Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2022-50498

Fecha de publicación:
04/10/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> eth: alx: take rtnl_lock on resume<br /> <br /> Zbynek reports that alx trips an rtnl assertion on resume:<br /> <br /> RTNL: assertion failed at net/core/dev.c (2891)<br /> RIP: 0010:netif_set_real_num_tx_queues+0x1ac/0x1c0<br /> Call Trace:<br /> <br /> __alx_open+0x230/0x570 [alx]<br /> alx_resume+0x54/0x80 [alx]<br /> ? pci_legacy_resume+0x80/0x80<br /> dpm_run_callback+0x4a/0x150<br /> device_resume+0x8b/0x190<br /> async_resume+0x19/0x30<br /> async_run_entry_fn+0x30/0x130<br /> process_one_work+0x1e5/0x3b0<br /> <br /> indeed the driver does not hold rtnl_lock during its internal close<br /> and re-open functions during suspend/resume. Note that this is not<br /> a huge bug as the driver implements its own locking, and does not<br /> implement changing the number of queues, but we need to silence<br /> the splat.
Gravedad CVSS v3.1: MEDIA
Última modificación:
22/01/2026

CVE-2022-50497

Fecha de publicación:
04/10/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> binfmt_misc: fix shift-out-of-bounds in check_special_flags<br /> <br /> UBSAN reported a shift-out-of-bounds warning:<br /> <br /> left shift of 1 by 31 places cannot be represented in type &amp;#39;int&amp;#39;<br /> Call Trace:<br /> <br /> __dump_stack lib/dump_stack.c:88 [inline]<br /> dump_stack_lvl+0x8d/0xcf lib/dump_stack.c:106<br /> ubsan_epilogue+0xa/0x44 lib/ubsan.c:151<br /> __ubsan_handle_shift_out_of_bounds+0x1e7/0x208 lib/ubsan.c:322<br /> check_special_flags fs/binfmt_misc.c:241 [inline]<br /> create_entry fs/binfmt_misc.c:456 [inline]<br /> bm_register_write+0x9d3/0xa20 fs/binfmt_misc.c:654<br /> vfs_write+0x11e/0x580 fs/read_write.c:582<br /> ksys_write+0xcf/0x120 fs/read_write.c:637<br /> do_syscall_x64 arch/x86/entry/common.c:50 [inline]<br /> do_syscall_64+0x34/0x80 arch/x86/entry/common.c:80<br /> entry_SYSCALL_64_after_hwframe+0x63/0xcd<br /> RIP: 0033:0x4194e1<br /> <br /> Since the type of Node&amp;#39;s flags is unsigned long, we should define these<br /> macros with same type too.
Gravedad CVSS v3.1: ALTA
Última modificación:
22/01/2026

CVE-2022-50492

Fecha de publicación:
04/10/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/msm: fix use-after-free on probe deferral<br /> <br /> The bridge counter was never reset when tearing down the DRM device so<br /> that stale pointers to deallocated structures would be accessed on the<br /> next tear down (e.g. after a second late bind deferral).<br /> <br /> Given enough bridges and a few probe deferrals this could currently also<br /> lead to data beyond the bridge array being corrupted.<br /> <br /> Patchwork: https://patchwork.freedesktop.org/patch/502665/
Gravedad CVSS v3.1: ALTA
Última modificación:
23/01/2026

CVE-2022-50493

Fecha de publicación:
04/10/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> scsi: qla2xxx: Fix crash when I/O abort times out<br /> <br /> While performing CPU hotplug, a crash with the following stack was seen:<br /> <br /> Call Trace:<br /> qla24xx_process_response_queue+0x42a/0x970 [qla2xxx]<br /> qla2x00_start_nvme_mq+0x3a2/0x4b0 [qla2xxx]<br /> qla_nvme_post_cmd+0x166/0x240 [qla2xxx]<br /> nvme_fc_start_fcp_op.part.0+0x119/0x2e0 [nvme_fc]<br /> blk_mq_dispatch_rq_list+0x17b/0x610<br /> __blk_mq_sched_dispatch_requests+0xb0/0x140<br /> blk_mq_sched_dispatch_requests+0x30/0x60<br /> __blk_mq_run_hw_queue+0x35/0x90<br /> __blk_mq_delay_run_hw_queue+0x161/0x180<br /> blk_execute_rq+0xbe/0x160<br /> __nvme_submit_sync_cmd+0x16f/0x220 [nvme_core]<br /> nvmf_connect_admin_queue+0x11a/0x170 [nvme_fabrics]<br /> nvme_fc_create_association.cold+0x50/0x3dc [nvme_fc]<br /> nvme_fc_connect_ctrl_work+0x19/0x30 [nvme_fc]<br /> process_one_work+0x1e8/0x3c0<br /> <br /> On abort timeout, completion was called without checking if the I/O was<br /> already completed.<br /> <br /> Verify that I/O and abort request are indeed outstanding before attempting<br /> completion.
Gravedad CVSS v3.1: MEDIA
Última modificación:
23/01/2026

CVE-2022-50494

Fecha de publicación:
04/10/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> thermal: intel_powerclamp: Use get_cpu() instead of smp_processor_id() to avoid crash<br /> <br /> When CPU 0 is offline and intel_powerclamp is used to inject<br /> idle, it generates kernel BUG:<br /> <br /> BUG: using smp_processor_id() in preemptible [00000000] code: bash/15687<br /> caller is debug_smp_processor_id+0x17/0x20<br /> CPU: 4 PID: 15687 Comm: bash Not tainted 5.19.0-rc7+ #57<br /> Call Trace:<br /> <br /> dump_stack_lvl+0x49/0x63<br /> dump_stack+0x10/0x16<br /> check_preemption_disabled+0xdd/0xe0<br /> debug_smp_processor_id+0x17/0x20<br /> powerclamp_set_cur_state+0x7f/0xf9 [intel_powerclamp]<br /> ...<br /> ...<br /> <br /> Here CPU 0 is the control CPU by default and changed to the current CPU,<br /> if CPU 0 offlined. This check has to be performed under cpus_read_lock(),<br /> hence the above warning.<br /> <br /> Use get_cpu() instead of smp_processor_id() to avoid this BUG.<br /> <br /> [ rjw: Subject edits ]
Gravedad CVSS v3.1: MEDIA
Última modificación:
23/01/2026

CVE-2022-50491

Fecha de publicación:
04/10/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> coresight: cti: Fix hang in cti_disable_hw()<br /> <br /> cti_enable_hw() and cti_disable_hw() are called from an atomic context<br /> so shouldn&amp;#39;t use runtime PM because it can result in a sleep when<br /> communicating with firmware.<br /> <br /> Since commit 3c6656337852 ("Revert "firmware: arm_scmi: Add clock<br /> management to the SCMI power domain""), this causes a hang on Juno when<br /> running the Perf Coresight tests or running this command:<br /> <br /> perf record -e cs_etm//u -- ls<br /> <br /> This was also missed until the revert commit because pm_runtime_put()<br /> was called with the wrong device until commit 692c9a499b28 ("coresight:<br /> cti: Correct the parameter for pm_runtime_put")<br /> <br /> With lock and scheduler debugging enabled the following is output:<br /> <br /> coresight cti_sys0: cti_enable_hw -- dev:cti_sys0 parent: 20020000.cti<br /> BUG: sleeping function called from invalid context at drivers/base/power/runtime.c:1151<br /> in_atomic(): 1, irqs_disabled(): 128, non_block: 0, pid: 330, name: perf-exec<br /> preempt_count: 2, expected: 0<br /> RCU nest depth: 0, expected: 0<br /> INFO: lockdep is turned off.<br /> irq event stamp: 0<br /> hardirqs last enabled at (0): [] 0x0<br /> hardirqs last disabled at (0): [] copy_process+0xa0c/0x1948<br /> softirqs last enabled at (0): [] copy_process+0xa0c/0x1948<br /> softirqs last disabled at (0): [] 0x0<br /> CPU: 3 PID: 330 Comm: perf-exec Not tainted 6.0.0-00053-g042116d99298 #7<br /> Hardware name: ARM LTD ARM Juno Development Platform/ARM Juno Development Platform, BIOS EDK II Sep 13 2022<br /> Call trace:<br /> dump_backtrace+0x134/0x140<br /> show_stack+0x20/0x58<br /> dump_stack_lvl+0x8c/0xb8<br /> dump_stack+0x18/0x34<br /> __might_resched+0x180/0x228<br /> __might_sleep+0x50/0x88<br /> __pm_runtime_resume+0xac/0xb0<br /> cti_enable+0x44/0x120<br /> coresight_control_assoc_ectdev+0xc0/0x150<br /> coresight_enable_path+0xb4/0x288<br /> etm_event_start+0x138/0x170<br /> etm_event_add+0x48/0x70<br /> event_sched_in.isra.122+0xb4/0x280<br /> merge_sched_in+0x1fc/0x3d0<br /> visit_groups_merge.constprop.137+0x16c/0x4b0<br /> ctx_sched_in+0x114/0x1f0<br /> perf_event_sched_in+0x60/0x90<br /> ctx_resched+0x68/0xb0<br /> perf_event_exec+0x138/0x508<br /> begin_new_exec+0x52c/0xd40<br /> load_elf_binary+0x6b8/0x17d0<br /> bprm_execve+0x360/0x7f8<br /> do_execveat_common.isra.47+0x218/0x238<br /> __arm64_sys_execve+0x48/0x60<br /> invoke_syscall+0x4c/0x110<br /> el0_svc_common.constprop.4+0xfc/0x120<br /> do_el0_svc+0x34/0xc0<br /> el0_svc+0x40/0x98<br /> el0t_64_sync_handler+0x98/0xc0<br /> el0t_64_sync+0x170/0x174<br /> <br /> Fix the issue by removing the runtime PM calls completely. They are not<br /> needed here because it must have already been done when building the<br /> path for a trace.<br /> <br /> [ Fix build warnings ]
Gravedad CVSS v3.1: MEDIA
Última modificación:
27/01/2026

CVE-2022-50487

Fecha de publicación:
04/10/2025
Idioma:
Inglés
*** Pendiente de traducción *** Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Gravedad: Pendiente de análisis
Última modificación:
10/10/2025

CVE-2022-50484

Fecha de publicación:
04/10/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ALSA: usb-audio: Fix potential memory leaks<br /> <br /> When the driver hits -ENOMEM at allocating a URB or a buffer, it<br /> aborts and goes to the error path that releases the all previously<br /> allocated resources. However, when -ENOMEM hits at the middle of the<br /> sync EP URB allocation loop, the partially allocated URBs might be<br /> left without released, because ep-&gt;nurbs is still zero at that point.<br /> <br /> Fix it by setting ep-&gt;nurbs at first, so that the error handler loops<br /> over the full URB list.
Gravedad CVSS v3.1: MEDIA
Última modificación:
23/01/2026

CVE-2022-50483

Fecha de publicación:
04/10/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: enetc: avoid buffer leaks on xdp_do_redirect() failure<br /> <br /> Before enetc_clean_rx_ring_xdp() calls xdp_do_redirect(), each software<br /> BD in the RX ring between index orig_i and i can have one of 2 refcount<br /> values on its page.<br /> <br /> We are the owner of the current buffer that is being processed, so the<br /> refcount will be at least 1.<br /> <br /> If the current owner of the buffer at the diametrically opposed index<br /> in the RX ring (i.o.w, the other half of this page) has not yet called<br /> kfree(), this page&amp;#39;s refcount could even be 2.<br /> <br /> enetc_page_reusable() in enetc_flip_rx_buff() tests for the page<br /> refcount against 1, and [ if it&amp;#39;s 2 ] does not attempt to reuse it.<br /> <br /> But if enetc_flip_rx_buff() is put after the xdp_do_redirect() call,<br /> the page refcount can have one of 3 values. It can also be 0, if there<br /> is no owner of the other page half, and xdp_do_redirect() for this<br /> buffer ran so far that it triggered a flush of the devmap/cpumap bulk<br /> queue, and the consumers of those bulk queues also freed the buffer,<br /> all by the time xdp_do_redirect() returns the execution back to enetc.<br /> <br /> This is the reason why enetc_flip_rx_buff() is called before<br /> xdp_do_redirect(), but there is a big flaw with that reasoning:<br /> enetc_flip_rx_buff() will set rx_swbd-&gt;page = NULL on both sides of the<br /> enetc_page_reusable() branch, and if xdp_do_redirect() returns an error,<br /> we call enetc_xdp_free(), which does not deal gracefully with that.<br /> <br /> In fact, what happens is quite special. The page refcounts start as 1.<br /> enetc_flip_rx_buff() figures they&amp;#39;re reusable, transfers these<br /> rx_swbd-&gt;page pointers to a different rx_swbd in enetc_reuse_page(), and<br /> bumps the refcount to 2. When xdp_do_redirect() later returns an error,<br /> we call the no-op enetc_xdp_free(), but we still haven&amp;#39;t lost the<br /> reference to that page. A copy of it is still at rx_ring-&gt;next_to_alloc,<br /> but that has refcount 2 (and there are no concurrent owners of it in<br /> flight, to drop the refcount). What really kills the system is when<br /> we&amp;#39;ll flip the rx_swbd-&gt;page the second time around. With an updated<br /> refcount of 2, the page will not be reusable and we&amp;#39;ll really leak it.<br /> Then enetc_new_page() will have to allocate more pages, which will then<br /> eventually leak again on further errors from xdp_do_redirect().<br /> <br /> The problem, summarized, is that we zeroize rx_swbd-&gt;page before we&amp;#39;re<br /> completely done with it, and this makes it impossible for the error path<br /> to do something with it.<br /> <br /> Since the packet is potentially multi-buffer and therefore the<br /> rx_swbd-&gt;page is potentially an array, manual passing of the old<br /> pointers between enetc_flip_rx_buff() and enetc_xdp_free() is a bit<br /> difficult.<br /> <br /> For the sake of going with a simple solution, we accept the possibility<br /> of racing with xdp_do_redirect(), and we move the flip procedure to<br /> execute only on the redirect success path. By racing, I mean that the<br /> page may be deemed as not reusable by enetc (having a refcount of 0),<br /> but there will be no leak in that case, either.<br /> <br /> Once we accept that, we have something better to do with buffers on<br /> XDP_REDIRECT failure. Since we haven&amp;#39;t performed half-page flipping yet,<br /> we won&amp;#39;t, either (and this way, we can avoid enetc_xdp_free()<br /> completely, which gives the entire page to the slab allocator).<br /> Instead, we&amp;#39;ll call enetc_xdp_drop(), which will recycle this half of<br /> the buffer back to the RX ring.
Gravedad CVSS v3.1: MEDIA
Última modificación:
23/01/2026

CVE-2022-50488

Fecha de publicación:
04/10/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> block, bfq: fix possible uaf for &amp;#39;bfqq-&gt;bic&amp;#39;<br /> <br /> Our test report a uaf for &amp;#39;bfqq-&gt;bic&amp;#39; in 5.10:<br /> <br /> ==================================================================<br /> BUG: KASAN: use-after-free in bfq_select_queue+0x378/0xa30<br /> <br /> CPU: 6 PID: 2318352 Comm: fsstress Kdump: loaded Not tainted 5.10.0-60.18.0.50.h602.kasan.eulerosv2r11.x86_64 #1<br /> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.1-0-ga5cab58-20220320_160524-szxrtosci10000 04/01/2014<br /> Call Trace:<br /> bfq_select_queue+0x378/0xa30<br /> bfq_dispatch_request+0xe8/0x130<br /> blk_mq_do_dispatch_sched+0x62/0xb0<br /> __blk_mq_sched_dispatch_requests+0x215/0x2a0<br /> blk_mq_sched_dispatch_requests+0x8f/0xd0<br /> __blk_mq_run_hw_queue+0x98/0x180<br /> __blk_mq_delay_run_hw_queue+0x22b/0x240<br /> blk_mq_run_hw_queue+0xe3/0x190<br /> blk_mq_sched_insert_requests+0x107/0x200<br /> blk_mq_flush_plug_list+0x26e/0x3c0<br /> blk_finish_plug+0x63/0x90<br /> __iomap_dio_rw+0x7b5/0x910<br /> iomap_dio_rw+0x36/0x80<br /> ext4_dio_read_iter+0x146/0x190 [ext4]<br /> ext4_file_read_iter+0x1e2/0x230 [ext4]<br /> new_sync_read+0x29f/0x400<br /> vfs_read+0x24e/0x2d0<br /> ksys_read+0xd5/0x1b0<br /> do_syscall_64+0x33/0x40<br /> entry_SYSCALL_64_after_hwframe+0x61/0xc6<br /> <br /> Commit 3bc5e683c67d ("bfq: Split shared queues on move between cgroups")<br /> changes that move process to a new cgroup will allocate a new bfqq to<br /> use, however, the old bfqq and new bfqq can point to the same bic:<br /> <br /> 1) Initial state, two process with io in the same cgroup.<br /> <br /> Process 1 Process 2<br /> (BIC1) (BIC2)<br /> | Λ | Λ<br /> | | | |<br /> V | V |<br /> bfqq1 bfqq2<br /> <br /> 2) bfqq1 is merged to bfqq2.<br /> <br /> Process 1 Process 2<br /> (BIC1) (BIC2)<br /> | |<br /> \-------------\|<br /> V<br /> bfqq1 bfqq2(coop)<br /> <br /> 3) Process 1 exit, then issue new io(denoce IOA) from Process 2.<br /> <br /> (BIC2)<br /> | Λ<br /> | |<br /> V |<br /> bfqq2(coop)<br /> <br /> 4) Before IOA is completed, move Process 2 to another cgroup and issue io.<br /> <br /> Process 2<br /> (BIC2)<br /> Λ<br /> |\--------------\<br /> | V<br /> bfqq2 bfqq3<br /> <br /> Now that BIC2 points to bfqq3, while bfqq2 and bfqq3 both point to BIC2.<br /> If all the requests are completed, and Process 2 exit, BIC2 will be<br /> freed while there is no guarantee that bfqq2 will be freed before BIC2.<br /> <br /> Fix the problem by clearing bfqq-&gt;bic while bfqq is detached from bic.
Gravedad CVSS v3.1: ALTA
Última modificación:
26/01/2026

CVE-2022-50490

Fecha de publicación:
04/10/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bpf: Propagate error from htab_lock_bucket() to userspace<br /> <br /> In __htab_map_lookup_and_delete_batch() if htab_lock_bucket() returns<br /> -EBUSY, it will go to next bucket. Going to next bucket may not only<br /> skip the elements in current bucket silently, but also incur<br /> out-of-bound memory access or expose kernel memory to userspace if<br /> current bucket_cnt is greater than bucket_size or zero.<br /> <br /> Fixing it by stopping batch operation and returning -EBUSY when<br /> htab_lock_bucket() fails, and the application can retry or skip the busy<br /> batch as needed.
Gravedad CVSS v3.1: ALTA
Última modificación:
27/01/2026

CVE-2022-50489

Fecha de publicación:
04/10/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/mipi-dsi: Detach devices when removing the host<br /> <br /> Whenever the MIPI-DSI host is unregistered, the code of<br /> mipi_dsi_host_unregister() loops over every device currently found on that<br /> bus and will unregister it.<br /> <br /> However, it doesn&amp;#39;t detach it from the bus first, which leads to all kind<br /> of resource leaks if the host wants to perform some clean up whenever a<br /> device is detached.
Gravedad CVSS v3.1: MEDIA
Última modificación:
27/01/2026