Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-49434

Publication date:
26/02/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> PCI: Avoid pci_dev_lock() AB/BA deadlock with sriov_numvfs_store()<br /> <br /> The sysfs sriov_numvfs_store() path acquires the device lock before the<br /> config space access lock:<br /> <br /> sriov_numvfs_store<br /> device_lock # A (1) acquire device lock<br /> sriov_configure<br /> vfio_pci_sriov_configure # (for example)<br /> vfio_pci_core_sriov_configure<br /> pci_disable_sriov<br /> sriov_disable<br /> pci_cfg_access_lock<br /> pci_wait_cfg # B (4) wait for dev-&gt;block_cfg_access == 0<br /> <br /> Previously, pci_dev_lock() acquired the config space access lock before the<br /> device lock:<br /> <br /> pci_dev_lock<br /> pci_cfg_access_lock<br /> dev-&gt;block_cfg_access = 1 # B (2) set dev-&gt;block_cfg_access = 1<br /> device_lock # A (3) wait for device lock<br /> <br /> Any path that uses pci_dev_lock(), e.g., pci_reset_function(), may<br /> deadlock with sriov_numvfs_store() if the operations occur in the sequence<br /> (1) (2) (3) (4).<br /> <br /> Avoid the deadlock by reversing the order in pci_dev_lock() so it acquires<br /> the device lock before the config space access lock, the same as the<br /> sriov_numvfs_store() path.<br /> <br /> [bhelgaas: combined and adapted commit log from Jay Zhou&amp;#39;s independent<br /> subsequent posting:<br /> https://lore.kernel.org/r/20220404062539.1710-1-jianjay.zhou@huawei.com]
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2025

CVE-2022-49416

Publication date:
26/02/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: mac80211: fix use-after-free in chanctx code<br /> <br /> In ieee80211_vif_use_reserved_context(), when we have an<br /> old context and the new context&amp;#39;s replace_state is set to<br /> IEEE80211_CHANCTX_REPLACE_NONE, we free the old context<br /> in ieee80211_vif_use_reserved_reassign(). Therefore, we<br /> cannot check the old_ctx anymore, so we should set it to<br /> NULL after this point.<br /> <br /> However, since the new_ctx replace state is clearly not<br /> IEEE80211_CHANCTX_REPLACES_OTHER, we&amp;#39;re not going to do<br /> anything else in this function and can just return to<br /> avoid accessing the freed old_ctx.
Severity CVSS v4.0: Pending analysis
Last modification:
24/03/2025

CVE-2022-49417

Publication date:
26/02/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> iwlwifi: mei: fix potential NULL-ptr deref<br /> <br /> If SKB allocation fails, continue rather than using the NULL<br /> pointer.<br /> <br /> Coverity CID: 1497650
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2025

CVE-2022-49418

Publication date:
26/02/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> NFSv4: Fix free of uninitialized nfs4_label on referral lookup.<br /> <br /> Send along the already-allocated fattr along with nfs4_fs_locations, and<br /> drop the memcpy of fattr. We end up growing two more allocations, but this<br /> fixes up a crash as:<br /> <br /> PID: 790 TASK: ffff88811b43c000 CPU: 0 COMMAND: "ls"<br /> #0 [ffffc90000857920] panic at ffffffff81b9bfde<br /> #1 [ffffc900008579c0] do_trap at ffffffff81023a9b<br /> #2 [ffffc90000857a10] do_error_trap at ffffffff81023b78<br /> #3 [ffffc90000857a58] exc_stack_segment at ffffffff81be1f45<br /> #4 [ffffc90000857a80] asm_exc_stack_segment at ffffffff81c009de<br /> #5 [ffffc90000857b08] nfs_lookup at ffffffffa0302322 [nfs]<br /> #6 [ffffc90000857b70] __lookup_slow at ffffffff813a4a5f<br /> #7 [ffffc90000857c60] walk_component at ffffffff813a86c4<br /> #8 [ffffc90000857cb8] path_lookupat at ffffffff813a9553<br /> #9 [ffffc90000857cf0] filename_lookup at ffffffff813ab86b
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2025

CVE-2022-49419

Publication date:
26/02/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> video: fbdev: vesafb: Fix a use-after-free due early fb_info cleanup<br /> <br /> Commit b3c9a924aab6 ("fbdev: vesafb: Cleanup fb_info in .fb_destroy rather<br /> than .remove") fixed a use-after-free error due the vesafb driver freeing<br /> the fb_info in the .remove handler instead of doing it in .fb_destroy.<br /> <br /> This can happen if the .fb_destroy callback is executed after the .remove<br /> callback, since the former tries to access a pointer freed by the latter.<br /> <br /> But that change didn&amp;#39;t take into account that another possible scenario is<br /> that .fb_destroy is called before the .remove callback. For example, if no<br /> process has the fbdev chardev opened by the time the driver is removed.<br /> <br /> If that&amp;#39;s the case, fb_info will be freed when unregister_framebuffer() is<br /> called, making the fb_info pointer accessed in vesafb_remove() after that<br /> to no longer be valid.<br /> <br /> To prevent that, move the expression containing the info-&gt;par to happen<br /> before the unregister_framebuffer() function call.
Severity CVSS v4.0: Pending analysis
Last modification:
24/03/2025

CVE-2022-49420

Publication date:
26/02/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: annotate races around sk-&gt;sk_bound_dev_if<br /> <br /> UDP sendmsg() is lockless, and reads sk-&gt;sk_bound_dev_if while<br /> this field can be changed by another thread.<br /> <br /> Adds minimal annotations to avoid KCSAN splats for UDP.<br /> Following patches will add more annotations to potential lockless readers.<br /> <br /> BUG: KCSAN: data-race in __ip6_datagram_connect / udpv6_sendmsg<br /> <br /> write to 0xffff888136d47a94 of 4 bytes by task 7681 on cpu 0:<br /> __ip6_datagram_connect+0x6e2/0x930 net/ipv6/datagram.c:221<br /> ip6_datagram_connect+0x2a/0x40 net/ipv6/datagram.c:272<br /> inet_dgram_connect+0x107/0x190 net/ipv4/af_inet.c:576<br /> __sys_connect_file net/socket.c:1900 [inline]<br /> __sys_connect+0x197/0x1b0 net/socket.c:1917<br /> __do_sys_connect net/socket.c:1927 [inline]<br /> __se_sys_connect net/socket.c:1924 [inline]<br /> __x64_sys_connect+0x3d/0x50 net/socket.c:1924<br /> do_syscall_x64 arch/x86/entry/common.c:50 [inline]<br /> do_syscall_64+0x2b/0x50 arch/x86/entry/common.c:80<br /> entry_SYSCALL_64_after_hwframe+0x44/0xae<br /> <br /> read to 0xffff888136d47a94 of 4 bytes by task 7670 on cpu 1:<br /> udpv6_sendmsg+0xc60/0x16e0 net/ipv6/udp.c:1436<br /> inet6_sendmsg+0x5f/0x80 net/ipv6/af_inet6.c:652<br /> sock_sendmsg_nosec net/socket.c:705 [inline]<br /> sock_sendmsg net/socket.c:725 [inline]<br /> ____sys_sendmsg+0x39a/0x510 net/socket.c:2413<br /> ___sys_sendmsg net/socket.c:2467 [inline]<br /> __sys_sendmmsg+0x267/0x4c0 net/socket.c:2553<br /> __do_sys_sendmmsg net/socket.c:2582 [inline]<br /> __se_sys_sendmmsg net/socket.c:2579 [inline]<br /> __x64_sys_sendmmsg+0x53/0x60 net/socket.c:2579<br /> do_syscall_x64 arch/x86/entry/common.c:50 [inline]<br /> do_syscall_64+0x2b/0x50 arch/x86/entry/common.c:80<br /> entry_SYSCALL_64_after_hwframe+0x44/0xae<br /> <br /> value changed: 0x00000000 -&gt; 0xffffff9b<br /> <br /> Reported by Kernel Concurrency Sanitizer on:<br /> CPU: 1 PID: 7670 Comm: syz-executor.3 Tainted: G W 5.18.0-rc1-syzkaller-dirty #0<br /> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011<br /> <br /> I chose to not add Fixes: tag because race has minor consequences<br /> and stable teams busy enough.
Severity CVSS v4.0: Pending analysis
Last modification:
21/10/2025

CVE-2022-49421

Publication date:
26/02/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> video: fbdev: clcdfb: Fix refcount leak in clcdfb_of_vram_setup<br /> <br /> of_parse_phandle() returns a node pointer with refcount incremented, we should<br /> use of_node_put() on it when not need anymore. Add missing of_node_put() to<br /> avoid refcount leak.
Severity CVSS v4.0: Pending analysis
Last modification:
22/09/2025

CVE-2022-49422

Publication date:
26/02/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> dmaengine: idxd: Fix the error handling path in idxd_cdev_register()<br /> <br /> If a call to alloc_chrdev_region() fails, the already allocated resources<br /> are leaking.<br /> <br /> Add the needed error handling path to fix the leak.
Severity CVSS v4.0: Pending analysis
Last modification:
22/10/2025

CVE-2022-49423

Publication date:
26/02/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> rtla: Avoid record NULL pointer dereference<br /> <br /> Fix the following null/deref_null.cocci errors:<br /> ./tools/tracing/rtla/src/osnoise_hist.c:870:31-36: ERROR: record is NULL but dereferenced.<br /> ./tools/tracing/rtla/src/osnoise_top.c:650:31-36: ERROR: record is NULL but dereferenced.<br /> ./tools/tracing/rtla/src/timerlat_hist.c:905:31-36: ERROR: record is NULL but dereferenced.<br /> ./tools/tracing/rtla/src/timerlat_top.c:700:31-36: ERROR: record is NULL but dereferenced.<br /> <br /> "record" is NULL before calling osnoise_init_trace_tool.<br /> Add a tag "out_free" to avoid dereferring a NULL pointer.
Severity CVSS v4.0: Pending analysis
Last modification:
22/10/2025

CVE-2022-49424

Publication date:
26/02/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> iommu/mediatek: Fix NULL pointer dereference when printing dev_name<br /> <br /> When larbdev is NULL (in the case I hit, the node is incorrectly set<br /> iommus = ), it will cause device_link_add() fail and<br /> kernel crashes when we try to print dev_name(larbdev).<br /> <br /> Let&amp;#39;s fail the probe if a larbdev is NULL to avoid invalid inputs from<br /> dts.<br /> <br /> It should work for normal correct setting and avoid the crash caused<br /> by my incorrect setting.<br /> <br /> Error log:<br /> [ 18.189042][ T301] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000050<br /> ...<br /> [ 18.344519][ T301] pstate: a0400005 (NzCv daif +PAN -UAO)<br /> [ 18.345213][ T301] pc : mtk_iommu_probe_device+0xf8/0x118 [mtk_iommu]<br /> [ 18.346050][ T301] lr : mtk_iommu_probe_device+0xd0/0x118 [mtk_iommu]<br /> [ 18.346884][ T301] sp : ffffffc00a5635e0<br /> [ 18.347392][ T301] x29: ffffffc00a5635e0 x28: ffffffd44a46c1d8<br /> [ 18.348156][ T301] x27: ffffff80c39a8000 x26: ffffffd44a80cc38<br /> [ 18.348917][ T301] x25: 0000000000000000 x24: ffffffd44a80cc38<br /> [ 18.349677][ T301] x23: ffffffd44e4da4c6 x22: ffffffd44a80cc38<br /> [ 18.350438][ T301] x21: ffffff80cecd1880 x20: 0000000000000000<br /> [ 18.351198][ T301] x19: ffffff80c439f010 x18: ffffffc00a50d0c0<br /> [ 18.351959][ T301] x17: ffffffffffffffff x16: 0000000000000004<br /> [ 18.352719][ T301] x15: 0000000000000004 x14: ffffffd44eb5d420<br /> [ 18.353480][ T301] x13: 0000000000000ad2 x12: 0000000000000003<br /> [ 18.354241][ T301] x11: 00000000fffffad2 x10: c0000000fffffad2<br /> [ 18.355003][ T301] x9 : a0d288d8d7142d00 x8 : a0d288d8d7142d00<br /> [ 18.355763][ T301] x7 : ffffffd44c2bc640 x6 : 0000000000000000<br /> [ 18.356524][ T301] x5 : 0000000000000080 x4 : 0000000000000001<br /> [ 18.357284][ T301] x3 : 0000000000000000 x2 : 0000000000000005<br /> [ 18.358045][ T301] x1 : 0000000000000000 x0 : 0000000000000000<br /> [ 18.360208][ T301] Hardware name: MT6873 (DT)<br /> [ 18.360771][ T301] Call trace:<br /> [ 18.361168][ T301] dump_backtrace+0xf8/0x1f0<br /> [ 18.361737][ T301] dump_stack_lvl+0xa8/0x11c<br /> [ 18.362305][ T301] dump_stack+0x1c/0x2c<br /> [ 18.362816][ T301] mrdump_common_die+0x184/0x40c [mrdump]<br /> [ 18.363575][ T301] ipanic_die+0x24/0x38 [mrdump]<br /> [ 18.364230][ T301] atomic_notifier_call_chain+0x128/0x2b8<br /> [ 18.364937][ T301] die+0x16c/0x568<br /> [ 18.365394][ T301] __do_kernel_fault+0x1e8/0x214<br /> [ 18.365402][ T301] do_page_fault+0xb8/0x678<br /> [ 18.366934][ T301] do_translation_fault+0x48/0x64<br /> [ 18.368645][ T301] do_mem_abort+0x68/0x148<br /> [ 18.368652][ T301] el1_abort+0x40/0x64<br /> [ 18.368660][ T301] el1h_64_sync_handler+0x54/0x88<br /> [ 18.368668][ T301] el1h_64_sync+0x68/0x6c<br /> [ 18.368673][ T301] mtk_iommu_probe_device+0xf8/0x118 [mtk_iommu]<br /> ...
Severity CVSS v4.0: Pending analysis
Last modification:
22/10/2025

CVE-2022-49425

Publication date:
26/02/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> f2fs: fix dereference of stale list iterator after loop body<br /> <br /> The list iterator variable will be a bogus pointer if no break was hit.<br /> Dereferencing it (cur-&gt;page in this case) could load an out-of-bounds/undefined<br /> value making it unsafe to use that in the comparision to determine if the<br /> specific element was found.<br /> <br /> Since &amp;#39;cur-&gt;page&amp;#39; *can* be out-ouf-bounds it cannot be guaranteed that<br /> by chance (or intention of an attacker) it matches the value of &amp;#39;page&amp;#39;<br /> even though the correct element was not found.<br /> <br /> This is fixed by using a separate list iterator variable for the loop<br /> and only setting the original variable if a suitable element was found.<br /> Then determing if the element was found is simply checking if the<br /> variable is set.
Severity CVSS v4.0: Pending analysis
Last modification:
22/10/2025

CVE-2022-49405

Publication date:
26/02/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> staging: r8188eu: prevent -&gt;Ssid overflow in rtw_wx_set_scan()<br /> <br /> This code has a check to prevent read overflow but it needs another<br /> check to prevent writing beyond the end of the -&gt;Ssid[] array.
Severity CVSS v4.0: Pending analysis
Last modification:
21/10/2025