CVE-2024-57838
Linux Kernel vulnerability analysis and mitigation

Overview

CVE-2024-57838 is a vulnerability in the Linux kernel's stack depot functionality on s390 architecture, discovered and disclosed on January 11, 2025. The issue affects the stack trace de-duplication mechanism where the .irqentry.text section on s390 is empty, preventing proper stack depot filtering and de-duplication (NVD).

Technical details

The vulnerability stems from an architectural issue in the s390 platform's interrupt handling implementation. The stack depot is designed to filter out everything outside of the top interrupt context as irrelevant parts of stack traces, using inirqentrytext() to identify functions within .irqentry.text and .softirqentry.text sections. While _dosoftirq() is correctly placed in the .softirqentry.text section by common code, the .irqentry.text section on s390 remains empty, leading to potential stack depot exhaustion. This can manifest as warnings indicating 'Stack depot reached limit capacity' with CPU 0 PID 286113 at lib/stackdepot.c:252 (Kernel Commit).

Impact

The primary impact of this vulnerability is the potential exhaustion of the stack depot due to an explosion of saved stack traces. This occurs because the system fails to properly de-duplicate stack traces that share the same IRQ context code path but originate from different randomly interrupted points (NVD).

Mitigation and workarounds

The issue has been resolved by moving the IO/EXT interrupt handlers from .kprobes.text into the .irqentry.text section and updating the kprobes blacklist to include the .irqentry.text section. This fix is specifically implemented for asynchronous interrupts, while deliberately excluding program checks which are synchronous and require preserved context. The fix has been incorporated into various Linux kernel versions, with patches available for affected systems (Debian Security).

Additional resources


SourceThis report was generated using AI

Related Linux Kernel vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-40000CRITICAL9.8
  • Linux KernelLinux Kernel
  • kernel-rt-modules-partner
NoNoOct 15, 2025
CVE-2025-39996CRITICAL9.8
  • Linux KernelLinux Kernel
  • linux-xilinx-zynqmp
NoNoOct 15, 2025
CVE-2025-39998HIGH7.8
  • Linux KernelLinux Kernel
  • kernel-modules-partner
NoNoOct 15, 2025
CVE-2025-39999N/AN/A
  • Linux KernelLinux Kernel
  • kernel-abi-stablelists
NoNoOct 15, 2025
CVE-2025-39997N/AN/A
  • Linux KernelLinux Kernel
  • kernel-64k-debug-modules
NoNoOct 15, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management