ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2021-1000706 | NFS: fix an incorrect limit in filelayout_decode_layout() | NFS: fix an incorrect limit in filelayout_decode_layout()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.271 by commit 9d280ab53df1d4a1043bd7a9e7c6a2f9cfbfe040, it was introduced in version v2.6.37 by commit 16b374ca439fb406e46e071f75428f5b033056f8. For more details please see the references link. | null | 2021-12-19T23:49:01.262802Z | 2021-06-04T20:06:44.348854Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/16b374ca439fb406e46e071f75428f5b033056f8'} |
Linux | GSD-2021-1001814 | isdn: mISDN: Fix sleeping function called from invalid context | isdn: mISDN: Fix sleeping function called from invalid context
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.156 by commit 4054b869dc263228d30a4755800b78f0f2ba0c89. For more details please see the references link. | null | 2021-12-19T22:11:08.078542Z | 2021-10-28T13:50:20.858315Z | null | null | null | null | null |
Linux | GSD-2022-1001791 | f2fs: fix to do sanity check on curseg->alloc_type | f2fs: fix to do sanity check on curseg->alloc_type
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit f68caedf264a95c0b02dfd0d9f92ac2637d5848a. For more details please see the references link. | null | 2022-04-25T05:22:05.818923Z | 2022-04-24T21:42:32.563620Z | null | null | null | null | null |
Linux | GSD-2022-1000883 | usb: gadget: rndis: add spinlock for rndis response list | usb: gadget: rndis: add spinlock for rndis response list
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.182 by commit 9ab652d41deab49848673c3dadb57ad338485376, it was introduced in version v4.6 by commit f6281af9d62e128aa6efad29cf7265062af114f2. For more details please see the references link. | null | 2022-03-18T02:50:30.625486Z | 2022-03-18T00:27:33.555350Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f6281af9d62e128aa6efad29cf7265062af114f2'} |
Linux | GSD-2021-1000356 | i2c: img-scb: fix reference leak when pm_runtime_get_sync fails | i2c: img-scb: fix reference leak when pm_runtime_get_sync fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit e80ae8bde41266d3b8bf012460b6593851766006, it was introduced in version v4.15 by commit 93222bd9b966105f43418fd336654ad10045783a. For more details please see the references link. | null | 2021-12-20T01:29:02.049661Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/93222bd9b966105f43418fd336654ad10045783a'} |
Linux | GSD-2022-1000929 | iio: adc: men_z188_adc: Fix a resource leak in an error handling path | iio: adc: men_z188_adc: Fix a resource leak in an error handling path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.269 by commit c5723b422f564af15f2e3bc0592fd6376a0a6c45, it was introduced in version v3.15 by commit 74aeac4da66fbfa246edbfc849002eac9b5af9ca. For more details please see the references link. | null | 2022-03-18T02:48:42.961987Z | 2022-03-18T00:33:12.492072Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/74aeac4da66fbfa246edbfc849002eac9b5af9ca'} |
Linux | GSD-2021-1002691 | audit: improve robustness of the audit queue handling | audit: improve robustness of the audit queue handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.88 by commit 4cc6badff97f74d0fce65f9784b5df3b64e4250b, it was introduced in version v4.11 by commit 5b52330bbfe63b3305765354d6046c9f7f89c011. For more details please see the references link. | null | 2022-01-11T05:47:37.273795Z | 2021-12-27T05:37:00.010249Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5b52330bbfe63b3305765354d6046c9f7f89c011'} |
Linux | GSD-2021-1002384 | iio: mma8452: Fix trigger reference couting | iio: mma8452: Fix trigger reference couting
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.293 by commit fb75cc4740d81264cd5bcb0e17d961d018a8be96, it was introduced in version v4.2 by commit ae6d9ce05691bf79694074db7c7da980080548af. For more details please see the references link. | null | 2021-12-19T22:21:18.649470Z | 2021-12-19T19:35:00.231204Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ae6d9ce05691bf79694074db7c7da980080548af'} |
Linux | GSD-2021-1000643 | iommu/vt-d: Fix sysfs leak in alloc_iommu() | iommu/vt-d: Fix sysfs leak in alloc_iommu()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.124 by commit 044bbe8b92ab4e542de7f6c93c88ea65cccd8e29, it was introduced in version v4.11 by commit 39ab9555c24110671f8dc671311a26e5c985b592. For more details please see the references link. | null | 2021-12-20T01:36:33.151820Z | 2021-06-04T19:53:26.596393Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/39ab9555c24110671f8dc671311a26e5c985b592'} |
Linux | GSD-2021-1001951 | comedi: vmk80xx: fix bulk-buffer overflow | comedi: vmk80xx: fix bulk-buffer overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.290 by commit 7cfb35db607760698d299fd1cf7402dfa8f09973, it was introduced in version v2.6.31 by commit 985cafccbf9b7f862aa1c5ee566801e18b5161fb. For more details please see the references link. | null | 2021-12-20T00:37:02.073964Z | 2021-11-14T15:13:08.890315Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/985cafccbf9b7f862aa1c5ee566801e18b5161fb'} |
Linux | GSD-2021-1000213 | ethernet:enic: Fix a use after free bug in enic_hard_start_xmit | ethernet:enic: Fix a use after free bug in enic_hard_start_xmit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.5 by commit d90529392aaf498dafa95d212295d64b2cea4e24, it was introduced in version v4.16 by commit fb7516d42478ebc8e2f00efb76ef96f7b68fd8d3. For more details please see the references link. | null | 2021-12-20T01:29:30.222656Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb7516d42478ebc8e2f00efb76ef96f7b68fd8d3'} |
Linux | GSD-2022-1001284 | brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path | brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 0347bdfdb1529994ac3a4cb425087c477a74eb2c, it was introduced in version v5.4 by commit 82f93cf46d6007ffa003b2d4a2834563b6b84d21. For more details please see the references link. | null | 2022-04-25T03:36:17.038453Z | 2022-04-24T21:01:15.827121Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/82f93cf46d6007ffa003b2d4a2834563b6b84d21'} |
Linux | GSD-2022-1002502 | power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init | power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit 31cdf7897dba1f096b74f69d840f0575b8cdb9ae, it was introduced in version v4.9 by commit 8c0984e5a75337df513047ec92a6c09d78e3e5cd. For more details please see the references link. | null | 2022-04-25T06:54:28.515633Z | 2022-04-24T22:55:12.190925Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c0984e5a75337df513047ec92a6c09d78e3e5cd'} |
Linux | GSD-2021-1001052 | drm/amd/display: Fix potential memory leak in DMUB hw_init | drm/amd/display: Fix potential memory leak in DMUB hw_init
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.12 by commit aa000f828e60ac15d6340f606ec4a673966f5b0b. For more details please see the references link. | null | 2021-12-20T00:12:01.643224Z | 2021-06-30T00:36:28.247179Z | null | null | null | null | null |
Linux | GSD-2022-1002152 | ALSA: oss: Fix PCM OSS buffer allocation overflow | ALSA: oss: Fix PCM OSS buffer allocation overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.109 by commit 5ce74ff7059341d8b2f4d01c3383491df63d1898. For more details please see the references link. | null | 2022-04-25T05:33:54.373163Z | 2022-04-24T22:16:31.288533Z | null | null | null | null | null |
Linux | GSD-2021-1001402 | netrom: Decrease sock refcount when sock timers expire | netrom: Decrease sock refcount when sock timers expire
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.241 by commit 48866fd5c361ea417ed24b43fc2a7dc2f5b060ef, it was introduced in version v4.14.98 by commit 0adf571fa34b27bd0b97b408cc0f0dc54b72f0eb. For more details please see the references link. | null | 2021-12-19T23:38:05.593259Z | 2021-08-03T02:30:26.135309Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0adf571fa34b27bd0b97b408cc0f0dc54b72f0eb'} |
Linux | GSD-2022-1000495 | scsi: myrs: Fix crash in error case | scsi: myrs: Fix crash in error case
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 1d6cd26605b4d662063a83c15c776b5299a1cb23. For more details please see the references link. | null | 2022-03-07T01:41:27.372714Z | 2022-02-27T03:15:10.008422Z | null | null | null | null | null |
Linux | GSD-2022-1002386 | drm/amdkfd: Check for potential null return of kmalloc_array() | drm/amdkfd: Check for potential null return of kmalloc_array()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 40bf32dbfef866c83a3e74800b81d79e52b6d20b. For more details please see the references link. | null | 2022-04-25T05:55:53.599454Z | 2022-04-24T22:41:29.013737Z | null | null | null | null | null |
Linux | GSD-2022-1001953 | mm: fix unexpected zeroed page mapping with zram swap | mm: fix unexpected zeroed page mapping with zram swap
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.112 by commit 20ed94f8181a25212e7404e44958e234f407624b, it was introduced in version v4.15 by commit 0bcac06f27d7528591c27ac2b093ccd71c5d0168. For more details please see the references link. | null | 2022-04-25T04:54:03.400997Z | 2022-04-24T21:57:43.804249Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0bcac06f27d7528591c27ac2b093ccd71c5d0168'} |
Linux | GSD-2022-1000641 | net/mlx5e: Fix wrong calculation of header index in HW_GRO | net/mlx5e: Fix wrong calculation of header index in HW_GRO
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.6 by commit 66c6dbfc8493fc1b0192f74c12d417d911ee632b, it was introduced in version v5.16 by commit f97d5c2a453e26071e3b0ec12161de57c4a237c4. For more details please see the references link. | null | 2022-03-07T01:35:23.224376Z | 2022-02-27T03:35:08.960601Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f97d5c2a453e26071e3b0ec12161de57c4a237c4'} |
Linux | GSD-2021-1001286 | scsi: core: Fix bad pointer dereference when ehandler kthread is invalid | scsi: core: Fix bad pointer dereference when ehandler kthread is invalid
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.52 by commit ea518b70ed5e4598c8d706f37fc16f7b06e440bd, it was introduced in version v5.10.44 by commit 7a696ce1d5d16a33a6cd6400bbcc0339b2460e11. For more details please see the references link. | null | 2021-12-20T00:59:25.337378Z | 2021-08-03T01:57:31.242871Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7a696ce1d5d16a33a6cd6400bbcc0339b2460e11'} |
Linux | GSD-2022-1000211 | net: sched: fix use-after-free in tc_new_tfilter() | net: sched: fix use-after-free in tc_new_tfilter()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.97 by commit e7be56926397cf9d992be8913f74a76152f8f08d, it was introduced in version v5.1 by commit 470502de5bdb1ed0def643a4458593a40b8f6b66. For more details please see the references link. | null | 2022-02-19T03:01:18.222354Z | 2022-02-18T21:56:01.472613Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/470502de5bdb1ed0def643a4458593a40b8f6b66'} |
Linux | GSD-2021-1002500 | xhci: Fix commad ring abort, write all 64 bits to CRCR register. | xhci: Fix commad ring abort, write all 64 bits to CRCR register.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.84 by commit 90c915051c3df2d6d98d506323ab805bc1da7ae3, it was introduced in version v5.10.75 by commit dec944bb7079b37968cf69c8a438f91f15c4cc61. For more details please see the references link. | null | 2021-12-19T22:50:35.363958Z | 2021-12-19T19:40:02.332410Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/dec944bb7079b37968cf69c8a438f91f15c4cc61'} |
Linux | GSD-2022-1001050 | Bluetooth: use memset avoid memory leaks | Bluetooth: use memset avoid memory leaks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit d588c183a971b85c775ad66da563ee6e8bc8158f. For more details please see the references link. | null | 2022-04-25T05:01:27.638119Z | 2022-04-24T20:42:28.099984Z | null | null | null | null | null |
Linux | GSD-2021-1002150 | misc: fastrpc: Add missing lock before accessing find_vma() | misc: fastrpc: Add missing lock before accessing find_vma()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit f9a470db2736b01538ad193c316eb3f26be37d58, it was introduced in version v5.2 by commit 80f3afd72bd4149c57daf852905476b43bb47647. For more details please see the references link. | null | 2021-12-19T23:43:22.738129Z | 2021-11-14T15:22:07.221206Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80f3afd72bd4149c57daf852905476b43bb47647'} |
Linux | GSD-2021-1000497 | nvme-loop: fix memory leak in nvme_loop_create_ctrl() | nvme-loop: fix memory leak in nvme_loop_create_ctrl()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.7 by commit 551ba08d4b7eb26f75758cdb9f15105b276517ad, it was introduced in version v4.8 by commit 3a85a5de29ea779634ddfd768059e06196687aba. For more details please see the references link. | null | 2021-12-20T00:30:23.373460Z | 2021-05-31T23:46:16.025712Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3a85a5de29ea779634ddfd768059e06196687aba'} |
Linux | GSD-2022-1001400 | dm ioctl: prevent potential spectre v1 gadget | dm ioctl: prevent potential spectre v1 gadget
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 44e6cb3ab177faae840bb2c1ebda9a2539876184. For more details please see the references link. | null | 2022-04-25T04:27:26.809727Z | 2022-04-24T21:10:29.023998Z | null | null | null | null | null |
Linux | GSD-2021-1000182 | perf/core: Fix unconditional security_locked_down() call | perf/core: Fix unconditional security_locked_down() call
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.117 by commit b246759284d6a2bc5b6f1009caeeb3abce2ec9ff, it was introduced in version v5.4 by commit b0c8fdc7fdb77586c3d1937050925b960743306e. For more details please see the references link. | null | 2021-12-19T21:47:20.285501Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b0c8fdc7fdb77586c3d1937050925b960743306e'} |
Linux | GSD-2022-1001115 | KVM: SVM: fix panic on out-of-bounds guest IRQ | KVM: SVM: fix panic on out-of-bounds guest IRQ
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit a6ffdebfb6a9c2ffeed902b544b96fe67498210e. For more details please see the references link. | null | 2022-04-25T04:45:48.272302Z | 2022-04-24T20:46:40.454281Z | null | null | null | null | null |
Linux | GSD-2021-1000478 | net/nfc: fix use-after-free llcp_sock_bind/connect | net/nfc: fix use-after-free llcp_sock_bind/connect
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.233 by commit 18ae4a192a4496e48a5490b52812645d2413307c, it was introduced in version v4.14.231 by commit 538a6ff11516d38a61e237d2d2dc04c30c845fbe. For more details please see the references link. | null | 2021-12-20T01:28:38.425821Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/538a6ff11516d38a61e237d2d2dc04c30c845fbe'} |
Linux | GSD-2021-1002445 | sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl | sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.164 by commit 77393806c76b6b44f1c44bd957788c8bd9152c45, it was introduced in version v2.6.24 by commit faf0b2e5afe7dae072d2715763c7f992b612b628. For more details please see the references link. | null | 2021-12-19T22:42:05.925204Z | 2021-12-19T19:37:42.283368Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/faf0b2e5afe7dae072d2715763c7f992b612b628'} |
Linux | GSD-2022-1001545 | power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init | power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 261041097ab3470f1120b7733cbf472712304d1e, it was introduced in version v4.9 by commit 8c0984e5a75337df513047ec92a6c09d78e3e5cd. For more details please see the references link. | null | 2022-04-25T06:42:09.015358Z | 2022-04-24T21:22:11.439944Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c0984e5a75337df513047ec92a6c09d78e3e5cd'} |
Linux | GSD-2021-1000028 | netfilter: nft_limit: avoid possible divide error in nft_limit_init | netfilter: nft_limit: avoid possible divide error in nft_limit_init
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.16 by commit 1bb3ee4259936cc3b2d80a4a480bbb4868575071, it was introduced in version v4.13 by commit c26844eda9d4fdbd266660e3b3de2d0270e3a1ed. For more details please see the references link. | null | 2021-12-20T00:08:54.416674Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c26844eda9d4fdbd266660e3b3de2d0270e3a1ed'} |
Linux | GSD-2021-1002015 | usbnet: sanity check for maxpacket | usbnet: sanity check for maxpacket
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.157 by commit 492140e45d2bf27c1014243f8616a9b612144e20. For more details please see the references link. | null | 2021-12-20T02:14:36.576734Z | 2021-11-14T15:16:00.590557Z | null | null | null | null | null |
Linux | GSD-2021-1000881 | IB/mlx5: Fix initializing CQ fragments buffer | IB/mlx5: Fix initializing CQ fragments buffer
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.195 by commit 1ec2dcd680c71d0d36fa25638b327a468babd5c9, it was introduced in version v4.17 by commit 388ca8be00370db132464e27f745b8a0add19fcb. For more details please see the references link. | null | 2021-12-19T23:29:46.752488Z | 2021-06-30T00:03:21.772929Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/388ca8be00370db132464e27f745b8a0add19fcb'} |
Linux | GSD-2021-1001793 | NFC: digital: fix possible memory leak in digital_in_send_sdd_req() | NFC: digital: fix possible memory leak in digital_in_send_sdd_req()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.252 by commit fcce6e5255474ca33c27dda0cdf9bf5087278873, it was introduced in version v3.13 by commit 2c66daecc4092e6049673c281b2e6f0d5e59a94c. For more details please see the references link. | null | 2021-12-19T22:22:16.949924Z | 2021-10-28T13:49:08.388341Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c66daecc4092e6049673c281b2e6f0d5e59a94c'} |
Linux | GSD-2022-1001816 | cpufreq: qcom-cpufreq-nvmem: fix reading of PVS Valid fuse | cpufreq: qcom-cpufreq-nvmem: fix reading of PVS Valid fuse
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 251aabcb0b0925cc63f595a1d6d6485feb3119dd, it was introduced in version v5.7 by commit a8811ec764f95a04ba82f6f457e28c5e9e36e36b. For more details please see the references link. | null | 2022-04-25T06:32:34.439596Z | 2022-04-24T21:44:36.784453Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a8811ec764f95a04ba82f6f457e28c5e9e36e36b'} |
Linux | GSD-2022-1000704 | netfilter: fix use-after-free in __nf_register_net_hook() | netfilter: fix use-after-free in __nf_register_net_hook()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.13 by commit 5a8076e98dde17224dd47283b894a8b1dbe1bc72, it was introduced in version v4.14 by commit 2420b79f8c18a75ee2417cace381f4604b9b4365. For more details please see the references link. | null | 2022-03-18T02:56:04.163080Z | 2022-03-18T00:11:12.462156Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2420b79f8c18a75ee2417cace381f4604b9b4365'} |
Linux | GSD-2021-1001269 | watchdog: Fix possible use-after-free by calling del_timer_sync() | watchdog: Fix possible use-after-free by calling del_timer_sync()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.52 by commit 66ba9cf929b1c4fabf545bd4c18f6f64e23e46e4. For more details please see the references link. | null | 2021-12-19T23:46:45.245987Z | 2021-08-03T01:53:44.552820Z | null | null | null | null | null |
Linux | GSD-2022-1002369 | mm: invalidate hwpoison page cache page in fault path | mm: invalidate hwpoison page cache page in fault path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit e83d4184908c4ebd6adfd3e1252439af91d6b0e9. For more details please see the references link. | null | 2022-04-25T06:15:16.350849Z | 2022-04-24T22:39:40.983134Z | null | null | null | null | null |
Linux | GSD-2022-1000354 | libsubcmd: Fix use-after-free for realloc(..., 0) | libsubcmd: Fix use-after-free for realloc(..., 0)
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.181 by commit aca7e5b6a5008dcf551516490b0ba4510e073d08, it was introduced in version v4.5 by commit 2f4ce5ec1d447beb42143a9653716a2ab025161e. For more details please see the references link. | null | 2022-03-07T01:33:05.122683Z | 2022-02-27T02:55:41.193778Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2f4ce5ec1d447beb42143a9653716a2ab025161e'} |
Linux | GSD-2021-1001639 | netfilter: ipset: Fix oversized kvmalloc() calls | netfilter: ipset: Fix oversized kvmalloc() calls
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.71 by commit da5b8b9319f044c2ca24f6602c54033931e0c1cc. For more details please see the references link. | null | 2021-12-20T00:37:33.762721Z | 2021-10-19T16:29:27.720845Z | null | null | null | null | null |
Linux | GSD-2021-1000301 | drm/amdgpu: Init GFX10_ADDR_CONFIG for VCN v3 in DPG mode. | drm/amdgpu: Init GFX10_ADDR_CONFIG for VCN v3 in DPG mode.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit c9864a6b0ab3860e9f462b5f23b653762c1657a9, it was introduced in version v5.9 by commit 99541f392b4d0584594a2492582b3f262a8f2643. For more details please see the references link. | null | 2021-12-19T23:33:22.122364Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/99541f392b4d0584594a2492582b3f262a8f2643'} |
Linux | GSD-2022-1001396 | scsi: pm8001: Fix memory leak in pm8001_chip_fw_flash_update_req() | scsi: pm8001: Fix memory leak in pm8001_chip_fw_flash_update_req()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit fe5b8ea5583b5c3f6f68e06acba50387edf3b5d5. For more details please see the references link. | null | 2022-04-25T05:01:36.106086Z | 2022-04-24T21:10:17.398887Z | null | null | null | null | null |
Linux | GSD-2021-1002296 | ASoC: SOF: Intel: hda-dai: fix potential locking issue | ASoC: SOF: Intel: hda-dai: fix potential locking issue
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.82 by commit 0c6daf4799613b16dd4ad86fbc34f719ceb69911. For more details please see the references link. | null | 2021-12-19T22:26:04.462382Z | 2021-11-29T02:37:29.957472Z | null | null | null | null | null |
Linux | GSD-2021-1000751 | HID: magicmouse: fix NULL-deref on disconnect | HID: magicmouse: fix NULL-deref on disconnect
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.125 by commit 368c5d45a87e1bcc7f1e98e0c255c37b7b12c5d6, it was introduced in version v4.20 by commit 9d7b18668956c411a422d04c712994c5fdb23a4b. For more details please see the references link. | null | 2021-12-20T01:16:02.155663Z | 2021-06-25T00:02:24.911359Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9d7b18668956c411a422d04c712994c5fdb23a4b'} |
Linux | GSD-2021-1001843 | userfaultfd: fix a race between writeprotect and exit_mmap() | userfaultfd: fix a race between writeprotect and exit_mmap()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit 3cda4bfffd4f755645577aaa9e96a606657b4525, it was introduced in version v5.7 by commit 63b2d4174c4ad1f40b48d7138e71bcb564c1fe03. For more details please see the references link. | null | 2021-12-20T01:37:49.703125Z | 2021-10-28T13:51:47.486961Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63b2d4174c4ad1f40b48d7138e71bcb564c1fe03'} |
Linux | GSD-2022-1002040 | video: fbdev: sm712fb: Fix crash in smtcfb_write() | video: fbdev: sm712fb: Fix crash in smtcfb_write()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit b1c28577529cdfad40c8242673285f1e1e4c314e. For more details please see the references link. | null | 2022-04-25T04:27:27.836177Z | 2022-04-24T22:05:22.556975Z | null | null | null | null | null |
Linux | GSD-2021-1001510 | netfilter: ipset: Fix oversized kvmalloc() calls | netfilter: ipset: Fix oversized kvmalloc() calls
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.285 by commit c3a2856d3ddd0bbf05390e411f692b7e07239cb8. For more details please see the references link. | null | 2021-12-20T01:08:58.350323Z | 2021-10-19T16:21:29.714319Z | null | null | null | null | null |
Linux | GSD-2022-1000587 | net/smc: Forward wakeup to smc socket waitqueue after fallback | net/smc: Forward wakeup to smc socket waitqueue after fallback
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.22 by commit 0ef6049f664941bc0f75828b3a61877635048b27, it was introduced in version v5.15.7 by commit fb92e025baa73e99250b79ab64f4e088d2888993. For more details please see the references link. | null | 2022-03-07T01:37:28.642192Z | 2022-02-27T03:27:47.236482Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb92e025baa73e99250b79ab64f4e088d2888993'} |
Linux | GSD-2022-1002410 | ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 | ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit ed3dfdaa8b5f0579eabfc1c5818eed30cfe1fe84. For more details please see the references link. | null | 2022-04-25T05:42:45.027786Z | 2022-04-24T22:44:20.785664Z | null | null | null | null | null |
Linux | GSD-2021-1001140 | cfg80211: call cfg80211_leave_ocb when switching away from OCB | cfg80211: call cfg80211_leave_ocb when switching away from OCB
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13 by commit a64b6a25dd9f984ed05fade603a00e2eae787d2f. For more details please see the references link. | null | 2021-12-19T23:54:56.430832Z | 2021-07-08T01:59:09.595291Z | null | null | null | null | null |
Linux | GSD-2021-1001455 | dm btree remove: assign new_root only when removal succeeds | dm btree remove: assign new_root only when removal succeeds
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.276 by commit c154775619186781aaf8a99333ac07437a1768d5. For more details please see the references link. | null | 2021-12-20T00:43:39.168904Z | 2021-08-03T02:46:22.548248Z | null | null | null | null | null |
Linux | GSD-2022-1000138 | drm/nouveau: fix off by one in BIOS boundary checking | drm/nouveau: fix off by one in BIOS boundary checking
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.228 by commit b2a21669ee98aafc41c6d42ef15af4dab9e6e882, it was introduced in version v4.8 by commit 4d4e9907ff572bb1d1c0f6913ad6e3d6d4525077. For more details please see the references link. | null | 2022-02-20T06:41:21.800486Z | 2022-02-18T21:46:12.290319Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4d4e9907ff572bb1d1c0f6913ad6e3d6d4525077'} |
Linux | GSD-2022-1002105 | media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED | media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 4d68603cc4382174bc1e7d532e10675c48c6b257, it was introduced in version v3.7 by commit 8ac456495a33d9466076fea94594181ceefb76d9. For more details please see the references link. | null | 2022-04-25T05:11:41.302008Z | 2022-04-24T22:11:56.809318Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ac456495a33d9466076fea94594181ceefb76d9'} |
Linux | GSD-2021-1001005 | net: ll_temac: Make sure to free skb when it is completely used | net: ll_temac: Make sure to free skb when it is completely used
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.46 by commit 019ab7d044d0ebf97e1236bb8935b7809be92358. For more details please see the references link. | null | 2021-12-19T22:58:59.109196Z | 2021-06-30T00:32:40.267121Z | null | null | null | null | null |
Linux | GSD-2022-1000092 | scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe | scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.300 by commit 3a345198a7c2d1db2526dc60b77052f75de019d3, it was introduced in version v3.16 by commit d576a5e80cd07ea7049f8fd7b303c14df7b5d7d2. For more details please see the references link. | null | 2022-02-19T10:25:38.735238Z | 2022-02-18T21:34:18.446807Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d576a5e80cd07ea7049f8fd7b303c14df7b5d7d2'} |
Linux | GSD-2022-1000568 | pidfd: fix test failure due to stack overflow on some arches | pidfd: fix test failure due to stack overflow on some arches
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit 3cfc79b41381780ef745d696520260238c1cf9fc. For more details please see the references link. | null | 2022-03-07T01:36:05.653647Z | 2022-02-27T03:24:55.492195Z | null | null | null | null | null |
Linux | GSD-2021-1002279 | tipc: check for null after calling kmemdup | tipc: check for null after calling kmemdup
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.82 by commit a7d91625863d4ffed63b993b5e6dc1298b6430c9. For more details please see the references link. | null | 2021-12-20T00:49:31.912874Z | 2021-11-29T02:36:47.465843Z | null | null | null | null | null |
Linux | GSD-2021-1000244 | i2c: sprd: fix reference leak when pm_runtime_get_sync fails | i2c: sprd: fix reference leak when pm_runtime_get_sync fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit d3406ab52097328a3bc4cbe124bfd8f6d51fb86f, it was introduced in version v4.14 by commit 8b9ec0719834fe66146d138d62ed66cef025c864. For more details please see the references link. | null | 2021-12-20T01:25:36.383240Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8b9ec0719834fe66146d138d62ed66cef025c864'} |
Linux | GSD-2022-1001729 | drm/amdgpu: Fix recursive locking warning | drm/amdgpu: Fix recursive locking warning
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 0a922366d6d9b2532344b3763a54090ab9b50f59. For more details please see the references link. | null | 2022-04-25T06:50:03.125753Z | 2022-04-24T21:38:02.930458Z | null | null | null | null | null |
Linux | GSD-2021-1002783 | hamradio: improve the incomplete fix to avoid NPD | hamradio: improve the incomplete fix to avoid NPD
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.260 by commit a7b0ae2cc486fcb601f9f9d87d98138cc7b7f7f9. For more details please see the references link. | null | 2022-01-11T06:43:09.654645Z | 2021-12-30T02:43:15.530250Z | null | null | null | null | null |
Linux | GSD-2021-1002629 | xen/console: harden hvc_xen against event channel storms | xen/console: harden hvc_xen against event channel storms
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.294 by commit 728389c21176b2095fa58e858d5ef1d2f2aac429. For more details please see the references link. | null | 2022-01-11T05:52:57.713228Z | 2021-12-27T05:27:57.795066Z | null | null | null | null | null |
Linux | GSD-2021-1000614 | NFC: nci: fix memory leak in nci_allocate_device | NFC: nci: fix memory leak in nci_allocate_device
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.41 by commit b34cb7ac32cc8e5471dc773180ea9ae676b1a745, it was introduced in version v4.0 by commit 11f54f228643d0248ec00ce8c9fb8d872f87e7b8. For more details please see the references link. | null | 2021-12-19T22:09:52.435106Z | 2021-06-04T19:47:43.444591Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/11f54f228643d0248ec00ce8c9fb8d872f87e7b8'} |
Linux | GSD-2021-1001906 | net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path | net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit ed8aafea4fec9c654e63445236e0b505e27ed3a7, it was introduced in version v3.11 by commit e126ba97dba9edeb6fafa3665b5f8497fc9cdf8c. For more details please see the references link. | null | 2021-12-19T23:02:16.391456Z | 2021-10-28T13:55:03.278218Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e126ba97dba9edeb6fafa3665b5f8497fc9cdf8c'} |
Linux | GSD-2022-1001683 | rxrpc: fix a race in rxrpc_exit_net() | rxrpc: fix a race in rxrpc_exit_net()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 571d8e1d154ca18f08dcb72b69318d36e10010a0, it was introduced in version v4.17 by commit ace45bec6d77bc061c3c3d8ad99e298ea9800c2b. For more details please see the references link. | null | 2022-04-25T03:19:02.014972Z | 2022-04-24T21:34:49.854631Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ace45bec6d77bc061c3c3d8ad99e298ea9800c2b'} |
Linux | GSD-2022-1000991 | net: dsa: realtek: rtl8365mb: serialize indirect PHY register access | net: dsa: realtek: rtl8365mb: serialize indirect PHY register access
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.4 by commit ac3e87eebf428819c343175ec446c86c46f5a30d, it was introduced in version v5.16 by commit 4af2950c50c8634ed2865cf81e607034f78b84aa. For more details please see the references link. | null | 2022-04-25T03:29:13.112255Z | 2022-04-24T20:37:50.075477Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4af2950c50c8634ed2865cf81e607034f78b84aa'} |
Linux | GSD-2022-1001379 | staging: wfx: fix an error handling in wfx_init_common() | staging: wfx: fix an error handling in wfx_init_common()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit ab0fed1fa744173433cfd1dbaf9239f200ded650. For more details please see the references link. | null | 2022-04-25T04:29:35.894271Z | 2022-04-24T21:09:15.422227Z | null | null | null | null | null |
Linux | GSD-2021-1000403 | net/nfc: fix use-after-free llcp_sock_bind/connect | net/nfc: fix use-after-free llcp_sock_bind/connect
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 6b7021ed36dabf29e56842e3408781cd3b82ef6e, it was introduced in version v5.10.30 by commit 6fb003e5ae18d8cda4c8a1175d9dd8db12bec049. For more details please see the references link. | null | 2021-12-20T01:16:13.192846Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6fb003e5ae18d8cda4c8a1175d9dd8db12bec049'} |
Linux | GSD-2022-1001494 | kgdboc: fix return value of __setup handler | kgdboc: fix return value of __setup handler
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 9010154beae2a685c7d1045f08da69f48fce9f47, it was introduced in version v4.20 by commit 1bd54d851f50dea6af30c3e6ff4f3e9aab5558f9. For more details please see the references link. | null | 2022-04-25T03:20:03.709897Z | 2022-04-24T21:16:56.953618Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1bd54d851f50dea6af30c3e6ff4f3e9aab5558f9'} |
Linux | GSD-2021-1002594 | net/sched: fq_pie: prevent dismantle issue | net/sched: fq_pie: prevent dismantle issue
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.8 by commit d86216dfda7c98375f809e26a30bfdaaba21d46e, it was introduced in version v5.6 by commit ec97ecf1ebe485a17cd8395a5f35e6b80b57665a. For more details please see the references link. | null | 2021-12-19T23:17:48.790588Z | 2021-12-19T19:44:19.811035Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ec97ecf1ebe485a17cd8395a5f35e6b80b57665a'} |
Linux | GSD-2021-1000053 | dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails | dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.3 by commit d757bf4c69cda3c3ab7f775dfabbf5a80e2f6f9d, it was introduced in version v4.6 by commit 1c357a1e86a4227a6b6059f2de118ae47659cebc. For more details please see the references link. | null | 2021-12-19T23:32:09.205672Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c357a1e86a4227a6b6059f2de118ae47659cebc'} |
Linux | GSD-2021-1001212 | media: v4l2-core: explicitly clear ioctl input data | media: v4l2-core: explicitly clear ioctl input data
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.3 by commit bfb48b54db25c3b4ef4bef5e0691464ebc4aa335. For more details please see the references link. | null | 2021-12-19T23:32:59.490068Z | 2021-08-03T01:38:14.807926Z | null | null | null | null | null |
Linux | GSD-2022-1002312 | scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one() | scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit db863ab2baf058ed05c7b723612e3c40c9dd6885, it was introduced in version v2.6.23 by commit 45804fbb00eea27bdf4d62751681228a9e2844e9. For more details please see the references link. | null | 2022-04-25T05:41:25.033261Z | 2022-04-24T22:33:25.716568Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/45804fbb00eea27bdf4d62751681228a9e2844e9'} |
Linux | GSD-2021-1000950 | ftrace: Do not blindly read the ip address in ftrace_bug() | ftrace: Do not blindly read the ip address in ftrace_bug()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.44 by commit 97524384762c1fb9b3ded931498dd2047bd0de81, it was introduced in version v2.6.28 by commit 05736a427f7e16be948ccbf39782bd3a6ae16b14. For more details please see the references link. | null | 2021-12-20T00:35:43.751222Z | 2021-06-30T00:28:43.735036Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/05736a427f7e16be948ccbf39782bd3a6ae16b14'} |
Linux | GSD-2021-1001642 | ipack: ipoctal: fix module reference leak | ipack: ipoctal: fix module reference leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.71 by commit 7cea848678470daadbfdaa6a112b823c290f900c, it was introduced in version v3.18 by commit 82a82340bab6c251e0705339f60763718eaa2a22. For more details please see the references link. | null | 2021-12-20T01:34:19.384027Z | 2021-10-19T16:29:35.709336Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/82a82340bab6c251e0705339f60763718eaa2a22'} |
Linux | GSD-2021-1001357 | atm: nicstar: Fix possible use-after-free in nicstar_cleanup() | atm: nicstar: Fix possible use-after-free in nicstar_cleanup()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.133 by commit bdf5334250c69fabf555b7322c75249ea7d5f148. For more details please see the references link. | null | 2021-12-19T22:17:28.552458Z | 2021-08-03T02:17:12.978136Z | null | null | null | null | null |
Linux | GSD-2022-1001928 | NFSD: prevent integer overflow on 32 bit systems | NFSD: prevent integer overflow on 32 bit systems
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 303cd6173dce0a28d26526c77814eb90a41bd898. For more details please see the references link. | null | 2022-04-25T05:38:11.114145Z | 2022-04-24T21:55:47.632700Z | null | null | null | null | null |
Linux | GSD-2021-1000815 | nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect | nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit 0c4559736d9a4ec1ca58ba98ca34e7c4da4c422b, it was introduced in version v3.3 by commit d646960f7986fefb460a2b062d5ccc8ccfeacc3a. For more details please see the references link. | null | 2021-12-20T01:39:52.753269Z | 2021-06-25T00:09:08.215135Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d646960f7986fefb460a2b062d5ccc8ccfeacc3a'} |
Linux | GSD-2021-1002828 | net: stmmac: ptp: fix potentially overflowing expression | net: stmmac: ptp: fix potentially overflowing expression
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.12 by commit be2473e5f377fb7fe471a5096f37a2d73a8367e6, it was introduced in version v5.14 by commit e9e3720002f61cd637a49ecafae77cac230eefae. For more details please see the references link. | null | 2022-01-11T05:56:53.285012Z | 2021-12-30T02:45:12.122273Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e9e3720002f61cd637a49ecafae77cac230eefae'} |
Linux | GSD-2021-1001707 | netfilter: conntrack: serialize hash resizes and cleanups | netfilter: conntrack: serialize hash resizes and cleanups
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit 7ea6f5848281182ce0cff6cafdcf3fbdeb8ca7e1. For more details please see the references link. | null | 2021-12-19T23:37:07.291258Z | 2021-10-19T16:32:51.403473Z | null | null | null | null | null |
Linux | GSD-2022-1001882 | media: ti-vpe: cal: Fix a NULL pointer dereference in cal_ctx_v4l2_init_formats() | media: ti-vpe: cal: Fix a NULL pointer dereference in cal_ctx_v4l2_init_formats()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit aa613ac270292e102503e9767882e39200efe608, it was introduced in version v5.12 by commit 7168155002cf7aadbfaa14a28f037c880a214764. For more details please see the references link. | null | 2022-04-25T03:04:53.791029Z | 2022-04-24T21:51:28.760858Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7168155002cf7aadbfaa14a28f037c880a214764'} |
Linux | GSD-2022-1000790 | mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work | mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.27 by commit e03ad1915ccccc5c908645c78c9dd4de25ecd1b6. For more details please see the references link. | null | 2022-03-18T02:52:44.881401Z | 2022-03-18T00:18:08.163292Z | null | null | null | null | null |
Linux | GSD-2022-1002257 | ASoC: mxs: Fix error handling in mxs_sgtl5000_probe | ASoC: mxs: Fix error handling in mxs_sgtl5000_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 67e12f1cb2f97468c12b59e21975eaa0f332e7d2, it was introduced in version v3.5 by commit e968194b45c4e8077dada75c5bae5660b37628fe. For more details please see the references link. | null | 2022-04-25T08:21:05.020449Z | 2022-04-24T22:27:07.746756Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e968194b45c4e8077dada75c5bae5660b37628fe'} |
Linux | GSD-2021-1000546 | net: fec: fix the potential memory leak in fec_enet_init() | net: fec: fix the potential memory leak in fec_enet_init()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit 32a1777fd113335c3f70dc445dffee0ad1c6870f, it was introduced in version v3.18 by commit 59d0f746564495c7f54526674deabfcf101236a1. For more details please see the references link. | null | 2021-12-19T22:19:30.777698Z | 2021-06-04T19:36:24.266780Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/59d0f746564495c7f54526674deabfcf101236a1'} |
Linux | GSD-2021-1002081 | btrfs: fix abort logic in btrfs_replace_file_extents | btrfs: fix abort logic in btrfs_replace_file_extents
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit 0e309e1152fc34ef75991d9d69b165dbf75bf26c. For more details please see the references link. | null | 2021-12-19T22:49:03.019992Z | 2021-11-14T15:18:59.496257Z | null | null | null | null | null |
Linux | GSD-2021-1000116 | mmc: uniphier-sd: Fix a resource leak in the remove function | mmc: uniphier-sd: Fix a resource leak in the remove function
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.20 by commit ebe0f12cf4c044f812c6d17011531582f9ac8bb3, it was introduced in version v4.20 by commit 3fd784f745dd1747863775a99ec749619ee6759c. For more details please see the references link. | null | 2021-12-19T23:56:53.208554Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3fd784f745dd1747863775a99ec749619ee6759c'} |
Linux | GSD-2022-1001181 | clk: qcom: clk-rcg2: Update logic to calculate D value for RCG | clk: qcom: clk-rcg2: Update logic to calculate D value for RCG
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit a4e2e31971354790b0d1fa3e783452a9d135fcff, it was introduced in version v3.16 by commit 99cbd064b059f222c8839ba433a68b2d6ee33066. For more details please see the references link. | null | 2022-04-25T05:58:45.510087Z | 2022-04-24T20:51:22.960211Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/99cbd064b059f222c8839ba433a68b2d6ee33066'} |
Linux | GSD-2022-1002484 | video: fbdev: sm712fb: Fix crash in smtcfb_write() | video: fbdev: sm712fb: Fix crash in smtcfb_write()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit fb791514acf9070225eed46e1ccbb0aa7aae5da5. For more details please see the references link. | null | 2022-04-25T04:26:10.338555Z | 2022-04-24T22:53:13.904281Z | null | null | null | null | null |
Linux | GSD-2022-1000143 | moxart: fix potential use-after-free on remove path | moxart: fix potential use-after-free on remove path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.229 by commit 9c25d5ff1856b91bd4365e813f566cb59aaa9552. For more details please see the references link. | null | 2022-02-19T10:59:24.781732Z | 2022-02-18T21:46:46.262247Z | null | null | null | null | null |
Linux | GSD-2021-1001584 | bpf: Fix integer overflow in prealloc_elems_and_freelist() | bpf: Fix integer overflow in prealloc_elems_and_freelist()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.153 by commit b14f28126c51533bb329379f65de5b0dd689b13a, it was introduced in version v4.6 by commit 557c0c6e7df8e14a46bd7560d193fa5bbc00a858. For more details please see the references link. | null | 2021-12-20T00:23:43.659158Z | 2021-10-19T16:24:55.540625Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/557c0c6e7df8e14a46bd7560d193fa5bbc00a858'} |
Linux | GSD-2022-1000513 | net: dsa: lantiq_gswip: don't use devres for mdiobus | net: dsa: lantiq_gswip: don't use devres for mdiobus
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 2443ba2fe396bdde187a2fdfa6a57375643ae93c, it was introduced in version v5.9 by commit ac3a68d56651c3dad2c12c7afce065fe15267f44. For more details please see the references link. | null | 2022-03-07T01:44:12.720202Z | 2022-02-27T03:17:11.675876Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac3a68d56651c3dad2c12c7afce065fe15267f44'} |
Linux | GSD-2021-1002202 | nvme-tcp: fix possible req->offset corruption | nvme-tcp: fix possible req->offset corruption
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit ce7723e9cdae4eb3030da082876580f4b2dc0861, it was introduced in version v5.8 by commit db5ad6b7f8cdd6d78efef62a1557461d0cbaee54. For more details please see the references link. | null | 2021-12-19T23:45:08.791505Z | 2021-11-14T15:24:30.448326Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/db5ad6b7f8cdd6d78efef62a1557461d0cbaee54'} |
Linux | GSD-2022-1001752 | rxrpc: Fix call timer start racing with call destruction | rxrpc: Fix call timer start racing with call destruction
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 8cbf4ae7a2833767d63114573e5f9a45740cc975, it was introduced in version v4.15 by commit a158bdd3247b9656df36ba133235fff702e9fdc3. For more details please see the references link. | null | 2022-04-25T06:23:40.490945Z | 2022-04-24T21:39:37.860268Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a158bdd3247b9656df36ba133235fff702e9fdc3'} |
Linux | GSD-2022-1000840 | usb: gadget: clear related members when goto fail | usb: gadget: clear related members when goto fail
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.104 by commit fdd64084e405544c5c11841ca9261785c988e2a1. For more details please see the references link. | null | 2022-03-18T02:56:26.124213Z | 2022-03-18T00:23:04.962011Z | null | null | null | null | null |
Linux | GSD-2021-1002652 | rds: memory leak in __rds_conn_create() | rds: memory leak in __rds_conn_create()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.222 by commit 1ed173726c1a0082e9d77c7d5a85411e85bdd983, it was introduced in version v4.19.195 by commit 0a3158ac5999fe0b9974604e630078cd1eff8be6. For more details please see the references link. | null | 2022-01-11T05:57:44.679161Z | 2021-12-27T05:33:17.616415Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0a3158ac5999fe0b9974604e630078cd1eff8be6'} |
Linux | GSD-2021-1000395 | KVM: Destroy I/O bus devices on unregister failure _after_ sync'ing SRCU | KVM: Destroy I/O bus devices on unregister failure _after_ sync'ing SRCU
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 03c6cccedd3913006744faa252a4da5145299343, it was introduced in version v5.9 by commit f65886606c2d3b562716de030706dfe1bea4ed5e. For more details please see the references link. | null | 2021-12-19T22:12:37.539944Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f65886606c2d3b562716de030706dfe1bea4ed5e'} |
Linux | GSD-2022-1001302 | cifs: prevent bad output lengths in smb2_ioctl_query_info() | cifs: prevent bad output lengths in smb2_ioctl_query_info()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 7529fbee10d82493c5cb109e51788bf74816d1c0. For more details please see the references link. | null | 2022-04-25T06:34:24.600494Z | 2022-04-24T21:02:25.847940Z | null | null | null | null | null |
Linux | GSD-2021-1000680 | net: usb: fix memory leak in smsc75xx_bind | net: usb: fix memory leak in smsc75xx_bind
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.235 by commit 9e6b8c1ff9d997e1fa16cbd2d60739adf6dc1bbc, it was introduced in version v2.6.34 by commit d0cad871703b898a442e4049c532ec39168e5b57. For more details please see the references link. | null | 2021-12-19T22:22:49.482454Z | 2021-06-04T20:00:56.832345Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0cad871703b898a442e4049c532ec39168e5b57'} |
Linux | GSD-2021-1001992 | isofs: Fix out of bound access for corrupted isofs image | isofs: Fix out of bound access for corrupted isofs image
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.217 by commit b0ddff8d68f2e43857a84dce54c3deab181c8ae1. For more details please see the references link. | null | 2021-12-20T00:54:10.629514Z | 2021-11-14T15:14:56.910653Z | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.