CVE-2024-13905

CVE-2024-13905

Título es
CVE-2024-13905

Jue, 27/02/2025 – 05:15

Tipo
CWE-918

Gravedad 2.0 Txt
Pendiente de análisis

Título en

CVE-2024-13905

Descripción en
The OneStore Sites plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 0.1.1 via the class-export.php file. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

27/02/2025

27/02/2025

Vector CVSS:3.1
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Gravedad 3.1 (CVSS 3.1 Base Score)
5.30

Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
MEDIUM

Referencias


  • https://plugins.trac.wordpress.org/browser/onestore-sites/trunk/classess/class-export.php#L3

  • https://www.wordfence.com/threat-intel/vulnerabilities/id/f2c70d5f-beb3-480e-8ea8-c3ab01ce5a20?source=cve
  • Enviar en el boletín
    Off

    CVE-2024-13647

    CVE-2024-13647

    Título es
    CVE-2024-13647

    Jue, 27/02/2025 – 05:15

    Tipo
    CWE-352

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-13647

    Descripción en
    The School Management System – SakolaWP plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.8. This is due to missing or incorrect nonce validation on the 'save_exam_setting' and 'delete_exam_setting' actions. This makes it possible for unauthenticated attackers to update exam settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

    27/02/2025

    27/02/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

    Gravedad 3.1 (CVSS 3.1 Base Score)
    4.30

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    MEDIUM

    Referencias


  • https://wordpress.org/plugins/sakolawp-lite/

  • https://www.wordfence.com/threat-intel/vulnerabilities/id/6a5db3fc-6ae4-4566-8610-687cb725cf6e?source=cve
  • Enviar en el boletín
    Off

    CVE-2025-1686

    CVE-2025-1686

    Título es
    CVE-2025-1686

    Jue, 27/02/2025 – 05:15

    Tipo
    CWE-73

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-1686

    Descripción en
    All versions of the package io.pebbletemplates:pebble are vulnerable to External Control of File Name or Path via the include tag. A high privileged attacker can access sensitive local files by crafting malicious notification templates that leverage this tag to include files like /etc/passwd or /proc/1/environ.

    Workaround

    This vulnerability can be mitigated by disabling the include macro in Pebble Templates:

    java
    new PebbleEngine.Builder()
    .registerExtensionCustomizer(new DisallowExtensionCustomizerBuilder()
    .disallowedTokenParserTags(List.of("include"))
    .build())
    .build();

    27/02/2025

    27/02/2025

    Vector CVSS:4.0
    CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N

    Gravedad 4.0
    6.10

    Gravedad 4.0 txt
    MEDIUM

    Gravedad 3.1 (CVSS 3.1 Base Score)
    6.80

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    MEDIUM

    Referencias


  • https://github.com/PebbleTemplates/pebble/issues/680

  • https://github.com/PebbleTemplates/pebble/issues/688

  • https://pebbletemplates.io/wiki/tag/include

  • https://security.snyk.io/vuln/SNYK-JAVA-IOPEBBLETEMPLATES-8745594
  • Enviar en el boletín
    Off

    CVE-2025-21723

    CVE-2025-21723

    Título es
    CVE-2025-21723

    Jue, 27/02/2025 – 02:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-21723

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    scsi: mpi3mr: Fix possible crash when setting up bsg fails

    If bsg_setup_queue() fails, the bsg_queue is assigned a non-NULL value.
    Consequently, in mpi3mr_bsg_exit(), the condition "if(!mrioc->bsg_queue)"
    will not be satisfied, preventing execution from entering
    bsg_remove_queue(), which could lead to the following crash:

    BUG: kernel NULL pointer dereference, address: 000000000000041c
    Call Trace:

    mpi3mr_bsg_exit+0x1f/0x50 [mpi3mr]
    mpi3mr_remove+0x6f/0x340 [mpi3mr]
    pci_device_remove+0x3f/0xb0
    device_release_driver_internal+0x19d/0x220
    unbind_store+0xa4/0xb0
    kernfs_fop_write_iter+0x11f/0x200
    vfs_write+0x1fc/0x3e0
    ksys_write+0x67/0xe0
    do_syscall_64+0x38/0x80
    entry_SYSCALL_64_after_hwframe+0x78/0xe2

    27/02/2025

    27/02/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/19b248069d1b1424982723a2bf3941ad864d5204

  • https://git.kernel.org/stable/c/295006f6e8c17212d3098811166e29627d19e05c

  • https://git.kernel.org/stable/c/832b8f95a2832321b8200ae478ed988b25faaef4
  • Enviar en el boletín
    Off

    CVE-2025-21722

    CVE-2025-21722

    Título es
    CVE-2025-21722

    Jue, 27/02/2025 – 02:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-21722

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    nilfs2: do not force clear folio if buffer is referenced

    Patch series "nilfs2: protect busy buffer heads from being force-cleared".

    This series fixes the buffer head state inconsistency issues reported by
    syzbot that occurs when the filesystem is corrupted and falls back to
    read-only, and the associated buffer head use-after-free issue.

    This patch (of 2):

    Syzbot has reported that after nilfs2 detects filesystem corruption and
    falls back to read-only, inconsistencies in the buffer state may occur.

    One of the inconsistencies is that when nilfs2 calls mark_buffer_dirty()
    to set a data or metadata buffer as dirty, but it detects that the buffer
    is not in the uptodate state:

    WARNING: CPU: 0 PID: 6049 at fs/buffer.c:1177 mark_buffer_dirty+0x2e5/0x520
    fs/buffer.c:1177

    Call Trace:

    nilfs_palloc_commit_alloc_entry+0x4b/0x160 fs/nilfs2/alloc.c:598
    nilfs_ifile_create_inode+0x1dd/0x3a0 fs/nilfs2/ifile.c:73
    nilfs_new_inode+0x254/0x830 fs/nilfs2/inode.c:344
    nilfs_mkdir+0x10d/0x340 fs/nilfs2/namei.c:218
    vfs_mkdir+0x2f9/0x4f0 fs/namei.c:4257
    do_mkdirat+0x264/0x3a0 fs/namei.c:4280
    __do_sys_mkdirat fs/namei.c:4295 [inline]
    __se_sys_mkdirat fs/namei.c:4293 [inline]
    __x64_sys_mkdirat+0x87/0xa0 fs/namei.c:4293
    do_syscall_x64 arch/x86/entry/common.c:52 [inline]
    do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
    entry_SYSCALL_64_after_hwframe+0x77/0x7f

    The other is when nilfs_btree_propagate(), which propagates the dirty
    state to the ancestor nodes of a b-tree that point to a dirty buffer,
    detects that the origin buffer is not dirty, even though it should be:

    WARNING: CPU: 0 PID: 5245 at fs/nilfs2/btree.c:2089
    nilfs_btree_propagate+0xc79/0xdf0 fs/nilfs2/btree.c:2089

    Call Trace:

    nilfs_bmap_propagate+0x75/0x120 fs/nilfs2/bmap.c:345
    nilfs_collect_file_data+0x4d/0xd0 fs/nilfs2/segment.c:587
    nilfs_segctor_apply_buffers+0x184/0x340 fs/nilfs2/segment.c:1006
    nilfs_segctor_scan_file+0x28c/0xa50 fs/nilfs2/segment.c:1045
    nilfs_segctor_collect_blocks fs/nilfs2/segment.c:1216 [inline]
    nilfs_segctor_collect fs/nilfs2/segment.c:1540 [inline]
    nilfs_segctor_do_construct+0x1c28/0x6b90 fs/nilfs2/segment.c:2115
    nilfs_segctor_construct+0x181/0x6b0 fs/nilfs2/segment.c:2479
    nilfs_segctor_thread_construct fs/nilfs2/segment.c:2587 [inline]
    nilfs_segctor_thread+0x69e/0xe80 fs/nilfs2/segment.c:2701
    kthread+0x2f0/0x390 kernel/kthread.c:389
    ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
    ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

    Both of these issues are caused by the callbacks that handle the
    page/folio write requests, forcibly clear various states, including the
    working state of the buffers they hold, at unexpected times when they
    detect read-only fallback.

    Fix these issues by checking if the buffer is referenced before clearing
    the page/folio state, and skipping the clear if it is.

    27/02/2025

    27/02/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/1098bb8d52419d262a3358d099a1598a920b730f

  • https://git.kernel.org/stable/c/19296737024cd220a1d6590bf4c092bca8c99497

  • https://git.kernel.org/stable/c/557ccf5e49f1fb848a29698585bcab2e50a597ef

  • https://git.kernel.org/stable/c/ca76bb226bf47ff04c782cacbd299f12ddee1ec1
  • Enviar en el boletín
    Off

    CVE-2025-21731

    CVE-2025-21731

    Título es
    CVE-2025-21731

    Jue, 27/02/2025 – 02:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-21731

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    nbd: don't allow reconnect after disconnect

    Following process can cause nbd_config UAF:

    1) grab nbd_config temporarily;

    2) nbd_genl_disconnect() flush all recv_work() and release the
    initial reference:

    nbd_genl_disconnect
    nbd_disconnect_and_put
    nbd_disconnect
    flush_workqueue(nbd->recv_workq)
    if (test_and_clear_bit(NBD_RT_HAS_CONFIG_REF, …))
    nbd_config_put
    -> due to step 1), reference is still not zero

    3) nbd_genl_reconfigure() queue recv_work() again;

    nbd_genl_reconfigure
    config = nbd_get_config_unlocked(nbd)
    if (!config)
    -> succeed
    if (!test_bit(NBD_RT_BOUND, …))
    -> succeed
    nbd_reconnect_socket
    queue_work(nbd->recv_workq, &args->work)

    4) step 1) release the reference;

    5) Finially, recv_work() will trigger UAF:

    recv_work
    nbd_config_put(nbd)
    -> nbd_config is freed
    atomic_dec(&config->recv_threads)
    -> UAF

    Fix the problem by clearing NBD_RT_BOUND in nbd_genl_disconnect(), so
    that nbd_genl_reconfigure() will fail.

    27/02/2025

    27/02/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/844b8cdc681612ff24df62cdefddeab5772fadf1

  • https://git.kernel.org/stable/c/9793bd5ae4bdbdb2dde401a3cab94a6bfd05e302

  • https://git.kernel.org/stable/c/a8ee6ecde2b7bfb58c8a3afe8a9d2b848f580739

  • https://git.kernel.org/stable/c/d208d2c52b652913b5eefc8ca434b0d6b757f68f

  • https://git.kernel.org/stable/c/e7343fa33751cb07c1c56b666bf37cfca357130e
  • Enviar en el boletín
    Off

    CVE-2025-21730

    CVE-2025-21730

    Título es
    CVE-2025-21730

    Jue, 27/02/2025 – 02:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-21730

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    wifi: rtw89: avoid to init mgnt_entry list twice when WoWLAN failed

    If WoWLAN failed in resume flow, the rtw89_ops_add_interface() triggered
    without removing the interface first. Then the mgnt_entry list init again,
    causing the list_empty() check in rtw89_chanctx_ops_assign_vif()
    useless, and list_add_tail() again. Therefore, we have added a check to
    prevent double adding of the list.

    rtw89_8852ce 0000:01:00.0: failed to check wow status disabled
    rtw89_8852ce 0000:01:00.0: wow: failed to check disable fw ready
    rtw89_8852ce 0000:01:00.0: wow: failed to swap to normal fw
    rtw89_8852ce 0000:01:00.0: failed to disable wow
    rtw89_8852ce 0000:01:00.0: failed to resume for wow -110
    rtw89_8852ce 0000:01:00.0: MAC has already powered on
    i2c_hid_acpi i2c-ILTK0001:00: PM: acpi_subsys_resume+0x0/0x60 returned 0 after 284705 usecs
    list_add corruption. prev->next should be next (ffff9d9719d82228), but was ffff9d9719f96030. (prev=ffff9d9719f96030).
    ————[ cut here ]————
    kernel BUG at lib/list_debug.c:34!
    invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
    CPU: 2 PID: 6918 Comm: kworker/u8:19 Tainted: G U O
    Hardware name: Google Anraggar/Anraggar, BIOS Google_Anraggar.15217.514.0 03/25/2024
    Workqueue: events_unbound async_run_entry_fn
    RIP: 0010:__list_add_valid_or_report+0x9f/0xb0
    Code: e8 56 89 ff ff 0f 0b 48 c7 c7 3e fc e0 96 48 89 c6 e8 45 89 ff …
    RSP: 0018:ffffa51b42bbbaf0 EFLAGS: 00010246
    RAX: 0000000000000075 RBX: ffff9d9719d82ab0 RCX: 13acb86e047a4400
    RDX: 3fffffffffffffff RSI: 0000000000000000 RDI: 00000000ffffdfff
    RBP: ffffa51b42bbbb28 R08: ffffffff9768e250 R09: 0000000000001fff
    R10: ffffffff9765e250 R11: 0000000000005ffd R12: ffff9d9719f95c40
    R13: ffff9d9719f95be8 R14: ffff9d97081bfd78 R15: ffff9d9719d82060
    FS: 0000000000000000(0000) GS:ffff9d9a6fb00000(0000) knlGS:0000000000000000
    CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    CR2: 00007e7d029a4060 CR3: 0000000345e38000 CR4: 0000000000750ee0
    PKRU: 55555554
    Call Trace:

    ? __die_body+0x68/0xb0
    ? die+0xaa/0xd0
    ? do_trap+0x9f/0x170
    ? __list_add_valid_or_report+0x9f/0xb0
    ? __list_add_valid_or_report+0x9f/0xb0
    ? handle_invalid_op+0x69/0x90
    ? __list_add_valid_or_report+0x9f/0xb0
    ? exc_invalid_op+0x3c/0x50
    ? asm_exc_invalid_op+0x16/0x20
    ? __list_add_valid_or_report+0x9f/0xb0
    rtw89_chanctx_ops_assign_vif+0x1f9/0x210 [rtw89_core cbb375c44bf28564ce479002bff66617a25d9ac1]
    ? __mutex_unlock_slowpath+0xa0/0xf0
    rtw89_ops_assign_vif_chanctx+0x4b/0x90 [rtw89_core cbb375c44bf28564ce479002bff66617a25d9ac1]
    drv_assign_vif_chanctx+0xa7/0x1f0 [mac80211 6efaad16237edaaea0868b132d4f93ecf918a8b6]
    ieee80211_reconfig+0x9cb/0x17b0 [mac80211 6efaad16237edaaea0868b132d4f93ecf918a8b6]
    ? __pfx_wiphy_resume+0x10/0x10 [cfg80211 572d03acaaa933fe38251be7fce3b3675284b8ed]
    ? dev_printk_emit+0x51/0x70
    ? _dev_info+0x6e/0x90
    wiphy_resume+0x89/0x180 [cfg80211 572d03acaaa933fe38251be7fce3b3675284b8ed]
    ? __pfx_wiphy_resume+0x10/0x10 [cfg80211 572d03acaaa933fe38251be7fce3b3675284b8ed]
    dpm_run_callback+0x37/0x1e0
    device_resume+0x26d/0x4b0
    ? __pfx_dpm_watchdog_handler+0x10/0x10
    async_resume+0x1d/0x30
    async_run_entry_fn+0x29/0xd0
    worker_thread+0x397/0x970
    kthread+0xed/0x110
    ? __pfx_worker_thread+0x10/0x10
    ? __pfx_kthread+0x10/0x10
    ret_from_fork+0x38/0x50
    ? __pfx_kthread+0x10/0x10
    ret_from_fork_asm+0x1b/0x30

    27/02/2025

    27/02/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/2f7667675df1b40b73ecc53b4b8c3189b1e5f2c1

  • https://git.kernel.org/stable/c/4ed5bf49819757303e657f3900725febf2f3926f

  • https://git.kernel.org/stable/c/7fc295fdd3992a9a07d12fd3f2e84dface23aedc
  • Enviar en el boletín
    Off

    CVE-2025-21729

    CVE-2025-21729

    Título es
    CVE-2025-21729

    Jue, 27/02/2025 – 02:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-21729

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    wifi: rtw89: fix race between cancel_hw_scan and hw_scan completion

    The rtwdev->scanning flag isn't protected by mutex originally, so
    cancel_hw_scan can pass the condition, but suddenly hw_scan completion
    unset the flag and calls ieee80211_scan_completed() that will free
    local->hw_scan_req. Then, cancel_hw_scan raises null-ptr-deref and
    use-after-free. Fix it by moving the check condition to where
    protected by mutex.

    KASAN: null-ptr-deref in range [0x0000000000000088-0x000000000000008f]
    CPU: 2 PID: 6922 Comm: kworker/2:2 Tainted: G OE
    Hardware name: LENOVO 2356AD1/2356AD1, BIOS G7ETB6WW (2.76 ) 09/10/2019
    Workqueue: events cfg80211_conn_work [cfg80211]
    RIP: 0010:rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]
    Code: 00 45 89 6c 24 1c 0f 85 23 01 00 00 48 8b 85 20 ff ff ff 48 8d
    RSP: 0018:ffff88811fd9f068 EFLAGS: 00010206
    RAX: dffffc0000000000 RBX: ffff88811fd9f258 RCX: 0000000000000001
    RDX: 0000000000000011 RSI: 0000000000000001 RDI: 0000000000000089
    RBP: ffff88811fd9f170 R08: 0000000000000000 R09: 0000000000000000
    R10: ffff88811fd9f108 R11: 0000000000000000 R12: ffff88810e47f960
    R13: 0000000000000000 R14: 000000000000ffff R15: 0000000000000000
    FS: 0000000000000000(0000) GS:ffff8881d6f00000(0000) knlGS:0000000000000000
    CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    CR2: 00007531dfca55b0 CR3: 00000001be296004 CR4: 00000000001706e0
    Call Trace:

    ? show_regs+0x61/0x73
    ? __die_body+0x20/0x73
    ? die_addr+0x4f/0x7b
    ? exc_general_protection+0x191/0x1db
    ? asm_exc_general_protection+0x27/0x30
    ? rtw89_fw_h2c_scan_offload_be+0xc33/0x13c3 [rtw89_core]
    ? rtw89_fw_h2c_scan_offload_be+0x458/0x13c3 [rtw89_core]
    ? __pfx_rtw89_fw_h2c_scan_offload_be+0x10/0x10 [rtw89_core]
    ? do_raw_spin_lock+0x75/0xdb
    ? __pfx_do_raw_spin_lock+0x10/0x10
    rtw89_hw_scan_offload+0xb5e/0xbf7 [rtw89_core]
    ? _raw_spin_unlock+0xe/0x24
    ? __mutex_lock.constprop.0+0x40c/0x471
    ? __pfx_rtw89_hw_scan_offload+0x10/0x10 [rtw89_core]
    ? __mutex_lock_slowpath+0x13/0x1f
    ? mutex_lock+0xa2/0xdc
    ? __pfx_mutex_lock+0x10/0x10
    rtw89_hw_scan_abort+0x58/0xb7 [rtw89_core]
    rtw89_ops_cancel_hw_scan+0x120/0x13b [rtw89_core]
    ieee80211_scan_cancel+0x468/0x4d0 [mac80211]
    ieee80211_prep_connection+0x858/0x899 [mac80211]
    ieee80211_mgd_auth+0xbea/0xdde [mac80211]
    ? __pfx_ieee80211_mgd_auth+0x10/0x10 [mac80211]
    ? cfg80211_find_elem+0x15/0x29 [cfg80211]
    ? is_bss+0x1b7/0x1d7 [cfg80211]
    ieee80211_auth+0x18/0x27 [mac80211]
    cfg80211_mlme_auth+0x3bb/0x3e7 [cfg80211]
    cfg80211_conn_do_work+0x410/0xb81 [cfg80211]
    ? __pfx_cfg80211_conn_do_work+0x10/0x10 [cfg80211]
    ? __kasan_check_read+0x11/0x1f
    ? psi_group_change+0x8bc/0x944
    ? __kasan_check_write+0x14/0x22
    ? mutex_lock+0x8e/0xdc
    ? __pfx_mutex_lock+0x10/0x10
    ? __pfx___radix_tree_lookup+0x10/0x10
    cfg80211_conn_work+0x245/0x34d [cfg80211]
    ? __pfx_cfg80211_conn_work+0x10/0x10 [cfg80211]
    ? update_cfs_rq_load_avg+0x3bc/0x3d7
    ? sched_clock_noinstr+0x9/0x1a
    ? sched_clock+0x10/0x24
    ? sched_clock_cpu+0x7e/0x42e
    ? newidle_balance+0x796/0x937
    ? __pfx_sched_clock_cpu+0x10/0x10
    ? __pfx_newidle_balance+0x10/0x10
    ? __kasan_check_read+0x11/0x1f
    ? psi_group_change+0x8bc/0x944
    ? _raw_spin_unlock+0xe/0x24
    ? raw_spin_rq_unlock+0x47/0x54
    ? raw_spin_rq_unlock_irq+0x9/0x1f
    ? finish_task_switch.isra.0+0x347/0x586
    ? __schedule+0x27bf/0x2892
    ? mutex_unlock+0x80/0xd0
    ? do_raw_spin_lock+0x75/0xdb
    ? __pfx___schedule+0x10/0x10
    process_scheduled_works+0x58c/0x821
    worker_thread+0x4c7/0x586
    ? __kasan_check_read+0x11/0x1f
    kthread+0x285/0x294
    ? __pfx_worker_thread+0x10/0x10
    ? __pfx_kthread+0x10/0x10
    ret_from_fork+0x29/0x6f
    ? __pfx_kthread+0x10/0x10
    ret_from_fork_asm+0x1b/0x30

    27/02/2025

    27/02/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/2403cb3c235d5e339b580cc3a825493769fadca8

  • https://git.kernel.org/stable/c/5afcd6fcd1e1c1fd6bcc9a360c121d10eddade67

  • https://git.kernel.org/stable/c/ba4bb0402c60e945c4c396c51f0acac3c3e3ea5c
  • Enviar en el boletín
    Off

    CVE-2025-21728

    CVE-2025-21728

    Título es
    CVE-2025-21728

    Jue, 27/02/2025 – 02:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-21728

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    bpf: Send signals asynchronously if !preemptible

    BPF programs can execute in all kinds of contexts and when a program
    running in a non-preemptible context uses the bpf_send_signal() kfunc,
    it will cause issues because this kfunc can sleep.
    Change `irqs_disabled()` to `!preemptible()`.

    27/02/2025

    27/02/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/092fc76b7ab4163e008f9cde596a58dad2108260

  • https://git.kernel.org/stable/c/78b97783496b454435639937db3303e900a24d3f

  • https://git.kernel.org/stable/c/87c544108b612512b254c8f79aa5c0a8546e2cc4

  • https://git.kernel.org/stable/c/be42a09fe898635b0093c0c8dac1bfabe225c240

  • https://git.kernel.org/stable/c/eeef8e65041a031bd8a747a392c14b76a123a12c
  • Enviar en el boletín
    Off

    CVE-2025-21727

    CVE-2025-21727

    Título es
    CVE-2025-21727

    Jue, 27/02/2025 – 02:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-21727

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    padata: fix UAF in padata_reorder

    A bug was found when run ltp test:

    BUG: KASAN: slab-use-after-free in padata_find_next+0x29/0x1a0
    Read of size 4 at addr ffff88bbfe003524 by task kworker/u113:2/3039206

    CPU: 0 PID: 3039206 Comm: kworker/u113:2 Kdump: loaded Not tainted 6.6.0+
    Workqueue: pdecrypt_parallel padata_parallel_worker
    Call Trace:

    dump_stack_lvl+0x32/0x50
    print_address_description.constprop.0+0x6b/0x3d0
    print_report+0xdd/0x2c0
    kasan_report+0xa5/0xd0
    padata_find_next+0x29/0x1a0
    padata_reorder+0x131/0x220
    padata_parallel_worker+0x3d/0xc0
    process_one_work+0x2ec/0x5a0

    If 'mdelay(10)' is added before calling 'padata_find_next' in the
    'padata_reorder' function, this issue could be reproduced easily with
    ltp test (pcrypt_aead01).

    This can be explained as bellow:

    pcrypt_aead_encrypt

    padata_do_parallel
    refcount_inc(&pd->refcnt); // add refcnt

    padata_do_serial
    padata_reorder // pd
    while (1) {
    padata_find_next(pd, true); // using pd
    queue_work_on

    padata_serial_worker crypto_del_alg
    padata_put_pd_cnt // sub refcnt
    padata_free_shell
    padata_put_pd(ps->pd);
    // pd is freed
    // loop again, but pd is freed
    // call padata_find_next, UAF
    }

    In the padata_reorder function, when it loops in 'while', if the alg is
    deleted, the refcnt may be decreased to 0 before entering
    'padata_find_next', which leads to UAF.

    As mentioned in [1], do_serial is supposed to be called with BHs disabled
    and always happen under RCU protection, to address this issue, add
    synchronize_rcu() in 'padata_free_shell' wait for all _do_serial calls
    to finish.

    [1] https://lore.kernel.org/all/20221028160401.cccypv4euxikusiq@parnassus.localdomain/
    [2] https://lore.kernel.org/linux-kernel/jfjz5d7zwbytztackem7ibzalm5lnxldi2eofeiczqmqs2m7o6@fq426cwnjtkm/

    27/02/2025

    27/02/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/0ae2f332cfd2d74cf3ce344ec9938cf3e29c3ccd

  • https://git.kernel.org/stable/c/573ac9c70bf7885dc85d82fa44550581bfc3b738

  • https://git.kernel.org/stable/c/80231f069240d52e98b6a317456c67b2eafd0781

  • https://git.kernel.org/stable/c/bbccae982e9fa1d7abcb23a5ec81cb0ec883f7de

  • https://git.kernel.org/stable/c/e01780ea4661172734118d2a5f41bc9720765668
  • Enviar en el boletín
    Off