Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-50131

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> HID: mcp2221: prevent a buffer overflow in mcp_smbus_write()<br /> <br /> Smatch Warning:<br /> drivers/hid/hid-mcp2221.c:388 mcp_smbus_write() error: __memcpy()<br /> &amp;#39;&amp;mcp-&gt;txbuf[5]&amp;#39; too small (59 vs 255)<br /> drivers/hid/hid-mcp2221.c:388 mcp_smbus_write() error: __memcpy() &amp;#39;buf&amp;#39;<br /> too small (34 vs 255)<br /> <br /> The &amp;#39;len&amp;#39; variable can take a value between 0-255 as it can come from<br /> data-&gt;block[0] and it is user data. So add an bound check to prevent a<br /> buffer overflow in memcpy().
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2025

CVE-2022-50130

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> staging: fbtft: core: set smem_len before fb_deferred_io_init call<br /> <br /> The fbtft_framebuffer_alloc() calls fb_deferred_io_init() before<br /> initializing info-&gt;fix.smem_len. It is set to zero by the<br /> framebuffer_alloc() function. It will trigger a WARN_ON() at the<br /> start of fb_deferred_io_init() and the function will not do anything.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2025

CVE-2022-50129

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> RDMA/srpt: Fix a use-after-free<br /> <br /> Change the LIO port members inside struct srpt_port from regular members<br /> into pointers. Allocate the LIO port data structures from inside<br /> srpt_make_tport() and free these from inside srpt_make_tport(). Keep<br /> struct srpt_device as long as either an RDMA port or a LIO target port is<br /> associated with it. This patch decouples the lifetime of struct srpt_port<br /> (controlled by the RDMA core) and struct srpt_port_id (controlled by LIO).<br /> This patch fixes the following KASAN complaint:<br /> <br /> BUG: KASAN: use-after-free in srpt_enable_tpg+0x31/0x70 [ib_srpt]<br /> Read of size 8 at addr ffff888141cc34b8 by task check/5093<br /> <br /> Call Trace:<br /> <br /> show_stack+0x4e/0x53<br /> dump_stack_lvl+0x51/0x66<br /> print_address_description.constprop.0.cold+0xea/0x41e<br /> print_report.cold+0x90/0x205<br /> kasan_report+0xb9/0xf0<br /> __asan_load8+0x69/0x90<br /> srpt_enable_tpg+0x31/0x70 [ib_srpt]<br /> target_fabric_tpg_base_enable_store+0xe2/0x140 [target_core_mod]<br /> configfs_write_iter+0x18b/0x210<br /> new_sync_write+0x1f2/0x2f0<br /> vfs_write+0x3e3/0x540<br /> ksys_write+0xbb/0x140<br /> __x64_sys_write+0x42/0x50<br /> do_syscall_64+0x34/0x80<br /> entry_SYSCALL_64_after_hwframe+0x46/0xb0<br />
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2025

CVE-2022-50127

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> RDMA/rxe: Fix error unwind in rxe_create_qp()<br /> <br /> In the function rxe_create_qp(), rxe_qp_from_init() is called to<br /> initialize qp, internally things like the spin locks are not setup until<br /> rxe_qp_init_req().<br /> <br /> If an error occures before this point then the unwind will call<br /> rxe_cleanup() and eventually to rxe_qp_do_cleanup()/rxe_cleanup_task()<br /> which will oops when trying to access the uninitialized spinlock.<br /> <br /> Move the spinlock initializations earlier before any failures.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2025

CVE-2022-50126

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> jbd2: fix assertion &amp;#39;jh-&gt;b_frozen_data == NULL&amp;#39; failure when journal aborted<br /> <br /> Following process will fail assertion &amp;#39;jh-&gt;b_frozen_data == NULL&amp;#39; in<br /> jbd2_journal_dirty_metadata():<br /> <br /> jbd2_journal_commit_transaction<br /> unlink(dir/a)<br /> jh-&gt;b_transaction = trans1<br /> jh-&gt;b_jlist = BJ_Metadata<br /> journal-&gt;j_running_transaction = NULL<br /> trans1-&gt;t_state = T_COMMIT<br /> unlink(dir/b)<br /> handle-&gt;h_trans = trans2<br /> do_get_write_access<br /> jh-&gt;b_modified = 0<br /> jh-&gt;b_frozen_data = frozen_buffer<br /> jh-&gt;b_next_transaction = trans2<br /> jbd2_journal_dirty_metadata<br /> is_handle_aborted<br /> is_journal_aborted // return false<br /> <br /> --&gt; jbd2 abort t_buffers)<br /> if (is_journal_aborted)<br /> jbd2_journal_refile_buffer<br /> __jbd2_journal_refile_buffer<br /> WRITE_ONCE(jh-&gt;b_transaction,<br /> jh-&gt;b_next_transaction)<br /> WRITE_ONCE(jh-&gt;b_next_transaction, NULL)<br /> __jbd2_journal_file_buffer(jh, BJ_Reserved)<br /> J_ASSERT_JH(jh, jh-&gt;b_frozen_data == NULL) // assertion failure !<br /> <br /> The reproducer (See detail in [Link]) reports:<br /> ------------[ cut here ]------------<br /> kernel BUG at fs/jbd2/transaction.c:1629!<br /> invalid opcode: 0000 [#1] PREEMPT SMP<br /> CPU: 2 PID: 584 Comm: unlink Tainted: G W<br /> 5.19.0-rc6-00115-g4a57a8400075-dirty #697<br /> RIP: 0010:jbd2_journal_dirty_metadata+0x3c5/0x470<br /> RSP: 0018:ffffc90000be7ce0 EFLAGS: 00010202<br /> Call Trace:<br /> <br /> __ext4_handle_dirty_metadata+0xa0/0x290<br /> ext4_handle_dirty_dirblock+0x10c/0x1d0<br /> ext4_delete_entry+0x104/0x200<br /> __ext4_unlink+0x22b/0x360<br /> ext4_unlink+0x275/0x390<br /> vfs_unlink+0x20b/0x4c0<br /> do_unlinkat+0x42f/0x4c0<br /> __x64_sys_unlink+0x37/0x50<br /> do_syscall_64+0x35/0x80<br /> <br /> After journal aborting, __jbd2_journal_refile_buffer() is executed with<br /> holding @jh-&gt;b_state_lock, we can fix it by moving &amp;#39;is_handle_aborted()&amp;#39;<br /> into the area protected by @jh-&gt;b_state_lock.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2025

CVE-2022-50125

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ASoC: cros_ec_codec: Fix refcount leak in cros_ec_codec_platform_probe<br /> <br /> of_parse_phandle() returns a node pointer with refcount<br /> incremented, we should use of_node_put() on it when not need anymore.<br /> Add missing of_node_put() to avoid refcount leak.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2025

CVE-2022-50124

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ASoC: mt6797-mt6351: Fix refcount leak in mt6797_mt6351_dev_probe<br /> <br /> of_parse_phandle() returns a node pointer with refcount<br /> incremented, we should use of_node_put() on it when not need anymore.<br /> Add missing of_node_put() to avoid refcount leak.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2025

CVE-2022-50123

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ASoC: mediatek: mt8173: Fix refcount leak in mt8173_rt5650_rt5676_dev_probe<br /> <br /> of_parse_phandle() returns a node pointer with refcount<br /> incremented, we should use of_node_put() on it when not need anymore.<br /> Fix missing of_node_put() in error paths.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2025

CVE-2022-50122

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ASoC: mediatek: mt8173-rt5650: Fix refcount leak in mt8173_rt5650_dev_probe<br /> <br /> of_parse_phandle() returns a node pointer with refcount<br /> incremented, we should use of_node_put() on it when not need anymore.<br /> Fix refcount leak in some error paths.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2025

CVE-2022-50121

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> remoteproc: k3-r5: Fix refcount leak in k3_r5_cluster_of_init<br /> <br /> Every iteration of for_each_available_child_of_node() decrements<br /> the reference count of the previous node.<br /> When breaking early from a for_each_available_child_of_node() loop,<br /> we need to explicitly call of_node_put() on the child node.<br /> Add missing of_node_put() to avoid refcount leak.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2025

CVE-2022-50120

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> remoteproc: imx_rproc: Fix refcount leak in imx_rproc_addr_init<br /> <br /> of_parse_phandle() returns a node pointer with refcount<br /> incremented, we should use of_node_put() on it when not needed anymore.<br /> This function has two paths missing of_node_put().
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2025

CVE-2022-50119

Publication date:
18/06/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> rpmsg: Fix possible refcount leak in rpmsg_register_device_override()<br /> <br /> rpmsg_register_device_override need to call put_device to free vch when<br /> driver_set_override fails.<br /> <br /> Fix this by adding a put_device() to the error path.
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2025