支持本站 — 捐款将帮助我们持续运营

目标:1000 元,已筹:736

73.6%
一、 漏洞 CVE-2025-71142 基础信息
漏洞信息
                                        # CPUSet:禁用远程分区时修复警告

N/A
                                        
神龙判断

是否为 Web 类漏洞: 未知

判断理由:

N/A
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
cpuset: fix warning when disabling remote partition
来源:美国国家漏洞数据库 NVD
漏洞描述信息
In the Linux kernel, the following vulnerability has been resolved: cpuset: fix warning when disabling remote partition A warning was triggered as follows: WARNING: kernel/cgroup/cpuset.c:1651 at remote_partition_disable+0xf7/0x110 RIP: 0010:remote_partition_disable+0xf7/0x110 RSP: 0018:ffffc90001947d88 EFLAGS: 00000206 RAX: 0000000000007fff RBX: ffff888103b6e000 RCX: 0000000000006f40 RDX: 0000000000006f00 RSI: ffffc90001947da8 RDI: ffff888103b6e000 RBP: ffff888103b6e000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000001 R11: ffff88810b2e2728 R12: ffffc90001947da8 R13: 0000000000000000 R14: ffffc90001947da8 R15: ffff8881081f1c00 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007f55c8bbe0b2 CR3: 000000010b14c000 CR4: 00000000000006f0 Call Trace: <TASK> update_prstate+0x2d3/0x580 cpuset_partition_write+0x94/0xf0 kernfs_fop_write_iter+0x147/0x200 vfs_write+0x35d/0x500 ksys_write+0x66/0xe0 do_syscall_64+0x6b/0x390 entry_SYSCALL_64_after_hwframe+0x4b/0x53 RIP: 0033:0x7f55c8cd4887 Reproduction steps (on a 16-CPU machine): # cd /sys/fs/cgroup/ # mkdir A1 # echo +cpuset > A1/cgroup.subtree_control # echo "0-14" > A1/cpuset.cpus.exclusive # mkdir A1/A2 # echo "0-14" > A1/A2/cpuset.cpus.exclusive # echo "root" > A1/A2/cpuset.cpus.partition # echo 0 > /sys/devices/system/cpu/cpu15/online # echo member > A1/A2/cpuset.cpus.partition When CPU 15 is offlined, subpartitions_cpus gets cleared because no CPUs remain available for the top_cpuset, forcing partitions to share CPUs with the top_cpuset. In this scenario, disabling the remote partition triggers a warning stating that effective_xcpus is not a subset of subpartitions_cpus. Partitions should be invalidated in this case to inform users that the partition is now invalid(cpus are shared with top_cpuset). To fix this issue: 1. Only emit the warning only if subpartitions_cpus is not empty and the effective_xcpus is not a subset of subpartitions_cpus. 2. During the CPU hotplug process, invalidate partitions if subpartitions_cpus is empty.
来源:美国国家漏洞数据库 NVD
CVSS信息
N/A
来源:美国国家漏洞数据库 NVD
漏洞类别
N/A
来源:美国国家漏洞数据库 NVD
漏洞标题
Linux kernel 安全漏洞
来源:中国国家信息安全漏洞库 CNNVD
漏洞描述信息
Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于禁用远程分区时处理不当,可能导致警告。
来源:中国国家信息安全漏洞库 CNNVD
CVSS信息
N/A
来源:中国国家信息安全漏洞库 CNNVD
漏洞类别
其他
来源:中国国家信息安全漏洞库 CNNVD
二、漏洞 CVE-2025-71142 的公开POC
#POC 描述源链接神龙链接
三、漏洞 CVE-2025-71142 的情报信息
  • 标题: Oh noes! -- 🔗来源链接

    标签:

    神龙速读:
                                            ### 关键信息
    
    - **Error Code**: `4d1dbaddfcc0f385`
    - **Access Control**: The page shows an "Access Denied" message, indicating restricted access.
    - **Protection Details**: The website is protected by Anubis, a service provided by T3char0.
    - **Software Version**: The website is running Anubis version 1.22.0.
    
    ### Possible Vulnerabilities
    
    - **Error Code Exposure**: The error code might be used for error-based attacks if it reveals internal system details.
    - **Software Version Disclosure**: Knowing the exact version of Anubis could help attackers find known vulnerabilities associated with that specific version.
                                            
    Oh noes!
  • 标题: Oh noes! -- 🔗来源链接

    标签:

    神龙速读:
                                            - **错误信息**: "Access Denied: error code 4d1dbaddfcc0f385."
    - **安全系统**: 当前网站受到 Anubis 的保护,来自动化安全提供商 Techaro。
    - **版本信息**: 此网站运行的是 Anubis 版本 1.22.0。
    - **潜在漏洞**: 错误代码 4d1dbaddfcc0f385 可能指示了一个具体的安全访问拒绝情况,这可能指向配置错误或者潜在的攻击尝试被Anubis拦截。然而,没有更多信息,无法确定具体漏洞。
    - **UI定制**: UI可能由CelpHASE设计,这可能意味着该特定错误页面是为网站定制的,可能包含独特的视觉标识。
                                            
    Oh noes!
  • https://nvd.nist.gov/vuln/detail/CVE-2025-71142
四、漏洞 CVE-2025-71142 的评论
匿名用户
2026-01-15 06:08:11

Zaproxy alias impedit expedita quisquam pariatur exercitationem. Nemo rerum eveniet dolores rem quia dignissimos.


发表评论