Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-42287

Publication date:
17/08/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> scsi: qla2xxx: Complete command early within lock<br /> <br /> A crash was observed while performing NPIV and FW reset,<br /> <br /> BUG: kernel NULL pointer dereference, address: 000000000000001c<br /> #PF: supervisor read access in kernel mode<br /> #PF: error_code(0x0000) - not-present page<br /> PGD 0 P4D 0<br /> Oops: 0000 1 PREEMPT_RT SMP NOPTI<br /> RIP: 0010:dma_direct_unmap_sg+0x51/0x1e0<br /> RSP: 0018:ffffc90026f47b88 EFLAGS: 00010246<br /> RAX: 0000000000000000 RBX: 0000000000000021 RCX: 0000000000000002<br /> RDX: 0000000000000021 RSI: 0000000000000000 RDI: ffff8881041130d0<br /> RBP: ffff8881041130d0 R08: 0000000000000000 R09: 0000000000000034<br /> R10: ffffc90026f47c48 R11: 0000000000000031 R12: 0000000000000000<br /> R13: 0000000000000000 R14: ffff8881565e4a20 R15: 0000000000000000<br /> FS: 00007f4c69ed3d00(0000) GS:ffff889faac80000(0000) knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: 000000000000001c CR3: 0000000288a50002 CR4: 00000000007706e0<br /> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br /> DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400<br /> PKRU: 55555554<br /> Call Trace:<br /> <br /> ? __die_body+0x1a/0x60<br /> ? page_fault_oops+0x16f/0x4a0<br /> ? do_user_addr_fault+0x174/0x7f0<br /> ? exc_page_fault+0x69/0x1a0<br /> ? asm_exc_page_fault+0x22/0x30<br /> ? dma_direct_unmap_sg+0x51/0x1e0<br /> ? preempt_count_sub+0x96/0xe0<br /> qla2xxx_qpair_sp_free_dma+0x29f/0x3b0 [qla2xxx]<br /> qla2xxx_qpair_sp_compl+0x60/0x80 [qla2xxx]<br /> __qla2x00_abort_all_cmds+0xa2/0x450 [qla2xxx]<br /> <br /> The command completion was done early while aborting the commands in driver<br /> unload path but outside lock to avoid the WARN_ON condition of performing<br /> dma_free_attr within the lock. However this caused race condition while<br /> command completion via multiple paths causing system crash.<br /> <br /> Hence complete the command early in unload path but within the lock to<br /> avoid race condition.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-42288

Publication date:
17/08/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> scsi: qla2xxx: Fix for possible memory corruption<br /> <br /> Init Control Block is dereferenced incorrectly. Correctly dereference ICB
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-42289

Publication date:
17/08/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> scsi: qla2xxx: During vport delete send async logout explicitly<br /> <br /> During vport delete, it is observed that during unload we hit a crash<br /> because of stale entries in outstanding command array. For all these stale<br /> I/O entries, eh_abort was issued and aborted (fast_fail_io = 2009h) but<br /> I/Os could not complete while vport delete is in process of deleting.<br /> <br /> BUG: kernel NULL pointer dereference, address: 000000000000001c<br /> #PF: supervisor read access in kernel mode<br /> #PF: error_code(0x0000) - not-present page<br /> PGD 0 P4D 0<br /> Oops: 0000 [#1] PREEMPT SMP NOPTI<br /> Workqueue: qla2xxx_wq qla_do_work [qla2xxx]<br /> RIP: 0010:dma_direct_unmap_sg+0x51/0x1e0<br /> RSP: 0018:ffffa1e1e150fc68 EFLAGS: 00010046<br /> RAX: 0000000000000000 RBX: 0000000000000021 RCX: 0000000000000001<br /> RDX: 0000000000000021 RSI: 0000000000000000 RDI: ffff8ce208a7a0d0<br /> RBP: ffff8ce208a7a0d0 R08: 0000000000000000 R09: ffff8ce378aac9c8<br /> R10: ffff8ce378aac8a0 R11: ffffa1e1e150f9d8 R12: 0000000000000000<br /> R13: 0000000000000000 R14: ffff8ce378aac9c8 R15: 0000000000000000<br /> FS: 0000000000000000(0000) GS:ffff8d217f000000(0000) knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: 000000000000001c CR3: 0000002089acc000 CR4: 0000000000350ee0<br /> Call Trace:<br /> <br /> qla2xxx_qpair_sp_free_dma+0x417/0x4e0<br /> ? qla2xxx_qpair_sp_compl+0x10d/0x1a0<br /> ? qla2x00_status_entry+0x768/0x2830<br /> ? newidle_balance+0x2f0/0x430<br /> ? dequeue_entity+0x100/0x3c0<br /> ? qla24xx_process_response_queue+0x6a1/0x19e0<br /> ? __schedule+0x2d5/0x1140<br /> ? qla_do_work+0x47/0x60<br /> ? process_one_work+0x267/0x440<br /> ? process_one_work+0x440/0x440<br /> ? worker_thread+0x2d/0x3d0<br /> ? process_one_work+0x440/0x440<br /> ? kthread+0x156/0x180<br /> ? set_kthread_struct+0x50/0x50<br /> ? ret_from_fork+0x22/0x30<br /> <br /> <br /> Send out async logout explicitly for all the ports during vport delete.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-42290

Publication date:
17/08/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> irqchip/imx-irqsteer: Handle runtime power management correctly<br /> <br /> The power domain is automatically activated from clk_prepare(). However, on<br /> certain platforms like i.MX8QM and i.MX8QXP, the power-on handling invokes<br /> sleeping functions, which triggers the &amp;#39;scheduling while atomic&amp;#39; bug in the<br /> context switch path during device probing:<br /> <br /> BUG: scheduling while atomic: kworker/u13:1/48/0x00000002<br /> Call trace:<br /> __schedule_bug+0x54/0x6c<br /> __schedule+0x7f0/0xa94<br /> schedule+0x5c/0xc4<br /> schedule_preempt_disabled+0x24/0x40<br /> __mutex_lock.constprop.0+0x2c0/0x540<br /> __mutex_lock_slowpath+0x14/0x20<br /> mutex_lock+0x48/0x54<br /> clk_prepare_lock+0x44/0xa0<br /> clk_prepare+0x20/0x44<br /> imx_irqsteer_resume+0x28/0xe0<br /> pm_generic_runtime_resume+0x2c/0x44<br /> __genpd_runtime_resume+0x30/0x80<br /> genpd_runtime_resume+0xc8/0x2c0<br /> __rpm_callback+0x48/0x1d8<br /> rpm_callback+0x6c/0x78<br /> rpm_resume+0x490/0x6b4<br /> __pm_runtime_resume+0x50/0x94<br /> irq_chip_pm_get+0x2c/0xa0<br /> __irq_do_set_handler+0x178/0x24c<br /> irq_set_chained_handler_and_data+0x60/0xa4<br /> mxc_gpio_probe+0x160/0x4b0<br /> <br /> Cure this by implementing the irq_bus_lock/sync_unlock() interrupt chip<br /> callbacks and handle power management in them as they are invoked from<br /> non-atomic context.<br /> <br /> [ tglx: Rewrote change log, added Fixes tag ]
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-42291

Publication date:
17/08/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ice: Add a per-VF limit on number of FDIR filters<br /> <br /> While the iavf driver adds a s/w limit (128) on the number of FDIR<br /> filters that the VF can request, a malicious VF driver can request more<br /> than that and exhaust the resources for other VFs.<br /> <br /> Add a similar limit in ice.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-42292

Publication date:
17/08/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> kobject_uevent: Fix OOB access within zap_modalias_env()<br /> <br /> zap_modalias_env() wrongly calculates size of memory block to move, so<br /> will cause OOB memory access issue if variable MODALIAS is not the last<br /> one within its @env parameter, fixed by correcting size to memmove.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-42275

Publication date:
17/08/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/client: Fix error code in drm_client_buffer_vmap_local()<br /> <br /> This function accidentally returns zero/success on the failure path.<br /> It leads to locking issues and an uninitialized *map_copy in the<br /> caller.
Severity CVSS v4.0: Pending analysis
Last modification:
29/09/2025

CVE-2024-42278

Publication date:
17/08/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ASoC: TAS2781: Fix tasdev_load_calibrated_data()<br /> <br /> This function has a reversed if statement so it&amp;#39;s either a no-op or it<br /> leads to a NULL dereference.
Severity CVSS v4.0: Pending analysis
Last modification:
30/09/2024

CVE-2024-42279

Publication date:
17/08/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> spi: microchip-core: ensure TX and RX FIFOs are empty at start of a transfer<br /> <br /> While transmitting with rx_len == 0, the RX FIFO is not going to be<br /> emptied in the interrupt handler. A subsequent transfer could then<br /> read crap from the previous transfer out of the RX FIFO into the<br /> start RX buffer. The core provides a register that will empty the RX and<br /> TX FIFOs, so do that before each transfer.
Severity CVSS v4.0: Pending analysis
Last modification:
02/10/2025

CVE-2024-42267

Publication date:
17/08/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> riscv/mm: Add handling for VM_FAULT_SIGSEGV in mm_fault_error()<br /> <br /> Handle VM_FAULT_SIGSEGV in the page fault path so that we correctly<br /> kill the process and we don&amp;#39;t BUG() the kernel.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-42268

Publication date:
17/08/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net/mlx5: Fix missing lock on sync reset reload<br /> <br /> On sync reset reload work, when remote host updates devlink on reload<br /> actions performed on that host, it misses taking devlink lock before<br /> calling devlink_remote_reload_actions_performed() which results in<br /> triggering lock assert like the following:<br /> <br /> WARNING: CPU: 4 PID: 1164 at net/devlink/core.c:261 devl_assert_locked+0x3e/0x50<br /> …<br /> CPU: 4 PID: 1164 Comm: kworker/u96:6 Tainted: G S W 6.10.0-rc2+ #116<br /> Hardware name: Supermicro SYS-2028TP-DECTR/X10DRT-PT, BIOS 2.0 12/18/2015<br /> Workqueue: mlx5_fw_reset_events mlx5_sync_reset_reload_work [mlx5_core]<br /> RIP: 0010:devl_assert_locked+0x3e/0x50<br /> …<br /> Call Trace:<br /> <br /> ? __warn+0xa4/0x210<br /> ? devl_assert_locked+0x3e/0x50<br /> ? report_bug+0x160/0x280<br /> ? handle_bug+0x3f/0x80<br /> ? exc_invalid_op+0x17/0x40<br /> ? asm_exc_invalid_op+0x1a/0x20<br /> ? devl_assert_locked+0x3e/0x50<br /> devlink_notify+0x88/0x2b0<br /> ? mlx5_attach_device+0x20c/0x230 [mlx5_core]<br /> ? __pfx_devlink_notify+0x10/0x10<br /> ? process_one_work+0x4b6/0xbb0<br /> process_one_work+0x4b6/0xbb0<br /> […]
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-42269

Publication date:
17/08/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netfilter: iptables: Fix potential null-ptr-deref in ip6table_nat_table_init().<br /> <br /> ip6table_nat_table_init() accesses net-&gt;gen-&gt;ptr[ip6table_nat_net_ops.id],<br /> but the function is exposed to user space before the entry is allocated<br /> via register_pernet_subsys().<br /> <br /> Let&amp;#39;s call register_pernet_subsys() before xt_register_template().
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025