ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2021-1001602 | hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field | hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.151 by commit 200ced5ba724d8bbf29dfac4ed1e17a39ccaccd1. For more details please see the references link. | null | 2021-12-19T22:34:03.888789Z | 2021-10-19T16:27:47.396726Z | null | null | null | null | null |
Linux | GSD-2021-1000910 | drm/tegra: sor: Do not leak runtime PM reference | drm/tegra: sor: Do not leak runtime PM reference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.127 by commit e4c3f7a6a3b241aab8aaebe50b7dbf11b5d8a5ee. For more details please see the references link. | null | 2021-12-20T00:28:25.103921Z | 2021-06-30T00:05:58.194849Z | null | null | null | null | null |
Linux | GSD-2022-1000695 | mptcp: Correctly set DATA_FIN timeout when number of retransmits is large | mptcp: Correctly set DATA_FIN timeout when number of retransmits is large
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.13 by commit 03ae283bd71f761feae3f402668d698b393b0e79, it was introduced in version v5.13 by commit 6477dd39e62c3a67cfa368ddc127410b4ae424c6. For more details please see the references link. | null | 2022-03-18T02:55:02.218615Z | 2022-03-18T00:10:09.324178Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6477dd39e62c3a67cfa368ddc127410b4ae424c6'} |
Linux | GSD-2022-1001987 | drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire() | drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit 0c122eb3a109356fb2c39f49c1768321248d0f1d, it was introduced in version v4.13 by commit 71c37505e7eaa01fa259debad1a71a7ae061039d. For more details please see the references link. | null | 2022-04-25T05:12:54.531397Z | 2022-04-24T22:01:27.363232Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/71c37505e7eaa01fa259debad1a71a7ae061039d'} |
Linux | GSD-2021-1001317 | scsi: libfc: Fix array index out of bound exception | scsi: libfc: Fix array index out of bound exception
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.135 by commit 0fe70c15f9435bb3c50954778245d62ee38b0e03. For more details please see the references link. | null | 2021-12-19T23:05:53.431994Z | 2021-08-03T02:06:44.757956Z | null | null | null | null | null |
Linux | GSD-2022-1000380 | phy: ti: Fix missing sentinel for clk_div_table | phy: ti: Fix missing sentinel for clk_div_table
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.101 by commit 3c75d1017cb362b6a4e0935746ef5da28250919f, it was introduced in version v5.6 by commit 091876cc355d6739e393efa4b3d07f451a6a035c. For more details please see the references link. | null | 2022-03-07T01:38:02.715428Z | 2022-02-27T02:58:36.758803Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/091876cc355d6739e393efa4b3d07f451a6a035c'} |
Linux | GSD-2022-1001968 | ata: sata_dwc_460ex: Fix crash due to OOB write | ata: sata_dwc_460ex: Fix crash due to OOB write
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit fc629224aa62f23849cae83717932985ac51232d, it was introduced in version v4.18 by commit 28361c403683c2b00d4f5e76045f3ccd299bf99d. For more details please see the references link. | null | 2022-04-25T05:47:28.003109Z | 2022-04-24T21:59:23.129131Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/28361c403683c2b00d4f5e76045f3ccd299bf99d'} |
Linux | GSD-2021-1001747 | bpf: Add oversize check before call kvcalloc() | bpf: Add oversize check before call kvcalloc()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.9 by commit b5fe7cdfee5901ce5513c30e554d51536e003bde. For more details please see the references link. | null | 2021-12-20T00:14:18.350193Z | 2021-10-19T16:34:45.982572Z | null | null | null | null | null |
Linux | GSD-2021-1000855 | drm: Fix use-after-free read in drm_getunique() | drm: Fix use-after-free read in drm_getunique()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.237 by commit 17dab9326ff263c62dab1dbac4492e2938a049e4. For more details please see the references link. | null | 2021-12-19T22:56:03.166143Z | 2021-06-30T00:01:36.160435Z | null | null | null | null | null |
Linux | GSD-2022-1002217 | powerpc/kasan: Fix early region not updated correctly | powerpc/kasan: Fix early region not updated correctly
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 7f19245c3647afea8c7c41f795506ef70f64b9f2, it was introduced in version v5.4 by commit cbd18991e24fea2c31da3bb117c83e4a3538cd11. For more details please see the references link. | null | 2022-04-25T04:26:48.734172Z | 2022-04-24T22:22:42.178405Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cbd18991e24fea2c31da3bb117c83e4a3538cd11'} |
Linux | GSD-2021-1000506 | ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry | ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.40 by commit 4528c0c323085e645b8765913b4a7fd42cf49b65, it was introduced in version v5.6 by commit c5b2cbdbdac563f46ecd5e187253ab1abbd6fc04. For more details please see the references link. | null | 2021-12-19T23:53:29.266296Z | 2021-05-31T23:47:36.723923Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c5b2cbdbdac563f46ecd5e187253ab1abbd6fc04'} |
Linux | GSD-2022-1001591 | media: davinci: vpif: fix use-after-free on driver unbind | media: davinci: vpif: fix use-after-free on driver unbind
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit b5a3bb7f6f164eb6ee74ef4898dcd019b2063448, it was introduced in version v4.13 by commit 479f7a1181058689435baddc16a6a42e1a8ff0e8. For more details please see the references link. | null | 2022-04-25T04:56:20.877764Z | 2022-04-24T21:26:54.443550Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/479f7a1181058689435baddc16a6a42e1a8ff0e8'} |
Linux | GSD-2021-1000156 | s390/zcrypt: fix zcard and zqueue hot-unplug memleak | s390/zcrypt: fix zcard and zqueue hot-unplug memleak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.36 by commit 026499a9c2e002e621ad568d1378324ae97e5524, it was introduced in version v5.10 by commit 29c2680fd2bf3862ff5cf2957f198512493156f9. For more details please see the references link. | null | 2021-12-19T23:53:19.548658Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/29c2680fd2bf3862ff5cf2957f198512493156f9'} |
Linux | GSD-2021-1002491 | perf report: Fix memory leaks around perf_tip() | perf report: Fix memory leaks around perf_tip()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.84 by commit ff061b5bda73c4f785b4703eeb0848fd99e5608a. For more details please see the references link. | null | 2021-12-20T00:37:35.265698Z | 2021-12-19T19:39:40.835687Z | null | null | null | null | null |
Linux | GSD-2022-1001354 | iommu/omap: Fix regression in probe for NULL pointer dereference | iommu/omap: Fix regression in probe for NULL pointer dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit ea518578aa8a9a0280605b53cc33f707e10c8178, it was introduced in version v5.8 by commit 6785eb9105e3363aa51408c700a55e8b5f88fcf6. For more details please see the references link. | null | 2022-04-25T08:11:05.561029Z | 2022-04-24T21:07:05.507459Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6785eb9105e3363aa51408c700a55e8b5f88fcf6'} |
Linux | GSD-2021-1000639 | net: usb: fix memory leak in smsc75xx_bind | net: usb: fix memory leak in smsc75xx_bind
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.124 by commit b95fb96e6339e34694dd578fb6bde3575b01af17, it was introduced in version v2.6.34 by commit d0cad871703b898a442e4049c532ec39168e5b57. For more details please see the references link. | null | 2021-12-20T00:08:14.440559Z | 2021-06-04T19:52:46.994034Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0cad871703b898a442e4049c532ec39168e5b57'} |
Linux | GSD-2021-1002604 | ASoC: codecs: wcd934x: handle channel mappping list correctly | ASoC: codecs: wcd934x: handle channel mappping list correctly
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.8 by commit 339ffb5b56005582aacc860524d2d208604049d1, it was introduced in version v5.6 by commit a70d9245759a48e57bb1dc9f63213dcf3017db32. For more details please see the references link. | null | 2021-12-19T23:11:10.528901Z | 2021-12-19T19:44:43.616932Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a70d9245759a48e57bb1dc9f63213dcf3017db32'} |
Linux | GSD-2022-1001704 | habanalabs: fix possible memory leak in MMU DR fini | habanalabs: fix possible memory leak in MMU DR fini
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 12e49aefda2e04b07604f13e03f40027cbeb0dc6. For more details please see the references link. | null | 2022-04-25T06:09:59.688789Z | 2022-04-24T21:36:37.728967Z | null | null | null | null | null |
Linux | GSD-2022-1000816 | CDC-NCM: avoid overflow in sanity checking | CDC-NCM: avoid overflow in sanity checking
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.26 by commit 49909c9f8458cacb5b241106cba65aba5a6d8f4c. For more details please see the references link. | null | 2022-03-18T03:02:21.012513Z | 2022-03-18T00:21:08.189957Z | null | null | null | null | null |
Linux | GSD-2021-1000793 | HID: amd_sfh: Fix memory leak in amd_sfh_work | HID: amd_sfh: Fix memory leak in amd_sfh_work
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit 29beadea66a226d744d5ffdcde6b984623053d24, it was introduced in version v5.11 by commit 4b2c53d93a4bc9d52cc0ec354629cfc9dc217f93. For more details please see the references link. | null | 2021-12-20T00:27:12.608741Z | 2021-06-25T00:06:00.306925Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4b2c53d93a4bc9d52cc0ec354629cfc9dc217f93'} |
Linux | GSD-2021-1001881 | mm/mempolicy: do not allow illegal MPOL_F_NUMA_BALANCING | MPOL_LOCAL in mbind() | mm/mempolicy: do not allow illegal MPOL_F_NUMA_BALANCING | MPOL_LOCAL in mbind()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit 9ee4e9ae98f1f262d6fae0d266cfdf3ba2c321d9, it was introduced in version v5.12 by commit bda420b985054a3badafef23807c4b4fa38a3dff. For more details please see the references link. | null | 2021-12-20T00:31:03.325780Z | 2021-10-28T13:53:43.047115Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bda420b985054a3badafef23807c4b4fa38a3dff'} |
Linux | GSD-2021-1000269 | media: atomisp: Fix use after free in atomisp_alloc_css_stat_bufs() | media: atomisp: Fix use after free in atomisp_alloc_css_stat_bufs()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 8267ccd7b9df7ab682043507dd682fe0621cf045, it was introduced in version v5.8 by commit ad85094b293e40e7a2f831b0311a389d952ebd5e. For more details please see the references link. | null | 2021-12-19T23:04:25.325505Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ad85094b293e40e7a2f831b0311a389d952ebd5e'} |
Linux | GSD-2021-1002254 | usb: musb: tusb6010: check return value after calling platform_get_resource() | usb: musb: tusb6010: check return value after calling platform_get_resource()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.218 by commit f87a79c04a33ab4e5be598c7b0867e6ef193d702. For more details please see the references link. | null | 2021-12-20T00:14:06.008783Z | 2021-11-29T02:35:32.644885Z | null | null | null | null | null |
Linux | GSD-2022-1000545 | vsock: remove vsock from connected table when connect is interrupted by a signal | vsock: remove vsock from connected table when connect is interrupted by a signal
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit addd62a8cb6fa90aa322365c62487da61f6baab8, it was introduced in version v3.9 by commit d021c344051af91f42c5ba9fdedc176740cbd238. For more details please see the references link. | null | 2022-03-07T01:41:00.907315Z | 2022-02-27T03:21:38.418863Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d021c344051af91f42c5ba9fdedc176740cbd238'} |
Linux | GSD-2021-1001028 | btrfs: promote debugging asserts to full-fledged checks in validate_super | btrfs: promote debugging asserts to full-fledged checks in validate_super
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.11 by commit 7253a49994576d0d61ba5136d6cbd3ac9e819447. For more details please see the references link. | null | 2021-12-20T00:31:36.953214Z | 2021-06-30T00:34:53.025857Z | null | null | null | null | null |
Linux | GSD-2022-1002082 | MIPS: pgalloc: fix memory leak caused by pgd_free() | MIPS: pgalloc: fix memory leak caused by pgd_free()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit fa3d44424579972cc7c4fac3d9cf227798ebdfa0, it was introduced in version v5.9 by commit f9cb654cb550b7b87e8608b14fc3eca432429ffe. For more details please see the references link. | null | 2022-04-25T03:18:43.332822Z | 2022-04-24T22:08:59.918667Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f9cb654cb550b7b87e8608b14fc3eca432429ffe'} |
Linux | GSD-2022-1002128 | ASoC: SOF: Intel: Fix NULL ptr dereference when ENOMEM | ASoC: SOF: Intel: Fix NULL ptr dereference when ENOMEM
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 0c307349fe060971625b856c92f0361b8ea9a120, it was introduced in version v5.2 by commit d16046ffa6de040bf580a64d5f4d0aa18258a854. For more details please see the references link. | null | 2022-04-25T04:21:16.140427Z | 2022-04-24T22:14:08.257987Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d16046ffa6de040bf580a64d5f4d0aa18258a854'} |
Linux | GSD-2022-1000115 | scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe | scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.265 by commit 471085571f926a1fe6b1bed095638994dbf23990, it was introduced in version v3.16 by commit d576a5e80cd07ea7049f8fd7b303c14df7b5d7d2. For more details please see the references link. | null | 2022-02-19T02:56:08.251242Z | 2022-02-18T21:42:46.959945Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d576a5e80cd07ea7049f8fd7b303c14df7b5d7d2'} |
Linux | GSD-2021-1001182 | seq_file: disallow extremely large seq buffer allocations | seq_file: disallow extremely large seq buffer allocations
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.4 by commit 71de462034c69525a5049fbdf3903c5833cbce04, it was introduced in version v3.16 by commit 058504edd02667eef8fac9be27ab3ea74332e9b4. For more details please see the references link. | null | 2021-12-20T01:42:17.290614Z | 2021-08-03T01:32:58.860432Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/058504edd02667eef8fac9be27ab3ea74332e9b4'} |
Linux | GSD-2021-1001478 | watchdog: Fix possible use-after-free by calling del_timer_sync() | watchdog: Fix possible use-after-free by calling del_timer_sync()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.276 by commit 58606882ad8ec6c39e0f40344b922921ef94ab4d. For more details please see the references link. | null | 2021-12-19T23:01:18.227907Z | 2021-08-03T02:53:29.590013Z | null | null | null | null | null |
Linux | GSD-2022-1000400 | net_sched: add __rcu annotation to netdev->qdisc | net_sched: add __rcu annotation to netdev->qdisc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.102 by commit d9bd9d4c60c34fe3e71732b8edcba3a880193948, it was introduced in version v5.1 by commit 470502de5bdb1ed0def643a4458593a40b8f6b66. For more details please see the references link. | null | 2022-03-07T01:37:45.355460Z | 2022-02-27T03:01:35.874992Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/470502de5bdb1ed0def643a4458593a40b8f6b66'} |
Linux | GSD-2021-1001497 | ipack: ipoctal: fix stack information leak | ipack: ipoctal: fix stack information leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.286 by commit acb96e782bad427ca4bb1bd94af660acd1462380, it was introduced in version v3.5 by commit ba4dc61fe8c545a5d6a68b63616776556b771f51. For more details please see the references link. | null | 2021-12-19T23:06:15.509914Z | 2021-10-19T16:20:54.489496Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ba4dc61fe8c545a5d6a68b63616776556b771f51'} |
Linux | GSD-2022-1000050 | NFC: st21nfca: Fix memory leak in device probe and remove | NFC: st21nfca: Fix memory leak in device probe and remove
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.13 by commit 238920381b8925d070d32d73cd9ce52ab29896fe, it was introduced in version v3.16 by commit 68957303f44a501af5cf37913208a2acaa6bcdf1. For more details please see the references link. | null | 2022-01-11T05:55:45.281750Z | 2022-01-10T19:51:51.550036Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/68957303f44a501af5cf37913208a2acaa6bcdf1'} |
Linux | GSD-2021-1002741 | net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg | net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit 4f4a353f6fe033807cd026a5de81c67469ff19b0, it was introduced in version v5.8 by commit d8355240cf8fb8b9e002b5c8458578435cea85c2. For more details please see the references link. | null | 2022-01-11T05:57:16.788690Z | 2021-12-27T05:46:02.479374Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d8355240cf8fb8b9e002b5c8458578435cea85c2'} |
Linux | GSD-2022-1001211 | mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init | mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit f1694169f3674cdf7553aed06864254635679878, it was introduced in version v4.12 by commit f88fc122cc34c2545dec9562eaab121494e401ef. For more details please see the references link. | null | 2022-04-25T05:40:45.745093Z | 2022-04-24T20:54:06.505603Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f88fc122cc34c2545dec9562eaab121494e401ef'} |
Linux | GSD-2021-1000286 | crypto: sun8i-ss - Fix memory leak of pad | crypto: sun8i-ss - Fix memory leak of pad
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit d3d702084d125689edb2b9395c707e09b471352e, it was introduced in version v5.10 by commit d9b45418a91773b7672e4c60037a28074b495c6d. For more details please see the references link. | null | 2021-12-19T23:09:42.735727Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9b45418a91773b7672e4c60037a28074b495c6d'} |
Linux | GSD-2021-1002311 | tipc: check for null after calling kmemdup | tipc: check for null after calling kmemdup
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit 9404c4145542c23019a80ab1bb2ecf73cd057b10. For more details please see the references link. | null | 2021-12-19T23:38:48.609236Z | 2021-11-29T02:38:14.697398Z | null | null | null | null | null |
Linux | GSD-2022-1001641 | ALSA: pcm: Test for "silence" field in struct "pcm_format_data" | ALSA: pcm: Test for "silence" field in struct "pcm_format_data"
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.35 by commit 63038f6e96a77a0abf8083649c53e6a72c1a0124. For more details please see the references link. | null | 2022-04-25T03:38:35.925776Z | 2022-04-24T21:30:55.434420Z | null | null | null | null | null |
Linux | GSD-2022-1000953 | sr9700: sanity check for packet length | sr9700: sanity check for packet length
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.304 by commit 89260e0e191e8a3a9872f72836bdf0641853c87f. For more details please see the references link. | null | 2022-03-18T02:55:35.752278Z | 2022-03-18T00:36:28.523418Z | null | null | null | null | null |
Linux | GSD-2022-1001991 | xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu>=32 | xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu>=32
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit a2a0e04f6478e8c1038db64717f3fafd55de1420. For more details please see the references link. | null | 2022-04-25T03:34:55.771634Z | 2022-04-24T22:01:38.794335Z | null | null | null | null | null |
Linux | GSD-2022-1000683 | moxart: fix potential use-after-free on remove path | moxart: fix potential use-after-free on remove path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.9 by commit 7f901d53f120d1921f84f7b9b118e87e94b403c5. For more details please see the references link. | null | 2022-03-07T01:46:34.760387Z | 2022-02-27T03:40:33.381278Z | null | null | null | null | null |
Linux | GSD-2021-1000906 | NFS: Fix use-after-free in nfs4_init_client() | NFS: Fix use-after-free in nfs4_init_client()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.126 by commit 3e3c7ebbfac152d08be75c92802a64a1f6471a15, it was introduced in version v4.13 by commit 8dcbec6d20eb881ba368d0aebc3a8a678aebb1da. For more details please see the references link. | null | 2021-12-20T01:29:50.830127Z | 2021-06-30T00:05:42.880083Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8dcbec6d20eb881ba368d0aebc3a8a678aebb1da'} |
Linux | GSD-2021-1001614 | staging: greybus: uart: fix tty use after free | staging: greybus: uart: fix tty use after free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.150 by commit 4dc56951a8d9d61d364d346c61a5f1d70b4f5e14, it was introduced in version v4.9 by commit a18e15175708d39abbe9746ddc3479466b7800c3. For more details please see the references link. | null | 2021-12-19T22:44:45.722703Z | 2021-10-19T16:28:21.876142Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a18e15175708d39abbe9746ddc3479466b7800c3'} |
Linux | GSD-2022-1000379 | eeprom: ee1004: limit i2c reads to I2C_SMBUS_BLOCK_MAX | eeprom: ee1004: limit i2c reads to I2C_SMBUS_BLOCK_MAX
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.101 by commit a37960df7eac3cc8094bd1ab84864e9e32c91345, it was introduced in version v5.10.94 by commit 25714ad6bf5e98025579fa4c08ff2041a663910c. For more details please see the references link. | null | 2022-03-07T01:32:09.896880Z | 2022-02-27T02:58:30.063619Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/25714ad6bf5e98025579fa4c08ff2041a663910c'} |
Linux | GSD-2022-1002344 | xen: fix is_xen_pmu() | xen: fix is_xen_pmu()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit d533c4a2e8c4ca3a0fe84d295a7bd43af1931028, it was introduced in version v4.3 by commit bf6dfb154d935725c9a2005033ca33017b9df439. For more details please see the references link. | null | 2022-04-25T06:47:04.449394Z | 2022-04-24T22:36:08.911670Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf6dfb154d935725c9a2005033ca33017b9df439'} |
Linux | GSD-2021-1001244 | KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak | KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.54 by commit e14ef1095387f764d95614d3ec9e4d07c82a3533, it was introduced in version v4.18 by commit b3cebfe8c1cadf1817939dcc3688a2504a69c662. For more details please see the references link. | null | 2021-12-19T22:40:58.274221Z | 2021-08-03T01:47:25.776376Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b3cebfe8c1cadf1817939dcc3688a2504a69c662'} |
Linux | GSD-2022-1000729 | sc16is7xx: Fix for incorrect data being transmitted | sc16is7xx: Fix for incorrect data being transmitted
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.12 by commit daedfa962a1c3762bc2cca7bb6ad209155276c6d, it was introduced in version v5.8 by commit 6393ff1c4435acc343b1481f5b834b918cb42b12. For more details please see the references link. | null | 2022-03-18T03:06:20.875116Z | 2022-03-18T00:12:57.000693Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6393ff1c4435acc343b1481f5b834b918cb42b12'} |
Linux | GSD-2022-1001092 | net: preserve skb_end_offset() in skb_unclone_keeptruesize() | net: preserve skb_end_offset() in skb_unclone_keeptruesize()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit a903e516f5df44b46d526b403d93e7be1a425538, it was introduced in version v5.16 by commit c4777efa751d293e369aec464ce6875e957be255. For more details please see the references link. | null | 2022-04-25T04:57:58.843176Z | 2022-04-24T20:44:37.789846Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c4777efa751d293e369aec464ce6875e957be255'} |
Linux | GSD-2021-1002038 | drm/msm: Fix null pointer dereference on pointer edp | drm/msm: Fix null pointer dereference on pointer edp
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.75 by commit 91a340768b012f5b910a203a805b97a345b3db37, it was introduced in version v4.0 by commit ab5b0107ccf3821a6837b0f2819270d6fa0b278f. For more details please see the references link. | null | 2021-12-19T22:28:13.146464Z | 2021-11-14T15:17:04.593168Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab5b0107ccf3821a6837b0f2819270d6fa0b278f'} |
Linux | GSD-2022-1001568 | ASoC: soc-compress: prevent the potentially use of null pointer | ASoC: soc-compress: prevent the potentially use of null pointer
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 08af6da684b44097ea09f1d74d5858b837ed203b, it was introduced in version v5.4 by commit 467fece8fbc6774a3a3bd0981e1a342fb5022706. For more details please see the references link. | null | 2022-04-25T05:05:17.398860Z | 2022-04-24T21:24:39.720614Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/467fece8fbc6774a3a3bd0981e1a342fb5022706'} |
Linux | GSD-2021-1002468 | powerpc/32: Fix hardlockup on vmap stack overflow | powerpc/32: Fix hardlockup on vmap stack overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.83 by commit dfe906da9a1abebdebe8b15bb3e66a2578f6c4c7, it was introduced in version v5.10 by commit c118c7303ad528be8ff2aea8cd1ee15452c763f0. For more details please see the references link. | null | 2021-12-19T23:04:26.181367Z | 2021-12-19T19:38:37.710164Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c118c7303ad528be8ff2aea8cd1ee15452c763f0'} |
Linux | GSD-2021-1000455 | powerpc: Fix HAVE_HARDLOCKUP_DETECTOR_ARCH build configuration | powerpc: Fix HAVE_HARDLOCKUP_DETECTOR_ARCH build configuration
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.191 by commit 706d8600af49f80ef496e16460c2a377ea110f2e, it was introduced in version v4.13 by commit 2104180a53698df5aec35aed5f840a26ade0551d. For more details please see the references link. | null | 2021-12-20T00:48:30.372306Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2104180a53698df5aec35aed5f840a26ade0551d'} |
Linux | GSD-2021-1002192 | ocfs2: fix race between searching chunks and release journal_head from buffer_head | ocfs2: fix race between searching chunks and release journal_head from buffer_head
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 6f1b228529ae49b0f85ab89bcdb6c365df401558. For more details please see the references link. | null | 2021-12-20T02:16:30.134443Z | 2021-11-14T15:24:05.860453Z | null | null | null | null | null |
Linux | GSD-2022-1001138 | powerpc/tm: Fix more userspace r13 corruption | powerpc/tm: Fix more userspace r13 corruption
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 73d8082c90f17dfba57cad4ca94db5cae323f1b1, it was introduced in version v3.9 by commit 98ae22e15b430bfed5def01ac1a88ec9396284c8. For more details please see the references link. | null | 2022-04-25T04:46:17.583220Z | 2022-04-24T20:48:28.558576Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/98ae22e15b430bfed5def01ac1a88ec9396284c8'} |
Linux | GSD-2021-1002487 | ipv6: fix memory leak in fib6_rule_suppress | ipv6: fix memory leak in fib6_rule_suppress
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.84 by commit 209d35ee34e25f9668c404350a1c86d914c54ffa, it was introduced in version v5.4 by commit ca7a03c4175366a92cee0ccc4fec0038c3266e26. For more details please see the references link. | null | 2021-12-19T22:26:17.002217Z | 2021-12-19T19:39:31.197202Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca7a03c4175366a92cee0ccc4fec0038c3266e26'} |
Linux | GSD-2021-1000140 | sfc: farch: fix TX queue lookup in TX event handling | sfc: farch: fix TX queue lookup in TX event handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.36 by commit bf2b941d0a6f2d3b9f5fa3c4c21bdd54f71ce253, it was introduced in version v5.10 by commit 12804793b17c0e19115a90d98f2f3df0cb79e233. For more details please see the references link. | null | 2021-12-20T00:59:44.342367Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/12804793b17c0e19115a90d98f2f3df0cb79e233'} |
Linux | GSD-2022-1001587 | crypto: ccp - Ensure psp_ret is always init'd in __sev_platform_init_locked() | crypto: ccp - Ensure psp_ret is always init'd in __sev_platform_init_locked()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 43d0f4d5705ab9f1d25bccf58f673104addc24f3, it was introduced in version v5.16.3 by commit decce23b3623bd4f6c9b86ff5dd8c8d9cd544c69. For more details please see the references link. | null | 2022-04-25T02:48:34.918327Z | 2022-04-24T21:26:32.159675Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/decce23b3623bd4f6c9b86ff5dd8c8d9cd544c69'} |
Linux | GSD-2021-1000510 | nvmet: fix memory leak in nvmet_alloc_ctrl() | nvmet: fix memory leak in nvmet_alloc_ctrl()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.40 by commit 4720f29acb3fe67aa8aa71e6b675b079d193aaeb, it was introduced in version v5.7 by commit 94a39d61f80fcd679debda11e1ca02b88d90e67e. For more details please see the references link. | null | 2021-12-20T01:01:21.308236Z | 2021-05-31T23:48:18.643214Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/94a39d61f80fcd679debda11e1ca02b88d90e67e'} |
Linux | GSD-2022-1002201 | ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 | ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit c4e2f577271e158d87a916afb4e87415a88ce856. For more details please see the references link. | null | 2022-04-25T03:33:17.551140Z | 2022-04-24T22:21:10.188394Z | null | null | null | null | null |
Linux | GSD-2021-1000843 | kvm: avoid speculation-based attacks from out-of-range memslot accesses | kvm: avoid speculation-based attacks from out-of-range memslot accesses
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.273 by commit 740621309b25bbf619b8a0ba5fd50a8e58989441. For more details please see the references link. | null | 2021-12-20T00:16:13.865439Z | 2021-06-30T00:00:51.090030Z | null | null | null | null | null |
Linux | GSD-2021-1001751 | irqchip/gic-v3-its: Fix potential VPE leak on error | irqchip/gic-v3-its: Fix potential VPE leak on error
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.9 by commit e0c1c2e5da19685a20557a50f10c6aa4fa26aa84, it was introduced in version v4.14 by commit 7d75bbb4bc1ad90386776459d37e4ddfe605671e. For more details please see the references link. | null | 2021-12-20T00:57:24.660243Z | 2021-10-19T16:34:56.839179Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7d75bbb4bc1ad90386776459d37e4ddfe605671e'} |
Linux | GSD-2022-1000396 | nvme-rdma: fix possible use-after-free in transport error_recovery work | nvme-rdma: fix possible use-after-free in transport error_recovery work
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.102 by commit 324f5bdc52ecb6a6dadb31a62823ef8c709d1439. For more details please see the references link. | null | 2022-03-07T01:31:05.759073Z | 2022-02-27T03:01:07.277208Z | null | null | null | null | null |
Linux | GSD-2021-1001301 | drm/sched: Avoid data corruptions | drm/sched: Avoid data corruptions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.51 by commit 0687411e2a8858262de2fc4a1d576016fd77292e. For more details please see the references link. | null | 2021-12-19T22:46:59.775173Z | 2021-08-03T02:01:57.425671Z | null | null | null | null | null |
Linux | GSD-2022-1002485 | mmc: host: Return an error when ->enable_sdio_irq() ops is missing | mmc: host: Return an error when ->enable_sdio_irq() ops is missing
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit fdbc5cd071e5b0fe286e8bedd467d7ba6bea3002. For more details please see the references link. | null | 2022-04-25T06:23:27.834672Z | 2022-04-24T22:53:16.722979Z | null | null | null | null | null |
Linux | GSD-2022-1000142 | scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe | scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.228 by commit 003bcee66a8f0e76157eb3af369c173151901d97, it was introduced in version v3.16 by commit d576a5e80cd07ea7049f8fd7b303c14df7b5d7d2. For more details please see the references link. | null | 2022-02-19T08:00:28.174870Z | 2022-02-18T21:46:39.519729Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d576a5e80cd07ea7049f8fd7b303c14df7b5d7d2'} |
Linux | GSD-2022-1000512 | net: dsa: felix: don't use devres for mdiobus | net: dsa: felix: don't use devres for mdiobus
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 9db6f056efd089e80d81c774c01b639adf30c097, it was introduced in version v5.9 by commit ac3a68d56651c3dad2c12c7afce065fe15267f44. For more details please see the references link. | null | 2022-03-07T01:44:01.424361Z | 2022-02-27T03:17:04.544907Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac3a68d56651c3dad2c12c7afce065fe15267f44'} |
Linux | GSD-2021-1001585 | usb: dwc2: check return value after calling platform_get_resource() | usb: dwc2: check return value after calling platform_get_resource()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.152 by commit 8b9c1c33e51d0959f2aec573dfbac0ffd3f5c0b7. For more details please see the references link. | null | 2021-12-20T02:12:09.572408Z | 2021-10-19T16:24:58.201665Z | null | null | null | null | null |
Linux | GSD-2021-1002203 | octeontx2-af: Fix possible null pointer dereference. | octeontx2-af: Fix possible null pointer dereference.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit c2d4c543f74c90f883e8ec62a31973ae8807d354, it was introduced in version v5.5 by commit 8756828a81485f7b28b588adbf0bac9bf6fc6651. For more details please see the references link. | null | 2021-12-20T01:11:10.540336Z | 2021-11-14T15:24:32.900372Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8756828a81485f7b28b588adbf0bac9bf6fc6651'} |
Linux | GSD-2022-1001753 | ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl | ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 1a3f1cf87054833242fcd0218de0481cf855f888, it was introduced in version v4.8 by commit 714fb87e8bc05ff78255afc0dca981e8c5242785. For more details please see the references link. | null | 2022-04-25T04:19:03.615086Z | 2022-04-24T21:39:45.987715Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/714fb87e8bc05ff78255afc0dca981e8c5242785'} |
Linux | GSD-2022-1000841 | riscv: Fix config KASAN && DEBUG_VIRTUAL | riscv: Fix config KASAN && DEBUG_VIRTUAL
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.104 by commit dd9dd24fd7cb5310fa1db2b1b03431c96663fa7c, it was introduced in version v5.6 by commit 8ad8b72721d0f07fa02dbe71f901743f9c71c8e6. For more details please see the references link. | null | 2022-03-18T02:59:51.813187Z | 2022-03-18T00:23:10.060676Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ad8b72721d0f07fa02dbe71f901743f9c71c8e6'} |
Linux | GSD-2021-1002653 | igbvf: fix double free in `igbvf_probe` | igbvf: fix double free in `igbvf_probe`
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.222 by commit cc9b655bb84f1be283293dfea94dff9a31b106ac, it was introduced in version v2.6.30 by commit d4e0fe01a38a073568aee541a0247fe734095979. For more details please see the references link. | null | 2022-01-11T05:47:28.249941Z | 2021-12-27T05:33:20.020242Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d4e0fe01a38a073568aee541a0247fe734095979'} |
Linux | GSD-2022-1001303 | cifs: fix NULL ptr dereference in smb2_ioctl_query_info() | cifs: fix NULL ptr dereference in smb2_ioctl_query_info()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 49bef50e585d738e957060f669e872b4ad15eb87. For more details please see the references link. | null | 2022-04-25T05:05:50.851422Z | 2022-04-24T21:02:28.751075Z | null | null | null | null | null |
Linux | GSD-2021-1000394 | KVM: Stop looking for coalesced MMIO zones if the bus is destroyed | KVM: Stop looking for coalesced MMIO zones if the bus is destroyed
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 2a20592baff59c5351c5200ec667e1a2aa22af85, it was introduced in version v5.9 by commit f65886606c2d3b562716de030706dfe1bea4ed5e. For more details please see the references link. | null | 2021-12-20T00:46:58.825634Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f65886606c2d3b562716de030706dfe1bea4ed5e'} |
Linux | GSD-2022-1001616 | jffs2: fix use-after-free in jffs2_clear_xattr_subsystem | jffs2: fix use-after-free in jffs2_clear_xattr_subsystem
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 22327bd7988f21de3a53c1373f3b81542bfe1f44, it was introduced in version v2.6.18 by commit aa98d7cf59b5b0764d3502662053489585faf2fe. For more details please see the references link. | null | 2022-04-25T06:23:12.573641Z | 2022-04-24T21:28:41.144926Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/aa98d7cf59b5b0764d3502662053489585faf2fe'} |
Linux | GSD-2022-1000904 | cifs: fix double free race when mount fails in cifs_get_root() | cifs: fix double free race when mount fails in cifs_get_root()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.233 by commit 2fe0e281f7ad0a62259649764228227dd6b2561d. For more details please see the references link. | null | 2022-03-18T02:54:59.105632Z | 2022-03-18T00:30:04.829848Z | null | null | null | null | null |
Linux | GSD-2021-1000681 | misc/uss720: fix memory leak in uss720_probe | misc/uss720: fix memory leak in uss720_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.235 by commit bcb30cc8f8befcbdbcf7a016e4dfd4747c54a364, it was introduced in version v2.6.14 by commit 0f36163d3abefbda1b21a330b3fdf3c2dc076d94. For more details please see the references link. | null | 2021-12-20T01:03:51.411345Z | 2021-06-04T20:01:19.180313Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0f36163d3abefbda1b21a330b3fdf3c2dc076d94'} |
Linux | GSD-2021-1001993 | comedi: dt9812: fix DMA buffers on stack | comedi: dt9812: fix DMA buffers on stack
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.217 by commit 39ea61037ae78f14fa121228dd962ea3280eacf3, it was introduced in version v2.6.29 by commit 63274cd7d38a3322d90b66a5bc976de1fb899051. For more details please see the references link. | null | 2021-12-19T23:05:46.360890Z | 2021-11-14T15:14:59.382132Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63274cd7d38a3322d90b66a5bc976de1fb899051'} |
Linux | GSD-2021-1002346 | usb: typec: tipd: Remove WARN_ON in tps6598x_block_read | usb: typec: tipd: Remove WARN_ON in tps6598x_block_read
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit 2c71811c963b6c310a29455d521d31a7ea6c5b5e. For more details please see the references link. | null | 2021-12-20T00:09:34.461870Z | 2021-11-29T02:39:47.813320Z | null | null | null | null | null |
Linux | GSD-2022-1001246 | ath11k: add missing of_node_put() to avoid leak | ath11k: add missing of_node_put() to avoid leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 7d51cb010b20d70b16dc6e4341bf29d6c5b32564, it was introduced in version v5.17 by commit 6ac04bdc5edb418787ab2040b1f922c23464c750. For more details please see the references link. | null | 2022-04-25T06:22:10.991288Z | 2022-04-24T20:57:28.144585Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6ac04bdc5edb418787ab2040b1f922c23464c750'} |
Linux | GSD-2021-1002716 | xen/blkfront: harden blkfront against event channel storms | xen/blkfront: harden blkfront against event channel storms
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.88 by commit 8ac3b6ee7c9ff2df7c99624bb1235e2e55623825. For more details please see the references link. | null | 2022-01-11T07:17:37.731892Z | 2021-12-27T05:38:40.841490Z | null | null | null | null | null |
Linux | GSD-2021-1001839 | mm, slub: fix mismatch between reconstructed freelist depth and cnt | mm, slub: fix mismatch between reconstructed freelist depth and cnt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit 48843dd23c7bfcb0f0c3a02926d660f939dc2b9f, it was introduced in version v4.17 by commit c3895391df385c6628638f014c87e16f5e2efd45. For more details please see the references link. | null | 2021-12-20T00:27:57.341477Z | 2021-10-28T13:51:36.839086Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c3895391df385c6628638f014c87e16f5e2efd45'} |
Linux | GSD-2021-1001090 | net: bridge: fix vlan tunnel dst refcnt when egressing | net: bridge: fix vlan tunnel dst refcnt when egressing
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit 25053a8404ba17ca48f5553d487afc1882e9f56c, it was introduced in version v4.11 by commit 11538d039ac6efcf4f1a6c536e1b87cd3668a9fd. For more details please see the references link. | null | 2021-12-20T00:36:22.776064Z | 2021-06-30T00:38:57.002785Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/11538d039ac6efcf4f1a6c536e1b87cd3668a9fd'} |
Linux | GSD-2022-1000457 | nvme-tcp: fix possible use-after-free in transport error_recovery work | nvme-tcp: fix possible use-after-free in transport error_recovery work
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit 5e42fca37ccc76f39f73732661bd47254cad5982. For more details please see the references link. | null | 2022-03-07T02:19:23.500264Z | 2022-02-27T03:09:33.441418Z | null | null | null | null | null |
Linux | GSD-2022-1002190 | drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire() | drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit c5e12c3a47db6f307483645baaab3776dff71a70, it was introduced in version v4.13 by commit 71c37505e7eaa01fa259debad1a71a7ae061039d. For more details please see the references link. | null | 2022-04-25T05:43:19.712592Z | 2022-04-24T22:20:26.054842Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/71c37505e7eaa01fa259debad1a71a7ae061039d'} |
Linux | GSD-2022-1001495 | virt: acrn: fix a memory leak in acrn_dev_ioctl() | virt: acrn: fix a memory leak in acrn_dev_ioctl()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit ee827d86ee73583c0f0b65db877467d9b5551aa4, it was introduced in version v5.12 by commit 9c5137aedd112f78a968bdd2325de2ea06df46c0. For more details please see the references link. | null | 2022-04-25T03:36:38.901772Z | 2022-04-24T21:17:01.184838Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9c5137aedd112f78a968bdd2325de2ea06df46c0'} |
Linux | GSD-2021-1000402 | selinux: add proper NULL termination to the secclass_map permissions | selinux: add proper NULL termination to the secclass_map permissions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 4c0ddc8712d9cd26459091c9f0c9e1a9f64815dc, it was introduced in version v4.15 by commit ec27c3568a34c7fe5fcf4ac0a354eda77687f7eb. For more details please see the references link. | null | 2021-12-20T01:39:15.874569Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ec27c3568a34c7fe5fcf4ac0a354eda77687f7eb'} |
Linux | GSD-2021-1002595 | ALSA: pcm: oss: Fix negative period/buffer sizes | ALSA: pcm: oss: Fix negative period/buffer sizes
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.8 by commit 00a860678098fcd9fa8db2b5fb9d2ddf4776d4cc. For more details please see the references link. | null | 2021-12-20T01:04:22.558918Z | 2021-12-19T19:44:22.271193Z | null | null | null | null | null |
Linux | GSD-2021-1000052 | thermal/drivers/cpufreq_cooling: Fix slab OOB issue | thermal/drivers/cpufreq_cooling: Fix slab OOB issue
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.3 by commit 6bf443acf6ca4f666d0e4225614ba9993a3aa1a9, it was introduced in version v5.8 by commit 371a3bc79c11b707d7a1b7a2c938dc3cc042fffb. For more details please see the references link. | null | 2021-12-19T23:36:15.028474Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/371a3bc79c11b707d7a1b7a2c938dc3cc042fffb'} |
Linux | GSD-2021-1001213 | cgroup: verify that source is a string | cgroup: verify that source is a string
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.4 by commit a41573667b39152176f6b08d10b4deb171e541c4, it was introduced in version v5.1 by commit 8d2451f4994fa60a57617282bab91b98266a00b1. For more details please see the references link. | null | 2021-12-19T22:15:02.414923Z | 2021-08-03T01:38:18.525925Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8d2451f4994fa60a57617282bab91b98266a00b1'} |
Linux | GSD-2022-1002313 | drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire() | drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit a17d93c9088c1b7d7ec42ce25573b93544e19616, it was introduced in version v4.13 by commit 71c37505e7eaa01fa259debad1a71a7ae061039d. For more details please see the references link. | null | 2022-04-25T03:21:03.401922Z | 2022-04-24T22:33:33.201532Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/71c37505e7eaa01fa259debad1a71a7ae061039d'} |
Linux | GSD-2021-1000951 | btrfs: promote debugging asserts to full-fledged checks in validate_super | btrfs: promote debugging asserts to full-fledged checks in validate_super
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.44 by commit 31fe243a6376e81f69ffab3853c35a6c4f3be5fc. For more details please see the references link. | null | 2021-12-20T01:13:03.804203Z | 2021-06-30T00:28:49.011945Z | null | null | null | null | null |
Linux | GSD-2021-1001643 | ipack: ipoctal: fix stack information leak | ipack: ipoctal: fix stack information leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.71 by commit 5f6a309a699675680df15d9b6d389114515b4426, it was introduced in version v3.5 by commit ba4dc61fe8c545a5d6a68b63616776556b771f51. For more details please see the references link. | null | 2021-12-19T23:29:17.404696Z | 2021-10-19T16:29:40.106466Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ba4dc61fe8c545a5d6a68b63616776556b771f51'} |
Linux | GSD-2021-1001356 | mISDN: fix possible use-after-free in HFC_cleanup() | mISDN: fix possible use-after-free in HFC_cleanup()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.133 by commit 3ecd228c636ee17c14662729737fa07242a93cb0. For more details please see the references link. | null | 2021-12-20T01:28:02.950217Z | 2021-08-03T02:16:57.951749Z | null | null | null | null | null |
Linux | GSD-2022-1001929 | cifs: fix handlecache and multiuser | cifs: fix handlecache and multiuser
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 2fafbc198613823943c106d1ec9b516da692059f. For more details please see the references link. | null | 2022-04-25T06:57:16.723910Z | 2022-04-24T21:55:50.546595Z | null | null | null | null | null |
Linux | GSD-2022-1001883 | media: usb: go7007: s2250-board: fix leak in probe() | media: usb: go7007: s2250-board: fix leak in probe()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 895364fa97e60749855f789bc4568883fc7a8b39, it was introduced in version v3.10 by commit d3b2ccd9e307eae80b4b4eeb0ede46cb02212df2. For more details please see the references link. | null | 2022-04-25T06:08:14.309612Z | 2022-04-24T21:51:38.835347Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d3b2ccd9e307eae80b4b4eeb0ede46cb02212df2'} |
Linux | GSD-2022-1000791 | btrfs: prevent copying too big compressed lzo segment | btrfs: prevent copying too big compressed lzo segment
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.26 by commit 8df508b7a44cd8110c726057cd28e8f8116885eb. For more details please see the references link. | null | 2022-03-18T03:00:40.084886Z | 2022-03-18T00:18:10.530815Z | null | null | null | null | null |
Linux | GSD-2021-1002829 | Input: elantech - fix stack out of bound access in elantech_change_report_id() | Input: elantech - fix stack out of bound access in elantech_change_report_id()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.12 by commit dfd5b60b5342b6b505a104e48f08ad9b9bdbbd7b, it was introduced in version v5.11 by commit e4c9062717feda88900b566463228d1c4910af6d. For more details please see the references link. | null | 2022-01-11T05:47:56.557213Z | 2021-12-30T02:45:14.396556Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e4c9062717feda88900b566463228d1c4910af6d'} |
Linux | GSD-2021-1000814 | ext4: fix memory leak in ext4_mb_init_backend on error path. | ext4: fix memory leak in ext4_mb_init_backend on error path.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit 04fb2baa0b147f51db065a1b13a11954abe592d0, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T22:38:01.310381Z | 2021-06-25T00:09:04.538778Z | null | null | null | null | null |
Linux | GSD-2021-1001706 | netfilter: nf_tables: Fix oversized kvmalloc() calls | netfilter: nf_tables: Fix oversized kvmalloc() calls
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit 14492ff9638796c75b09ee1b470d6a5a10994b1a. For more details please see the references link. | null | 2021-12-19T22:22:22.072299Z | 2021-10-19T16:32:48.610811Z | null | null | null | null | null |
Linux | GSD-2022-1002256 | udmabuf: validate ubuf->pagecount | udmabuf: validate ubuf->pagecount
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 5d50f851dd307c07ca5591297093f19967c834a9, it was introduced in version v4.20 by commit fbb0de795078190a9834b3409e4b009cfb18a6d4. For more details please see the references link. | null | 2022-04-25T06:18:47.376033Z | 2022-04-24T22:26:57.277222Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fbb0de795078190a9834b3409e4b009cfb18a6d4'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.