Instituto Nacional de ciberseguridad. Sección Incibe
Instituto Nacional de Ciberseguridad. Sección INCIBE-CERT

Vulnerabilidades

Con el objetivo de informar, advertir y ayudar a los profesionales sobre las ultimas vulnerabilidades de seguridad en sistemas tecnológicos, ponemos a disposición de los usuarios interesados en esta información una base de datos con información en castellano sobre cada una de las ultimas vulnerabilidades documentadas y conocidas.

Este repositorio con más de 75.000 registros esta basado en la información de NVD (National Vulnerability Database) – en función de un acuerdo de colaboración – por el cual desde INCIBE realizamos la traducción al castellano de la información incluida. En ocasiones este listado mostrará vulnerabilidades que aún no han sido traducidas debido a que se recogen en el transcurso del tiempo en el que el equipo de INCIBE realiza el proceso de traducción.

Se emplea el estándar de nomenclatura de vulnerabilidades CVE (Common Vulnerabilities and Exposures), con el fin de facilitar el intercambio de información entre diferentes bases de datos y herramientas. Cada una de las vulnerabilidades recogidas enlaza a diversas fuentes de información así como a parches disponibles o soluciones aportadas por los fabricantes y desarrolladores. Es posible realizar búsquedas avanzadas teniendo la opción de seleccionar diferentes criterios como el tipo de vulnerabilidad, fabricante, tipo de impacto entre otros, con el fin de acortar los resultados.

Mediante suscripción RSS o Boletines podemos estar informados diariamente de las ultimas vulnerabilidades incorporadas al repositorio.

CVE-2023-53259

Fecha de publicación:
15/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> VMCI: check context-&gt;notify_page after call to get_user_pages_fast() to avoid GPF<br /> <br /> The call to get_user_pages_fast() in vmci_host_setup_notify() can return<br /> NULL context-&gt;notify_page causing a GPF. To avoid GPF check if<br /> context-&gt;notify_page == NULL and return error if so.<br /> <br /> general protection fault, probably for non-canonical address<br /> 0xe0009d1000000060: 0000 [#1] PREEMPT SMP KASAN NOPTI<br /> KASAN: maybe wild-memory-access in range [0x0005088000000300-<br /> 0x0005088000000307]<br /> CPU: 2 PID: 26180 Comm: repro_34802241 Not tainted 6.1.0-rc4 #1<br /> Hardware name: Red Hat KVM, BIOS 1.15.0-2.module+el8.6.0 04/01/2014<br /> RIP: 0010:vmci_ctx_check_signal_notify+0x91/0xe0<br /> Call Trace:<br /> <br /> vmci_host_unlocked_ioctl+0x362/0x1f40<br /> __x64_sys_ioctl+0x1a1/0x230<br /> do_syscall_64+0x3a/0x90<br /> entry_SYSCALL_64_after_hwframe+0x63/0xcd
Gravedad: Pendiente de análisis
Última modificación:
03/11/2025

CVE-2023-53248

Fecha de publicación:
15/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/amdgpu: install stub fence into potential unused fence pointers<br /> <br /> When using cpu to update page tables, vm update fences are unused.<br /> Install stub fence into these fence pointers instead of NULL<br /> to avoid NULL dereference when calling dma_fence_wait() on them.
Gravedad: Pendiente de análisis
Última modificación:
15/09/2025

CVE-2023-53249

Fecha de publicación:
15/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> clk: imx: clk-imx8mn: fix memory leak in imx8mn_clocks_probe<br /> <br /> Use devm_of_iomap() instead of of_iomap() to automatically handle<br /> the unused ioremap region.<br /> <br /> If any error occurs, regions allocated by kzalloc() will leak,<br /> but using devm_kzalloc() instead will automatically free the memory<br /> using devm_kfree().
Gravedad: Pendiente de análisis
Última modificación:
15/09/2025

CVE-2023-53250

Fecha de publicación:
15/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> firmware: dmi-sysfs: Fix null-ptr-deref in dmi_sysfs_register_handle<br /> <br /> KASAN reported a null-ptr-deref error:<br /> <br /> KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]<br /> CPU: 0 PID: 1373 Comm: modprobe<br /> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)<br /> RIP: 0010:dmi_sysfs_entry_release<br /> ...<br /> Call Trace:<br /> <br /> kobject_put<br /> dmi_sysfs_register_handle (drivers/firmware/dmi-sysfs.c:540) dmi_sysfs<br /> dmi_decode_table (drivers/firmware/dmi_scan.c:133)<br /> dmi_walk (drivers/firmware/dmi_scan.c:1115)<br /> dmi_sysfs_init (drivers/firmware/dmi-sysfs.c:149) dmi_sysfs<br /> do_one_initcall (init/main.c:1296)<br /> ...<br /> Kernel panic - not syncing: Fatal exception<br /> Kernel Offset: 0x4000000 from 0xffffffff81000000<br /> ---[ end Kernel panic - not syncing: Fatal exception ]---<br /> <br /> It is because previous patch added kobject_put() to release the memory<br /> which will call dmi_sysfs_entry_release() and list_del().<br /> <br /> However, list_add_tail(entry-&gt;list) is called after the error block,<br /> so the list_head is uninitialized and cannot be deleted.<br /> <br /> Move error handling to after list_add_tail to fix this.
Gravedad: Pendiente de análisis
Última modificación:
15/09/2025

CVE-2023-53251

Fecha de publicación:
15/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> wifi: iwlwifi: pcie: fix NULL pointer dereference in iwl_pcie_irq_rx_msix_handler()<br /> <br /> rxq can be NULL only when trans_pcie-&gt;rxq is NULL and entry-&gt;entry<br /> is zero. For the case when entry-&gt;entry is not equal to 0, rxq<br /> won&amp;#39;t be NULL even if trans_pcie-&gt;rxq is NULL. Modify checker to<br /> check for trans_pcie-&gt;rxq.
Gravedad: Pendiente de análisis
Última modificación:
15/09/2025

CVE-2023-53252

Fecha de publicación:
15/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> Bluetooth: use RCU for hci_conn_params and iterate safely in hci_sync<br /> <br /> hci_update_accept_list_sync iterates over hdev-&gt;pend_le_conns and<br /> hdev-&gt;pend_le_reports, and waits for controller events in the loop body,<br /> without holding hdev lock.<br /> <br /> Meanwhile, these lists and the items may be modified e.g. by<br /> le_scan_cleanup. This can invalidate the list cursor or any other item<br /> in the list, resulting to invalid behavior (eg use-after-free).<br /> <br /> Use RCU for the hci_conn_params action lists. Since the loop bodies in<br /> hci_sync block and we cannot use RCU or hdev-&gt;lock for the whole loop,<br /> copy list items first and then iterate on the copy. Only the flags field<br /> is written from elsewhere, so READ_ONCE/WRITE_ONCE should guarantee we<br /> read valid values.<br /> <br /> Free params everywhere with hci_conn_params_free so the cleanup is<br /> guaranteed to be done properly.<br /> <br /> This fixes the following, which can be triggered e.g. by BlueZ new<br /> mgmt-tester case "Add + Remove Device Nowait - Success", or by changing<br /> hci_le_set_cig_params to always return false, and running iso-tester:<br /> <br /> ==================================================================<br /> BUG: KASAN: slab-use-after-free in hci_update_passive_scan_sync (net/bluetooth/hci_sync.c:2536 net/bluetooth/hci_sync.c:2723 net/bluetooth/hci_sync.c:2841)<br /> Read of size 8 at addr ffff888001265018 by task kworker/u3:0/32<br /> <br /> Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-1.fc38 04/01/2014<br /> Workqueue: hci0 hci_cmd_sync_work<br /> Call Trace:<br /> <br /> dump_stack_lvl (./arch/x86/include/asm/irqflags.h:134 lib/dump_stack.c:107)<br /> print_report (mm/kasan/report.c:320 mm/kasan/report.c:430)<br /> ? __virt_addr_valid (./include/linux/mmzone.h:1915 ./include/linux/mmzone.h:2011 arch/x86/mm/physaddr.c:65)<br /> ? hci_update_passive_scan_sync (net/bluetooth/hci_sync.c:2536 net/bluetooth/hci_sync.c:2723 net/bluetooth/hci_sync.c:2841)<br /> kasan_report (mm/kasan/report.c:538)<br /> ? hci_update_passive_scan_sync (net/bluetooth/hci_sync.c:2536 net/bluetooth/hci_sync.c:2723 net/bluetooth/hci_sync.c:2841)<br /> hci_update_passive_scan_sync (net/bluetooth/hci_sync.c:2536 net/bluetooth/hci_sync.c:2723 net/bluetooth/hci_sync.c:2841)<br /> ? __pfx_hci_update_passive_scan_sync (net/bluetooth/hci_sync.c:2780)<br /> ? mutex_lock (kernel/locking/mutex.c:282)<br /> ? __pfx_mutex_lock (kernel/locking/mutex.c:282)<br /> ? __pfx_mutex_unlock (kernel/locking/mutex.c:538)<br /> ? __pfx_update_passive_scan_sync (net/bluetooth/hci_sync.c:2861)<br /> hci_cmd_sync_work (net/bluetooth/hci_sync.c:306)<br /> process_one_work (./arch/x86/include/asm/preempt.h:27 kernel/workqueue.c:2399)<br /> worker_thread (./include/linux/list.h:292 kernel/workqueue.c:2538)<br /> ? __pfx_worker_thread (kernel/workqueue.c:2480)<br /> kthread (kernel/kthread.c:376)<br /> ? __pfx_kthread (kernel/kthread.c:331)<br /> ret_from_fork (arch/x86/entry/entry_64.S:314)<br /> <br /> <br /> Allocated by task 31:<br /> kasan_save_stack (mm/kasan/common.c:46)<br /> kasan_set_track (mm/kasan/common.c:52)<br /> __kasan_kmalloc (mm/kasan/common.c:374 mm/kasan/common.c:383)<br /> hci_conn_params_add (./include/linux/slab.h:580 ./include/linux/slab.h:720 net/bluetooth/hci_core.c:2277)<br /> hci_connect_le_scan (net/bluetooth/hci_conn.c:1419 net/bluetooth/hci_conn.c:1589)<br /> hci_connect_cis (net/bluetooth/hci_conn.c:2266)<br /> iso_connect_cis (net/bluetooth/iso.c:390)<br /> iso_sock_connect (net/bluetooth/iso.c:899)<br /> __sys_connect (net/socket.c:2003 net/socket.c:2020)<br /> __x64_sys_connect (net/socket.c:2027)<br /> do_syscall_64 (arch/x86/entry/common.c:50 arch/x86/entry/common.c:80)<br /> entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:120)<br /> <br /> Freed by task 15:<br /> kasan_save_stack (mm/kasan/common.c:46)<br /> kasan_set_track (mm/kasan/common.c:52)<br /> kasan_save_free_info (mm/kasan/generic.c:523)<br /> __kasan_slab_free (mm/kasan/common.c:238 mm/kasan/common.c:200 mm/kasan/common.c:244)<br /> __kmem_cache_free (mm/slub.c:1807 mm/slub.c:3787 mm/slub.c:3800)<br /> hci_conn_params_del (net/bluetooth/hci_core.c:2323)<br /> le_scan_cleanup (net/bluetooth/hci_conn.c:202)<br /> process_one_work (./arch/x86/include/asm/preempt.<br /> ---truncated---
Gravedad: Pendiente de análisis
Última modificación:
15/09/2025

CVE-2023-53253

Fecha de publicación:
15/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> HID: nvidia-shield: Reference hid_device devm allocation of input_dev name<br /> <br /> Use hid_device for devm allocation of the input_dev name to avoid a<br /> use-after-free. input_unregister_device would trigger devres cleanup of all<br /> resources associated with the input_dev, free-ing the name. The name would<br /> subsequently be used in a uevent fired at the end of unregistering the<br /> input_dev.
Gravedad: Pendiente de análisis
Última modificación:
15/09/2025

CVE-2023-53254

Fecha de publicación:
15/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> cacheinfo: Fix shared_cpu_map to handle shared caches at different levels<br /> <br /> The cacheinfo sets up the shared_cpu_map by checking whether the caches<br /> with the same index are shared between CPUs. However, this will trigger<br /> slab-out-of-bounds access if the CPUs do not have the same cache hierarchy.<br /> Another problem is the mismatched shared_cpu_map when the shared cache does<br /> not have the same index between CPUs.<br /> <br /> CPU0 I D L3<br /> index 0 1 2 x<br /> ^ ^ ^ ^<br /> index 0 1 2 3<br /> CPU1 I D L2 L3<br /> <br /> This patch checks each cache is shared with all caches on other CPUs.
Gravedad: Pendiente de análisis
Última modificación:
15/09/2025

CVE-2023-53255

Fecha de publicación:
15/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> firmware: stratix10-svc: Fix a potential resource leak in svc_create_memory_pool()<br /> <br /> svc_create_memory_pool() is only called from stratix10_svc_drv_probe().<br /> Most of resources in the probe are managed, but not this memremap() call.<br /> <br /> There is also no memunmap() call in the file.<br /> <br /> So switch to devm_memremap() to avoid a resource leak.
Gravedad: Pendiente de análisis
Última modificación:
15/09/2025

CVE-2023-53256

Fecha de publicación:
15/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> firmware: arm_ffa: Fix FFA device names for logical partitions<br /> <br /> Each physical partition can provide multiple services each with UUID.<br /> Each such service can be presented as logical partition with a unique<br /> combination of VM ID and UUID. The number of distinct UUID in a system<br /> will be less than or equal to the number of logical partitions.<br /> <br /> However, currently it fails to register more than one logical partition<br /> or service within a physical partition as the device name contains only<br /> VM ID while both VM ID and UUID are maintained in the partition information.<br /> The kernel complains with the below message:<br /> <br /> | sysfs: cannot create duplicate filename &amp;#39;/devices/arm-ffa-8001&amp;#39;<br /> | CPU: 1 PID: 1 Comm: swapper/0 Not tainted 6.3.0-rc7 #8<br /> | Hardware name: FVP Base RevC (DT)<br /> | Call trace:<br /> | dump_backtrace+0xf8/0x118<br /> | show_stack+0x18/0x24<br /> | dump_stack_lvl+0x50/0x68<br /> | dump_stack+0x18/0x24<br /> | sysfs_create_dir_ns+0xe0/0x13c<br /> | kobject_add_internal+0x220/0x3d4<br /> | kobject_add+0x94/0x100<br /> | device_add+0x144/0x5d8<br /> | device_register+0x20/0x30<br /> | ffa_device_register+0x88/0xd8<br /> | ffa_setup_partitions+0x108/0x1b8<br /> | ffa_init+0x2ec/0x3a4<br /> | do_one_initcall+0xcc/0x240<br /> | do_initcall_level+0x8c/0xac<br /> | do_initcalls+0x54/0x94<br /> | do_basic_setup+0x1c/0x28<br /> | kernel_init_freeable+0x100/0x16c<br /> | kernel_init+0x20/0x1a0<br /> | ret_from_fork+0x10/0x20<br /> | kobject_add_internal failed for arm-ffa-8001 with -EEXIST, don&amp;#39;t try to<br /> | register things with the same name in the same directory.<br /> | arm_ffa arm-ffa: unable to register device arm-ffa-8001 err=-17<br /> | ARM FF-A: ffa_setup_partitions: failed to register partition ID 0x8001<br /> <br /> By virtue of being random enough to avoid collisions when generated in a<br /> distributed system, there is no way to compress UUID keys to the number<br /> of bits required to identify each. We can eliminate &amp;#39;-&amp;#39; in the name but<br /> it is not worth eliminating 4 bytes and add unnecessary logic for doing<br /> that. Also v1.0 doesn&amp;#39;t provide the UUID of the partitions which makes<br /> it hard to use the same for the device name.<br /> <br /> So to keep it simple, let us alloc an ID using ida_alloc() and append the<br /> same to "arm-ffa" to make up a unique device name. Also stash the id value<br /> in ffa_dev to help freeing the ID later when the device is destroyed.
Gravedad: Pendiente de análisis
Última modificación:
15/09/2025

CVE-2023-53239

Fecha de publicación:
15/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> drm/msm/mdp5: Add check for kzalloc<br /> <br /> As kzalloc may fail and return NULL pointer,<br /> it should be better to check the return value<br /> in order to avoid the NULL pointer dereference.<br /> <br /> Patchwork: https://patchwork.freedesktop.org/patch/514154/
Gravedad: Pendiente de análisis
Última modificación:
15/09/2025

CVE-2023-53240

Fecha de publicación:
15/09/2025
Idioma:
Inglés
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br /> <br /> xsk: check IFF_UP earlier in Tx path<br /> <br /> Xsk Tx can be triggered via either sendmsg() or poll() syscalls. These<br /> two paths share a call to common function xsk_xmit() which has two<br /> sanity checks within. A pseudo code example to show the two paths:<br /> <br /> __xsk_sendmsg() : xsk_poll():<br /> if (unlikely(!xsk_is_bound(xs))) if (unlikely(!xsk_is_bound(xs)))<br /> return -ENXIO; return mask;<br /> if (unlikely(need_wait)) (...)<br /> return -EOPNOTSUPP; xsk_xmit()<br /> mark napi id<br /> (...)<br /> xsk_xmit()<br /> <br /> xsk_xmit():<br /> if (unlikely(!(xs-&gt;dev-&gt;flags &amp; IFF_UP)))<br /> return -ENETDOWN;<br /> if (unlikely(!xs-&gt;tx))<br /> return -ENOBUFS;<br /> <br /> As it can be observed above, in sendmsg() napi id can be marked on<br /> interface that was not brought up and this causes a NULL ptr<br /> dereference:<br /> <br /> [31757.505631] BUG: kernel NULL pointer dereference, address: 0000000000000018<br /> [31757.512710] #PF: supervisor read access in kernel mode<br /> [31757.517936] #PF: error_code(0x0000) - not-present page<br /> [31757.523149] PGD 0 P4D 0<br /> [31757.525726] Oops: 0000 [#1] PREEMPT SMP NOPTI<br /> [31757.530154] CPU: 26 PID: 95641 Comm: xdpsock Not tainted 6.2.0-rc5+ #40<br /> [31757.536871] Hardware name: Intel Corporation S2600WFT/S2600WFT, BIOS SE5C620.86B.02.01.0008.031920191559 03/19/2019<br /> [31757.547457] RIP: 0010:xsk_sendmsg+0xde/0x180<br /> [31757.551799] Code: 00 75 a2 48 8b 00 a8 04 75 9b 84 d2 74 69 8b 85 14 01 00 00 85 c0 75 1b 48 8b 85 28 03 00 00 48 8b 80 98 00 00 00 48 8b 40 20 40 18 89 85 14 01 00 00 8b bd 14 01 00 00 81 ff 00 01 00 00 0f<br /> [31757.570840] RSP: 0018:ffffc90034f27dc0 EFLAGS: 00010246<br /> [31757.576143] RAX: 0000000000000000 RBX: ffffc90034f27e18 RCX: 0000000000000000<br /> [31757.583389] RDX: 0000000000000001 RSI: ffffc90034f27e18 RDI: ffff88984cf3c100<br /> [31757.590631] RBP: ffff88984714a800 R08: ffff88984714a800 R09: 0000000000000000<br /> [31757.597877] R10: 0000000000000001 R11: 0000000000000000 R12: 00000000fffffffa<br /> [31757.605123] R13: 0000000000000000 R14: 0000000000000003 R15: 0000000000000000<br /> [31757.612364] FS: 00007fb4c5931180(0000) GS:ffff88afdfa00000(0000) knlGS:0000000000000000<br /> [31757.620571] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033<br /> [31757.626406] CR2: 0000000000000018 CR3: 000000184b41c003 CR4: 00000000007706e0<br /> [31757.633648] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000<br /> [31757.640894] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400<br /> [31757.648139] PKRU: 55555554<br /> [31757.650894] Call Trace:<br /> [31757.653385] <br /> [31757.655524] sock_sendmsg+0x8f/0xa0<br /> [31757.659077] ? sockfd_lookup_light+0x12/0x70<br /> [31757.663416] __sys_sendto+0xfc/0x170<br /> [31757.667051] ? do_sched_setscheduler+0xdb/0x1b0<br /> [31757.671658] __x64_sys_sendto+0x20/0x30<br /> [31757.675557] do_syscall_64+0x38/0x90<br /> [31757.679197] entry_SYSCALL_64_after_hwframe+0x72/0xdc<br /> [31757.687969] Code: 8e f6 ff 44 8b 4c 24 2c 4c 8b 44 24 20 41 89 c4 44 8b 54 24 28 48 8b 54 24 18 b8 2c 00 00 00 48 8b 74 24 10 8b 7c 24 08 0f 05 3d 00 f0 ff ff 77 3a 44 89 e7 48 89 44 24 08 e8 b5 8e f6 ff 48<br /> [31757.707007] RSP: 002b:00007ffd49c73c70 EFLAGS: 00000293 ORIG_RAX: 000000000000002c<br /> [31757.714694] RAX: ffffffffffffffda RBX: 000055a996565380 RCX: 00007fb4c5727c16<br /> [31757.721939] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003<br /> [31757.729184] RBP: 0000000000000040 R08: 0000000000000000 R09: 0000000000000000<br /> [31757.736429] R10: 0000000000000040 R11: 0000000000000293 R12: 0000000000000000<br /> [31757.743673] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000<br /> [31757.754940] <br /> <br /> To fix this, let&amp;#39;s make xsk_xmit a function that will be responsible for<br /> generic Tx, where RCU is handled accordingly and pull out sanity checks<br /> and xs-&gt;zc handling. Populate sanity checks to __xsk_sendmsg() and<br /> xsk_poll().
Gravedad: Pendiente de análisis
Última modificación:
15/09/2025