In the Linux kernel, the following vulnerability has been resolved:
serial/pmac_zilog: Remove flawed mitigation for rx irq flood
The mitigation was intended to stop the irq completely. That may be
better than a hard lock-up but it turns out that you get a crash anyway
if you're using pmac_zilog as a serial console:
ttyPZ0: pmz: rx irq flood !
BUG: spinlock recursion on CPU#0, swapper/0
That's because the pr_err() call in pmz_receive_chars() results in
pmz_console_write() attempting to lock a spinlock already locked in
pmz_interrupt(). With CONFIG_DEBUG_SPINLOCK=y, this produces a fatal
BUG splat. The spinlock in question is the one in struct uart_port.
Even when it's not fatal, the serial port rx function ceases to work.
Also, the iteration limit doesn't play nicely with QEMU, as can be
seen in the bug report linked below.
A web search for other reports of the error message "pmz: rx irq flood"
didn't produce anything. So I don't think this code is needed any more.
Remove it.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
03 Mar 2025, 17:47
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:6.9:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:6.9:rc3:*:*:*:*:*:* |
|
References |
|
|
References | () https://git.kernel.org/stable/c/52aaf1ff14622a04148dbb9ccce6d9de5d534ea7 - Patch, Mailing List | |
References | () https://git.kernel.org/stable/c/7a3bbe41efa55323b6ea3c35fa15941d4dbecdef - Patch, Mailing List | |
References | () https://git.kernel.org/stable/c/69a02273e288011b521ee7c1f3ab2c23fda633ce - Patch, Mailing List | |
References | () https://git.kernel.org/stable/c/ca09dfc3cfdf89e6af3ac24e1c6c0be5c575a729 - Patch, Mailing List | |
References | () https://git.kernel.org/stable/c/1be3226445362bfbf461c92a5bcdb1723f2e4907 - Patch, Mailing List | |
References | () https://git.kernel.org/stable/c/d679c816929d62af51c8e6d7fc0e165c9412d2f3 - Patch, Mailing List | |
References | () https://git.kernel.org/stable/c/bbaafbb4651fede8d3c3881601ecaa4f834f9d3f - Patch, Mailing List | |
References | () https://git.kernel.org/stable/c/ab86cf6f8d24e63e9aca23da5108af1aa5483928 - Patch, Mailing List | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
First Time |
Debian debian Linux
Debian Linux linux Kernel Linux |
05 Nov 2024, 10:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Jun 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 May 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
03 May 2024, 03:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 May 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-01 06:15
Updated : 2025-03-03 17:47
NVD link : CVE-2024-26999
Mitre link : CVE-2024-26999
JSON object : View
Products Affected
linux
- linux_kernel
debian
- debian_linux
CWE
No CWE.