Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-49978

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> fbdev: fb_pm2fb: Avoid potential divide by zero error<br /> <br /> In `do_fb_ioctl()` of fbmem.c, if cmd is FBIOPUT_VSCREENINFO, var will be<br /> copied from user, then go through `fb_set_var()` and<br /> `info-&gt;fbops-&gt;fb_check_var()` which could may be `pm2fb_check_var()`.<br /> Along the path, `var-&gt;pixclock` won&amp;#39;t be modified. This function checks<br /> whether reciprocal of `var-&gt;pixclock` is too high. If `var-&gt;pixclock` is<br /> zero, there will be a divide by zero error. So, it is necessary to check<br /> whether denominator is zero to avoid crash. As this bug is found by<br /> Syzkaller, logs are listed below.<br /> <br /> divide error in pm2fb_check_var<br /> Call Trace:<br /> <br /> fb_set_var+0x367/0xeb0 drivers/video/fbdev/core/fbmem.c:1015<br /> do_fb_ioctl+0x234/0x670 drivers/video/fbdev/core/fbmem.c:1110<br /> fb_ioctl+0xdd/0x130 drivers/video/fbdev/core/fbmem.c:1189
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2025

CVE-2022-49977

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ftrace: Fix NULL pointer dereference in is_ftrace_trampoline when ftrace is dead<br /> <br /> ftrace_startup does not remove ops from ftrace_ops_list when<br /> ftrace_startup_enable fails:<br /> <br /> register_ftrace_function<br /> ftrace_startup<br /> __register_ftrace_function<br /> ...<br /> add_ftrace_ops(&amp;ftrace_ops_list, ops)<br /> ...<br /> ...<br /> ftrace_startup_enable // if ftrace failed to modify, ftrace_disabled is set to 1<br /> ...<br /> return 0 // ops is in the ftrace_ops_list.<br /> <br /> When ftrace_disabled = 1, unregister_ftrace_function simply returns without doing anything:<br /> unregister_ftrace_function<br /> ftrace_shutdown<br /> if (unlikely(ftrace_disabled))<br /> return -ENODEV; // return here, __unregister_ftrace_function is not executed,<br /> // as a result, ops is still in the ftrace_ops_list<br /> __unregister_ftrace_function<br /> ...<br /> <br /> If ops is dynamically allocated, it will be free later, in this case,<br /> is_ftrace_trampoline accesses NULL pointer:<br /> <br /> is_ftrace_trampoline<br /> ftrace_ops_trampoline<br /> do_for_each_ftrace_op(op, ftrace_ops_list) // OOPS! op may be NULL!<br /> <br /> Syzkaller reports as follows:<br /> [ 1203.506103] BUG: kernel NULL pointer dereference, address: 000000000000010b<br /> [ 1203.508039] #PF: supervisor read access in kernel mode<br /> [ 1203.508798] #PF: error_code(0x0000) - not-present page<br /> [ 1203.509558] PGD 800000011660b067 P4D 800000011660b067 PUD 130fb8067 PMD 0<br /> [ 1203.510560] Oops: 0000 [#1] SMP KASAN PTI<br /> [ 1203.511189] CPU: 6 PID: 29532 Comm: syz-executor.2 Tainted: G B W 5.10.0 #8<br /> [ 1203.512324] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014<br /> [ 1203.513895] RIP: 0010:is_ftrace_trampoline+0x26/0xb0<br /> [ 1203.514644] Code: ff eb d3 90 41 55 41 54 49 89 fc 55 53 e8 f2 00 fd ff 48 8b 1d 3b 35 5d 03 e8 e6 00 fd ff 48 8d bb 90 00 00 00 e8 2a 81 26 00 8b ab 90 00 00 00 48 85 ed 74 1d e8 c9 00 fd ff 48 8d bb 98 00<br /> [ 1203.518838] RSP: 0018:ffffc900012cf960 EFLAGS: 00010246<br /> [ 1203.520092] RAX: 0000000000000000 RBX: 000000000000007b RCX: ffffffff8a331866<br /> [ 1203.521469] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 000000000000010b<br /> [ 1203.522583] RBP: 0000000000000000 R08: 0000000000000000 R09: ffffffff8df18b07<br /> [ 1203.523550] R10: fffffbfff1be3160 R11: 0000000000000001 R12: 0000000000478399<br /> [ 1203.524596] R13: 0000000000000000 R14: ffff888145088000 R15: 0000000000000008<br /> [ 1203.525634] FS: 00007f429f5f4700(0000) GS:ffff8881daf00000(0000) knlGS:0000000000000000<br /> [ 1203.526801] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> [ 1203.527626] CR2: 000000000000010b CR3: 0000000170e1e001 CR4: 00000000003706e0<br /> [ 1203.528611] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br /> [ 1203.529605] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400<br /> <br /> Therefore, when ftrace_startup_enable fails, we need to rollback registration<br /> process and remove ops from ftrace_ops_list.
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2025

CVE-2022-49979

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: fix refcount bug in sk_psock_get (2)<br /> <br /> Syzkaller reports refcount bug as follows:<br /> ------------[ cut here ]------------<br /> refcount_t: saturated; leaking memory.<br /> WARNING: CPU: 1 PID: 3605 at lib/refcount.c:19 refcount_warn_saturate+0xf4/0x1e0 lib/refcount.c:19<br /> Modules linked in:<br /> CPU: 1 PID: 3605 Comm: syz-executor208 Not tainted 5.18.0-syzkaller-03023-g7e062cda7d90 #0<br /> <br /> __refcount_add_not_zero include/linux/refcount.h:163 [inline]<br /> __refcount_inc_not_zero include/linux/refcount.h:227 [inline]<br /> refcount_inc_not_zero include/linux/refcount.h:245 [inline]<br /> sk_psock_get+0x3bc/0x410 include/linux/skmsg.h:439<br /> tls_data_ready+0x6d/0x1b0 net/tls/tls_sw.c:2091<br /> tcp_data_ready+0x106/0x520 net/ipv4/tcp_input.c:4983<br /> tcp_data_queue+0x25f2/0x4c90 net/ipv4/tcp_input.c:5057<br /> tcp_rcv_state_process+0x1774/0x4e80 net/ipv4/tcp_input.c:6659<br /> tcp_v4_do_rcv+0x339/0x980 net/ipv4/tcp_ipv4.c:1682<br /> sk_backlog_rcv include/net/sock.h:1061 [inline]<br /> __release_sock+0x134/0x3b0 net/core/sock.c:2849<br /> release_sock+0x54/0x1b0 net/core/sock.c:3404<br /> inet_shutdown+0x1e0/0x430 net/ipv4/af_inet.c:909<br /> __sys_shutdown_sock net/socket.c:2331 [inline]<br /> __sys_shutdown_sock net/socket.c:2325 [inline]<br /> __sys_shutdown+0xf1/0x1b0 net/socket.c:2343<br /> __do_sys_shutdown net/socket.c:2351 [inline]<br /> __se_sys_shutdown net/socket.c:2349 [inline]<br /> __x64_sys_shutdown+0x50/0x70 net/socket.c:2349<br /> do_syscall_x64 arch/x86/entry/common.c:50 [inline]<br /> do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80<br /> entry_SYSCALL_64_after_hwframe+0x46/0xb0<br /> <br /> <br /> During SMC fallback process in connect syscall, kernel will<br /> replaces TCP with SMC. In order to forward wakeup<br /> smc socket waitqueue after fallback, kernel will sets<br /> clcsk-&gt;sk_user_data to origin smc socket in<br /> smc_fback_replace_callbacks().<br /> <br /> Later, in shutdown syscall, kernel will calls<br /> sk_psock_get(), which treats the clcsk-&gt;sk_user_data<br /> as psock type, triggering the refcnt warning.<br /> <br /> So, the root cause is that smc and psock, both will use<br /> sk_user_data field. So they will mismatch this field<br /> easily.<br /> <br /> This patch solves it by using another bit(defined as<br /> SK_USER_DATA_PSOCK) in PTRMASK, to mark whether<br /> sk_user_data points to a psock object or not.<br /> This patch depends on a PTRMASK introduced in commit f1ff5ce2cd5e<br /> ("net, sk_msg: Clear sk_user_data pointer on clone if tagged").<br /> <br /> For there will possibly be more flags in the sk_user_data field,<br /> this patch also refactor sk_user_data flags code to be more generic<br /> to improve its maintainability.
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2025

CVE-2022-49968

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ieee802154/adf7242: defer destroy_workqueue call<br /> <br /> There is a possible race condition (use-after-free) like below<br /> <br /> (FREE) | (USE)<br /> adf7242_remove | adf7242_channel<br /> cancel_delayed_work_sync |<br /> destroy_workqueue (1) | adf7242_cmd_rx<br /> | mod_delayed_work (2)<br /> |<br /> <br /> The root cause for this race is that the upper layer (ieee802154) is<br /> unaware of this detaching event and the function adf7242_channel can<br /> be called without any checks.<br /> <br /> To fix this, we can add a flag write at the beginning of adf7242_remove<br /> and add flag check in adf7242_channel. Or we can just defer the<br /> destructive operation like other commit 3e0588c291d6 ("hamradio: defer<br /> ax25 kfree after unregister_netdev") which let the<br /> ieee802154_unregister_hw() to handle the synchronization. This patch<br /> takes the second option.<br /> <br /> runs")
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2022-49969

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amd/display: clear optc underflow before turn off odm clock<br /> <br /> [Why]<br /> After ODM clock off, optc underflow bit will be kept there always and clear not work.<br /> We need to clear that before clock off.<br /> <br /> [How]<br /> Clear that if have when clock off.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2022-49971

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amd/pm: Fix a potential gpu_metrics_table memory leak<br /> <br /> Memory is allocated for gpu_metrics_table in<br /> smu_v13_0_4_init_smc_tables(), but not freed in<br /> smu_v13_0_4_fini_smc_tables(). This may cause memory leaks, fix it.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2022-49972

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> xsk: Fix corrupted packets for XDP_SHARED_UMEM<br /> <br /> Fix an issue in XDP_SHARED_UMEM mode together with aligned mode where<br /> packets are corrupted for the second and any further sockets bound to<br /> the same umem. In other words, this does not affect the first socket<br /> bound to the umem. The culprit for this bug is that the initialization<br /> of the DMA addresses for the pre-populated xsk buffer pool entries was<br /> not performed for any socket but the first one bound to the umem. Only<br /> the linear array of DMA addresses was populated. Fix this by populating<br /> the DMA addresses in the xsk buffer pool for every socket bound to the<br /> same umem.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2022-49973

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> skmsg: Fix wrong last sg check in sk_msg_recvmsg()<br /> <br /> Fix one kernel NULL pointer dereference as below:<br /> <br /> [ 224.462334] Call Trace:<br /> [ 224.462394] __tcp_bpf_recvmsg+0xd3/0x380<br /> [ 224.462441] ? sock_has_perm+0x78/0xa0<br /> [ 224.462463] tcp_bpf_recvmsg+0x12e/0x220<br /> [ 224.462494] inet_recvmsg+0x5b/0xd0<br /> [ 224.462534] __sys_recvfrom+0xc8/0x130<br /> [ 224.462574] ? syscall_trace_enter+0x1df/0x2e0<br /> [ 224.462606] ? __do_page_fault+0x2de/0x500<br /> [ 224.462635] __x64_sys_recvfrom+0x24/0x30<br /> [ 224.462660] do_syscall_64+0x5d/0x1d0<br /> [ 224.462709] entry_SYSCALL_64_after_hwframe+0x65/0xca<br /> <br /> In commit 9974d37ea75f ("skmsg: Fix invalid last sg check in<br /> sk_msg_recvmsg()"), we change last sg check to sg_is_last(),<br /> but in sockmap redirection case (without stream_parser/stream_verdict/<br /> skb_verdict), we did not mark the end of the scatterlist. Check the<br /> sk_msg_alloc, sk_msg_page_add, and bpf_msg_push_data functions, they all<br /> do not mark the end of sg. They are expected to use sg.end for end<br /> judgment. So the judgment of &amp;#39;(i != msg_rx-&gt;sg.end)&amp;#39; is added back here.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2022-49974

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> HID: nintendo: fix rumble worker null pointer deref<br /> <br /> We can dereference a null pointer trying to queue work to a destroyed<br /> workqueue.<br /> <br /> If the device is disconnected, nintendo_hid_remove is called, in which<br /> the rumble_queue is destroyed. Avoid using that queue to defer rumble<br /> work once the controller state is set to JOYCON_CTLR_STATE_REMOVED.<br /> <br /> This eliminates the null pointer dereference.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2022-49975

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bpf: Don&amp;#39;t redirect packets with invalid pkt_len<br /> <br /> Syzbot found an issue [1]: fq_codel_drop() try to drop a flow whitout any<br /> skbs, that is, the flow-&gt;head is null.<br /> The root cause, as the [2] says, is because that bpf_prog_test_run_skb()<br /> run a bpf prog which redirects empty skbs.<br /> So we should determine whether the length of the packet modified by bpf<br /> prog or others like bpf_prog_test is valid before forwarding it directly.
Severity CVSS v4.0: Pending analysis
Last modification:
13/11/2025

CVE-2022-49967

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bpf: Fix a data-race around bpf_jit_limit.<br /> <br /> While reading bpf_jit_limit, it can be changed concurrently via sysctl,<br /> WRITE_ONCE() in __do_proc_doulongvec_minmax(). The size of bpf_jit_limit<br /> is long, so we need to add a paired READ_ONCE() to avoid load-tearing.
Severity CVSS v4.0: Pending analysis
Last modification:
14/11/2025

CVE-2022-49970

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bpf, cgroup: Fix kernel BUG in purge_effective_progs<br /> <br /> Syzkaller reported a triggered kernel BUG as follows:<br /> <br /> ------------[ cut here ]------------<br /> kernel BUG at kernel/bpf/cgroup.c:925!<br /> invalid opcode: 0000 [#1] PREEMPT SMP NOPTI<br /> CPU: 1 PID: 194 Comm: detach Not tainted 5.19.0-14184-g69dac8e431af #8<br /> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS<br /> rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014<br /> RIP: 0010:__cgroup_bpf_detach+0x1f2/0x2a0<br /> Code: 00 e8 92 60 30 00 84 c0 75 d8 4c 89 e0 31 f6 85 f6 74 19 42 f6 84<br /> 28 48 05 00 00 02 75 0e 48 8b 80 c0 00 00 00 48 85 c0 75 e5 0b 48<br /> 8b 0c5<br /> RSP: 0018:ffffc9000055bdb0 EFLAGS: 00000246<br /> RAX: 0000000000000000 RBX: ffff888100ec0800 RCX: ffffc900000f1000<br /> RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff888100ec4578<br /> RBP: 0000000000000000 R08: ffff888100ec0800 R09: 0000000000000040<br /> R10: 0000000000000000 R11: 0000000000000000 R12: ffff888100ec4000<br /> R13: 000000000000000d R14: ffffc90000199000 R15: ffff888100effb00<br /> FS: 00007f68213d2b80(0000) GS:ffff88813bc80000(0000)<br /> knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: 000055f74a0e5850 CR3: 0000000102836000 CR4: 00000000000006e0<br /> Call Trace:<br /> <br /> cgroup_bpf_prog_detach+0xcc/0x100<br /> __sys_bpf+0x2273/0x2a00<br /> __x64_sys_bpf+0x17/0x20<br /> do_syscall_64+0x3b/0x90<br /> entry_SYSCALL_64_after_hwframe+0x63/0xcd<br /> RIP: 0033:0x7f68214dbcb9<br /> Code: 08 44 89 e0 5b 41 5c c3 66 0f 1f 84 00 00 00 00 00 48 89 f8 48 89<br /> f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 3d 01<br /> f0 ff8<br /> RSP: 002b:00007ffeb487db68 EFLAGS: 00000246 ORIG_RAX: 0000000000000141<br /> RAX: ffffffffffffffda RBX: 000000000000000b RCX: 00007f68214dbcb9<br /> RDX: 0000000000000090 RSI: 00007ffeb487db70 RDI: 0000000000000009<br /> RBP: 0000000000000003 R08: 0000000000000012 R09: 0000000b00000003<br /> R10: 00007ffeb487db70 R11: 0000000000000246 R12: 00007ffeb487dc20<br /> R13: 0000000000000004 R14: 0000000000000001 R15: 000055f74a1011b0<br /> <br /> Modules linked in:<br /> ---[ end trace 0000000000000000 ]---<br /> <br /> Repetition steps:<br /> <br /> For the following cgroup tree,<br /> <br /> root<br /> |<br /> cg1<br /> |<br /> cg2<br /> <br /> 1. attach prog2 to cg2, and then attach prog1 to cg1, both bpf progs<br /> attach type is NONE or OVERRIDE.<br /> 2. write 1 to /proc/thread-self/fail-nth for failslab.<br /> 3. detach prog1 for cg1, and then kernel BUG occur.<br /> <br /> Failslab injection will cause kmalloc fail and fall back to<br /> purge_effective_progs. The problem is that cg2 have attached another prog,<br /> so when go through cg2 layer, iteration will add pos to 1, and subsequent<br /> operations will be skipped by the following condition, and cg will meet<br /> NULL in the end.<br /> <br /> `if (pos &amp;&amp; !(cg-&gt;bpf.flags[atype] &amp; BPF_F_ALLOW_MULTI))`<br /> <br /> The NULL cg means no link or prog match, this is as expected, and it&amp;#39;s not<br /> a bug. So here just skip the no match situation.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2026