CVE-2025-38286

7.1 HIGH

📋 TL;DR

A Linux kernel vulnerability in the AT91 pinctrl driver allows out-of-bounds memory access when accessing GPIO chips. This could lead to kernel crashes or potential privilege escalation. Systems using AT91-based hardware with affected kernel versions are vulnerable.

💻 Affected Systems

Products:
  • Linux kernel with AT91 pinctrl driver
Versions: Specific kernel versions with the vulnerable commit; check stable kernel trees for exact ranges.
Operating Systems: Linux distributions using affected kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with AT91-based hardware (e.g., Microchip AT91SAM9, SAMA5).

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

Kernel panic leading to system crash, or potential privilege escalation to root if memory corruption enables arbitrary code execution.

🟠

Likely Case

System instability, kernel crashes, or denial of service on affected AT91-based systems.

🟢

If Mitigated

Minimal impact if systems are patched or don't use AT91 GPIO functionality.

🌐 Internet-Facing: LOW - Requires local access or specific hardware interaction.
🏢 Internal Only: MEDIUM - Could affect embedded systems, IoT devices, or servers with AT91 hardware.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and specific hardware interaction; not trivial to exploit remotely.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check stable kernel trees for specific patched versions (e.g., 5.10.x, 5.15.x, 6.1.x with fixes)

Vendor Advisory: https://git.kernel.org/stable/c/264a5cf0c422e65c94447a1ebebfac7c92690670

Restart Required: Yes

Instructions:

1. Update to a patched kernel version from your distribution. 2. Reboot the system to load the new kernel.

🔧 Temporary Workarounds

Disable AT91 GPIO if unused

linux

Remove or blacklist the at91-gpio module if not needed.

echo 'blacklist at91-gpio' >> /etc/modprobe.d/blacklist.conf
rmmod at91-gpio

🧯 If You Can't Patch

  • Restrict physical and local access to affected systems.
  • Monitor system logs for kernel panics or unusual GPIO-related errors.

🔍 How to Verify

Check if Vulnerable:

Check kernel version and if AT91 GPIO is loaded: 'uname -r' and 'lsmod | grep at91'.

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version is patched and system is stable after update.

📡 Detection & Monitoring

Log Indicators:

  • Kernel panic messages
  • GPIO or pinctrl-related errors in dmesg

Network Indicators:

  • None - local vulnerability

SIEM Query:

Search for 'kernel panic' or 'at91' in system logs.

🔗 References

📤 Share & Export