CVE-2025-21820

In the Linux kernel, the following vulnerability has been resolved: tty: xilinx_uartps: split sysrq handling lockdep detects the following circular locking dependency: CPU 0 CPU 1 ========================== ============================ cdns_uart_isr() printk() uart_port_lock(port) console_lock() cdns_uart_console_write() if (!port->sysrq) uart_port_lock(port) uart_handle_break() port->sysrq = ... uart_handle_sysrq_char() printk() console_lock() The fixed commit attempts to avoid this situation by only taking the port lock in cdns_uart_console_write if port->sysrq unset. However, if (as shown above) cdns_uart_console_write runs before port->sysrq is set, then it will try to take the port lock anyway. This may result in a deadlock. Fix this by splitting sysrq handling into two parts. We use the prepare helper under the port lock and defer handling until we release the lock.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

13 Mar 2025, 13:15

Type Values Removed Values Added
References
  • () https://git.kernel.org/stable/c/e22a97700901ba5e8bf8db68056a0d50f9440cae -

05 Mar 2025, 14:05

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
References () https://git.kernel.org/stable/c/9b88a7c4584ba67267a051069b8abe44fc9595b2 - () https://git.kernel.org/stable/c/9b88a7c4584ba67267a051069b8abe44fc9595b2 - Patch
References () https://git.kernel.org/stable/c/4410dba9807a17a93f649a9f5870ceaf30a675a3 - () https://git.kernel.org/stable/c/4410dba9807a17a93f649a9f5870ceaf30a675a3 - Patch
References () https://git.kernel.org/stable/c/b06f388994500297bb91be60ffaf6825ecfd2afe - () https://git.kernel.org/stable/c/b06f388994500297bb91be60ffaf6825ecfd2afe - Patch
References () https://git.kernel.org/stable/c/de5bd24197bd9ee37ec1e379a3d882bbd15c5065 - () https://git.kernel.org/stable/c/de5bd24197bd9ee37ec1e379a3d882bbd15c5065 - Patch
References () https://git.kernel.org/stable/c/8ea0e7b3d7b8f2f0fc9db491ff22a0abe120801c - () https://git.kernel.org/stable/c/8ea0e7b3d7b8f2f0fc9db491ff22a0abe120801c - Patch

27 Feb 2025, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-27 20:16

Updated : 2025-03-13 13:15


NVD link : CVE-2025-21820

Mitre link : CVE-2025-21820


JSON object : View

Products Affected

linux

  • linux_kernel
CWE

No CWE.