支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:736

73.6%
一、 漏洞 CVE-2025-71125 基础信息
漏洞信息
                                        # 跟踪:不注册不支持的perf事件

N/A
                                        
神龙判断

是否为 Web 类漏洞: 未知

判断理由:

N/A
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
tracing: Do not register unsupported perf events
来源:美国国家漏洞数据库 NVD
漏洞描述信息
In the Linux kernel, the following vulnerability has been resolved: tracing: Do not register unsupported perf events Synthetic events currently do not have a function to register perf events. This leads to calling the tracepoint register functions with a NULL function pointer which triggers: ------------[ cut here ]------------ WARNING: kernel/tracepoint.c:175 at tracepoint_add_func+0x357/0x370, CPU#2: perf/2272 Modules linked in: kvm_intel kvm irqbypass CPU: 2 UID: 0 PID: 2272 Comm: perf Not tainted 6.18.0-ftest-11964-ge022764176fc-dirty #323 PREEMPTLAZY Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-debian-1.17.0-1 04/01/2014 RIP: 0010:tracepoint_add_func+0x357/0x370 Code: 28 9c e8 4c 0b f5 ff eb 0f 4c 89 f7 48 c7 c6 80 4d 28 9c e8 ab 89 f4 ff 31 c0 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc cc <0f> 0b 49 c7 c6 ea ff ff ff e9 ee fe ff ff 0f 0b e9 f9 fe ff ff 0f RSP: 0018:ffffabc0c44d3c40 EFLAGS: 00010246 RAX: 0000000000000001 RBX: ffff9380aa9e4060 RCX: 0000000000000000 RDX: 000000000000000a RSI: ffffffff9e1d4a98 RDI: ffff937fcf5fd6c8 RBP: 0000000000000001 R08: 0000000000000007 R09: ffff937fcf5fc780 R10: 0000000000000003 R11: ffffffff9c193910 R12: 000000000000000a R13: ffffffff9e1e5888 R14: 0000000000000000 R15: ffffabc0c44d3c78 FS: 00007f6202f5f340(0000) GS:ffff93819f00f000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055d3162281a8 CR3: 0000000106a56003 CR4: 0000000000172ef0 Call Trace: <TASK> tracepoint_probe_register+0x5d/0x90 synth_event_reg+0x3c/0x60 perf_trace_event_init+0x204/0x340 perf_trace_init+0x85/0xd0 perf_tp_event_init+0x2e/0x50 perf_try_init_event+0x6f/0x230 ? perf_event_alloc+0x4bb/0xdc0 perf_event_alloc+0x65a/0xdc0 __se_sys_perf_event_open+0x290/0x9f0 do_syscall_64+0x93/0x7b0 ? entry_SYSCALL_64_after_hwframe+0x76/0x7e ? trace_hardirqs_off+0x53/0xc0 entry_SYSCALL_64_after_hwframe+0x76/0x7e Instead, have the code return -ENODEV, which doesn't warn and has perf error out with: # perf record -e synthetic:futex_wait Error: The sys_perf_event_open() syscall returned with 19 (No such device) for event (synthetic:futex_wait). "dmesg | grep -i perf" may provide additional information. Ideally perf should support synthetic events, but for now just fix the warning. The support can come later.
来源:美国国家漏洞数据库 NVD
CVSS信息
N/A
来源:美国国家漏洞数据库 NVD
漏洞类别
N/A
来源:美国国家漏洞数据库 NVD
漏洞标题
Linux kernel 安全漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于为不支持的事件注册了NULL函数指针,可能导致空指针取消引用。
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
其他
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2025-71125 的公开POC
#POC 描述源链接神龙链接
三、漏洞 CVE-2025-71125 的情报信息
  • 标题: Oh noes! -- 🔗来源链接

    标签:

    神龙速读:
                                            从这个网页截图中可以获取以下关于漏洞的关键信息:
    
    - **访问被拒绝**:页面显示“Access Denied”信息,可能表明请求的资源无法访问或用户没有权限访问该资源。
    - **错误代码**:错误代码为`4d1dbaddfcc0f385`,这个代码可以用于进一步诊断问题,了解具体的错误原因。
    - **防护系统**:页面由`Anubis`防护系统保护,来自`Techaro`公司,这表明网站可能有专门的安全防护措施。
    - **版本信息**:网站运行的`Anubis`版本为`1.22.0`,这个版本信息可以用于查找已知的漏洞和安全问题,特别是与这个版本相关的漏洞。
    
    这些信息可以帮助安全人员或开发者进一步调查和解决问题。
                                            
    Oh noes!
  • 标题: Oh noes! -- 🔗来源链接

    标签:

    神龙速读:
                                            - **状态信息**: 访问被拒绝,错误代码为 4d1dbaddfcc0f385。
    - **保护状态**: 网站使用 Anubis 保护,来自 Techaro。
    - **版本信息**: 当前网站运行的是 Anubis 版本 1.22.0。
    - **设计信息**: Anubis 的吉祥物设计由 CELPHASE 完成。
                                            
    Oh noes!
  • 标题: Oh noes! -- 🔗来源链接

    标签:

    神龙速读:
                                            - **Access Issue**: The page shows an "Access Denied" message with error code 4d1dbaddfcc0f385, indicating a potential vulnerability if unauthorized access is involved.
    - **Protection Details**: The website is protected by an Anubis system, originating from Techaro, and developed in Canada with love.
    - **Software Version**: The website runs on Anubis version 1.22.0, which could potentially have known vulnerabilities or bugs if it's not the latest version.
    - **Mascot Design**: Although not directly related to vulnerabilities, the mascot design is credited to CELPHASE, suggesting proprietary design elements.
    - **Error Code**: The specific error code may reveal internal error handling practices, potentially exploitable if improperly managed.
                                            
    Oh noes!
  • 标题: Oh noes! -- 🔗来源链接

    标签:

    神龙速读:
                                            - **Access Denied Error**: There is an access denied message with a specific error code: `4d1dbaddfcc0f385`.
    - **Protection Information**: The site is protected by Anubis from Techaro, indicating the use of a specific web security service.
    - **Anubis Version**: The site is running Anubis version `1.22.0`, which may be relevant for identifying potential known vulnerabilities in that version.
                                            
    Oh noes!
  • 标题: 503 Service Temporarily Unavailable -- 🔗来源链接

    标签:

    神龙速读:
                                            - **HTTP Status Code**: 503
    - **Error Message**: Service Temporarily Unavailable
    - **Web Server**: Nginx
                                            
    503 Service Temporarily Unavailable
  • 标题: 503 Service Temporarily Unavailable -- 🔗来源链接

    标签:

    神龙速读:
                                            - **HTTP Status Code**: 503
    - **Error Type**: Service Unavailable
    - **Web Server**: nginx
    - **Indication**: The service is not available, possibly due to a server being overloaded or down for maintenance.
                                            
    503 Service Temporarily Unavailable
  • 标题: Oh noes! -- 🔗来源链接

    标签:

    神龙速读:
                                            从这个网页截图中可以获取到以下关于漏洞的关键信息:
    
    - **防护状态**: 该网站受到Anubis防护。
    - **错误信息**: 访问被拒绝,错误代码为`4d1dbaddfcc0f385`。
    - **版本信息**: 该网站正在运行Anubis版本`1.22.0`。
    
    这些信息可能对安全分析或漏洞利用提供一些线索,例如对特定版本的攻击向量研究。
                                            
    Oh noes!
  • https://nvd.nist.gov/vuln/detail/CVE-2025-71125
四、漏洞 CVE-2025-71125 的评论
匿名用户
2026-01-15 06:08:15

Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.


发表评论