ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2022-1001617 | jffs2: fix memory leak in jffs2_do_mount_fs | jffs2: fix memory leak in jffs2_do_mount_fs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 5f34310d1376ca5b2ed798258def2c2ab3cc6699, it was introduced in version v2.6.15 by commit e631ddba588783edd521c5a89f7b2902772fb691. For more details please see the references link. | null | 2022-04-25T04:36:08.010417Z | 2022-04-24T21:28:53.766146Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e631ddba588783edd521c5a89f7b2902772fb691'} |
Linux | GSD-2022-1000905 | ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min | ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.233 by commit 0b2ecc9163472128e7f30b517bee92dcd27ffc34, it was introduced in version v4.19.228 by commit 65a61b1f56f5386486757930069fbdce94af08bf. For more details please see the references link. | null | 2022-03-18T02:49:31.149465Z | 2022-03-18T00:30:07.373593Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/65a61b1f56f5386486757930069fbdce94af08bf'} |
Linux | GSD-2021-1002347 | usb: musb: tusb6010: check return value after calling platform_get_resource() | usb: musb: tusb6010: check return value after calling platform_get_resource()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit 06cfb4cb2241e704d72e3045cf4d7dfb567fbce0. For more details please see the references link. | null | 2021-12-20T00:02:04.850744Z | 2021-11-29T02:39:50.365367Z | null | null | null | null | null |
Linux | GSD-2022-1001247 | udmabuf: validate ubuf->pagecount | udmabuf: validate ubuf->pagecount
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 9e9b4a269f84d3230f2af84ff42322db676440d9, it was introduced in version v4.20 by commit fbb0de795078190a9834b3409e4b009cfb18a6d4. For more details please see the references link. | null | 2022-04-25T08:04:18.076839Z | 2022-04-24T20:57:34.593318Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fbb0de795078190a9834b3409e4b009cfb18a6d4'} |
Linux | GSD-2021-1002717 | xen/netfront: harden netfront against event channel storms | xen/netfront: harden netfront against event channel storms
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.88 by commit d31b3379179d64724d3bbfa87bd4ada94e3237de. For more details please see the references link. | null | 2022-01-11T06:34:12.049624Z | 2021-12-27T05:38:47.532343Z | null | null | null | null | null |
Linux | GSD-2021-1001838 | mm, slub: fix potential memoryleak in kmem_cache_open() | mm, slub: fix potential memoryleak in kmem_cache_open()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit 568f906340b43120abd6fcc67c37396482f85930, it was introduced in version v4.8 by commit 210e7a43fa905bccafa9bb5966fba1d71f33eb8b. For more details please see the references link. | null | 2021-12-20T00:29:02.956458Z | 2021-10-28T13:51:34.381612Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/210e7a43fa905bccafa9bb5966fba1d71f33eb8b'} |
Linux | GSD-2021-1001091 | mm/slub: actually fix freelist pointer vs redzoning | mm/slub: actually fix freelist pointer vs redzoning
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit ce6e8bee7a3883e8008b30f5887dbb426aac6a35. For more details please see the references link. | null | 2021-12-20T00:13:16.938196Z | 2021-06-30T00:39:00.841579Z | null | null | null | null | null |
Linux | GSD-2022-1000456 | iwlwifi: fix use-after-free | iwlwifi: fix use-after-free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit ddd46059f7d99119b62d44c519df7a79f2e6a515, it was introduced in version v5.15.17 by commit e23f075d77987de4215c8e0696f28bcc707506f7. For more details please see the references link. | null | 2022-03-07T01:46:53.527224Z | 2022-02-27T03:09:26.516049Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e23f075d77987de4215c8e0696f28bcc707506f7'} |
Linux | GSD-2022-1002191 | xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu>=32 | xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu>=32
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 8a7462b5211cd5b74b8815034d038e28cbd96d52. For more details please see the references link. | null | 2022-04-25T03:37:23.086019Z | 2022-04-24T22:20:28.978621Z | null | null | null | null | null |
Linux | GSD-2021-1000907 | scsi: core: Fix error handling of scsi_host_alloc() | scsi: core: Fix error handling of scsi_host_alloc()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.126 by commit 79296e292d67fa7b5fb8d8c27343683e823872c8. For more details please see the references link. | null | 2021-12-20T00:02:11.329103Z | 2021-06-30T00:05:47.105229Z | null | null | null | null | null |
Linux | GSD-2021-1001615 | mcb: fix error handling in mcb_alloc_bus() | mcb: fix error handling in mcb_alloc_bus()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.150 by commit 7751f609eadf36b1f53712bae430019c53a16eb0, it was introduced in version v4.7 by commit 5d9e2ab9fea4cdf0a2522f5cbed2e7fbb220d757. For more details please see the references link. | null | 2021-12-19T23:18:21.951782Z | 2021-10-19T16:28:24.438286Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5d9e2ab9fea4cdf0a2522f5cbed2e7fbb220d757'} |
Linux | GSD-2022-1001990 | x86/Kconfig: Do not allow CONFIG_X86_X32_ABI=y with llvm-objcopy | x86/Kconfig: Do not allow CONFIG_X86_X32_ABI=y with llvm-objcopy
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit 9cb90f9ad5975ddfc90d0906b40e9c71c2eca44e. For more details please see the references link. | null | 2022-04-25T05:36:10.137189Z | 2022-04-24T22:01:35.959378Z | null | null | null | null | null |
Linux | GSD-2022-1000682 | ext4: fix error handling in ext4_fc_record_modified_inode() | ext4: fix error handling in ext4_fc_record_modified_inode()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.8 by commit 14aa3f49c7fc6424763f4323bfbc3a807b0727dc. For more details please see the references link. | null | 2022-03-07T02:53:39.642727Z | 2022-02-27T03:40:26.697725Z | null | null | null | null | null |
Linux | GSD-2022-1002345 | kgdboc: fix return value of __setup handler | kgdboc: fix return value of __setup handler
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 1c3bb588b78e07f97e5a55fb523d103d124050a1, it was introduced in version v4.19.2 by commit df7ada33d6dc57926e25e4cf1a22e80b4f385884. For more details please see the references link. | null | 2022-04-25T04:11:26.022629Z | 2022-04-24T22:36:15.144581Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/df7ada33d6dc57926e25e4cf1a22e80b4f385884'} |
Linux | GSD-2022-1000378 | net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup | net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.101 by commit 758290defe93a865a2880d10c5d5abd288b64b5d, it was introduced in version v3.9 by commit e2ca90c276e1fc410d7cd3c1a4eee245ec902a20. For more details please see the references link. | null | 2022-03-07T01:35:12.030656Z | 2022-02-27T02:58:23.308185Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e2ca90c276e1fc410d7cd3c1a4eee245ec902a20'} |
Linux | GSD-2021-1001245 | net: fix uninit-value in caif_seqpkt_sendmsg | net: fix uninit-value in caif_seqpkt_sendmsg
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.54 by commit 1582a02fecffcee306663035a295e28e1c4aaaff, it was introduced in version v2.6.35 by commit bece7b2398d073d11b2e352405a3ecd3a1e39c60. For more details please see the references link. | null | 2021-12-19T22:38:08.038788Z | 2021-08-03T01:47:52.283971Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bece7b2398d073d11b2e352405a3ecd3a1e39c60'} |
Linux | GSD-2022-1000728 | usb: gadget: rndis: add spinlock for rndis response list | usb: gadget: rndis: add spinlock for rndis response list
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.12 by commit 33222d1571d7ce8c1c75f6b488f38968fa93d2d9, it was introduced in version v4.6 by commit f6281af9d62e128aa6efad29cf7265062af114f2. For more details please see the references link. | null | 2022-03-18T02:56:59.902720Z | 2022-03-18T00:12:52.290465Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f6281af9d62e128aa6efad29cf7265062af114f2'} |
Linux | GSD-2021-1002039 | netfilter: xt_IDLETIMER: fix panic that occurs when timer_type has garbage value | netfilter: xt_IDLETIMER: fix panic that occurs when timer_type has garbage value
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit 2a670c323055282c9b72794a491d53cef86bbeaf, it was introduced in version v5.7 by commit 68983a354a655c35d3fb204489d383a2a051fda7. For more details please see the references link. | null | 2021-12-19T23:51:14.162230Z | 2021-11-14T15:17:07.107707Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/68983a354a655c35d3fb204489d383a2a051fda7'} |
Linux | GSD-2022-1001093 | docs: sysctl/kernel: add missing bit to panic_print | docs: sysctl/kernel: add missing bit to panic_print
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit c459241243ab28e9af1bdbd785ed69230704e1b5, it was introduced in version v5.2 by commit de6da1e8bcf0dd2058b950b127491821207679dc. For more details please see the references link. | null | 2022-04-25T03:31:28.631287Z | 2022-04-24T20:44:43.602603Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/de6da1e8bcf0dd2058b950b127491821207679dc'} |
Linux | GSD-2022-1001569 | ASoC: codecs: wc938x: fix accessing array out of bounds for enum type | ASoC: codecs: wc938x: fix accessing array out of bounds for enum type
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit f03c0c94186d5876857132d97e28f20cdc100bdc, it was introduced in version v5.14 by commit e8ba1e05bdc016700c85fad559a812c2e795442f. For more details please see the references link. | null | 2022-04-25T05:02:48.184421Z | 2022-04-24T21:24:43.520313Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e8ba1e05bdc016700c85fad559a812c2e795442f'} |
Linux | GSD-2021-1000454 | liquidio: Fix unintented sign extension of a left shift of a u16 | liquidio: Fix unintented sign extension of a left shift of a u16
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.191 by commit 85ab024c69fa865a044c586aeb50e6459cd59c37, it was introduced in version v4.9 by commit 5bc67f587ba7eaa8dd3976bfeff8f2b60718c871. For more details please see the references link. | null | 2021-12-20T00:35:23.619107Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5bc67f587ba7eaa8dd3976bfeff8f2b60718c871'} |
Linux | GSD-2021-1002469 | proc/vmcore: fix clearing user buffer by properly using clear_user() | proc/vmcore: fix clearing user buffer by properly using clear_user()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.83 by commit a8a917058faf4abaec9fb614bb6d5f8fe3529ec6, it was introduced in version v3.0 by commit 997c136f518c5debd63847e78e2a8694f56dcf90. For more details please see the references link. | null | 2021-12-19T22:03:19.828164Z | 2021-12-19T19:38:39.995905Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/997c136f518c5debd63847e78e2a8694f56dcf90'} |
Linux | GSD-2022-1001139 | video: fbdev: cirrusfb: check pixclock to avoid divide by zero | video: fbdev: cirrusfb: check pixclock to avoid divide by zero
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit e498b504f8c81b07efab9febf8503448de4dc9cf. For more details please see the references link. | null | 2022-04-25T05:16:03.971917Z | 2022-04-24T20:48:31.484905Z | null | null | null | null | null |
Linux | GSD-2021-1002193 | mm: filemap: check if THP has hwpoisoned subpage for PMD page fault | mm: filemap: check if THP has hwpoisoned subpage for PMD page fault
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit eac96c3efdb593df1a57bb5b95dbe037bfa9a522, it was introduced in version v4.8 by commit 800d8c63b2e989c2e349632d1648119bf5862f01. For more details please see the references link. | null | 2021-12-20T01:16:56.257616Z | 2021-11-14T15:24:08.266580Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/800d8c63b2e989c2e349632d1648119bf5862f01'} |
Linux | GSD-2021-1002486 | sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl | sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.84 by commit 4a46b2f5dce02539e88a300800812bd24a45e097, it was introduced in version v2.6.24 by commit faf0b2e5afe7dae072d2715763c7f992b612b628. For more details please see the references link. | null | 2021-12-20T00:24:38.371976Z | 2021-12-19T19:39:28.212900Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/faf0b2e5afe7dae072d2715763c7f992b612b628'} |
Linux | GSD-2021-1000141 | md/raid1: properly indicate failure when ending a failed write request | md/raid1: properly indicate failure when ending a failed write request
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.36 by commit 661061a45e32d8b2cc0e306da9f169ad44011382, it was introduced in version v5.4 by commit eeba6809d8d58908b5ed1b5ceb5fcb09a98a7cad. For more details please see the references link. | null | 2021-12-19T23:50:47.058657Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/eeba6809d8d58908b5ed1b5ceb5fcb09a98a7cad'} |
Linux | GSD-2021-1000511 | scsi: qedf: Add pointer checks in qedf_update_link_speed() | scsi: qedf: Add pointer checks in qedf_update_link_speed()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.40 by commit a6362a737572f66051deb7637f3f77ddf7a4402f, it was introduced in version v4.11 by commit 61d8658b4a435eac729966cc94cdda077a8df5cd. For more details please see the references link. | null | 2021-12-20T01:00:15.385359Z | 2021-05-31T23:48:29.693093Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61d8658b4a435eac729966cc94cdda077a8df5cd'} |
Linux | GSD-2022-1001586 | btrfs: verify the tranisd of the to-be-written dirty extent buffer | btrfs: verify the tranisd of the to-be-written dirty extent buffer
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 17a2437d44f4bfa1f199343075e6458303a2dceb. For more details please see the references link. | null | 2022-04-25T04:30:05.778058Z | 2022-04-24T21:26:28.922092Z | null | null | null | null | null |
Linux | GSD-2022-1002200 | drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj | drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 4009f104b02b223d1a11d74b36b1cc083bc37028. For more details please see the references link. | null | 2022-04-25T08:31:30.234583Z | 2022-04-24T22:21:07.322179Z | null | null | null | null | null |
Linux | GSD-2021-1000842 | drm: Lock pointer access in drm_master_release() | drm: Lock pointer access in drm_master_release()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.273 by commit 8e250a134c8fe2a945d10b421d0ccb54e85d8683. For more details please see the references link. | null | 2021-12-19T23:03:18.106043Z | 2021-06-30T00:00:46.475562Z | null | null | null | null | null |
Linux | GSD-2021-1001750 | dma-debug: prevent an error message from causing runtime problems | dma-debug: prevent an error message from causing runtime problems
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.9 by commit de4afec2d2946c92c62a15ab341c70b287289e6a. For more details please see the references link. | null | 2021-12-19T22:52:40.693441Z | 2021-10-19T16:34:54.175041Z | null | null | null | null | null |
Linux | GSD-2021-1001300 | udf: Fix NULL pointer dereference in udf_symlink function | udf: Fix NULL pointer dereference in udf_symlink function
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.51 by commit 21bf1414580c36ffc8d8de043beb3508cf812238. For more details please see the references link. | null | 2021-12-19T22:39:02.800485Z | 2021-08-03T02:01:42.190967Z | null | null | null | null | null |
Linux | GSD-2022-1000397 | gcc-plugins/stackleak: Use noinstr in favor of notrace | gcc-plugins/stackleak: Use noinstr in favor of notrace
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.102 by commit 143aaf79bafa9839cabebd49aa10b36f8aaef3ce. For more details please see the references link. | null | 2022-03-07T02:27:11.536493Z | 2022-02-27T03:01:15.418747Z | null | null | null | null | null |
Linux | GSD-2022-1001355 | drbd: Fix five use after free bugs in get_initial_state | drbd: Fix five use after free bugs in get_initial_state
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit de63e74da2333b4068bb79983e632db730fea97e, it was introduced in version v4.5 by commit a29728463b254ce81ecefdf20c1a02e01d9361da. For more details please see the references link. | null | 2022-04-25T04:22:07.106157Z | 2022-04-24T21:07:14.071270Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a29728463b254ce81ecefdf20c1a02e01d9361da'} |
Linux | GSD-2021-1002605 | mtd: rawnand: fsmc: Fix timing computation | mtd: rawnand: fsmc: Fix timing computation
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.8 by commit a4953e7b6f6ab5e1faf3267b5728e40eac1b6f8d, it was introduced in version v4.13 by commit d9fb0795718333e36f7e472d7d81b7b8efe347c8. For more details please see the references link. | null | 2021-12-19T23:19:38.165575Z | 2021-12-19T19:44:45.861136Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9fb0795718333e36f7e472d7d81b7b8efe347c8'} |
Linux | GSD-2021-1000638 | serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' | serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.124 by commit 915452f40e2f495e187276c4407a4f567ec2307e, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T22:27:11.195840Z | 2021-06-04T19:52:43.512672Z | null | null | null | null | null |
Linux | GSD-2021-1000792 | efi/libstub: prevent read overflow in find_file_option() | efi/libstub: prevent read overflow in find_file_option()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit e786eacbf323b632bd4e77fc0f5474b5a422e025, it was introduced in version v5.8 by commit 7a88a6227dc7f2e723bba11ece05e57bd8dce8e4. For more details please see the references link. | null | 2021-12-19T22:51:15.528523Z | 2021-06-25T00:05:56.557149Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7a88a6227dc7f2e723bba11ece05e57bd8dce8e4'} |
Linux | GSD-2021-1001880 | mm/secretmem: fix NULL page->mapping dereference in page_is_secretmem() | mm/secretmem: fix NULL page->mapping dereference in page_is_secretmem()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit b77ba1e02345bafd703f0d407bdbd88c3be1f767, it was introduced in version v5.14 by commit 1507f51255c9ff07d75909a84e7c0d7f3c4b2f49. For more details please see the references link. | null | 2021-12-19T23:49:40.348077Z | 2021-10-28T13:53:40.540005Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1507f51255c9ff07d75909a84e7c0d7f3c4b2f49'} |
Linux | GSD-2022-1001705 | staging: vchiq_core: handle NULL result of find_service_by_handle | staging: vchiq_core: handle NULL result of find_service_by_handle
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 42f2142a337ee372455574809fc924580a7e51b2. For more details please see the references link. | null | 2022-04-25T06:45:18.206306Z | 2022-04-24T21:36:40.671464Z | null | null | null | null | null |
Linux | GSD-2022-1000817 | sr9700: sanity check for packet length | sr9700: sanity check for packet length
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.26 by commit 9f2d614779906f3d8ad4fb882c5b3e5ad6150bbe. For more details please see the references link. | null | 2022-03-18T03:02:07.878645Z | 2022-03-18T00:21:10.535472Z | null | null | null | null | null |
Linux | GSD-2021-1002255 | scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq() | scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.218 by commit b291d147d0268e93ad866f8bc820ea14497abc9b. For more details please see the references link. | null | 2021-12-20T00:37:03.570640Z | 2021-11-29T02:35:35.536638Z | null | null | null | null | null |
Linux | GSD-2021-1000268 | nvmet-tcp: fix incorrect locking in state_change sk callback | nvmet-tcp: fix incorrect locking in state_change sk callback
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 906c538340dde6d891df89fe7dac8eaa724e40da, it was introduced in version v5.0 by commit 872d26a391da92ed8f0c0f5cb5fef428067b7f30. For more details please see the references link. | null | 2021-12-19T23:44:45.053296Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/872d26a391da92ed8f0c0f5cb5fef428067b7f30'} |
Linux | GSD-2022-1000544 | iwlwifi: fix use-after-free | iwlwifi: fix use-after-free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit 9958b9cbb22145295ee1ffaea0904c383da2c05d, it was introduced in version v5.16.3 by commit 6b5ad4bd0d78fef6bbe0ecdf96e09237c9c52cc1. For more details please see the references link. | null | 2022-03-07T01:37:49.434743Z | 2022-02-27T03:21:31.352593Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6b5ad4bd0d78fef6bbe0ecdf96e09237c9c52cc1'} |
Linux | GSD-2022-1002083 | mips: cdmm: Fix refcount leak in mips_cdmm_phys_base | mips: cdmm: Fix refcount leak in mips_cdmm_phys_base
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit ef1728e3cb9e43f38ed10cde705a7ba2b4ad2d35, it was introduced in version v5.9 by commit 2121aa3e2312ccc1d6299154dc4f07a6ab8beee2. For more details please see the references link. | null | 2022-04-25T03:10:06.182454Z | 2022-04-24T22:09:04.600150Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2121aa3e2312ccc1d6299154dc4f07a6ab8beee2'} |
Linux | GSD-2021-1001029 | usb: dwc3-meson-g12a: fix usb2 PHY glue init when phy0 is disabled | usb: dwc3-meson-g12a: fix usb2 PHY glue init when phy0 is disabled
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.11 by commit d8dd3754e707104a34f8ec595034d503ea8871a2, it was introduced in version v5.8 by commit 013af227f58a97ffc61b99301f8f4448dc7e7f55. For more details please see the references link. | null | 2021-12-19T23:07:21.328123Z | 2021-06-30T00:34:56.848978Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/013af227f58a97ffc61b99301f8f4448dc7e7f55'} |
Linux | GSD-2021-1001183 | netfilter: nf_tables: Fix dereference of null pointer flow | netfilter: nf_tables: Fix dereference of null pointer flow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.5 by commit 70a5a1950cca02c5cd161bb3846b4d983eed97d3, it was introduced in version v5.13.2 by commit 09b1f676e2e0bbff67c568672c565c6f31470157. For more details please see the references link. | null | 2021-12-20T01:02:37.135933Z | 2021-08-03T01:33:02.573543Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/09b1f676e2e0bbff67c568672c565c6f31470157'} |
Linux | GSD-2022-1000114 | net: ieee802154: ca8210: Stop leaking skb's | net: ieee802154: ca8210: Stop leaking skb's
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.265 by commit a1c277b0ed2a13e7de923b5f03bc23586eceb851, it was introduced in version v4.12 by commit ded845a781a578dfb0b5b2c138e5a067aa3b1242. For more details please see the references link. | null | 2022-02-19T09:58:19.250667Z | 2022-02-18T21:42:40.239559Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ded845a781a578dfb0b5b2c138e5a067aa3b1242'} |
Linux | GSD-2022-1002129 | mm,hwpoison: unmap poisoned page before invalidation | mm,hwpoison: unmap poisoned page before invalidation
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit bc2f58b8e47cc01cb75e13e29930e4e547d6bc5c, it was introduced in version v5.10.110 by commit fa37c1714367e530f592d451607433ab58d56643. For more details please see the references link. | null | 2022-04-24T22:14:11.289754Z | 2022-04-24T22:14:11.289754Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fa37c1714367e530f592d451607433ab58d56643'} |
Linux | GSD-2021-1001479 | watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() | watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.276 by commit 0015581a79bbf8e521f85dddb7d3e4a66b9f51d4. For more details please see the references link. | null | 2021-12-19T22:13:39.018346Z | 2021-08-03T02:53:44.693283Z | null | null | null | null | null |
Linux | GSD-2021-1001496 | HID: usbhid: free raw_report buffers in usbhid_stop | HID: usbhid: free raw_report buffers in usbhid_stop
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.286 by commit 7ce4e49146612261265671b1d30d117139021030. For more details please see the references link. | null | 2021-12-19T22:26:01.948416Z | 2021-10-19T16:20:51.827025Z | null | null | null | null | null |
Linux | GSD-2022-1000401 | libsubcmd: Fix use-after-free for realloc(..., 0) | libsubcmd: Fix use-after-free for realloc(..., 0)
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.102 by commit 50f3b00d4c7ba9aef6e0be4db192ee81f4f8a125, it was introduced in version v4.5 by commit 2f4ce5ec1d447beb42143a9653716a2ab025161e. For more details please see the references link. | null | 2022-03-07T01:38:22.939956Z | 2022-02-27T03:01:42.679538Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2f4ce5ec1d447beb42143a9653716a2ab025161e'} |
Linux | GSD-2022-1000051 | i2c: validate user data in compat ioctl | i2c: validate user data in compat ioctl
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.13 by commit f68599581067e8a5a8901ba9eb270b4519690e26, it was introduced in version v4.15 by commit 7d5cb45655f2e9e37ef75d18f50c0072ef14a38b. For more details please see the references link. | null | 2022-01-11T05:49:00.740962Z | 2022-01-10T19:51:53.981647Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7d5cb45655f2e9e37ef75d18f50c0072ef14a38b'} |
Linux | GSD-2021-1002740 | inet_diag: fix kernel-infoleak for UDP sockets | inet_diag: fix kernel-infoleak for UDP sockets
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit e5d28205bf1de7082d904ed277ceb2db2879e302, it was introduced in version v3.3 by commit 3c4d05c8056724aff3abc20650807dd828fded54. For more details please see the references link. | null | 2022-01-11T05:56:59.644790Z | 2021-12-27T05:45:59.927603Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c4d05c8056724aff3abc20650807dd828fded54'} |
Linux | GSD-2021-1000287 | m68k: mvme147,mvme16x: Don't wipe PCC timer config bits | m68k: mvme147,mvme16x: Don't wipe PCC timer config bits
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 5d34225169346cab5145978d153b9ce90e9ace21, it was introduced in version v5.2 by commit 7529b90d051e4629884771ba2b1d3a87d2c6a9d7. For more details please see the references link. | null | 2021-12-20T00:39:09.758098Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7529b90d051e4629884771ba2b1d3a87d2c6a9d7'} |
Linux | GSD-2022-1001210 | mips: cdmm: Fix refcount leak in mips_cdmm_phys_base | mips: cdmm: Fix refcount leak in mips_cdmm_phys_base
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 721ab4be20d4448dd04c2cc8ed99cd4f3e45f765, it was introduced in version v5.9 by commit 2121aa3e2312ccc1d6299154dc4f07a6ab8beee2. For more details please see the references link. | null | 2022-04-25T06:46:44.806563Z | 2022-04-24T20:53:58.936800Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2121aa3e2312ccc1d6299154dc4f07a6ab8beee2'} |
Linux | GSD-2021-1002310 | hugetlb, userfaultfd: fix reservation restore on userfaultfd error | hugetlb, userfaultfd: fix reservation restore on userfaultfd error
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit b5069d44e2fbc4a9093d005b3ef0949add3dd27e, it was introduced in version v5.14 by commit c7b1850dfb41d0b4154aca8dbc04777fbd75616f. For more details please see the references link. | null | 2021-12-19T23:47:18.315265Z | 2021-11-29T02:38:12.559139Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c7b1850dfb41d0b4154aca8dbc04777fbd75616f'} |
Linux | GSD-2022-1001640 | dm integrity: fix memory corruption when tag_size is less than digest size | dm integrity: fix memory corruption when tag_size is less than digest size
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.35 by commit 6b4bf97587ef6c1927a78934b700204920655123. For more details please see the references link. | null | 2022-04-25T03:54:28.400427Z | 2022-04-24T21:30:52.576273Z | null | null | null | null | null |
Linux | GSD-2022-1000952 | gso: do not skip outer ip header in case of ipip and net_failover | gso: do not skip outer ip header in case of ipip and net_failover
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.304 by commit 45d006c2c7ed7baf1fa258fa7b5bc9923d3a983e, it was introduced in version v3.13 by commit cb32f511a70be8967ac9025cf49c44324ced9a39. For more details please see the references link. | null | 2022-03-18T03:44:58.539309Z | 2022-03-18T00:36:26.101271Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cb32f511a70be8967ac9025cf49c44324ced9a39'} |
Linux | GSD-2021-1002185 | isdn: mISDN: Fix sleeping function called from invalid context | isdn: mISDN: Fix sleeping function called from invalid context
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 6510e80a0b81b5d814e3aea6297ba42f5e76f73c. For more details please see the references link. | null | 2021-12-20T00:28:30.173934Z | 2021-11-14T15:23:47.897663Z | null | null | null | null | null |
Linux | GSD-2021-1000442 | ACPI: scan: Fix a memory leak in an error handling path | ACPI: scan: Fix a memory leak in an error handling path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.191 by commit 69cc821e89ce572884548ac54c4f80eec7a837a5, it was introduced in version v4.19.184 by commit 7385e438e1f31af5b86f72fd19b0dcd2738502c9. For more details please see the references link. | null | 2021-12-19T23:04:49.277354Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7385e438e1f31af5b86f72fd19b0dcd2738502c9'} |
Linux | GSD-2022-1001085 | Bluetooth: hci_event: Ignore multiple conn complete events | Bluetooth: hci_event: Ignore multiple conn complete events
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit aa1ca580e3ffe62a2c5ea1c095b609b2943c5269. For more details please see the references link. | null | 2022-04-25T04:23:16.673309Z | 2022-04-24T20:44:08.956228Z | null | null | null | null | null |
Linux | GSD-2021-1000012 | KVM: VMX: Don't use vcpu->run->internal.ndata as an array index | KVM: VMX: Don't use vcpu->run->internal.ndata as an array index
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.16 by commit ce541d7b59566a0d94c7c99bfb5d34b050e6af70, it was introduced in version v5.9 by commit 1aa561b1a4c0ae2a9a9b9c21a84b5ca66b4775d8. For more details please see the references link. | null | 2021-12-20T01:08:06.873919Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1aa561b1a4c0ae2a9a9b9c21a84b5ca66b4775d8'} |
Linux | GSD-2021-1001253 | bpf: Track subprog poke descriptors correctly and fix use-after-free | bpf: Track subprog poke descriptors correctly and fix use-after-free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.53 by commit a9f36bf3613c65cb587c70fac655c775d911409b, it was introduced in version v5.10 by commit a748c6975dea325da540610c2ba9b5f332c603e6. For more details please see the references link. | null | 2021-12-19T23:04:18.599831Z | 2021-08-03T01:49:11.858893Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a748c6975dea325da540610c2ba9b5f332c603e6'} |
Linux | GSD-2022-1002353 | power: supply: wm8350-power: Add missing free in free_charger_irq | power: supply: wm8350-power: Add missing free in free_charger_irq
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 60dd1082322966f192f42fe2a6605dfa08eef41f, it was introduced in version v2.6.29 by commit 14431aa0c5a443d13d24e6f865a8838f97dab973. For more details please see the references link. | null | 2022-04-25T02:50:23.914521Z | 2022-04-24T22:37:34.679891Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/14431aa0c5a443d13d24e6f865a8838f97dab973'} |
Linux | GSD-2022-1000694 | ibmvnic: free reset-work-item when flushing | ibmvnic: free reset-work-item when flushing
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.13 by commit 4c26745e4576cec224092e6cc12e37829333b183, it was introduced in version v4.18 by commit 2770a7984db588913e11a6dfcfe3461dbba9b7b2. For more details please see the references link. | null | 2022-03-18T03:00:39.456547Z | 2022-03-18T00:10:05.832369Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2770a7984db588913e11a6dfcfe3461dbba9b7b2'} |
Linux | GSD-2022-1001986 | scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one() | scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit c5f77b595379b5191316edd365a542f8b1526066, it was introduced in version v2.6.23 by commit 45804fbb00eea27bdf4d62751681228a9e2844e9. For more details please see the references link. | null | 2022-04-25T05:38:09.837812Z | 2022-04-24T22:01:19.918938Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/45804fbb00eea27bdf4d62751681228a9e2844e9'} |
Linux | GSD-2021-1001603 | crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() | crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.151 by commit 24f3d2609114f1e1f6b487b511ce5fa36f21e0ae, it was introduced in version v4.12 by commit 36cf515b9bbe298e1ce7384620f0d4ec45ad3328. For more details please see the references link. | null | 2021-12-19T23:35:28.299595Z | 2021-10-19T16:27:50.033767Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/36cf515b9bbe298e1ce7384620f0d4ec45ad3328'} |
Linux | GSD-2021-1000911 | gfs2: Fix use-after-free in gfs2_glock_shrink_scan | gfs2: Fix use-after-free in gfs2_glock_shrink_scan
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.127 by commit 86fd5b27db743a0ce0cc245e3a34813b2aa6ec1d. For more details please see the references link. | null | 2021-12-20T00:52:33.314963Z | 2021-06-30T00:06:01.924010Z | null | null | null | null | null |
Linux | GSD-2022-1000381 | fs/proc: task_mmu.c: don't read mapcount for migration entry | fs/proc: task_mmu.c: don't read mapcount for migration entry
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.102 by commit db3f3636e4aed2cba3e4e7897a053323f7a62249, it was introduced in version v4.5 by commit e9b61f19858a5d6c42ce2298cf138279375d0d9b. For more details please see the references link. | null | 2022-03-07T01:39:05.458691Z | 2022-02-27T02:58:43.516281Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e9b61f19858a5d6c42ce2298cf138279375d0d9b'} |
Linux | GSD-2021-1001316 | igc: Fix use-after-free error during reset | igc: Fix use-after-free error during reset
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.136 by commit a9508e0edfe369ac95d0825bcdca976436ce780f, it was introduced in version v4.20 by commit 13b5b7fd6a4a96dffe604f25e7b64cfbd9520924. For more details please see the references link. | null | 2021-12-20T00:44:43.555412Z | 2021-08-03T02:06:33.344096Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/13b5b7fd6a4a96dffe604f25e7b64cfbd9520924'} |
Linux | GSD-2022-1001969 | irqchip/gic-v3: Fix GICR_CTLR.RWP polling | irqchip/gic-v3: Fix GICR_CTLR.RWP polling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit ff24114bb08d8b90edf2aff0a4fd0689523e6c17, it was introduced in version v3.17 by commit 021f653791ad17e03f98aaa7fb933816ae16f161. For more details please see the references link. | null | 2022-04-25T04:52:19.776689Z | 2022-04-24T21:59:32.414728Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/021f653791ad17e03f98aaa7fb933816ae16f161'} |
Linux | GSD-2021-1001746 | xen/balloon: use a kernel thread instead a workqueue | xen/balloon: use a kernel thread instead a workqueue
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.9 by commit 922fd5b6bb13ad31ff36e86e2eba2f26d8135272. For more details please see the references link. | null | 2021-12-19T23:01:49.480123Z | 2021-10-19T16:34:41.886446Z | null | null | null | null | null |
Linux | GSD-2021-1000854 | net/qla3xxx: fix schedule while atomic in ql_sem_spinlock | net/qla3xxx: fix schedule while atomic in ql_sem_spinlock
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.237 by commit b0b447bcdeda85fa66782ee8ea1758d55eeec224. For more details please see the references link. | null | 2021-12-19T23:08:00.498418Z | 2021-06-30T00:01:32.121547Z | null | null | null | null | null |
Linux | GSD-2022-1002216 | video: fbdev: cirrusfb: check pixclock to avoid divide by zero | video: fbdev: cirrusfb: check pixclock to avoid divide by zero
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 53a2088a396cfa1da92690a1da289634cd73bf0d. For more details please see the references link. | null | 2022-04-25T05:55:56.849121Z | 2022-04-24T22:22:36.626800Z | null | null | null | null | null |
Linux | GSD-2022-1001590 | brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path | brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 4e0b507597e1a86e9b4c056ab274c427223cf8ea, it was introduced in version v5.4 by commit 82f93cf46d6007ffa003b2d4a2834563b6b84d21. For more details please see the references link. | null | 2022-04-25T05:26:33.458517Z | 2022-04-24T21:26:46.902836Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/82f93cf46d6007ffa003b2d4a2834563b6b84d21'} |
Linux | GSD-2021-1000507 | uio_hv_generic: Fix a memory leak in error handling paths | uio_hv_generic: Fix a memory leak in error handling paths
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.40 by commit d84b5e912212b05f6b5bde9f682046accfbe0354, it was introduced in version v4.20 by commit cdfa835c6e5e87d145f9f632b58843de97509f2b. For more details please see the references link. | null | 2021-12-20T01:26:26.310222Z | 2021-05-31T23:47:45.168017Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cdfa835c6e5e87d145f9f632b58843de97509f2b'} |
Linux | GSD-2021-1000157 | ovl: fix leaked dentry | ovl: fix leaked dentry
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.35 by commit 71d58457a8afc650da5d3292a7f7029317654d95, it was introduced in version v5.8 by commit 6815f479ca90ee7fd2e28b2a420f796b974155fe. For more details please see the references link. | null | 2021-12-20T01:15:24.822179Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6815f479ca90ee7fd2e28b2a420f796b974155fe'} |
Linux | GSD-2021-1002490 | tcp: fix page frag corruption on page fault | tcp: fix page frag corruption on page fault
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.84 by commit c6f340a331fb72e5ac23a083de9c780e132ca3ae, it was introduced in version v3.7 by commit 5640f7685831e088fe6c2e1f863a6805962f8e81. For more details please see the references link. | null | 2021-12-20T00:36:45.467051Z | 2021-12-19T19:39:38.501619Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5640f7685831e088fe6c2e1f863a6805962f8e81'} |
Linux | GSD-2022-1000102 | net: fix information leakage in /proc/net/ptype | net: fix information leakage in /proc/net/ptype
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.265 by commit c38023032a598ec6263e008d62c7f02def72d5c7, it was introduced in version v2.6.26 by commit 2feb27dbe00cbb4f7d31f90acf6bd0d751dd0a50. For more details please see the references link. | null | 2022-02-20T01:59:38.996357Z | 2022-02-18T21:35:25.165532Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2feb27dbe00cbb4f7d31f90acf6bd0d751dd0a50'} |
Linux | GSD-2021-1001195 | watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() | watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.4 by commit f0feab82f6a0323f54d85e8b512a2be64f83648a. For more details please see the references link. | null | 2021-12-20T00:23:13.205554Z | 2021-08-03T01:34:16.271668Z | null | null | null | null | null |
Linux | GSD-2022-1002095 | power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init | power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 879356a6a05559582b0a7895d86d2d4359745c08, it was introduced in version v4.9 by commit 8c0984e5a75337df513047ec92a6c09d78e3e5cd. For more details please see the references link. | null | 2022-04-25T03:12:09.423079Z | 2022-04-24T22:10:32.888746Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c0984e5a75337df513047ec92a6c09d78e3e5cd'} |
Linux | GSD-2022-1000552 | drop_monitor: fix data-race in dropmon_net_event / trace_napi_poll_hit | drop_monitor: fix data-race in dropmon_net_event / trace_napi_poll_hit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit 234ffe4e4854858e3a2a3a457b622bb043bc10c2, it was introduced in version v2.6.31 by commit 4ea7e38696c7e798c47ebbecadfd392f23f814f9. For more details please see the references link. | null | 2022-03-07T01:37:16.982703Z | 2022-02-27T03:23:05.267412Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4ea7e38696c7e798c47ebbecadfd392f23f814f9'} |
Linux | GSD-2021-1002243 | scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq() | scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.256 by commit f05a0191b90156e539cccc189b9d87ca2a4d9305. For more details please see the references link. | null | 2021-12-20T00:17:20.488226Z | 2021-11-29T02:34:57.802519Z | null | null | null | null | null |
Linux | GSD-2022-1000801 | RDMA/ib_srp: Fix a deadlock | RDMA/ib_srp: Fix a deadlock
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.26 by commit c8b56e51aa91b8e7df3a98388dce3fdabd15c1d4, it was introduced in version v3.8 by commit ef6c49d87c3418c442a22e55e3ce2f91b163d69e. For more details please see the references link. | null | 2022-03-18T04:20:04.285924Z | 2022-03-18T00:19:26.705367Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef6c49d87c3418c442a22e55e3ce2f91b163d69e'} |
Linux | GSD-2022-1001713 | scsi: libfc: Fix use after free in fc_exch_abts_resp() | scsi: libfc: Fix use after free in fc_exch_abts_resp()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit f581df412bc45c95176e3c808ee2839c05b2ab0c. For more details please see the references link. | null | 2022-04-25T04:23:09.487173Z | 2022-04-24T21:37:03.804426Z | null | null | null | null | null |
Linux | GSD-2021-1001896 | mptcp: fix possible stall on recvmsg() | mptcp: fix possible stall on recvmsg()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit 1a4554e94f0deff9fc1dc5addf93fa579cc29711, it was introduced in version v5.6 by commit 7a6a6cbc3e592e339ad23e4e8ede9a3f6160bda8. For more details please see the references link. | null | 2021-12-20T01:31:09.256052Z | 2021-10-28T13:54:35.220932Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7a6a6cbc3e592e339ad23e4e8ede9a3f6160bda8'} |
Linux | GSD-2021-1000784 | btrfs: abort in rename_exchange if we fail to insert the second ref | btrfs: abort in rename_exchange if we fail to insert the second ref
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.43 by commit 0df50d47d17401f9f140dfbe752a65e5d72f9932, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T22:12:29.909332Z | 2021-06-25T00:05:25.777513Z | null | null | null | null | null |
Linux | GSD-2021-1002613 | dm btree remove: fix use after free in rebalance_children() | dm btree remove: fix use after free in rebalance_children()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.296 by commit a48f6a2bf33734ec5669ee03067dfb6c5b4818d6. For more details please see the references link. | null | 2022-01-11T05:52:39.599722Z | 2021-12-27T05:27:14.742611Z | null | null | null | null | null |
Linux | GSD-2022-1001343 | irqchip/gic-v3: Fix GICR_CTLR.RWP polling | irqchip/gic-v3: Fix GICR_CTLR.RWP polling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 60e1eb4811f53f5f60c788297d978515e7a2637a, it was introduced in version v3.17 by commit 021f653791ad17e03f98aaa7fb933816ae16f161. For more details please see the references link. | null | 2022-04-25T04:28:12.255714Z | 2022-04-24T21:06:15.582443Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/021f653791ad17e03f98aaa7fb933816ae16f161'} |
Linux | GSD-2022-1000944 | cifs: fix double free race when mount fails in cifs_get_root() | cifs: fix double free race when mount fails in cifs_get_root()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.305 by commit da834d6c1147c7519a9e55b510a03b7055104749. For more details please see the references link. | null | 2022-03-18T03:00:13.636216Z | 2022-03-18T00:35:01.414884Z | null | null | null | null | null |
Linux | GSD-2022-1001656 | net/smc: Fix NULL pointer dereference in smc_pnet_find_ib() | net/smc: Fix NULL pointer dereference in smc_pnet_find_ib()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.35 by commit 3a523807f01455fe9a0c1a433f27cd4411ee400f, it was introduced in version v5.1 by commit af5f60c7e3d593c2fa31b9a62c16eae75f074de3. For more details please see the references link. | null | 2022-04-25T04:56:04.690811Z | 2022-04-24T21:32:04.602783Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/af5f60c7e3d593c2fa31b9a62c16eae75f074de3'} |
Linux | GSD-2021-1002306 | cfg80211: call cfg80211_stop_ap when switch from P2P_GO type | cfg80211: call cfg80211_stop_ap when switch from P2P_GO type
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit 5a9b671c8d74a3e1b999e7a0c7f366079bcc93dd, it was introduced in version v3.6 by commit ac800140c20e7ae51117e71289065bedd4930fc2. For more details please see the references link. | null | 2021-12-19T22:21:01.476516Z | 2021-11-29T02:38:03.332775Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac800140c20e7ae51117e71289065bedd4930fc2'} |
Linux | GSD-2022-1001206 | bpf, sockmap: Fix memleak in sk_psock_queue_msg | bpf, sockmap: Fix memleak in sk_psock_queue_msg
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 03948ed6553960db62f1c33bec29e64d7c191a3f, it was introduced in version v5.14 by commit 9635720b7c88592214562cb72605bdab6708006c. For more details please see the references link. | null | 2022-04-25T06:45:53.507766Z | 2022-04-24T20:53:39.529495Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9635720b7c88592214562cb72605bdab6708006c'} |
Linux | GSD-2021-1000291 | Drivers: hv: vmbus: Drop error message when 'No request id available' | Drivers: hv: vmbus: Drop error message when 'No request id available'
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 9dbd136aff69d3e197e733af56e57b1aa8e917ab, it was introduced in version v5.11 by commit e8b7db38449ac5b950a3f00519171c4be3e226ff. For more details please see the references link. | null | 2021-12-20T01:08:55.081012Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e8b7db38449ac5b950a3f00519171c4be3e226ff'} |
Linux | GSD-2021-1001879 | blk-cgroup: blk_cgroup_bio_start() should use irq-safe operations on blkg->iostat_cpu | blk-cgroup: blk_cgroup_bio_start() should use irq-safe operations on blkg->iostat_cpu
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit b1a34f86b41fd89441fa0e245b6b23627b0d73d3, it was introduced in version v5.13 by commit 2d146aa3aa842d7f5065802556b4f9a2c6e8ef12. For more details please see the references link. | null | 2021-12-19T23:16:38.317407Z | 2021-10-28T13:53:37.977143Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2d146aa3aa842d7f5065802556b4f9a2c6e8ef12'} |
Linux | GSD-2021-1002756 | selinux: fix sleeping function called from invalid context | selinux: fix sleeping function called from invalid context
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit d1bac0d97bc9b18b7c077a66375cc4282d01c367, it was introduced in version v5.13 by commit 69c4a42d72eb9b41e1c6e4bc9ab7f3650bf35f62. For more details please see the references link. | null | 2022-01-11T05:58:29.793130Z | 2021-12-27T05:48:31.023188Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69c4a42d72eb9b41e1c6e4bc9ab7f3650bf35f62'} |
Linux | GSD-2022-1000047 | parisc: Clear stale IIR value on instruction access rights trap | parisc: Clear stale IIR value on instruction access rights trap
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.90 by commit d01e9ce1af6116f812491d3d3873d204f10ae0b8. For more details please see the references link. | null | 2022-01-11T05:53:23.604346Z | 2022-01-10T19:51:44.004435Z | null | null | null | null | null |
Linux | GSD-2022-1000417 | scsi: target: iscsi: Make sure the np under each tpg is unique | scsi: target: iscsi: Make sure the np under each tpg is unique
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit 4f786e8f18c3e80a168aac3e4f9da99310b8fcdd. For more details please see the references link. | null | 2022-03-07T01:39:59.961839Z | 2022-02-27T03:04:11.348563Z | null | null | null | null | null |
Linux | GSD-2021-1001480 | watchdog: Fix possible use-after-free in wdt_startup() | watchdog: Fix possible use-after-free in wdt_startup()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.276 by commit 63a3dc24bd053792f84cb4eef0168b1266202a02. For more details please see the references link. | null | 2021-12-19T23:14:41.470118Z | 2021-08-03T02:53:59.836201Z | null | null | null | null | null |
Linux | GSD-2021-1001654 | mac80211: fix use-after-free in CCMP/GCMP RX | mac80211: fix use-after-free in CCMP/GCMP RX
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.71 by commit 57de2dcb18742dc2860861c9f496da7d42b67da0, it was introduced in version v5.10.42 by commit e64ea0597050157f926ac2ba9b478a44ee5be945. For more details please see the references link. | null | 2021-12-19T22:57:50.738070Z | 2021-10-19T16:30:13.802770Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e64ea0597050157f926ac2ba9b478a44ee5be945'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.