Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-38561

Publication date:
19/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> kunit: Fix kthread reference<br /> <br /> There is a race condition when a kthread finishes after the deadline and<br /> before the call to kthread_stop(), which may lead to use after free.
Severity CVSS v4.0: Pending analysis
Last modification:
30/08/2024

CVE-2024-38562

Publication date:
19/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: nl80211: Avoid address calculations via out of bounds array indexing<br /> <br /> Before request-&gt;channels[] can be used, request-&gt;n_channels must be set.<br /> Additionally, address calculations for memory after the "channels" array<br /> need to be calculated from the allocation base ("request") rather than<br /> via the first "out of bounds" index of "channels", otherwise run-time<br /> bounds checking will throw a warning.
Severity CVSS v4.0: Pending analysis
Last modification:
30/10/2024

CVE-2024-38563

Publication date:
19/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: mt76: mt7996: fix potential memory leakage when reading chip temperature<br /> <br /> Without this commit, reading chip temperature will cause memory leakage.
Severity CVSS v4.0: Pending analysis
Last modification:
01/08/2024

CVE-2024-38564

Publication date:
19/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bpf: Add BPF_PROG_TYPE_CGROUP_SKB attach type enforcement in BPF_LINK_CREATE<br /> <br /> bpf_prog_attach uses attach_type_to_prog_type to enforce proper<br /> attach type for BPF_PROG_TYPE_CGROUP_SKB. link_create uses<br /> bpf_prog_get and relies on bpf_prog_attach_check_attach_type<br /> to properly verify prog_type attach_type association.<br /> <br /> Add missing attach_type enforcement for the link_create case.<br /> Otherwise, it&amp;#39;s currently possible to attach cgroup_skb prog<br /> types to other cgroup hooks.
Severity CVSS v4.0: Pending analysis
Last modification:
20/10/2025

CVE-2024-38566

Publication date:
19/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> bpf: Fix verifier assumptions about socket-&gt;sk<br /> <br /> The verifier assumes that &amp;#39;sk&amp;#39; field in &amp;#39;struct socket&amp;#39; is valid<br /> and non-NULL when &amp;#39;socket&amp;#39; pointer itself is trusted and non-NULL.<br /> That may not be the case when socket was just created and<br /> passed to LSM socket_accept hook.<br /> Fix this verifier assumption and adjust tests.
Severity CVSS v4.0: Pending analysis
Last modification:
17/09/2025

CVE-2024-38568

Publication date:
19/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drivers/perf: hisi: hns3: Fix out-of-bound access when valid event group<br /> <br /> The perf tool allows users to create event groups through following<br /> cmd [1], but the driver does not check whether the array index is out<br /> of bounds when writing data to the event_group array. If the number of<br /> events in an event_group is greater than HNS3_PMU_MAX_HW_EVENTS, the<br /> memory write overflow of event_group array occurs.<br /> <br /> Add array index check to fix the possible array out of bounds violation,<br /> and return directly when write new events are written to array bounds.<br /> <br /> There are 9 different events in an event_group.<br /> [1] perf stat -e &amp;#39;{pmu/event1/, ... ,pmu/event9/}
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2024

CVE-2024-38559

Publication date:
19/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> scsi: qedf: Ensure the copied buf is NUL terminated<br /> <br /> Currently, we allocate a count-sized kernel buffer and copy count from<br /> userspace to that buffer. Later, we use kstrtouint on this buffer but we<br /> don&amp;#39;t ensure that the string is terminated inside the buffer, this can<br /> lead to OOB read when using kstrtouint. Fix this issue by using<br /> memdup_user_nul instead of memdup_user.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2024-38560

Publication date:
19/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> scsi: bfa: Ensure the copied buf is NUL terminated<br /> <br /> Currently, we allocate a nbytes-sized kernel buffer and copy nbytes from<br /> userspace to that buffer. Later, we use sscanf on this buffer but we don&amp;#39;t<br /> ensure that the string is terminated inside the buffer, this can lead to<br /> OOB read when using sscanf. Fix this issue by using memdup_user_nul instead<br /> of memdup_user.
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2024-38565

Publication date:
19/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: ar5523: enable proper endpoint verification<br /> <br /> Syzkaller reports [1] hitting a warning about an endpoint in use<br /> not having an expected type to it.<br /> <br /> Fix the issue by checking for the existence of all proper<br /> endpoints with their according types intact.<br /> <br /> Sadly, this patch has not been tested on real hardware.<br /> <br /> [1] Syzkaller report:<br /> ------------[ cut here ]------------<br /> usb 1-1: BOGUS urb xfer, pipe 3 != type 1<br /> WARNING: CPU: 0 PID: 3643 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504<br /> ...<br /> Call Trace:<br /> <br /> ar5523_cmd+0x41b/0x780 drivers/net/wireless/ath/ar5523/ar5523.c:275<br /> ar5523_cmd_read drivers/net/wireless/ath/ar5523/ar5523.c:302 [inline]<br /> ar5523_host_available drivers/net/wireless/ath/ar5523/ar5523.c:1376 [inline]<br /> ar5523_probe+0x14b0/0x1d10 drivers/net/wireless/ath/ar5523/ar5523.c:1655<br /> usb_probe_interface+0x30f/0x7f0 drivers/usb/core/driver.c:396<br /> call_driver_probe drivers/base/dd.c:560 [inline]<br /> really_probe+0x249/0xb90 drivers/base/dd.c:639<br /> __driver_probe_device+0x1df/0x4d0 drivers/base/dd.c:778<br /> driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:808<br /> __device_attach_driver+0x1d4/0x2e0 drivers/base/dd.c:936<br /> bus_for_each_drv+0x163/0x1e0 drivers/base/bus.c:427<br /> __device_attach+0x1e4/0x530 drivers/base/dd.c:1008<br /> bus_probe_device+0x1e8/0x2a0 drivers/base/bus.c:487<br /> device_add+0xbd9/0x1e90 drivers/base/core.c:3517<br /> usb_set_configuration+0x101d/0x1900 drivers/usb/core/message.c:2170<br /> usb_generic_driver_probe+0xbe/0x100 drivers/usb/core/generic.c:238<br /> usb_probe_device+0xd8/0x2c0 drivers/usb/core/driver.c:293<br /> call_driver_probe drivers/base/dd.c:560 [inline]<br /> really_probe+0x249/0xb90 drivers/base/dd.c:639<br /> __driver_probe_device+0x1df/0x4d0 drivers/base/dd.c:778<br /> driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:808<br /> __device_attach_driver+0x1d4/0x2e0 drivers/base/dd.c:936<br /> bus_for_each_drv+0x163/0x1e0 drivers/base/bus.c:427<br /> __device_attach+0x1e4/0x530 drivers/base/dd.c:1008<br /> bus_probe_device+0x1e8/0x2a0 drivers/base/bus.c:487<br /> device_add+0xbd9/0x1e90 drivers/base/core.c:3517<br /> usb_new_device.cold+0x685/0x10ad drivers/usb/core/hub.c:2573<br /> hub_port_connect drivers/usb/core/hub.c:5353 [inline]<br /> hub_port_connect_change drivers/usb/core/hub.c:5497 [inline]<br /> port_event drivers/usb/core/hub.c:5653 [inline]<br /> hub_event+0x26cb/0x45d0 drivers/usb/core/hub.c:5735<br /> process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289<br /> worker_thread+0x669/0x1090 kernel/workqueue.c:2436<br /> kthread+0x2e8/0x3a0 kernel/kthread.c:376<br /> ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306<br />
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2024-38567

Publication date:
19/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: carl9170: add a proper sanity check for endpoints<br /> <br /> Syzkaller reports [1] hitting a warning which is caused by presence<br /> of a wrong endpoint type at the URB sumbitting stage. While there<br /> was a check for a specific 4th endpoint, since it can switch types<br /> between bulk and interrupt, other endpoints are trusted implicitly.<br /> Similar warning is triggered in a couple of other syzbot issues [2].<br /> <br /> Fix the issue by doing a comprehensive check of all endpoints<br /> taking into account difference between high- and full-speed<br /> configuration.<br /> <br /> [1] Syzkaller report:<br /> ...<br /> WARNING: CPU: 0 PID: 4721 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504<br /> ...<br /> Call Trace:<br /> <br /> carl9170_usb_send_rx_irq_urb+0x273/0x340 drivers/net/wireless/ath/carl9170/usb.c:504<br /> carl9170_usb_init_device drivers/net/wireless/ath/carl9170/usb.c:939 [inline]<br /> carl9170_usb_firmware_finish drivers/net/wireless/ath/carl9170/usb.c:999 [inline]<br /> carl9170_usb_firmware_step2+0x175/0x240 drivers/net/wireless/ath/carl9170/usb.c:1028<br /> request_firmware_work_func+0x130/0x240 drivers/base/firmware_loader/main.c:1107<br /> process_one_work+0x9bf/0x1710 kernel/workqueue.c:2289<br /> worker_thread+0x669/0x1090 kernel/workqueue.c:2436<br /> kthread+0x2e8/0x3a0 kernel/kthread.c:376<br /> ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308<br /> <br /> <br /> [2] Related syzkaller crashes:
Severity CVSS v4.0: Pending analysis
Last modification:
04/11/2025

CVE-2024-38548

Publication date:
19/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm: bridge: cdns-mhdp8546: Fix possible null pointer dereference<br /> <br /> In cdns_mhdp_atomic_enable(), the return value of drm_mode_duplicate() is<br /> assigned to mhdp_state-&gt;current_mode, and there is a dereference of it in<br /> drm_mode_set_name(), which will lead to a NULL pointer dereference on<br /> failure of drm_mode_duplicate().<br /> <br /> Fix this bug add a check of mhdp_state-&gt;current_mode.
Severity CVSS v4.0: Pending analysis
Last modification:
01/04/2025

CVE-2024-38550

Publication date:
19/06/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ASoC: kirkwood: Fix potential NULL dereference<br /> <br /> In kirkwood_dma_hw_params() mv_mbus_dram_info() returns NULL if<br /> CONFIG_PLAT_ORION macro is not defined.<br /> Fix this bug by adding NULL check.<br /> <br /> Found by Linux Verification Center (linuxtesting.org) with SVACE.
Severity CVSS v4.0: Pending analysis
Last modification:
01/04/2025