Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-53111

Publication date:
02/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> loop: Fix use-after-free issues<br /> <br /> do_req_filebacked() calls blk_mq_complete_request() synchronously or<br /> asynchronously when using asynchronous I/O unless memory allocation fails.<br /> Hence, modify loop_handle_cmd() such that it does not dereference &amp;#39;cmd&amp;#39; nor<br /> &amp;#39;rq&amp;#39; after do_req_filebacked() finished unless we are sure that the request<br /> has not yet been completed. This patch fixes the following kernel crash:<br /> <br /> Unable to handle kernel NULL pointer dereference at virtual address 0000000000000054<br /> Call trace:<br /> css_put.42938+0x1c/0x1ac<br /> loop_process_work+0xc8c/0xfd4<br /> loop_rootcg_workfn+0x24/0x34<br /> process_one_work+0x244/0x558<br /> worker_thread+0x400/0x8fc<br /> kthread+0x16c/0x1e0<br /> ret_from_fork+0x10/0x20
Severity CVSS v4.0: Pending analysis
Last modification:
10/11/2025

CVE-2023-53104

Publication date:
02/05/2025
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: Pending analysis
Last modification:
08/05/2025

CVE-2023-53110

Publication date:
02/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net/smc: fix NULL sndbuf_desc in smc_cdc_tx_handler()<br /> <br /> When performing a stress test on SMC-R by rmmod mlx5_ib driver<br /> during the wrk/nginx test, we found that there is a probability<br /> of triggering a panic while terminating all link groups.<br /> <br /> This issue dues to the race between smc_smcr_terminate_all()<br /> and smc_buf_create().<br /> <br /> smc_smcr_terminate_all<br /> <br /> smc_buf_create<br /> /* init */<br /> conn-&gt;sndbuf_desc = NULL;<br /> ...<br /> <br /> __smc_lgr_terminate<br /> smc_conn_kill<br /> smc_close_abort<br /> smc_cdc_get_slot_and_msg_send<br /> <br /> __softirqentry_text_start<br /> smc_wr_tx_process_cqe<br /> smc_cdc_tx_handler<br /> READ(conn-&gt;sndbuf_desc-&gt;len);<br /> /* panic dues to NULL sndbuf_desc */<br /> <br /> conn-&gt;sndbuf_desc = xxx;<br /> <br /> This patch tries to fix the issue by always to check the sndbuf_desc<br /> before send any cdc msg, to make sure that no null pointer is<br /> seen during cqe processing.
Severity CVSS v4.0: Pending analysis
Last modification:
10/11/2025

CVE-2023-53109

Publication date:
02/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: tunnels: annotate lockless accesses to dev-&gt;needed_headroom<br /> <br /> IP tunnels can apparently update dev-&gt;needed_headroom<br /> in their xmit path.<br /> <br /> This patch takes care of three tunnels xmit, and also the<br /> core LL_RESERVED_SPACE() and LL_RESERVED_SPACE_EXTRA()<br /> helpers.<br /> <br /> More changes might be needed for completeness.<br /> <br /> BUG: KCSAN: data-race in ip_tunnel_xmit / ip_tunnel_xmit<br /> <br /> read to 0xffff88815b9da0ec of 2 bytes by task 888 on cpu 1:<br /> ip_tunnel_xmit+0x1270/0x1730 net/ipv4/ip_tunnel.c:803<br /> __gre_xmit net/ipv4/ip_gre.c:469 [inline]<br /> ipgre_xmit+0x516/0x570 net/ipv4/ip_gre.c:661<br /> __netdev_start_xmit include/linux/netdevice.h:4881 [inline]<br /> netdev_start_xmit include/linux/netdevice.h:4895 [inline]<br /> xmit_one net/core/dev.c:3580 [inline]<br /> dev_hard_start_xmit+0x127/0x400 net/core/dev.c:3596<br /> __dev_queue_xmit+0x1007/0x1eb0 net/core/dev.c:4246<br /> dev_queue_xmit include/linux/netdevice.h:3051 [inline]<br /> neigh_direct_output+0x17/0x20 net/core/neighbour.c:1623<br /> neigh_output include/net/neighbour.h:546 [inline]<br /> ip_finish_output2+0x740/0x840 net/ipv4/ip_output.c:228<br /> ip_finish_output+0xf4/0x240 net/ipv4/ip_output.c:316<br /> NF_HOOK_COND include/linux/netfilter.h:291 [inline]<br /> ip_output+0xe5/0x1b0 net/ipv4/ip_output.c:430<br /> dst_output include/net/dst.h:444 [inline]<br /> ip_local_out+0x64/0x80 net/ipv4/ip_output.c:126<br /> iptunnel_xmit+0x34a/0x4b0 net/ipv4/ip_tunnel_core.c:82<br /> ip_tunnel_xmit+0x1451/0x1730 net/ipv4/ip_tunnel.c:813<br /> __gre_xmit net/ipv4/ip_gre.c:469 [inline]<br /> ipgre_xmit+0x516/0x570 net/ipv4/ip_gre.c:661<br /> __netdev_start_xmit include/linux/netdevice.h:4881 [inline]<br /> netdev_start_xmit include/linux/netdevice.h:4895 [inline]<br /> xmit_one net/core/dev.c:3580 [inline]<br /> dev_hard_start_xmit+0x127/0x400 net/core/dev.c:3596<br /> __dev_queue_xmit+0x1007/0x1eb0 net/core/dev.c:4246<br /> dev_queue_xmit include/linux/netdevice.h:3051 [inline]<br /> neigh_direct_output+0x17/0x20 net/core/neighbour.c:1623<br /> neigh_output include/net/neighbour.h:546 [inline]<br /> ip_finish_output2+0x740/0x840 net/ipv4/ip_output.c:228<br /> ip_finish_output+0xf4/0x240 net/ipv4/ip_output.c:316<br /> NF_HOOK_COND include/linux/netfilter.h:291 [inline]<br /> ip_output+0xe5/0x1b0 net/ipv4/ip_output.c:430<br /> dst_output include/net/dst.h:444 [inline]<br /> ip_local_out+0x64/0x80 net/ipv4/ip_output.c:126<br /> iptunnel_xmit+0x34a/0x4b0 net/ipv4/ip_tunnel_core.c:82<br /> ip_tunnel_xmit+0x1451/0x1730 net/ipv4/ip_tunnel.c:813<br /> __gre_xmit net/ipv4/ip_gre.c:469 [inline]<br /> ipgre_xmit+0x516/0x570 net/ipv4/ip_gre.c:661<br /> __netdev_start_xmit include/linux/netdevice.h:4881 [inline]<br /> netdev_start_xmit include/linux/netdevice.h:4895 [inline]<br /> xmit_one net/core/dev.c:3580 [inline]<br /> dev_hard_start_xmit+0x127/0x400 net/core/dev.c:3596<br /> __dev_queue_xmit+0x1007/0x1eb0 net/core/dev.c:4246<br /> dev_queue_xmit include/linux/netdevice.h:3051 [inline]<br /> neigh_direct_output+0x17/0x20 net/core/neighbour.c:1623<br /> neigh_output include/net/neighbour.h:546 [inline]<br /> ip_finish_output2+0x740/0x840 net/ipv4/ip_output.c:228<br /> ip_finish_output+0xf4/0x240 net/ipv4/ip_output.c:316<br /> NF_HOOK_COND include/linux/netfilter.h:291 [inline]<br /> ip_output+0xe5/0x1b0 net/ipv4/ip_output.c:430<br /> dst_output include/net/dst.h:444 [inline]<br /> ip_local_out+0x64/0x80 net/ipv4/ip_output.c:126<br /> iptunnel_xmit+0x34a/0x4b0 net/ipv4/ip_tunnel_core.c:82<br /> ip_tunnel_xmit+0x1451/0x1730 net/ipv4/ip_tunnel.c:813<br /> __gre_xmit net/ipv4/ip_gre.c:469 [inline]<br /> ipgre_xmit+0x516/0x570 net/ipv4/ip_gre.c:661<br /> __netdev_start_xmit include/linux/netdevice.h:4881 [inline]<br /> netdev_start_xmit include/linux/netdevice.h:4895 [inline]<br /> xmit_one net/core/dev.c:3580 [inline]<br /> dev_hard_start_xmit+0x127/0x400 net/core/dev.c:3596<br /> __dev_queue_xmit+0x1007/0x1eb0 net/core/dev.c:4246<br /> dev_queue_xmit include/linux/netdevice.h:3051 [inline]<br /> neigh_direct_output+0x17/0x20 net/core/neighbour.c:1623<br /> neigh_output include/net/neighbour.h:546 [inline]<br /> ip_finish_output2+0x740/0x840 net/ipv4/ip_output.c:228<br /> ip_finish_output+0xf4/0x240 net/ipv4/ip_output.c:316<br /> NF_HOOK_COND include/linux/netfilter.h:291 [inline]<br /> ip_output+0xe5/0x1b0 net/i<br /> ---truncated---
Severity CVSS v4.0: Pending analysis
Last modification:
10/11/2025

CVE-2023-53108

Publication date:
02/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net/iucv: Fix size of interrupt data<br /> <br /> iucv_irq_data needs to be 4 bytes larger.<br /> These bytes are not used by the iucv module, but written by<br /> the z/VM hypervisor in case a CPU is deconfigured.<br /> <br /> Reported as:<br /> BUG dma-kmalloc-64 (Not tainted): kmalloc Redzone overwritten<br /> -----------------------------------------------------------------------------<br /> 0x0000000000400564-0x0000000000400567 @offset=1380. First byte 0x80 instead of 0xcc<br /> Allocated in iucv_cpu_prepare+0x44/0xd0 age=167839 cpu=2 pid=1<br /> __kmem_cache_alloc_node+0x166/0x450<br /> kmalloc_node_trace+0x3a/0x70<br /> iucv_cpu_prepare+0x44/0xd0<br /> cpuhp_invoke_callback+0x156/0x2f0<br /> cpuhp_issue_call+0xf0/0x298<br /> __cpuhp_setup_state_cpuslocked+0x136/0x338<br /> __cpuhp_setup_state+0xf4/0x288<br /> iucv_init+0xf4/0x280<br /> do_one_initcall+0x78/0x390<br /> do_initcalls+0x11a/0x140<br /> kernel_init_freeable+0x25e/0x2a0<br /> kernel_init+0x2e/0x170<br /> __ret_from_fork+0x3c/0x58<br /> ret_from_fork+0xa/0x40<br /> Freed in iucv_init+0x92/0x280 age=167839 cpu=2 pid=1<br /> __kmem_cache_free+0x308/0x358<br /> iucv_init+0x92/0x280<br /> do_one_initcall+0x78/0x390<br /> do_initcalls+0x11a/0x140<br /> kernel_init_freeable+0x25e/0x2a0<br /> kernel_init+0x2e/0x170<br /> __ret_from_fork+0x3c/0x58<br /> ret_from_fork+0xa/0x40<br /> Slab 0x0000037200010000 objects=32 used=30 fp=0x0000000000400640 flags=0x1ffff00000010200(slab|head|node=0|zone=0|<br /> Object 0x0000000000400540 @offset=1344 fp=0x0000000000000000<br /> Redzone 0000000000400500: cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................<br /> Redzone 0000000000400510: cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................<br /> Redzone 0000000000400520: cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................<br /> Redzone 0000000000400530: cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................<br /> Object 0000000000400540: 00 01 00 03 00 00 00 00 00 00 00 00 00 00 00 00 ................<br /> Object 0000000000400550: f3 86 81 f2 f4 82 f8 82 f0 f0 f0 f0 f0 f0 f0 f2 ................<br /> Object 0000000000400560: 00 00 00 00 80 00 00 00 cc cc cc cc cc cc cc cc ................<br /> Object 0000000000400570: cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc ................<br /> Redzone 0000000000400580: cc cc cc cc cc cc cc cc ........<br /> Padding 00000000004005d4: 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ<br /> Padding 00000000004005e4: 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZZZZZ<br /> Padding 00000000004005f4: 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a 5a ZZZZZZZZZZZZ<br /> CPU: 6 PID: 121030 Comm: 116-pai-crypto. Not tainted 6.3.0-20230221.rc0.git4.99b8246b2d71.300.fc37.s390x+debug #1<br /> Hardware name: IBM 3931 A01 704 (z/VM 7.3.0)<br /> Call Trace:<br /> [] dump_stack_lvl+0xac/0x100<br /> [] check_bytes_and_report+0x104/0x140<br /> [] check_object+0x370/0x3c0<br /> [] free_debug_processing+0x15e/0x348<br /> [] free_to_partial_list+0x9a/0x2f0<br /> [] __slab_free+0x1e4/0x3a8<br /> [] __kmem_cache_free+0x308/0x358<br /> [] iucv_cpu_dead+0x6c/0x88<br /> [] cpuhp_invoke_callback+0x156/0x2f0<br /> [] _cpu_down.constprop.0+0x22a/0x5e0<br /> [] cpu_device_down+0x4e/0x78<br /> [] device_offline+0xc8/0x118<br /> [] online_store+0x60/0xe0<br /> [] kernfs_fop_write_iter+0x150/0x1e8<br /> [] vfs_write+0x174/0x360<br /> [] ksys_write+0x74/0x100<br /> [] __do_syscall+0x1da/0x208<br /> [] system_call+0x82/0xb0<br /> INFO: lockdep is turned off.<br /> FIX dma-kmalloc-64: Restoring kmalloc Redzone 0x0000000000400564-0x0000000000400567=0xcc<br /> FIX dma-kmalloc-64: Object at 0x0000000000400540 not freed
Severity CVSS v4.0: Pending analysis
Last modification:
10/11/2025

CVE-2023-53107

Publication date:
02/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> veth: Fix use after free in XDP_REDIRECT<br /> <br /> Commit 718a18a0c8a6 ("veth: Rework veth_xdp_rcv_skb in order<br /> to accept non-linear skb") introduced a bug where it tried to<br /> use pskb_expand_head() if the headroom was less than<br /> XDP_PACKET_HEADROOM. This however uses kmalloc to expand the head,<br /> which will later allow consume_skb() to free the skb while is it still<br /> in use by AF_XDP.<br /> <br /> Previously if the headroom was less than XDP_PACKET_HEADROOM we<br /> continued on to allocate a new skb from pages so this restores that<br /> behavior.<br /> <br /> BUG: KASAN: use-after-free in __xsk_rcv+0x18d/0x2c0<br /> Read of size 78 at addr ffff888976250154 by task napi/iconduit-g/148640<br /> <br /> CPU: 5 PID: 148640 Comm: napi/iconduit-g Kdump: loaded Tainted: G O 6.1.4-cloudflare-kasan-2023.1.2 #1<br /> Hardware name: Quanta Computer Inc. QuantaPlex T41S-2U/S2S-MB, BIOS S2S_3B10.03 06/21/2018<br /> Call Trace:<br /> <br /> dump_stack_lvl+0x34/0x48<br /> print_report+0x170/0x473<br /> ? __xsk_rcv+0x18d/0x2c0<br /> kasan_report+0xad/0x130<br /> ? __xsk_rcv+0x18d/0x2c0<br /> kasan_check_range+0x149/0x1a0<br /> memcpy+0x20/0x60<br /> __xsk_rcv+0x18d/0x2c0<br /> __xsk_map_redirect+0x1f3/0x490<br /> ? veth_xdp_rcv_skb+0x89c/0x1ba0 [veth]<br /> xdp_do_redirect+0x5ca/0xd60<br /> veth_xdp_rcv_skb+0x935/0x1ba0 [veth]<br /> ? __netif_receive_skb_list_core+0x671/0x920<br /> ? veth_xdp+0x670/0x670 [veth]<br /> veth_xdp_rcv+0x304/0xa20 [veth]<br /> ? do_xdp_generic+0x150/0x150<br /> ? veth_xdp_rcv_one+0xde0/0xde0 [veth]<br /> ? _raw_spin_lock_bh+0xe0/0xe0<br /> ? newidle_balance+0x887/0xe30<br /> ? __perf_event_task_sched_in+0xdb/0x800<br /> veth_poll+0x139/0x571 [veth]<br /> ? veth_xdp_rcv+0xa20/0xa20 [veth]<br /> ? _raw_spin_unlock+0x39/0x70<br /> ? finish_task_switch.isra.0+0x17e/0x7d0<br /> ? __switch_to+0x5cf/0x1070<br /> ? __schedule+0x95b/0x2640<br /> ? io_schedule_timeout+0x160/0x160<br /> __napi_poll+0xa1/0x440<br /> napi_threaded_poll+0x3d1/0x460<br /> ? __napi_poll+0x440/0x440<br /> ? __kthread_parkme+0xc6/0x1f0<br /> ? __napi_poll+0x440/0x440<br /> kthread+0x2a2/0x340<br /> ? kthread_complete_and_exit+0x20/0x20<br /> ret_from_fork+0x22/0x30<br /> <br /> <br /> Freed by task 148640:<br /> kasan_save_stack+0x23/0x50<br /> kasan_set_track+0x21/0x30<br /> kasan_save_free_info+0x2a/0x40<br /> ____kasan_slab_free+0x169/0x1d0<br /> slab_free_freelist_hook+0xd2/0x190<br /> __kmem_cache_free+0x1a1/0x2f0<br /> skb_release_data+0x449/0x600<br /> consume_skb+0x9f/0x1c0<br /> veth_xdp_rcv_skb+0x89c/0x1ba0 [veth]<br /> veth_xdp_rcv+0x304/0xa20 [veth]<br /> veth_poll+0x139/0x571 [veth]<br /> __napi_poll+0xa1/0x440<br /> napi_threaded_poll+0x3d1/0x460<br /> kthread+0x2a2/0x340<br /> ret_from_fork+0x22/0x30<br /> <br /> The buggy address belongs to the object at ffff888976250000<br /> which belongs to the cache kmalloc-2k of size 2048<br /> The buggy address is located 340 bytes inside of<br /> 2048-byte region [ffff888976250000, ffff888976250800)<br /> <br /> The buggy address belongs to the physical page:<br /> page:00000000ae18262a refcount:2 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x976250<br /> head:00000000ae18262a order:3 compound_mapcount:0 compound_pincount:0<br /> flags: 0x2ffff800010200(slab|head|node=0|zone=2|lastcpupid=0x1ffff)<br /> raw: 002ffff800010200 0000000000000000 dead000000000122 ffff88810004cf00<br /> raw: 0000000000000000 0000000080080008 00000002ffffffff 0000000000000000<br /> page dumped because: kasan: bad access detected<br /> <br /> Memory state around the buggy address:<br /> ffff888976250000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb<br /> ffff888976250080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb<br /> &gt; ffff888976250100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb<br /> ^<br /> ffff888976250180: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb<br /> ffff888976250200: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
Severity CVSS v4.0: Pending analysis
Last modification:
10/11/2025

CVE-2023-53106

Publication date:
02/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> nfc: st-nci: Fix use after free bug in ndlc_remove due to race condition<br /> <br /> This bug influences both st_nci_i2c_remove and st_nci_spi_remove.<br /> Take st_nci_i2c_remove as an example.<br /> <br /> In st_nci_i2c_probe, it called ndlc_probe and bound &amp;ndlc-&gt;sm_work<br /> with llt_ndlc_sm_work.<br /> <br /> When it calls ndlc_recv or timeout handler, it will finally call<br /> schedule_work to start the work.<br /> <br /> When we call st_nci_i2c_remove to remove the driver, there<br /> may be a sequence as follows:<br /> <br /> Fix it by finishing the work before cleanup in ndlc_remove<br /> <br /> CPU0 CPU1<br /> <br /> |llt_ndlc_sm_work<br /> st_nci_i2c_remove |<br /> ndlc_remove |<br /> st_nci_remove |<br /> nci_free_device|<br /> kfree(ndev) |<br /> //free ndlc-&gt;ndev |<br /> |llt_ndlc_rcv_queue<br /> |nci_recv_frame<br /> |//use ndlc-&gt;ndev
Severity CVSS v4.0: Pending analysis
Last modification:
10/11/2025

CVE-2023-53105

Publication date:
02/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net/mlx5e: Fix cleanup null-ptr deref on encap lock<br /> <br /> During module is unloaded while a peer tc flow is still offloaded,<br /> first the peer uplink rep profile is changed to a nic profile, and so<br /> neigh encap lock is destroyed. Next during unload, the VF reps netdevs<br /> are unregistered which causes the original non-peer tc flow to be deleted,<br /> which deletes the peer flow. The peer flow deletion detaches the encap<br /> entry and try to take the already destroyed encap lock, causing the<br /> below trace.<br /> <br /> Fix this by clearing peer flows during tc eswitch cleanup<br /> (mlx5e_tc_esw_cleanup()).<br /> <br /> Relevant trace:<br /> [ 4316.837128] BUG: kernel NULL pointer dereference, address: 00000000000001d8<br /> [ 4316.842239] RIP: 0010:__mutex_lock+0xb5/0xc40<br /> [ 4316.851897] Call Trace:<br /> [ 4316.852481] <br /> [ 4316.857214] mlx5e_rep_neigh_entry_release+0x93/0x790 [mlx5_core]<br /> [ 4316.858258] mlx5e_rep_encap_entry_detach+0xa7/0xf0 [mlx5_core]<br /> [ 4316.859134] mlx5e_encap_dealloc+0xa3/0xf0 [mlx5_core]<br /> [ 4316.859867] clean_encap_dests.part.0+0x5c/0xe0 [mlx5_core]<br /> [ 4316.860605] mlx5e_tc_del_fdb_flow+0x32a/0x810 [mlx5_core]<br /> [ 4316.862609] __mlx5e_tc_del_fdb_peer_flow+0x1a2/0x250 [mlx5_core]<br /> [ 4316.863394] mlx5e_tc_del_flow+0x(/0x630 [mlx5_core]<br /> [ 4316.864090] mlx5e_flow_put+0x5f/0x100 [mlx5_core]<br /> [ 4316.864771] mlx5e_delete_flower+0x4de/0xa40 [mlx5_core]<br /> [ 4316.865486] tc_setup_cb_reoffload+0x20/0x80<br /> [ 4316.865905] fl_reoffload+0x47c/0x510 [cls_flower]<br /> [ 4316.869181] tcf_block_playback_offloads+0x91/0x1d0<br /> [ 4316.869649] tcf_block_unbind+0xe7/0x1b0<br /> [ 4316.870049] tcf_block_offload_cmd.isra.0+0x1ee/0x270<br /> [ 4316.879266] tcf_block_offload_unbind+0x61/0xa0<br /> [ 4316.879711] __tcf_block_put+0xa4/0x310
Severity CVSS v4.0: Pending analysis
Last modification:
10/11/2025

CVE-2023-53103

Publication date:
02/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bonding: restore bond&amp;#39;s IFF_SLAVE flag if a non-eth dev enslave fails<br /> <br /> syzbot reported a warning[1] where the bond device itself is a slave and<br /> we try to enslave a non-ethernet device as the first slave which fails<br /> but then in the error path when ether_setup() restores the bond device<br /> it also clears all flags. In my previous fix[2] I restored the<br /> IFF_MASTER flag, but I didn&amp;#39;t consider the case that the bond device<br /> itself might also be a slave with IFF_SLAVE set, so we need to restore<br /> that flag as well. Use the bond_ether_setup helper which does the right<br /> thing and restores the bond&amp;#39;s flags properly.<br /> <br /> Steps to reproduce using a nlmon dev:<br /> $ ip l add nlmon0 type nlmon<br /> $ ip l add bond1 type bond<br /> $ ip l add bond2 type bond<br /> $ ip l set bond1 master bond2<br /> $ ip l set dev nlmon0 master bond1<br /> $ ip -d l sh dev bond1<br /> 22: bond1: mtu 1500 qdisc noqueue master bond2 state DOWN mode DEFAULT group default qlen 1000<br /> (now bond1&amp;#39;s IFF_SLAVE flag is gone and we&amp;#39;ll hit a warning[3] if we<br /> try to delete it)<br /> <br /> [1] https://syzkaller.appspot.com/bug?id=391c7b1f6522182899efba27d891f1743e8eb3ef<br /> [2] commit 7d5cd2ce5292 ("bonding: correctly handle bonding type change on enslave failure")<br /> [3] example warning:<br /> [ 27.008664] bond1: (slave nlmon0): The slave device specified does not support setting the MAC address<br /> [ 27.008692] bond1: (slave nlmon0): Error -95 calling set_mac_address<br /> [ 32.464639] bond1 (unregistering): Released all slaves<br /> [ 32.464685] ------------[ cut here ]------------<br /> [ 32.464686] WARNING: CPU: 1 PID: 2004 at net/core/dev.c:10829 unregister_netdevice_many+0x72a/0x780<br /> [ 32.464694] Modules linked in: br_netfilter bridge bonding virtio_net<br /> [ 32.464699] CPU: 1 PID: 2004 Comm: ip Kdump: loaded Not tainted 5.18.0-rc3+ #47<br /> [ 32.464703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.1-2.fc37 04/01/2014<br /> [ 32.464704] RIP: 0010:unregister_netdevice_many+0x72a/0x780<br /> [ 32.464707] Code: 99 fd ff ff ba 90 1a 00 00 48 c7 c6 f4 02 66 96 48 c7 c7 20 4d 35 96 c6 05 fa c7 2b 02 01 e8 be 6f 4a 00 0f 0b e9 73 fd ff ff 0b e9 5f fd ff ff 80 3d e3 c7 2b 02 00 0f 85 3b fd ff ff ba 59<br /> [ 32.464710] RSP: 0018:ffffa006422d7820 EFLAGS: 00010206<br /> [ 32.464712] RAX: ffff8f6e077140a0 RBX: ffffa006422d7888 RCX: 0000000000000000<br /> [ 32.464714] RDX: ffff8f6e12edbe58 RSI: 0000000000000296 RDI: ffffffff96d4a520<br /> [ 32.464716] RBP: ffff8f6e07714000 R08: ffffffff96d63600 R09: ffffa006422d7728<br /> [ 32.464717] R10: 0000000000000ec0 R11: ffffffff9698c988 R12: ffff8f6e12edb140<br /> [ 32.464719] R13: dead000000000122 R14: dead000000000100 R15: ffff8f6e12edb140<br /> [ 32.464723] FS: 00007f297c2f1740(0000) GS:ffff8f6e5d900000(0000) knlGS:0000000000000000<br /> [ 32.464725] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> [ 32.464726] CR2: 00007f297bf1c800 CR3: 00000000115e8000 CR4: 0000000000350ee0<br /> [ 32.464730] Call Trace:<br /> [ 32.464763] <br /> [ 32.464767] rtnl_dellink+0x13e/0x380<br /> [ 32.464776] ? cred_has_capability.isra.0+0x68/0x100<br /> [ 32.464780] ? __rtnl_unlock+0x33/0x60<br /> [ 32.464783] ? bpf_lsm_capset+0x10/0x10<br /> [ 32.464786] ? security_capable+0x36/0x50<br /> [ 32.464790] rtnetlink_rcv_msg+0x14e/0x3b0<br /> [ 32.464792] ? _copy_to_iter+0xb1/0x790<br /> [ 32.464796] ? post_alloc_hook+0xa0/0x160<br /> [ 32.464799] ? rtnl_calcit.isra.0+0x110/0x110<br /> [ 32.464802] netlink_rcv_skb+0x50/0xf0<br /> [ 32.464806] netlink_unicast+0x216/0x340<br /> [ 32.464809] netlink_sendmsg+0x23f/0x480<br /> [ 32.464812] sock_sendmsg+0x5e/0x60<br /> [ 32.464815] ____sys_sendmsg+0x22c/0x270<br /> [ 32.464818] ? import_iovec+0x17/0x20<br /> [ 32.464821] ? sendmsg_copy_msghdr+0x59/0x90<br /> [ 32.464823] ? do_set_pte+0xa0/0xe0<br /> [ 32.464828] ___sys_sendmsg+0x81/0xc0<br /> [ 32.464832] ? mod_objcg_state+0xc6/0x300<br /> [ 32.464835] ? refill_obj_stock+0xa9/0x160<br /> [ 32.464838] ? memcg_slab_free_hook+0x1a5/0x1f0<br /> [ 32.464842] __sys_sendm<br /> ---truncated---
Severity CVSS v4.0: Pending analysis
Last modification:
10/11/2025

CVE-2023-53102

Publication date:
02/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ice: xsk: disable txq irq before flushing hw<br /> <br /> ice_qp_dis() intends to stop a given queue pair that is a target of xsk<br /> pool attach/detach. One of the steps is to disable interrupts on these<br /> queues. It currently is broken in a way that txq irq is turned off<br /> *after* HW flush which in turn takes no effect.<br /> <br /> ice_qp_dis():<br /> -&gt; ice_qvec_dis_irq()<br /> --&gt; disable rxq irq<br /> --&gt; flush hw<br /> -&gt; ice_vsi_stop_tx_ring()<br /> --&gt;disable txq irq<br /> <br /> Below splat can be triggered by following steps:<br /> - start xdpsock WITHOUT loading xdp prog<br /> - run xdp_rxq_info with XDP_TX action on this interface<br /> - start traffic<br /> - terminate xdpsock<br /> <br /> [ 256.312485] BUG: kernel NULL pointer dereference, address: 0000000000000018<br /> [ 256.319560] #PF: supervisor read access in kernel mode<br /> [ 256.324775] #PF: error_code(0x0000) - not-present page<br /> [ 256.329994] PGD 0 P4D 0<br /> [ 256.332574] Oops: 0000 [#1] PREEMPT SMP NOPTI<br /> [ 256.337006] CPU: 3 PID: 32 Comm: ksoftirqd/3 Tainted: G OE 6.2.0-rc5+ #51<br /> [ 256.345218] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0008.031920191559 03/19/2019<br /> [ 256.355807] RIP: 0010:ice_clean_rx_irq_zc+0x9c/0x7d0 [ice]<br /> [ 256.361423] Code: b7 8f 8a 00 00 00 66 39 ca 0f 84 f1 04 00 00 49 8b 47 40 4c 8b 24 d0 41 0f b7 45 04 66 25 ff 3f 66 89 04 24 0f 84 85 02 00 00 8b 44 24 18 0f b7 14 24 48 05 00 01 00 00 49 89 04 24 49 89 44<br /> [ 256.380463] RSP: 0018:ffffc900088bfd20 EFLAGS: 00010206<br /> [ 256.385765] RAX: 000000000000003c RBX: 0000000000000035 RCX: 000000000000067f<br /> [ 256.393012] RDX: 0000000000000775 RSI: 0000000000000000 RDI: ffff8881deb3ac80<br /> [ 256.400256] RBP: 000000000000003c R08: ffff889847982710 R09: 0000000000010000<br /> [ 256.407500] R10: ffffffff82c060c0 R11: 0000000000000004 R12: 0000000000000000<br /> [ 256.414746] R13: ffff88811165eea0 R14: ffffc9000d255000 R15: ffff888119b37600<br /> [ 256.421990] FS: 0000000000000000(0000) GS:ffff8897e0cc0000(0000) knlGS:0000000000000000<br /> [ 256.430207] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> [ 256.436036] CR2: 0000000000000018 CR3: 0000000005c0a006 CR4: 00000000007706e0<br /> [ 256.443283] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br /> [ 256.450527] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400<br /> [ 256.457770] PKRU: 55555554<br /> [ 256.460529] Call Trace:<br /> [ 256.463015] <br /> [ 256.465157] ? ice_xmit_zc+0x6e/0x150 [ice]<br /> [ 256.469437] ice_napi_poll+0x46d/0x680 [ice]<br /> [ 256.473815] ? _raw_spin_unlock_irqrestore+0x1b/0x40<br /> [ 256.478863] __napi_poll+0x29/0x160<br /> [ 256.482409] net_rx_action+0x136/0x260<br /> [ 256.486222] __do_softirq+0xe8/0x2e5<br /> [ 256.489853] ? smpboot_thread_fn+0x2c/0x270<br /> [ 256.494108] run_ksoftirqd+0x2a/0x50<br /> [ 256.497747] smpboot_thread_fn+0x1c1/0x270<br /> [ 256.501907] ? __pfx_smpboot_thread_fn+0x10/0x10<br /> [ 256.506594] kthread+0xea/0x120<br /> [ 256.509785] ? __pfx_kthread+0x10/0x10<br /> [ 256.513597] ret_from_fork+0x29/0x50<br /> [ 256.517238] <br /> <br /> In fact, irqs were not disabled and napi managed to be scheduled and run<br /> while xsk_pool pointer was still valid, but SW ring of xdp_buff pointers<br /> was already freed.<br /> <br /> To fix this, call ice_qvec_dis_irq() after ice_vsi_stop_tx_ring(). Also<br /> while at it, remove redundant ice_clean_rx_ring() call - this is handled<br /> in ice_qp_clean_rings().
Severity CVSS v4.0: Pending analysis
Last modification:
10/11/2025

CVE-2023-53101

Publication date:
02/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ext4: zero i_disksize when initializing the bootloader inode<br /> <br /> If the boot loader inode has never been used before, the<br /> EXT4_IOC_SWAP_BOOT inode will initialize it, including setting the<br /> i_size to 0. However, if the "never before used" boot loader has a<br /> non-zero i_size, then i_disksize will be non-zero, and the<br /> inconsistency between i_size and i_disksize can trigger a kernel<br /> warning:<br /> <br /> WARNING: CPU: 0 PID: 2580 at fs/ext4/file.c:319<br /> CPU: 0 PID: 2580 Comm: bb Not tainted 6.3.0-rc1-00004-g703695902cfa<br /> RIP: 0010:ext4_file_write_iter+0xbc7/0xd10<br /> Call Trace:<br /> vfs_write+0x3b1/0x5c0<br /> ksys_write+0x77/0x160<br /> __x64_sys_write+0x22/0x30<br /> do_syscall_64+0x39/0x80<br /> <br /> Reproducer:<br /> 1. create corrupted image and mount it:<br /> mke2fs -t ext4 /tmp/foo.img 200<br /> debugfs -wR "sif size 25700" /tmp/foo.img<br /> mount -t ext4 /tmp/foo.img /mnt<br /> cd /mnt<br /> echo 123 &gt; file<br /> 2. Run the reproducer program:<br /> posix_memalign(&amp;buf, 1024, 1024)<br /> fd = open("file", O_RDWR | O_DIRECT);<br /> ioctl(fd, EXT4_IOC_SWAP_BOOT);<br /> write(fd, buf, 1024);<br /> <br /> Fix this by setting i_disksize as well as i_size to zero when<br /> initiaizing the boot loader inode.
Severity CVSS v4.0: Pending analysis
Last modification:
10/11/2025

CVE-2023-53100

Publication date:
02/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ext4: fix WARNING in ext4_update_inline_data<br /> <br /> Syzbot found the following issue:<br /> EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 without journal. Quota mode: none.<br /> fscrypt: AES-256-CTS-CBC using implementation "cts-cbc-aes-aesni"<br /> fscrypt: AES-256-XTS using implementation "xts-aes-aesni"<br /> ------------[ cut here ]------------<br /> WARNING: CPU: 0 PID: 5071 at mm/page_alloc.c:5525 __alloc_pages+0x30a/0x560 mm/page_alloc.c:5525<br /> Modules linked in:<br /> CPU: 1 PID: 5071 Comm: syz-executor263 Not tainted 6.2.0-rc1-syzkaller #0<br /> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022<br /> RIP: 0010:__alloc_pages+0x30a/0x560 mm/page_alloc.c:5525<br /> RSP: 0018:ffffc90003c2f1c0 EFLAGS: 00010246<br /> RAX: ffffc90003c2f220 RBX: 0000000000000014 RCX: 0000000000000000<br /> RDX: 0000000000000028 RSI: 0000000000000000 RDI: ffffc90003c2f248<br /> RBP: ffffc90003c2f2d8 R08: dffffc0000000000 R09: ffffc90003c2f220<br /> R10: fffff52000785e49 R11: 1ffff92000785e44 R12: 0000000000040d40<br /> R13: 1ffff92000785e40 R14: dffffc0000000000 R15: 1ffff92000785e3c<br /> FS: 0000555556c0d300(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: 00007f95d5e04138 CR3: 00000000793aa000 CR4: 00000000003506f0<br /> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br /> DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400<br /> Call Trace:<br /> <br /> __alloc_pages_node include/linux/gfp.h:237 [inline]<br /> alloc_pages_node include/linux/gfp.h:260 [inline]<br /> __kmalloc_large_node+0x95/0x1e0 mm/slab_common.c:1113<br /> __do_kmalloc_node mm/slab_common.c:956 [inline]<br /> __kmalloc+0xfe/0x190 mm/slab_common.c:981<br /> kmalloc include/linux/slab.h:584 [inline]<br /> kzalloc include/linux/slab.h:720 [inline]<br /> ext4_update_inline_data+0x236/0x6b0 fs/ext4/inline.c:346<br /> ext4_update_inline_dir fs/ext4/inline.c:1115 [inline]<br /> ext4_try_add_inline_entry+0x328/0x990 fs/ext4/inline.c:1307<br /> ext4_add_entry+0x5a4/0xeb0 fs/ext4/namei.c:2385<br /> ext4_add_nondir+0x96/0x260 fs/ext4/namei.c:2772<br /> ext4_create+0x36c/0x560 fs/ext4/namei.c:2817<br /> lookup_open fs/namei.c:3413 [inline]<br /> open_last_lookups fs/namei.c:3481 [inline]<br /> path_openat+0x12ac/0x2dd0 fs/namei.c:3711<br /> do_filp_open+0x264/0x4f0 fs/namei.c:3741<br /> do_sys_openat2+0x124/0x4e0 fs/open.c:1310<br /> do_sys_open fs/open.c:1326 [inline]<br /> __do_sys_openat fs/open.c:1342 [inline]<br /> __se_sys_openat fs/open.c:1337 [inline]<br /> __x64_sys_openat+0x243/0x290 fs/open.c:1337<br /> do_syscall_x64 arch/x86/entry/common.c:50 [inline]<br /> do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80<br /> entry_SYSCALL_64_after_hwframe+0x63/0xcd<br /> <br /> Above issue happens as follows:<br /> ext4_iget<br /> ext4_find_inline_data_nolock -&gt;i_inline_off=164 i_inline_size=60<br /> ext4_try_add_inline_entry<br /> __ext4_mark_inode_dirty<br /> ext4_expand_extra_isize_ea -&gt;i_extra_isize=32 s_want_extra_isize=44<br /> ext4_xattr_shift_entries<br /> -&gt;after shift i_inline_off is incorrect, actually is change to 176<br /> ext4_try_add_inline_entry<br /> ext4_update_inline_dir<br /> get_max_inline_xattr_value_size<br /> if (EXT4_I(inode)-&gt;i_inline_off)<br /> entry = (struct ext4_xattr_entry *)((void *)raw_inode +<br /> EXT4_I(inode)-&gt;i_inline_off);<br /> free += EXT4_XATTR_SIZE(le32_to_cpu(entry-&gt;e_value_size));<br /> -&gt;As entry is incorrect, then &amp;#39;free&amp;#39; may be negative<br /> ext4_update_inline_data<br /> value = kzalloc(len, GFP_NOFS);<br /> -&gt; len is unsigned int, maybe very large, then trigger warning when<br /> &amp;#39;kzalloc()&amp;#39;<br /> <br /> To resolve the above issue we need to update &amp;#39;i_inline_off&amp;#39; after<br /> &amp;#39;ext4_xattr_shift_entries()&amp;#39;. We do not need to set<br /> EXT4_STATE_MAY_INLINE_DATA flag here, since ext4_mark_inode_dirty()<br /> already sets this flag if needed. Setting EXT4_STATE_MAY_INLINE_DATA<br /> when it is needed may trigger a BUG_ON in ext4_writepages().
Severity CVSS v4.0: Pending analysis
Last modification:
10/11/2025