Stack Depot Warnings Resolved in Linux Kernel for s390 Architecture
CVE-2024-57838

Currently unrated

Key Information:

Vendor
Linux
Status
Vendor
CVE Published:
11 January 2025

Summary

A vulnerability in the Linux kernel's handling of IRQ entries on the s390 architecture has led to stack depot warnings due to inadequate filtering. The empty .irqentry.text section obstructs effective stack trace de-duplication, potentially resulting in stack depot limit capacity warnings when PREEMPT and KASAN are enabled. To address this, the fix involves relocating IO/EXT interrupt handlers from .kprobes.text into the .irqentry.text section, thus enhancing the system's ability to manage interrupts effectively without unnecessary overhead.

Affected Version(s)

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 5bb7a2c3afcf8732dc65ea49c09147b07da1d993

Linux 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 < 1af22528fee8072b7adc007b8ca49cc4ea62689e

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.