目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2025-39790— Linux kernel 安全漏洞

EPSS 0.02% · P5
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2025-39790 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
bus: mhi: host: Detect events pointing to unexpected TREs
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: bus: mhi: host: Detect events pointing to unexpected TREs When a remote device sends a completion event to the host, it contains a pointer to the consumed TRE. The host uses this pointer to process all of the TREs between it and the host's local copy of the ring's read pointer. This works when processing completion for chained transactions, but can lead to nasty results if the device sends an event for a single-element transaction with a read pointer that is multiple elements ahead of the host's read pointer. For instance, if the host accesses an event ring while the device is updating it, the pointer inside of the event might still point to an old TRE. If the host uses the channel's xfer_cb() to directly free the buffer pointed to by the TRE, the buffer will be double-freed. This behavior was observed on an ep that used upstream EP stack without 'commit 6f18d174b73d ("bus: mhi: ep: Update read pointer only after buffer is written")'. Where the device updated the events ring pointer before updating the event contents, so it left a window where the host was able to access the stale data the event pointed to, before the device had the chance to update them. The usual pattern was that the host received an event pointing to a TRE that is not immediately after the last processed one, so it got treated as if it was a chained transaction, processing all of the TREs in between the two read pointers. This commit aims to harden the host by ensuring transactions where the event points to a TRE that isn't local_rp + 1 are chained. [mani: added stable tag and reworded commit message]
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Linux kernel 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于未正确检测指向意外TRE的事件,可能导致缓冲区双重释放。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD

受影响产品

厂商产品影响版本CPE订阅
LinuxLinux 1d3173a3bae7039b765a0956e3e4bf846dbaacb8 ~ 7b3f0e3b60c27f4fcb69927d84987e5fd6240530 -
LinuxLinux 5.7 -

二、漏洞 CVE-2025-39790 的公开POC

#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2025-39790 的情报信息

登录查看更多情报信息。

同批安全公告 · Linux · 2025-09-11 · 共 54 条

CVE-2025-39773Linux kernel 安全漏洞
CVE-2025-39789Linux kernel 安全漏洞
CVE-2025-39784Linux kernel 安全漏洞
CVE-2025-39787Linux kernel 安全漏洞
CVE-2025-39786Linux kernel 安全漏洞
CVE-2025-39785Linux kernel 安全漏洞
CVE-2025-39788Linux kernel 安全漏洞
CVE-2025-39776Linux kernel 安全漏洞
CVE-2025-39775Linux kernel 安全漏洞
CVE-2025-39774Linux kernel 安全漏洞
CVE-2025-39777Linux kernel 安全漏洞
CVE-2025-39772Linux kernel 安全漏洞
CVE-2025-39771Linux kernel 安全漏洞
CVE-2025-39770Linux kernel 安全漏洞
CVE-2025-39769Linux kernel 安全漏洞
CVE-2025-39768Linux kernel 安全漏洞
CVE-2025-39766Linux kernel 安全漏洞
CVE-2025-39767Linux kernel 安全漏洞
CVE-2025-39765Linux kernel 安全漏洞
CVE-2025-39764Linux kernel 安全漏洞

显示前 20 条,共 54 条。 查看全部 → →

IV. Related Vulnerabilities

V. Comments for CVE-2025-39790

暂无评论


发表评论