamic IRQ allocation. During unbind, this causes improper SGI cleanup leading to kernel crash. Add explicit irq_type field to pdata for reliable identification of SGI interrupts (type-2) and only clean up SGI resources when appropriate.

PUBLISHED Reserved 2025-04-16 | Published 2025-11-12 | Updated 2025-12-01 | Assigner Linux

Product status

Default status
unaffected

6ffb1635341bec50fa9540ae7827d1e5d75ae0b0 (git) before 1ee147efee68be00203b1fee6479911debb1edb2
affected

6ffb1635341bec50fa9540ae7827d1e5d75ae0b0 (git) before 32bf7c6e01f5ba17a53ba236a770bd0274cefdf4
affected

6ffb1635341bec50fa9540ae7827d1e5d75ae0b0 (git) before bb160e791ab15b89188a7a19589b8e11f681bef3
affected

Default status
affected

6.10
affected

Any version before 6.10
unaffected

6.12.54 (semver)
unaffected

6.17.4 (semver)
unaffected

6.18 (original_commit_for_fix)
unaffected

References

git.kernel.org/...c/1ee147efee68be00203b1fee6479911debb1edb2

git.kernel.org/...c/32bf7c6e01f5ba17a53ba236a770bd0274cefdf4

git.kernel.org/...c/bb160e791ab15b89188a7a19589b8e11f681bef3

cve.org (CVE-2025-40161)

nvd.nist.gov (CVE-2025-40161)

Download JSON