目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2025-38398— Linux kernel 安全漏洞

EPSS 0.03% · P10

影响版本矩阵 6

厂商产品版本范围状态
LinuxLinux7304d1909080ef0c9da703500a97f46c98393fcd< 86fb36de1132b560f9305f0c78fa69f459fa0980affected
7304d1909080ef0c9da703500a97f46c98393fcd< d85d0380292a7e618915069c3579ae23c7c80339affected
6.15affected
< 6.15unaffected
6.15.6≤ 6.15.*unaffected
6.16≤ *unaffected
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2025-38398 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
spi: spi-qpic-snand: reallocate BAM transactions
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: spi: spi-qpic-snand: reallocate BAM transactions Using the mtd_nandbiterrs module for testing the driver occasionally results in weird things like below. 1. swiotlb mapping fails with the following message: [ 85.926216] qcom_snand 79b0000.spi: swiotlb buffer is full (sz: 4294967294 bytes), total 512 (slots), used 0 (slots) [ 85.932937] qcom_snand 79b0000.spi: failure in mapping desc [ 87.999314] qcom_snand 79b0000.spi: failure to write raw page [ 87.999352] mtd_nandbiterrs: error: write_oob failed (-110) Rebooting the board after this causes a panic due to a NULL pointer dereference. 2. If the swiotlb mapping does not fail, rebooting the board may result in a different panic due to a bad spinlock magic: [ 256.104459] BUG: spinlock bad magic on CPU#3, procd/2241 [ 256.104488] Unable to handle kernel paging request at virtual address ffffffff0000049b ... Investigating the issue revealed that these symptoms are results of memory corruption which is caused by out of bounds access within the driver. The driver uses a dynamically allocated structure for BAM transactions, which structure must have enough space for all possible variations of different flash operations initiated by the driver. The required space heavily depends on the actual number of 'codewords' which is calculated from the pagesize of the actual NAND chip. Although the qcom_nandc_alloc() function allocates memory for the BAM transactions during probe, but since the actual number of 'codewords' is not yet know the allocation is done for one 'codeword' only. Because of this, whenever the driver does a flash operation, and the number of the required transactions exceeds the size of the allocated arrays the driver accesses memory out of the allocated range. To avoid this, change the code to free the initially allocated BAM transactions memory, and allocate a new one once the actual number of 'codewords' required for a given NAND chip is known.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Linux kernel 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于BAM事务重新分配可能导致映射失败。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD

受影响产品

厂商产品影响版本CPE订阅
LinuxLinux 7304d1909080ef0c9da703500a97f46c98393fcd ~ 86fb36de1132b560f9305f0c78fa69f459fa0980 -
LinuxLinux 6.15 -

二、漏洞 CVE-2025-38398 的公开POC

#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2025-38398 的情报信息

登录查看更多情报信息。

同批安全公告 · Linux · 2025-07-25 · 共 114 条

CVE-2025-38426Linux kernel 安全漏洞
CVE-2025-38440Linux kernel 安全漏洞
CVE-2025-38438Linux kernel 安全漏洞
CVE-2025-38437Linux kernel 安全漏洞
CVE-2025-38436Linux kernel 安全漏洞
CVE-2025-38435Linux kernel 安全漏洞
CVE-2025-38434Linux kernel 安全漏洞
CVE-2025-38433Linux kernel 安全漏洞
CVE-2025-38432Linux kernel 安全漏洞
CVE-2025-38431Linux kernel 安全漏洞
CVE-2025-38430Linux kernel 安全漏洞
CVE-2025-38429Linux kernel 安全漏洞
CVE-2025-38428Linux kernel 安全漏洞
CVE-2025-38427Linux kernel 安全漏洞
CVE-2025-38425Linux kernel 安全漏洞
CVE-2025-38414Linux kernel 安全漏洞
CVE-2025-38417Linux kernel 安全漏洞
CVE-2025-38416Linux kernel 安全漏洞
CVE-2025-38415Linux kernel 安全漏洞
CVE-2025-38418Linux kernel 安全漏洞

显示前 20 条,共 114 条。 查看全部 &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2025-38398

暂无评论


发表评论