ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2022-1002406 | MIPS: fix fortify panic when copying asm exception handlers | MIPS: fix fortify panic when copying asm exception handlers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit e7036df78359213bbf104b342a28ba67aba8c9b8. For more details please see the references link. | null | 2022-04-25T05:16:13.608739Z | 2022-04-24T22:43:56.811171Z | null | null | null | null | null |
Linux | GSD-2022-1000591 | scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe | scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.22 by commit 2f5a1ac68bdf2899ce822ab845081922ea8c588e, it was introduced in version v3.16 by commit d576a5e80cd07ea7049f8fd7b303c14df7b5d7d2. For more details please see the references link. | null | 2022-03-07T01:39:40.094812Z | 2022-02-27T03:28:14.402307Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d576a5e80cd07ea7049f8fd7b303c14df7b5d7d2'} |
Linux | GSD-2021-1001506 | phy: mdio: fix memory leak | phy: mdio: fix memory leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.287 by commit 2250392d930bd0d989f24d355d6355b0150256e7, it was introduced in version v2.6.28 by commit 46abc02175b3c246dd5141d878f565a8725060c9. For more details please see the references link. | null | 2021-12-20T00:47:30.514286Z | 2021-10-19T16:21:19.063426Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/46abc02175b3c246dd5141d878f565a8725060c9'} |
Linux | GSD-2022-1002056 | selinux: allow FIOCLEX and FIONCLEX with policy capability | selinux: allow FIOCLEX and FIONCLEX with policy capability
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 448857f58009fd950f4d732e8f1e4fcf859cb4b1. For more details please see the references link. | null | 2022-04-25T06:01:29.842229Z | 2022-04-24T22:06:11.282115Z | null | null | null | null | null |
Linux | GSD-2021-1001855 | NFC: digital: fix possible memory leak in digital_in_send_sdd_req() | NFC: digital: fix possible memory leak in digital_in_send_sdd_req()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.75 by commit 50cb95487c265187289810addec5093d4fed8329, it was introduced in version v3.13 by commit 2c66daecc4092e6049673c281b2e6f0d5e59a94c. For more details please see the references link. | null | 2021-12-19T23:05:16.740784Z | 2021-10-28T13:52:23.124431Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c66daecc4092e6049673c281b2e6f0d5e59a94c'} |
Linux | GSD-2021-1000747 | ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions | ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.125 by commit 7ba7fa78a92dc410b6f93ed73075ab669c3a0b59, it was introduced in version v5.3 by commit f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74. For more details please see the references link. | null | 2021-12-20T00:29:18.864222Z | 2021-06-25T00:02:09.537385Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74'} |
Linux | GSD-2021-1002280 | NFC: add NCI_UNREG flag to eliminate the race | NFC: add NCI_UNREG flag to eliminate the race
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.82 by commit 34e54703fb0fdbfc0a3cfc065d71e9a8353d3ac9, it was introduced in version v3.2 by commit 6a2968aaf50c7a22fced77a5e24aa636281efca8. For more details please see the references link. | null | 2021-12-19T23:04:27.760078Z | 2021-11-29T02:36:50.322472Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6a2968aaf50c7a22fced77a5e24aa636281efca8'} |
Linux | GSD-2022-1001380 | staging: vchiq_arm: Avoid NULL ptr deref in vchiq_dump_platform_instances | staging: vchiq_arm: Avoid NULL ptr deref in vchiq_dump_platform_instances
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 4627250cabaa80278d3ab01ad107893cea83799f. For more details please see the references link. | null | 2022-04-25T06:34:38.656601Z | 2022-04-24T21:09:18.309860Z | null | null | null | null | null |
Linux | GSD-2021-1000317 | kyber: fix out of bounds access when preempted | kyber: fix out of bounds access when preempted
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.38 by commit 54dbe2d2c1fcabf650c7a8b747601da355cd7f9f, it was introduced in version v4.18 by commit a6088845c2bf754d6cb2572b484180680b037804. For more details please see the references link. | null | 2021-12-19T23:59:20.446900Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a6088845c2bf754d6cb2572b484180680b037804'} |
Linux | GSD-2022-1000968 | spi: cadence-quadspi: fix protocol setup for non-1-1-X operations | spi: cadence-quadspi: fix protocol setup for non-1-1-X operations
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.4 by commit f3d8b6f4bc6160ab279573c4567ef7e9dd513c10. For more details please see the references link. | null | 2022-04-25T04:28:42.425171Z | 2022-04-24T20:35:49.738143Z | null | null | null | null | null |
Linux | GSD-2022-1000987 | SUNRPC: Fix the svc_deferred_event trace class | SUNRPC: Fix the svc_deferred_event trace class
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.4 by commit c2456f470eea3bd06574d988bf6089e7c3f4c5cc, it was introduced in version v4.17 by commit ece200ddd54b9ce840cfee554fb812560c545c7d. For more details please see the references link. | null | 2022-04-25T04:39:02.243419Z | 2022-04-24T20:37:28.373772Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ece200ddd54b9ce840cfee554fb812560c545c7d'} |
Linux | GSD-2022-1001695 | jfs: prevent NULL deref in diFree | jfs: prevent NULL deref in diFree
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit d925b7e78b62805fcc5440d1521181c82b6f03cb. For more details please see the references link. | null | 2022-04-25T04:27:47.358415Z | 2022-04-24T21:35:55.594978Z | null | null | null | null | null |
Linux | GSD-2021-1001910 | dm: fix mempool NULL pointer race when completing IO | dm: fix mempool NULL pointer race when completing IO
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit 6e506f07c5b561d673dd0b0d8f7f420cc48024fb. For more details please see the references link. | null | 2021-12-20T01:19:23.032347Z | 2021-10-28T13:55:17.410430Z | null | null | null | null | null |
Linux | GSD-2021-1000602 | NFS: Fix an Oopsable condition in __nfs_pageio_add_request() | NFS: Fix an Oopsable condition in __nfs_pageio_add_request()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.42 by commit ee21cd3aa8548e0cbc8c67a80b62113aedd2d101, it was introduced in version v4.0 by commit a7d42ddb3099727f58366fa006f850a219cce6c8. For more details please see the references link. | null | 2021-12-19T22:13:51.040858Z | 2021-06-04T19:45:40.437405Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a7d42ddb3099727f58366fa006f850a219cce6c8'} |
Linux | GSD-2021-1002795 | ipmi: ssif: initialize ssif_info->client early | ipmi: ssif: initialize ssif_info->client early
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.169 by commit 8efd6a3391f7b0b19fb0c38e50add06ca30c94af, it was introduced in version v5.4 by commit c4436c9149c5d2bc0c49ab57ec85c75ea1c4d61c. For more details please see the references link. | null | 2022-01-11T05:57:35.961010Z | 2021-12-30T02:43:44.221316Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c4436c9149c5d2bc0c49ab57ec85c75ea1c4d61c'} |
Linux | GSD-2021-1000252 | mt76: mt7615: fix memory leak in mt7615_coredump_work | mt76: mt7615: fix memory leak in mt7615_coredump_work
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 54b989653c5531bc4416ced33f146b9cb633d978, it was introduced in version v5.12 by commit d2bf7959d9c0f631ef860edaf834d55773fdedff. For more details please see the references link. | null | 2021-12-20T01:15:47.144502Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d2bf7959d9c0f631ef860edaf834d55773fdedff'} |
Linux | GSD-2022-1000084 | ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback | ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.300 by commit 45b96488ec4cf10818c2457ada05fa8d660161cc, it was introduced in version v4.9.248 by commit 9f7e83674411bb1475e7ecd67df62c525fd7eec4. For more details please see the references link. | null | 2022-02-19T09:28:03.381003Z | 2022-02-18T21:33:24.567386Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9f7e83674411bb1475e7ecd67df62c525fd7eec4'} |
Linux | GSD-2021-1001013 | wq: handle VM suspension in stall detection | wq: handle VM suspension in stall detection
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.11 by commit 8b30908df8d53db5ccb7f1bcd1c97d3aa75bbd62. For more details please see the references link. | null | 2021-12-20T01:29:00.921650Z | 2021-06-30T00:33:55.367101Z | null | null | null | null | null |
Linux | GSD-2022-1002113 | f2fs: fix compressed file start atomic write may cause data corruption | f2fs: fix compressed file start atomic write may cause data corruption
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit d2c53e77b0431a0954f0655cc517abb6309f6a79, it was introduced in version v5.6 by commit 4c8ff7095bef64fc47e996a938f7d57f9e077da3. For more details please see the references link. | null | 2022-04-25T05:06:12.845471Z | 2022-04-24T22:12:55.117390Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4c8ff7095bef64fc47e996a938f7d57f9e077da3'} |
Linux | GSD-2021-1001443 | memory: fsl_ifc: fix leak of private memory on probe failure | memory: fsl_ifc: fix leak of private memory on probe failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.276 by commit 3b45b8a7d549bd92ec94b5357c2c2c1a7ed107e4, it was introduced in version v3.3 by commit a20cbdeffce247a2b6fb83cd8d22433994068565. For more details please see the references link. | null | 2021-12-20T01:37:58.930887Z | 2021-08-03T02:43:06.728458Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a20cbdeffce247a2b6fb83cd8d22433994068565'} |
Linux | GSD-2022-1000600 | Bluetooth: refactor malicious adv data check | Bluetooth: refactor malicious adv data check
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.5 by commit 5c968affa804ba98c3c603f37ffea6fba618025e. For more details please see the references link. | null | 2022-03-07T02:24:14.168035Z | 2022-02-27T03:29:14.575633Z | null | null | null | null | null |
Linux | GSD-2022-1001912 | mm,hwpoison: unmap poisoned page before invalidation | mm,hwpoison: unmap poisoned page before invalidation
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 7d04d6d5c1143f8812881dc5d2c4300c42f41414, it was introduced in version v5.15.33 by commit 3bae72c2db693ec421647fbf7e7a097842e73276. For more details please see the references link. | null | 2022-04-24T21:54:02.528Z | 2022-04-24T21:54:02.528Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3bae72c2db693ec421647fbf7e7a097842e73276'} |
Linux | GSD-2021-1001697 | iwlwifi: mvm: Fix possible NULL dereference | iwlwifi: mvm: Fix possible NULL dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.12 by commit 432d8185e9ffce97e3866ca71c39b0807a456920, it was introduced in version v5.14 by commit 7b3954a1d69a992a781e71036950f9254f8147f6. For more details please see the references link. | null | 2021-12-20T01:06:44.842186Z | 2021-10-19T16:32:22.313626Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7b3954a1d69a992a781e71036950f9254f8147f6'} |
Linux | GSD-2021-1000985 | net: qrtr: fix OOB Read in qrtr_endpoint_post | net: qrtr: fix OOB Read in qrtr_endpoint_post
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.46 by commit 960b08dd36de1e341e3eb43d1c547513e338f4f8, it was introduced in version v4.15 by commit 194ccc88297ae78d0803adad83c6dcc369787c9e. For more details please see the references link. | null | 2021-12-20T00:37:58.464669Z | 2021-06-30T00:31:26.078961Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/194ccc88297ae78d0803adad83c6dcc369787c9e'} |
Linux | GSD-2021-1002812 | pinctrl: mediatek: fix global-out-of-bounds issue | pinctrl: mediatek: fix global-out-of-bounds issue
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.89 by commit 441d3873664d170982922c5d2fc01fa89d9439ed. For more details please see the references link. | null | 2022-01-11T06:43:54.394129Z | 2021-12-30T02:44:31.382795Z | null | null | null | null | null |
Linux | GSD-2022-1000250 | usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS | usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.19 by commit 27980463256060aaef8db0ddfcf40fd2342b96e8, it was introduced in version v5.13 by commit 90c4d05780d47e14a50e11a7f17373104cd47d25. For more details please see the references link. | null | 2022-02-19T03:08:51.552635Z | 2022-02-18T22:01:18.827387Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/90c4d05780d47e14a50e11a7f17373104cd47d25'} |
Linux | GSD-2021-1002541 | net: stmmac: Disable Tx queues when reconfiguring the interface | net: stmmac: Disable Tx queues when reconfiguring the interface
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.6 by commit a92f0eebb8dc008b9e8c51c6f7b8c93b27a29a43, it was introduced in version v5.13 by commit 5fabb01207a2d3439a6abe1d08640de9c942945f. For more details please see the references link. | null | 2021-12-20T00:55:49.171477Z | 2021-12-19T19:41:54.286413Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5fabb01207a2d3439a6abe1d08640de9c942945f'} |
Linux | GSD-2022-1001011 | qede: confirm skb is allocated before using | qede: confirm skb is allocated before using
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit e1fd0c42acfa22bb34d2ab6a111484f466ab8093, it was introduced in version v4.18 by commit 8a8633978b842c88fbcfe00d4e5dde96048f630e. For more details please see the references link. | null | 2022-04-25T06:07:54.736141Z | 2022-04-24T20:39:29.725393Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8a8633978b842c88fbcfe00d4e5dde96048f630e'} |
Linux | GSD-2021-1000086 | perf/core: Fix unconditional security_locked_down() call | perf/core: Fix unconditional security_locked_down() call
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.2 by commit c7b0208ee370b89d20486fae71cd9abb759819c1, it was introduced in version v5.4 by commit b0c8fdc7fdb77586c3d1937050925b960743306e. For more details please see the references link. | null | 2021-12-20T01:29:30.965085Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b0c8fdc7fdb77586c3d1937050925b960743306e'} |
Linux | GSD-2021-1002111 | mm, slub: fix potential memoryleak in kmem_cache_open() | mm, slub: fix potential memoryleak in kmem_cache_open()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit 42b81946e3ac9ea0372ba16e05160dc11e02694f, it was introduced in version v4.8 by commit 210e7a43fa905bccafa9bb5966fba1d71f33eb8b. For more details please see the references link. | null | 2021-12-20T01:04:30.535743Z | 2021-11-14T15:20:21.446573Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/210e7a43fa905bccafa9bb5966fba1d71f33eb8b'} |
Linux | GSD-2022-1001441 | ubifs: Fix 'ui->dirty' race between do_tmpfile() and writeback work | ubifs: Fix 'ui->dirty' race between do_tmpfile() and writeback work
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit f3bdd3b7415fe4e3337bc34a2842cf1adba5c378, it was introduced in version v4.9 by commit 474b93704f32163af4bfa728fddc570eba357353. For more details please see the references link. | null | 2022-04-25T04:27:51.060218Z | 2022-04-24T21:13:39.792172Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/474b93704f32163af4bfa728fddc570eba357353'} |
Linux | GSD-2022-1001154 | spi: fsi: Implement a timeout for polling status | spi: fsi: Implement a timeout for polling status
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit dac1438f347d3b8cf892105c94e254f29c5764de. For more details please see the references link. | null | 2022-04-25T05:35:17.429113Z | 2022-04-24T20:49:15.094555Z | null | null | null | null | null |
Linux | GSD-2021-1002404 | iio: mma8452: Fix trigger reference couting | iio: mma8452: Fix trigger reference couting
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.258 by commit 794c0898f6bf39a458655d5fb4af70ec43a5cfcb, it was introduced in version v4.2 by commit ae6d9ce05691bf79694074db7c7da980080548af. For more details please see the references link. | null | 2021-12-20T01:24:14.535383Z | 2021-12-19T19:35:49.041130Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ae6d9ce05691bf79694074db7c7da980080548af'} |
Linux | GSD-2021-1000439 | KVM: Stop looking for coalesced MMIO zones if the bus is destroyed | KVM: Stop looking for coalesced MMIO zones if the bus is destroyed
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.119 by commit 7d1bc32d6477ff96a32695ea4be8144e4513ab2d, it was introduced in version v5.4.66 by commit 41b2ea7a6a11e2b1a7f2c29e1675a709a6b2b98d. For more details please see the references link. | null | 2021-12-19T23:28:47.996888Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41b2ea7a6a11e2b1a7f2c29e1675a709a6b2b98d'} |
Linux | GSD-2022-1001504 | drivers: ethernet: cpsw: fix panic when interrupt coaleceing is set via ethtool | drivers: ethernet: cpsw: fix panic when interrupt coaleceing is set via ethtool
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 459080fab12b23c0526026e5cedbf3fabb5457cc, it was introduced in version v5.15 by commit d43c65b05b848e0b2db1a6c78b02c189da3a95b5. For more details please see the references link. | null | 2022-04-25T06:23:10.684037Z | 2022-04-24T21:18:05.865023Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d43c65b05b848e0b2db1a6c78b02c189da3a95b5'} |
Linux | GSD-2021-1000593 | net: dsa: sja1105: add error handling in sja1105_setup() | net: dsa: sja1105: add error handling in sja1105_setup()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.42 by commit dd8609f203448ca6d58ae71461208b3f6b0329b0, it was introduced in version v5.10 by commit 0a7bdbc23d8a1d5e6f6f74abf00ba572f7369dd6. For more details please see the references link. | null | 2021-12-20T01:37:35.020625Z | 2021-06-04T19:43:59.468840Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0a7bdbc23d8a1d5e6f6f74abf00ba572f7369dd6'} |
Linux | GSD-2021-1002054 | s390/pci: fix zpci_zdev_put() on reserve | s390/pci: fix zpci_zdev_put() on reserve
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit 188907c252188ac7a5ec3efcfa31dae1f47b8a20, it was introduced in version v5.10.61 by commit a69326e134d4ffa0d2d77bf1a4a62271c51c3051. For more details please see the references link. | null | 2021-12-20T00:39:33.680739Z | 2021-11-14T15:17:44.659535Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a69326e134d4ffa0d2d77bf1a4a62271c51c3051'} |
Linux | GSD-2021-1000069 | ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure | ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.3 by commit 596e079c362ac17ed02aa1b99fdc444d62072a01, it was introduced in version v4.12 by commit ca9ae5ec4ef0ed13833b03297ab319676965492c. For more details please see the references link. | null | 2021-12-20T00:42:51.475266Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca9ae5ec4ef0ed13833b03297ab319676965492c'} |
Linux | GSD-2022-1000745 | io_uring: add a schedule point in io_add_buffers() | io_uring: add a schedule point in io_add_buffers()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.12 by commit 8f3cc3c5bc43d03b5748ac4fb8d180084952c36a, it was introduced in version v5.7 by commit ddf0322db79c5984dc1a1db890f946dd19b7d6d9. For more details please see the references link. | null | 2022-03-18T02:59:49.243599Z | 2022-03-18T00:14:59.228562Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ddf0322db79c5984dc1a1db890f946dd19b7d6d9'} |
Linux | GSD-2022-1001857 | drm/bridge: anx7625: Fix overflow issue on reading EDID | drm/bridge: anx7625: Fix overflow issue on reading EDID
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 64c06df2428bb7bb3d8cf5691416001af42d94dd, it was introduced in version v5.11 by commit 8bdfc5dae4e3ba4d99dfb430ef43249e5f1b7730. For more details please see the references link. | null | 2022-04-25T04:44:49.377280Z | 2022-04-24T21:48:46.846481Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8bdfc5dae4e3ba4d99dfb430ef43249e5f1b7730'} |
Linux | GSD-2021-1001228 | net: xilinx_emaclite: Do not print real IOMEM pointer | net: xilinx_emaclite: Do not print real IOMEM pointer
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.3 by commit 8722275b41d5127048e1422a8a1b6370b4878533. For more details please see the references link. | null | 2021-12-19T22:15:17.061481Z | 2021-08-03T01:42:19.448480Z | null | null | null | null | null |
Linux | GSD-2022-1002282 | tpm: use try_get_ops() in tpm-space.c | tpm: use try_get_ops() in tpm-space.c
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.188 by commit 5b1d2561a03e534064b51c50c774657833d3d2cf. For more details please see the references link. | null | 2022-04-25T05:39:11.375908Z | 2022-04-24T22:30:01.767936Z | null | null | null | null | null |
Linux | GSD-2022-1000315 | scsi: target: iscsi: Make sure the np under each tpg is unique | scsi: target: iscsi: Make sure the np under each tpg is unique
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.230 by commit ded80123b84253ecc6c6cfd1fbbbd99f51c984ec. For more details please see the references link. | null | 2022-03-07T01:37:41.361590Z | 2022-02-27T02:49:51.378079Z | null | null | null | null | null |
Linux | GSD-2022-1002328 | ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock() | ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 5343575aa11c5d7044107d59d43f84aec01312b0, it was introduced in version v2.6.27 by commit 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d. For more details please see the references link. | null | 2022-04-25T05:19:15.493001Z | 2022-04-24T22:35:01.140186Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d'} |
Linux | GSD-2021-1001382 | nfs: fix acl memory leak of posix_acl_create() | nfs: fix acl memory leak of posix_acl_create()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.198 by commit 0704f617040c397ae73c1f88f3956787ec5d6529, it was introduced in version v3.14 by commit 013cdf1088d7235da9477a2375654921d9b9ba9f. For more details please see the references link. | null | 2021-12-19T22:29:26.648464Z | 2021-08-03T02:25:17.238039Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/013cdf1088d7235da9477a2375654921d9b9ba9f'} |
Linux | GSD-2021-1001678 | binder: make sure fd closes complete | binder: make sure fd closes complete
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.70 by commit d5b0473707fa53b03a5db0256ce62b2874bddbc7, it was introduced in version v5.0 by commit 80cd795630d6526ba729a089a435bf74a57af927. For more details please see the references link. | null | 2021-12-19T22:35:12.216153Z | 2021-10-19T16:31:25.891525Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80cd795630d6526ba729a089a435bf74a57af927'} |
Linux | GSD-2021-1002687 | nfc: fix segfault in nfc_genl_dump_devices_done | nfc: fix segfault in nfc_genl_dump_devices_done
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.87 by commit c602863ad28ec86794cb4ab4edea5324f555f181. For more details please see the references link. | null | 2022-01-11T05:54:59.664361Z | 2021-12-27T05:36:50.701120Z | null | null | null | null | null |
Linux | GSD-2021-1000340 | mm: memcontrol: slab: fix obtain a reference to a freeing memcg | mm: memcontrol: slab: fix obtain a reference to a freeing memcg
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 31df8bc4d3feca9f9c6b2cd06fd64a111ae1a0e6, it was introduced in version v5.10.11 by commit 26f54dac15640c65ec69867e182de7be708ea389. For more details please see the references link. | null | 2021-12-19T21:47:36.998491Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/26f54dac15640c65ec69867e182de7be708ea389'} |
Linux | GSD-2022-1000895 | xen/gnttab: fix gnttab_end_foreign_access() without page specified | xen/gnttab: fix gnttab_end_foreign_access() without page specified
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.234 by commit 92dc0e4a219602242407dedd987dc9c8263c959b. For more details please see the references link. | null | 2022-03-18T03:00:31.415480Z | 2022-03-18T00:29:07.557224Z | null | null | null | null | null |
Linux | GSD-2022-1001787 | media: staging: media: zoran: move videodev alloc | media: staging: media: zoran: move videodev alloc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit ff3357bffd9fb78f59762d8955afc7382a279079. For more details please see the references link. | null | 2022-04-25T04:19:48.538358Z | 2022-04-24T21:42:20.839657Z | null | null | null | null | null |
Linux | GSD-2021-1001802 | ocfs2: fix data corruption after conversion from inline format | ocfs2: fix data corruption after conversion from inline format
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.214 by commit a3a089c241cd49b33a8cdd7fcb37cc87a086912a, it was introduced in version v4.19.155 by commit 7ce2b16bad2cbfa3fa7bbc42c4448914f639ca47. For more details please see the references link. | null | 2021-12-19T22:11:30.244467Z | 2021-10-28T13:49:41.944791Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ce2b16bad2cbfa3fa7bbc42c4448914f639ca47'} |
Linux | GSD-2021-1000710 | misc/uss720: fix memory leak in uss720_probe | misc/uss720: fix memory leak in uss720_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.271 by commit 5f46b2410db2c8f26b8bb91b40deebf4ec184391, it was introduced in version v2.6.14 by commit 0f36163d3abefbda1b21a330b3fdf3c2dc076d94. For more details please see the references link. | null | 2021-12-20T01:34:07.090135Z | 2021-06-04T20:07:40.580400Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0f36163d3abefbda1b21a330b3fdf3c2dc076d94'} |
Linux | GSD-2022-1002001 | netlabel: fix out-of-bounds memory accesses | netlabel: fix out-of-bounds memory accesses
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.0 by commit 5578de4834fe0f2a34fedc7374be691443396d1f, it was introduced in version v2.6.19 by commit 446fda4f26822b2d42ab3396aafcedf38a9ff2b6. For more details please see the references link. | null | 2022-04-25T05:17:09.055784Z | 2022-04-24T22:02:19.806011Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/446fda4f26822b2d42ab3396aafcedf38a9ff2b6'} |
Linux | GSD-2021-1001551 | net_sched: fix NULL deref in fifo_set_limit() | net_sched: fix NULL deref in fifo_set_limit()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.211 by commit d07098f45be868a9cdce6c616563c36c64dbbd87, it was introduced in version v2.6.27 by commit fb0305ce1b03f6ff17f84f2c63daccecb45f2805. For more details please see the references link. | null | 2021-12-20T00:38:43.482424Z | 2021-10-19T16:23:23.175633Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb0305ce1b03f6ff17f84f2c63daccecb45f2805'} |
Linux | GSD-2022-1002451 | jffs2: fix memory leak in jffs2_scan_medium | jffs2: fix memory leak in jffs2_scan_medium
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit b36bccb04e14cc0c1e2d0e92d477fe220314fad6, it was introduced in version v2.6.15 by commit e631ddba588783edd521c5a89f7b2902772fb691. For more details please see the references link. | null | 2022-04-25T05:27:15.958815Z | 2022-04-24T22:49:23.035395Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e631ddba588783edd521c5a89f7b2902772fb691'} |
Linux | GSD-2022-1000196 | net: fix information leakage in /proc/net/ptype | net: fix information leakage in /proc/net/ptype
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.96 by commit db044d97460ea792110eb8b971e82569ded536c6, it was introduced in version v2.6.26 by commit 2feb27dbe00cbb4f7d31f90acf6bd0d751dd0a50. For more details please see the references link. | null | 2022-02-19T02:54:41.538437Z | 2022-02-18T21:53:31.369149Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2feb27dbe00cbb4f7d31f90acf6bd0d751dd0a50'} |
Linux | GSD-2021-1001101 | net: qed: Fix memcpy() overflow of qed_dcbx_params() | net: qed: Fix memcpy() overflow of qed_dcbx_params()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.274 by commit b84996d966f61bf8c2e99fab43f43f939ff29063. For more details please see the references link. | null | 2021-12-19T23:39:02.235969Z | 2021-07-08T01:56:24.012766Z | null | null | null | null | null |
Linux | GSD-2022-1000483 | audit: don't deref the syscall args when checking the openat2 open_how::flags | audit: don't deref the syscall args when checking the openat2 open_how::flags
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 310c9ddfdf1f8d3c9834f02175eae79c8b254b6c, it was introduced in version v5.16 by commit 1c30e3af8a79260cdba833a719209b01e6b92300. For more details please see the references link. | null | 2022-03-07T01:39:10.068258Z | 2022-02-27T03:13:08.782101Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c30e3af8a79260cdba833a719209b01e6b92300'} |
Linux | GSD-2021-1001414 | watchdog: Fix possible use-after-free by calling del_timer_sync() | watchdog: Fix possible use-after-free by calling del_timer_sync()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.240 by commit 8bec568d7518b1504a602ed5376bb322e4dbb270. For more details please see the references link. | null | 2021-12-19T22:53:29.677574Z | 2021-08-03T02:33:58.153943Z | null | null | null | null | null |
Linux | GSD-2022-1002144 | tpm: use try_get_ops() in tpm-space.c | tpm: use try_get_ops() in tpm-space.c
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.109 by commit 95193d12f10a8a088843b25e0f5fe1d83ec6b079. For more details please see the references link. | null | 2022-04-25T06:34:24.377505Z | 2022-04-24T22:15:51.460989Z | null | null | null | null | null |
Linux | GSD-2022-1000179 | select: Fix indefinitely sleeping task in poll_schedule_timeout() | select: Fix indefinitely sleeping task in poll_schedule_timeout()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.95 by commit 11ba2c6dfb902de05b73000a98534e376173b6ca. For more details please see the references link. | null | 2022-02-19T09:26:23.353855Z | 2022-02-18T21:51:37.133840Z | null | null | null | null | null |
Linux | GSD-2021-1001044 | NFS: Fix use-after-free in nfs4_init_client() | NFS: Fix use-after-free in nfs4_init_client()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.11 by commit 72651c6579a25317a90536181d311c663d0329ab, it was introduced in version v4.13 by commit 8dcbec6d20eb881ba368d0aebc3a8a678aebb1da. For more details please see the references link. | null | 2021-12-19T23:47:05.965498Z | 2021-06-30T00:35:58.999509Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8dcbec6d20eb881ba368d0aebc3a8a678aebb1da'} |
Linux | GSD-2022-1002514 | jffs2: fix use-after-free in jffs2_clear_xattr_subsystem | jffs2: fix use-after-free in jffs2_clear_xattr_subsystem
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit 9150cb625b46f68d524f4cfd491f1aafc23e10a9, it was introduced in version v2.6.18 by commit aa98d7cf59b5b0764d3502662053489585faf2fe. For more details please see the references link. | null | 2022-04-25T04:26:31.875832Z | 2022-04-24T22:57:10.408826Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/aa98d7cf59b5b0764d3502662053489585faf2fe'} |
Linux | GSD-2022-1000529 | perf: Fix list corruption in perf_cgroup_switch() | perf: Fix list corruption in perf_cgroup_switch()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 2142bc1469a316fddd10012d76428f7265258f81, it was introduced in version v4.11 by commit 058fe1c0440e68a1ba3c2270ae43e9f0298b27d8. For more details please see the references link. | null | 2022-03-07T01:34:27.021435Z | 2022-02-27T03:19:49.170372Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/058fe1c0440e68a1ba3c2270ae43e9f0298b27d8'} |
Linux | GSD-2022-1001292 | PM: domains: Fix sleep-in-atomic bug caused by genpd_debug_remove() | PM: domains: Fix sleep-in-atomic bug caused by genpd_debug_remove()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit fee777ea77769cc5392a34805d9d73099a223fae, it was introduced in version v5.11 by commit 718072ceb211833f3c71724f49d733d636067191. For more details please see the references link. | null | 2022-04-25T02:59:46.394345Z | 2022-04-24T21:01:49.352796Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/718072ceb211833f3c71724f49d733d636067191'} |
Linux | GSD-2021-1000205 | powerpc/64s: Fix crashes when toggling entry flush barrier | powerpc/64s: Fix crashes when toggling entry flush barrier
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.5 by commit 5bc00fdda1e934c557351a9c751a205293e68cbf, it was introduced in version v5.10 by commit f79643787e0a0762d2409b7b8334e83f22d85695. For more details please see the references link. | null | 2021-12-19T23:49:52.407762Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f79643787e0a0762d2409b7b8334e83f22d85695'} |
Linux | GSD-2021-1002238 | ALSA: gus: fix null pointer dereference on pointer block | ALSA: gus: fix null pointer dereference on pointer block
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.256 by commit 542fa721594a02d2aee0370a764d306ef48d030c. For more details please see the references link. | null | 2021-12-19T23:23:47.613764Z | 2021-11-29T02:34:44.714411Z | null | null | null | null | null |
Linux | GSD-2022-1001768 | scsi: qla2xxx: Fix scheduling while atomic | scsi: qla2xxx: Fix scheduling while atomic
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 826a9d4a00d1424afa961504aec6298ee92d5053. For more details please see the references link. | null | 2022-04-25T03:34:54.352077Z | 2022-04-24T21:41:12.485284Z | null | null | null | null | null |
Linux | GSD-2021-1001947 | isofs: Fix out of bound access for corrupted isofs image | isofs: Fix out of bound access for corrupted isofs image
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.290 by commit 9ec33a9b8790c212cc926a88c5e2105f97f3f57e. For more details please see the references link. | null | 2021-12-20T00:01:49.453813Z | 2021-11-14T15:12:58.443325Z | null | null | null | null | null |
Linux | GSD-2021-1000655 | net: dsa: mt7530: fix VLAN traffic leaks | net: dsa: mt7530: fix VLAN traffic leaks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.193 by commit ae389812733b1b1e8e07fcc238e41db166b5c78d, it was introduced in version v4.16 by commit 83163f7dca5684816d01c8ccf4857aa74801e7b7. For more details please see the references link. | null | 2021-12-20T01:26:42.362127Z | 2021-06-04T19:55:41.449726Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/83163f7dca5684816d01c8ccf4857aa74801e7b7'} |
Linux | GSD-2021-1002668 | nfc: fix segfault in nfc_genl_dump_devices_done | nfc: fix segfault in nfc_genl_dump_devices_done
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.167 by commit d731ecc6f2eaec68f4ad1542283bbc7d07bd0112. For more details please see the references link. | null | 2022-01-11T05:54:01.036373Z | 2021-12-27T05:35:20.436793Z | null | null | null | null | null |
Linux | GSD-2021-1002392 | net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound | net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.257 by commit d3dedaa5a601107cfedda087209772c76e364d58. For more details please see the references link. | null | 2021-12-20T00:07:06.884550Z | 2021-12-19T19:35:20.519096Z | null | null | null | null | null |
Linux | GSD-2022-1001338 | net/smc: use memcpy instead of snprintf to avoid out of bounds read | net/smc: use memcpy instead of snprintf to avoid out of bounds read
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11 by commit 8a4465368964b4fbaf084760c94c7aabf61059fb, it was introduced in version v5.11 by commit a3db10efcc4cc9c03a6375920179ade75ea2df7a. For more details please see the references link. | null | 2022-04-25T06:49:05.350953Z | 2022-04-24T21:05:40.926184Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a3db10efcc4cc9c03a6375920179ade75ea2df7a'} |
Linux | GSD-2022-1001457 | ARM: mmp: Fix failure to remove sram device | ARM: mmp: Fix failure to remove sram device
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 56f25cad7d3e3a55612d9596551ad436f8647317. For more details please see the references link. | null | 2022-04-25T06:31:24.980471Z | 2022-04-24T21:14:42.736315Z | null | null | null | null | null |
Linux | GSD-2021-1002107 | audit: fix possible null-pointer dereference in audit_filter_rules | audit: fix possible null-pointer dereference in audit_filter_rules
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit 4e9e46a700201b4c85081fd478c99c692a9aaa0d, it was introduced in version v5.3 by commit bf361231c295d92a28ca283ea713f56e93e55796. For more details please see the references link. | null | 2021-12-20T01:31:44.219828Z | 2021-11-14T15:20:11.698420Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf361231c295d92a28ca283ea713f56e93e55796'} |
Linux | GSD-2021-1000090 | net: qrtr: Avoid potential use after free in MHI send | net: qrtr: Avoid potential use after free in MHI send
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.2 by commit 03c649dee8b1eb5600212a249542a70f47a5ab40, it was introduced in version v5.8 by commit 6e728f321393b1fce9e1c2c3e55f9f7c15991321. For more details please see the references link. | null | 2021-12-20T00:04:45.128425Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6e728f321393b1fce9e1c2c3e55f9f7c15991321'} |
Linux | GSD-2022-1001007 | mm/mempolicy: fix mpol_new leak in shared_policy_replace | mm/mempolicy: fix mpol_new leak in shared_policy_replace
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit fe39ac59dbbf893b73b24e3184161d0bd06d6651, it was introduced in version v3.8 by commit 42288fe366c4f1ce7522bc9f27d0bc2a81c55264. For more details please see the references link. | null | 2022-04-25T05:52:45.003102Z | 2022-04-24T20:39:09.532290Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/42288fe366c4f1ce7522bc9f27d0bc2a81c55264'} |
Linux | GSD-2021-1002557 | net: ethernet: dec: tulip: de4x5: fix possible array overflows in type3_infoblock() | net: ethernet: dec: tulip: de4x5: fix possible array overflows in type3_infoblock()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.7 by commit 40e35c77448e25de86a0a908a715142919307263. For more details please see the references link. | null | 2021-12-20T01:27:39.610482Z | 2021-12-19T19:42:33.706366Z | null | null | null | null | null |
Linux | GSD-2022-1000246 | psi: Fix uaf issue when psi trigger is destroyed while being polled | psi: Fix uaf issue when psi trigger is destroyed while being polled
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.19 by commit d3e4c61e143e69671803ef3f52140cf7a7258ee7, it was introduced in version v5.2 by commit 0e94682b73bfa6c44c98af7a26771c9c08c055d5. For more details please see the references link. | null | 2022-02-19T09:46:31.030878Z | 2022-02-18T22:00:51.146058Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0e94682b73bfa6c44c98af7a26771c9c08c055d5'} |
Linux | GSD-2021-1000839 | tracing: Correct the length check which causes memory corruption | tracing: Correct the length check which causes memory corruption
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.273 by commit edcce01e0e50840a9aa6a70baed21477bdd2c9f9, it was introduced in version v4.9.258 by commit 2e584b1a02eeb860e286d39bc408b25ebc5ec844. For more details please see the references link. | null | 2021-12-20T01:15:51.896350Z | 2021-06-30T00:00:35.256970Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2e584b1a02eeb860e286d39bc408b25ebc5ec844'} |
Linux | GSD-2021-1002804 | ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module | ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.89 by commit 6809da5185141e61401da5b01896b79a4deed1ad, it was introduced in version v4.15 by commit b2cfd8ab4add53c2070367bfee2f5b738f51698d. For more details please see the references link. | null | 2022-01-11T05:56:39.151606Z | 2021-12-30T02:44:12.193505Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b2cfd8ab4add53c2070367bfee2f5b738f51698d'} |
Linux | GSD-2021-1000993 | can: bcm: fix infoleak in struct bcm_msg_head | can: bcm: fix infoleak in struct bcm_msg_head
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.46 by commit acb755be1f7adb204dcedc4d3b204ef098628623, it was introduced in version v2.6.25 by commit ffd980f976e7fd666c2e61bf8ab35107efd11828. For more details please see the references link. | null | 2021-12-19T22:03:38.103293Z | 2021-06-30T00:31:56.444187Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ffd980f976e7fd666c2e61bf8ab35107efd11828'} |
Linux | GSD-2021-1001681 | powerpc/64s: Fix unrecoverable MCE calling async handler from NMI | powerpc/64s: Fix unrecoverable MCE calling async handler from NMI
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.12 by commit d7a8e38999fbd6910516e44cb43f9f4317e54f73, it was introduced in version v5.14 by commit 2b43dd7653cca47d297756980846ebbfe8887fa1. For more details please see the references link. | null | 2021-12-19T23:04:37.914117Z | 2021-10-19T16:31:35.725014Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2b43dd7653cca47d297756980846ebbfe8887fa1'} |
Linux | GSD-2022-1001904 | PM: domains: Fix sleep-in-atomic bug caused by genpd_debug_remove() | PM: domains: Fix sleep-in-atomic bug caused by genpd_debug_remove()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 2039163c30f886cf5638afd6993705ae9bb34a06, it was introduced in version v5.11 by commit 718072ceb211833f3c71724f49d733d636067191. For more details please see the references link. | null | 2022-04-25T03:11:26.090136Z | 2022-04-24T21:53:32.528345Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/718072ceb211833f3c71724f49d733d636067191'} |
Linux | GSD-2022-1000616 | USB: core: Fix hang in usb_kill_urb by adding memory barriers | USB: core: Fix hang in usb_kill_urb by adding memory barriers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.5 by commit c9a18f7c5b071dce5e6939568829d40994866ab0. For more details please see the references link. | null | 2022-03-07T01:36:06.048800Z | 2022-02-27T03:31:42.024048Z | null | null | null | null | null |
Linux | GSD-2021-1001394 | seq_buf: Fix overflow in seq_buf_putmem_hex() | seq_buf: Fix overflow in seq_buf_putmem_hex()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.198 by commit 1f4c6061fccee64b2072b28dfa3e93cf859c4c0a, it was introduced in version v2.6.27 by commit 5e3ca0ec76fce92daa4eed0d02de9c79b1fe3920. For more details please see the references link. | null | 2021-12-20T01:01:31.880560Z | 2021-08-03T02:27:24.536042Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5e3ca0ec76fce92daa4eed0d02de9c79b1fe3920'} |
Linux | GSD-2022-1000303 | net: fix a memleak when uncloning an skb dst and its metadata | net: fix a memleak when uncloning an skb dst and its metadata
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.267 by commit c1ff27d100e2670b03cbfddb9117e5f9fc672540, it was introduced in version v4.3 by commit fc4099f17240767554ff3a73977acb78ef615404. For more details please see the references link. | null | 2022-03-07T01:37:32.468595Z | 2022-02-27T02:48:29.858587Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fc4099f17240767554ff3a73977acb78ef615404'} |
Linux | GSD-2022-1002294 | gcc-plugins: latent_entropy: use /dev/urandom | gcc-plugins: latent_entropy: use /dev/urandom
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.239 by commit 8b1010a6ae05fd52f6e989c05083dc134e4a3671, it was introduced in version v4.9 by commit 38addce8b600ca335dc86fa3d48c890f1c6fa1f4. For more details please see the references link. | null | 2022-04-25T05:08:56.176596Z | 2022-04-24T22:31:03.873017Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/38addce8b600ca335dc86fa3d48c890f1c6fa1f4'} |
Linux | GSD-2022-1001841 | MIPS: pgalloc: fix memory leak caused by pgd_free() | MIPS: pgalloc: fix memory leak caused by pgd_free()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit d29cda15cab086d82d692de016f7249545d4b6b4, it was introduced in version v5.9 by commit f9cb654cb550b7b87e8608b14fc3eca432429ffe. For more details please see the references link. | null | 2022-04-25T03:36:30.829198Z | 2022-04-24T21:47:02.130652Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f9cb654cb550b7b87e8608b14fc3eca432429ffe'} |
Linux | GSD-2022-1000753 | io_uring: disallow modification of rsrc_data during quiesce | io_uring: disallow modification of rsrc_data during quiesce
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.12 by commit cb87bfcab8f046c167245dd85161a95d8c923e0d. For more details please see the references link. | null | 2022-03-18T02:57:21.454162Z | 2022-03-18T00:15:24.814124Z | null | null | null | null | null |
Linux | GSD-2021-1002042 | ocfs2: fix data corruption after conversion from inline format | ocfs2: fix data corruption after conversion from inline format
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit f1b98569e81c37d7e0deada7172f8f60860c1360, it was introduced in version v5.10 by commit 6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b. For more details please see the references link. | null | 2021-12-20T01:26:36.158916Z | 2021-11-14T15:17:15.763574Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b'} |
Linux | GSD-2021-1000585 | drm/amd/amdgpu: fix refcount leak | drm/amd/amdgpu: fix refcount leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.42 by commit 9fdb8ed37a3a44f9c49372b69f87fd5f61cb3240, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T00:34:15.799210Z | 2021-06-04T19:43:03.583179Z | null | null | null | null | null |
Linux | GSD-2022-1001512 | RDMA/nldev: Prevent underflow in nldev_stat_set_counter_dynamic_doit() | RDMA/nldev: Prevent underflow in nldev_stat_set_counter_dynamic_doit()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit f6dd8669b8299a3a536cd92a7069152a7704da1d, it was introduced in version v5.16 by commit 3c3c1f1416392382faa0238e76a70d7810aab2ef. For more details please see the references link. | null | 2022-04-25T06:49:06.251823Z | 2022-04-24T21:19:01.383766Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c3c1f1416392382faa0238e76a70d7810aab2ef'} |
Linux | GSD-2021-1002412 | atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait | atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.220 by commit 0275fcd9b54f0364f66f2f3f6a0f3748648f3d35. For more details please see the references link. | null | 2021-12-20T01:05:44.066510Z | 2021-12-19T19:36:08.915885Z | null | null | null | null | null |
Linux | GSD-2022-1001142 | media: ir_toy: free before error exiting | media: ir_toy: free before error exiting
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 93ef3fdf3b6633c58f049e5a6be755777dde4340. For more details please see the references link. | null | 2022-04-25T04:12:12.141408Z | 2022-04-24T20:48:40.262357Z | null | null | null | null | null |
Linux | GSD-2021-1001117 | dmaengine: mediatek: free the proper desc in desc_free handler | dmaengine: mediatek: free the proper desc in desc_free handler
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.129 by commit 3d995587c3ea335ad828b24592c89fdee013815f. For more details please see the references link. | null | 2021-12-20T00:48:58.470631Z | 2021-07-08T01:57:27.496601Z | null | null | null | null | null |
Linux | GSD-2022-1000180 | drm/vmwgfx: Fix stale file descriptors on failed usercopy | drm/vmwgfx: Fix stale file descriptors on failed usercopy
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.95 by commit ae2b20f27732fe92055d9e7b350abc5cdf3e2414, it was introduced in version v4.14 by commit c906965dee22d5e95d0651759ba107b420212a9f. For more details please see the references link. | null | 2022-02-19T10:59:12.664136Z | 2022-02-18T21:51:43.738379Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c906965dee22d5e95d0651759ba107b420212a9f'} |
Linux | GSD-2022-1002447 | video: fbdev: sm712fb: Fix crash in smtcfb_read() | video: fbdev: sm712fb: Fix crash in smtcfb_read()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 2a616cc4513217c850865482cbc0bc6e7188580c. For more details please see the references link. | null | 2022-04-25T06:05:49.323024Z | 2022-04-24T22:48:52.328593Z | null | null | null | null | null |
Linux | GSD-2021-1001547 | xen/x86: fix PV trap handling on secondary processors | xen/x86: fix PV trap handling on secondary processors
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.249 by commit e316892ec618b0476111bf720415fd62e084762b, it was introduced in version v2.6.23 by commit f87e4cac4f4e940b328d3deb5b53e642e3881f43. For more details please see the references link. | null | 2021-12-20T00:44:08.619747Z | 2021-10-19T16:23:12.319470Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f87e4cac4f4e940b328d3deb5b53e642e3881f43'} |
Linux | GSD-2022-1002017 | ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 | ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit 9d7d83d0399e23d66fd431b553842a84ac10398f. For more details please see the references link. | null | 2022-04-25T05:02:25.626226Z | 2022-04-24T22:03:05.458474Z | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.