Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las últimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las últimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las últimas vulnerabilidades incorporadas al repositorio.

CVE-2025-68177

Fecha de publicación:
16/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> cpufreq/longhaul: handle NULL policy in longhaul_exit<br /> <br /> longhaul_exit() was calling cpufreq_cpu_get(0) without checking<br /> for a NULL policy pointer. On some systems, this could lead to a<br /> NULL dereference and a kernel warning or panic.<br /> <br /> This patch adds a check using unlikely() and returns early if the<br /> policy is NULL.<br /> <br /> Bugzilla: #219962
Gravedad: Pendiente de análisis
Última modificación:
15/04/2026

CVE-2025-68178

Fecha de publicación:
16/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> blk-cgroup: fix possible deadlock while configuring policy<br /> <br /> Following deadlock can be triggered easily by lockdep:<br /> <br /> WARNING: possible circular locking dependency detected<br /> 6.17.0-rc3-00124-ga12c2658ced0 #1665 Not tainted<br /> ------------------------------------------------------<br /> check/1334 is trying to acquire lock:<br /> ff1100011d9d0678 (&amp;q-&gt;sysfs_lock){+.+.}-{4:4}, at: blk_unregister_queue+0x53/0x180<br /> <br /> but task is already holding lock:<br /> ff1100011d9d00e0 (&amp;q-&gt;q_usage_counter(queue)#3){++++}-{0:0}, at: del_gendisk+0xba/0x110<br /> <br /> which lock already depends on the new lock.<br /> <br /> the existing dependency chain (in reverse order) is:<br /> <br /> -&gt; #2 (&amp;q-&gt;q_usage_counter(queue)#3){++++}-{0:0}:<br /> blk_queue_enter+0x40b/0x470<br /> blkg_conf_prep+0x7b/0x3c0<br /> tg_set_limit+0x10a/0x3e0<br /> cgroup_file_write+0xc6/0x420<br /> kernfs_fop_write_iter+0x189/0x280<br /> vfs_write+0x256/0x490<br /> ksys_write+0x83/0x190<br /> __x64_sys_write+0x21/0x30<br /> x64_sys_call+0x4608/0x4630<br /> do_syscall_64+0xdb/0x6b0<br /> entry_SYSCALL_64_after_hwframe+0x76/0x7e<br /> <br /> -&gt; #1 (&amp;q-&gt;rq_qos_mutex){+.+.}-{4:4}:<br /> __mutex_lock+0xd8/0xf50<br /> mutex_lock_nested+0x2b/0x40<br /> wbt_init+0x17e/0x280<br /> wbt_enable_default+0xe9/0x140<br /> blk_register_queue+0x1da/0x2e0<br /> __add_disk+0x38c/0x5d0<br /> add_disk_fwnode+0x89/0x250<br /> device_add_disk+0x18/0x30<br /> virtblk_probe+0x13a3/0x1800<br /> virtio_dev_probe+0x389/0x610<br /> really_probe+0x136/0x620<br /> __driver_probe_device+0xb3/0x230<br /> driver_probe_device+0x2f/0xe0<br /> __driver_attach+0x158/0x250<br /> bus_for_each_dev+0xa9/0x130<br /> driver_attach+0x26/0x40<br /> bus_add_driver+0x178/0x3d0<br /> driver_register+0x7d/0x1c0<br /> __register_virtio_driver+0x2c/0x60<br /> virtio_blk_init+0x6f/0xe0<br /> do_one_initcall+0x94/0x540<br /> kernel_init_freeable+0x56a/0x7b0<br /> kernel_init+0x2b/0x270<br /> ret_from_fork+0x268/0x4c0<br /> ret_from_fork_asm+0x1a/0x30<br /> <br /> -&gt; #0 (&amp;q-&gt;sysfs_lock){+.+.}-{4:4}:<br /> __lock_acquire+0x1835/0x2940<br /> lock_acquire+0xf9/0x450<br /> __mutex_lock+0xd8/0xf50<br /> mutex_lock_nested+0x2b/0x40<br /> blk_unregister_queue+0x53/0x180<br /> __del_gendisk+0x226/0x690<br /> del_gendisk+0xba/0x110<br /> sd_remove+0x49/0xb0 [sd_mod]<br /> device_remove+0x87/0xb0<br /> device_release_driver_internal+0x11e/0x230<br /> device_release_driver+0x1a/0x30<br /> bus_remove_device+0x14d/0x220<br /> device_del+0x1e1/0x5a0<br /> __scsi_remove_device+0x1ff/0x2f0<br /> scsi_remove_device+0x37/0x60<br /> sdev_store_delete+0x77/0x100<br /> dev_attr_store+0x1f/0x40<br /> sysfs_kf_write+0x65/0x90<br /> kernfs_fop_write_iter+0x189/0x280<br /> vfs_write+0x256/0x490<br /> ksys_write+0x83/0x190<br /> __x64_sys_write+0x21/0x30<br /> x64_sys_call+0x4608/0x4630<br /> do_syscall_64+0xdb/0x6b0<br /> entry_SYSCALL_64_after_hwframe+0x76/0x7e<br /> <br /> other info that might help us debug this:<br /> <br /> Chain exists of:<br /> &amp;q-&gt;sysfs_lock --&gt; &amp;q-&gt;rq_qos_mutex --&gt; &amp;q-&gt;q_usage_counter(queue)#3<br /> <br /> Possible unsafe locking scenario:<br /> <br /> CPU0 CPU1<br /> ---- ----<br /> lock(&amp;q-&gt;q_usage_counter(queue)#3);<br /> lock(&amp;q-&gt;rq_qos_mutex);<br /> lock(&amp;q-&gt;q_usage_counter(queue)#3);<br /> lock(&amp;q-&gt;sysfs_lock);<br /> <br /> Root cause is that queue_usage_counter is grabbed with rq_qos_mutex<br /> held in blkg_conf_prep(), while queue should be freezed before<br /> rq_qos_mutex from other context.<br /> <br /> The blk_queue_enter() from blkg_conf_prep() is used to protect against<br /> policy deactivation, which is already protected with blkcg_mutex, hence<br /> convert blk_queue_enter() to blkcg_mutex to fix this problem. Meanwhile,<br /> consider that blkcg_mutex is held after queue is freezed from policy<br /> deactivation, also convert blkg_alloc() to use GFP_NOIO.
Gravedad: Pendiente de análisis
Última modificación:
15/04/2026

CVE-2025-68179

Fecha de publicación:
16/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> s390: Disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP<br /> <br /> As reported by Luiz Capitulino enabling HVO on s390 leads to reproducible<br /> crashes. The problem is that kernel page tables are modified without<br /> flushing corresponding TLB entries.<br /> <br /> Even if it looks like the empty flush_tlb_all() implementation on s390 is<br /> the problem, it is actually a different problem: on s390 it is not allowed<br /> to replace an active/valid page table entry with another valid page table<br /> entry without the detour over an invalid entry. A direct replacement may<br /> lead to random crashes and/or data corruption.<br /> <br /> In order to invalidate an entry special instructions have to be used<br /> (e.g. ipte or idte). Alternatively there are also special instructions<br /> available which allow to replace a valid entry with a different valid<br /> entry (e.g. crdte or cspg).<br /> <br /> Given that the HVO code currently does not provide the hooks to allow for<br /> an implementation which is compliant with the s390 architecture<br /> requirements, disable ARCH_WANT_OPTIMIZE_HUGETLB_VMEMMAP again, which is<br /> basically a revert of the original patch which enabled it.
Gravedad: Pendiente de análisis
Última modificación:
15/04/2026

CVE-2025-40361

Fecha de publicación:
16/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Gravedad: Pendiente de análisis
Última modificación:
09/01/2026

CVE-2025-40362

Fecha de publicación:
16/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ceph: fix multifs mds auth caps issue<br /> <br /> The mds auth caps check should also validate the<br /> fsname along with the associated caps. Not doing<br /> so would result in applying the mds auth caps of<br /> one fs on to the other fs in a multifs ceph cluster.<br /> The bug causes multiple issues w.r.t user<br /> authentication, following is one such example.<br /> <br /> Steps to Reproduce (on vstart cluster):<br /> 1. Create two file systems in a cluster, say &amp;#39;fsname1&amp;#39; and &amp;#39;fsname2&amp;#39;<br /> 2. Authorize read only permission to the user &amp;#39;client.usr&amp;#39; on fs &amp;#39;fsname1&amp;#39;<br /> $ceph fs authorize fsname1 client.usr / r<br /> 3. Authorize read and write permission to the same user &amp;#39;client.usr&amp;#39; on fs &amp;#39;fsname2&amp;#39;<br /> $ceph fs authorize fsname2 client.usr / rw<br /> 4. Update the keyring<br /> $ceph auth get client.usr &gt;&gt; ./keyring<br /> <br /> With above permssions for the user &amp;#39;client.usr&amp;#39;, following is the<br /> expectation.<br /> a. The &amp;#39;client.usr&amp;#39; should be able to only read the contents<br /> and not allowed to create or delete files on file system &amp;#39;fsname1&amp;#39;.<br /> b. The &amp;#39;client.usr&amp;#39; should be able to read/write on file system &amp;#39;fsname2&amp;#39;.<br /> <br /> But, with this bug, the &amp;#39;client.usr&amp;#39; is allowed to read/write on file<br /> system &amp;#39;fsname1&amp;#39;. See below.<br /> <br /> 5. Mount the file system &amp;#39;fsname1&amp;#39; with the user &amp;#39;client.usr&amp;#39;<br /> $sudo bin/mount.ceph usr@.fsname1=/ /kmnt_fsname1_usr/<br /> 6. Try creating a file on file system &amp;#39;fsname1&amp;#39; with user &amp;#39;client.usr&amp;#39;. This<br /> should fail but passes with this bug.<br /> $touch /kmnt_fsname1_usr/file1<br /> 7. Mount the file system &amp;#39;fsname1&amp;#39; with the user &amp;#39;client.admin&amp;#39; and create a<br /> file.<br /> $sudo bin/mount.ceph admin@.fsname1=/ /kmnt_fsname1_admin<br /> $echo "data" &gt; /kmnt_fsname1_admin/admin_file1<br /> 8. Try removing an existing file on file system &amp;#39;fsname1&amp;#39; with the user<br /> &amp;#39;client.usr&amp;#39;. This shoudn&amp;#39;t succeed but succeeds with the bug.<br /> $rm -f /kmnt_fsname1_usr/admin_file1<br /> <br /> For more information, please take a look at the corresponding mds/fuse patch<br /> and tests added by looking into the tracker mentioned below.<br /> <br /> v2: Fix a possible null dereference in doutc<br /> v3: Don&amp;#39;t store fsname from mdsmap, validate against<br /> ceph_mount_options&amp;#39;s fsname and use it<br /> v4: Code refactor, better warning message and<br /> fix possible compiler warning<br /> <br /> [ Slava.Dubeyko: "fsname check failed" -&gt; "fsname mismatch" ]
Gravedad: Pendiente de análisis
Última modificación:
15/04/2026

CVE-2025-40363

Fecha de publicación:
16/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> net: ipv6: fix field-spanning memcpy warning in AH output<br /> <br /> Fix field-spanning memcpy warnings in ah6_output() and<br /> ah6_output_done() where extension headers are copied to/from IPv6<br /> address fields, triggering fortify-string warnings about writes beyond<br /> the 16-byte address fields.<br /> <br /> memcpy: detected field-spanning write (size 40) of single field "&amp;top_iph-&gt;saddr" at net/ipv6/ah6.c:439 (size 16)<br /> WARNING: CPU: 0 PID: 8838 at net/ipv6/ah6.c:439 ah6_output+0xe7e/0x14e0 net/ipv6/ah6.c:439<br /> <br /> The warnings are false positives as the extension headers are<br /> intentionally placed after the IPv6 header in memory. Fix by properly<br /> copying addresses and extension headers separately, and introduce<br /> helper functions to avoid code duplication.
Gravedad: Pendiente de análisis
Última modificación:
15/04/2026

CVE-2025-68167

Fecha de publicación:
16/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> gpiolib: fix invalid pointer access in debugfs<br /> <br /> If the memory allocation in gpiolib_seq_start() fails, the s-&gt;private<br /> field remains uninitialized and is later dereferenced without checking<br /> in gpiolib_seq_stop(). Initialize s-&gt;private to NULL before calling<br /> kzalloc() and check it before dereferencing it.
Gravedad: Pendiente de análisis
Última modificación:
15/04/2026

CVE-2025-68168

Fecha de publicación:
16/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> jfs: fix uninitialized waitqueue in transaction manager<br /> <br /> The transaction manager initialization in txInit() was not properly<br /> initializing TxBlock[0].waitor waitqueue, causing a crash when<br /> txEnd(0) is called on read-only filesystems.<br /> <br /> When a filesystem is mounted read-only, txBegin() returns tid=0 to<br /> indicate no transaction. However, txEnd(0) still gets called and<br /> tries to access TxBlock[0].waitor via tid_to_tblock(0), but this<br /> waitqueue was never initialized because the initialization loop<br /> started at index 1 instead of 0.<br /> <br /> This causes a &amp;#39;non-static key&amp;#39; lockdep warning and system crash:<br /> INFO: trying to register non-static key in txEnd<br /> <br /> Fix by ensuring all transaction blocks including TxBlock[0] have<br /> their waitqueues properly initialized during txInit().
Gravedad: Pendiente de análisis
Última modificación:
15/04/2026

CVE-2025-68169

Fecha de publicación:
16/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> netpoll: Fix deadlock in memory allocation under spinlock<br /> <br /> Fix a AA deadlock in refill_skbs() where memory allocation while holding<br /> skb_pool-&gt;lock can trigger a recursive lock acquisition attempt.<br /> <br /> The deadlock scenario occurs when the system is under severe memory<br /> pressure:<br /> <br /> 1. refill_skbs() acquires skb_pool-&gt;lock (spinlock)<br /> 2. alloc_skb() is called while holding the lock<br /> 3. Memory allocator fails and calls slab_out_of_memory()<br /> 4. This triggers printk() for the OOM warning<br /> 5. The console output path calls netpoll_send_udp()<br /> 6. netpoll_send_udp() attempts to acquire the same skb_pool-&gt;lock<br /> 7. Deadlock: the lock is already held by the same CPU<br /> <br /> Call stack:<br /> refill_skbs()<br /> spin_lock_irqsave(&amp;skb_pool-&gt;lock) lock)
Gravedad: Pendiente de análisis
Última modificación:
15/04/2026

CVE-2025-68170

Fecha de publicación:
16/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/radeon: Do not kfree() devres managed rdev<br /> <br /> Since the allocation of the drivers main structure was changed to<br /> devm_drm_dev_alloc() rdev is managed by devres and we shouldn&amp;#39;t be calling<br /> kfree() on it.<br /> <br /> This fixes things exploding if the driver probe fails and devres cleans up<br /> the rdev after we already free&amp;#39;d it.<br /> <br /> (cherry picked from commit 16c0681617b8a045773d4d87b6140002fa75b03b)
Gravedad: Pendiente de análisis
Última modificación:
15/04/2026

CVE-2025-68171

Fecha de publicación:
16/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> x86/fpu: Ensure XFD state on signal delivery<br /> <br /> Sean reported [1] the following splat when running KVM tests:<br /> <br /> WARNING: CPU: 232 PID: 15391 at xfd_validate_state+0x65/0x70<br /> Call Trace:<br /> <br /> fpu__clear_user_states+0x9c/0x100<br /> arch_do_signal_or_restart+0x142/0x210<br /> exit_to_user_mode_loop+0x55/0x100<br /> do_syscall_64+0x205/0x2c0<br /> entry_SYSCALL_64_after_hwframe+0x4b/0x53<br /> <br /> Chao further identified [2] a reproducible scenario involving signal<br /> delivery: a non-AMX task is preempted by an AMX-enabled task which<br /> modifies the XFD MSR.<br /> <br /> When the non-AMX task resumes and reloads XSTATE with init values,<br /> a warning is triggered due to a mismatch between fpstate::xfd and the<br /> CPU&amp;#39;s current XFD state. fpu__clear_user_states() does not currently<br /> re-synchronize the XFD state after such preemption.<br /> <br /> Invoke xfd_update_state() which detects and corrects the mismatch if<br /> there is a dynamic feature.<br /> <br /> This also benefits the sigreturn path, as fpu__restore_sig() may call<br /> fpu__clear_user_states() when the sigframe is inaccessible.<br /> <br /> [ dhansen: minor changelog munging ]
Gravedad: Pendiente de análisis
Última modificación:
15/04/2026

CVE-2025-40352

Fecha de publicación:
16/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> platform/mellanox: mlxbf-pmc: add sysfs_attr_init() to count_clock init<br /> <br /> The lock-related debug logic (CONFIG_LOCK_STAT) in the kernel is noting<br /> the following warning when the BlueField-3 SOC is booted:<br /> <br /> BUG: key ffff00008a3402a8 has not been registered!<br /> ------------[ cut here ]------------<br /> DEBUG_LOCKS_WARN_ON(1)<br /> WARNING: CPU: 4 PID: 592 at kernel/locking/lockdep.c:4801 lockdep_init_map_type+0x1d4/0x2a0<br /> <br /> Call trace:<br /> lockdep_init_map_type+0x1d4/0x2a0<br /> __kernfs_create_file+0x84/0x140<br /> sysfs_add_file_mode_ns+0xcc/0x1cc<br /> internal_create_group+0x110/0x3d4<br /> internal_create_groups.part.0+0x54/0xcc<br /> sysfs_create_groups+0x24/0x40<br /> device_add+0x6e8/0x93c<br /> device_register+0x28/0x40<br /> __hwmon_device_register+0x4b0/0x8a0<br /> devm_hwmon_device_register_with_groups+0x7c/0xe0<br /> mlxbf_pmc_probe+0x1e8/0x3e0 [mlxbf_pmc]<br /> platform_probe+0x70/0x110<br /> <br /> The mlxbf_pmc driver must call sysfs_attr_init() during the<br /> initialization of the "count_clock" data structure to avoid<br /> this warning.
Gravedad: Pendiente de análisis
Última modificación:
15/04/2026