Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-53214

Publication date:
27/12/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> vfio/pci: Properly hide first-in-list PCIe extended capability<br /> <br /> There are cases where a PCIe extended capability should be hidden from<br /> the user. For example, an unknown capability (i.e., capability with ID<br /> greater than PCI_EXT_CAP_ID_MAX) or a capability that is intentionally<br /> chosen to be hidden from the user.<br /> <br /> Hiding a capability is done by virtualizing and modifying the &amp;#39;Next<br /> Capability Offset&amp;#39; field of the previous capability so it points to the<br /> capability after the one that should be hidden.<br /> <br /> The special case where the first capability in the list should be hidden<br /> is handled differently because there is no previous capability that can<br /> be modified. In this case, the capability ID and version are zeroed<br /> while leaving the next pointer intact. This hides the capability and<br /> leaves an anchor for the rest of the capability list.<br /> <br /> However, today, hiding the first capability in the list is not done<br /> properly if the capability is unknown, as struct<br /> vfio_pci_core_device-&gt;pci_config_map is set to the capability ID during<br /> initialization but the capability ID is not properly checked later when<br /> used in vfio_config_do_rw(). This leads to the following warning [1] and<br /> to an out-of-bounds access to ecap_perms array.<br /> <br /> Fix it by checking cap_id in vfio_config_do_rw(), and if it is greater<br /> than PCI_EXT_CAP_ID_MAX, use an alternative struct perm_bits for direct<br /> read only access instead of the ecap_perms array.<br /> <br /> Note that this is safe since the above is the only case where cap_id can<br /> exceed PCI_EXT_CAP_ID_MAX (except for the special capabilities, which<br /> are already checked before).<br /> <br /> [1]<br /> <br /> WARNING: CPU: 118 PID: 5329 at drivers/vfio/pci/vfio_pci_config.c:1900 vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]<br /> CPU: 118 UID: 0 PID: 5329 Comm: simx-qemu-syste Not tainted 6.12.0+ #1<br /> (snip)<br /> Call Trace:<br /> <br /> ? show_regs+0x69/0x80<br /> ? __warn+0x8d/0x140<br /> ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]<br /> ? report_bug+0x18f/0x1a0<br /> ? handle_bug+0x63/0xa0<br /> ? exc_invalid_op+0x19/0x70<br /> ? asm_exc_invalid_op+0x1b/0x20<br /> ? vfio_pci_config_rw+0x395/0x430 [vfio_pci_core]<br /> ? vfio_pci_config_rw+0x244/0x430 [vfio_pci_core]<br /> vfio_pci_rw+0x101/0x1b0 [vfio_pci_core]<br /> vfio_pci_core_read+0x1d/0x30 [vfio_pci_core]<br /> vfio_device_fops_read+0x27/0x40 [vfio]<br /> vfs_read+0xbd/0x340<br /> ? vfio_device_fops_unl_ioctl+0xbb/0x740 [vfio]<br /> ? __rseq_handle_notify_resume+0xa4/0x4b0<br /> __x64_sys_pread64+0x96/0xc0<br /> x64_sys_call+0x1c3d/0x20d0<br /> do_syscall_64+0x4d/0x120<br /> entry_SYSCALL_64_after_hwframe+0x76/0x7e
Severity CVSS v4.0: Pending analysis
Last modification:
27/12/2024

CVE-2024-53219

Publication date:
27/12/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> virtiofs: use pages instead of pointer for kernel direct IO<br /> <br /> When trying to insert a 10MB kernel module kept in a virtio-fs with cache<br /> disabled, the following warning was reported:<br /> <br /> ------------[ cut here ]------------<br /> WARNING: CPU: 1 PID: 404 at mm/page_alloc.c:4551 ......<br /> Modules linked in:<br /> CPU: 1 PID: 404 Comm: insmod Not tainted 6.9.0-rc5+ #123<br /> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996) ......<br /> RIP: 0010:__alloc_pages+0x2bf/0x380<br /> ......<br /> Call Trace:<br /> <br /> ? __warn+0x8e/0x150<br /> ? __alloc_pages+0x2bf/0x380<br /> __kmalloc_large_node+0x86/0x160<br /> __kmalloc+0x33c/0x480<br /> virtio_fs_enqueue_req+0x240/0x6d0<br /> virtio_fs_wake_pending_and_unlock+0x7f/0x190<br /> queue_request_and_unlock+0x55/0x60<br /> fuse_simple_request+0x152/0x2b0<br /> fuse_direct_io+0x5d2/0x8c0<br /> fuse_file_read_iter+0x121/0x160<br /> __kernel_read+0x151/0x2d0<br /> kernel_read+0x45/0x50<br /> kernel_read_file+0x1a9/0x2a0<br /> init_module_from_file+0x6a/0xe0<br /> idempotent_init_module+0x175/0x230<br /> __x64_sys_finit_module+0x5d/0xb0<br /> x64_sys_call+0x1c3/0x9e0<br /> do_syscall_64+0x3d/0xc0<br /> entry_SYSCALL_64_after_hwframe+0x4b/0x53<br /> ......<br /> <br /> ---[ end trace 0000000000000000 ]---<br /> <br /> The warning is triggered as follows:<br /> <br /> 1) syscall finit_module() handles the module insertion and it invokes<br /> kernel_read_file() to read the content of the module first.<br /> <br /> 2) kernel_read_file() allocates a 10MB buffer by using vmalloc() and<br /> passes it to kernel_read(). kernel_read() constructs a kvec iter by<br /> using iov_iter_kvec() and passes it to fuse_file_read_iter().<br /> <br /> 3) virtio-fs disables the cache, so fuse_file_read_iter() invokes<br /> fuse_direct_io(). As for now, the maximal read size for kvec iter is<br /> only limited by fc-&gt;max_read. For virtio-fs, max_read is UINT_MAX, so<br /> fuse_direct_io() doesn&amp;#39;t split the 10MB buffer. It saves the address and<br /> the size of the 10MB-sized buffer in out_args[0] of a fuse request and<br /> passes the fuse request to virtio_fs_wake_pending_and_unlock().<br /> <br /> 4) virtio_fs_wake_pending_and_unlock() uses virtio_fs_enqueue_req() to<br /> queue the request. Because virtiofs need DMA-able address, so<br /> virtio_fs_enqueue_req() uses kmalloc() to allocate a bounce buffer for<br /> all fuse args, copies these args into the bounce buffer and passed the<br /> physical address of the bounce buffer to virtiofsd. The total length of<br /> these fuse args for the passed fuse request is about 10MB, so<br /> copy_args_to_argbuf() invokes kmalloc() with a 10MB size parameter and<br /> it triggers the warning in __alloc_pages():<br /> <br /> if (WARN_ON_ONCE_GFP(order &gt; MAX_PAGE_ORDER, gfp))<br /> return NULL;<br /> <br /> 5) virtio_fs_enqueue_req() will retry the memory allocation in a<br /> kworker, but it won&amp;#39;t help, because kmalloc() will always return NULL<br /> due to the abnormal size and finit_module() will hang forever.<br /> <br /> A feasible solution is to limit the value of max_read for virtio-fs, so<br /> the length passed to kmalloc() will be limited. However it will affect<br /> the maximal read size for normal read. And for virtio-fs write initiated<br /> from kernel, it has the similar problem but now there is no way to limit<br /> fc-&gt;max_write in kernel.<br /> <br /> So instead of limiting both the values of max_read and max_write in<br /> kernel, introducing use_pages_for_kvec_io in fuse_conn and setting it as<br /> true in virtiofs. When use_pages_for_kvec_io is enabled, fuse will use<br /> pages instead of pointer to pass the KVEC_IO data.<br /> <br /> After switching to pages for KVEC_IO data, these pages will be used for<br /> DMA through virtio-fs. If these pages are backed by vmalloc(),<br /> {flush|invalidate}_kernel_vmap_range() are necessary to flush or<br /> invalidate the cache before the DMA operation. So add two new fields in<br /> fuse_args_pages to record the base address of vmalloc area and the<br /> condition indicating whether invalidation is needed. Perform the flush<br /> in fuse_get_user_pages() for write operations and the invalidation in<br /> fuse_release_user_pages() for read operations.<br /> <br /> It may seem necessary to introduce another fie<br /> ---truncated---
Severity CVSS v4.0: Pending analysis
Last modification:
27/12/2024

CVE-2024-53218

Publication date:
27/12/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> f2fs: fix race in concurrent f2fs_stop_gc_thread<br /> <br /> In my test case, concurrent calls to f2fs shutdown report the following<br /> stack trace:<br /> <br /> Oops: general protection fault, probably for non-canonical address 0xc6cfff63bb5513fc: 0000 [#1] PREEMPT SMP PTI<br /> CPU: 0 UID: 0 PID: 678 Comm: f2fs_rep_shutdo Not tainted 6.12.0-rc5-next-20241029-g6fb2fa9805c5-dirty #85<br /> Call Trace:<br /> <br /> ? show_regs+0x8b/0xa0<br /> ? __die_body+0x26/0xa0<br /> ? die_addr+0x54/0x90<br /> ? exc_general_protection+0x24b/0x5c0<br /> ? asm_exc_general_protection+0x26/0x30<br /> ? kthread_stop+0x46/0x390<br /> f2fs_stop_gc_thread+0x6c/0x110<br /> f2fs_do_shutdown+0x309/0x3a0<br /> f2fs_ioc_shutdown+0x150/0x1c0<br /> __f2fs_ioctl+0xffd/0x2ac0<br /> f2fs_ioctl+0x76/0xe0<br /> vfs_ioctl+0x23/0x60<br /> __x64_sys_ioctl+0xce/0xf0<br /> x64_sys_call+0x2b1b/0x4540<br /> do_syscall_64+0xa7/0x240<br /> entry_SYSCALL_64_after_hwframe+0x76/0x7e<br /> <br /> The root cause is a race condition in f2fs_stop_gc_thread() called from<br /> different f2fs shutdown paths:<br /> <br /> [CPU0] [CPU1]<br /> ---------------------- -----------------------<br /> f2fs_stop_gc_thread f2fs_stop_gc_thread<br /> gc_th = sbi-&gt;gc_thread<br /> gc_th = sbi-&gt;gc_thread<br /> kfree(gc_th)<br /> sbi-&gt;gc_thread = NULL<br /> <br /> kthread_stop(gc_th-&gt;f2fs_gc_task) //UAF<br /> <br /> The commit c7f114d864ac ("f2fs: fix to avoid use-after-free in<br /> f2fs_stop_gc_thread()") attempted to fix this issue by using a read<br /> semaphore to prevent races between shutdown and remount threads, but<br /> it fails to prevent all race conditions.<br /> <br /> Fix it by converting to write lock of s_umount in f2fs_do_shutdown().
Severity CVSS v4.0: Pending analysis
Last modification:
24/03/2025

CVE-2024-53216

Publication date:
27/12/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> nfsd: release svc_expkey/svc_export with rcu_work<br /> <br /> The last reference for `cache_head` can be reduced to zero in `c_show`<br /> and `e_show`(using `rcu_read_lock` and `rcu_read_unlock`). Consequently,<br /> `svc_export_put` and `expkey_put` will be invoked, leading to two<br /> issues:<br /> <br /> 1. The `svc_export_put` will directly free ex_uuid. However,<br /> `e_show`/`c_show` will access `ex_uuid` after `cache_put`, which can<br /> trigger a use-after-free issue, shown below.<br /> <br /> ==================================================================<br /> BUG: KASAN: slab-use-after-free in svc_export_show+0x362/0x430 [nfsd]<br /> Read of size 1 at addr ff11000010fdc120 by task cat/870<br /> <br /> CPU: 1 UID: 0 PID: 870 Comm: cat Not tainted 6.12.0-rc3+ #1<br /> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS<br /> 1.16.1-2.fc37 04/01/2014<br /> Call Trace:<br /> <br /> dump_stack_lvl+0x53/0x70<br /> print_address_description.constprop.0+0x2c/0x3a0<br /> print_report+0xb9/0x280<br /> kasan_report+0xae/0xe0<br /> svc_export_show+0x362/0x430 [nfsd]<br /> c_show+0x161/0x390 [sunrpc]<br /> seq_read_iter+0x589/0x770<br /> seq_read+0x1e5/0x270<br /> proc_reg_read+0xe1/0x140<br /> vfs_read+0x125/0x530<br /> ksys_read+0xc1/0x160<br /> do_syscall_64+0x5f/0x170<br /> entry_SYSCALL_64_after_hwframe+0x76/0x7e<br /> <br /> Allocated by task 830:<br /> kasan_save_stack+0x20/0x40<br /> kasan_save_track+0x14/0x30<br /> __kasan_kmalloc+0x8f/0xa0<br /> __kmalloc_node_track_caller_noprof+0x1bc/0x400<br /> kmemdup_noprof+0x22/0x50<br /> svc_export_parse+0x8a9/0xb80 [nfsd]<br /> cache_do_downcall+0x71/0xa0 [sunrpc]<br /> cache_write_procfs+0x8e/0xd0 [sunrpc]<br /> proc_reg_write+0xe1/0x140<br /> vfs_write+0x1a5/0x6d0<br /> ksys_write+0xc1/0x160<br /> do_syscall_64+0x5f/0x170<br /> entry_SYSCALL_64_after_hwframe+0x76/0x7e<br /> <br /> Freed by task 868:<br /> kasan_save_stack+0x20/0x40<br /> kasan_save_track+0x14/0x30<br /> kasan_save_free_info+0x3b/0x60<br /> __kasan_slab_free+0x37/0x50<br /> kfree+0xf3/0x3e0<br /> svc_export_put+0x87/0xb0 [nfsd]<br /> cache_purge+0x17f/0x1f0 [sunrpc]<br /> nfsd_destroy_serv+0x226/0x2d0 [nfsd]<br /> nfsd_svc+0x125/0x1e0 [nfsd]<br /> write_threads+0x16a/0x2a0 [nfsd]<br /> nfsctl_transaction_write+0x74/0xa0 [nfsd]<br /> vfs_write+0x1a5/0x6d0<br /> ksys_write+0xc1/0x160<br /> do_syscall_64+0x5f/0x170<br /> entry_SYSCALL_64_after_hwframe+0x76/0x7e<br /> <br /> 2. We cannot sleep while using `rcu_read_lock`/`rcu_read_unlock`.<br /> However, `svc_export_put`/`expkey_put` will call path_put, which<br /> subsequently triggers a sleeping operation due to the following<br /> `dput`.<br /> <br /> =============================<br /> WARNING: suspicious RCU usage<br /> 5.10.0-dirty #141 Not tainted<br /> -----------------------------<br /> ...<br /> Call Trace:<br /> dump_stack+0x9a/0xd0<br /> ___might_sleep+0x231/0x240<br /> dput+0x39/0x600<br /> path_put+0x1b/0x30<br /> svc_export_put+0x17/0x80<br /> e_show+0x1c9/0x200<br /> seq_read_iter+0x63f/0x7c0<br /> seq_read+0x226/0x2d0<br /> vfs_read+0x113/0x2c0<br /> ksys_read+0xc9/0x170<br /> do_syscall_64+0x33/0x40<br /> entry_SYSCALL_64_after_hwframe+0x67/0xd1<br /> <br /> Fix these issues by using `rcu_work` to help release<br /> `svc_expkey`/`svc_export`. This approach allows for an asynchronous<br /> context to invoke `path_put` and also facilitates the freeing of<br /> `uuid/exp/key` after an RCU grace period.
Severity CVSS v4.0: Pending analysis
Last modification:
24/03/2025

CVE-2024-53207

Publication date:
27/12/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> Bluetooth: MGMT: Fix possible deadlocks<br /> <br /> This fixes possible deadlocks like the following caused by<br /> hci_cmd_sync_dequeue causing the destroy function to run:<br /> <br /> INFO: task kworker/u19:0:143 blocked for more than 120 seconds.<br /> Tainted: G W O 6.8.0-2024-03-19-intel-next-iLS-24ww14 #1<br /> "echo 0 &gt; /proc/sys/kernel/hung_task_timeout_secs" disables this message.<br /> task:kworker/u19:0 state:D stack:0 pid:143 tgid:143 ppid:2 flags:0x00004000<br /> Workqueue: hci0 hci_cmd_sync_work [bluetooth]<br /> Call Trace:<br /> <br /> __schedule+0x374/0xaf0<br /> schedule+0x3c/0xf0<br /> schedule_preempt_disabled+0x1c/0x30<br /> __mutex_lock.constprop.0+0x3ef/0x7a0<br /> __mutex_lock_slowpath+0x13/0x20<br /> mutex_lock+0x3c/0x50<br /> mgmt_set_connectable_complete+0xa4/0x150 [bluetooth]<br /> ? kfree+0x211/0x2a0<br /> hci_cmd_sync_dequeue+0xae/0x130 [bluetooth]<br /> ? __pfx_cmd_complete_rsp+0x10/0x10 [bluetooth]<br /> cmd_complete_rsp+0x26/0x80 [bluetooth]<br /> mgmt_pending_foreach+0x4d/0x70 [bluetooth]<br /> __mgmt_power_off+0x8d/0x180 [bluetooth]<br /> ? _raw_spin_unlock_irq+0x23/0x40<br /> hci_dev_close_sync+0x445/0x5b0 [bluetooth]<br /> hci_set_powered_sync+0x149/0x250 [bluetooth]<br /> set_powered_sync+0x24/0x60 [bluetooth]<br /> hci_cmd_sync_work+0x90/0x150 [bluetooth]<br /> process_one_work+0x13e/0x300<br /> worker_thread+0x2f7/0x420<br /> ? __pfx_worker_thread+0x10/0x10<br /> kthread+0x107/0x140<br /> ? __pfx_kthread+0x10/0x10<br /> ret_from_fork+0x3d/0x60<br /> ? __pfx_kthread+0x10/0x10<br /> ret_from_fork_asm+0x1b/0x30<br />
Severity CVSS v4.0: Pending analysis
Last modification:
08/01/2025

CVE-2024-53210

Publication date:
27/12/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> s390/iucv: MSG_PEEK causes memory leak in iucv_sock_destruct()<br /> <br /> Passing MSG_PEEK flag to skb_recv_datagram() increments skb refcount<br /> (skb-&gt;users) and iucv_sock_recvmsg() does not decrement skb refcount<br /> at exit.<br /> This results in skb memory leak in skb_queue_purge() and WARN_ON in<br /> iucv_sock_destruct() during socket close. To fix this decrease<br /> skb refcount by one if MSG_PEEK is set in order to prevent memory<br /> leak and WARN_ON.<br /> <br /> WARNING: CPU: 2 PID: 6292 at net/iucv/af_iucv.c:286 iucv_sock_destruct+0x144/0x1a0 [af_iucv]<br /> CPU: 2 PID: 6292 Comm: afiucv_test_msg Kdump: loaded Tainted: G W 6.10.0-rc7 #1<br /> Hardware name: IBM 3931 A01 704 (z/VM 7.3.0)<br /> Call Trace:<br /> [] iucv_sock_destruct+0x148/0x1a0 [af_iucv]<br /> [] iucv_sock_destruct+0x80/0x1a0 [af_iucv]<br /> [] __sk_destruct+0x52/0x550<br /> [] __sock_release+0xa4/0x230<br /> [] sock_close+0x2c/0x40<br /> [] __fput+0x2e8/0x970<br /> [] task_work_run+0x1c4/0x2c0<br /> [] do_exit+0x996/0x1050<br /> [] do_group_exit+0x13a/0x360<br /> [] __s390x_sys_exit_group+0x56/0x60<br /> [] do_syscall+0x27a/0x380<br /> [] __do_syscall+0x9c/0x160<br /> [] system_call+0x70/0x98<br /> Last Breaking-Event-Address:<br /> [] iucv_sock_destruct+0x84/0x1a0 [af_iucv]
Severity CVSS v4.0: Pending analysis
Last modification:
14/01/2025

CVE-2024-53206

Publication date:
27/12/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> tcp: Fix use-after-free of nreq in reqsk_timer_handler().<br /> <br /> The cited commit replaced inet_csk_reqsk_queue_drop_and_put() with<br /> __inet_csk_reqsk_queue_drop() and reqsk_put() in reqsk_timer_handler().<br /> <br /> Then, oreq should be passed to reqsk_put() instead of req; otherwise<br /> use-after-free of nreq could happen when reqsk is migrated but the<br /> retry attempt failed (e.g. due to timeout).<br /> <br /> Let&amp;#39;s pass oreq to reqsk_put().
Severity CVSS v4.0: Pending analysis
Last modification:
11/02/2025

CVE-2024-53208

Publication date:
27/12/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> Bluetooth: MGMT: Fix slab-use-after-free Read in set_powered_sync<br /> <br /> This fixes the following crash:<br /> <br /> ==================================================================<br /> BUG: KASAN: slab-use-after-free in set_powered_sync+0x3a/0xc0 net/bluetooth/mgmt.c:1353<br /> Read of size 8 at addr ffff888029b4dd18 by task kworker/u9:0/54<br /> <br /> CPU: 1 UID: 0 PID: 54 Comm: kworker/u9:0 Not tainted 6.11.0-rc6-syzkaller-01155-gf723224742fc #0<br /> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024<br /> Workqueue: hci0 hci_cmd_sync_work<br /> Call Trace:<br /> <br /> __dump_stack lib/dump_stack.c:93 [inline]<br /> dump_stack_lvl+0x241/0x360 lib/dump_stack.c:119<br /> print_address_description mm/kasan/report.c:377 [inline]<br /> print_report+0x169/0x550 mm/kasan/report.c:488<br /> q kasan_report+0x143/0x180 mm/kasan/report.c:601<br /> set_powered_sync+0x3a/0xc0 net/bluetooth/mgmt.c:1353<br /> hci_cmd_sync_work+0x22b/0x400 net/bluetooth/hci_sync.c:328<br /> process_one_work kernel/workqueue.c:3231 [inline]<br /> process_scheduled_works+0xa2c/0x1830 kernel/workqueue.c:3312<br /> worker_thread+0x86d/0xd10 kernel/workqueue.c:3389<br /> kthread+0x2f0/0x390 kernel/kthread.c:389<br /> ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147<br /> ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244<br /> <br /> <br /> Allocated by task 5247:<br /> kasan_save_stack mm/kasan/common.c:47 [inline]<br /> kasan_save_track+0x3f/0x80 mm/kasan/common.c:68<br /> poison_kmalloc_redzone mm/kasan/common.c:370 [inline]<br /> __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:387<br /> kasan_kmalloc include/linux/kasan.h:211 [inline]<br /> __kmalloc_cache_noprof+0x19c/0x2c0 mm/slub.c:4193<br /> kmalloc_noprof include/linux/slab.h:681 [inline]<br /> kzalloc_noprof include/linux/slab.h:807 [inline]<br /> mgmt_pending_new+0x65/0x250 net/bluetooth/mgmt_util.c:269<br /> mgmt_pending_add+0x36/0x120 net/bluetooth/mgmt_util.c:296<br /> set_powered+0x3cd/0x5e0 net/bluetooth/mgmt.c:1394<br /> hci_mgmt_cmd+0xc47/0x11d0 net/bluetooth/hci_sock.c:1712<br /> hci_sock_sendmsg+0x7b8/0x11c0 net/bluetooth/hci_sock.c:1832<br /> sock_sendmsg_nosec net/socket.c:730 [inline]<br /> __sock_sendmsg+0x221/0x270 net/socket.c:745<br /> sock_write_iter+0x2dd/0x400 net/socket.c:1160<br /> new_sync_write fs/read_write.c:497 [inline]<br /> vfs_write+0xa72/0xc90 fs/read_write.c:590<br /> ksys_write+0x1a0/0x2c0 fs/read_write.c:643<br /> do_syscall_x64 arch/x86/entry/common.c:52 [inline]<br /> do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83<br /> entry_SYSCALL_64_after_hwframe+0x77/0x7f<br /> <br /> Freed by task 5246:<br /> kasan_save_stack mm/kasan/common.c:47 [inline]<br /> kasan_save_track+0x3f/0x80 mm/kasan/common.c:68<br /> kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:579<br /> poison_slab_object+0xe0/0x150 mm/kasan/common.c:240<br /> __kasan_slab_free+0x37/0x60 mm/kasan/common.c:256<br /> kasan_slab_free include/linux/kasan.h:184 [inline]<br /> slab_free_hook mm/slub.c:2256 [inline]<br /> slab_free mm/slub.c:4477 [inline]<br /> kfree+0x149/0x360 mm/slub.c:4598<br /> settings_rsp+0x2bc/0x390 net/bluetooth/mgmt.c:1443<br /> mgmt_pending_foreach+0xd1/0x130 net/bluetooth/mgmt_util.c:259<br /> __mgmt_power_off+0x112/0x420 net/bluetooth/mgmt.c:9455<br /> hci_dev_close_sync+0x665/0x11a0 net/bluetooth/hci_sync.c:5191<br /> hci_dev_do_close net/bluetooth/hci_core.c:483 [inline]<br /> hci_dev_close+0x112/0x210 net/bluetooth/hci_core.c:508<br /> sock_do_ioctl+0x158/0x460 net/socket.c:1222<br /> sock_ioctl+0x629/0x8e0 net/socket.c:1341<br /> vfs_ioctl fs/ioctl.c:51 [inline]<br /> __do_sys_ioctl fs/ioctl.c:907 [inline]<br /> __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:893<br /> do_syscall_x64 arch/x86/entry/common.c:52 [inline]<br /> do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83gv<br /> entry_SYSCALL_64_after_hwframe+0x77/0x7f
Severity CVSS v4.0: Pending analysis
Last modification:
06/03/2025

CVE-2024-53204

Publication date:
27/12/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> phy: realtek: usb: fix NULL deref in rtk_usb3phy_probe<br /> <br /> In rtk_usb3phy_probe() devm_kzalloc() may return NULL<br /> but this returned value is not checked.
Severity CVSS v4.0: Pending analysis
Last modification:
18/04/2025

CVE-2024-53205

Publication date:
27/12/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> phy: realtek: usb: fix NULL deref in rtk_usb2phy_probe<br /> <br /> In rtk_usb2phy_probe() devm_kzalloc() may return NULL<br /> but this returned value is not checked.
Severity CVSS v4.0: Pending analysis
Last modification:
18/04/2025

CVE-2024-53209

Publication date:
27/12/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bnxt_en: Fix receive ring space parameters when XDP is active<br /> <br /> The MTU setting at the time an XDP multi-buffer is attached<br /> determines whether the aggregation ring will be used and the<br /> rx_skb_func handler. This is done in bnxt_set_rx_skb_mode().<br /> <br /> If the MTU is later changed, the aggregation ring setting may need<br /> to be changed and it may become out-of-sync with the settings<br /> initially done in bnxt_set_rx_skb_mode(). This may result in<br /> random memory corruption and crashes as the HW may DMA data larger<br /> than the allocated buffer size, such as:<br /> <br /> BUG: kernel NULL pointer dereference, address: 00000000000003c0<br /> PGD 0 P4D 0<br /> Oops: 0000 [#1] PREEMPT SMP NOPTI<br /> CPU: 17 PID: 0 Comm: swapper/17 Kdump: loaded Tainted: G S OE 6.1.0-226bf9805506 #1<br /> Hardware name: Wiwynn Delta Lake PVT BZA.02601.0150/Delta Lake-Class1, BIOS F0E_3A12 08/26/2021<br /> RIP: 0010:bnxt_rx_pkt+0xe97/0x1ae0 [bnxt_en]<br /> Code: 8b 95 70 ff ff ff 4c 8b 9d 48 ff ff ff 66 41 89 87 b4 00 00 00 e9 0b f7 ff ff 0f b7 43 0a 49 8b 95 a8 04 00 00 25 ff 0f 00 00 b7 14 42 48 c1 e2 06 49 03 95 a0 04 00 00 0f b6 42 33f<br /> RSP: 0018:ffffa19f40cc0d18 EFLAGS: 00010202<br /> RAX: 00000000000001e0 RBX: ffff8e2c805c6100 RCX: 00000000000007ff<br /> RDX: 0000000000000000 RSI: ffff8e2c271ab990 RDI: ffff8e2c84f12380<br /> RBP: ffffa19f40cc0e48 R08: 000000000001000d R09: 974ea2fcddfa4cbf<br /> R10: 0000000000000000 R11: ffffa19f40cc0ff8 R12: ffff8e2c94b58980<br /> R13: ffff8e2c952d6600 R14: 0000000000000016 R15: ffff8e2c271ab990<br /> FS: 0000000000000000(0000) GS:ffff8e3b3f840000(0000) knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: 00000000000003c0 CR3: 0000000e8580a004 CR4: 00000000007706e0<br /> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br /> DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400<br /> PKRU: 55555554<br /> Call Trace:<br /> <br /> __bnxt_poll_work+0x1c2/0x3e0 [bnxt_en]<br /> <br /> To address the issue, we now call bnxt_set_rx_skb_mode() within<br /> bnxt_change_mtu() to properly set the AGG rings configuration and<br /> update rx_skb_func based on the new MTU value.<br /> Additionally, BNXT_FLAG_NO_AGG_RINGS is cleared at the beginning of<br /> bnxt_set_rx_skb_mode() to make sure it gets set or cleared based on<br /> the current MTU.
Severity CVSS v4.0: Pending analysis
Last modification:
22/05/2025

CVE-2024-53203

Publication date:
27/12/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> usb: typec: fix potential array underflow in ucsi_ccg_sync_control()<br /> <br /> The "command" variable can be controlled by the user via debugfs. The<br /> worry is that if con_index is zero then "&amp;uc-&gt;ucsi-&gt;connector[con_index<br /> - 1]" would be an array underflow.
Severity CVSS v4.0: Pending analysis
Last modification:
04/06/2025