Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2025-38706

Fecha de publicación:
04/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime()<br /> <br /> snd_soc_remove_pcm_runtime() might be called with rtd == NULL which will<br /> leads to null pointer dereference.<br /> This was reproduced with topology loading and marking a link as ignore<br /> due to missing hardware component on the system.<br /> On module removal the soc_tplg_remove_link() would call<br /> snd_soc_remove_pcm_runtime() with rtd == NULL since the link was ignored,<br /> no runtime was created.
Gravedad CVSS v3.1: MEDIA
Última modificación:
23/01/2026

CVE-2025-38708

Fecha de publicación:
04/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drbd: add missing kref_get in handle_write_conflicts<br /> <br /> With `two-primaries` enabled, DRBD tries to detect "concurrent" writes<br /> and handle write conflicts, so that even if you write to the same sector<br /> simultaneously on both nodes, they end up with the identical data once<br /> the writes are completed.<br /> <br /> In handling "superseeded" writes, we forgot a kref_get,<br /> resulting in a premature drbd_destroy_device and use after free,<br /> and further to kernel crashes with symptoms.<br /> <br /> Relevance: No one should use DRBD as a random data generator, and apparently<br /> all users of "two-primaries" handle concurrent writes correctly on layer up.<br /> That is cluster file systems use some distributed lock manager,<br /> and live migration in virtualization environments stops writes on one node<br /> before starting writes on the other node.<br /> <br /> Which means that other than for "test cases",<br /> this code path is never taken in real life.<br /> <br /> FYI, in DRBD 9, things are handled differently nowadays. We still detect<br /> "write conflicts", but no longer try to be smart about them.<br /> We decided to disconnect hard instead: upper layers must not submit concurrent<br /> writes. If they do, that&amp;#39;s their fault.
Gravedad CVSS v3.1: ALTA
Última modificación:
27/01/2026

CVE-2025-38699

Fecha de publicación:
04/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> scsi: bfa: Double-free fix<br /> <br /> When the bfad_im_probe() function fails during initialization, the memory<br /> pointed to by bfad-&gt;im is freed without setting bfad-&gt;im to NULL.<br /> <br /> Subsequently, during driver uninstallation, when the state machine enters<br /> the bfad_sm_stopping state and calls the bfad_im_probe_undo() function,<br /> it attempts to free the memory pointed to by bfad-&gt;im again, thereby<br /> triggering a double-free vulnerability.<br /> <br /> Set bfad-&gt;im to NULL if probing fails.
Gravedad CVSS v3.1: ALTA
Última modificación:
07/01/2026

CVE-2025-38701

Fecha de publicación:
04/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr<br /> <br /> A syzbot fuzzed image triggered a BUG_ON in ext4_update_inline_data()<br /> when an inode had the INLINE_DATA_FL flag set but was missing the<br /> system.data extended attribute.<br /> <br /> Since this can happen due to a maiciouly fuzzed file system, we<br /> shouldn&amp;#39;t BUG, but rather, report it as a corrupted file system.<br /> <br /> Add similar replacements of BUG_ON with EXT4_ERROR_INODE() ii<br /> ext4_create_inline_data() and ext4_inline_data_truncate().
Gravedad CVSS v3.1: MEDIA
Última modificación:
09/01/2026

CVE-2025-38700

Fecha de publicación:
04/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> scsi: libiscsi: Initialize iscsi_conn-&gt;dd_data only if memory is allocated<br /> <br /> In case of an ib_fast_reg_mr allocation failure during iSER setup, the<br /> machine hits a panic because iscsi_conn-&gt;dd_data is initialized<br /> unconditionally, even when no memory is allocated (dd_size == 0). This<br /> leads invalid pointer dereference during connection teardown.<br /> <br /> Fix by setting iscsi_conn-&gt;dd_data only if memory is actually allocated.<br /> <br /> Panic trace:<br /> ------------<br /> iser: iser_create_fastreg_desc: Failed to allocate ib_fast_reg_mr err=-12<br /> iser: iser_alloc_rx_descriptors: failed allocating rx descriptors / data buffers<br /> BUG: unable to handle page fault for address: fffffffffffffff8<br /> RIP: 0010:swake_up_locked.part.5+0xa/0x40<br /> Call Trace:<br /> complete+0x31/0x40<br /> iscsi_iser_conn_stop+0x88/0xb0 [ib_iser]<br /> iscsi_stop_conn+0x66/0xc0 [scsi_transport_iscsi]<br /> iscsi_if_stop_conn+0x14a/0x150 [scsi_transport_iscsi]<br /> iscsi_if_rx+0x1135/0x1834 [scsi_transport_iscsi]<br /> ? netlink_lookup+0x12f/0x1b0<br /> ? netlink_deliver_tap+0x2c/0x200<br /> netlink_unicast+0x1ab/0x280<br /> netlink_sendmsg+0x257/0x4f0<br /> ? _copy_from_user+0x29/0x60<br /> sock_sendmsg+0x5f/0x70
Gravedad CVSS v3.1: MEDIA
Última modificación:
09/01/2026

CVE-2025-38696

Fecha de publicación:
04/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> MIPS: Don&amp;#39;t crash in stack_top() for tasks without ABI or vDSO<br /> <br /> Not all tasks have an ABI associated or vDSO mapped,<br /> for example kthreads never do.<br /> If such a task ever ends up calling stack_top(), it will derefence the<br /> NULL ABI pointer and crash.<br /> <br /> This can for example happen when using kunit:<br /> <br /> mips_stack_top+0x28/0xc0<br /> arch_pick_mmap_layout+0x190/0x220<br /> kunit_vm_mmap_init+0xf8/0x138<br /> __kunit_add_resource+0x40/0xa8<br /> kunit_vm_mmap+0x88/0xd8<br /> usercopy_test_init+0xb8/0x240<br /> kunit_try_run_case+0x5c/0x1a8<br /> kunit_generic_run_threadfn_adapter+0x28/0x50<br /> kthread+0x118/0x240<br /> ret_from_kernel_thread+0x14/0x1c<br /> <br /> Only dereference the ABI point if it is set.<br /> <br /> The GIC page is also included as it is specific to the vDSO.<br /> Also move the randomization adjustment into the same conditional.
Gravedad CVSS v3.1: MEDIA
Última modificación:
09/01/2026

CVE-2025-38702

Fecha de publicación:
04/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> fbdev: fix potential buffer overflow in do_register_framebuffer()<br /> <br /> The current implementation may lead to buffer overflow when:<br /> 1. Unregistration creates NULL gaps in registered_fb[]<br /> 2. All array slots become occupied despite num_registered_fb
Gravedad CVSS v3.1: ALTA
Última modificación:
23/01/2026

CVE-2025-38697

Fecha de publicación:
04/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> jfs: upper bound check of tree index in dbAllocAG<br /> <br /> When computing the tree index in dbAllocAG, we never check if we are<br /> out of bounds realative to the size of the stree.<br /> This could happen in a scenario where the filesystem metadata are<br /> corrupted.
Gravedad CVSS v3.1: ALTA
Última modificación:
26/01/2026

CVE-2025-38698

Fecha de publicación:
04/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> jfs: Regular file corruption check<br /> <br /> The reproducer builds a corrupted file on disk with a negative i_size value.<br /> Add a check when opening this file to avoid subsequent operation failures.
Gravedad CVSS v3.1: MEDIA
Última modificación:
26/01/2026

CVE-2025-38695

Fecha de publicación:
04/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> scsi: lpfc: Check for hdwq null ptr when cleaning up lpfc_vport structure<br /> <br /> If a call to lpfc_sli4_read_rev() from lpfc_sli4_hba_setup() fails, the<br /> resultant cleanup routine lpfc_sli4_vport_delete_fcp_xri_aborted() may<br /> occur before sli4_hba.hdwqs are allocated. This may result in a null<br /> pointer dereference when attempting to take the abts_io_buf_list_lock for<br /> the first hardware queue. Fix by adding a null ptr check on<br /> phba-&gt;sli4_hba.hdwq and early return because this situation means there<br /> must have been an error during port initialization.
Gravedad CVSS v3.1: MEDIA
Última modificación:
09/01/2026

CVE-2025-38693

Fecha de publicación:
04/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> media: dvb-frontends: w7090p: fix null-ptr-deref in w7090p_tuner_write_serpar and w7090p_tuner_read_serpar<br /> <br /> In w7090p_tuner_write_serpar, msg is controlled by user. When msg[0].buf is null and msg[0].len is zero, former checks on msg[0].buf would be passed. If accessing msg[0].buf[2] without sanity check, null pointer deref would happen. We add<br /> check on msg[0].len to prevent crash.<br /> <br /> Similar commit: commit 0ed554fd769a ("media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()")
Gravedad CVSS v3.1: MEDIA
Última modificación:
09/01/2026

CVE-2025-38691

Fecha de publicación:
04/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> pNFS: Fix uninited ptr deref in block/scsi layout<br /> <br /> The error occurs on the third attempt to encode extents. When function<br /> ext_tree_prepare_commit() reallocates a larger buffer to retry encoding<br /> extents, the "layoutupdate_pages" page array is initialized only after the<br /> retry loop. But ext_tree_free_commitdata() is called on every iteration<br /> and tries to put pages in the array, thus dereferencing uninitialized<br /> pointers.<br /> <br /> An additional problem is that there is no limit on the maximum possible<br /> buffer_size. When there are too many extents, the client may create a<br /> layoutcommit that is larger than the maximum possible RPC size accepted<br /> by the server.<br /> <br /> During testing, we observed two typical scenarios. First, one memory page<br /> for extents is enough when we work with small files, append data to the<br /> end of the file, or preallocate extents before writing. But when we fill<br /> a new large file without preallocating, the number of extents can be huge,<br /> and counting the number of written extents in ext_tree_encode_commit()<br /> does not help much. Since this number increases even more between<br /> unlocking and locking of ext_tree, the reallocated buffer may not be<br /> large enough again and again.
Gravedad CVSS v3.1: MEDIA
Última modificación:
09/01/2026