CVE-2025-38624

EUVD-2025-25577
In the Linux kernel, the following vulnerability has been resolved:

PCI: pnv_php: Clean up allocated IRQs on unplug

When the root of a nested PCIe bridge configuration is unplugged, the
pnv_php driver leaked the allocated IRQ resources for the child bridges'
hotplug event notifications, resulting in a panic.

Fix this by walking all child buses and deallocating all its IRQ resources
before calling pci_hp_remove_devices().

Also modify the lifetime of the workqueue at struct pnv_php_slot::wq so
that it is only destroyed in pnv_php_free_slot(), instead of
pnv_php_disable_irq(). This is required since pnv_php_disable_irq() will
now be called by workers triggered by hot unplug interrupts, so the
workqueue needs to stay allocated.

The abridged kernel panic that occurs without this patch is as follows:

  WARNING: CPU: 0 PID: 687 at kernel/irq/msi.c:292 msi_device_data_release+0x6c/0x9c
  CPU: 0 UID: 0 PID: 687 Comm: bash Not tainted 6.14.0-rc5+ #2
  Call Trace:
   msi_device_data_release+0x34/0x9c (unreliable)
   release_nodes+0x64/0x13c
   devres_release_all+0xc0/0x140
   device_del+0x2d4/0x46c
   pci_destroy_dev+0x5c/0x194
   pci_hp_remove_devices+0x90/0x128
   pci_hp_remove_devices+0x44/0x128
   pnv_php_disable_slot+0x54/0xd4
   power_write_file+0xf8/0x18c
   pci_slot_attr_store+0x40/0x5c
   sysfs_kf_write+0x64/0x78
   kernfs_fop_write_iter+0x1b0/0x290
   vfs_write+0x3bc/0x50c
   ksys_write+0x84/0x140
   system_call_exception+0x124/0x230
   system_call_vectored_common+0x15c/0x2ec

[bhelgaas: tidy comments]
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
5.5 MEDIUM
LOCAL
LOW
LOW
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 7%
Affected Products (NVD)
VendorProductVersion
linuxlinux_kernel
4.9 ≤
𝑥
< 5.10.241
linuxlinux_kernel
5.11 ≤
𝑥
< 5.15.190
linuxlinux_kernel
5.16 ≤
𝑥
< 6.1.148
linuxlinux_kernel
6.2 ≤
𝑥
< 6.6.102
linuxlinux_kernel
6.7 ≤
𝑥
< 6.12.42
linuxlinux_kernel
6.13 ≤
𝑥
< 6.15.10
linuxlinux_kernel
6.16 ≤
𝑥
< 6.16.1
debiandebian_linux
11.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
linux
bookworm
6.1.170-3
fixed
bookworm (security)
6.1.172-1
fixed
bullseye
ignored
bullseye (security)
vulnerable
forky
7.0.7-1
fixed
sid
7.0.7-1
fixed
trixie
6.12.86-1
fixed
trixie (security)
6.12.88-1
fixed
linux-6.1
bullseye (security)
6.1.172-1~deb11u1
fixed
openSUSE logo
openSUSE / SLES Releases
openSUSE Product
Release
cluster-md-kmp-default
suse enterprise server 12 SP5
4.12.14-122.275.1
fixed
dlm-kmp-default
suse enterprise server 12 SP5
4.12.14-122.275.1
fixed
gfs2-kmp-default
suse enterprise server 12 SP5
4.12.14-122.275.1
fixed
kernel-64kb
suse enterprise desktop 15 SP6
6.4.0-150600.23.70.1
fixed
suse enterprise desktop 15 SP7
6.4.0-150700.53.16.1
fixed
suse enterprise sap 15 SP6
6.4.0-150600.23.70.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.16.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.70.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.16.1
fixed
kernel-azure
suse enterprise sap 15 SP6
6.4.0-150600.8.52.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.20.15.2
fixed
suse enterprise server 15 SP6
6.4.0-150600.8.52.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.20.15.2
fixed
kernel-default
suse enterprise desktop 15 SP6
6.4.0-150600.23.70.1
fixed
suse enterprise desktop 15 SP7
6.4.0-150700.53.16.1
fixed
suse enterprise sap 15 SP6
6.4.0-150600.23.70.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.16.1
fixed
suse enterprise server 12 SP5
4.12.14-122.275.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.70.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.16.1
fixed
kernel-default-base
suse enterprise desktop 15 SP6
6.4.0-150600.23.70.1.150600.12.30.2
fixed
suse enterprise desktop 15 SP7
6.4.0-150700.53.16.1.150700.17.11.2
fixed
suse enterprise sap 15 SP6
6.4.0-150600.23.70.1.150600.12.30.2
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.16.1.150700.17.11.2
fixed
suse enterprise server 12 SP5
4.12.14-122.275.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.70.1.150600.12.30.2
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.16.1.150700.17.11.2
fixed
kernel-default-extra
suse enterprise desktop 15 SP6
6.4.0-150600.23.70.1
fixed
suse enterprise desktop 15 SP7
6.4.0-150700.53.16.1
fixed
suse enterprise sap 15 SP6
6.4.0-150600.23.70.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.16.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.70.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.16.1
fixed
suse enterprise workstation 15 SP6
6.4.0-150600.23.70.1
fixed
suse enterprise workstation 15 SP7
6.4.0-150700.53.16.1
fixed
kernel-default-man
suse enterprise server 12 SP5
4.12.14-122.275.1
fixed
kernel-docs
suse enterprise desktop 15 SP6
6.4.0-150600.23.70.1
fixed
suse enterprise desktop 15 SP7
6.4.0-150700.53.16.1
fixed
suse enterprise sap 15 SP6
6.4.0-150600.23.70.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.16.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.70.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.16.1
fixed
kernel-macros
suse enterprise desktop 15 SP6
6.4.0-150600.23.70.1
fixed
suse enterprise desktop 15 SP7
6.4.0-150700.53.16.1
fixed
suse enterprise sap 15 SP6
6.4.0-150600.23.70.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.16.1
fixed
suse enterprise server 12 SP5
4.12.14-122.275.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.70.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.16.1
fixed
kernel-obs-build
suse enterprise desktop 15 SP6
6.4.0-150600.23.70.1
fixed
suse enterprise desktop 15 SP7
6.4.0-150700.53.16.1
fixed
suse enterprise sap 15 SP6
6.4.0-150600.23.70.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.16.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.70.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.16.1
fixed
kernel-source
suse enterprise desktop 15 SP6
6.4.0-150600.23.70.1
fixed
suse enterprise desktop 15 SP7
6.4.0-150700.53.16.1
fixed
suse enterprise sap 15 SP6
6.4.0-150600.23.70.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.16.1
fixed
suse enterprise server 12 SP5
4.12.14-122.275.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.70.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.16.1
fixed
kernel-source-azure
suse enterprise sap 15 SP6
6.4.0-150600.8.52.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.20.15.2
fixed
suse enterprise server 15 SP6
6.4.0-150600.8.52.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.20.15.2
fixed
kernel-syms
suse enterprise desktop 15 SP6
6.4.0-150600.23.70.1
fixed
suse enterprise desktop 15 SP7
6.4.0-150700.53.16.1
fixed
suse enterprise sap 15 SP6
6.4.0-150600.23.70.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.16.1
fixed
suse enterprise server 12 SP5
4.12.14-122.275.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.70.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.16.1
fixed
kernel-syms-azure
suse enterprise sap 15 SP6
6.4.0-150600.8.52.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.20.15.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.8.52.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.20.15.1
fixed
kernel-zfcpdump
suse enterprise desktop 15 SP6
6.4.0-150600.23.70.1
fixed
suse enterprise desktop 15 SP7
6.4.0-150700.53.16.1
fixed
suse enterprise sap 15 SP6
6.4.0-150600.23.70.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.16.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.70.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.16.1
fixed
ocfs2-kmp-default
suse enterprise server 12 SP5
4.12.14-122.275.1
fixed
reiserfs-kmp-default
suse enterprise sap 15 SP6
6.4.0-150600.23.70.1
fixed
suse enterprise sap 15 SP7
6.4.0-150700.53.16.1
fixed
suse enterprise server 15 SP6
6.4.0-150600.23.70.1
fixed
suse enterprise server 15 SP7
6.4.0-150700.53.16.1
fixed