Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las últimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las últimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las últimas vulnerabilidades incorporadas al repositorio.

CVE-2023-53742

Fecha de publicación:
08/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> kcsan: Avoid READ_ONCE() in read_instrumented_memory()<br /> <br /> Haibo Li reported:<br /> <br /> | Unable to handle kernel paging request at virtual address<br /> | ffffff802a0d8d7171<br /> | Mem abort info:o:<br /> | ESR = 0x9600002121<br /> | EC = 0x25: DABT (current EL), IL = 32 bitsts<br /> | SET = 0, FnV = 0 0<br /> | EA = 0, S1PTW = 0 0<br /> | FSC = 0x21: alignment fault<br /> | Data abort info:o:<br /> | ISV = 0, ISS = 0x0000002121<br /> | CM = 0, WnR = 0 0<br /> | swapper pgtable: 4k pages, 39-bit VAs, pgdp=000000002835200000<br /> | [ffffff802a0d8d71] pgd=180000005fbf9003, p4d=180000005fbf9003,<br /> | pud=180000005fbf9003, pmd=180000005fbe8003, pte=006800002a0d8707<br /> | Internal error: Oops: 96000021 [#1] PREEMPT SMP<br /> | Modules linked in:<br /> | CPU: 2 PID: 45 Comm: kworker/u8:2 Not tainted<br /> | 5.15.78-android13-8-g63561175bbda-dirty #1<br /> | ...<br /> | pc : kcsan_setup_watchpoint+0x26c/0x6bc<br /> | lr : kcsan_setup_watchpoint+0x88/0x6bc<br /> | sp : ffffffc00ab4b7f0<br /> | x29: ffffffc00ab4b800 x28: ffffff80294fe588 x27: 0000000000000001<br /> | x26: 0000000000000019 x25: 0000000000000001 x24: ffffff80294fdb80<br /> | x23: 0000000000000000 x22: ffffffc00a70fb68 x21: ffffff802a0d8d71<br /> | x20: 0000000000000002 x19: 0000000000000000 x18: ffffffc00a9bd060<br /> | x17: 0000000000000001 x16: 0000000000000000 x15: ffffffc00a59f000<br /> | x14: 0000000000000001 x13: 0000000000000000 x12: ffffffc00a70faa0<br /> | x11: 00000000aaaaaaab x10: 0000000000000054 x9 : ffffffc00839adf8<br /> | x8 : ffffffc009b4cf00 x7 : 0000000000000000 x6 : 0000000000000007<br /> | x5 : 0000000000000000 x4 : 0000000000000000 x3 : ffffffc00a70fb70<br /> | x2 : 0005ff802a0d8d71 x1 : 0000000000000000 x0 : 0000000000000000<br /> | Call trace:<br /> | kcsan_setup_watchpoint+0x26c/0x6bc<br /> | __tsan_read2+0x1f0/0x234<br /> | inflate_fast+0x498/0x750<br /> | zlib_inflate+0x1304/0x2384<br /> | __gunzip+0x3a0/0x45c<br /> | gunzip+0x20/0x30<br /> | unpack_to_rootfs+0x2a8/0x3fc<br /> | do_populate_rootfs+0xe8/0x11c<br /> | async_run_entry_fn+0x58/0x1bc<br /> | process_one_work+0x3ec/0x738<br /> | worker_thread+0x4c4/0x838<br /> | kthread+0x20c/0x258<br /> | ret_from_fork+0x10/0x20<br /> | Code: b8bfc2a8 2a0803f7 14000007 d503249f (78bfc2a8) )<br /> | ---[ end trace 613a943cb0a572b6 ]-----<br /> <br /> The reason for this is that on certain arm64 configuration since<br /> e35123d83ee3 ("arm64: lto: Strengthen READ_ONCE() to acquire when<br /> CONFIG_LTO=y"), READ_ONCE() may be promoted to a full atomic acquire<br /> instruction which cannot be used on unaligned addresses.<br /> <br /> Fix it by avoiding READ_ONCE() in read_instrumented_memory(), and simply<br /> forcing the compiler to do the required access by casting to the<br /> appropriate volatile type. In terms of generated code this currently<br /> only affects architectures that do not use the default READ_ONCE()<br /> implementation.<br /> <br /> The only downside is that we are not guaranteed atomicity of the access<br /> itself, although on most architectures a plain load up to machine word<br /> size should still be atomic (a fact the default READ_ONCE() still relies<br /> on itself).
Gravedad: Pendiente de análisis
Última modificación:
15/04/2026

CVE-2023-53743

Fecha de publicación:
08/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> PCI: Free released resource after coalescing<br /> <br /> release_resource() doesn&amp;#39;t actually free the resource or resource list<br /> entry so free the resource list entry to avoid a leak.
Gravedad: Pendiente de análisis
Última modificación:
15/04/2026

CVE-2023-53744

Fecha de publicación:
08/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> soc: ti: pm33xx: Fix refcount leak in am33xx_pm_probe<br /> <br /> wkup_m3_ipc_get() takes refcount, which should be freed by<br /> wkup_m3_ipc_put(). Add missing refcount release in the error paths.
Gravedad: Pendiente de análisis
Última modificación:
15/04/2026

CVE-2023-53745

Fecha de publicación:
08/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> um: vector: Fix memory leak in vector_config<br /> <br /> If the return value of the uml_parse_vector_ifspec function is NULL,<br /> we should call kfree(params) to prevent memory leak.
Gravedad: Pendiente de análisis
Última modificación:
15/04/2026

CVE-2023-53746

Fecha de publicación:
08/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> s390/vfio-ap: fix memory leak in vfio_ap device driver<br /> <br /> The device release callback function invoked to release the matrix device<br /> uses the dev_get_drvdata(device *dev) function to retrieve the<br /> pointer to the vfio_matrix_dev object in order to free its storage. The<br /> problem is, this object is not stored as drvdata with the device; since the<br /> kfree function will accept a NULL pointer, the memory for the<br /> vfio_matrix_dev object is never freed.<br /> <br /> Since the device being released is contained within the vfio_matrix_dev<br /> object, the container_of macro will be used to retrieve its pointer.
Gravedad: Pendiente de análisis
Última modificación:
15/04/2026

CVE-2022-50621

Fecha de publicación:
08/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> dm: verity-loadpin: Only trust verity targets with enforcement<br /> <br /> Verity targets can be configured to ignore corrupted data blocks.<br /> LoadPin must only trust verity targets that are configured to<br /> perform some kind of enforcement when data corruption is detected,<br /> like returning an error, restarting the system or triggering a<br /> panic.
Gravedad: Pendiente de análisis
Última modificación:
15/04/2026

CVE-2022-50622

Fecha de publicación:
08/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ext4: fix potential memory leak in ext4_fc_record_modified_inode()<br /> <br /> As krealloc may return NULL, in this case &amp;#39;state-&gt;fc_modified_inodes&amp;#39;<br /> may not be freed by krealloc, but &amp;#39;state-&gt;fc_modified_inodes&amp;#39; already<br /> set NULL. Then will lead to &amp;#39;state-&gt;fc_modified_inodes&amp;#39; memory leak.
Gravedad: Pendiente de análisis
Última modificación:
15/04/2026

CVE-2022-50623

Fecha de publicación:
08/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> fpga: prevent integer overflow in dfl_feature_ioctl_set_irq()<br /> <br /> The "hdr.count * sizeof(s32)" multiplication can overflow on 32 bit<br /> systems leading to memory corruption. Use array_size() to fix that.
Gravedad: Pendiente de análisis
Última modificación:
15/04/2026

CVE-2022-50624

Fecha de publicación:
08/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: netsec: fix error handling in netsec_register_mdio()<br /> <br /> If phy_device_register() fails, phy_device_free() need be called to<br /> put refcount, so memory of phy device and device name can be freed<br /> in callback function.<br /> <br /> If get_phy_device() fails, mdiobus_unregister() need be called,<br /> or it will cause warning in mdiobus_free() and kobject is leaked.
Gravedad: Pendiente de análisis
Última modificación:
15/04/2026

CVE-2022-50625

Fecha de publicación:
08/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> serial: amba-pl011: avoid SBSA UART accessing DMACR register<br /> <br /> Chapter "B Generic UART" in "ARM Server Base System Architecture" [1]<br /> documentation describes a generic UART interface. Such generic UART<br /> does not support DMA. In current code, sbsa_uart_pops and<br /> amba_pl011_pops share the same stop_rx operation, which will invoke<br /> pl011_dma_rx_stop, leading to an access of the DMACR register. This<br /> commit adds a using_rx_dma check in pl011_dma_rx_stop to avoid the<br /> access to DMACR register for SBSA UARTs which does not support DMA.<br /> <br /> When the kernel enables DMA engine with "CONFIG_DMA_ENGINE=y", Linux<br /> SBSA PL011 driver will access PL011 DMACR register in some functions.<br /> For most real SBSA Pl011 hardware implementations, the DMACR write<br /> behaviour will be ignored. So these DMACR operations will not cause<br /> obvious problems. But for some virtual SBSA PL011 hardware, like Xen<br /> virtual SBSA PL011 (vpl011) device, the behaviour might be different.<br /> Xen vpl011 emulation will inject a data abort to guest, when guest is<br /> accessing an unimplemented UART register. As Xen VPL011 is SBSA<br /> compatible, it will not implement DMACR register. So when Linux SBSA<br /> PL011 driver access DMACR register, it will get an unhandled data abort<br /> fault and the application will get a segmentation fault:<br /> Unhandled fault at 0xffffffc00944d048<br /> Mem abort info:<br /> ESR = 0x96000000<br /> EC = 0x25: DABT (current EL), IL = 32 bits<br /> SET = 0, FnV = 0<br /> EA = 0, S1PTW = 0<br /> FSC = 0x00: ttbr address size fault<br /> Data abort info:<br /> ISV = 0, ISS = 0x00000000<br /> CM = 0, WnR = 0<br /> swapper pgtable: 4k pages, 39-bit VAs, pgdp=0000000020e2e000<br /> [ffffffc00944d048] pgd=100000003ffff803, p4d=100000003ffff803, pud=100000003ffff803, pmd=100000003fffa803, pte=006800009c090f13<br /> Internal error: ttbr address size fault: 96000000 [#1] PREEMPT SMP<br /> ...<br /> Call trace:<br /> pl011_stop_rx+0x70/0x80<br /> tty_port_shutdown+0x7c/0xb4<br /> tty_port_close+0x60/0xcc<br /> uart_close+0x34/0x8c<br /> tty_release+0x144/0x4c0<br /> __fput+0x78/0x220<br /> ____fput+0x1c/0x30<br /> task_work_run+0x88/0xc0<br /> do_notify_resume+0x8d0/0x123c<br /> el0_svc+0xa8/0xc0<br /> el0t_64_sync_handler+0xa4/0x130<br /> el0t_64_sync+0x1a0/0x1a4<br /> Code: b9000083 b901f001 794038a0 8b000042 (b9000041)<br /> ---[ end trace 83dd93df15c3216f ]---<br /> note: bootlogd[132] exited with preempt_count 1<br /> /etc/rcS.d/S07bootlogd: line 47: 132 Segmentation fault start-stop-daemon<br /> <br /> This has been discussed in the Xen community, and we think it should fix<br /> this in Linux. See [2] for more information.<br /> <br /> [1] https://developer.arm.com/documentation/den0094/c/?lang=en<br /> [2] https://lists.xenproject.org/archives/html/xen-devel/2022-11/msg00543.html
Gravedad: Pendiente de análisis
Última modificación:
15/04/2026

CVE-2022-50626

Fecha de publicación:
08/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> media: dvb-usb: fix memory leak in dvb_usb_adapter_init()<br /> <br /> Syzbot reports a memory leak in "dvb_usb_adapter_init()".<br /> The leak is due to not accounting for and freeing current iteration&amp;#39;s<br /> adapter-&gt;priv in case of an error. Currently if an error occurs,<br /> it will exit before incrementing "num_adapters_initalized",<br /> which is used as a reference counter to free all adap-&gt;priv<br /> in "dvb_usb_adapter_exit()". There are multiple error paths that<br /> can exit from before incrementing the counter. Including the<br /> error handling paths for "dvb_usb_adapter_stream_init()",<br /> "dvb_usb_adapter_dvb_init()" and "dvb_usb_adapter_frontend_init()"<br /> within "dvb_usb_adapter_init()".<br /> <br /> This means that in case of an error in any of these functions the<br /> current iteration is not accounted for and the current iteration&amp;#39;s<br /> adap-&gt;priv is not freed.<br /> <br /> Fix this by freeing the current iteration&amp;#39;s adap-&gt;priv in the<br /> "stream_init_err:" label in the error path. The rest of the<br /> (accounted for) adap-&gt;priv objects are freed in dvb_usb_adapter_exit()<br /> as expected using the num_adapters_initalized variable.<br /> <br /> Syzbot report:<br /> <br /> BUG: memory leak<br /> unreferenced object 0xffff8881172f1a00 (size 512):<br /> comm "kworker/0:2", pid 139, jiffies 4294994873 (age 10.960s)<br /> hex dump (first 32 bytes):<br /> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................<br /> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................<br /> backtrace:<br /> [] dvb_usb_adapter_init drivers/media/usb/dvb-usb/dvb-usb-init.c:75 [inline]<br /> [] dvb_usb_init drivers/media/usb/dvb-usb/dvb-usb-init.c:184 [inline]<br /> [] dvb_usb_device_init.cold+0x4e5/0x79e drivers/media/usb/dvb-usb/dvb-usb-init.c:308<br /> [] dib0700_probe+0x8d/0x1b0 drivers/media/usb/dvb-usb/dib0700_core.c:883<br /> [] usb_probe_interface+0x177/0x370 drivers/usb/core/driver.c:396<br /> [] call_driver_probe drivers/base/dd.c:542 [inline]<br /> [] really_probe.part.0+0xe7/0x310 drivers/base/dd.c:621<br /> [] really_probe drivers/base/dd.c:583 [inline]<br /> [] __driver_probe_device+0x10c/0x1e0 drivers/base/dd.c:752<br /> [] driver_probe_device+0x2a/0x120 drivers/base/dd.c:782<br /> [] __device_attach_driver+0xf6/0x140 drivers/base/dd.c:899<br /> [] bus_for_each_drv+0xb7/0x100 drivers/base/bus.c:427<br /> [] __device_attach+0x122/0x260 drivers/base/dd.c:970<br /> [] bus_probe_device+0xc6/0xe0 drivers/base/bus.c:487<br /> [] device_add+0x5fb/0xdf0 drivers/base/core.c:3405<br /> [] usb_set_configuration+0x8f2/0xb80 drivers/usb/core/message.c:2170<br /> [] usb_generic_driver_probe+0x8c/0xc0 drivers/usb/core/generic.c:238<br /> [] usb_probe_device+0x5c/0x140 drivers/usb/core/driver.c:293<br /> [] call_driver_probe drivers/base/dd.c:542 [inline]<br /> [] really_probe.part.0+0xe7/0x310 drivers/base/dd.c:621<br /> [] really_probe drivers/base/dd.c:583 [inline]<br /> [] __driver_probe_device+0x10c/0x1e0 drivers/base/dd.c:752
Gravedad: Pendiente de análisis
Última modificación:
15/04/2026

CVE-2022-50627

Fecha de publicación:
08/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: ath11k: fix monitor mode bringup crash<br /> <br /> When the interface is brought up in monitor mode, it leads<br /> to NULL pointer dereference crash. This crash happens when<br /> the packet type is extracted for a SKB. This extraction<br /> which is present in the received msdu delivery path,is<br /> not needed for the monitor ring packets since they are<br /> all RAW packets. Hence appending the flags with<br /> "RX_FLAG_ONLY_MONITOR" to skip that extraction.<br /> <br /> Observed calltrace:<br /> <br /> Unable to handle kernel NULL pointer dereference at virtual address<br /> 0000000000000064<br /> Mem abort info:<br /> ESR = 0x0000000096000004<br /> EC = 0x25: DABT (current EL), IL = 32 bits<br /> SET = 0, FnV = 0<br /> EA = 0, S1PTW = 0<br /> FSC = 0x04: level 0 translation fault<br /> Data abort info:<br /> ISV = 0, ISS = 0x00000004<br /> CM = 0, WnR = 0<br /> user pgtable: 4k pages, 48-bit VAs, pgdp=0000000048517000<br /> [0000000000000064] pgd=0000000000000000, p4d=0000000000000000<br /> Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP<br /> Modules linked in: ath11k_pci ath11k qmi_helpers<br /> CPU: 2 PID: 1781 Comm: napi/-271 Not tainted<br /> 6.1.0-rc5-wt-ath-656295-gef907406320c-dirty #6<br /> Hardware name: Qualcomm Technologies, Inc. IPQ8074/AP-HK10-C2 (DT)<br /> pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)<br /> pc : ath11k_hw_qcn9074_rx_desc_get_decap_type+0x34/0x60 [ath11k]<br /> lr : ath11k_hw_qcn9074_rx_desc_get_decap_type+0x5c/0x60 [ath11k]<br /> sp : ffff80000ef5bb10<br /> x29: ffff80000ef5bb10 x28: 0000000000000000 x27: ffff000007baafa0<br /> x26: ffff000014a91ed0 x25: 0000000000000000 x24: 0000000000000000<br /> x23: ffff800002b77378 x22: ffff000014a91ec0 x21: ffff000006c8d600<br /> x20: 0000000000000000 x19: ffff800002b77740 x18: 0000000000000006<br /> x17: 736564203634343a x16: 656e694c20657079 x15: 0000000000000143<br /> x14: 00000000ffffffea x13: ffff80000ef5b8b8 x12: ffff80000ef5b8c8<br /> x11: ffff80000a591d30 x10: ffff80000a579d40 x9 : c0000000ffffefff<br /> x8 : 0000000000000003 x7 : 0000000000017fe8 x6 : ffff80000a579ce8<br /> x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000<br /> x2 : 3a35ec12ed7f8900 x1 : 0000000000000000 x0 : 0000000000000052<br /> Call trace:<br /> ath11k_hw_qcn9074_rx_desc_get_decap_type+0x34/0x60 [ath11k]<br /> ath11k_dp_rx_deliver_msdu.isra.42+0xa4/0x3d0 [ath11k]<br /> ath11k_dp_rx_mon_deliver.isra.43+0x2f8/0x458 [ath11k]<br /> ath11k_dp_rx_process_mon_rings+0x310/0x4c0 [ath11k]<br /> ath11k_dp_service_srng+0x234/0x338 [ath11k]<br /> ath11k_pcic_ext_grp_napi_poll+0x30/0xb8 [ath11k]<br /> __napi_poll+0x5c/0x190<br /> napi_threaded_poll+0xf0/0x118<br /> kthread+0xf4/0x110<br /> ret_from_fork+0x10/0x20<br /> <br /> Tested-on: QCN9074 hw1.0 PCI WLAN.HK.2.7.0.1-01744-QCAHKSWPL_SILICONZ-1
Gravedad: Pendiente de análisis
Última modificación:
15/04/2026