ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2022-1001420 | KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs | KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit d4a764be384f99da35378d4c3c7adb9b5e683536, it was introduced in version v4.2 by commit ca724305a2b02abcbecbf22577536fc8e965ab4f. For more details please see the references link. | null | 2022-04-25T05:15:06.261902Z | 2022-04-24T21:11:32.587546Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca724305a2b02abcbecbf22577536fc8e965ab4f'} |
Linux | GSD-2021-1001930 | comedi: vmk80xx: fix transfer-buffer overflows | comedi: vmk80xx: fix transfer-buffer overflows
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.292 by commit 5229159f1d052821007aff1a1beb7873eacf1a9f, it was introduced in version v2.6.31 by commit 985cafccbf9b7f862aa1c5ee566801e18b5161fb. For more details please see the references link. | null | 2021-12-20T01:31:51.486667Z | 2021-11-14T15:12:10.678067Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/985cafccbf9b7f862aa1c5ee566801e18b5161fb'} |
Linux | GSD-2021-1000622 | drm/amd/amdgpu: fix refcount leak | drm/amd/amdgpu: fix refcount leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.124 by commit dde2656e0bbb2ac7d83a7bd95a8d5c3c95bbc009, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T00:57:09.513076Z | 2021-06-04T19:49:13.154892Z | null | null | null | null | null |
Linux | GSD-2021-1000788 | x86/kvm: Disable all PV features on crash | x86/kvm: Disable all PV features on crash
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.43 by commit 334c59d58de5faf449d9c9feaa8c50dd8b4046a7, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T00:26:39.152834Z | 2021-06-25T00:05:41.825987Z | null | null | null | null | null |
Linux | GSD-2021-1000272 | media: venus: core: Fix some resource leaks in the error path of 'venus_probe()' | media: venus: core: Fix some resource leaks in the error path of 'venus_probe()'
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 711acdf0228dc71601247f28b56f13e850e395c8, it was introduced in version v5.5 by commit 32f0a6ddc8c98a1aade2bf3d07c79d5d2c6ceb9a. For more details please see the references link. | null | 2021-12-20T00:36:44.577498Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/32f0a6ddc8c98a1aade2bf3d07c79d5d2c6ceb9a'} |
Linux | GSD-2022-1002099 | libbpf: Fix possible NULL pointer dereference when destroying skeleton | libbpf: Fix possible NULL pointer dereference when destroying skeleton
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 56722aa77b3bb9b53882182cb424514ed4287198, it was introduced in version v5.6 by commit d66562fba1ce66975bd61b0786fb8b1810f33caa. For more details please see the references link. | null | 2022-04-25T02:58:29.250467Z | 2022-04-24T22:11:04.291226Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d66562fba1ce66975bd61b0786fb8b1810f33caa'} |
Linux | GSD-2021-1001033 | usb: dwc3: ep0: fix NULL pointer exception | usb: dwc3: ep0: fix NULL pointer exception
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.11 by commit 788755756dd4a6aba1de479fec20b0fa600e7f19. For more details please see the references link. | null | 2021-12-19T22:03:20.367729Z | 2021-06-30T00:35:12.075030Z | null | null | null | null | null |
Linux | GSD-2021-1001199 | iommu/arm-smmu: Fix arm_smmu_device refcount leak when arm_smmu_rpm_get fails | iommu/arm-smmu: Fix arm_smmu_device refcount leak when arm_smmu_rpm_get fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.4 by commit fe92c058199067ae90cf2a901ddf3c271893557a. For more details please see the references link. | null | 2021-12-19T23:07:10.004868Z | 2021-08-03T01:35:28.206311Z | null | null | null | null | null |
Linux | GSD-2022-1002133 | riscv: Increase stack size under KASAN | riscv: Increase stack size under KASAN
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 34bc1f69bf569309e76e5dfd574ee9034ceca147, it was introduced in version v5.6 by commit 8ad8b72721d0f07fa02dbe71f901743f9c71c8e6. For more details please see the references link. | null | 2022-04-25T04:14:00.087519Z | 2022-04-24T22:14:25.259585Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ad8b72721d0f07fa02dbe71f901743f9c71c8e6'} |
Linux | GSD-2021-1001463 | media: zr364xx: fix memory leak in zr364xx_start_readpipe | media: zr364xx: fix memory leak in zr364xx_start_readpipe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.276 by commit bbc80a972a3c5d7eba3f6c9c07af8fea42f5c513, it was introduced in version v2.6.32 by commit ccbf035ae5de4c535160fc99f73feb44cc55b534. For more details please see the references link. | null | 2021-12-19T23:31:49.219099Z | 2021-08-03T02:47:56.703132Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ccbf035ae5de4c535160fc99f73feb44cc55b534'} |
Linux | GSD-2021-1001176 | bus: mhi: core: Validate channel ID when processing command completions | bus: mhi: core: Validate channel ID when processing command completions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.6 by commit aed4f5b51aba41e2afd7cfda20a0571a6a67dfe9, it was introduced in version v5.7 by commit 1d3173a3bae7039b765a0956e3e4bf846dbaacb8. For more details please see the references link. | null | 2021-12-19T22:42:02.479125Z | 2021-08-03T01:32:29.927640Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1d3173a3bae7039b765a0956e3e4bf846dbaacb8'} |
Linux | GSD-2022-1002426 | net/x25: Fix null-ptr-deref caused by x25_disconnect | net/x25: Fix null-ptr-deref caused by x25_disconnect
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 858642789ada1b48630f322e59416ca9fca3e6b7, it was introduced in version v4.14.192 by commit f0b6ce595c397a91d5b62c6b0b5ea93b84191795. For more details please see the references link. | null | 2022-04-25T04:01:14.910514Z | 2022-04-24T22:45:38.982488Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f0b6ce595c397a91d5b62c6b0b5ea93b84191795'} |
Linux | GSD-2021-1001526 | bpf: Fix integer overflow in prealloc_elems_and_freelist() | bpf: Fix integer overflow in prealloc_elems_and_freelist()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.251 by commit f34bcd10c4832d491049905d25ea3f46a410c426, it was introduced in version v4.6 by commit 557c0c6e7df8e14a46bd7560d193fa5bbc00a858. For more details please see the references link. | null | 2021-12-20T00:11:31.344713Z | 2021-10-19T16:22:16.204517Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/557c0c6e7df8e14a46bd7560d193fa5bbc00a858'} |
Linux | GSD-2022-1002076 | Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt | Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 70a6cf749d9ff9f463490248322e5343199bc267, it was introduced in version v5.2 by commit 9aebfd4a2200ab8075e44379c758bccefdc589bb. For more details please see the references link. | null | 2022-04-25T05:06:55.430818Z | 2022-04-24T22:08:22.686320Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9aebfd4a2200ab8075e44379c758bccefdc589bb'} |
Linux | GSD-2021-1001875 | powerpc/idle: Don't corrupt back chain when going idle | powerpc/idle: Don't corrupt back chain when going idle
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit 65ede7bd97138435c07de602efc8812c586a1d38, it was introduced in version v5.14.15 by commit 6d077c37c4643394b1bae9682da48164fc147ea8. For more details please see the references link. | null | 2021-10-28T13:53:26.716587Z | 2021-10-28T13:53:26.716587Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6d077c37c4643394b1bae9682da48164fc147ea8'} |
Linux | GSD-2021-1000767 | netfilter: nft_ct: skip expectations for confirmed conntrack | netfilter: nft_ct: skip expectations for confirmed conntrack
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.43 by commit 5f3429c05e4028a0e241afdad856dd15dec2ffb9, it was introduced in version v5.3 by commit 857b46027d6f91150797295752581b7155b9d0e1. For more details please see the references link. | null | 2021-12-19T22:34:45.324754Z | 2021-06-25T00:04:19.137136Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/857b46027d6f91150797295752581b7155b9d0e1'} |
Linux | GSD-2021-1000337 | f2fs: fix panic during f2fs_resize_fs() | f2fs: fix panic during f2fs_resize_fs()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.38 by commit 1c20a4896409f5ca1c770e1880c33d0a28a8b10f, it was introduced in version v5.8 by commit b4b10061ef98c583bcf82a4200703fbaa98c18dc. For more details please see the references link. | null | 2021-12-19T23:20:48.766649Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b4b10061ef98c583bcf82a4200703fbaa98c18dc'} |
Linux | GSD-2022-1000948 | iio: adc: men_z188_adc: Fix a resource leak in an error handling path | iio: adc: men_z188_adc: Fix a resource leak in an error handling path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.304 by commit 0f88722313645a903f4d420ba61ddc690ec2481d, it was introduced in version v3.15 by commit 74aeac4da66fbfa246edbfc849002eac9b5af9ca. For more details please see the references link. | null | 2022-03-18T03:07:22.658532Z | 2022-03-18T00:35:35.946885Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/74aeac4da66fbfa246edbfc849002eac9b5af9ca'} |
Linux | GSD-2022-1000698 | net: dsa: microchip: fix bridging with more than two member ports | net: dsa: microchip: fix bridging with more than two member ports
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.13 by commit 91e2709a2b61843f3d6827460a54e02a499d23e4, it was introduced in version v5.16 by commit b3612ccdf2841c64ae7a8dd9e780c91240093fe6. For more details please see the references link. | null | 2022-03-18T02:59:48.107449Z | 2022-03-18T00:10:26.474316Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b3612ccdf2841c64ae7a8dd9e780c91240093fe6'} |
Linux | GSD-2022-1000362 | scsi: target: iscsi: Make sure the np under each tpg is unique | scsi: target: iscsi: Make sure the np under each tpg is unique
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.101 by commit 7dbda616fc64298cedfb5b6cd52049f8038234fb. For more details please see the references link. | null | 2022-03-07T01:39:21.131701Z | 2022-02-27T02:56:35.469409Z | null | null | null | null | null |
Linux | GSD-2022-1000732 | iio: adc: men_z188_adc: Fix a resource leak in an error handling path | iio: adc: men_z188_adc: Fix a resource leak in an error handling path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.12 by commit d6ed5426a7fad36cf928c244483ba24e72359638, it was introduced in version v3.15 by commit 74aeac4da66fbfa246edbfc849002eac9b5af9ca. For more details please see the references link. | null | 2022-03-18T03:02:05.578112Z | 2022-03-18T00:13:19.583812Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/74aeac4da66fbfa246edbfc849002eac9b5af9ca'} |
Linux | GSD-2022-1001820 | kernel/resource: fix kfree() of bootmem memory again | kernel/resource: fix kfree() of bootmem memory again
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit a9e88c2618d228d7a4e7e515cf30dc0d0d813f27, it was introduced in version v3.10 by commit ebff7d8f270d045338d9f4796014f4db429a17f9. For more details please see the references link. | null | 2022-04-25T08:04:04.414137Z | 2022-04-24T21:45:01.545808Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ebff7d8f270d045338d9f4796014f4db429a17f9'} |
Linux | GSD-2021-1002023 | isofs: Fix out of bound access for corrupted isofs image | isofs: Fix out of bound access for corrupted isofs image
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.159 by commit 6e80e9314f8bb52d9eabe1907698718ff01120f5. For more details please see the references link. | null | 2021-12-20T00:27:35.636588Z | 2021-11-14T15:16:21.274983Z | null | null | null | null | null |
Linux | GSD-2022-1001089 | coredump: Use the vma snapshot in fill_files_note | coredump: Use the vma snapshot in fill_files_note
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 5c6baf808f409b69ad0799a551a704177b5a7ec1, it was introduced in version v5.10 by commit a07279c9a8cd7dbd321640ff7210591599ee00a4. For more details please see the references link. | null | 2022-04-25T06:33:02.386891Z | 2022-04-24T20:44:22.145507Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a07279c9a8cd7dbd321640ff7210591599ee00a4'} |
Linux | GSD-2022-1001573 | video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() | video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit d396c651e2b508b6179bb678cc029f3becbf5170, it was introduced in version v3.2 by commit 3c8a63e22a0802fd56380f6ab305b419f18eb6f5. For more details please see the references link. | null | 2022-04-25T05:11:55.829356Z | 2022-04-24T21:25:12.983867Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c8a63e22a0802fd56380f6ab305b419f18eb6f5'} |
Linux | GSD-2021-1002473 | ice: fix vsi->txq_map sizing | ice: fix vsi->txq_map sizing
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.83 by commit 1eb5395add786613c7c5579d3947aa0b8f0ec241, it was introduced in version v5.5 by commit efc2214b6047b6f5b4ca53151eba62521b9452d6. For more details please see the references link. | null | 2021-12-20T01:31:09.086426Z | 2021-12-19T19:38:49.843766Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/efc2214b6047b6f5b4ca53151eba62521b9452d6'} |
Linux | GSD-2022-1001123 | scsi: qla2xxx: Fix scheduling while atomic | scsi: qla2xxx: Fix scheduling while atomic
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 78612f2fe8e26637476d756a44f0f05cca0d97de. For more details please see the references link. | null | 2022-04-25T05:56:53.123851Z | 2022-04-24T20:47:30.750258Z | null | null | null | null | null |
Linux | GSD-2021-1002189 | net/tls: Fix flipped sign in tls_err_abort() calls | net/tls: Fix flipped sign in tls_err_abort() calls
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit da353fac65fede6b8b4cfe207f0d9408e3121105, it was introduced in version v4.17 by commit c46234ebb4d1eee5e09819f49169e51cfc6eb909. For more details please see the references link. | null | 2021-12-20T01:22:26.204398Z | 2021-11-14T15:23:57.691221Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c46234ebb4d1eee5e09819f49169e51cfc6eb909'} |
Linux | GSD-2022-1001436 | wireguard: socket: ignore v6 endpoints when ipv6 is disabled | wireguard: socket: ignore v6 endpoints when ipv6 is disabled
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit efde4c0cf7fdbaa27c11740b0ced2e84f73779d8, it was introduced in version v5.6 by commit e7096c131e5161fa3b8e52a650d7719d2857adfd. For more details please see the references link. | null | 2022-04-25T04:24:54.415059Z | 2022-04-24T21:12:59.380645Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e7096c131e5161fa3b8e52a650d7719d2857adfd'} |
Linux | GSD-2021-1002166 | ice: Avoid crash from unnecessary IDA free | ice: Avoid crash from unnecessary IDA free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 73e30a62b19b9fbb4e6a3465c59da186630d5f2e, it was introduced in version v5.14 by commit d25a0fc41c1f927bb914e72a03c1898052557406. For more details please see the references link. | null | 2021-12-20T01:24:45.940995Z | 2021-11-14T15:22:54.058427Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d25a0fc41c1f927bb914e72a03c1898052557406'} |
Linux | GSD-2022-1001066 | scsi: mpi3mr: Fix memory leaks | scsi: mpi3mr: Fix memory leaks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 71c7ac65a084ae7d387c3c1d02d59edfdecb009f. For more details please see the references link. | null | 2022-04-25T04:13:21.211104Z | 2022-04-24T20:43:14.090322Z | null | null | null | null | null |
Linux | GSD-2021-1002536 | ice: fix vsi->txq_map sizing | ice: fix vsi->txq_map sizing
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.6 by commit 992ba40a67638dfe2772b84dfc8168dc328d5c4c, it was introduced in version v5.5 by commit efc2214b6047b6f5b4ca53151eba62521b9452d6. For more details please see the references link. | null | 2021-12-19T21:45:13.443695Z | 2021-12-19T19:41:41.627427Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/efc2214b6047b6f5b4ca53151eba62521b9452d6'} |
Linux | GSD-2022-1000227 | spi: uniphier: fix reference count leak in uniphier_spi_probe() | spi: uniphier: fix reference count leak in uniphier_spi_probe()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.99 by commit e895e067d73e154b1ebc84a124e00831e311d9b0, it was introduced in version v5.6 by commit 28d1dddc59f6b7fc085093e7c1e978b33f0caf4c. For more details please see the references link. | null | 2022-02-19T12:54:07.091958Z | 2022-02-18T21:57:49.640744Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/28d1dddc59f6b7fc085093e7c1e978b33f0caf4c'} |
Linux | GSD-2021-1000858 | ftrace: Do not blindly read the ip address in ftrace_bug() | ftrace: Do not blindly read the ip address in ftrace_bug()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.237 by commit acf671ba79c1feccc3ec7cfdcffead4efcec49e7, it was introduced in version v2.6.28 by commit 05736a427f7e16be948ccbf39782bd3a6ae16b14. For more details please see the references link. | null | 2021-12-20T01:28:53.438650Z | 2021-06-30T00:01:54.249692Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/05736a427f7e16be948ccbf39782bd3a6ae16b14'} |
Linux | GSD-2022-1000677 | ASoC: codecs: wcd938x: fix incorrect used of portid | ASoC: codecs: wcd938x: fix incorrect used of portid
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.8 by commit 9167f2712dc8c24964840a4d1e2ebf130e846b95, it was introduced in version v5.14 by commit e8ba1e05bdc016700c85fad559a812c2e795442f. For more details please see the references link. | null | 2022-03-07T01:47:47.391669Z | 2022-02-27T03:39:52.927071Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e8ba1e05bdc016700c85fad559a812c2e795442f'} |
Linux | GSD-2022-1001965 | mm/sparsemem: fix 'mem_section' will never be NULL gcc 12 warning | mm/sparsemem: fix 'mem_section' will never be NULL gcc 12 warning
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit 5c672073bcca537a0880257f31c6d942388df046, it was introduced in version v2.6.14 by commit 3e347261a80b57df792ab9464b5f0ed59add53a8. For more details please see the references link. | null | 2022-04-25T04:52:59.260123Z | 2022-04-24T21:59:10.628027Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3e347261a80b57df792ab9464b5f0ed59add53a8'} |
Linux | GSD-2021-1001434 | media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() | media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.277 by commit c6ddeb63dd543b5474b0217c4e47538b7ffd7686, it was introduced in version v2.6.34 by commit dae52d009fc950b5c209260d50fcc000f5becd3c. For more details please see the references link. | null | 2021-12-19T23:23:28.044118Z | 2021-08-03T02:39:49.083122Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/dae52d009fc950b5c209260d50fcc000f5becd3c'} |
Linux | GSD-2022-1000159 | yam: fix a memory leak in yam_siocdevprivate() | yam: fix a memory leak in yam_siocdevprivate()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.176 by commit 7afc09c8915b0735203ebcb8d766d7db37b794c0, it was introduced in version v4.19 by commit 0781168e23a2fc8dceb989f11fc5b39b3ccacc35. For more details please see the references link. | null | 2022-02-20T06:32:06.916771Z | 2022-02-18T21:48:35.386085Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0781168e23a2fc8dceb989f11fc5b39b3ccacc35'} |
Linux | GSD-2022-1002164 | cifs: potential buffer overflow in handling symlinks | cifs: potential buffer overflow in handling symlinks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.190 by commit 22d658c6c5affed10c8907e67160cef0b6c92186, it was introduced in version v2.6.37 by commit c69c1b6eaea1b3e1eecf7ad2fba0208ac4a11131. For more details please see the references link. | null | 2022-04-25T04:29:30.297173Z | 2022-04-24T22:17:28.201657Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c69c1b6eaea1b3e1eecf7ad2fba0208ac4a11131'} |
Linux | GSD-2021-1001064 | mptcp: fix soft lookup in subflow_error_report() | mptcp: fix soft lookup in subflow_error_report()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit 27ef25c72373222aaa5fe7b5cd890ae9cfb89a8d, it was introduced in version v5.12 by commit 15cc10453398c22f78f6c2b897119ecce5e5dd89. For more details please see the references link. | null | 2021-12-20T00:30:24.560938Z | 2021-06-30T00:37:12.847703Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/15cc10453398c22f78f6c2b897119ecce5e5dd89'} |
Linux | GSD-2022-1000509 | SUNRPC: lock against ->sock changing during sysfs read | SUNRPC: lock against ->sock changing during sysfs read
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 9482ab4540f5bcc869b44c067ae99b5fca16bd07, it was introduced in version v5.16 by commit 17f09d3f619a7ad2d2b021b4e5246f08225b1b0f. For more details please see the references link. | null | 2022-03-07T01:43:19.868837Z | 2022-02-27T03:16:43.691076Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/17f09d3f619a7ad2d2b021b4e5246f08225b1b0f'} |
Linux | GSD-2021-1002218 | NFC: reorder the logic in nfc_{un,}register_device | NFC: reorder the logic in nfc_{un,}register_device
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.293 by commit 5ef16d2d172ee56714cff37cd005b98aba08ef5a, it was introduced in version v3.10 by commit be055b2f89b5842f41363b5655a33dffb51a8294. For more details please see the references link. | null | 2021-12-19T22:04:54.814518Z | 2021-11-29T02:33:55.586584Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/be055b2f89b5842f41363b5655a33dffb51a8294'} |
Linux | GSD-2021-1000225 | net: Only allow init netns to set default tcp cong to a restricted algo | net: Only allow init netns to set default tcp cong to a restricted algo
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit e7d7bedd507bb732e600403b7a96f9fe48d0ca31, it was introduced in version v4.15 by commit 6670e152447732ba90626f36dfc015a13fbf150e. For more details please see the references link. | null | 2021-12-20T00:12:44.775950Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6670e152447732ba90626f36dfc015a13fbf150e'} |
Linux | GSD-2022-1001748 | nbd: fix possible overflow on 'first_minor' in nbd_dev_add() | nbd: fix possible overflow on 'first_minor' in nbd_dev_add()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 5142720dbe51befeb25f204f912ef1ad93fba343, it was introduced in version v4.11 by commit b0d9111a2d53785847763c64c40af2d4c4c5a8b7. For more details please see the references link. | null | 2022-04-25T03:37:49.629544Z | 2022-04-24T21:39:13.547470Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b0d9111a2d53785847763c64c40af2d4c4c5a8b7'} |
Linux | GSD-2021-1001967 | scsi: core: Put LLD module refcnt after SCSI device is released | scsi: core: Put LLD module refcnt after SCSI device is released
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.255 by commit 61a0faa89f21861d1f8d059123b5c285a5d9ffee. For more details please see the references link. | null | 2021-12-19T23:18:28.855662Z | 2021-11-14T15:13:47.843553Z | null | null | null | null | null |
Linux | GSD-2021-1002648 | audit: improve robustness of the audit queue handling | audit: improve robustness of the audit queue handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.222 by commit 8389f50ceb854cb437fefb9330d5024ed3c7c1f5, it was introduced in version v4.11 by commit 5b52330bbfe63b3305765354d6046c9f7f89c011. For more details please see the references link. | null | 2022-01-11T05:53:25.764179Z | 2021-12-27T05:32:45.558824Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5b52330bbfe63b3305765354d6046c9f7f89c011'} |
Linux | GSD-2021-1000675 | drm/meson: fix shutdown crash when component not probed | drm/meson: fix shutdown crash when component not probed
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.235 by commit b4298d33c1fcce511ffe84d8d3de07e220300f9b, it was introduced in version v4.14.226 by commit 8a5160cc8488776ddc48ea045860dab015f47390. For more details please see the references link. | null | 2021-12-19T22:59:06.685515Z | 2021-06-04T19:59:48.406323Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8a5160cc8488776ddc48ea045860dab015f47390'} |
Linux | GSD-2022-1001318 | cifs: fix handlecache and multiuser | cifs: fix handlecache and multiuser
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit e71f6a3a1d5c826a30384fec587ca7503ef6bde5. For more details please see the references link. | null | 2022-04-25T04:31:11.839697Z | 2022-04-24T21:04:11.116212Z | null | null | null | null | null |
Linux | GSD-2021-1001988 | regmap: Fix possible double-free in regcache_rbtree_exit() | regmap: Fix possible double-free in regcache_rbtree_exit()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.215 by commit 3dae1a4eced3ee733d7222e69b8a55caf2d61091, it was introduced in version v3.12 by commit 3f4ff561bc88b074d5e868dde4012d89cbb06c87. For more details please see the references link. | null | 2021-12-19T23:12:45.120256Z | 2021-11-14T15:14:46.882784Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f4ff561bc88b074d5e868dde4012d89cbb06c87'} |
Linux | GSD-2021-1000360 | mt76: mt7915: fix tx skb dma unmap | mt76: mt7915: fix tx skb dma unmap
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 4e7914ce23306b28d377ec395e00e5fde0e6f96e, it was introduced in version v5.10 by commit 27d5c528a7ca08dcd44877fdd9fc08b76630bf77. For more details please see the references link. | null | 2021-12-20T00:47:47.093765Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/27d5c528a7ca08dcd44877fdd9fc08b76630bf77'} |
Linux | GSD-2021-1001822 | can: peak_pci: peak_pci_remove(): fix UAF | can: peak_pci: peak_pci_remove(): fix UAF
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.156 by commit 1248582e47a9f7ce0ecd156c39fc61f8b6aa3699, it was introduced in version v3.4 by commit e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd. For more details please see the references link. | null | 2021-12-20T00:42:20.559583Z | 2021-10-28T13:50:42.771730Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd'} |
Linux | GSD-2021-1000730 | net: caif: fix memory leak in cfusbl_device_notify | net: caif: fix memory leak in cfusbl_device_notify
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.236 by commit e8b37f5009ea7095529790f022859711e6939c76, it was introduced in version v3.3 by commit 7ad65bf68d705b445ef10b77ab50dab22be185ee. For more details please see the references link. | null | 2021-12-20T01:35:30.225962Z | 2021-06-24T23:59:43.848399Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ad65bf68d705b445ef10b77ab50dab22be185ee'} |
Linux | GSD-2022-1002021 | ax25: fix UAF bug in ax25_send_control() | ax25: fix UAF bug in ax25_send_control()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.112 by commit a4942c6fea879972a7fee50f7e92e2e10f3fc23e, it was introduced in version v5.10.112 by commit b20a5ab0f5fb175750c6bafd4cf12daccf00c738. For more details please see the references link. | null | 2022-04-24T22:03:27.260292Z | 2022-04-24T22:03:27.260292Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b20a5ab0f5fb175750c6bafd4cf12daccf00c738'} |
Linux | GSD-2021-1001571 | xen/balloon: use a kernel thread instead a workqueue | xen/balloon: use a kernel thread instead a workqueue
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.209 by commit 6bba79c6a073741b672b0bf86a1f03c0fe47f973. For more details please see the references link. | null | 2021-12-19T23:50:28.438277Z | 2021-10-19T16:24:18.470904Z | null | null | null | null | null |
Linux | GSD-2022-1002471 | drbd: Fix five use after free bugs in get_initial_state | drbd: Fix five use after free bugs in get_initial_state
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit 0489700bfeb1e53eb2039c2291c67e71b0b40103, it was introduced in version v4.5 by commit a29728463b254ce81ecefdf20c1a02e01d9361da. For more details please see the references link. | null | 2022-04-25T05:45:14.824422Z | 2022-04-24T22:51:58.065514Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a29728463b254ce81ecefdf20c1a02e01d9361da'} |
Linux | GSD-2021-1001121 | i2c: robotfuzz-osif: fix control-request directions | i2c: robotfuzz-osif: fix control-request directions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.129 by commit d77c9c8537dbc874c8d02b12e7bc5e2a0dcfc04f, it was introduced in version v3.14 by commit 83e53a8f120f2f273cf0ad717f5372ab79ac24fe. For more details please see the references link. | null | 2021-12-20T01:34:42.881358Z | 2021-07-08T01:57:43.626906Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/83e53a8f120f2f273cf0ad717f5372ab79ac24fe'} |
Linux | GSD-2022-1001174 | NFS: remove unneeded check in decode_devicenotify_args() | NFS: remove unneeded check in decode_devicenotify_args()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit dafe0551e2c5c7e8ee4d3a06bdb599bc2aff2087, it was introduced in version v4.0 by commit a4f743a6bb201662962fa888e3f978583d61691e. For more details please see the references link. | null | 2022-04-25T04:30:55.106399Z | 2022-04-24T20:50:38.436631Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a4f743a6bb201662962fa888e3f978583d61691e'} |
Linux | GSD-2021-1000419 | net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send | net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.119 by commit 55fcdd1258faaecca74b91b88cc0921f9edd775d, it was introduced in version v4.9 by commit b9b17debc69d27cd55e21ee51a5ba7fc50a426cf. For more details please see the references link. | null | 2021-12-20T01:30:32.261076Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b9b17debc69d27cd55e21ee51a5ba7fc50a426cf'} |
Linux | GSD-2021-1002424 | can: pch_can: pch_can_rx_normal: fix use after free | can: pch_can: pch_can_rx_normal: fix use after free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.221 by commit 3e193ef4e0a3f5bf92ede83ef214cb09d01b00aa, it was introduced in version v2.6.37 by commit b21d18b51b31a24d17f883b678432fbdee3d5675. For more details please see the references link. | null | 2021-12-20T01:06:10.816667Z | 2021-12-19T19:36:44.557339Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b21d18b51b31a24d17f883b678432fbdee3d5675'} |
Linux | GSD-2022-1001524 | RDMA/irdma: Prevent some integer underflows | RDMA/irdma: Prevent some integer underflows
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit f21056f15bbeacab7b4b87af232f5599d1f2bff1, it was introduced in version v5.14 by commit 3f49d684256963d3f27dfb9d9ff228e2255be78d. For more details please see the references link. | null | 2022-04-25T03:11:19.725779Z | 2022-04-24T21:19:58.249031Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f49d684256963d3f27dfb9d9ff228e2255be78d'} |
Linux | GSD-2021-1000049 | net: hso: fix NULL-deref on disconnect regression | net: hso: fix NULL-deref on disconnect regression
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.189 by commit 5c17cfe155d21954b4c7e2a78fa771cebcd86725, it was introduced in version v4.19.187 by commit 92028d7a31e55d53e41cff679156b9432cffcb36. For more details please see the references link. | null | 2021-12-19T23:04:44.847705Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/92028d7a31e55d53e41cff679156b9432cffcb36'} |
Linux | GSD-2021-1002074 | comedi: dt9812: fix DMA buffers on stack | comedi: dt9812: fix DMA buffers on stack
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.79 by commit 786f5b03450454557ff858a8bead5d7c0cbf78d6, it was introduced in version v2.6.29 by commit 63274cd7d38a3322d90b66a5bc976de1fb899051. For more details please see the references link. | null | 2021-12-20T01:01:47.041628Z | 2021-11-14T15:18:41.327557Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63274cd7d38a3322d90b66a5bc976de1fb899051'} |
Linux | GSD-2022-1000765 | mptcp: Correctly set DATA_FIN timeout when number of retransmits is large | mptcp: Correctly set DATA_FIN timeout when number of retransmits is large
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.27 by commit 0c3f34beb459753f9f80d0cc14c1b50ab615c631, it was introduced in version v5.13 by commit 6477dd39e62c3a67cfa368ddc127410b4ae424c6. For more details please see the references link. | null | 2022-03-18T03:44:33.342367Z | 2022-03-18T00:16:09.672528Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6477dd39e62c3a67cfa368ddc127410b4ae424c6'} |
Linux | GSD-2022-1001877 | ASoC: codecs: wc938x: fix accessing array out of bounds for enum type | ASoC: codecs: wc938x: fix accessing array out of bounds for enum type
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit adafea71b49ec4dbc44e0b84ec6eb602004a7a08, it was introduced in version v5.14 by commit e8ba1e05bdc016700c85fad559a812c2e795442f. For more details please see the references link. | null | 2022-04-25T05:57:31.434849Z | 2022-04-24T21:51:06.245468Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e8ba1e05bdc016700c85fad559a812c2e795442f'} |
Linux | GSD-2021-1001208 | f2fs: fix to avoid racing on fsync_entry_slab by multi filesystem instances | f2fs: fix to avoid racing on fsync_entry_slab by multi filesystem instances
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.3 by commit e472b276a0d2180808009be38105e12754432e2a. For more details please see the references link. | null | 2021-12-20T00:12:00.784552Z | 2021-08-03T01:37:33.123701Z | null | null | null | null | null |
Linux | GSD-2022-1002308 | drbd: Fix five use after free bugs in get_initial_state | drbd: Fix five use after free bugs in get_initial_state
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 188fe6b26765edbad4055611c0f788b6870f4024, it was introduced in version v4.5 by commit a29728463b254ce81ecefdf20c1a02e01d9361da. For more details please see the references link. | null | 2022-04-25T04:16:19.144370Z | 2022-04-24T22:32:59.716038Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a29728463b254ce81ecefdf20c1a02e01d9361da'} |
Linux | GSD-2022-1000335 | scsi: myrs: Fix crash in error case | scsi: myrs: Fix crash in error case
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.180 by commit 5c5ceea00c8c9df150708e66cb9f2891192c1162. For more details please see the references link. | null | 2022-03-07T01:56:06.586581Z | 2022-02-27T02:52:48.280245Z | null | null | null | null | null |
Linux | GSD-2021-1001658 | hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field | hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.71 by commit 1499bb2c3a87a2efea0065adab2bd66badee61c3. For more details please see the references link. | null | 2021-12-19T23:54:02.548807Z | 2021-10-19T16:30:23.836680Z | null | null | null | null | null |
Linux | GSD-2022-1000620 | rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev | rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.5 by commit d6cdc6ae542845d4d0ac8b6d99362bde7042a3c7, it was introduced in version v4.11 by commit c0cdc19f84a4712cf74888f83af286e3c2e14efd. For more details please see the references link. | null | 2022-03-07T01:44:08.571176Z | 2022-02-27T03:32:09.244911Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c0cdc19f84a4712cf74888f83af286e3c2e14efd'} |
Linux | GSD-2022-1001932 | firmware: sysfb: fix platform-device leak in error path | firmware: sysfb: fix platform-device leak in error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit b3e38f939ab4d0d86f56bff3362c3f88c4b2ad32, it was introduced in version v5.15.17 by commit 71db96193317626954073c24344d5cf4759e0af3. For more details please see the references link. | null | 2022-04-25T06:44:31.495290Z | 2022-04-24T21:56:00.495761Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/71db96193317626954073c24344d5cf4759e0af3'} |
Linux | GSD-2021-1002832 | ipmi: fix initialization when workqueue allocation fails | ipmi: fix initialization when workqueue allocation fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.12 by commit 5aae769a0ef7ec3ad0e9b3e3297a2e4fc69cde95, it was introduced in version v5.15.7 by commit c4618188b15af986c4f43bb63271edc7d07f73aa. For more details please see the references link. | null | 2022-01-11T05:47:34.500945Z | 2021-12-30T02:45:28.482369Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c4618188b15af986c4f43bb63271edc7d07f73aa'} |
Linux | GSD-2022-1001898 | drm/i915/gem: add missing boundary check in vm_access | drm/i915/gem: add missing boundary check in vm_access
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 312d3d4f49e12f97260bcf972c848c3562126a18, it was introduced in version v5.8 by commit 9f909e215fea0652023b9ed09d3d7bfe10386423. For more details please see the references link. | null | 2022-04-25T04:43:51.878539Z | 2022-04-24T21:53:11.021955Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9f909e215fea0652023b9ed09d3d7bfe10386423'} |
Linux | GSD-2022-1000270 | net: ipa: prevent concurrent replenish | net: ipa: prevent concurrent replenish
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.20 by commit dffeeca9268b221063c7a5a75719299b324c1acf, it was introduced in version v5.7 by commit 84f9bd12d46dbe8ac7d4b650a8fbb4c49657a38b. For more details please see the references link. | null | 2022-02-19T10:24:06.310835Z | 2022-02-18T22:04:29.274020Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/84f9bd12d46dbe8ac7d4b650a8fbb4c49657a38b'} |
Linux | GSD-2021-1002561 | net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() | net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.7 by commit c5ef33c1489b2cd74368057fa00b5d2183bb5853, it was introduced in version v3.9 by commit 7f9664525f9cb507de9198a395a111371413f230. For more details please see the references link. | null | 2021-12-19T23:06:03.793697Z | 2021-12-19T19:42:43.473382Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7f9664525f9cb507de9198a395a111371413f230'} |
Linux | GSD-2022-1001031 | x86: Annotate call_on_stack() | x86: Annotate call_on_stack()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 9b78f03e429076e97615fbdb886f06ddd7ab6e50. For more details please see the references link. | null | 2022-04-25T03:13:57.940141Z | 2022-04-24T20:41:20.712966Z | null | null | null | null | null |
Linux | GSD-2021-1002131 | riscv, bpf: Fix potential NULL dereference | riscv, bpf: Fix potential NULL dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.16 by commit e1b80a5ebe5431caeb20f88c32d4a024777a2d41, it was introduced in version v5.7 by commit ca6cb5447ceca6a87d6b62c9e5d41042c34f7ffa. For more details please see the references link. | null | 2021-12-19T23:16:57.227280Z | 2021-11-14T15:21:19.812889Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca6cb5447ceca6a87d6b62c9e5d41042c34f7ffa'} |
Linux | GSD-2022-1001461 | media: atomisp: fix dummy_ptr check to avoid duplicate active_bo | media: atomisp: fix dummy_ptr check to avoid duplicate active_bo
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit edaa87390aab4d9452730540243c2f0ef06d5fc9. For more details please see the references link. | null | 2022-04-25T06:07:11.177676Z | 2022-04-24T21:14:57.990674Z | null | null | null | null | null |
Linux | GSD-2022-1001416 | usb: cdnsp: fix cdnsp_decode_trb function to properly handle ret value | usb: cdnsp: fix cdnsp_decode_trb function to properly handle ret value
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 6cb0c612a438494bf8f7da4e9fb52a71471cf001. For more details please see the references link. | null | 2022-04-25T04:12:13.863747Z | 2022-04-24T21:11:15.258703Z | null | null | null | null | null |
Linux | GSD-2021-1000481 | net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send | net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.269 by commit c7f75d11fe72913d2619f97b2334b083cd7bb955, it was introduced in version v4.9 by commit b9b17debc69d27cd55e21ee51a5ba7fc50a426cf. For more details please see the references link. | null | 2021-12-19T22:10:02.998773Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b9b17debc69d27cd55e21ee51a5ba7fc50a426cf'} |
Linux | GSD-2021-1002146 | media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt() | media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.17 by commit 02a476ca886dc8155025fe99cbbad4121d029fa7. For more details please see the references link. | null | 2021-12-20T03:09:32.167022Z | 2021-11-14T15:21:56.280494Z | null | null | null | null | null |
Linux | GSD-2022-1001046 | netlabel: fix out-of-bounds memory accesses | netlabel: fix out-of-bounds memory accesses
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.0 by commit 5578de4834fe0f2a34fedc7374be691443396d1f, it was introduced in version v2.6.19 by commit 446fda4f26822b2d42ab3396aafcedf38a9ff2b6. For more details please see the references link. | null | 2022-04-25T06:15:18.409587Z | 2022-04-24T20:42:16.494184Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/446fda4f26822b2d42ab3396aafcedf38a9ff2b6'} |
Linux | GSD-2021-1002516 | aio: fix use-after-free due to missing POLLFREE handling | aio: fix use-after-free due to missing POLLFREE handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.85 by commit 47ffefd88abfffe8a040bcc1dd0554d4ea6f7689, it was introduced in version v4.18 by commit 2c14fa838cbefc23cf1c73ca167ed85b274b2913. For more details please see the references link. | null | 2021-12-19T22:57:27.365697Z | 2021-12-19T19:40:46.930564Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c14fa838cbefc23cf1c73ca167ed85b274b2913'} |
Linux | GSD-2022-1000207 | net/mlx5e: Fix handling of wrong devices during bond netevent | net/mlx5e: Fix handling of wrong devices during bond netevent
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.97 by commit a01ee1b8165f4161459b5ec4e728bc7130fe8cd4, it was introduced in version v5.8 by commit 7e51891a237f9ea319f53f9beb83afb0077d88e6. For more details please see the references link. | null | 2022-02-20T06:46:18.879894Z | 2022-02-18T21:55:33.875909Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7e51891a237f9ea319f53f9beb83afb0077d88e6'} |
Linux | GSD-2021-1001290 | media: zr364xx: fix memory leak in zr364xx_start_readpipe | media: zr364xx: fix memory leak in zr364xx_start_readpipe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.51 by commit c57bfd8000d7677bf435873b440eec0c47f73a08, it was introduced in version v2.6.32 by commit ccbf035ae5de4c535160fc99f73feb44cc55b534. For more details please see the references link. | null | 2021-12-19T23:28:28.317707Z | 2021-08-03T01:58:15.695638Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ccbf035ae5de4c535160fc99f73feb44cc55b534'} |
Linux | GSD-2021-1002845 | hamradio: defer ax25 kfree after unregister_netdev | hamradio: defer ax25 kfree after unregister_netdev
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.12 by commit cb6c99aedd2c843056a598a8907a6128cb07603b. For more details please see the references link. | null | 2022-01-11T07:35:32.061487Z | 2021-12-30T02:45:59.776539Z | null | null | null | null | null |
Linux | GSD-2021-1000878 | usb: fix various gadgets null ptr deref on 10gbps cabling. | usb: fix various gadgets null ptr deref on 10gbps cabling.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.195 by commit 10770d2ac0094b053c8897d96d7b2737cd72f7c5, it was introduced in version v4.6 by commit eaef50c760576bca70b87fdc26eb87a3660529f8. For more details please see the references link. | null | 2021-12-20T00:31:57.309051Z | 2021-06-30T00:03:10.295228Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/eaef50c760576bca70b87fdc26eb87a3660529f8'} |
Linux | GSD-2022-1000657 | drm/nouveau: fix off by one in BIOS boundary checking | drm/nouveau: fix off by one in BIOS boundary checking
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.8 by commit e7c36fa8a1e63b08312162179c78a0c7795ea369, it was introduced in version v4.8 by commit 4d4e9907ff572bb1d1c0f6913ad6e3d6d4525077. For more details please see the references link. | null | 2022-03-07T01:45:00.133849Z | 2022-02-27T03:36:58.005256Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4d4e9907ff572bb1d1c0f6913ad6e3d6d4525077'} |
Linux | GSD-2022-1001945 | dm integrity: fix memory corruption when tag_size is less than digest size | dm integrity: fix memory corruption when tag_size is less than digest size
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.112 by commit cd02b2687d66f0a8e716384de4b9a0671331f1dc. For more details please see the references link. | null | 2022-04-25T04:35:19.418667Z | 2022-04-24T21:57:00.338539Z | null | null | null | null | null |
Linux | GSD-2022-1002390 | cifs: potential buffer overflow in handling symlinks | cifs: potential buffer overflow in handling symlinks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 1316c28569a80ab3596eeab05bf5e01991e7e739, it was introduced in version v2.6.37 by commit c69c1b6eaea1b3e1eecf7ad2fba0208ac4a11131. For more details please see the references link. | null | 2022-04-25T06:17:36.671547Z | 2022-04-24T22:42:10.647935Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c69c1b6eaea1b3e1eecf7ad2fba0208ac4a11131'} |
Linux | GSD-2022-1000342 | net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup | net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.180 by commit a0fd5492ee769029a636f1fb521716b022b1423d, it was introduced in version v3.9 by commit e2ca90c276e1fc410d7cd3c1a4eee245ec902a20. For more details please see the references link. | null | 2022-03-07T01:39:05.301460Z | 2022-02-27T02:53:36.010162Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e2ca90c276e1fc410d7cd3c1a4eee245ec902a20'} |
Linux | GSD-2022-1000712 | ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min | ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.13 by commit 70712d5afbbea898d5f51fa02e315fe0a4835043, it was introduced in version v5.16.8 by commit bb72d2dda85564c66d909108ea6903937a41679d. For more details please see the references link. | null | 2022-03-18T02:50:13.561600Z | 2022-03-18T00:11:41.718342Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bb72d2dda85564c66d909108ea6903937a41679d'} |
Linux | GSD-2022-1001800 | LSM: general protection fault in legacy_parse_param | LSM: general protection fault in legacy_parse_param
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit f3f93a1aaafc3032e0a9655fb43deccfb3e953a3. For more details please see the references link. | null | 2022-04-25T06:11:56.089750Z | 2022-04-24T21:42:58.719376Z | null | null | null | null | null |
Linux | GSD-2021-1001785 | net: encx24j600: check error in devm_regmap_init_encx24j600 | net: encx24j600: check error in devm_regmap_init_encx24j600
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.288 by commit f043fac1133a6c5ef960a8422c0f6dd711dee462, it was introduced in version v4.4 by commit 04fbfce7a222327b97ca165294ef19f0faa45960. For more details please see the references link. | null | 2021-12-19T23:27:23.489012Z | 2021-10-28T13:48:45.623006Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/04fbfce7a222327b97ca165294ef19f0faa45960'} |
Linux | GSD-2021-1000897 | tracing: Correct the length check which causes memory corruption | tracing: Correct the length check which causes memory corruption
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.126 by commit d63f00ec908b3be635ead5d6029cc94246e1f38d, it was introduced in version v5.4.99 by commit a0997a86f5c0085e183ddee5fb72091d584d3d16. For more details please see the references link. | null | 2021-12-20T00:53:26.130934Z | 2021-06-30T00:05:10.150374Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a0997a86f5c0085e183ddee5fb72091d584d3d16'} |
Linux | GSD-2021-1002003 | can: peak_pci: peak_pci_remove(): fix UAF | can: peak_pci: peak_pci_remove(): fix UAF
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.156 by commit 1248582e47a9f7ce0ecd156c39fc61f8b6aa3699, it was introduced in version v3.4 by commit e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd. For more details please see the references link. | null | 2021-12-20T01:25:27.013952Z | 2021-11-14T15:15:24.496380Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd'} |
Linux | GSD-2022-1001553 | Bluetooth: hci_serdev: call init_rwsem() before p->open() | Bluetooth: hci_serdev: call init_rwsem() before p->open()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 24608d8489cb3622f5ca968fb7996d193e4f9f81, it was introduced in version v4.16 by commit d73e172816652772114827abaa2dbc053eecbbd7. For more details please see the references link. | null | 2022-04-25T05:25:07.992970Z | 2022-04-24T21:23:00.454705Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d73e172816652772114827abaa2dbc053eecbbd7'} |
Linux | GSD-2021-1002453 | can: pch_can: pch_can_rx_normal: fix use after free | can: pch_can: pch_can_rx_normal: fix use after free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.165 by commit abb4eff3dcd2e583060082a18a8dbf31f02689d4, it was introduced in version v2.6.37 by commit b21d18b51b31a24d17f883b678432fbdee3d5675. For more details please see the references link. | null | 2021-12-19T23:38:22.897657Z | 2021-12-19T19:38:02.342463Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b21d18b51b31a24d17f883b678432fbdee3d5675'} |
Linux | GSD-2022-1001103 | ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl | ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 5f9e9c223e48c264241d2f34d0bfc29e5fcb5c1b, it was introduced in version v4.8 by commit 714fb87e8bc05ff78255afc0dca981e8c5242785. For more details please see the references link. | null | 2022-04-25T04:59:20.382915Z | 2022-04-24T20:45:36.432581Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/714fb87e8bc05ff78255afc0dca981e8c5242785'} |
Linux | GSD-2021-1000194 | usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4 | usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.5 by commit 5e9c6f58b01e6fdfbc740390c01f542a35c97e57, it was introduced in version v5.8 by commit 992a60ed0d5e312ce9a485c9e12097ac82ae4b3e. For more details please see the references link. | null | 2021-12-19T22:34:45.526515Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/992a60ed0d5e312ce9a485c9e12097ac82ae4b3e'} |
Linux | GSD-2021-1001156 | igb: Fix use-after-free error during reset | igb: Fix use-after-free error during reset
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.6 by commit 8e24c12f2ff6d32fd9f057382f08e748ec97194c, it was introduced in version v4.12 by commit 7cc6fd4c60f267e17b0baef1580d7a6258c0a6f0. For more details please see the references link. | null | 2021-12-19T23:16:50.536821Z | 2021-08-03T01:31:12.542891Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7cc6fd4c60f267e17b0baef1580d7a6258c0a6f0'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.