Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2023-53150

Publication date:
15/09/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> scsi: qla2xxx: Pointer may be dereferenced<br /> <br /> Klocwork tool reported pointer &amp;#39;rport&amp;#39; returned from call to function<br /> fc_bsg_to_rport() may be NULL and will be dereferenced.<br /> <br /> Add a fix to validate rport before dereferencing.
Severity CVSS v4.0: Pending analysis
Last modification:
15/09/2025

CVE-2023-53151

Publication date:
15/09/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> md/raid10: prevent soft lockup while flush writes<br /> <br /> Currently, there is no limit for raid1/raid10 plugged bio. While flushing<br /> writes, raid1 has cond_resched() while raid10 doesn&amp;#39;t, and too many<br /> writes can cause soft lockup.<br /> <br /> Follow up soft lockup can be triggered easily with writeback test for<br /> raid10 with ramdisks:<br /> <br /> watchdog: BUG: soft lockup - CPU#10 stuck for 27s! [md0_raid10:1293]<br /> Call Trace:<br /> <br /> call_rcu+0x16/0x20<br /> put_object+0x41/0x80<br /> __delete_object+0x50/0x90<br /> delete_object_full+0x2b/0x40<br /> kmemleak_free+0x46/0xa0<br /> slab_free_freelist_hook.constprop.0+0xed/0x1a0<br /> kmem_cache_free+0xfd/0x300<br /> mempool_free_slab+0x1f/0x30<br /> mempool_free+0x3a/0x100<br /> bio_free+0x59/0x80<br /> bio_put+0xcf/0x2c0<br /> free_r10bio+0xbf/0xf0<br /> raid_end_bio_io+0x78/0xb0<br /> one_write_done+0x8a/0xa0<br /> raid10_end_write_request+0x1b4/0x430<br /> bio_endio+0x175/0x320<br /> brd_submit_bio+0x3b9/0x9b7 [brd]<br /> __submit_bio+0x69/0xe0<br /> submit_bio_noacct_nocheck+0x1e6/0x5a0<br /> submit_bio_noacct+0x38c/0x7e0<br /> flush_pending_writes+0xf0/0x240<br /> raid10d+0xac/0x1ed0<br /> <br /> Fix the problem by adding cond_resched() to raid10 like what raid1 did.<br /> <br /> Note that unlimited plugged bio still need to be optimized, for example,<br /> in the case of lots of dirty pages writeback, this will take lots of<br /> memory and io will spend a long time in plug, hence io latency is bad.
Severity CVSS v4.0: Pending analysis
Last modification:
15/09/2025

CVE-2023-53152

Publication date:
15/09/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amdgpu: fix calltrace warning in amddrm_buddy_fini<br /> <br /> The following call trace is observed when removing the amdgpu driver, which<br /> is caused by that BOs allocated for psp are not freed until removing.<br /> <br /> [61811.450562] RIP: 0010:amddrm_buddy_fini.cold+0x29/0x47 [amddrm_buddy]<br /> [61811.450577] Call Trace:<br /> [61811.450577] <br /> [61811.450579] amdgpu_vram_mgr_fini+0x135/0x1c0 [amdgpu]<br /> [61811.450728] amdgpu_ttm_fini+0x207/0x290 [amdgpu]<br /> [61811.450870] amdgpu_bo_fini+0x27/0xa0 [amdgpu]<br /> [61811.451012] gmc_v9_0_sw_fini+0x4a/0x60 [amdgpu]<br /> [61811.451166] amdgpu_device_fini_sw+0x117/0x520 [amdgpu]<br /> [61811.451306] amdgpu_driver_release_kms+0x16/0x30 [amdgpu]<br /> [61811.451447] devm_drm_dev_init_release+0x4d/0x80 [drm]<br /> [61811.451466] devm_action_release+0x15/0x20<br /> [61811.451469] release_nodes+0x40/0xb0<br /> [61811.451471] devres_release_all+0x9b/0xd0<br /> [61811.451473] __device_release_driver+0x1bb/0x2a0<br /> [61811.451476] driver_detach+0xf3/0x140<br /> [61811.451479] bus_remove_driver+0x6c/0xf0<br /> [61811.451481] driver_unregister+0x31/0x60<br /> [61811.451483] pci_unregister_driver+0x40/0x90<br /> [61811.451486] amdgpu_exit+0x15/0x447 [amdgpu]<br /> <br /> For smu v13_0_2, if the GPU supports xgmi, refer to<br /> <br /> commit f5c7e7797060 ("drm/amdgpu: Adjust removal control flow for smu v13_0_2"),<br /> <br /> it will run gpu recover in AMDGPU_RESET_FOR_DEVICE_REMOVE mode when removing,<br /> which makes all devices in hive list have hw reset but no resume except the<br /> basic ip blocks, then other ip blocks will not call .hw_fini according to<br /> ip_block.status.hw.<br /> <br /> Since psp_free_shared_bufs just includes some software operations, so move<br /> it to psp_sw_fini.
Severity CVSS v4.0: Pending analysis
Last modification:
15/09/2025

CVE-2023-53153

Publication date:
15/09/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: cfg80211: Fix use after free for wext<br /> <br /> Key information in wext.connect is not reset on (re)connect and can hold<br /> data from a previous connection.<br /> <br /> Reset key data to avoid that drivers or mac80211 incorrectly detect a<br /> WEP connection request and access the freed or already reused memory.<br /> <br /> Additionally optimize cfg80211_sme_connect() and avoid an useless<br /> schedule of conn_work.
Severity CVSS v4.0: Pending analysis
Last modification:
15/09/2025

CVE-2023-53163

Publication date:
15/09/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> fs/ntfs3: don&amp;#39;t hold ni_lock when calling truncate_setsize()<br /> <br /> syzbot is reporting hung task at do_user_addr_fault() [1], for there is<br /> a silent deadlock between PG_locked bit and ni_lock lock.<br /> <br /> Since filemap_update_page() calls filemap_read_folio() after calling<br /> folio_trylock() which will set PG_locked bit, ntfs_truncate() must not<br /> call truncate_setsize() which will wait for PG_locked bit to be cleared<br /> when holding ni_lock lock.
Severity CVSS v4.0: Pending analysis
Last modification:
15/09/2025

CVE-2022-50253

Publication date:
15/09/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bpf: make sure skb-&gt;len != 0 when redirecting to a tunneling device<br /> <br /> syzkaller managed to trigger another case where skb-&gt;len == 0<br /> when we enter __dev_queue_xmit:<br /> <br /> WARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]<br /> WARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295<br /> <br /> Call Trace:<br /> dev_queue_xmit+0x17/0x20 net/core/dev.c:4406<br /> __bpf_tx_skb net/core/filter.c:2115 [inline]<br /> __bpf_redirect_no_mac net/core/filter.c:2140 [inline]<br /> __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163<br /> ____bpf_clone_redirect net/core/filter.c:2447 [inline]<br /> bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419<br /> bpf_prog_48159a89cb4a9a16+0x59/0x5e<br /> bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]<br /> __bpf_prog_run include/linux/filter.h:596 [inline]<br /> bpf_prog_run include/linux/filter.h:603 [inline]<br /> bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402<br /> bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170<br /> bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648<br /> __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005<br /> __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]<br /> __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]<br /> __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089<br /> do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48<br /> entry_SYSCALL_64_after_hwframe+0x61/0xc6<br /> <br /> The reproducer doesn&amp;#39;t really reproduce outside of syzkaller<br /> environment, so I&amp;#39;m taking a guess here. It looks like we<br /> do generate correct ETH_HLEN-sized packet, but we redirect<br /> the packet to the tunneling device. Before we do so, we<br /> __skb_pull l2 header and arrive again at skb-&gt;len == 0.<br /> Doesn&amp;#39;t seem like we can do anything better than having<br /> an explicit check after __skb_pull?
Severity CVSS v4.0: Pending analysis
Last modification:
15/09/2025

CVE-2022-50254

Publication date:
15/09/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> media: ov8865: Fix an error handling path in ov8865_probe()<br /> <br /> The commit in Fixes also introduced some new error handling which should<br /> goto the existing error handling path.<br /> Otherwise some resources leak.
Severity CVSS v4.0: Pending analysis
Last modification:
15/09/2025

CVE-2022-50255

Publication date:
15/09/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> tracing: Fix reading strings from synthetic events<br /> <br /> The follow commands caused a crash:<br /> <br /> # cd /sys/kernel/tracing<br /> # echo &amp;#39;s:open char file[]&amp;#39; &gt; dynamic_events<br /> # echo &amp;#39;hist:keys=common_pid:file=filename:onchange($file).trace(open,$file)&amp;#39; &gt; events/syscalls/sys_enter_openat/trigger&amp;#39;<br /> # echo 1 &gt; events/synthetic/open/enable<br /> <br /> BOOM!<br /> <br /> The problem is that the synthetic event field "char file[]" will read<br /> the value given to it as a string without any memory checks to make sure<br /> the address is valid. The above example will pass in the user space<br /> address and the sythetic event code will happily call strlen() on it<br /> and then strscpy() where either one will cause an oops when accessing<br /> user space addresses.<br /> <br /> Use the helper functions from trace_kprobe and trace_eprobe that can<br /> read strings safely (and actually succeed when the address is from user<br /> space and the memory is mapped in).<br /> <br /> Now the above can show:<br /> <br /> packagekitd-1721 [000] ...2. 104.597170: open: file=/usr/lib/rpm/fileattrs/cmake.attr<br /> in:imjournal-978 [006] ...2. 104.599642: open: file=/var/lib/rsyslog/imjournal.state.tmp<br /> packagekitd-1721 [000] ...2. 104.626308: open: file=/usr/lib/rpm/fileattrs/debuginfo.attr
Severity CVSS v4.0: Pending analysis
Last modification:
15/09/2025

CVE-2022-50256

Publication date:
15/09/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/meson: remove drm bridges at aggregate driver unbind time<br /> <br /> drm bridges added by meson_encoder_hdmi_init and meson_encoder_cvbs_init<br /> were not manually removed at module unload time, which caused dangling<br /> references to freed memory to remain linked in the global bridge_list.<br /> <br /> When loading the driver modules back in, the same functions would again<br /> call drm_bridge_add, and when traversing the global bridge_list, would<br /> end up peeking into freed memory.<br /> <br /> Once again KASAN revealed the problem:<br /> <br /> [ +0.000095] =============================================================<br /> [ +0.000008] BUG: KASAN: use-after-free in __list_add_valid+0x9c/0x120<br /> [ +0.000018] Read of size 8 at addr ffff00003da291f0 by task modprobe/2483<br /> <br /> [ +0.000018] CPU: 3 PID: 2483 Comm: modprobe Tainted: G C O 5.19.0-rc6-lrmbkasan+ #1<br /> [ +0.000011] Hardware name: Hardkernel ODROID-N2Plus (DT)<br /> [ +0.000008] Call trace:<br /> [ +0.000006] dump_backtrace+0x1ec/0x280<br /> [ +0.000012] show_stack+0x24/0x80<br /> [ +0.000008] dump_stack_lvl+0x98/0xd4<br /> [ +0.000011] print_address_description.constprop.0+0x80/0x520<br /> [ +0.000011] print_report+0x128/0x260<br /> [ +0.000008] kasan_report+0xb8/0xfc<br /> [ +0.000008] __asan_report_load8_noabort+0x3c/0x50<br /> [ +0.000009] __list_add_valid+0x9c/0x120<br /> [ +0.000009] drm_bridge_add+0x6c/0x104 [drm]<br /> [ +0.000165] dw_hdmi_probe+0x1900/0x2360 [dw_hdmi]<br /> [ +0.000022] meson_dw_hdmi_bind+0x520/0x814 [meson_dw_hdmi]<br /> [ +0.000014] component_bind+0x174/0x520<br /> [ +0.000012] component_bind_all+0x1a8/0x38c<br /> [ +0.000010] meson_drv_bind_master+0x5e8/0xb74 [meson_drm]<br /> [ +0.000032] meson_drv_bind+0x20/0x2c [meson_drm]<br /> [ +0.000027] try_to_bring_up_aggregate_device+0x19c/0x390<br /> [ +0.000010] component_master_add_with_match+0x1c8/0x284<br /> [ +0.000009] meson_drv_probe+0x274/0x280 [meson_drm]<br /> [ +0.000026] platform_probe+0xd0/0x220<br /> [ +0.000009] really_probe+0x3ac/0xa80<br /> [ +0.000009] __driver_probe_device+0x1f8/0x400<br /> [ +0.000009] driver_probe_device+0x68/0x1b0<br /> [ +0.000009] __driver_attach+0x20c/0x480<br /> [ +0.000008] bus_for_each_dev+0x114/0x1b0<br /> [ +0.000009] driver_attach+0x48/0x64<br /> [ +0.000008] bus_add_driver+0x390/0x564<br /> [ +0.000009] driver_register+0x1a8/0x3e4<br /> [ +0.000009] __platform_driver_register+0x6c/0x94<br /> [ +0.000008] meson_drm_platform_driver_init+0x3c/0x1000 [meson_drm]<br /> [ +0.000027] do_one_initcall+0xc4/0x2b0<br /> [ +0.000011] do_init_module+0x154/0x570<br /> [ +0.000011] load_module+0x1a78/0x1ea4<br /> [ +0.000008] __do_sys_init_module+0x184/0x1cc<br /> [ +0.000009] __arm64_sys_init_module+0x78/0xb0<br /> [ +0.000009] invoke_syscall+0x74/0x260<br /> [ +0.000009] el0_svc_common.constprop.0+0xcc/0x260<br /> [ +0.000008] do_el0_svc+0x50/0x70<br /> [ +0.000007] el0_svc+0x68/0x1a0<br /> [ +0.000012] el0t_64_sync_handler+0x11c/0x150<br /> [ +0.000008] el0t_64_sync+0x18c/0x190<br /> <br /> [ +0.000016] Allocated by task 879:<br /> [ +0.000008] kasan_save_stack+0x2c/0x5c<br /> [ +0.000011] __kasan_kmalloc+0x90/0xd0<br /> [ +0.000007] __kmalloc+0x278/0x4a0<br /> [ +0.000011] mpi_resize+0x13c/0x1d0<br /> [ +0.000011] mpi_powm+0xd24/0x1570<br /> [ +0.000009] rsa_enc+0x1a4/0x30c<br /> [ +0.000009] pkcs1pad_verify+0x3f0/0x580<br /> [ +0.000009] public_key_verify_signature+0x7a8/0xba4<br /> [ +0.000010] public_key_verify_signature_2+0x40/0x60<br /> [ +0.000008] verify_signature+0xb4/0x114<br /> [ +0.000008] pkcs7_validate_trust_one.constprop.0+0x3b8/0x574<br /> [ +0.000009] pkcs7_validate_trust+0xb8/0x15c<br /> [ +0.000008] verify_pkcs7_message_sig+0xec/0x1b0<br /> [ +0.000012] verify_pkcs7_signature+0x78/0xac<br /> [ +0.000007] mod_verify_sig+0x110/0x190<br /> [ +0.000009] module_sig_check+0x114/0x1e0<br /> [ +0.000009] load_module+0xa0/0x1ea4<br /> [ +0.000008] __do_sys_init_module+0x184/0x1cc<br /> [ +0.000008] __arm64_sys_init_module+0x78/0xb0<br /> [ +0.000008] invoke_syscall+0x74/0x260<br /> [ +0.000009] el0_svc_common.constprop.0+0x1a8/0x260<br /> [ +0.000008] do_el0_svc+0x50/0x70<br /> [ +0.000007] el0_svc+0x68/0x1a0<br /> [ +0.000009] el0t_64_sync_handler+0x11c/0x150<br /> [ +0.000009] el0t_64<br /> ---truncated---
Severity CVSS v4.0: Pending analysis
Last modification:
15/09/2025

CVE-2022-50257

Publication date:
15/09/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> xen/gntdev: Prevent leaking grants<br /> <br /> Prior to this commit, if a grant mapping operation failed partially,<br /> some of the entries in the map_ops array would be invalid, whereas all<br /> of the entries in the kmap_ops array would be valid. This in turn would<br /> cause the following logic in gntdev_map_grant_pages to become invalid:<br /> <br /> for (i = 0; i count; i++) {<br /> if (map-&gt;map_ops[i].status == GNTST_okay) {<br /> map-&gt;unmap_ops[i].handle = map-&gt;map_ops[i].handle;<br /> if (!use_ptemod)<br /> alloced++;<br /> }<br /> if (use_ptemod) {<br /> if (map-&gt;kmap_ops[i].status == GNTST_okay) {<br /> if (map-&gt;map_ops[i].status == GNTST_okay)<br /> alloced++;<br /> map-&gt;kunmap_ops[i].handle = map-&gt;kmap_ops[i].handle;<br /> }<br /> }<br /> }<br /> ...<br /> atomic_add(alloced, &amp;map-&gt;live_grants);<br /> <br /> Assume that use_ptemod is true (i.e., the domain mapping the granted<br /> pages is a paravirtualized domain). In the code excerpt above, note that<br /> the "alloced" variable is only incremented when both kmap_ops[i].status<br /> and map_ops[i].status are set to GNTST_okay (i.e., both mapping<br /> operations are successful). However, as also noted above, there are<br /> cases where a grant mapping operation fails partially, breaking the<br /> assumption of the code excerpt above.<br /> <br /> The aforementioned causes map-&gt;live_grants to be incorrectly set. In<br /> some cases, all of the map_ops mappings fail, but all of the kmap_ops<br /> mappings succeed, meaning that live_grants may remain zero. This in turn<br /> makes it impossible to unmap the successfully grant-mapped pages pointed<br /> to by kmap_ops, because unmap_grant_pages has the following snippet of<br /> code at its beginning:<br /> <br /> if (atomic_read(&amp;map-&gt;live_grants) == 0)<br /> return; /* Nothing to do */<br /> <br /> In other cases where only some of the map_ops mappings fail but all<br /> kmap_ops mappings succeed, live_grants is made positive, but when the<br /> user requests unmapping the grant-mapped pages, __unmap_grant_pages_done<br /> will then make map-&gt;live_grants negative, because the latter function<br /> does not check if all of the pages that were requested to be unmapped<br /> were actually unmapped, and the same function unconditionally subtracts<br /> "data-&gt;count" (i.e., a value that can be greater than map-&gt;live_grants)<br /> from map-&gt;live_grants. The side effects of a negative live_grants value<br /> have not been studied.<br /> <br /> The net effect of all of this is that grant references are leaked in one<br /> of the above conditions. In Qubes OS v4.1 (which uses Xen&amp;#39;s grant<br /> mechanism extensively for X11 GUI isolation), this issue manifests<br /> itself with warning messages like the following to be printed out by the<br /> Linux kernel in the VM that had granted pages (that contain X11 GUI<br /> window data) to dom0: "g.e. 0x1234 still pending", especially after the<br /> user rapidly resizes GUI VM windows (causing some grant-mapping<br /> operations to partially or completely fail, due to the fact that the VM<br /> unshares some of the pages as part of the window resizing, making the<br /> pages impossible to grant-map from dom0).<br /> <br /> The fix for this issue involves counting all successful map_ops and<br /> kmap_ops mappings separately, and then adding the sum to live_grants.<br /> During unmapping, only the number of successfully unmapped grants is<br /> subtracted from live_grants. The code is also modified to check for<br /> negative live_grants values after the subtraction and warn the user.
Severity CVSS v4.0: Pending analysis
Last modification:
15/09/2025

CVE-2022-50258

Publication date:
15/09/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: brcmfmac: Fix potential stack-out-of-bounds in brcmf_c_preinit_dcmds()<br /> <br /> This patch fixes a stack-out-of-bounds read in brcmfmac that occurs<br /> when &amp;#39;buf&amp;#39; that is not null-terminated is passed as an argument of<br /> strsep() in brcmf_c_preinit_dcmds(). This buffer is filled with a firmware<br /> version string by memcpy() in brcmf_fil_iovar_data_get().<br /> The patch ensures buf is null-terminated.<br /> <br /> Found by a modified version of syzkaller.<br /> <br /> [ 47.569679][ T1897] brcmfmac: brcmf_fw_alloc_request: using brcm/brcmfmac43236b for chip BCM43236/3<br /> [ 47.582839][ T1897] brcmfmac: brcmf_c_process_clm_blob: no clm_blob available (err=-2), device may have limited channels available<br /> [ 47.601565][ T1897] ==================================================================<br /> [ 47.602574][ T1897] BUG: KASAN: stack-out-of-bounds in strsep+0x1b2/0x1f0<br /> [ 47.603447][ T1897] Read of size 1 at addr ffffc90001f6f000 by task kworker/0:2/1897<br /> [ 47.604336][ T1897]<br /> [ 47.604621][ T1897] CPU: 0 PID: 1897 Comm: kworker/0:2 Tainted: G O 5.14.0+ #131<br /> [ 47.605617][ T1897] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org 04/01/2014<br /> [ 47.606907][ T1897] Workqueue: usb_hub_wq hub_event<br /> [ 47.607453][ T1897] Call Trace:<br /> [ 47.607801][ T1897] dump_stack_lvl+0x8e/0xd1<br /> [ 47.608295][ T1897] print_address_description.constprop.0.cold+0xf/0x334<br /> [ 47.609009][ T1897] ? strsep+0x1b2/0x1f0<br /> [ 47.609434][ T1897] ? strsep+0x1b2/0x1f0<br /> [ 47.609863][ T1897] kasan_report.cold+0x83/0xdf<br /> [ 47.610366][ T1897] ? strsep+0x1b2/0x1f0<br /> [ 47.610882][ T1897] strsep+0x1b2/0x1f0<br /> [ 47.611300][ T1897] ? brcmf_fil_iovar_data_get+0x3a/0xf0<br /> [ 47.611883][ T1897] brcmf_c_preinit_dcmds+0x995/0xc40<br /> [ 47.612434][ T1897] ? brcmf_c_set_joinpref_default+0x100/0x100<br /> [ 47.613078][ T1897] ? rcu_read_lock_sched_held+0xa1/0xd0<br /> [ 47.613662][ T1897] ? rcu_read_lock_bh_held+0xb0/0xb0<br /> [ 47.614208][ T1897] ? lock_acquire+0x19d/0x4e0<br /> [ 47.614704][ T1897] ? find_held_lock+0x2d/0x110<br /> [ 47.615236][ T1897] ? brcmf_usb_deq+0x1a7/0x260<br /> [ 47.615741][ T1897] ? brcmf_usb_rx_fill_all+0x5a/0xf0<br /> [ 47.616288][ T1897] brcmf_attach+0x246/0xd40<br /> [ 47.616758][ T1897] ? wiphy_new_nm+0x1703/0x1dd0<br /> [ 47.617280][ T1897] ? kmemdup+0x43/0x50<br /> [ 47.617720][ T1897] brcmf_usb_probe+0x12de/0x1690<br /> [ 47.618244][ T1897] ? brcmf_usbdev_qinit.constprop.0+0x470/0x470<br /> [ 47.618901][ T1897] usb_probe_interface+0x2aa/0x760<br /> [ 47.619429][ T1897] ? usb_probe_device+0x250/0x250<br /> [ 47.619950][ T1897] really_probe+0x205/0xb70<br /> [ 47.620435][ T1897] ? driver_allows_async_probing+0x130/0x130<br /> [ 47.621048][ T1897] __driver_probe_device+0x311/0x4b0<br /> [ 47.621595][ T1897] ? driver_allows_async_probing+0x130/0x130<br /> [ 47.622209][ T1897] driver_probe_device+0x4e/0x150<br /> [ 47.622739][ T1897] __device_attach_driver+0x1cc/0x2a0<br /> [ 47.623287][ T1897] bus_for_each_drv+0x156/0x1d0<br /> [ 47.623796][ T1897] ? bus_rescan_devices+0x30/0x30<br /> [ 47.624309][ T1897] ? lockdep_hardirqs_on_prepare+0x273/0x3e0<br /> [ 47.624907][ T1897] ? trace_hardirqs_on+0x46/0x160<br /> [ 47.625437][ T1897] __device_attach+0x23f/0x3a0<br /> [ 47.625924][ T1897] ? device_bind_driver+0xd0/0xd0<br /> [ 47.626433][ T1897] ? kobject_uevent_env+0x287/0x14b0<br /> [ 47.627057][ T1897] bus_probe_device+0x1da/0x290<br /> [ 47.627557][ T1897] device_add+0xb7b/0x1eb0<br /> [ 47.628027][ T1897] ? wait_for_completion+0x290/0x290<br /> [ 47.628593][ T1897] ? __fw_devlink_link_to_suppliers+0x5a0/0x5a0<br /> [ 47.629249][ T1897] usb_set_configuration+0xf59/0x16f0<br /> [ 47.629829][ T1897] usb_generic_driver_probe+0x82/0xa0<br /> [ 47.630385][ T1897] usb_probe_device+0xbb/0x250<br /> [ 47.630927][ T1897] ? usb_suspend+0x590/0x590<br /> [ 47.631397][ T1897] really_probe+0x205/0xb70<br /> [ 47.631855][ T1897] ? driver_allows_async_probing+0x130/0x130<br /> [ 47.632469][ T1897] __driver_probe_device+0x311/0x4b0<br /> [ 47.633002][ <br /> ---truncated---
Severity CVSS v4.0: Pending analysis
Last modification:
15/09/2025

CVE-2022-50259

Publication date:
15/09/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bpf, sockmap: fix race in sock_map_free()<br /> <br /> sock_map_free() calls release_sock(sk) without owning a reference<br /> on the socket. This can cause use-after-free as syzbot found [1]<br /> <br /> Jakub Sitnicki already took care of a similar issue<br /> in sock_hash_free() in commit 75e68e5bf2c7 ("bpf, sockhash:<br /> Synchronize delete from bucket list on map free")<br /> <br /> [1]<br /> refcount_t: decrement hit 0; leaking memory.<br /> WARNING: CPU: 0 PID: 3785 at lib/refcount.c:31 refcount_warn_saturate+0x17c/0x1a0 lib/refcount.c:31<br /> Modules linked in:<br /> CPU: 0 PID: 3785 Comm: kworker/u4:6 Not tainted 6.1.0-rc7-syzkaller-00103-gef4d3ea40565 #0<br /> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022<br /> Workqueue: events_unbound bpf_map_free_deferred<br /> RIP: 0010:refcount_warn_saturate+0x17c/0x1a0 lib/refcount.c:31<br /> Code: 68 8b 31 c0 e8 75 71 15 fd 0f 0b e9 64 ff ff ff e8 d9 6e 4e fd c6 05 62 9c 3d 0a 01 48 c7 c7 80 bb 68 8b 31 c0 e8 54 71 15 fd 0b e9 43 ff ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a2 fe ff<br /> RSP: 0018:ffffc9000456fb60 EFLAGS: 00010246<br /> RAX: eae59bab72dcd700 RBX: 0000000000000004 RCX: ffff8880207057c0<br /> RDX: 0000000000000000 RSI: 0000000000000201 RDI: 0000000000000000<br /> RBP: 0000000000000004 R08: ffffffff816fdabd R09: fffff520008adee5<br /> R10: fffff520008adee5 R11: 1ffff920008adee4 R12: 0000000000000004<br /> R13: dffffc0000000000 R14: ffff88807b1c6c00 R15: 1ffff1100f638dcf<br /> FS: 0000000000000000(0000) GS:ffff8880b9800000(0000) knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: 0000001b30c30000 CR3: 000000000d08e000 CR4: 00000000003506f0<br /> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br /> DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400<br /> Call Trace:<br /> <br /> __refcount_dec include/linux/refcount.h:344 [inline]<br /> refcount_dec include/linux/refcount.h:359 [inline]<br /> __sock_put include/net/sock.h:779 [inline]<br /> tcp_release_cb+0x2d0/0x360 net/ipv4/tcp_output.c:1092<br /> release_sock+0xaf/0x1c0 net/core/sock.c:3468<br /> sock_map_free+0x219/0x2c0 net/core/sock_map.c:356<br /> process_one_work+0x81c/0xd10 kernel/workqueue.c:2289<br /> worker_thread+0xb14/0x1330 kernel/workqueue.c:2436<br /> kthread+0x266/0x300 kernel/kthread.c:376<br /> ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306<br />
Severity CVSS v4.0: Pending analysis
Last modification:
15/09/2025