DEBIAN-CVE-2026-23115

Source
https://security-tracker.debian.org/tracker/CVE-2026-23115
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-23115.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2026-23115
Upstream
Published
2026-02-14T15:16:06.607Z
Modified
2026-03-19T09:00:16.590732Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

In the Linux kernel, the following vulnerability has been resolved: serial: Fix not set tty->port race condition Revert commit bfc467db60b7 ("serial: remove redundant ttyportlinkdevice()") because the ttyportlinkdevice() is not redundant: the tty->port has to be confured before we call uartconfigureport(), otherwise user-space can open console without TTY linked to the driver. This ttyportlinkdevice() was added explicitly to avoid this exact issue in commit fb2b90014d78 ("tty: link tty and port before configuring it as console"), so offending commit basically reverted the fix saying it is redundant without addressing the actual race condition presented there. Reproducible always as tty->port warning on Qualcomm SoC with most of devices disabled, so with very fast boot, and one serial device being the console: printk: legacy console [ttyMSM0] enabled printk: legacy console [ttyMSM0] enabled printk: legacy bootconsole [qcomgeni0] disabled printk: legacy bootconsole [qcomgeni0] disabled ------------[ cut here ]------------ ttyinitdev: ttyMSM driver does not set tty->port. This would crash the kernel. Fix the driver! WARNING: drivers/tty/ttyio.c:1414 at ttyinitdev.part.0+0x228/0x25c, CPU#2: systemd/1 Modules linked in: socinfo tcsrcceliza gcceliza sm3ce fuse ipv6 CPU: 2 UID: 0 PID: 1 Comm: systemd Tainted: G S 6.19.0-rc4-next-20260108-00024-g2202f4d30aa8 #73 PREEMPT Tainted: [S]=CPUOUTOFSPEC Hardware name: Qualcomm Technologies, Inc. Eliza (DT) ... ttyinitdev.part.0 (drivers/tty/ttyio.c:1414 (discriminator 11)) (P) ttyopen (arch/arm64/include/asm/atomicllsc.h:95 (discriminator 3) drivers/tty/ttyio.c:2073 (discriminator 3) drivers/tty/ttyio.c:2120 (discriminator 3)) chrdevopen (fs/chardev.c:411) dodentryopen (fs/open.c:962) vfsopen (fs/open.c:1094) doopen (fs/namei.c:4634) pathopenat (fs/namei.c:4793) dofilpopen (fs/namei.c:4820) dosysopenat2 (fs/open.c:1391 (discriminator 3)) ... Starting Network Name Resolution... Apparently the flow with this small Yocto-based ramdisk user-space is: driver (qcomgeniserial.c): user-space: ============================ =========== qcomgeniserialprobe() uartaddoneport() serialcoreregisterport() serialcoreaddoneport() uartconfigureport() registerconsole() | | open console | ... | ttyinitdev() | driver->ports[idx] is NULL | ttyportregisterdeviceattrserdev() ttyportlink_device() <- set driver->ports[idx]

References

Affected packages

Debian:14 / linux

Package

Name
linux
Purl
pkg:deb/debian/linux?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
6.18.8-1

Affected versions

6.*
6.12.38-1
6.12.41-1
6.12.43-1~bpo12+1
6.12.43-1
6.12.48-1
6.12.57-1~bpo12+1
6.12.57-1
6.12.63-1~bpo12+1
6.12.63-1
6.12.69-1~bpo12+1
6.12.69-1
6.12.73-1~bpo12+1
6.12.73-1
6.12.74-1
6.12.74-2~bpo12+1
6.12.74-2
6.13~rc6-1~exp1
6.13~rc7-1~exp1
6.13.2-1~exp1
6.13.3-1~exp1
6.13.4-1~exp1
6.13.5-1~exp1
6.13.6-1~exp1
6.13.7-1~exp1
6.13.8-1~exp1
6.13.9-1~exp1
6.13.10-1~exp1
6.13.11-1~exp1
6.14.3-1~exp1
6.14.5-1~exp1
6.14.6-1~exp1
6.15~rc7-1~exp1
6.15-1~exp1
6.15.1-1~exp1
6.15.2-1~exp1
6.15.3-1~exp1
6.15.4-1~exp1
6.15.5-1~exp1
6.15.6-1~exp1
6.16~rc7-1~exp1
6.16-1~exp1
6.16.1-1~exp1
6.16.3-1~bpo13+1
6.16.3-1
6.16.5-1
6.16.6-1
6.16.7-1
6.16.8-1
6.16.9-1
6.16.10-1
6.16.11-1
6.16.12-1~bpo13+1
6.16.12-1
6.16.12-2
6.17.2-1~exp1
6.17.5-1~exp1
6.17.6-1
6.17.7-1
6.17.7-2
6.17.8-1~bpo13+1
6.17.8-1
6.17.9-1
6.17.10-1
6.17.11-1
6.17.12-1
6.17.13-1~bpo13+1
6.17.13-1
6.18~rc4-1~exp1
6.18~rc4-1~exp2
6.18~rc5-1~exp1
6.18~rc6-1~exp1
6.18~rc7-1~exp1
6.18.1-1~exp1
6.18.2-1~exp1
6.18.3-1
6.18.5-1~bpo13+1
6.18.5-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source
"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2026-23115.json"