CVE-2025-39801 (CNNVD-202509-2073)

UNKNOWN
中文标题:
Linux kernel 安全漏洞
英文标题:
usb: dwc3: Remove WARN_ON for device endpoint command timeouts
CVSS分数: N/A
发布时间: 2025-09-15 12:36:43
漏洞类型: 其他
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v5
漏洞描述
中文描述:

Linux kernel是美国Linux基金会的开源操作系统Linux所使用的内核。 Linux kernel存在安全漏洞,该漏洞源于设备端点命令超时导致内核恐慌,可能在不必要的调用跟踪打印时触发。

英文描述:

In the Linux kernel, the following vulnerability has been resolved: usb: dwc3: Remove WARN_ON for device endpoint command timeouts This commit addresses a rarely observed endpoint command timeout which causes kernel panic due to warn when 'panic_on_warn' is enabled and unnecessary call trace prints when 'panic_on_warn' is disabled. It is seen during fast software-controlled connect/disconnect testcases. The following is one such endpoint command timeout that we observed: 1. Connect ======= ->dwc3_thread_interrupt ->dwc3_ep0_interrupt ->configfs_composite_setup ->composite_setup ->usb_ep_queue ->dwc3_gadget_ep0_queue ->__dwc3_gadget_ep0_queue ->__dwc3_ep0_do_control_data ->dwc3_send_gadget_ep_cmd 2. Disconnect ========== ->dwc3_thread_interrupt ->dwc3_gadget_disconnect_interrupt ->dwc3_ep0_reset_state ->dwc3_ep0_end_control_data ->dwc3_send_gadget_ep_cmd In the issue scenario, in Exynos platforms, we observed that control transfers for the previous connect have not yet been completed and end transfer command sent as a part of the disconnect sequence and processing of USB_ENDPOINT_HALT feature request from the host timeout. This maybe an expected scenario since the controller is processing EP commands sent as a part of the previous connect. It maybe better to remove WARN_ON in all places where device endpoint commands are sent to avoid unnecessary kernel panic due to warn.

CWE类型:
CWE-617
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
Linux Linux - < dfe40159eec6ca63b40133bfa783eee2e3ed829f - cpe:2.3:a:linux:linux:*:*:*:*:*:*:*:*
Linux Linux 3.2 - - cpe:2.3:a:linux:linux:3.2:*:*:*:*:*:*:*
linux linux_kernel * - - cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
linux linux_kernel 6.17 - - cpe:2.3:o:linux:linux_kernel:6.17:rc1:*:*:*:*:*:*
debian debian_linux 11.0 - - cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
无标题 OTHER
cve.org
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
CVSS评分详情
暂无CVSS评分信息
时间信息
发布时间:
2025-09-15 12:36:43
修改时间:
2025-11-03 17:43:31
创建时间:
2025-11-11 15:40:29
更新时间:
2026-01-24 06:00:18
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2025-39801 2025-11-11 15:23:19 2025-11-11 07:40:29
NVD nvd_CVE-2025-39801 2025-11-11 15:01:02 2025-11-11 07:48:18
CNNVD cnnvd_CNNVD-202509-2073 2025-11-11 15:12:57 2025-11-11 08:00:11
版本与语言
当前版本: v5
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v5 NVD
2026-01-24 06:00:18
affected_products_count: 2 → 5
查看详细变更
  • affected_products_count: 2 -> 5
v4 CVE
2026-01-12 02:11:42
affected_products_count: 1 → 2
查看详细变更
  • affected_products_count: 1 -> 2
v3 CNNVD
2025-11-11 16:00:11
vulnerability_type: 未提取 → 其他; severity: SeverityLevel.MEDIUM → SeverityLevel.UNKNOWN; cvss_score: 未提取 → 0.0; cnnvd_id: 未提取 → CNNVD-202509-2073; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 其他
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.UNKNOWN
  • cvss_score: 未提取 -> 0.0
  • cnnvd_id: 未提取 -> CNNVD-202509-2073
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:48:18
affected_products_count: 7 → 1; references_count: 6 → 7; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • affected_products_count: 7 -> 1
  • references_count: 6 -> 7
  • data_sources: ['cve'] -> ['cve', 'nvd']