Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-54218

Publication date:
30/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: Fix load-tearing on sk-&gt;sk_stamp in sock_recv_cmsgs().<br /> <br /> KCSAN found a data race in sock_recv_cmsgs() where the read access<br /> to sk-&gt;sk_stamp needs READ_ONCE().<br /> <br /> BUG: KCSAN: data-race in packet_recvmsg / packet_recvmsg<br /> <br /> write (marked) to 0xffff88803c81f258 of 8 bytes by task 19171 on cpu 0:<br /> sock_write_timestamp include/net/sock.h:2670 [inline]<br /> sock_recv_cmsgs include/net/sock.h:2722 [inline]<br /> packet_recvmsg+0xb97/0xd00 net/packet/af_packet.c:3489<br /> sock_recvmsg_nosec net/socket.c:1019 [inline]<br /> sock_recvmsg+0x11a/0x130 net/socket.c:1040<br /> sock_read_iter+0x176/0x220 net/socket.c:1118<br /> call_read_iter include/linux/fs.h:1845 [inline]<br /> new_sync_read fs/read_write.c:389 [inline]<br /> vfs_read+0x5e0/0x630 fs/read_write.c:470<br /> ksys_read+0x163/0x1a0 fs/read_write.c:613<br /> __do_sys_read fs/read_write.c:623 [inline]<br /> __se_sys_read fs/read_write.c:621 [inline]<br /> __x64_sys_read+0x41/0x50 fs/read_write.c:621<br /> do_syscall_x64 arch/x86/entry/common.c:50 [inline]<br /> do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80<br /> entry_SYSCALL_64_after_hwframe+0x72/0xdc<br /> <br /> read to 0xffff88803c81f258 of 8 bytes by task 19183 on cpu 1:<br /> sock_recv_cmsgs include/net/sock.h:2721 [inline]<br /> packet_recvmsg+0xb64/0xd00 net/packet/af_packet.c:3489<br /> sock_recvmsg_nosec net/socket.c:1019 [inline]<br /> sock_recvmsg+0x11a/0x130 net/socket.c:1040<br /> sock_read_iter+0x176/0x220 net/socket.c:1118<br /> call_read_iter include/linux/fs.h:1845 [inline]<br /> new_sync_read fs/read_write.c:389 [inline]<br /> vfs_read+0x5e0/0x630 fs/read_write.c:470<br /> ksys_read+0x163/0x1a0 fs/read_write.c:613<br /> __do_sys_read fs/read_write.c:623 [inline]<br /> __se_sys_read fs/read_write.c:621 [inline]<br /> __x64_sys_read+0x41/0x50 fs/read_write.c:621<br /> do_syscall_x64 arch/x86/entry/common.c:50 [inline]<br /> do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80<br /> entry_SYSCALL_64_after_hwframe+0x72/0xdc<br /> <br /> value changed: 0xffffffffc4653600 -&gt; 0x0000000000000000<br /> <br /> Reported by Kernel Concurrency Sanitizer on:<br /> CPU: 1 PID: 19183 Comm: syz-executor.5 Not tainted 6.3.0-rc7-02330-gca6270c12e20 #2<br /> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2025

CVE-2023-54219

Publication date:
30/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> Revert "IB/isert: Fix incorrect release of isert connection"<br /> <br /> Commit: 699826f4e30a ("IB/isert: Fix incorrect release of isert connection") is<br /> causing problems on OPA when DEVICE_REMOVAL is happening.<br /> <br /> ------------[ cut here ]------------<br /> WARNING: CPU: 52 PID: 2117247 at drivers/infiniband/core/cq.c:359<br /> ib_cq_pool_cleanup+0xac/0xb0 [ib_core]<br /> Modules linked in: nfsd nfs_acl target_core_user uio tcm_fc libfc<br /> scsi_transport_fc tcm_loop target_core_pscsi target_core_iblock target_core_file<br /> rpcsec_gss_krb5 auth_rpcgss nfsv4 dns_resolver nfs lockd grace fscache netfs<br /> rfkill rpcrdma rdma_ucm ib_srpt sunrpc ib_isert iscsi_target_mod target_core_mod<br /> opa_vnic ib_iser libiscsi ib_umad scsi_transport_iscsi rdma_cm ib_ipoib iw_cm<br /> ib_cm hfi1(-) rdmavt ib_uverbs intel_rapl_msr intel_rapl_common sb_edac ib_core<br /> x86_pkg_temp_thermal intel_powerclamp coretemp i2c_i801 mxm_wmi rapl iTCO_wdt<br /> ipmi_si iTCO_vendor_support mei_me ipmi_devintf mei intel_cstate ioatdma<br /> intel_uncore i2c_smbus joydev pcspkr lpc_ich ipmi_msghandler acpi_power_meter<br /> acpi_pad xfs libcrc32c sr_mod sd_mod cdrom t10_pi sg crct10dif_pclmul<br /> crc32_pclmul crc32c_intel drm_kms_helper drm_shmem_helper ahci libahci<br /> ghash_clmulni_intel igb drm libata dca i2c_algo_bit wmi fuse<br /> CPU: 52 PID: 2117247 Comm: modprobe Not tainted 6.5.0-rc1+ #1<br /> Hardware name: Intel Corporation S2600CWR/S2600CW, BIOS<br /> SE5C610.86B.01.01.0014.121820151719 12/18/2015<br /> RIP: 0010:ib_cq_pool_cleanup+0xac/0xb0 [ib_core]<br /> Code: ff 48 8b 43 40 48 8d 7b 40 48 83 e8 40 4c 39 e7 75 b3 49 83<br /> c4 10 4d 39 fc 75 94 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc 0b eb a1<br /> 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f<br /> RSP: 0018:ffffc10bea13fc80 EFLAGS: 00010206<br /> RAX: 000000000000010c RBX: ffff9bf5c7e66c00 RCX: 000000008020001d<br /> RDX: 000000008020001e RSI: fffff175221f9900 RDI: ffff9bf5c7e67640<br /> RBP: ffff9bf5c7e67600 R08: ffff9bf5c7e64400 R09: 000000008020001d<br /> R10: 0000000040000000 R11: 0000000000000000 R12: ffff9bee4b1e8a18<br /> R13: dead000000000122 R14: dead000000000100 R15: ffff9bee4b1e8a38<br /> FS: 00007ff1e6d38740(0000) GS:ffff9bfd9fb00000(0000) knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: 00005652044ecc68 CR3: 0000000889b5c005 CR4: 00000000001706e0<br /> Call Trace:<br /> <br /> ? __warn+0x80/0x130<br /> ? ib_cq_pool_cleanup+0xac/0xb0 [ib_core]<br /> ? report_bug+0x195/0x1a0<br /> ? handle_bug+0x3c/0x70<br /> ? exc_invalid_op+0x14/0x70<br /> ? asm_exc_invalid_op+0x16/0x20<br /> ? ib_cq_pool_cleanup+0xac/0xb0 [ib_core]<br /> disable_device+0x9d/0x160 [ib_core]<br /> __ib_unregister_device+0x42/0xb0 [ib_core]<br /> ib_unregister_device+0x22/0x30 [ib_core]<br /> rvt_unregister_device+0x20/0x90 [rdmavt]<br /> hfi1_unregister_ib_device+0x16/0xf0 [hfi1]<br /> remove_one+0x55/0x1a0 [hfi1]<br /> pci_device_remove+0x36/0xa0<br /> device_release_driver_internal+0x193/0x200<br /> driver_detach+0x44/0x90<br /> bus_remove_driver+0x69/0xf0<br /> pci_unregister_driver+0x2a/0xb0<br /> hfi1_mod_cleanup+0xc/0x3c [hfi1]<br /> __do_sys_delete_module.constprop.0+0x17a/0x2f0<br /> ? exit_to_user_mode_prepare+0xc4/0xd0<br /> ? syscall_trace_enter.constprop.0+0x126/0x1a0<br /> do_syscall_64+0x5c/0x90<br /> ? syscall_exit_to_user_mode+0x12/0x30<br /> ? do_syscall_64+0x69/0x90<br /> ? syscall_exit_work+0x103/0x130<br /> ? syscall_exit_to_user_mode+0x12/0x30<br /> ? do_syscall_64+0x69/0x90<br /> ? exc_page_fault+0x65/0x150<br /> entry_SYSCALL_64_after_hwframe+0x6e/0xd8<br /> RIP: 0033:0x7ff1e643f5ab<br /> Code: 73 01 c3 48 8b 0d 75 a8 1b 00 f7 d8 64 89 01 48 83 c8 ff c3<br /> 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 b0 00 00 00 0f 05 3d 01 f0<br /> ff ff 73 01 c3 48 8b 0d 45 a8 1b 00 f7 d8 64 89 01 48<br /> RSP: 002b:00007ffec9103cc8 EFLAGS: 00000206 ORIG_RAX: 00000000000000b0<br /> RAX: ffffffffffffffda RBX: 00005615267fdc50 RCX: 00007ff1e643f5ab<br /> RDX: 0000000000000000 RSI: 0000000000000800 RDI: 00005615267fdcb8<br /> RBP: 00005615267fdc50 R08: 0000000000000000 R09: 0000000000000000<br /> R10: 00007ff1e659eac0 R11: 0000000000000206 R12: 00005615267fdcb8<br /> R13: 00000000000<br /> ---truncated---
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2025

CVE-2023-54220

Publication date:
30/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> serial: 8250: Fix oops for port-&gt;pm on uart_change_pm()<br /> <br /> Unloading a hardware specific 8250 driver can produce error "Unable to<br /> handle kernel paging request at virtual address" about ten seconds after<br /> unloading the driver. This happens on uart_hangup() calling<br /> uart_change_pm().<br /> <br /> Turns out commit 04e82793f068 ("serial: 8250: Reinit port-&gt;pm on port<br /> specific driver unbind") was only a partial fix. If the hardware specific<br /> driver has initialized port-&gt;pm function, we need to clear port-&gt;pm too.<br /> Just reinitializing port-&gt;ops does not do this. Otherwise serial8250_pm()<br /> will call port-&gt;pm() instead of serial8250_do_pm().
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2025

CVE-2023-54221

Publication date:
30/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> clk: imx93: fix memory leak and missing unwind goto in imx93_clocks_probe<br /> <br /> In function probe(), it returns directly without unregistered hws<br /> when error occurs.<br /> <br /> Fix this by adding &amp;#39;goto unregister_hws;&amp;#39; on line 295 and<br /> line 310.<br /> <br /> Use devm_kzalloc() instead of kzalloc() to automatically<br /> free the memory using devm_kfree() when error occurs.<br /> <br /> Replace of_iomap() with devm_of_iomap() to automatically<br /> handle the unused ioremap region and delete &amp;#39;iounmap(anatop_base);&amp;#39;<br /> in unregister_hws.
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2025

CVE-2023-54222

Publication date:
30/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> hte: tegra-194: Fix off by one in tegra_hte_map_to_line_id()<br /> <br /> The "map_sz" is the number of elements in the "m" array so the &gt;<br /> comparison needs to be changed to &gt;= to prevent an out of bounds<br /> read.
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2025

CVE-2023-54223

Publication date:
30/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net/mlx5e: xsk: Fix invalid buffer access for legacy rq<br /> <br /> The below crash can be encountered when using xdpsock in rx mode for<br /> legacy rq: the buffer gets released in the XDP_REDIRECT path, and then<br /> once again in the driver. This fix sets the flag to avoid releasing on<br /> the driver side.<br /> <br /> XSK handling of buffers for legacy rq was relying on the caller to set<br /> the skip release flag. But the referenced fix started using fragment<br /> counts for pages instead of the skip flag.<br /> <br /> Crash log:<br /> general protection fault, probably for non-canonical address 0xffff8881217e3a: 0000 [#1] SMP<br /> CPU: 0 PID: 14 Comm: ksoftirqd/0 Not tainted 6.5.0-rc1+ #31<br /> Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014<br /> RIP: 0010:bpf_prog_03b13f331978c78c+0xf/0x28<br /> Code: ...<br /> RSP: 0018:ffff88810082fc98 EFLAGS: 00010246<br /> RAX: 0000000000000000 RBX: ffff888138404901 RCX: c0ffffc900027cbc<br /> RDX: ffffffffa000b514 RSI: 00ffff8881217e32 RDI: ffff888138404901<br /> RBP: ffff88810082fc98 R08: 0000000000091100 R09: 0000000000000006<br /> R10: 0000000000000800 R11: 0000000000000800 R12: ffffc9000027a000<br /> R13: ffff8881217e2dc0 R14: ffff8881217e2910 R15: ffff8881217e2f00<br /> FS: 0000000000000000(0000) GS:ffff88852c800000(0000) knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: 0000564cb2e2cde0 CR3: 000000010e603004 CR4: 0000000000370eb0<br /> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br /> DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400<br /> Call Trace:<br /> <br /> ? die_addr+0x32/0x80<br /> ? exc_general_protection+0x192/0x390<br /> ? asm_exc_general_protection+0x22/0x30<br /> ? 0xffffffffa000b514<br /> ? bpf_prog_03b13f331978c78c+0xf/0x28<br /> mlx5e_xdp_handle+0x48/0x670 [mlx5_core]<br /> ? dev_gro_receive+0x3b5/0x6e0<br /> mlx5e_xsk_skb_from_cqe_linear+0x6e/0x90 [mlx5_core]<br /> mlx5e_handle_rx_cqe+0x55/0x100 [mlx5_core]<br /> mlx5e_poll_rx_cq+0x87/0x6e0 [mlx5_core]<br /> mlx5e_napi_poll+0x45e/0x6b0 [mlx5_core]<br /> __napi_poll+0x25/0x1a0<br /> net_rx_action+0x28a/0x300<br /> __do_softirq+0xcd/0x279<br /> ? sort_range+0x20/0x20<br /> run_ksoftirqd+0x1a/0x20<br /> smpboot_thread_fn+0xa2/0x130<br /> kthread+0xc9/0xf0<br /> ? kthread_complete_and_exit+0x20/0x20<br /> ret_from_fork+0x1f/0x30<br /> <br /> Modules linked in: mlx5_ib mlx5_core rpcrdma rdma_ucm ib_iser libiscsi scsi_transport_iscsi ib_umad rdma_cm ib_ipoib iw_cm ib_cm ib_uverbs ib_core xt_conntrack xt_MASQUERADE nf_conntrack_netlink nfnetlink xt_addrtype iptable_nat nf_nat br_netfilter overlay zram zsmalloc fuse [last unloaded: mlx5_core]<br /> ---[ end trace 0000000000000000 ]---
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2025

CVE-2023-54225

Publication date:
30/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: ipa: only reset hashed tables when supported<br /> <br /> Last year, the code that manages GSI channel transactions switched<br /> from using spinlock-protected linked lists to using indexes into the<br /> ring buffer used for a channel. Recently, Google reported seeing<br /> transaction reference count underflows occasionally during shutdown.<br /> <br /> Doug Anderson found a way to reproduce the issue reliably, and<br /> bisected the issue to the commit that eliminated the linked lists<br /> and the lock. The root cause was ultimately determined to be<br /> related to unused transactions being committed as part of the modem<br /> shutdown cleanup activity. Unused transactions are not normally<br /> expected (except in error cases).<br /> <br /> The modem uses some ranges of IPA-resident memory, and whenever it<br /> shuts down we zero those ranges. In ipa_filter_reset_table() a<br /> transaction is allocated to zero modem filter table entries. If<br /> hashing is not supported, hashed table memory should not be zeroed.<br /> But currently nothing prevents that, and the result is an unused<br /> transaction. Something similar occurs when we zero routing table<br /> entries for the modem.<br /> <br /> By preventing any attempt to clear hashed tables when hashing is not<br /> supported, the reference count underflow is avoided in this case.<br /> <br /> Note that there likely remains an issue with properly freeing unused<br /> transactions (if they occur due to errors). This patch addresses<br /> only the underflows that Google originally reported.
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2025

CVE-2023-54226

Publication date:
30/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> af_unix: Fix data races around sk-&gt;sk_shutdown.<br /> <br /> KCSAN found a data race around sk-&gt;sk_shutdown where unix_release_sock()<br /> and unix_shutdown() update it under unix_state_lock(), OTOH unix_poll()<br /> and unix_dgram_poll() read it locklessly.<br /> <br /> We need to annotate the writes and reads with WRITE_ONCE() and READ_ONCE().<br /> <br /> BUG: KCSAN: data-race in unix_poll / unix_release_sock<br /> <br /> write to 0xffff88800d0f8aec of 1 bytes by task 264 on cpu 0:<br /> unix_release_sock+0x75c/0x910 net/unix/af_unix.c:631<br /> unix_release+0x59/0x80 net/unix/af_unix.c:1042<br /> __sock_release+0x7d/0x170 net/socket.c:653<br /> sock_close+0x19/0x30 net/socket.c:1397<br /> __fput+0x179/0x5e0 fs/file_table.c:321<br /> ____fput+0x15/0x20 fs/file_table.c:349<br /> task_work_run+0x116/0x1a0 kernel/task_work.c:179<br /> resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]<br /> exit_to_user_mode_loop kernel/entry/common.c:171 [inline]<br /> exit_to_user_mode_prepare+0x174/0x180 kernel/entry/common.c:204<br /> __syscall_exit_to_user_mode_work kernel/entry/common.c:286 [inline]<br /> syscall_exit_to_user_mode+0x1a/0x30 kernel/entry/common.c:297<br /> do_syscall_64+0x4b/0x90 arch/x86/entry/common.c:86<br /> entry_SYSCALL_64_after_hwframe+0x72/0xdc<br /> <br /> read to 0xffff88800d0f8aec of 1 bytes by task 222 on cpu 1:<br /> unix_poll+0xa3/0x2a0 net/unix/af_unix.c:3170<br /> sock_poll+0xcf/0x2b0 net/socket.c:1385<br /> vfs_poll include/linux/poll.h:88 [inline]<br /> ep_item_poll.isra.0+0x78/0xc0 fs/eventpoll.c:855<br /> ep_send_events fs/eventpoll.c:1694 [inline]<br /> ep_poll fs/eventpoll.c:1823 [inline]<br /> do_epoll_wait+0x6c4/0xea0 fs/eventpoll.c:2258<br /> __do_sys_epoll_wait fs/eventpoll.c:2270 [inline]<br /> __se_sys_epoll_wait fs/eventpoll.c:2265 [inline]<br /> __x64_sys_epoll_wait+0xcc/0x190 fs/eventpoll.c:2265<br /> do_syscall_x64 arch/x86/entry/common.c:50 [inline]<br /> do_syscall_64+0x3b/0x90 arch/x86/entry/common.c:80<br /> entry_SYSCALL_64_after_hwframe+0x72/0xdc<br /> <br /> value changed: 0x00 -&gt; 0x03<br /> <br /> Reported by Kernel Concurrency Sanitizer on:<br /> CPU: 1 PID: 222 Comm: dbus-broker Not tainted 6.3.0-rc7-02330-gca6270c12e20 #2<br /> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2025

CVE-2023-54224

Publication date:
30/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> btrfs: fix lockdep splat and potential deadlock after failure running delayed items<br /> <br /> When running delayed items we are holding a delayed node&amp;#39;s mutex and then<br /> we will attempt to modify a subvolume btree to insert/update/delete the<br /> delayed items. However if have an error during the insertions for example,<br /> btrfs_insert_delayed_items() may return with a path that has locked extent<br /> buffers (a leaf at the very least), and then we attempt to release the<br /> delayed node at __btrfs_run_delayed_items(), which requires taking the<br /> delayed node&amp;#39;s mutex, causing an ABBA type of deadlock. This was reported<br /> by syzbot and the lockdep splat is the following:<br /> <br /> WARNING: possible circular locking dependency detected<br /> 6.5.0-rc7-syzkaller-00024-g93f5de5f648d #0 Not tainted<br /> ------------------------------------------------------<br /> syz-executor.2/13257 is trying to acquire lock:<br /> ffff88801835c0c0 (&amp;delayed_node-&gt;mutex){+.+.}-{3:3}, at: __btrfs_release_delayed_node+0x9a/0xaa0 fs/btrfs/delayed-inode.c:256<br /> <br /> but task is already holding lock:<br /> ffff88802a5ab8e8 (btrfs-tree-00){++++}-{3:3}, at: __btrfs_tree_lock+0x3c/0x2a0 fs/btrfs/locking.c:198<br /> <br /> which lock already depends on the new lock.<br /> <br /> the existing dependency chain (in reverse order) is:<br /> <br /> -&gt; #1 (btrfs-tree-00){++++}-{3:3}:<br /> __lock_release kernel/locking/lockdep.c:5475 [inline]<br /> lock_release+0x36f/0x9d0 kernel/locking/lockdep.c:5781<br /> up_write+0x79/0x580 kernel/locking/rwsem.c:1625<br /> btrfs_tree_unlock_rw fs/btrfs/locking.h:189 [inline]<br /> btrfs_unlock_up_safe+0x179/0x3b0 fs/btrfs/locking.c:239<br /> search_leaf fs/btrfs/ctree.c:1986 [inline]<br /> btrfs_search_slot+0x2511/0x2f80 fs/btrfs/ctree.c:2230<br /> btrfs_insert_empty_items+0x9c/0x180 fs/btrfs/ctree.c:4376<br /> btrfs_insert_delayed_item fs/btrfs/delayed-inode.c:746 [inline]<br /> btrfs_insert_delayed_items fs/btrfs/delayed-inode.c:824 [inline]<br /> __btrfs_commit_inode_delayed_items+0xd24/0x2410 fs/btrfs/delayed-inode.c:1111<br /> __btrfs_run_delayed_items+0x1db/0x430 fs/btrfs/delayed-inode.c:1153<br /> flush_space+0x269/0xe70 fs/btrfs/space-info.c:723<br /> btrfs_async_reclaim_metadata_space+0x106/0x350 fs/btrfs/space-info.c:1078<br /> process_one_work+0x92c/0x12c0 kernel/workqueue.c:2600<br /> worker_thread+0xa63/0x1210 kernel/workqueue.c:2751<br /> kthread+0x2b8/0x350 kernel/kthread.c:389<br /> ret_from_fork+0x2e/0x60 arch/x86/kernel/process.c:145<br /> ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304<br /> <br /> -&gt; #0 (&amp;delayed_node-&gt;mutex){+.+.}-{3:3}:<br /> check_prev_add kernel/locking/lockdep.c:3142 [inline]<br /> check_prevs_add kernel/locking/lockdep.c:3261 [inline]<br /> validate_chain kernel/locking/lockdep.c:3876 [inline]<br /> __lock_acquire+0x39ff/0x7f70 kernel/locking/lockdep.c:5144<br /> lock_acquire+0x1e3/0x520 kernel/locking/lockdep.c:5761<br /> __mutex_lock_common+0x1d8/0x2530 kernel/locking/mutex.c:603<br /> __mutex_lock kernel/locking/mutex.c:747 [inline]<br /> mutex_lock_nested+0x1b/0x20 kernel/locking/mutex.c:799<br /> __btrfs_release_delayed_node+0x9a/0xaa0 fs/btrfs/delayed-inode.c:256<br /> btrfs_release_delayed_node fs/btrfs/delayed-inode.c:281 [inline]<br /> __btrfs_run_delayed_items+0x2b5/0x430 fs/btrfs/delayed-inode.c:1156<br /> btrfs_commit_transaction+0x859/0x2ff0 fs/btrfs/transaction.c:2276<br /> btrfs_sync_file+0xf56/0x1330 fs/btrfs/file.c:1988<br /> vfs_fsync_range fs/sync.c:188 [inline]<br /> vfs_fsync fs/sync.c:202 [inline]<br /> do_fsync fs/sync.c:212 [inline]<br /> __do_sys_fsync fs/sync.c:220 [inline]<br /> __se_sys_fsync fs/sync.c:218 [inline]<br /> __x64_sys_fsync+0x196/0x1e0 fs/sync.c:218<br /> do_syscall_x64 arch/x86/entry/common.c:50 [inline]<br /> do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80<br /> entry_SYSCALL_64_after_hwframe+0x63/0xcd<br /> <br /> other info that<br /> ---truncated---
Severity CVSS v4.0: Pending analysis
Last modification:
05/01/2026

CVE-2023-54212

Publication date:
30/12/2025
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: Pending analysis
Last modification:
30/12/2025

CVE-2023-54209

Publication date:
30/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> block: fix blktrace debugfs entries leakage<br /> <br /> Commit 99d055b4fd4b ("block: remove per-disk debugfs files in<br /> blk_unregister_queue") moves blk_trace_shutdown() from<br /> blk_release_queue() to blk_unregister_queue(), this is safe if blktrace<br /> is created through sysfs, however, there is a regression in corner<br /> case.<br /> <br /> blktrace can still be enabled after del_gendisk() through ioctl if<br /> the disk is opened before del_gendisk(), and if blktrace is not shutdown<br /> through ioctl before closing the disk, debugfs entries will be leaked.<br /> <br /> Fix this problem by shutdown blktrace in disk_release(), this is safe<br /> because blk_trace_remove() is reentrant.
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2025

CVE-2023-54210

Publication date:
30/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> Bluetooth: hci_sync: Avoid use-after-free in dbg for hci_remove_adv_monitor()<br /> <br /> KASAN reports that there&amp;#39;s a use-after-free in<br /> hci_remove_adv_monitor(). Trawling through the disassembly, you can<br /> see that the complaint is from the access in bt_dev_dbg() under the<br /> HCI_ADV_MONITOR_EXT_MSFT case. The problem case happens because<br /> msft_remove_monitor() can end up freeing the monitor<br /> structure. Specifically:<br /> hci_remove_adv_monitor() -&gt;<br /> msft_remove_monitor() -&gt;<br /> msft_remove_monitor_sync() -&gt;<br /> msft_le_cancel_monitor_advertisement_cb() -&gt;<br /> hci_free_adv_monitor()<br /> <br /> Let&amp;#39;s fix the problem by just stashing the relevant data when it&amp;#39;s<br /> still valid.
Severity CVSS v4.0: Pending analysis
Last modification:
31/12/2025