Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2022-48668

Publication date:
28/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> smb3: fix temporary data corruption in collapse range<br /> <br /> collapse range doesn&amp;#39;t discard the affected cached region<br /> so can risk temporarily corrupting the file data. This<br /> fixes xfstest generic/031<br /> <br /> I also decided to merge a minor cleanup to this into the same patch<br /> (avoiding rereading inode size repeatedly unnecessarily) to make it<br /> clearer.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2025

CVE-2024-25050

Publication date:
28/04/2024
IBM i 7.2, 7.3, 7.4, 7.5 and IBM Rational Development Studio for i 7.2, 7.3, 7.4, 7.5 networking and compiler infrastructure could allow a local user to gain elevated privileges due to an unqualified library call. A malicious actor could cause user-controlled code to run with administrator privileges. IBM X-Force ID: 283242.
Severity CVSS v4.0: Pending analysis
Last modification:
13/08/2025

CVE-2022-48642

Publication date:
28/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netfilter: nf_tables: fix percpu memory leak at nf_tables_addchain()<br /> <br /> It seems to me that percpu memory for chain stats started leaking since<br /> commit 3bc158f8d0330f0a ("netfilter: nf_tables: map basechain priority to<br /> hardware priority") when nft_chain_offload_priority() returned an error.
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2025

CVE-2022-48643

Publication date:
28/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netfilter: nf_tables: fix nft_counters_enabled underflow at nf_tables_addchain()<br /> <br /> syzbot is reporting underflow of nft_counters_enabled counter at<br /> nf_tables_addchain() [1], for commit 43eb8949cfdffa76 ("netfilter:<br /> nf_tables: do not leave chain stats enabled on error") missed that<br /> nf_tables_chain_destroy() after nft_basechain_init() in the error path of<br /> nf_tables_addchain() decrements the counter because nft_basechain_init()<br /> makes nft_is_base_chain() return true by setting NFT_CHAIN_BASE flag.<br /> <br /> Increment the counter immediately after returning from<br /> nft_basechain_init().
Severity CVSS v4.0: Pending analysis
Last modification:
18/09/2025

CVE-2022-48644

Publication date:
28/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net/sched: taprio: avoid disabling offload when it was never enabled<br /> <br /> In an incredibly strange API design decision, qdisc-&gt;destroy() gets<br /> called even if qdisc-&gt;init() never succeeded, not exclusively since<br /> commit 87b60cfacf9f ("net_sched: fix error recovery at qdisc creation"),<br /> but apparently also earlier (in the case of qdisc_create_dflt()).<br /> <br /> The taprio qdisc does not fully acknowledge this when it attempts full<br /> offload, because it starts off with q-&gt;flags = TAPRIO_FLAGS_INVALID in<br /> taprio_init(), then it replaces q-&gt;flags with TCA_TAPRIO_ATTR_FLAGS<br /> parsed from netlink (in taprio_change(), tail called from taprio_init()).<br /> <br /> But in taprio_destroy(), we call taprio_disable_offload(), and this<br /> determines what to do based on FULL_OFFLOAD_IS_ENABLED(q-&gt;flags).<br /> <br /> But looking at the implementation of FULL_OFFLOAD_IS_ENABLED()<br /> (a bitwise check of bit 1 in q-&gt;flags), it is invalid to call this macro<br /> on q-&gt;flags when it contains TAPRIO_FLAGS_INVALID, because that is set<br /> to U32_MAX, and therefore FULL_OFFLOAD_IS_ENABLED() will return true on<br /> an invalid set of flags.<br /> <br /> As a result, it is possible to crash the kernel if user space forces an<br /> error between setting q-&gt;flags = TAPRIO_FLAGS_INVALID, and the calling<br /> of taprio_enable_offload(). This is because drivers do not expect the<br /> offload to be disabled when it was never enabled.<br /> <br /> The error that we force here is to attach taprio as a non-root qdisc,<br /> but instead as child of an mqprio root qdisc:<br /> <br /> $ tc qdisc add dev swp0 root handle 1: \<br /> mqprio num_tc 8 map 0 1 2 3 4 5 6 7 \<br /> queues 1@0 1@1 1@2 1@3 1@4 1@5 1@6 1@7 hw 0<br /> $ tc qdisc replace dev swp0 parent 1:1 \<br /> taprio num_tc 8 map 0 1 2 3 4 5 6 7 \<br /> queues 1@0 1@1 1@2 1@3 1@4 1@5 1@6 1@7 base-time 0 \<br /> sched-entry S 0x7f 990000 sched-entry S 0x80 100000 \<br /> flags 0x0 clockid CLOCK_TAI<br /> Unable to handle kernel paging request at virtual address fffffffffffffff8<br /> [fffffffffffffff8] pgd=0000000000000000, p4d=0000000000000000<br /> Internal error: Oops: 96000004 [#1] PREEMPT SMP<br /> Call trace:<br /> taprio_dump+0x27c/0x310<br /> vsc9959_port_setup_tc+0x1f4/0x460<br /> felix_port_setup_tc+0x24/0x3c<br /> dsa_slave_setup_tc+0x54/0x27c<br /> taprio_disable_offload.isra.0+0x58/0xe0<br /> taprio_destroy+0x80/0x104<br /> qdisc_create+0x240/0x470<br /> tc_modify_qdisc+0x1fc/0x6b0<br /> rtnetlink_rcv_msg+0x12c/0x390<br /> netlink_rcv_skb+0x5c/0x130<br /> rtnetlink_rcv+0x1c/0x2c<br /> <br /> Fix this by keeping track of the operations we made, and undo the<br /> offload only if we actually did it.<br /> <br /> I&amp;#39;ve added "bool offloaded" inside a 4 byte hole between "int clockid"<br /> and "atomic64_t picos_per_byte". Now the first cache line looks like<br /> below:<br /> <br /> $ pahole -C taprio_sched net/sched/sch_taprio.o<br /> struct taprio_sched {<br /> struct Qdisc * * qdiscs; /* 0 8 */<br /> struct Qdisc * root; /* 8 8 */<br /> u32 flags; /* 16 4 */<br /> enum tk_offsets tk_offset; /* 20 4 */<br /> int clockid; /* 24 4 */<br /> bool offloaded; /* 28 1 */<br /> <br /> /* XXX 3 bytes hole, try to pack */<br /> <br /> atomic64_t picos_per_byte; /* 32 0 */<br /> <br /> /* XXX 8 bytes hole, try to pack */<br /> <br /> spinlock_t current_entry_lock; /* 40 0 */<br /> <br /> /* XXX 8 bytes hole, try to pack */<br /> <br /> struct sched_entry * current_entry; /* 48 8 */<br /> struct sched_gate_list * oper_sched; /* 56 8 */<br /> /* --- cacheline 1 boundary (64 bytes) --- */
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2025

CVE-2022-48645

Publication date:
28/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: enetc: deny offload of tc-based TSN features on VF interfaces<br /> <br /> TSN features on the ENETC (taprio, cbs, gate, police) are configured<br /> through a mix of command BD ring messages and port registers:<br /> enetc_port_rd(), enetc_port_wr().<br /> <br /> Port registers are a region of the ENETC memory map which are only<br /> accessible from the PCIe Physical Function. They are not accessible from<br /> the Virtual Functions.<br /> <br /> Moreover, attempting to access these registers crashes the kernel:<br /> <br /> $ echo 1 &gt; /sys/bus/pci/devices/0000\:00\:00.0/sriov_numvfs<br /> pci 0000:00:01.0: [1957:ef00] type 00 class 0x020001<br /> fsl_enetc_vf 0000:00:01.0: Adding to iommu group 15<br /> fsl_enetc_vf 0000:00:01.0: enabling device (0000 -&gt; 0002)<br /> fsl_enetc_vf 0000:00:01.0 eno0vf0: renamed from eth0<br /> $ tc qdisc replace dev eno0vf0 root taprio num_tc 8 map 0 1 2 3 4 5 6 7 \<br /> queues 1@0 1@1 1@2 1@3 1@4 1@5 1@6 1@7 base-time 0 \<br /> sched-entry S 0x7f 900000 sched-entry S 0x80 100000 flags 0x2<br /> Unable to handle kernel paging request at virtual address ffff800009551a08<br /> Internal error: Oops: 96000007 [#1] PREEMPT SMP<br /> pc : enetc_setup_tc_taprio+0x170/0x47c<br /> lr : enetc_setup_tc_taprio+0x16c/0x47c<br /> Call trace:<br /> enetc_setup_tc_taprio+0x170/0x47c<br /> enetc_setup_tc+0x38/0x2dc<br /> taprio_change+0x43c/0x970<br /> taprio_init+0x188/0x1e0<br /> qdisc_create+0x114/0x470<br /> tc_modify_qdisc+0x1fc/0x6c0<br /> rtnetlink_rcv_msg+0x12c/0x390<br /> <br /> Split enetc_setup_tc() into separate functions for the PF and for the<br /> VF drivers. Also remove enetc_qos.o from being included into<br /> enetc-vf.ko, since it serves absolutely no purpose there.
Severity CVSS v4.0: Pending analysis
Last modification:
19/09/2025

CVE-2022-48646

Publication date:
28/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> sfc/siena: fix null pointer dereference in efx_hard_start_xmit<br /> <br /> Like in previous patch for sfc, prevent potential (but unlikely) NULL<br /> pointer dereference.
Severity CVSS v4.0: Pending analysis
Last modification:
20/03/2025

CVE-2022-48647

Publication date:
28/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> sfc: fix TX channel offset when using legacy interrupts<br /> <br /> In legacy interrupt mode the tx_channel_offset was hardcoded to 1, but<br /> that&amp;#39;s not correct if efx_sepparate_tx_channels is false. In that case,<br /> the offset is 0 because the tx queues are in the single existing channel<br /> at index 0, together with the rx queue.<br /> <br /> Without this fix, as soon as you try to send any traffic, it tries to<br /> get the tx queues from an uninitialized channel getting these errors:<br /> WARNING: CPU: 1 PID: 0 at drivers/net/ethernet/sfc/tx.c:540 efx_hard_start_xmit+0x12e/0x170 [sfc]<br /> [...]<br /> RIP: 0010:efx_hard_start_xmit+0x12e/0x170 [sfc]<br /> [...]<br /> Call Trace:<br /> <br /> dev_hard_start_xmit+0xd7/0x230<br /> sch_direct_xmit+0x9f/0x360<br /> __dev_queue_xmit+0x890/0xa40<br /> [...]<br /> BUG: unable to handle kernel NULL pointer dereference at 0000000000000020<br /> [...]<br /> RIP: 0010:efx_hard_start_xmit+0x153/0x170 [sfc]<br /> [...]<br /> Call Trace:<br /> <br /> dev_hard_start_xmit+0xd7/0x230<br /> sch_direct_xmit+0x9f/0x360<br /> __dev_queue_xmit+0x890/0xa40<br /> [...]
Severity CVSS v4.0: Pending analysis
Last modification:
03/03/2025

CVE-2022-48648

Publication date:
28/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> sfc: fix null pointer dereference in efx_hard_start_xmit<br /> <br /> Trying to get the channel from the tx_queue variable here is wrong<br /> because we can only be here if tx_queue is NULL, so we shouldn&amp;#39;t<br /> dereference it. As the above comment in the code says, this is very<br /> unlikely to happen, but it&amp;#39;s wrong anyway so let&amp;#39;s fix it.<br /> <br /> I hit this issue because of a different bug that caused tx_queue to be<br /> NULL. If that happens, this is the error message that we get here:<br /> BUG: unable to handle kernel NULL pointer dereference at 0000000000000020<br /> [...]<br /> RIP: 0010:efx_hard_start_xmit+0x153/0x170 [sfc]
Severity CVSS v4.0: Pending analysis
Last modification:
14/01/2025

CVE-2022-48649

Publication date:
28/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mm/slab_common: fix possible double free of kmem_cache<br /> <br /> When doing slub_debug test, kfence&amp;#39;s &amp;#39;test_memcache_typesafe_by_rcu&amp;#39;<br /> kunit test case cause a use-after-free error:<br /> <br /> BUG: KASAN: use-after-free in kobject_del+0x14/0x30<br /> Read of size 8 at addr ffff888007679090 by task kunit_try_catch/261<br /> <br /> CPU: 1 PID: 261 Comm: kunit_try_catch Tainted: G B N 6.0.0-rc5-next-20220916 #17<br /> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014<br /> Call Trace:<br /> <br /> dump_stack_lvl+0x34/0x48<br /> print_address_description.constprop.0+0x87/0x2a5<br /> print_report+0x103/0x1ed<br /> kasan_report+0xb7/0x140<br /> kobject_del+0x14/0x30<br /> kmem_cache_destroy+0x130/0x170<br /> test_exit+0x1a/0x30<br /> kunit_try_run_case+0xad/0xc0<br /> kunit_generic_run_threadfn_adapter+0x26/0x50<br /> kthread+0x17b/0x1b0<br /> <br /> <br /> The cause is inside kmem_cache_destroy():<br /> <br /> kmem_cache_destroy<br /> acquire lock/mutex<br /> shutdown_cache<br /> schedule_work(kmem_cache_release) (if RCU flag set)<br /> release lock/mutex<br /> kmem_cache_release (if RCU flag not set)<br /> <br /> In some certain timing, the scheduled work could be run before<br /> the next RCU flag checking, which can then get a wrong value<br /> and lead to double kmem_cache_release().<br /> <br /> Fix it by caching the RCU flag inside protected area, just like &amp;#39;refcnt&amp;#39;
Severity CVSS v4.0: Pending analysis
Last modification:
10/01/2025

CVE-2022-48650

Publication date:
28/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> scsi: qla2xxx: Fix memory leak in __qlt_24xx_handle_abts()<br /> <br /> Commit 8f394da36a36 ("scsi: qla2xxx: Drop TARGET_SCF_LOOKUP_LUN_FROM_TAG")<br /> made the __qlt_24xx_handle_abts() function return early if<br /> tcm_qla2xxx_find_cmd_by_tag() didn&amp;#39;t find a command, but it missed to clean<br /> up the allocated memory for the management command.
Severity CVSS v4.0: Pending analysis
Last modification:
20/03/2025

CVE-2022-48651

Publication date:
28/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ipvlan: Fix out-of-bound bugs caused by unset skb-&gt;mac_header<br /> <br /> If an AF_PACKET socket is used to send packets through ipvlan and the<br /> default xmit function of the AF_PACKET socket is changed from<br /> dev_queue_xmit() to packet_direct_xmit() via setsockopt() with the option<br /> name of PACKET_QDISC_BYPASS, the skb-&gt;mac_header may not be reset and<br /> remains as the initial value of 65535, this may trigger slab-out-of-bounds<br /> bugs as following:<br /> <br /> =================================================================<br /> UG: KASAN: slab-out-of-bounds in ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan]<br /> PU: 2 PID: 1768 Comm: raw_send Kdump: loaded Not tainted 6.0.0-rc4+ #6<br /> ardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-1.fc33<br /> all Trace:<br /> print_address_description.constprop.0+0x1d/0x160<br /> print_report.cold+0x4f/0x112<br /> kasan_report+0xa3/0x130<br /> ipvlan_xmit_mode_l2+0xdb/0x330 [ipvlan]<br /> ipvlan_start_xmit+0x29/0xa0 [ipvlan]<br /> __dev_direct_xmit+0x2e2/0x380<br /> packet_direct_xmit+0x22/0x60<br /> packet_snd+0x7c9/0xc40<br /> sock_sendmsg+0x9a/0xa0<br /> __sys_sendto+0x18a/0x230<br /> __x64_sys_sendto+0x74/0x90<br /> do_syscall_64+0x3b/0x90<br /> entry_SYSCALL_64_after_hwframe+0x63/0xcd<br /> <br /> The root cause is:<br /> 1. packet_snd() only reset skb-&gt;mac_header when sock-&gt;type is SOCK_RAW<br /> and skb-&gt;protocol is not specified as in packet_parse_headers()<br /> <br /> 2. packet_direct_xmit() doesn&amp;#39;t reset skb-&gt;mac_header as dev_queue_xmit()<br /> <br /> In this case, skb-&gt;mac_header is 65535 when ipvlan_xmit_mode_l2() is<br /> called. So when ipvlan_xmit_mode_l2() gets mac header with eth_hdr() which<br /> use "skb-&gt;head + skb-&gt;mac_header", out-of-bound access occurs.<br /> <br /> This patch replaces eth_hdr() with skb_eth_hdr() in ipvlan_xmit_mode_l2()<br /> and reset mac header in multicast to solve this out-of-bound bug.
Severity CVSS v4.0: Pending analysis
Last modification:
20/03/2025