Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-50563

Publication date:
22/10/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> dm thin: Fix UAF in run_timer_softirq()<br /> <br /> When dm_resume() and dm_destroy() are concurrent, it will<br /> lead to UAF, as follows:<br /> <br /> BUG: KASAN: use-after-free in __run_timers+0x173/0x710<br /> Write of size 8 at addr ffff88816d9490f0 by task swapper/0/0<br /> <br /> Call Trace:<br /> <br /> dump_stack_lvl+0x73/0x9f<br /> print_report.cold+0x132/0xaa2<br /> _raw_spin_lock_irqsave+0xcd/0x160<br /> __run_timers+0x173/0x710<br /> kasan_report+0xad/0x110<br /> __run_timers+0x173/0x710<br /> __asan_store8+0x9c/0x140<br /> __run_timers+0x173/0x710<br /> call_timer_fn+0x310/0x310<br /> pvclock_clocksource_read+0xfa/0x250<br /> kvm_clock_read+0x2c/0x70<br /> kvm_clock_get_cycles+0xd/0x20<br /> ktime_get+0x5c/0x110<br /> lapic_next_event+0x38/0x50<br /> clockevents_program_event+0xf1/0x1e0<br /> run_timer_softirq+0x49/0x90<br /> __do_softirq+0x16e/0x62c<br /> __irq_exit_rcu+0x1fa/0x270<br /> irq_exit_rcu+0x12/0x20<br /> sysvec_apic_timer_interrupt+0x8e/0xc0<br /> <br /> One of the concurrency UAF can be shown as below:<br /> <br /> use free<br /> do_resume |<br /> __find_device_hash_cell |<br /> dm_get |<br /> atomic_inc(&amp;md-&gt;holders) |<br /> | dm_destroy<br /> | __dm_destroy<br /> | if (!dm_suspended_md(md))<br /> | atomic_read(&amp;md-&gt;holders)<br /> | msleep(1)<br /> dm_resume |<br /> __dm_resume |<br /> dm_table_resume_targets |<br /> pool_resume |<br /> do_waker #add delay work |<br /> dm_put |<br /> atomic_dec(&amp;md-&gt;holders) |<br /> | dm_table_destroy<br /> | pool_dtr<br /> | __pool_dec<br /> | __pool_destroy<br /> | destroy_workqueue<br /> | kfree(pool) # free pool<br /> time out<br /> __do_softirq<br /> run_timer_softirq # pool has already been freed<br /> <br /> This can be easily reproduced using:<br /> 1. create thin-pool<br /> 2. dmsetup suspend pool<br /> 3. dmsetup resume pool<br /> 4. dmsetup remove_all # Concurrent with 3<br /> <br /> The root cause of this UAF bug is that dm_resume() adds timer after<br /> dm_destroy() skips cancelling the timer because of suspend status.<br /> After timeout, it will call run_timer_softirq(), however pool has<br /> already been freed. The concurrency UAF bug will happen.<br /> <br /> Therefore, cancelling timer again in __pool_destroy().
Severity CVSS v4.0: Pending analysis
Last modification:
22/10/2025

CVE-2022-50564

Publication date:
22/10/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> s390/netiucv: Fix return type of netiucv_tx()<br /> <br /> With clang&amp;#39;s kernel control flow integrity (kCFI, CONFIG_CFI_CLANG),<br /> indirect call targets are validated against the expected function<br /> pointer prototype to make sure the call target is valid to help mitigate<br /> ROP attacks. If they are not identical, there is a failure at run time,<br /> which manifests as either a kernel panic or thread getting killed. A<br /> proposed warning in clang aims to catch these at compile time, which<br /> reveals:<br /> <br /> drivers/s390/net/netiucv.c:1854:21: error: incompatible function pointer types initializing &amp;#39;netdev_tx_t (*)(struct sk_buff *, struct net_device *)&amp;#39; (aka &amp;#39;enum netdev_tx (*)(struct sk_buff *, struct net_device *)&amp;#39;) with an expression of type &amp;#39;int (struct sk_buff *, struct net_device *)&amp;#39; [-Werror,-Wincompatible-function-pointer-types-strict]<br /> .ndo_start_xmit = netiucv_tx,<br /> ^~~~~~~~~~<br /> <br /> -&gt;ndo_start_xmit() in &amp;#39;struct net_device_ops&amp;#39; expects a return type of<br /> &amp;#39;netdev_tx_t&amp;#39;, not &amp;#39;int&amp;#39;. Adjust the return type of netiucv_tx() to<br /> match the prototype&amp;#39;s to resolve the warning and potential CFI failure,<br /> should s390 select ARCH_SUPPORTS_CFI_CLANG in the future.<br /> <br /> Additionally, while in the area, remove a comment block that is no<br /> longer relevant.
Severity CVSS v4.0: Pending analysis
Last modification:
22/10/2025

CVE-2022-50565

Publication date:
22/10/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: plfxlc: fix potential memory leak in __lf_x_usb_enable_rx()<br /> <br /> urbs does not be freed in exception paths in __lf_x_usb_enable_rx().<br /> That will trigger memory leak. To fix it, add kfree() for urbs within<br /> "error" label. Compile tested only.
Severity CVSS v4.0: Pending analysis
Last modification:
22/10/2025

CVE-2022-50566

Publication date:
22/10/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mtd: Fix device name leak when register device failed in add_mtd_device()<br /> <br /> There is a kmemleak when register device failed:<br /> unreferenced object 0xffff888101aab550 (size 8):<br /> comm "insmod", pid 3922, jiffies 4295277753 (age 925.408s)<br /> hex dump (first 8 bytes):<br /> 6d 74 64 30 00 88 ff ff mtd0....<br /> backtrace:<br /> [] __kmalloc_node_track_caller+0x4e/0x150<br /> [] kvasprintf+0xb0/0x130<br /> [] kobject_set_name_vargs+0x2f/0xb0<br /> [] dev_set_name+0xab/0xe0<br /> [] add_mtd_device+0x4bb/0x700<br /> [] mtd_device_parse_register+0x2ac/0x3f0<br /> [] 0xffffffffa0238457<br /> [] 0xffffffffa02a008f<br /> [] do_one_initcall+0x87/0x2a0<br /> [] do_init_module+0xdf/0x320<br /> [] load_module+0x2f98/0x3330<br /> [] __do_sys_finit_module+0x113/0x1b0<br /> [] do_syscall_64+0x35/0x80<br /> [] entry_SYSCALL_64_after_hwframe+0x46/0xb0<br /> <br /> If register device failed, should call put_device() to give up the<br /> reference.
Severity CVSS v4.0: Pending analysis
Last modification:
22/10/2025

CVE-2022-50567

Publication date:
22/10/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> fs: jfs: fix shift-out-of-bounds in dbAllocAG<br /> <br /> Syzbot found a crash : UBSAN: shift-out-of-bounds in dbAllocAG. The<br /> underlying bug is the missing check of bmp-&gt;db_agl2size. The field can<br /> be greater than 64 and trigger the shift-out-of-bounds.<br /> <br /> Fix this bug by adding a check of bmp-&gt;db_agl2size in dbMount since this<br /> field is used in many following functions. The upper bound for this<br /> field is L2MAXL2SIZE - L2MAXAG, thanks for the help of Dave Kleikamp.<br /> Note that, for maintenance, I reorganized error handling code of dbMount.
Severity CVSS v4.0: Pending analysis
Last modification:
22/10/2025

CVE-2022-50568

Publication date:
22/10/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> usb: gadget: f_hid: fix f_hidg lifetime vs cdev<br /> <br /> The embedded struct cdev does not have its lifetime correctly tied to<br /> the enclosing struct f_hidg, so there is a use-after-free if /dev/hidgN<br /> is held open while the gadget is deleted.<br /> <br /> This can readily be replicated with libusbgx&amp;#39;s example programs (for<br /> conciseness - operating directly via configfs is equivalent):<br /> <br /> gadget-hid<br /> exec 3 /dev/hidg0<br /> gadget-vid-pid-remove<br /> exec 3
Severity CVSS v4.0: Pending analysis
Last modification:
22/10/2025

CVE-2022-50569

Publication date:
22/10/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> xfrm: Update ipcomp_scratches with NULL when freed<br /> <br /> Currently if ipcomp_alloc_scratches() fails to allocate memory<br /> ipcomp_scratches holds obsolete address. So when we try to free the<br /> percpu scratches using ipcomp_free_scratches() it tries to vfree non<br /> existent vm area. Described below:<br /> <br /> static void * __percpu *ipcomp_alloc_scratches(void)<br /> {<br /> ...<br /> scratches = alloc_percpu(void *);<br /> if (!scratches)<br /> return NULL;<br /> ipcomp_scratches does not know about this allocation failure.<br /> Therefore holding the old obsolete address.<br /> ...<br /> }<br /> <br /> So when we free,<br /> <br /> static void ipcomp_free_scratches(void)<br /> {<br /> ...<br /> scratches = ipcomp_scratches;<br /> Assigning obsolete address from ipcomp_scratches<br /> <br /> if (!scratches)<br /> return;<br /> <br /> for_each_possible_cpu(i)<br /> vfree(*per_cpu_ptr(scratches, i));<br /> Trying to free non existent page, causing warning: trying to vfree<br /> existent vm area.<br /> ...<br /> }<br /> <br /> Fix this breakage by updating ipcomp_scrtches with NULL when scratches<br /> is freed
Severity CVSS v4.0: Pending analysis
Last modification:
22/10/2025

CVE-2022-50570

Publication date:
22/10/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> platform/chrome: fix memory corruption in ioctl<br /> <br /> If "s_mem.bytes" is larger than the buffer size it leads to memory<br /> corruption.
Severity CVSS v4.0: Pending analysis
Last modification:
22/10/2025

CVE-2022-50557

Publication date:
22/10/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> pinctrl: thunderbay: fix possible memory leak in thunderbay_build_functions()<br /> <br /> The thunderbay_add_functions() will free memory of thunderbay_funcs<br /> when everything is ok, but thunderbay_funcs will not be freed when<br /> thunderbay_add_functions() fails, then there will be a memory leak,<br /> so we need to add kfree() when thunderbay_add_functions() fails to<br /> fix it.<br /> <br /> In addition, doing some cleaner works, moving kfree(funcs) from<br /> thunderbay_add_functions() to thunderbay_build_functions().
Severity CVSS v4.0: Pending analysis
Last modification:
22/10/2025

CVE-2022-50558

Publication date:
22/10/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> regmap-irq: Use the new num_config_regs property in regmap_add_irq_chip_fwnode<br /> <br /> Commit faa87ce9196d ("regmap-irq: Introduce config registers for irq<br /> types") added the num_config_regs, then commit 9edd4f5aee84 ("regmap-irq:<br /> Deprecate type registers and virtual registers") suggested to replace<br /> num_type_reg with it. However, regmap_add_irq_chip_fwnode wasn&amp;#39;t modified<br /> to use the new property. Later on, commit 255a03bb1bb3 ("ASoC: wcd9335:<br /> Convert irq chip to config regs") removed the old num_type_reg property<br /> from the WCD9335 driver&amp;#39;s struct regmap_irq_chip, causing a null pointer<br /> dereference in regmap_irq_set_type when it tried to index d-&gt;type_buf as<br /> it was never allocated in regmap_add_irq_chip_fwnode:<br /> <br /> [ 39.199374] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000<br /> <br /> [ 39.200006] Call trace:<br /> [ 39.200014] regmap_irq_set_type+0x84/0x1c0<br /> [ 39.200026] __irq_set_trigger+0x60/0x1c0<br /> [ 39.200040] __setup_irq+0x2f4/0x78c<br /> [ 39.200051] request_threaded_irq+0xe8/0x1a0<br /> <br /> Use num_config_regs in regmap_add_irq_chip_fwnode instead of num_type_reg,<br /> and fall back to it if num_config_regs isn&amp;#39;t defined to maintain backward<br /> compatibility.
Severity CVSS v4.0: Pending analysis
Last modification:
22/10/2025

CVE-2022-50559

Publication date:
22/10/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> clk: imx: scu: fix memleak on platform_device_add() fails<br /> <br /> No error handling is performed when platform_device_add()<br /> fails. Add error processing before return, and modified<br /> the return value.
Severity CVSS v4.0: Pending analysis
Last modification:
22/10/2025

CVE-2022-50560

Publication date:
22/10/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/meson: explicitly remove aggregate driver at module unload time<br /> <br /> Because component_master_del wasn&amp;#39;t being called when unloading the<br /> meson_drm module, the aggregate device would linger forever in the global<br /> aggregate_devices list. That means when unloading and reloading the<br /> meson_dw_hdmi module, component_add would call into<br /> try_to_bring_up_aggregate_device and find the unbound meson_drm aggregate<br /> device.<br /> <br /> This would in turn dereference some of the aggregate_device&amp;#39;s struct<br /> entries which point to memory automatically freed by the devres API when<br /> unbinding the aggregate device from meson_drv_unbind, and trigger an<br /> use-after-free bug:<br /> <br /> [ +0.000014] =============================================================<br /> [ +0.000007] BUG: KASAN: use-after-free in find_components+0x468/0x500<br /> [ +0.000017] Read of size 8 at addr ffff000006731688 by task modprobe/2536<br /> [ +0.000018] CPU: 4 PID: 2536 Comm: modprobe Tainted: G C O 5.19.0-rc6-lrmbkasan+ #1<br /> [ +0.000010] Hardware name: Hardkernel ODROID-N2Plus (DT)<br /> [ +0.000008] Call trace:<br /> [ +0.000005] dump_backtrace+0x1ec/0x280<br /> [ +0.000011] show_stack+0x24/0x80<br /> [ +0.000007] dump_stack_lvl+0x98/0xd4<br /> [ +0.000010] print_address_description.constprop.0+0x80/0x520<br /> [ +0.000011] print_report+0x128/0x260<br /> [ +0.000007] kasan_report+0xb8/0xfc<br /> [ +0.000007] __asan_report_load8_noabort+0x3c/0x50<br /> [ +0.000009] find_components+0x468/0x500<br /> [ +0.000008] try_to_bring_up_aggregate_device+0x64/0x390<br /> [ +0.000009] __component_add+0x1dc/0x49c<br /> [ +0.000009] component_add+0x20/0x30<br /> [ +0.000008] meson_dw_hdmi_probe+0x28/0x34 [meson_dw_hdmi]<br /> [ +0.000013] platform_probe+0xd0/0x220<br /> [ +0.000008] really_probe+0x3ac/0xa80<br /> [ +0.000008] __driver_probe_device+0x1f8/0x400<br /> [ +0.000008] driver_probe_device+0x68/0x1b0<br /> [ +0.000008] __driver_attach+0x20c/0x480<br /> [ +0.000009] bus_for_each_dev+0x114/0x1b0<br /> [ +0.000007] driver_attach+0x48/0x64<br /> [ +0.000009] bus_add_driver+0x390/0x564<br /> [ +0.000007] driver_register+0x1a8/0x3e4<br /> [ +0.000009] __platform_driver_register+0x6c/0x94<br /> [ +0.000007] meson_dw_hdmi_platform_driver_init+0x30/0x1000 [meson_dw_hdmi]<br /> [ +0.000014] do_one_initcall+0xc4/0x2b0<br /> [ +0.000008] do_init_module+0x154/0x570<br /> [ +0.000010] load_module+0x1a78/0x1ea4<br /> [ +0.000008] __do_sys_init_module+0x184/0x1cc<br /> [ +0.000008] __arm64_sys_init_module+0x78/0xb0<br /> [ +0.000008] invoke_syscall+0x74/0x260<br /> [ +0.000008] el0_svc_common.constprop.0+0xcc/0x260<br /> [ +0.000009] do_el0_svc+0x50/0x70<br /> [ +0.000008] el0_svc+0x68/0x1a0<br /> [ +0.000009] el0t_64_sync_handler+0x11c/0x150<br /> [ +0.000009] el0t_64_sync+0x18c/0x190<br /> <br /> [ +0.000014] Allocated by task 902:<br /> [ +0.000007] kasan_save_stack+0x2c/0x5c<br /> [ +0.000009] __kasan_kmalloc+0x90/0xd0<br /> [ +0.000007] __kmalloc_node+0x240/0x580<br /> [ +0.000010] memcg_alloc_slab_cgroups+0xa4/0x1ac<br /> [ +0.000010] memcg_slab_post_alloc_hook+0xbc/0x4c0<br /> [ +0.000008] kmem_cache_alloc_node+0x1d0/0x490<br /> [ +0.000009] __alloc_skb+0x1d4/0x310<br /> [ +0.000010] alloc_skb_with_frags+0x8c/0x620<br /> [ +0.000008] sock_alloc_send_pskb+0x5ac/0x6d0<br /> [ +0.000010] unix_dgram_sendmsg+0x2e0/0x12f0<br /> [ +0.000010] sock_sendmsg+0xcc/0x110<br /> [ +0.000007] sock_write_iter+0x1d0/0x304<br /> [ +0.000008] new_sync_write+0x364/0x460<br /> [ +0.000007] vfs_write+0x420/0x5ac<br /> [ +0.000008] ksys_write+0x19c/0x1f0<br /> [ +0.000008] __arm64_sys_write+0x78/0xb0<br /> [ +0.000007] invoke_syscall+0x74/0x260<br /> [ +0.000008] el0_svc_common.constprop.0+0x1a8/0x260<br /> [ +0.000009] do_el0_svc+0x50/0x70<br /> [ +0.000007] el0_svc+0x68/0x1a0<br /> [ +0.000008] el0t_64_sync_handler+0x11c/0x150<br /> [ +0.000008] el0t_64_sync+0x18c/0x190<br /> <br /> [ +0.000013] Freed by task 2509:<br /> [ +0.000008] kasan_save_stack+0x2c/0x5c<br /> [ +0.000007] kasan_set_track+0x2c/0x40<br /> [ +0.000008] kasan_set_free_info+0x28/0x50<br /> [ +0.000008] ____kasan_slab_free+0x128/0x1d4<br /> [ +0.000008] __kasan_slab_free+0x18/0x24<br /> [ +0.000007] slab_free_freelist_hook+0x108/0x230<br /> [ +0.000010] <br /> ---truncated---
Severity CVSS v4.0: Pending analysis
Last modification:
22/10/2025