-

CVE-2025-39724

In the Linux kernel, the following vulnerability has been resolved:

serial: 8250: fix panic due to PSLVERR

When the PSLVERR_RESP_EN parameter is set to 1, the device generates
an error response if an attempt is made to read an empty RBR (Receive
Buffer Register) while the FIFO is enabled.

In serial8250_do_startup(), calling serial_port_out(port, UART_LCR,
UART_LCR_WLEN8) triggers dw8250_check_lcr(), which invokes
dw8250_force_idle() and serial8250_clear_and_reinit_fifos(). The latter
function enables the FIFO via serial_out(p, UART_FCR, p->fcr).
Execution proceeds to the serial_port_in(port, UART_RX).
This satisfies the PSLVERR trigger condition.

When another CPU (e.g., using printk()) is accessing the UART (UART
is busy), the current CPU fails the check (value & ~UART_LCR_SPAR) ==
(lcr & ~UART_LCR_SPAR) in dw8250_check_lcr(), causing it to enter
dw8250_force_idle().

Put serial_port_out(port, UART_LCR, UART_LCR_WLEN8) under the port->lock
to fix this issue.

Panic backtrace:
[    0.442336] Oops - unknown exception [#1]
[    0.442343] epc : dw8250_serial_in32+0x1e/0x4a
[    0.442351]  ra : serial8250_do_startup+0x2c8/0x88e
...
[    0.442416] console_on_rootfs+0x26/0x70

Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
Product Linux
Default Statusunaffected
Version < 0b882f00655afefbc7729c6b5aec86f7a5473a3d
Version c49436b657d0a56a6ad90d14a7c3041add7cf64d
Status affected
Version < b8ca8e3f75ede308b4d49a6ca5081460be01bdb5
Version c49436b657d0a56a6ad90d14a7c3041add7cf64d
Status affected
Version < 68c4613e89f000e8198f9ace643082c697921c9f
Version c49436b657d0a56a6ad90d14a7c3041add7cf64d
Status affected
Version < c826943abf473a3f7260fbadfad65e44db475460
Version c49436b657d0a56a6ad90d14a7c3041add7cf64d
Status affected
Version < cb7b3633ed749db8e56f475f43c960652cbd6882
Version c49436b657d0a56a6ad90d14a7c3041add7cf64d
Status affected
Version < 8e2739478c164147d0774802008528d9e03fb802
Version c49436b657d0a56a6ad90d14a7c3041add7cf64d
Status affected
Version < 38c0ea484dedb58cb3a4391229933e16be0d1031
Version c49436b657d0a56a6ad90d14a7c3041add7cf64d
Status affected
Version < 7f8fdd4dbffc05982b96caf586f77a014b2a9353
Version c49436b657d0a56a6ad90d14a7c3041add7cf64d
Status affected
Version 6d5e79331417886196cb3a733bdb6645ba85bc42
Status affected
Version 2401577586898b3590db80f8b97a26f81f0f6d4e
Status affected
VendorLinux
Product Linux
Default Statusaffected
Version 3.13
Status affected
Version < 3.13
Version 0
Status unaffected
Version <= 5.4.*
Version 5.4.297
Status unaffected
Version <= 5.10.*
Version 5.10.241
Status unaffected
Version <= 5.15.*
Version 5.15.190
Status unaffected
Version <= 6.1.*
Version 6.1.149
Status unaffected
Version <= 6.6.*
Version 6.6.103
Status unaffected
Version <= 6.12.*
Version 6.12.44
Status unaffected
Version <= 6.16.*
Version 6.16.4
Status unaffected
Version <= *
Version 6.17-rc1
Status unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.03% 0.088
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string