ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2022-1001420
KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs
KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit d4a764be384f99da35378d4c3c7adb9b5e683536, it was introduced in version v4.2 by commit ca724305a2b02abcbecbf22577536fc8e965ab4f. For more details please see the references link.
null
2022-04-25T05:15:06.261902Z
2022-04-24T21:11:32.587546Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca724305a2b02abcbecbf22577536fc8e965ab4f'}
Linux
GSD-2021-1001930
comedi: vmk80xx: fix transfer-buffer overflows
comedi: vmk80xx: fix transfer-buffer overflows This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.292 by commit 5229159f1d052821007aff1a1beb7873eacf1a9f, it was introduced in version v2.6.31 by commit 985cafccbf9b7f862aa1c5ee566801e18b5161fb. For more details please see the references link.
null
2021-12-20T01:31:51.486667Z
2021-11-14T15:12:10.678067Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/985cafccbf9b7f862aa1c5ee566801e18b5161fb'}
Linux
GSD-2021-1000622
drm/amd/amdgpu: fix refcount leak
drm/amd/amdgpu: fix refcount leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.124 by commit dde2656e0bbb2ac7d83a7bd95a8d5c3c95bbc009, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T00:57:09.513076Z
2021-06-04T19:49:13.154892Z
null
null
null
null
null
Linux
GSD-2021-1000788
x86/kvm: Disable all PV features on crash
x86/kvm: Disable all PV features on crash This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.43 by commit 334c59d58de5faf449d9c9feaa8c50dd8b4046a7, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T00:26:39.152834Z
2021-06-25T00:05:41.825987Z
null
null
null
null
null
Linux
GSD-2021-1000272
media: venus: core: Fix some resource leaks in the error path of 'venus_probe()'
media: venus: core: Fix some resource leaks in the error path of 'venus_probe()' This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 711acdf0228dc71601247f28b56f13e850e395c8, it was introduced in version v5.5 by commit 32f0a6ddc8c98a1aade2bf3d07c79d5d2c6ceb9a. For more details please see the references link.
null
2021-12-20T00:36:44.577498Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/32f0a6ddc8c98a1aade2bf3d07c79d5d2c6ceb9a'}
Linux
GSD-2022-1002099
libbpf: Fix possible NULL pointer dereference when destroying skeleton
libbpf: Fix possible NULL pointer dereference when destroying skeleton This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 56722aa77b3bb9b53882182cb424514ed4287198, it was introduced in version v5.6 by commit d66562fba1ce66975bd61b0786fb8b1810f33caa. For more details please see the references link.
null
2022-04-25T02:58:29.250467Z
2022-04-24T22:11:04.291226Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d66562fba1ce66975bd61b0786fb8b1810f33caa'}
Linux
GSD-2021-1001033
usb: dwc3: ep0: fix NULL pointer exception
usb: dwc3: ep0: fix NULL pointer exception This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit 788755756dd4a6aba1de479fec20b0fa600e7f19. For more details please see the references link.
null
2021-12-19T22:03:20.367729Z
2021-06-30T00:35:12.075030Z
null
null
null
null
null
Linux
GSD-2021-1001199
iommu/arm-smmu: Fix arm_smmu_device refcount leak when arm_smmu_rpm_get fails
iommu/arm-smmu: Fix arm_smmu_device refcount leak when arm_smmu_rpm_get fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.4 by commit fe92c058199067ae90cf2a901ddf3c271893557a. For more details please see the references link.
null
2021-12-19T23:07:10.004868Z
2021-08-03T01:35:28.206311Z
null
null
null
null
null
Linux
GSD-2022-1002133
riscv: Increase stack size under KASAN
riscv: Increase stack size under KASAN This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 34bc1f69bf569309e76e5dfd574ee9034ceca147, it was introduced in version v5.6 by commit 8ad8b72721d0f07fa02dbe71f901743f9c71c8e6. For more details please see the references link.
null
2022-04-25T04:14:00.087519Z
2022-04-24T22:14:25.259585Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ad8b72721d0f07fa02dbe71f901743f9c71c8e6'}
Linux
GSD-2021-1001463
media: zr364xx: fix memory leak in zr364xx_start_readpipe
media: zr364xx: fix memory leak in zr364xx_start_readpipe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.276 by commit bbc80a972a3c5d7eba3f6c9c07af8fea42f5c513, it was introduced in version v2.6.32 by commit ccbf035ae5de4c535160fc99f73feb44cc55b534. For more details please see the references link.
null
2021-12-19T23:31:49.219099Z
2021-08-03T02:47:56.703132Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ccbf035ae5de4c535160fc99f73feb44cc55b534'}
Linux
GSD-2021-1001176
bus: mhi: core: Validate channel ID when processing command completions
bus: mhi: core: Validate channel ID when processing command completions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.6 by commit aed4f5b51aba41e2afd7cfda20a0571a6a67dfe9, it was introduced in version v5.7 by commit 1d3173a3bae7039b765a0956e3e4bf846dbaacb8. For more details please see the references link.
null
2021-12-19T22:42:02.479125Z
2021-08-03T01:32:29.927640Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1d3173a3bae7039b765a0956e3e4bf846dbaacb8'}
Linux
GSD-2022-1002426
net/x25: Fix null-ptr-deref caused by x25_disconnect
net/x25: Fix null-ptr-deref caused by x25_disconnect This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 858642789ada1b48630f322e59416ca9fca3e6b7, it was introduced in version v4.14.192 by commit f0b6ce595c397a91d5b62c6b0b5ea93b84191795. For more details please see the references link.
null
2022-04-25T04:01:14.910514Z
2022-04-24T22:45:38.982488Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f0b6ce595c397a91d5b62c6b0b5ea93b84191795'}
Linux
GSD-2021-1001526
bpf: Fix integer overflow in prealloc_elems_and_freelist()
bpf: Fix integer overflow in prealloc_elems_and_freelist() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.251 by commit f34bcd10c4832d491049905d25ea3f46a410c426, it was introduced in version v4.6 by commit 557c0c6e7df8e14a46bd7560d193fa5bbc00a858. For more details please see the references link.
null
2021-12-20T00:11:31.344713Z
2021-10-19T16:22:16.204517Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/557c0c6e7df8e14a46bd7560d193fa5bbc00a858'}
Linux
GSD-2022-1002076
Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt
Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 70a6cf749d9ff9f463490248322e5343199bc267, it was introduced in version v5.2 by commit 9aebfd4a2200ab8075e44379c758bccefdc589bb. For more details please see the references link.
null
2022-04-25T05:06:55.430818Z
2022-04-24T22:08:22.686320Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9aebfd4a2200ab8075e44379c758bccefdc589bb'}
Linux
GSD-2021-1001875
powerpc/idle: Don't corrupt back chain when going idle
powerpc/idle: Don't corrupt back chain when going idle This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit 65ede7bd97138435c07de602efc8812c586a1d38, it was introduced in version v5.14.15 by commit 6d077c37c4643394b1bae9682da48164fc147ea8. For more details please see the references link.
null
2021-10-28T13:53:26.716587Z
2021-10-28T13:53:26.716587Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6d077c37c4643394b1bae9682da48164fc147ea8'}
Linux
GSD-2021-1000767
netfilter: nft_ct: skip expectations for confirmed conntrack
netfilter: nft_ct: skip expectations for confirmed conntrack This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.43 by commit 5f3429c05e4028a0e241afdad856dd15dec2ffb9, it was introduced in version v5.3 by commit 857b46027d6f91150797295752581b7155b9d0e1. For more details please see the references link.
null
2021-12-19T22:34:45.324754Z
2021-06-25T00:04:19.137136Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/857b46027d6f91150797295752581b7155b9d0e1'}
Linux
GSD-2021-1000337
f2fs: fix panic during f2fs_resize_fs()
f2fs: fix panic during f2fs_resize_fs() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.38 by commit 1c20a4896409f5ca1c770e1880c33d0a28a8b10f, it was introduced in version v5.8 by commit b4b10061ef98c583bcf82a4200703fbaa98c18dc. For more details please see the references link.
null
2021-12-19T23:20:48.766649Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b4b10061ef98c583bcf82a4200703fbaa98c18dc'}
Linux
GSD-2022-1000948
iio: adc: men_z188_adc: Fix a resource leak in an error handling path
iio: adc: men_z188_adc: Fix a resource leak in an error handling path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.304 by commit 0f88722313645a903f4d420ba61ddc690ec2481d, it was introduced in version v3.15 by commit 74aeac4da66fbfa246edbfc849002eac9b5af9ca. For more details please see the references link.
null
2022-03-18T03:07:22.658532Z
2022-03-18T00:35:35.946885Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/74aeac4da66fbfa246edbfc849002eac9b5af9ca'}
Linux
GSD-2022-1000698
net: dsa: microchip: fix bridging with more than two member ports
net: dsa: microchip: fix bridging with more than two member ports This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.13 by commit 91e2709a2b61843f3d6827460a54e02a499d23e4, it was introduced in version v5.16 by commit b3612ccdf2841c64ae7a8dd9e780c91240093fe6. For more details please see the references link.
null
2022-03-18T02:59:48.107449Z
2022-03-18T00:10:26.474316Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b3612ccdf2841c64ae7a8dd9e780c91240093fe6'}
Linux
GSD-2022-1000362
scsi: target: iscsi: Make sure the np under each tpg is unique
scsi: target: iscsi: Make sure the np under each tpg is unique This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.101 by commit 7dbda616fc64298cedfb5b6cd52049f8038234fb. For more details please see the references link.
null
2022-03-07T01:39:21.131701Z
2022-02-27T02:56:35.469409Z
null
null
null
null
null
Linux
GSD-2022-1000732
iio: adc: men_z188_adc: Fix a resource leak in an error handling path
iio: adc: men_z188_adc: Fix a resource leak in an error handling path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.12 by commit d6ed5426a7fad36cf928c244483ba24e72359638, it was introduced in version v3.15 by commit 74aeac4da66fbfa246edbfc849002eac9b5af9ca. For more details please see the references link.
null
2022-03-18T03:02:05.578112Z
2022-03-18T00:13:19.583812Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/74aeac4da66fbfa246edbfc849002eac9b5af9ca'}
Linux
GSD-2022-1001820
kernel/resource: fix kfree() of bootmem memory again
kernel/resource: fix kfree() of bootmem memory again This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit a9e88c2618d228d7a4e7e515cf30dc0d0d813f27, it was introduced in version v3.10 by commit ebff7d8f270d045338d9f4796014f4db429a17f9. For more details please see the references link.
null
2022-04-25T08:04:04.414137Z
2022-04-24T21:45:01.545808Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ebff7d8f270d045338d9f4796014f4db429a17f9'}
Linux
GSD-2021-1002023
isofs: Fix out of bound access for corrupted isofs image
isofs: Fix out of bound access for corrupted isofs image This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.159 by commit 6e80e9314f8bb52d9eabe1907698718ff01120f5. For more details please see the references link.
null
2021-12-20T00:27:35.636588Z
2021-11-14T15:16:21.274983Z
null
null
null
null
null
Linux
GSD-2022-1001089
coredump: Use the vma snapshot in fill_files_note
coredump: Use the vma snapshot in fill_files_note This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 5c6baf808f409b69ad0799a551a704177b5a7ec1, it was introduced in version v5.10 by commit a07279c9a8cd7dbd321640ff7210591599ee00a4. For more details please see the references link.
null
2022-04-25T06:33:02.386891Z
2022-04-24T20:44:22.145507Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a07279c9a8cd7dbd321640ff7210591599ee00a4'}
Linux
GSD-2022-1001573
video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe()
video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit d396c651e2b508b6179bb678cc029f3becbf5170, it was introduced in version v3.2 by commit 3c8a63e22a0802fd56380f6ab305b419f18eb6f5. For more details please see the references link.
null
2022-04-25T05:11:55.829356Z
2022-04-24T21:25:12.983867Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c8a63e22a0802fd56380f6ab305b419f18eb6f5'}
Linux
GSD-2021-1002473
ice: fix vsi->txq_map sizing
ice: fix vsi->txq_map sizing This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.83 by commit 1eb5395add786613c7c5579d3947aa0b8f0ec241, it was introduced in version v5.5 by commit efc2214b6047b6f5b4ca53151eba62521b9452d6. For more details please see the references link.
null
2021-12-20T01:31:09.086426Z
2021-12-19T19:38:49.843766Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/efc2214b6047b6f5b4ca53151eba62521b9452d6'}
Linux
GSD-2022-1001123
scsi: qla2xxx: Fix scheduling while atomic
scsi: qla2xxx: Fix scheduling while atomic This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 78612f2fe8e26637476d756a44f0f05cca0d97de. For more details please see the references link.
null
2022-04-25T05:56:53.123851Z
2022-04-24T20:47:30.750258Z
null
null
null
null
null
Linux
GSD-2021-1002189
net/tls: Fix flipped sign in tls_err_abort() calls
net/tls: Fix flipped sign in tls_err_abort() calls This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit da353fac65fede6b8b4cfe207f0d9408e3121105, it was introduced in version v4.17 by commit c46234ebb4d1eee5e09819f49169e51cfc6eb909. For more details please see the references link.
null
2021-12-20T01:22:26.204398Z
2021-11-14T15:23:57.691221Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c46234ebb4d1eee5e09819f49169e51cfc6eb909'}
Linux
GSD-2022-1001436
wireguard: socket: ignore v6 endpoints when ipv6 is disabled
wireguard: socket: ignore v6 endpoints when ipv6 is disabled This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit efde4c0cf7fdbaa27c11740b0ced2e84f73779d8, it was introduced in version v5.6 by commit e7096c131e5161fa3b8e52a650d7719d2857adfd. For more details please see the references link.
null
2022-04-25T04:24:54.415059Z
2022-04-24T21:12:59.380645Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e7096c131e5161fa3b8e52a650d7719d2857adfd'}
Linux
GSD-2021-1002166
ice: Avoid crash from unnecessary IDA free
ice: Avoid crash from unnecessary IDA free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 73e30a62b19b9fbb4e6a3465c59da186630d5f2e, it was introduced in version v5.14 by commit d25a0fc41c1f927bb914e72a03c1898052557406. For more details please see the references link.
null
2021-12-20T01:24:45.940995Z
2021-11-14T15:22:54.058427Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d25a0fc41c1f927bb914e72a03c1898052557406'}
Linux
GSD-2022-1001066
scsi: mpi3mr: Fix memory leaks
scsi: mpi3mr: Fix memory leaks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 71c7ac65a084ae7d387c3c1d02d59edfdecb009f. For more details please see the references link.
null
2022-04-25T04:13:21.211104Z
2022-04-24T20:43:14.090322Z
null
null
null
null
null
Linux
GSD-2021-1002536
ice: fix vsi->txq_map sizing
ice: fix vsi->txq_map sizing This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.6 by commit 992ba40a67638dfe2772b84dfc8168dc328d5c4c, it was introduced in version v5.5 by commit efc2214b6047b6f5b4ca53151eba62521b9452d6. For more details please see the references link.
null
2021-12-19T21:45:13.443695Z
2021-12-19T19:41:41.627427Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/efc2214b6047b6f5b4ca53151eba62521b9452d6'}
Linux
GSD-2022-1000227
spi: uniphier: fix reference count leak in uniphier_spi_probe()
spi: uniphier: fix reference count leak in uniphier_spi_probe() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.99 by commit e895e067d73e154b1ebc84a124e00831e311d9b0, it was introduced in version v5.6 by commit 28d1dddc59f6b7fc085093e7c1e978b33f0caf4c. For more details please see the references link.
null
2022-02-19T12:54:07.091958Z
2022-02-18T21:57:49.640744Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/28d1dddc59f6b7fc085093e7c1e978b33f0caf4c'}
Linux
GSD-2021-1000858
ftrace: Do not blindly read the ip address in ftrace_bug()
ftrace: Do not blindly read the ip address in ftrace_bug() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.237 by commit acf671ba79c1feccc3ec7cfdcffead4efcec49e7, it was introduced in version v2.6.28 by commit 05736a427f7e16be948ccbf39782bd3a6ae16b14. For more details please see the references link.
null
2021-12-20T01:28:53.438650Z
2021-06-30T00:01:54.249692Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/05736a427f7e16be948ccbf39782bd3a6ae16b14'}
Linux
GSD-2022-1000677
ASoC: codecs: wcd938x: fix incorrect used of portid
ASoC: codecs: wcd938x: fix incorrect used of portid This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.8 by commit 9167f2712dc8c24964840a4d1e2ebf130e846b95, it was introduced in version v5.14 by commit e8ba1e05bdc016700c85fad559a812c2e795442f. For more details please see the references link.
null
2022-03-07T01:47:47.391669Z
2022-02-27T03:39:52.927071Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e8ba1e05bdc016700c85fad559a812c2e795442f'}
Linux
GSD-2022-1001965
mm/sparsemem: fix 'mem_section' will never be NULL gcc 12 warning
mm/sparsemem: fix 'mem_section' will never be NULL gcc 12 warning This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit 5c672073bcca537a0880257f31c6d942388df046, it was introduced in version v2.6.14 by commit 3e347261a80b57df792ab9464b5f0ed59add53a8. For more details please see the references link.
null
2022-04-25T04:52:59.260123Z
2022-04-24T21:59:10.628027Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3e347261a80b57df792ab9464b5f0ed59add53a8'}
Linux
GSD-2021-1001434
media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf()
media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.277 by commit c6ddeb63dd543b5474b0217c4e47538b7ffd7686, it was introduced in version v2.6.34 by commit dae52d009fc950b5c209260d50fcc000f5becd3c. For more details please see the references link.
null
2021-12-19T23:23:28.044118Z
2021-08-03T02:39:49.083122Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/dae52d009fc950b5c209260d50fcc000f5becd3c'}
Linux
GSD-2022-1000159
yam: fix a memory leak in yam_siocdevprivate()
yam: fix a memory leak in yam_siocdevprivate() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.176 by commit 7afc09c8915b0735203ebcb8d766d7db37b794c0, it was introduced in version v4.19 by commit 0781168e23a2fc8dceb989f11fc5b39b3ccacc35. For more details please see the references link.
null
2022-02-20T06:32:06.916771Z
2022-02-18T21:48:35.386085Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0781168e23a2fc8dceb989f11fc5b39b3ccacc35'}
Linux
GSD-2022-1002164
cifs: potential buffer overflow in handling symlinks
cifs: potential buffer overflow in handling symlinks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.190 by commit 22d658c6c5affed10c8907e67160cef0b6c92186, it was introduced in version v2.6.37 by commit c69c1b6eaea1b3e1eecf7ad2fba0208ac4a11131. For more details please see the references link.
null
2022-04-25T04:29:30.297173Z
2022-04-24T22:17:28.201657Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c69c1b6eaea1b3e1eecf7ad2fba0208ac4a11131'}
Linux
GSD-2021-1001064
mptcp: fix soft lookup in subflow_error_report()
mptcp: fix soft lookup in subflow_error_report() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit 27ef25c72373222aaa5fe7b5cd890ae9cfb89a8d, it was introduced in version v5.12 by commit 15cc10453398c22f78f6c2b897119ecce5e5dd89. For more details please see the references link.
null
2021-12-20T00:30:24.560938Z
2021-06-30T00:37:12.847703Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/15cc10453398c22f78f6c2b897119ecce5e5dd89'}
Linux
GSD-2022-1000509
SUNRPC: lock against ->sock changing during sysfs read
SUNRPC: lock against ->sock changing during sysfs read This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 9482ab4540f5bcc869b44c067ae99b5fca16bd07, it was introduced in version v5.16 by commit 17f09d3f619a7ad2d2b021b4e5246f08225b1b0f. For more details please see the references link.
null
2022-03-07T01:43:19.868837Z
2022-02-27T03:16:43.691076Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/17f09d3f619a7ad2d2b021b4e5246f08225b1b0f'}
Linux
GSD-2021-1002218
NFC: reorder the logic in nfc_{un,}register_device
NFC: reorder the logic in nfc_{un,}register_device This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.293 by commit 5ef16d2d172ee56714cff37cd005b98aba08ef5a, it was introduced in version v3.10 by commit be055b2f89b5842f41363b5655a33dffb51a8294. For more details please see the references link.
null
2021-12-19T22:04:54.814518Z
2021-11-29T02:33:55.586584Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/be055b2f89b5842f41363b5655a33dffb51a8294'}
Linux
GSD-2021-1000225
net: Only allow init netns to set default tcp cong to a restricted algo
net: Only allow init netns to set default tcp cong to a restricted algo This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit e7d7bedd507bb732e600403b7a96f9fe48d0ca31, it was introduced in version v4.15 by commit 6670e152447732ba90626f36dfc015a13fbf150e. For more details please see the references link.
null
2021-12-20T00:12:44.775950Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6670e152447732ba90626f36dfc015a13fbf150e'}
Linux
GSD-2022-1001748
nbd: fix possible overflow on 'first_minor' in nbd_dev_add()
nbd: fix possible overflow on 'first_minor' in nbd_dev_add() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 5142720dbe51befeb25f204f912ef1ad93fba343, it was introduced in version v4.11 by commit b0d9111a2d53785847763c64c40af2d4c4c5a8b7. For more details please see the references link.
null
2022-04-25T03:37:49.629544Z
2022-04-24T21:39:13.547470Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b0d9111a2d53785847763c64c40af2d4c4c5a8b7'}
Linux
GSD-2021-1001967
scsi: core: Put LLD module refcnt after SCSI device is released
scsi: core: Put LLD module refcnt after SCSI device is released This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.255 by commit 61a0faa89f21861d1f8d059123b5c285a5d9ffee. For more details please see the references link.
null
2021-12-19T23:18:28.855662Z
2021-11-14T15:13:47.843553Z
null
null
null
null
null
Linux
GSD-2021-1002648
audit: improve robustness of the audit queue handling
audit: improve robustness of the audit queue handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.222 by commit 8389f50ceb854cb437fefb9330d5024ed3c7c1f5, it was introduced in version v4.11 by commit 5b52330bbfe63b3305765354d6046c9f7f89c011. For more details please see the references link.
null
2022-01-11T05:53:25.764179Z
2021-12-27T05:32:45.558824Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5b52330bbfe63b3305765354d6046c9f7f89c011'}
Linux
GSD-2021-1000675
drm/meson: fix shutdown crash when component not probed
drm/meson: fix shutdown crash when component not probed This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.235 by commit b4298d33c1fcce511ffe84d8d3de07e220300f9b, it was introduced in version v4.14.226 by commit 8a5160cc8488776ddc48ea045860dab015f47390. For more details please see the references link.
null
2021-12-19T22:59:06.685515Z
2021-06-04T19:59:48.406323Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8a5160cc8488776ddc48ea045860dab015f47390'}
Linux
GSD-2022-1001318
cifs: fix handlecache and multiuser
cifs: fix handlecache and multiuser This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit e71f6a3a1d5c826a30384fec587ca7503ef6bde5. For more details please see the references link.
null
2022-04-25T04:31:11.839697Z
2022-04-24T21:04:11.116212Z
null
null
null
null
null
Linux
GSD-2021-1001988
regmap: Fix possible double-free in regcache_rbtree_exit()
regmap: Fix possible double-free in regcache_rbtree_exit() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.215 by commit 3dae1a4eced3ee733d7222e69b8a55caf2d61091, it was introduced in version v3.12 by commit 3f4ff561bc88b074d5e868dde4012d89cbb06c87. For more details please see the references link.
null
2021-12-19T23:12:45.120256Z
2021-11-14T15:14:46.882784Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f4ff561bc88b074d5e868dde4012d89cbb06c87'}
Linux
GSD-2021-1000360
mt76: mt7915: fix tx skb dma unmap
mt76: mt7915: fix tx skb dma unmap This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 4e7914ce23306b28d377ec395e00e5fde0e6f96e, it was introduced in version v5.10 by commit 27d5c528a7ca08dcd44877fdd9fc08b76630bf77. For more details please see the references link.
null
2021-12-20T00:47:47.093765Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/27d5c528a7ca08dcd44877fdd9fc08b76630bf77'}
Linux
GSD-2021-1001822
can: peak_pci: peak_pci_remove(): fix UAF
can: peak_pci: peak_pci_remove(): fix UAF This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.156 by commit 1248582e47a9f7ce0ecd156c39fc61f8b6aa3699, it was introduced in version v3.4 by commit e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd. For more details please see the references link.
null
2021-12-20T00:42:20.559583Z
2021-10-28T13:50:42.771730Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd'}
Linux
GSD-2021-1000730
net: caif: fix memory leak in cfusbl_device_notify
net: caif: fix memory leak in cfusbl_device_notify This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.236 by commit e8b37f5009ea7095529790f022859711e6939c76, it was introduced in version v3.3 by commit 7ad65bf68d705b445ef10b77ab50dab22be185ee. For more details please see the references link.
null
2021-12-20T01:35:30.225962Z
2021-06-24T23:59:43.848399Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ad65bf68d705b445ef10b77ab50dab22be185ee'}
Linux
GSD-2022-1002021
ax25: fix UAF bug in ax25_send_control()
ax25: fix UAF bug in ax25_send_control() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.112 by commit a4942c6fea879972a7fee50f7e92e2e10f3fc23e, it was introduced in version v5.10.112 by commit b20a5ab0f5fb175750c6bafd4cf12daccf00c738. For more details please see the references link.
null
2022-04-24T22:03:27.260292Z
2022-04-24T22:03:27.260292Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b20a5ab0f5fb175750c6bafd4cf12daccf00c738'}
Linux
GSD-2021-1001571
xen/balloon: use a kernel thread instead a workqueue
xen/balloon: use a kernel thread instead a workqueue This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.209 by commit 6bba79c6a073741b672b0bf86a1f03c0fe47f973. For more details please see the references link.
null
2021-12-19T23:50:28.438277Z
2021-10-19T16:24:18.470904Z
null
null
null
null
null
Linux
GSD-2022-1002471
drbd: Fix five use after free bugs in get_initial_state
drbd: Fix five use after free bugs in get_initial_state This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit 0489700bfeb1e53eb2039c2291c67e71b0b40103, it was introduced in version v4.5 by commit a29728463b254ce81ecefdf20c1a02e01d9361da. For more details please see the references link.
null
2022-04-25T05:45:14.824422Z
2022-04-24T22:51:58.065514Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a29728463b254ce81ecefdf20c1a02e01d9361da'}
Linux
GSD-2021-1001121
i2c: robotfuzz-osif: fix control-request directions
i2c: robotfuzz-osif: fix control-request directions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.129 by commit d77c9c8537dbc874c8d02b12e7bc5e2a0dcfc04f, it was introduced in version v3.14 by commit 83e53a8f120f2f273cf0ad717f5372ab79ac24fe. For more details please see the references link.
null
2021-12-20T01:34:42.881358Z
2021-07-08T01:57:43.626906Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/83e53a8f120f2f273cf0ad717f5372ab79ac24fe'}
Linux
GSD-2022-1001174
NFS: remove unneeded check in decode_devicenotify_args()
NFS: remove unneeded check in decode_devicenotify_args() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit dafe0551e2c5c7e8ee4d3a06bdb599bc2aff2087, it was introduced in version v4.0 by commit a4f743a6bb201662962fa888e3f978583d61691e. For more details please see the references link.
null
2022-04-25T04:30:55.106399Z
2022-04-24T20:50:38.436631Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a4f743a6bb201662962fa888e3f978583d61691e'}
Linux
GSD-2021-1000419
net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send
net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.119 by commit 55fcdd1258faaecca74b91b88cc0921f9edd775d, it was introduced in version v4.9 by commit b9b17debc69d27cd55e21ee51a5ba7fc50a426cf. For more details please see the references link.
null
2021-12-20T01:30:32.261076Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b9b17debc69d27cd55e21ee51a5ba7fc50a426cf'}
Linux
GSD-2021-1002424
can: pch_can: pch_can_rx_normal: fix use after free
can: pch_can: pch_can_rx_normal: fix use after free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.221 by commit 3e193ef4e0a3f5bf92ede83ef214cb09d01b00aa, it was introduced in version v2.6.37 by commit b21d18b51b31a24d17f883b678432fbdee3d5675. For more details please see the references link.
null
2021-12-20T01:06:10.816667Z
2021-12-19T19:36:44.557339Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b21d18b51b31a24d17f883b678432fbdee3d5675'}
Linux
GSD-2022-1001524
RDMA/irdma: Prevent some integer underflows
RDMA/irdma: Prevent some integer underflows This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit f21056f15bbeacab7b4b87af232f5599d1f2bff1, it was introduced in version v5.14 by commit 3f49d684256963d3f27dfb9d9ff228e2255be78d. For more details please see the references link.
null
2022-04-25T03:11:19.725779Z
2022-04-24T21:19:58.249031Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f49d684256963d3f27dfb9d9ff228e2255be78d'}
Linux
GSD-2021-1000049
net: hso: fix NULL-deref on disconnect regression
net: hso: fix NULL-deref on disconnect regression This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.189 by commit 5c17cfe155d21954b4c7e2a78fa771cebcd86725, it was introduced in version v4.19.187 by commit 92028d7a31e55d53e41cff679156b9432cffcb36. For more details please see the references link.
null
2021-12-19T23:04:44.847705Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/92028d7a31e55d53e41cff679156b9432cffcb36'}
Linux
GSD-2021-1002074
comedi: dt9812: fix DMA buffers on stack
comedi: dt9812: fix DMA buffers on stack This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.79 by commit 786f5b03450454557ff858a8bead5d7c0cbf78d6, it was introduced in version v2.6.29 by commit 63274cd7d38a3322d90b66a5bc976de1fb899051. For more details please see the references link.
null
2021-12-20T01:01:47.041628Z
2021-11-14T15:18:41.327557Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63274cd7d38a3322d90b66a5bc976de1fb899051'}
Linux
GSD-2022-1000765
mptcp: Correctly set DATA_FIN timeout when number of retransmits is large
mptcp: Correctly set DATA_FIN timeout when number of retransmits is large This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.27 by commit 0c3f34beb459753f9f80d0cc14c1b50ab615c631, it was introduced in version v5.13 by commit 6477dd39e62c3a67cfa368ddc127410b4ae424c6. For more details please see the references link.
null
2022-03-18T03:44:33.342367Z
2022-03-18T00:16:09.672528Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6477dd39e62c3a67cfa368ddc127410b4ae424c6'}
Linux
GSD-2022-1001877
ASoC: codecs: wc938x: fix accessing array out of bounds for enum type
ASoC: codecs: wc938x: fix accessing array out of bounds for enum type This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit adafea71b49ec4dbc44e0b84ec6eb602004a7a08, it was introduced in version v5.14 by commit e8ba1e05bdc016700c85fad559a812c2e795442f. For more details please see the references link.
null
2022-04-25T05:57:31.434849Z
2022-04-24T21:51:06.245468Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e8ba1e05bdc016700c85fad559a812c2e795442f'}
Linux
GSD-2021-1001208
f2fs: fix to avoid racing on fsync_entry_slab by multi filesystem instances
f2fs: fix to avoid racing on fsync_entry_slab by multi filesystem instances This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.3 by commit e472b276a0d2180808009be38105e12754432e2a. For more details please see the references link.
null
2021-12-20T00:12:00.784552Z
2021-08-03T01:37:33.123701Z
null
null
null
null
null
Linux
GSD-2022-1002308
drbd: Fix five use after free bugs in get_initial_state
drbd: Fix five use after free bugs in get_initial_state This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 188fe6b26765edbad4055611c0f788b6870f4024, it was introduced in version v4.5 by commit a29728463b254ce81ecefdf20c1a02e01d9361da. For more details please see the references link.
null
2022-04-25T04:16:19.144370Z
2022-04-24T22:32:59.716038Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a29728463b254ce81ecefdf20c1a02e01d9361da'}
Linux
GSD-2022-1000335
scsi: myrs: Fix crash in error case
scsi: myrs: Fix crash in error case This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.180 by commit 5c5ceea00c8c9df150708e66cb9f2891192c1162. For more details please see the references link.
null
2022-03-07T01:56:06.586581Z
2022-02-27T02:52:48.280245Z
null
null
null
null
null
Linux
GSD-2021-1001658
hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field
hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.71 by commit 1499bb2c3a87a2efea0065adab2bd66badee61c3. For more details please see the references link.
null
2021-12-19T23:54:02.548807Z
2021-10-19T16:30:23.836680Z
null
null
null
null
null
Linux
GSD-2022-1000620
rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev
rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit d6cdc6ae542845d4d0ac8b6d99362bde7042a3c7, it was introduced in version v4.11 by commit c0cdc19f84a4712cf74888f83af286e3c2e14efd. For more details please see the references link.
null
2022-03-07T01:44:08.571176Z
2022-02-27T03:32:09.244911Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c0cdc19f84a4712cf74888f83af286e3c2e14efd'}
Linux
GSD-2022-1001932
firmware: sysfb: fix platform-device leak in error path
firmware: sysfb: fix platform-device leak in error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit b3e38f939ab4d0d86f56bff3362c3f88c4b2ad32, it was introduced in version v5.15.17 by commit 71db96193317626954073c24344d5cf4759e0af3. For more details please see the references link.
null
2022-04-25T06:44:31.495290Z
2022-04-24T21:56:00.495761Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/71db96193317626954073c24344d5cf4759e0af3'}
Linux
GSD-2021-1002832
ipmi: fix initialization when workqueue allocation fails
ipmi: fix initialization when workqueue allocation fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.12 by commit 5aae769a0ef7ec3ad0e9b3e3297a2e4fc69cde95, it was introduced in version v5.15.7 by commit c4618188b15af986c4f43bb63271edc7d07f73aa. For more details please see the references link.
null
2022-01-11T05:47:34.500945Z
2021-12-30T02:45:28.482369Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c4618188b15af986c4f43bb63271edc7d07f73aa'}
Linux
GSD-2022-1001898
drm/i915/gem: add missing boundary check in vm_access
drm/i915/gem: add missing boundary check in vm_access This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 312d3d4f49e12f97260bcf972c848c3562126a18, it was introduced in version v5.8 by commit 9f909e215fea0652023b9ed09d3d7bfe10386423. For more details please see the references link.
null
2022-04-25T04:43:51.878539Z
2022-04-24T21:53:11.021955Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9f909e215fea0652023b9ed09d3d7bfe10386423'}
Linux
GSD-2022-1000270
net: ipa: prevent concurrent replenish
net: ipa: prevent concurrent replenish This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.20 by commit dffeeca9268b221063c7a5a75719299b324c1acf, it was introduced in version v5.7 by commit 84f9bd12d46dbe8ac7d4b650a8fbb4c49657a38b. For more details please see the references link.
null
2022-02-19T10:24:06.310835Z
2022-02-18T22:04:29.274020Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/84f9bd12d46dbe8ac7d4b650a8fbb4c49657a38b'}
Linux
GSD-2021-1002561
net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings()
net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.7 by commit c5ef33c1489b2cd74368057fa00b5d2183bb5853, it was introduced in version v3.9 by commit 7f9664525f9cb507de9198a395a111371413f230. For more details please see the references link.
null
2021-12-19T23:06:03.793697Z
2021-12-19T19:42:43.473382Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7f9664525f9cb507de9198a395a111371413f230'}
Linux
GSD-2022-1001031
x86: Annotate call_on_stack()
x86: Annotate call_on_stack() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 9b78f03e429076e97615fbdb886f06ddd7ab6e50. For more details please see the references link.
null
2022-04-25T03:13:57.940141Z
2022-04-24T20:41:20.712966Z
null
null
null
null
null
Linux
GSD-2021-1002131
riscv, bpf: Fix potential NULL dereference
riscv, bpf: Fix potential NULL dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.16 by commit e1b80a5ebe5431caeb20f88c32d4a024777a2d41, it was introduced in version v5.7 by commit ca6cb5447ceca6a87d6b62c9e5d41042c34f7ffa. For more details please see the references link.
null
2021-12-19T23:16:57.227280Z
2021-11-14T15:21:19.812889Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca6cb5447ceca6a87d6b62c9e5d41042c34f7ffa'}
Linux
GSD-2022-1001461
media: atomisp: fix dummy_ptr check to avoid duplicate active_bo
media: atomisp: fix dummy_ptr check to avoid duplicate active_bo This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit edaa87390aab4d9452730540243c2f0ef06d5fc9. For more details please see the references link.
null
2022-04-25T06:07:11.177676Z
2022-04-24T21:14:57.990674Z
null
null
null
null
null
Linux
GSD-2022-1001416
usb: cdnsp: fix cdnsp_decode_trb function to properly handle ret value
usb: cdnsp: fix cdnsp_decode_trb function to properly handle ret value This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 6cb0c612a438494bf8f7da4e9fb52a71471cf001. For more details please see the references link.
null
2022-04-25T04:12:13.863747Z
2022-04-24T21:11:15.258703Z
null
null
null
null
null
Linux
GSD-2021-1000481
net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send
net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.269 by commit c7f75d11fe72913d2619f97b2334b083cd7bb955, it was introduced in version v4.9 by commit b9b17debc69d27cd55e21ee51a5ba7fc50a426cf. For more details please see the references link.
null
2021-12-19T22:10:02.998773Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b9b17debc69d27cd55e21ee51a5ba7fc50a426cf'}
Linux
GSD-2021-1002146
media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()
media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.17 by commit 02a476ca886dc8155025fe99cbbad4121d029fa7. For more details please see the references link.
null
2021-12-20T03:09:32.167022Z
2021-11-14T15:21:56.280494Z
null
null
null
null
null
Linux
GSD-2022-1001046
netlabel: fix out-of-bounds memory accesses
netlabel: fix out-of-bounds memory accesses This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.0 by commit 5578de4834fe0f2a34fedc7374be691443396d1f, it was introduced in version v2.6.19 by commit 446fda4f26822b2d42ab3396aafcedf38a9ff2b6. For more details please see the references link.
null
2022-04-25T06:15:18.409587Z
2022-04-24T20:42:16.494184Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/446fda4f26822b2d42ab3396aafcedf38a9ff2b6'}
Linux
GSD-2021-1002516
aio: fix use-after-free due to missing POLLFREE handling
aio: fix use-after-free due to missing POLLFREE handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.85 by commit 47ffefd88abfffe8a040bcc1dd0554d4ea6f7689, it was introduced in version v4.18 by commit 2c14fa838cbefc23cf1c73ca167ed85b274b2913. For more details please see the references link.
null
2021-12-19T22:57:27.365697Z
2021-12-19T19:40:46.930564Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c14fa838cbefc23cf1c73ca167ed85b274b2913'}
Linux
GSD-2022-1000207
net/mlx5e: Fix handling of wrong devices during bond netevent
net/mlx5e: Fix handling of wrong devices during bond netevent This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.97 by commit a01ee1b8165f4161459b5ec4e728bc7130fe8cd4, it was introduced in version v5.8 by commit 7e51891a237f9ea319f53f9beb83afb0077d88e6. For more details please see the references link.
null
2022-02-20T06:46:18.879894Z
2022-02-18T21:55:33.875909Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7e51891a237f9ea319f53f9beb83afb0077d88e6'}
Linux
GSD-2021-1001290
media: zr364xx: fix memory leak in zr364xx_start_readpipe
media: zr364xx: fix memory leak in zr364xx_start_readpipe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.51 by commit c57bfd8000d7677bf435873b440eec0c47f73a08, it was introduced in version v2.6.32 by commit ccbf035ae5de4c535160fc99f73feb44cc55b534. For more details please see the references link.
null
2021-12-19T23:28:28.317707Z
2021-08-03T01:58:15.695638Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ccbf035ae5de4c535160fc99f73feb44cc55b534'}
Linux
GSD-2021-1002845
hamradio: defer ax25 kfree after unregister_netdev
hamradio: defer ax25 kfree after unregister_netdev This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.12 by commit cb6c99aedd2c843056a598a8907a6128cb07603b. For more details please see the references link.
null
2022-01-11T07:35:32.061487Z
2021-12-30T02:45:59.776539Z
null
null
null
null
null
Linux
GSD-2021-1000878
usb: fix various gadgets null ptr deref on 10gbps cabling.
usb: fix various gadgets null ptr deref on 10gbps cabling. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.195 by commit 10770d2ac0094b053c8897d96d7b2737cd72f7c5, it was introduced in version v4.6 by commit eaef50c760576bca70b87fdc26eb87a3660529f8. For more details please see the references link.
null
2021-12-20T00:31:57.309051Z
2021-06-30T00:03:10.295228Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/eaef50c760576bca70b87fdc26eb87a3660529f8'}
Linux
GSD-2022-1000657
drm/nouveau: fix off by one in BIOS boundary checking
drm/nouveau: fix off by one in BIOS boundary checking This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.8 by commit e7c36fa8a1e63b08312162179c78a0c7795ea369, it was introduced in version v4.8 by commit 4d4e9907ff572bb1d1c0f6913ad6e3d6d4525077. For more details please see the references link.
null
2022-03-07T01:45:00.133849Z
2022-02-27T03:36:58.005256Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4d4e9907ff572bb1d1c0f6913ad6e3d6d4525077'}
Linux
GSD-2022-1001945
dm integrity: fix memory corruption when tag_size is less than digest size
dm integrity: fix memory corruption when tag_size is less than digest size This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.112 by commit cd02b2687d66f0a8e716384de4b9a0671331f1dc. For more details please see the references link.
null
2022-04-25T04:35:19.418667Z
2022-04-24T21:57:00.338539Z
null
null
null
null
null
Linux
GSD-2022-1002390
cifs: potential buffer overflow in handling symlinks
cifs: potential buffer overflow in handling symlinks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 1316c28569a80ab3596eeab05bf5e01991e7e739, it was introduced in version v2.6.37 by commit c69c1b6eaea1b3e1eecf7ad2fba0208ac4a11131. For more details please see the references link.
null
2022-04-25T06:17:36.671547Z
2022-04-24T22:42:10.647935Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c69c1b6eaea1b3e1eecf7ad2fba0208ac4a11131'}
Linux
GSD-2022-1000342
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.180 by commit a0fd5492ee769029a636f1fb521716b022b1423d, it was introduced in version v3.9 by commit e2ca90c276e1fc410d7cd3c1a4eee245ec902a20. For more details please see the references link.
null
2022-03-07T01:39:05.301460Z
2022-02-27T02:53:36.010162Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e2ca90c276e1fc410d7cd3c1a4eee245ec902a20'}
Linux
GSD-2022-1000712
ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min
ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.13 by commit 70712d5afbbea898d5f51fa02e315fe0a4835043, it was introduced in version v5.16.8 by commit bb72d2dda85564c66d909108ea6903937a41679d. For more details please see the references link.
null
2022-03-18T02:50:13.561600Z
2022-03-18T00:11:41.718342Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bb72d2dda85564c66d909108ea6903937a41679d'}
Linux
GSD-2022-1001800
LSM: general protection fault in legacy_parse_param
LSM: general protection fault in legacy_parse_param This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit f3f93a1aaafc3032e0a9655fb43deccfb3e953a3. For more details please see the references link.
null
2022-04-25T06:11:56.089750Z
2022-04-24T21:42:58.719376Z
null
null
null
null
null
Linux
GSD-2021-1001785
net: encx24j600: check error in devm_regmap_init_encx24j600
net: encx24j600: check error in devm_regmap_init_encx24j600 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.288 by commit f043fac1133a6c5ef960a8422c0f6dd711dee462, it was introduced in version v4.4 by commit 04fbfce7a222327b97ca165294ef19f0faa45960. For more details please see the references link.
null
2021-12-19T23:27:23.489012Z
2021-10-28T13:48:45.623006Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/04fbfce7a222327b97ca165294ef19f0faa45960'}
Linux
GSD-2021-1000897
tracing: Correct the length check which causes memory corruption
tracing: Correct the length check which causes memory corruption This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.126 by commit d63f00ec908b3be635ead5d6029cc94246e1f38d, it was introduced in version v5.4.99 by commit a0997a86f5c0085e183ddee5fb72091d584d3d16. For more details please see the references link.
null
2021-12-20T00:53:26.130934Z
2021-06-30T00:05:10.150374Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a0997a86f5c0085e183ddee5fb72091d584d3d16'}
Linux
GSD-2021-1002003
can: peak_pci: peak_pci_remove(): fix UAF
can: peak_pci: peak_pci_remove(): fix UAF This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.156 by commit 1248582e47a9f7ce0ecd156c39fc61f8b6aa3699, it was introduced in version v3.4 by commit e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd. For more details please see the references link.
null
2021-12-20T01:25:27.013952Z
2021-11-14T15:15:24.496380Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd'}
Linux
GSD-2022-1001553
Bluetooth: hci_serdev: call init_rwsem() before p->open()
Bluetooth: hci_serdev: call init_rwsem() before p->open() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 24608d8489cb3622f5ca968fb7996d193e4f9f81, it was introduced in version v4.16 by commit d73e172816652772114827abaa2dbc053eecbbd7. For more details please see the references link.
null
2022-04-25T05:25:07.992970Z
2022-04-24T21:23:00.454705Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d73e172816652772114827abaa2dbc053eecbbd7'}
Linux
GSD-2021-1002453
can: pch_can: pch_can_rx_normal: fix use after free
can: pch_can: pch_can_rx_normal: fix use after free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.165 by commit abb4eff3dcd2e583060082a18a8dbf31f02689d4, it was introduced in version v2.6.37 by commit b21d18b51b31a24d17f883b678432fbdee3d5675. For more details please see the references link.
null
2021-12-19T23:38:22.897657Z
2021-12-19T19:38:02.342463Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b21d18b51b31a24d17f883b678432fbdee3d5675'}
Linux
GSD-2022-1001103
ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl
ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 5f9e9c223e48c264241d2f34d0bfc29e5fcb5c1b, it was introduced in version v4.8 by commit 714fb87e8bc05ff78255afc0dca981e8c5242785. For more details please see the references link.
null
2022-04-25T04:59:20.382915Z
2022-04-24T20:45:36.432581Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/714fb87e8bc05ff78255afc0dca981e8c5242785'}
Linux
GSD-2021-1000194
usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4
usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit 5e9c6f58b01e6fdfbc740390c01f542a35c97e57, it was introduced in version v5.8 by commit 992a60ed0d5e312ce9a485c9e12097ac82ae4b3e. For more details please see the references link.
null
2021-12-19T22:34:45.526515Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/992a60ed0d5e312ce9a485c9e12097ac82ae4b3e'}
Linux
GSD-2021-1001156
igb: Fix use-after-free error during reset
igb: Fix use-after-free error during reset This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.6 by commit 8e24c12f2ff6d32fd9f057382f08e748ec97194c, it was introduced in version v4.12 by commit 7cc6fd4c60f267e17b0baef1580d7a6258c0a6f0. For more details please see the references link.
null
2021-12-19T23:16:50.536821Z
2021-08-03T01:31:12.542891Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7cc6fd4c60f267e17b0baef1580d7a6258c0a6f0'}