ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2021-1000547 | mptcp: fix data stream corruption | mptcp: fix data stream corruption
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit 18e7f0580da15cac1e79d73683ada5a9e70980f8, it was introduced in version v5.7 by commit 18b683bff89d46ace55f12d00c0440d44d6160c4. For more details please see the references link. | null | 2021-12-20T00:12:36.610433Z | 2021-06-04T19:36:31.790792Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/18b683bff89d46ace55f12d00c0440d44d6160c4'} |
Linux | GSD-2021-1002080 | drm/msm: Avoid potential overflow in timeout_to_jiffies() | drm/msm: Avoid potential overflow in timeout_to_jiffies()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit 697ee8c3d3fadfeb3ac270a3a3d2ce42b2c07557, it was introduced in version v5.6 by commit 6cedb8b377bba6520508399b74754b9a0ca06edf. For more details please see the references link. | null | 2021-12-19T23:58:52.137208Z | 2021-11-14T15:18:57.065390Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6cedb8b377bba6520508399b74754b9a0ca06edf'} |
Linux | GSD-2022-1001180 | remoteproc: qcom_q6v5_mss: Fix some leaks in q6v5_alloc_memory_region | remoteproc: qcom_q6v5_mss: Fix some leaks in q6v5_alloc_memory_region
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit b9df3007b3cda4936cc50f5a7d2d30505a652828, it was introduced in version v4.17 by commit 278d744c46fd4f1925aec77752d18a0e4a9cbec3. For more details please see the references link. | null | 2022-04-25T06:56:04.901863Z | 2022-04-24T20:51:13.457800Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/278d744c46fd4f1925aec77752d18a0e4a9cbec3'} |
Linux | GSD-2021-1000117 | scsi: qla2xxx: Reserve extra IRQ vectors | scsi: qla2xxx: Reserve extra IRQ vectors
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.20 by commit 4ecd42dec858b6632c5f024fe13e9ad6c30f2734, it was introduced in version v5.11 by commit a6dcfe08487e5e83b6b4214c959a9577a9ed2d9f. For more details please see the references link. | null | 2021-12-19T22:54:42.618891Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a6dcfe08487e5e83b6b4214c959a9577a9ed2d9f'} |
Linux | GSD-2022-1001397 | scsi: pm8001: Fix tag leaks on error | scsi: pm8001: Fix tag leaks on error
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit bdc74815f1c39905054b7d47399e0260b201b14d. For more details please see the references link. | null | 2022-04-25T06:02:05.200415Z | 2022-04-24T21:10:20.284987Z | null | null | null | null | null |
Linux | GSD-2021-1000300 | KVM: x86/mmu: Alloc page for PDPTEs when shadowing 32-bit NPT with 64-bit | KVM: x86/mmu: Alloc page for PDPTEs when shadowing 32-bit NPT with 64-bit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit a974aed548b20bf6483b6098d830cdd22fd5bcb8, it was introduced in version v4.19 by commit ee6268ba3a6861b2806e569bff7fe91fbdf846dd. For more details please see the references link. | null | 2021-12-20T00:45:22.995989Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ee6268ba3a6861b2806e569bff7fe91fbdf846dd'} |
Linux | GSD-2021-1002297 | arm64: dts: qcom: msm8998: Fix CPU/L2 idle state latency and residency | arm64: dts: qcom: msm8998: Fix CPU/L2 idle state latency and residency
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.82 by commit e52fecdd0c142b95c720683885b06ee3f0e065c8. For more details please see the references link. | null | 2021-12-20T01:40:28.776493Z | 2021-11-29T02:37:32.174164Z | null | null | null | null | null |
Linux | GSD-2021-1000750 | net: caif: fix memory leak in cfusbl_device_notify | net: caif: fix memory leak in cfusbl_device_notify
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.125 by commit 4d94f530cd24c85aede6e72b8923f371b45d6886, it was introduced in version v3.3 by commit 7ad65bf68d705b445ef10b77ab50dab22be185ee. For more details please see the references link. | null | 2021-12-20T00:38:22.800833Z | 2021-06-25T00:02:21.215866Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ad65bf68d705b445ef10b77ab50dab22be185ee'} |
Linux | GSD-2021-1001842 | audit: fix possible null-pointer dereference in audit_filter_rules | audit: fix possible null-pointer dereference in audit_filter_rules
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit 16802fa4c33eb1a8efb23f1e93365190e4047d05, it was introduced in version v5.3 by commit bf361231c295d92a28ca283ea713f56e93e55796. For more details please see the references link. | null | 2021-12-19T22:46:52.094913Z | 2021-10-28T13:51:44.825122Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf361231c295d92a28ca283ea713f56e93e55796'} |
Linux | GSD-2022-1002041 | media: atomisp: fix dummy_ptr check to avoid duplicate active_bo | media: atomisp: fix dummy_ptr check to avoid duplicate active_bo
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 41082d6432e5d8cfaaa49a3864c88a16535f8e95. For more details please see the references link. | null | 2022-04-25T04:41:28.645485Z | 2022-04-24T22:05:25.411410Z | null | null | null | null | null |
Linux | GSD-2022-1000586 | net: ieee802154: ca8210: Stop leaking skb's | net: ieee802154: ca8210: Stop leaking skb's
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.22 by commit 94cd597e20ed4acedb8f15f029d92998b011cb1a, it was introduced in version v4.12 by commit ded845a781a578dfb0b5b2c138e5a067aa3b1242. For more details please see the references link. | null | 2022-03-07T01:45:29.094319Z | 2022-02-27T03:27:40.495352Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ded845a781a578dfb0b5b2c138e5a067aa3b1242'} |
Linux | GSD-2021-1001511 | ipack: ipoctal: fix stack information leak | ipack: ipoctal: fix stack information leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.285 by commit 741ea2670e021350e54f491106bdaa22dc50e6a0, it was introduced in version v3.5 by commit ba4dc61fe8c545a5d6a68b63616776556b771f51. For more details please see the references link. | null | 2021-12-19T23:59:57.321449Z | 2021-10-19T16:21:32.658802Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ba4dc61fe8c545a5d6a68b63616776556b771f51'} |
Linux | GSD-2022-1002411 | KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs | KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit f15c05f476437c6d55055c29463c2228e9e4251e, it was introduced in version v4.2 by commit ca724305a2b02abcbecbf22577536fc8e965ab4f. For more details please see the references link. | null | 2022-04-25T05:54:50.123467Z | 2022-04-24T22:44:29.428723Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca724305a2b02abcbecbf22577536fc8e965ab4f'} |
Linux | GSD-2021-1001141 | dmaengine: mediatek: free the proper desc in desc_free handler | dmaengine: mediatek: free the proper desc in desc_free handler
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13 by commit 0a2ff58f9f8f95526ecb0ccd7517fefceb96f661. For more details please see the references link. | null | 2021-12-20T00:24:39.027056Z | 2021-07-08T01:59:13.496044Z | null | null | null | null | null |
Linux | GSD-2021-1001454 | jfs: fix GPF in diFree | jfs: fix GPF in diFree
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.276 by commit 745c9a59422c63f661f4374ed5181740db4130a1. For more details please see the references link. | null | 2021-12-19T22:42:01.454046Z | 2021-08-03T02:46:08.064602Z | null | null | null | null | null |
Linux | GSD-2022-1002104 | ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe | ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 662ee5ac6b451aa5a27b8eebd397f2f5c7f42cec, it was introduced in version v3.8 by commit 531f67e41dcde1e358cf821d056241a66355cf03. For more details please see the references link. | null | 2022-04-25T04:48:12.023906Z | 2022-04-24T22:11:46.514872Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/531f67e41dcde1e358cf821d056241a66355cf03'} |
Linux | GSD-2022-1000139 | iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() | iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.228 by commit a31cb1f0fb6caf46ffe88c41252b6b7a4ee062d9, it was introduced in version v4.19.135 by commit c0c489e5430530a7021f4c889cd5931597e4b200. For more details please see the references link. | null | 2022-02-19T04:38:54.571471Z | 2022-02-18T21:46:19.133952Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c0c489e5430530a7021f4c889cd5931597e4b200'} |
Linux | GSD-2022-1000093 | moxart: fix potential use-after-free on remove path | moxart: fix potential use-after-free on remove path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.301 by commit f5dc193167591e88797262ec78515a0cbe79ff5f. For more details please see the references link. | null | 2022-02-19T09:40:32.282823Z | 2022-02-18T21:34:25.124495Z | null | null | null | null | null |
Linux | GSD-2021-1001004 | net: ll_temac: Fix TX BD buffer overwrite | net: ll_temac: Fix TX BD buffer overwrite
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.46 by commit cfe403f209b11fad123a882100f0822a52a7630f, it was introduced in version v5.6 by commit 84823ff80f7403752b59e00bb198724100dc611c. For more details please see the references link. | null | 2021-12-20T00:06:41.178506Z | 2021-06-30T00:32:36.665853Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/84823ff80f7403752b59e00bb198724100dc611c'} |
Linux | GSD-2022-1000569 | staging: vc04_services: Fix RCU dereference check | staging: vc04_services: Fix RCU dereference check
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit 3f09310ec5b33540bd1d6d4663d112a8eb1ed8f4. For more details please see the references link. | null | 2022-03-07T01:40:24.141322Z | 2022-02-27T03:25:02.424856Z | null | null | null | null | null |
Linux | GSD-2021-1000245 | i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails | i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit b100650d80cd2292f6c152f5f2943b5944b3e8ce, it was introduced in version v4.16 by commit 13d6eb20fc79a1e606307256dad4098375539a09. For more details please see the references link. | null | 2021-12-19T23:28:42.956667Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/13d6eb20fc79a1e606307256dad4098375539a09'} |
Linux | GSD-2021-1002278 | x86/hyperv: Fix NULL deref in set_hv_tscchange_cb() if Hyper-V setup fails | x86/hyperv: Fix NULL deref in set_hv_tscchange_cb() if Hyper-V setup fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.82 by commit 9c177eee116cf888276d3748cb176e72562cfd5c, it was introduced in version v4.16 by commit 93286261de1b46339aa27cd4c639b21778f6cade. For more details please see the references link. | null | 2021-12-19T22:31:19.001342Z | 2021-11-29T02:36:44.818116Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/93286261de1b46339aa27cd4c639b21778f6cade'} |
Linux | GSD-2021-1002782 | hamradio: defer ax25 kfree after unregister_netdev | hamradio: defer ax25 kfree after unregister_netdev
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.260 by commit eaa816a86e629cbcc0a94f38391fee09231628c7. For more details please see the references link. | null | 2022-01-11T05:54:36.634584Z | 2021-12-30T02:43:13.332696Z | null | null | null | null | null |
Linux | GSD-2022-1001728 | PCI: endpoint: Fix alignment fault error in copy tests | PCI: endpoint: Fix alignment fault error in copy tests
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit bd21b9607bd76529b3cb8bc722f0beaa4aa508ae. For more details please see the references link. | null | 2022-04-25T04:15:54.563122Z | 2022-04-24T21:38:00.043991Z | null | null | null | null | null |
Linux | GSD-2022-1001682 | iommu/omap: Fix regression in probe for NULL pointer dereference | iommu/omap: Fix regression in probe for NULL pointer dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 47e239117bd97c8556f9187af7a9a7938db4e021, it was introduced in version v5.8 by commit 6785eb9105e3363aa51408c700a55e8b5f88fcf6. For more details please see the references link. | null | 2022-04-25T06:32:31.580169Z | 2022-04-24T21:34:43.067605Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6785eb9105e3363aa51408c700a55e8b5f88fcf6'} |
Linux | GSD-2022-1000990 | btrfs: release correct delalloc amount in direct IO write path | btrfs: release correct delalloc amount in direct IO write path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.4 by commit a04d37ddfe4be431b9e52e8504490376ab0a39a4, it was introduced in version v5.17 by commit f0bfa76a11e93d0fe2c896fcb566568c5e8b5d3f. For more details please see the references link. | null | 2022-04-25T06:45:57.519531Z | 2022-04-24T20:37:46.653250Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f0bfa76a11e93d0fe2c896fcb566568c5e8b5d3f'} |
Linux | GSD-2021-1000615 | bpf: No need to simulate speculative domain for immediates | bpf: No need to simulate speculative domain for immediates
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.41 by commit 27acfd11ba179b746f55077edf9750f8f7cb1cb6, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T22:23:08.731359Z | 2021-06-04T19:47:54.737809Z | null | null | null | null | null |
Linux | GSD-2021-1002628 | xen/netfront: harden netfront against event channel storms | xen/netfront: harden netfront against event channel storms
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.294 by commit 99120c8230fdd5e8b72a6e4162db9e1c0a61954a. For more details please see the references link. | null | 2022-01-11T05:53:43.822524Z | 2021-12-27T05:27:55.529135Z | null | null | null | null | null |
Linux | GSD-2021-1001907 | nvme-pci: Fix abort command id | nvme-pci: Fix abort command id
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit 5ccd69157a9a043f1fbcf7d6a09bcb7829b845aa, it was introduced in version v5.14.6 by commit 5c08d027f13644aa32588cc6b242833fa0989a95. For more details please see the references link. | null | 2021-12-20T00:17:41.891516Z | 2021-10-28T13:55:07.374075Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5c08d027f13644aa32588cc6b242833fa0989a95'} |
Linux | GSD-2022-1001378 | staging: vchiq_core: handle NULL result of find_service_by_handle | staging: vchiq_core: handle NULL result of find_service_by_handle
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 04202f54dd8899e10f56a89c4c1ede0043fa22af. For more details please see the references link. | null | 2022-04-25T04:19:34.786744Z | 2022-04-24T21:09:12.552972Z | null | null | null | null | null |
Linux | GSD-2022-1002387 | gcc-plugins: latent_entropy: use /dev/urandom | gcc-plugins: latent_entropy: use /dev/urandom
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 846737e63cfe7ee81788c4ca9babe0d3bf687677, it was introduced in version v4.9 by commit 38addce8b600ca335dc86fa3d48c890f1c6fa1f4. For more details please see the references link. | null | 2022-04-25T03:15:26.412450Z | 2022-04-24T22:41:36.801900Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/38addce8b600ca335dc86fa3d48c890f1c6fa1f4'} |
Linux | GSD-2022-1001952 | drivers: net: slip: fix NPD bug in sl_tx_timeout() | drivers: net: slip: fix NPD bug in sl_tx_timeout()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.112 by commit ca24c5e8f0ac3d43ec0cff29e1c861be73aff165. For more details please see the references link. | null | 2022-04-25T04:31:13.221063Z | 2022-04-24T21:57:36.632398Z | null | null | null | null | null |
Linux | GSD-2022-1000640 | net/mlx5e: Avoid field-overflowing memcpy() | net/mlx5e: Avoid field-overflowing memcpy()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.6 by commit 8fbdf8c8b8ab82beab882175157650452c46493e, it was introduced in version v4.9 by commit b5503b994ed5ed8dbfe821317e7b5b38acb065c5. For more details please see the references link. | null | 2022-03-07T01:31:13.213335Z | 2022-02-27T03:35:02.178998Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b5503b994ed5ed8dbfe821317e7b5b38acb065c5'} |
Linux | GSD-2022-1000210 | net: amd-xgbe: Fix skb data length underflow | net: amd-xgbe: Fix skb data length underflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.97 by commit 4d3fcfe8464838b3920bc2b939d888e0b792934e, it was introduced in version v4.11 by commit 622c36f143fc9566ba49d7cec994c2da1182d9e2. For more details please see the references link. | null | 2022-02-19T12:49:49.556720Z | 2022-02-18T21:55:54.144602Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/622c36f143fc9566ba49d7cec994c2da1182d9e2'} |
Linux | GSD-2021-1001287 | dm btree remove: assign new_root only when removal succeeds | dm btree remove: assign new_root only when removal succeeds
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.51 by commit ba47e65a5de3e0e8270301a409fc63d3129fdb9e. For more details please see the references link. | null | 2021-12-20T02:26:59.248139Z | 2021-08-03T01:57:42.795692Z | null | null | null | null | null |
Linux | GSD-2021-1002501 | serial: core: fix transmit-buffer reset and memleak | serial: core: fix transmit-buffer reset and memleak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.84 by commit e1722acf4f0d4d67b60f57e08ce16f8b66cd4b8f, it was introduced in version v4.9 by commit 761ed4a94582ab291aa24dcbea4e01e8936488c8. For more details please see the references link. | null | 2021-12-20T00:41:48.226175Z | 2021-12-19T19:40:04.814231Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/761ed4a94582ab291aa24dcbea4e01e8936488c8'} |
Linux | GSD-2022-1001051 | iavf: stop leaking iavf_status as "errno" values | iavf: stop leaking iavf_status as "errno" values
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 9dd165c40d8297c37112623fd884d8f8016fc0ee. For more details please see the references link. | null | 2022-04-25T06:32:12.655939Z | 2022-04-24T20:42:30.960164Z | null | null | null | null | null |
Linux | GSD-2021-1002151 | net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path | net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 94b960b9deffc02fc0747afc01f72cc62ab099e3, it was introduced in version v3.11 by commit e126ba97dba9edeb6fafa3665b5f8497fc9cdf8c. For more details please see the references link. | null | 2021-12-19T23:45:30.823517Z | 2021-11-14T15:22:09.691491Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e126ba97dba9edeb6fafa3665b5f8497fc9cdf8c'} |
Linux | GSD-2022-1001401 | powerpc/set_memory: Avoid spinlock recursion in change_page_attr() | powerpc/set_memory: Avoid spinlock recursion in change_page_attr()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 96917107e67846f1d959ed03be281048efad14c5. For more details please see the references link. | null | 2022-04-25T05:52:17.356509Z | 2022-04-24T21:10:31.921258Z | null | null | null | null | null |
Linux | GSD-2021-1000496 | platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios | platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.7 by commit 8d746ea7c687bab060a2c05a35c449302406cd52, it was introduced in version v4.15 by commit 1a258e670434f404a4500b65ba1afea2c2b29bba. For more details please see the references link. | null | 2021-12-20T01:22:14.421162Z | 2021-05-31T23:46:04.918828Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1a258e670434f404a4500b65ba1afea2c2b29bba'} |
Linux | GSD-2022-1001114 | ubifs: Fix to add refcount once page is set private | ubifs: Fix to add refcount once page is set private
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit fbeb2139eed65e929ce806c6468e6601ade01b1b, it was introduced in version v2.6.27 by commit 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d. For more details please see the references link. | null | 2022-04-25T05:37:22.635386Z | 2022-04-24T20:46:37.551024Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d'} |
Linux | GSD-2021-1000183 | ACPI: custom_method: fix potential use-after-free issue | ACPI: custom_method: fix potential use-after-free issue
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.118 by commit 72814a94c38a33239793f7622cec6ace1e540c4b, it was introduced in version v5.4 by commit 03d1571d9513369c17e6848476763ebbd10ec2cb. For more details please see the references link. | null | 2021-12-20T01:39:32.173668Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/03d1571d9513369c17e6848476763ebbd10ec2cb'} |
Linux | GSD-2021-1002444 | perf hist: Fix memory leak of a perf_hpp_fmt | perf hist: Fix memory leak of a perf_hpp_fmt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.164 by commit b380d09e44e8479e71e3ae8446b515a5b3166244. For more details please see the references link. | null | 2021-12-20T00:01:51.184635Z | 2021-12-19T19:37:39.984768Z | null | null | null | null | null |
Linux | GSD-2021-1000479 | powerpc/64s: Fix crashes when toggling entry flush barrier | powerpc/64s: Fix crashes when toggling entry flush barrier
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.269 by commit 0c25a7bb697f2e6ee65b6d63782f675bf129511a, it was introduced in version v4.9.245 by commit fa4bf9f38184ed7ca4916eb64f8c767d1e279c1f. For more details please see the references link. | null | 2021-12-20T00:54:13.768672Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fa4bf9f38184ed7ca4916eb64f8c767d1e279c1f'} |
Linux | GSD-2022-1001544 | drm/amd/display: Add affected crtcs to atomic state for dsc mst unplug | drm/amd/display: Add affected crtcs to atomic state for dsc mst unplug
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit e9bbd9504bfaf70d8a299fc243931b93ae9fc933, it was introduced in version v5.6 by commit 44be939ff7ac5858f0dbd8a2a4af1fe198e14db1. For more details please see the references link. | null | 2022-04-25T03:19:44.505449Z | 2022-04-24T21:22:03.423423Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/44be939ff7ac5858f0dbd8a2a4af1fe198e14db1'} |
Linux | GSD-2021-1002014 | net: mdiobus: Fix memory leak in __mdiobus_register | net: mdiobus: Fix memory leak in __mdiobus_register
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.156 by commit b0feaa8376f52357bf2fd020d0c471713a859728. For more details please see the references link. | null | 2021-12-19T23:25:34.305411Z | 2021-11-14T15:15:58.185110Z | null | null | null | null | null |
Linux | GSD-2021-1000029 | dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback | dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.32 by commit a5ad12d5d69c63af289a37f05187a0c6fe93553d, it was introduced in version v5.6 by commit bfe1d56091c1a404b3d4ce7e9809d745fc4453bb. For more details please see the references link. | null | 2021-12-20T01:37:53.824336Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bfe1d56091c1a404b3d4ce7e9809d745fc4453bb'} |
Linux | GSD-2022-1001817 | clk: qcom: ipq8074: fix PCI-E clock oops | clk: qcom: ipq8074: fix PCI-E clock oops
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 41e360fa73a4c2f5b78f5ded78a5375b08c206a5, it was introduced in version v5.9 by commit f0cfcf1ade201dcfd3365f231efc90e846fa46df. For more details please see the references link. | null | 2022-04-25T06:46:29.539076Z | 2022-04-24T21:44:41.572360Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f0cfcf1ade201dcfd3365f231efc90e846fa46df'} |
Linux | GSD-2022-1000705 | xfrm: fix MTU regression | xfrm: fix MTU regression
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.13 by commit 53b06e55c38b8f23f2552b83a3a07056a986fbda, it was introduced in version v4.15 by commit 749439bfac6e1a2932c582e2699f91d329658196. For more details please see the references link. | null | 2022-03-18T04:18:40.707936Z | 2022-03-18T00:11:19.915973Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/749439bfac6e1a2932c582e2699f91d329658196'} |
Linux | GSD-2021-1000880 | perf: Fix data race between pin_count increment/decrement | perf: Fix data race between pin_count increment/decrement
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.195 by commit db72bdb5c7981e7f1f7ffb46282e784292e7f112, it was introduced in version v2.6.39 by commit fe4b04fa31a6dcf4358aa84cf81e5a7fd079469b. For more details please see the references link. | null | 2021-12-20T00:53:21.181182Z | 2021-06-30T00:03:18.023311Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fe4b04fa31a6dcf4358aa84cf81e5a7fd079469b'} |
Linux | GSD-2021-1001792 | drm/msm: Fix null pointer dereference on pointer edp | drm/msm: Fix null pointer dereference on pointer edp
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.252 by commit 0cd063aa0a09822cc1620fc59a67fe2f9f6338ac, it was introduced in version v4.0 by commit ab5b0107ccf3821a6837b0f2819270d6fa0b278f. For more details please see the references link. | null | 2021-12-20T01:22:31.398475Z | 2021-10-28T13:49:05.544421Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab5b0107ccf3821a6837b0f2819270d6fa0b278f'} |
Linux | GSD-2021-1001268 | watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() | watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.52 by commit a173e3b62cf6dd3c4a0a10c8a82eedfcae81a566. For more details please see the references link. | null | 2021-12-20T00:01:48.236441Z | 2021-08-03T01:53:40.975001Z | null | null | null | null | null |
Linux | GSD-2022-1000355 | nvme-rdma: fix possible use-after-free in transport error_recovery work | nvme-rdma: fix possible use-after-free in transport error_recovery work
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.181 by commit d411b2a5da68b8a130c23097014434ac140a2ace. For more details please see the references link. | null | 2022-03-07T01:38:20.010361Z | 2022-02-27T02:55:47.868226Z | null | null | null | null | null |
Linux | GSD-2022-1002368 | block: don't delete queue kobject before its children | block: don't delete queue kobject before its children
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit b2001eb10f59363da930cdd6e086a2861986fa18, it was introduced in version v4.16 by commit 2c2086afc2b8b974fac32cb028e73dc27bfae442. For more details please see the references link. | null | 2022-04-25T05:40:00.855520Z | 2022-04-24T22:39:38.148716Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c2086afc2b8b974fac32cb028e73dc27bfae442'} |
Linux | GSD-2021-1001638 | ext4: add error checking to ext4_ext_replay_set_iblocks() | ext4: add error checking to ext4_ext_replay_set_iblocks()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.71 by commit a63474dbf692dd09b50fed592bc41f6de5f102fc, it was introduced in version v5.10 by commit 8016e29f4362e285f0f7e38fadc61a5b7bdfdfa2. For more details please see the references link. | null | 2021-12-19T22:13:38.764481Z | 2021-10-19T16:29:24.853219Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8016e29f4362e285f0f7e38fadc61a5b7bdfdfa2'} |
Linux | GSD-2022-1000181 | Bluetooth: refactor malicious adv data check | Bluetooth: refactor malicious adv data check
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.96 by commit 83d5196b65d1b29e27d7dd16a3b9b439fb1d2dba. For more details please see the references link. | null | 2022-02-20T06:40:40.311396Z | 2022-02-18T21:51:50.454372Z | null | null | null | null | null |
Linux | GSD-2021-1001116 | cfg80211: call cfg80211_leave_ocb when switching away from OCB | cfg80211: call cfg80211_leave_ocb when switching away from OCB
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.129 by commit f2c027a7750f2d7a35cd95858163cce9aae4c1aa. For more details please see the references link. | null | 2021-12-20T00:37:43.325210Z | 2021-07-08T01:57:23.273500Z | null | null | null | null | null |
Linux | GSD-2022-1002446 | video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() | video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 0fd28daec73525382e5c992db8743bf76e42cd5c, it was introduced in version v3.2 by commit 3c8a63e22a0802fd56380f6ab305b419f18eb6f5. For more details please see the references link. | null | 2022-04-25T06:30:20.542213Z | 2022-04-24T22:48:49.445591Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c8a63e22a0802fd56380f6ab305b419f18eb6f5'} |
Linux | GSD-2021-1001546 | staging: greybus: uart: fix tty use after free | staging: greybus: uart: fix tty use after free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.249 by commit 64062fcaca8872f063ec9da011e7bf30470be33f, it was introduced in version v4.9 by commit a18e15175708d39abbe9746ddc3479466b7800c3. For more details please see the references link. | null | 2021-12-19T23:53:32.001310Z | 2021-10-19T16:23:09.451217Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a18e15175708d39abbe9746ddc3479466b7800c3'} |
Linux | GSD-2022-1002016 | drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj | drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit 927beb05aaa429c883cc0ec6adc48964b187e291. For more details please see the references link. | null | 2022-04-25T06:02:24.547242Z | 2022-04-24T22:03:02.606500Z | null | null | null | null | null |
Linux | GSD-2022-1001790 | btrfs: make search_csum_tree return 0 if we get -EFBIG | btrfs: make search_csum_tree return 0 if we get -EFBIG
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit c78bada18aa11ee70a8e26e1972595539617425a. For more details please see the references link. | null | 2022-04-25T06:44:10.884265Z | 2022-04-24T21:42:29.637182Z | null | null | null | null | null |
Linux | GSD-2022-1000882 | xhci: Prevent futile URB re-submissions due to incorrect return value. | xhci: Prevent futile URB re-submissions due to incorrect return value.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.182 by commit 1879db4f25212f5f946fd88207e56ac107632a58, it was introduced in version v3.11 by commit 203a86613fb3bf2767335659513fa98563a3eb71. For more details please see the references link. | null | 2022-03-18T02:55:16.265994Z | 2022-03-18T00:27:24.317168Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/203a86613fb3bf2767335659513fa98563a3eb71'} |
Linux | GSD-2021-1000707 | Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails | Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.271 by commit 61a811e8f5229264b822361f8b23d7638fd8c914, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T00:10:58.385081Z | 2021-06-04T20:06:55.454261Z | null | null | null | null | null |
Linux | GSD-2021-1001815 | mm, slub: fix potential memoryleak in kmem_cache_open() | mm, slub: fix potential memoryleak in kmem_cache_open()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.156 by commit 4f5d1c29cfab5cb0ab885059818751bdef32e2bb, it was introduced in version v4.8 by commit 210e7a43fa905bccafa9bb5966fba1d71f33eb8b. For more details please see the references link. | null | 2021-12-19T22:38:06.376163Z | 2021-10-28T13:50:24.341040Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/210e7a43fa905bccafa9bb5966fba1d71f33eb8b'} |
Linux | GSD-2021-1000357 | i2c: cadence: fix reference leak when pm_runtime_get_sync fails | i2c: cadence: fix reference leak when pm_runtime_get_sync fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 30410519328c94367e561fd878e5f0d3a0303585, it was introduced in version v4.5 by commit 7fa32329ca03148fb2c07b4ef3247b8fc0488d6a. For more details please see the references link. | null | 2021-12-20T01:24:03.156371Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7fa32329ca03148fb2c07b4ef3247b8fc0488d6a'} |
Linux | GSD-2021-1002690 | bpf: Fix signed bounds propagation after mov32 | bpf: Fix signed bounds propagation after mov32
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.88 by commit e2aad0b5f2cbf71a31d00ce7bb4dee948adff5a9, it was introduced in version v5.7 by commit 3f50f132d8400e129fc9eb68b5020167ef80a244. For more details please see the references link. | null | 2022-01-11T05:58:07.947712Z | 2021-12-27T05:36:57.704273Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f50f132d8400e129fc9eb68b5020167ef80a244'} |
Linux | GSD-2022-1000928 | usb: gadget: rndis: add spinlock for rndis response list | usb: gadget: rndis: add spinlock for rndis response list
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.269 by commit 669c2b178956718407af5631ccbc61c24413f038, it was introduced in version v4.6 by commit f6281af9d62e128aa6efad29cf7265062af114f2. For more details please see the references link. | null | 2022-03-18T03:00:24.950810Z | 2022-03-18T00:33:01.545751Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f6281af9d62e128aa6efad29cf7265062af114f2'} |
Linux | GSD-2021-1002385 | iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove | iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.293 by commit 60a55b9d91ba99eb8cf015bc46dc2de05e168a15, it was introduced in version v4.2 by commit a25691c1f9674090fb66586cf4c5d60d3efdf339. For more details please see the references link. | null | 2021-12-20T00:01:21.702510Z | 2021-12-19T19:35:02.742586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a25691c1f9674090fb66586cf4c5d60d3efdf339'} |
Linux | GSD-2021-1000642 | misc/uss720: fix memory leak in uss720_probe | misc/uss720: fix memory leak in uss720_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.124 by commit 36b5ff1db1a4ef4fdbc2bae364344279f033ad88, it was introduced in version v2.6.14 by commit 0f36163d3abefbda1b21a330b3fdf3c2dc076d94. For more details please see the references link. | null | 2021-12-20T00:17:59.511380Z | 2021-06-04T19:53:15.418540Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0f36163d3abefbda1b21a330b3fdf3c2dc076d94'} |
Linux | GSD-2021-1001950 | comedi: vmk80xx: fix transfer-buffer overflows | comedi: vmk80xx: fix transfer-buffer overflows
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.290 by commit ec85bcff4ed09260243d8f39faba99e1041718ba, it was introduced in version v2.6.31 by commit 985cafccbf9b7f862aa1c5ee566801e18b5161fb. For more details please see the references link. | null | 2021-12-19T23:41:38.175468Z | 2021-11-14T15:13:06.461391Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/985cafccbf9b7f862aa1c5ee566801e18b5161fb'} |
Linux | GSD-2022-1001285 | media: davinci: vpif: fix use-after-free on driver unbind | media: davinci: vpif: fix use-after-free on driver unbind
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 9ffc602e14d7b9f7e7cb2f67e18dfef9ef8af676, it was introduced in version v4.13 by commit 479f7a1181058689435baddc16a6a42e1a8ff0e8. For more details please see the references link. | null | 2022-04-25T06:39:20.499125Z | 2022-04-24T21:01:23.212667Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/479f7a1181058689435baddc16a6a42e1a8ff0e8'} |
Linux | GSD-2021-1000212 | libbpf: Fix signed overflow in ringbuf_process_ring | libbpf: Fix signed overflow in ringbuf_process_ring
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.5 by commit 117151b0d560c286be000a212d30a9e813e55ed7, it was introduced in version v5.8 by commit bf99c936f9478a05d51e9f101f90de70bee9a89c. For more details please see the references link. | null | 2021-12-19T23:16:57.022346Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf99c936f9478a05d51e9f101f90de70bee9a89c'} |
Linux | GSD-2022-1002503 | ath9k_htc: fix uninit value bugs | ath9k_htc: fix uninit value bugs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit 5c2a6a8daa17a3f65b38b9a5574bb362c13fa1d9, it was introduced in version v2.6.35 by commit fb9987d0f748c983bb795a86f47522313f701a08. For more details please see the references link. | null | 2022-04-25T04:48:36.421562Z | 2022-04-24T22:55:23.716934Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb9987d0f748c983bb795a86f47522313f701a08'} |
Linux | GSD-2021-1001053 | batman-adv: Avoid WARN_ON timing related checks | batman-adv: Avoid WARN_ON timing related checks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit 2eb4e0b3631832a4291c8bf4c9db873f60b128c8, it was introduced in version v3.14 by commit ef0a937f7a1450d3a133ccd83c9c7d07587e7a00. For more details please see the references link. | null | 2021-12-20T00:35:19.952536Z | 2021-06-30T00:36:32.278330Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef0a937f7a1450d3a133ccd83c9c7d07587e7a00'} |
Linux | GSD-2022-1002153 | ax25: Fix UAF bugs in ax25 timers | ax25: Fix UAF bugs in ax25 timers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.190 by commit a83a18c4c9033fb6604c587f52a2d78857cf0ac2. For more details please see the references link. | null | 2022-04-25T04:54:35.865689Z | 2022-04-24T22:16:34.108018Z | null | null | null | null | null |
Linux | GSD-2022-1000494 | arm64: errata: Add detection for TRBE invalid prohibited states | arm64: errata: Add detection for TRBE invalid prohibited states
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 12c7ff193e5716296898a5a63d4aaeed5ab3bd0e. For more details please see the references link. | null | 2022-03-07T01:36:11.322430Z | 2022-02-27T03:15:03.257556Z | null | null | null | null | null |
Linux | GSD-2021-1001403 | KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow | KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.241 by commit b67a821813c7b8160b54d83928281fec84a42d88, it was introduced in version v3.10 by commit 8e591cb7204739efa8e15967ea334eb367039dde. For more details please see the references link. | null | 2021-12-20T00:31:09.090865Z | 2021-08-03T02:30:29.810453Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8e591cb7204739efa8e15967ea334eb367039dde'} |
Linux | GSD-2022-1001456 | media: imx-jpeg: fix a bug of accessing array out of bounds | media: imx-jpeg: fix a bug of accessing array out of bounds
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 20c8b90430c5d6c4a3936eaa7c35aac670581487. For more details please see the references link. | null | 2022-04-25T07:05:05.639423Z | 2022-04-24T21:14:39.759978Z | null | null | null | null | null |
Linux | GSD-2021-1002106 | blk-cgroup: blk_cgroup_bio_start() should use irq-safe operations on blkg->iostat_cpu | blk-cgroup: blk_cgroup_bio_start() should use irq-safe operations on blkg->iostat_cpu
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit b1a34f86b41fd89441fa0e245b6b23627b0d73d3, it was introduced in version v5.13 by commit 2d146aa3aa842d7f5065802556b4f9a2c6e8ef12. For more details please see the references link. | null | 2021-12-20T01:10:10.829257Z | 2021-11-14T15:20:09.187670Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2d146aa3aa842d7f5065802556b4f9a2c6e8ef12'} |
Linux | GSD-2022-1001006 | btrfs: zoned: traverse devices under chunk_mutex in btrfs_can_activate_zone | btrfs: zoned: traverse devices under chunk_mutex in btrfs_can_activate_zone
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 142f822bd945a7be442a2916ec6167cc102c4183, it was introduced in version v5.16 by commit a85f05e59bc15a83ad910dbcb71df5ad8fa77295. For more details please see the references link. | null | 2022-04-25T06:38:55.250971Z | 2022-04-24T20:38:59.367443Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a85f05e59bc15a83ad910dbcb71df5ad8fa77295'} |
Linux | GSD-2021-1000091 | netfilter: conntrack: Make global sysctls readonly in non-init netns | netfilter: conntrack: Make global sysctls readonly in non-init netns
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.2 by commit 671c54ea8c7ff47bd88444f3fffb65bf9799ce43, it was introduced in version v5.7 by commit d0febd81ae77a0e13717f1412ff9589e43fc4f8b. For more details please see the references link. | null | 2021-12-20T00:03:10.806676Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0febd81ae77a0e13717f1412ff9589e43fc4f8b'} |
Linux | GSD-2021-1002556 | ipv6: fix memory leak in fib6_rule_suppress | ipv6: fix memory leak in fib6_rule_suppress
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.7 by commit 8ef8a76a340ebdb2c2eea3f6fb0ebbed09a16383, it was introduced in version v5.4 by commit ca7a03c4175366a92cee0ccc4fec0038c3266e26. For more details please see the references link. | null | 2021-12-20T01:30:46.097977Z | 2021-12-19T19:42:31.452390Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca7a03c4175366a92cee0ccc4fec0038c3266e26'} |
Linux | GSD-2022-1000247 | KVM: LAPIC: Also cancel preemption timer during SET_LAPIC | KVM: LAPIC: Also cancel preemption timer during SET_LAPIC
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.19 by commit 54b3439c8e70e0bcfea59aeef9dd98908cbbf655. For more details please see the references link. | null | 2022-02-19T08:47:50.305939Z | 2022-02-18T22:00:57.955922Z | null | null | null | null | null |
Linux | GSD-2021-1002805 | ipmi: fix initialization when workqueue allocation fails | ipmi: fix initialization when workqueue allocation fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.89 by commit 8b745616ba8f2db389a59e5678fdbe28ad5883bf, it was introduced in version v5.10.84 by commit f717f29e84688b0327ae6e51fabaf397fbcd18d3. For more details please see the references link. | null | 2022-01-11T05:52:20.083333Z | 2021-12-30T02:44:14.522946Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f717f29e84688b0327ae6e51fabaf397fbcd18d3'} |
Linux | GSD-2021-1000838 | bonding: init notify_work earlier to avoid uninitialized use | bonding: init notify_work earlier to avoid uninitialized use
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.273 by commit e7e1ef6a9b7699c5315c0687fe695a2b8ed4c142. For more details please see the references link. | null | 2021-12-19T22:48:54.570218Z | 2021-06-30T00:00:31.692251Z | null | null | null | null | null |
Linux | GSD-2022-1001905 | ext4: fix fs corruption when tring to remove a non-empty directory with IO error | ext4: fix fs corruption when tring to remove a non-empty directory with IO error
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 597393cde8411ebd2098c819a29c2de23f66af65. For more details please see the references link. | null | 2022-04-25T05:15:36.561932Z | 2022-04-24T21:53:35.469135Z | null | null | null | null | null |
Linux | GSD-2022-1000617 | mm, kasan: use compare-exchange operation to set KASAN page tag | mm, kasan: use compare-exchange operation to set KASAN page tag
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.5 by commit dd22253c13d2795c566f52c30f1dba48d51c482d, it was introduced in version v5.0 by commit 2813b9c0296259fb11e75c839bab2d958ba4f96c. For more details please see the references link. | null | 2022-03-07T01:37:54.346944Z | 2022-02-27T03:31:48.956242Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2813b9c0296259fb11e75c839bab2d958ba4f96c'} |
Linux | GSD-2021-1000992 | phy: phy-mtk-tphy: Fix some resource leaks in mtk_phy_init() | phy: phy-mtk-tphy: Fix some resource leaks in mtk_phy_init()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.46 by commit 9a17907946232d01aa2ec109da5f93b8d31dd425. For more details please see the references link. | null | 2021-12-20T00:32:02.977130Z | 2021-06-30T00:31:52.669277Z | null | null | null | null | null |
Linux | GSD-2021-1001680 | x86/entry: Clear X86_FEATURE_SMAP when CONFIG_X86_SMAP=n | x86/entry: Clear X86_FEATURE_SMAP when CONFIG_X86_SMAP=n
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.12 by commit 4e9ec1c65da98c293f75d83755dfa5e03075a6d0, it was introduced in version v5.8 by commit 3c73b81a9164d0c1b6379d6672d2772a9e95168e. For more details please see the references link. | null | 2021-12-19T22:19:47.758585Z | 2021-10-19T16:31:31.832470Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c73b81a9164d0c1b6379d6672d2772a9e95168e'} |
Linux | GSD-2022-1000302 | net: do not keep the dst cache when uncloning an skb dst and its metadata | net: do not keep the dst cache when uncloning an skb dst and its metadata
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.267 by commit 39a269fbb80a9e905818d332aebe6651fd7a1ee9, it was introduced in version v4.6 by commit d71785ffc7e7cae3fbdc4ea8a9d05b7a1c59f7b8. For more details please see the references link. | null | 2022-03-07T01:53:27.622552Z | 2022-02-27T02:48:22.775202Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d71785ffc7e7cae3fbdc4ea8a9d05b7a1c59f7b8'} |
Linux | GSD-2021-1001395 | coresight: tmc-etf: Fix global-out-of-bounds in tmc_update_etf_buffer() | coresight: tmc-etf: Fix global-out-of-bounds in tmc_update_etf_buffer()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.198 by commit 04bd77ef4f4d9fc6102023b85f4590fc2130aac5, it was introduced in version v4.14 by commit 0c3fc4d5fa26092853278145aca9b21fa52a3e93. For more details please see the references link. | null | 2021-12-20T00:22:40.511529Z | 2021-08-03T02:27:39.717595Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0c3fc4d5fa26092853278145aca9b21fa52a3e93'} |
Linux | GSD-2022-1002295 | cifs: potential buffer overflow in handling symlinks | cifs: potential buffer overflow in handling symlinks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.239 by commit eb5f51756944735ac70cd8bb38637cc202e29c91, it was introduced in version v2.6.37 by commit c69c1b6eaea1b3e1eecf7ad2fba0208ac4a11131. For more details please see the references link. | null | 2022-04-25T06:43:44.589912Z | 2022-04-24T22:31:15.180953Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c69c1b6eaea1b3e1eecf7ad2fba0208ac4a11131'} |
Linux | GSD-2022-1001840 | mips: cdmm: Fix refcount leak in mips_cdmm_phys_base | mips: cdmm: Fix refcount leak in mips_cdmm_phys_base
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 69155dc2e04777aa94207a73a8b10f12b8428a68, it was introduced in version v5.9 by commit 2121aa3e2312ccc1d6299154dc4f07a6ab8beee2. For more details please see the references link. | null | 2022-04-25T04:41:20.006073Z | 2022-04-24T21:46:57.451218Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2121aa3e2312ccc1d6299154dc4f07a6ab8beee2'} |
Linux | GSD-2022-1000752 | KVM: x86/mmu: make apf token non-zero to fix bug | KVM: x86/mmu: make apf token non-zero to fix bug
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.12 by commit 62040f5cd7d937de547836e747b6aa8212fec573. For more details please see the references link. | null | 2022-03-18T02:57:16.321323Z | 2022-03-18T00:15:22.521254Z | null | null | null | null | null |
Linux | GSD-2021-1002043 | ocfs2: mount fails with buffer overflow in strlen | ocfs2: mount fails with buffer overflow in strlen
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit 93be0eeea14cf39235e585c8f56df3b3859deaad. For more details please see the references link. | null | 2021-12-19T23:41:11.265327Z | 2021-11-14T15:17:18.150913Z | null | null | null | null | null |
Linux | GSD-2022-1001513 | mptcp: Fix crash due to tcp_tsorted_anchor was initialized before release skb | mptcp: Fix crash due to tcp_tsorted_anchor was initialized before release skb
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 752add6f5ce5305e55d8bda4ac8d69be3a09f14d, it was introduced in version v5.16 by commit f70cad1085d1e01d3ec73c1078405f906237feee. For more details please see the references link. | null | 2022-04-25T05:33:14.978700Z | 2022-04-24T21:19:04.905296Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f70cad1085d1e01d3ec73c1078405f906237feee'} |
Linux | GSD-2021-1000584 | interconnect: qcom: bcm-voter: add a missing of_node_put() | interconnect: qcom: bcm-voter: add a missing of_node_put()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.42 by commit 4e3cea8035b6f1b9055e69cc6ebf9fa4e50763ae, it was introduced in version v5.7 by commit 976daac4a1c581e5d5fd64047519fd6fcde39738. For more details please see the references link. | null | 2021-12-20T01:33:54.432152Z | 2021-06-04T19:42:55.477198Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/976daac4a1c581e5d5fd64047519fd6fcde39738'} |
Linux | GSD-2021-1002413 | ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() | ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.220 by commit dd07f8971b81ad98cc754b179b331b57f35aa1ff. For more details please see the references link. | null | 2021-12-19T23:27:14.877328Z | 2021-12-19T19:36:11.203123Z | null | null | null | null | null |
Linux | GSD-2022-1001143 | media: staging: media: zoran: move videodev alloc | media: staging: media: zoran: move videodev alloc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 1e501ec38796f43e995731d1bcd4173cb1ccfce0. For more details please see the references link. | null | 2022-04-25T06:34:00.054782Z | 2022-04-24T20:48:43.181900Z | null | null | null | null | null |
Linux | GSD-2021-1002686 | xen/console: harden hvc_xen against event channel storms | xen/console: harden hvc_xen against event channel storms
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.168 by commit 560e64413b4a6d9bd6630e350d5f2e6a05f6ffe3. For more details please see the references link. | null | 2022-01-11T05:53:42.470920Z | 2021-12-27T05:36:48.424560Z | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.