{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-38286","assignerOrgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","state":"PUBLISHED","assignerShortName":"Linux","dateReserved":"2025-04-16T04:51:24.000Z","datePublished":"2025-07-10T07:42:03.409Z","dateUpdated":"2026-05-11T21:24:58.757Z"},"containers":{"cna":{"providerMetadata":{"orgId":"416baaa9-dc9f-4396-8d5f-8c081fb06d67","shortName":"Linux","dateUpdated":"2026-05-11T21:24:58.757Z"},"descriptions":[{"lang":"en","value":"In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: at91: Fix possible out-of-boundary access\n\nat91_gpio_probe() doesn't check that given OF alias is not available or\nsomething went wrong when trying to get it. This might have consequences\nwhen accessing gpio_chips array with that value as an index. Note, that\nBUG() can be compiled out and hence won't actually perform the required\nchecks."}],"affected":[{"product":"Linux","vendor":"Linux","defaultStatus":"unaffected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/pinctrl/pinctrl-at91.c"],"versions":[{"version":"6732ae5cb47c4f9a72727585956f2a5e069d1637","lessThan":"264a5cf0c422e65c94447a1ebebfac7c92690670","status":"affected","versionType":"git"},{"version":"6732ae5cb47c4f9a72727585956f2a5e069d1637","lessThan":"db5665cbfd766db7d8cd0e5fd6e3c0b412916774","status":"affected","versionType":"git"},{"version":"6732ae5cb47c4f9a72727585956f2a5e069d1637","lessThan":"2ecafe59668d2506a68459a9d169ebe41a147a41","status":"affected","versionType":"git"},{"version":"6732ae5cb47c4f9a72727585956f2a5e069d1637","lessThan":"f1c1fdc41fbf7e308ced9c86f3f66345a3f6f478","status":"affected","versionType":"git"},{"version":"6732ae5cb47c4f9a72727585956f2a5e069d1637","lessThan":"eb435bc4c74acbb286cec773deac13d117d3ef39","status":"affected","versionType":"git"},{"version":"6732ae5cb47c4f9a72727585956f2a5e069d1637","lessThan":"e02e12d6a7ab76c83849a4122785650dc7edef65","status":"affected","versionType":"git"},{"version":"6732ae5cb47c4f9a72727585956f2a5e069d1637","lessThan":"288c39286f759314ee8fb3a80a858179b4f306da","status":"affected","versionType":"git"},{"version":"6732ae5cb47c4f9a72727585956f2a5e069d1637","lessThan":"762ef7d1e6eefad9896560bfcb9bcf7f1b6df9c1","status":"affected","versionType":"git"}]},{"product":"Linux","vendor":"Linux","defaultStatus":"affected","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git","programFiles":["drivers/pinctrl/pinctrl-at91.c"],"versions":[{"version":"3.8","status":"affected"},{"version":"0","lessThan":"3.8","status":"unaffected","versionType":"semver"},{"version":"5.4.295","lessThanOrEqual":"5.4.*","status":"unaffected","versionType":"semver"},{"version":"5.10.239","lessThanOrEqual":"5.10.*","status":"unaffected","versionType":"semver"},{"version":"5.15.186","lessThanOrEqual":"5.15.*","status":"unaffected","versionType":"semver"},{"version":"6.1.142","lessThanOrEqual":"6.1.*","status":"unaffected","versionType":"semver"},{"version":"6.6.94","lessThanOrEqual":"6.6.*","status":"unaffected","versionType":"semver"},{"version":"6.12.34","lessThanOrEqual":"6.12.*","status":"unaffected","versionType":"semver"},{"version":"6.15.3","lessThanOrEqual":"6.15.*","status":"unaffected","versionType":"semver"},{"version":"6.16","lessThanOrEqual":"*","status":"unaffected","versionType":"original_commit_for_fix"}]}],"cpeApplicability":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.8","versionEndExcluding":"5.4.295"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.8","versionEndExcluding":"5.10.239"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.8","versionEndExcluding":"5.15.186"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.8","versionEndExcluding":"6.1.142"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.8","versionEndExcluding":"6.6.94"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.8","versionEndExcluding":"6.12.34"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.8","versionEndExcluding":"6.15.3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"3.8","versionEndExcluding":"6.16"}]}]}],"references":[{"url":"https://git.kernel.org/stable/c/264a5cf0c422e65c94447a1ebebfac7c92690670"},{"url":"https://git.kernel.org/stable/c/db5665cbfd766db7d8cd0e5fd6e3c0b412916774"},{"url":"https://git.kernel.org/stable/c/2ecafe59668d2506a68459a9d169ebe41a147a41"},{"url":"https://git.kernel.org/stable/c/f1c1fdc41fbf7e308ced9c86f3f66345a3f6f478"},{"url":"https://git.kernel.org/stable/c/eb435bc4c74acbb286cec773deac13d117d3ef39"},{"url":"https://git.kernel.org/stable/c/e02e12d6a7ab76c83849a4122785650dc7edef65"},{"url":"https://git.kernel.org/stable/c/288c39286f759314ee8fb3a80a858179b4f306da"},{"url":"https://git.kernel.org/stable/c/762ef7d1e6eefad9896560bfcb9bcf7f1b6df9c1"}],"title":"pinctrl: at91: Fix possible out-of-boundary access","x_generator":{"engine":"bippy-1.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html"},{"url":"https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T17:36:15.628Z"}}]}}