Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Gemini 2.5 Pro and Flash are generally available and Gemini 2.5 Flash-Lite preview is announced

      June 19, 2025

      CSS Cascade Layers Vs. BEM Vs. Utility Classes: Specificity Control

      June 19, 2025

      IBM launches new integration to help unify AI security and governance

      June 18, 2025

      Meet Accessible UX Research, A Brand-New Smashing Book

      June 18, 2025

      How to free up your Mac’s storage space – 3 easy ways

      June 19, 2025

      I finally found a mini PC with a striking design (and the power to back it up)

      June 19, 2025

      The best password generators of 2025: Expert tested

      June 19, 2025

      Facebook’s new passkey support could soon let you ditch your password forever

      June 19, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      eslint-plugin-mutate

      June 19, 2025
      Recent

      eslint-plugin-mutate

      June 19, 2025

      Event-Driven Microservice Backend For a Modern E-commerce Platform.

      June 19, 2025

      Search Params Are State – How TanStack Router Solves It

      June 19, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      You Can Now Auto-Generate Google Forms Using Gemini Using Prompts or Files – Here’s How

      June 19, 2025
      Recent

      You Can Now Auto-Generate Google Forms Using Gemini Using Prompts or Files – Here’s How

      June 19, 2025

      Google Helps Devs Build Safe Android Apps with THIS Play Policy – Find Out More Here

      June 19, 2025

      Microsoft Edge for Business Now Lets Admins Push Encrypted Passwords to Users Securely

      June 19, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2023-53134 – “Broadcom bnxt_en Linux kernel Memory Allocation Vulnerability”

    CVE-2023-53134 – “Broadcom bnxt_en Linux kernel Memory Allocation Vulnerability”

    May 2, 2025

    CVE ID : CVE-2023-53134

    Published : May 2, 2025, 4:15 p.m. | 34 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    bnxt_en: Avoid order-5 memory allocation for TPA data

    The driver needs to keep track of all the possible concurrent TPA (GRO/LRO)
    completions on the aggregation ring. On P5 chips, the maximum number
    of concurrent TPA is 256 and the amount of memory we allocate is order-5
    on systems using 4K pages. Memory allocation failure has been reported:

    NetworkManager: page allocation failure: order:5, mode:0x40dc0(GFP_KERNEL|__GFP_COMP|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0-1
    CPU: 15 PID: 2995 Comm: NetworkManager Kdump: loaded Not tainted 5.10.156 #1
    Hardware name: Dell Inc. PowerEdge R660/0M1CC5, BIOS 0.2.25 08/12/2022
    Call Trace:
    dump_stack+0x57/0x6e
    warn_alloc.cold.120+0x7b/0xdd
    ? _cond_resched+0x15/0x30
    ? __alloc_pages_direct_compact+0x15f/0x170
    __alloc_pages_slowpath.constprop.108+0xc58/0xc70
    __alloc_pages_nodemask+0x2d0/0x300
    kmalloc_order+0x24/0xe0
    kmalloc_order_trace+0x19/0x80
    bnxt_alloc_mem+0x1150/0x15c0 [bnxt_en]
    ? bnxt_get_func_stat_ctxs+0x13/0x60 [bnxt_en]
    __bnxt_open_nic+0x12e/0x780 [bnxt_en]
    bnxt_open+0x10b/0x240 [bnxt_en]
    __dev_open+0xe9/0x180
    __dev_change_flags+0x1af/0x220
    dev_change_flags+0x21/0x60
    do_setlink+0x35c/0x1100

    Instead of allocating this big chunk of memory and dividing it up for the
    concurrent TPA instances, allocate each small chunk separately for each
    TPA instance. This will reduce it to order-0 allocations.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2023-53135 – Riscv Linux Kernel Stack Out-of-Bounds Vulnerability
    Next Article CVE-2023-53132 – “Mellanox MPI3MR Linux Kernel Memory Leak”

    Related Posts

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-6284 – PHPGurukul Car Rental Portal Cross-Site Request Forgery Vulnerability

    June 19, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-6285 – PHPGurukul COVID19 Testing Management System PHP Cross-Site Scripting Vulnerability

    June 19, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-1138 – IBM InfoSphere Information Server Directory Traversal Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Google fixes Chrome zero-day with in-the-wild exploit (CVE-2025-5419)

    Security

    Elden Ring Nightreign: How to unlock character skins and change garb

    News & Updates

    Mastering tsconfig.json: The Ultimate Guide to Configuring TypeScript Projects

    Development

    Highlights

    CVE-2025-46327 – Snowflake Golang Driver Local File Configuration TOCTOU

    April 29, 2025

    CVE ID : CVE-2025-46327

    Published : April 28, 2025, 11:15 p.m. | 3 hours, 50 minutes ago

    Description : gosnowflake is the Snowflake Golang driver. Versions starting from 1.7.0 to before 1.13.3, are vulnerable to a Time-of-Check to Time-of-Use (TOCTOU) race condition. When using the Easy Logging feature on Linux and macOS, the Driver reads logging configuration from a user-provided file. On Linux and macOS the Driver verifies that the configuration file can be written to only by its owner. That check was vulnerable to a TOCTOU race condition and failed to verify that the file owner matches the user running the Driver. This could allow a local attacker with write access to the configuration file or the directory containing it to overwrite the configuration and gain control over logging level and output location. This issue has been patched in version 1.13.3.

    Severity: 3.3 | LOW

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-49814 – Apache HTTP Server Authentication Bypass

    June 12, 2025

    Experts Uncover Four New Privilege Escalation Flaws in Windows Task Scheduler

    April 16, 2025

    CVE-2025-40674 – osCommerce Reflected Cross-Site Scripting (XSS)

    June 17, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.