目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2025-38687— Linux kernel 安全漏洞

EPSS 0.02% · P6

影响版本矩阵 20

厂商产品版本范围状态
LinuxLinux2f3fdcd7ce935f6f2899ceab57dc8fe5286db3e1< fe67122ba781df44a1a9716eb1dfd751321ab512affected
2f3fdcd7ce935f6f2899ceab57dc8fe5286db3e1< cd4286123d6948ff638ea9cd5818ae4796d5d252affected
2f3fdcd7ce935f6f2899ceab57dc8fe5286db3e1< d85fac8729c9acfd72368faff1d576ec585e5c8faffected
2f3fdcd7ce935f6f2899ceab57dc8fe5286db3e1< 0f989f9d05492028afd2bded4b42023c57d8a76eaffected
2f3fdcd7ce935f6f2899ceab57dc8fe5286db3e1< 5c4a2ffcbd052c69bbf4680677d4c4eaa5a252d4affected
2f3fdcd7ce935f6f2899ceab57dc8fe5286db3e1< 017198079551a2a5cf61eae966af3c4b145e1f3baffected
2f3fdcd7ce935f6f2899ceab57dc8fe5286db3e1< 71ca60d2e631cf9c63bcbc7017961c61ff04e419affected
2f3fdcd7ce935f6f2899ceab57dc8fe5286db3e1< 5724e82df4f9a4be62908362c97d522d25de75ddaffected
… +12 条更多
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2025-38687 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
comedi: fix race between polling and detaching
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: comedi: fix race between polling and detaching syzbot reports a use-after-free in comedi in the below link, which is due to comedi gladly removing the allocated async area even though poll requests are still active on the wait_queue_head inside of it. This can cause a use-after-free when the poll entries are later triggered or removed, as the memory for the wait_queue_head has been freed. We need to check there are no tasks queued on any of the subdevices' wait queues before allowing the device to be detached by the `COMEDI_DEVCONFIG` ioctl. Tasks will read-lock `dev->attach_lock` before adding themselves to the subdevice wait queue, so fix the problem in the `COMEDI_DEVCONFIG` ioctl handler by write-locking `dev->attach_lock` before checking that all of the subdevices are safe to be deleted. This includes testing for any sleepers on the subdevices' wait queues. It remains locked until the device has been detached. This requires the `comedi_device_detach()` function to be refactored slightly, moving the bulk of it into new function `comedi_device_detach_locked()`. Note that the refactor of `comedi_device_detach()` results in `comedi_device_cancel_all()` now being called while `dev->attach_lock` is write-locked, which wasn't the case previously, but that does not matter. Thanks to Jens Axboe for diagnosing the problem and co-developing this patch.
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Linux kernel 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于轮询和分离操作竞争条件,可能导致释放后重用。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD

受影响产品

厂商产品影响版本CPE订阅
LinuxLinux 2f3fdcd7ce935f6f2899ceab57dc8fe5286db3e1 ~ fe67122ba781df44a1a9716eb1dfd751321ab512 -
LinuxLinux 3.14 -

二、漏洞 CVE-2025-38687 的公开POC

#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2025-38687 的情报信息

登录查看更多情报信息。

同批安全公告 · Linux · 2025-09-04 · 共 52 条

CVE-2025-38695Linux kernel 安全漏洞
CVE-2025-38679Linux kernel 安全漏洞
CVE-2025-38680Linux kernel 安全漏洞
CVE-2025-38685Linux kernel 安全漏洞
CVE-2025-38682Linux kernel 安全漏洞
CVE-2025-38683Linux kernel 安全漏洞
CVE-2025-38684Linux kernel 安全漏洞
CVE-2025-38681Linux kernel 安全漏洞
CVE-2025-38694Linux kernel 安全漏洞
CVE-2025-38693Linux kernel 安全漏洞
CVE-2025-38692Linux kernel 安全漏洞
CVE-2025-38696Linux kernel 安全漏洞
CVE-2025-38697Linux kernel 安全漏洞
CVE-2025-38699Linux kernel 安全漏洞
CVE-2025-38698Linux kernel 安全漏洞
CVE-2025-38700Linux kernel 安全漏洞
CVE-2025-38701Linux kernel 安全漏洞
CVE-2025-38702Linux kernel 安全漏洞
CVE-2025-38703Linux kernel 安全漏洞
CVE-2025-38704Linux kernel 安全漏洞

显示前 20 条,共 52 条。 查看全部 &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2025-38687

暂无评论


发表评论