目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2025-37843— Linux kernel 安全漏洞

EPSS 0.05% · P16
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2025-37843 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
PCI: pciehp: Avoid unnecessary device replacement check
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: PCI: pciehp: Avoid unnecessary device replacement check Hot-removal of nested PCI hotplug ports suffers from a long-standing race condition which can lead to a deadlock: A parent hotplug port acquires pci_lock_rescan_remove(), then waits for pciehp to unbind from a child hotplug port. Meanwhile that child hotplug port tries to acquire pci_lock_rescan_remove() as well in order to remove its own children. The deadlock only occurs if the parent acquires pci_lock_rescan_remove() first, not if the child happens to acquire it first. Several workarounds to avoid the issue have been proposed and discarded over the years, e.g.: https://lore.kernel.org/r/4c882e25194ba8282b78fe963fec8faae7cf23eb.1529173804.git.lukas@wunner.de/ A proper fix is being worked on, but needs more time as it is nontrivial and necessarily intrusive. Recent commit 9d573d19547b ("PCI: pciehp: Detect device replacement during system sleep") provokes more frequent occurrence of the deadlock when removing more than one Thunderbolt device during system sleep. The commit sought to detect device replacement, but also triggered on device removal. Differentiating reliably between replacement and removal is impossible because pci_get_dsn() returns 0 both if the device was removed, as well as if it was replaced with one lacking a Device Serial Number. Avoid the more frequent occurrence of the deadlock by checking whether the hotplug port itself was hot-removed. If so, there's no sense in checking whether its child device was replaced. This works because the ->resume_noirq() callback is invoked in top-down order for the entire hierarchy: A parent hotplug port detecting device replacement (or removal) marks all children as removed using pci_dev_set_disconnected() and a child hotplug port can then reliably detect being removed.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Linux kernel 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于PCI: pciehp中不必要的设备替换检查。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD

受影响产品

厂商产品影响版本CPE订阅
LinuxLinux 9d573d19547b3fae0c1d4e5fce52bdad3fda3664 ~ e4a1d7defbc2d806540720a5adebe24ec3488683 -
LinuxLinux 6.11 -

二、漏洞 CVE-2025-37843 的公开POC

#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2025-37843 的情报信息

登录查看更多情报信息。

同批安全公告 · Linux · 2025-05-09 · 共 52 条

CVE-2025-37874Linux kernel 安全漏洞
CVE-2025-37889Linux kernel 安全漏洞
CVE-2025-37888Linux kernel 安全漏洞
CVE-2025-37883Linux kernel 安全漏洞
CVE-2025-37886Linux kernel 安全漏洞
CVE-2025-37885Linux kernel 安全漏洞
CVE-2025-37884Linux kernel 安全漏洞
CVE-2025-37887Linux kernel 安全漏洞
CVE-2025-37876Linux kernel 安全漏洞
CVE-2025-37875Linux kernel 安全漏洞
CVE-2025-37877Linux kernel 安全漏洞
CVE-2025-37873Linux kernel 安全漏洞
CVE-2025-37872Linux kernel 安全漏洞
CVE-2025-37871Linux kernel 安全漏洞
CVE-2025-37870Linux kernel 安全漏洞
CVE-2025-37869Linux kernel 安全漏洞
CVE-2025-37868Linux kernel 安全漏洞
CVE-2025-37867Linux kernel 安全漏洞
CVE-2025-37866Linux kernel 安全漏洞
CVE-2025-37865Linux kernel 安全漏洞

显示前 20 条,共 52 条。 查看全部 → →

IV. Related Vulnerabilities

V. Comments for CVE-2025-37843

暂无评论


发表评论