Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-26787

Publication date:
04/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mmc: mmci: stm32: fix DMA API overlapping mappings warning<br /> <br /> Turning on CONFIG_DMA_API_DEBUG_SG results in the following warning:<br /> <br /> DMA-API: mmci-pl18x 48220000.mmc: cacheline tracking EEXIST,<br /> overlapping mappings aren&amp;#39;t supported<br /> WARNING: CPU: 1 PID: 51 at kernel/dma/debug.c:568<br /> add_dma_entry+0x234/0x2f4<br /> Modules linked in:<br /> CPU: 1 PID: 51 Comm: kworker/1:2 Not tainted 6.1.28 #1<br /> Hardware name: STMicroelectronics STM32MP257F-EV1 Evaluation Board (DT)<br /> Workqueue: events_freezable mmc_rescan<br /> Call trace:<br /> add_dma_entry+0x234/0x2f4<br /> debug_dma_map_sg+0x198/0x350<br /> __dma_map_sg_attrs+0xa0/0x110<br /> dma_map_sg_attrs+0x10/0x2c<br /> sdmmc_idma_prep_data+0x80/0xc0<br /> mmci_prep_data+0x38/0x84<br /> mmci_start_data+0x108/0x2dc<br /> mmci_request+0xe4/0x190<br /> __mmc_start_request+0x68/0x140<br /> mmc_start_request+0x94/0xc0<br /> mmc_wait_for_req+0x70/0x100<br /> mmc_send_tuning+0x108/0x1ac<br /> sdmmc_execute_tuning+0x14c/0x210<br /> mmc_execute_tuning+0x48/0xec<br /> mmc_sd_init_uhs_card.part.0+0x208/0x464<br /> mmc_sd_init_card+0x318/0x89c<br /> mmc_attach_sd+0xe4/0x180<br /> mmc_rescan+0x244/0x320<br /> <br /> DMA API debug brings to light leaking dma-mappings as dma_map_sg and<br /> dma_unmap_sg are not correctly balanced.<br /> <br /> If an error occurs in mmci_cmd_irq function, only mmci_dma_error<br /> function is called and as this API is not managed on stm32 variant,<br /> dma_unmap_sg is never called in this error path.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2026

CVE-2023-36644

Publication date:
04/04/2024
Incorrect Access Control in ITB-GmbH TradePro v9.5, allows remote attackers to receive all order confirmations from the online shop via the printmail plugin.
Severity CVSS v4.0: Pending analysis
Last modification:
24/04/2025

CVE-2023-36645

Publication date:
04/04/2024
SQL injection vulnerability in ITB-GmbH TradePro v9.5, allows remote attackers to run SQL queries via oordershow component in customer function.
Severity CVSS v4.0: Pending analysis
Last modification:
24/04/2025

CVE-2024-20800

Publication date:
04/04/2024
Adobe Experience Manager versions 6.5.19 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable web pages. Malicious JavaScript may be executed in a victim’s browser when they browse to the page containing the vulnerable script. This could result in arbitrary code execution within the context of the victim&amp;#39;s browser.
Severity CVSS v4.0: Pending analysis
Last modification:
03/12/2024

CVE-2024-26745

Publication date:
04/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> powerpc/pseries/iommu: IOMMU table is not initialized for kdump over SR-IOV<br /> <br /> When kdump kernel tries to copy dump data over SR-IOV, LPAR panics due<br /> to NULL pointer exception:<br /> <br /> Kernel attempted to read user page (0) - exploit attempt? (uid: 0)<br /> BUG: Kernel NULL pointer dereference on read at 0x00000000<br /> Faulting instruction address: 0xc000000020847ad4<br /> Oops: Kernel access of bad area, sig: 11 [#1]<br /> LE PAGE_SIZE=64K MMU=Radix SMP NR_CPUS=2048 NUMA pSeries<br /> Modules linked in: mlx5_core(+) vmx_crypto pseries_wdt papr_scm libnvdimm mlxfw tls psample sunrpc fuse overlay squashfs loop<br /> CPU: 12 PID: 315 Comm: systemd-udevd Not tainted 6.4.0-Test102+ #12<br /> Hardware name: IBM,9080-HEX POWER10 (raw) 0x800200 0xf000006 of:IBM,FW1060.00 (NH1060_008) hv:phyp pSeries<br /> NIP: c000000020847ad4 LR: c00000002083b2dc CTR: 00000000006cd18c<br /> REGS: c000000029162ca0 TRAP: 0300 Not tainted (6.4.0-Test102+)<br /> MSR: 800000000280b033 CR: 48288244 XER: 00000008<br /> CFAR: c00000002083b2d8 DAR: 0000000000000000 DSISR: 40000000 IRQMASK: 1<br /> ...<br /> NIP _find_next_zero_bit+0x24/0x110<br /> LR bitmap_find_next_zero_area_off+0x5c/0xe0<br /> Call Trace:<br /> dev_printk_emit+0x38/0x48 (unreliable)<br /> iommu_area_alloc+0xc4/0x180<br /> iommu_range_alloc+0x1e8/0x580<br /> iommu_alloc+0x60/0x130<br /> iommu_alloc_coherent+0x158/0x2b0<br /> dma_iommu_alloc_coherent+0x3c/0x50<br /> dma_alloc_attrs+0x170/0x1f0<br /> mlx5_cmd_init+0xc0/0x760 [mlx5_core]<br /> mlx5_function_setup+0xf0/0x510 [mlx5_core]<br /> mlx5_init_one+0x84/0x210 [mlx5_core]<br /> probe_one+0x118/0x2c0 [mlx5_core]<br /> local_pci_probe+0x68/0x110<br /> pci_call_probe+0x68/0x200<br /> pci_device_probe+0xbc/0x1a0<br /> really_probe+0x104/0x540<br /> __driver_probe_device+0xb4/0x230<br /> driver_probe_device+0x54/0x130<br /> __driver_attach+0x158/0x2b0<br /> bus_for_each_dev+0xa8/0x130<br /> driver_attach+0x34/0x50<br /> bus_add_driver+0x16c/0x300<br /> driver_register+0xa4/0x1b0<br /> __pci_register_driver+0x68/0x80<br /> mlx5_init+0xb8/0x100 [mlx5_core]<br /> do_one_initcall+0x60/0x300<br /> do_init_module+0x7c/0x2b0<br /> <br /> At the time of LPAR dump, before kexec hands over control to kdump<br /> kernel, DDWs (Dynamic DMA Windows) are scanned and added to the FDT.<br /> For the SR-IOV case, default DMA window "ibm,dma-window" is removed from<br /> the FDT and DDW added, for the device.<br /> <br /> Now, kexec hands over control to the kdump kernel.<br /> <br /> When the kdump kernel initializes, PCI busses are scanned and IOMMU<br /> group/tables created, in pci_dma_bus_setup_pSeriesLP(). For the SR-IOV<br /> case, there is no "ibm,dma-window". The original commit: b1fc44eaa9ba,<br /> fixes the path where memory is pre-mapped (direct mapped) to the DDW.<br /> When TCEs are direct mapped, there is no need to initialize IOMMU<br /> tables.<br /> <br /> iommu_table_setparms_lpar() only considers "ibm,dma-window" property<br /> when initiallizing IOMMU table. In the scenario where TCEs are<br /> dynamically allocated for SR-IOV, newly created IOMMU table is not<br /> initialized. Later, when the device driver tries to enter TCEs for the<br /> SR-IOV device, NULL pointer execption is thrown from iommu_area_alloc().<br /> <br /> The fix is to initialize the IOMMU table with DDW property stored in the<br /> FDT. There are 2 points to remember:<br /> <br /> 1. For the dedicated adapter, kdump kernel would encounter both<br /> default and DDW in FDT. In this case, DDW property is used to<br /> initialize the IOMMU table.<br /> <br /> 2. A DDW could be direct or dynamic mapped. kdump kernel would<br /> initialize IOMMU table and mark the existing DDW as<br /> "dynamic". This works fine since, at the time of table<br /> initialization, iommu_table_clear() makes some space in the<br /> DDW, for some predefined number of TCEs which are needed for<br /> kdump to succeed.
Severity CVSS v4.0: Pending analysis
Last modification:
04/04/2025

CVE-2024-26746

Publication date:
04/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> dmaengine: idxd: Ensure safe user copy of completion record<br /> <br /> If CONFIG_HARDENED_USERCOPY is enabled, copying completion record from<br /> event log cache to user triggers a kernel bug.<br /> <br /> [ 1987.159822] usercopy: Kernel memory exposure attempt detected from SLUB object &amp;#39;dsa0&amp;#39; (offset 74, size 31)!<br /> [ 1987.170845] ------------[ cut here ]------------<br /> [ 1987.176086] kernel BUG at mm/usercopy.c:102!<br /> [ 1987.180946] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI<br /> [ 1987.186866] CPU: 17 PID: 528 Comm: kworker/17:1 Not tainted 6.8.0-rc2+ #5<br /> [ 1987.194537] Hardware name: Intel Corporation AvenueCity/AvenueCity, BIOS BHSDCRB1.86B.2492.D03.2307181620 07/18/2023<br /> [ 1987.206405] Workqueue: wq0.0 idxd_evl_fault_work [idxd]<br /> [ 1987.212338] RIP: 0010:usercopy_abort+0x72/0x90<br /> [ 1987.217381] Code: 58 65 9c 50 48 c7 c2 17 85 61 9c 57 48 c7 c7 98 fd 6b 9c 48 0f 44 d6 48 c7 c6 b3 08 62 9c 4c 89 d1 49 0f 44 f3 e8 1e 2e d5 ff 0b 49 c7 c1 9e 42 61 9c 4c 89 cf 4d 89 c8 eb a9 66 66 2e 0f 1f<br /> [ 1987.238505] RSP: 0018:ff62f5cf20607d60 EFLAGS: 00010246<br /> [ 1987.244423] RAX: 000000000000005f RBX: 000000000000001f RCX: 0000000000000000<br /> [ 1987.252480] RDX: 0000000000000000 RSI: ffffffff9c61429e RDI: 00000000ffffffff<br /> [ 1987.260538] RBP: ff62f5cf20607d78 R08: ff2a6a89ef3fffe8 R09: 00000000fffeffff<br /> [ 1987.268595] R10: ff2a6a89eed00000 R11: 0000000000000003 R12: ff2a66934849c89a<br /> [ 1987.276652] R13: 0000000000000001 R14: ff2a66934849c8b9 R15: ff2a66934849c899<br /> [ 1987.284710] FS: 0000000000000000(0000) GS:ff2a66b22fe40000(0000) knlGS:0000000000000000<br /> [ 1987.293850] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> [ 1987.300355] CR2: 00007fe291a37000 CR3: 000000010fbd4005 CR4: 0000000000f71ef0<br /> [ 1987.308413] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br /> [ 1987.316470] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400<br /> [ 1987.324527] PKRU: 55555554<br /> [ 1987.327622] Call Trace:<br /> [ 1987.330424] <br /> [ 1987.332826] ? show_regs+0x6e/0x80<br /> [ 1987.336703] ? die+0x3c/0xa0<br /> [ 1987.339988] ? do_trap+0xd4/0xf0<br /> [ 1987.343662] ? do_error_trap+0x75/0xa0<br /> [ 1987.347922] ? usercopy_abort+0x72/0x90<br /> [ 1987.352277] ? exc_invalid_op+0x57/0x80<br /> [ 1987.356634] ? usercopy_abort+0x72/0x90<br /> [ 1987.360988] ? asm_exc_invalid_op+0x1f/0x30<br /> [ 1987.365734] ? usercopy_abort+0x72/0x90<br /> [ 1987.370088] __check_heap_object+0xb7/0xd0<br /> [ 1987.374739] __check_object_size+0x175/0x2d0<br /> [ 1987.379588] idxd_copy_cr+0xa9/0x130 [idxd]<br /> [ 1987.384341] idxd_evl_fault_work+0x127/0x390 [idxd]<br /> [ 1987.389878] process_one_work+0x13e/0x300<br /> [ 1987.394435] ? __pfx_worker_thread+0x10/0x10<br /> [ 1987.399284] worker_thread+0x2f7/0x420<br /> [ 1987.403544] ? _raw_spin_unlock_irqrestore+0x2b/0x50<br /> [ 1987.409171] ? __pfx_worker_thread+0x10/0x10<br /> [ 1987.414019] kthread+0x107/0x140<br /> [ 1987.417693] ? __pfx_kthread+0x10/0x10<br /> [ 1987.421954] ret_from_fork+0x3d/0x60<br /> [ 1987.426019] ? __pfx_kthread+0x10/0x10<br /> [ 1987.430281] ret_from_fork_asm+0x1b/0x30<br /> [ 1987.434744] <br /> <br /> The issue arises because event log cache is created using<br /> kmem_cache_create() which is not suitable for user copy.<br /> <br /> Fix the issue by creating event log cache with<br /> kmem_cache_create_usercopy(), ensuring safe user copy.
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2025

CVE-2024-26750

Publication date:
04/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> af_unix: Drop oob_skb ref before purging queue in GC.<br /> <br /> syzbot reported another task hung in __unix_gc(). [0]<br /> <br /> The current while loop assumes that all of the left candidates<br /> have oob_skb and calling kfree_skb(oob_skb) releases the remaining<br /> candidates.<br /> <br /> However, I missed a case that oob_skb has self-referencing fd and<br /> another fd and the latter sk is placed before the former in the<br /> candidate list. Then, the while loop never proceeds, resulting<br /> the task hung.<br /> <br /> __unix_gc() has the same loop just before purging the collected skb,<br /> so we can call kfree_skb(oob_skb) there and let __skb_queue_purge()<br /> release all inflight sockets.<br /> <br /> [0]:<br /> Sending NMI from CPU 0 to CPUs 1:<br /> NMI backtrace for cpu 1<br /> CPU: 1 PID: 2784 Comm: kworker/u4:8 Not tainted 6.8.0-rc4-syzkaller-01028-g71b605d32017 #0<br /> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024<br /> Workqueue: events_unbound __unix_gc<br /> RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x70 kernel/kcov.c:200<br /> Code: 89 fb e8 23 00 00 00 48 8b 3d 84 f5 1a 0c 48 89 de 5b e9 43 26 57 00 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1e fa 48 8b 04 24 65 48 8b 0d 90 52 70 7e 65 8b 15 91 52 70<br /> RSP: 0018:ffffc9000a17fa78 EFLAGS: 00000287<br /> RAX: ffffffff8a0a6108 RBX: ffff88802b6c2640 RCX: ffff88802c0b3b80<br /> RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000000<br /> RBP: ffffc9000a17fbf0 R08: ffffffff89383f1d R09: 1ffff1100ee5ff84<br /> R10: dffffc0000000000 R11: ffffed100ee5ff85 R12: 1ffff110056d84ee<br /> R13: ffffc9000a17fae0 R14: 0000000000000000 R15: ffffffff8f47b840<br /> FS: 0000000000000000(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: 00007ffef5687ff8 CR3: 0000000029b34000 CR4: 00000000003506f0<br /> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br /> DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400<br /> Call Trace:<br /> <br /> <br /> <br /> __unix_gc+0xe69/0xf40 net/unix/garbage.c:343<br /> process_one_work kernel/workqueue.c:2633 [inline]<br /> process_scheduled_works+0x913/0x1420 kernel/workqueue.c:2706<br /> worker_thread+0xa5f/0x1000 kernel/workqueue.c:2787<br /> kthread+0x2ef/0x390 kernel/kthread.c:388<br /> ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147<br /> ret_from_fork_asm+0x1b/0x30 arch/x86/entry/entry_64.S:242<br />
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2025

CVE-2024-26780

Publication date:
04/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> af_unix: Fix task hung while purging oob_skb in GC.<br /> <br /> syzbot reported a task hung; at the same time, GC was looping infinitely<br /> in list_for_each_entry_safe() for OOB skb. [0]<br /> <br /> syzbot demonstrated that the list_for_each_entry_safe() was not actually<br /> safe in this case.<br /> <br /> A single skb could have references for multiple sockets. If we free such<br /> a skb in the list_for_each_entry_safe(), the current and next sockets could<br /> be unlinked in a single iteration.<br /> <br /> unix_notinflight() uses list_del_init() to unlink the socket, so the<br /> prefetched next socket forms a loop itself and list_for_each_entry_safe()<br /> never stops.<br /> <br /> Here, we must use while() and make sure we always fetch the first socket.<br /> <br /> [0]:<br /> Sending NMI from CPU 0 to CPUs 1:<br /> NMI backtrace for cpu 1<br /> CPU: 1 PID: 5065 Comm: syz-executor236 Not tainted 6.8.0-rc3-syzkaller-00136-g1f719a2f3fa6 #0<br /> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024<br /> RIP: 0010:preempt_count arch/x86/include/asm/preempt.h:26 [inline]<br /> RIP: 0010:check_kcov_mode kernel/kcov.c:173 [inline]<br /> RIP: 0010:__sanitizer_cov_trace_pc+0xd/0x60 kernel/kcov.c:207<br /> Code: cc cc cc cc 66 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 65 48 8b 14 25 40 c2 03 00 8b 05 b4 7c 78 7e a9 00 01 ff 00 48 8b 34 24 74 0f f6 c4 01 74<br /> RSP: 0018:ffffc900033efa58 EFLAGS: 00000283<br /> RAX: ffff88807b077800 RBX: ffff88807b077800 RCX: 1ffffffff27b1189<br /> RDX: ffff88802a5a3b80 RSI: ffffffff8968488d RDI: ffff88807b077f70<br /> RBP: ffffc900033efbb0 R08: 0000000000000001 R09: fffffbfff27a900c<br /> R10: ffffffff93d48067 R11: ffffffff8ae000eb R12: ffff88807b077800<br /> R13: dffffc0000000000 R14: ffff88807b077e40 R15: 0000000000000001<br /> FS: 0000000000000000(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: 0000564f4fc1e3a8 CR3: 000000000d57a000 CR4: 00000000003506f0<br /> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br /> DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400<br /> Call Trace:<br /> <br /> <br /> <br /> unix_gc+0x563/0x13b0 net/unix/garbage.c:319<br /> unix_release_sock+0xa93/0xf80 net/unix/af_unix.c:683<br /> unix_release+0x91/0xf0 net/unix/af_unix.c:1064<br /> __sock_release+0xb0/0x270 net/socket.c:659<br /> sock_close+0x1c/0x30 net/socket.c:1421<br /> __fput+0x270/0xb80 fs/file_table.c:376<br /> task_work_run+0x14f/0x250 kernel/task_work.c:180<br /> exit_task_work include/linux/task_work.h:38 [inline]<br /> do_exit+0xa8a/0x2ad0 kernel/exit.c:871<br /> do_group_exit+0xd4/0x2a0 kernel/exit.c:1020<br /> __do_sys_exit_group kernel/exit.c:1031 [inline]<br /> __se_sys_exit_group kernel/exit.c:1029 [inline]<br /> __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1029<br /> do_syscall_x64 arch/x86/entry/common.c:52 [inline]<br /> do_syscall_64+0xd5/0x270 arch/x86/entry/common.c:83<br /> entry_SYSCALL_64_after_hwframe+0x6f/0x77<br /> RIP: 0033:0x7f9d6cbdac09<br /> Code: Unable to access opcode bytes at 0x7f9d6cbdabdf.<br /> RSP: 002b:00007fff5952feb8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7<br /> RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9d6cbdac09<br /> RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000<br /> RBP: 00007f9d6cc552b0 R08: ffffffffffffffb8 R09: 0000000000000006<br /> R10: 0000000000000006 R11: 0000000000000246 R12: 00007f9d6cc552b0<br /> R13: 0000000000000000 R14: 00007f9d6cc55d00 R15: 00007f9d6cbabe70<br />
Severity CVSS v4.0: Pending analysis
Last modification:
18/03/2025

CVE-2024-26781

Publication date:
04/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mptcp: fix possible deadlock in subflow diag<br /> <br /> Syzbot and Eric reported a lockdep splat in the subflow diag:<br /> <br /> WARNING: possible circular locking dependency detected<br /> 6.8.0-rc4-syzkaller-00212-g40b9385dd8e6 #0 Not tainted<br /> <br /> syz-executor.2/24141 is trying to acquire lock:<br /> ffff888045870130 (k-sk_lock-AF_INET6){+.+.}-{0:0}, at:<br /> tcp_diag_put_ulp net/ipv4/tcp_diag.c:100 [inline]<br /> ffff888045870130 (k-sk_lock-AF_INET6){+.+.}-{0:0}, at:<br /> tcp_diag_get_aux+0x738/0x830 net/ipv4/tcp_diag.c:137<br /> <br /> but task is already holding lock:<br /> ffffc9000135e488 (&amp;h-&gt;lhash2[i].lock){+.+.}-{2:2}, at: spin_lock<br /> include/linux/spinlock.h:351 [inline]<br /> ffffc9000135e488 (&amp;h-&gt;lhash2[i].lock){+.+.}-{2:2}, at:<br /> inet_diag_dump_icsk+0x39f/0x1f80 net/ipv4/inet_diag.c:1038<br /> <br /> which lock already depends on the new lock.<br /> <br /> the existing dependency chain (in reverse order) is:<br /> <br /> -&gt; #1 (&amp;h-&gt;lhash2[i].lock){+.+.}-{2:2}:<br /> lock_acquire+0x1e3/0x530 kernel/locking/lockdep.c:5754<br /> __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]<br /> _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154<br /> spin_lock include/linux/spinlock.h:351 [inline]<br /> __inet_hash+0x335/0xbe0 net/ipv4/inet_hashtables.c:743<br /> inet_csk_listen_start+0x23a/0x320 net/ipv4/inet_connection_sock.c:1261<br /> __inet_listen_sk+0x2a2/0x770 net/ipv4/af_inet.c:217<br /> inet_listen+0xa3/0x110 net/ipv4/af_inet.c:239<br /> rds_tcp_listen_init+0x3fd/0x5a0 net/rds/tcp_listen.c:316<br /> rds_tcp_init_net+0x141/0x320 net/rds/tcp.c:577<br /> ops_init+0x352/0x610 net/core/net_namespace.c:136<br /> __register_pernet_operations net/core/net_namespace.c:1214 [inline]<br /> register_pernet_operations+0x2cb/0x660 net/core/net_namespace.c:1283<br /> register_pernet_device+0x33/0x80 net/core/net_namespace.c:1370<br /> rds_tcp_init+0x62/0xd0 net/rds/tcp.c:735<br /> do_one_initcall+0x238/0x830 init/main.c:1236<br /> do_initcall_level+0x157/0x210 init/main.c:1298<br /> do_initcalls+0x3f/0x80 init/main.c:1314<br /> kernel_init_freeable+0x42f/0x5d0 init/main.c:1551<br /> kernel_init+0x1d/0x2a0 init/main.c:1441<br /> ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147<br /> ret_from_fork_asm+0x1b/0x30 arch/x86/entry/entry_64.S:242<br /> <br /> -&gt; #0 (k-sk_lock-AF_INET6){+.+.}-{0:0}:<br /> check_prev_add kernel/locking/lockdep.c:3134 [inline]<br /> check_prevs_add kernel/locking/lockdep.c:3253 [inline]<br /> validate_chain+0x18ca/0x58e0 kernel/locking/lockdep.c:3869<br /> __lock_acquire+0x1345/0x1fd0 kernel/locking/lockdep.c:5137<br /> lock_acquire+0x1e3/0x530 kernel/locking/lockdep.c:5754<br /> lock_sock_fast include/net/sock.h:1723 [inline]<br /> subflow_get_info+0x166/0xd20 net/mptcp/diag.c:28<br /> tcp_diag_put_ulp net/ipv4/tcp_diag.c:100 [inline]<br /> tcp_diag_get_aux+0x738/0x830 net/ipv4/tcp_diag.c:137<br /> inet_sk_diag_fill+0x10ed/0x1e00 net/ipv4/inet_diag.c:345<br /> inet_diag_dump_icsk+0x55b/0x1f80 net/ipv4/inet_diag.c:1061<br /> __inet_diag_dump+0x211/0x3a0 net/ipv4/inet_diag.c:1263<br /> inet_diag_dump_compat+0x1c1/0x2d0 net/ipv4/inet_diag.c:1371<br /> netlink_dump+0x59b/0xc80 net/netlink/af_netlink.c:2264<br /> __netlink_dump_start+0x5df/0x790 net/netlink/af_netlink.c:2370<br /> netlink_dump_start include/linux/netlink.h:338 [inline]<br /> inet_diag_rcv_msg_compat+0x209/0x4c0 net/ipv4/inet_diag.c:1405<br /> sock_diag_rcv_msg+0xe7/0x410<br /> netlink_rcv_skb+0x1e3/0x430 net/netlink/af_netlink.c:2543<br /> sock_diag_rcv+0x2a/0x40 net/core/sock_diag.c:280<br /> netlink_unicast_kernel net/netlink/af_netlink.c:1341 [inline]<br /> netlink_unicast+0x7ea/0x980 net/netlink/af_netlink.c:1367<br /> netlink_sendmsg+0xa3b/0xd70 net/netlink/af_netlink.c:1908<br /> sock_sendmsg_nosec net/socket.c:730 [inline]<br /> __sock_sendmsg+0x221/0x270 net/socket.c:745<br /> ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584<br /> ___sys_sendmsg net/socket.c:2638 [inline]<br /> __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667<br /> do_syscall_64+0xf9/0x240<br /> entry_SYSCALL_64_after_hwframe+0x6f/0x77<br /> <br /> As noted by Eric we can break the lock dependency chain avoid<br /> dumping <br /> ---truncated---
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2025

CVE-2023-36643

Publication date:
04/04/2024
Incorrect Access Control in ITB-GmbH TradePro v9.5, allows remote attackers to receive all orders from the online shop via oordershow component in customer function.
Severity CVSS v4.0: Pending analysis
Last modification:
24/04/2025

CVE-2024-29008

Publication date:
04/04/2024
A problem has been identified in the CloudStack additional VM configuration (extraconfig) feature which can be misused by anyone who has privilege to deploy a VM instance or configure settings of an already deployed VM instance, to configure additional VM configuration even when the feature is not explicitly enabled by the administrator. In a KVM based CloudStack environment, an attacker can exploit this issue to attach host devices such as storage disks, and PCI and USB devices such as network adapters and GPUs, in a regular VM instance that can be further exploited to gain access to the underlying network and storage infrastructure resources, and access any VM instance disks on the local storage.<br /> <br /> Users are advised to upgrade to version 4.18.1.1 or 4.19.0.1, which fixes this issue.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
30/06/2025

CVE-2024-30565

Publication date:
04/04/2024
An issue was discovered in SeaCMS version 12.9, allows remote attackers to execute arbitrary code via admin notify.php.
Severity CVSS v4.0: Pending analysis
Last modification:
28/03/2025