Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2021-47481

Publication date:
22/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> RDMA/mlx5: Initialize the ODP xarray when creating an ODP MR<br /> <br /> Normally the zero fill would hide the missing initialization, but an<br /> errant set to desc_size in reg_create() causes a crash:<br /> <br /> BUG: unable to handle page fault for address: 0000000800000000<br /> PGD 0 P4D 0<br /> Oops: 0000 [#1] SMP PTI<br /> CPU: 5 PID: 890 Comm: ib_write_bw Not tainted 5.15.0-rc4+ #47<br /> Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014<br /> RIP: 0010:mlx5_ib_dereg_mr+0x14/0x3b0 [mlx5_ib]<br /> Code: 48 63 cd 4c 89 f7 48 89 0c 24 e8 37 30 03 e1 48 8b 0c 24 eb a0 90 0f 1f 44 00 00 41 56 41 55 41 54 55 53 48 89 fb 48 83 ec 30 8b 2f 65 48 8b 04 25 28 00 00 00 48 89 44 24 28 31 c0 8b 87 c8<br /> RSP: 0018:ffff88811afa3a60 EFLAGS: 00010286<br /> RAX: 000000000000001c RBX: 0000000800000000 RCX: 0000000000000000<br /> RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000800000000<br /> RBP: 0000000800000000 R08: 0000000000000000 R09: c0000000fffff7ff<br /> R10: ffff88811afa38f8 R11: ffff88811afa38f0 R12: ffffffffa02c7ac0<br /> R13: 0000000000000000 R14: ffff88811afa3cd8 R15: ffff88810772fa00<br /> FS: 00007f47b9080740(0000) GS:ffff88852cd40000(0000) knlGS:0000000000000000<br /> CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> CR2: 0000000800000000 CR3: 000000010761e003 CR4: 0000000000370ea0<br /> DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br /> DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400<br /> Call Trace:<br /> mlx5_ib_free_odp_mr+0x95/0xc0 [mlx5_ib]<br /> mlx5_ib_dereg_mr+0x128/0x3b0 [mlx5_ib]<br /> ib_dereg_mr_user+0x45/0xb0 [ib_core]<br /> ? xas_load+0x8/0x80<br /> destroy_hw_idr_uobject+0x1a/0x50 [ib_uverbs]<br /> uverbs_destroy_uobject+0x2f/0x150 [ib_uverbs]<br /> uobj_destroy+0x3c/0x70 [ib_uverbs]<br /> ib_uverbs_cmd_verbs+0x467/0xb00 [ib_uverbs]<br /> ? uverbs_finalize_object+0x60/0x60 [ib_uverbs]<br /> ? ttwu_queue_wakelist+0xa9/0xe0<br /> ? pty_write+0x85/0x90<br /> ? file_tty_write.isra.33+0x214/0x330<br /> ? process_echoes+0x60/0x60<br /> ib_uverbs_ioctl+0xa7/0x110 [ib_uverbs]<br /> __x64_sys_ioctl+0x10d/0x8e0<br /> ? vfs_write+0x17f/0x260<br /> do_syscall_64+0x3c/0x80<br /> entry_SYSCALL_64_after_hwframe+0x44/0xae<br /> <br /> Add the missing xarray initialization and remove the desc_size set.
Severity CVSS v4.0: Pending analysis
Last modification:
29/09/2025

CVE-2021-47482

Publication date:
22/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: batman-adv: fix error handling<br /> <br /> Syzbot reported ODEBUG warning in batadv_nc_mesh_free(). The problem was<br /> in wrong error handling in batadv_mesh_init().<br /> <br /> Before this patch batadv_mesh_init() was calling batadv_mesh_free() in case<br /> of any batadv_*_init() calls failure. This approach may work well, when<br /> there is some kind of indicator, which can tell which parts of batadv are<br /> initialized; but there isn&amp;#39;t any.<br /> <br /> All written above lead to cleaning up uninitialized fields. Even if we hide<br /> ODEBUG warning by initializing bat_priv-&gt;nc.work, syzbot was able to hit<br /> GPF in batadv_nc_purge_paths(), because hash pointer in still NULL. [1]<br /> <br /> To fix these bugs we can unwind batadv_*_init() calls one by one.<br /> It is good approach for 2 reasons: 1) It fixes bugs on error handling<br /> path 2) It improves the performance, since we won&amp;#39;t call unneeded<br /> batadv_*_free() functions.<br /> <br /> So, this patch makes all batadv_*_init() clean up all allocated memory<br /> before returning with an error to no call correspoing batadv_*_free()<br /> and open-codes batadv_mesh_free() with proper order to avoid touching<br /> uninitialized fields.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2025

CVE-2021-47483

Publication date:
22/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> regmap: Fix possible double-free in regcache_rbtree_exit()<br /> <br /> In regcache_rbtree_insert_to_block(), when &amp;#39;present&amp;#39; realloc failed,<br /> the &amp;#39;blk&amp;#39; which is supposed to assign to &amp;#39;rbnode-&gt;block&amp;#39; will be freed,<br /> so &amp;#39;rbnode-&gt;block&amp;#39; points a freed memory, in the error handling path of<br /> regcache_rbtree_init(), &amp;#39;rbnode-&gt;block&amp;#39; will be freed again in<br /> regcache_rbtree_exit(), KASAN will report double-free as follows:<br /> <br /> BUG: KASAN: double-free or invalid-free in kfree+0xce/0x390<br /> Call Trace:<br /> slab_free_freelist_hook+0x10d/0x240<br /> kfree+0xce/0x390<br /> regcache_rbtree_exit+0x15d/0x1a0<br /> regcache_rbtree_init+0x224/0x2c0<br /> regcache_init+0x88d/0x1310<br /> __regmap_init+0x3151/0x4a80<br /> __devm_regmap_init+0x7d/0x100<br /> madera_spi_probe+0x10f/0x333 [madera_spi]<br /> spi_probe+0x183/0x210<br /> really_probe+0x285/0xc30<br /> <br /> To fix this, moving up the assignment of rbnode-&gt;block to immediately after<br /> the reallocation has succeeded so that the data structure stays valid even<br /> if the second reallocation fails.
Severity CVSS v4.0: Pending analysis
Last modification:
06/01/2025

CVE-2021-47484

Publication date:
22/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> octeontx2-af: Fix possible null pointer dereference.<br /> <br /> This patch fixes possible null pointer dereference in files<br /> "rvu_debugfs.c" and "rvu_nix.c"
Severity CVSS v4.0: Pending analysis
Last modification:
01/04/2025

CVE-2021-47485

Publication date:
22/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields<br /> <br /> Overflowing either addrlimit or bytes_togo can allow userspace to trigger<br /> a buffer overflow of kernel memory. Check for overflows in all the places<br /> doing math on user controlled buffers.
Severity CVSS v4.0: Pending analysis
Last modification:
06/01/2025

CVE-2021-47486

Publication date:
22/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> riscv, bpf: Fix potential NULL dereference<br /> <br /> The bpf_jit_binary_free() function requires a non-NULL argument. When<br /> the RISC-V BPF JIT fails to converge in NR_JIT_ITERATIONS steps,<br /> jit_data-&gt;header will be NULL, which triggers a NULL<br /> dereference. Avoid this by checking the argument, prior calling the<br /> function.
Severity CVSS v4.0: Pending analysis
Last modification:
01/04/2025

CVE-2021-47487

Publication date:
22/05/2024
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: Pending analysis
Last modification:
28/05/2024

CVE-2021-47488

Publication date:
22/05/2024
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Severity CVSS v4.0: Pending analysis
Last modification:
05/12/2024

CVE-2021-47490

Publication date:
22/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/ttm: fix memleak in ttm_transfered_destroy<br /> <br /> We need to cleanup the fences for ghost objects as well.<br /> <br /> Bug: https://bugzilla.kernel.org/show_bug.cgi?id=214029<br /> Bug: https://bugzilla.kernel.org/show_bug.cgi?id=214447
Severity CVSS v4.0: Pending analysis
Last modification:
24/01/2025

CVE-2021-47491

Publication date:
22/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mm: khugepaged: skip huge page collapse for special files<br /> <br /> The read-only THP for filesystems will collapse THP for files opened<br /> readonly and mapped with VM_EXEC. The intended usecase is to avoid TLB<br /> misses for large text segments. But it doesn&amp;#39;t restrict the file types<br /> so a THP could be collapsed for a non-regular file, for example, block<br /> device, if it is opened readonly and mapped with EXEC permission. This<br /> may cause bugs, like [1] and [2].<br /> <br /> This is definitely not the intended usecase, so just collapse THP for<br /> regular files in order to close the attack surface.<br /> <br /> [shy828301@gmail.com: fix vm_file check [3]]
Severity CVSS v4.0: Pending analysis
Last modification:
29/09/2025

CVE-2021-47489

Publication date:
22/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amdgpu: Fix even more out of bound writes from debugfs<br /> <br /> CVE-2021-42327 was fixed by:<br /> <br /> commit f23750b5b3d98653b31d4469592935ef6364ad67<br /> Author: Thelford Williams <br /> Date: Wed Oct 13 16:04:13 2021 -0400<br /> <br /> drm/amdgpu: fix out of bounds write<br /> <br /> but amdgpu_dm_debugfs.c contains more of the same issue so fix the<br /> remaining ones.<br /> <br /> v2:<br /> * Add missing fix in dp_max_bpc_write (Harry Wentland)
Severity CVSS v4.0: Pending analysis
Last modification:
18/11/2025

CVE-2021-47474

Publication date:
22/05/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> comedi: vmk80xx: fix bulk-buffer overflow<br /> <br /> The driver is using endpoint-sized buffers but must not assume that the<br /> tx and rx buffers are of equal size or a malicious device could overflow<br /> the slab-allocated receive buffer when doing bulk transfers.
Severity CVSS v4.0: Pending analysis
Last modification:
24/09/2025