Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-50770

Publication date:
24/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ocfs2: fix memory leak in ocfs2_mount_volume()<br /> <br /> There is a memory leak reported by kmemleak:<br /> <br /> unreferenced object 0xffff88810cc65e60 (size 32):<br /> comm "mount.ocfs2", pid 23753, jiffies 4302528942 (age 34735.105s)<br /> hex dump (first 32 bytes):<br /> 10 00 00 00 00 00 00 00 00 01 01 01 01 01 01 01 ................<br /> 01 01 01 01 01 01 01 01 00 00 00 00 00 00 00 00 ................<br /> backtrace:<br /> [] __kmalloc+0x4d/0x150<br /> [] ocfs2_compute_replay_slots+0x121/0x330 [ocfs2]<br /> [] ocfs2_check_volume+0x485/0x900 [ocfs2]<br /> [] ocfs2_mount_volume.isra.0+0x1e9/0x650 [ocfs2]<br /> [] ocfs2_fill_super+0xe0b/0x1740 [ocfs2]<br /> [] mount_bdev+0x312/0x400<br /> [] legacy_get_tree+0xed/0x1d0<br /> [] vfs_get_tree+0x7d/0x230<br /> [] path_mount+0xd62/0x1760<br /> [] do_mount+0xca/0xe0<br /> [] __x64_sys_mount+0x12c/0x1a0<br /> [] do_syscall_64+0x35/0x80<br /> [] entry_SYSCALL_64_after_hwframe+0x46/0xb0<br /> <br /> This call stack is related to two problems. Firstly, the ocfs2 super uses<br /> "replay_map" to trace online/offline slots, in order to recover offline<br /> slots during recovery and mount. But when ocfs2_truncate_log_init()<br /> returns an error in ocfs2_mount_volume(), the memory of "replay_map" will<br /> not be freed in error handling path. Secondly, the memory of "replay_map"<br /> will not be freed if d_make_root() returns an error in ocfs2_fill_super().<br /> But the memory of "replay_map" will be freed normally when completing<br /> recovery and mount in ocfs2_complete_mount_recovery().<br /> <br /> Fix the first problem by adding error handling path to free "replay_map"<br /> when ocfs2_truncate_log_init() fails. And fix the second problem by<br /> calling ocfs2_free_replay_slots(osb) in the error handling path<br /> "out_dismount". In addition, since ocfs2_free_replay_slots() is static,<br /> it is necessary to remove its static attribute and declare it in header<br /> file.
Severity CVSS v4.0: Pending analysis
Last modification:
24/12/2025

CVE-2022-50771

Publication date:
24/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> rcu: Fix __this_cpu_read() lockdep warning in rcu_force_quiescent_state()<br /> <br /> Running rcutorture with non-zero fqs_duration module parameter in a<br /> kernel built with CONFIG_PREEMPTION=y results in the following splat:<br /> <br /> BUG: using __this_cpu_read() in preemptible [00000000]<br /> code: rcu_torture_fqs/398<br /> caller is __this_cpu_preempt_check+0x13/0x20<br /> CPU: 3 PID: 398 Comm: rcu_torture_fqs Not tainted 6.0.0-rc1-yoctodev-standard+<br /> Call Trace:<br /> <br /> dump_stack_lvl+0x5b/0x86<br /> dump_stack+0x10/0x16<br /> check_preemption_disabled+0xe5/0xf0<br /> __this_cpu_preempt_check+0x13/0x20<br /> rcu_force_quiescent_state.part.0+0x1c/0x170<br /> rcu_force_quiescent_state+0x1e/0x30<br /> rcu_torture_fqs+0xca/0x160<br /> ? rcu_torture_boost+0x430/0x430<br /> kthread+0x192/0x1d0<br /> ? kthread_complete_and_exit+0x30/0x30<br /> ret_from_fork+0x22/0x30<br /> <br /> <br /> The problem is that rcu_force_quiescent_state() uses __this_cpu_read()<br /> in preemptible code instead of the proper raw_cpu_read(). This commit<br /> therefore changes __this_cpu_read() to raw_cpu_read().
Severity CVSS v4.0: Pending analysis
Last modification:
24/12/2025

CVE-2022-50753

Publication date:
24/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> f2fs: fix to do sanity check on summary info<br /> <br /> As Wenqing Liu reported in bugzilla:<br /> <br /> https://bugzilla.kernel.org/show_bug.cgi?id=216456<br /> <br /> BUG: KASAN: use-after-free in recover_data+0x63ae/0x6ae0 [f2fs]<br /> Read of size 4 at addr ffff8881464dcd80 by task mount/1013<br /> <br /> CPU: 3 PID: 1013 Comm: mount Tainted: G W 6.0.0-rc4 #1<br /> Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014<br /> Call Trace:<br /> dump_stack_lvl+0x45/0x5e<br /> print_report.cold+0xf3/0x68d<br /> kasan_report+0xa8/0x130<br /> recover_data+0x63ae/0x6ae0 [f2fs]<br /> f2fs_recover_fsync_data+0x120d/0x1fc0 [f2fs]<br /> f2fs_fill_super+0x4665/0x61e0 [f2fs]<br /> mount_bdev+0x2cf/0x3b0<br /> legacy_get_tree+0xed/0x1d0<br /> vfs_get_tree+0x81/0x2b0<br /> path_mount+0x47e/0x19d0<br /> do_mount+0xce/0xf0<br /> __x64_sys_mount+0x12c/0x1a0<br /> do_syscall_64+0x38/0x90<br /> entry_SYSCALL_64_after_hwframe+0x63/0xcd<br /> <br /> The root cause is: in fuzzed image, SSA table is corrupted: ofs_in_node<br /> is larger than ADDRS_PER_PAGE(), result in out-of-range access on 4k-size<br /> page.<br /> <br /> - recover_data<br /> - do_recover_data<br /> - check_index_in_prev_nodes<br /> - f2fs_data_blkaddr<br /> <br /> This patch adds sanity check on summary info in recovery and GC flow<br /> in where the flows rely on them.<br /> <br /> After patch:<br /> [ 29.310883] F2FS-fs (loop0): Inconsistent ofs_in_node:65286 in summary, ino:0, nid:6, max:1018
Severity CVSS v4.0: Pending analysis
Last modification:
24/12/2025

CVE-2022-50754

Publication date:
24/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> apparmor: fix a memleak in multi_transaction_new()<br /> <br /> In multi_transaction_new(), the variable t is not freed or passed out<br /> on the failure of copy_from_user(t-&gt;data, buf, size), which could lead<br /> to a memleak.<br /> <br /> Fix this bug by adding a put_multi_transaction(t) in the error path.
Severity CVSS v4.0: Pending analysis
Last modification:
24/12/2025

CVE-2022-50755

Publication date:
24/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> udf: Avoid double brelse() in udf_rename()<br /> <br /> syzbot reported a warning like below [1]:<br /> <br /> VFS: brelse: Trying to free free buffer<br /> WARNING: CPU: 2 PID: 7301 at fs/buffer.c:1145 __brelse+0x67/0xa0<br /> ...<br /> Call Trace:<br /> <br /> invalidate_bh_lru+0x99/0x150<br /> smp_call_function_many_cond+0xe2a/0x10c0<br /> ? generic_remap_file_range_prep+0x50/0x50<br /> ? __brelse+0xa0/0xa0<br /> ? __mutex_lock+0x21c/0x12d0<br /> ? smp_call_on_cpu+0x250/0x250<br /> ? rcu_read_lock_sched_held+0xb/0x60<br /> ? lock_release+0x587/0x810<br /> ? __brelse+0xa0/0xa0<br /> ? generic_remap_file_range_prep+0x50/0x50<br /> on_each_cpu_cond_mask+0x3c/0x80<br /> blkdev_flush_mapping+0x13a/0x2f0<br /> blkdev_put_whole+0xd3/0xf0<br /> blkdev_put+0x222/0x760<br /> deactivate_locked_super+0x96/0x160<br /> deactivate_super+0xda/0x100<br /> cleanup_mnt+0x222/0x3d0<br /> task_work_run+0x149/0x240<br /> ? task_work_cancel+0x30/0x30<br /> do_exit+0xb29/0x2a40<br /> ? reacquire_held_locks+0x4a0/0x4a0<br /> ? do_raw_spin_lock+0x12a/0x2b0<br /> ? mm_update_next_owner+0x7c0/0x7c0<br /> ? rwlock_bug.part.0+0x90/0x90<br /> ? zap_other_threads+0x234/0x2d0<br /> do_group_exit+0xd0/0x2a0<br /> __x64_sys_exit_group+0x3a/0x50<br /> do_syscall_64+0x34/0xb0<br /> entry_SYSCALL_64_after_hwframe+0x63/0xcd<br /> <br /> The cause of the issue is that brelse() is called on both ofibh.sbh<br /> and ofibh.ebh by udf_find_entry() when it returns NULL. However,<br /> brelse() is called by udf_rename(), too. So, b_count on buffer_head<br /> becomes unbalanced.<br /> <br /> This patch fixes the issue by not calling brelse() by udf_rename()<br /> when udf_find_entry() returns NULL.
Severity CVSS v4.0: Pending analysis
Last modification:
24/12/2025

CVE-2022-50756

Publication date:
24/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> nvme-pci: fix mempool alloc size<br /> <br /> Convert the max size to bytes to match the units of the divisor that<br /> calculates the worst-case number of PRP entries.<br /> <br /> The result is used to determine how many PRP Lists are required. The<br /> code was previously rounding this to 1 list, but we can require 2 in the<br /> worst case. In that scenario, the driver would corrupt memory beyond the<br /> size provided by the mempool.<br /> <br /> While unlikely to occur (you&amp;#39;d need a 4MB in exactly 127 phys segments<br /> on a queue that doesn&amp;#39;t support SGLs), this memory corruption has been<br /> observed by kfence.
Severity CVSS v4.0: Pending analysis
Last modification:
24/12/2025

CVE-2022-50757

Publication date:
24/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> media: camss: Clean up received buffers on failed start of streaming<br /> <br /> It is required to return the received buffers, if streaming can not be<br /> started. For instance media_pipeline_start() may fail with EPIPE, if<br /> a link validation between entities is not passed, and in such a case<br /> a user gets a kernel warning:<br /> <br /> WARNING: CPU: 1 PID: 520 at drivers/media/common/videobuf2/videobuf2-core.c:1592 vb2_start_streaming+0xec/0x160<br /> <br /> Call trace:<br /> vb2_start_streaming+0xec/0x160<br /> vb2_core_streamon+0x9c/0x1a0<br /> vb2_ioctl_streamon+0x68/0xbc<br /> v4l_streamon+0x30/0x3c<br /> __video_do_ioctl+0x184/0x3e0<br /> video_usercopy+0x37c/0x7b0<br /> video_ioctl2+0x24/0x40<br /> v4l2_ioctl+0x4c/0x70<br /> <br /> The fix is to correct the error path in video_start_streaming() of camss.
Severity CVSS v4.0: Pending analysis
Last modification:
24/12/2025

CVE-2022-50758

Publication date:
24/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> staging: vt6655: fix potential memory leak<br /> <br /> In function device_init_td0_ring, memory is allocated for member<br /> td_info of priv-&gt;apTD0Rings[i], with i increasing from 0. In case of<br /> allocation failure, the memory is freed in reversed order, with i<br /> decreasing to 0. However, the case i=0 is left out and thus memory is<br /> leaked.<br /> <br /> Modify the memory freeing loop to include the case i=0.
Severity CVSS v4.0: Pending analysis
Last modification:
24/12/2025

CVE-2022-50759

Publication date:
24/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> media: i2c: ov5648: Free V4L2 fwnode data on unbind<br /> <br /> The V4L2 fwnode data structure doesn&amp;#39;t get freed on unbind, which leads to<br /> a memleak.
Severity CVSS v4.0: Pending analysis
Last modification:
24/12/2025

CVE-2022-50760

Publication date:
24/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amdgpu: Fix PCI device refcount leak in amdgpu_atrm_get_bios()<br /> <br /> As comment of pci_get_class() says, it returns a pci_device with its<br /> refcount increased and decreased the refcount for the input parameter<br /> @from if it is not NULL.<br /> <br /> If we break the loop in amdgpu_atrm_get_bios() with &amp;#39;pdev&amp;#39; not NULL, we<br /> need to call pci_dev_put() to decrease the refcount. Add the missing<br /> pci_dev_put() to avoid refcount leak.
Severity CVSS v4.0: Pending analysis
Last modification:
24/12/2025

CVE-2022-50761

Publication date:
24/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> x86/xen: Fix memory leak in xen_init_lock_cpu()<br /> <br /> In xen_init_lock_cpu(), the @name has allocated new string by kasprintf(),<br /> if bind_ipi_to_irqhandler() fails, it should be freed, otherwise may lead<br /> to a memory leak issue, fix it.
Severity CVSS v4.0: Pending analysis
Last modification:
24/12/2025

CVE-2022-50762

Publication date:
24/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> fs/ntfs3: Avoid UBSAN error on true_sectors_per_clst()<br /> <br /> syzbot reported UBSAN error as below:<br /> <br /> [ 76.901829][ T6677] ================================================================================<br /> [ 76.903908][ T6677] UBSAN: shift-out-of-bounds in fs/ntfs3/super.c:675:13<br /> [ 76.905363][ T6677] shift exponent -247 is negative<br /> <br /> This patch avoid this error.
Severity CVSS v4.0: Pending analysis
Last modification:
24/12/2025