目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2025-21664— Linux kernel 安全漏洞

EPSS 0.03% · P8
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2025-21664 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
dm thin: make get_first_thin use rcu-safe list first function
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: dm thin: make get_first_thin use rcu-safe list first function The documentation in rculist.h explains the absence of list_empty_rcu() and cautions programmers against relying on a list_empty() -> list_first() sequence in RCU safe code. This is because each of these functions performs its own READ_ONCE() of the list head. This can lead to a situation where the list_empty() sees a valid list entry, but the subsequent list_first() sees a different view of list head state after a modification. In the case of dm-thin, this author had a production box crash from a GP fault in the process_deferred_bios path. This function saw a valid list head in get_first_thin() but when it subsequently dereferenced that and turned it into a thin_c, it got the inside of the struct pool, since the list was now empty and referring to itself. The kernel on which this occurred printed both a warning about a refcount_t being saturated, and a UBSAN error for an out-of-bounds cpuid access in the queued spinlock, prior to the fault itself. When the resulting kdump was examined, it was possible to see another thread patiently waiting in thin_dtr's synchronize_rcu. The thin_dtr call managed to pull the thin_c out of the active thins list (and have it be the last entry in the active_thins list) at just the wrong moment which lead to this crash. Fortunately, the fix here is straight forward. Switch get_first_thin() function to use list_first_or_null_rcu() which performs just a single READ_ONCE() and returns NULL if the list is already empty. This was run against the devicemapper test suite's thin-provisioning suites for delete and suspend and no regressions were observed.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Linux kernel 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于dm thin模块中get_first_thin函数未正确使用RCU安全的列表操作。这可能导致内存访问错误或系统崩溃。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD

受影响产品

厂商产品影响版本CPE订阅
LinuxLinux b10ebd34cccae1b431caf1be54919aede2be7cbe ~ ec037fe8c0d0f6140e3d8a49c7b29cb5582160b8 -
LinuxLinux 3.15 -

二、漏洞 CVE-2025-21664 的公开POC

#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2025-21664 的情报信息

登录查看更多情报信息。

同批安全公告 · Linux · 2025-01-21 · 共 25 条

CVE-2024-57943Linux kernel 安全漏洞
CVE-2024-57946Linux kernel 安全漏洞
CVE-2025-21663Linux kernel 安全漏洞
CVE-2025-21662Linux kernel 安全漏洞
CVE-2025-21661Linux kernel 安全漏洞
CVE-2025-21660Linux kernel 安全漏洞
CVE-2025-21659Linux kernel 安全漏洞
CVE-2025-21658Linux kernel 代码问题漏洞
CVE-2025-21657Linux kernel 安全漏洞
CVE-2024-57945Linux kernel 安全漏洞
CVE-2025-21656Linux kernel 安全漏洞
CVE-2024-57944Linux kernel 代码问题漏洞
CVE-2024-57930Linux kernel 安全漏洞
CVE-2024-57942Linux kernel 安全漏洞
CVE-2024-57941Linux kernel 安全漏洞
CVE-2024-57940Linux kernel 安全漏洞
CVE-2024-57939Linux kernel 安全漏洞
CVE-2024-57938Linux kernel 输入验证错误漏洞
CVE-2024-57936Linux kernel 安全漏洞
CVE-2024-57935Linux kernel 安全漏洞

显示前 20 条,共 25 条。 查看全部 → →

IV. Related Vulnerabilities

V. Comments for CVE-2025-21664

暂无评论


发表评论