Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-37840— mtd: rawnand: brcmnand: fix PM resume warning

EPSS 0.07% · P20

Affected Version Matrix 20

VendorProductVersion RangeStatus
LinuxLinux97d90da8a886949f09bb4754843fb0b504956ad2< 6f567c6a5250e3531cfd9c7ff254ecc2650464faaffected
97d90da8a886949f09bb4754843fb0b504956ad2< 8775581e1c48e1bdd04a893d6f6bbe5128ad0ea7affected
97d90da8a886949f09bb4754843fb0b504956ad2< fbcb584efa5cd912ff8a151d67b8fe22f4162a85affected
97d90da8a886949f09bb4754843fb0b504956ad2< 9dd161f707ecb7db38e5f529e979a5b6eb565b2daffected
97d90da8a886949f09bb4754843fb0b504956ad2< 9bd51723ab51580e077c91d494c37e80703b8524affected
97d90da8a886949f09bb4754843fb0b504956ad2< 7266066b9469f04ed1d4c0fdddaea1425835eb55affected
97d90da8a886949f09bb4754843fb0b504956ad2< c2eb3cffb0d972c5503e4d48921971c81def0fe5affected
97d90da8a886949f09bb4754843fb0b504956ad2< 659b1f29f3e2fd5d751fdf35c5526d1f1c9b3dd2affected
… +12 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-37840

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
mtd: rawnand: brcmnand: fix PM resume warning
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: mtd: rawnand: brcmnand: fix PM resume warning Fixed warning on PM resume as shown below caused due to uninitialized struct nand_operation that checks chip select field : WARN_ON(op->cs >= nanddev_ntargets(&chip->base) [ 14.588522] ------------[ cut here ]------------ [ 14.588529] WARNING: CPU: 0 PID: 1392 at drivers/mtd/nand/raw/internals.h:139 nand_reset_op+0x1e0/0x1f8 [ 14.588553] Modules linked in: bdc udc_core [ 14.588579] CPU: 0 UID: 0 PID: 1392 Comm: rtcwake Tainted: G W 6.14.0-rc4-g5394eea10651 #16 [ 14.588590] Tainted: [W]=WARN [ 14.588593] Hardware name: Broadcom STB (Flattened Device Tree) [ 14.588598] Call trace: [ 14.588604] dump_backtrace from show_stack+0x18/0x1c [ 14.588622] r7:00000009 r6:0000008b r5:60000153 r4:c0fa558c [ 14.588625] show_stack from dump_stack_lvl+0x70/0x7c [ 14.588639] dump_stack_lvl from dump_stack+0x18/0x1c [ 14.588653] r5:c08d40b0 r4:c1003cb0 [ 14.588656] dump_stack from __warn+0x84/0xe4 [ 14.588668] __warn from warn_slowpath_fmt+0x18c/0x194 [ 14.588678] r7:c08d40b0 r6:c1003cb0 r5:00000000 r4:00000000 [ 14.588681] warn_slowpath_fmt from nand_reset_op+0x1e0/0x1f8 [ 14.588695] r8:70c40dff r7:89705f41 r6:36b4a597 r5:c26c9444 r4:c26b0048 [ 14.588697] nand_reset_op from brcmnand_resume+0x13c/0x150 [ 14.588714] r9:00000000 r8:00000000 r7:c24f8010 r6:c228a3f8 r5:c26c94bc r4:c26b0040 [ 14.588717] brcmnand_resume from platform_pm_resume+0x34/0x54 [ 14.588735] r5:00000010 r4:c0840a50 [ 14.588738] platform_pm_resume from dpm_run_callback+0x5c/0x14c [ 14.588757] dpm_run_callback from device_resume+0xc0/0x324 [ 14.588776] r9:c24f8054 r8:c24f80a0 r7:00000000 r6:00000000 r5:00000010 r4:c24f8010 [ 14.588779] device_resume from dpm_resume+0x130/0x160 [ 14.588799] r9:c22539e4 r8:00000010 r7:c22bebb0 r6:c24f8010 r5:c22539dc r4:c22539b0 [ 14.588802] dpm_resume from dpm_resume_end+0x14/0x20 [ 14.588822] r10:c2204e40 r9:00000000 r8:c228a3fc r7:00000000 r6:00000003 r5:c228a414 [ 14.588826] r4:00000010 [ 14.588828] dpm_resume_end from suspend_devices_and_enter+0x274/0x6f8 [ 14.588848] r5:c228a414 r4:00000000 [ 14.588851] suspend_devices_and_enter from pm_suspend+0x228/0x2bc [ 14.588868] r10:c3502910 r9:c3501f40 r8:00000004 r7:c228a438 r6:c0f95e18 r5:00000000 [ 14.588871] r4:00000003 [ 14.588874] pm_suspend from state_store+0x74/0xd0 [ 14.588889] r7:c228a438 r6:c0f934c8 r5:00000003 r4:00000003 [ 14.588892] state_store from kobj_attr_store+0x1c/0x28 [ 14.588913] r9:00000000 r8:00000000 r7:f09f9f08 r6:00000004 r5:c3502900 r4:c0283250 [ 14.588916] kobj_attr_store from sysfs_kf_write+0x40/0x4c [ 14.588936] r5:c3502900 r4:c0d92a48 [ 14.588939] sysfs_kf_write from kernfs_fop_write_iter+0x104/0x1f0 [ 14.588956] r5:c3502900 r4:c3501f40 [ 14.588960] kernfs_fop_write_iter from vfs_write+0x250/0x420 [ 14.588980] r10:c0e14b48 r9:00000000 r8:c25f5780 r7:00443398 r6:f09f9f68 r5:c34f7f00 [ 14.588983] r4:c042a88c [ 14.588987] vfs_write from ksys_write+0x74/0xe4 [ 14.589005] r10:00000004 r9:c25f5780 r8:c02002fA0 r7:00000000 r6:00000000 r5:c34f7f00 [ 14.589008] r4:c34f7f00 [ 14.589011] ksys_write from sys_write+0x10/0x14 [ 14.589029] r7:00000004 r6:004421c0 r5:00443398 r4:00000004 [ 14.589032] sys_write from ret_fast_syscall+0x0/0x5c [ 14.589044] Exception stack(0xf09f9fa8 to 0xf09f9ff0) [ 14.589050] 9fa0: 00000004 00443398 00000004 00443398 00000004 00000001 [ 14.589056] 9fc0: 00000004 00443398 004421c0 00000004 b6ecbd58 00000008 bebfbc38 0043eb78 [ 14.589062] 9fe0: 00440eb0 bebfbaf8 b6de18a0 b6e579e8 [ 14.589065] ---[ end trace 0000000000000000 ]--- The fix uses the higher level nand_reset(chip, chipnr); where chipnr = 0, when doing PM resume operation in compliance with the controller support for single die nand chip. Switching from nand_reset_op() to nan ---truncated---
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于mtd: rawnand: brcmnand中未初始化nand_operation导致PM恢复警告。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 97d90da8a886949f09bb4754843fb0b504956ad2 ~ 6f567c6a5250e3531cfd9c7ff254ecc2650464fa -
LinuxLinux 4.16 -

II. Public POCs for CVE-2025-37840

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-37840

登录查看更多情报信息。

Same Patch Batch · Linux · 2025-05-09 · 52 CVEs total

CVE-2025-37874net: ngbe: fix memory leak in ngbe_probe() error path
CVE-2025-37889ASoC: ops: Consistently treat platform_max as control value
CVE-2025-37888net/mlx5: Fix null-ptr-deref in mlx5_create_{inner_,}ttc_table()
CVE-2025-37883s390/sclp: Add check for get_zeroed_page()
CVE-2025-37886pds_core: make wait_context part of q_info
CVE-2025-37885KVM: x86: Reset IRTE to host control if *new* route isn't postable
CVE-2025-37884bpf: Fix deadlock between rcu_tasks_trace and event_mutex.
CVE-2025-37887pds_core: handle unsupported PDS_CORE_CMD_FW_CONTROL result
CVE-2025-37876netfs: Only create /proc/fs/netfs with CONFIG_PROC_FS
CVE-2025-37875igc: fix PTM cycle trigger logic
CVE-2025-37877iommu: Clear iommu-dma ops on cleanup
CVE-2025-37873eth: bnxt: fix missing ring index trim on error path
CVE-2025-37872net: txgbe: fix memory leak in txgbe_probe() error path
CVE-2025-37871nfsd: decrease sc_count directly if fail to queue dl_recall
CVE-2025-37870drm/amd/display: prevent hang on link training fail
CVE-2025-37869drm/xe: Use local fence in error path of xe_migrate_clear
CVE-2025-37868drm/xe/userptr: fix notifier vs folio deadlock
CVE-2025-37867RDMA/core: Silence oversized kvmalloc() warning
CVE-2025-37866mlxbf-bootctl: use sysfs_emit_at() in secure_boot_fuse_state_show()
CVE-2025-37865net: dsa: mv88e6xxx: fix -ENOENT when deleting VLANs and MST is unsupported

Showing top 20 of 52 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2025-37840

No comments yet


Leave a comment