CVE-2025-21829

CVE-2025-21829

Título es
CVE-2025-21829

Jue, 06/03/2025 – 17:15

Gravedad 2.0 Txt
Pendiente de análisis

Título en

CVE-2025-21829

Descripción en
In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix the warning "__rxe_cleanup+0x12c/0x170 [rdma_rxe]"

The Call Trace is as below:
"

? show_regs.cold+0x1a/0x1f
? __rxe_cleanup+0x12c/0x170 [rdma_rxe]
? __warn+0x84/0xd0
? __rxe_cleanup+0x12c/0x170 [rdma_rxe]
? report_bug+0x105/0x180
? handle_bug+0x46/0x80
? exc_invalid_op+0x19/0x70
? asm_exc_invalid_op+0x1b/0x20
? __rxe_cleanup+0x12c/0x170 [rdma_rxe]
? __rxe_cleanup+0x124/0x170 [rdma_rxe]
rxe_destroy_qp.cold+0x24/0x29 [rdma_rxe]
ib_destroy_qp_user+0x118/0x190 [ib_core]
rdma_destroy_qp.cold+0x43/0x5e [rdma_cm]
rtrs_cq_qp_destroy.cold+0x1d/0x2b [rtrs_core]
rtrs_srv_close_work.cold+0x1b/0x31 [rtrs_server]
process_one_work+0x21d/0x3f0
worker_thread+0x4a/0x3c0
? process_one_work+0x3f0/0x3f0
kthread+0xf0/0x120
? kthread_complete_and_exit+0x20/0x20
ret_from_fork+0x22/0x30

"
When too many rdma resources are allocated, rxe needs more time to
handle these rdma resources. Sometimes with the current timeout, rxe
can not release the rdma resources correctly.

Compared with other rdma drivers, a bigger timeout is used.

06/03/2025

06/03/2025

Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
Pendiente de análisis

Referencias


  • https://git.kernel.org/stable/c/45e567800492088bc52c9abac35524b4d332a8f8

  • https://git.kernel.org/stable/c/720653309dd31c8a927ef5d87964578ad544980f

  • https://git.kernel.org/stable/c/7a2de8126ed3801f2396720e10a03cd546a3cea1

  • https://git.kernel.org/stable/c/a7d15eaecf0d6e13226db629ae2401c8c02683e5

  • https://git.kernel.org/stable/c/edc4ef0e0154096d6c0cf5e06af6fc330dbad9d1
  • Enviar en el boletín
    Off

    CVE-2025-0337

    CVE-2025-0337

    Título es
    CVE-2025-0337

    Jue, 06/03/2025 – 17:15

    Tipo
    CWE-639

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-0337

    Descripción en
    ServiceNow has addressed an authorization bypass vulnerability that was identified in the Washington release of the Now Platform. This vulnerability, if exploited, potentially could enable an authenticated user to access unauthorized data stored within the Now Platform that the user otherwise would not be entitled to access.

    This issue is addressed in the listed patches and family release, which have been made available to hosted and self-hosted customers, as well as partners.

    06/03/2025

    06/03/2025

    Vector CVSS:4.0
    CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

    Gravedad 4.0
    7.10

    Gravedad 4.0 txt
    HIGH

    Gravedad 3.1 (CVSS 3.1 Base Score)
    6.50

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    MEDIUM

    Referencias


  • https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1948695
  • Enviar en el boletín
    Off

    CVE-2024-58086

    CVE-2024-58086

    Título es
    CVE-2024-58086

    Jue, 06/03/2025 – 17:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2024-58086

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    drm/v3d: Stop active perfmon if it is being destroyed

    If the active performance monitor (`v3d->active_perfmon`) is being
    destroyed, stop it first. Currently, the active perfmon is not
    stopped during destruction, leaving the `v3d->active_perfmon` pointer
    stale. This can lead to undefined behavior and instability.

    This patch ensures that the active perfmon is stopped before being
    destroyed, aligning with the behavior introduced in commit
    7d1fd3638ee3 ("drm/v3d: Stop the active perfmon before being destroyed").

    06/03/2025

    06/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/1c5673a2c8926adbb61f340c779b28e18188a8cd

  • https://git.kernel.org/stable/c/21f1435b1e6b012a07c42f36b206d2b66fc8f13b

  • https://git.kernel.org/stable/c/95036d4c01167568166108d42c2b0e9f8dbd7d2b

  • https://git.kernel.org/stable/c/eb0e0eca0eab93f310c6c37b8564049366704691

  • https://git.kernel.org/stable/c/f8805b12f477bd964e2820a87921c7b58cc2dee3
  • Enviar en el boletín
    Off

    CVE-2025-21834

    CVE-2025-21834

    Título es
    CVE-2025-21834

    Jue, 06/03/2025 – 17:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-21834

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    seccomp: passthrough uretprobe systemcall without filtering

    When attaching uretprobes to processes running inside docker, the attached
    process is segfaulted when encountering the retprobe.

    The reason is that now that uretprobe is a system call the default seccomp
    filters in docker block it as they only allow a specific set of known
    syscalls. This is true for other userspace applications which use seccomp
    to control their syscall surface.

    Since uretprobe is a "kernel implementation detail" system call which is
    not used by userspace application code directly, it is impractical and
    there's very little point in forcing all userspace applications to
    explicitly allow it in order to avoid crashing tracked processes.

    Pass this systemcall through seccomp without depending on configuration.

    Note: uretprobe is currently only x86_64 and isn't expected to ever be
    supported in i386.

    [kees: minimized changes for easier backporting, tweaked commit log]

    06/03/2025

    06/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/5a262628f4cf2437d863fe41f9d427177b87664c

  • https://git.kernel.org/stable/c/cf6cb56ef24410fb5308f9655087f1eddf4452e6

  • https://git.kernel.org/stable/c/fa80018aa5be10c35e9fa896b7b4061a8dce3eed
  • Enviar en el boletín
    Off

    CVE-2025-21833

    CVE-2025-21833

    Título es
    CVE-2025-21833

    Jue, 06/03/2025 – 17:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-21833

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    iommu/vt-d: Avoid use of NULL after WARN_ON_ONCE

    There is a WARN_ON_ONCE to catch an unlikely situation when
    domain_remove_dev_pasid can't find the `pasid`. In case it nevertheless
    happens we must avoid using a NULL pointer.

    06/03/2025

    06/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/60f030f7418d3f1d94f2fb207fe3080e1844630b

  • https://git.kernel.org/stable/c/df96876be3b064aefc493f760e0639765d13ed0d
  • Enviar en el boletín
    Off

    CVE-2025-21832

    CVE-2025-21832

    Título es
    CVE-2025-21832

    Jue, 06/03/2025 – 17:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-21832

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    block: don't revert iter for -EIOCBQUEUED

    blkdev_read_iter() has a few odd checks, like gating the position and
    count adjustment on whether or not the result is bigger-than-or-equal to
    zero (where bigger than makes more sense), and not checking the return
    value of blkdev_direct_IO() before doing an iov_iter_revert(). The
    latter can lead to attempting to revert with a negative value, which
    when passed to iov_iter_revert() as an unsigned value will lead to
    throwing a WARN_ON() because unroll is bigger than MAX_RW_COUNT.

    Be sane and don't revert for -EIOCBQUEUED, like what is done in other
    spots.

    06/03/2025

    06/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/68f16d3034a06661245ecd22f0d586a8b4e7c473

  • https://git.kernel.org/stable/c/6c26619effb1b4cb7d20b4e666ab8f71f6a53ccb

  • https://git.kernel.org/stable/c/84671b0630ccb46ae9f1f99a45c7d63ffcd6a474

  • https://git.kernel.org/stable/c/a58f136bad29f9ae721a29d98c042fddbee22f77

  • https://git.kernel.org/stable/c/b13ee668e8280ca5b07f8ce2846b9957a8a10853
  • Enviar en el boletín
    Off

    CVE-2025-21831

    CVE-2025-21831

    Título es
    CVE-2025-21831

    Jue, 06/03/2025 – 17:15

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-21831

    Descripción en
    In the Linux kernel, the following vulnerability has been resolved:

    PCI: Avoid putting some root ports into D3 on TUXEDO Sirius Gen1

    commit 9d26d3a8f1b0 ("PCI: Put PCIe ports into D3 during suspend") sets the
    policy that all PCIe ports are allowed to use D3. When the system is
    suspended if the port is not power manageable by the platform and won't be
    used for wakeup via a PME this sets up the policy for these ports to go
    into D3hot.

    This policy generally makes sense from an OSPM perspective but it leads to
    problems with wakeup from suspend on the TUXEDO Sirius 16 Gen 1 with a
    specific old BIOS. This manifests as a system hang.

    On the affected Device + BIOS combination, add a quirk for the root port of
    the problematic controller to ensure that these root ports are not put into
    D3hot at suspend.

    This patch is based on

    https://lore.kernel.org/linux-pci/20230708214457.1229-2-mario.limonciello@amd.com

    but with the added condition both in the documentation and in the code to
    apply only to the TUXEDO Sirius 16 Gen 1 with a specific old BIOS and only
    the affected root ports.

    06/03/2025

    06/03/2025

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    Pendiente de análisis

    Referencias


  • https://git.kernel.org/stable/c/5ee3dd6e59b834e4d66e8b16fc684749ee40a257

  • https://git.kernel.org/stable/c/8852e056e297df1d8635ee7504e780d3184e45d0

  • https://git.kernel.org/stable/c/a78dfe50fffe6058afed2bb04c50c2c9a16664ee

  • https://git.kernel.org/stable/c/b1049f2d68693c80a576c4578d96774a68df2bad
  • Enviar en el boletín
    Off

    CVE-2025-2033

    CVE-2025-2033

    Título es
    CVE-2025-2033

    Jue, 06/03/2025 – 17:15

    Tipo
    CWE-74

    Gravedad v2.0
    6.50

    Gravedad 2.0 Txt
    MEDIUM

    Título en

    CVE-2025-2033

    Descripción en
    A vulnerability, which was classified as critical, was found in code-projects Blood Bank Management System 1.0. Affected is an unknown function of the file /user_dashboard/view_donor.php. The manipulation of the argument donor_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

    06/03/2025

    06/03/2025

    Vector CVSS:4.0
    CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

    Vector CVSS:2.0
    AV:N/AC:L/Au:S/C:P/I:P/A:P

    Gravedad 4.0
    5.30

    Gravedad 4.0 txt
    MEDIUM

    Gravedad 3.1 (CVSS 3.1 Base Score)
    6.30

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    MEDIUM

    Referencias


  • https://code-projects.org/

  • https://github.com/intercpt/XSS1/blob/main/SQL.md

  • https://vuldb.com/?ctiid_298776=

  • https://vuldb.com/?id_298776=

  • https://vuldb.com/?submit_512164=
  • Enviar en el boletín
    Off

    CVE-2025-2032

    CVE-2025-2032

    Título es
    CVE-2025-2032

    Jue, 06/03/2025 – 17:15

    Tipo
    CWE-22

    Gravedad v2.0
    2.70

    Gravedad 2.0 Txt
    LOW

    Título en

    CVE-2025-2032

    Descripción en
    A vulnerability classified as problematic was found in ChestnutCMS 1.5.2. This vulnerability affects the function renameFile of the file /cms/file/rename. The manipulation of the argument rename leads to path traversal. The exploit has been disclosed to the public and may be used.

    06/03/2025

    06/03/2025

    Vector CVSS:4.0
    CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

    Vector CVSS:3.1
    CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

    Vector CVSS:2.0
    AV:A/AC:L/Au:S/C:N/I:P/A:N

    Gravedad 4.0
    5.10

    Gravedad 4.0 txt
    MEDIUM

    Gravedad 3.1 (CVSS 3.1 Base Score)
    3.50

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    LOW

    Referencias


  • https://github.com/IceFoxH/VULN/issues/7

  • https://vuldb.com/?ctiid_298774=

  • https://vuldb.com/?id_298774=

  • https://vuldb.com/?submit_512030=
  • Enviar en el boletín
    Off

    CVE-2025-2045

    CVE-2025-2045

    Título es
    CVE-2025-2045

    Jue, 06/03/2025 – 13:15

    Tipo
    CWE-863

    Gravedad 2.0 Txt
    Pendiente de análisis

    Título en

    CVE-2025-2045

    Descripción en
    Improper authorization in GitLab EE affecting all versions from 17.7 prior to 17.7.6, 17.8 prior to 17.8.4, 17.9 prior to 17.9.1 allow users with limited permissions to access to potentially sensitive project analytics data.

    06/03/2025

    06/03/2025

    Vector CVSS:3.1
    CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

    Gravedad 3.1 (CVSS 3.1 Base Score)
    4.30

    Gravedad 3.1 Txt Gravedad 3.1 (CVSS 3.1 Base Score)
    MEDIUM

    Referencias


  • https://gitlab.com/gitlab-org/gitlab/-/issues/512050

  • https://hackerone.com/reports/2921111
  • Enviar en el boletín
    Off