ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2021-1002625 | xen/netback: don't queue unlimited number of packages | xen/netback: don't queue unlimited number of packages
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.294 by commit b4226b387436315e7f57465c15335f4f4b5b075d, it was introduced in version v3.18 by commit f48da8b14d04ca87ffcffe68829afd45f926ec6a. For more details please see the references link. | null | 2022-01-11T05:47:02.719185Z | 2021-12-27T05:27:47.741637Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f48da8b14d04ca87ffcffe68829afd45f926ec6a'} |
Linux | GSD-2022-1001725 | dm ioctl: prevent potential spectre v1 gadget | dm ioctl: prevent potential spectre v1 gadget
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 02cc46f397eb3691c56affbd5073e54f7a82ac32. For more details please see the references link. | null | 2022-04-25T06:34:39.589158Z | 2022-04-24T21:37:51.193946Z | null | null | null | null | null |
Linux | GSD-2022-1000837 | thermal: core: Fix TZ_GET_TRIP NULL pointer dereference | thermal: core: Fix TZ_GET_TRIP NULL pointer dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.104 by commit 1c0b51e62a50e9291764d022ed44549e65d6ab9c, it was introduced in version v5.9 by commit 1ce50e7d408ef2bdc8ca021363fd46d1b8bfad00. For more details please see the references link. | null | 2022-03-18T03:35:48.128061Z | 2022-03-18T00:22:57.510974Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1ce50e7d408ef2bdc8ca021363fd46d1b8bfad00'} |
Linux | GSD-2021-1000248 | RDMA/rtrs-clt: destroy sysfs after removing session from active list | RDMA/rtrs-clt: destroy sysfs after removing session from active list
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit d3cca8067d43dfee4a3535c645b55f618708dccb, it was introduced in version v5.8 by commit 6a98d71daea186247005099758af549e6afdd244. For more details please see the references link. | null | 2021-12-20T00:27:12.431024Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6a98d71daea186247005099758af549e6afdd244'} |
Linux | GSD-2021-1002275 | selinux: fix NULL-pointer dereference when hashtab allocation fails | selinux: fix NULL-pointer dereference when hashtab allocation fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.82 by commit b17dd53cac769dd13031b0ca34f90cc65e523fab, it was introduced in version v5.8 by commit 03414a49ad5f3c56988c36d2070e402ffa17feaf. For more details please see the references link. | null | 2021-12-20T01:09:07.051579Z | 2021-11-29T02:36:30.286185Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/03414a49ad5f3c56988c36d2070e402ffa17feaf'} |
Linux | GSD-2022-1000564 | dmaengine: ptdma: Fix the error handling path in pt_core_init() | dmaengine: ptdma: Fix the error handling path in pt_core_init()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit d7de1e4820c5a42441ff7276174c8c0e63575c1b, it was introduced in version v5.15 by commit fa5d823b16a9442d609617abeec31da8b6afa224. For more details please see the references link. | null | 2022-03-07T01:54:14.369192Z | 2022-02-27T03:24:28.334676Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fa5d823b16a9442d609617abeec31da8b6afa224'} |
Linux | GSD-2021-1001009 | usb: dwc3: core: fix kernel panic when do reboot | usb: dwc3: core: fix kernel panic when do reboot
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.46 by commit 174c27583b3807ac96228c442735b02622d8d1c3, it was introduced in version v5.10.46 by commit e52d43c82f2f6556f0b7a790c19c072c1e99a95f. For more details please see the references link. | null | 2021-06-30T00:33:39.066467Z | 2021-06-30T00:33:39.066467Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e52d43c82f2f6556f0b7a790c19c072c1e99a95f'} |
Linux | GSD-2022-1002109 | soc: qcom: rpmpd: Check for null return of devm_kcalloc | soc: qcom: rpmpd: Check for null return of devm_kcalloc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit b5d6eba71997b6d661935d2b15094ac7f9f6132d, it was introduced in version v5.1 by commit bbe3a66c3f5a65fb3d702351bac2a6033944d389. For more details please see the references link. | null | 2022-04-25T05:28:21.944646Z | 2022-04-24T22:12:27.987062Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bbe3a66c3f5a65fb3d702351bac2a6033944d389'} |
Linux | GSD-2022-1000134 | af_packet: fix data-race in packet_setsockopt / packet_setsockopt | af_packet: fix data-race in packet_setsockopt / packet_setsockopt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.228 by commit 1f0c712832907baef27d13721b3ca2e515d39ecf, it was introduced in version v4.3 by commit 47dceb8ecdc1c3ad1818dfea3d659a05b74c3fc2. For more details please see the references link. | null | 2022-02-19T12:50:19.388992Z | 2022-02-18T21:44:56.090598Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/47dceb8ecdc1c3ad1818dfea3d659a05b74c3fc2'} |
Linux | GSD-2021-1001459 | wl1251: Fix possible buffer overflow in wl1251_cmd_scan | wl1251: Fix possible buffer overflow in wl1251_cmd_scan
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.276 by commit d3d8b9c9c7843dce31e284927d4c9904fd5a510a. For more details please see the references link. | null | 2021-12-19T23:49:22.519852Z | 2021-08-03T02:47:11.987687Z | null | null | null | null | null |
Linux | GSD-2021-1000161 | ovl: fix leaked dentry | ovl: fix leaked dentry
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.35 by commit 71d58457a8afc650da5d3292a7f7029317654d95, it was introduced in version v5.8 by commit 6815f479ca90ee7fd2e28b2a420f796b974155fe. For more details please see the references link. | null | 2021-12-19T23:45:40.188434Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6815f479ca90ee7fd2e28b2a420f796b974155fe'} |
Linux | GSD-2021-1000531 | iommu/amd: Clear DMA ops when switching domain | iommu/amd: Clear DMA ops when switching domain
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit f3f2cf46291a693eab21adb94171b0128c2a9ec1, it was introduced in version v5.11 by commit 08a27c1c3ecf5e1da193ce5f8fc97c3be16e75f0. For more details please see the references link. | null | 2021-12-19T23:27:25.420369Z | 2021-06-04T19:34:28.847786Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/08a27c1c3ecf5e1da193ce5f8fc97c3be16e75f0'} |
Linux | GSD-2022-1002220 | PM: core: keep irq flags in device_pm_check_callbacks() | PM: core: keep irq flags in device_pm_check_callbacks()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 0cccf9d4fb45f1acbc0bbf6d7e4d8d0fb7a10416. For more details please see the references link. | null | 2022-04-25T04:08:40.269320Z | 2022-04-24T22:22:50.692298Z | null | null | null | null | null |
Linux | GSD-2021-1000862 | usb: fix various gadget panics on 10gbps cabling | usb: fix various gadget panics on 10gbps cabling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.237 by commit 70cd19cb5bd94bbb5bacfc9c1e4ee0071699a604. For more details please see the references link. | null | 2021-12-20T00:48:14.011174Z | 2021-06-30T00:02:08.891582Z | null | null | null | null | null |
Linux | GSD-2021-1001770 | ocfs2: mount fails with buffer overflow in strlen | ocfs2: mount fails with buffer overflow in strlen
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.290 by commit ac011cb3ff7a76b3e0e6e77158ee4ba2f929e1fb. For more details please see the references link. | null | 2021-12-19T23:44:58.293223Z | 2021-10-28T13:48:03.231028Z | null | null | null | null | null |
Linux | GSD-2021-1001320 | net: validate lwtstate->data before returning from skb_tunnel_info() | net: validate lwtstate->data before returning from skb_tunnel_info()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.135 by commit 8aa13a86964cdec4fd969ef677c6614ff068641a, it was introduced in version v4.3 by commit 61adedf3e3f1d3f032c5a6a299978d91eff6d555. For more details please see the references link. | null | 2021-12-20T00:46:14.086817Z | 2021-08-03T02:07:33.606261Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61adedf3e3f1d3f032c5a6a299978d91eff6d555'} |
Linux | GSD-2021-1000927 | can: bcm: fix infoleak in struct bcm_msg_head | can: bcm: fix infoleak in struct bcm_msg_head
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.128 by commit c297559a2a2a6b6f0de61ed333a978a118b0e660, it was introduced in version v2.6.25 by commit ffd980f976e7fd666c2e61bf8ab35107efd11828. For more details please see the references link. | null | 2021-12-19T23:09:29.230113Z | 2021-06-30T00:25:02.486402Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ffd980f976e7fd666c2e61bf8ab35107efd11828'} |
Linux | GSD-2021-1001635 | KVM: x86: Handle SRCU initialization failure during page track init | KVM: x86: Handle SRCU initialization failure during page track init
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.71 by commit deb2949417677649e2413266d7ce8c2ff73952b4. For more details please see the references link. | null | 2021-12-19T22:11:34.235493Z | 2021-10-19T16:29:16.867737Z | null | null | null | null | null |
Linux | GSD-2022-1000358 | Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj | Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.181 by commit fe595759c2a4a5bb41c438474f15947d8ae32f5c, it was introduced in version v4.15 by commit c2e5df616e1ae6c2a074cb241ebb65a318ebaf7c. For more details please see the references link. | null | 2022-03-07T01:42:52.976953Z | 2022-02-27T02:56:08.403817Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c2e5df616e1ae6c2a074cb241ebb65a318ebaf7c'} |
Linux | GSD-2022-1002365 | video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() | video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit dd3a6cc7385b89ec2303f39dfc3bafa4e24cec4b, it was introduced in version v3.2 by commit 3c8a63e22a0802fd56380f6ab305b419f18eb6f5. For more details please see the references link. | null | 2022-04-25T03:19:49.344499Z | 2022-04-24T22:39:25.436162Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c8a63e22a0802fd56380f6ab305b419f18eb6f5'} |
Linux | GSD-2021-1001265 | nfs: fix acl memory leak of posix_acl_create() | nfs: fix acl memory leak of posix_acl_create()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.52 by commit 4b515308ab875c7e8ada8e606fe0c64762da5ed4, it was introduced in version v3.14 by commit 013cdf1088d7235da9477a2375654921d9b9ba9f. For more details please see the references link. | null | 2021-12-19T23:41:44.941321Z | 2021-08-03T01:53:10.378036Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/013cdf1088d7235da9477a2375654921d9b9ba9f'} |
Linux | GSD-2022-1000708 | blktrace: fix use after free for struct blk_trace | blktrace: fix use after free for struct blk_trace
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.13 by commit 6418634238ade86f2b08192928787f39d8afb58c, it was introduced in version v5.12 by commit c0ea57608b691d6cde8aff23e11f9858a86b5918. For more details please see the references link. | null | 2022-03-18T04:14:29.705744Z | 2022-03-18T00:11:28.992815Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c0ea57608b691d6cde8aff23e11f9858a86b5918'} |
Linux | GSD-2021-1002019 | regmap: Fix possible double-free in regcache_rbtree_exit() | regmap: Fix possible double-free in regcache_rbtree_exit()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.157 by commit 1cead23c1c0bc766dacb900a3b0269f651ad596f, it was introduced in version v3.12 by commit 3f4ff561bc88b074d5e868dde4012d89cbb06c87. For more details please see the references link. | null | 2021-12-19T22:43:19.649304Z | 2021-11-14T15:16:11.624220Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f4ff561bc88b074d5e868dde4012d89cbb06c87'} |
Linux | GSD-2021-1000024 | dmaengine: idxd: fix wq size store permission state | dmaengine: idxd: fix wq size store permission state
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.16 by commit 05b7791c4c4aa8304368fdc55ae911f6b34e7281, it was introduced in version v5.6 by commit c52ca478233c172b2d322b5241d6279a8661cbba. For more details please see the references link. | null | 2021-12-19T23:30:19.527804Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c52ca478233c172b2d322b5241d6279a8661cbba'} |
Linux | GSD-2022-1001549 | ptp: unregister virtual clocks when unregistering physical clock. | ptp: unregister virtual clocks when unregistering physical clock.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 9c796a57cbb5daf124a665689f0b2bc9262e0ced, it was introduced in version v5.14 by commit 73f37068d540eba5f93ba3a0019bf479d35ebd76. For more details please see the references link. | null | 2022-04-25T06:32:40.514431Z | 2022-04-24T21:22:30.806408Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/73f37068d540eba5f93ba3a0019bf479d35ebd76'} |
Linux | GSD-2021-1002449 | net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources() | net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.164 by commit e461a9816a1ac5b4aeb61621b817225b61e46a68, it was introduced in version v4.7 by commit ec25bc04ed8e12947738468cbe2191f1529f9e39. For more details please see the references link. | null | 2021-12-19T22:00:12.288288Z | 2021-12-19T19:37:51.717737Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ec25bc04ed8e12947738468cbe2191f1529f9e39'} |
Linux | GSD-2021-1000474 | bus: qcom: Put child node before return | bus: qcom: Put child node before return
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.233 by commit 94810fc52925eb122a922df7f9966cf3f4ba7391, it was introduced in version v4.9 by commit 335a127548081322bd2b294d715418648912f20c. For more details please see the references link. | null | 2021-12-20T01:22:41.711491Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/335a127548081322bd2b294d715418648912f20c'} |
Linux | GSD-2022-1001119 | ubifs: Fix deadlock in concurrent rename whiteout and inode writeback | ubifs: Fix deadlock in concurrent rename whiteout and inode writeback
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 8b278c8dcfb565cb65eceb62a38cbf7a7c326db5, it was introduced in version v4.9 by commit 9e0a1fff8db56eaaebb74b4a3ef65f86811c4798. For more details please see the references link. | null | 2022-04-25T04:39:34.645611Z | 2022-04-24T20:47:11.290925Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9e0a1fff8db56eaaebb74b4a3ef65f86811c4798'} |
Linux | GSD-2021-1000399 | rtw88: Fix array overrun in rtw_get_tx_power_params() | rtw88: Fix array overrun in rtw_get_tx_power_params()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 95fb153c6027924cda3422120169d1890737f3a0, it was introduced in version v5.3 by commit fa6dfe6bff246ddd5be3cfe81637f137acd6c294. For more details please see the references link. | null | 2021-12-19T23:09:50.135075Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fa6dfe6bff246ddd5be3cfe81637f137acd6c294'} |
Linux | GSD-2021-1000663 | net: usb: fix memory leak in smsc75xx_bind | net: usb: fix memory leak in smsc75xx_bind
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.193 by commit 9e6a3eccb28779710cbbafc4f4258d92509c6d07, it was introduced in version v2.6.34 by commit d0cad871703b898a442e4049c532ec39168e5b57. For more details please see the references link. | null | 2021-12-19T23:57:41.867016Z | 2021-06-04T19:57:22.375326Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0cad871703b898a442e4049c532ec39168e5b57'} |
Linux | GSD-2021-1001971 | comedi: ni_usb6501: fix NULL-deref in command paths | comedi: ni_usb6501: fix NULL-deref in command paths
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.255 by commit df7b1238f3b599a0b9284249772cdfd1ea83a632, it was introduced in version v3.18 by commit a03bb00e50ab4c07107da58a52a0bff7943f360c. For more details please see the references link. | null | 2021-12-19T22:41:30.911780Z | 2021-11-14T15:13:57.496442Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a03bb00e50ab4c07107da58a52a0bff7943f360c'} |
Linux | GSD-2021-1000233 | powerpc/64: Fix the definition of the fixmap area | powerpc/64: Fix the definition of the fixmap area
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit a84df7c80bdac598d6ac9268ae578da6928883e8, it was introduced in version v5.5 by commit 265c3491c4bc8d40587996d6ee2f447a7ccfb4f3. For more details please see the references link. | null | 2021-12-20T01:02:00.331091Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/265c3491c4bc8d40587996d6ee2f447a7ccfb4f3'} |
Linux | GSD-2021-1001588 | HID: betop: fix slab-out-of-bounds Write in betop_probe | HID: betop: fix slab-out-of-bounds Write in betop_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.151 by commit fe9bb925e7096509711660d39c0493a1546e9550. For more details please see the references link. | null | 2021-12-20T00:58:56.494095Z | 2021-10-19T16:25:09.261793Z | null | null | null | null | null |
Linux | GSD-2021-1001072 | net: ethernet: fix potential use-after-free in ec_bhf_remove | net: ethernet: fix potential use-after-free in ec_bhf_remove
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit d11d79e52ba080ee567cb7d7eb42a5ade60a8130, it was introduced in version v3.15 by commit 6af55ff52b02d492d45db88df3e461fa51a6f753. For more details please see the references link. | null | 2021-12-20T00:18:43.383926Z | 2021-06-30T00:37:47.702360Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6af55ff52b02d492d45db88df3e461fa51a6f753'} |
Linux | GSD-2022-1002172 | mm/sparsemem: fix 'mem_section' will never be NULL gcc 12 warning | mm/sparsemem: fix 'mem_section' will never be NULL gcc 12 warning
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit fdfb9ae26161606952f4cc3c4e0c0984d5c81cb6, it was introduced in version v2.6.14 by commit 3e347261a80b57df792ab9464b5f0ed59add53a8. For more details please see the references link. | null | 2022-04-25T06:43:30.250023Z | 2022-04-24T22:18:30.811484Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3e347261a80b57df792ab9464b5f0ed59add53a8'} |
Linux | GSD-2021-1001422 | jfs: fix GPF in diFree | jfs: fix GPF in diFree
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.240 by commit 49def1b0644892e3b113673c13d650c3060b43bc. For more details please see the references link. | null | 2021-12-20T00:35:09.988177Z | 2021-08-03T02:36:14.184337Z | null | null | null | null | null |
Linux | GSD-2022-1002488 | video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow | video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit 47e5533adf118afaf06d25a3e2aaaab89371b1c5. For more details please see the references link. | null | 2022-04-25T06:24:54.535439Z | 2022-04-24T22:53:25.291140Z | null | null | null | null | null |
Linux | GSD-2021-1001137 | i2c: robotfuzz-osif: fix control-request directions | i2c: robotfuzz-osif: fix control-request directions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.14 by commit cdc9ae6b3bd46e71cd07a8a97f21ebd0207d36c2, it was introduced in version v3.14 by commit 83e53a8f120f2f273cf0ad717f5372ab79ac24fe. For more details please see the references link. | null | 2021-12-19T23:25:02.906600Z | 2021-07-08T01:58:56.030674Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/83e53a8f120f2f273cf0ad717f5372ab79ac24fe'} |
Linux | GSD-2022-1002467 | veth: Ensure eth header is in skb's linear part | veth: Ensure eth header is in skb's linear part
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit 3de2a02b60a4ef0ab76263216f08c7d095fc7c42, it was introduced in version v2.6.24 by commit e314dbdc1c0dc6a548ecf0afce28ecfd538ff568. For more details please see the references link. | null | 2022-04-25T07:55:19.049653Z | 2022-04-24T22:51:34.016107Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e314dbdc1c0dc6a548ecf0afce28ecfd538ff568'} |
Linux | GSD-2021-1001567 | tty: Fix out-of-bound vmalloc access in imageblit | tty: Fix out-of-bound vmalloc access in imageblit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.209 by commit 8a6a240f52e14356386030d8958ae8b1761d2325. For more details please see the references link. | null | 2021-12-20T00:53:56.346020Z | 2021-10-19T16:24:07.414411Z | null | null | null | null | null |
Linux | GSD-2022-1002037 | KVM: x86/mmu: do compare-and-exchange of gPTE via the user address | KVM: x86/mmu: do compare-and-exchange of gPTE via the user address
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit e90518d10c7dd59d5ebbe25b0f0083a7dbffa42f, it was introduced in version v5.2 by commit bd53cb35a3e9adb73a834a36586e9ad80e877767. For more details please see the references link. | null | 2022-04-25T06:45:43.889299Z | 2022-04-24T22:05:13.832191Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bd53cb35a3e9adb73a834a36586e9ad80e877767'} |
Linux | GSD-2021-1000726 | nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect | nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.272 by commit 39c15bd2e5d11bcf7f4c3dba2aad9e1e110a5d94, it was introduced in version v3.3 by commit d646960f7986fefb460a2b062d5ccc8ccfeacc3a. For more details please see the references link. | null | 2021-12-20T01:08:32.933848Z | 2021-06-24T23:59:29.257871Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d646960f7986fefb460a2b062d5ccc8ccfeacc3a'} |
Linux | GSD-2021-1001834 | scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() | scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit 96f0aebf29be25254fa585af43924e34aa21fd9a, it was introduced in version v3.11 by commit 8c0eb596baa51f2b43949c698c644727ef17805c. For more details please see the references link. | null | 2021-12-20T00:15:20.167434Z | 2021-10-28T13:51:22.912857Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c0eb596baa51f2b43949c698c644727ef17805c'} |
Linux | GSD-2021-1000376 | drm/amd/display: Fix off by one in hdmi_14_process_transaction() | drm/amd/display: Fix off by one in hdmi_14_process_transaction()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 403c4528e5887af3deb9838cb77a557631d1e138, it was introduced in version v5.5 by commit 4c283fdac08abf3211533f70623c90a34f41d08d. For more details please see the references link. | null | 2021-12-20T01:11:36.528960Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4c283fdac08abf3211533f70623c90a34f41d08d'} |
Linux | GSD-2022-1000909 | iio: adc: men_z188_adc: Fix a resource leak in an error handling path | iio: adc: men_z188_adc: Fix a resource leak in an error handling path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.232 by commit 53d43a9c8dd224e66559fe86af1e473802c7130e, it was introduced in version v3.15 by commit 74aeac4da66fbfa246edbfc849002eac9b5af9ca. For more details please see the references link. | null | 2022-03-18T02:55:11.933297Z | 2022-03-18T00:30:41.810972Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/74aeac4da66fbfa246edbfc849002eac9b5af9ca'} |
Linux | GSD-2022-1000323 | parisc: Fix data TLB miss in sba_unmap_sg | parisc: Fix data TLB miss in sba_unmap_sg
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.231 by commit 867e50231c7605547d9334904d70a181f39f2d9e. For more details please see the references link. | null | 2022-03-07T01:47:49.898295Z | 2022-02-27T02:51:27.231499Z | null | null | null | null | null |
Linux | GSD-2022-1000289 | net: fix a memleak when uncloning an skb dst and its metadata | net: fix a memleak when uncloning an skb dst and its metadata
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.302 by commit 4ac84498fbe84a00e7aef185e2bb3e40ce71eca4, it was introduced in version v4.3 by commit fc4099f17240767554ff3a73977acb78ef615404. For more details please see the references link. | null | 2022-03-07T01:43:13.418214Z | 2022-02-27T02:38:47.014694Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fc4099f17240767554ff3a73977acb78ef615404'} |
Linux | GSD-2022-1001861 | ptp: unregister virtual clocks when unregistering physical clock. | ptp: unregister virtual clocks when unregistering physical clock.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit b2dea2a696d09163da4cd33cb598ce1f73e86597, it was introduced in version v5.14 by commit 73f37068d540eba5f93ba3a0019bf479d35ebd76. For more details please see the references link. | null | 2022-04-25T03:11:10.943332Z | 2022-04-24T21:49:10.594608Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/73f37068d540eba5f93ba3a0019bf479d35ebd76'} |
Linux | GSD-2022-1000773 | netfilter: fix use-after-free in __nf_register_net_hook() | netfilter: fix use-after-free in __nf_register_net_hook()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.27 by commit bd61f192a339b1095dfd6d56073a5265934c2979, it was introduced in version v4.14 by commit 2420b79f8c18a75ee2417cace381f4604b9b4365. For more details please see the references link. | null | 2022-03-18T02:55:57.272475Z | 2022-03-18T00:17:10.106186Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2420b79f8c18a75ee2417cace381f4604b9b4365'} |
Linux | GSD-2021-1002062 | drm/ttm: fix memleak in ttm_transfered_destroy | drm/ttm: fix memleak in ttm_transfered_destroy
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.77 by commit c21b4002214c1c7e7b627b9b53375612f7aab6db. For more details please see the references link. | null | 2021-12-19T22:25:45.339978Z | 2021-11-14T15:18:04.820244Z | null | null | null | null | null |
Linux | GSD-2021-1002598 | btrfs: free exchange changeset on failures | btrfs: free exchange changeset on failures
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.8 by commit ca06c5cb1b6dbfe67655b33c02fc394d65824519. For more details please see the references link. | null | 2021-12-20T01:03:05.767799Z | 2021-12-19T19:44:29.530039Z | null | null | null | null | null |
Linux | GSD-2022-1001532 | power: supply: wm8350-power: Add missing free in free_charger_irq | power: supply: wm8350-power: Add missing free in free_charger_irq
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit ae07ec8110ba83295c88bff7e85835cc2f6cc4ea, it was introduced in version v2.6.29 by commit 14431aa0c5a443d13d24e6f865a8838f97dab973. For more details please see the references link. | null | 2022-04-25T05:06:05.479005Z | 2022-04-24T21:20:51.138004Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/14431aa0c5a443d13d24e6f865a8838f97dab973'} |
Linux | GSD-2022-1001498 | NFS: remove unneeded check in decode_devicenotify_args() | NFS: remove unneeded check in decode_devicenotify_args()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit e53f2f987435aa8ff208f3ef7a6e90862c8cb71b, it was introduced in version v4.0 by commit a4f743a6bb201662962fa888e3f978583d61691e. For more details please see the references link. | null | 2022-04-25T04:27:07.311851Z | 2022-04-24T21:17:24.747604Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a4f743a6bb201662962fa888e3f978583d61691e'} |
Linux | GSD-2021-1002432 | iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove | iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.221 by commit a3730f74159ad00a28960c0efe2a931fe6fe6b45, it was introduced in version v4.2 by commit a25691c1f9674090fb66586cf4c5d60d3efdf339. For more details please see the references link. | null | 2021-12-19T23:59:06.805383Z | 2021-12-19T19:37:03.421760Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a25691c1f9674090fb66586cf4c5d60d3efdf339'} |
Linux | GSD-2022-1001162 | selinux: allow FIOCLEX and FIONCLEX with policy capability | selinux: allow FIOCLEX and FIONCLEX with policy capability
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit b531d4ead7990638c4d0402de1f6b3c6f4aa81be. For more details please see the references link. | null | 2022-04-25T04:55:44.258139Z | 2022-04-24T20:49:38.356468Z | null | null | null | null | null |
Linux | GSD-2022-1001477 | PM: core: keep irq flags in device_pm_check_callbacks() | PM: core: keep irq flags in device_pm_check_callbacks()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 2add538e57a2825c61d639260386f385c75e4166. For more details please see the references link. | null | 2022-04-25T04:45:13.119067Z | 2022-04-24T21:15:44.752588Z | null | null | null | null | null |
Linux | GSD-2021-1002127 | drm/ttm: fix memleak in ttm_transfered_destroy | drm/ttm: fix memleak in ttm_transfered_destroy
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.16 by commit 132a3d998d6753047f22152731fba2b0d6b463dd. For more details please see the references link. | null | 2021-12-20T01:02:56.399969Z | 2021-11-14T15:21:09.969285Z | null | null | null | null | null |
Linux | GSD-2022-1001027 | drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire() | drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit fe7929ff9ee0bf3514c69c3c298b3819f91e7d99, it was introduced in version v4.13 by commit 71c37505e7eaa01fa259debad1a71a7ae061039d. For more details please see the references link. | null | 2022-04-25T03:46:19.040551Z | 2022-04-24T20:41:08.867853Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/71c37505e7eaa01fa259debad1a71a7ae061039d'} |
Linux | GSD-2021-1002577 | xhci: Fix commad ring abort, write all 64 bits to CRCR register. | xhci: Fix commad ring abort, write all 64 bits to CRCR register.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.7 by commit fa75f593c867cde772e2d87ca36ab735c4aa4a09, it was introduced in version v5.15 by commit ff0e50d3564f33b7f4b35cadeabd951d66cfc570. For more details please see the references link. | null | 2021-12-19T23:08:54.122234Z | 2021-12-19T19:43:30.731465Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ff0e50d3564f33b7f4b35cadeabd951d66cfc570'} |
Linux | GSD-2022-1000266 | yam: fix a memory leak in yam_siocdevprivate() | yam: fix a memory leak in yam_siocdevprivate()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.19 by commit 0690c3943ed0fa76654e600eca38cde6a13c87ac, it was introduced in version v4.19 by commit 0781168e23a2fc8dceb989f11fc5b39b3ccacc35. For more details please see the references link. | null | 2022-02-20T06:32:18.288077Z | 2022-02-18T22:04:01.426771Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0781168e23a2fc8dceb989f11fc5b39b3ccacc35'} |
Linux | GSD-2021-1002824 | asix: fix uninit-value in asix_mdio_read() | asix: fix uninit-value in asix_mdio_read()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.12 by commit d259f621c85949f30cc578cac813b82bb5169f56, it was introduced in version v4.9 by commit d9fe64e511144c1ee7d7555b4111f09dde9692ef. For more details please see the references link. | null | 2022-01-11T05:55:53.189916Z | 2021-12-30T02:45:02.133172Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9fe64e511144c1ee7d7555b4111f09dde9692ef'} |
Linux | GSD-2021-1000819 | btrfs: fixup error handling in fixup_inode_link_counts | btrfs: fixup error handling in fixup_inode_link_counts
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit 4cd303735bdfacd115ee20a6f3235b0084924174, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T00:15:15.638997Z | 2021-06-25T00:09:22.655379Z | null | null | null | null | null |
Linux | GSD-2022-1001924 | can: m_can: m_can_tx_handler(): fix use after free of skb | can: m_can: m_can_tx_handler(): fix use after free of skb
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit f43e64076ff1b1dcb893fb77ad1204105f710a29, it was introduced in version v3.18 by commit 80646733f11c2e9de3b6339f7e635047e6087280. For more details please see the references link. | null | 2022-04-25T06:16:22.681959Z | 2022-04-24T21:55:26.793276Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80646733f11c2e9de3b6339f7e635047e6087280'} |
Linux | GSD-2022-1000636 | PCI: pciehp: Fix infinite loop in IRQ handler upon power fault | PCI: pciehp: Fix infinite loop in IRQ handler upon power fault
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.6 by commit 6d6f1f0dac3e3441ecdb1103d4efb11b9ed24dd5, it was introduced in version v5.7 by commit 8edf5332c39340b9583cf9cba659eb7ec71f75b5. For more details please see the references link. | null | 2022-03-07T01:38:59.708194Z | 2022-02-27T03:33:56.732795Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8edf5332c39340b9583cf9cba659eb7ec71f75b5'} |
Linux | GSD-2021-1001475 | nfs: fix acl memory leak of posix_acl_create() | nfs: fix acl memory leak of posix_acl_create()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.276 by commit 2e3960f276b4574a9bb0dfa31a7497302f6363b2, it was introduced in version v3.14 by commit 013cdf1088d7235da9477a2375654921d9b9ba9f. For more details please see the references link. | null | 2021-12-20T00:45:18.423270Z | 2021-08-03T02:52:44.185578Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/013cdf1088d7235da9477a2375654921d9b9ba9f'} |
Linux | GSD-2022-1002125 | mm/kmemleak: reset tag when compare object pointer | mm/kmemleak: reset tag when compare object pointer
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit d5d5804acc16fce9726fbbd006660d8642e2c459. For more details please see the references link. | null | 2022-04-25T06:07:46.255131Z | 2022-04-24T22:13:55.081453Z | null | null | null | null | null |
Linux | GSD-2022-1000118 | select: Fix indefinitely sleeping task in poll_schedule_timeout() | select: Fix indefinitely sleeping task in poll_schedule_timeout()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.227 by commit 6717900f775a6129a7b4d03ba4922218d8bf1caa. For more details please see the references link. | null | 2022-02-19T15:35:18.690314Z | 2022-02-18T21:43:07.301997Z | null | null | null | null | null |
Linux | GSD-2021-1001025 | ftrace: Do not blindly read the ip address in ftrace_bug() | ftrace: Do not blindly read the ip address in ftrace_bug()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.11 by commit 3e4ddeb68751fb4fb657199aed9cfd5d02796875, it was introduced in version v2.6.28 by commit 05736a427f7e16be948ccbf39782bd3a6ae16b14. For more details please see the references link. | null | 2021-12-19T22:35:18.124244Z | 2021-06-30T00:34:40.155348Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/05736a427f7e16be948ccbf39782bd3a6ae16b14'} |
Linux | GSD-2022-1000548 | ipv6: mcast: use rcu-safe version of ipv6_get_lladdr() | ipv6: mcast: use rcu-safe version of ipv6_get_lladdr()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit 27f567c84f446048670376827e356f9c92033bf9, it was introduced in version v5.13 by commit 88e2ca3080947fe22eb520c1f8231e79a105d011. For more details please see the references link. | null | 2022-03-07T01:44:10.660438Z | 2022-02-27T03:22:37.716052Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/88e2ca3080947fe22eb520c1f8231e79a105d011'} |
Linux | GSD-2021-1000264 | Bluetooth: avoid deadlock between hci_dev->lock and socket lock | Bluetooth: avoid deadlock between hci_dev->lock and socket lock
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 332e69eb3bd90370f2d9f2c2ca7974ff523dea17, it was introduced in version v5.7 by commit eab2404ba798a8efda2a970f44071c3406d94e57. For more details please see the references link. | null | 2021-12-19T23:26:21.354548Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/eab2404ba798a8efda2a970f44071c3406d94e57'} |
Linux | GSD-2021-1002259 | NFC: reorder the logic in nfc_{un,}register_device | NFC: reorder the logic in nfc_{un,}register_device
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.162 by commit 307d2e6cebfca9d92f86c8e2c8e3dd4a8be46ba6, it was introduced in version v3.10 by commit be055b2f89b5842f41363b5655a33dffb51a8294. For more details please see the references link. | null | 2021-12-19T22:15:10.245997Z | 2021-11-29T02:35:46.854341Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/be055b2f89b5842f41363b5655a33dffb51a8294'} |
Linux | GSD-2022-1001709 | ceph: fix memory leak in ceph_readdir when note_last_dentry returns error | ceph: fix memory leak in ceph_readdir when note_last_dentry returns error
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 2fe82d3254029ef9ec4e7be890125d5ef4f537de. For more details please see the references link. | null | 2022-04-25T06:53:52.815955Z | 2022-04-24T21:36:52.245644Z | null | null | null | null | null |
Linux | GSD-2021-1000634 | NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() | NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.124 by commit 785917316b25685c9b3a2a88f933139f2de75e33, it was introduced in version v4.0 by commit a7d42ddb3099727f58366fa006f850a219cce6c8. For more details please see the references link. | null | 2021-12-19T22:00:29.524836Z | 2021-06-04T19:51:28.108004Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a7d42ddb3099727f58366fa006f850a219cce6c8'} |
Linux | GSD-2021-1002609 | iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove | iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.8 by commit 14508fe13b1c578b3d2ba574f1d48b351975860c, it was introduced in version v4.2 by commit a25691c1f9674090fb66586cf4c5d60d3efdf339. For more details please see the references link. | null | 2021-12-19T22:19:36.920930Z | 2021-12-19T19:44:56.210659Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a25691c1f9674090fb66586cf4c5d60d3efdf339'} |
Linux | GSD-2021-1001926 | scsi: core: Put LLD module refcnt after SCSI device is released | scsi: core: Put LLD module refcnt after SCSI device is released
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.292 by commit 1105573d964f7b78734348466b01f5f6ba8a1813. For more details please see the references link. | null | 2021-12-19T23:35:58.893545Z | 2021-11-14T15:12:00.373278Z | null | null | null | null | null |
Linux | GSD-2022-1001359 | net: openvswitch: fix leak of nested actions | net: openvswitch: fix leak of nested actions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 3554c214b83ec9a839ed574263a34218f372990c, it was introduced in version v4.3 by commit 34ae932a40369be6bd6ea97d66b6686361b4370d. For more details please see the references link. | null | 2022-04-25T05:08:18.567197Z | 2022-04-24T21:07:42.163258Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/34ae932a40369be6bd6ea97d66b6686361b4370d'} |
Linux | GSD-2021-1000321 | userfaultfd: release page in error path to avoid BUG_ON | userfaultfd: release page in error path to avoid BUG_ON
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.38 by commit 140cfd9980124aecb6c03ef2e69c72d0548744de, it was introduced in version v4.11 by commit cb658a453b9327ce96ce5222c24d162b5b65b564. For more details please see the references link. | null | 2021-12-20T00:36:33.937448Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cb658a453b9327ce96ce5222c24d162b5b65b564'} |
Linux | GSD-2021-1000771 | wireguard: allowedips: free empty intermediate nodes when removing single node | wireguard: allowedips: free empty intermediate nodes when removing single node
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.43 by commit df3b45f6d1ce605120750b983fc4448e3769619a, it was introduced in version v5.6 by commit e7096c131e5161fa3b8e52a650d7719d2857adfd. For more details please see the references link. | null | 2021-12-20T00:55:56.442188Z | 2021-06-25T00:04:34.100116Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e7096c131e5161fa3b8e52a650d7719d2857adfd'} |
Linux | GSD-2021-1001863 | xhci: Fix command ring pointer corruption while aborting a command | xhci: Fix command ring pointer corruption while aborting a command
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.75 by commit dec944bb7079b37968cf69c8a438f91f15c4cc61. For more details please see the references link. | null | 2021-12-19T22:55:37.332132Z | 2021-10-28T13:52:52.210984Z | null | null | null | null | null |
Linux | GSD-2022-1002060 | lib/test: use after free in register_test_dev_kmod() | lib/test: use after free in register_test_dev_kmod()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 327f07e3704c821ce33e54ef5046bdf69975cb86, it was introduced in version v4.13 by commit d9c6a72d6fa29d3a7999dda726577e5d1fccafa5. For more details please see the references link. | null | 2022-04-25T06:02:55.921513Z | 2022-04-24T22:06:27.623777Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9c6a72d6fa29d3a7999dda726577e5d1fccafa5'} |
Linux | GSD-2021-1001530 | ipack: ipoctal: fix module reference leak | ipack: ipoctal: fix module reference leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.249 by commit dde4c1429b97383689f755ce92b4ed1e84a9c92b, it was introduced in version v3.18 by commit 82a82340bab6c251e0705339f60763718eaa2a22. For more details please see the references link. | null | 2021-12-20T00:10:47.703277Z | 2021-10-19T16:22:27.265213Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/82a82340bab6c251e0705339f60763718eaa2a22'} |
Linux | GSD-2022-1002430 | NFS: remove unneeded check in decode_devicenotify_args() | NFS: remove unneeded check in decode_devicenotify_args()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit a5ddd85bad671bee4a98e1dee3c23e8aff78288f, it was introduced in version v4.0 by commit a4f743a6bb201662962fa888e3f978583d61691e. For more details please see the references link. | null | 2022-04-25T05:51:38.348915Z | 2022-04-24T22:46:12.609462Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a4f743a6bb201662962fa888e3f978583d61691e'} |
Linux | GSD-2021-1001160 | bpf, sockmap: Fix potential memory leak on unlikely error case | bpf, sockmap: Fix potential memory leak on unlikely error case
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.6 by commit 6c508a1c6c62793dc6e6872cad4b200097bab7c9, it was introduced in version v5.10 by commit 4363023d2668e621b0743db351a9555d6e6ea57e. For more details please see the references link. | null | 2021-12-19T23:34:35.487780Z | 2021-08-03T01:31:27.433300Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4363023d2668e621b0743db351a9555d6e6ea57e'} |
Linux | GSD-2022-1001135 | drm/dp: Fix off-by-one in register cache size | drm/dp: Fix off-by-one in register cache size
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit ab096ec04c902d351ea1fce3acb8ef9f4a25fc51, it was introduced in version v5.12 by commit e2e16da398d9149ede0162a55f44537582aed2e7. For more details please see the references link. | null | 2022-04-25T03:10:44.805234Z | 2022-04-24T20:48:08.875384Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e2e16da398d9149ede0162a55f44537582aed2e7'} |
Linux | GSD-2021-1002465 | iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove | iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.165 by commit 8c163a14277115ca962103910ab4cce55e862ffb, it was introduced in version v4.2 by commit a25691c1f9674090fb66586cf4c5d60d3efdf339. For more details please see the references link. | null | 2021-12-20T01:12:15.887105Z | 2021-12-19T19:38:30.577654Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a25691c1f9674090fb66586cf4c5d60d3efdf339'} |
Linux | GSD-2021-1000458 | soundwire: stream: fix memory leak in stream config error path | soundwire: stream: fix memory leak in stream config error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.191 by commit 342260fe821047c3d515e3d28085d73fbdce3e80, it was introduced in version v4.18 by commit 89e590535f32d4bc548bcf266f3b046e50942f6d. For more details please see the references link. | null | 2021-12-19T23:55:51.980626Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/89e590535f32d4bc548bcf266f3b046e50942f6d'} |
Linux | GSD-2022-1001565 | media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED | media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 2874122ca4ca74adec72d6d6bf8828228ec20f15, it was introduced in version v3.7 by commit 8ac456495a33d9466076fea94594181ceefb76d9. For more details please see the references link. | null | 2022-04-25T04:24:14.330428Z | 2022-04-24T21:24:20.154121Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ac456495a33d9466076fea94594181ceefb76d9'} |
Linux | GSD-2021-1002035 | NFC: digital: fix possible memory leak in digital_in_send_sdd_req() | NFC: digital: fix possible memory leak in digital_in_send_sdd_req()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.75 by commit 50cb95487c265187289810addec5093d4fed8329, it was introduced in version v3.13 by commit 2c66daecc4092e6049673c281b2e6f0d5e59a94c. For more details please see the references link. | null | 2021-12-20T01:41:42.146758Z | 2021-11-14T15:16:57.292142Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c66daecc4092e6049673c281b2e6f0d5e59a94c'} |
Linux | GSD-2022-1001836 | Revert "RDMA/core: Fix ib_qp_usecnt_dec() called when error" | Revert "RDMA/core: Fix ib_qp_usecnt_dec() called when error"
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit b089f7fc89f9a106c24bfc9d8f0bbf67df84fc3f, it was introduced in version v5.15.33 by commit 4c3c666ecc6a287f367c2e0b53fa2e48e548820d. For more details please see the references link. | null | 2022-04-24T21:46:35.712726Z | 2022-04-24T21:46:35.712726Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4c3c666ecc6a287f367c2e0b53fa2e48e548820d'} |
Linux | GSD-2022-1000724 | btrfs: prevent copying too big compressed lzo segment | btrfs: prevent copying too big compressed lzo segment
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.12 by commit e326bd06cdde46df952361456232022298281d16. For more details please see the references link. | null | 2022-03-18T02:52:08.374369Z | 2022-03-18T00:12:19.575891Z | null | null | null | null | null |
Linux | GSD-2021-1001249 | bpf: Fix tail_call_reachable rejection for interpreter when jit failed | bpf: Fix tail_call_reachable rejection for interpreter when jit failed
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.54 by commit 39f1735c8107ef43a53c4daf82f330d880488d8f, it was introduced in version v5.10 by commit ebf7d1f508a73871acf3b2bfbfa1323a477acdb3. For more details please see the references link. | null | 2021-12-20T01:37:50.295115Z | 2021-08-03T01:48:26.199616Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ebf7d1f508a73871acf3b2bfbfa1323a477acdb3'} |
Linux | GSD-2022-1000374 | net: do not keep the dst cache when uncloning an skb dst and its metadata | net: do not keep the dst cache when uncloning an skb dst and its metadata
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.101 by commit 2e9fd2d0f69e4cc82a9a497bb14c1d70e75cc430, it was introduced in version v4.6 by commit d71785ffc7e7cae3fbdc4ea8a9d05b7a1c59f7b8. For more details please see the references link. | null | 2022-03-07T01:44:25.707297Z | 2022-02-27T02:57:56.182587Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d71785ffc7e7cae3fbdc4ea8a9d05b7a1c59f7b8'} |
Linux | GSD-2022-1002349 | af_netlink: Fix shift out of bounds in group mask calculation | af_netlink: Fix shift out of bounds in group mask calculation
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit f75f4abeec4c04b600a15b50c89a481f1e7435ee, it was introduced in version v2.6.14 by commit f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198. For more details please see the references link. | null | 2022-04-25T05:38:15.084731Z | 2022-04-24T22:36:58.387601Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198'} |
Linux | GSD-2021-1001619 | powerpc/64s: fix program check interrupt emergency stack path | powerpc/64s: fix program check interrupt emergency stack path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.73 by commit 411b38fe68ba20a8bbe724b0939762c3f16e16ca, it was introduced in version v5.3 by commit 0a882e28468f48ab3d9a36dde0a5723ea29ed1ed. For more details please see the references link. | null | 2021-12-20T01:36:07.453578Z | 2021-10-19T16:28:35.087968Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0a882e28468f48ab3d9a36dde0a5723ea29ed1ed'} |
Linux | GSD-2022-1001973 | lz4: fix LZ4_decompress_safe_partial read out of bound | lz4: fix LZ4_decompress_safe_partial read out of bound
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit 6adc01a7aa37445dafe8846faa0610a86029b253. For more details please see the references link. | null | 2022-04-25T08:47:48.203662Z | 2022-04-24T21:59:52.749930Z | null | null | null | null | null |
Linux | GSD-2022-1000661 | dma-buf: heaps: Fix potential spectre v1 gadget | dma-buf: heaps: Fix potential spectre v1 gadget
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.8 by commit cc8f7940d9c2d45f67b3d1a2f2b7a829ca561bed, it was introduced in version v5.5 by commit a69b0e855d3fd278ff6f09a23e1edf929538e304. For more details please see the references link. | null | 2022-03-07T01:49:07.977313Z | 2022-02-27T03:37:25.147637Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a69b0e855d3fd278ff6f09a23e1edf929538e304'} |
Linux | GSD-2022-1000231 | scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe | scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.99 by commit ec4334152dae175dbd8fd5bde1d2139bbe7b42d0, it was introduced in version v3.16 by commit d576a5e80cd07ea7049f8fd7b303c14df7b5d7d2. For more details please see the references link. | null | 2022-02-19T09:27:53.154418Z | 2022-02-18T21:59:06.573627Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d576a5e80cd07ea7049f8fd7b303c14df7b5d7d2'} |
Linux | GSD-2021-1002520 | nfsd: fix use-after-free due to delegation race | nfsd: fix use-after-free due to delegation race
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.85 by commit eeb0711801f5e19ef654371b627682aed3b11373. For more details please see the references link. | null | 2021-12-20T00:12:12.602732Z | 2021-12-19T19:40:56.497174Z | null | null | null | null | null |
Linux | GSD-2022-1001070 | ref_tracker: implement use-after-free detection | ref_tracker: implement use-after-free detection
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 3743c9de303fa36c2e2ca2522ab280c52bcafbd2. For more details please see the references link. | null | 2022-04-25T06:17:42.464295Z | 2022-04-24T20:43:25.744025Z | null | null | null | null | null |
Linux | GSD-2021-1002170 | ocfs2: fix data corruption after conversion from inline format | ocfs2: fix data corruption after conversion from inline format
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 5314454ea3ff6fc746eaf71b9a7ceebed52888fa, it was introduced in version v5.10 by commit 6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b. For more details please see the references link. | null | 2021-12-19T23:10:34.499549Z | 2021-11-14T15:23:04.549931Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.