目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2025-68331— Linux kernel 安全漏洞

EPSS 0.05% · P14
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2025-68331の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
usb: uas: fix urb unmapping issue when the uas device is remove during ongoing data transfer
ソース: NVD (National Vulnerability Database)
脆弱性説明
In the Linux kernel, the following vulnerability has been resolved: usb: uas: fix urb unmapping issue when the uas device is remove during ongoing data transfer When a UAS device is unplugged during data transfer, there is a probability of a system panic occurring. The root cause is an access to an invalid memory address during URB callback handling. Specifically, this happens when the dma_direct_unmap_sg() function is called within the usb_hcd_unmap_urb_for_dma() interface, but the sg->dma_address field is 0 and the sg data structure has already been freed. The SCSI driver sends transfer commands by invoking uas_queuecommand_lck() in uas.c, using the uas_submit_urbs() function to submit requests to USB. Within the uas_submit_urbs() implementation, three URBs (sense_urb, data_urb, and cmd_urb) are sequentially submitted. Device removal may occur at any point during uas_submit_urbs execution, which may result in URB submission failure. However, some URBs might have been successfully submitted before the failure, and uas_submit_urbs will return the -ENODEV error code in this case. The current error handling directly calls scsi_done(). In the SCSI driver, this eventually triggers scsi_complete() to invoke scsi_end_request() for releasing the sgtable. The successfully submitted URBs, when being unlinked to giveback, call usb_hcd_unmap_urb_for_dma() in hcd.c, leading to exceptions during sg unmapping operations since the sg data structure has already been freed. This patch modifies the error condition check in the uas_submit_urbs() function. When a UAS device is removed but one or more URBs have already been successfully submitted to USB, it avoids immediately invoking scsi_done() and save the cmnd to devinfo->cmnd array. If the successfully submitted URBs is completed before devinfo->resetting being set, then the scsi_done() function will be called within uas_try_complete() after all pending URB operations are finalized. Otherwise, the scsi_done() function will be called within uas_zap_pending(), which is executed after usb_kill_anchored_urbs(). The error handling only takes effect when uas_queuecommand_lck() calls uas_submit_urbs() and returns the error value -ENODEV . In this case, the device is disconnected, and the flow proceeds to uas_disconnect(), where uas_zap_pending() is invoked to call uas_try_complete().
ソース: NVD (National Vulnerability Database)
CVSS情報
N/A
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
N/A
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
Linux kernel 安全漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于UAS设备在数据传输期间移除时的URB取消映射问题,可能导致系统恐慌。
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

影響を受ける製品

ベンダープロダクト影響を受けるバージョンCPE購読
LinuxLinux eb2a86ae8c544be0ab04aa8169390c0669bc7148 ~ 6289fc489e94c9beb6be2b502ccc263663733d72 -
LinuxLinux 5.10 -

II. CVE-2025-68331の公開POC

#POC説明ソースリンクShenlongリンク
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2025-68331のインテリジェンス情報

登录查看更多情报信息。

Same Patch Batch · Linux · 2025-12-22 · 12 CVEs total

CVE-2025-68337jbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted
CVE-2025-68336locking/spinlock/debug: Fix data-race in do_raw_write_lock
CVE-2025-68335comedi: pcl818: fix null-ptr-deref in pcl818_ai_cancel()
CVE-2025-68334platform/x86/amd/pmc: Add support for Van Gogh SoC
CVE-2025-68333sched_ext: Fix possible deadlock in the deferred_irq_workfn()
CVE-2025-68332comedi: c6xdigio: Fix invalid PNP driver unregistration
CVE-2025-68330iio: accel: bmc150: Fix irq assumption regression
CVE-2025-68329tracing: Fix WARN_ON in tracing_buffers_mmap_close for split VMAs
CVE-2025-68328firmware: stratix10-svc: fix bug in saving controller data
CVE-2025-68327usb: renesas_usbhs: Fix synchronous external abort on unbind
CVE-2025-68326drm/xe/guc: Fix stack_depot usage

IV. 関連脆弱性

V. CVE-2025-68331へのコメント

まだコメントはありません


コメントを残す