Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-21965

Publication date:
01/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> sched_ext: Validate prev_cpu in scx_bpf_select_cpu_dfl()<br /> <br /> If a BPF scheduler provides an invalid CPU (outside the nr_cpu_ids<br /> range) as prev_cpu to scx_bpf_select_cpu_dfl() it can cause a kernel<br /> crash.<br /> <br /> To prevent this, validate prev_cpu in scx_bpf_select_cpu_dfl() and<br /> trigger an scx error if an invalid CPU is specified.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2025

CVE-2025-21958

Publication date:
01/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> Revert "openvswitch: switch to per-action label counting in conntrack"<br /> <br /> Currently, ovs_ct_set_labels() is only called for confirmed conntrack<br /> entries (ct) within ovs_ct_commit(). However, if the conntrack entry<br /> does not have the labels_ext extension, attempting to allocate it in<br /> ovs_ct_get_conn_labels() for a confirmed entry triggers a warning in<br /> nf_ct_ext_add():<br /> <br /> WARN_ON(nf_ct_is_confirmed(ct));<br /> <br /> This happens when the conntrack entry is created externally before OVS<br /> increments net-&gt;ct.labels_used. The issue has become more likely since<br /> commit fcb1aa5163b1 ("openvswitch: switch to per-action label counting<br /> in conntrack"), which changed to use per-action label counting and<br /> increment net-&gt;ct.labels_used when a flow with ct action is added.<br /> <br /> Since there’s no straightforward way to fully resolve this issue at the<br /> moment, this reverts the commit to avoid breaking existing use cases.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2025

CVE-2025-21961

Publication date:
01/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> eth: bnxt: fix truesize for mb-xdp-pass case<br /> <br /> When mb-xdp is set and return is XDP_PASS, packet is converted from<br /> xdp_buff to sk_buff with xdp_update_skb_shared_info() in<br /> bnxt_xdp_build_skb().<br /> bnxt_xdp_build_skb() passes incorrect truesize argument to<br /> xdp_update_skb_shared_info().<br /> The truesize is calculated as BNXT_RX_PAGE_SIZE * sinfo-&gt;nr_frags but<br /> the skb_shared_info was wiped by napi_build_skb() before.<br /> So it stores sinfo-&gt;nr_frags before bnxt_xdp_build_skb() and use it<br /> instead of getting skb_shared_info from xdp_get_shared_info_from_buff().<br /> <br /> Splat looks like:<br /> ------------[ cut here ]------------<br /> WARNING: CPU: 2 PID: 0 at net/core/skbuff.c:6072 skb_try_coalesce+0x504/0x590<br /> Modules linked in: xt_nat xt_tcpudp veth af_packet xt_conntrack nft_chain_nat xt_MASQUERADE nf_conntrack_netlink xfrm_user xt_addrtype nft_coms<br /> CPU: 2 UID: 0 PID: 0 Comm: swapper/2 Not tainted 6.14.0-rc2+ #3<br /> RIP: 0010:skb_try_coalesce+0x504/0x590<br /> Code: 4b fd ff ff 49 8b 34 24 40 80 e6 40 0f 84 3d fd ff ff 49 8b 74 24 48 40 f6 c6 01 0f 84 2e fd ff ff 48 8d 4e ff e9 25 fd ff ff 0b e99<br /> RSP: 0018:ffffb62c4120caa8 EFLAGS: 00010287<br /> RAX: 0000000000000003 RBX: ffffb62c4120cb14 RCX: 0000000000000ec0<br /> RDX: 0000000000001000 RSI: ffffa06e5d7dc000 RDI: 0000000000000003<br /> RBP: ffffa06e5d7ddec0 R08: ffffa06e6120a800 R09: ffffa06e7a119900<br /> R10: 0000000000002310 R11: ffffa06e5d7dcec0 R12: ffffe4360575f740<br /> R13: ffffe43600000000 R14: 0000000000000002 R15: 0000000000000002<br /> FS: 0000000000000000(0000) GS:ffffa0755f700000(0000) knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: 00007f147b76b0f8 CR3: 00000001615d4000 CR4: 00000000007506f0<br /> PKRU: 55555554<br /> Call Trace:<br /> <br /> ? __warn+0x84/0x130<br /> ? skb_try_coalesce+0x504/0x590<br /> ? report_bug+0x18a/0x1a0<br /> ? handle_bug+0x53/0x90<br /> ? exc_invalid_op+0x14/0x70<br /> ? asm_exc_invalid_op+0x16/0x20<br /> ? skb_try_coalesce+0x504/0x590<br /> inet_frag_reasm_finish+0x11f/0x2e0<br /> ip_defrag+0x37a/0x900<br /> ip_local_deliver+0x51/0x120<br /> ip_sublist_rcv_finish+0x64/0x70<br /> ip_sublist_rcv+0x179/0x210<br /> ip_list_rcv+0xf9/0x130<br /> <br /> How to reproduce:<br /> <br /> ip link set $interface1 xdp obj xdp_pass.o<br /> ip link set $interface1 mtu 9000 up<br /> ip a a 10.0.0.1/24 dev $interface1<br /> <br /> ip link set $interfac2 mtu 9000 up<br /> ip a a 10.0.0.2/24 dev $interface2<br /> ping 10.0.0.1 -s 65000<br /> <br /> Following ping.py patch adds xdp-mb-pass case. so ping.py is going to be<br /> able to reproduce this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2025

CVE-2025-21966

Publication date:
01/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> dm-flakey: Fix memory corruption in optional corrupt_bio_byte feature<br /> <br /> Fix memory corruption due to incorrect parameter being passed to bio_init
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2025

CVE-2025-21967

Publication date:
01/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ksmbd: fix use-after-free in ksmbd_free_work_struct<br /> <br /> -&gt;interim_entry of ksmbd_work could be deleted after oplock is freed.<br /> We don&amp;#39;t need to manage it with linked list. The interim request could be<br /> immediately sent whenever a oplock break wait is needed.
Severity CVSS v4.0: Pending analysis
Last modification:
16/04/2025

CVE-2025-21959

Publication date:
01/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netfilter: nf_conncount: Fully initialize struct nf_conncount_tuple in insert_tree()<br /> <br /> Since commit b36e4523d4d5 ("netfilter: nf_conncount: fix garbage<br /> collection confirm race"), `cpu` and `jiffies32` were introduced to<br /> the struct nf_conncount_tuple.<br /> <br /> The commit made nf_conncount_add() initialize `conn-&gt;cpu` and<br /> `conn-&gt;jiffies32` when allocating the struct.<br /> In contrast, count_tree() was not changed to initialize them.<br /> <br /> By commit 34848d5c896e ("netfilter: nf_conncount: Split insert and<br /> traversal"), count_tree() was split and the relevant allocation<br /> code now resides in insert_tree().<br /> Initialize `conn-&gt;cpu` and `conn-&gt;jiffies32` in insert_tree().<br /> <br /> BUG: KMSAN: uninit-value in find_or_evict net/netfilter/nf_conncount.c:117 [inline]<br /> BUG: KMSAN: uninit-value in __nf_conncount_add+0xd9c/0x2850 net/netfilter/nf_conncount.c:143<br /> find_or_evict net/netfilter/nf_conncount.c:117 [inline]<br /> __nf_conncount_add+0xd9c/0x2850 net/netfilter/nf_conncount.c:143<br /> count_tree net/netfilter/nf_conncount.c:438 [inline]<br /> nf_conncount_count+0x82f/0x1e80 net/netfilter/nf_conncount.c:521<br /> connlimit_mt+0x7f6/0xbd0 net/netfilter/xt_connlimit.c:72<br /> __nft_match_eval net/netfilter/nft_compat.c:403 [inline]<br /> nft_match_eval+0x1a5/0x300 net/netfilter/nft_compat.c:433<br /> expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]<br /> nft_do_chain+0x426/0x2290 net/netfilter/nf_tables_core.c:288<br /> nft_do_chain_ipv4+0x1a5/0x230 net/netfilter/nft_chain_filter.c:23<br /> nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]<br /> nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626<br /> nf_hook_slow_list+0x24d/0x860 net/netfilter/core.c:663<br /> NF_HOOK_LIST include/linux/netfilter.h:350 [inline]<br /> ip_sublist_rcv+0x17b7/0x17f0 net/ipv4/ip_input.c:633<br /> ip_list_rcv+0x9ef/0xa40 net/ipv4/ip_input.c:669<br /> __netif_receive_skb_list_ptype net/core/dev.c:5936 [inline]<br /> __netif_receive_skb_list_core+0x15c5/0x1670 net/core/dev.c:5983<br /> __netif_receive_skb_list net/core/dev.c:6035 [inline]<br /> netif_receive_skb_list_internal+0x1085/0x1700 net/core/dev.c:6126<br /> netif_receive_skb_list+0x5a/0x460 net/core/dev.c:6178<br /> xdp_recv_frames net/bpf/test_run.c:280 [inline]<br /> xdp_test_run_batch net/bpf/test_run.c:361 [inline]<br /> bpf_test_run_xdp_live+0x2e86/0x3480 net/bpf/test_run.c:390<br /> bpf_prog_test_run_xdp+0xf1d/0x1ae0 net/bpf/test_run.c:1316<br /> bpf_prog_test_run+0x5e5/0xa30 kernel/bpf/syscall.c:4407<br /> __sys_bpf+0x6aa/0xd90 kernel/bpf/syscall.c:5813<br /> __do_sys_bpf kernel/bpf/syscall.c:5902 [inline]<br /> __se_sys_bpf kernel/bpf/syscall.c:5900 [inline]<br /> __ia32_sys_bpf+0xa0/0xe0 kernel/bpf/syscall.c:5900<br /> ia32_sys_call+0x394d/0x4180 arch/x86/include/generated/asm/syscalls_32.h:358<br /> do_syscall_32_irqs_on arch/x86/entry/common.c:165 [inline]<br /> __do_fast_syscall_32+0xb0/0x110 arch/x86/entry/common.c:387<br /> do_fast_syscall_32+0x38/0x80 arch/x86/entry/common.c:412<br /> do_SYSENTER_32+0x1f/0x30 arch/x86/entry/common.c:450<br /> entry_SYSENTER_compat_after_hwframe+0x84/0x8e<br /> <br /> Uninit was created at:<br /> slab_post_alloc_hook mm/slub.c:4121 [inline]<br /> slab_alloc_node mm/slub.c:4164 [inline]<br /> kmem_cache_alloc_noprof+0x915/0xe10 mm/slub.c:4171<br /> insert_tree net/netfilter/nf_conncount.c:372 [inline]<br /> count_tree net/netfilter/nf_conncount.c:450 [inline]<br /> nf_conncount_count+0x1415/0x1e80 net/netfilter/nf_conncount.c:521<br /> connlimit_mt+0x7f6/0xbd0 net/netfilter/xt_connlimit.c:72<br /> __nft_match_eval net/netfilter/nft_compat.c:403 [inline]<br /> nft_match_eval+0x1a5/0x300 net/netfilter/nft_compat.c:433<br /> expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]<br /> nft_do_chain+0x426/0x2290 net/netfilter/nf_tables_core.c:288<br /> nft_do_chain_ipv4+0x1a5/0x230 net/netfilter/nft_chain_filter.c:23<br /> nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]<br /> nf_hook_slow+0xf4/0x400 net/netfilter/core.c:626<br /> nf_hook_slow_list+0x24d/0x860 net/netfilter/core.c:663<br /> NF_HOOK_LIST include/linux/netfilter.h:350 [inline]<br /> ip_sublist_rcv+0x17b7/0x17f0 net/ipv4/ip_input.c:633<br /> ip_list_rcv+0x9ef/0xa40 net/ip<br /> ---truncated---
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2025-21960

Publication date:
01/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> eth: bnxt: do not update checksum in bnxt_xdp_build_skb()<br /> <br /> The bnxt_rx_pkt() updates ip_summed value at the end if checksum offload<br /> is enabled.<br /> When the XDP-MB program is attached and it returns XDP_PASS, the<br /> bnxt_xdp_build_skb() is called to update skb_shared_info.<br /> The main purpose of bnxt_xdp_build_skb() is to update skb_shared_info,<br /> but it updates ip_summed value too if checksum offload is enabled.<br /> This is actually duplicate work.<br /> <br /> When the bnxt_rx_pkt() updates ip_summed value, it checks if ip_summed<br /> is CHECKSUM_NONE or not.<br /> It means that ip_summed should be CHECKSUM_NONE at this moment.<br /> But ip_summed may already be updated to CHECKSUM_UNNECESSARY in the<br /> XDP-MB-PASS path.<br /> So the by skb_checksum_none_assert() WARNS about it.<br /> <br /> This is duplicate work and updating ip_summed in the<br /> bnxt_xdp_build_skb() is not needed.<br /> <br /> Splat looks like:<br /> WARNING: CPU: 3 PID: 5782 at ./include/linux/skbuff.h:5155 bnxt_rx_pkt+0x479b/0x7610 [bnxt_en]<br /> Modules linked in: bnxt_re bnxt_en rdma_ucm rdma_cm iw_cm ib_cm ib_uverbs veth xt_nat xt_tcpudp xt_conntrack nft_chain_nat xt_MASQUERADE nf_]<br /> CPU: 3 UID: 0 PID: 5782 Comm: socat Tainted: G W 6.14.0-rc4+ #27<br /> Tainted: [W]=WARN<br /> Hardware name: ASUS System Product Name/PRIME Z690-P D4, BIOS 0603 11/01/2021<br /> RIP: 0010:bnxt_rx_pkt+0x479b/0x7610 [bnxt_en]<br /> Code: 54 24 0c 4c 89 f1 4c 89 ff c1 ea 1f ff d3 0f 1f 00 49 89 c6 48 85 c0 0f 84 4c e5 ff ff 48 89 c7 e8 ca 3d a0 c8 e9 8f f4 ff ff 0b f<br /> RSP: 0018:ffff88881ba09928 EFLAGS: 00010202<br /> RAX: 0000000000000000 RBX: 00000000c7590303 RCX: 0000000000000000<br /> RDX: 1ffff1104e7d1610 RSI: 0000000000000001 RDI: ffff8881c91300b8<br /> RBP: ffff88881ba09b28 R08: ffff888273e8b0d0 R09: ffff888273e8b070<br /> R10: ffff888273e8b010 R11: ffff888278b0f000 R12: ffff888273e8b080<br /> R13: ffff8881c9130e00 R14: ffff8881505d3800 R15: ffff888273e8b000<br /> FS: 00007f5a2e7be080(0000) GS:ffff88881ba00000(0000) knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: 00007fff2e708ff8 CR3: 000000013e3b0000 CR4: 00000000007506f0<br /> PKRU: 55555554<br /> Call Trace:<br /> <br /> ? __warn+0xcd/0x2f0<br /> ? bnxt_rx_pkt+0x479b/0x7610<br /> ? report_bug+0x326/0x3c0<br /> ? handle_bug+0x53/0xa0<br /> ? exc_invalid_op+0x14/0x50<br /> ? asm_exc_invalid_op+0x16/0x20<br /> ? bnxt_rx_pkt+0x479b/0x7610<br /> ? bnxt_rx_pkt+0x3e41/0x7610<br /> ? __pfx_bnxt_rx_pkt+0x10/0x10<br /> ? napi_complete_done+0x2cf/0x7d0<br /> __bnxt_poll_work+0x4e8/0x1220<br /> ? __pfx___bnxt_poll_work+0x10/0x10<br /> ? __pfx_mark_lock.part.0+0x10/0x10<br /> bnxt_poll_p5+0x36a/0xfa0<br /> ? __pfx_bnxt_poll_p5+0x10/0x10<br /> __napi_poll.constprop.0+0xa0/0x440<br /> net_rx_action+0x899/0xd00<br /> ...<br /> <br /> Following ping.py patch adds xdp-mb-pass case. so ping.py is going<br /> to be able to reproduce this issue.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2025-21962

Publication date:
01/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> cifs: Fix integer overflow while processing closetimeo mount option<br /> <br /> User-provided mount parameter closetimeo of type u32 is intended to have<br /> an upper limit, but before it is validated, the value is converted from<br /> seconds to jiffies which can lead to an integer overflow.<br /> <br /> Found by Linux Verification Center (linuxtesting.org) with SVACE.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2025-21963

Publication date:
01/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> cifs: Fix integer overflow while processing acdirmax mount option<br /> <br /> User-provided mount parameter acdirmax of type u32 is intended to have<br /> an upper limit, but before it is validated, the value is converted from<br /> seconds to jiffies which can lead to an integer overflow.<br /> <br /> Found by Linux Verification Center (linuxtesting.org) with SVACE.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2025-21964

Publication date:
01/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> cifs: Fix integer overflow while processing acregmax mount option<br /> <br /> User-provided mount parameter acregmax of type u32 is intended to have<br /> an upper limit, but before it is validated, the value is converted from<br /> seconds to jiffies which can lead to an integer overflow.<br /> <br /> Found by Linux Verification Center (linuxtesting.org) with SVACE.
Severity CVSS v4.0: Pending analysis
Last modification:
03/11/2025

CVE-2025-21952

Publication date:
01/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> HID: corsair-void: Update power supply values with a unified work handler<br /> <br /> corsair_void_process_receiver can be called from an interrupt context,<br /> locking battery_mutex in it was causing a kernel panic.<br /> Fix it by moving the critical section into its own work, sharing this<br /> work with battery_add_work and battery_remove_work to remove the need<br /> for any locking
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2025

CVE-2025-21954

Publication date:
01/04/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netmem: prevent TX of unreadable skbs<br /> <br /> Currently on stable trees we have support for netmem/devmem RX but not<br /> TX. It is not safe to forward/redirect an RX unreadable netmem packet<br /> into the device&amp;#39;s TX path, as the device may call dma-mapping APIs on<br /> dma addrs that should not be passed to it.<br /> <br /> Fix this by preventing the xmit of unreadable skbs.<br /> <br /> Tested by configuring tc redirect:<br /> <br /> sudo tc qdisc add dev eth1 ingress<br /> sudo tc filter add dev eth1 ingress protocol ip prio 1 flower ip_proto \<br /> tcp src_ip 192.168.1.12 action mirred egress redirect dev eth1<br /> <br /> Before, I see unreadable skbs in the driver&amp;#39;s TX path passed to dma<br /> mapping APIs.<br /> <br /> After, I don&amp;#39;t see unreadable skbs in the driver&amp;#39;s TX path passed to dma<br /> mapping APIs.
Severity CVSS v4.0: Pending analysis
Last modification:
31/10/2025