目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1020

100%

CVE-2025-39989— Linux kernel 安全漏洞

EPSS 0.06% · P19

影响版本矩阵 13

厂商产品版本范围状态
LinuxLinux4c132d1d844a53fc4e4b5c34e36ef10d6124b783< 5724654a084f701dc64b08d34a0e800f22f0e6e4affected
4c132d1d844a53fc4e4b5c34e36ef10d6124b783< 3e3d8169c0950a0b3cd5105f6403a78350dcac80affected
4c132d1d844a53fc4e4b5c34e36ef10d6124b783< 449413da90a337f343cc5a73070cbd68e92e8a54affected
4c132d1d844a53fc4e4b5c34e36ef10d6124b783< 0b8388e97ba6a8c033f9a8b5565af41af07f9345affected
4c132d1d844a53fc4e4b5c34e36ef10d6124b783< 1a15bb8303b6b104e78028b6c68f76a0d4562134affected
88eded8104d2ca0429703755dd250f8cbecc1447affected
5.17affected
< 5.17unaffected
… +5 条更多
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2025-39989 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
x86/mce: use is_copy_from_user() to determine copy-from-user context
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
In the Linux kernel, the following vulnerability has been resolved: x86/mce: use is_copy_from_user() to determine copy-from-user context Patch series "mm/hwpoison: Fix regressions in memory failure handling", v4. ## 1. What am I trying to do: This patchset resolves two critical regressions related to memory failure handling that have appeared in the upstream kernel since version 5.17, as compared to 5.10 LTS. - copyin case: poison found in user page while kernel copying from user space - instr case: poison found while instruction fetching in user space ## 2. What is the expected outcome and why - For copyin case: Kernel can recover from poison found where kernel is doing get_user() or copy_from_user() if those places get an error return and the kernel return -EFAULT to the process instead of crashing. More specifily, MCE handler checks the fixup handler type to decide whether an in kernel #MC can be recovered. When EX_TYPE_UACCESS is found, the PC jumps to recovery code specified in _ASM_EXTABLE_FAULT() and return a -EFAULT to user space. - For instr case: If a poison found while instruction fetching in user space, full recovery is possible. User process takes #PF, Linux allocates a new page and fills by reading from storage. ## 3. What actually happens and why - For copyin case: kernel panic since v5.17 Commit 4c132d1d844a ("x86/futex: Remove .fixup usage") introduced a new extable fixup type, EX_TYPE_EFAULT_REG, and later patches updated the extable fixup type for copy-from-user operations, changing it from EX_TYPE_UACCESS to EX_TYPE_EFAULT_REG. It breaks previous EX_TYPE_UACCESS handling when posion found in get_user() or copy_from_user(). - For instr case: user process is killed by a SIGBUS signal due to #CMCI and #MCE race When an uncorrected memory error is consumed there is a race between the CMCI from the memory controller reporting an uncorrected error with a UCNA signature, and the core reporting and SRAR signature machine check when the data is about to be consumed. ### Background: why *UN*corrected errors tied to *C*MCI in Intel platform [1] Prior to Icelake memory controllers reported patrol scrub events that detected a previously unseen uncorrected error in memory by signaling a broadcast machine check with an SRAO (Software Recoverable Action Optional) signature in the machine check bank. This was overkill because it's not an urgent problem that no core is on the verge of consuming that bad data. It's also found that multi SRAO UCE may cause nested MCE interrupts and finally become an IERR. Hence, Intel downgrades the machine check bank signature of patrol scrub from SRAO to UCNA (Uncorrected, No Action required), and signal changed to #CMCI. Just to add to the confusion, Linux does take an action (in uc_decode_notifier()) to try to offline the page despite the UC*NA* signature name. ### Background: why #CMCI and #MCE race when poison is consuming in Intel platform [1] Having decided that CMCI/UCNA is the best action for patrol scrub errors, the memory controller uses it for reads too. But the memory controller is executing asynchronously from the core, and can't tell the difference between a "real" read and a speculative read. So it will do CMCI/UCNA if an error is found in any read. Thus: 1) Core is clever and thinks address A is needed soon, issues a speculative read. 2) Core finds it is going to use address A soon after sending the read request 3) The CMCI from the memory controller is in a race with MCE from the core that will soon try to retire the load from address A. Quite often (because speculation has got better) the CMCI from the memory controller is delivered before the core is committed to the instruction reading address A, so the interrupt is taken, and Linux offlines the page (marking it as poison). ## Why user process is killed for instr case Commit 046545a661af ("mm/hwpoison: fix error page recovered but reported "not ---truncated---
来源: 美国国家漏洞数据库 NVD
CVSS Information
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
N/A
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Linux kernel 安全漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于未正确判断用户空间复制环境,可能导致错误处理。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD

受影响产品

厂商产品影响版本CPE订阅
LinuxLinux 4c132d1d844a53fc4e4b5c34e36ef10d6124b783 ~ 5724654a084f701dc64b08d34a0e800f22f0e6e4 -
LinuxLinux 5.17 -

二、漏洞 CVE-2025-39989 的公开POC

#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2025-39989 的情报信息

登录查看更多情报信息。
补丁 · 1

同批安全公告 · Linux · 2025-04-18 · 共 23 条

CVE-2025-39688Linux kernel 安全漏洞
CVE-2025-37785Linux kernel 安全漏洞
CVE-2025-37860Linux kernel 安全漏洞
CVE-2025-37925Linux kernel 安全漏洞
CVE-2025-37893Linux kernel 安全漏洞
CVE-2025-38049Linux kernel 安全漏洞
CVE-2025-38104Linux kernel 安全漏洞
CVE-2025-38152Linux kernel 安全漏洞
CVE-2025-38240Linux kernel 安全漏洞
CVE-2025-38479Linux kernel 安全漏洞
CVE-2025-38575Linux kernel 安全漏洞
CVE-2025-37838Linux kernel 安全漏洞
CVE-2025-38637Linux kernel 安全漏洞
CVE-2025-39735Linux kernel 安全漏洞
CVE-2025-39728Linux kernel 安全漏洞
CVE-2025-39755Linux kernel 安全漏洞
CVE-2025-39778Linux kernel 安全漏洞
CVE-2025-39930Linux kernel 安全漏洞
CVE-2025-40014Linux kernel 安全漏洞
CVE-2025-40114Linux kernel 安全漏洞

显示前 20 条,共 23 条。 查看全部 &rarr; →

IV. Related Vulnerabilities

V. Comments for CVE-2025-39989

暂无评论


发表评论