ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2022-1001654 | Drivers: hv: vmbus: Deactivate sysctl_record_panic_msg by default in isolated guests | Drivers: hv: vmbus: Deactivate sysctl_record_panic_msg by default in isolated guests
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.35 by commit 1b576e81d31b56b248316b8ff816b1cc5c4407c7. For more details please see the references link. | null | 2022-04-25T06:42:04.516294Z | 2022-04-24T21:31:55.711253Z | null | null | null | null | null |
Linux | GSD-2022-1000946 | xhci: Prevent futile URB re-submissions due to incorrect return value. | xhci: Prevent futile URB re-submissions due to incorrect return value.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.304 by commit a750d0ee17404ee03b338894ebe763cbfa021397, it was introduced in version v3.11 by commit 203a86613fb3bf2767335659513fa98563a3eb71. For more details please see the references link. | null | 2022-03-18T02:58:07.365478Z | 2022-03-18T00:35:15.496260Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/203a86613fb3bf2767335659513fa98563a3eb71'} |
Linux | GSD-2021-1002304 | bpf: Forbid bpf_ktime_get_coarse_ns and bpf_timer_* in tracing progs | bpf: Forbid bpf_ktime_get_coarse_ns and bpf_timer_* in tracing progs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit 439b99314b635b40f2e0622eabe62d7055bb409b, it was introduced in version v5.11 by commit d055126180564a57fe533728a4e93d0cb53d49b3. For more details please see the references link. | null | 2021-12-20T01:31:10.928212Z | 2021-11-29T02:37:50.497136Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d055126180564a57fe533728a4e93d0cb53d49b3'} |
Linux | GSD-2021-1000339 | KEYS: trusted: Fix memory leak on object td | KEYS: trusted: Fix memory leak on object td
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.38 by commit 31c9a4b24d86cbb36ff0d7a085725a3b4f0138c8, it was introduced in version v5.10.20 by commit 9d83cc1a1e7f494aedee2aa108e801d11525fccf. For more details please see the references link. | null | 2021-12-19T22:00:44.995069Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9d83cc1a1e7f494aedee2aa108e801d11525fccf'} |
Linux | GSD-2021-1000293 | crypto: sun8i-ss - Fix memory leak of object d when dma_iv fails to map | crypto: sun8i-ss - Fix memory leak of object d when dma_iv fails to map
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 6516cb852d704ff8d615de1f93cd443a99736c3d, it was introduced in version v5.10 by commit ac2614d721dea2ff273af19c6c5d508d58a2bb3e. For more details please see the references link. | null | 2021-12-19T22:11:39.070143Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac2614d721dea2ff273af19c6c5d508d58a2bb3e'} |
Linux | GSD-2022-1001204 | bpf, sockmap: Fix double uncharge the mem of sk_msg | bpf, sockmap: Fix double uncharge the mem of sk_msg
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit ac3ecb7760c750c8e4fc09c719241d8e6e88028c, it was introduced in version v4.20 by commit 604326b41a6fb9b4a78b6179335decee0365cd8c. For more details please see the references link. | null | 2022-04-25T06:52:44.782085Z | 2022-04-24T20:53:30.169299Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/604326b41a6fb9b4a78b6179335decee0365cd8c'} |
Linux | GSD-2021-1002754 | net: systemport: Add global locking for descriptor lifecycle | net: systemport: Add global locking for descriptor lifecycle
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit eb4687c7442942e115420a30185f8d83faf37696, it was introduced in version v3.16 by commit 80105befdb4b8cea924711b40b2462b87df65b62. For more details please see the references link. | null | 2022-01-11T06:00:04.750457Z | 2021-12-27T05:48:23.238174Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80105befdb4b8cea924711b40b2462b87df65b62'} |
Linux | GSD-2021-1000769 | ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions | ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.43 by commit 09870235827451409ff546b073d754a19fd17e2e, it was introduced in version v5.3 by commit f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74. For more details please see the references link. | null | 2021-12-20T00:05:59.153212Z | 2021-06-25T00:04:26.759646Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74'} |
Linux | GSD-2021-1002241 | scsi: advansys: Fix kernel pointer leak | scsi: advansys: Fix kernel pointer leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.256 by commit 5612287991debe310c914600599bd59511ababfb. For more details please see the references link. | null | 2021-12-19T22:46:49.169209Z | 2021-11-29T02:34:51.821078Z | null | null | null | null | null |
Linux | GSD-2021-1000786 | x86/kvm: Disable kvmclock on all CPUs on shutdown | x86/kvm: Disable kvmclock on all CPUs on shutdown
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.43 by commit 3b0becf8b1ecf642a9edaf4c9628ffc641e490d6, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T22:40:58.715062Z | 2021-06-25T00:05:34.436713Z | null | null | null | null | null |
Linux | GSD-2021-1001894 | KVM: arm64: Fix host stage-2 PGD refcount | KVM: arm64: Fix host stage-2 PGD refcount
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit b372264c66ef78f2cab44e877fbd765ad6d24c39, it was introduced in version v5.13 by commit 1025c8c0c6accfcbdc8f52ca1940160f65cd87d6. For more details please see the references link. | null | 2021-12-20T00:48:59.393921Z | 2021-10-28T13:54:29.729318Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1025c8c0c6accfcbdc8f52ca1940160f65cd87d6'} |
Linux | GSD-2022-1001711 | Bluetooth: Fix use after free in hci_send_acl | Bluetooth: Fix use after free in hci_send_acl
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit d404765dffdbd8dcd14758695d0c96c52fb2e624. For more details please see the references link. | null | 2022-04-25T04:10:32.582527Z | 2022-04-24T21:36:58.035483Z | null | null | null | null | null |
Linux | GSD-2022-1000803 | net-timestamp: convert sk->sk_tskey to atomic_t | net-timestamp: convert sk->sk_tskey to atomic_t
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.26 by commit ff999198ec2149a6b83edb083293c91ec027f56f, it was introduced in version v3.17 by commit 09c2d251b70723650ba47e83571ff49281320f7c. For more details please see the references link. | null | 2022-03-18T02:57:12.796411Z | 2022-03-18T00:19:52.076466Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/09c2d251b70723650ba47e83571ff49281320f7c'} |
Linux | GSD-2021-1002611 | net: netlink: af_netlink: Prevent empty skb by adding a check on len. | net: netlink: af_netlink: Prevent empty skb by adding a check on len.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.296 by commit c54a60c8fbaa774f828e26df79f66229a8a0e010. For more details please see the references link. | null | 2022-01-11T05:46:16.649516Z | 2021-12-27T05:27:09.963506Z | null | null | null | null | null |
Linux | GSD-2022-1001341 | drm/panel: ili9341: fix optional regulator handling | drm/panel: ili9341: fix optional regulator handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit e3d982c111a6c033671dd6084b07f62fbf50f76f, it was introduced in version v5.15 by commit 5a04227326b04c15b015181772f5c853172fdb68. For more details please see the references link. | null | 2022-04-25T04:56:49.410667Z | 2022-04-24T21:06:03.220513Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5a04227326b04c15b015181772f5c853172fdb68'} |
Linux | GSD-2021-1001197 | NFSv4: Initialise connection to the server in nfs4_alloc_client() | NFSv4: Initialise connection to the server in nfs4_alloc_client()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.4 by commit b0bfac939030181177373f549398ba94c384713d, it was introduced in version v4.8 by commit 5c6e5b60aae4347223f176966455010a5715b863. For more details please see the references link. | null | 2021-12-20T01:11:00.812853Z | 2021-08-03T01:34:46.428855Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5c6e5b60aae4347223f176966455010a5715b863'} |
Linux | GSD-2022-1000100 | rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev | rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.265 by commit 74d85e9fbc7022a4011102c7474a9c7aeb704a35, it was introduced in version v4.11 by commit c0cdc19f84a4712cf74888f83af286e3c2e14efd. For more details please see the references link. | null | 2022-02-19T15:30:51.285708Z | 2022-02-18T21:35:11.969552Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c0cdc19f84a4712cf74888f83af286e3c2e14efd'} |
Linux | GSD-2022-1002097 | ath9k_htc: fix uninit value bugs | ath9k_htc: fix uninit value bugs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 11f11ac281f0c0b363d2940204f28bae0422ed71, it was introduced in version v2.6.35 by commit fb9987d0f748c983bb795a86f47522313f701a08. For more details please see the references link. | null | 2022-04-25T06:42:19.813268Z | 2022-04-24T22:10:51.878536Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb9987d0f748c983bb795a86f47522313f701a08'} |
Linux | GSD-2022-1000550 | net: dsa: lantiq_gswip: fix use after free in gswip_remove() | net: dsa: lantiq_gswip: fix use after free in gswip_remove()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit c61f599b8d33adfa256126a6695c734c0de331cb, it was introduced in version v5.16.10 by commit 2443ba2fe396bdde187a2fdfa6a57375643ae93c. For more details please see the references link. | null | 2022-03-07T01:32:56.415950Z | 2022-02-27T03:22:51.593854Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2443ba2fe396bdde187a2fdfa6a57375643ae93c'} |
Linux | GSD-2021-1000505 | x86/sev-es: Don't return NULL from sev_es_get_ghcb() | x86/sev-es: Don't return NULL from sev_es_get_ghcb()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.40 by commit be4cba71b2d068f783ede32775212ef4da3238c4, it was introduced in version v5.10 by commit 0786138c78e79343c7b015d77507cbf9d5f15d00. For more details please see the references link. | null | 2021-12-20T00:08:00.922650Z | 2021-05-31T23:47:34.071790Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0786138c78e79343c7b015d77507cbf9d5f15d00'} |
Linux | GSD-2021-1002538 | mlxsw: spectrum: Protect driver from buggy firmware | mlxsw: spectrum: Protect driver from buggy firmware
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.6 by commit da4d70199e5d82da664a80077508d6c18f5e76df, it was introduced in version v5.4 by commit 28b1987ef5064dd5c43538ba1168ef7b801f3cad. For more details please see the references link. | null | 2021-12-20T01:35:15.833809Z | 2021-12-19T19:41:46.813236Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/28b1987ef5064dd5c43538ba1168ef7b801f3cad'} |
Linux | GSD-2022-1001592 | media: venus: vdec: fixed possible memory leak issue | media: venus: vdec: fixed possible memory leak issue
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 55bccafc246b2e64763a155ec454470c07a54a6e, it was introduced in version v5.16 by commit 40d87aafee29fb01ce1e1868502fb2059a6a7f34. For more details please see the references link. | null | 2022-04-25T06:52:55.752253Z | 2022-04-24T21:26:57.936564Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/40d87aafee29fb01ce1e1868502fb2059a6a7f34'} |
Linux | GSD-2022-1001068 | PCI: endpoint: Fix alignment fault error in copy tests | PCI: endpoint: Fix alignment fault error in copy tests
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 6d16d35fad657acc7aa479e6686724a383792bd9. For more details please see the references link. | null | 2022-04-25T05:50:55.112243Z | 2022-04-24T20:43:19.954054Z | null | null | null | null | null |
Linux | GSD-2021-1000155 | perf/core: Fix unconditional security_locked_down() call | perf/core: Fix unconditional security_locked_down() call
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.35 by commit 4348d3b5027bc3ff6336368b6c60605d4ef8e1ce, it was introduced in version v5.4 by commit b0c8fdc7fdb77586c3d1937050925b960743306e. For more details please see the references link. | null | 2021-12-19T22:21:54.612146Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b0c8fdc7fdb77586c3d1937050925b960743306e'} |
Linux | GSD-2021-1002168 | can: peak_pci: peak_pci_remove(): fix UAF | can: peak_pci: peak_pci_remove(): fix UAF
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 949fe9b35570361bc6ee2652f89a0561b26eec98, it was introduced in version v3.4 by commit e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd. For more details please see the references link. | null | 2021-12-19T23:14:41.729441Z | 2021-11-14T15:22:59.278144Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd'} |
Linux | GSD-2022-1001438 | ubifs: Fix to add refcount once page is set private | ubifs: Fix to add refcount once page is set private
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 5aaa2c0f0052b02c4a982993d4c5bb68fb7cbe22, it was introduced in version v2.6.27 by commit 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d. For more details please see the references link. | null | 2022-04-25T06:37:00.045556Z | 2022-04-24T21:13:16.820313Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d'} |
Linux | GSD-2021-1002492 | net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() | net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.84 by commit 15fa12c119f869173f9b710cbe6a4a14071d2105, it was introduced in version v3.9 by commit 7f9664525f9cb507de9198a395a111371413f230. For more details please see the references link. | null | 2021-12-19T22:26:18.124223Z | 2021-12-19T19:39:43.391502Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7f9664525f9cb507de9198a395a111371413f230'} |
Linux | GSD-2021-1001314 | igb: Fix use-after-free error during reset | igb: Fix use-after-free error during reset
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.136 by commit 88e0720133d42d34851c8721cf5f289a50a8710f, it was introduced in version v4.12 by commit 7cc6fd4c60f267e17b0baef1580d7a6258c0a6f0. For more details please see the references link. | null | 2021-12-20T00:51:40.658727Z | 2021-08-03T02:06:14.909989Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7cc6fd4c60f267e17b0baef1580d7a6258c0a6f0'} |
Linux | GSD-2022-1000383 | mm: memcg: synchronize objcg lists with a dedicated spinlock | mm: memcg: synchronize objcg lists with a dedicated spinlock
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.102 by commit 8c8385972ea96adeb9b678c9390beaa4d94c4aae, it was introduced in version v5.9 by commit bf4f059954dcb221384b2f784677e19a13cd4bdb. For more details please see the references link. | null | 2022-03-07T01:48:39.697123Z | 2022-02-27T02:59:38.473811Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf4f059954dcb221384b2f784677e19a13cd4bdb'} |
Linux | GSD-2022-1000679 | gve: fix the wrong AdminQ buffer queue index check | gve: fix the wrong AdminQ buffer queue index check
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.8 by commit 7d9c470134104dfecb753b7b4add7037a7403c6e, it was introduced in version v5.10 by commit 5cdad90de62c27c6af53edb1b4b91712622b892b. For more details please see the references link. | null | 2022-03-07T01:43:35.101767Z | 2022-02-27T03:40:06.394619Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5cdad90de62c27c6af53edb1b4b91712622b892b'} |
Linux | GSD-2021-1000856 | drm: Lock pointer access in drm_master_release() | drm: Lock pointer access in drm_master_release()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.237 by commit b235f1037c0f9253ae45ff440a33a93e964ad2ec. For more details please see the references link. | null | 2021-12-19T22:15:57.741671Z | 2021-06-30T00:01:45.892221Z | null | null | null | null | null |
Linux | GSD-2021-1001744 | blk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd | blk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.9 by commit 7c2c69e010431b0157c9454adcdd2305809bf9fb. For more details please see the references link. | null | 2021-12-20T00:02:46.556815Z | 2021-10-19T16:34:36.284423Z | null | null | null | null | null |
Linux | GSD-2022-1002214 | video: fbdev: sm712fb: Fix crash in smtcfb_write() | video: fbdev: sm712fb: Fix crash in smtcfb_write()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 3b36c05f68ba32d0dfb63abc9016d6fe9117829f. For more details please see the references link. | null | 2022-04-25T06:45:05.690740Z | 2022-04-24T22:22:30.904641Z | null | null | null | null | null |
Linux | GSD-2022-1000229 | net: macsec: Fix offload support for NETDEV_UNREGISTER event | net: macsec: Fix offload support for NETDEV_UNREGISTER event
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.99 by commit 2e7f5b6ee1a7a2c628253a95b0a95b582901ef1b, it was introduced in version v5.6 by commit 3cf3227a21d1fb020fe26128e60321bd2151e922. For more details please see the references link. | null | 2022-02-19T02:42:49.132833Z | 2022-02-18T21:58:51.853269Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3cf3227a21d1fb020fe26128e60321bd2151e922'} |
Linux | GSD-2021-1001251 | igc: Fix use-after-free error during reset | igc: Fix use-after-free error during reset
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.54 by commit e15f629036bac005fc758b4ad17896cf2312add4, it was introduced in version v4.20 by commit 13b5b7fd6a4a96dffe604f25e7b64cfbd9520924. For more details please see the references link. | null | 2021-12-19T22:03:43.403873Z | 2021-08-03T01:48:53.130562Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/13b5b7fd6a4a96dffe604f25e7b64cfbd9520924'} |
Linux | GSD-2022-1002351 | PCI: Reduce warnings on possible RW1C corruption | PCI: Reduce warnings on possible RW1C corruption
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit b09700574652d0e9cf0b3b35e48ca542e9830255, it was introduced in version v4.10 by commit fb26592301200dbbe4a9943fe188b57a46716900. For more details please see the references link. | null | 2022-04-25T05:21:29.843681Z | 2022-04-24T22:37:13.769997Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb26592301200dbbe4a9943fe188b57a46716900'} |
Linux | GSD-2021-1000913 | kvm: LAPIC: Restore guard to prevent illegal APIC register access | kvm: LAPIC: Restore guard to prevent illegal APIC register access
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.128 by commit bf99ea52970caeb4583bdba1192c1f9b53b12c84, it was introduced in version v5.3 by commit 01402cf81051f796dac7c60ca11d6147153ca46a. For more details please see the references link. | null | 2021-12-19T23:19:08.584850Z | 2021-06-30T00:06:09.406632Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/01402cf81051f796dac7c60ca11d6147153ca46a'} |
Linux | GSD-2021-1001601 | cpufreq: schedutil: Destroy mutex before kobject_put() frees the memory | cpufreq: schedutil: Destroy mutex before kobject_put() frees the memory
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.151 by commit e2370e1935190054c10d476b5a33fa9e9a18b7e3, it was introduced in version v5.4.151 by commit 67c98e023135ff81b8d52998a6fdb8ca0c518d82. For more details please see the references link. | null | 2021-10-19T16:27:44.960135Z | 2021-10-19T16:27:44.960135Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/67c98e023135ff81b8d52998a6fdb8ca0c518d82'} |
Linux | GSD-2022-1001984 | net/tls: fix slab-out-of-bounds bug in decrypt_internal | net/tls: fix slab-out-of-bounds bug in decrypt_internal
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit 589154d0f18945f41d138a5b4e49e518d294474b, it was introduced in version v5.2 by commit f295b3ae9f5927e084bd5decdff82390e3471801. For more details please see the references link. | null | 2022-04-25T04:45:23.057205Z | 2022-04-24T22:01:02.742628Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f295b3ae9f5927e084bd5decdff82390e3471801'} |
Linux | GSD-2022-1000696 | auxdisplay: lcd2s: Fix memory leak in ->remove() | auxdisplay: lcd2s: Fix memory leak in ->remove()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.13 by commit 3585ed5f9b11a6094dd991d76a1541e5d03b986a, it was introduced in version v5.11 by commit 8c9108d014c5bd0f0da2e3544eb45dc56a6da92b. For more details please see the references link. | null | 2022-03-18T03:00:05.351702Z | 2022-03-18T00:10:13.411747Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c9108d014c5bd0f0da2e3544eb45dc56a6da92b'} |
Linux | GSD-2021-1002187 | s390/pci: fix zpci_zdev_put() on reserve | s390/pci: fix zpci_zdev_put() on reserve
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit a46044a92add6a400f4dada7b943b30221f7cc80, it was introduced in version v5.14 by commit 2a671f77ee49f3e78997b77fdee139467ff6a598. For more details please see the references link. | null | 2021-12-20T00:24:14.870743Z | 2021-11-14T15:23:52.766385Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2a671f77ee49f3e78997b77fdee139467ff6a598'} |
Linux | GSD-2021-1000440 | net/nfc: fix use-after-free llcp_sock_bind/connect | net/nfc: fix use-after-free llcp_sock_bind/connect
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.119 by commit e32352070bcac22be6ed8ab635debc280bb65b8c, it was introduced in version v5.4.112 by commit c89903c9eff219a4695e63715cf922748d743f65. For more details please see the references link. | null | 2021-12-20T01:13:44.702146Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c89903c9eff219a4695e63715cf922748d743f65'} |
Linux | GSD-2022-1001087 | ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 | ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit cbd96d6cad6625feba9c8d101ed4977d53e82f8e. For more details please see the references link. | null | 2022-04-25T04:35:36.427917Z | 2022-04-24T20:44:14.693731Z | null | null | null | null | null |
Linux | GSD-2021-1002742 | net/sched: sch_ets: don't remove idle classes from the round-robin list | net/sched: sch_ets: don't remove idle classes from the round-robin list
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit 491c1253441e2fdc8f6a6f4976e3f13440419b7a, it was introduced in version v5.15.6 by commit e25bdbc7e951ae5728fee1f4c09485df113d013c. For more details please see the references link. | null | 2022-01-11T05:46:54.477994Z | 2021-12-27T05:46:05.040495Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e25bdbc7e951ae5728fee1f4c09485df113d013c'} |
Linux | GSD-2022-1001212 | ath10k: Fix error handling in ath10k_setup_msa_resources | ath10k: Fix error handling in ath10k_setup_msa_resources
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 4ed37d611ea5d222c3ecb3549e4c2d34b8f3c335, it was introduced in version v5.8 by commit 727fec790ead3d75e2735f66209949c2163523ea. For more details please see the references link. | null | 2022-04-25T05:18:36.692875Z | 2022-04-24T20:54:11.419693Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/727fec790ead3d75e2735f66209949c2163523ea'} |
Linux | GSD-2021-1000285 | spi: Fix use-after-free with devm_spi_alloc_* | spi: Fix use-after-free with devm_spi_alloc_*
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 8735248ebb918d25427965f0db07939ed0473ec6, it was introduced in version v5.10 by commit 5e844cc37a5cbaa460e68f9a989d321d63088a89. For more details please see the references link. | null | 2021-12-20T01:39:17.237142Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5e844cc37a5cbaa460e68f9a989d321d63088a89'} |
Linux | GSD-2021-1002312 | NFC: add NCI_UNREG flag to eliminate the race | NFC: add NCI_UNREG flag to eliminate the race
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit ed35e950d8e5658db5b45526be2c4e3778746909, it was introduced in version v3.2 by commit 6a2968aaf50c7a22fced77a5e24aa636281efca8. For more details please see the references link. | null | 2021-12-20T00:02:54.045332Z | 2021-11-29T02:38:17.236311Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6a2968aaf50c7a22fced77a5e24aa636281efca8'} |
Linux | GSD-2022-1000950 | configfs: fix a race in configfs_{,un}register_subsystem() | configfs: fix a race in configfs_{,un}register_subsystem()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.304 by commit 40805099af11f68c5ca7dbcfacf455da8f99f622, it was introduced in version v2.6.16 by commit 7063fbf2261194f72ee75afca67b3b38b554b5fa. For more details please see the references link. | null | 2022-03-18T02:56:45.644421Z | 2022-03-18T00:36:02.932613Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7063fbf2261194f72ee75afca67b3b38b554b5fa'} |
Linux | GSD-2022-1001642 | i2c: dev: check return value when calling dev_set_name() | i2c: dev: check return value when calling dev_set_name()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.35 by commit 2f345bb14ad4744950499ff222e2899209297afa, it was introduced in version v5.7 by commit 1413ef638abae4ab5621901cf4d8ef08a4a48ba6. For more details please see the references link. | null | 2022-04-25T06:37:11.643852Z | 2022-04-24T21:31:00.486826Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1413ef638abae4ab5621901cf4d8ef08a4a48ba6'} |
Linux | GSD-2022-1000403 | mtd: rawnand: gpmi: don't leak PM reference in error path | mtd: rawnand: gpmi: don't leak PM reference in error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.102 by commit a4eeeaca50199e3f19eb13ac3b7e0bbb93e22de4, it was introduced in version v5.10.94 by commit 538a5e208e7d29e8b3cb1d79bbb757e8c763b680. For more details please see the references link. | null | 2022-03-07T01:50:59.391453Z | 2022-02-27T03:01:56.716549Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/538a5e208e7d29e8b3cb1d79bbb757e8c763b680'} |
Linux | GSD-2021-1001494 | phy: mdio: fix memory leak | phy: mdio: fix memory leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.289 by commit 25e9f88c7e3cc35f5e3d3db199660d28a15df639, it was introduced in version v2.6.28 by commit 46abc02175b3c246dd5141d878f565a8725060c9. For more details please see the references link. | null | 2021-12-19T23:36:01.178222Z | 2021-10-19T16:20:46.502011Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/46abc02175b3c246dd5141d878f565a8725060c9'} |
Linux | GSD-2022-1000053 | net: fix use-after-free in tw_timer_handler | net: fix use-after-free in tw_timer_handler
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.13 by commit 08eacbd141e2495d2fcdde84358a06c4f95cbb13, it was introduced in version v2.6.27 by commit 61a7e26028b94805fd686a6dc9dbd9941f8f19b0. For more details please see the references link. | null | 2022-01-11T06:53:37.778763Z | 2022-01-10T19:51:58.606398Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61a7e26028b94805fd686a6dc9dbd9941f8f19b0'} |
Linux | GSD-2022-1000546 | ipv6: fix data-race in fib6_info_hw_flags_set / fib6_purge_rt | ipv6: fix data-race in fib6_info_hw_flags_set / fib6_purge_rt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit d5e80a1840121ba727e1ca92c2cc4234e2390d2b, it was introduced in version v5.12 by commit 0c5fcf9e249ee1d94cf872c99baf9cba7ff9ce27. For more details please see the references link. | null | 2022-03-07T01:52:34.561350Z | 2022-02-27T03:21:45.164877Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0c5fcf9e249ee1d94cf872c99baf9cba7ff9ce27'} |
Linux | GSD-2022-1002081 | bpf, sockmap: Fix more uncharged while msg has more_data | bpf, sockmap: Fix more uncharged while msg has more_data
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 7b812a369e6416ab06d83cdd39d8e3f752781dd0, it was introduced in version v4.20 by commit 604326b41a6fb9b4a78b6179335decee0365cd8c. For more details please see the references link. | null | 2022-04-25T06:33:25.824289Z | 2022-04-24T22:08:55.285970Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/604326b41a6fb9b4a78b6179335decee0365cd8c'} |
Linux | GSD-2022-1000116 | moxart: fix potential use-after-free on remove path | moxart: fix potential use-after-free on remove path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.266 by commit e6f580d0b3349646d4ee1ce0057eb273e8fb7e2e. For more details please see the references link. | null | 2022-02-19T09:37:57.122758Z | 2022-02-18T21:42:53.607439Z | null | null | null | null | null |
Linux | GSD-2021-1001181 | cpufreq: CPPC: Fix potential memleak in cppc_cpufreq_cpu_init | cpufreq: CPPC: Fix potential memleak in cppc_cpufreq_cpu_init
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.4 by commit e1b2b2b61d30d7ce057ec17237c217d152ed97f2, it was introduced in version v5.11 by commit a28b2bfc099c6b9caa6ef697660408e076a32019. For more details please see the references link. | null | 2021-12-19T22:13:29.577709Z | 2021-08-03T01:32:55.196251Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a28b2bfc099c6b9caa6ef697660408e076a32019'} |
Linux | GSD-2022-1001357 | qede: confirm skb is allocated before using | qede: confirm skb is allocated before using
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit b2d6b3db9d1cf80908964036dbe1c52a86b1afb1, it was introduced in version v4.18 by commit 8a8633978b842c88fbcfe00d4e5dde96048f630e. For more details please see the references link. | null | 2022-04-25T05:22:54.152295Z | 2022-04-24T21:07:27.623010Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8a8633978b842c88fbcfe00d4e5dde96048f630e'} |
Linux | GSD-2021-1001928 | comedi: dt9812: fix DMA buffers on stack | comedi: dt9812: fix DMA buffers on stack
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.292 by commit a6af69768d5cb4b2528946d53be5fa19ade37723, it was introduced in version v2.6.29 by commit 63274cd7d38a3322d90b66a5bc976de1fb899051. For more details please see the references link. | null | 2021-12-19T22:50:25.189124Z | 2021-11-14T15:12:05.674778Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63274cd7d38a3322d90b66a5bc976de1fb899051'} |
Linux | GSD-2021-1002607 | iio: mma8452: Fix trigger reference couting | iio: mma8452: Fix trigger reference couting
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.8 by commit c43517071dfc9fce34f8f69dbb98a86017f6b739, it was introduced in version v4.2 by commit ae6d9ce05691bf79694074db7c7da980080548af. For more details please see the references link. | null | 2021-12-19T23:22:30.996574Z | 2021-12-19T19:44:51.609118Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ae6d9ce05691bf79694074db7c7da980080548af'} |
Linux | GSD-2022-1000815 | hwmon: Handle failure to register sensor with thermal zone correctly | hwmon: Handle failure to register sensor with thermal zone correctly
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.26 by commit 7efe8499cb90651c540753f4269d2d43ede14223, it was introduced in version v5.8 by commit 1597b374af22266266e1e20612208c4b11359ad4. For more details please see the references link. | null | 2022-03-18T02:55:27.650453Z | 2022-03-18T00:21:05.795027Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1597b374af22266266e1e20612208c4b11359ad4'} |
Linux | GSD-2022-1001707 | staging: vchiq_arm: Avoid NULL ptr deref in vchiq_dump_platform_instances | staging: vchiq_arm: Avoid NULL ptr deref in vchiq_dump_platform_instances
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 176df12b38c70b0a45e6392a0ee5bc83489dfc29. For more details please see the references link. | null | 2022-04-25T03:55:04.663985Z | 2022-04-24T21:36:46.486542Z | null | null | null | null | null |
Linux | GSD-2021-1001882 | userfaultfd: fix a race between writeprotect and exit_mmap() | userfaultfd: fix a race between writeprotect and exit_mmap()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit 149958ecd0627a9f1e9c678c25c665400054cd6a, it was introduced in version v5.7 by commit 63b2d4174c4ad1f40b48d7138e71bcb564c1fe03. For more details please see the references link. | null | 2021-12-20T00:33:51.029788Z | 2021-10-28T13:53:46.065111Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63b2d4174c4ad1f40b48d7138e71bcb564c1fe03'} |
Linux | GSD-2021-1000790 | mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report | mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit 6919e8a24e70b6ba148fe07f44f835bcdd1a8d02, it was introduced in version v5.12 by commit 1c099ab44727c8e42fe4de4d91b53cec3ef02860. For more details please see the references link. | null | 2021-12-19T22:28:26.603582Z | 2021-06-25T00:05:48.938227Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c099ab44727c8e42fe4de4d91b53cec3ef02860'} |
Linux | GSD-2021-1002257 | btrfs: fix memory ordering between normal and ordered work functions | btrfs: fix memory ordering between normal and ordered work functions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.162 by commit 670f6b3867c8f0f11e5097f353b164cecfec6179, it was introduced in version v3.15 by commit 08a9ff3264181986d1d692a4e6fce3669700c9f8. For more details please see the references link. | null | 2021-12-19T22:59:56.755536Z | 2021-11-29T02:35:41.067261Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/08a9ff3264181986d1d692a4e6fce3669700c9f8'} |
Linux | GSD-2022-1002202 | KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs | KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 01f700bae439fdfc56f0e2c0d0f56b0d20aaa999, it was introduced in version v4.2 by commit ca724305a2b02abcbecbf22577536fc8e965ab4f. For more details please see the references link. | null | 2022-04-25T05:58:36.035115Z | 2022-04-24T22:21:18.917200Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca724305a2b02abcbecbf22577536fc8e965ab4f'} |
Linux | GSD-2021-1001752 | net: macb: fix use after free on rmmod | net: macb: fix use after free on rmmod
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.9 by commit 4ad6f2d23b0f6ac0d3e5f3102a4256d1c86c90f5. For more details please see the references link. | null | 2021-12-19T23:55:51.507406Z | 2021-10-19T16:34:59.546142Z | null | null | null | null | null |
Linux | GSD-2021-1000840 | wq: handle VM suspension in stall detection | wq: handle VM suspension in stall detection
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.273 by commit a8f2c7bbbdf433d726a3f1ac81379da9e09b11e7. For more details please see the references link. | null | 2021-12-20T01:29:18.031174Z | 2021-06-30T00:00:39.109177Z | null | null | null | null | null |
Linux | GSD-2022-1000395 | nvme-tcp: fix possible use-after-free in transport error_recovery work | nvme-tcp: fix possible use-after-free in transport error_recovery work
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.102 by commit e192184cf8bce8dd55d619f5611a2eaba996fa05. For more details please see the references link. | null | 2022-03-07T01:35:10.308036Z | 2022-02-27T03:01:00.479333Z | null | null | null | null | null |
Linux | GSD-2021-1001302 | atm: nicstar: Fix possible use-after-free in nicstar_cleanup() | atm: nicstar: Fix possible use-after-free in nicstar_cleanup()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.51 by commit a7f7c42e31157d1f0871d6a8e1a0b73a6b4ea785. For more details please see the references link. | null | 2021-12-20T00:35:43.916814Z | 2021-08-03T02:02:12.788482Z | null | null | null | null | null |
Linux | GSD-2021-1002484 | ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() | ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.84 by commit 22519eff7df2d88adcc2568d86046ce1e2b52803. For more details please see the references link. | null | 2021-12-20T00:57:26.519688Z | 2021-12-19T19:39:23.554203Z | null | null | null | null | null |
Linux | GSD-2021-1000143 | tpm: efi: Use local variable for calculating final log size | tpm: efi: Use local variable for calculating final log size
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.36 by commit 60a01ecc9f68067e4314a0b55148e39e5d58a51b, it was introduced in version v5.3 by commit 166a2809d65b282272c474835ec22c882a39ca1b. For more details please see the references link. | null | 2021-12-20T00:11:34.654270Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/166a2809d65b282272c474835ec22c882a39ca1b'} |
Linux | GSD-2022-1001584 | clocksource/drivers/exynos_mct: Handle DTS with higher number of interrupts | clocksource/drivers/exynos_mct: Handle DTS with higher number of interrupts
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit ff37c4784dedb5b815bb2f8a0de23e4a5f51371f, it was introduced in version v3.10 by commit 36ba5d527e9567ed303bad6e86a5f3c2723470f6. For more details please see the references link. | null | 2022-04-25T05:37:30.209488Z | 2022-04-24T21:26:22.204038Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/36ba5d527e9567ed303bad6e86a5f3c2723470f6'} |
Linux | GSD-2021-1000513 | uio_hv_generic: Fix a memory leak in error handling paths | uio_hv_generic: Fix a memory leak in error handling paths
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.122 by commit cdd91637d4ef33e2be19a8e16e72e7d00c996d76, it was introduced in version v4.20 by commit cdfa835c6e5e87d145f9f632b58843de97509f2b. For more details please see the references link. | null | 2021-12-19T22:20:24.829037Z | 2021-05-31T23:48:51.960880Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cdfa835c6e5e87d145f9f632b58843de97509f2b'} |
Linux | GSD-2022-1001091 | KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs | KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit f801e9ee0d94caae479b3ff2bd6a762c0e1c61d6, it was introduced in version v4.2 by commit ca724305a2b02abcbecbf22577536fc8e965ab4f. For more details please see the references link. | null | 2022-04-25T03:37:58.161447Z | 2022-04-24T20:44:34.354830Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca724305a2b02abcbecbf22577536fc8e965ab4f'} |
Linux | GSD-2021-1000456 | Drivers: hv: vmbus: Increase wait time for VMbus unload | Drivers: hv: vmbus: Increase wait time for VMbus unload
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.191 by commit feb4750ef9b8cb26c8ae5933479cad9f16451f6a, it was introduced in version v4.19.147 by commit 1dcf055a46ba41c971b0d4f7a19c584db4d01bac. For more details please see the references link. | null | 2021-12-19T22:57:15.000725Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1dcf055a46ba41c971b0d4f7a19c584db4d01bac'} |
Linux | GSD-2021-1002191 | cfg80211: fix management registrations locking | cfg80211: fix management registrations locking
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 09b1d5dc6ce1c9151777f6c4e128a59457704c97, it was introduced in version v5.8 by commit 6cd536fe62ef58d7c4eac2da07ab0ed7fd19010d. For more details please see the references link. | null | 2021-12-20T01:06:24.419338Z | 2021-11-14T15:24:02.964185Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6cd536fe62ef58d7c4eac2da07ab0ed7fd19010d'} |
Linux | GSD-2022-1000680 | bpf: Use VM_MAP instead of VM_ALLOC for ringbuf | bpf: Use VM_MAP instead of VM_ALLOC for ringbuf
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.8 by commit d578933f6226d5419af9306746efa1c693cbaf9c, it was introduced in version v5.8 by commit 457f44363a8894135c85b7a9afd2bd8196db24ab. For more details please see the references link. | null | 2022-03-07T01:34:04.835271Z | 2022-02-27T03:40:13.181934Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/457f44363a8894135c85b7a9afd2bd8196db24ab'} |
Linux | GSD-2022-1001992 | NFSv4.2: fix reference count leaks in _nfs42_proc_copy_notify() | NFSv4.2: fix reference count leaks in _nfs42_proc_copy_notify()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit 9b9feec97c1fc7dd9bb69f62c4905cddf1801599. For more details please see the references link. | null | 2022-04-25T04:15:57.997104Z | 2022-04-24T22:01:41.642133Z | null | null | null | null | null |
Linux | GSD-2021-1001617 | binder: make sure fd closes complete | binder: make sure fd closes complete
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.150 by commit aa2c274c279ff365a06a4cba263f04965895166e, it was introduced in version v5.0 by commit 80cd795630d6526ba729a089a435bf74a57af927. For more details please see the references link. | null | 2021-12-19T23:02:37.168976Z | 2021-10-19T16:28:29.967434Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80cd795630d6526ba729a089a435bf74a57af927'} |
Linux | GSD-2021-1000905 | NFS: Fix a potential NULL dereference in nfs_get_client() | NFS: Fix a potential NULL dereference in nfs_get_client()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.126 by commit 0057ecef9f324007c0ba5fcca4ddd131178ce78b, it was introduced in version v3.17 by commit 31434f496abb9f3410b10f541462fe58613dd3ad. For more details please see the references link. | null | 2021-12-20T00:27:43.541483Z | 2021-06-30T00:05:39.328830Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/31434f496abb9f3410b10f541462fe58613dd3ad'} |
Linux | GSD-2022-1002347 | pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe | pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 0067ba448f1c29ca06e5aee00d8506889ed1f9d0, it was introduced in version v3.9 by commit 32e67eee670e1254ee5ab41e2f454680acb9c17c. For more details please see the references link. | null | 2022-04-25T06:33:38.498997Z | 2022-04-24T22:36:34.301925Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/32e67eee670e1254ee5ab41e2f454680acb9c17c'} |
Linux | GSD-2021-1001247 | bpf, sockmap: Fix potential memory leak on unlikely error case | bpf, sockmap: Fix potential memory leak on unlikely error case
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.54 by commit 715f378f42909c401ec043f5150c4fdf57fb8889, it was introduced in version v5.10 by commit 4363023d2668e621b0743db351a9555d6e6ea57e. For more details please see the references link. | null | 2021-12-20T01:25:17.151293Z | 2021-08-03T01:48:11.525811Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4363023d2668e621b0743db351a9555d6e6ea57e'} |
Linux | GSD-2022-1001838 | RDMA/mlx5: Fix memory leak in error flow for subscribe event routine | RDMA/mlx5: Fix memory leak in error flow for subscribe event routine
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 8dd392e352d3269938fea32061a74655a613f929, it was introduced in version v5.3 by commit 7597385371425febdaa8c6a1da3625d4ffff16f5. For more details please see the references link. | null | 2022-04-25T03:18:41.648002Z | 2022-04-24T21:46:45.181997Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7597385371425febdaa8c6a1da3625d4ffff16f5'} |
Linux | GSD-2022-1002039 | ARM: mmp: Fix failure to remove sram device | ARM: mmp: Fix failure to remove sram device
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit e7bb29df2a149f466c660209ea1aa3783b3e0e1c. For more details please see the references link. | null | 2022-04-25T06:33:05.929642Z | 2022-04-24T22:05:19.645367Z | null | null | null | null | null |
Linux | GSD-2021-1001093 | cfg80211: call cfg80211_leave_ocb when switching away from OCB | cfg80211: call cfg80211_leave_ocb when switching away from OCB
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.274 by commit c49b86ba5a25541531c501c4fa3c6a53bf8160ff. For more details please see the references link. | null | 2021-12-19T23:00:37.625268Z | 2021-07-08T01:55:51.361294Z | null | null | null | null | null |
Linux | GSD-2021-1001569 | md: fix a lock order reversal in md_alloc | md: fix a lock order reversal in md_alloc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.209 by commit 906b4dcc180808f0ba74ec1e07a5cf708463bc48, it was introduced in version v3.0 by commit b0140891a8cea36469f58d23859e599b1122bd37. For more details please see the references link. | null | 2021-12-19T23:57:49.597511Z | 2021-10-19T16:24:13.554533Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b0140891a8cea36469f58d23859e599b1122bd37'} |
Linux | GSD-2022-1002469 | mm/mempolicy: fix mpol_new leak in shared_policy_replace | mm/mempolicy: fix mpol_new leak in shared_policy_replace
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit 8510c2346d9e47a72b7f018a36ef0c39483e53d6, it was introduced in version v3.8 by commit 42288fe366c4f1ce7522bc9f27d0bc2a81c55264. For more details please see the references link. | null | 2022-04-25T05:39:27.210008Z | 2022-04-24T22:51:46.814811Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/42288fe366c4f1ce7522bc9f27d0bc2a81c55264'} |
Linux | GSD-2022-1000454 | nvme: fix a possible use-after-free in controller reset during load | nvme: fix a possible use-after-free in controller reset during load
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit e043fb5a0336ee74614e26f0d9f36f1f5bb6d606. For more details please see the references link. | null | 2022-03-07T01:37:44.397750Z | 2022-02-27T03:09:13.040054Z | null | null | null | null | null |
Linux | GSD-2021-1001139 | mac80211: remove warning in ieee80211_get_sband() | mac80211: remove warning in ieee80211_get_sband()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13 by commit 0ee4d55534f82a0624701d0bb9fc2304d4529086. For more details please see the references link. | null | 2021-12-20T01:15:02.251816Z | 2021-07-08T01:59:05.600074Z | null | null | null | null | null |
Linux | GSD-2022-1002193 | scsi: libfc: Fix use after free in fc_exch_abts_resp() | scsi: libfc: Fix use after free in fc_exch_abts_resp()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 5cf2ce8967b0d98c8cfa4dc42ef4fcf080f5c836. For more details please see the references link. | null | 2022-04-25T05:46:09.613870Z | 2022-04-24T22:20:34.729775Z | null | null | null | null | null |
Linux | GSD-2022-1000907 | xhci: Prevent futile URB re-submissions due to incorrect return value. | xhci: Prevent futile URB re-submissions due to incorrect return value.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.232 by commit 4cf9a3da2b555f77a9a8956a754ac9e3c53c3384, it was introduced in version v3.11 by commit 203a86613fb3bf2767335659513fa98563a3eb71. For more details please see the references link. | null | 2022-03-18T02:55:05.822197Z | 2022-03-18T00:30:21.367969Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/203a86613fb3bf2767335659513fa98563a3eb71'} |
Linux | GSD-2022-1001615 | can: m_can: m_can_tx_handler(): fix use after free of skb | can: m_can: m_can_tx_handler(): fix use after free of skb
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 4db7d6f481990dd179a9ee7126dc7aa31ea4fff3, it was introduced in version v3.18 by commit 80646733f11c2e9de3b6339f7e635047e6087280. For more details please see the references link. | null | 2022-04-25T03:27:50.241759Z | 2022-04-24T21:28:28.689076Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80646733f11c2e9de3b6339f7e635047e6087280'} |
Linux | GSD-2021-1001990 | scsi: core: Put LLD module refcnt after SCSI device is released | scsi: core: Put LLD module refcnt after SCSI device is released
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.216 by commit c2df161f69fb1c67f63adbd193368b47f511edc0. For more details please see the references link. | null | 2021-12-20T00:23:07.479948Z | 2021-11-14T15:14:51.934283Z | null | null | null | null | null |
Linux | GSD-2021-1000682 | NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() | NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.235 by commit 42637ca25c7d7b5a92804a679af5192e8c1a9f48, it was introduced in version v4.14.233 by commit 7b7b9774643220e53eef58c15bb29bd4182fe053. For more details please see the references link. | null | 2021-12-19T22:23:32.026343Z | 2021-06-04T20:01:30.239453Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7b7b9774643220e53eef58c15bb29bd4182fe053'} |
Linux | GSD-2021-1000378 | spi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails | spi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 5980a3b9c933408bc22b0e349b78c3ebd7cbf880, it was introduced in version v5.10 by commit 1c26372e5aa9e53391a1f8fe0dc7cd93a7e5ba9e. For more details please see the references link. | null | 2021-12-20T00:26:44.770447Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c26372e5aa9e53391a1f8fe0dc7cd93a7e5ba9e'} |
Linux | GSD-2021-1002345 | staging: rtl8723bs: remove possible deadlock when disconnect (v2) | staging: rtl8723bs: remove possible deadlock when disconnect (v2)
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit 353a6e9acb45a66f8fb80b07c2f4097cf4b826d1. For more details please see the references link. | null | 2021-12-19T22:30:45.583951Z | 2021-11-29T02:39:45.312842Z | null | null | null | null | null |
Linux | GSD-2022-1001245 | bpf: Fix UAF due to race between btf_try_get_module and load_module | bpf: Fix UAF due to race between btf_try_get_module and load_module
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 0481baa2318cb1ab13277715da6cdbb657807b3f, it was introduced in version v5.12 by commit 541c3bad8dc51b253ba8686d0cd7628e6b9b5f4c. For more details please see the references link. | null | 2022-04-25T05:54:15.609130Z | 2022-04-24T20:57:24.880480Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/541c3bad8dc51b253ba8686d0cd7628e6b9b5f4c'} |
Linux | GSD-2021-1000728 | net: caif: add proper error handling | net: caif: add proper error handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.236 by commit 676d6d02de3f6b7f3a072b08d0dda819b09d31dd, it was introduced in version v3.3 by commit 7c18d2205ea76eef9674e59e1ecae4f332a53e9e. For more details please see the references link. | null | 2021-12-20T01:37:15.700898Z | 2021-06-24T23:59:36.680764Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7c18d2205ea76eef9674e59e1ecae4f332a53e9e'} |
Linux | GSD-2021-1002715 | scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select() | scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.88 by commit a9078e791426c2cbbdf28a320c3670f6e0a611e6. For more details please see the references link. | null | 2022-01-11T06:52:27.324537Z | 2021-12-27T05:38:38.594173Z | null | null | null | null | null |
Linux | GSD-2021-1002200 | drm/amdgpu: fix out of bounds write | drm/amdgpu: fix out of bounds write
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 5afa7898ab7a0ec9c28556a91df714bf3c2f725e. For more details please see the references link. | null | 2021-12-20T01:23:55.502116Z | 2021-11-14T15:24:25.579119Z | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.