Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-50650

Publication date:
09/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bpf: Fix reference state management for synchronous callbacks<br /> <br /> Currently, verifier verifies callback functions (sync and async) as if<br /> they will be executed once, (i.e. it explores execution state as if the<br /> function was being called once). The next insn to explore is set to<br /> start of subprog and the exit from nested frame is handled using<br /> curframe &gt; 0 and prepare_func_exit. In case of async callback it uses a<br /> customized variant of push_stack simulating a kind of branch to set up<br /> custom state and execution context for the async callback.<br /> <br /> While this approach is simple and works when callback really will be<br /> executed only once, it is unsafe for all of our current helpers which<br /> are for_each style, i.e. they execute the callback multiple times.<br /> <br /> A callback releasing acquired references of the caller may do so<br /> multiple times, but currently verifier sees it as one call inside the<br /> frame, which then returns to caller. Hence, it thinks it released some<br /> reference that the cb e.g. got access through callback_ctx (register<br /> filled inside cb from spilled typed register on stack).<br /> <br /> Similarly, it may see that an acquire call is unpaired inside the<br /> callback, so the caller will copy the reference state of callback and<br /> then will have to release the register with new ref_obj_ids. But again,<br /> the callback may execute multiple times, but the verifier will only<br /> account for acquired references for a single symbolic execution of the<br /> callback, which will cause leaks.<br /> <br /> Note that for async callback case, things are different. While currently<br /> we have bpf_timer_set_callback which only executes it once, even for<br /> multiple executions it would be safe, as reference state is NULL and<br /> check_reference_leak would force program to release state before<br /> BPF_EXIT. The state is also unaffected by analysis for the caller frame.<br /> Hence async callback is safe.<br /> <br /> Since we want the reference state to be accessible, e.g. for pointers<br /> loaded from stack through callback_ctx&amp;#39;s PTR_TO_STACK, we still have to<br /> copy caller&amp;#39;s reference_state to callback&amp;#39;s bpf_func_state, but we<br /> enforce that whatever references it adds to that reference_state has<br /> been released before it hits BPF_EXIT. This requires introducing a new<br /> callback_ref member in the reference state to distinguish between caller<br /> vs callee references. Hence, check_reference_leak now errors out if it<br /> sees we are in callback_fn and we have not released callback_ref refs.<br /> Since there can be multiple nested callbacks, like frame 0 -&gt; cb1 -&gt; cb2<br /> etc. we need to also distinguish between whether this particular ref<br /> belongs to this callback frame or parent, and only error for our own, so<br /> we store state-&gt;frameno (which is always non-zero for callbacks).<br /> <br /> In short, callbacks can read parent reference_state, but cannot mutate<br /> it, to be able to use pointers acquired by the caller. They must only<br /> undo their changes (by releasing their own acquired_refs before<br /> BPF_EXIT) on top of caller reference_state before returning (at which<br /> point the caller and callback state will match anyway, so no need to<br /> copy it back to caller).
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2025

CVE-2022-50651

Publication date:
09/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ethtool: eeprom: fix null-deref on genl_info in dump<br /> <br /> The similar fix as commit 46cdedf2a0fa ("ethtool: pse-pd: fix null-deref on<br /> genl_info in dump") is also needed for ethtool eeprom.
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2025

CVE-2022-50638

Publication date:
09/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ext4: fix bug_on in __es_tree_search caused by bad boot loader inode<br /> <br /> We got a issue as fllows:<br /> ==================================================================<br /> kernel BUG at fs/ext4/extents_status.c:203!<br /> invalid opcode: 0000 [#1] PREEMPT SMP<br /> CPU: 1 PID: 945 Comm: cat Not tainted 6.0.0-next-20221007-dirty #349<br /> RIP: 0010:ext4_es_end.isra.0+0x34/0x42<br /> RSP: 0018:ffffc9000143b768 EFLAGS: 00010203<br /> RAX: 0000000000000000 RBX: ffff8881769cd0b8 RCX: 0000000000000000<br /> RDX: 0000000000000000 RSI: ffffffff8fc27cf7 RDI: 00000000ffffffff<br /> RBP: ffff8881769cd0bc R08: 0000000000000000 R09: ffffc9000143b5f8<br /> R10: 0000000000000001 R11: 0000000000000001 R12: ffff8881769cd0a0<br /> R13: ffff8881768e5668 R14: 00000000768e52f0 R15: 0000000000000000<br /> FS: 00007f359f7f05c0(0000)GS:ffff88842fd00000(0000)knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: 00007f359f5a2000 CR3: 000000017130c000 CR4: 00000000000006e0<br /> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br /> DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400<br /> Call Trace:<br /> <br /> __es_tree_search.isra.0+0x6d/0xf5<br /> ext4_es_cache_extent+0xfa/0x230<br /> ext4_cache_extents+0xd2/0x110<br /> ext4_find_extent+0x5d5/0x8c0<br /> ext4_ext_map_blocks+0x9c/0x1d30<br /> ext4_map_blocks+0x431/0xa50<br /> ext4_mpage_readpages+0x48e/0xe40<br /> ext4_readahead+0x47/0x50<br /> read_pages+0x82/0x530<br /> page_cache_ra_unbounded+0x199/0x2a0<br /> do_page_cache_ra+0x47/0x70<br /> page_cache_ra_order+0x242/0x400<br /> ondemand_readahead+0x1e8/0x4b0<br /> page_cache_sync_ra+0xf4/0x110<br /> filemap_get_pages+0x131/0xb20<br /> filemap_read+0xda/0x4b0<br /> generic_file_read_iter+0x13a/0x250<br /> ext4_file_read_iter+0x59/0x1d0<br /> vfs_read+0x28f/0x460<br /> ksys_read+0x73/0x160<br /> __x64_sys_read+0x1e/0x30<br /> do_syscall_64+0x35/0x80<br /> entry_SYSCALL_64_after_hwframe+0x63/0xcd<br /> <br /> ==================================================================<br /> <br /> In the above issue, ioctl invokes the swap_inode_boot_loader function to<br /> swap inode and inode. However, inode contain incorrect imode and<br /> disordered extents, and i_nlink is set to 1. The extents check for inode in<br /> the ext4_iget function can be bypassed bacause 5 is EXT4_BOOT_LOADER_INO.<br /> While links_count is set to 1, the extents are not initialized in<br /> swap_inode_boot_loader. After the ioctl command is executed successfully,<br /> the extents are swapped to inode, in this case, run the `cat` command<br /> to view inode. And Bug_ON is triggered due to the incorrect extents.<br /> <br /> When the boot loader inode is not initialized, its imode can be one of the<br /> following:<br /> 1) the imode is a bad type, which is marked as bad_inode in ext4_iget and<br /> set to S_IFREG.<br /> 2) the imode is good type but not S_IFREG.<br /> 3) the imode is S_IFREG.<br /> <br /> The BUG_ON may be triggered by bypassing the check in cases 1 and 2.<br /> Therefore, when the boot loader inode is bad_inode or its imode is not<br /> S_IFREG, initialize the inode to avoid triggering the BUG.
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2025

CVE-2022-50639

Publication date:
09/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> io-wq: Fix memory leak in worker creation<br /> <br /> If the CPU mask allocation for a node fails, then the memory allocated for<br /> the &amp;#39;io_wqe&amp;#39; struct of the current node doesn&amp;#39;t get freed on the error<br /> handling path, since it has not yet been added to the &amp;#39;wqes&amp;#39; array.<br /> <br /> This was spotted when fuzzing v6.1-rc1 with Syzkaller:<br /> BUG: memory leak<br /> unreferenced object 0xffff8880093d5000 (size 1024):<br /> comm "syz-executor.2", pid 7701, jiffies 4295048595 (age 13.900s)<br /> hex dump (first 32 bytes):<br /> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................<br /> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................<br /> backtrace:<br /> [] __kmem_cache_alloc_node+0x18e/0x720<br /> [] kmalloc_node_trace+0x2a/0x130<br /> [] io_wq_create+0x7b9/0xdc0<br /> [] io_uring_alloc_task_context+0x31e/0x59d<br /> [] __io_uring_add_tctx_node.cold+0x19/0x1ba<br /> [] io_uring_setup.cold+0x1b80/0x1dce<br /> [] __x64_sys_io_uring_setup+0x5d/0x80<br /> [] do_syscall_64+0x5d/0x90<br /> [] entry_SYSCALL_64_after_hwframe+0x63/0xcd
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2025

CVE-2022-50640

Publication date:
09/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mmc: core: Fix kernel panic when remove non-standard SDIO card<br /> <br /> SDIO tuple is only allocated for standard SDIO card, especially it causes<br /> memory corruption issues when the non-standard SDIO card has removed, which<br /> is because the card device&amp;#39;s reference counter does not increase for it at<br /> sdio_init_func(), but all SDIO card device reference counter gets decreased<br /> at sdio_release_func().
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2025

CVE-2022-50641

Publication date:
09/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> HSI: omap_ssi: Fix refcount leak in ssi_probe<br /> <br /> When returning or breaking early from a<br /> for_each_available_child_of_node() loop, we need to explicitly call<br /> of_node_put() on the child node to possibly release the node.
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2025

CVE-2022-50642

Publication date:
09/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> platform/chrome: cros_ec_typec: zero out stale pointers<br /> <br /> `cros_typec_get_switch_handles` allocates four pointers when obtaining<br /> type-c switch handles. These pointers are all freed if failing to obtain<br /> any of them; therefore, pointers in `port` become stale. The stale<br /> pointers eventually cause use-after-free or double free in later code<br /> paths. Zeroing out all pointer fields after freeing to eliminate these<br /> stale pointers.
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2025

CVE-2022-50643

Publication date:
09/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> cifs: Fix xid leak in cifs_copy_file_range()<br /> <br /> If the file is used by swap, before return -EOPNOTSUPP, should<br /> free the xid, otherwise, the xid will be leaked.
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2025

CVE-2022-50644

Publication date:
09/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> clk: ti: dra7-atl: Fix reference leak in of_dra7_atl_clk_probe<br /> <br /> pm_runtime_get_sync() will increment pm usage counter.<br /> Forgetting to putting operation will result in reference leak.<br /> Add missing pm_runtime_put_sync in some error paths.
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2025

CVE-2022-50632

Publication date:
09/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drivers: perf: marvell_cn10k: Fix hotplug callback leak in tad_pmu_init()<br /> <br /> tad_pmu_init() won&amp;#39;t remove the callback added by cpuhp_setup_state_multi()<br /> when platform_driver_register() failed. Remove the callback by<br /> cpuhp_remove_multi_state() in fail path.<br /> <br /> Similar to the handling of arm_ccn_init() in commit 26242b330093 ("bus:<br /> arm-ccn: Prevent hotplug callback leak")
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2025

CVE-2022-50633

Publication date:
09/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> usb: dwc3: qcom: Fix memory leak in dwc3_qcom_interconnect_init<br /> <br /> of_icc_get() alloc resources for path handle, we should release it when not<br /> need anymore. Like the release in dwc3_qcom_interconnect_exit() function.<br /> Add icc_put() in error handling to fix this.
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2025

CVE-2022-50634

Publication date:
09/12/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> power: supply: cw2015: Fix potential null-ptr-deref in cw_bat_probe()<br /> <br /> cw_bat_probe() calls create_singlethread_workqueue() and not checked the<br /> ret value, which may return NULL. And a null-ptr-deref may happen:<br /> <br /> cw_bat_probe()<br /> create_singlethread_workqueue() # failed, cw_bat-&gt;wq is NULL<br /> queue_delayed_work()<br /> queue_delayed_work_on()<br /> __queue_delayed_work() # warning here, but continue<br /> __queue_work() # access wq-&gt;flags, null-ptr-deref<br /> <br /> Check the ret value and return -ENOMEM if it is NULL.
Severity CVSS v4.0: Pending analysis
Last modification:
09/12/2025