CVE-2021-47648

CVE-2021-47648

Título es
CVE-2021-47648

Mié, 26/02/2025 – 06:37

Gravedad 2.0 Txt
Pendiente de análisis

Título en

CVE-2021-47648

Descripción en
In the Linux kernel, the following vulnerability has been resolved:

gpu: host1x: Fix a memory leak in 'host1x_remove()'

Add a missing 'host1x_channel_list_free()' call in the remove function,
as already done in the error handling path of the probe function.

26/02/2025

26/02/2025

Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
Pendiente de análisis

Referencias


  • https://git.kernel.org/stable/c/025c6643a81564f066d8381b9e2f4603e0f8438f

  • https://git.kernel.org/stable/c/5124a344983e1b9670dae7add0e4d00d589aabcd

  • https://git.kernel.org/stable/c/6bb107332db28a0e9256c2d36a0902b85307612c

  • https://git.kernel.org/stable/c/c06577a80485511b894cb688e881ef0bc2d1d296

  • https://git.kernel.org/stable/c/fe1ce680560d4f0049ffa0c687de17567421c1ec
  • Enviar en el boletín
    Off

    CVE-2021-47647

    CVE-2021-47647

    Título es
    CVE-2021-47647

    Mié, 26/02/2025 – 06:37

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2021-47647

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    clk: qcom: ipq8074: fix PCI-E clock oops

    Fix PCI-E clock related kernel oops that are caused by a missing clock
    parent.

    pcie0_rchng_clk_src has num_parents set to 2 but only one parent is
    actually set via parent_hws, it should also have "XO" defined.
    This will cause the kernel to panic on a NULL pointer in
    clk_core_get_parent_by_index().

    So, to fix this utilize clk_parent_data to provide gcc_xo_gpll0 parent
    data.
    Since there is already an existing static const char * const gcc_xo_gpll0[]
    used to provide the same parents via parent_names convert those users to
    clk_parent_data as well.

    Without this earlycon is needed to even catch the OOPS as it will reset
    the board before serial is initialized with the following:

    [ 0.232279] Unable to handle kernel paging request at virtual address 0000a00000000000
    [ 0.232322] Mem abort info:
    [ 0.239094] ESR = 0x96000004
    [ 0.241778] EC = 0x25: DABT (current EL), IL = 32 bits
    [ 0.244908] SET = 0, FnV = 0
    [ 0.250377] EA = 0, S1PTW = 0
    [ 0.253236] FSC = 0x04: level 0 translation fault
    [ 0.256277] Data abort info:
    [ 0.261141] ISV = 0, ISS = 0x00000004
    [ 0.264262] CM = 0, WnR = 0
    [ 0.267820] [0000a00000000000] address between user and kernel address ranges
    [ 0.270954] Internal error: Oops: 96000004 [#1] SMP
    [ 0.278067] Modules linked in:
    [ 0.282751] CPU: 1 PID: 1 Comm: swapper/0 Not tainted 5.15.10 #0
    [ 0.285882] Hardware name: Xiaomi AX3600 (DT)
    [ 0.292043] pstate: 20400005 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=–)
    [ 0.296299] pc : clk_core_get_parent_by_index+0x68/0xec
    [ 0.303067] lr : __clk_register+0x1d8/0x820
    [ 0.308273] sp : ffffffc01111b7d0
    [ 0.312438] x29: ffffffc01111b7d0 x28: 0000000000000000 x27: 0000000000000040
    [ 0.315919] x26: 0000000000000002 x25: 0000000000000000 x24: ffffff8000308800
    [ 0.323037] x23: ffffff8000308850 x22: ffffff8000308880 x21: ffffff8000308828
    [ 0.330155] x20: 0000000000000028 x19: ffffff8000309700 x18: 0000000000000020
    [ 0.337272] x17: 000000005cc86990 x16: 0000000000000004 x15: ffffff80001d9d0a
    [ 0.344391] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000006
    [ 0.351508] x11: 0000000000000003 x10: 0101010101010101 x9 : 0000000000000000
    [ 0.358626] x8 : 7f7f7f7f7f7f7f7f x7 : 6468626f5e626266 x6 : 17000a3a403c1b06
    [ 0.365744] x5 : 061b3c403a0a0017 x4 : 0000000000000000 x3 : 0000000000000001
    [ 0.372863] x2 : 0000a00000000000 x1 : 0000000000000001 x0 : ffffff8000309700
    [ 0.379982] Call trace:
    [ 0.387091] clk_core_get_parent_by_index+0x68/0xec
    [ 0.389351] __clk_register+0x1d8/0x820
    [ 0.394210] devm_clk_hw_register+0x5c/0xe0
    [ 0.398030] devm_clk_register_regmap+0x44/0x8c
    [ 0.402198] qcom_cc_really_probe+0x17c/0x1d0
    [ 0.406711] qcom_cc_probe+0x34/0x44
    [ 0.411224] gcc_ipq8074_probe+0x18/0x30
    [ 0.414869] platform_probe+0x68/0xe0
    [ 0.418776] really_probe.part.0+0x9c/0x30c
    [ 0.422336] __driver_probe_device+0x98/0x144
    [ 0.426329] driver_probe_device+0x44/0x11c
    [ 0.430842] __device_attach_driver+0xb4/0x120
    [ 0.434836] bus_for_each_drv+0x68/0xb0
    [ 0.439349] __device_attach+0xb0/0x170
    [ 0.443081] device_initial_probe+0x14/0x20
    [ 0.446901] bus_probe_device+0x9c/0xa4
    [ 0.451067] device_add+0x35c/0x834
    [ 0.454886] of_device_add+0x54/0x64
    [ 0.458360] of_platform_device_create_pdata+0xc0/0x100
    [ 0.462181] of_platform_bus_create+0x114/0x370
    [ 0.467128] of_platform_bus_create+0x15c/0x370
    [ 0.471641] of_platform_populate+0x50/0xcc
    [ 0.476155] of_platform_default_populate_init+0xa8/0xc8
    [ 0.480324] do_one_initcall+0x50/0x1b0
    [ 0.485877] kernel_init_freeable+0x234/0x29c
    [ 0.489436] kernel_init+0x24/0x120
    [ 0.493948] ret_from_fork+0x10/0x20
    [ 0.497253] Code: d50323bf d65f03c0 f94002a2 b4000302 (f9400042)
    [ 0.501079] —[ end trace 4ca7e1129da2abce ]—

    26/02/2025

    26/02/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/41e360fa73a4c2f5b78f5ded78a5375b08c206a5

  • https://git.kernel.org/stable/c/5a5576ad405c3c89fc9afb245c4dcc3e412b0aa9

  • https://git.kernel.org/stable/c/8b89c9e68a01a19a1dd689a42aa65d545e931899

  • https://git.kernel.org/stable/c/bf8f5182b8f59309809b41c1d1730ed9ca6134b1

  • https://git.kernel.org/stable/c/d02b3d4a8c525068bc5cfb4341e0023d8eb82ace
  • Enviar en el boletín
    Off

    CVE-2021-47646

    CVE-2021-47646

    Título es
    CVE-2021-47646

    Mié, 26/02/2025 – 06:37

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2021-47646

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    Revert "Revert "block, bfq: honor already-setup queue merges""

    A crash [1] happened to be triggered in conjunction with commit
    2d52c58b9c9b ("block, bfq: honor already-setup queue merges"). The
    latter was then reverted by commit ebc69e897e17 ("Revert "block, bfq:
    honor already-setup queue merges""). Yet, the reverted commit was not
    the one introducing the bug. In fact, it actually triggered a UAF
    introduced by a different commit, and now fixed by commit d29bd41428cf
    ("block, bfq: reset last_bfqq_created on group change").

    So, there is no point in keeping commit 2d52c58b9c9b ("block, bfq:
    honor already-setup queue merges") out. This commit restores it.

    [1] https://bugzilla.kernel.org/show_bug.cgi?id=214503

    26/02/2025

    26/02/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/15729ff8143f8135b03988a100a19e66d7cb7ecd

  • https://git.kernel.org/stable/c/4083925bd6dc89216d156474a8076feec904e607

  • https://git.kernel.org/stable/c/65d8a737452e88f251fe5d925371de6d606df613

  • https://git.kernel.org/stable/c/931aff627469a75c77b9fd3823146d0575afffd6

  • https://git.kernel.org/stable/c/abc2129e646af7b43025d90a071f83043f1ae76c

  • https://git.kernel.org/stable/c/cc051f497eac9d8a0d816cd4bffa3415f2724871

  • https://git.kernel.org/stable/c/f990f0985eda59d4f29fc83fcf300c92b1225d39
  • Enviar en el boletín
    Off

    CVE-2021-47645

    CVE-2021-47645

    Título es
    CVE-2021-47645

    Mié, 26/02/2025 – 06:37

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2021-47645

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    media: staging: media: zoran: calculate the right buffer number for zoran_reap_stat_com

    On the case tmp_dcim=1, the index of buffer is miscalculated.
    This generate a NULL pointer dereference later.

    So let's fix the calcul and add a check to prevent this to reappear.

    26/02/2025

    26/02/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/20811bbe685ca3eddd34b0c750860427d7030910

  • https://git.kernel.org/stable/c/20db2ed1e2f9fcd417fa67853e5154f0c2537d6c

  • https://git.kernel.org/stable/c/7e76f3ed7ab2ae026c6ef9cc23096a7554af8c52

  • https://git.kernel.org/stable/c/bafec1a6ba4b187a7fcdcfce0faebdc623d4ef8e

  • https://git.kernel.org/stable/c/e3b86f4e558cea9eed71d894df2f19b10d60a207
  • Enviar en el boletín
    Off

    CVE-2021-47644

    CVE-2021-47644

    Título es
    CVE-2021-47644

    Mié, 26/02/2025 – 06:37

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2021-47644

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    media: staging: media: zoran: move videodev alloc

    Move some code out of zr36057_init() and create new functions for handling
    zr->video_dev. This permit to ease code reading and fix a zr->video_dev
    memory leak.

    26/02/2025

    26/02/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/1e501ec38796f43e995731d1bcd4173cb1ccfce0

  • https://git.kernel.org/stable/c/82e3a496eb56da0b9f29fdc5b63cedb3289e91de

  • https://git.kernel.org/stable/c/bd01629315ffd5b63da91d0bd529a77d30e55028

  • https://git.kernel.org/stable/c/c1ba65100a359fe28cfe37e09e10c99f247cbf1e

  • https://git.kernel.org/stable/c/ff3357bffd9fb78f59762d8955afc7382a279079
  • Enviar en el boletín
    Off

    CVE-2021-47643

    CVE-2021-47643

    Título es
    CVE-2021-47643

    Mié, 26/02/2025 – 06:37

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2021-47643

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    media: ir_toy: free before error exiting

    Fix leak in error path.

    26/02/2025

    26/02/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/2011363c196846c083649c91ed30aeef64358d52

  • https://git.kernel.org/stable/c/382e0f6958ef34eb093127b6d74c12f3b8fd0904

  • https://git.kernel.org/stable/c/52cdb013036391d9d87aba5b4fc49cdfc6ea4b23

  • https://git.kernel.org/stable/c/93ef3fdf3b6633c58f049e5a6be755777dde4340

  • https://git.kernel.org/stable/c/99e3f83539cac6884a4df02cb204a57a184ea12b
  • Enviar en el boletín
    Off

    CVE-2025-0760

    CVE-2025-0760

    Título es
    CVE-2025-0760

    Mié, 26/02/2025 – 00:15

    Tipo
    CWE-522

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-0760

    Descripción en
    A Credential Disclosure vulnerability exists where an administrator could extract the stored SMTP account credentials due to lack of encryption.

    26/02/2025

    26/02/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

    Gravedad 3.1 (CVSS 3.1 Base Score)
    2.70

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    LOW

    Referencias


  • https://www.tenable.com/security/tns-2025-01
  • Enviar en el boletín
    Off

    CVE-2025-1091

    CVE-2025-1091

    Título es
    CVE-2025-1091

    Mié, 26/02/2025 – 00:15

    Tipo
    CWE-862

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-1091

    Descripción en
    A Broken Authorization schema exists where any authenticated user could download IOA script and configuration files if the URL is known.

    26/02/2025

    26/02/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

    Gravedad 3.1 (CVSS 3.1 Base Score)
    4.30

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    MEDIUM

    Referencias


  • https://www.tenable.com/security/tns-2025-01
  • Enviar en el boletín
    Off

    CVE-2025-0514

    CVE-2025-0514

    Título es
    CVE-2025-0514

    Mar, 25/02/2025 – 22:15

    Tipo
    CWE-20

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-0514

    Descripción en
    Improper Input Validation vulnerability in The Document Foundation LibreOffice allows Windows Executable hyperlink targets to be executed unconditionally on activation.This issue affects LibreOffice: from 24.8 before

    25/02/2025

    25/02/2025

    Vector CVSS:4.0
    CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:L/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

    Gravedad 4.0
    7.20

    Gravedad 4.0 txt
    HIGH

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://www.libreoffice.org/about-us/security/advisories/cve-2025-0514
  • Enviar en el boletín
    Off

    CVE-2025-22211

    CVE-2025-22211

    Título es
    CVE-2025-22211

    Mar, 25/02/2025 – 22:15

    Tipo
    CWE-89

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-22211

    Descripción en
    A SQL injection vulnerability in the JoomShopping component versions 1.0.0-1.4.3 for Joomla allows authenticated attackers (administrator) to execute arbitrary SQL commands in the country management area in backend.

    25/02/2025

    25/02/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://www.webdesigner-profi.de/
  • Enviar en el boletín
    Off