{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-23140","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-01-11T14:28:41.512Z","datePublished":"2025-05-01T12:55:30.885Z","dateUpdated":"2026-05-11T21:13:43.458Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:13:43.458Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\nmisc: pci_endpoint_test: Avoid issue of interrupts remaining after request_irq error\n\nAfter devm_request_irq() fails with error in pci_endpoint_test_request_irq(),\nthe pci_endpoint_test_free_irq_vectors() is called assuming that all IRQs\nhave been released.\n\nHowever, some requested IRQs remain unreleased, so there are still\n/proc/irq/* entries remaining, and this results in WARN() with the\nfollowing message:\n\n  remove_proc_entry: removing non-empty directory 'irq/30', leaking at least 'pci-endpoint-test.0'\n  WARNING: CPU: 0 PID: 202 at fs/proc/generic.c:719 remove_proc_entry +0x190/0x19c\n\nTo solve this issue, set the number of remaining IRQs to test->num_irqs,\nand release IRQs in advance by calling pci_endpoint_test_release_irq().\n\n[kwilczynski: commit log]"}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/misc/pci_endpoint_test.c"],"versions":[{"version":"e03327122e2c8e6ae4565ef5b3d3cbe4364546a1","lessThan":"705be96504779e4a333ea042b4779ea941f0ace9","status":"affected","versionType":"git"},{"version":"e03327122e2c8e6ae4565ef5b3d3cbe4364546a1","lessThan":"e516e187bf32d8decc7c7d0025ae4857cad13c0e","status":"affected","versionType":"git"},{"version":"e03327122e2c8e6ae4565ef5b3d3cbe4364546a1","lessThan":"54c9f299ad7d7c4be5d271ed12d01a59e95b8907","status":"affected","versionType":"git"},{"version":"e03327122e2c8e6ae4565ef5b3d3cbe4364546a1","lessThan":"9d5118b107b1a2353ed0dff24404aee2e6b7ca0a","status":"affected","versionType":"git"},{"version":"e03327122e2c8e6ae4565ef5b3d3cbe4364546a1","lessThan":"5a4b7181213268c9b07bef8800905528435db44a","status":"affected","versionType":"git"},{"version":"e03327122e2c8e6ae4565ef5b3d3cbe4364546a1","lessThan":"0557e70e2aeba8647bf5a950820b67cfb86533db","status":"affected","versionType":"git"},{"version":"e03327122e2c8e6ae4565ef5b3d3cbe4364546a1","lessThan":"770407f6173f4f39f4e2c1b54422b79ce6c98bdb","status":"affected","versionType":"git"},{"version":"e03327122e2c8e6ae4565ef5b3d3cbe4364546a1","lessThan":"f6cb7828c8e17520d4f5afb416515d3fae1af9a9","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/misc/pci_endpoint_test.c"],"versions":[{"version":"4.19","status":"affected"},{"version":"0","lessThan":"4.19","status":"unaffected","versionType":"semver"},{"version":"5.4.293","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.237","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.181","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.135","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.88","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.25","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.14.3","lessThanOrEqual":"6.14.*","status":"unaffected","versionType":"semver"},{"version":"6.15","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19","versionEndExcluding":"5.4.293"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19","versionEndExcluding":"5.10.237"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19","versionEndExcluding":"5.15.181"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19","versionEndExcluding":"6.1.135"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19","versionEndExcluding":"6.6.88"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19","versionEndExcluding":"6.12.25"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19","versionEndExcluding":"6.14.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"4.19","versionEndExcluding":"6.15"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/705be96504779e4a333ea042b4779ea941f0ace9"},{"url":"https://git.kernel.org/stable/c/e516e187bf32d8decc7c7d0025ae4857cad13c0e"},{"url":"https://git.kernel.org/stable/c/54c9f299ad7d7c4be5d271ed12d01a59e95b8907"},{"url":"https://git.kernel.org/stable/c/9d5118b107b1a2353ed0dff24404aee2e6b7ca0a"},{"url":"https://git.kernel.org/stable/c/5a4b7181213268c9b07bef8800905528435db44a"},{"url":"https://git.kernel.org/stable/c/0557e70e2aeba8647bf5a950820b67cfb86533db"},{"url":"https://git.kernel.org/stable/c/770407f6173f4f39f4e2c1b54422b79ce6c98bdb"},{"url":"https://git.kernel.org/stable/c/f6cb7828c8e17520d4f5afb416515d3fae1af9a9"}],"title":"misc: pci_endpoint_test: Avoid issue of interrupts remaining after request_irq error","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00045.html"},{"url":"https://lists.debian.org/debian-lts-announce/2025/05/msg00030.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T19:42:25.618Z"}}]}}