CVE-2025-21858

CVE-2025-21858

Título es
CVE-2025-21858

Mié, 12/03/2025 – 10:15

Gravedad 2.0 Txt
Pendiente de análisis

Título en

CVE-2025-21858

Descripción en
In the Linux kernel, the following vulnerability has been resolved:

geneve: Fix use-after-free in geneve_find_dev().

syzkaller reported a use-after-free in geneve_find_dev() [0]
without repro.

geneve_configure() links struct geneve_dev.next to
net_generic(net, geneve_net_id)->geneve_list.

The net here could differ from dev_net(dev) if IFLA_NET_NS_PID,
IFLA_NET_NS_FD, or IFLA_TARGET_NETNSID is set.

When dev_net(dev) is dismantled, geneve_exit_batch_rtnl() finally
calls unregister_netdevice_queue() for each dev in the netns,
and later the dev is freed.

However, its geneve_dev.next is still linked to the backend UDP
socket netns.

Then, use-after-free will occur when another geneve dev is created
in the netns.

Let's call geneve_dellink() instead in geneve_destroy_tunnels().

[0]:
BUG: KASAN: slab-use-after-free in geneve_find_dev drivers/net/geneve.c:1295 [inline]
BUG: KASAN: slab-use-after-free in geneve_configure+0x234/0x858 drivers/net/geneve.c:1343
Read of size 2 at addr ffff000054d6ee24 by task syz.1.4029/13441

CPU: 1 UID: 0 PID: 13441 Comm: syz.1.4029 Not tainted 6.13.0-g0ad9617c78ac #24 dc35ca22c79fb82e8e7bc5c9c9adafea898b1e3d
Hardware name: linux,dummy-virt (DT)
Call trace:
show_stack+0x38/0x50 arch/arm64/kernel/stacktrace.c:466 (C)
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0xbc/0x108 lib/dump_stack.c:120
print_address_description mm/kasan/report.c:378 [inline]
print_report+0x16c/0x6f0 mm/kasan/report.c:489
kasan_report+0xc0/0x120 mm/kasan/report.c:602
__asan_report_load2_noabort+0x20/0x30 mm/kasan/report_generic.c:379
geneve_find_dev drivers/net/geneve.c:1295 [inline]
geneve_configure+0x234/0x858 drivers/net/geneve.c:1343
geneve_newlink+0xb8/0x128 drivers/net/geneve.c:1634
rtnl_newlink_create+0x23c/0x868 net/core/rtnetlink.c:3795
__rtnl_newlink net/core/rtnetlink.c:3906 [inline]
rtnl_newlink+0x1054/0x1630 net/core/rtnetlink.c:4021
rtnetlink_rcv_msg+0x61c/0x918 net/core/rtnetlink.c:6911
netlink_rcv_skb+0x1dc/0x398 net/netlink/af_netlink.c:2543
rtnetlink_rcv+0x34/0x50 net/core/rtnetlink.c:6938
netlink_unicast_kernel net/netlink/af_netlink.c:1322 [inline]
netlink_unicast+0x618/0x838 net/netlink/af_netlink.c:1348
netlink_sendmsg+0x5fc/0x8b0 net/netlink/af_netlink.c:1892
sock_sendmsg_nosec net/socket.c:713 [inline]
__sock_sendmsg net/socket.c:728 [inline]
____sys_sendmsg+0x410/0x6f8 net/socket.c:2568
___sys_sendmsg+0x178/0x1d8 net/socket.c:2622
__sys_sendmsg net/socket.c:2654 [inline]
__do_sys_sendmsg net/socket.c:2659 [inline]
__se_sys_sendmsg net/socket.c:2657 [inline]
__arm64_sys_sendmsg+0x12c/0x1c8 net/socket.c:2657
__invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
invoke_syscall+0x90/0x278 arch/arm64/kernel/syscall.c:49
el0_svc_common+0x13c/0x250 arch/arm64/kernel/syscall.c:132
do_el0_svc+0x54/0x70 arch/arm64/kernel/syscall.c:151
el0_svc+0x4c/0xa8 arch/arm64/kernel/entry-common.c:744
el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:762
el0t_64_sync+0x198/0x1a0 arch/arm64/kernel/entry.S:600

Allocated by task 13247:
kasan_save_stack mm/kasan/common.c:47 [inline]
kasan_save_track+0x30/0x68 mm/kasan/common.c:68
kasan_save_alloc_info+0x44/0x58 mm/kasan/generic.c:568
poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
__kasan_kmalloc+0x84/0xa0 mm/kasan/common.c:394
kasan_kmalloc include/linux/kasan.h:260 [inline]
__do_kmalloc_node mm/slub.c:4298 [inline]
__kmalloc_node_noprof+0x2a0/0x560 mm/slub.c:4304
__kvmalloc_node_noprof+0x9c/0x230 mm/util.c:645
alloc_netdev_mqs+0xb8/0x11a0 net/core/dev.c:11470
rtnl_create_link+0x2b8/0xb50 net/core/rtnetlink.c:3604
rtnl_newlink_create+0x19c/0x868 net/core/rtnetlink.c:3780
__rtnl_newlink net/core/rtnetlink.c:3906 [inline]
rtnl_newlink+0x1054/0x1630 net/core/rtnetlink.c:4021
rtnetlink_rcv_msg+0x61c/0x918 net/core/rtnetlink.c:6911
netlink_rcv_skb+0x1dc/0x398 net/netlink/af_netlink.c:2543
rtnetlink_rcv+0x34/0x50 net/core/rtnetlink.c:6938
netlink_unicast_kernel net/netlink/af_n
—truncated—

12/03/2025

12/03/2025

Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
Pendiente de análisis

Referencias


  • https://git.kernel.org/stable/c/3ce92ca990cfac88a87c61df3cc0b5880e688ecf

  • https://git.kernel.org/stable/c/788dbca056a8783ec063da3c9d49a3a71c76c283

  • https://git.kernel.org/stable/c/904e746b2e7fa952ab8801b303ce826a63153d78

  • https://git.kernel.org/stable/c/9593172d93b9f91c362baec4643003dc29802929

  • https://git.kernel.org/stable/c/da9b0ae47f084014b1e4b3f31f70a0defd047ff3
  • Enviar en el boletín
    Off

    CVE-2025-2239

    CVE-2025-2239

    Título es
    CVE-2025-2239

    Mié, 12/03/2025 – 10:15

    Tipo
    CWE-209

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-2239

    Descripción en
    Generation of Error Message Containing Sensitive Information vulnerability in Hillstone Networks Hillstone Next Generation FireWall.This issue affects Hillstone Next Generation FireWall: from 5.5R8P1 before 5.5R8P23.

    12/03/2025

    12/03/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

    Gravedad 3.1 (CVSS 3.1 Base Score)
    5.30

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    MEDIUM

    Referencias


  • https://www.hillstonenet.com.cn/security-notification/2025/02/17/stoneosjd/
  • Enviar en el boletín
    Off

    CVE-2025-21866

    CVE-2025-21866

    Título es
    CVE-2025-21866

    Mié, 12/03/2025 – 10:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-21866

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    powerpc/code-patching: Fix KASAN hit by not flagging text patching area as VM_ALLOC

    Erhard reported the following KASAN hit while booting his PowerMac G4
    with a KASAN-enabled kernel 6.13-rc6:

    BUG: KASAN: vmalloc-out-of-bounds in copy_to_kernel_nofault+0xd8/0x1c8
    Write of size 8 at addr f1000000 by task chronyd/1293

    CPU: 0 UID: 123 PID: 1293 Comm: chronyd Tainted: G W 6.13.0-rc6-PMacG4 #2
    Tainted: [W]=WARN
    Hardware name: PowerMac3,6 7455 0x80010303 PowerMac
    Call Trace:
    [c2437590] [c1631a84] dump_stack_lvl+0x70/0x8c (unreliable)
    [c24375b0] [c0504998] print_report+0xdc/0x504
    [c2437610] [c050475c] kasan_report+0xf8/0x108
    [c2437690] [c0505a3c] kasan_check_range+0x24/0x18c
    [c24376a0] [c03fb5e4] copy_to_kernel_nofault+0xd8/0x1c8
    [c24376c0] [c004c014] patch_instructions+0x15c/0x16c
    [c2437710] [c00731a8] bpf_arch_text_copy+0x60/0x7c
    [c2437730] [c0281168] bpf_jit_binary_pack_finalize+0x50/0xac
    [c2437750] [c0073cf4] bpf_int_jit_compile+0xb30/0xdec
    [c2437880] [c0280394] bpf_prog_select_runtime+0x15c/0x478
    [c24378d0] [c1263428] bpf_prepare_filter+0xbf8/0xc14
    [c2437990] [c12677ec] bpf_prog_create_from_user+0x258/0x2b4
    [c24379d0] [c027111c] do_seccomp+0x3dc/0x1890
    [c2437ac0] [c001d8e0] system_call_exception+0x2dc/0x420
    [c2437f30] [c00281ac] ret_from_syscall+0x0/0x2c
    — interrupt: c00 at 0x5a1274
    NIP: 005a1274 LR: 006a3b3c CTR: 005296c8
    REGS: c2437f40 TRAP: 0c00 Tainted: G W (6.13.0-rc6-PMacG4)
    MSR: 0200f932 CR: 24004422 XER: 00000000

    GPR00: 00000166 af8f3fa0 a7ee3540 00000001 00000000 013b6500 005a5858 0200f932
    GPR08: 00000000 00001fe9 013d5fc8 005296c8 2822244c 00b2fcd8 00000000 af8f4b57
    GPR16: 00000000 00000001 00000000 00000000 00000000 00000001 00000000 00000002
    GPR24: 00afdbb0 00000000 00000000 00000000 006e0004 013ce060 006e7c1c 00000001
    NIP [005a1274] 0x5a1274
    LR [006a3b3c] 0x6a3b3c
    — interrupt: c00

    The buggy address belongs to the virtual mapping at
    [f1000000, f1002000) created by:
    text_area_cpu_up+0x20/0x190

    The buggy address belongs to the physical page:
    page: refcount:1 mapcount:0 mapping:00000000 index:0x0 pfn:0x76e30
    flags: 0x80000000(zone=2)
    raw: 80000000 00000000 00000122 00000000 00000000 00000000 ffffffff 00000001
    raw: 00000000
    page dumped because: kasan: bad access detected

    Memory state around the buggy address:
    f0ffff00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    f0ffff80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
    >f1000000: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
    ^
    f1000080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
    f1000100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8
    ==================================================================

    f8 corresponds to KASAN_VMALLOC_INVALID which means the area is not
    initialised hence not supposed to be used yet.

    Powerpc text patching infrastructure allocates a virtual memory area
    using get_vm_area() and flags it as VM_ALLOC. But that flag is meant
    to be used for vmalloc() and vmalloc() allocated memory is not
    supposed to be used before a call to __vmalloc_node_range() which is
    never called for that area.

    That went undetected until commit e4137f08816b ("mm, kasan, kmsan:
    instrument copy_from/to_kernel_nofault")

    The area allocated by text_area_cpu_up() is not vmalloc memory, it is
    mapped directly on demand when needed by map_kernel_page(). There is
    no VM flag corresponding to such usage, so just pass no flag. That way
    the area will be unpoisonned and usable immediately.

    12/03/2025

    12/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/2d542f13d26344e3452eee77613026ce9b653065

  • https://git.kernel.org/stable/c/2e6c80423f201405fd65254e52decd21663896f3

  • https://git.kernel.org/stable/c/8d06e9208184b2851fa79a3a39d6860320c8bdf8

  • https://git.kernel.org/stable/c/c905a3053518212a1017e50bd2be3bee59305bb0

  • https://git.kernel.org/stable/c/d262a192d38e527faa5984629aabda2e0d1c4f54
  • Enviar en el boletín
    Off

    CVE-2025-21865

    CVE-2025-21865

    Título es
    CVE-2025-21865

    Mié, 12/03/2025 – 10:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-21865

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl().

    Brad Spengler reported the list_del() corruption splat in
    gtp_net_exit_batch_rtnl(). [0]

    Commit eb28fd76c0a0 ("gtp: Destroy device along with udp socket's netns
    dismantle.") added the for_each_netdev() loop in gtp_net_exit_batch_rtnl()
    to destroy devices in each netns as done in geneve and ip tunnels.

    However, this could trigger ->dellink() twice for the same device during
    ->exit_batch_rtnl().

    Say we have two netns A & B and gtp device B that resides in netns B but
    whose UDP socket is in netns A.

    1. cleanup_net() processes netns A and then B.

    2. gtp_net_exit_batch_rtnl() finds the device B while iterating
    netns A's gn->gtp_dev_list and calls ->dellink().

    [ device B is not yet unlinked from netns B
    as unregister_netdevice_many() has not been called. ]

    3. gtp_net_exit_batch_rtnl() finds the device B while iterating
    netns B's for_each_netdev() and calls ->dellink().

    gtp_dellink() cleans up the device's hash table, unlinks the dev from
    gn->gtp_dev_list, and calls unregister_netdevice_queue().

    Basically, calling gtp_dellink() multiple times is fine unless
    CONFIG_DEBUG_LIST is enabled.

    Let's remove for_each_netdev() in gtp_net_exit_batch_rtnl() and
    delegate the destruction to default_device_exit_batch() as done
    in bareudp.

    [0]:
    list_del corruption, ffff8880aaa62c00->next (autoslab_size_M_dev_P_net_core_dev_11127_8_1328_8_S_4096_A_64_n_139+0xc00/0x1000 [slab object]) is LIST_POISON1 (ffffffffffffff02) (prev is 0xffffffffffffff04)
    kernel BUG at lib/list_debug.c:58!
    Oops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN
    CPU: 1 UID: 0 PID: 1804 Comm: kworker/u8:7 Tainted: G T 6.12.13-grsec-full-20250211091339 #1
    Tainted: [T]=RANDSTRUCT
    Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
    Workqueue: netns cleanup_net
    RIP: 0010:[] __list_del_entry_valid_or_report+0x141/0x200 lib/list_debug.c:58
    Code: c2 76 91 31 c0 e8 9f b1 f7 fc 0f 0b 4d 89 f0 48 c7 c1 02 ff ff ff 48 89 ea 48 89 ee 48 c7 c7 e0 c2 76 91 31 c0 e8 7f b1 f7 fc 0b 4d 89 e8 48 c7 c1 04 ff ff ff 48 89 ea 48 89 ee 48 c7 c7 60
    RSP: 0018:fffffe8040b4fbd0 EFLAGS: 00010283
    RAX: 00000000000000cc RBX: dffffc0000000000 RCX: ffffffff818c4054
    RDX: ffffffff84947381 RSI: ffffffff818d1512 RDI: 0000000000000000
    RBP: ffff8880aaa62c00 R08: 0000000000000001 R09: fffffbd008169f32
    R10: fffffe8040b4f997 R11: 0000000000000001 R12: a1988d84f24943e4
    R13: ffffffffffffff02 R14: ffffffffffffff04 R15: ffff8880aaa62c08
    RBX: kasan shadow of 0x0
    RCX: __wake_up_klogd.part.0+0x74/0xe0 kernel/printk/printk.c:4554
    RDX: __list_del_entry_valid_or_report+0x141/0x200 lib/list_debug.c:58
    RSI: vprintk+0x72/0x100 kernel/printk/printk_safe.c:71
    RBP: autoslab_size_M_dev_P_net_core_dev_11127_8_1328_8_S_4096_A_64_n_139+0xc00/0x1000 [slab object]
    RSP: process kstack fffffe8040b4fbd0+0x7bd0/0x8000 [kworker/u8:7+netns 1804 ]
    R09: kasan shadow of process kstack fffffe8040b4f990+0x7990/0x8000 [kworker/u8:7+netns 1804 ]
    R10: process kstack fffffe8040b4f997+0x7997/0x8000 [kworker/u8:7+netns 1804 ]
    R15: autoslab_size_M_dev_P_net_core_dev_11127_8_1328_8_S_4096_A_64_n_139+0xc08/0x1000 [slab object]
    FS: 0000000000000000(0000) GS:ffff888116000000(0000) knlGS:0000000000000000
    CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    CR2: 0000748f5372c000 CR3: 0000000015408000 CR4: 00000000003406f0 shadow CR4: 00000000003406f0
    Stack:
    0000000000000000 ffffffff8a0c35e7 ffffffff8a0c3603 ffff8880aaa62c00
    ffff8880aaa62c00 0000000000000004 ffff88811145311c 0000000000000005
    0000000000000001 ffff8880aaa62000 fffffe8040b4fd40 ffffffff8a0c360d
    Call Trace:

    [] __list_del_entry_valid include/linux/list.h:131 [inline] fffffe8040b4fc28
    [] __list_del_entry include/linux/list.h:248 [inline] fffffe8040b4fc28
    [] list_del include/linux/list.h:262 [inl
    —truncated—

    12/03/2025

    12/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/37e7644b961600ef0beb01d3970c3034a62913af

  • https://git.kernel.org/stable/c/4ccacf86491d33d2486b62d4d44864d7101b299d

  • https://git.kernel.org/stable/c/9d03e7e37187ae140e716377599493987fb20c5b

  • https://git.kernel.org/stable/c/b70fa591b066d52b141fc430ffdee35b6cc87a66

  • https://git.kernel.org/stable/c/ff81b14010362f6188ca26fec22ff05e4da45595
  • Enviar en el boletín
    Off

    CVE-2025-21864

    CVE-2025-21864

    Título es
    CVE-2025-21864

    Mié, 12/03/2025 – 10:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-21864

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    tcp: drop secpath at the same time as we currently drop dst

    Xiumei reported hitting the WARN in xfrm6_tunnel_net_exit while
    running tests that boil down to:
    – create a pair of netns
    – run a basic TCP test over ipcomp6
    – delete the pair of netns

    The xfrm_state found on spi_byaddr was not deleted at the time we
    delete the netns, because we still have a reference on it. This
    lingering reference comes from a secpath (which holds a ref on the
    xfrm_state), which is still attached to an skb. This skb is not
    leaked, it ends up on sk_receive_queue and then gets defer-free'd by
    skb_attempt_defer_free.

    The problem happens when we defer freeing an skb (push it on one CPU's
    defer_list), and don't flush that list before the netns is deleted. In
    that case, we still have a reference on the xfrm_state that we don't
    expect at this point.

    We already drop the skb's dst in the TCP receive path when it's no
    longer needed, so let's also drop the secpath. At this point,
    tcp_filter has already called into the LSM hooks that may require the
    secpath, so it should not be needed anymore. However, in some of those
    places, the MPTCP extension has just been attached to the skb, so we
    cannot simply drop all extensions.

    12/03/2025

    12/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/69cafd9413084cd5012cf5d7c7ec6f3d493726d9

  • https://git.kernel.org/stable/c/87858bbf21da239ace300d61dd209907995c0491

  • https://git.kernel.org/stable/c/9b6412e6979f6f9e0632075f8f008937b5cd4efd

  • https://git.kernel.org/stable/c/cd34a07f744451e2ecf9005bb7d24d0b2fb83656

  • https://git.kernel.org/stable/c/f1d5e6a5e468308af7759cf5276779d3155c5e98
  • Enviar en el boletín
    Off

    CVE-2025-21863

    CVE-2025-21863

    Título es
    CVE-2025-21863

    Mié, 12/03/2025 – 10:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-21863

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    io_uring: prevent opcode speculation

    sqe->opcode is used for different tables, make sure we santitise it
    against speculations.

    12/03/2025

    12/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/1e988c3fe1264708f4f92109203ac5b1d65de50b

  • https://git.kernel.org/stable/c/506b9b5e8c2d2a411ea8fe361333f5081c56d23a

  • https://git.kernel.org/stable/c/b9826e3b26ec031e9063f64a7c735449c43955e4

  • https://git.kernel.org/stable/c/fdbfd52bd8b85ed6783365ff54c82ab7067bd61b
  • Enviar en el boletín
    Off

    CVE-2025-21861

    CVE-2025-21861

    Título es
    CVE-2025-21861

    Mié, 12/03/2025 – 10:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-21861

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    mm/migrate_device: don't add folio to be freed to LRU in migrate_device_finalize()

    If migration succeeded, we called
    folio_migrate_flags()->mem_cgroup_migrate() to migrate the memcg from the
    old to the new folio. This will set memcg_data of the old folio to 0.

    Similarly, if migration failed, memcg_data of the dst folio is left unset.

    If we call folio_putback_lru() on such folios (memcg_data == 0), we will
    add the folio to be freed to the LRU, making memcg code unhappy. Running
    the hmm selftests:

    # ./hmm-tests

    # RUN hmm.hmm_device_private.migrate …
    [ 102.078007][T14893] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x7ff27d200 pfn:0x13cc00
    [ 102.079974][T14893] anon flags: 0x17ff00000020018(uptodate|dirty|swapbacked|node=0|zone=2|lastcpupid=0x7ff)
    [ 102.082037][T14893] raw: 017ff00000020018 dead000000000100 dead000000000122 ffff8881353896c9
    [ 102.083687][T14893] raw: 00000007ff27d200 0000000000000000 00000001ffffffff 0000000000000000
    [ 102.085331][T14893] page dumped because: VM_WARN_ON_ONCE_FOLIO(!memcg && !mem_cgroup_disabled())
    [ 102.087230][T14893] ————[ cut here ]————
    [ 102.088279][T14893] WARNING: CPU: 0 PID: 14893 at ./include/linux/memcontrol.h:726 folio_lruvec_lock_irqsave+0x10e/0x170
    [ 102.090478][T14893] Modules linked in:
    [ 102.091244][T14893] CPU: 0 UID: 0 PID: 14893 Comm: hmm-tests Not tainted 6.13.0-09623-g6c216bc522fd #151
    [ 102.093089][T14893] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014
    [ 102.094848][T14893] RIP: 0010:folio_lruvec_lock_irqsave+0x10e/0x170
    [ 102.096104][T14893] Code: …
    [ 102.099908][T14893] RSP: 0018:ffffc900236c37b0 EFLAGS: 00010293
    [ 102.101152][T14893] RAX: 0000000000000000 RBX: ffffea0004f30000 RCX: ffffffff8183f426
    [ 102.102684][T14893] RDX: ffff8881063cb880 RSI: ffffffff81b8117f RDI: ffff8881063cb880
    [ 102.104227][T14893] RBP: 0000000000000000 R08: 0000000000000005 R09: 0000000000000000
    [ 102.105757][T14893] R10: 0000000000000001 R11: 0000000000000002 R12: ffffc900236c37d8
    [ 102.107296][T14893] R13: ffff888277a2bcb0 R14: 000000000000001f R15: 0000000000000000
    [ 102.108830][T14893] FS: 00007ff27dbdd740(0000) GS:ffff888277a00000(0000) knlGS:0000000000000000
    [ 102.110643][T14893] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
    [ 102.111924][T14893] CR2: 00007ff27d400000 CR3: 000000010866e000 CR4: 0000000000750ef0
    [ 102.113478][T14893] PKRU: 55555554
    [ 102.114172][T14893] Call Trace:
    [ 102.114805][T14893]
    [ 102.115397][T14893] ? folio_lruvec_lock_irqsave+0x10e/0x170
    [ 102.116547][T14893] ? __warn.cold+0x110/0x210
    [ 102.117461][T14893] ? folio_lruvec_lock_irqsave+0x10e/0x170
    [ 102.118667][T14893] ? report_bug+0x1b9/0x320
    [ 102.119571][T14893] ? handle_bug+0x54/0x90
    [ 102.120494][T14893] ? exc_invalid_op+0x17/0x50
    [ 102.121433][T14893] ? asm_exc_invalid_op+0x1a/0x20
    [ 102.122435][T14893] ? __wake_up_klogd.part.0+0x76/0xd0
    [ 102.123506][T14893] ? dump_page+0x4f/0x60
    [ 102.124352][T14893] ? folio_lruvec_lock_irqsave+0x10e/0x170
    [ 102.125500][T14893] folio_batch_move_lru+0xd4/0x200
    [ 102.126577][T14893] ? __pfx_lru_add+0x10/0x10
    [ 102.127505][T14893] __folio_batch_add_and_move+0x391/0x720
    [ 102.128633][T14893] ? __pfx_lru_add+0x10/0x10
    [ 102.129550][T14893] folio_putback_lru+0x16/0x80
    [ 102.130564][T14893] migrate_device_finalize+0x9b/0x530
    [ 102.131640][T14893] dmirror_migrate_to_device.constprop.0+0x7c5/0xad0
    [ 102.133047][T14893] dmirror_fops_unlocked_ioctl+0x89b/0xc80

    Likely, nothing else goes wrong: putting the last folio reference will
    remove the folio from the LRU again. So besides memcg complaining, adding
    the folio to be freed to the LRU is just an unnecessary step.

    The new flow resembles what we have in migrate_folio_move(): add the dst
    to the lru, rem
    —truncated—

    12/03/2025

    12/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/069dd21ea8262204f94737878389c2815a054a9e

  • https://git.kernel.org/stable/c/3f9240d59e9a95d19f06120bfd1d0e681c6c0ac7

  • https://git.kernel.org/stable/c/41cddf83d8b00f29fd105e7a0777366edc69a5cf
  • Enviar en el boletín
    Off

    CVE-2025-21862

    CVE-2025-21862

    Título es
    CVE-2025-21862

    Mié, 12/03/2025 – 10:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-21862

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    drop_monitor: fix incorrect initialization order

    Syzkaller reports the following bug:

    BUG: spinlock bad magic on CPU#1, syz-executor.0/7995
    lock: 0xffff88805303f3e0, .magic: 00000000, .owner: /-1, .owner_cpu: 0
    CPU: 1 PID: 7995 Comm: syz-executor.0 Tainted: G E 5.10.209+ #1
    Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop Reference Platform, BIOS 6.00 11/12/2020
    Call Trace:
    __dump_stack lib/dump_stack.c:77 [inline]
    dump_stack+0x119/0x179 lib/dump_stack.c:118
    debug_spin_lock_before kernel/locking/spinlock_debug.c:83 [inline]
    do_raw_spin_lock+0x1f6/0x270 kernel/locking/spinlock_debug.c:112
    __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:117 [inline]
    _raw_spin_lock_irqsave+0x50/0x70 kernel/locking/spinlock.c:159
    reset_per_cpu_data+0xe6/0x240 [drop_monitor]
    net_dm_cmd_trace+0x43d/0x17a0 [drop_monitor]
    genl_family_rcv_msg_doit+0x22f/0x330 net/netlink/genetlink.c:739
    genl_family_rcv_msg net/netlink/genetlink.c:783 [inline]
    genl_rcv_msg+0x341/0x5a0 net/netlink/genetlink.c:800
    netlink_rcv_skb+0x14d/0x440 net/netlink/af_netlink.c:2497
    genl_rcv+0x29/0x40 net/netlink/genetlink.c:811
    netlink_unicast_kernel net/netlink/af_netlink.c:1322 [inline]
    netlink_unicast+0x54b/0x800 net/netlink/af_netlink.c:1348
    netlink_sendmsg+0x914/0xe00 net/netlink/af_netlink.c:1916
    sock_sendmsg_nosec net/socket.c:651 [inline]
    __sock_sendmsg+0x157/0x190 net/socket.c:663
    ____sys_sendmsg+0x712/0x870 net/socket.c:2378
    ___sys_sendmsg+0xf8/0x170 net/socket.c:2432
    __sys_sendmsg+0xea/0x1b0 net/socket.c:2461
    do_syscall_64+0x30/0x40 arch/x86/entry/common.c:46
    entry_SYSCALL_64_after_hwframe+0x62/0xc7
    RIP: 0033:0x7f3f9815aee9
    Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
    RSP: 002b:00007f3f972bf0c8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
    RAX: ffffffffffffffda RBX: 00007f3f9826d050 RCX: 00007f3f9815aee9
    RDX: 0000000020000000 RSI: 0000000020001300 RDI: 0000000000000007
    RBP: 00007f3f981b63bd R08: 0000000000000000 R09: 0000000000000000
    R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
    R13: 000000000000006e R14: 00007f3f9826d050 R15: 00007ffe01ee6768

    If drop_monitor is built as a kernel module, syzkaller may have time
    to send a netlink NET_DM_CMD_START message during the module loading.
    This will call the net_dm_monitor_start() function that uses
    a spinlock that has not yet been initialized.

    To fix this, let's place resource initialization above the registration
    of a generic netlink family.

    Found by InfoTeCS on behalf of Linux Verification Center
    (linuxtesting.org) with Syzkaller.

    12/03/2025

    12/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/07b598c0e6f06a0f254c88dafb4ad50f8a8c6eea

  • https://git.kernel.org/stable/c/0efa6c42f81c60d8f72ba7f5ed8d4fec8c526282

  • https://git.kernel.org/stable/c/219a47d0e6195bd202f22855e35f25bd15bc4d58

  • https://git.kernel.org/stable/c/b7859e8643e75619b2705b4fcac93ffd94d72b4a

  • https://git.kernel.org/stable/c/fcfc00bfec7bb6661074cb21356d05a4c9470a3c
  • Enviar en el boletín
    Off

    CVE-2024-13430

    CVE-2024-13430

    Título es
    CVE-2024-13430

    Mié, 12/03/2025 – 09:15

    Tipo
    CWE-284

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-13430

    Descripción en
    The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.9.8 via the 'pagelayer_builder_posts_shortcode' function due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private posts that they should not have access to.

    12/03/2025

    12/03/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

    Gravedad 3.1 (CVSS 3.1 Base Score)
    4.30

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    MEDIUM

    Referencias


  • https://plugins.trac.wordpress.org/changeset/3252081/pagelayer

  • https://www.wordfence.com/threat-intel/vulnerabilities/id/1de8da4c-dee7-4d59-a475-a969008aa0d4?source=cve
  • Enviar en el boletín
    Off

    CVE-2024-13446

    CVE-2024-13446

    Título es
    CVE-2024-13446

    Mié, 12/03/2025 – 10:15

    Tipo
    CWE-288

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-13446

    Descripción en
    The Workreap plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 3.2.5. This is due to the plugin not properly validating a user's identity prior to (1) performing a social auto-login or (2) updating their profile details (e.g. password). This makes it possible for unauthenticated attackers to (1) login as an arbitrary user if their email address is known or (2) change an arbitrary user's password, including administrators, and leverage that to gain access to their account. NOTE: This vulnerability was partially fixed in version 3.2.5.

    12/03/2025

    12/03/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

    Gravedad 3.1 (CVSS 3.1 Base Score)
    9.80

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    CRITICAL

    Referencias


  • https://themeforest.net/item/workreap-freelance-marketplace-wordpress-theme/23712454

  • https://www.wordfence.com/threat-intel/vulnerabilities/id/78c1308b-0849-4235-b2d6-0b1750a5614f?source=cve
  • Enviar en el boletín
    Off