Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-50040

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: dsa: sja1105: fix buffer overflow in sja1105_setup_devlink_regions()<br /> <br /> If an error occurs in dsa_devlink_region_create(), then &amp;#39;priv-&gt;regions&amp;#39;<br /> array will be accessed by negative index &amp;#39;-1&amp;#39;.<br /> <br /> Found by Linux Verification Center (linuxtesting.org) with SVACE.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2022-50041

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ice: Fix call trace with null VSI during VF reset<br /> <br /> During stress test with attaching and detaching VF from KVM and<br /> simultaneously changing VFs spoofcheck and trust there was a<br /> call trace in ice_reset_vf that VF&amp;#39;s VSI is null.<br /> <br /> [145237.352797] WARNING: CPU: 46 PID: 840629 at drivers/net/ethernet/intel/ice/ice_vf_lib.c:508 ice_reset_vf+0x3d6/0x410 [ice]<br /> [145237.352851] Modules linked in: ice(E) vfio_pci vfio_pci_core vfio_virqfd vfio_iommu_type1 vfio iavf dm_mod xt_CHECKSUM xt_MASQUERADE<br /> xt_conntrack ipt_REJECT nf_reject_ipv4 nft_compat nft_chain_nat nf_nat nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 nf_tables nfnetlink tun<br /> bridge stp llc sunrpc intel_rapl_msr intel_rapl_common sb_edac x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm iTCO_wdt iTC<br /> O_vendor_support irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel rapl ipmi_si intel_cstate ipmi_devintf joydev intel_uncore m<br /> ei_me ipmi_msghandler i2c_i801 pcspkr mei lpc_ich ioatdma i2c_smbus acpi_pad acpi_power_meter ip_tables xfs libcrc32c i2c_algo_bit drm_sh<br /> mem_helper drm_kms_helper sd_mod t10_pi crc64_rocksoft syscopyarea crc64 sysfillrect sg sysimgblt fb_sys_fops drm i40e ixgbe ahci libahci<br /> libata crc32c_intel mdio dca wmi fuse [last unloaded: ice]<br /> [145237.352917] CPU: 46 PID: 840629 Comm: kworker/46:2 Tainted: G S W I E 5.19.0-rc6+ #24<br /> [145237.352921] Hardware name: Intel Corporation S2600WTT/S2600WTT, BIOS SE5C610.86B.01.01.0008.021120151325 02/11/2015<br /> [145237.352923] Workqueue: ice ice_service_task [ice]<br /> [145237.352948] RIP: 0010:ice_reset_vf+0x3d6/0x410 [ice]<br /> [145237.352984] Code: 30 ec f3 cc e9 28 fd ff ff 0f b7 4b 50 48 c7 c2 48 19 9c c0 4c 89 ee 48 c7 c7 30 fe 9e c0 e8 d1 21 9d cc 31 c0 e9 a<br /> 9 fe ff ff 0b b8 ea ff ff ff e9 c1 fc ff ff 0f 0b b8 fb ff ff ff e9 91 fe<br /> [145237.352987] RSP: 0018:ffffb453e257fdb8 EFLAGS: 00010246<br /> [145237.352990] RAX: ffff8bd0040181c0 RBX: ffff8be68db8f800 RCX: 0000000000000000<br /> [145237.352991] RDX: 000000000000ffff RSI: 0000000000000000 RDI: ffff8be68db8f800<br /> [145237.352993] RBP: ffff8bd0040181c0 R08: 0000000000001000 R09: ffff8bcfd520e000<br /> [145237.352995] R10: 0000000000000000 R11: 00008417b5ab0bc0 R12: 0000000000000005<br /> [145237.352996] R13: ffff8bcee061c0d0 R14: ffff8bd004019640 R15: 0000000000000000<br /> [145237.352998] FS: 0000000000000000(0000) GS:ffff8be5dfb00000(0000) knlGS:0000000000000000<br /> [145237.353000] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> [145237.353002] CR2: 00007fd81f651d68 CR3: 0000001a0fe10001 CR4: 00000000001726e0<br /> [145237.353003] Call Trace:<br /> [145237.353008] <br /> [145237.353011] ice_process_vflr_event+0x8d/0xb0 [ice]<br /> [145237.353049] ice_service_task+0x79f/0xef0 [ice]<br /> [145237.353074] process_one_work+0x1c8/0x390<br /> [145237.353081] ? process_one_work+0x390/0x390<br /> [145237.353084] worker_thread+0x30/0x360<br /> [145237.353087] ? process_one_work+0x390/0x390<br /> [145237.353090] kthread+0xe8/0x110<br /> [145237.353094] ? kthread_complete_and_exit+0x20/0x20<br /> [145237.353097] ret_from_fork+0x22/0x30<br /> [145237.353103] <br /> <br /> Remove WARN_ON() from check if VSI is null in ice_reset_vf.<br /> Add "VF is already removed\n" in dev_dbg().<br /> <br /> This WARN_ON() is unnecessary and causes call trace, despite that<br /> call trace, driver still works. There is no need for this warn<br /> because this piece of code is responsible for disabling VF&amp;#39;s Tx/Rx<br /> queues when VF is disabled, but when VF is already removed there<br /> is no need to do reset or disable queues.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2022-50042

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: genl: fix error path memory leak in policy dumping<br /> <br /> If construction of the array of policies fails when recording<br /> non-first policy we need to unwind.<br /> <br /> netlink_policy_dump_add_policy() itself also needs fixing as<br /> it currently gives up on error without recording the allocated<br /> pointer in the pstate pointer.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2022-50031

Publication date:
18/06/2025
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: Pending analysis
Last modification:
11/08/2025

CVE-2022-50033

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> usb: host: ohci-ppc-of: Fix refcount leak bug<br /> <br /> In ohci_hcd_ppc_of_probe(), of_find_compatible_node() will return<br /> a node pointer with refcount incremented. We should use of_node_put()<br /> when it is not used anymore.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2022-50034

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> usb: cdns3 fix use-after-free at workaround 2<br /> <br /> BUG: KFENCE: use-after-free read in __list_del_entry_valid+0x10/0xac<br /> <br /> cdns3_wa2_remove_old_request()<br /> {<br /> ...<br /> kfree(priv_req-&gt;request.buf);<br /> cdns3_gadget_ep_free_request(&amp;priv_ep-&gt;endpoint, &amp;priv_req-&gt;request);<br /> list_del_init(&amp;priv_req-&gt;list);<br /> ^^^ use after free<br /> ...<br /> }<br /> <br /> cdns3_gadget_ep_free_request() free the space pointed by priv_req,<br /> but priv_req is used in the following list_del_init().<br /> <br /> This patch move list_del_init() before cdns3_gadget_ep_free_request().
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2022-50035

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amdgpu: Fix use-after-free on amdgpu_bo_list mutex<br /> <br /> If amdgpu_cs_vm_handling returns r != 0, then it will unlock the<br /> bo_list_mutex inside the function amdgpu_cs_vm_handling and again on<br /> amdgpu_cs_parser_fini. This problem results in the following<br /> use-after-free problem:<br /> <br /> [ 220.280990] ------------[ cut here ]------------<br /> [ 220.281000] refcount_t: underflow; use-after-free.<br /> [ 220.281019] WARNING: CPU: 1 PID: 3746 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x110<br /> [ 220.281029] ------------[ cut here ]------------<br /> [ 220.281415] CPU: 1 PID: 3746 Comm: chrome:cs0 Tainted: G W L ------- --- 5.20.0-0.rc0.20220812git7ebfc85e2cd7.10.fc38.x86_64 #1<br /> [ 220.281421] Hardware name: System manufacturer System Product Name/ROG STRIX X570-I GAMING, BIOS 4403 04/27/2022<br /> [ 220.281426] RIP: 0010:refcount_warn_saturate+0xba/0x110<br /> [ 220.281431] Code: 01 01 e8 79 4a 6f 00 0f 0b e9 42 47 a5 00 80 3d de<br /> 7e be 01 00 75 85 48 c7 c7 f8 98 8e 98 c6 05 ce 7e be 01 01 e8 56 4a<br /> 6f 00 0b e9 1f 47 a5 00 80 3d b9 7e be 01 00 0f 85 5e ff ff ff 48<br /> c7<br /> [ 220.281437] RSP: 0018:ffffb4b0d18d7a80 EFLAGS: 00010282<br /> [ 220.281443] RAX: 0000000000000026 RBX: 0000000000000003 RCX: 0000000000000000<br /> [ 220.281448] RDX: 0000000000000001 RSI: ffffffff988d06dc RDI: 00000000ffffffff<br /> [ 220.281452] RBP: 00000000ffffffff R08: 0000000000000000 R09: ffffb4b0d18d7930<br /> [ 220.281457] R10: 0000000000000003 R11: ffffa0672e2fffe8 R12: ffffa058ca360400<br /> [ 220.281461] R13: ffffa05846c50a18 R14: 00000000fffffe00 R15: 0000000000000003<br /> [ 220.281465] FS: 00007f82683e06c0(0000) GS:ffffa066e2e00000(0000) knlGS:0000000000000000<br /> [ 220.281470] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> [ 220.281475] CR2: 00003590005cc000 CR3: 00000001fca46000 CR4: 0000000000350ee0<br /> [ 220.281480] Call Trace:<br /> [ 220.281485] <br /> [ 220.281490] amdgpu_cs_ioctl+0x4e2/0x2070 [amdgpu]<br /> [ 220.281806] ? amdgpu_cs_find_mapping+0xe0/0xe0 [amdgpu]<br /> [ 220.282028] drm_ioctl_kernel+0xa4/0x150<br /> [ 220.282043] drm_ioctl+0x21f/0x420<br /> [ 220.282053] ? amdgpu_cs_find_mapping+0xe0/0xe0 [amdgpu]<br /> [ 220.282275] ? lock_release+0x14f/0x460<br /> [ 220.282282] ? _raw_spin_unlock_irqrestore+0x30/0x60<br /> [ 220.282290] ? _raw_spin_unlock_irqrestore+0x30/0x60<br /> [ 220.282297] ? lockdep_hardirqs_on+0x7d/0x100<br /> [ 220.282305] ? _raw_spin_unlock_irqrestore+0x40/0x60<br /> [ 220.282317] amdgpu_drm_ioctl+0x4a/0x80 [amdgpu]<br /> [ 220.282534] __x64_sys_ioctl+0x90/0xd0<br /> [ 220.282545] do_syscall_64+0x5b/0x80<br /> [ 220.282551] ? futex_wake+0x6c/0x150<br /> [ 220.282568] ? lock_is_held_type+0xe8/0x140<br /> [ 220.282580] ? do_syscall_64+0x67/0x80<br /> [ 220.282585] ? lockdep_hardirqs_on+0x7d/0x100<br /> [ 220.282592] ? do_syscall_64+0x67/0x80<br /> [ 220.282597] ? do_syscall_64+0x67/0x80<br /> [ 220.282602] ? lockdep_hardirqs_on+0x7d/0x100<br /> [ 220.282609] entry_SYSCALL_64_after_hwframe+0x63/0xcd<br /> [ 220.282616] RIP: 0033:0x7f8282a4f8bf<br /> [ 220.282639] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10<br /> 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00<br /> 0f 05 c2 3d 00 f0 ff ff 77 18 48 8b 44 24 18 64 48 2b 04 25 28 00<br /> 00<br /> [ 220.282644] RSP: 002b:00007f82683df410 EFLAGS: 00000246 ORIG_RAX: 0000000000000010<br /> [ 220.282651] RAX: ffffffffffffffda RBX: 00007f82683df588 RCX: 00007f8282a4f8bf<br /> [ 220.282655] RDX: 00007f82683df4d0 RSI: 00000000c0186444 RDI: 0000000000000018<br /> [ 220.282659] RBP: 00007f82683df4d0 R08: 00007f82683df5e0 R09: 00007f82683df4b0<br /> [ 220.282663] R10: 00001d04000a0600 R11: 0000000000000246 R12: 00000000c0186444<br /> [ 220.282667] R13: 0000000000000018 R14: 00007f82683df588 R15: 0000000000000003<br /> [ 220.282689] <br /> [ 220.282693] irq event stamp: 6232311<br /> [ 220.282697] hardirqs last enabled at (6232319): [] __up_console_sem+0x5e/0x70<br /> [ 220.282704] hardirqs last disabled at (6232326): [] __up_console_sem+0x43/0x70<br /> [ 220.282709] softirqs last enabled at (6232072): [] __irq_exit_rcu+0xf9/0x170<br /> [ 220.282716] softirqs last disabled at (6232061): [
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2022-50028

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> gadgetfs: ep_io - wait until IRQ finishes<br /> <br /> after usb_ep_queue() if wait_for_completion_interruptible() is<br /> interrupted we need to wait until IRQ gets finished.<br /> <br /> Otherwise complete() from epio_complete() can corrupt stack.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2022-50029

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> clk: qcom: ipq8074: dont disable gcc_sleep_clk_src<br /> <br /> Once the usb sleep clocks are disabled, clock framework is trying to<br /> disable the sleep clock source also.<br /> <br /> However, it seems that it cannot be disabled and trying to do so produces:<br /> [ 245.436390] ------------[ cut here ]------------<br /> [ 245.441233] gcc_sleep_clk_src status stuck at &amp;#39;on&amp;#39;<br /> [ 245.441254] WARNING: CPU: 2 PID: 223 at clk_branch_wait+0x130/0x140<br /> [ 245.450435] Modules linked in: xhci_plat_hcd xhci_hcd dwc3 dwc3_qcom leds_gpio<br /> [ 245.456601] CPU: 2 PID: 223 Comm: sh Not tainted 5.18.0-rc4 #215<br /> [ 245.463889] Hardware name: Xiaomi AX9000 (DT)<br /> [ 245.470050] pstate: 204000c5 (nzCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)<br /> [ 245.474307] pc : clk_branch_wait+0x130/0x140<br /> [ 245.481073] lr : clk_branch_wait+0x130/0x140<br /> [ 245.485588] sp : ffffffc009f2bad0<br /> [ 245.489838] x29: ffffffc009f2bad0 x28: ffffff8003e6c800 x27: 0000000000000000<br /> [ 245.493057] x26: 0000000000000000 x25: 0000000000000000 x24: ffffff800226ef20<br /> [ 245.500175] x23: ffffffc0089ff550 x22: 0000000000000000 x21: ffffffc008476ad0<br /> [ 245.507294] x20: 0000000000000000 x19: ffffffc00965ac70 x18: fffffffffffc51a7<br /> [ 245.514413] x17: 68702e3030303837 x16: 3a6d726f6674616c x15: ffffffc089f2b777<br /> [ 245.521531] x14: ffffffc0095c9d18 x13: 0000000000000129 x12: 0000000000000129<br /> [ 245.528649] x11: 00000000ffffffea x10: ffffffc009621d18 x9 : 0000000000000001<br /> [ 245.535767] x8 : 0000000000000001 x7 : 0000000000017fe8 x6 : 0000000000000001<br /> [ 245.542885] x5 : ffffff803fdca6d8 x4 : 0000000000000000 x3 : 0000000000000027<br /> [ 245.550002] x2 : 0000000000000027 x1 : 0000000000000023 x0 : 0000000000000026<br /> [ 245.557122] Call trace:<br /> [ 245.564229] clk_branch_wait+0x130/0x140<br /> [ 245.566490] clk_branch2_disable+0x2c/0x40<br /> [ 245.570656] clk_core_disable+0x60/0xb0<br /> [ 245.574561] clk_core_disable+0x68/0xb0<br /> [ 245.578293] clk_disable+0x30/0x50<br /> [ 245.582113] dwc3_qcom_remove+0x60/0xc0 [dwc3_qcom]<br /> [ 245.585588] platform_remove+0x28/0x60<br /> [ 245.590361] device_remove+0x4c/0x80<br /> [ 245.594179] device_release_driver_internal+0x1dc/0x230<br /> [ 245.597914] device_driver_detach+0x18/0x30<br /> [ 245.602861] unbind_store+0xec/0x110<br /> [ 245.607027] drv_attr_store+0x24/0x40<br /> [ 245.610847] sysfs_kf_write+0x44/0x60<br /> [ 245.614405] kernfs_fop_write_iter+0x128/0x1c0<br /> [ 245.618052] new_sync_write+0xc0/0x130<br /> [ 245.622391] vfs_write+0x1d4/0x2a0<br /> [ 245.626123] ksys_write+0x58/0xe0<br /> [ 245.629508] __arm64_sys_write+0x1c/0x30<br /> [ 245.632895] invoke_syscall.constprop.0+0x5c/0x110<br /> [ 245.636890] do_el0_svc+0xa0/0x150<br /> [ 245.641488] el0_svc+0x18/0x60<br /> [ 245.644872] el0t_64_sync_handler+0xa4/0x130<br /> [ 245.647914] el0t_64_sync+0x174/0x178<br /> [ 245.652340] ---[ end trace 0000000000000000 ]---<br /> <br /> So, add CLK_IS_CRITICAL flag to the clock so that the kernel won&amp;#39;t try<br /> to disable the sleep clock.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2022-50030

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> scsi: lpfc: Prevent buffer overflow crashes in debugfs with malformed user input<br /> <br /> Malformed user input to debugfs results in buffer overflow crashes. Adapt<br /> input string lengths to fit within internal buffers, leaving space for NULL<br /> terminators.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2022-50032

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> usb: renesas: Fix refcount leak bug<br /> <br /> In usbhs_rza1_hardware_init(), of_find_node_by_name() will return<br /> a node pointer with refcount incremented. We should use of_node_put()<br /> when it is not used anymore.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2022-50024

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> dmaengine: dw-axi-dmac: do not print NULL LLI during error<br /> <br /> During debugging we have seen an issue where axi_chan_dump_lli()<br /> is passed a NULL LLI pointer which ends up causing an OOPS due<br /> to trying to get fields from it. Simply print NULL LLI and exit<br /> to avoid this.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025