Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2023-54277

Fecha de publicación:
30/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> fbdev: udlfb: Fix endpoint check<br /> <br /> The syzbot fuzzer detected a problem in the udlfb driver, caused by an<br /> endpoint not having the expected type:<br /> <br /> usb 1-1: Read EDID byte 0 failed: -71<br /> usb 1-1: Unable to get valid EDID from device/display<br /> ------------[ cut here ]------------<br /> usb 1-1: BOGUS urb xfer, pipe 3 != type 1<br /> WARNING: CPU: 0 PID: 9 at drivers/usb/core/urb.c:504 usb_submit_urb+0xed6/0x1880<br /> drivers/usb/core/urb.c:504<br /> Modules linked in:<br /> CPU: 0 PID: 9 Comm: kworker/0:1 Not tainted<br /> 6.4.0-rc1-syzkaller-00016-ga4422ff22142 #0<br /> Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google<br /> 04/28/2023<br /> Workqueue: usb_hub_wq hub_event<br /> RIP: 0010:usb_submit_urb+0xed6/0x1880 drivers/usb/core/urb.c:504<br /> ...<br /> Call Trace:<br /> <br /> dlfb_submit_urb+0x92/0x180 drivers/video/fbdev/udlfb.c:1980<br /> dlfb_set_video_mode+0x21f0/0x2950 drivers/video/fbdev/udlfb.c:315<br /> dlfb_ops_set_par+0x2a7/0x8d0 drivers/video/fbdev/udlfb.c:1111<br /> dlfb_usb_probe+0x149a/0x2710 drivers/video/fbdev/udlfb.c:1743<br /> <br /> The current approach for this issue failed to catch the problem<br /> because it only checks for the existence of a bulk-OUT endpoint; it<br /> doesn&amp;#39;t check whether this endpoint is the one that the driver will<br /> actually use.<br /> <br /> We can fix the problem by instead checking that the endpoint used by<br /> the driver does exist and is bulk-OUT.
Gravedad: Pendiente de análisis
Última modificación:
31/12/2025

CVE-2023-54278

Fecha de publicación:
30/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> s390/vmem: split pages when debug pagealloc is enabled<br /> <br /> Since commit bb1520d581a3 ("s390/mm: start kernel with DAT enabled")<br /> the kernel crashes early during boot when debug pagealloc is enabled:<br /> <br /> mem auto-init: stack:off, heap alloc:off, heap free:off<br /> addressing exception: 0005 ilc:2 [#1] SMP DEBUG_PAGEALLOC<br /> Modules linked in:<br /> CPU: 0 PID: 0 Comm: swapper Not tainted 6.5.0-rc3-09759-gc5666c912155 #630<br /> [..]<br /> Krnl Code: 00000000001325f6: ec5600248064 cgrj %r5,%r6,8,000000000013263e<br /> 00000000001325fc: eb880002000c srlg %r8,%r8,2<br /> #0000000000132602: b2210051 ipte %r5,%r1,%r0,0<br /> &gt;0000000000132606: b90400d1 lgr %r13,%r1<br /> 000000000013260a: 41605008 la %r6,8(%r5)<br /> 000000000013260e: a7db1000 aghi %r13,4096<br /> 0000000000132612: b221006d ipte %r6,%r13,%r0,0<br /> 0000000000132616: e3d0d0000171 lay %r13,4096(%r13)<br /> <br /> Call Trace:<br /> __kernel_map_pages+0x14e/0x320<br /> __free_pages_ok+0x23a/0x5a8)<br /> free_low_memory_core_early+0x214/0x2c8<br /> memblock_free_all+0x28/0x58<br /> mem_init+0xb6/0x228<br /> mm_core_init+0xb6/0x3b0<br /> start_kernel+0x1d2/0x5a8<br /> startup_continue+0x36/0x40<br /> Kernel panic - not syncing: Fatal exception: panic_on_oops<br /> <br /> This is caused by using large mappings on machines with EDAT1/EDAT2. Add<br /> the code to split the mappings into 4k pages if debug pagealloc is enabled<br /> by CONFIG_DEBUG_PAGEALLOC_ENABLE_DEFAULT or the debug_pagealloc kernel<br /> command line option.
Gravedad: Pendiente de análisis
Última modificación:
31/12/2025

CVE-2023-54279

Fecha de publicación:
30/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> MIPS: fw: Allow firmware to pass a empty env<br /> <br /> fw_getenv will use env entry to determine style of env,<br /> however it is legal for firmware to just pass a empty list.<br /> <br /> Check if first entry exist before running strchr to avoid<br /> null pointer dereference.
Gravedad: Pendiente de análisis
Última modificación:
31/12/2025

CVE-2023-54280

Fecha de publicación:
30/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> cifs: fix potential race when tree connecting ipc<br /> <br /> Protect access of TCP_Server_Info::hostname when building the ipc tree<br /> name as it might get freed in cifsd thread and thus causing an<br /> use-after-free bug in __tree_connect_dfs_target(). Also, while at it,<br /> update status of IPC tcon on success and then avoid any extra tree<br /> connects.
Gravedad: Pendiente de análisis
Última modificación:
31/12/2025

CVE-2023-54263

Fecha de publicación:
30/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/nouveau/kms/nv50-: init hpd_irq_lock for PIOR DP<br /> <br /> Fixes OOPS on boards with ANX9805 DP encoders.
Gravedad: Pendiente de análisis
Última modificación:
31/12/2025

CVE-2023-54264

Fecha de publicación:
30/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> fs/sysv: Null check to prevent null-ptr-deref bug<br /> <br /> sb_getblk(inode-&gt;i_sb, parent) return a null ptr and taking lock on<br /> that leads to the null-ptr-deref bug.
Gravedad: Pendiente de análisis
Última modificación:
31/12/2025

CVE-2023-54265

Fecha de publicación:
30/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> ipv6: Fix an uninit variable access bug in __ip6_make_skb()<br /> <br /> Syzbot reported a bug as following:<br /> <br /> =====================================================<br /> BUG: KMSAN: uninit-value in arch_atomic64_inc arch/x86/include/asm/atomic64_64.h:88 [inline]<br /> BUG: KMSAN: uninit-value in arch_atomic_long_inc include/linux/atomic/atomic-long.h:161 [inline]<br /> BUG: KMSAN: uninit-value in atomic_long_inc include/linux/atomic/atomic-instrumented.h:1429 [inline]<br /> BUG: KMSAN: uninit-value in __ip6_make_skb+0x2f37/0x30f0 net/ipv6/ip6_output.c:1956<br /> arch_atomic64_inc arch/x86/include/asm/atomic64_64.h:88 [inline]<br /> arch_atomic_long_inc include/linux/atomic/atomic-long.h:161 [inline]<br /> atomic_long_inc include/linux/atomic/atomic-instrumented.h:1429 [inline]<br /> __ip6_make_skb+0x2f37/0x30f0 net/ipv6/ip6_output.c:1956<br /> ip6_finish_skb include/net/ipv6.h:1122 [inline]<br /> ip6_push_pending_frames+0x10e/0x550 net/ipv6/ip6_output.c:1987<br /> rawv6_push_pending_frames+0xb12/0xb90 net/ipv6/raw.c:579<br /> rawv6_sendmsg+0x297e/0x2e60 net/ipv6/raw.c:922<br /> inet_sendmsg+0x101/0x180 net/ipv4/af_inet.c:827<br /> sock_sendmsg_nosec net/socket.c:714 [inline]<br /> sock_sendmsg net/socket.c:734 [inline]<br /> ____sys_sendmsg+0xa8e/0xe70 net/socket.c:2476<br /> ___sys_sendmsg+0x2a1/0x3f0 net/socket.c:2530<br /> __sys_sendmsg net/socket.c:2559 [inline]<br /> __do_sys_sendmsg net/socket.c:2568 [inline]<br /> __se_sys_sendmsg net/socket.c:2566 [inline]<br /> __x64_sys_sendmsg+0x367/0x540 net/socket.c:2566<br /> do_syscall_x64 arch/x86/entry/common.c:50 [inline]<br /> do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80<br /> entry_SYSCALL_64_after_hwframe+0x63/0xcd<br /> <br /> Uninit was created at:<br /> slab_post_alloc_hook mm/slab.h:766 [inline]<br /> slab_alloc_node mm/slub.c:3452 [inline]<br /> __kmem_cache_alloc_node+0x71f/0xce0 mm/slub.c:3491<br /> __do_kmalloc_node mm/slab_common.c:967 [inline]<br /> __kmalloc_node_track_caller+0x114/0x3b0 mm/slab_common.c:988<br /> kmalloc_reserve net/core/skbuff.c:492 [inline]<br /> __alloc_skb+0x3af/0x8f0 net/core/skbuff.c:565<br /> alloc_skb include/linux/skbuff.h:1270 [inline]<br /> __ip6_append_data+0x51c1/0x6bb0 net/ipv6/ip6_output.c:1684<br /> ip6_append_data+0x411/0x580 net/ipv6/ip6_output.c:1854<br /> rawv6_sendmsg+0x2882/0x2e60 net/ipv6/raw.c:915<br /> inet_sendmsg+0x101/0x180 net/ipv4/af_inet.c:827<br /> sock_sendmsg_nosec net/socket.c:714 [inline]<br /> sock_sendmsg net/socket.c:734 [inline]<br /> ____sys_sendmsg+0xa8e/0xe70 net/socket.c:2476<br /> ___sys_sendmsg+0x2a1/0x3f0 net/socket.c:2530<br /> __sys_sendmsg net/socket.c:2559 [inline]<br /> __do_sys_sendmsg net/socket.c:2568 [inline]<br /> __se_sys_sendmsg net/socket.c:2566 [inline]<br /> __x64_sys_sendmsg+0x367/0x540 net/socket.c:2566<br /> do_syscall_x64 arch/x86/entry/common.c:50 [inline]<br /> do_syscall_64+0x3d/0xb0 arch/x86/entry/common.c:80<br /> entry_SYSCALL_64_after_hwframe+0x63/0xcd<br /> <br /> It is because icmp6hdr does not in skb linear region under the scenario<br /> of SOCK_RAW socket. Access icmp6_hdr(skb)-&gt;icmp6_type directly will<br /> trigger the uninit variable access bug.<br /> <br /> Use a local variable icmp6_type to carry the correct value in different<br /> scenarios.
Gravedad: Pendiente de análisis
Última modificación:
31/12/2025

CVE-2023-54266

Fecha de publicación:
30/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> media: dvb-usb: m920x: Fix a potential memory leak in m920x_i2c_xfer()<br /> <br /> &amp;#39;read&amp;#39; is freed when it is known to be NULL, but not when a read error<br /> occurs.<br /> <br /> Revert the logic to avoid a small leak, should a m920x_read() call fail.
Gravedad: Pendiente de análisis
Última modificación:
31/12/2025

CVE-2023-54267

Fecha de publicación:
30/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> powerpc/pseries: Rework lppaca_shared_proc() to avoid DEBUG_PREEMPT<br /> <br /> lppaca_shared_proc() takes a pointer to the lppaca which is typically<br /> accessed through get_lppaca(). With DEBUG_PREEMPT enabled, this leads<br /> to checking if preemption is enabled, for example:<br /> <br /> BUG: using smp_processor_id() in preemptible [00000000] code: grep/10693<br /> caller is lparcfg_data+0x408/0x19a0<br /> CPU: 4 PID: 10693 Comm: grep Not tainted 6.5.0-rc3 #2<br /> Call Trace:<br /> dump_stack_lvl+0x154/0x200 (unreliable)<br /> check_preemption_disabled+0x214/0x220<br /> lparcfg_data+0x408/0x19a0<br /> ...<br /> <br /> This isn&amp;#39;t actually a problem however, as it does not matter which<br /> lppaca is accessed, the shared proc state will be the same.<br /> vcpudispatch_stats_procfs_init() already works around this by disabling<br /> preemption, but the lparcfg code does not, erroring any time<br /> /proc/powerpc/lparcfg is accessed with DEBUG_PREEMPT enabled.<br /> <br /> Instead of disabling preemption on the caller side, rework<br /> lppaca_shared_proc() to not take a pointer and instead directly access<br /> the lppaca, bypassing any potential preemption checks.<br /> <br /> [mpe: Rework to avoid needing a definition in paca.h and lppaca.h]
Gravedad: Pendiente de análisis
Última modificación:
31/12/2025

CVE-2023-54268

Fecha de publicación:
30/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> debugobjects: Don&amp;#39;t wake up kswapd from fill_pool()<br /> <br /> syzbot is reporting a lockdep warning in fill_pool() because the allocation<br /> from debugobjects is using GFP_ATOMIC, which is (__GFP_HIGH | __GFP_KSWAPD_RECLAIM)<br /> and therefore tries to wake up kswapd, which acquires kswapd_wait::lock.<br /> <br /> Since fill_pool() might be called with arbitrary locks held, fill_pool()<br /> should not assume that acquiring kswapd_wait::lock is safe.<br /> <br /> Use __GFP_HIGH instead and remove __GFP_NORETRY as it is pointless for<br /> !__GFP_DIRECT_RECLAIM allocation.
Gravedad: Pendiente de análisis
Última modificación:
31/12/2025

CVE-2023-54269

Fecha de publicación:
30/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> SUNRPC: double free xprt_ctxt while still in use<br /> <br /> When an RPC request is deferred, the rq_xprt_ctxt pointer is moved out<br /> of the svc_rqst into the svc_deferred_req.<br /> When the deferred request is revisited, the pointer is copied into<br /> the new svc_rqst - and also remains in the svc_deferred_req.<br /> <br /> In the (rare?) case that the request is deferred a second time, the old<br /> svc_deferred_req is reused - it still has all the correct content.<br /> However in that case the rq_xprt_ctxt pointer is NOT cleared so that<br /> when xpo_release_xprt is called, the ctxt is freed (UDP) or possible<br /> added to a free list (RDMA).<br /> When the deferred request is revisited for a second time, it will<br /> reference this ctxt which may be invalid, and the free the object a<br /> second time which is likely to oops.<br /> <br /> So change svc_defer() to *always* clear rq_xprt_ctxt, and assert that<br /> the value is now stored in the svc_deferred_req.
Gravedad: Pendiente de análisis
Última modificación:
31/12/2025

CVE-2023-54270

Fecha de publicación:
30/12/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> media: usb: siano: Fix use after free bugs caused by do_submit_urb<br /> <br /> There are UAF bugs caused by do_submit_urb(). One of the KASan reports<br /> is shown below:<br /> <br /> [ 36.403605] BUG: KASAN: use-after-free in worker_thread+0x4a2/0x890<br /> [ 36.406105] Read of size 8 at addr ffff8880059600e8 by task kworker/0:2/49<br /> [ 36.408316]<br /> [ 36.408867] CPU: 0 PID: 49 Comm: kworker/0:2 Not tainted 6.2.0-rc3-15798-g5a41237ad1d4-dir8<br /> [ 36.411696] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g15584<br /> [ 36.416157] Workqueue: 0x0 (events)<br /> [ 36.417654] Call Trace:<br /> [ 36.418546] <br /> [ 36.419320] dump_stack_lvl+0x96/0xd0<br /> [ 36.420522] print_address_description+0x75/0x350<br /> [ 36.421992] print_report+0x11b/0x250<br /> [ 36.423174] ? _raw_spin_lock_irqsave+0x87/0xd0<br /> [ 36.424806] ? __virt_addr_valid+0xcf/0x170<br /> [ 36.426069] ? worker_thread+0x4a2/0x890<br /> [ 36.427355] kasan_report+0x131/0x160<br /> [ 36.428556] ? worker_thread+0x4a2/0x890<br /> [ 36.430053] worker_thread+0x4a2/0x890<br /> [ 36.431297] ? worker_clr_flags+0x90/0x90<br /> [ 36.432479] kthread+0x166/0x190<br /> [ 36.433493] ? kthread_blkcg+0x50/0x50<br /> [ 36.434669] ret_from_fork+0x22/0x30<br /> [ 36.435923] <br /> [ 36.436684]<br /> [ 36.437215] Allocated by task 24:<br /> [ 36.438289] kasan_set_track+0x50/0x80<br /> [ 36.439436] __kasan_kmalloc+0x89/0xa0<br /> [ 36.440566] smsusb_probe+0x374/0xc90<br /> [ 36.441920] usb_probe_interface+0x2d1/0x4c0<br /> [ 36.443253] really_probe+0x1d5/0x580<br /> [ 36.444539] __driver_probe_device+0xe3/0x130<br /> [ 36.446085] driver_probe_device+0x49/0x220<br /> [ 36.447423] __device_attach_driver+0x19e/0x1b0<br /> [ 36.448931] bus_for_each_drv+0xcb/0x110<br /> [ 36.450217] __device_attach+0x132/0x1f0<br /> [ 36.451470] bus_probe_device+0x59/0xf0<br /> [ 36.452563] device_add+0x4ec/0x7b0<br /> [ 36.453830] usb_set_configuration+0xc63/0xe10<br /> [ 36.455230] usb_generic_driver_probe+0x3b/0x80<br /> [ 36.456166] printk: console [ttyGS0] disabled<br /> [ 36.456569] usb_probe_device+0x90/0x110<br /> [ 36.459523] really_probe+0x1d5/0x580<br /> [ 36.461027] __driver_probe_device+0xe3/0x130<br /> [ 36.462465] driver_probe_device+0x49/0x220<br /> [ 36.463847] __device_attach_driver+0x19e/0x1b0<br /> [ 36.465229] bus_for_each_drv+0xcb/0x110<br /> [ 36.466466] __device_attach+0x132/0x1f0<br /> [ 36.467799] bus_probe_device+0x59/0xf0<br /> [ 36.469010] device_add+0x4ec/0x7b0<br /> [ 36.470125] usb_new_device+0x863/0xa00<br /> [ 36.471374] hub_event+0x18c7/0x2220<br /> [ 36.472746] process_one_work+0x34c/0x5b0<br /> [ 36.474041] worker_thread+0x4b7/0x890<br /> [ 36.475216] kthread+0x166/0x190<br /> [ 36.476267] ret_from_fork+0x22/0x30<br /> [ 36.477447]<br /> [ 36.478160] Freed by task 24:<br /> [ 36.479239] kasan_set_track+0x50/0x80<br /> [ 36.480512] kasan_save_free_info+0x2b/0x40<br /> [ 36.481808] ____kasan_slab_free+0x122/0x1a0<br /> [ 36.483173] __kmem_cache_free+0xc4/0x200<br /> [ 36.484563] smsusb_term_device+0xcd/0xf0<br /> [ 36.485896] smsusb_probe+0xc85/0xc90<br /> [ 36.486976] usb_probe_interface+0x2d1/0x4c0<br /> [ 36.488303] really_probe+0x1d5/0x580<br /> [ 36.489498] __driver_probe_device+0xe3/0x130<br /> [ 36.491140] driver_probe_device+0x49/0x220<br /> [ 36.492475] __device_attach_driver+0x19e/0x1b0<br /> [ 36.493988] bus_for_each_drv+0xcb/0x110<br /> [ 36.495171] __device_attach+0x132/0x1f0<br /> [ 36.496617] bus_probe_device+0x59/0xf0<br /> [ 36.497875] device_add+0x4ec/0x7b0<br /> [ 36.498972] usb_set_configuration+0xc63/0xe10<br /> [ 36.500264] usb_generic_driver_probe+0x3b/0x80<br /> [ 36.501740] usb_probe_device+0x90/0x110<br /> [ 36.503084] really_probe+0x1d5/0x580<br /> [ 36.504241] __driver_probe_device+0xe3/0x130<br /> [ 36.505548] driver_probe_device+0x49/0x220<br /> [ 36.506766] __device_attach_driver+0x19e/0x1b0<br /> [ 36.508368] bus_for_each_drv+0xcb/0x110<br /> [ 36.509646] __device_attach+0x132/0x1f0<br /> [ 36.510911] bus_probe_device+0x59/0xf0<br /> [ 36.512103] device_add+0x4ec/0x7b0<br /> [ 36.513215] usb_new_device+0x863/0xa00<br /> [ 36.514736] hub_event+0x18c7/0x2220<br /> [ 36.516130] process_one_work+<br /> ---truncated---
Gravedad: Pendiente de análisis
Última modificación:
31/12/2025