Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-49858

Publication date:
21/10/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> efistub/tpm: Use ACPI reclaim memory for event log to avoid corruption<br /> <br /> The TPM event log table is a Linux specific construct, where the data<br /> produced by the GetEventLog() boot service is cached in memory, and<br /> passed on to the OS using an EFI configuration table.<br /> <br /> The use of EFI_LOADER_DATA here results in the region being left<br /> unreserved in the E820 memory map constructed by the EFI stub, and this<br /> is the memory description that is passed on to the incoming kernel by<br /> kexec, which is therefore unaware that the region should be reserved.<br /> <br /> Even though the utility of the TPM2 event log after a kexec is<br /> questionable, any corruption might send the parsing code off into the<br /> weeds and crash the kernel. So let&amp;#39;s use EFI_ACPI_RECLAIM_MEMORY<br /> instead, which is always treated as reserved by the E820 conversion<br /> logic.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-49859

Publication date:
21/10/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> f2fs: fix to check atomic_file in f2fs ioctl interfaces<br /> <br /> Some f2fs ioctl interfaces like f2fs_ioc_set_pin_file(),<br /> f2fs_move_file_range(), and f2fs_defragment_range() missed to<br /> check atomic_write status, which may cause potential race issue,<br /> fix it.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-49860

Publication date:
21/10/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ACPI: sysfs: validate return type of _STR method<br /> <br /> Only buffer objects are valid return values of _STR.<br /> <br /> If something else is returned description_show() will access invalid<br /> memory.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-47752

Publication date:
21/10/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> media: mediatek: vcodec: Fix H264 stateless decoder smatch warning<br /> <br /> Fix a smatch static checker warning on vdec_h264_req_if.c.<br /> Which leads to a kernel crash when fb is NULL.
Severity CVSS v4.0: Pending analysis
Last modification:
22/10/2024

CVE-2024-47755

Publication date:
21/10/2024
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: Pending analysis
Last modification:
23/10/2024

CVE-2024-47753

Publication date:
21/10/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> media: mediatek: vcodec: Fix VP8 stateless decoder smatch warning<br /> <br /> Fix a smatch static checker warning on vdec_vp8_req_if.c.<br /> Which leads to a kernel crash when fb is NULL.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-47754

Publication date:
21/10/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> media: mediatek: vcodec: Fix H264 multi stateless decoder smatch warning<br /> <br /> Fix a smatch static checker warning on vdec_h264_req_multi_if.c.<br /> Which leads to a kernel crash when fb is NULL.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-49850

Publication date:
21/10/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bpf: correctly handle malformed BPF_CORE_TYPE_ID_LOCAL relos<br /> <br /> In case of malformed relocation record of kind BPF_CORE_TYPE_ID_LOCAL<br /> referencing a non-existing BTF type, function bpf_core_calc_relo_insn<br /> would cause a null pointer deference.<br /> <br /> Fix this by adding a proper check upper in call stack, as malformed<br /> relocation records could be passed from user space.<br /> <br /> Simplest reproducer is a program:<br /> <br /> r0 = 0<br /> exit<br /> <br /> With a single relocation record:<br /> <br /> .insn_off = 0, /* patch first instruction */<br /> .type_id = 100500, /* this type id does not exist */<br /> .access_str_off = 6, /* offset of string "0" */<br /> .kind = BPF_CORE_TYPE_ID_LOCAL,<br /> <br /> See the link for original reproducer or next commit for a test case.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-49851

Publication date:
21/10/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> tpm: Clean up TPM space after command failure<br /> <br /> tpm_dev_transmit prepares the TPM space before attempting command<br /> transmission. However if the command fails no rollback of this<br /> preparation is done. This can result in transient handles being leaked<br /> if the device is subsequently closed with no further commands performed.<br /> <br /> Fix this by flushing the space in the event of command transmission<br /> failure.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-49852

Publication date:
21/10/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> scsi: elx: libefc: Fix potential use after free in efc_nport_vport_del()<br /> <br /> The kref_put() function will call nport-&gt;release if the refcount drops to<br /> zero. The nport-&gt;release release function is _efc_nport_free() which frees<br /> "nport". But then we dereference "nport" on the next line which is a use<br /> after free. Re-order these lines to avoid the use after free.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-47750

Publication date:
21/10/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> RDMA/hns: Fix Use-After-Free of rsv_qp on HIP08<br /> <br /> Currently rsv_qp is freed before ib_unregister_device() is called<br /> on HIP08. During the time interval, users can still dereg MR and<br /> rsv_qp will be used in this process, leading to a UAF. Move the<br /> release of rsv_qp after calling ib_unregister_device() to fix it.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-47751

Publication date:
21/10/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> PCI: kirin: Fix buffer overflow in kirin_pcie_parse_port()<br /> <br /> Within kirin_pcie_parse_port(), the pcie-&gt;num_slots is compared to<br /> pcie-&gt;gpio_id_reset size (MAX_PCI_SLOTS) which is correct and would lead<br /> to an overflow.<br /> <br /> Thus, fix condition to pcie-&gt;num_slots + 1 &gt;= MAX_PCI_SLOTS and move<br /> pcie-&gt;num_slots increment below the if-statement to avoid out-of-bounds<br /> array access.<br /> <br /> Found by Linux Verification Center (linuxtesting.org) with SVACE.<br /> <br /> [kwilczynski: commit log]
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025