ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2021-1000865 | NFS: Fix use-after-free in nfs4_init_client() | NFS: Fix use-after-free in nfs4_init_client()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.237 by commit c7eab9e2d7b4e983ce280276fb920af649955897, it was introduced in version v4.13 by commit 8dcbec6d20eb881ba368d0aebc3a8a678aebb1da. For more details please see the references link. | null | 2021-12-19T23:16:35.030978Z | 2021-06-30T00:02:20.023049Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8dcbec6d20eb881ba368d0aebc3a8a678aebb1da'} |
Linux | GSD-2021-1001777 | net: mdiobus: Fix memory leak in __mdiobus_register | net: mdiobus: Fix memory leak in __mdiobus_register
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.288 by commit bc5f2f3431ced08300e4cb3aff35f1da14c26433. For more details please see the references link. | null | 2021-12-19T22:27:49.049272Z | 2021-10-28T13:48:23.301560Z | null | null | null | null | null |
Linux | GSD-2022-1002227 | xen: fix is_xen_pmu() | xen: fix is_xen_pmu()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit ab2c789d1c0a3d0a682f7aa287754193471ff9f8, it was introduced in version v4.3 by commit bf6dfb154d935725c9a2005033ca33017b9df439. For more details please see the references link. | null | 2022-04-25T06:07:40.661315Z | 2022-04-24T22:23:20.991582Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf6dfb154d935725c9a2005033ca33017b9df439'} |
Linux | GSD-2021-1001327 | NFSv4: Initialise connection to the server in nfs4_alloc_client() | NFSv4: Initialise connection to the server in nfs4_alloc_client()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.134 by commit 81e03fe5bf8f5f66b8a62429fb4832b11ec6b272, it was introduced in version v4.8 by commit 5c6e5b60aae4347223f176966455010a5715b863. For more details please see the references link. | null | 2021-12-19T23:23:54.675545Z | 2021-08-03T02:10:06.466966Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5c6e5b60aae4347223f176966455010a5715b863'} |
Linux | GSD-2022-1001958 | cifs: potential buffer overflow in handling symlinks | cifs: potential buffer overflow in handling symlinks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.112 by commit 4e166a41180be2f1e66bbb6d46448e80a9a5ec05, it was introduced in version v2.6.37 by commit c69c1b6eaea1b3e1eecf7ad2fba0208ac4a11131. For more details please see the references link. | null | 2022-04-25T06:53:39.124094Z | 2022-04-24T21:58:14.785437Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c69c1b6eaea1b3e1eecf7ad2fba0208ac4a11131'} |
Linux | GSD-2021-1000166 | net: hso: fix NULL-deref on disconnect regression | net: hso: fix NULL-deref on disconnect regression
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.33 by commit 90642ee9eb581a13569b1c0bd57e85d962215273, it was introduced in version v5.10.30 by commit dc195928d7e4ec7b5cfc6cd10dc4c8d87a7c72ac. For more details please see the references link. | null | 2021-12-20T00:23:49.113254Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/dc195928d7e4ec7b5cfc6cd10dc4c8d87a7c72ac'} |
Linux | GSD-2021-1000536 | net/smc: remove device from smcd_dev_list after failed device_add() | net/smc: remove device from smcd_dev_list after failed device_add()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit 40588782f1016c655ae1d302892f61d35af96842, it was introduced in version v4.19 by commit c6ba7c9ba43de1b57e9a53946e7ff988554c84ed. For more details please see the references link. | null | 2021-12-20T01:01:30.035727Z | 2021-06-04T19:35:03.007712Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6ba7c9ba43de1b57e9a53946e7ff988554c84ed'} |
Linux | GSD-2021-1000023 | dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback | dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.16 by commit 02981a44a0e402089775416371bd2e0c935685f8, it was introduced in version v5.6 by commit bfe1d56091c1a404b3d4ce7e9809d745fc4453bb. For more details please see the references link. | null | 2021-12-19T22:09:06.702185Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bfe1d56091c1a404b3d4ce7e9809d745fc4453bb'} |
Linux | GSD-2021-1000473 | Drivers: hv: vmbus: Increase wait time for VMbus unload | Drivers: hv: vmbus: Increase wait time for VMbus unload
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.233 by commit aac05d8ab50d9f0b18a3f03bb8f88b6c917b6d57, it was introduced in version v4.14.199 by commit f3440c029e471962719de3cbd771933e2165b338. For more details please see the references link. | null | 2021-12-20T01:34:33.829344Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f3440c029e471962719de3cbd771933e2165b338'} |
Linux | GSD-2022-1002362 | media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED | media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit f04a520a422222fc921bf035dc67414c500a286a, it was introduced in version v3.7 by commit 8ac456495a33d9466076fea94594181ceefb76d9. For more details please see the references link. | null | 2022-04-25T03:23:36.800260Z | 2022-04-24T22:38:54.296201Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ac456495a33d9466076fea94594181ceefb76d9'} |
Linux | GSD-2021-1000920 | sch_cake: Fix out of bounds when parsing TCP options and header | sch_cake: Fix out of bounds when parsing TCP options and header
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.128 by commit 4cefa061fc63f4d2dff5ab4083f43857cd7a2335, it was introduced in version v4.19 by commit 8b7138814f29933898ecd31dfc83e35a30ee69f5. For more details please see the references link. | null | 2021-12-19T23:56:35.219050Z | 2021-06-30T00:24:34.652437Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8b7138814f29933898ecd31dfc83e35a30ee69f5'} |
Linux | GSD-2021-1001632 | usb: chipidea: ci_hdrc_imx: Also search for 'phys' phandle | usb: chipidea: ci_hdrc_imx: Also search for 'phys' phandle
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.73 by commit b3265b88e83b16c7be762fa5fb7e0632bce0002c, it was introduced in version v5.8 by commit 746f316b753a83e366bfc5f936cbf0d72d1c2d1d. For more details please see the references link. | null | 2021-12-19T22:44:04.643728Z | 2021-10-19T16:29:08.879861Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/746f316b753a83e366bfc5f936cbf0d72d1c2d1d'} |
Linux | GSD-2021-1001798 | efi: Change down_interruptible() in virt_efi_reset_system() to down_trylock() | efi: Change down_interruptible() in virt_efi_reset_system() to down_trylock()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.252 by commit 2d1792c078cd1b9f28ee3c7d3f1f8c2087ea39fd. For more details please see the references link. | null | 2021-12-19T23:56:18.765775Z | 2021-10-28T13:49:22.488205Z | null | null | null | null | null |
Linux | GSD-2021-1001262 | memory: fsl_ifc: fix leak of IO mapping on probe failure | memory: fsl_ifc: fix leak of IO mapping on probe failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.52 by commit 8d071d270afba468708faca5f7b6d9e656f75e27, it was introduced in version v3.3 by commit a20cbdeffce247a2b6fb83cd8d22433994068565. For more details please see the references link. | null | 2021-12-19T22:58:59.162223Z | 2021-08-03T01:51:54.729674Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a20cbdeffce247a2b6fb83cd8d22433994068565'} |
Linux | GSD-2022-1001237 | mt76: mt7915: fix possible memory leak in mt7915_mcu_add_sta | mt76: mt7915: fix possible memory leak in mt7915_mcu_add_sta
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit b334a245ff1d76b1e97af8cea648ea6798b9eb87, it was introduced in version v5.16 by commit 89bbd3730f382f15cfcc2c9264c65b5901ce02fa. For more details please see the references link. | null | 2022-04-25T03:35:17.067875Z | 2022-04-24T20:56:37.753612Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/89bbd3730f382f15cfcc2c9264c65b5901ce02fa'} |
Linux | GSD-2021-1002767 | io-wq: check for wq exit after adding new worker task_work | io-wq: check for wq exit after adding new worker task_work
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit 4b4e5bbf9386d4ec21d91c0cb0fd60b9bba778ec. For more details please see the references link. | null | 2022-01-11T05:50:05.700954Z | 2021-12-27T05:52:51.848892Z | null | null | null | null | null |
Linux | GSD-2021-1001848 | can: peak_pci: peak_pci_remove(): fix UAF | can: peak_pci: peak_pci_remove(): fix UAF
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit 28f28e4bc3a5e0051faa963f10b778ab38c1db69, it was introduced in version v3.4 by commit e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd. For more details please see the references link. | null | 2021-12-20T00:25:06.470257Z | 2021-10-28T13:52:01.004677Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd'} |
Linux | GSD-2022-1001667 | mm/sparsemem: fix 'mem_section' will never be NULL gcc 12 warning | mm/sparsemem: fix 'mem_section' will never be NULL gcc 12 warning
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 429f413ed83f6b9f81e8c4362bcc19e817a4d208, it was introduced in version v2.6.14 by commit 3e347261a80b57df792ab9464b5f0ed59add53a8. For more details please see the references link. | null | 2022-04-25T06:17:22.754223Z | 2022-04-24T21:33:29.358745Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3e347261a80b57df792ab9464b5f0ed59add53a8'} |
Linux | GSD-2022-1000975 | io_uring: abort file assignment prior to assigning creds | io_uring: abort file assignment prior to assigning creds
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.4 by commit 262960775e0d2cdf97a3e33993e95e13175df4bb, it was introduced in version v5.17.3 by commit 2c443b22756cf75dc594d4d32bf64505bf4ce84b. For more details please see the references link. | null | 2022-04-25T05:52:13.157024Z | 2022-04-24T20:36:14.155938Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c443b22756cf75dc594d4d32bf64505bf4ce84b'} |
Linux | GSD-2021-1002337 | tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc | tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit 5c34486f04700f1ba04907231dce0cc2705c2d7d. For more details please see the references link. | null | 2021-12-20T01:04:52.673940Z | 2021-11-29T02:39:25.697779Z | null | null | null | null | null |
Linux | GSD-2022-1000426 | KVM: eventfd: Fix false positive RCU usage warning | KVM: eventfd: Fix false positive RCU usage warning
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit d44af3ad2a2148582839b556d0ff5b5e3787dfc0. For more details please see the references link. | null | 2022-03-07T01:34:58.067029Z | 2022-02-27T03:05:11.574931Z | null | null | null | null | null |
Linux | GSD-2022-1000099 | USB: core: Fix hang in usb_kill_urb by adding memory barriers | USB: core: Fix hang in usb_kill_urb by adding memory barriers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.265 by commit 546ba238535d925254e0b3f12012a5c55801e2f3. For more details please see the references link. | null | 2022-02-19T04:37:11.172725Z | 2022-02-18T21:35:05.392196Z | null | null | null | null | null |
Linux | GSD-2022-1000563 | copy_process(): Move fd_install() out of sighand->siglock critical section | copy_process(): Move fd_install() out of sighand->siglock critical section
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit bc8167d53b7cbed96d5c2274bd7b92c4c9af1105, it was introduced in version v5.2 by commit 6fd2fe494b17bf2dec37b610d23a43a72b16923a. For more details please see the references link. | null | 2022-03-07T01:50:15.207183Z | 2022-02-27T03:24:21.736983Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6fd2fe494b17bf2dec37b610d23a43a72b16923a'} |
Linux | GSD-2022-1000133 | rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() | rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.228 by commit a01e60a1ec6bef9be471fb7182a33c6d6f124e93, it was introduced in version v3.14 by commit ba7d49b1f0f8e5f24294a880ed576964059af5ef. For more details please see the references link. | null | 2022-02-19T03:05:56.342498Z | 2022-02-18T21:44:49.541575Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ba7d49b1f0f8e5f24294a880ed576964059af5ef'} |
Linux | GSD-2021-1002622 | igbvf: fix double free in `igbvf_probe` | igbvf: fix double free in `igbvf_probe`
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.294 by commit 79d9b092035dcdbe636b70433149df9cc6db1e49, it was introduced in version v2.6.30 by commit d4e0fe01a38a073568aee541a0247fe734095979. For more details please see the references link. | null | 2022-01-11T05:48:00.463019Z | 2021-12-27T05:27:40.766193Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d4e0fe01a38a073568aee541a0247fe734095979'} |
Linux | GSD-2022-1001688 | IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition | IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 92f1947c0d26060e978b3a9f21f32ce7c8c9cca3, it was introduced in version v5.1 by commit d757c60eca9b22f4d108929a24401e0fdecda0b1. For more details please see the references link. | null | 2022-04-25T03:19:47.020195Z | 2022-04-24T21:35:25.093107Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d757c60eca9b22f4d108929a24401e0fdecda0b1'} |
Linux | GSD-2022-1001372 | scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one() | scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit de6aee0978f164d3d0c771ce03e3066a26c371c5, it was introduced in version v2.6.23 by commit 45804fbb00eea27bdf4d62751681228a9e2844e9. For more details please see the references link. | null | 2022-04-25T06:02:05.958414Z | 2022-04-24T21:08:50.339144Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/45804fbb00eea27bdf4d62751681228a9e2844e9'} |
Linux | GSD-2021-1002272 | usb: typec: tipd: Remove WARN_ON in tps6598x_block_read | usb: typec: tipd: Remove WARN_ON in tps6598x_block_read
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.162 by commit 30dcfcda8992dc42f18e7d35b6a1fa72372d382d. For more details please see the references link. | null | 2021-12-20T00:27:20.176536Z | 2021-11-29T02:36:22.137143Z | null | null | null | null | null |
Linux | GSD-2022-1001722 | scsi: pm8001: Fix memory leak in pm8001_chip_fw_flash_update_req() | scsi: pm8001: Fix memory leak in pm8001_chip_fw_flash_update_req()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit e5ecdb01952f230921aa8163d8d7f4c97c925ed8. For more details please see the references link. | null | 2022-04-25T06:25:01.288399Z | 2022-04-24T21:37:42.452564Z | null | null | null | null | null |
Linux | GSD-2022-1000830 | netfilter: nf_queue: fix possible use-after-free | netfilter: nf_queue: fix possible use-after-free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.104 by commit 4d05239203fa38ea8a6f31e228460da4cb17a71a, it was introduced in version v2.6.29 by commit 271b72c7fa82c2c7a795bc16896149933110672d. For more details please see the references link. | null | 2022-03-18T02:51:26.287167Z | 2022-03-18T00:22:24.445439Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/271b72c7fa82c2c7a795bc16896149933110672d'} |
Linux | GSD-2021-1002788 | f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr() | f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.223 by commit f9dfa44be0fb5e8426183a70f69a246cf5827f49. For more details please see the references link. | null | 2022-01-11T06:43:38.664954Z | 2021-12-30T02:43:27.169590Z | null | null | null | null | null |
Linux | GSD-2021-1000561 | USB: usbfs: Don't WARN about excessively large memory allocations | USB: usbfs: Don't WARN about excessively large memory allocations
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit 9f7cb3f01a10d9064cf13b3d26fb7e7a5827d098, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T23:20:18.936348Z | 2021-06-04T19:39:08.343951Z | null | null | null | null | null |
Linux | GSD-2021-1000131 | dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails | dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.36 by commit 1cb02dc76f4c0a2749a02b26469512d6984252e9, it was introduced in version v4.6 by commit 1c357a1e86a4227a6b6059f2de118ae47659cebc. For more details please see the references link. | null | 2021-12-20T00:59:46.156225Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c357a1e86a4227a6b6059f2de118ae47659cebc'} |
Linux | GSD-2021-1000998 | PCI: aardvark: Fix kernel panic during PIO transfer | PCI: aardvark: Fix kernel panic during PIO transfer
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.46 by commit 1a1dbc4473974867fe8c5f195c17b341c8e82867. For more details please see the references link. | null | 2021-12-19T22:54:25.929199Z | 2021-06-30T00:32:14.625749Z | null | null | null | null | null |
Linux | GSD-2021-1001370 | net/sched: act_skbmod: Skip non-Ethernet packets | net/sched: act_skbmod: Skip non-Ethernet packets
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.199 by commit e4fdca366806f6bab374d1a95e626a10a3854b0c, it was introduced in version v4.9 by commit 86da71b57383d40993cb90baafb3735cffe5d800. For more details please see the references link. | null | 2021-12-19T22:32:16.180891Z | 2021-08-03T02:21:15.052469Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/86da71b57383d40993cb90baafb3735cffe5d800'} |
Linux | GSD-2022-1002270 | mm/kmemleak: reset tag when compare object pointer | mm/kmemleak: reset tag when compare object pointer
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 35b72d8e2c8e324d26a06149e45416a02aa7aec8. For more details please see the references link. | null | 2022-04-25T06:21:28.328297Z | 2022-04-24T22:28:37.678271Z | null | null | null | null | null |
Linux | GSD-2021-1000832 | usb: dwc3: ep0: fix NULL pointer exception | usb: dwc3: ep0: fix NULL pointer exception
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.273 by commit 96b74a99d360235c24052f1d060e64ac53f43528. For more details please see the references link. | null | 2021-12-20T00:41:12.443080Z | 2021-06-30T00:00:09.218259Z | null | null | null | null | null |
Linux | GSD-2021-1001720 | RDMA/hfi1: Fix kernel pointer leak | RDMA/hfi1: Fix kernel pointer leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit 714bfabe5f2901d96902e271d7217601fe4703e5, it was introduced in version v5.13 by commit 042a00f93aad5874937e00f36e68301f7e3a0af1. For more details please see the references link. | null | 2021-12-20T01:19:41.549996Z | 2021-10-19T16:33:27.033145Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/042a00f93aad5874937e00f36e68301f7e3a0af1'} |
Linux | GSD-2021-1001235 | atm: iphase: fix possible use-after-free in ia_module_exit() | atm: iphase: fix possible use-after-free in ia_module_exit()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.3 by commit d1fb12412874c94ad037e11d0ecdd1140a439297. For more details please see the references link. | null | 2021-12-19T23:37:41.094424Z | 2021-08-03T01:44:39.381714Z | null | null | null | null | null |
Linux | GSD-2022-1000758 | xen/xenbus: don't let xenbus_grant_ring() remove grants in error case | xen/xenbus: don't let xenbus_grant_ring() remove grants in error case
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.28 by commit 66cb2bbb522b0d5e4f6a11558ff7bfdf3f7d31f3. For more details please see the references link. | null | 2022-03-18T03:03:08.607862Z | 2022-03-18T00:15:44.390748Z | null | null | null | null | null |
Linux | GSD-2021-1000977 | net: ipv4: fix memory leak in netlbl_cipsov4_add_std | net: ipv4: fix memory leak in netlbl_cipsov4_add_std
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.46 by commit deeeb65c6ee404f2d1fb80b38b2730645c0f4663, it was introduced in version v2.6.19 by commit 96cb8e3313c7a12e026c1ed510522ae6f6023875. For more details please see the references link. | null | 2021-12-20T01:25:18.382912Z | 2021-06-30T00:30:56.195321Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/96cb8e3313c7a12e026c1ed510522ae6f6023875'} |
Linux | GSD-2021-1001665 | xen/balloon: use a kernel thread instead a workqueue | xen/balloon: use a kernel thread instead a workqueue
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.70 by commit 372d3e6ea1e115942fdfb4b25f7003d822d071be. For more details please see the references link. | null | 2021-12-20T01:16:13.514953Z | 2021-10-19T16:30:42.882865Z | null | null | null | null | null |
Linux | GSD-2022-1000308 | parisc: Fix data TLB miss in sba_unmap_sg | parisc: Fix data TLB miss in sba_unmap_sg
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.268 by commit de75676ee99bf9f25b1124ff301b3f7b8ba597d4. For more details please see the references link. | null | 2022-03-07T02:37:24.631885Z | 2022-02-27T02:49:03.458919Z | null | null | null | null | null |
Linux | GSD-2022-1002335 | video: fbdev: cirrusfb: check pixclock to avoid divide by zero | video: fbdev: cirrusfb: check pixclock to avoid divide by zero
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 40b13e3d85744210db13457785646634e2d056bd. For more details please see the references link. | null | 2022-04-25T04:25:07.545277Z | 2022-04-24T22:35:31.210500Z | null | null | null | null | null |
Linux | GSD-2021-1002419 | net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources() | net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.220 by commit 676dc7d9b15bf8733233a2db1ec3f9091ab34275, it was introduced in version v4.7 by commit ec25bc04ed8e12947738468cbe2191f1529f9e39. For more details please see the references link. | null | 2021-12-19T23:34:19.116088Z | 2021-12-19T19:36:33.107993Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ec25bc04ed8e12947738468cbe2191f1529f9e39'} |
Linux | GSD-2021-1000424 | i2c: img-scb: fix reference leak when pm_runtime_get_sync fails | i2c: img-scb: fix reference leak when pm_runtime_get_sync fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.119 by commit 4734c4b1d9573c9d20bbc46cf37dde095ee011b8, it was introduced in version v4.15 by commit 93222bd9b966105f43418fd336654ad10045783a. For more details please see the references link. | null | 2021-12-19T23:52:20.345813Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/93222bd9b966105f43418fd336654ad10045783a'} |
Linux | GSD-2022-1001149 | btrfs: do not clean up repair bio if submit fails | btrfs: do not clean up repair bio if submit fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit d1cb11fb45ebbb1e7dfe5e9038b32ea72c184b14. For more details please see the references link. | null | 2022-04-25T06:51:25.224276Z | 2022-04-24T20:49:00.618938Z | null | null | null | null | null |
Linux | GSD-2021-1002049 | mm, slub: fix potential memoryleak in kmem_cache_open() | mm, slub: fix potential memoryleak in kmem_cache_open()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit 568f906340b43120abd6fcc67c37396482f85930, it was introduced in version v4.8 by commit 210e7a43fa905bccafa9bb5966fba1d71f33eb8b. For more details please see the references link. | null | 2021-12-19T22:23:46.509014Z | 2021-11-14T15:17:32.496448Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/210e7a43fa905bccafa9bb5966fba1d71f33eb8b'} |
Linux | GSD-2021-1000074 | riscv/kprobe: fix kernel panic when invoking sys_read traced by kprobe | riscv/kprobe: fix kernel panic when invoking sys_read traced by kprobe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.3 by commit fd0f06590d35c99f98d12c7984897ec4201a6263, it was introduced in version v5.12 by commit c22b0bcb1dd024cb9caad9230e3a387d8b061df5. For more details please see the references link. | null | 2021-12-19T23:29:20.962115Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c22b0bcb1dd024cb9caad9230e3a387d8b061df5'} |
Linux | GSD-2022-1001519 | bpf, sockmap: Fix double uncharge the mem of sk_msg | bpf, sockmap: Fix double uncharge the mem of sk_msg
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 223f3c51ab163852dd4819d357dcf33039929434, it was introduced in version v4.20 by commit 604326b41a6fb9b4a78b6179335decee0365cd8c. For more details please see the references link. | null | 2022-04-25T04:05:38.594555Z | 2022-04-24T21:19:35.679868Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/604326b41a6fb9b4a78b6179335decee0365cd8c'} |
Linux | GSD-2022-1000021 | net: fix use-after-free in tw_timer_handler | net: fix use-after-free in tw_timer_handler
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.224 by commit a8e1944b44f94f5c5f530e434c5eaee787254566, it was introduced in version v2.6.27 by commit 61a7e26028b94805fd686a6dc9dbd9941f8f19b0. For more details please see the references link. | null | 2022-01-11T05:48:21.866151Z | 2022-01-10T19:50:30.551170Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61a7e26028b94805fd686a6dc9dbd9941f8f19b0'} |
Linux | GSD-2022-1000471 | mtd: rawnand: gpmi: don't leak PM reference in error path | mtd: rawnand: gpmi: don't leak PM reference in error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit 4a7ec50298b1127c5024a750c969ea0794899545, it was introduced in version v5.15.17 by commit 0fe08bf9909f02eb487af2cc829f2853ea69bc96. For more details please see the references link. | null | 2022-03-07T01:38:48.558909Z | 2022-02-27T03:11:47.788588Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0fe08bf9909f02eb487af2cc829f2853ea69bc96'} |
Linux | GSD-2021-1002360 | net: ethernet: dec: tulip: de4x5: fix possible array overflows in type3_infoblock() | net: ethernet: dec: tulip: de4x5: fix possible array overflows in type3_infoblock()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.294 by commit 9a3af2f11bb7a50dcdcdfb98a687831dd75768e8. For more details please see the references link. | null | 2021-12-20T01:21:40.686687Z | 2021-12-19T19:33:54.461363Z | null | null | null | null | null |
Linux | GSD-2022-1001630 | tpm: fix reference counting for struct tpm_chip | tpm: fix reference counting for struct tpm_chip
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 2f928c0d5c02dbab49e8c19d98725c822f6fc409, it was introduced in version v4.12 by commit fdc915f7f71939ad5a3dda3389b8d2d7a7c5ee66. For more details please see the references link. | null | 2022-04-25T03:12:32.391037Z | 2022-04-24T21:30:09.880806Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fdc915f7f71939ad5a3dda3389b8d2d7a7c5ee66'} |
Linux | GSD-2022-1000922 | xfrm: fix MTU regression | xfrm: fix MTU regression
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.270 by commit d4d5190b942ac7a0f048db718c0a9f280b4fc2ce, it was introduced in version v4.14.16 by commit 8278804e05f6bcfe3fdfea4a404020752ead15a6. For more details please see the references link. | null | 2022-03-18T02:55:01.909537Z | 2022-03-18T00:32:30.781135Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8278804e05f6bcfe3fdfea4a404020752ead15a6'} |
Linux | GSD-2021-1002730 | bpf: Fix kernel address leakage in atomic cmpxchg's r0 aux reg | bpf: Fix kernel address leakage in atomic cmpxchg's r0 aux reg
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit f87a6c160ecc8c7b417d25f508d3f076fe346136, it was introduced in version v5.12 by commit 5ffa25502b5ab3d639829a2d1e316cff7f59a41e. For more details please see the references link. | null | 2022-01-11T05:58:12.901258Z | 2021-12-27T05:44:57.204715Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5ffa25502b5ab3d639829a2d1e316cff7f59a41e'} |
Linux | GSD-2022-1000888 | netfilter: nf_tables: fix memory leak during stateful obj update | netfilter: nf_tables: fix memory leak during stateful obj update
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.182 by commit 53026346a94c43f35c32b18804041bc483271d87, it was introduced in version v5.4 by commit d62d0ba97b5803183e70cfded7f7b9da76893bf5. For more details please see the references link. | null | 2022-03-18T03:36:06.566794Z | 2022-03-18T00:28:22.435684Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d62d0ba97b5803183e70cfded7f7b9da76893bf5'} |
Linux | GSD-2022-1001260 | ASoC: codecs: wc938x: fix accessing array out of bounds for enum type | ASoC: codecs: wc938x: fix accessing array out of bounds for enum type
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit d09aee1b1da196be11ed86dd4897f228f2487613, it was introduced in version v5.14 by commit e8ba1e05bdc016700c85fad559a812c2e795442f. For more details please see the references link. | null | 2022-04-25T06:40:29.488583Z | 2022-04-24T20:58:59.075442Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e8ba1e05bdc016700c85fad559a812c2e795442f'} |
Linux | GSD-2022-1001775 | ARM: mmp: Fix failure to remove sram device | ARM: mmp: Fix failure to remove sram device
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 4ab0293c961b75f914d05c9ed67fbb137315955a. For more details please see the references link. | null | 2022-04-25T05:17:31.030773Z | 2022-04-24T21:41:40.830905Z | null | null | null | null | null |
Linux | GSD-2022-1000867 | KVM: x86/mmu: make apf token non-zero to fix bug | KVM: x86/mmu: make apf token non-zero to fix bug
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.103 by commit 72fdfc75d4217b32363cc80def3de2cb3fef3f02. For more details please see the references link. | null | 2022-03-18T03:01:02.404335Z | 2022-03-18T00:25:58.768705Z | null | null | null | null | null |
Linux | GSD-2021-1000218 | f2fs: fix to avoid touching checkpointed data in get_victim() | f2fs: fix to avoid touching checkpointed data in get_victim()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.5 by commit 211372b2571520e394b56b431a0705586013b3ff, it was introduced in version v4.20 by commit 4354994f097d068a894aa1a0860da54571df3582. For more details please see the references link. | null | 2021-12-20T01:12:49.895415Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4354994f097d068a894aa1a0860da54571df3582'} |
Linux | GSD-2021-1002225 | cfg80211: call cfg80211_stop_ap when switch from P2P_GO type | cfg80211: call cfg80211_stop_ap when switch from P2P_GO type
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.291 by commit 0738cdb636c21ab552eaecf905efa4a6070e3ebc, it was introduced in version v3.6 by commit ac800140c20e7ae51117e71289065bedd4930fc2. For more details please see the references link. | null | 2021-12-19T23:48:46.063378Z | 2021-11-29T02:34:13.181185Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac800140c20e7ae51117e71289065bedd4930fc2'} |
Linux | GSD-2022-1001325 | locking/lockdep: Avoid potential access of invalid memory in lock_class | locking/lockdep: Avoid potential access of invalid memory in lock_class
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 0e3dd4fba4b1ccfaac60194950df6a760576c608, it was introduced in version v5.1 by commit 8b39adbee805c539a461dbf208b125b096152b1c. For more details please see the references link. | null | 2022-04-25T04:21:32.852697Z | 2022-04-24T21:04:42.199255Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8b39adbee805c539a461dbf208b125b096152b1c'} |
Linux | GSD-2021-1000648 | net: fec: fix the potential memory leak in fec_enet_init() | net: fec: fix the potential memory leak in fec_enet_init()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.193 by commit 15102886bc8f5f29daaadf2d925591d564c17e9f, it was introduced in version v3.18 by commit 59d0f746564495c7f54526674deabfcf101236a1. For more details please see the references link. | null | 2021-12-19T23:01:20.940735Z | 2021-06-04T19:54:33.767373Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/59d0f746564495c7f54526674deabfcf101236a1'} |
Linux | GSD-2021-1002675 | net: systemport: Add global locking for descriptor lifecycle | net: systemport: Add global locking for descriptor lifecycle
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.168 by commit c675256a7f131f5ba3f331efb715e8f31ea0e392, it was introduced in version v3.16 by commit 80105befdb4b8cea924711b40b2462b87df65b62. For more details please see the references link. | null | 2022-01-11T05:48:00.384531Z | 2021-12-27T05:36:16.087844Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80105befdb4b8cea924711b40b2462b87df65b62'} |
Linux | GSD-2022-1002159 | ARM: davinci: da850-evm: Avoid NULL pointer dereference | ARM: davinci: da850-evm: Avoid NULL pointer dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.190 by commit 89931d4762572aaee6edbe5673d41f8082de110f, it was introduced in version v2.6.33 by commit bae105879f2f2404155da6f50b3636193d228a62. For more details please see the references link. | null | 2022-04-25T07:03:32.239219Z | 2022-04-24T22:17:05.631627Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bae105879f2f2404155da6f50b3636193d228a62'} |
Linux | GSD-2022-1000164 | net: sched: fix use-after-free in tc_new_tfilter() | net: sched: fix use-after-free in tc_new_tfilter()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.177 by commit b1d17e920dfcd4b56fa2edced5710c191f7e50b5, it was introduced in version v5.1 by commit 470502de5bdb1ed0def643a4458593a40b8f6b66. For more details please see the references link. | null | 2022-02-19T09:48:02.826240Z | 2022-02-18T21:49:10.387490Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/470502de5bdb1ed0def643a4458593a40b8f6b66'} |
Linux | GSD-2021-1001409 | net: qcom/emac: fix UAF in emac_remove | net: qcom/emac: fix UAF in emac_remove
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.241 by commit b1e091331920f8fbfc747dcbd16263fcd71abb2d, it was introduced in version v4.9 by commit 54e19bc74f3380d414681762ceed9f7245bc6a6e. For more details please see the references link. | null | 2021-12-19T23:21:26.756581Z | 2021-08-03T02:32:42.275514Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/54e19bc74f3380d414681762ceed9f7245bc6a6e'} |
Linux | GSD-2022-1002509 | video: fbdev: sm712fb: Fix crash in smtcfb_read() | video: fbdev: sm712fb: Fix crash in smtcfb_read()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit e6766bb02614ad69218dcd849668524e46916e11. For more details please see the references link. | null | 2022-04-25T06:27:36.512308Z | 2022-04-24T22:56:17.537225Z | null | null | null | null | null |
Linux | GSD-2022-1000534 | parisc: Fix data TLB miss in sba_unmap_sg | parisc: Fix data TLB miss in sba_unmap_sg
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit e40ae3133ed87d6d526f3c8fc6a5f9a2d72dcdbf. For more details please see the references link. | null | 2022-03-07T01:40:03.971233Z | 2022-02-27T03:20:23.516764Z | null | null | null | null | null |
Linux | GSD-2021-1001059 | net/mlx5e: Fix use-after-free of encap entry in neigh update handler | net/mlx5e: Fix use-after-free of encap entry in neigh update handler
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit b6447b72aca571632e71bb73a797118d5ce46a93, it was introduced in version v5.4 by commit 2a1f1768fa17805ca2e937e2e034a7c3433d3bdc. For more details please see the references link. | null | 2021-12-20T00:49:26.567375Z | 2021-06-30T00:36:54.704234Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2a1f1768fa17805ca2e937e2e034a7c3433d3bdc'} |
Linux | GSD-2021-1001736 | hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field | hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit 24af1fe376e22c42238a4a604d31e46c486876c3. For more details please see the references link. | null | 2021-12-20T01:21:32.306715Z | 2021-10-19T16:34:12.600498Z | null | null | null | null | null |
Linux | GSD-2021-1000824 | neighbour: allow NUD_NOARP entries to be forced GCed | neighbour: allow NUD_NOARP entries to be forced GCed
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit ddf088d7aaaaacfc836104f2e632b29b1d383cfc, it was introduced in version v5.0 by commit 58956317c8de52009d1a38a721474c24aef74fe7. For more details please see the references link. | null | 2021-12-19T23:47:56.946378Z | 2021-06-25T00:09:41.298049Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/58956317c8de52009d1a38a721474c24aef74fe7'} |
Linux | GSD-2021-1002819 | netfilter: nf_tables: fix use-after-free in nft_set_catchall_destroy() | netfilter: nf_tables: fix use-after-free in nft_set_catchall_destroy()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.12 by commit 9d558e5f0d6fdd0a568f73dceb0b40c4f5012e5a, it was introduced in version v5.13 by commit aaa31047a6d25da0fa101da1ed544e1247949b40. For more details please see the references link. | null | 2022-01-11T05:53:42.304842Z | 2021-12-30T02:44:48.660684Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/aaa31047a6d25da0fa101da1ed544e1247949b40'} |
Linux | GSD-2022-1002266 | block: don't delete queue kobject before its children | block: don't delete queue kobject before its children
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 84fe3ca6e7910beb47ec13509d484f84fa2a41ad, it was introduced in version v4.16 by commit 2c2086afc2b8b974fac32cb028e73dc27bfae442. For more details please see the references link. | null | 2022-04-25T04:34:59.480537Z | 2022-04-24T22:28:23.450159Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c2086afc2b8b974fac32cb028e73dc27bfae442'} |
Linux | GSD-2021-1001366 | virtio-blk: Fix memory leak among suspend/resume procedure | virtio-blk: Fix memory leak among suspend/resume procedure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.198 by commit 600942d2fd49b90e44857d20c774b20d16f3130f. For more details please see the references link. | null | 2021-12-19T22:43:26.161720Z | 2021-08-03T02:20:14.530022Z | null | null | null | null | null |
Linux | GSD-2022-1001919 | riscv: Increase stack size under KASAN | riscv: Increase stack size under KASAN
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 305a5303d1dad349d854d1b51893a8e5e3b2fa27, it was introduced in version v5.6 by commit 8ad8b72721d0f07fa02dbe71f901743f9c71c8e6. For more details please see the references link. | null | 2022-04-25T03:21:35.982846Z | 2022-04-24T21:54:27.368117Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ad8b72721d0f07fa02dbe71f901743f9c71c8e6'} |
Linux | GSD-2021-1000127 | bpf: Fix masking negation logic upon negative dst register | bpf: Fix masking negation logic upon negative dst register
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.19 by commit 6eba92a4d4be8feb4dc33976abac544fa99d6ecc, it was introduced in version v5.0 by commit 979d63d50c0c0f7bc537bf821e056cc9fe5abd38. For more details please see the references link. | null | 2021-12-20T00:12:58.189199Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/979d63d50c0c0f7bc537bf821e056cc9fe5abd38'} |
Linux | GSD-2021-1000577 | net: lantiq: fix memory corruption in RX ring | net: lantiq: fix memory corruption in RX ring
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.42 by commit 5ac72351655f8b033a2935646f53b7465c903418, it was introduced in version v4.20 by commit fe1a56420cf2ec28c8eceef672b87de0bbe1a260. For more details please see the references link. | null | 2021-12-19T22:37:20.614822Z | 2021-06-04T19:41:37.293274Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fe1a56420cf2ec28c8eceef672b87de0bbe1a260'} |
Linux | GSD-2021-1000598 | tipc: wait and exit until all work queues are done | tipc: wait and exit until all work queues are done
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.42 by commit 5195ec5e365a2a9331bfeb585b613a6e94f98dba, it was introduced in version v4.1 by commit d0f91938bede204a343473792529e0db7d599836. For more details please see the references link. | null | 2021-12-20T00:01:37.740943Z | 2021-06-04T19:44:55.411036Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0f91938bede204a343473792529e0db7d599836'} |
Linux | GSD-2021-1000062 | ext4: fix check to prevent false positive report of incorrect used inodes | ext4: fix check to prevent false positive report of incorrect used inodes
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.3 by commit e18d76a12b34791bc0318a0e0c0fa5863cd8dabf, it was introduced in version v4.18 by commit 5012284700775a4e6e3fbe7eac4c543c4874b559. For more details please see the references link. | null | 2021-12-20T00:32:29.913633Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5012284700775a4e6e3fbe7eac4c543c4874b559'} |
Linux | GSD-2021-1000432 | spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() | spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.119 by commit 4a01ad002d2e03c399af536562693752af7c81b1, it was introduced in version v5.2 by commit 944c01a889d97dc08e1b71f4ed868f4023fd6034. For more details please see the references link. | null | 2021-12-20T00:00:02.239205Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/944c01a889d97dc08e1b71f4ed868f4023fd6034'} |
Linux | GSD-2022-1002323 | ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 | ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 25efc5d03455c3839249bc77fce5e29ecb54677e. For more details please see the references link. | null | 2022-04-25T06:42:24.420226Z | 2022-04-24T22:34:16.551054Z | null | null | null | null | null |
Linux | GSD-2021-1001389 | jfs: fix GPF in diFree | jfs: fix GPF in diFree
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.198 by commit aff8d95b69051d0cf4acc3d91f22299fdbb9dfb3. For more details please see the references link. | null | 2021-12-20T00:22:23.723732Z | 2021-08-03T02:26:36.660037Z | null | null | null | null | null |
Linux | GSD-2021-1001673 | comedi: Fix memory leak in compat_insnlist() | comedi: Fix memory leak in compat_insnlist()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.70 by commit 8d6a21e4cd6a319b0662cbe4ad6199e276ac776a, it was introduced in version v5.8 by commit b8d47d8813055ce38c0d2ad913d5462017e52692. For more details please see the references link. | null | 2021-12-20T01:04:15.127797Z | 2021-10-19T16:31:11.616015Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b8d47d8813055ce38c0d2ad913d5462017e52692'} |
Linux | GSD-2021-1000961 | gpio: wcd934x: Fix shift-out-of-bounds error | gpio: wcd934x: Fix shift-out-of-bounds error
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.44 by commit e0b518a2eb44d8a74c19e50f79a8ed393e96d634, it was introduced in version v5.6 by commit 59c324683400b41caa6d85b091e812ee3d5415c3. For more details please see the references link. | null | 2021-12-19T23:49:38.492751Z | 2021-06-30T00:29:26.749844Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/59c324683400b41caa6d85b091e812ee3d5415c3'} |
Linux | GSD-2021-1001223 | drm/amd/display: Avoid HDCP over-read and corruption | drm/amd/display: Avoid HDCP over-read and corruption
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.3 by commit 3b2b93a485fb7a970bc8b5daef16f4cf579d172f. For more details please see the references link. | null | 2021-12-19T23:30:07.430215Z | 2021-08-03T01:40:48.548438Z | null | null | null | null | null |
Linux | GSD-2022-1002289 | drivers: net: slip: fix NPD bug in sl_tx_timeout() | drivers: net: slip: fix NPD bug in sl_tx_timeout()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.239 by commit 753b9d220a7d36dac70e7c6d05492d10d6f9dd36. For more details please see the references link. | null | 2022-04-25T05:24:34.209235Z | 2022-04-24T22:30:35.119825Z | null | null | null | null | null |
Linux | GSD-2022-1001276 | block: don't delete queue kobject before its children | block: don't delete queue kobject before its children
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 3d7e32c8da45957326f56937e0471c686d1a7711, it was introduced in version v4.16 by commit 2c2086afc2b8b974fac32cb028e73dc27bfae442. For more details please see the references link. | null | 2022-04-25T06:00:47.027340Z | 2022-04-24T21:00:37.615877Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c2086afc2b8b974fac32cb028e73dc27bfae442'} |
Linux | GSD-2021-1001809 | net: encx24j600: check error in devm_regmap_init_encx24j600 | net: encx24j600: check error in devm_regmap_init_encx24j600
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.213 by commit 5e5494e6fc8a29c927e0478bec4a078a40da8901, it was introduced in version v4.4 by commit 04fbfce7a222327b97ca165294ef19f0faa45960. For more details please see the references link. | null | 2021-12-19T23:06:40.908228Z | 2021-10-28T13:50:01.474327Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/04fbfce7a222327b97ca165294ef19f0faa45960'} |
Linux | GSD-2021-1002726 | drm/msm: Fix null ptr access msm_ioctl_gem_submit() | drm/msm: Fix null ptr access msm_ioctl_gem_submit()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.10 by commit f6db3d98f876870c35e96693cfd54752f6199e59. For more details please see the references link. | null | 2022-01-11T05:51:12.236997Z | 2021-12-27T05:39:15.933276Z | null | null | null | null | null |
Linux | GSD-2022-1000934 | sr9700: sanity check for packet length | sr9700: sanity check for packet length
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.269 by commit fbc3c962b6eb42b1483d00d8ea28b61b9f2fff26. For more details please see the references link. | null | 2022-03-18T03:36:18.377788Z | 2022-03-18T00:34:05.229382Z | null | null | null | null | null |
Linux | GSD-2022-1001626 | firmware: sysfb: fix platform-device leak in error path | firmware: sysfb: fix platform-device leak in error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit bb7fcbe80a013dc883181dc818c407d38558f76c, it was introduced in version v5.16.3 by commit 124986477234ba3610cb9202d3c208939031b1bc. For more details please see the references link. | null | 2022-04-25T06:06:49.308537Z | 2022-04-24T21:29:49.746851Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/124986477234ba3610cb9202d3c208939031b1bc'} |
Linux | GSD-2021-1002376 | sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl | sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.292 by commit 91ba94d3f7afca195b224f77a72044fbde1389ce, it was introduced in version v2.6.24 by commit faf0b2e5afe7dae072d2715763c7f992b612b628. For more details please see the references link. | null | 2021-12-19T22:35:41.663893Z | 2021-12-19T19:34:34.013290Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/faf0b2e5afe7dae072d2715763c7f992b612b628'} |
Linux | GSD-2022-1000467 | net_sched: add __rcu annotation to netdev->qdisc | net_sched: add __rcu annotation to netdev->qdisc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit 9bb363ba014ff7d2823baf2a0cf7a91e39fb63f2, it was introduced in version v5.1 by commit 470502de5bdb1ed0def643a4458593a40b8f6b66. For more details please see the references link. | null | 2022-03-07T01:43:24.754463Z | 2022-02-27T03:11:20.231548Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/470502de5bdb1ed0def643a4458593a40b8f6b66'} |
Linux | GSD-2022-1000037 | Input: appletouch - initialize work before device registration | Input: appletouch - initialize work before device registration
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.90 by commit 9f329d0d6c91142cf0ad08d23c72dd195db2633c, it was introduced in version v2.6.23 by commit 5a6eb676d3bc4d7a6feab200a92437b62ad298da. For more details please see the references link. | null | 2022-01-11T05:49:30.963728Z | 2022-01-10T19:51:11.126792Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5a6eb676d3bc4d7a6feab200a92437b62ad298da'} |
Linux | GSD-2022-1000522 | eeprom: ee1004: limit i2c reads to I2C_SMBUS_BLOCK_MAX | eeprom: ee1004: limit i2c reads to I2C_SMBUS_BLOCK_MAX
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 9443ddeb3754e9e382a396b50adc1961301713ce, it was introduced in version v5.16.3 by commit 07d9beb6e3c2e852e884113d6803ea4b3643ae38. For more details please see the references link. | null | 2022-03-07T01:38:20.499875Z | 2022-02-27T03:19:01.717090Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/07d9beb6e3c2e852e884113d6803ea4b3643ae38'} |
Linux | GSD-2022-1000488 | NFSD: Fix the behavior of READ near OFFSET_MAX | NFSD: Fix the behavior of READ near OFFSET_MAX
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 44502aca8e02ab32d6b0eb52e006a5ec9402719b. For more details please see the references link. | null | 2022-03-07T01:40:24.804645Z | 2022-02-27T03:14:22.544525Z | null | null | null | null | null |
Linux | GSD-2022-1000172 | mm/kmemleak: avoid scanning potential huge holes | mm/kmemleak: avoid scanning potential huge holes
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.178 by commit d3533ee20e9a0e2e8f60384da7450d43d1c63d1a. For more details please see the references link. | null | 2022-02-19T04:35:42.141697Z | 2022-02-18T21:50:49.478276Z | null | null | null | null | null |
Linux | GSD-2021-1002663 | xen/console: harden hvc_xen against event channel storms | xen/console: harden hvc_xen against event channel storms
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.222 by commit 57e46acb3b48ea4e8efb1e1bea2e89e0c6cc43e2. For more details please see the references link. | null | 2022-01-11T05:48:17.305869Z | 2021-12-27T05:35:06.801947Z | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.