CVE-2025-21844

CVE-2025-21844

Título es
CVE-2025-21844

Mié, 12/03/2025 – 10:15

Gravedad 2.0 Txt
Pendiente de análisis

Título en

CVE-2025-21844

Descripción en
In the Linux kernel, the following vulnerability has been resolved:

smb: client: Add check for next_buffer in receive_encrypted_standard()

Add check for the return value of cifs_buf_get() and cifs_small_buf_get()
in receive_encrypted_standard() to prevent null pointer dereference.

12/03/2025

12/03/2025

Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
Pendiente de análisis

Referencias


  • https://git.kernel.org/stable/c/24e8e4523d3071bc5143b0db9127d511489f7b3b

  • https://git.kernel.org/stable/c/554736b583f529ee159aa95af9a0cbc12b5ffc96

  • https://git.kernel.org/stable/c/860ca5e50f73c2a1cef7eefc9d39d04e275417f7

  • https://git.kernel.org/stable/c/9e5d99a4cf2e23c716b44862975548415fae5391

  • https://git.kernel.org/stable/c/a9b0b4b29877cb4dc5d0842b59b5ccbacddb85bd
  • Enviar en el boletín
    Off

    CVE-2024-58089

    CVE-2024-58089

    Título es
    CVE-2024-58089

    Mié, 12/03/2025 – 10:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-58089

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    btrfs: fix double accounting race when btrfs_run_delalloc_range() failed

    [BUG]
    When running btrfs with block size (4K) smaller than page size (64K,
    aarch64), there is a very high chance to crash the kernel at
    generic/750, with the following messages:
    (before the call traces, there are 3 extra debug messages added)

    BTRFS warning (device dm-3): read-write for sector size 4096 with page size 65536 is experimental
    BTRFS info (device dm-3): checking UUID tree
    hrtimer: interrupt took 5451385 ns
    BTRFS error (device dm-3): cow_file_range failed, root=4957 inode=257 start=1605632 len=69632: -28
    BTRFS error (device dm-3): run_delalloc_nocow failed, root=4957 inode=257 start=1605632 len=69632: -28
    BTRFS error (device dm-3): failed to run delalloc range, root=4957 ino=257 folio=1572864 submit_bitmap=8-15 start=1605632 len=69632: -28
    ————[ cut here ]————
    WARNING: CPU: 2 PID: 3020984 at ordered-data.c:360 can_finish_ordered_extent+0x370/0x3b8 [btrfs]
    CPU: 2 UID: 0 PID: 3020984 Comm: kworker/u24:1 Tainted: G OE 6.13.0-rc1-custom+ #89
    Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
    Hardware name: QEMU KVM Virtual Machine, BIOS unknown 2/2/2022
    Workqueue: events_unbound btrfs_async_reclaim_data_space [btrfs]
    pc : can_finish_ordered_extent+0x370/0x3b8 [btrfs]
    lr : can_finish_ordered_extent+0x1ec/0x3b8 [btrfs]
    Call trace:
    can_finish_ordered_extent+0x370/0x3b8 [btrfs] (P)
    can_finish_ordered_extent+0x1ec/0x3b8 [btrfs] (L)
    btrfs_mark_ordered_io_finished+0x130/0x2b8 [btrfs]
    extent_writepage+0x10c/0x3b8 [btrfs]
    extent_write_cache_pages+0x21c/0x4e8 [btrfs]
    btrfs_writepages+0x94/0x160 [btrfs]
    do_writepages+0x74/0x190
    filemap_fdatawrite_wbc+0x74/0xa0
    start_delalloc_inodes+0x17c/0x3b0 [btrfs]
    btrfs_start_delalloc_roots+0x17c/0x288 [btrfs]
    shrink_delalloc+0x11c/0x280 [btrfs]
    flush_space+0x288/0x328 [btrfs]
    btrfs_async_reclaim_data_space+0x180/0x228 [btrfs]
    process_one_work+0x228/0x680
    worker_thread+0x1bc/0x360
    kthread+0x100/0x118
    ret_from_fork+0x10/0x20
    —[ end trace 0000000000000000 ]—
    BTRFS critical (device dm-3): bad ordered extent accounting, root=4957 ino=257 OE offset=1605632 OE len=16384 to_dec=16384 left=0
    BTRFS critical (device dm-3): bad ordered extent accounting, root=4957 ino=257 OE offset=1622016 OE len=12288 to_dec=12288 left=0
    Unable to handle kernel NULL pointer dereference at virtual address 0000000000000008
    BTRFS critical (device dm-3): bad ordered extent accounting, root=4957 ino=257 OE offset=1634304 OE len=8192 to_dec=4096 left=0
    CPU: 1 UID: 0 PID: 3286940 Comm: kworker/u24:3 Tainted: G W OE 6.13.0-rc1-custom+ #89
    Hardware name: QEMU KVM Virtual Machine, BIOS unknown 2/2/2022
    Workqueue: btrfs_work_helper [btrfs] (btrfs-endio-write)
    pstate: 404000c5 (nZcv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=–)
    pc : process_one_work+0x110/0x680
    lr : worker_thread+0x1bc/0x360
    Call trace:
    process_one_work+0x110/0x680 (P)
    worker_thread+0x1bc/0x360 (L)
    worker_thread+0x1bc/0x360
    kthread+0x100/0x118
    ret_from_fork+0x10/0x20
    Code: f84086a1 f9000fe1 53041c21 b9003361 (f9400661)
    —[ end trace 0000000000000000 ]—
    Kernel panic – not syncing: Oops: Fatal exception
    SMP: stopping secondary CPUs
    SMP: failed to stop secondary CPUs 2-3
    Dumping ftrace buffer:
    (ftrace buffer empty)
    Kernel Offset: 0x275bb9540000 from 0xffff800080000000
    PHYS_OFFSET: 0xffff8fbba0000000
    CPU features: 0x100,00000070,00801250,8201720b

    [CAUSE]
    The above warning is triggered immediately after the delalloc range
    failure, this happens in the following sequence:

    – Range [1568K, 1636K) is dirty

    1536K 1568K 1600K 1636K 1664K
    | |/////////|////////| |

    Where 1536K, 1600K and 1664K are page boundaries (64K page size)

    – Enter extent_writepage() for page 1536K

    – Enter run_delalloc_nocow() with locke
    —truncated—

    12/03/2025

    12/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/0283ee1912c8e243c931f4ee5b3672e954fe0384

  • https://git.kernel.org/stable/c/21333148b5c9e52f41fafcedec3810b56a5e0e40

  • https://git.kernel.org/stable/c/72dad8e377afa50435940adfb697e070d3556670
  • Enviar en el boletín
    Off

    CVE-2024-58088

    CVE-2024-58088

    Título es
    CVE-2024-58088

    Mié, 12/03/2025 – 10:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-58088

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    bpf: Fix deadlock when freeing cgroup storage

    The following commit
    bc235cdb423a ("bpf: Prevent deadlock from recursive bpf_task_storage_[get|delete]")
    first introduced deadlock prevention for fentry/fexit programs attaching
    on bpf_task_storage helpers. That commit also employed the logic in map
    free path in its v6 version.

    Later bpf_cgrp_storage was first introduced in
    c4bcfb38a95e ("bpf: Implement cgroup storage available to non-cgroup-attached bpf progs")
    which faces the same issue as bpf_task_storage, instead of its busy
    counter, NULL was passed to bpf_local_storage_map_free() which opened
    a window to cause deadlock:

    (acquiring local_storage->lock)
    _raw_spin_lock_irqsave+0x3d/0x50
    bpf_local_storage_update+0xd1/0x460
    bpf_cgrp_storage_get+0x109/0x130
    bpf_prog_a4d4a370ba857314_cgrp_ptr+0x139/0x170
    ? __bpf_prog_enter_recur+0x16/0x80
    bpf_trampoline_6442485186+0x43/0xa4
    cgroup_storage_ptr+0x9/0x20
    (holding local_storage->lock)
    bpf_selem_unlink_storage_nolock.constprop.0+0x135/0x160
    bpf_selem_unlink_storage+0x6f/0x110
    bpf_local_storage_map_free+0xa2/0x110
    bpf_map_free_deferred+0x5b/0x90
    process_one_work+0x17c/0x390
    worker_thread+0x251/0x360
    kthread+0xd2/0x100
    ret_from_fork+0x34/0x50
    ret_from_fork_asm+0x1a/0x30

    Progs:
    – A: SEC("fentry/cgroup_storage_ptr")
    – cgid (BPF_MAP_TYPE_HASH)
    Record the id of the cgroup the current task belonging
    to in this hash map, using the address of the cgroup
    as the map key.
    – cgrpa (BPF_MAP_TYPE_CGRP_STORAGE)
    If current task is a kworker, lookup the above hash
    map using function parameter @owner as the key to get
    its corresponding cgroup id which is then used to get
    a trusted pointer to the cgroup through
    bpf_cgroup_from_id(). This trusted pointer can then
    be passed to bpf_cgrp_storage_get() to finally trigger
    the deadlock issue.
    – B: SEC("tp_btf/sys_enter")
    – cgrpb (BPF_MAP_TYPE_CGRP_STORAGE)
    The only purpose of this prog is to fill Prog A's
    hash map by calling bpf_cgrp_storage_get() for as
    many userspace tasks as possible.

    Steps to reproduce:
    – Run A;
    – while (true) { Run B; Destroy B; }

    Fix this issue by passing its busy counter to the free procedure so
    it can be properly incremented before storage/smap locking.

    12/03/2025

    12/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/6ecb9fa14eec5f15d97c84c36896871335f6ddfb

  • https://git.kernel.org/stable/c/c78f4afbd962f43a3989f45f3ca04300252b19b5

  • https://git.kernel.org/stable/c/fac674d2bd68f3479f27328626b42d1eebd11fef

  • https://git.kernel.org/stable/c/fcec95b4ab3e7bc6b2f36e5d59f7e24104ea87f7
  • Enviar en el boletín
    Off

    CVE-2025-24912

    CVE-2025-24912

    Título es
    CVE-2025-24912

    Mié, 12/03/2025 – 05:15

    Tipo
    CWE-826

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-24912

    Descripción en
    hostapd fails to process crafted RADIUS packets properly. When hostapd authenticates wi-fi devices with RADIUS authentication, an attacker in the position between the hostapd and the RADIUS server may inject crafted RADIUS packets and force RADIUS authentications to fail.

    12/03/2025

    12/03/2025

    Vector CVSS:3.1
    CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L

    Gravedad 3.1 (CVSS 3.1 Base Score)
    3.70

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    LOW

    Referencias


  • https://jvn.jp/en/jp/JVN19358384/

  • https://w1.fi/cgit/hostap/commit/?id=339a334551ca911187cc870f4f97ef08e11db109

  • https://w1.fi/cgit/hostap/commit/?id=726432d7622cc0088ac353d073b59628b590ea44

  • https://w1.fi/hostapd/
  • Enviar en el boletín
    Off

    CVE-2024-13498

    CVE-2024-13498

    Título es
    CVE-2024-13498

    Mié, 12/03/2025 – 06:15

    Tipo
    CWE-200

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-13498

    Descripción en
    The NEX-Forms – Ultimate Form Builder – Contact forms and much more plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 8.8.1 via file uploads due to insufficient directory listing prevention and lack of randomization of file names. This makes it possible for unauthenticated attackers to extract sensitive data including files uploaded via a form.

    12/03/2025

    12/03/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

    Gravedad 3.1 (CVSS 3.1 Base Score)
    5.30

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    MEDIUM

    Referencias


  • https://plugins.trac.wordpress.org/changeset/3235420/nex-forms-express-wp-form-builder

  • https://www.wordfence.com/threat-intel/vulnerabilities/id/f188a5e6-699e-4e1a-b4e4-7fb4056b0bee?source=cve
  • Enviar en el boletín
    Off

    CVE-2024-12589

    CVE-2024-12589

    Título es
    CVE-2024-12589

    Mié, 12/03/2025 – 07:15

    Tipo
    CWE-79

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-12589

    Descripción en
    The Finale Lite – Sales Countdown Timer & Discount for WooCommerce plugin for WordPress is vulnerable to Stored DOM-Based Cross-Site Scripting via the countdown timer in all versions up to, and including, 2.19.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    12/03/2025

    12/03/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N

    Gravedad 3.1 (CVSS 3.1 Base Score)
    6.40

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    MEDIUM

    Referencias


  • https://plugins.trac.wordpress.org/changeset/3247611/finale-woocommerce-sales-countdown-timer-discount

  • https://www.wordfence.com/threat-intel/vulnerabilities/id/ae0a001b-0792-4a32-8f49-5d4b1550f4be?source=cve
  • Enviar en el boletín
    Off

    CVE-2024-13838

    CVE-2024-13838

    Título es
    CVE-2024-13838

    Mié, 12/03/2025 – 07:15

    Tipo
    CWE-918

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-13838

    Descripción en
    The Uncanny Automator – Easy Automation, Integration, Webhooks & Workflow Builder Plugin plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 6.2 via the 'call_webhook' method of the Automator_Send_Webhook class This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.

    12/03/2025

    12/03/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N

    Gravedad 3.1 (CVSS 3.1 Base Score)
    5.50

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    MEDIUM

    Referencias


  • https://plugins.trac.wordpress.org/changeset/3249921/uncanny-automator/trunk/src/core/lib/webhooks/class-automator-send-webhook.php

  • https://www.wordfence.com/threat-intel/vulnerabilities/id/29eeac86-6b33-49e6-a7e1-c80dee383d6f?source=cve
  • Enviar en el boletín
    Off

    CVE-2024-58087

    CVE-2024-58087

    Título es
    CVE-2024-58087

    Mié, 12/03/2025 – 08:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-58087

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    ksmbd: fix racy issue from session lookup and expire

    Increment the session reference count within the lock for lookup to avoid
    racy issue with session expire.

    12/03/2025

    12/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/2107ab40629aeabbec369cf34b8cf0f288c3eb1b

  • https://git.kernel.org/stable/c/37a0e2b362b3150317fb6e2139de67b1e29ae5ff

  • https://git.kernel.org/stable/c/450a844c045ff0895d41b05a1cbe8febd1acfcfd

  • https://git.kernel.org/stable/c/a39e31e22a535d47b14656a7d6a893c7f6cf758c

  • https://git.kernel.org/stable/c/b95629435b84b9ecc0c765995204a4d8a913ed52
  • Enviar en el boletín
    Off

    CVE-2025-1508

    CVE-2025-1508

    Título es
    CVE-2025-1508

    Mié, 12/03/2025 – 04:15

    Tipo
    CWE-862

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-1508

    Descripción en
    The WP Crowdfunding plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the download_data action in all versions up to, and including, 2.1.13. This makes it possible for authenticated attackers, with subscriber-level access and above, to download all of a site's post content when WooCommerce is installed.

    12/03/2025

    12/03/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

    Gravedad 3.1 (CVSS 3.1 Base Score)
    5.30

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    MEDIUM

    Referencias


  • https://wordpress.org/plugins/wp-crowdfunding/

  • https://www.wordfence.com/threat-intel/vulnerabilities/id/70a93afa-9801-41d2-8923-ca4ae6ae974f?source=cve
  • Enviar en el boletín
    Off

    CVE-2025-2076

    CVE-2025-2076

    Título es
    CVE-2025-2076

    Mié, 12/03/2025 – 04:15

    Tipo
    CWE-79

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-2076

    Descripción en
    The binlayerpress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

    12/03/2025

    12/03/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N

    Gravedad 3.1 (CVSS 3.1 Base Score)
    4.40

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    MEDIUM

    Referencias


  • https://wordpress.org/plugins/binlayerpress/

  • https://www.wordfence.com/threat-intel/vulnerabilities/id/4af920a9-15fb-44c9-be31-7c9ed5bc2031?source=cve
  • Enviar en el boletín
    Off