Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-48659

Publication date:
28/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mm/slub: fix to return errno if kmalloc() fails<br /> <br /> In create_unique_id(), kmalloc(, GFP_KERNEL) can fail due to<br /> out-of-memory, if it fails, return errno correctly rather than<br /> triggering panic via BUG_ON();<br /> <br /> kernel BUG at mm/slub.c:5893!<br /> Internal error: Oops - BUG: 0 [#1] PREEMPT SMP<br /> <br /> Call trace:<br /> sysfs_slab_add+0x258/0x260 mm/slub.c:5973<br /> __kmem_cache_create+0x60/0x118 mm/slub.c:4899<br /> create_cache mm/slab_common.c:229 [inline]<br /> kmem_cache_create_usercopy+0x19c/0x31c mm/slab_common.c:335<br /> kmem_cache_create+0x1c/0x28 mm/slab_common.c:390<br /> f2fs_kmem_cache_create fs/f2fs/f2fs.h:2766 [inline]<br /> f2fs_init_xattr_caches+0x78/0xb4 fs/f2fs/xattr.c:808<br /> f2fs_fill_super+0x1050/0x1e0c fs/f2fs/super.c:4149<br /> mount_bdev+0x1b8/0x210 fs/super.c:1400<br /> f2fs_mount+0x44/0x58 fs/f2fs/super.c:4512<br /> legacy_get_tree+0x30/0x74 fs/fs_context.c:610<br /> vfs_get_tree+0x40/0x140 fs/super.c:1530<br /> do_new_mount+0x1dc/0x4e4 fs/namespace.c:3040<br /> path_mount+0x358/0x914 fs/namespace.c:3370<br /> do_mount fs/namespace.c:3383 [inline]<br /> __do_sys_mount fs/namespace.c:3591 [inline]<br /> __se_sys_mount fs/namespace.c:3568 [inline]<br /> __arm64_sys_mount+0x2f8/0x408 fs/namespace.c:3568
Severity CVSS v4.0: Pending analysis
Last modification:
30/04/2024

CVE-2022-48660

Publication date:
28/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> gpiolib: cdev: Set lineevent_state::irq after IRQ register successfully<br /> <br /> When running gpio test on nxp-ls1028 platform with below command<br /> gpiomon --num-events=3 --rising-edge gpiochip1 25<br /> There will be a warning trace as below:<br /> Call trace:<br /> free_irq+0x204/0x360<br /> lineevent_free+0x64/0x70<br /> gpio_ioctl+0x598/0x6a0<br /> __arm64_sys_ioctl+0xb4/0x100<br /> invoke_syscall+0x5c/0x130<br /> ......<br /> el0t_64_sync+0x1a0/0x1a4<br /> The reason of this issue is that calling request_threaded_irq()<br /> function failed, and then lineevent_free() is invoked to release<br /> the resource. Since the lineevent_state::irq was already set, so<br /> the subsequent invocation of free_irq() would trigger the above<br /> warning call trace. To fix this issue, set the lineevent_state::irq<br /> after the IRQ register successfully.
Severity CVSS v4.0: Pending analysis
Last modification:
27/10/2024

CVE-2022-48661

Publication date:
28/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> gpio: mockup: Fix potential resource leakage when register a chip<br /> <br /> If creation of software node fails, the locally allocated string<br /> array is left unfreed. Free it on error path.
Severity CVSS v4.0: Pending analysis
Last modification:
30/04/2024

CVE-2022-48662

Publication date:
28/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/i915/gem: Really move i915_gem_context.link under ref protection<br /> <br /> i915_perf assumes that it can use the i915_gem_context reference to<br /> protect its i915-&gt;gem.contexts.list iteration. However, this requires<br /> that we do not remove the context from the list until after we drop the<br /> final reference and release the struct. If, as currently, we remove the<br /> context from the list during context_close(), the link.next pointer may<br /> be poisoned while we are holding the context reference and cause a GPF:<br /> <br /> [ 4070.573157] i915 0000:00:02.0: [drm:i915_perf_open_ioctl [i915]] filtering on ctx_id=0x1fffff ctx_id_mask=0x1fffff<br /> [ 4070.574881] general protection fault, probably for non-canonical address 0xdead000000000100: 0000 [#1] PREEMPT SMP<br /> [ 4070.574897] CPU: 1 PID: 284392 Comm: amd_performance Tainted: G E 5.17.9 #180<br /> [ 4070.574903] Hardware name: Intel Corporation NUC7i5BNK/NUC7i5BNB, BIOS BNKBL357.86A.0052.2017.0918.1346 09/18/2017<br /> [ 4070.574907] RIP: 0010:oa_configure_all_contexts.isra.0+0x222/0x350 [i915]<br /> [ 4070.574982] Code: 08 e8 32 6e 10 e1 4d 8b 6d 50 b8 ff ff ff ff 49 83 ed 50 f0 41 0f c1 04 24 83 f8 01 0f 84 e3 00 00 00 85 c0 0f 8e fa 00 00 00 8b 45 50 48 8d 70 b0 49 8d 45 50 48 39 44 24 10 0f 85 34 fe ff<br /> [ 4070.574990] RSP: 0018:ffffc90002077b78 EFLAGS: 00010202<br /> [ 4070.574995] RAX: 0000000000000002 RBX: 0000000000000002 RCX: 0000000000000000<br /> [ 4070.575000] RDX: 0000000000000001 RSI: ffffc90002077b20 RDI: ffff88810ddc7c68<br /> [ 4070.575004] RBP: 0000000000000001 R08: ffff888103242648 R09: fffffffffffffffc<br /> [ 4070.575008] R10: ffffffff82c50bc0 R11: 0000000000025c80 R12: ffff888101bf1860<br /> [ 4070.575012] R13: dead0000000000b0 R14: ffffc90002077c04 R15: ffff88810be5cabc<br /> [ 4070.575016] FS: 00007f1ed50c0780(0000) GS:ffff88885ec80000(0000) knlGS:0000000000000000<br /> [ 4070.575021] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> [ 4070.575025] CR2: 00007f1ed5590280 CR3: 000000010ef6f005 CR4: 00000000003706e0<br /> [ 4070.575029] Call Trace:<br /> [ 4070.575033] <br /> [ 4070.575037] lrc_configure_all_contexts+0x13e/0x150 [i915]<br /> [ 4070.575103] gen8_enable_metric_set+0x4d/0x90 [i915]<br /> [ 4070.575164] i915_perf_open_ioctl+0xbc0/0x1500 [i915]<br /> [ 4070.575224] ? asm_common_interrupt+0x1e/0x40<br /> [ 4070.575232] ? i915_oa_init_reg_state+0x110/0x110 [i915]<br /> [ 4070.575290] drm_ioctl_kernel+0x85/0x110<br /> [ 4070.575296] ? update_load_avg+0x5f/0x5e0<br /> [ 4070.575302] drm_ioctl+0x1d3/0x370<br /> [ 4070.575307] ? i915_oa_init_reg_state+0x110/0x110 [i915]<br /> [ 4070.575382] ? gen8_gt_irq_handler+0x46/0x130 [i915]<br /> [ 4070.575445] __x64_sys_ioctl+0x3c4/0x8d0<br /> [ 4070.575451] ? __do_softirq+0xaa/0x1d2<br /> [ 4070.575456] do_syscall_64+0x35/0x80<br /> [ 4070.575461] entry_SYSCALL_64_after_hwframe+0x44/0xae<br /> [ 4070.575467] RIP: 0033:0x7f1ed5c10397<br /> [ 4070.575471] Code: 3c 1c e8 1c ff ff ff 85 c0 79 87 49 c7 c4 ff ff ff ff 5b 5d 4c 89 e0 41 5c c3 66 0f 1f 84 00 00 00 00 00 b8 10 00 00 00 0f 05 3d 01 f0 ff ff 73 01 c3 48 8b 0d a9 da 0d 00 f7 d8 64 89 01 48<br /> [ 4070.575478] RSP: 002b:00007ffd65c8d7a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010<br /> [ 4070.575484] RAX: ffffffffffffffda RBX: 0000000000000006 RCX: 00007f1ed5c10397<br /> [ 4070.575488] RDX: 00007ffd65c8d7c0 RSI: 0000000040106476 RDI: 0000000000000006<br /> [ 4070.575492] RBP: 00005620972f9c60 R08: 000000000000000a R09: 0000000000000005<br /> [ 4070.575496] R10: 000000000000000d R11: 0000000000000246 R12: 000000000000000a<br /> [ 4070.575500] R13: 000000000000000d R14: 0000000000000000 R15: 00007ffd65c8d7c0<br /> [ 4070.575505] <br /> [ 4070.575507] Modules linked in: nls_ascii(E) nls_cp437(E) vfat(E) fat(E) i915(E) x86_pkg_temp_thermal(E) intel_powerclamp(E) crct10dif_pclmul(E) crc32_pclmul(E) crc32c_intel(E) aesni_intel(E) crypto_simd(E) intel_gtt(E) cryptd(E) ttm(E) rapl(E) intel_cstate(E) drm_kms_helper(E) cfbfillrect(E) syscopyarea(E) cfbimgblt(E) intel_uncore(E) sysfillrect(E) mei_me(E) sysimgblt(E) i2c_i801(E) fb_sys_fops(E) mei(E) intel_pch_thermal(E) i2c_smbus<br /> ---truncated---
Severity CVSS v4.0: Pending analysis
Last modification:
26/08/2024

CVE-2022-48663

Publication date:
28/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> gpio: mockup: fix NULL pointer dereference when removing debugfs<br /> <br /> We now remove the device&amp;#39;s debugfs entries when unbinding the driver.<br /> This now causes a NULL-pointer dereference on module exit because the<br /> platform devices are unregistered *after* the global debugfs directory<br /> has been recursively removed. Fix it by unregistering the devices first.
Severity CVSS v4.0: Pending analysis
Last modification:
14/01/2025

CVE-2022-48635

Publication date:
28/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> fsdax: Fix infinite loop in dax_iomap_rw()<br /> <br /> I got an infinite loop and a WARNING report when executing a tail command<br /> in virtiofs.<br /> <br /> WARNING: CPU: 10 PID: 964 at fs/iomap/iter.c:34 iomap_iter+0x3a2/0x3d0<br /> Modules linked in:<br /> CPU: 10 PID: 964 Comm: tail Not tainted 5.19.0-rc7<br /> Call Trace:<br /> <br /> dax_iomap_rw+0xea/0x620<br /> ? __this_cpu_preempt_check+0x13/0x20<br /> fuse_dax_read_iter+0x47/0x80<br /> fuse_file_read_iter+0xae/0xd0<br /> new_sync_read+0xfe/0x180<br /> ? 0xffffffff81000000<br /> vfs_read+0x14d/0x1a0<br /> ksys_read+0x6d/0xf0<br /> __x64_sys_read+0x1a/0x20<br /> do_syscall_64+0x3b/0x90<br /> entry_SYSCALL_64_after_hwframe+0x63/0xcd<br /> <br /> The tail command will call read() with a count of 0. In this case,<br /> iomap_iter() will report this WARNING, and always return 1 which casuing<br /> the infinite loop in dax_iomap_rw().<br /> <br /> Fixing by checking count whether is 0 in dax_iomap_rw().
Severity CVSS v4.0: Pending analysis
Last modification:
29/10/2025

CVE-2022-48631

Publication date:
28/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ext4: fix bug in extents parsing when eh_entries == 0 and eh_depth &gt; 0<br /> <br /> When walking through an inode extents, the ext4_ext_binsearch_idx() function<br /> assumes that the extent header has been previously validated. However, there<br /> are no checks that verify that the number of entries (eh-&gt;eh_entries) is<br /> non-zero when depth is &gt; 0. And this will lead to problems because the<br /> EXT_FIRST_INDEX() and EXT_LAST_INDEX() will return garbage and result in this:<br /> <br /> [ 135.245946] ------------[ cut here ]------------<br /> [ 135.247579] kernel BUG at fs/ext4/extents.c:2258!<br /> [ 135.249045] invalid opcode: 0000 [#1] PREEMPT SMP<br /> [ 135.250320] CPU: 2 PID: 238 Comm: tmp118 Not tainted 5.19.0-rc8+ #4<br /> [ 135.252067] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.15.0-0-g2dd4b9b-rebuilt.opensuse.org 04/01/2014<br /> [ 135.255065] RIP: 0010:ext4_ext_map_blocks+0xc20/0xcb0<br /> [ 135.256475] Code:<br /> [ 135.261433] RSP: 0018:ffffc900005939f8 EFLAGS: 00010246<br /> [ 135.262847] RAX: 0000000000000024 RBX: ffffc90000593b70 RCX: 0000000000000023<br /> [ 135.264765] RDX: ffff8880038e5f10 RSI: 0000000000000003 RDI: ffff8880046e922c<br /> [ 135.266670] RBP: ffff8880046e9348 R08: 0000000000000001 R09: ffff888002ca580c<br /> [ 135.268576] R10: 0000000000002602 R11: 0000000000000000 R12: 0000000000000024<br /> [ 135.270477] R13: 0000000000000000 R14: 0000000000000024 R15: 0000000000000000<br /> [ 135.272394] FS: 00007fdabdc56740(0000) GS:ffff88807dd00000(0000) knlGS:0000000000000000<br /> [ 135.274510] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> [ 135.276075] CR2: 00007ffc26bd4f00 CR3: 0000000006261004 CR4: 0000000000170ea0<br /> [ 135.277952] Call Trace:<br /> [ 135.278635] <br /> [ 135.279247] ? preempt_count_add+0x6d/0xa0<br /> [ 135.280358] ? percpu_counter_add_batch+0x55/0xb0<br /> [ 135.281612] ? _raw_read_unlock+0x18/0x30<br /> [ 135.282704] ext4_map_blocks+0x294/0x5a0<br /> [ 135.283745] ? xa_load+0x6f/0xa0<br /> [ 135.284562] ext4_mpage_readpages+0x3d6/0x770<br /> [ 135.285646] read_pages+0x67/0x1d0<br /> [ 135.286492] ? folio_add_lru+0x51/0x80<br /> [ 135.287441] page_cache_ra_unbounded+0x124/0x170<br /> [ 135.288510] filemap_get_pages+0x23d/0x5a0<br /> [ 135.289457] ? path_openat+0xa72/0xdd0<br /> [ 135.290332] filemap_read+0xbf/0x300<br /> [ 135.291158] ? _raw_spin_lock_irqsave+0x17/0x40<br /> [ 135.292192] new_sync_read+0x103/0x170<br /> [ 135.293014] vfs_read+0x15d/0x180<br /> [ 135.293745] ksys_read+0xa1/0xe0<br /> [ 135.294461] do_syscall_64+0x3c/0x80<br /> [ 135.295284] entry_SYSCALL_64_after_hwframe+0x46/0xb0<br /> <br /> This patch simply adds an extra check in __ext4_ext_check(), verifying that<br /> eh_entries is not 0 when eh_depth is &gt; 0.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2025

CVE-2022-48632

Publication date:
28/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> i2c: mlxbf: prevent stack overflow in mlxbf_i2c_smbus_start_transaction()<br /> <br /> memcpy() is called in a loop while &amp;#39;operation-&gt;length&amp;#39; upper bound<br /> is not checked and &amp;#39;data_idx&amp;#39; also increments.
Severity CVSS v4.0: Pending analysis
Last modification:
03/03/2025

CVE-2022-48633

Publication date:
28/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/gma500: Fix WARN_ON(lock-&gt;magic != lock) error<br /> <br /> psb_gem_unpin() calls dma_resv_lock() but the underlying ww_mutex<br /> gets destroyed by drm_gem_object_release() move the<br /> drm_gem_object_release() call in psb_gem_free_object() to after<br /> the unpin to fix the below warning:<br /> <br /> [ 79.693962] ------------[ cut here ]------------<br /> [ 79.693992] DEBUG_LOCKS_WARN_ON(lock-&gt;magic != lock)<br /> [ 79.694015] WARNING: CPU: 0 PID: 240 at kernel/locking/mutex.c:582 __ww_mutex_lock.constprop.0+0x569/0xfb0<br /> [ 79.694052] Modules linked in: rfcomm snd_seq_dummy snd_hrtimer qrtr bnep ath9k ath9k_common ath9k_hw snd_hda_codec_realtek snd_hda_codec_generic ledtrig_audio snd_hda_codec_hdmi snd_hda_intel ath3k snd_intel_dspcfg mac80211 snd_intel_sdw_acpi btusb snd_hda_codec btrtl btbcm btintel btmtk bluetooth at24 snd_hda_core snd_hwdep uvcvideo snd_seq libarc4 videobuf2_vmalloc ath videobuf2_memops videobuf2_v4l2 videobuf2_common snd_seq_device videodev acer_wmi intel_powerclamp coretemp mc snd_pcm joydev sparse_keymap ecdh_generic pcspkr wmi_bmof cfg80211 i2c_i801 i2c_smbus snd_timer snd r8169 rfkill lpc_ich soundcore acpi_cpufreq zram rtsx_pci_sdmmc mmc_core serio_raw rtsx_pci gma500_gfx(E) video wmi ip6_tables ip_tables i2c_dev fuse<br /> [ 79.694436] CPU: 0 PID: 240 Comm: plymouthd Tainted: G W E 6.0.0-rc3+ #490<br /> [ 79.694457] Hardware name: Packard Bell dot s/SJE01_CT, BIOS V1.10 07/23/2013<br /> [ 79.694469] RIP: 0010:__ww_mutex_lock.constprop.0+0x569/0xfb0<br /> [ 79.694496] Code: ff 85 c0 0f 84 15 fb ff ff 8b 05 ca 3c 11 01 85 c0 0f 85 07 fb ff ff 48 c7 c6 30 cb 84 aa 48 c7 c7 a3 e1 82 aa e8 ac 29 f8 ff 0b e9 ed fa ff ff e8 5b 83 8a ff 85 c0 74 10 44 8b 0d 98 3c 11<br /> [ 79.694513] RSP: 0018:ffffad1dc048bbe0 EFLAGS: 00010282<br /> [ 79.694623] RAX: 0000000000000028 RBX: 0000000000000000 RCX: 0000000000000000<br /> [ 79.694636] RDX: 0000000000000001 RSI: ffffffffaa8b0ffc RDI: 00000000ffffffff<br /> [ 79.694650] RBP: ffffad1dc048bc80 R08: 0000000000000000 R09: ffffad1dc048ba90<br /> [ 79.694662] R10: 0000000000000003 R11: ffffffffaad62fe8 R12: ffff9ff302103138<br /> [ 79.694675] R13: ffff9ff306ec8000 R14: ffff9ff307779078 R15: ffff9ff3014c0270<br /> [ 79.694690] FS: 00007ff1cccf1740(0000) GS:ffff9ff3bc200000(0000) knlGS:0000000000000000<br /> [ 79.694705] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> [ 79.694719] CR2: 0000559ecbcb4420 CR3: 0000000013210000 CR4: 00000000000006f0<br /> [ 79.694734] Call Trace:<br /> [ 79.694749] <br /> [ 79.694761] ? __schedule+0x47f/0x1670<br /> [ 79.694796] ? psb_gem_unpin+0x27/0x1a0 [gma500_gfx]<br /> [ 79.694830] ? lock_is_held_type+0xe3/0x140<br /> [ 79.694864] ? ww_mutex_lock+0x38/0xa0<br /> [ 79.694885] ? __cond_resched+0x1c/0x30<br /> [ 79.694902] ww_mutex_lock+0x38/0xa0<br /> [ 79.694925] psb_gem_unpin+0x27/0x1a0 [gma500_gfx]<br /> [ 79.694964] psb_gem_unpin+0x199/0x1a0 [gma500_gfx]<br /> [ 79.694996] drm_gem_object_release_handle+0x50/0x60<br /> [ 79.695020] ? drm_gem_object_handle_put_unlocked+0xf0/0xf0<br /> [ 79.695042] idr_for_each+0x4b/0xb0<br /> [ 79.695066] ? _raw_spin_unlock_irqrestore+0x30/0x60<br /> [ 79.695095] drm_gem_release+0x1c/0x30<br /> [ 79.695118] drm_file_free.part.0+0x1ea/0x260<br /> [ 79.695150] drm_release+0x6a/0x120<br /> [ 79.695175] __fput+0x9f/0x260<br /> [ 79.695203] task_work_run+0x59/0xa0<br /> [ 79.695227] do_exit+0x387/0xbe0<br /> [ 79.695250] ? seqcount_lockdep_reader_access.constprop.0+0x82/0x90<br /> [ 79.695275] ? lockdep_hardirqs_on+0x7d/0x100<br /> [ 79.695304] do_group_exit+0x33/0xb0<br /> [ 79.695331] __x64_sys_exit_group+0x14/0x20<br /> [ 79.695353] do_syscall_64+0x58/0x80<br /> [ 79.695376] ? up_read+0x17/0x20<br /> [ 79.695401] ? lock_is_held_type+0xe3/0x140<br /> [ 79.695429] ? asm_exc_page_fault+0x22/0x30<br /> [ 79.695450] ? lockdep_hardirqs_on+0x7d/0x100<br /> [ 79.695473] entry_SYSCALL_64_after_hwframe+0x63/0xcd<br /> [ 79.695493] RIP: 0033:0x7ff1ccefe3f1<br /> [ 79.695516] Code: Unable to access opcode bytes at RIP 0x7ff1ccefe3c7.<br /> [ 79.695607] RSP: 002b:00007ffed4413378 EFLAGS: <br /> ---truncated---
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2025

CVE-2022-48634

Publication date:
28/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/gma500: Fix BUG: sleeping function called from invalid context errors<br /> <br /> gma_crtc_page_flip() was holding the event_lock spinlock while calling<br /> crtc_funcs-&gt;mode_set_base() which takes ww_mutex.<br /> <br /> The only reason to hold event_lock is to clear gma_crtc-&gt;page_flip_event<br /> on mode_set_base() errors.<br /> <br /> Instead unlock it after setting gma_crtc-&gt;page_flip_event and on<br /> errors re-take the lock and clear gma_crtc-&gt;page_flip_event it<br /> it is still set.<br /> <br /> This fixes the following WARN/stacktrace:<br /> <br /> [ 512.122953] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:870<br /> [ 512.123004] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 1253, name: gnome-shell<br /> [ 512.123031] preempt_count: 1, expected: 0<br /> [ 512.123048] RCU nest depth: 0, expected: 0<br /> [ 512.123066] INFO: lockdep is turned off.<br /> [ 512.123080] irq event stamp: 0<br /> [ 512.123094] hardirqs last enabled at (0): [] 0x0<br /> [ 512.123134] hardirqs last disabled at (0): [] copy_process+0x9fc/0x1de0<br /> [ 512.123176] softirqs last enabled at (0): [] copy_process+0x9fc/0x1de0<br /> [ 512.123207] softirqs last disabled at (0): [] 0x0<br /> [ 512.123233] Preemption disabled at:<br /> [ 512.123241] [] 0x0<br /> [ 512.123275] CPU: 3 PID: 1253 Comm: gnome-shell Tainted: G W 5.19.0+ #1<br /> [ 512.123304] Hardware name: Packard Bell dot s/SJE01_CT, BIOS V1.10 07/23/2013<br /> [ 512.123323] Call Trace:<br /> [ 512.123346] <br /> [ 512.123370] dump_stack_lvl+0x5b/0x77<br /> [ 512.123412] __might_resched.cold+0xff/0x13a<br /> [ 512.123458] ww_mutex_lock+0x1e/0xa0<br /> [ 512.123495] psb_gem_pin+0x2c/0x150 [gma500_gfx]<br /> [ 512.123601] gma_pipe_set_base+0x76/0x240 [gma500_gfx]<br /> [ 512.123708] gma_crtc_page_flip+0x95/0x130 [gma500_gfx]<br /> [ 512.123808] drm_mode_page_flip_ioctl+0x57d/0x5d0<br /> [ 512.123897] ? drm_mode_cursor2_ioctl+0x10/0x10<br /> [ 512.123936] drm_ioctl_kernel+0xa1/0x150<br /> [ 512.123984] drm_ioctl+0x21f/0x420<br /> [ 512.124025] ? drm_mode_cursor2_ioctl+0x10/0x10<br /> [ 512.124070] ? rcu_read_lock_bh_held+0xb/0x60<br /> [ 512.124104] ? lock_release+0x1ef/0x2d0<br /> [ 512.124161] __x64_sys_ioctl+0x8d/0xd0<br /> [ 512.124203] do_syscall_64+0x58/0x80<br /> [ 512.124239] ? do_syscall_64+0x67/0x80<br /> [ 512.124267] ? trace_hardirqs_on_prepare+0x55/0xe0<br /> [ 512.124300] ? do_syscall_64+0x67/0x80<br /> [ 512.124340] ? rcu_read_lock_sched_held+0x10/0x80<br /> [ 512.124377] entry_SYSCALL_64_after_hwframe+0x63/0xcd<br /> [ 512.124411] RIP: 0033:0x7fcc4a70740f<br /> [ 512.124442] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00 00<br /> [ 512.124470] RSP: 002b:00007ffda73f5390 EFLAGS: 00000246 ORIG_RAX: 0000000000000010<br /> [ 512.124503] RAX: ffffffffffffffda RBX: 000055cc9e474500 RCX: 00007fcc4a70740f<br /> [ 512.124524] RDX: 00007ffda73f5420 RSI: 00000000c01864b0 RDI: 0000000000000009<br /> [ 512.124544] RBP: 00007ffda73f5420 R08: 000055cc9c0b0cb0 R09: 0000000000000034<br /> [ 512.124564] R10: 0000000000000000 R11: 0000000000000246 R12: 00000000c01864b0<br /> [ 512.124584] R13: 0000000000000009 R14: 000055cc9df484d0 R15: 000055cc9af5d0c0<br /> [ 512.124647]
Severity CVSS v4.0: Pending analysis
Last modification:
21/03/2025

CVE-2022-48636

Publication date:
28/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> s390/dasd: fix Oops in dasd_alias_get_start_dev due to missing pavgroup<br /> <br /> Fix Oops in dasd_alias_get_start_dev() function caused by the pavgroup<br /> pointer being NULL.<br /> <br /> The pavgroup pointer is checked on the entrance of the function but<br /> without the lcu-&gt;lock being held. Therefore there is a race window<br /> between dasd_alias_get_start_dev() and _lcu_update() which sets<br /> pavgroup to NULL with the lcu-&gt;lock held.<br /> <br /> Fix by checking the pavgroup pointer with lcu-&gt;lock held.
Severity CVSS v4.0: Pending analysis
Last modification:
21/03/2025

CVE-2022-48637

Publication date:
28/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bnxt: prevent skb UAF after handing over to PTP worker<br /> <br /> When reading the timestamp is required bnxt_tx_int() hands<br /> over the ownership of the completed skb to the PTP worker.<br /> The skb should not be used afterwards, as the worker may<br /> run before the rest of our code and free the skb, leading<br /> to a use-after-free.<br /> <br /> Since dev_kfree_skb_any() accepts NULL make the loss of<br /> ownership more obvious and set skb to NULL.
Severity CVSS v4.0: Pending analysis
Last modification:
21/03/2025