Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-40259

Опубликовано: 04 дек. 2025
Источник: debian

Описание

In the Linux kernel, the following vulnerability has been resolved: scsi: sg: Do not sleep in atomic context sg_finish_rem_req() calls blk_rq_unmap_user(). The latter function may sleep. Hence, call sg_finish_rem_req() with interrupts enabled instead of disabled.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed6.17.10-1package
linuxfixed6.12.63-1trixiepackage
linuxfixed6.1.159-1bookwormpackage

Примечания

  • https://git.kernel.org/linus/90449f2d1e1f020835cba5417234636937dd657e (6.18-rc7)

Связанные уязвимости

ubuntu
2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: scsi: sg: Do not sleep in atomic context sg_finish_rem_req() calls blk_rq_unmap_user(). The latter function may sleep. Hence, call sg_finish_rem_req() with interrupts enabled instead of disabled.

nvd
2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: scsi: sg: Do not sleep in atomic context sg_finish_rem_req() calls blk_rq_unmap_user(). The latter function may sleep. Hence, call sg_finish_rem_req() with interrupts enabled instead of disabled.

CVSS3: 6.2
msrc
2 месяца назад

scsi: sg: Do not sleep in atomic context

github
2 месяца назад

In the Linux kernel, the following vulnerability has been resolved: scsi: sg: Do not sleep in atomic context sg_finish_rem_req() calls blk_rq_unmap_user(). The latter function may sleep. Hence, call sg_finish_rem_req() with interrupts enabled instead of disabled.

CVSS3: 7
fstec
3 месяца назад

Уязвимость функции sg_finish_rem_req() модуля drivers/scsi/sg.c драйвера поддержки устройств SCSI ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании