-
CVE-2025-39724
- EPSS 0.03%
- Published 05.09.2025 17:21:32
- Last modified 08.09.2025 16:25:38
- Source 416baaa9-dc9f-4396-8d5f-8c081f
- Teams watchlist Login
- Open Login
In the Linux kernel, the following vulnerability has been resolved: serial: 8250: fix panic due to PSLVERR When the PSLVERR_RESP_EN parameter is set to 1, the device generates an error response if an attempt is made to read an empty RBR (Receive Buffer Register) while the FIFO is enabled. In serial8250_do_startup(), calling serial_port_out(port, UART_LCR, UART_LCR_WLEN8) triggers dw8250_check_lcr(), which invokes dw8250_force_idle() and serial8250_clear_and_reinit_fifos(). The latter function enables the FIFO via serial_out(p, UART_FCR, p->fcr). Execution proceeds to the serial_port_in(port, UART_RX). This satisfies the PSLVERR trigger condition. When another CPU (e.g., using printk()) is accessing the UART (UART is busy), the current CPU fails the check (value & ~UART_LCR_SPAR) == (lcr & ~UART_LCR_SPAR) in dw8250_check_lcr(), causing it to enter dw8250_force_idle(). Put serial_port_out(port, UART_LCR, UART_LCR_WLEN8) under the port->lock to fix this issue. Panic backtrace: [ 0.442336] Oops - unknown exception [#1] [ 0.442343] epc : dw8250_serial_in32+0x1e/0x4a [ 0.442351] ra : serial8250_do_startup+0x2c8/0x88e ... [ 0.442416] console_on_rootfs+0x26/0x70
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorLinux
≫
Product
Linux
Default Statusunaffected
Version <
0b882f00655afefbc7729c6b5aec86f7a5473a3d
Version
c49436b657d0a56a6ad90d14a7c3041add7cf64d
Status
affected
Version <
b8ca8e3f75ede308b4d49a6ca5081460be01bdb5
Version
c49436b657d0a56a6ad90d14a7c3041add7cf64d
Status
affected
Version <
68c4613e89f000e8198f9ace643082c697921c9f
Version
c49436b657d0a56a6ad90d14a7c3041add7cf64d
Status
affected
Version <
c826943abf473a3f7260fbadfad65e44db475460
Version
c49436b657d0a56a6ad90d14a7c3041add7cf64d
Status
affected
Version <
cb7b3633ed749db8e56f475f43c960652cbd6882
Version
c49436b657d0a56a6ad90d14a7c3041add7cf64d
Status
affected
Version <
8e2739478c164147d0774802008528d9e03fb802
Version
c49436b657d0a56a6ad90d14a7c3041add7cf64d
Status
affected
Version <
38c0ea484dedb58cb3a4391229933e16be0d1031
Version
c49436b657d0a56a6ad90d14a7c3041add7cf64d
Status
affected
Version <
7f8fdd4dbffc05982b96caf586f77a014b2a9353
Version
c49436b657d0a56a6ad90d14a7c3041add7cf64d
Status
affected
Version
6d5e79331417886196cb3a733bdb6645ba85bc42
Status
affected
Version
2401577586898b3590db80f8b97a26f81f0f6d4e
Status
affected
VendorLinux
≫
Product
Linux
Default Statusaffected
Version
3.13
Status
affected
Version <
3.13
Version
0
Status
unaffected
Version <=
5.4.*
Version
5.4.297
Status
unaffected
Version <=
5.10.*
Version
5.10.241
Status
unaffected
Version <=
5.15.*
Version
5.15.190
Status
unaffected
Version <=
6.1.*
Version
6.1.149
Status
unaffected
Version <=
6.6.*
Version
6.6.103
Status
unaffected
Version <=
6.12.*
Version
6.12.44
Status
unaffected
Version <=
6.16.*
Version
6.16.4
Status
unaffected
Version <=
*
Version
6.17-rc1
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.088 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|