Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-47305

Publication date:
21/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> dma-buf/sync_file: Don&amp;#39;t leak fences on merge failure<br /> <br /> Each add_fence() call does a dma_fence_get() on the relevant fence. In<br /> the error path, we weren&amp;#39;t calling dma_fence_put() so all those fences<br /> got leaked. Also, in the krealloc_array failure case, we weren&amp;#39;t<br /> freeing the fences array. Instead, ensure that i and fences are always<br /> zero-initialized and dma_fence_put() all the fences and kfree(fences) on<br /> every error path.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2025

CVE-2021-47306

Publication date:
21/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: fddi: fix UAF in fza_probe<br /> <br /> fp is netdev private data and it cannot be<br /> used after free_netdev() call. Using fp after free_netdev()<br /> can cause UAF bug. Fix it by moving free_netdev() after error message.<br /> <br /> TURBOchannel adapter")
Severity CVSS v4.0: Pending analysis
Last modification:
26/12/2024

CVE-2021-47307

Publication date:
21/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> cifs: prevent NULL deref in cifs_compose_mount_options()<br /> <br /> The optional @ref parameter might contain an NULL node_name, so<br /> prevent dereferencing it in cifs_compose_mount_options().<br /> <br /> Addresses-Coverity: 1476408 ("Explicit null dereferenced")
Severity CVSS v4.0: Pending analysis
Last modification:
26/12/2024

CVE-2021-47308

Publication date:
21/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> scsi: libfc: Fix array index out of bound exception<br /> <br /> Fix array index out of bound exception in fc_rport_prli_resp().
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2025

CVE-2021-47309

Publication date:
21/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: validate lwtstate-&gt;data before returning from skb_tunnel_info()<br /> <br /> skb_tunnel_info() returns pointer of lwtstate-&gt;data as ip_tunnel_info<br /> type without validation. lwtstate-&gt;data can have various types such as<br /> mpls_iptunnel_encap, etc and these are not compatible.<br /> So skb_tunnel_info() should validate before returning that pointer.<br /> <br /> Splat looks like:<br /> BUG: KASAN: slab-out-of-bounds in vxlan_get_route+0x418/0x4b0 [vxlan]<br /> Read of size 2 at addr ffff888106ec2698 by task ping/811<br /> <br /> CPU: 1 PID: 811 Comm: ping Not tainted 5.13.0+ #1195<br /> Call Trace:<br /> dump_stack_lvl+0x56/0x7b<br /> print_address_description.constprop.8.cold.13+0x13/0x2ee<br /> ? vxlan_get_route+0x418/0x4b0 [vxlan]<br /> ? vxlan_get_route+0x418/0x4b0 [vxlan]<br /> kasan_report.cold.14+0x83/0xdf<br /> ? vxlan_get_route+0x418/0x4b0 [vxlan]<br /> vxlan_get_route+0x418/0x4b0 [vxlan]<br /> [ ... ]<br /> vxlan_xmit_one+0x148b/0x32b0 [vxlan]<br /> [ ... ]<br /> vxlan_xmit+0x25c5/0x4780 [vxlan]<br /> [ ... ]<br /> dev_hard_start_xmit+0x1ae/0x6e0<br /> __dev_queue_xmit+0x1f39/0x31a0<br /> [ ... ]<br /> neigh_xmit+0x2f9/0x940<br /> mpls_xmit+0x911/0x1600 [mpls_iptunnel]<br /> lwtunnel_xmit+0x18f/0x450<br /> ip_finish_output2+0x867/0x2040<br /> [ ... ]
Severity CVSS v4.0: Pending analysis
Last modification:
26/12/2024

CVE-2021-47310

Publication date:
21/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: ti: fix UAF in tlan_remove_one<br /> <br /> priv is netdev private data and it cannot be<br /> used after free_netdev() call. Using priv after free_netdev()<br /> can cause UAF bug. Fix it by moving free_netdev() at the end of the<br /> function.
Severity CVSS v4.0: Pending analysis
Last modification:
26/12/2024

CVE-2021-47311

Publication date:
21/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: qcom/emac: fix UAF in emac_remove<br /> <br /> adpt is netdev private data and it cannot be<br /> used after free_netdev() call. Using adpt after free_netdev()<br /> can cause UAF bug. Fix it by moving free_netdev() at the end of the<br /> function.
Severity CVSS v4.0: Pending analysis
Last modification:
26/12/2024

CVE-2021-47312

Publication date:
21/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netfilter: nf_tables: Fix dereference of null pointer flow<br /> <br /> In the case where chain-&gt;flags &amp; NFT_CHAIN_HW_OFFLOAD is false then<br /> nft_flow_rule_create is not called and flow is NULL. The subsequent<br /> error handling execution via label err_destroy_flow_rule will lead<br /> to a null pointer dereference on flow when calling nft_flow_rule_destroy.<br /> Since the error path to err_destroy_flow_rule has to cater for null<br /> and non-null flows, only call nft_flow_rule_destroy if flow is non-null<br /> to fix this issue.<br /> <br /> Addresses-Coverity: ("Explicity null dereference")
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2025

CVE-2021-47313

Publication date:
21/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> cpufreq: CPPC: Fix potential memleak in cppc_cpufreq_cpu_init<br /> <br /> It&amp;#39;s a classic example of memleak, we allocate something, we fail and<br /> never free the resources.<br /> <br /> Make sure we free all resources on policy -&gt;init() failures.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2025

CVE-2021-47314

Publication date:
21/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> memory: fsl_ifc: fix leak of private memory on probe failure<br /> <br /> On probe error the driver should free the memory allocated for private<br /> structure. Fix this by using resource-managed allocation.
Severity CVSS v4.0: Pending analysis
Last modification:
24/12/2024

CVE-2021-47315

Publication date:
21/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> memory: fsl_ifc: fix leak of IO mapping on probe failure<br /> <br /> On probe error the driver should unmap the IO memory. Smatch reports:<br /> <br /> drivers/memory/fsl_ifc.c:298 fsl_ifc_ctrl_probe() warn: &amp;#39;fsl_ifc_ctrl_dev-&gt;gregs&amp;#39; not released on lines: 298.
Severity CVSS v4.0: Pending analysis
Last modification:
12/05/2025

CVE-2021-47316

Publication date:
21/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> nfsd: fix NULL dereference in nfs3svc_encode_getaclres<br /> <br /> In error cases the dentry may be NULL.<br /> <br /> Before 20798dfe249a, the encoder also checked dentry and<br /> d_really_is_positive(dentry), but that looks like overkill to me--zero<br /> status should be enough to guarantee a positive dentry.<br /> <br /> This isn&amp;#39;t the first time we&amp;#39;ve seen an error-case NULL dereference<br /> hidden in the initialization of a local variable in an xdr encoder. But<br /> I went back through the other recent rewrites and didn&amp;#39;t spot any<br /> similar bugs.
Severity CVSS v4.0: Pending analysis
Last modification:
24/12/2024