ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2022-1001962 | SUNRPC: Fix the svc_deferred_event trace class | SUNRPC: Fix the svc_deferred_event trace class
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.112 by commit 85ee17ca21cf92989e8c923e3ea4514c291e9d38, it was introduced in version v4.17 by commit ece200ddd54b9ce840cfee554fb812560c545c7d. For more details please see the references link. | null | 2022-04-25T05:21:29.895364Z | 2022-04-24T21:58:42.851810Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ece200ddd54b9ce840cfee554fb812560c545c7d'} |
Linux | GSD-2021-1002161 | mptcp: fix possible stall on recvmsg() | mptcp: fix possible stall on recvmsg()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 612f71d7328c14369924384ad2170aae2a6abd92, it was introduced in version v5.6 by commit 7a6a6cbc3e592e339ad23e4e8ede9a3f6160bda8. For more details please see the references link. | null | 2021-12-20T01:05:19.028427Z | 2021-11-14T15:22:41.684336Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7a6a6cbc3e592e339ad23e4e8ede9a3f6160bda8'} |
Linux | GSD-2022-1001431 | watch_queue: Free the page array when watch_queue is dismantled | watch_queue: Free the page array when watch_queue is dismantled
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 3963a5d1ff75585bddf0c3a918566a6be09d7520, it was introduced in version v5.8 by commit c73be61cede5882f9605a852414db559c0ebedfd. For more details please see the references link. | null | 2022-04-25T06:40:29.432774Z | 2022-04-24T21:12:31.649247Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c73be61cede5882f9605a852414db559c0ebedfd'} |
Linux | GSD-2021-1002531 | media: v4l2-core: fix VIDIOC_DQEVENT handling on non-x86 | media: v4l2-core: fix VIDIOC_DQEVENT handling on non-x86
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.6 by commit 75fa2dadb7c26010eef19185eaff40c960a185fd, it was introduced in version v5.14 by commit c344f07aa1b4ba38ca8fabe407a2afe2f436323c. For more details please see the references link. | null | 2021-12-20T01:14:35.325850Z | 2021-12-19T19:41:23.182131Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c344f07aa1b4ba38ca8fabe407a2afe2f436323c'} |
Linux | GSD-2022-1001061 | ipv6: annotate some data-races around sk->sk_prot | ipv6: annotate some data-races around sk->sk_prot
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 7f11e5c2fc12eafc874e42158078b968e47e4ac0. For more details please see the references link. | null | 2022-04-25T06:17:10.467355Z | 2022-04-24T20:42:59.718359Z | null | null | null | null | null |
Linux | GSD-2021-1001034 | usb: typec: tcpm: cancel vdm and state machine hrtimer when unregister tcpm port | usb: typec: tcpm: cancel vdm and state machine hrtimer when unregister tcpm port
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.11 by commit d0a06696a8a4d99f649240b6f9b8a2e55452ecf5, it was introduced in version v5.10 by commit 3ed8e1c2ac9914a2fcb08ec13476b85319536cea. For more details please see the references link. | null | 2021-12-20T01:30:54.628012Z | 2021-06-30T00:35:15.760269Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3ed8e1c2ac9914a2fcb08ec13476b85319536cea'} |
Linux | GSD-2022-1000559 | perf bpf: Defer freeing string after possible strlen() on it | perf bpf: Defer freeing string after possible strlen() on it
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit 40c1ff40decabe8236e7c610c068bc041927cbbe, it was introduced in version v5.8 by commit 04f9bf2bac72480ca1d289b751b956dd1707a5d5. For more details please see the references link. | null | 2022-03-07T01:43:57.306603Z | 2022-02-27T03:23:54.386450Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/04f9bf2bac72480ca1d289b751b956dd1707a5d5'} |
Linux | GSD-2021-1001464 | seq_buf: Fix overflow in seq_buf_putmem_hex() | seq_buf: Fix overflow in seq_buf_putmem_hex()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.276 by commit f2b9f758e1dfb593872fd0fcd7644875bcb8757a, it was introduced in version v2.6.27 by commit 5e3ca0ec76fce92daa4eed0d02de9c79b1fe3920. For more details please see the references link. | null | 2021-12-20T02:18:37.978428Z | 2021-08-03T02:48:26.883589Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5e3ca0ec76fce92daa4eed0d02de9c79b1fe3920'} |
Linux | GSD-2022-1000109 | ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() | ASoC: ops: Reject out of bounds values in snd_soc_put_volsw()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.265 by commit 586ef863c94354a7e00e5ae5ef01443d1dc99bc7. For more details please see the references link. | null | 2022-02-20T02:12:13.738552Z | 2022-02-18T21:42:05.893604Z | null | null | null | null | null |
Linux | GSD-2022-1002134 | mm/pages_alloc.c: don't create ZONE_MOVABLE beyond the end of a node | mm/pages_alloc.c: don't create ZONE_MOVABLE beyond the end of a node
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 7188e7c96f39ae40b8f8d6a807d3f338fb1927ac, it was introduced in version v2.6.23 by commit 2a1e274acf0b1c192face19a4be7c12d4503eaaf. For more details please see the references link. | null | 2022-04-25T04:20:48.831053Z | 2022-04-24T22:14:37.521972Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2a1e274acf0b1c192face19a4be7c12d4503eaaf'} |
Linux | GSD-2021-1001937 | ocfs2: fix data corruption after conversion from inline format | ocfs2: fix data corruption after conversion from inline format
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.288 by commit 560edd14de2bf9dbc0129681eeb4d5ef87cc105f, it was introduced in version v4.9.242 by commit acef5107e2eacb08a16ad5db60320d65bd26a6c0. For more details please see the references link. | null | 2021-12-19T23:43:47.633360Z | 2021-11-14T15:12:27.625028Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/acef5107e2eacb08a16ad5db60320d65bd26a6c0'} |
Linux | GSD-2021-1002618 | xen/console: harden hvc_xen against event channel storms | xen/console: harden hvc_xen against event channel storms
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.296 by commit c7eaa5082bccfc00dfdb500ac6cc86d6f24ca027. For more details please see the references link. | null | 2022-01-11T05:58:14.862684Z | 2021-12-27T05:27:27.566755Z | null | null | null | null | null |
Linux | GSD-2021-1000625 | btrfs: do not BUG_ON in link_to_fixup_dir | btrfs: do not BUG_ON in link_to_fixup_dir
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.124 by commit 0ed102453aa1cd12fefde8f6b60b9519b0b1f003, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T01:27:51.625153Z | 2021-06-04T19:49:27.793122Z | null | null | null | null | null |
Linux | GSD-2022-1001348 | btrfs: zoned: traverse devices under chunk_mutex in btrfs_can_activate_zone | btrfs: zoned: traverse devices under chunk_mutex in btrfs_can_activate_zone
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 09e65ae515af2b24d6dc23af21719a3b41de83e5, it was introduced in version v5.16 by commit a85f05e59bc15a83ad910dbcb71df5ad8fa77295. For more details please see the references link. | null | 2022-04-25T03:49:41.851399Z | 2022-04-24T21:06:36.011232Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a85f05e59bc15a83ad910dbcb71df5ad8fa77295'} |
Linux | GSD-2021-1002248 | i40e: Fix NULL ptr dereference on VSI filter sync | i40e: Fix NULL ptr dereference on VSI filter sync
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.218 by commit 87c421ab4a43433cb009fea44bbbc77f46913e1d, it was introduced in version v3.12 by commit 41c445ff0f482bb6e6b72dcee9e598e20575f743. For more details please see the references link. | null | 2021-12-19T23:18:51.806547Z | 2021-11-29T02:35:18.367128Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41c445ff0f482bb6e6b72dcee9e598e20575f743'} |
Linux | GSD-2021-1000275 | drm/amd/display: Fix off by one in hdmi_14_process_transaction() | drm/amd/display: Fix off by one in hdmi_14_process_transaction()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 080bd41d6478a64edf96704fddcda52b1fd5fed7, it was introduced in version v5.5 by commit 4c283fdac08abf3211533f70623c90a34f41d08d. For more details please see the references link. | null | 2021-12-19T23:02:58.745792Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4c283fdac08abf3211533f70623c90a34f41d08d'} |
Linux | GSD-2022-1001718 | Bluetooth: use memset avoid memory leaks | Bluetooth: use memset avoid memory leaks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 42b6a39f439b6f37cc2024d91ce547d83290ff78. For more details please see the references link. | null | 2022-04-25T05:28:04.251388Z | 2022-04-24T21:37:30.871263Z | null | null | null | null | null |
Linux | GSD-2021-1001872 | kunit: fix reference count leak in kfree_at_end | kunit: fix reference count leak in kfree_at_end
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit bbdd158b40b66a9403391a517f24ef6613573446. For more details please see the references link. | null | 2021-12-19T23:18:29.891946Z | 2021-10-28T13:53:18.011232Z | null | null | null | null | null |
Linux | GSD-2021-1000760 | x86/kvm: Disable all PV features on crash | x86/kvm: Disable all PV features on crash
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.125 by commit 97e814e6b5cdc8101127a5140925941b6088aabb, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T23:21:29.948991Z | 2021-06-25T00:03:00.856824Z | null | null | null | null | null |
Linux | GSD-2021-1000330 | ethernet:enic: Fix a use after free bug in enic_hard_start_xmit | ethernet:enic: Fix a use after free bug in enic_hard_start_xmit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.38 by commit 7afdd6aba95c8a526038e7abe283eeac3e4320f1, it was introduced in version v4.16 by commit fb7516d42478ebc8e2f00efb76ef96f7b68fd8d3. For more details please see the references link. | null | 2021-12-20T00:27:35.234553Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb7516d42478ebc8e2f00efb76ef96f7b68fd8d3'} |
Linux | GSD-2022-1002421 | video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow | video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 580e5d3815474b8349250c25c16416585a72c7fe. For more details please see the references link. | null | 2022-04-25T04:35:09.847507Z | 2022-04-24T22:45:18.456327Z | null | null | null | null | null |
Linux | GSD-2021-1001171 | usb: max-3421: Prevent corruption of freed memory | usb: max-3421: Prevent corruption of freed memory
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.6 by commit d4179cdb769a651f2ae89c325612a69bf6fbdf70, it was introduced in version v3.16 by commit 2d53139f31626bad6f8983d8e519ddde2cbba921. For more details please see the references link. | null | 2021-12-20T00:12:28.970174Z | 2021-08-03T01:32:10.823130Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2d53139f31626bad6f8983d8e519ddde2cbba921'} |
Linux | GSD-2022-1002071 | tipc: fix the timer expires after interval 100ms | tipc: fix the timer expires after interval 100ms
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 084be6309f4f7d71cf7cbc4da6a6be513992b69f, it was introduced in version v4.20 by commit 6787927475e52f6933e3affce365dabb2aa2fadf. For more details please see the references link. | null | 2022-04-25T03:10:32.434587Z | 2022-04-24T22:07:50.539609Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6787927475e52f6933e3affce365dabb2aa2fadf'} |
Linux | GSD-2021-1001521 | mcb: fix error handling in mcb_alloc_bus() | mcb: fix error handling in mcb_alloc_bus()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.285 by commit 8a558261fa57a6deefb0925ab1829f698b194aea, it was introduced in version v4.7 by commit 5d9e2ab9fea4cdf0a2522f5cbed2e7fbb220d757. For more details please see the references link. | null | 2021-12-19T22:30:17.500090Z | 2021-10-19T16:21:59.002103Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5d9e2ab9fea4cdf0a2522f5cbed2e7fbb220d757'} |
Linux | GSD-2022-1001831 | ibmvnic: fix race between xmit and reset | ibmvnic: fix race between xmit and reset
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 1bd58abf595b6cf1ba6dd47ec887c4c009155fc9, it was introduced in version v5.4 by commit 7ed5b31f4a6695a21f617df07646e9b15c6c1d29. For more details please see the references link. | null | 2022-04-25T03:33:55.309682Z | 2022-04-24T21:46:09.900281Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ed5b31f4a6695a21f617df07646e9b15c6c1d29'} |
Linux | GSD-2022-1000723 | btrfs: defrag: allow defrag_one_cluster() to skip large extent which is not a target | btrfs: defrag: allow defrag_one_cluster() to skip large extent which is not a target
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.12 by commit 833df0a3d38c4d5bd3cd84b8dd38855792aa6573. For more details please see the references link. | null | 2022-03-18T02:52:33.012784Z | 2022-03-18T00:12:17.207485Z | null | null | null | null | null |
Linux | GSD-2022-1000689 | btrfs: do not start relocation until in progress drops are done | btrfs: do not start relocation until in progress drops are done
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.13 by commit 5e70bc827b563caf22e1203428cc3719643de5aa. For more details please see the references link. | null | 2022-03-18T03:03:12.953323Z | 2022-03-18T00:09:46.222981Z | null | null | null | null | null |
Linux | GSD-2022-1000373 | ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path | ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.101 by commit 09ac0fcb0a82d647f2c61d3d488d367b7ee5bd51, it was introduced in version v4.0 by commit f243e5a7859a24d10975afb9a1708cac624ba6f1. For more details please see the references link. | null | 2022-03-07T01:39:25.576464Z | 2022-02-27T02:57:49.509871Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f243e5a7859a24d10975afb9a1708cac624ba6f1'} |
Linux | GSD-2021-1002462 | aio: fix use-after-free due to missing POLLFREE handling | aio: fix use-after-free due to missing POLLFREE handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.165 by commit 4105e6a128e8a98455dfc9e6dbb2ab0c33c4497f, it was introduced in version v4.18 by commit 2c14fa838cbefc23cf1c73ca167ed85b274b2913. For more details please see the references link. | null | 2021-12-20T01:36:16.619922Z | 2021-12-19T19:38:23.616900Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c14fa838cbefc23cf1c73ca167ed85b274b2913'} |
Linux | GSD-2022-1001132 | media: atomisp: fix dummy_ptr check to avoid duplicate active_bo | media: atomisp: fix dummy_ptr check to avoid duplicate active_bo
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 2a4be3f39f1c436f2f59902247a90d705fe76e2d. For more details please see the references link. | null | 2022-04-25T06:51:37.652328Z | 2022-04-24T20:47:58.760803Z | null | null | null | null | null |
Linux | GSD-2021-1002198 | cgroup: Fix memory leak caused by missing cgroup_bpf_offline | cgroup: Fix memory leak caused by missing cgroup_bpf_offline
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 04f8ef5643bcd8bcde25dfdebef998aea480b2ba, it was introduced in version v5.10 by commit 2b0d3d3e4fcfb19d10f9a82910b8f0f05c56ee3e. For more details please see the references link. | null | 2021-12-19T23:37:53.791675Z | 2021-11-14T15:24:20.790071Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2b0d3d3e4fcfb19d10f9a82910b8f0f05c56ee3e'} |
Linux | GSD-2021-1002032 | nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells | nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.75 by commit 57e48886401b14cd351423fabfec2cfd18df4f66, it was introduced in version v4.3 by commit 69aba7948cbe53f2f1827e84e9dd0ae470a5072e. For more details please see the references link. | null | 2021-12-19T23:35:48.972357Z | 2021-11-14T15:16:43.389898Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69aba7948cbe53f2f1827e84e9dd0ae470a5072e'} |
Linux | GSD-2022-1001098 | x86/sev: Unroll string mmio with CC_ATTR_GUEST_UNROLL_STRING_IO | x86/sev: Unroll string mmio with CC_ATTR_GUEST_UNROLL_STRING_IO
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit b06bacfacdcdd8df7800b48814b96554b532b77f, it was introduced in version v4.15 by commit d8aa7eea78a1401cce39b3bb61ead0150044a3df. For more details please see the references link. | null | 2022-04-25T05:40:20.807421Z | 2022-04-24T20:45:07.803960Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d8aa7eea78a1401cce39b3bb61ead0150044a3df'} |
Linux | GSD-2022-1001562 | ASoC: rockchip: Fix PM usage reference of rockchip_i2s_tdm_resume | ASoC: rockchip: Fix PM usage reference of rockchip_i2s_tdm_resume
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 4e5510219111607b1f1875ab3c3f0485ba3c381c, it was introduced in version v5.16 by commit 081068fd641403994f0505e6b91e021d3925f348. For more details please see the references link. | null | 2022-04-25T06:51:44.324642Z | 2022-04-24T21:23:53.107560Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/081068fd641403994f0505e6b91e021d3925f348'} |
Linux | GSD-2022-1001077 | drm/amdkfd: svm range restore work deadlock when process exit | drm/amdkfd: svm range restore work deadlock when process exit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 858822905f4bf44100d63c5e22e263109976f7cb. For more details please see the references link. | null | 2022-04-25T05:13:40.923269Z | 2022-04-24T20:43:45.972305Z | null | null | null | null | null |
Linux | GSD-2021-1002527 | io_uring: fail cancellation for EXITING tasks | io_uring: fail cancellation for EXITING tasks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.6 by commit 3d2a1e68fd9904fdc1b02f2e7d40ca47df7ba39f, it was introduced in version v5.15 by commit 89b263f6d56e683ddcf7643140271ef6e36c72b9. For more details please see the references link. | null | 2021-12-19T22:42:17.611366Z | 2021-12-19T19:41:13.338246Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/89b263f6d56e683ddcf7643140271ef6e36c72b9'} |
Linux | GSD-2022-1001427 | io_uring: fix memory leak of uid in files registration | io_uring: fix memory leak of uid in files registration
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit d6d7a517e81accf6ed22d55684baea763d2dbe43, it was introduced in version v5.5 by commit 08a451739a9b5783f67de51e84cb6d9559bb9dc4. For more details please see the references link. | null | 2022-04-25T04:25:23.749198Z | 2022-04-24T21:12:10.924630Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/08a451739a9b5783f67de51e84cb6d9559bb9dc4'} |
Linux | GSD-2021-1002177 | KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest() | KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 9b4416c5095c20e110c82ae602c254099b83b72f, it was introduced in version v5.2 by commit 10d91611f426d4bafd2a83d966c36da811b2f7ad. For more details please see the references link. | null | 2021-12-20T00:47:01.273558Z | 2021-11-14T15:23:21.568036Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/10d91611f426d4bafd2a83d966c36da811b2f7ad'} |
Linux | GSD-2022-1001974 | drbd: Fix five use after free bugs in get_initial_state | drbd: Fix five use after free bugs in get_initial_state
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit 594205b4936771a250f9d141e7e0fff21c3dd2d9, it was introduced in version v4.5 by commit a29728463b254ce81ecefdf20c1a02e01d9361da. For more details please see the references link. | null | 2022-04-25T06:14:28.657535Z | 2022-04-24T22:00:01.359868Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a29728463b254ce81ecefdf20c1a02e01d9361da'} |
Linux | GSD-2022-1000666 | RDMA/cma: Use correct address when leaving multicast group | RDMA/cma: Use correct address when leaving multicast group
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.8 by commit 3365f9daa2a7060309979d55105f0a1c12354683, it was introduced in version v5.10 by commit b5de0c60cc30c2a3513c7188c73f3f29acc29234. For more details please see the references link. | null | 2022-03-07T01:52:47.921583Z | 2022-02-27T03:37:58.437327Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b5de0c60cc30c2a3513c7188c73f3f29acc29234'} |
Linux | GSD-2022-1000236 | moxart: fix potential use-after-free on remove path | moxart: fix potential use-after-free on remove path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.100 by commit be93028d306dac9f5b59ebebd9ec7abcfc69c156. For more details please see the references link. | null | 2022-02-19T10:23:11.609612Z | 2022-02-18T21:59:41.082520Z | null | null | null | null | null |
Linux | GSD-2021-1000849 | scsi: core: Fix error handling of scsi_host_alloc() | scsi: core: Fix error handling of scsi_host_alloc()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.273 by commit 8958181c1663e24a13434448e7d6b96b5d04900a. For more details please see the references link. | null | 2021-12-20T03:08:58.041027Z | 2021-06-30T00:01:13.511008Z | null | null | null | null | null |
Linux | GSD-2021-1000799 | bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks | bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit acc43fc6cf0d50612193813c5906a1ab9d433e1e, it was introduced in version v5.6 by commit 59438b46471ae6cdfb761afc8c9beaf1e428a331. For more details please see the references link. | null | 2021-12-19T23:04:34.623358Z | 2021-06-25T00:08:08.380930Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/59438b46471ae6cdfb761afc8c9beaf1e428a331'} |
Linux | GSD-2021-1000263 | ataflop: potential out of bounds in do_format() | ataflop: potential out of bounds in do_format()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 2a3a8bbca28b899806844c00d49ed1b7ccb50957, it was introduced in version v5.11 by commit bf9c0538e485b591a2ee02d9adb8a99db4be5a2a. For more details please see the references link. | null | 2021-12-19T23:33:16.483472Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf9c0538e485b591a2ee02d9adb8a99db4be5a2a'} |
Linux | GSD-2021-1000633 | drm/meson: fix shutdown crash when component not probed | drm/meson: fix shutdown crash when component not probed
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.124 by commit 4ce2bf20b4a6e307e114847d60b2bf40a6a1fac0, it was introduced in version v5.4.106 by commit d2100ef32a8cfd024bad94f4fbc5e53d40d2b3da. For more details please see the references link. | null | 2021-12-20T01:03:15.701493Z | 2021-06-04T19:51:16.650822Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d2100ef32a8cfd024bad94f4fbc5e53d40d2b3da'} |
Linux | GSD-2021-1001921 | isdn: mISDN: Fix sleeping function called from invalid context | isdn: mISDN: Fix sleeping function called from invalid context
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.290 by commit 6f95c97e0f9d6eb39c3f2cb45e8fa4268d1b372b. For more details please see the references link. | null | 2021-12-20T00:19:04.789303Z | 2021-11-14T15:11:48.428866Z | null | null | null | null | null |
Linux | GSD-2021-1001188 | virtio_console: Assure used length from device is limited | virtio_console: Assure used length from device is limited
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.4 by commit 21a06a244d2576f93cbc9ce9bf95814c2810c36a. For more details please see the references link. | null | 2021-12-20T00:11:13.898616Z | 2021-08-03T01:33:28.391366Z | null | null | null | null | null |
Linux | GSD-2022-1002122 | brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path | brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit f3820ddaf4f3ac80c7401ccc6a42e663c9317f31, it was introduced in version v5.4 by commit 82f93cf46d6007ffa003b2d4a2834563b6b84d21. For more details please see the references link. | null | 2022-04-25T03:11:24.794919Z | 2022-04-24T22:13:46.385773Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/82f93cf46d6007ffa003b2d4a2834563b6b84d21'} |
Linux | GSD-2021-1001472 | seq_file: disallow extremely large seq buffer allocations | seq_file: disallow extremely large seq buffer allocations
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.276 by commit 3533e50cbee8ff086bfa04176ac42a01ee3db37d, it was introduced in version v3.16 by commit 058504edd02667eef8fac9be27ab3ea74332e9b4. For more details please see the references link. | null | 2021-12-20T00:38:25.566788Z | 2021-08-03T02:51:28.552916Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/058504edd02667eef8fac9be27ab3ea74332e9b4'} |
Linux | GSD-2022-1002088 | gpu: host1x: Fix a memory leak in 'host1x_remove()' | gpu: host1x: Fix a memory leak in 'host1x_remove()'
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 6bb107332db28a0e9256c2d36a0902b85307612c, it was introduced in version v4.13 by commit 8474b02531c4881a762c52ef869c52429e38633f. For more details please see the references link. | null | 2022-04-25T05:05:07.270479Z | 2022-04-24T22:09:42.884285Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8474b02531c4881a762c52ef869c52429e38633f'} |
Linux | GSD-2021-1001022 | usb: misc: brcmstb-usb-pinmap: check return value after calling platform_get_resource() | usb: misc: brcmstb-usb-pinmap: check return value after calling platform_get_resource()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.11 by commit 2147684be1ebdaf845783139b9bc4eba3fecd9e4, it was introduced in version v5.11 by commit 517c4c44b32372d2fdf4421822e21083c45e89f9. For more details please see the references link. | null | 2021-12-19T23:34:39.888334Z | 2021-06-30T00:34:28.893543Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/517c4c44b32372d2fdf4421822e21083c45e89f9'} |
Linux | GSD-2021-1001537 | cpufreq: schedutil: Destroy mutex before kobject_put() frees the memory | cpufreq: schedutil: Destroy mutex before kobject_put() frees the memory
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.249 by commit 514643eadfeab8ee11e55981289c720308eb0afd, it was introduced in version v4.14.249 by commit 463c46705f321201090b69c4ad5da0cd2ce614c9. For more details please see the references link. | null | 2021-10-19T16:22:45.082782Z | 2021-10-19T16:22:45.082782Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/463c46705f321201090b69c4ad5da0cd2ce614c9'} |
Linux | GSD-2022-1002067 | clk: qcom: clk-rcg2: Update logic to calculate D value for RCG | clk: qcom: clk-rcg2: Update logic to calculate D value for RCG
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 334720f418f57b1d969dad2117b21f9388cb9395, it was introduced in version v3.16 by commit 99cbd064b059f222c8839ba433a68b2d6ee33066. For more details please see the references link. | null | 2022-04-25T04:51:26.646529Z | 2022-04-24T22:07:22.792923Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/99cbd064b059f222c8839ba433a68b2d6ee33066'} |
Linux | GSD-2021-1001167 | io_uring: fix memleak in io_init_wq_offload() | io_uring: fix memleak in io_init_wq_offload()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.6 by commit 502731a03f27cba1513fbbff77e508185ffce5bb, it was introduced in version v5.12 by commit e941894eae31b52f0fd9bdb3ce20620afa152f45. For more details please see the references link. | null | 2021-12-19T23:18:23.332946Z | 2021-08-03T01:31:54.637164Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e941894eae31b52f0fd9bdb3ce20620afa152f45'} |
Linux | GSD-2022-1002437 | drm/tegra: Fix reference leak in tegra_dsi_ganged_probe | drm/tegra: Fix reference leak in tegra_dsi_ganged_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 5e8fdb6392d945d33fef959eab73f8c34bc0a63b, it was introduced in version v3.19 by commit e94236cde4d519cdecd45e2435defba33abdc99f. For more details please see the references link. | null | 2022-04-25T05:55:35.809481Z | 2022-04-24T22:47:18.983939Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e94236cde4d519cdecd45e2435defba33abdc99f'} |
Linux | GSD-2021-1000326 | sched: Fix out-of-bound access in uclamp | sched: Fix out-of-bound access in uclamp
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.38 by commit f7347c85490b92dd144fa1fba9e1eca501656ab3, it was introduced in version v5.3 by commit 69842cba9ace84849bb9b8edcdf2cefccd97901c. For more details please see the references link. | null | 2021-12-19T23:14:06.306445Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69842cba9ace84849bb9b8edcdf2cefccd97901c'} |
Linux | GSD-2022-1000959 | i2c: dev: check return value when calling dev_set_name() | i2c: dev: check return value when calling dev_set_name()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.4 by commit c74d77a2d07744147d734138acd6ce9dba715e5d, it was introduced in version v5.7 by commit 1413ef638abae4ab5621901cf4d8ef08a4a48ba6. For more details please see the references link. | null | 2022-04-25T06:26:17.536268Z | 2022-04-24T20:35:06.579858Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1413ef638abae4ab5621901cf4d8ef08a4a48ba6'} |
Linux | GSD-2021-1000776 | ext4: fix memory leak in ext4_fill_super | ext4: fix memory leak in ext4_fill_super
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.43 by commit 01d349a481f0591230300a9171330136f9159bcd, it was introduced in version v2.6.25 by commit ce40733ce93de402ed629762f0e912d9af187cef. For more details please see the references link. | null | 2021-12-19T22:52:18.063659Z | 2021-06-25T00:04:52.990237Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ce40733ce93de402ed629762f0e912d9af187cef'} |
Linux | GSD-2021-1001864 | efi: Change down_interruptible() in virt_efi_reset_system() to down_trylock() | efi: Change down_interruptible() in virt_efi_reset_system() to down_trylock()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.75 by commit 3b42751401424a1c0f39297b7f4317598aa33474. For more details please see the references link. | null | 2021-12-20T00:57:25.055592Z | 2021-10-28T13:52:54.868441Z | null | null | null | null | null |
Linux | GSD-2022-1001535 | scsi: pm8001: Fix abort all task initialization | scsi: pm8001: Fix abort all task initialization
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 326d894adf89f3c707b7784becbe241830daaab6, it was introduced in version v3.10 by commit c6b9ef5779c3e1edfa9de949d2a51252bc347663. For more details please see the references link. | null | 2022-04-25T06:51:39.885911Z | 2022-04-24T21:21:14.266549Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6b9ef5779c3e1edfa9de949d2a51252bc347663'} |
Linux | GSD-2021-1002065 | riscv, bpf: Fix potential NULL dereference | riscv, bpf: Fix potential NULL dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.77 by commit cac6b043cea3e120f4fccec16f7381747cbfdc0d, it was introduced in version v5.7 by commit ca6cb5447ceca6a87d6b62c9e5d41042c34f7ffa. For more details please see the references link. | null | 2021-12-20T01:09:54.508279Z | 2021-11-14T15:18:19.566383Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca6cb5447ceca6a87d6b62c9e5d41042c34f7ffa'} |
Linux | GSD-2021-1000058 | media: staging/intel-ipu3: Fix set_fmt error handling | media: staging/intel-ipu3: Fix set_fmt error handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.3 by commit 6fb617e37a39db0a3eca4489431359d0bdf3b9bc, it was introduced in version v5.2 by commit 6d5f26f2e045f2377b524516194657c00efbbce8. For more details please see the references link. | null | 2021-12-19T23:33:00.134312Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6d5f26f2e045f2377b524516194657c00efbbce8'} |
Linux | GSD-2022-1001165 | LSM: general protection fault in legacy_parse_param | LSM: general protection fault in legacy_parse_param
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit cadae7c5e477aaafcba819b8e4a3d1c1a1503b62. For more details please see the references link. | null | 2022-04-25T06:23:08.908548Z | 2022-04-24T20:49:46.966137Z | null | null | null | null | null |
Linux | GSD-2021-1002435 | proc/vmcore: fix clearing user buffer by properly using clear_user() | proc/vmcore: fix clearing user buffer by properly using clear_user()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.163 by commit fd7974c547abfb03072a4ee706d3a6f182266f89, it was introduced in version v3.0 by commit 997c136f518c5debd63847e78e2a8694f56dcf90. For more details please see the references link. | null | 2021-12-19T22:09:54.542282Z | 2021-12-19T19:37:10.501558Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/997c136f518c5debd63847e78e2a8694f56dcf90'} |
Linux | GSD-2021-1000408 | hfsplus: prevent corruption in shrinking truncate | hfsplus: prevent corruption in shrinking truncate
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.120 by commit c451a6bafb5f422197d31536f82116aed132b72c, it was introduced in version v4.19 by commit 31651c607151f1034cfb57e5a78678bea54c362b. For more details please see the references link. | null | 2021-12-19T22:55:19.274558Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/31651c607151f1034cfb57e5a78678bea54c362b'} |
Linux | GSD-2022-1000324 | vsock: remove vsock from connected table when connect is interrupted by a signal | vsock: remove vsock from connected table when connect is interrupted by a signal
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.231 by commit 2910bcb9f67551a45397735e47b6d456eb8cd549, it was introduced in version v3.9 by commit d021c344051af91f42c5ba9fdedc176740cbd238. For more details please see the references link. | null | 2022-03-07T01:38:08.536544Z | 2022-02-27T02:51:33.956871Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d021c344051af91f42c5ba9fdedc176740cbd238'} |
Linux | GSD-2022-1002319 | dm ioctl: prevent potential spectre v1 gadget | dm ioctl: prevent potential spectre v1 gadget
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 7ae2c5b89da3cfaf856df880af27d3bb32a74b3d. For more details please see the references link. | null | 2022-04-25T05:41:38.487154Z | 2022-04-24T22:33:52.558788Z | null | null | null | null | null |
Linux | GSD-2021-1001649 | mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap | mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.71 by commit 1282bb00835ff79d2d9c023055d514df5b4de260, it was introduced in version v4.7 by commit 646e76bb5daf4ca38438c69ffb72cccb605f3466. For more details please see the references link. | null | 2021-12-20T00:37:38.047407Z | 2021-10-19T16:29:57.214152Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/646e76bb5daf4ca38438c69ffb72cccb605f3466'} |
Linux | GSD-2022-1001866 | bpf: Fix UAF due to race between btf_try_get_module and load_module | bpf: Fix UAF due to race between btf_try_get_module and load_module
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 51b82141fffa454abf937a8ff0b8af89e4fd0c8f, it was introduced in version v5.12 by commit 541c3bad8dc51b253ba8686d0cd7628e6b9b5f4c. For more details please see the references link. | null | 2022-04-25T03:10:44.070208Z | 2022-04-24T21:49:45.242691Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/541c3bad8dc51b253ba8686d0cd7628e6b9b5f4c'} |
Linux | GSD-2022-1000774 | xfrm: fix MTU regression | xfrm: fix MTU regression
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.27 by commit 75cbedd333431381ef309c5b0968582c7ba4c8ee, it was introduced in version v4.15 by commit 749439bfac6e1a2932c582e2699f91d329658196. For more details please see the references link. | null | 2022-03-18T04:47:33.259033Z | 2022-03-18T00:17:17.621062Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/749439bfac6e1a2932c582e2699f91d329658196'} |
Linux | GSD-2021-1001219 | RDMA/cma: Fix rdma_resolve_route() memory leak | RDMA/cma: Fix rdma_resolve_route() memory leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.3 by commit 07583ba2e2d8947c3d365d97608cb436510885ac. For more details please see the references link. | null | 2021-12-20T00:14:40.057528Z | 2021-08-03T01:39:33.098394Z | null | null | null | null | null |
Linux | GSD-2021-1002823 | net: marvell: prestera: fix incorrect structure access | net: marvell: prestera: fix incorrect structure access
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.12 by commit 5c553a0cd1263e4da5f220d80fa713fc3959c1d0, it was introduced in version v5.14 by commit 3d5048cc54bd250cfbb358c37fcc011135977887. For more details please see the references link. | null | 2022-01-11T05:48:11.066628Z | 2021-12-30T02:44:59.336675Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3d5048cc54bd250cfbb358c37fcc011135977887'} |
Linux | GSD-2022-1001889 | watch_queue: Fix NULL dereference in error cleanup | watch_queue: Fix NULL dereference in error cleanup
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 695c47cea02b9101e2fc2e7d36d552128592b347, it was introduced in version v5.8 by commit c73be61cede5882f9605a852414db559c0ebedfd. For more details please see the references link. | null | 2022-04-25T03:36:28.729306Z | 2022-04-24T21:52:18.881607Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c73be61cede5882f9605a852414db559c0ebedfd'} |
Linux | GSD-2022-1000261 | powerpc64/bpf: Limit 'ldbrx' to processors compliant with ISA v2.06 | powerpc64/bpf: Limit 'ldbrx' to processors compliant with ISA v2.06
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.19 by commit 3bfbc00587dc883eaed383558ae512a351c2cd09, it was introduced in version v4.8 by commit 156d0e290e969caba25f1851c52417c14d141b24. For more details please see the references link. | null | 2022-02-19T03:13:39.185386Z | 2022-02-18T22:03:25.904794Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/156d0e290e969caba25f1851c52417c14d141b24'} |
Linux | GSD-2022-1001923 | jffs2: fix memory leak in jffs2_scan_medium | jffs2: fix memory leak in jffs2_scan_medium
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 52ba0ab4f0a606f02a6163493378989faa1ec10a, it was introduced in version v2.6.15 by commit e631ddba588783edd521c5a89f7b2902772fb691. For more details please see the references link. | null | 2022-04-25T06:30:41.274134Z | 2022-04-24T21:55:17.649441Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e631ddba588783edd521c5a89f7b2902772fb691'} |
Linux | GSD-2022-1000631 | hwmon: (nct6775) Fix crash in clear_caseopen | hwmon: (nct6775) Fix crash in clear_caseopen
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.5 by commit cfb7d12f2e4a4d694f49e9b4ebb352f7b67cdfbb, it was introduced in version v5.16 by commit 2e7b9886968b89f0b4cbc59b8e6ed47fd4edd0dd. For more details please see the references link. | null | 2022-03-07T01:50:38.549903Z | 2022-02-27T03:33:23.241580Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2e7b9886968b89f0b4cbc59b8e6ed47fd4edd0dd'} |
Linux | GSD-2021-1002120 | net/tls: Fix flipped sign in tls_err_abort() calls | net/tls: Fix flipped sign in tls_err_abort() calls
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.16 by commit e41473543f75f7dbc5d605007e6f883f1bd13b9a, it was introduced in version v4.17 by commit c46234ebb4d1eee5e09819f49169e51cfc6eb909. For more details please see the references link. | null | 2021-12-20T00:43:49.393819Z | 2021-11-14T15:20:45.047458Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c46234ebb4d1eee5e09819f49169e51cfc6eb909'} |
Linux | GSD-2022-1001470 | btrfs: handle csum lookup errors properly on reads | btrfs: handle csum lookup errors properly on reads
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit f181b2e060929da91c01e2068179774ab8fa18fc. For more details please see the references link. | null | 2022-04-25T03:38:42.623232Z | 2022-04-24T21:15:24.307856Z | null | null | null | null | null |
Linux | GSD-2021-1002570 | drm/vc4: kms: Add missing drm_crtc_commit_put | drm/vc4: kms: Add missing drm_crtc_commit_put
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.7 by commit 53f9601e908d42481addd67cdb01a9288c611124, it was introduced in version v5.12 by commit 9ec03d7f1ed394897891319a4dda75f52c5d292d. For more details please see the references link. | null | 2021-12-19T23:26:28.026844Z | 2021-12-19T19:43:14.649305Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9ec03d7f1ed394897891319a4dda75f52c5d292d'} |
Linux | GSD-2022-1001020 | skbuff: fix coalescing for page_pool fragment recycling | skbuff: fix coalescing for page_pool fragment recycling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 72bb856d16e883437023ff2ff77d0c498018728a, it was introduced in version v5.15 by commit 53e0961da1c7bbdabd1abebb20de403ec237ec09. For more details please see the references link. | null | 2022-04-25T06:40:30.075405Z | 2022-04-24T20:40:26.787402Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/53e0961da1c7bbdabd1abebb20de403ec237ec09'} |
Linux | GSD-2021-1001075 | regulator: rt4801: Fix NULL pointer dereference if priv->enable_gpios is NULL | regulator: rt4801: Fix NULL pointer dereference if priv->enable_gpios is NULL
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit dc68f0c9e4a001e02376fe87f4bdcacadb27e8a1. For more details please see the references link. | null | 2021-12-20T01:36:22.878168Z | 2021-06-30T00:37:59.117299Z | null | null | null | null | null |
Linux | GSD-2022-1000518 | veth: fix races around rq->rx_notify_masked | veth: fix races around rq->rx_notify_masked
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit fd45628d2fec2bf7085d856ef448959d6e7effe9, it was introduced in version v4.19 by commit 948d4f214fde43743c57aae0c708bff44f6345f2. For more details please see the references link. | null | 2022-03-07T01:48:10.132338Z | 2022-02-27T03:18:34.332718Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/948d4f214fde43743c57aae0c708bff44f6345f2'} |
Linux | GSD-2021-1001425 | dm btree remove: assign new_root only when removal succeeds | dm btree remove: assign new_root only when removal succeeds
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.240 by commit 73f27adaa73e3057a9ec464e33c4f54d34ea5de3. For more details please see the references link. | null | 2021-12-19T23:39:54.182427Z | 2021-08-03T02:36:32.349570Z | null | null | null | null | null |
Linux | GSD-2022-1002175 | irqchip/gic-v3: Fix GICR_CTLR.RWP polling | irqchip/gic-v3: Fix GICR_CTLR.RWP polling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 3c07cc242baf83f0bddbbd9d7945d0bee56d8b57, it was introduced in version v3.17 by commit 021f653791ad17e03f98aaa7fb933816ae16f161. For more details please see the references link. | null | 2022-04-25T04:53:17.064364Z | 2022-04-24T22:18:45.795491Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/021f653791ad17e03f98aaa7fb933816ae16f161'} |
Linux | GSD-2022-1000148 | udf: Fix NULL ptr deref when converting from inline format | udf: Fix NULL ptr deref when converting from inline format
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.176 by commit 31136e5467f381cf18e2cfd467207dda7678c7a2, it was introduced in version v4.2 by commit 52ebea749aaed195245701a8f90a23d672c7a933. For more details please see the references link. | null | 2022-02-19T08:09:41.079239Z | 2022-02-18T21:47:19.841660Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/52ebea749aaed195245701a8f90a23d672c7a933'} |
Linux | GSD-2021-1000664 | misc/uss720: fix memory leak in uss720_probe | misc/uss720: fix memory leak in uss720_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.193 by commit 386918878ce4cd676e4607233866e03c9399a46a, it was introduced in version v2.6.14 by commit 0f36163d3abefbda1b21a330b3fdf3c2dc076d94. For more details please see the references link. | null | 2021-12-19T22:34:39.945900Z | 2021-06-04T19:57:44.662256Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0f36163d3abefbda1b21a330b3fdf3c2dc076d94'} |
Linux | GSD-2021-1002659 | xen/netback: don't queue unlimited number of packages | xen/netback: don't queue unlimited number of packages
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.222 by commit c9f17e92917fd5786be872626a3928979ecc4c39, it was introduced in version v3.18 by commit f48da8b14d04ca87ffcffe68829afd45f926ec6a. For more details please see the references link. | null | 2022-01-11T05:57:59.095548Z | 2021-12-27T05:33:34.496007Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f48da8b14d04ca87ffcffe68829afd45f926ec6a'} |
Linux | GSD-2021-1001976 | NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() | NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.213 by commit 9881b0c860649f27ef2565deef011e516390f416, it was introduced in version v3.13 by commit 1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8. For more details please see the references link. | null | 2021-12-19T22:14:05.329178Z | 2021-11-14T15:14:16.626456Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8'} |
Linux | GSD-2022-1001309 | can: m_can: m_can_tx_handler(): fix use after free of skb | can: m_can: m_can_tx_handler(): fix use after free of skb
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 31417073493f302d26ab66b3abc098d43227b835, it was introduced in version v3.18 by commit 80646733f11c2e9de3b6339f7e635047e6087280. For more details please see the references link. | null | 2022-04-25T04:20:30.308598Z | 2022-04-24T21:02:56.872532Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80646733f11c2e9de3b6339f7e635047e6087280'} |
Linux | GSD-2021-1000234 | mt76: mt7615: Fix a dereference of pointer sta before it is null checked | mt76: mt7615: Fix a dereference of pointer sta before it is null checked
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 28d7cb12d403f7f49e0914fd39b869ce5521f726, it was introduced in version v5.12.4 by commit fb2e48febf56c8993c5355dd2084c3d36b70c110. For more details please see the references link. | null | 2021-06-24T22:55:39.150843Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb2e48febf56c8993c5355dd2084c3d36b70c110'} |
Linux | GSD-2021-1002209 | staging: rtl8712: fix use-after-free in rtl8712_dl_fw | staging: rtl8712: fix use-after-free in rtl8712_dl_fw
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.2 by commit a65c9afe9f2f55b7a7fb4a25ab654cd4139683a4, it was introduced in version v3.3 by commit 8c213fa59199f9673d66970d6940fa093186642f. For more details please see the references link. | null | 2021-12-20T03:52:27.909143Z | 2021-11-14T15:24:47.541914Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c213fa59199f9673d66970d6940fa093186642f'} |
Linux | GSD-2022-1001759 | wireguard: socket: ignore v6 endpoints when ipv6 is disabled | wireguard: socket: ignore v6 endpoints when ipv6 is disabled
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 9af42a4f6d81b96b123f3ec22a4dcb906c6d00e7, it was introduced in version v5.6 by commit e7096c131e5161fa3b8e52a650d7719d2857adfd. For more details please see the references link. | null | 2022-04-25T05:35:51.615050Z | 2022-04-24T21:40:17.827677Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e7096c131e5161fa3b8e52a650d7719d2857adfd'} |
Linux | GSD-2021-1000721 | net: caif: fix memory leak in caif_device_notify | net: caif: fix memory leak in caif_device_notify
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.272 by commit 9348c1f10932f13b299cbc8b1bd5f780751fae49, it was introduced in version v3.3 by commit 7c18d2205ea76eef9674e59e1ecae4f332a53e9e. For more details please see the references link. | null | 2021-12-20T01:37:45.007577Z | 2021-06-24T23:59:11.036428Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7c18d2205ea76eef9674e59e1ecae4f332a53e9e'} |
Linux | GSD-2021-1001833 | s390/pci: fix zpci_zdev_put() on reserve | s390/pci: fix zpci_zdev_put() on reserve
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit 188907c252188ac7a5ec3efcfa31dae1f47b8a20, it was introduced in version v5.10.61 by commit a69326e134d4ffa0d2d77bf1a4a62271c51c3051. For more details please see the references link. | null | 2021-12-20T00:21:05.530192Z | 2021-10-28T13:51:19.841325Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a69326e134d4ffa0d2d77bf1a4a62271c51c3051'} |
Linux | GSD-2021-1001999 | NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() | NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.155 by commit 7ab488d7228a9dceb2456867f1f0919decf6efed, it was introduced in version v3.13 by commit 1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8. For more details please see the references link. | null | 2021-12-20T00:36:34.963988Z | 2021-11-14T15:15:14.811618Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8'} |
Linux | GSD-2021-1000371 | media: venus: core: Fix some resource leaks in the error path of 'venus_probe()' | media: venus: core: Fix some resource leaks in the error path of 'venus_probe()'
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 00b68a7478343afdf83f30c43e64db5296057030, it was introduced in version v5.5 by commit 32f0a6ddc8c98a1aade2bf3d07c79d5d2c6ceb9a. For more details please see the references link. | null | 2021-12-19T22:56:47.965308Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/32f0a6ddc8c98a1aade2bf3d07c79d5d2c6ceb9a'} |
Linux | GSD-2022-1002460 | drivers: net: slip: fix NPD bug in sl_tx_timeout() | drivers: net: slip: fix NPD bug in sl_tx_timeout()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit 113284fe48770841e157e338bf3a2e9f197a8b50. For more details please see the references link. | null | 2022-04-25T05:29:37.729474Z | 2022-04-24T22:50:29.091025Z | null | null | null | null | null |
Linux | GSD-2021-1001130 | mac80211: remove warning in ieee80211_get_sband() | mac80211: remove warning in ieee80211_get_sband()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.14 by commit 93e9f3fbafe3ebe8d060c11a425a08fad1885f23. For more details please see the references link. | null | 2021-12-19T22:13:39.146941Z | 2021-07-08T01:58:28.424269Z | null | null | null | null | null |
Linux | GSD-2022-1002030 | ubifs: Fix to add refcount once page is set private | ubifs: Fix to add refcount once page is set private
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit c34ae24a2590fee96a3a7735ba2fa6cc52306221, it was introduced in version v2.6.27 by commit 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d. For more details please see the references link. | null | 2022-04-25T04:49:47.547920Z | 2022-04-24T22:04:31.523642Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d'} |
Linux | GSD-2021-1001560 | sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb | sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.209 by commit 8c630a7b4f9dec63f08bd881ab77984a724a5124, it was introduced in version v4.8 by commit 3acb50c18d8d6650f10919464ade4dcdaf41d62f. For more details please see the references link. | null | 2021-12-20T01:34:06.934654Z | 2021-10-19T16:23:47.850869Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3acb50c18d8d6650f10919464ade4dcdaf41d62f'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.