Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-27039

Publication date:
01/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> clk: hisilicon: hi3559a: Fix an erroneous devm_kfree()<br /> <br /> &amp;#39;p_clk&amp;#39; is an array allocated just before the for loop for all clk that<br /> need to be registered.<br /> It is incremented at each loop iteration.<br /> <br /> If a clk_register() call fails, &amp;#39;p_clk&amp;#39; may point to something different<br /> from what should be freed.<br /> <br /> The best we can do, is to avoid this wrong release of memory.
Severity CVSS v4.0: Pending analysis
Last modification:
18/09/2025

CVE-2024-27040

Publication date:
01/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amd/display: Add &amp;#39;replay&amp;#39; NULL check in &amp;#39;edp_set_replay_allow_active()&amp;#39;<br /> <br /> In the first if statement, we&amp;#39;re checking if &amp;#39;replay&amp;#39; is NULL. But in<br /> the second if statement, we&amp;#39;re not checking if &amp;#39;replay&amp;#39; is NULL again<br /> before calling replay-&gt;funcs-&gt;replay_set_power_opt().<br /> <br /> if (replay == NULL &amp;&amp; force_static)<br /> return false;<br /> <br /> ...<br /> <br /> if (link-&gt;replay_settings.replay_feature_enabled &amp;&amp;<br /> replay-&gt;funcs-&gt;replay_set_power_opt) {<br /> replay-&gt;funcs-&gt;replay_set_power_opt(replay, *power_opts, panel_inst);<br /> link-&gt;replay_settings.replay_power_opt_active = *power_opts;<br /> }<br /> <br /> If &amp;#39;replay&amp;#39; is NULL, this will cause a null pointer dereference.<br /> <br /> Fixes the below found by smatch:<br /> drivers/gpu/drm/amd/amdgpu/../display/dc/link/protocols/link_edp_panel_control.c:895 edp_set_replay_allow_active() error: we previously assumed &amp;#39;replay&amp;#39; could be null (see line 887)
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2025

CVE-2024-27041

Publication date:
01/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amd/display: fix NULL checks for adev-&gt;dm.dc in amdgpu_dm_fini()<br /> <br /> Since &amp;#39;adev-&gt;dm.dc&amp;#39; in amdgpu_dm_fini() might turn out to be NULL<br /> before the call to dc_enable_dmub_notifications(), check<br /> beforehand to ensure there will not be a possible NULL-ptr-deref<br /> there.<br /> <br /> Also, since commit 1e88eb1b2c25 ("drm/amd/display: Drop<br /> CONFIG_DRM_AMD_DC_HDCP") there are two separate checks for NULL in<br /> &amp;#39;adev-&gt;dm.dc&amp;#39; before dc_deinit_callbacks() and dc_dmub_srv_destroy().<br /> Clean up by combining them all under one &amp;#39;if&amp;#39;.<br /> <br /> Found by Linux Verification Center (linuxtesting.org) with static<br /> analysis tool SVACE.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2025

CVE-2024-27042

Publication date:
01/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amdgpu: Fix potential out-of-bounds access in &amp;#39;amdgpu_discovery_reg_base_init()&amp;#39;<br /> <br /> The issue arises when the array &amp;#39;adev-&gt;vcn.vcn_config&amp;#39; is accessed<br /> before checking if the index &amp;#39;adev-&gt;vcn.num_vcn_inst&amp;#39; is within the<br /> bounds of the array.<br /> <br /> The fix involves moving the bounds check before the array access. This<br /> ensures that &amp;#39;adev-&gt;vcn.num_vcn_inst&amp;#39; is within the bounds of the array<br /> before it is used as an index.<br /> <br /> Fixes the below:<br /> drivers/gpu/drm/amd/amdgpu/amdgpu_discovery.c:1289 amdgpu_discovery_reg_base_init() error: testing array offset &amp;#39;adev-&gt;vcn.num_vcn_inst&amp;#39; after use.
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2024

CVE-2024-27043

Publication date:
01/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> media: edia: dvbdev: fix a use-after-free<br /> <br /> In dvb_register_device, *pdvbdev is set equal to dvbdev, which is freed<br /> in several error-handling paths. However, *pdvbdev is not set to NULL<br /> after dvbdev&amp;#39;s deallocation, causing use-after-frees in many places,<br /> for example, in the following call chain:<br /> <br /> budget_register<br /> |-&gt; dvb_dmxdev_init<br /> |-&gt; dvb_register_device<br /> |-&gt; dvb_dmxdev_release<br /> |-&gt; dvb_unregister_device<br /> |-&gt; dvb_remove_device<br /> |-&gt; dvb_device_put<br /> |-&gt; kref_put<br /> <br /> When calling dvb_unregister_device, dmxdev-&gt;dvbdev (i.e. *pdvbdev in<br /> dvb_register_device) could point to memory that had been freed in<br /> dvb_register_device. Thereafter, this pointer is transferred to<br /> kref_put and triggering a use-after-free.
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2024

CVE-2024-27044

Publication date:
01/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amd/display: Fix potential NULL pointer dereferences in &amp;#39;dcn10_set_output_transfer_func()&amp;#39;<br /> <br /> The &amp;#39;stream&amp;#39; pointer is used in dcn10_set_output_transfer_func() before<br /> the check if &amp;#39;stream&amp;#39; is NULL.<br /> <br /> Fixes the below:<br /> drivers/gpu/drm/amd/amdgpu/../display/dc/hwss/dcn10/dcn10_hwseq.c:1892 dcn10_set_output_transfer_func() warn: variable dereferenced before check &amp;#39;stream&amp;#39; (see line 1875)
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2024

CVE-2024-27045

Publication date:
01/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amd/display: Fix a potential buffer overflow in &amp;#39;dp_dsc_clock_en_read()&amp;#39;<br /> <br /> Tell snprintf() to store at most 10 bytes in the output buffer<br /> instead of 30.<br /> <br /> Fixes the below:<br /> drivers/gpu/drm/amd/amdgpu/../display/amdgpu_dm/amdgpu_dm_debugfs.c:1508 dp_dsc_clock_en_read() error: snprintf() is printing too much 30 vs 10
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2024

CVE-2024-27046

Publication date:
01/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> nfp: flower: handle acti_netdevs allocation failure<br /> <br /> The kmalloc_array() in nfp_fl_lag_do_work() will return null, if<br /> the physical memory has run out. As a result, if we dereference<br /> the acti_netdevs, the null pointer dereference bugs will happen.<br /> <br /> This patch adds a check to judge whether allocation failure occurs.<br /> If it happens, the delayed work will be rescheduled and try again.
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2024

CVE-2024-27047

Publication date:
01/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: phy: fix phy_get_internal_delay accessing an empty array<br /> <br /> The phy_get_internal_delay function could try to access to an empty<br /> array in the case that the driver is calling phy_get_internal_delay<br /> without defining delay_values and rx-internal-delay-ps or<br /> tx-internal-delay-ps is defined to 0 in the device-tree.<br /> This will lead to "unable to handle kernel NULL pointer dereference at<br /> virtual address 0". To avoid this kernel oops, the test should be delay<br /> &gt;= 0. As there is already delay
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2024

CVE-2024-27048

Publication date:
01/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: brcm80211: handle pmk_op allocation failure<br /> <br /> The kzalloc() in brcmf_pmksa_v3_op() will return null if the<br /> physical memory has run out. As a result, if we dereference<br /> the null value, the null pointer dereference bug will happen.<br /> <br /> Return -ENOMEM from brcmf_pmksa_v3_op() if kzalloc() fails<br /> for pmk_op.
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2024

CVE-2022-48669

Publication date:
01/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> powerpc/pseries: Fix potential memleak in papr_get_attr()<br /> <br /> `buf` is allocated in papr_get_attr(), and krealloc() of `buf`<br /> could fail. We need to free the original `buf` in the case of failure.
Severity CVSS v4.0: Pending analysis
Last modification:
08/04/2025

CVE-2023-52649

Publication date:
01/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/vkms: Avoid reading beyond LUT array<br /> <br /> When the floor LUT index (drm_fixp2int(lut_index) is the last<br /> index of the array the ceil LUT index will point to an entry<br /> beyond the array. Make sure we guard against it and use the<br /> value of the floor LUT index.<br /> <br /> v3:<br /> - Drop bits from commit description that didn&amp;#39;t contribute<br /> anything of value
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2024