CVE-2025-23161

Source
https://cve.org/CVERecord?id=CVE-2025-23161
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-23161.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-23161
Downstream
Related
Published
2025-05-01T12:55:46.021Z
Modified
2026-03-11T07:48:33.193455Z
Summary
PCI: vmd: Make vmd_dev::cfg_lock a raw_spinlock_t type
Details

In the Linux kernel, the following vulnerability has been resolved:

PCI: vmd: Make vmddev::cfglock a rawspinlockt type

The access to the PCI config space via pciops::read and pciops::write is a low-level hardware access. The functions can be accessed with disabled interrupts even on PREEMPTRT. The pcilock is a rawspinlockt for this purpose.

A spinlockt becomes a sleeping lock on PREEMPTRT, so it cannot be acquired with disabled interrupts. The vmddev::cfglock is accessed in the same context as the pci_lock.

Make vmddev::cfglock a rawspinlockt type so it can be used with interrupts disabled.

This was reported as:

BUG: sleeping function called from invalid context at kernel/locking/spinlockrt.c:48 Call Trace: rtspinlock+0x4e/0x130 vmdpciread+0x8d/0x100 [vmd] pciuserreadconfigbyte+0x6f/0xe0 pcireadconfig+0xfe/0x290 sysfskfbinread+0x68/0x90

[bigeasy: reword commit message] Tested-off-by: Luis Claudio R. Goncalves lgoncalv@redhat.com [kwilczynski: commit log] [bhelgaas: add back report info from https://lore.kernel.org/lkml/20241218115951.83062-1-ryotkkr98@gmail.com/]

Database specific
{
    "cna_assigner": "Linux",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/23xxx/CVE-2025-23161.json"
}
References

Affected packages

Git / git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git

Affected ranges

Type
GIT
Repo
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git
Events
Introduced
185a383ada2e7794b0e82e040223e741b24d2bf8
Fixed
c250262d6485ca333e9821f85b07eb383ec546b1
Fixed
c2968c812339593ac6e2bdd5cc3adabe3f05fa53
Fixed
13e5148f70e81991acbe0bab5b1b50ba699116e7
Fixed
5c3cfcf0b4bf43530788b08a8eaf7896ec567484
Fixed
2358046ead696ca5c7c628d6c0e2c6792619a3e5
Fixed
20d0a9062c031068fa39f725a32f182b709b5525
Fixed
18056a48669a040bef491e63b25896561ee14d90

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-23161.json"