Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-37843— PCI: pciehp: Avoid unnecessary device replacement check

EPSS 0.05% · P16

Affected Version Matrix 10

VendorProductVersion RangeStatus
LinuxLinux9d573d19547b3fae0c1d4e5fce52bdad3fda3664< e4a1d7defbc2d806540720a5adebe24ec3488683affected
9d573d19547b3fae0c1d4e5fce52bdad3fda3664< 0d0bbd01f7c0ac7d1be9f85aaf2cd0baec34655faffected
9d573d19547b3fae0c1d4e5fce52bdad3fda3664< 7535d10a2c61baeff493300070cf04d9ddda216baffected
9d573d19547b3fae0c1d4e5fce52bdad3fda3664< e3260237aaadc9799107ccb940c6688195c4518daffected
6.11affected
< 6.11unaffected
6.12.24≤ 6.12.*unaffected
6.13.12≤ 6.13.*unaffected
… +2 more rows
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-37843

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
PCI: pciehp: Avoid unnecessary device replacement check
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: PCI: pciehp: Avoid unnecessary device replacement check Hot-removal of nested PCI hotplug ports suffers from a long-standing race condition which can lead to a deadlock: A parent hotplug port acquires pci_lock_rescan_remove(), then waits for pciehp to unbind from a child hotplug port. Meanwhile that child hotplug port tries to acquire pci_lock_rescan_remove() as well in order to remove its own children. The deadlock only occurs if the parent acquires pci_lock_rescan_remove() first, not if the child happens to acquire it first. Several workarounds to avoid the issue have been proposed and discarded over the years, e.g.: https://lore.kernel.org/r/4c882e25194ba8282b78fe963fec8faae7cf23eb.1529173804.git.lukas@wunner.de/ A proper fix is being worked on, but needs more time as it is nontrivial and necessarily intrusive. Recent commit 9d573d19547b ("PCI: pciehp: Detect device replacement during system sleep") provokes more frequent occurrence of the deadlock when removing more than one Thunderbolt device during system sleep. The commit sought to detect device replacement, but also triggered on device removal. Differentiating reliably between replacement and removal is impossible because pci_get_dsn() returns 0 both if the device was removed, as well as if it was replaced with one lacking a Device Serial Number. Avoid the more frequent occurrence of the deadlock by checking whether the hotplug port itself was hot-removed. If so, there's no sense in checking whether its child device was replaced. This works because the ->resume_noirq() callback is invoked in top-down order for the entire hierarchy: A parent hotplug port detecting device replacement (or removal) marks all children as removed using pci_dev_set_disconnected() and a child hotplug port can then reliably detect being removed.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Linux kernel 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于PCI: pciehp中不必要的设备替换检查。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
LinuxLinux 9d573d19547b3fae0c1d4e5fce52bdad3fda3664 ~ e4a1d7defbc2d806540720a5adebe24ec3488683 -
LinuxLinux 6.11 -

II. Public POCs for CVE-2025-37843

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-37843

登录查看更多情报信息。

Same Patch Batch · Linux · 2025-05-09 · 52 CVEs total

CVE-2025-37874net: ngbe: fix memory leak in ngbe_probe() error path
CVE-2025-37889ASoC: ops: Consistently treat platform_max as control value
CVE-2025-37888net/mlx5: Fix null-ptr-deref in mlx5_create_{inner_,}ttc_table()
CVE-2025-37883s390/sclp: Add check for get_zeroed_page()
CVE-2025-37886pds_core: make wait_context part of q_info
CVE-2025-37885KVM: x86: Reset IRTE to host control if *new* route isn't postable
CVE-2025-37884bpf: Fix deadlock between rcu_tasks_trace and event_mutex.
CVE-2025-37887pds_core: handle unsupported PDS_CORE_CMD_FW_CONTROL result
CVE-2025-37876netfs: Only create /proc/fs/netfs with CONFIG_PROC_FS
CVE-2025-37875igc: fix PTM cycle trigger logic
CVE-2025-37877iommu: Clear iommu-dma ops on cleanup
CVE-2025-37873eth: bnxt: fix missing ring index trim on error path
CVE-2025-37872net: txgbe: fix memory leak in txgbe_probe() error path
CVE-2025-37871nfsd: decrease sc_count directly if fail to queue dl_recall
CVE-2025-37870drm/amd/display: prevent hang on link training fail
CVE-2025-37869drm/xe: Use local fence in error path of xe_migrate_clear
CVE-2025-37868drm/xe/userptr: fix notifier vs folio deadlock
CVE-2025-37867RDMA/core: Silence oversized kvmalloc() warning
CVE-2025-37866mlxbf-bootctl: use sysfs_emit_at() in secure_boot_fuse_state_show()
CVE-2025-37865net: dsa: mv88e6xxx: fix -ENOENT when deleting VLANs and MST is unsupported

Showing top 20 of 52 CVEs. View all on vendor page &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2025-37843

No comments yet


Leave a comment