Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-22110

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netfilter: nfnetlink_queue: Initialize ctx to avoid memory allocation error<br /> <br /> It is possible that ctx in nfqnl_build_packet_message() could be used<br /> before it is properly initialize, which is only initialized<br /> by nfqnl_get_sk_secctx().<br /> <br /> This patch corrects this problem by initializing the lsmctx to a safe<br /> value when it is declared.<br /> <br /> This is similar to the commit 35fcac7a7c25<br /> ("audit: Initialize lsmctx to avoid memory allocation error").
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2025-22111

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: Remove RTNL dance for SIOCBRADDIF and SIOCBRDELIF.<br /> <br /> SIOCBRDELIF is passed to dev_ioctl() first and later forwarded to<br /> br_ioctl_call(), which causes unnecessary RTNL dance and the splat<br /> below [0] under RTNL pressure.<br /> <br /> Let&amp;#39;s say Thread A is trying to detach a device from a bridge and<br /> Thread B is trying to remove the bridge.<br /> <br /> In dev_ioctl(), Thread A bumps the bridge device&amp;#39;s refcnt by<br /> netdev_hold() and releases RTNL because the following br_ioctl_call()<br /> also re-acquires RTNL.<br /> <br /> In the race window, Thread B could acquire RTNL and try to remove<br /> the bridge device. Then, rtnl_unlock() by Thread B will release RTNL<br /> and wait for netdev_put() by Thread A.<br /> <br /> Thread A, however, must hold RTNL after the unlock in dev_ifsioc(),<br /> which may take long under RTNL pressure, resulting in the splat by<br /> Thread B.<br /> <br /> Thread A (SIOCBRDELIF) Thread B (SIOCBRDELBR)<br /> ---------------------- ----------------------<br /> sock_ioctl sock_ioctl<br /> `- sock_do_ioctl `- br_ioctl_call<br /> `- dev_ioctl `- br_ioctl_stub<br /> |- rtnl_lock |<br /> |- dev_ifsioc &amp;#39;<br /> &amp;#39; |- dev = __dev_get_by_name(...)<br /> |- netdev_hold(dev, ...) .<br /> / |- rtnl_unlock ------. |<br /> | |- br_ioctl_call `---&gt; |- rtnl_lock<br /> Race | | `- br_ioctl_stub |- br_del_bridge<br /> Window | | | |- dev = __dev_get_by_name(...)<br /> | | | May take long | `- br_dev_delete(dev, ...)<br /> | | | under RTNL pressure | `- unregister_netdevice_queue(dev, ...)<br /> | | | | `- rtnl_unlock<br /> \ | |- rtnl_lock
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2025-22113

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ext4: avoid journaling sb update on error if journal is destroying<br /> <br /> Presently we always BUG_ON if trying to start a transaction on a journal marked<br /> with JBD2_UNMOUNT, since this should never happen. However, while ltp running<br /> stress tests, it was observed that in case of some error handling paths, it is<br /> possible for update_super_work to start a transaction after the journal is<br /> destroyed eg:<br /> <br /> (umount)<br /> ext4_kill_sb<br /> kill_block_super<br /> generic_shutdown_super<br /> sync_filesystem /* commits all txns */<br /> evict_inodes<br /> /* might start a new txn */<br /> ext4_put_super<br /> flush_work(&amp;sbi-&gt;s_sb_upd_work) /* flush the workqueue */<br /> jbd2_journal_destroy<br /> journal_kill_thread<br /> journal-&gt;j_flags |= JBD2_UNMOUNT;<br /> jbd2_journal_commit_transaction<br /> jbd2_journal_get_descriptor_buffer<br /> jbd2_journal_bmap<br /> ext4_journal_bmap<br /> ext4_map_blocks<br /> ...<br /> ext4_inode_error<br /> ext4_handle_error<br /> schedule_work(&amp;sbi-&gt;s_sb_upd_work)<br /> <br /> /* work queue kicks in */<br /> update_super_work<br /> jbd2_journal_start<br /> start_this_handle<br /> BUG_ON(journal-&gt;j_flags &amp;<br /> JBD2_UNMOUNT)<br /> <br /> Hence, introduce a new mount flag to indicate journal is destroying and only do<br /> a journaled (and deferred) update of sb if this flag is not set. Otherwise, just<br /> fallback to an un-journaled commit.<br /> <br /> Further, in the journal destroy path, we have the following sequence:<br /> <br /> 1. Set mount flag indicating journal is destroying<br /> 2. force a commit and wait for it<br /> 3. flush pending sb updates<br /> <br /> This sequence is important as it ensures that, after this point, there is no sb<br /> update that might be journaled so it is safe to update the sb outside the<br /> journal. (To avoid race discussed in 2d01ddc86606)<br /> <br /> Also, we don&amp;#39;t need a similar check in ext4_grp_locked_error since it is only<br /> called from mballoc and AFAICT it would be always valid to schedule work here.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2025-22114

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> btrfs: don&amp;#39;t clobber ret in btrfs_validate_super()<br /> <br /> Commit 2a9bb78cfd36 ("btrfs: validate system chunk array at<br /> btrfs_validate_super()") introduces a call to validate_sys_chunk_array()<br /> in btrfs_validate_super(), which clobbers the value of ret set earlier.<br /> This has the effect of negating the validity checks done earlier, making<br /> it so btrfs could potentially try to mount invalid filesystems.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2025-22117

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ice: fix using untrusted value of pkt_len in ice_vc_fdir_parse_raw()<br /> <br /> Fix using the untrusted value of proto-&gt;raw.pkt_len in function<br /> ice_vc_fdir_parse_raw() by verifying if it does not exceed the<br /> VIRTCHNL_MAX_SIZE_RAW_PACKET value.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2025-22116

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> idpf: check error for register_netdev() on init<br /> <br /> Current init logic ignores the error code from register_netdev(),<br /> which will cause WARN_ON() on attempt to unregister it, if there was one,<br /> and there is no info for the user that the creation of the netdev failed.<br /> <br /> WARNING: CPU: 89 PID: 6902 at net/core/dev.c:11512 unregister_netdevice_many_notify+0x211/0x1a10<br /> ...<br /> [ 3707.563641] unregister_netdev+0x1c/0x30<br /> [ 3707.563656] idpf_vport_dealloc+0x5cf/0xce0 [idpf]<br /> [ 3707.563684] idpf_deinit_task+0xef/0x160 [idpf]<br /> [ 3707.563712] idpf_vc_core_deinit+0x84/0x320 [idpf]<br /> [ 3707.563739] idpf_remove+0xbf/0x780 [idpf]<br /> [ 3707.563769] pci_device_remove+0xab/0x1e0<br /> [ 3707.563786] device_release_driver_internal+0x371/0x530<br /> [ 3707.563803] driver_detach+0xbf/0x180<br /> [ 3707.563816] bus_remove_driver+0x11b/0x2a0<br /> [ 3707.563829] pci_unregister_driver+0x2a/0x250<br /> <br /> Introduce an error check and log the vport number and error code.<br /> On removal make sure to check VPORT_REG_NETDEV flag prior to calling<br /> unregister and free on the netdev.<br /> <br /> Add local variables for idx, vport_config and netdev for readability.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2025-22112

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> eth: bnxt: fix out-of-range access of vnic_info array<br /> <br /> The bnxt_queue_{start | stop}() access vnic_info as much as allocated,<br /> which indicates bp-&gt;nr_vnics.<br /> So, it should not reach bp-&gt;vnic_info[bp-&gt;nr_vnics].
Severity CVSS v4.0: Pending analysis
Last modification:
27/06/2025

CVE-2025-22115

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> btrfs: fix block group refcount race in btrfs_create_pending_block_groups()<br /> <br /> Block group creation is done in two phases, which results in a slightly<br /> unintuitive property: a block group can be allocated/deallocated from<br /> after btrfs_make_block_group() adds it to the space_info with<br /> btrfs_add_bg_to_space_info(), but before creation is completely completed<br /> in btrfs_create_pending_block_groups(). As a result, it is possible for a<br /> block group to go unused and have &amp;#39;btrfs_mark_bg_unused&amp;#39; called on it<br /> concurrently with &amp;#39;btrfs_create_pending_block_groups&amp;#39;. This causes a<br /> number of issues, which were fixed with the block group flag<br /> &amp;#39;BLOCK_GROUP_FLAG_NEW&amp;#39;.<br /> <br /> However, this fix is not quite complete. Since it does not use the<br /> unused_bg_lock, it is possible for the following race to occur:<br /> <br /> btrfs_create_pending_block_groups btrfs_mark_bg_unused<br /> if list_empty // false<br /> list_del_init<br /> clear_bit<br /> else if (test_bit) // true<br /> list_move_tail<br /> <br /> And we get into the exact same broken ref count and invalid new_bgs<br /> state for transaction cleanup that BLOCK_GROUP_FLAG_NEW was designed to<br /> prevent.<br /> <br /> The broken refcount aspect will result in a warning like:<br /> <br /> [1272.943527] refcount_t: underflow; use-after-free.<br /> [1272.943967] WARNING: CPU: 1 PID: 61 at lib/refcount.c:28 refcount_warn_saturate+0xba/0x110<br /> [1272.944731] Modules linked in: btrfs virtio_net xor zstd_compress raid6_pq null_blk [last unloaded: btrfs]<br /> [1272.945550] CPU: 1 UID: 0 PID: 61 Comm: kworker/u32:1 Kdump: loaded Tainted: G W 6.14.0-rc5+ #108<br /> [1272.946368] Tainted: [W]=WARN<br /> [1272.946585] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS Arch Linux 1.16.3-1-1 04/01/2014<br /> [1272.947273] Workqueue: btrfs_discard btrfs_discard_workfn [btrfs]<br /> [1272.947788] RIP: 0010:refcount_warn_saturate+0xba/0x110<br /> [1272.949532] RSP: 0018:ffffbf1200247df0 EFLAGS: 00010282<br /> [1272.949901] RAX: 0000000000000000 RBX: ffffa14b00e3f800 RCX: 0000000000000000<br /> [1272.950437] RDX: 0000000000000000 RSI: ffffbf1200247c78 RDI: 00000000ffffdfff<br /> [1272.950986] RBP: ffffa14b00dc2860 R08: 00000000ffffdfff R09: ffffffff90526268<br /> [1272.951512] R10: ffffffff904762c0 R11: 0000000063666572 R12: ffffa14b00dc28c0<br /> [1272.952024] R13: 0000000000000000 R14: ffffa14b00dc2868 R15: 000001285dcd12c0<br /> [1272.952850] FS: 0000000000000000(0000) GS:ffffa14d33c40000(0000) knlGS:0000000000000000<br /> [1272.953458] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> [1272.953931] CR2: 00007f838cbda000 CR3: 000000010104e000 CR4: 00000000000006f0<br /> [1272.954474] Call Trace:<br /> [1272.954655] <br /> [1272.954812] ? refcount_warn_saturate+0xba/0x110<br /> [1272.955173] ? __warn.cold+0x93/0xd7<br /> [1272.955487] ? refcount_warn_saturate+0xba/0x110<br /> [1272.955816] ? report_bug+0xe7/0x120<br /> [1272.956103] ? handle_bug+0x53/0x90<br /> [1272.956424] ? exc_invalid_op+0x13/0x60<br /> [1272.956700] ? asm_exc_invalid_op+0x16/0x20<br /> [1272.957011] ? refcount_warn_saturate+0xba/0x110<br /> [1272.957399] btrfs_discard_cancel_work.cold+0x26/0x2b [btrfs]<br /> [1272.957853] btrfs_put_block_group.cold+0x5d/0x8e [btrfs]<br /> [1272.958289] btrfs_discard_workfn+0x194/0x380 [btrfs]<br /> [1272.958729] process_one_work+0x130/0x290<br /> [1272.959026] worker_thread+0x2ea/0x420<br /> [1272.959335] ? __pfx_worker_thread+0x10/0x10<br /> [1272.959644] kthread+0xd7/0x1c0<br /> [1272.959872] ? __pfx_kthread+0x10/0x10<br /> [1272.960172] ret_from_fork+0x30/0x50<br /> [1272.960474] ? __pfx_kthread+0x10/0x10<br /> [1272.960745] ret_from_fork_asm+0x1a/0x30<br /> [1272.961035] <br /> [1272.961238] ---[ end trace 0000000000000000 ]---<br /> <br /> Though we have seen them in the async discard workfn as well. It is<br /> most likely to happen after a relocation finishes which cancels discard,<br /> tears down the block group, etc.<br /> <br /> Fix this fully by taking the lock arou<br /> ---truncated---
Severity CVSS v4.0: Pending analysis
Last modification:
24/07/2025

CVE-2025-22098

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm: zynqmp_dp: Fix a deadlock in zynqmp_dp_ignore_hpd_set()<br /> <br /> Instead of attempting the same mutex twice, lock and unlock it.<br /> <br /> This bug has been detected by the Clang thread-safety analyzer.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2025-22099

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm: xlnx: zynqmp_dpsub: Add NULL check in zynqmp_audio_init<br /> <br /> devm_kasprintf() calls can return null pointers on failure.<br /> But some return values were not checked in zynqmp_audio_init().<br /> <br /> Add NULL check in zynqmp_audio_init(), avoid referencing null<br /> pointers in the subsequent code.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2025-22100

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/panthor: Fix race condition when gathering fdinfo group samples<br /> <br /> Commit e16635d88fa0 ("drm/panthor: add DRM fdinfo support") failed to<br /> protect access to groups with an xarray lock, which could lead to<br /> use-after-free errors.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025

CVE-2025-22103

Publication date:
16/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: fix NULL pointer dereference in l3mdev_l3_rcv<br /> <br /> When delete l3s ipvlan:<br /> <br /> ip link del link eth0 ipvlan1 type ipvlan mode l3s<br /> <br /> This may cause a null pointer dereference:<br /> <br /> Call trace:<br /> ip_rcv_finish+0x48/0xd0<br /> ip_rcv+0x5c/0x100<br /> __netif_receive_skb_one_core+0x64/0xb0<br /> __netif_receive_skb+0x20/0x80<br /> process_backlog+0xb4/0x204<br /> napi_poll+0xe8/0x294<br /> net_rx_action+0xd8/0x22c<br /> __do_softirq+0x12c/0x354<br /> <br /> This is because l3mdev_l3_rcv() visit dev-&gt;l3mdev_ops after<br /> ipvlan_l3s_unregister() assign the dev-&gt;l3mdev_ops to NULL. The process<br /> like this:<br /> <br /> (CPU1) | (CPU2)<br /> l3mdev_l3_rcv() |<br /> check dev-&gt;priv_flags: |<br /> master = skb-&gt;dev; |<br /> |<br /> | ipvlan_l3s_unregister()<br /> | set dev-&gt;priv_flags<br /> | dev-&gt;l3mdev_ops = NULL;<br /> |<br /> visit master-&gt;l3mdev_ops |<br /> <br /> To avoid this by do not set dev-&gt;l3mdev_ops when unregister l3s ipvlan.
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2025