Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2025-38434

Publication date:
25/07/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> Revert "riscv: Define TASK_SIZE_MAX for __access_ok()"<br /> <br /> This reverts commit ad5643cf2f69 ("riscv: Define TASK_SIZE_MAX for<br /> __access_ok()").<br /> <br /> This commit changes TASK_SIZE_MAX to be LONG_MAX to optimize access_ok(),<br /> because the previous TASK_SIZE_MAX (default to TASK_SIZE) requires some<br /> computation.<br /> <br /> The reasoning was that all user addresses are less than LONG_MAX, and all<br /> kernel addresses are greater than LONG_MAX. Therefore access_ok() can<br /> filter kernel addresses.<br /> <br /> Addresses between TASK_SIZE and LONG_MAX are not valid user addresses, but<br /> access_ok() let them pass. That was thought to be okay, because they are<br /> not valid addresses at hardware level.<br /> <br /> Unfortunately, one case is missed: get_user_pages_fast() happily accepts<br /> addresses between TASK_SIZE and LONG_MAX. futex(), for instance, uses<br /> get_user_pages_fast(). This causes the problem reported by Robert [1].<br /> <br /> Therefore, revert this commit. TASK_SIZE_MAX is changed to the default:<br /> TASK_SIZE.<br /> <br /> This unfortunately reduces performance, because TASK_SIZE is more expensive<br /> to compute compared to LONG_MAX. But correctness first, we can think about<br /> optimization later, if required.
Severity CVSS v4.0: Pending analysis
Last modification:
19/11/2025

CVE-2025-38435

Publication date:
25/07/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> riscv: vector: Fix context save/restore with xtheadvector<br /> <br /> Previously only v0-v7 were correctly saved/restored,<br /> and the context of v8-v31 are damanged.<br /> Correctly save/restore v8-v31 to avoid breaking userspace.
Severity CVSS v4.0: Pending analysis
Last modification:
19/11/2025

CVE-2025-38432

Publication date:
25/07/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: netpoll: Initialize UDP checksum field before checksumming<br /> <br /> commit f1fce08e63fe ("netpoll: Eliminate redundant assignment") removed<br /> the initialization of the UDP checksum, which was wrong and broke<br /> netpoll IPv6 transmission due to bad checksumming.<br /> <br /> udph-&gt;check needs to be set before calling csum_ipv6_magic().
Severity CVSS v4.0: Pending analysis
Last modification:
19/11/2025

CVE-2025-38431

Publication date:
25/07/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> smb: client: fix regression with native SMB symlinks<br /> <br /> Some users and customers reported that their backup/copy tools started<br /> to fail when the directory being copied contained symlink targets that<br /> the client couldn&amp;#39;t parse - even when those symlinks weren&amp;#39;t followed.<br /> <br /> Fix this by allowing lstat(2) and readlink(2) to succeed even when the<br /> client can&amp;#39;t resolve the symlink target, restoring old behavior.
Severity CVSS v4.0: Pending analysis
Last modification:
19/11/2025

CVE-2025-38428

Publication date:
25/07/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> Input: ims-pcu - check record size in ims_pcu_flash_firmware()<br /> <br /> The "len" variable comes from the firmware and we generally do<br /> trust firmware, but it&amp;#39;s always better to double check. If the "len"<br /> is too large it could result in memory corruption when we do<br /> "memcpy(fragment-&gt;data, rec-&gt;data, len);"
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2025

CVE-2025-38425

Publication date:
25/07/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> i2c: tegra: check msg length in SMBUS block read<br /> <br /> For SMBUS block read, do not continue to read if the message length<br /> passed from the device is &amp;#39;0&amp;#39; or greater than the maximum allowed bytes.
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2025

CVE-2025-38424

Publication date:
25/07/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> perf: Fix sample vs do_exit()<br /> <br /> Baisheng Gao reported an ARM64 crash, which Mark decoded as being a<br /> synchronous external abort -- most likely due to trying to access<br /> MMIO in bad ways.<br /> <br /> The crash further shows perf trying to do a user stack sample while in<br /> exit_mmap()&amp;#39;s tlb_finish_mmu() -- i.e. while tearing down the address<br /> space it is trying to access.<br /> <br /> It turns out that we stop perf after we tear down the userspace mm; a<br /> receipie for disaster, since perf likes to access userspace for<br /> various reasons.<br /> <br /> Flip this order by moving up where we stop perf in do_exit().<br /> <br /> Additionally, harden PERF_SAMPLE_CALLCHAIN and PERF_SAMPLE_STACK_USER<br /> to abort when the current task does not have an mm (exit_mm() makes<br /> sure to set current-&gt;mm = NULL; before commencing with the actual<br /> teardown). Such that CPU wide events don&amp;#39;t trip on this same problem.
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2025

CVE-2025-38422

Publication date:
25/07/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: lan743x: Modify the EEPROM and OTP size for PCI1xxxx devices<br /> <br /> Maximum OTP and EEPROM size for hearthstone PCI1xxxx devices are 8 Kb<br /> and 64 Kb respectively. Adjust max size definitions and return correct<br /> EEPROM length based on device. Also prevent out-of-bound read/write.
Severity CVSS v4.0: Pending analysis
Last modification:
23/12/2025

CVE-2025-38423

Publication date:
25/07/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ASoC: codecs: wcd9375: Fix double free of regulator supplies<br /> <br /> Driver gets regulator supplies in probe path with<br /> devm_regulator_bulk_get(), so should not call regulator_bulk_free() in<br /> error and remove paths to avoid double free.
Severity CVSS v4.0: Pending analysis
Last modification:
19/11/2025

CVE-2025-38427

Publication date:
25/07/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> video: screen_info: Relocate framebuffers behind PCI bridges<br /> <br /> Apply PCI host-bridge window offsets to screen_info framebuffers. Fixes<br /> invalid access to I/O memory.<br /> <br /> Resources behind a PCI host bridge can be relocated by a certain offset<br /> in the kernel&amp;#39;s CPU address range used for I/O. The framebuffer memory<br /> range stored in screen_info refers to the CPU addresses as seen during<br /> boot (where the offset is 0). During boot up, firmware may assign a<br /> different memory offset to the PCI host bridge and thereby relocating<br /> the framebuffer address of the PCI graphics device as seen by the kernel.<br /> The information in screen_info must be updated as well.<br /> <br /> The helper pcibios_bus_to_resource() performs the relocation of the<br /> screen_info&amp;#39;s framebuffer resource (given in PCI bus addresses). The<br /> result matches the I/O-memory resource of the PCI graphics device (given<br /> in CPU addresses). As before, we store away the information necessary to<br /> later update the information in screen_info itself.<br /> <br /> Commit 78aa89d1dfba ("firmware/sysfb: Update screen_info for relocated<br /> EFI framebuffers") added the code for updating screen_info. It is based<br /> on similar functionality that pre-existed in efifb. Efifb uses a pointer<br /> to the PCI resource, while the newer code does a memcpy of the region.<br /> Hence efifb sees any updates to the PCI resource and avoids the issue.<br /> <br /> v3:<br /> - Only use struct pci_bus_region for PCI bus addresses (Bjorn)<br /> - Clarify address semantics in commit messages and comments (Bjorn)<br /> v2:<br /> - Fixed tags (Takashi, Ivan)<br /> - Updated information on efifb
Severity CVSS v4.0: Pending analysis
Last modification:
19/11/2025

CVE-2025-38429

Publication date:
25/07/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bus: mhi: ep: Update read pointer only after buffer is written<br /> <br /> Inside mhi_ep_ring_add_element, the read pointer (rd_offset) is updated<br /> before the buffer is written, potentially causing race conditions where<br /> the host sees an updated read pointer before the buffer is actually<br /> written. Updating rd_offset prematurely can lead to the host accessing<br /> an uninitialized or incomplete element, resulting in data corruption.<br /> <br /> Invoke the buffer write before updating rd_offset to ensure the element<br /> is fully written before signaling its availability.
Severity CVSS v4.0: Pending analysis
Last modification:
19/11/2025

CVE-2025-38426

Publication date:
25/07/2025
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amdgpu: Add basic validation for RAS header<br /> <br /> If RAS header read from EEPROM is corrupted, it could result in trying<br /> to allocate huge memory for reading the records. Add some validation to<br /> header fields.
Severity CVSS v4.0: Pending analysis
Last modification:
25/03/2026