Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2024-26832

Publication date:
17/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> mm: zswap: fix missing folio cleanup in writeback race path<br /> <br /> In zswap_writeback_entry(), after we get a folio from<br /> __read_swap_cache_async(), we grab the tree lock again to check that the<br /> swap entry was not invalidated and recycled. If it was, we delete the<br /> folio we just added to the swap cache and exit.<br /> <br /> However, __read_swap_cache_async() returns the folio locked when it is<br /> newly allocated, which is always true for this path, and the folio is<br /> ref&amp;#39;d. Make sure to unlock and put the folio before returning.<br /> <br /> This was discovered by code inspection, probably because this path handles<br /> a race condition that should not happen often, and the bug would not crash<br /> the system, it will only strand the folio indefinitely.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2025

CVE-2024-26833

Publication date:
17/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amd/display: Fix memory leak in dm_sw_fini()<br /> <br /> After destroying dmub_srv, the memory associated with it is<br /> not freed, causing a memory leak:<br /> <br /> unreferenced object 0xffff896302b45800 (size 1024):<br /> comm "(udev-worker)", pid 222, jiffies 4294894636<br /> hex dump (first 32 bytes):<br /> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................<br /> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................<br /> backtrace (crc 6265fd77):<br /> [] kmalloc_trace+0x29d/0x340<br /> [] dm_dmub_sw_init+0xb4/0x450 [amdgpu]<br /> [] dm_sw_init+0x15/0x2b0 [amdgpu]<br /> [] amdgpu_device_init+0x1417/0x24e0 [amdgpu]<br /> [] amdgpu_driver_load_kms+0x15/0x190 [amdgpu]<br /> [] amdgpu_pci_probe+0x187/0x4e0 [amdgpu]<br /> [] local_pci_probe+0x3e/0x90<br /> [] pci_device_probe+0xc3/0x230<br /> [] really_probe+0xe2/0x480<br /> [] __driver_probe_device+0x78/0x160<br /> [] driver_probe_device+0x1f/0x90<br /> [] __driver_attach+0xce/0x1c0<br /> [] bus_for_each_dev+0x70/0xc0<br /> [] bus_add_driver+0x112/0x210<br /> [] driver_register+0x55/0x100<br /> [] do_one_initcall+0x41/0x300<br /> <br /> Fix this by freeing dmub_srv after destroying it.
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2025

CVE-2024-26834

Publication date:
17/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netfilter: nft_flow_offload: release dst in case direct xmit path is used<br /> <br /> Direct xmit does not use it since it calls dev_queue_xmit() to send<br /> packets, hence it calls dst_release().<br /> <br /> kmemleak reports:<br /> <br /> unreferenced object 0xffff88814f440900 (size 184):<br /> comm "softirq", pid 0, jiffies 4294951896<br /> hex dump (first 32 bytes):<br /> 00 60 5b 04 81 88 ff ff 00 e6 e8 82 ff ff ff ff .`[.............<br /> 21 0b 50 82 ff ff ff ff 00 00 00 00 00 00 00 00 !.P.............<br /> backtrace (crc cb2bf5d6):<br /> [] kmem_cache_alloc+0x286/0x340<br /> [] dst_alloc+0x43/0xb0<br /> [] rt_dst_alloc+0x2e/0x190<br /> [] __mkroute_output+0x244/0x980<br /> [] ip_route_output_flow+0xc0/0x160<br /> [] nf_ip_route+0xf/0x30<br /> [] nf_route+0x2d/0x60<br /> [] nft_flow_route+0x171/0x6a0 [nft_flow_offload]<br /> [] nft_flow_offload_eval+0x4e8/0x700 [nft_flow_offload]<br /> [] expr_call_ops_eval+0x53/0x330 [nf_tables]<br /> [] nft_do_chain+0x17c/0x840 [nf_tables]<br /> [] nft_do_chain_inet+0xa1/0x210 [nf_tables]<br /> [] nf_hook_slow+0x5b/0x160<br /> [] ip_forward+0x8b6/0x9b0<br /> [] ip_rcv+0x221/0x230<br /> [] __netif_receive_skb_one_core+0xfe/0x110
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2025

CVE-2024-26835

Publication date:
17/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netfilter: nf_tables: set dormant flag on hook register failure<br /> <br /> We need to set the dormant flag again if we fail to register<br /> the hooks.<br /> <br /> During memory pressure hook registration can fail and we end up<br /> with a table marked as active but no registered hooks.<br /> <br /> On table/base chain deletion, nf_tables will attempt to unregister<br /> the hook again which yields a warn splat from the nftables core.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2025

CVE-2024-26837

Publication date:
17/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: bridge: switchdev: Skip MDB replays of deferred events on offload<br /> <br /> Before this change, generation of the list of MDB events to replay<br /> would race against the creation of new group memberships, either from<br /> the IGMP/MLD snooping logic or from user configuration.<br /> <br /> While new memberships are immediately visible to walkers of<br /> br-&gt;mdb_list, the notification of their existence to switchdev event<br /> subscribers is deferred until a later point in time. So if a replay<br /> list was generated during a time that overlapped with such a window,<br /> it would also contain a replay of the not-yet-delivered event.<br /> <br /> The driver would thus receive two copies of what the bridge internally<br /> considered to be one single event. On destruction of the bridge, only<br /> a single membership deletion event was therefore sent. As a<br /> consequence of this, drivers which reference count memberships (at<br /> least DSA), would be left with orphan groups in their hardware<br /> database when the bridge was destroyed.<br /> <br /> This is only an issue when replaying additions. While deletion events<br /> may still be pending on the deferred queue, they will already have<br /> been removed from br-&gt;mdb_list, so no duplicates can be generated in<br /> that scenario.<br /> <br /> To a user this meant that old group memberships, from a bridge in<br /> which a port was previously attached, could be reanimated (in<br /> hardware) when the port joined a new bridge, without the new bridge&amp;#39;s<br /> knowledge.<br /> <br /> For example, on an mv88e6xxx system, create a snooping bridge and<br /> immediately add a port to it:<br /> <br /> root@infix-06-0b-00:~$ ip link add dev br0 up type bridge mcast_snooping 1 &amp;&amp; \<br /> &gt; ip link set dev x3 up master br0<br /> <br /> And then destroy the bridge:<br /> <br /> root@infix-06-0b-00:~$ ip link del dev br0<br /> root@infix-06-0b-00:~$ mvls atu<br /> ADDRESS FID STATE Q F 0 1 2 3 4 5 6 7 8 9 a<br /> DEV:0 Marvell 88E6393X<br /> 33:33:00:00:00:6a 1 static - - 0 . . . . . . . . . .<br /> 33:33:ff:87:e4:3f 1 static - - 0 . . . . . . . . . .<br /> ff:ff:ff:ff:ff:ff 1 static - - 0 1 2 3 4 5 6 7 8 9 a<br /> root@infix-06-0b-00:~$<br /> <br /> The two IPv6 groups remain in the hardware database because the<br /> port (x3) is notified of the host&amp;#39;s membership twice: once via the<br /> original event and once via a replay. Since only a single delete<br /> notification is sent, the count remains at 1 when the bridge is<br /> destroyed.<br /> <br /> Then add the same port (or another port belonging to the same hardware<br /> domain) to a new bridge, this time with snooping disabled:<br /> <br /> root@infix-06-0b-00:~$ ip link add dev br1 up type bridge mcast_snooping 0 &amp;&amp; \<br /> &gt; ip link set dev x3 up master br1<br /> <br /> All multicast, including the two IPv6 groups from br0, should now be<br /> flooded, according to the policy of br1. But instead the old<br /> memberships are still active in the hardware database, causing the<br /> switch to only forward traffic to those groups towards the CPU (port<br /> 0).<br /> <br /> Eliminate the race in two steps:<br /> <br /> 1. Grab the write-side lock of the MDB while generating the replay<br /> list.<br /> <br /> This prevents new memberships from showing up while we are generating<br /> the replay list. But it leaves the scenario in which a deferred event<br /> was already generated, but not delivered, before we grabbed the<br /> lock. Therefore:<br /> <br /> 2. Make sure that no deferred version of a replay event is already<br /> enqueued to the switchdev deferred queue, before adding it to the<br /> replay list, when replaying additions.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2025

CVE-2024-26838

Publication date:
17/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> RDMA/irdma: Fix KASAN issue with tasklet<br /> <br /> KASAN testing revealed the following issue assocated with freeing an IRQ.<br /> <br /> [50006.466686] Call Trace:<br /> [50006.466691] <br /> [50006.489538] dump_stack+0x5c/0x80<br /> [50006.493475] print_address_description.constprop.6+0x1a/0x150<br /> [50006.499872] ? irdma_sc_process_ceq+0x483/0x790 [irdma]<br /> [50006.505742] ? irdma_sc_process_ceq+0x483/0x790 [irdma]<br /> [50006.511644] kasan_report.cold.11+0x7f/0x118<br /> [50006.516572] ? irdma_sc_process_ceq+0x483/0x790 [irdma]<br /> [50006.522473] irdma_sc_process_ceq+0x483/0x790 [irdma]<br /> [50006.528232] irdma_process_ceq+0xb2/0x400 [irdma]<br /> [50006.533601] ? irdma_hw_flush_wqes_callback+0x370/0x370 [irdma]<br /> [50006.540298] irdma_ceq_dpc+0x44/0x100 [irdma]<br /> [50006.545306] tasklet_action_common.isra.14+0x148/0x2c0<br /> [50006.551096] __do_softirq+0x1d0/0xaf8<br /> [50006.555396] irq_exit_rcu+0x219/0x260<br /> [50006.559670] irq_exit+0xa/0x20<br /> [50006.563320] smp_apic_timer_interrupt+0x1bf/0x690<br /> [50006.568645] apic_timer_interrupt+0xf/0x20<br /> [50006.573341] <br /> <br /> The issue is that a tasklet could be pending on another core racing<br /> the delete of the irq.<br /> <br /> Fix by insuring any scheduled tasklet is killed after deleting the<br /> irq.
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2025

CVE-2024-26839

Publication date:
17/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> IB/hfi1: Fix a memleak in init_credit_return<br /> <br /> When dma_alloc_coherent fails to allocate dd-&gt;cr_base[i].va,<br /> init_credit_return should deallocate dd-&gt;cr_base and<br /> dd-&gt;cr_base[i] that allocated before. Or those resources<br /> would be never freed and a memleak is triggered.
Severity CVSS v4.0: Pending analysis
Last modification:
14/01/2025

CVE-2024-26840

Publication date:
17/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> cachefiles: fix memory leak in cachefiles_add_cache()<br /> <br /> The following memory leak was reported after unbinding /dev/cachefiles:<br /> <br /> ==================================================================<br /> unreferenced object 0xffff9b674176e3c0 (size 192):<br /> comm "cachefilesd2", pid 680, jiffies 4294881224<br /> hex dump (first 32 bytes):<br /> 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................<br /> 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................<br /> backtrace (crc ea38a44b):<br /> [] kmem_cache_alloc+0x2d5/0x370<br /> [] prepare_creds+0x26/0x2e0<br /> [] cachefiles_determine_cache_security+0x1f/0x120<br /> [] cachefiles_add_cache+0x13c/0x3a0<br /> [] cachefiles_daemon_write+0x146/0x1c0<br /> [] vfs_write+0xcb/0x520<br /> [] ksys_write+0x69/0xf0<br /> [] do_syscall_64+0x72/0x140<br /> [] entry_SYSCALL_64_after_hwframe+0x6e/0x76<br /> ==================================================================<br /> <br /> Put the reference count of cache_cred in cachefiles_daemon_unbind() to<br /> fix the problem. And also put cache_cred in cachefiles_add_cache() error<br /> branch to avoid memory leaks.
Severity CVSS v4.0: Pending analysis
Last modification:
07/01/2025

CVE-2024-26841

Publication date:
17/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> LoongArch: Update cpu_sibling_map when disabling nonboot CPUs<br /> <br /> Update cpu_sibling_map when disabling nonboot CPUs by defining &amp; calling<br /> clear_cpu_sibling_map(), otherwise we get such errors on SMT systems:<br /> <br /> jump label: negative count!<br /> WARNING: CPU: 6 PID: 45 at kernel/jump_label.c:263 __static_key_slow_dec_cpuslocked+0xec/0x100<br /> CPU: 6 PID: 45 Comm: cpuhp/6 Not tainted 6.8.0-rc5+ #1340<br /> pc 90000000004c302c ra 90000000004c302c tp 90000001005bc000 sp 90000001005bfd20<br /> a0 000000000000001b a1 900000000224c278 a2 90000001005bfb58 a3 900000000224c280<br /> a4 900000000224c278 a5 90000001005bfb50 a6 0000000000000001 a7 0000000000000001<br /> t0 ce87a4763eb5234a t1 ce87a4763eb5234a t2 0000000000000000 t3 0000000000000000<br /> t4 0000000000000006 t5 0000000000000000 t6 0000000000000064 t7 0000000000001964<br /> t8 000000000009ebf6 u0 9000000001f2a068 s9 0000000000000000 s0 900000000246a2d8<br /> s1 ffffffffffffffff s2 ffffffffffffffff s3 90000000021518c0 s4 0000000000000040<br /> s5 9000000002151058 s6 9000000009828e40 s7 00000000000000b4 s8 0000000000000006<br /> ra: 90000000004c302c __static_key_slow_dec_cpuslocked+0xec/0x100<br /> ERA: 90000000004c302c __static_key_slow_dec_cpuslocked+0xec/0x100<br /> CRMD: 000000b0 (PLV0 -IE -DA +PG DACF=CC DACM=CC -WE)<br /> PRMD: 00000004 (PPLV0 +PIE -PWE)<br /> EUEN: 00000000 (-FPE -SXE -ASXE -BTE)<br /> ECFG: 00071c1c (LIE=2-4,10-12 VS=7)<br /> ESTAT: 000c0000 [BRK] (IS= ECode=12 EsubCode=0)<br /> PRID: 0014d000 (Loongson-64bit, Loongson-3A6000-HV)<br /> CPU: 6 PID: 45 Comm: cpuhp/6 Not tainted 6.8.0-rc5+ #1340<br /> Stack : 0000000000000000 900000000203f258 900000000179afc8 90000001005bc000<br /> 90000001005bf980 0000000000000000 90000001005bf988 9000000001fe0be0<br /> 900000000224c280 900000000224c278 90000001005bf8c0 0000000000000001<br /> 0000000000000001 ce87a4763eb5234a 0000000007f38000 90000001003f8cc0<br /> 0000000000000000 0000000000000006 0000000000000000 4c206e6f73676e6f<br /> 6f4c203a656d616e 000000000009ec99 0000000007f38000 0000000000000000<br /> 900000000214b000 9000000001fe0be0 0000000000000004 0000000000000000<br /> 0000000000000107 0000000000000009 ffffffffffafdabe 00000000000000b4<br /> 0000000000000006 90000000004c302c 9000000000224528 00005555939a0c7c<br /> 00000000000000b0 0000000000000004 0000000000000000 0000000000071c1c<br /> ...<br /> Call Trace:<br /> [] show_stack+0x48/0x1a0<br /> [] dump_stack_lvl+0x78/0xa0<br /> [] __warn+0x90/0x1a0<br /> [] report_bug+0x1b8/0x280<br /> [] do_bp+0x264/0x420<br /> [] __static_key_slow_dec_cpuslocked+0xec/0x100<br /> [] sched_cpu_deactivate+0x2fc/0x300<br /> [] cpuhp_invoke_callback+0x178/0x8a0<br /> [] cpuhp_thread_fun+0xf0/0x240<br /> [] smpboot_thread_fn+0x1dc/0x2e0<br /> [] kthread+0x140/0x160<br /> [] ret_from_kernel_thread+0xc/0xa4
Severity CVSS v4.0: Pending analysis
Last modification:
02/04/2025

CVE-2024-26842

Publication date:
17/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> scsi: ufs: core: Fix shift issue in ufshcd_clear_cmd()<br /> <br /> When task_tag &gt;= 32 (in MCQ mode) and sizeof(unsigned int) == 4, 1U
Severity CVSS v4.0: Pending analysis
Last modification:
03/03/2025

CVE-2024-26836

Publication date:
17/04/2024
In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> platform/x86: think-lmi: Fix password opcode ordering for workstations<br /> <br /> The Lenovo workstations require the password opcode to be run before<br /> the attribute value is changed (if Admin password is enabled).<br /> <br /> Tested on some Thinkpads to confirm they are OK with this order too.
Severity CVSS v4.0: Pending analysis
Last modification:
25/11/2025

CVE-2023-44227

Publication date:
17/04/2024
Missing Authorization vulnerability in Mitchell Bennis Simple File List.This issue affects Simple File List: from n/a through 6.1.9.<br /> <br />
Severity CVSS v4.0: Pending analysis
Last modification:
17/04/2024