CVE-2026-23308
Warning Trace Caused by GPIO IRQ Handling in Linux Kernel Pinctrl
Publication date: 2026-03-25
Last updated on: 2026-03-25
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux_kernel | linux_kernel | 6.12.59 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-UNKNOWN |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is related to the Linux kernel's pinctrl equilibrium driver. The issue arises because the callback functions eqbr_irq_mask() and eqbr_irq_ack() are both called within another callback function eqbr_irq_mask_ack() to avoid duplicating code. However, eqbr_irq_mask() calls the gpiolib function gpiochip_disable_irq(), which disables interrupts.
This results in a warning trace being generated in the system log for every GPIO on load, indicating a potential problem with interrupt handling. The fix involves not calling eqbr_irq_mask() and eqbr_irq_ack() directly, but instead implementing the functionality without disabling interrupts.
How can this vulnerability impact me? :
The vulnerability causes warning traces in the system logs related to interrupt handling for GPIOs during system load. While it does not explicitly state a security breach or system crash, the warnings indicate improper interrupt management which could potentially lead to instability or unexpected behavior in the kernel's GPIO handling.
This may affect system reliability or debugging processes, as the warnings could mask other issues or cause confusion during system operation.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by checking the system logs for a specific warning trace related to gpiochip_disable_irq().
Look for log entries similar to the following warning trace in the kernel logs:
- [ 6.088111] ------------[ cut here ]------------
- [ 6.092440] WARNING: CPU: 3 PID: 1 at drivers/gpio/gpiolib.c:3810 gpiochip_disable_irq+0x39/0x50
You can use the following command to search for this warning in your system logs:
- dmesg | grep -i 'gpiochip_disable_irq'
- journalctl -k | grep -i 'gpiochip_disable_irq'
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to update the Linux kernel to a version where this issue is fixed.
The fix involves modifying the pinctrl equilibrium driver to avoid calling the eqbr_irq_mask() and eqbr_irq_ack() functions, which disable interrupts and cause the warning.
Until the update is applied, monitor the system logs for the warning trace and avoid using affected drivers if possible.