ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2022-1001266 | media: ti-vpe: cal: Fix a NULL pointer dereference in cal_ctx_v4l2_init_formats() | media: ti-vpe: cal: Fix a NULL pointer dereference in cal_ctx_v4l2_init_formats()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 1381f1a629a090c251965edb56f849ad648414a4, it was introduced in version v5.12 by commit 7168155002cf7aadbfaa14a28f037c880a214764. For more details please see the references link. | null | 2022-04-25T05:59:02.330287Z | 2022-04-24T20:59:31.739690Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7168155002cf7aadbfaa14a28f037c880a214764'} |
Linux | GSD-2021-1002736 | tee: amdtee: fix an IS_ERR() vs NULL bug | tee: amdtee: fix an IS_ERR() vs NULL bug
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit 832f3655c6138c23576ed268e31cc76e0f05f2b1, it was introduced in version v5.6 by commit 757cc3e9ff1d72d014096399d6e2bf03974d9da1. For more details please see the references link. | null | 2022-01-11T05:58:35.281505Z | 2021-12-27T05:45:37.895598Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/757cc3e9ff1d72d014096399d6e2bf03974d9da1'} |
Linux | GSD-2021-1001819 | powerpc/idle: Don't corrupt back chain when going idle | powerpc/idle: Don't corrupt back chain when going idle
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.156 by commit 8e25a62e8dab7bb09da337354ed1be5df61f83a0, it was introduced in version v5.4.156 by commit 80bbb0bc3a0288442f7fe6fc514f4ee1cb06ccb7. For more details please see the references link. | null | 2021-10-28T13:50:34.905869Z | 2021-10-28T13:50:34.905869Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80bbb0bc3a0288442f7fe6fc514f4ee1cb06ccb7'} |
Linux | GSD-2022-1000027 | sctp: use call_rcu to free endpoint | sctp: use call_rcu to free endpoint
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.224 by commit af6e6e58f7ebf86b4e7201694b1e4f3a62cbc3ec, it was introduced in version v4.14 by commit d25adbeb0cdb860fb39e09cdd025e9cfc954c5ab. For more details please see the references link. | null | 2022-01-11T05:56:45.862683Z | 2022-01-10T19:50:45.281441Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d25adbeb0cdb860fb39e09cdd025e9cfc954c5ab'} |
Linux | GSD-2022-1000477 | HID: elo: fix memory leak in elo_probe | HID: elo: fix memory leak in elo_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit de0d102d0c8c681fc9a3263d842fb35f7cf662f4, it was introduced in version v5.15 by commit fbf42729d0e91332e8ce75a1ecce08b8a2dab9c1. For more details please see the references link. | null | 2022-03-07T01:49:04.466729Z | 2022-02-27T03:12:28.608448Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fbf42729d0e91332e8ce75a1ecce08b8a2dab9c1'} |
Linux | GSD-2022-1000498 | riscv: eliminate unreliable __builtin_frame_address(1) | riscv: eliminate unreliable __builtin_frame_address(1)
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 7324a299fa544bdce6bced422a0923dbed513266, it was introduced in version v5.13 by commit eac2f3059e02382d91f8c887462083841d6ea2a3. For more details please see the references link. | null | 2022-03-07T01:31:04.702903Z | 2022-02-27T03:15:29.989478Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/eac2f3059e02382d91f8c887462083841d6ea2a3'} |
Linux | GSD-2022-1000162 | ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback | ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.177 by commit f2a186a44e7e066d3418f80b2627f02677853b13, it was introduced in version v5.4.82 by commit beead010654d0e0432166fccec290e10273b8c46. For more details please see the references link. | null | 2022-02-20T06:43:54.329585Z | 2022-02-18T21:48:56.885239Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/beead010654d0e0432166fccec290e10273b8c46'} |
Linux | GSD-2022-1000532 | mm: don't try to NUMA-migrate COW pages that have other uses | mm: don't try to NUMA-migrate COW pages that have other uses
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit d187eeb02d18446e5e54ed6bcbf8b47e6551daea, it was introduced in version v5.9 by commit 09854ba94c6aad7886996bfbee2530b3d8a7f4f4. For more details please see the references link. | null | 2022-03-07T01:33:51.815841Z | 2022-02-27T03:20:09.804637Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/09854ba94c6aad7886996bfbee2530b3d8a7f4f4'} |
Linux | GSD-2021-1002223 | usb: musb: tusb6010: check return value after calling platform_get_resource() | usb: musb: tusb6010: check return value after calling platform_get_resource()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.293 by commit 1ba7605856e05fa991d4654ac69e5ace66c767b9. For more details please see the references link. | null | 2021-12-20T00:35:11.516175Z | 2021-11-29T02:34:08.260314Z | null | null | null | null | null |
Linux | GSD-2022-1001289 | ext4: fix fs corruption when tring to remove a non-empty directory with IO error | ext4: fix fs corruption when tring to remove a non-empty directory with IO error
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 988fbad2ee18c01c23cec5f66200387303246030. For more details please see the references link. | null | 2022-04-25T04:17:03.085829Z | 2022-04-24T21:01:34.894803Z | null | null | null | null | null |
Linux | GSD-2022-1001773 | drm/i915: Treat SAGV block time 0 as SAGV disabled | drm/i915: Treat SAGV block time 0 as SAGV disabled
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 102cba6d5ae2378a8467504c71ac1008658f36c6. For more details please see the references link. | null | 2022-04-25T03:45:17.222423Z | 2022-04-24T21:41:34.949043Z | null | null | null | null | null |
Linux | GSD-2022-1000861 | gso: do not skip outer ip header in case of ipip and net_failover | gso: do not skip outer ip header in case of ipip and net_failover
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.103 by commit dac2490d9ee0b89dffc72f1172b8bbeb60eaec39, it was introduced in version v3.13 by commit cb32f511a70be8967ac9025cf49c44324ced9a39. For more details please see the references link. | null | 2022-03-18T02:56:12.831477Z | 2022-03-18T00:25:37.009996Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cb32f511a70be8967ac9025cf49c44324ced9a39'} |
Linux | GSD-2021-1002673 | dm btree remove: fix use after free in rebalance_children() | dm btree remove: fix use after free in rebalance_children()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.168 by commit 501ecd90efdc9b2edc6c28852ecd098a4adf8f00. For more details please see the references link. | null | 2022-01-11T05:48:40.204890Z | 2021-12-27T05:36:07.988552Z | null | null | null | null | null |
Linux | GSD-2022-1001323 | tpm: use try_get_ops() in tpm-space.c | tpm: use try_get_ops() in tpm-space.c
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.1 by commit ba84f9a48366dcc3cdef978599433efe101dd5bd. For more details please see the references link. | null | 2022-04-25T05:13:48.377289Z | 2022-04-24T21:04:33.184956Z | null | null | null | null | null |
Linux | GSD-2021-1002389 | scsi: mpt3sas: Fix kernel panic during drive powercycle test | scsi: mpt3sas: Fix kernel panic during drive powercycle test
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.257 by commit dd035ca0e7a142870a970d46b1d19276cfe2bc8c, it was introduced in version v3.8 by commit f92363d12359498f9a9960511de1a550f0ec41c2. For more details please see the references link. | null | 2021-12-20T01:38:43.543339Z | 2021-12-19T19:35:12.365841Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f92363d12359498f9a9960511de1a550f0ec41c2'} |
Linux | GSD-2021-1000121 | ACPI: custom_method: fix potential use-after-free issue | ACPI: custom_method: fix potential use-after-free issue
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.20 by commit f16737caf41fc06cfe6e49048becb09657074d4b, it was introduced in version v5.4 by commit 03d1571d9513369c17e6848476763ebbd10ec2cb. For more details please see the references link. | null | 2021-12-19T22:53:20.577401Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/03d1571d9513369c17e6848476763ebbd10ec2cb'} |
Linux | GSD-2021-1000571 | can: isotp: prevent race between isotp_bind() and isotp_setsockopt() | can: isotp: prevent race between isotp_bind() and isotp_setsockopt()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit b190618d8337b9466d985854e417dc0e8b012e3c, it was introduced in version v5.11 by commit 921ca574cd382142add8b12d0a7117f495510de5. For more details please see the references link. | null | 2021-12-20T00:22:32.681608Z | 2021-06-04T19:40:49.506891Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/921ca574cd382142add8b12d0a7117f495510de5'} |
Linux | GSD-2022-1002260 | ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction | ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 7025f40690a235a118c87674cfb93072694aa66d, it was introduced in version v3.16 by commit 00a7bb81c20f3e81711e28e0f6c08cee8fd18514. For more details please see the references link. | null | 2022-04-25T04:55:39.764161Z | 2022-04-24T22:27:37.436981Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/00a7bb81c20f3e81711e28e0f6c08cee8fd18514'} |
Linux | GSD-2021-1001730 | KVM: x86: Fix stack-out-of-bounds memory access from ioapic_write_indirect() | KVM: x86: Fix stack-out-of-bounds memory access from ioapic_write_indirect()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit 99a9e9b80f19fc63be005a33d76211dd23114792, it was introduced in version v5.5 by commit 7ee30bc132c683d06a6d9e360e39e483e3990708. For more details please see the references link. | null | 2021-12-20T00:35:47.274608Z | 2021-10-19T16:33:52.221616Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ee30bc132c683d06a6d9e360e39e483e3990708'} |
Linux | GSD-2021-1000822 | xen-netback: take a reference to the RX task thread | xen-netback: take a reference to the RX task thread
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit caec9bcaeb1a5f03f2d406305355c853af10c13e, it was introduced in version v5.5 by commit 2ac061ce97f413bfbbdd768f7d2e0fda2e8170df. For more details please see the references link. | null | 2021-12-20T01:05:31.468302Z | 2021-06-25T00:09:34.066515Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2ac061ce97f413bfbbdd768f7d2e0fda2e8170df'} |
Linux | GSD-2021-1000988 | net: ipv4: fix memory leak in ip_mc_add1_src | net: ipv4: fix memory leak in ip_mc_add1_src
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.46 by commit ac31cc837cafb57a271babad8ccffbf733caa076, it was introduced in version v4.9 by commit 24803f38a5c0b6c57ed800b47e695f9ce474bc3a. For more details please see the references link. | null | 2021-12-19T23:55:13.509900Z | 2021-06-30T00:31:37.302387Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/24803f38a5c0b6c57ed800b47e695f9ce474bc3a'} |
Linux | GSD-2021-1001360 | powerpc/mm: Fix lockup on kernel exec fault | powerpc/mm: Fix lockup on kernel exec fault
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.133 by commit a82471a14aad90f79d1608d2bcbb019f0ffb53f0, it was introduced in version v4.14 by commit d3ca587404b36943b02df87406054ce73cc49500. For more details please see the references link. | null | 2021-12-19T22:59:39.105700Z | 2021-08-03T02:18:13.478580Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d3ca587404b36943b02df87406054ce73cc49500'} |
Linux | GSD-2021-1001675 | mcb: fix error handling in mcb_alloc_bus() | mcb: fix error handling in mcb_alloc_bus()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.70 by commit 91e4ad05bf18322b5921d1a6c9b603f6eb1694f0, it was introduced in version v4.7 by commit 5d9e2ab9fea4cdf0a2522f5cbed2e7fbb220d757. For more details please see the references link. | null | 2021-12-19T22:51:56.398696Z | 2021-10-19T16:31:17.084943Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5d9e2ab9fea4cdf0a2522f5cbed2e7fbb220d757'} |
Linux | GSD-2021-1000967 | scsi: core: Fix error handling of scsi_host_alloc() | scsi: core: Fix error handling of scsi_host_alloc()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.44 by commit 7a696ce1d5d16a33a6cd6400bbcc0339b2460e11. For more details please see the references link. | null | 2021-12-19T22:33:31.937511Z | 2021-06-30T00:29:50.123524Z | null | null | null | null | null |
Linux | GSD-2022-1000318 | net: fix a memleak when uncloning an skb dst and its metadata | net: fix a memleak when uncloning an skb dst and its metadata
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.230 by commit 0be943916d781df2b652793bb2d3ae4f9624c10a, it was introduced in version v4.3 by commit fc4099f17240767554ff3a73977acb78ef615404. For more details please see the references link. | null | 2022-03-07T01:37:48.299698Z | 2022-02-27T02:50:11.620841Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fc4099f17240767554ff3a73977acb78ef615404'} |
Linux | GSD-2022-1002325 | ACPI: CPPC: Avoid out of bounds access when parsing _CPC data | ACPI: CPPC: Avoid out of bounds access when parsing _CPC data
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 28d5387c1994f5e1e0d41b30a1f3dd6e1f609252, it was introduced in version v4.4 by commit 337aadff8e4567e39669e07d9a88b789d78458b5. For more details please see the references link. | null | 2022-04-25T03:04:28.744185Z | 2022-04-24T22:34:33.643740Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/337aadff8e4567e39669e07d9a88b789d78458b5'} |
Linux | GSD-2021-1001225 | powerpc/mm: Fix lockup on kernel exec fault | powerpc/mm: Fix lockup on kernel exec fault
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.3 by commit 8a96ec5ebf96ad8e2ba7b1b34103a0be5140fc70, it was introduced in version v4.14 by commit d3ca587404b36943b02df87406054ce73cc49500. For more details please see the references link. | null | 2021-12-20T01:32:25.776364Z | 2021-08-03T01:41:18.759716Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d3ca587404b36943b02df87406054ce73cc49500'} |
Linux | GSD-2022-1000748 | bpf: Fix crash due to incorrect copy_map_value | bpf: Fix crash due to incorrect copy_map_value
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.12 by commit eca9bd215d2233de79d930fa97aefbce03247a98, it was introduced in version v5.15 by commit 68134668c17f31f51930478f75495b552a411550. For more details please see the references link. | null | 2022-03-18T03:33:11.121624Z | 2022-03-18T00:15:09.964474Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/68134668c17f31f51930478f75495b552a411550'} |
Linux | GSD-2021-1002059 | cfg80211: fix management registrations locking | cfg80211: fix management registrations locking
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.77 by commit 4c22227e39c7a0b4dab55617ee8d34d171fab8d4, it was introduced in version v5.8 by commit 6cd536fe62ef58d7c4eac2da07ab0ed7fd19010d. For more details please see the references link. | null | 2021-12-19T23:46:06.266604Z | 2021-11-14T15:17:56.984696Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6cd536fe62ef58d7c4eac2da07ab0ed7fd19010d'} |
Linux | GSD-2021-1000064 | sfc: adjust efx->xdp_tx_queue_count with the real number of initialized queues | sfc: adjust efx->xdp_tx_queue_count with the real number of initialized queues
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.3 by commit ebeac958b690123a0b40aa61f688f2f170035fad, it was introduced in version v5.12 by commit e26ca4b535820b1445dcef3c0f82b3fb5b45108b. For more details please see the references link. | null | 2021-12-19T22:49:22.986895Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e26ca4b535820b1445dcef3c0f82b3fb5b45108b'} |
Linux | GSD-2022-1001509 | net: dsa: fix panic on shutdown if multi-chip tree failed to probe | net: dsa: fix panic on shutdown if multi-chip tree failed to probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit b6e668ff43ebd87ccc8a19e5481345c428672295, it was introduced in version v5.15 by commit 0650bf52b31ff35dc6430fc2e37969c36baba724. For more details please see the references link. | null | 2022-04-25T03:00:22.070545Z | 2022-04-24T21:18:37.121698Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0650bf52b31ff35dc6430fc2e37969c36baba724'} |
Linux | GSD-2021-1002409 | proc/vmcore: fix clearing user buffer by properly using clear_user() | proc/vmcore: fix clearing user buffer by properly using clear_user()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.219 by commit 9ef384ed300d1bcfb23d0ab0b487d544444d4b52, it was introduced in version v3.0 by commit 997c136f518c5debd63847e78e2a8694f56dcf90. For more details please see the references link. | null | 2021-12-20T00:37:34.026804Z | 2021-12-19T19:36:01.845863Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/997c136f518c5debd63847e78e2a8694f56dcf90'} |
Linux | GSD-2021-1000434 | soundwire: stream: fix memory leak in stream config error path | soundwire: stream: fix memory leak in stream config error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.119 by commit 870533403ffa28ff63e173045fc5369365642002, it was introduced in version v4.18 by commit 89e590535f32d4bc548bcf266f3b046e50942f6d. For more details please see the references link. | null | 2021-12-20T00:02:55.888866Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/89e590535f32d4bc548bcf266f3b046e50942f6d'} |
Linux | GSD-2022-1001159 | hwrng: cavium - fix NULL but dereferenced coccicheck error | hwrng: cavium - fix NULL but dereferenced coccicheck error
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit e47b12f9415169eceda6770fcf45802e0c8d2a66. For more details please see the references link. | null | 2022-04-25T05:27:24.122852Z | 2022-04-24T20:49:29.667098Z | null | null | null | null | null |
Linux | GSD-2022-1000461 | ipv6: fix data-race in fib6_info_hw_flags_set / fib6_purge_rt | ipv6: fix data-race in fib6_info_hw_flags_set / fib6_purge_rt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit 9ed25183e6d47a71f5385dbc52419c473646c768, it was introduced in version v5.12 by commit 0c5fcf9e249ee1d94cf872c99baf9cba7ff9ce27. For more details please see the references link. | null | 2022-03-07T01:52:18.815218Z | 2022-02-27T03:10:39.646353Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0c5fcf9e249ee1d94cf872c99baf9cba7ff9ce27'} |
Linux | GSD-2022-1000031 | sctp: use call_rcu to free endpoint | sctp: use call_rcu to free endpoint
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.170 by commit 831de271452b87657fcf8d715ee20519b79caef5, it was introduced in version v4.14 by commit d25adbeb0cdb860fb39e09cdd025e9cfc954c5ab. For more details please see the references link. | null | 2022-01-11T05:53:33.342984Z | 2022-01-10T19:50:55.523105Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d25adbeb0cdb860fb39e09cdd025e9cfc954c5ab'} |
Linux | GSD-2022-1000898 | net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe() | net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.233 by commit b838add93e1dd98210482dc433768daaf752bdef, it was introduced in version v3.18 by commit 8c14f9c70327a6fb75534c4c61d7ea9c82ccf78f. For more details please see the references link. | null | 2022-03-18T02:55:08.642869Z | 2022-03-18T00:29:27.597920Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c14f9c70327a6fb75534c4c61d7ea9c82ccf78f'} |
Linux | GSD-2021-1002720 | RDMA/mlx5: Fix releasing unallocated memory in dereg MR flow | RDMA/mlx5: Fix releasing unallocated memory in dereg MR flow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.10 by commit e3bc4d4b50cae7db08e50dbe43f771c906e97701, it was introduced in version v5.13 by commit f18ec422311767738ef4033b61e91cae07163b22. For more details please see the references link. | null | 2022-01-11T05:58:22.282814Z | 2021-12-27T05:38:55.476686Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f18ec422311767738ef4033b61e91cae07163b22'} |
Linux | GSD-2022-1001270 | ASoC: xilinx: xlnx_formatter_pcm: Handle sysclk setting | ASoC: xilinx: xlnx_formatter_pcm: Handle sysclk setting
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 2091de10a1ffc3b76a527e90d5399d15fca0a8ce, it was introduced in version v5.1 by commit 6f6c3c36f0917be24587eeba818ab4fdfcb5465a. For more details please see the references link. | null | 2022-04-25T03:36:55.121080Z | 2022-04-24T21:00:01.565943Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6f6c3c36f0917be24587eeba818ab4fdfcb5465a'} |
Linux | GSD-2021-1002370 | proc/vmcore: fix clearing user buffer by properly using clear_user() | proc/vmcore: fix clearing user buffer by properly using clear_user()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.292 by commit 33a7d698f30fa0b99d50569e9909d3baa65d8f6a, it was introduced in version v3.0 by commit 997c136f518c5debd63847e78e2a8694f56dcf90. For more details please see the references link. | null | 2021-12-20T01:20:53.141456Z | 2021-12-19T19:34:19.147791Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/997c136f518c5debd63847e78e2a8694f56dcf90'} |
Linux | GSD-2022-1000932 | openvswitch: Fix setting ipv6 fields causing hw csum failure | openvswitch: Fix setting ipv6 fields causing hw csum failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.269 by commit 2158b384c60f13bc1cf38d703f835c4e33896714, it was introduced in version v3.8 by commit 3fdbd1ce11e5c0d7cafbe44c942c5cad61113d7b. For more details please see the references link. | null | 2022-03-18T03:35:37.078432Z | 2022-03-18T00:33:51.516491Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3fdbd1ce11e5c0d7cafbe44c942c5cad61113d7b'} |
Linux | GSD-2022-1001620 | remoteproc: Fix count check in rproc_coredump_write() | remoteproc: Fix count check in rproc_coredump_write()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit a8c3e53517985d69040a1b36a269e85f99cf0cea, it was introduced in version v5.9 by commit 3afdc59e4390487f04f2435b7e8a6289984e0a1e. For more details please see the references link. | null | 2022-04-25T03:36:29.023113Z | 2022-04-24T21:29:23.750132Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3afdc59e4390487f04f2435b7e8a6289984e0a1e'} |
Linux | GSD-2022-1001335 | powerpc: Fix virt_addr_valid() for 64-bit Book3E & 32-bit | powerpc: Fix virt_addr_valid() for 64-bit Book3E & 32-bit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit a3727c25eacd7e437c4f560957fa3a376fe93e6b. For more details please see the references link. | null | 2022-04-25T07:37:44.726883Z | 2022-04-24T21:05:29.663664Z | null | null | null | null | null |
Linux | GSD-2021-1000658 | Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails | Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.193 by commit f8be26b9950710fe50fb45358df5bd01ad18efb7, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T00:23:44.121510Z | 2021-06-04T19:56:26.271333Z | null | null | null | null | null |
Linux | GSD-2021-1002665 | firmware: arm_scpi: Fix string overflow in SCPI genpd driver | firmware: arm_scpi: Fix string overflow in SCPI genpd driver
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.168 by commit 802a1a8501563714a5fe8824f4ed27fec04a0719, it was introduced in version v4.8 by commit 8bec4337ad4023b26de35d3b0c3a3b2735ffc5c7. For more details please see the references link. | null | 2022-01-11T05:46:52.987220Z | 2021-12-27T05:35:11.521540Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8bec4337ad4023b26de35d3b0c3a3b2735ffc5c7'} |
Linux | GSD-2022-1000877 | xen/netfront: destroy queues before real_num_tx_queues is zeroed | xen/netfront: destroy queues before real_num_tx_queues is zeroed
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.183 by commit b40c912624775a21da32d1105e158db5f6d0554a, it was introduced in version v5.4.174 by commit a5d8e6189b134f5db61be5cd59cf5a74bb01edc7. For more details please see the references link. | null | 2022-03-18T02:56:10.071474Z | 2022-03-18T00:27:03.612766Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a5d8e6189b134f5db61be5cd59cf5a74bb01edc7'} |
Linux | GSD-2022-1001765 | KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast() | KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 0e5dbc0540baa89faf4c04ccc7e9c4fe6b1d7bf4. For more details please see the references link. | null | 2022-04-25T06:35:56.219901Z | 2022-04-24T21:41:03.709557Z | null | null | null | null | null |
Linux | GSD-2021-1000208 | can: mcp251x: fix resume from sleep before interface was brought up | can: mcp251x: fix resume from sleep before interface was brought up
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.5 by commit e1e10a390fd9479209c4d834d916ca5e6d5d396b, it was introduced in version v5.5 by commit 8ce8c0abcba314e1fe954a1840f6568bf5aef2ef. For more details please see the references link. | null | 2021-12-20T00:21:47.484894Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ce8c0abcba314e1fe954a1840f6568bf5aef2ef'} |
Linux | GSD-2021-1002235 | btrfs: fix memory ordering between normal and ordered work functions | btrfs: fix memory ordering between normal and ordered work functions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.256 by commit 804a9d239ae9cbe88e861a7cd62319cc6ec7b136, it was introduced in version v3.15 by commit 08a9ff3264181986d1d692a4e6fce3669700c9f8. For more details please see the references link. | null | 2021-12-19T22:22:50.526366Z | 2021-11-29T02:34:36.666602Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/08a9ff3264181986d1d692a4e6fce3669700c9f8'} |
Linux | GSD-2022-1000524 | vt_ioctl: fix array_index_nospec in vt_setactivate | vt_ioctl: fix array_index_nospec in vt_setactivate
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 6550bdf52846f85a2a3726a5aa0c7c4399f2fc02. For more details please see the references link. | null | 2022-03-07T02:18:30.745386Z | 2022-02-27T03:19:15.333877Z | null | null | null | null | null |
Linux | GSD-2021-1001049 | drm/tegra: sor: Do not leak runtime PM reference | drm/tegra: sor: Do not leak runtime PM reference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.12 by commit 6fc59edf0471eacba5769a83683f3f13834d1166. For more details please see the references link. | null | 2021-12-19T22:51:13.130627Z | 2021-06-30T00:36:17.303035Z | null | null | null | null | null |
Linux | GSD-2022-1002149 | mac80211: fix potential double free on mesh join | mac80211: fix potential double free on mesh join
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.109 by commit 5d3ff9542a40ce034416bca03864709540a36016, it was introduced in version v5.8 by commit 6a01afcf8468d3ca2bd8bbb27503f60dcf643b20. For more details please see the references link. | null | 2022-04-25T05:41:14.307645Z | 2022-04-24T22:16:15.551773Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6a01afcf8468d3ca2bd8bbb27503f60dcf643b20'} |
Linux | GSD-2022-1000174 | net: ieee802154: ca8210: Stop leaking skb's | net: ieee802154: ca8210: Stop leaking skb's
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.178 by commit 6f38d3a6ec11c2733b1c641a46a2a2ecec57be08, it was introduced in version v4.12 by commit ded845a781a578dfb0b5b2c138e5a067aa3b1242. For more details please see the references link. | null | 2022-02-19T03:04:45.807291Z | 2022-02-18T21:51:03.907528Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ded845a781a578dfb0b5b2c138e5a067aa3b1242'} |
Linux | GSD-2021-1001419 | nfs: fix acl memory leak of posix_acl_create() | nfs: fix acl memory leak of posix_acl_create()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.240 by commit 8a2b308a54c5ec224fedc753617f99b29ffcd883, it was introduced in version v3.14 by commit 013cdf1088d7235da9477a2375654921d9b9ba9f. For more details please see the references link. | null | 2021-12-20T01:03:43.083581Z | 2021-08-03T02:35:28.883500Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/013cdf1088d7235da9477a2375654921d9b9ba9f'} |
Linux | GSD-2021-1001337 | iommu/arm-smmu: Fix arm_smmu_device refcount leak in address translation | iommu/arm-smmu: Fix arm_smmu_device refcount leak in address translation
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.134 by commit b11220803ad14a2a880cc06d8e01fe2548cc85b0. For more details please see the references link. | null | 2021-12-20T00:59:48.018965Z | 2021-08-03T02:12:10.704324Z | null | null | null | null | null |
Linux | GSD-2022-1001948 | ipv6: fix panic when forwarding a pkt with no in6 dev | ipv6: fix panic when forwarding a pkt with no in6 dev
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.112 by commit a263712ba8c9ded25dd9d2d5ced11bcea5b33a3e, it was introduced in version v5.10.54 by commit 79ec7b5b2f4fe38e5c7459ed0bdff4ef3386ab63. For more details please see the references link. | null | 2022-04-25T06:44:04.212255Z | 2022-04-24T21:57:18.307849Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/79ec7b5b2f4fe38e5c7459ed0bdff4ef3386ab63'} |
Linux | GSD-2021-1001767 | staging: greybus: uart: fix tty use after free | staging: greybus: uart: fix tty use after free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.9 by commit 9872ff6fdce8b229f01993b611b5d1719cb70ff1, it was introduced in version v4.9 by commit a18e15175708d39abbe9746ddc3479466b7800c3. For more details please see the references link. | null | 2021-12-19T23:57:36.492343Z | 2021-10-19T16:35:44.659582Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a18e15175708d39abbe9746ddc3479466b7800c3'} |
Linux | GSD-2021-1000875 | ftrace: Do not blindly read the ip address in ftrace_bug() | ftrace: Do not blindly read the ip address in ftrace_bug()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.195 by commit 862dcc14f2803c556bdd73b43c27b023fafce2fb, it was introduced in version v2.6.28 by commit 05736a427f7e16be948ccbf39782bd3a6ae16b14. For more details please see the references link. | null | 2021-12-20T00:50:56.605Z | 2021-06-30T00:02:58.804843Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/05736a427f7e16be948ccbf39782bd3a6ae16b14'} |
Linux | GSD-2022-1002237 | Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt | Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 874eca93966a786eace87fa6dfb206c2dd9519b1, it was introduced in version v5.2 by commit 9aebfd4a2200ab8075e44379c758bccefdc589bb. For more details please see the references link. | null | 2022-04-25T04:31:42.828266Z | 2022-04-24T22:24:29.925389Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9aebfd4a2200ab8075e44379c758bccefdc589bb'} |
Linux | GSD-2021-1000526 | Bluetooth: SMP: Fail if remote and local public keys are identical | Bluetooth: SMP: Fail if remote and local public keys are identical
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.270 by commit 6555a006b21ab49090b9a7b36e92d0421db19328, it was introduced in version v3.17 by commit bfe01a5ba2490f299e1d2d5508cbbbadd897bbe9. For more details please see the references link. | null | 2021-12-19T22:15:54.019670Z | 2021-05-31T23:51:28.441301Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bfe01a5ba2490f299e1d2d5508cbbbadd897bbe9'} |
Linux | GSD-2021-1000176 | virtiofs: fix memory leak in virtio_fs_probe() | virtiofs: fix memory leak in virtio_fs_probe()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.118 by commit 310efc95c72c13faf855c692d19cd4d054d827c8, it was introduced in version v5.4 by commit a62a8ef9d97da23762a588592c8b8eb50a8deb6a. For more details please see the references link. | null | 2021-12-20T00:13:15.890136Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a62a8ef9d97da23762a588592c8b8eb50a8deb6a'} |
Linux | GSD-2021-1000199 | usb: dwc3: gadget: Free gadget structure only after freeing endpoints | usb: dwc3: gadget: Free gadget structure only after freeing endpoints
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.5 by commit b4b8e9601d7ee8806d2687f081a42485d27674a1, it was introduced in version v5.10 by commit e81a7018d93a7de31a3f121c9a7eecd0a5ec58b0. For more details please see the references link. | null | 2021-12-20T01:02:36.697598Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e81a7018d93a7de31a3f121c9a7eecd0a5ec58b0'} |
Linux | GSD-2021-1000463 | regmap: set debugfs_name to NULL after it is freed | regmap: set debugfs_name to NULL after it is freed
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.191 by commit 2dc1554d5f0fdaf47cc5bea442b84b9226fea867, it was introduced in version v4.19.168 by commit 5b654b03007917f3f1015b2a5c288c1ea6ae8f65. For more details please see the references link. | null | 2021-12-19T23:49:07.424599Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5b654b03007917f3f1015b2a5c288c1ea6ae8f65'} |
Linux | GSD-2021-1000033 | netfilter: nft_limit: avoid possible divide error in nft_limit_init | netfilter: nft_limit: avoid possible divide error in nft_limit_init
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.32 by commit dc1732baa9da5b68621586bf8636ebbc27dc62d2, it was introduced in version v4.13 by commit c26844eda9d4fdbd266660e3b3de2d0270e3a1ed. For more details please see the references link. | null | 2021-12-20T01:06:15.688098Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c26844eda9d4fdbd266660e3b3de2d0270e3a1ed'} |
Linux | GSD-2021-1001788 | isdn: mISDN: Fix sleeping function called from invalid context | isdn: mISDN: Fix sleeping function called from invalid context
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.253 by commit 37e4f57b22cc5ebb3f80cf0f74fdeb487f082367. For more details please see the references link. | null | 2021-12-20T00:01:04.988899Z | 2021-10-28T13:48:53.815844Z | null | null | null | null | null |
Linux | GSD-2021-1001272 | x86/signal: Detect and prevent an alternate signal stack overflow | x86/signal: Detect and prevent an alternate signal stack overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.52 by commit 74569cb9ed7bc60e395927f55d3dc3be143a0164, it was introduced in version v3.15 by commit c2bc11f10a39527cd1bb252097b5525664560956. For more details please see the references link. | null | 2021-12-20T00:15:58.068473Z | 2021-08-03T01:54:41.100515Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c2bc11f10a39527cd1bb252097b5525664560956'} |
Linux | GSD-2022-1002372 | jffs2: fix memory leak in jffs2_scan_medium | jffs2: fix memory leak in jffs2_scan_medium
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit e711913463af916d777a4873068f415f1fe2ad33, it was introduced in version v2.6.15 by commit e631ddba588783edd521c5a89f7b2902772fb691. For more details please see the references link. | null | 2022-04-25T05:56:01.300432Z | 2022-04-24T22:40:08.780054Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e631ddba588783edd521c5a89f7b2902772fb691'} |
Linux | GSD-2021-1001622 | i2c: acpi: fix resource leak in reconfiguration device addition | i2c: acpi: fix resource leak in reconfiguration device addition
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.73 by commit f86de018fd7a24ee07372d55ffa7824f0c674a95, it was introduced in version v4.8 by commit 525e6fabeae286848592363bda13bc34b59bb5ac. For more details please see the references link. | null | 2021-12-19T23:41:50.689776Z | 2021-10-19T16:28:42.869123Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/525e6fabeae286848592363bda13bc34b59bb5ac'} |
Linux | GSD-2021-1000930 | PCI: aardvark: Fix kernel panic during PIO transfer | PCI: aardvark: Fix kernel panic during PIO transfer
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.128 by commit 4c90f90a91d75c3c73dd633827c90e8746d9f54d. For more details please see the references link. | null | 2021-12-19T23:43:16.802971Z | 2021-06-30T00:25:13.689149Z | null | null | null | null | null |
Linux | GSD-2022-1000965 | mm/secretmem: fix panic when growing a memfd_secret | mm/secretmem: fix panic when growing a memfd_secret
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.4 by commit 9d3b877daf805fed29be8f61aa3d0ea37df82c7b. For more details please see the references link. | null | 2022-04-25T07:54:20.629644Z | 2022-04-24T20:35:39.258406Z | null | null | null | null | null |
Linux | GSD-2022-1001677 | lz4: fix LZ4_decompress_safe_partial read out of bound | lz4: fix LZ4_decompress_safe_partial read out of bound
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 9fb8bc6cfc58773ce95414e11c9ccc8fc6ac4927. For more details please see the references link. | null | 2022-04-25T04:30:29.898473Z | 2022-04-24T21:34:10.665766Z | null | null | null | null | null |
Linux | GSD-2021-1002327 | perf bench futex: Fix memory leak of perf_cpu_map__new() | perf bench futex: Fix memory leak of perf_cpu_map__new()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit 99643bdc6ff1c75ccd2871368fbcd20e8231d77e, it was introduced in version v5.4 by commit 9c3516d1b850ea938b074df33e4c86d721c77720. For more details please see the references link. | null | 2021-12-19T22:57:57.228455Z | 2021-11-29T02:38:53.860390Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9c3516d1b850ea938b074df33e4c86d721c77720'} |
Linux | GSD-2022-1001227 | libbpf: Fix memleak in libbpf_netlink_recv() | libbpf: Fix memleak in libbpf_netlink_recv()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit c3d665699e872061bdcd014fb462188d66b94b57, it was introduced in version v5.17.2 by commit dc69beab5b7baa106d8a195d2c690f7970a81eb5. For more details please see the references link. | null | 2022-04-24T20:55:51.425415Z | 2022-04-24T20:55:51.425415Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/dc69beab5b7baa106d8a195d2c690f7970a81eb5'} |
Linux | GSD-2021-1001858 | net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path | net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.75 by commit 4f7bddf8c5c01cac74373443b13a68e1c6723a94, it was introduced in version v3.11 by commit e126ba97dba9edeb6fafa3665b5f8497fc9cdf8c. For more details please see the references link. | null | 2021-12-19T22:11:11.575522Z | 2021-10-28T13:52:31.317085Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e126ba97dba9edeb6fafa3665b5f8497fc9cdf8c'} |
Linux | GSD-2021-1002777 | hamradio: defer ax25 kfree after unregister_netdev | hamradio: defer ax25 kfree after unregister_netdev
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.295 by commit 8a1a314965a17c62084a056b4f2cb7a770854c90. For more details please see the references link. | null | 2022-01-11T05:54:28.529143Z | 2021-12-30T02:43:00.657866Z | null | null | null | null | null |
Linux | GSD-2022-1000436 | ice: Fix KASAN error in LAG NETDEV_UNREGISTER handler | ice: Fix KASAN error in LAG NETDEV_UNREGISTER handler
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit f9daedc3ab8f673e3a9374b91a89fbf1174df469, it was introduced in version v5.15 by commit 6a8b357278f5f8b9817147277ab8f12879dce8a8. For more details please see the references link. | null | 2022-03-07T01:40:56.463016Z | 2022-02-27T03:07:07.036643Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6a8b357278f5f8b9817147277ab8f12879dce8a8'} |
Linux | GSD-2022-1000123 | USB: core: Fix hang in usb_kill_urb by adding memory barriers | USB: core: Fix hang in usb_kill_urb by adding memory barriers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.228 by commit 5904dfd3ddaff3bf4a41c3baf0a8e8f31ed4599b. For more details please see the references link. | null | 2022-02-19T12:04:44.492673Z | 2022-02-18T21:43:41.411554Z | null | null | null | null | null |
Linux | GSD-2022-1000089 | ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() | ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.300 by commit 9e5c40b5706d8aae2cf70bd7e01f0b4575a642d0. For more details please see the references link. | null | 2022-02-19T05:00:40.673571Z | 2022-02-18T21:33:58.163710Z | null | null | null | null | null |
Linux | GSD-2022-1000573 | btrfs: fix deadlock between quota disable and qgroup rescan worker | btrfs: fix deadlock between quota disable and qgroup rescan worker
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.22 by commit 89d4cca583fc9594ee7d1a0bc986886d6fb587e6. For more details please see the references link. | null | 2022-03-07T02:34:17.876261Z | 2022-02-27T03:25:29.662019Z | null | null | null | null | null |
Linux | GSD-2021-1002262 | scsi: core: sysfs: Fix hang when device state is set via sysfs | scsi: core: sysfs: Fix hang when device state is set via sysfs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.162 by commit edd783162bf2385b43de6764f2d4c6e9f4f6be27, it was introduced in version v5.4.143 by commit 69aa1a1a569f5c6d554b59352130ef363342ed4c. For more details please see the references link. | null | 2021-12-19T23:20:34.696614Z | 2021-11-29T02:35:55.836733Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69aa1a1a569f5c6d554b59352130ef363342ed4c'} |
Linux | GSD-2021-1002798 | hamradio: defer ax25 kfree after unregister_netdev | hamradio: defer ax25 kfree after unregister_netdev
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.169 by commit ef5f7bfa19e3fc366f4c6d1a841ceaddf7a9f5d4. For more details please see the references link. | null | 2022-01-11T05:54:48.459587Z | 2021-12-30T02:43:51.460894Z | null | null | null | null | null |
Linux | GSD-2022-1000820 | vhost/vsock: don't check owner in vhost_vsock_stop() while releasing | vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.26 by commit 960d474e451bcb5366859335f4f0de1a8f224c51, it was introduced in version v4.8 by commit 433fc58e6bf2c8bd97e57153ed28e64fd78207b8. For more details please see the references link. | null | 2022-03-18T03:01:20.011178Z | 2022-03-18T00:21:23.971340Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/433fc58e6bf2c8bd97e57153ed28e64fd78207b8'} |
Linux | GSD-2022-1001732 | mt76: dma: initialize skip_unmap in mt76_dma_rx_fill | mt76: dma: initialize skip_unmap in mt76_dma_rx_fill
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 55c93a89e31dcf2f99482be8dd28d99a3431dd9a. For more details please see the references link. | null | 2022-04-25T06:04:24.789817Z | 2022-04-24T21:38:11.493310Z | null | null | null | null | null |
Linux | GSD-2022-1001698 | x86/Kconfig: Do not allow CONFIG_X86_X32_ABI=y with llvm-objcopy | x86/Kconfig: Do not allow CONFIG_X86_X32_ABI=y with llvm-objcopy
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit c393a9f4cb3bce27ed98d6bc4ffb0bef72ccd698. For more details please see the references link. | null | 2022-04-25T06:13:36.333496Z | 2022-04-24T21:36:15.833823Z | null | null | null | null | null |
Linux | GSD-2021-1002632 | audit: improve robustness of the audit queue handling | audit: improve robustness of the audit queue handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.259 by commit 75fdb751f84727d614deea0571a1490c3225d83a, it was introduced in version v4.11 by commit 5b52330bbfe63b3305765354d6046c9f7f89c011. For more details please see the references link. | null | 2022-01-11T05:53:18.432461Z | 2021-12-27T05:28:07.523945Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5b52330bbfe63b3305765354d6046c9f7f89c011'} |
Linux | GSD-2022-1001362 | arch/arm64: Fix topology initialization for core scheduling | arch/arm64: Fix topology initialization for core scheduling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 790c1567582bda8f1153015436e3330a7c6eb278, it was introduced in version v5.14 by commit 9edeaea1bc452372718837ed2ba775811baf1ba1. For more details please see the references link. | null | 2022-04-25T05:15:21.948865Z | 2022-04-24T21:08:00.344037Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9edeaea1bc452372718837ed2ba775811baf1ba1'} |
Linux | GSD-2022-1000964 | perf/imx_ddr: Fix undefined behavior due to shift overflowing the constant | perf/imx_ddr: Fix undefined behavior due to shift overflowing the constant
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.4 by commit 98d05f6a811bfbc28a0b6c132eb6059a00e53ef4. For more details please see the references link. | null | 2022-04-25T05:27:31.639455Z | 2022-04-24T20:35:36.334951Z | null | null | null | null | null |
Linux | GSD-2022-1001676 | mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0) | mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0)
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit a04cb99c5d4668fe3f5c0e5b6da1cecd34c3f219. For more details please see the references link. | null | 2022-04-25T06:48:21.511397Z | 2022-04-24T21:34:07.812610Z | null | null | null | null | null |
Linux | GSD-2021-1002326 | net/ipa: ipa_resource: Fix wrong for loop range | net/ipa: ipa_resource: Fix wrong for loop range
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit f4d1328e6e304c81db81419d92b9d90b7b3cf9ab, it was introduced in version v5.13 by commit 4fd704b3608a4c89260ea33895a694bc5385e00f. For more details please see the references link. | null | 2021-12-19T22:56:50.992965Z | 2021-11-29T02:38:51.544533Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4fd704b3608a4c89260ea33895a694bc5385e00f'} |
Linux | GSD-2022-1001226 | drm/bridge: anx7625: Fix overflow issue on reading EDID | drm/bridge: anx7625: Fix overflow issue on reading EDID
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit db1c47d299298a7c52ccb201905d6be979fd7507, it was introduced in version v5.11 by commit 8bdfc5dae4e3ba4d99dfb430ef43249e5f1b7730. For more details please see the references link. | null | 2022-04-25T07:37:10.445753Z | 2022-04-24T20:55:48.342387Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8bdfc5dae4e3ba4d99dfb430ef43249e5f1b7730'} |
Linux | GSD-2021-1001859 | net: dsa: microchip: Added the condition for scheduling ksz_mib_read_work | net: dsa: microchip: Added the condition for scheduling ksz_mib_read_work
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.75 by commit f2e1de075018cf71bcd7d628e9f759cb8540b0c3, it was introduced in version v5.7 by commit 469b390e1ba330e888175e55d78573db2e9a8cb4. For more details please see the references link. | null | 2021-12-20T00:01:43.795778Z | 2021-10-28T13:52:41.250074Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/469b390e1ba330e888175e55d78573db2e9a8cb4'} |
Linux | GSD-2021-1002776 | IB/qib: Fix memory leak in qib_user_sdma_queue_pkts() | IB/qib: Fix memory leak in qib_user_sdma_queue_pkts()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.295 by commit 76b648063eb36c72dfc0a6896de8a0a7d2c7841c, it was introduced in version v4.9.290 by commit 3f57c3f67fd93b4da86aeffea1ca32c484d054ad. For more details please see the references link. | null | 2022-01-11T05:57:40.109626Z | 2021-12-30T02:42:58.189328Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f57c3f67fd93b4da86aeffea1ca32c484d054ad'} |
Linux | GSD-2022-1000437 | net: dsa: mv88e6xxx: fix use-after-free in mv88e6xxx_mdios_unregister | net: dsa: mv88e6xxx: fix use-after-free in mv88e6xxx_mdios_unregister
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit f916181692cb5da7050ec0efbf96c915d8ebbbbc, it was introduced in version v5.15.24 by commit 8b626d45127d6f5ada7d815b83cfdc09e8cb1394. For more details please see the references link. | null | 2022-02-27T03:07:13.750534Z | 2022-02-27T03:07:13.750534Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8b626d45127d6f5ada7d815b83cfdc09e8cb1394'} |
Linux | GSD-2022-1000122 | usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS | usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.228 by commit 2ad9bf965b1c85248ec4eefdf79df3e0f3a3c9a7, it was introduced in version v4.19.195 by commit 10770d2ac0094b053c8897d96d7b2737cd72f7c5. For more details please see the references link. | null | 2022-02-19T10:28:12.696774Z | 2022-02-18T21:43:34.780707Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/10770d2ac0094b053c8897d96d7b2737cd72f7c5'} |
Linux | GSD-2022-1000088 | ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() | ASoC: ops: Reject out of bounds values in snd_soc_put_volsw()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.300 by commit 40f598698129b5ceaf31012f9501b775c7b6e57d. For more details please see the references link. | null | 2022-02-19T03:10:48.991955Z | 2022-02-18T21:33:51.648160Z | null | null | null | null | null |
Linux | GSD-2022-1000572 | ALSA: hda: Fix UAF of leds class devs at unbinding | ALSA: hda: Fix UAF of leds class devs at unbinding
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.22 by commit 0e629052f013eeb61494d4df2f1f647c2a9aef47. For more details please see the references link. | null | 2022-03-07T02:18:33.524775Z | 2022-02-27T03:25:22.929022Z | null | null | null | null | null |
Linux | GSD-2021-1002263 | iavf: free q_vectors before queues in iavf_disable_vf | iavf: free q_vectors before queues in iavf_disable_vf
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.162 by commit 926e8c83d4c1c2dac0026637eb0d492df876489e, it was introduced in version v4.13 by commit 65c7006f234c9ede887d468f595f259a5c5cc552. For more details please see the references link. | null | 2021-12-19T23:51:38.325237Z | 2021-11-29T02:35:58.145105Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/65c7006f234c9ede887d468f595f259a5c5cc552'} |
Linux | GSD-2022-1000821 | mm/filemap: Fix handling of THPs in generic_file_buffered_read() | mm/filemap: Fix handling of THPs in generic_file_buffered_read()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.26 by commit f89903ae99bd02379e8b84d487ce302f122c4ef1, it was introduced in version v5.12 by commit cbd59c48ae2bcadc4a7599c29cf32fd3f9b78251. For more details please see the references link. | null | 2022-03-18T02:55:13.781834Z | 2022-03-18T00:21:27.697209Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cbd59c48ae2bcadc4a7599c29cf32fd3f9b78251'} |
Linux | GSD-2022-1001733 | mt76: mt7921: fix crash when startup fails. | mt76: mt7921: fix crash when startup fails.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 38fbe806645090c07aa97171f20fc62c3d7d3a98. For more details please see the references link. | null | 2022-04-25T06:29:37.404156Z | 2022-04-24T21:38:14.351868Z | null | null | null | null | null |
Linux | GSD-2021-1002799 | pinctrl: mediatek: fix global-out-of-bounds issue | pinctrl: mediatek: fix global-out-of-bounds issue
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.169 by commit f373298e1bf0c6ea097c0bcc558dc43ad53e421f. For more details please see the references link. | null | 2022-01-11T06:43:32.266554Z | 2021-12-30T02:43:53.743573Z | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.