Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-42089

Publication date:
29/07/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ASoC: fsl-asoc-card: set priv-&gt;pdev before using it<br /> <br /> priv-&gt;pdev pointer was set after being used in<br /> fsl_asoc_card_audmux_init().<br /> Move this assignment at the start of the probe function, so<br /> sub-functions can correctly use pdev through priv.<br /> <br /> fsl_asoc_card_audmux_init() dereferences priv-&gt;pdev to get access to the<br /> dev struct, used with dev_err macros.<br /> As priv is zero-initialised, there would be a NULL pointer dereference.<br /> Note that if priv-&gt;dev is dereferenced before assignment but never used,<br /> for example if there is no error to be printed, the driver won&amp;#39;t crash<br /> probably due to compiler optimisations.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-42090

Publication date:
29/07/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> pinctrl: fix deadlock in create_pinctrl() when handling -EPROBE_DEFER<br /> <br /> In create_pinctrl(), pinctrl_maps_mutex is acquired before calling<br /> add_setting(). If add_setting() returns -EPROBE_DEFER, create_pinctrl()<br /> calls pinctrl_free(). However, pinctrl_free() attempts to acquire<br /> pinctrl_maps_mutex, which is already held by create_pinctrl(), leading to<br /> a potential deadlock.<br /> <br /> This patch resolves the issue by releasing pinctrl_maps_mutex before<br /> calling pinctrl_free(), preventing the deadlock.<br /> <br /> This bug was discovered and resolved using Coverity Static Analysis<br /> Security Testing (SAST) by Synopsys, Inc.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-33365

Publication date:
29/07/2024
Buffer Overflow vulnerability in Tenda AC10 v4 US_AC10V4.0si_V16.03.10.20_cn allows a remote attacker to execute arbitrary code via the Virtual_Data_Check function in the bin/httpd component.
Severity CVSS v4.0: Pending analysis
Last modification:
07/07/2025

CVE-2024-42081

Publication date:
29/07/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/xe/xe_devcoredump: Check NULL before assignments<br /> <br /> Assign &amp;#39;xe_devcoredump_snapshot *&amp;#39; and &amp;#39;xe_device *&amp;#39; only if<br /> &amp;#39;coredump&amp;#39; is not NULL.<br /> <br /> v2<br /> - Fix commit messages.<br /> <br /> v3<br /> - Define variables before code.(Ashutosh/Jose)<br /> <br /> v4<br /> - Drop return check for coredump_to_xe. (Jose/Rodrigo)<br /> <br /> v5<br /> - Modify misleading commit message. (Matt)
Severity CVSS v4.0: Pending analysis
Last modification:
30/07/2024

CVE-2024-42083

Publication date:
29/07/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ionic: fix kernel panic due to multi-buffer handling<br /> <br /> Currently, the ionic_run_xdp() doesn&amp;#39;t handle multi-buffer packets<br /> properly for XDP_TX and XDP_REDIRECT.<br /> When a jumbo frame is received, the ionic_run_xdp() first makes xdp<br /> frame with all necessary pages in the rx descriptor.<br /> And if the action is either XDP_TX or XDP_REDIRECT, it should unmap<br /> dma-mapping and reset page pointer to NULL for all pages, not only the<br /> first page.<br /> But it doesn&amp;#39;t for SG pages. So, SG pages unexpectedly will be reused.<br /> It eventually causes kernel panic.<br /> <br /> Oops: general protection fault, probably for non-canonical address 0x504f4e4dbebc64ff: 0000 [#1] PREEMPT SMP NOPTI<br /> CPU: 3 PID: 0 Comm: swapper/3 Not tainted 6.10.0-rc3+ #25<br /> RIP: 0010:xdp_return_frame+0x42/0x90<br /> Code: 01 75 12 5b 4c 89 e6 5d 31 c9 41 5c 31 d2 41 5d e9 73 fd ff ff 44 8b 6b 20 0f b7 43 0a 49 81 ed 68 01 00 00 49 29 c5 49 01 fd 80 7d0<br /> RSP: 0018:ffff99d00122ce08 EFLAGS: 00010202<br /> RAX: 0000000000005453 RBX: ffff8d325f904000 RCX: 0000000000000001<br /> RDX: 00000000670e1000 RSI: 000000011f90d000 RDI: 504f4e4d4c4b4a49<br /> RBP: ffff99d003907740 R08: 0000000000000000 R09: 0000000000000000<br /> R10: 000000011f90d000 R11: 0000000000000000 R12: ffff8d325f904010<br /> R13: 504f4e4dbebc64fd R14: ffff8d3242b070c8 R15: ffff99d0039077c0<br /> FS: 0000000000000000(0000) GS:ffff8d399f780000(0000) knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: 00007f41f6c85e38 CR3: 000000037ac30000 CR4: 00000000007506f0<br /> PKRU: 55555554<br /> Call Trace:<br /> <br /> ? die_addr+0x33/0x90<br /> ? exc_general_protection+0x251/0x2f0<br /> ? asm_exc_general_protection+0x22/0x30<br /> ? xdp_return_frame+0x42/0x90<br /> ionic_tx_clean+0x211/0x280 [ionic 15881354510e6a9c655c59c54812b319ed2cd015]<br /> ionic_tx_cq_service+0xd3/0x210 [ionic 15881354510e6a9c655c59c54812b319ed2cd015]<br /> ionic_txrx_napi+0x41/0x1b0 [ionic 15881354510e6a9c655c59c54812b319ed2cd015]<br /> __napi_poll.constprop.0+0x29/0x1b0<br /> net_rx_action+0x2c4/0x350<br /> handle_softirqs+0xf4/0x320<br /> irq_exit_rcu+0x78/0xa0<br /> common_interrupt+0x77/0x90
Severity CVSS v4.0: Pending analysis
Last modification:
30/07/2024

CVE-2024-42078

Publication date:
29/07/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> nfsd: initialise nfsd_info.mutex early.<br /> <br /> nfsd_info.mutex can be dereferenced by svc_pool_stats_start()<br /> immediately after the new netns is created. Currently this can<br /> trigger an oops.<br /> <br /> Move the initialisation earlier before it can possibly be dereferenced.
Severity CVSS v4.0: Pending analysis
Last modification:
30/07/2024

CVE-2024-42077

Publication date:
29/07/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ocfs2: fix DIO failure due to insufficient transaction credits<br /> <br /> The code in ocfs2_dio_end_io_write() estimates number of necessary<br /> transaction credits using ocfs2_calc_extend_credits(). This however does<br /> not take into account that the IO could be arbitrarily large and can<br /> contain arbitrary number of extents.<br /> <br /> Extent tree manipulations do often extend the current transaction but not<br /> in all of the cases. For example if we have only single block extents in<br /> the tree, ocfs2_mark_extent_written() will end up calling<br /> ocfs2_replace_extent_rec() all the time and we will never extend the<br /> current transaction and eventually exhaust all the transaction credits if<br /> the IO contains many single block extents. Once that happens a<br /> WARN_ON(jbd2_handle_buffer_credits(handle)
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-42080

Publication date:
29/07/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> RDMA/restrack: Fix potential invalid address access<br /> <br /> struct rdma_restrack_entry&amp;#39;s kern_name was set to KBUILD_MODNAME<br /> in ib_create_cq(), while if the module exited but forgot del this<br /> rdma_restrack_entry, it would cause a invalid address access in<br /> rdma_restrack_clean() when print the owner of this rdma_restrack_entry.<br /> <br /> These code is used to help find one forgotten PD release in one of the<br /> ULPs. But it is not needed anymore, so delete them.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-42082

Publication date:
29/07/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> xdp: Remove WARN() from __xdp_reg_mem_model()<br /> <br /> syzkaller reports a warning in __xdp_reg_mem_model().<br /> <br /> The warning occurs only if __mem_id_init_hash_table() returns an error. It<br /> returns the error in two cases:<br /> <br /> 1. memory allocation fails;<br /> 2. rhashtable_init() fails when some fields of rhashtable_params<br /> struct are not initialized properly.<br /> <br /> The second case cannot happen since there is a static const rhashtable_params<br /> struct with valid fields. So, warning is only triggered when there is a<br /> problem with memory allocation.<br /> <br /> Thus, there is no sense in using WARN() to handle this error and it can be<br /> safely removed.<br /> <br /> WARNING: CPU: 0 PID: 5065 at net/core/xdp.c:299 __xdp_reg_mem_model+0x2d9/0x650 net/core/xdp.c:299<br /> <br /> CPU: 0 PID: 5065 Comm: syz-executor883 Not tainted 6.8.0-syzkaller-05271-gf99c5f563c17 #0<br /> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024<br /> RIP: 0010:__xdp_reg_mem_model+0x2d9/0x650 net/core/xdp.c:299<br /> <br /> Call Trace:<br /> xdp_reg_mem_model+0x22/0x40 net/core/xdp.c:344<br /> xdp_test_run_setup net/bpf/test_run.c:188 [inline]<br /> bpf_test_run_xdp_live+0x365/0x1e90 net/bpf/test_run.c:377<br /> bpf_prog_test_run_xdp+0x813/0x11b0 net/bpf/test_run.c:1267<br /> bpf_prog_test_run+0x33a/0x3b0 kernel/bpf/syscall.c:4240<br /> __sys_bpf+0x48d/0x810 kernel/bpf/syscall.c:5649<br /> __do_sys_bpf kernel/bpf/syscall.c:5738 [inline]<br /> __se_sys_bpf kernel/bpf/syscall.c:5736 [inline]<br /> __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5736<br /> do_syscall_64+0xfb/0x240<br /> entry_SYSCALL_64_after_hwframe+0x6d/0x75<br /> <br /> Found by Linux Verification Center (linuxtesting.org) with syzkaller.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2024-42079

Publication date:
29/07/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> gfs2: Fix NULL pointer dereference in gfs2_log_flush<br /> <br /> In gfs2_jindex_free(), set sdp-&gt;sd_jdesc to NULL under the log flush<br /> lock to provide exclusion against gfs2_log_flush().<br /> <br /> In gfs2_log_flush(), check if sdp-&gt;sd_jdesc is non-NULL before<br /> dereferencing it. Otherwise, we could run into a NULL pointer<br /> dereference when outstanding glock work races with an unmount<br /> (glock_work_func -&gt; run_queue -&gt; do_xmote -&gt; inode_go_sync -&gt;<br /> gfs2_log_flush).
Severity CVSS v4.0: Pending analysis
Last modification:
17/03/2026

CVE-2024-42064

Publication date:
29/07/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amd/display: Skip pipe if the pipe idx not set properly<br /> <br /> [why]<br /> Driver crashes when pipe idx not set properly<br /> <br /> [how]<br /> Add code to skip the pipe that idx not set properly
Severity CVSS v4.0: Pending analysis
Last modification:
30/07/2024

CVE-2024-42065

Publication date:
29/07/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/xe: Add a NULL check in xe_ttm_stolen_mgr_init<br /> <br /> Add an explicit check to ensure that the mgr is not NULL.
Severity CVSS v4.0: Pending analysis
Last modification:
30/07/2024