Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-49869

Publication date:
01/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bnxt_en: Fix possible crash in bnxt_hwrm_set_coal()<br /> <br /> During the error recovery sequence, the rtnl_lock is not held for the<br /> entire duration and some datastructures may be freed during the sequence.<br /> Check for the BNXT_STATE_OPEN flag instead of netif_running() to ensure<br /> that the device is fully operational before proceeding to reconfigure<br /> the coalescing settings.<br /> <br /> This will fix a possible crash like this:<br /> <br /> BUG: unable to handle kernel NULL pointer dereference at 0000000000000000<br /> PGD 0 P4D 0<br /> Oops: 0000 [#1] SMP NOPTI<br /> CPU: 10 PID: 181276 Comm: ethtool Kdump: loaded Tainted: G IOE --------- - - 4.18.0-348.el8.x86_64 #1<br /> Hardware name: Dell Inc. PowerEdge R740/0F9N89, BIOS 2.3.10 08/15/2019<br /> RIP: 0010:bnxt_hwrm_set_coal+0x1fb/0x2a0 [bnxt_en]<br /> Code: c2 66 83 4e 22 08 66 89 46 1c e8 10 cb 00 00 41 83 c6 01 44 39 b3 68 01 00 00 0f 8e a3 00 00 00 48 8b 93 c8 00 00 00 49 63 c6 8b 2c c2 48 8b 85 b8 02 00 00 48 85 c0 74 2e 48 8b 74 24 08 f6<br /> RSP: 0018:ffffb11c8dcaba50 EFLAGS: 00010246<br /> RAX: 0000000000000000 RBX: ffff8d168a8b0ac0 RCX: 00000000000000c5<br /> RDX: 0000000000000000 RSI: ffff8d162f72c000 RDI: ffff8d168a8b0b28<br /> RBP: 0000000000000000 R08: b6e1f68a12e9a7eb R09: 0000000000000000<br /> R10: 0000000000000001 R11: 0000000000000037 R12: ffff8d168a8b109c<br /> R13: ffff8d168a8b10aa R14: 0000000000000000 R15: ffffffffc01ac4e0<br /> FS: 00007f3852e4c740(0000) GS:ffff8d24c0080000(0000) knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: 0000000000000000 CR3: 000000041b3ee003 CR4: 00000000007706e0<br /> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br /> DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400<br /> PKRU: 55555554<br /> Call Trace:<br /> ethnl_set_coalesce+0x3ce/0x4c0<br /> genl_family_rcv_msg_doit.isra.15+0x10f/0x150<br /> genl_family_rcv_msg+0xb3/0x160<br /> ? coalesce_fill_reply+0x480/0x480<br /> genl_rcv_msg+0x47/0x90<br /> ? genl_family_rcv_msg+0x160/0x160<br /> netlink_rcv_skb+0x4c/0x120<br /> genl_rcv+0x24/0x40<br /> netlink_unicast+0x196/0x230<br /> netlink_sendmsg+0x204/0x3d0<br /> sock_sendmsg+0x4c/0x50<br /> __sys_sendto+0xee/0x160<br /> ? syscall_trace_enter+0x1d3/0x2c0<br /> ? __audit_syscall_exit+0x249/0x2a0<br /> __x64_sys_sendto+0x24/0x30<br /> do_syscall_64+0x5b/0x1a0<br /> entry_SYSCALL_64_after_hwframe+0x65/0xca<br /> RIP: 0033:0x7f38524163bb
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2025

CVE-2022-49868

Publication date:
01/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> phy: ralink: mt7621-pci: add sentinel to quirks table<br /> <br /> With mt7621 soc_dev_attr fixed to register the soc as a device,<br /> kernel will experience an oops in soc_device_match_attr<br /> <br /> This quirk test was introduced in the staging driver in<br /> commit 9445ccb3714c ("staging: mt7621-pci-phy: add quirks for &amp;#39;E2&amp;#39;<br /> revision using &amp;#39;soc_device_attribute&amp;#39;"). The staging driver was removed,<br /> and later re-added in commit d87da32372a0 ("phy: ralink: Add PHY driver<br /> for MT7621 PCIe PHY") for kernel 5.11
Severity CVSS v4.0: Pending analysis
Last modification:
10/11/2025

CVE-2022-49870

Publication date:
01/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> capabilities: fix undefined behavior in bit shift for CAP_TO_MASK<br /> <br /> Shifting signed 32-bit value by 31 bits is undefined, so changing<br /> significant bit to unsigned. The UBSAN warning calltrace like below:<br /> <br /> UBSAN: shift-out-of-bounds in security/commoncap.c:1252:2<br /> left shift of 1 by 31 places cannot be represented in type &amp;#39;int&amp;#39;<br /> Call Trace:<br /> <br /> dump_stack_lvl+0x7d/0xa5<br /> dump_stack+0x15/0x1b<br /> ubsan_epilogue+0xe/0x4e<br /> __ubsan_handle_shift_out_of_bounds+0x1e7/0x20c<br /> cap_task_prctl+0x561/0x6f0<br /> security_task_prctl+0x5a/0xb0<br /> __x64_sys_prctl+0x61/0x8f0<br /> do_syscall_64+0x58/0x80<br /> entry_SYSCALL_64_after_hwframe+0x63/0xcd<br />
Severity CVSS v4.0: Pending analysis
Last modification:
10/11/2025

CVE-2022-49865

Publication date:
01/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ipv6: addrlabel: fix infoleak when sending struct ifaddrlblmsg to network<br /> <br /> When copying a `struct ifaddrlblmsg` to the network, __ifal_reserved<br /> remained uninitialized, resulting in a 1-byte infoleak:<br /> <br /> BUG: KMSAN: kernel-network-infoleak in __netdev_start_xmit ./include/linux/netdevice.h:4841<br /> __netdev_start_xmit ./include/linux/netdevice.h:4841<br /> netdev_start_xmit ./include/linux/netdevice.h:4857<br /> xmit_one net/core/dev.c:3590<br /> dev_hard_start_xmit+0x1dc/0x800 net/core/dev.c:3606<br /> __dev_queue_xmit+0x17e8/0x4350 net/core/dev.c:4256<br /> dev_queue_xmit ./include/linux/netdevice.h:3009<br /> __netlink_deliver_tap_skb net/netlink/af_netlink.c:307<br /> __netlink_deliver_tap+0x728/0xad0 net/netlink/af_netlink.c:325<br /> netlink_deliver_tap net/netlink/af_netlink.c:338<br /> __netlink_sendskb net/netlink/af_netlink.c:1263<br /> netlink_sendskb+0x1d9/0x200 net/netlink/af_netlink.c:1272<br /> netlink_unicast+0x56d/0xf50 net/netlink/af_netlink.c:1360<br /> nlmsg_unicast ./include/net/netlink.h:1061<br /> rtnl_unicast+0x5a/0x80 net/core/rtnetlink.c:758<br /> ip6addrlbl_get+0xfad/0x10f0 net/ipv6/addrlabel.c:628<br /> rtnetlink_rcv_msg+0xb33/0x1570 net/core/rtnetlink.c:6082<br /> ...<br /> Uninit was created at:<br /> slab_post_alloc_hook+0x118/0xb00 mm/slab.h:742<br /> slab_alloc_node mm/slub.c:3398<br /> __kmem_cache_alloc_node+0x4f2/0x930 mm/slub.c:3437<br /> __do_kmalloc_node mm/slab_common.c:954<br /> __kmalloc_node_track_caller+0x117/0x3d0 mm/slab_common.c:975<br /> kmalloc_reserve net/core/skbuff.c:437<br /> __alloc_skb+0x27a/0xab0 net/core/skbuff.c:509<br /> alloc_skb ./include/linux/skbuff.h:1267<br /> nlmsg_new ./include/net/netlink.h:964<br /> ip6addrlbl_get+0x490/0x10f0 net/ipv6/addrlabel.c:608<br /> rtnetlink_rcv_msg+0xb33/0x1570 net/core/rtnetlink.c:6082<br /> netlink_rcv_skb+0x299/0x550 net/netlink/af_netlink.c:2540<br /> rtnetlink_rcv+0x26/0x30 net/core/rtnetlink.c:6109<br /> netlink_unicast_kernel net/netlink/af_netlink.c:1319<br /> netlink_unicast+0x9ab/0xf50 net/netlink/af_netlink.c:1345<br /> netlink_sendmsg+0xebc/0x10f0 net/netlink/af_netlink.c:1921<br /> ...<br /> <br /> This patch ensures that the reserved field is always initialized.
Severity CVSS v4.0: Pending analysis
Last modification:
23/01/2026

CVE-2022-49855

Publication date:
01/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: wwan: iosm: fix memory leak in ipc_pcie_read_bios_cfg<br /> <br /> ipc_pcie_read_bios_cfg() is using the acpi_evaluate_dsm() to<br /> obtain the wwan power state configuration from BIOS but is<br /> not freeing the acpi_object. The acpi_evaluate_dsm() returned<br /> acpi_object to be freed.<br /> <br /> Free the acpi_object after use.
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2025

CVE-2022-49856

Publication date:
01/05/2025
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: Pending analysis
Last modification:
08/05/2025

CVE-2022-49857

Publication date:
01/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: marvell: prestera: fix memory leak in prestera_rxtx_switch_init()<br /> <br /> When prestera_sdma_switch_init() failed, the memory pointed to by<br /> sw-&gt;rxtx isn&amp;#39;t released. Fix it. Only be compiled, not be tested.
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2025

CVE-2022-49860

Publication date:
01/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> dmaengine: ti: k3-udma-glue: fix memory leak when register device fail<br /> <br /> If device_register() fails, it should call put_device() to give<br /> up reference, the name allocated in dev_set_name() can be freed<br /> in callback function kobject_cleanup().
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2025

CVE-2022-49861

Publication date:
01/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> dmaengine: mv_xor_v2: Fix a resource leak in mv_xor_v2_remove()<br /> <br /> A clk_prepare_enable() call in the probe is not balanced by a corresponding<br /> clk_disable_unprepare() in the remove function.<br /> <br /> Add the missing call.
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2025

CVE-2022-49858

Publication date:
01/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> octeontx2-pf: Fix SQE threshold checking<br /> <br /> Current way of checking available SQE count which is based on<br /> HW updated SQB count could result in driver submitting an SQE<br /> even before CQE for the previously transmitted SQE at the same<br /> index is processed in NAPI resulting losing SKB pointers,<br /> hence a leak. Fix this by checking a consumer index which<br /> is updated once CQE is processed.
Severity CVSS v4.0: Pending analysis
Last modification:
10/11/2025

CVE-2022-49859

Publication date:
01/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: lapbether: fix issue of invalid opcode in lapbeth_open()<br /> <br /> If lapb_register() failed when lapb device goes to up for the first time,<br /> the NAPI is not disabled. As a result, the invalid opcode issue is<br /> reported when the lapb device goes to up for the second time.<br /> <br /> The stack info is as follows:<br /> [ 1958.311422][T11356] kernel BUG at net/core/dev.c:6442!<br /> [ 1958.312206][T11356] invalid opcode: 0000 [#1] PREEMPT SMP KASAN<br /> [ 1958.315979][T11356] RIP: 0010:napi_enable+0x16a/0x1f0<br /> [ 1958.332310][T11356] Call Trace:<br /> [ 1958.332817][T11356] <br /> [ 1958.336135][T11356] lapbeth_open+0x18/0x90<br /> [ 1958.337446][T11356] __dev_open+0x258/0x490<br /> [ 1958.341672][T11356] __dev_change_flags+0x4d4/0x6a0<br /> [ 1958.345325][T11356] dev_change_flags+0x93/0x160<br /> [ 1958.346027][T11356] devinet_ioctl+0x1276/0x1bf0<br /> [ 1958.346738][T11356] inet_ioctl+0x1c8/0x2d0<br /> [ 1958.349638][T11356] sock_ioctl+0x5d1/0x750<br /> [ 1958.356059][T11356] __x64_sys_ioctl+0x3ec/0x1790<br /> [ 1958.365594][T11356] do_syscall_64+0x35/0x80<br /> [ 1958.366239][T11356] entry_SYSCALL_64_after_hwframe+0x46/0xb0<br /> [ 1958.377381][T11356]
Severity CVSS v4.0: Pending analysis
Last modification:
10/11/2025

CVE-2022-49845

Publication date:
01/05/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> can: j1939: j1939_send_one(): fix missing CAN header initialization<br /> <br /> The read access to struct canxl_frame::len inside of a j1939 created<br /> skbuff revealed a missing initialization of reserved and later filled<br /> elements in struct can_frame.<br /> <br /> This patch initializes the 8 byte CAN header with zero.
Severity CVSS v4.0: Pending analysis
Last modification:
01/10/2025