CVE-2025-39724

In the Linux kernel, the following vulnerability has been resolved: serial: 8250: fix panic due to PSLVERR When the PSLVERR_RESP_EN parameter is set to 1, the device generates an error response if an attempt is made to read an empty RBR (Receive Buffer Register) while the FIFO is enabled. In serial8250_do_startup(), calling serial_port_out(port, UART_LCR, UART_LCR_WLEN8) triggers dw8250_check_lcr(), which invokes dw8250_force_idle() and serial8250_clear_and_reinit_fifos(). The latter function enables the FIFO via serial_out(p, UART_FCR, p->fcr). Execution proceeds to the serial_port_in(port, UART_RX). This satisfies the PSLVERR trigger condition. When another CPU (e.g., using printk()) is accessing the UART (UART is busy), the current CPU fails the check (value & ~UART_LCR_SPAR) == (lcr & ~UART_LCR_SPAR) in dw8250_check_lcr(), causing it to enter dw8250_force_idle(). Put serial_port_out(port, UART_LCR, UART_LCR_WLEN8) under the port->lock to fix this issue. Panic backtrace: [ 0.442336] Oops - unknown exception [#1] [ 0.442343] epc : dw8250_serial_in32+0x1e/0x4a [ 0.442351] ra : serial8250_do_startup+0x2c8/0x88e ... [ 0.442416] console_on_rootfs+0x26/0x70
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

12 Jan 2026, 15:53

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/0b882f00655afefbc7729c6b5aec86f7a5473a3d - () https://git.kernel.org/stable/c/0b882f00655afefbc7729c6b5aec86f7a5473a3d - Patch
References () https://git.kernel.org/stable/c/38c0ea484dedb58cb3a4391229933e16be0d1031 - () https://git.kernel.org/stable/c/38c0ea484dedb58cb3a4391229933e16be0d1031 - Patch
References () https://git.kernel.org/stable/c/68c4613e89f000e8198f9ace643082c697921c9f - () https://git.kernel.org/stable/c/68c4613e89f000e8198f9ace643082c697921c9f - Patch
References () https://git.kernel.org/stable/c/7f8fdd4dbffc05982b96caf586f77a014b2a9353 - () https://git.kernel.org/stable/c/7f8fdd4dbffc05982b96caf586f77a014b2a9353 - Patch
References () https://git.kernel.org/stable/c/8e2739478c164147d0774802008528d9e03fb802 - () https://git.kernel.org/stable/c/8e2739478c164147d0774802008528d9e03fb802 - Patch
References () https://git.kernel.org/stable/c/b8ca8e3f75ede308b4d49a6ca5081460be01bdb5 - () https://git.kernel.org/stable/c/b8ca8e3f75ede308b4d49a6ca5081460be01bdb5 - Patch
References () https://git.kernel.org/stable/c/c826943abf473a3f7260fbadfad65e44db475460 - () https://git.kernel.org/stable/c/c826943abf473a3f7260fbadfad65e44db475460 - Patch
References () https://git.kernel.org/stable/c/cb7b3633ed749db8e56f475f43c960652cbd6882 - () https://git.kernel.org/stable/c/cb7b3633ed749db8e56f475f43c960652cbd6882 - Patch
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html - Third Party Advisory, Mailing List
References () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html - Third Party Advisory, Mailing List
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
First Time Linux
Debian
Debian debian Linux
Linux linux Kernel

03 Nov 2025, 18:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html -
  • () https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html -

05 Sep 2025, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-05 18:15

Updated : 2026-01-12 15:53


NVD link : CVE-2025-39724

Mitre link : CVE-2025-39724

CVE.ORG link : CVE-2025-39724


JSON object : View

Products Affected

debian

  • debian_linux

linux

  • linux_kernel