ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2021-1000946 | drm: Fix use-after-free read in drm_getunique() | drm: Fix use-after-free read in drm_getunique()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.44 by commit 491d52e0078860b33b6c14f0a7ac74ca1b603bd6. For more details please see the references link. | null | 2021-12-20T00:49:34.823452Z | 2021-06-30T00:28:29.252345Z | null | null | null | null | null |
Linux | GSD-2022-1000339 | net: do not keep the dst cache when uncloning an skb dst and its metadata | net: do not keep the dst cache when uncloning an skb dst and its metadata
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.180 by commit 0b6087c6358656dd39dc714233d5183abc9c47a1, it was introduced in version v4.6 by commit d71785ffc7e7cae3fbdc4ea8a9d05b7a1c59f7b8. For more details please see the references link. | null | 2022-03-07T01:39:38.329954Z | 2022-02-27T02:53:15.365759Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d71785ffc7e7cae3fbdc4ea8a9d05b7a1c59f7b8'} |
Linux | GSD-2022-1002304 | ata: sata_dwc_460ex: Fix crash due to OOB write | ata: sata_dwc_460ex: Fix crash due to OOB write
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 596c7efd69aae94f4b0e91172b075eb197958b99, it was introduced in version v4.18 by commit 28361c403683c2b00d4f5e76045f3ccd299bf99d. For more details please see the references link. | null | 2022-04-25T07:10:41.833516Z | 2022-04-24T22:32:27.812957Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/28361c403683c2b00d4f5e76045f3ccd299bf99d'} |
Linux | GSD-2022-1000293 | vsock: remove vsock from connected table when connect is interrupted by a signal | vsock: remove vsock from connected table when connect is interrupted by a signal
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.303 by commit 0bb88f3f7e8d506f3efe46d694964117e20efbfc, it was introduced in version v3.9 by commit d021c344051af91f42c5ba9fdedc176740cbd238. For more details please see the references link. | null | 2022-03-07T01:34:40.655452Z | 2022-02-27T02:47:21.571281Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d021c344051af91f42c5ba9fdedc176740cbd238'} |
Linux | GSD-2021-1001204 | ALSA: usx2y: Don't call free_pages_exact() with NULL address | ALSA: usx2y: Don't call free_pages_exact() with NULL address
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.4 by commit 82e5ee742fdd8874fe996181b87fafe1eb5f1196. For more details please see the references link. | null | 2021-12-20T01:00:12.608106Z | 2021-08-03T01:36:44.067049Z | null | null | null | null | null |
Linux | GSD-2022-1000769 | net: ipv6: ensure we call ipv6_mc_down() at most once | net: ipv6: ensure we call ipv6_mc_down() at most once
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.27 by commit b11781515208dd31fbcd0b664078dce5dc44523f, it was introduced in version v3.18 by commit 3ce62a84d53cd3d3cc5377bbf339e9b08ddf9c36. For more details please see the references link. | null | 2022-03-18T03:01:20.671128Z | 2022-03-18T00:16:40.330909Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3ce62a84d53cd3d3cc5377bbf339e9b08ddf9c36'} |
Linux | GSD-2021-1002078 | dm: fix mempool NULL pointer race when completing IO | dm: fix mempool NULL pointer race when completing IO
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit 6e506f07c5b561d673dd0b0d8f7f420cc48024fb. For more details please see the references link. | null | 2021-12-20T00:08:23.391275Z | 2021-11-14T15:18:50.945333Z | null | null | null | null | null |
Linux | GSD-2021-1000045 | KEYS: trusted: Fix TPM reservation for seal/unseal | KEYS: trusted: Fix TPM reservation for seal/unseal
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.33 by commit bf84ef2dd2ccdcd8f2658476d34b51455f970ce4, it was introduced in version v5.10.20 by commit 67118bb78d72aab5b831f054a74ae856339a1974. For more details please see the references link. | null | 2021-12-19T23:46:32.817385Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/67118bb78d72aab5b831f054a74ae856339a1974'} |
Linux | GSD-2021-1002582 | serial: liteuart: fix minor-number leak on probe errors | serial: liteuart: fix minor-number leak on probe errors
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.7 by commit 888fc81107cacd2a4f681bac7bb785cef868214f, it was introduced in version v5.11 by commit 1da81e5562fac8286567422cc56a7fbd0dc646d4. For more details please see the references link. | null | 2021-12-19T22:28:24.743144Z | 2021-12-19T19:43:42.449099Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1da81e5562fac8286567422cc56a7fbd0dc646d4'} |
Linux | GSD-2022-1001528 | powerpc: 8xx: fix a return value error in mpc8xx_pic_init | powerpc: 8xx: fix a return value error in mpc8xx_pic_init
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 48f4f19937f46b5f141dd1e22253d0158c22d6c6, it was introduced in version v5.2 by commit cc76404feaed597bb4f5234d34d3f49e2d1139bf. For more details please see the references link. | null | 2022-04-25T06:19:47.225252Z | 2022-04-24T21:20:21.051722Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cc76404feaed597bb4f5234d34d3f49e2d1139bf'} |
Linux | GSD-2022-1001482 | block, bfq: don't move oom_bfqq | block, bfq: don't move oom_bfqq
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 87fdfe8589d43e471dffb4c60f75eeb6f37afc4c. For more details please see the references link. | null | 2022-04-25T05:17:39.243050Z | 2022-04-24T21:15:59.309273Z | null | null | null | null | null |
Linux | GSD-2021-1002428 | ALSA: pcm: oss: Fix negative period/buffer sizes | ALSA: pcm: oss: Fix negative period/buffer sizes
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.221 by commit f96c0959c1ee92adc911c10d6ec209af50105049. For more details please see the references link. | null | 2021-12-19T23:30:15.081199Z | 2021-12-19T19:36:53.881842Z | null | null | null | null | null |
Linux | GSD-2021-1000415 | ceph: fix inode leak on getattr error in __fh_to_dentry | ceph: fix inode leak on getattr error in __fh_to_dentry
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.120 by commit 2ad8af2b70e986284050213230428b823b950a38, it was introduced in version v5.4.49 by commit 807460787179dee5f74906965eeb5f3ca2353992. For more details please see the references link. | null | 2021-12-20T01:20:03.867224Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/807460787179dee5f74906965eeb5f3ca2353992'} |
Linux | GSD-2022-1001178 | kgdboc: fix return value of __setup handler | kgdboc: fix return value of __setup handler
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit d65c2d76062012e542f765911ca8eecec36df5bb, it was introduced in version v4.20 by commit 1bd54d851f50dea6af30c3e6ff4f3e9aab5558f9. For more details please see the references link. | null | 2022-04-25T04:32:20.030398Z | 2022-04-24T20:51:02.368316Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1bd54d851f50dea6af30c3e6ff4f3e9aab5558f9'} |
Linux | GSD-2022-1001197 | RDMA/nldev: Prevent underflow in nldev_stat_set_counter_dynamic_doit() | RDMA/nldev: Prevent underflow in nldev_stat_set_counter_dynamic_doit()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 2a495ef04d5f42e6f00eb2bec1ee9075e3d5a771, it was introduced in version v5.16 by commit 3c3c1f1416392382faa0238e76a70d7810aab2ef. For more details please see the references link. | null | 2022-04-25T06:34:53.667390Z | 2022-04-24T20:52:55.953022Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c3c1f1416392382faa0238e76a70d7810aab2ef'} |
Linux | GSD-2021-1000100 | media: dvbdev: Fix memory leak in dvb_media_device_free() | media: dvbdev: Fix memory leak in dvb_media_device_free()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.20 by commit 9ad15e214fcd73694ea51967d86055f47b802066, it was introduced in version v4.5 by commit 0230d60e4661d9ced6fb0b9a30f182ebdafbba7a. For more details please see the references link. | null | 2021-12-20T00:00:47.311255Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0230d60e4661d9ced6fb0b9a30f182ebdafbba7a'} |
Linux | GSD-2021-1002097 | ice: Avoid crash from unnecessary IDA free | ice: Avoid crash from unnecessary IDA free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit 777682e59840e24e6c5672197e6ffbcf4bff823b, it was introduced in version v5.14 by commit d25a0fc41c1f927bb914e72a03c1898052557406. For more details please see the references link. | null | 2021-12-20T01:38:59.553710Z | 2021-11-14T15:19:47.065085Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d25a0fc41c1f927bb914e72a03c1898052557406'} |
Linux | GSD-2021-1000550 | net: dsa: fix a crash if ->get_sset_count() fails | net: dsa: fix a crash if ->get_sset_count() fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit 7b22466648a4f8e3e94f57ca428d1531866d1373, it was introduced in version v4.7 by commit badf3ada60ab8f76f9488dc8f5c0c57f70682f5a. For more details please see the references link. | null | 2021-12-19T22:21:48.209387Z | 2021-06-04T19:37:05.334059Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/badf3ada60ab8f76f9488dc8f5c0c57f70682f5a'} |
Linux | GSD-2022-1002241 | bpf, sockmap: Fix memleak in tcp_bpf_sendmsg while sk msg is full | bpf, sockmap: Fix memleak in tcp_bpf_sendmsg while sk msg is full
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 6d03722c34d9603df325f67c6d30dc1b7b3c6067, it was introduced in version v4.20 by commit 604326b41a6fb9b4a78b6179335decee0365cd8c. For more details please see the references link. | null | 2022-04-25T05:10:00.973884Z | 2022-04-24T22:25:01.327051Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/604326b41a6fb9b4a78b6179335decee0365cd8c'} |
Linux | GSD-2022-1000786 | cifs: fix double free race when mount fails in cifs_get_root() | cifs: fix double free race when mount fails in cifs_get_root()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.27 by commit 546d60859ecf13380fcabcbeace53a5971493a2b. For more details please see the references link. | null | 2022-03-18T02:53:08.359668Z | 2022-03-18T00:17:58.336907Z | null | null | null | null | null |
Linux | GSD-2022-1001894 | crypto: ccp - Ensure psp_ret is always init'd in __sev_platform_init_locked() | crypto: ccp - Ensure psp_ret is always init'd in __sev_platform_init_locked()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 0e67b3e1f93a6d368ab0cebce5b3ef5e6af785a1, it was introduced in version v5.15.17 by commit c0713b3017a8057819173830dc273c8fec4b0b77. For more details please see the references link. | null | 2022-04-25T03:04:01.219250Z | 2022-04-24T21:52:48.043479Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c0713b3017a8057819173830dc273c8fec4b0b77'} |
Linux | GSD-2021-1001711 | ext4: fix reserved space counter leakage | ext4: fix reserved space counter leakage
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit 9bef6f6e2172f34e988b4a381b16bf2e30f3fbfa, it was introduced in version v3.8 by commit 51865fda28e585bdcc164474ff6438a9ccdbfada. For more details please see the references link. | null | 2021-12-20T01:13:29.769901Z | 2021-10-19T16:33:02.761168Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/51865fda28e585bdcc164474ff6438a9ccdbfada'} |
Linux | GSD-2021-1000803 | amdgpu: fix GEM obj leak in amdgpu_display_user_framebuffer_create | amdgpu: fix GEM obj leak in amdgpu_display_user_framebuffer_create
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit 5a5357cd2cd9a38944594eb5cd74377932e176bf, it was introduced in version v4.12 by commit 1769152ac64b0b07583f696b621624df2ca4c840. For more details please see the references link. | null | 2021-12-19T23:36:12.807964Z | 2021-06-25T00:08:23.166847Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1769152ac64b0b07583f696b621624df2ca4c840'} |
Linux | GSD-2021-1001341 | misc/libmasm/module: Fix two use after free in ibmasm_init_one | misc/libmasm/module: Fix two use after free in ibmasm_init_one
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.134 by commit 38660031e80eaa6cc9370b031c180612f414b00d. For more details please see the references link. | null | 2021-12-20T00:52:39.541719Z | 2021-08-03T02:13:07.423609Z | null | null | null | null | null |
Linux | GSD-2022-1001314 | pinctrl: samsung: drop pin banks references on error paths | pinctrl: samsung: drop pin banks references on error paths
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 22762140419aa06c178979aa26be59be2fee7231, it was introduced in version v3.8 by commit ab663789d69760d2735402f66501f20b60312a3d. For more details please see the references link. | null | 2022-04-25T05:44:48.731865Z | 2022-04-24T21:03:57.585660Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab663789d69760d2735402f66501f20b60312a3d'} |
Linux | GSD-2021-1000383 | crypto: sun8i-ss - Fix memory leak of pad | crypto: sun8i-ss - Fix memory leak of pad
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 2c67a9333da9d0a3b87310e0d116b7c9070c7b00, it was introduced in version v5.10 by commit d9b45418a91773b7672e4c60037a28074b495c6d. For more details please see the references link. | null | 2021-12-19T23:34:15.964095Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9b45418a91773b7672e4c60037a28074b495c6d'} |
Linux | GSD-2021-1000679 | serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' | serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.235 by commit 1cc57cb32c84e059bd158494f746b665fc14d1b1, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T22:47:46.178075Z | 2021-06-04T20:00:34.561310Z | null | null | null | null | null |
Linux | GSD-2021-1002644 | mac80211: validate extended element ID is present | mac80211: validate extended element ID is present
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.222 by commit 03029bb044ccee60adbc93e70713f3ae58abc3a1, it was introduced in version v4.19 by commit 41cbb0f5a29592874355e4159489eb08337cd50e. For more details please see the references link. | null | 2022-01-11T05:56:56.321316Z | 2021-12-27T05:29:16.562228Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41cbb0f5a29592874355e4159489eb08337cd50e'} |
Linux | GSD-2022-1000856 | spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() | spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.103 by commit 2efece1368aeee2d2552c7ec36aeb676c4d4c95f, it was introduced in version v5.2 by commit 67dca5e580f1e93a66177389981541cac208c817. For more details please see the references link. | null | 2022-03-18T03:33:49.325243Z | 2022-03-18T00:24:56.035346Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/67dca5e580f1e93a66177389981541cac208c817'} |
Linux | GSD-2022-1001744 | coredump: Use the vma snapshot in fill_files_note | coredump: Use the vma snapshot in fill_files_note
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 39fd0cc079c98dafcf355997ada7b5e67f0bb10a, it was introduced in version v5.10 by commit a07279c9a8cd7dbd321640ff7210591599ee00a4. For more details please see the references link. | null | 2022-04-25T05:43:50.481786Z | 2022-04-24T21:38:53.682744Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a07279c9a8cd7dbd321640ff7210591599ee00a4'} |
Linux | GSD-2021-1000229 | net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send | net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit e407495ba6788a67d1bd41714158c079e340879b, it was introduced in version v4.9 by commit b9b17debc69d27cd55e21ee51a5ba7fc50a426cf. For more details please see the references link. | null | 2021-12-20T01:03:02.057731Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b9b17debc69d27cd55e21ee51a5ba7fc50a426cf'} |
Linux | GSD-2021-1002214 | comedi: vmk80xx: fix transfer-buffer overflows | comedi: vmk80xx: fix transfer-buffer overflows
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.2 by commit 06ac746d57e6d32b062e220415c607b7e2e0fa50, it was introduced in version v2.6.31 by commit 985cafccbf9b7f862aa1c5ee566801e18b5161fb. For more details please see the references link. | null | 2021-12-19T22:46:05.332999Z | 2021-11-14T15:25:06.784110Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/985cafccbf9b7f862aa1c5ee566801e18b5161fb'} |
Linux | GSD-2022-1000505 | KVM: eventfd: Fix false positive RCU usage warning | KVM: eventfd: Fix false positive RCU usage warning
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit d851051d25c26f204b1b93c3722471d8efb53227. For more details please see the references link. | null | 2022-03-07T03:20:57.767018Z | 2022-02-27T03:16:16.874259Z | null | null | null | null | null |
Linux | GSD-2021-1001592 | net: hns3: do not allow call hns3_nic_net_open repeatedly | net: hns3: do not allow call hns3_nic_net_open repeatedly
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.151 by commit 5a31d4e73ada8022427b69b10fd1f01a6a8d4b3d, it was introduced in version v5.0 by commit e888402789b9db5de4fcda361331d66dbf0cd9fd. For more details please see the references link. | null | 2021-12-20T01:12:24.810517Z | 2021-10-19T16:25:21.140983Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e888402789b9db5de4fcda361331d66dbf0cd9fd'} |
Linux | GSD-2021-1001068 | net: usb: fix possible use-after-free in smsc75xx_bind | net: usb: fix possible use-after-free in smsc75xx_bind
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit 14616c372a7be01a2fb8c56c9d8debd232b9e43d, it was introduced in version v5.12.9 by commit 70c886ac93f87ae7214a0c69151a28a8075dd95b. For more details please see the references link. | null | 2021-12-20T00:36:32.052018Z | 2021-06-30T00:37:32.278230Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/70c886ac93f87ae7214a0c69151a28a8075dd95b'} |
Linux | GSD-2022-1002168 | gpiolib: acpi: use correct format characters | gpiolib: acpi: use correct format characters
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.190 by commit 8cefae8c40df9edbc103b13a43e49b41d2090a05, it was introduced in version v4.14 by commit e40a3ae1f794a35c4af3746291ed6fedc1fa0f6f. For more details please see the references link. | null | 2022-04-25T03:37:33.606028Z | 2022-04-24T22:18:00.408332Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e40a3ae1f794a35c4af3746291ed6fedc1fa0f6f'} |
Linux | GSD-2022-1000155 | scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() | scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.176 by commit bf2bd892a0cb14dd2d21f2c658f4b747813be311, it was introduced in version v3.2 by commit 0cbf32e1681d870632a1772601cbaadd996dc978. For more details please see the references link. | null | 2022-02-19T04:57:36.740609Z | 2022-02-18T21:48:08.435452Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0cbf32e1681d870632a1772601cbaadd996dc978'} |
Linux | GSD-2021-1001438 | net: fix uninit-value in caif_seqpkt_sendmsg | net: fix uninit-value in caif_seqpkt_sendmsg
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.277 by commit 5c6d8e2f7187b8e45a18c27acb7a3885f03ee3db, it was introduced in version v2.6.35 by commit bece7b2398d073d11b2e352405a3ecd3a1e39c60. For more details please see the references link. | null | 2021-12-20T00:58:55.755315Z | 2021-08-03T02:41:05.113192Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bece7b2398d073d11b2e352405a3ecd3a1e39c60'} |
Linux | GSD-2022-1002492 | net/x25: Fix null-ptr-deref caused by x25_disconnect | net/x25: Fix null-ptr-deref caused by x25_disconnect
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit dffc859d1d9560da594e4282091781b8d2715f00, it was introduced in version v4.9.233 by commit 08560e93a2c1c93eefe166015f2351196fbbc8e1. For more details please see the references link. | null | 2022-04-25T03:54:51.863141Z | 2022-04-24T22:53:38.333365Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/08560e93a2c1c93eefe166015f2351196fbbc8e1'} |
Linux | GSD-2022-1002187 | net/tls: fix slab-out-of-bounds bug in decrypt_internal | net/tls: fix slab-out-of-bounds bug in decrypt_internal
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 2b7d14c105dd8f6412eda5a91e1e6154653731e3, it was introduced in version v5.2 by commit f295b3ae9f5927e084bd5decdff82390e3471801. For more details please see the references link. | null | 2022-04-25T04:12:37.884061Z | 2022-04-24T22:20:01.315560Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f295b3ae9f5927e084bd5decdff82390e3471801'} |
Linux | GSD-2022-1000440 | phy: ti: Fix missing sentinel for clk_div_table | phy: ti: Fix missing sentinel for clk_div_table
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit 7a360e546ad9e7c3fd53d6bb60348c660cd28f54, it was introduced in version v5.6 by commit 091876cc355d6739e393efa4b3d07f451a6a035c. For more details please see the references link. | null | 2022-03-07T01:48:11.640234Z | 2022-02-27T03:07:34.022945Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/091876cc355d6739e393efa4b3d07f451a6a035c'} |
Linux | GSD-2022-1000010 | Input: appletouch - initialize work before device registration | Input: appletouch - initialize work before device registration
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.298 by commit d2cb2bf39a6d17ef4bdc0e59c1a35cf5751ad8f4, it was introduced in version v2.6.23 by commit 5a6eb676d3bc4d7a6feab200a92437b62ad298da. For more details please see the references link. | null | 2022-01-11T05:47:48.667565Z | 2022-01-10T19:50:01.333917Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5a6eb676d3bc4d7a6feab200a92437b62ad298da'} |
Linux | GSD-2021-1001087 | net: ll_temac: Fix TX BD buffer overwrite | net: ll_temac: Fix TX BD buffer overwrite
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit b6982493ed2dee412ccae062ccf7cf50fbe5a6a8, it was introduced in version v5.6 by commit 84823ff80f7403752b59e00bb198724100dc611c. For more details please see the references link. | null | 2021-12-20T00:39:46.224672Z | 2021-06-30T00:38:45.383648Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/84823ff80f7403752b59e00bb198724100dc611c'} |
Linux | GSD-2021-1002701 | mptcp: clear 'kern' flag from fallback sockets | mptcp: clear 'kern' flag from fallback sockets
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.88 by commit 451f1eded7f56e93aaf52eb547ba97742d9c0e97, it was introduced in version v5.6 by commit cf7da0d66cc1a2a19fc5930bb746ffbb2d4cd1be. For more details please see the references link. | null | 2022-01-11T05:47:27.280929Z | 2021-12-27T05:37:49.667036Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cf7da0d66cc1a2a19fc5930bb746ffbb2d4cd1be'} |
Linux | GSD-2022-1001251 | ASoC: mediatek: mt8195: Fix error handling in mt8195_mt6359_rt1019_rt5682_dev_probe | ASoC: mediatek: mt8195: Fix error handling in mt8195_mt6359_rt1019_rt5682_dev_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit c652f8f0875b569f8afa80b8cf9762828fd6187b, it was introduced in version v5.17 by commit 082482a5022780d42180a394fe6843e71fe963d8. For more details please see the references link. | null | 2022-04-25T03:36:14.096591Z | 2022-04-24T20:57:51.865746Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/082482a5022780d42180a394fe6843e71fe963d8'} |
Linux | GSD-2021-1002351 | thermal: Fix NULL pointer dereferences in of_thermal_ functions | thermal: Fix NULL pointer dereferences in of_thermal_ functions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.4 by commit ef2590a5305e0b8e9342f84c2214aa478ee7f28e. For more details please see the references link. | null | 2021-12-19T23:58:45.681354Z | 2021-11-29T02:40:01.773239Z | null | null | null | null | null |
Linux | GSD-2022-1000913 | sr9700: sanity check for packet length | sr9700: sanity check for packet length
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.232 by commit dde5ddf02a47487dd6efcc7077307f1d4e1ba337. For more details please see the references link. | null | 2022-03-18T02:55:08.773137Z | 2022-03-18T00:31:22.878439Z | null | null | null | null | null |
Linux | GSD-2022-1001601 | ext4: make mb_optimize_scan performance mount option work with extents | ext4: make mb_optimize_scan performance mount option work with extents
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 8eeebd24705f99a46aa15d94a2b07d30b3b9f3ee, it was introduced in version v5.13 by commit 196e402adf2e4cd66f101923409f1970ec5f1af3. For more details please see the references link. | null | 2022-04-25T06:16:30.562820Z | 2022-04-24T21:27:31.284487Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/196e402adf2e4cd66f101923409f1970ec5f1af3'} |
Linux | GSD-2021-1001984 | isdn: mISDN: Fix sleeping function called from invalid context | isdn: mISDN: Fix sleeping function called from invalid context
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.214 by commit a5b34409d3fc52114c828be4adbc30744fa3258b. For more details please see the references link. | null | 2021-12-20T01:23:21.591518Z | 2021-11-14T15:14:36.873634Z | null | null | null | null | null |
Linux | GSD-2021-1000696 | misc/uss720: fix memory leak in uss720_probe | misc/uss720: fix memory leak in uss720_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.271 by commit 7889c70e6173ef358f3cd7578db127a489035a42, it was introduced in version v2.6.14 by commit 0f36163d3abefbda1b21a330b3fdf3c2dc076d94. For more details please see the references link. | null | 2021-12-19T23:21:38.267718Z | 2021-06-04T20:04:29.813808Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0f36163d3abefbda1b21a330b3fdf3c2dc076d94'} |
Linux | GSD-2022-1000298 | net: ieee802154: at86rf230: Stop leaking skb's | net: ieee802154: at86rf230: Stop leaking skb's
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.303 by commit d2a1eaf51b7d4412319adb6acef114ba472d1692. For more details please see the references link. | null | 2022-03-07T01:50:57.458535Z | 2022-02-27T02:47:55.986187Z | null | null | null | null | null |
Linux | GSD-2022-1000762 | btrfs: fix relocation crash due to premature return from btrfs_commit_transaction() | btrfs: fix relocation crash due to premature return from btrfs_commit_transaction()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.27 by commit 725a6ac389b182261af174176e561a36b0f39ffc, it was introduced in version v5.12 by commit d0c2f4fa555e70324ec2a129b822ab58f172cc62. For more details please see the references link. | null | 2022-03-18T02:55:04.808924Z | 2022-03-18T00:15:55.198346Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0c2f4fa555e70324ec2a129b822ab58f172cc62'} |
Linux | GSD-2022-1001870 | ASoC: atmel: Fix error handling in sam9x5_wm8731_driver_probe | ASoC: atmel: Fix error handling in sam9x5_wm8731_driver_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit f589063b585ac6dd2081bde6c145411cf48d8d92, it was introduced in version v3.12 by commit fdbcb3cba54b29a37dfe42acdc0e72c543e0807d. For more details please see the references link. | null | 2022-04-25T05:55:06.136678Z | 2022-04-24T21:50:12.110819Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fdbcb3cba54b29a37dfe42acdc0e72c543e0807d'} |
Linux | GSD-2022-1000332 | Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj | Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.231 by commit 417947891bd5ae327f15efed1a0da2b12ef24962, it was introduced in version v4.15 by commit c2e5df616e1ae6c2a074cb241ebb65a318ebaf7c. For more details please see the references link. | null | 2022-03-07T01:43:44.603661Z | 2022-02-27T02:52:27.884175Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c2e5df616e1ae6c2a074cb241ebb65a318ebaf7c'} |
Linux | GSD-2022-1001489 | net: sparx5: switchdev: fix possible NULL pointer dereference | net: sparx5: switchdev: fix possible NULL pointer dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit c346791877e6ce923bb21e34b30c6f99326aa5a8, it was introduced in version v5.15 by commit 10615907e9b51c9ae92f3a6ecabd01c482f20f32. For more details please see the references link. | null | 2022-04-25T04:25:05.637040Z | 2022-04-24T21:16:25.256357Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/10615907e9b51c9ae92f3a6ecabd01c482f20f32'} |
Linux | GSD-2021-1002423 | can: sja1000: fix use after free in ems_pcmcia_add_card() | can: sja1000: fix use after free in ems_pcmcia_add_card()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.221 by commit ccf070183e4655824936c0f96c4a2bcca93419aa, it was introduced in version v3.2 by commit fd734c6f25aea4b2b44b045e489aec67b388577e. For more details please see the references link. | null | 2021-12-19T22:36:36.124805Z | 2021-12-19T19:36:42.210981Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fd734c6f25aea4b2b44b045e489aec67b388577e'} |
Linux | GSD-2022-1001173 | vsock/virtio: initialize vdev->priv before using VQs | vsock/virtio: initialize vdev->priv before using VQs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 83c80024c20d192168970a6029097f1c0b8bba40, it was introduced in version v5.3 by commit 9c7a5582f5d720dc35cfcc42ccaded69f0642e4a. For more details please see the references link. | null | 2022-04-25T06:40:04.427007Z | 2022-04-24T20:50:29.511244Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9c7a5582f5d720dc35cfcc42ccaded69f0642e4a'} |
Linux | GSD-2021-1002073 | isofs: Fix out of bound access for corrupted isofs image | isofs: Fix out of bound access for corrupted isofs image
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.79 by commit 86d4aedcbc69c0f84551fb70f953c24e396de2d7. For more details please see the references link. | null | 2021-12-19T22:29:13.017011Z | 2021-11-14T15:18:38.591684Z | null | null | null | null | null |
Linux | GSD-2021-1002589 | ethtool: do not perform operations on net devices being unregistered | ethtool: do not perform operations on net devices being unregistered
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.8 by commit cfd719f04267108f5f5bf802b9d7de69e99a99f9, it was introduced in version v5.6 by commit 041b1c5d4a53e97fc9e029ae32469552ca12cb9b. For more details please see the references link. | null | 2021-12-20T01:18:51.993678Z | 2021-12-19T19:43:59.255563Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/041b1c5d4a53e97fc9e029ae32469552ca12cb9b'} |
Linux | GSD-2022-1001523 | bpf, sockmap: Fix memleak in sk_psock_queue_msg | bpf, sockmap: Fix memleak in sk_psock_queue_msg
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 4dd2e947d3be13a4de3b3028859b9a6497266bcf, it was introduced in version v5.14 by commit 9635720b7c88592214562cb72605bdab6708006c. For more details please see the references link. | null | 2022-04-25T05:57:09.917296Z | 2022-04-24T21:19:54.425220Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9635720b7c88592214562cb72605bdab6708006c'} |
Linux | GSD-2022-1001036 | staging: wfx: fix an error handling in wfx_init_common() | staging: wfx: fix an error handling in wfx_init_common()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 9727912e906762a63c1a667c84731d3427653f88. For more details please see the references link. | null | 2022-04-25T06:28:52.706199Z | 2022-04-24T20:41:35.124232Z | null | null | null | null | null |
Linux | GSD-2021-1002566 | rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() | rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.7 by commit 9469273e616ca8f1b6e3773c5019f21b4c8d828c, it was introduced in version v5.4 by commit 9ebeddef58c41bd700419cdcece24cf64ce32276. For more details please see the references link. | null | 2021-12-20T01:03:10.890108Z | 2021-12-19T19:43:04.943095Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9ebeddef58c41bd700419cdcece24cf64ce32276'} |
Linux | GSD-2022-1001466 | media: staging: media: zoran: move videodev alloc | media: staging: media: zoran: move videodev alloc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit c1ba65100a359fe28cfe37e09e10c99f247cbf1e. For more details please see the references link. | null | 2022-04-25T03:48:50.520903Z | 2022-04-24T21:15:12.643507Z | null | null | null | null | null |
Linux | GSD-2021-1002136 | regmap: Fix possible double-free in regcache_rbtree_exit() | regmap: Fix possible double-free in regcache_rbtree_exit()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.16 by commit 50cc1462a668dc62949a1127388bc3af785ce047, it was introduced in version v3.12 by commit 3f4ff561bc88b074d5e868dde4012d89cbb06c87. For more details please see the references link. | null | 2021-12-20T01:37:01.486477Z | 2021-11-14T15:21:31.846879Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f4ff561bc88b074d5e868dde4012d89cbb06c87'} |
Linux | GSD-2022-1000627 | phylib: fix potential use-after-free | phylib: fix potential use-after-free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.5 by commit cb2fab10fc5e7a3aa1bb0a68a3abdcf3e37852af, it was introduced in version v4.16 by commit bafbdd527d569c8200521f2f7579f65a044271be. For more details please see the references link. | null | 2022-03-07T01:39:22.704058Z | 2022-02-27T03:32:56.157971Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bafbdd527d569c8200521f2f7579f65a044271be'} |
Linux | GSD-2022-1001935 | coresight: syscfg: Fix memleak on registration failure in cscfg_create_device | coresight: syscfg: Fix memleak on registration failure in cscfg_create_device
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit c61e2fc87f24cae4701f352fe9ecd4c5c143106c, it was introduced in version v5.15 by commit 85e2414c518a03a21dddd4bc88fec2723c5e1197. For more details please see the references link. | null | 2022-04-25T03:50:35.262261Z | 2022-04-24T21:56:13.125733Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/85e2414c518a03a21dddd4bc88fec2723c5e1197'} |
Linux | GSD-2022-1000277 | af_packet: fix data-race in packet_setsockopt / packet_setsockopt | af_packet: fix data-race in packet_setsockopt / packet_setsockopt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.20 by commit 34321180b94dbcd12abc130eb48c4ce67a3408aa, it was introduced in version v4.3 by commit 47dceb8ecdc1c3ad1818dfea3d659a05b74c3fc2. For more details please see the references link. | null | 2022-02-20T06:34:11.633760Z | 2022-02-18T22:05:17.677939Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/47dceb8ecdc1c3ad1818dfea3d659a05b74c3fc2'} |
Linux | GSD-2021-1000808 | net: caif: fix memory leak in caif_device_notify | net: caif: fix memory leak in caif_device_notify
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit 6a0e317f61094d377335547e015dd2ff12caf893, it was introduced in version v3.3 by commit 7c18d2205ea76eef9674e59e1ecae4f332a53e9e. For more details please see the references link. | null | 2021-12-20T00:12:41.589521Z | 2021-06-25T00:08:42.167994Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7c18d2205ea76eef9674e59e1ecae4f332a53e9e'} |
Linux | GSD-2021-1002835 | KVM: VMX: Always clear vmx->fail on emulation_required | KVM: VMX: Always clear vmx->fail on emulation_required
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.12 by commit e4e4e7cb229821cd215031abc47efdab5486a67c, it was introduced in version v5.15 by commit c8607e4a086fae05efe5bffb47c5199c65e7216e. For more details please see the references link. | null | 2022-01-11T05:52:45.427889Z | 2021-12-30T02:45:35.686475Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c8607e4a086fae05efe5bffb47c5199c65e7216e'} |
Linux | GSD-2021-1000222 | f2fs: fix panic during f2fs_resize_fs() | f2fs: fix panic during f2fs_resize_fs()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.5 by commit 822054e5026c43b1dd60cf387dd999e95ee2ecc2, it was introduced in version v5.8 by commit b4b10061ef98c583bcf82a4200703fbaa98c18dc. For more details please see the references link. | null | 2021-12-19T22:48:36.715986Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b4b10061ef98c583bcf82a4200703fbaa98c18dc'} |
Linux | GSD-2021-1000388 | mtd: require write permissions for locking and badblock ioctls | mtd: require write permissions for locking and badblock ioctls
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 7b6552719c0ccbbea29dde4be141da54fdb5877e, it was introduced in version v5.9 by commit f7e6b19bc76471ba03725fe58e0c218a3d6266c3. For more details please see the references link. | null | 2021-12-19T23:38:03.905475Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f7e6b19bc76471ba03725fe58e0c218a3d6266c3'} |
Linux | GSD-2021-1001960 | isdn: cpai: check ctr->cnr to avoid array index out of bound | isdn: cpai: check ctr->cnr to avoid array index out of bound
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.253 by commit 9b6b2db77bc3121fe435f1d4b56e34de443bec75. For more details please see the references link. | null | 2021-12-20T00:28:30.717802Z | 2021-11-14T15:13:31.263580Z | null | null | null | null | null |
Linux | GSD-2021-1000672 | net: fujitsu: fix potential null-ptr-deref | net: fujitsu: fix potential null-ptr-deref
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.235 by commit c4f1c23edbe921ab2ecd6140d700e756cd44c5f7, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T23:58:42.320027Z | 2021-06-04T19:59:03.361620Z | null | null | null | null | null |
Linux | GSD-2022-1002163 | drm/amdkfd: Check for potential null return of kmalloc_array() | drm/amdkfd: Check for potential null return of kmalloc_array()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.190 by commit c7a268b33882d5feaafd29c1734456f41ba41396. For more details please see the references link. | null | 2022-04-25T07:06:19.350760Z | 2022-04-24T22:17:16.912581Z | null | null | null | null | null |
Linux | GSD-2021-1001433 | atm: iphase: fix possible use-after-free in ia_module_exit() | atm: iphase: fix possible use-after-free in ia_module_exit()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.240 by commit bcdd2be48edd8c6867fb44112cb8d18086beae29. For more details please see the references link. | null | 2021-12-20T00:18:22.516417Z | 2021-08-03T02:39:18.757928Z | null | null | null | null | null |
Linux | GSD-2022-1002499 | ext2: correct max file size computing | ext2: correct max file size computing
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit df95b0e4f1e2eb7ebbef6618b14a802ea55ce32f, it was introduced in version v4.9.165 by commit 4b5f060b09f6ebdf86fc2acb483bdfcc5d723000. For more details please see the references link. | null | 2022-04-25T02:48:34.650217Z | 2022-04-24T22:54:45.328525Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4b5f060b09f6ebdf86fc2acb483bdfcc5d723000'} |
Linux | GSD-2021-1001599 | hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field | hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.151 by commit 44d3c480e4e2a75bf6296a18b4356157991ccd80. For more details please see the references link. | null | 2021-12-19T22:53:44.892325Z | 2021-10-19T16:27:39.812806Z | null | null | null | null | null |
Linux | GSD-2021-1001063 | sch_cake: Fix out of bounds when parsing TCP options and header | sch_cake: Fix out of bounds when parsing TCP options and header
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit 3371392c60e2685af30bd4547badd880f5df2b3f, it was introduced in version v4.19 by commit 8b7138814f29933898ecd31dfc83e35a30ee69f5. For more details please see the references link. | null | 2021-12-19T22:02:07.399767Z | 2021-06-30T00:37:09.130462Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8b7138814f29933898ecd31dfc83e35a30ee69f5'} |
Linux | GSD-2021-1001576 | drm/amdgpu: fix gart.bo pin_count leak | drm/amdgpu: fix gart.bo pin_count leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.154 by commit 83d857d6b0967b6709cd38750c3ce2ed8ced1a95. For more details please see the references link. | null | 2021-12-19T22:52:47.865159Z | 2021-10-19T16:24:31.580042Z | null | null | null | null | null |
Linux | GSD-2022-1002026 | watch_queue: Free the page array when watch_queue is dismantled | watch_queue: Free the page array when watch_queue is dismantled
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 7169f60110915c8b53bffd43741fa020a75eb87a, it was introduced in version v5.8 by commit c73be61cede5882f9605a852414db559c0ebedfd. For more details please see the references link. | null | 2022-04-25T06:10:30.673292Z | 2022-04-24T22:04:01.237654Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c73be61cede5882f9605a852414db559c0ebedfd'} |
Linux | GSD-2021-1001126 | nilfs2: fix memory leak in nilfs_sysfs_delete_device_group | nilfs2: fix memory leak in nilfs_sysfs_delete_device_group
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.47 by commit ab5bef9780386be0e54f98a40eeedb8295cd450b, it was introduced in version v3.17 by commit da7141fb78db915680616e15677539fc8140cf53. For more details please see the references link. | null | 2021-12-19T23:26:32.505992Z | 2021-07-08T01:58:11.782620Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/da7141fb78db915680616e15677539fc8140cf53'} |
Linux | GSD-2022-1002476 | scsi: libfc: Fix use after free in fc_exch_abts_resp() | scsi: libfc: Fix use after free in fc_exch_abts_resp()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit 4a131d4ea8b581ac9b01d3a72754db4848be3232. For more details please see the references link. | null | 2022-04-25T05:50:59.017209Z | 2022-04-24T22:52:26.930401Z | null | null | null | null | null |
Linux | GSD-2021-1000367 | drm: xlnx: zynqmp: fix a memset in zynqmp_dp_train() | drm: xlnx: zynqmp: fix a memset in zynqmp_dp_train()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit a6596d71a63544a6171cd0b9abaed8745ada7c65, it was introduced in version v5.9 by commit d76271d22694e874ed70791702db9252ffe96a4c. For more details please see the references link. | null | 2021-12-20T01:37:47.961270Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d76271d22694e874ed70791702db9252ffe96a4c'} |
Linux | GSD-2022-1000918 | xen/xenbus: don't let xenbus_grant_ring() remove grants in error case | xen/xenbus: don't let xenbus_grant_ring() remove grants in error case
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.271 by commit 67d21d5bddef88c1977378e4aca2b9c6a4af9edc. For more details please see the references link. | null | 2022-03-18T03:39:14.145597Z | 2022-03-18T00:31:50.446626Z | null | null | null | null | null |
Linux | GSD-2021-1001825 | drm/msm: Fix null pointer dereference on pointer edp | drm/msm: Fix null pointer dereference on pointer edp
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.155 by commit f302be08e3de94db8863a0b2958b2bb3e8e998e6, it was introduced in version v4.0 by commit ab5b0107ccf3821a6837b0f2819270d6fa0b278f. For more details please see the references link. | null | 2021-12-20T00:03:58.532363Z | 2021-10-28T13:50:50.604356Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab5b0107ccf3821a6837b0f2819270d6fa0b278f'} |
Linux | GSD-2021-1000737 | net: caif: add proper error handling | net: caif: add proper error handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.194 by commit 758f725c392ec073f9f1cfbe34323ca1372afbf8, it was introduced in version v3.3 by commit 7c18d2205ea76eef9674e59e1ecae4f332a53e9e. For more details please see the references link. | null | 2021-12-20T00:10:19.758726Z | 2021-06-25T00:00:12.801227Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7c18d2205ea76eef9674e59e1ecae4f332a53e9e'} |
Linux | GSD-2022-1001574 | media: ti-vpe: cal: Fix a NULL pointer dereference in cal_ctx_v4l2_init_formats() | media: ti-vpe: cal: Fix a NULL pointer dereference in cal_ctx_v4l2_init_formats()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 91e2805579ab0783eed53acc2bf9fb553e939004, it was introduced in version v5.12 by commit 7168155002cf7aadbfaa14a28f037c880a214764. For more details please see the references link. | null | 2022-04-25T05:45:08.237617Z | 2022-04-24T21:25:17.316046Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7168155002cf7aadbfaa14a28f037c880a214764'} |
Linux | GSD-2021-1000019 | ARM: 9063/1: mm: reduce maximum number of CPUs if DEBUG_KMAP_LOCAL is enabled | ARM: 9063/1: mm: reduce maximum number of CPUs if DEBUG_KMAP_LOCAL is enabled
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.16 by commit 5965ac11b1d5fcb38464728931649cd9df79c7c9, it was introduced in version v5.11 by commit 2a15ba82fa6ca3f35502b3060f22118a938d2889. For more details please see the references link. | null | 2021-12-19T22:18:22.847477Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2a15ba82fa6ca3f35502b3060f22118a938d2889'} |
Linux | GSD-2021-1002024 | comedi: dt9812: fix DMA buffers on stack | comedi: dt9812: fix DMA buffers on stack
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.159 by commit 3efb7af8ac437085b6c776e5b54830b149d86efe, it was introduced in version v2.6.29 by commit 63274cd7d38a3322d90b66a5bc976de1fb899051. For more details please see the references link. | null | 2021-12-20T00:46:59.906306Z | 2021-11-14T15:16:23.569458Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63274cd7d38a3322d90b66a5bc976de1fb899051'} |
Linux | GSD-2022-1001124 | scsi: qla2xxx: Fix premature hw access after PCI error | scsi: qla2xxx: Fix premature hw access after PCI error
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 6c125fd5ad035777f7b471553f7ddda76e8e7136. For more details please see the references link. | null | 2022-04-25T06:13:55.679597Z | 2022-04-24T20:47:33.645663Z | null | null | null | null | null |
Linux | GSD-2021-1000449 | ethernet:enic: Fix a use after free bug in enic_hard_start_xmit | ethernet:enic: Fix a use after free bug in enic_hard_start_xmit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.191 by commit 25a87b1f566b5eb2af2857a928f0e2310d900976, it was introduced in version v4.16 by commit fb7516d42478ebc8e2f00efb76ef96f7b68fd8d3. For more details please see the references link. | null | 2021-12-20T01:21:21.363826Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb7516d42478ebc8e2f00efb76ef96f7b68fd8d3'} |
Linux | GSD-2021-1002474 | ice: avoid bpf_prog refcount underflow | ice: avoid bpf_prog refcount underflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.83 by commit e65a8707b4cd756d26d246bb2b9fab06eebafac1, it was introduced in version v5.5 by commit efc2214b6047b6f5b4ca53151eba62521b9452d6. For more details please see the references link. | null | 2021-12-19T22:36:40.218492Z | 2021-12-19T19:38:59.121344Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/efc2214b6047b6f5b4ca53151eba62521b9452d6'} |
Linux | GSD-2022-1002358 | drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes() | drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 2c729dec8c1e3e2892fde5ce8181553860914e74, it was introduced in version v4.15 by commit e7b07ceef2a650e5ed8ca37997689e086c680daf. For more details please see the references link. | null | 2022-04-25T06:51:25.968686Z | 2022-04-24T22:38:12.703156Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e7b07ceef2a650e5ed8ca37997689e086c680daf'} |
Linux | GSD-2022-1000365 | scsi: qedf: Fix refcount issue when LOGO is received during TMF | scsi: qedf: Fix refcount issue when LOGO is received during TMF
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.101 by commit 87f187e5265bc8e3b38faef8b9db864cdd61dde7. For more details please see the references link. | null | 2022-03-07T02:22:24.669064Z | 2022-02-27T02:56:55.417781Z | null | null | null | null | null |
Linux | GSD-2021-1001608 | xen/balloon: use a kernel thread instead a workqueue | xen/balloon: use a kernel thread instead a workqueue
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.150 by commit 29917bbb07c30be295dece245c7c21872e1a6fbb. For more details please see the references link. | null | 2021-12-19T23:47:36.364563Z | 2021-10-19T16:28:02.729027Z | null | null | null | null | null |
Linux | GSD-2022-1000735 | configfs: fix a race in configfs_{,un}register_subsystem() | configfs: fix a race in configfs_{,un}register_subsystem()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.12 by commit 3aadfd46858b1f64d4d6a0654b863e21aabff975, it was introduced in version v2.6.16 by commit 7063fbf2261194f72ee75afca67b3b38b554b5fa. For more details please see the references link. | null | 2022-03-18T03:03:33.953422Z | 2022-03-18T00:13:48.593670Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7063fbf2261194f72ee75afca67b3b38b554b5fa'} |
Linux | GSD-2022-1001827 | af_netlink: Fix shift out of bounds in group mask calculation | af_netlink: Fix shift out of bounds in group mask calculation
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 7409ff6393a67ff9838d0ae1bd102fb5f020d07a, it was introduced in version v2.6.14 by commit f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198. For more details please see the references link. | null | 2022-04-25T04:50:17.677298Z | 2022-04-24T21:45:46.848340Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198'} |
Linux | GSD-2021-1001258 | net: validate lwtstate->data before returning from skb_tunnel_info() | net: validate lwtstate->data before returning from skb_tunnel_info()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.53 by commit 2179d96ec702cc33ead02a9ce40ece599b8538c5, it was introduced in version v4.3 by commit 61adedf3e3f1d3f032c5a6a299978d91eff6d555. For more details please see the references link. | null | 2021-12-20T00:20:35.763896Z | 2021-08-03T01:50:23.575845Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61adedf3e3f1d3f032c5a6a299978d91eff6d555'} |
Linux | GSD-2022-1000220 | drm/nouveau: fix off by one in BIOS boundary checking | drm/nouveau: fix off by one in BIOS boundary checking
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.99 by commit f071d9fa857582d7bd77f4906691f73d3edeab73, it was introduced in version v4.8 by commit 4d4e9907ff572bb1d1c0f6913ad6e3d6d4525077. For more details please see the references link. | null | 2022-02-19T15:37:13.957027Z | 2022-02-18T21:57:02.213643Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4d4e9907ff572bb1d1c0f6913ad6e3d6d4525077'} |
Linux | GSD-2022-1000670 | spi: uniphier: fix reference count leak in uniphier_spi_probe() | spi: uniphier: fix reference count leak in uniphier_spi_probe()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.8 by commit 447c3d4046d7b54052d07d8b27e15e6edea5662c, it was introduced in version v5.6 by commit 28d1dddc59f6b7fc085093e7c1e978b33f0caf4c. For more details please see the references link. | null | 2022-03-07T01:38:35.862125Z | 2022-02-27T03:39:05.779818Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/28d1dddc59f6b7fc085093e7c1e978b33f0caf4c'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.