ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2021-1002399
can: pch_can: pch_can_rx_normal: fix use after free
can: pch_can: pch_can_rx_normal: fix use after free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.258 by commit affbad02bf80380a7403885b9fe4a1587d1bb4f3, it was introduced in version v2.6.37 by commit b21d18b51b31a24d17f883b678432fbdee3d5675. For more details please see the references link.
null
2021-12-20T01:18:08.963489Z
2021-12-19T19:35:36.637429Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b21d18b51b31a24d17f883b678432fbdee3d5675'}
Linux
GSD-2022-1001333
netfilter: nf_tables: initialize registers in nft_do_chain()
netfilter: nf_tables: initialize registers in nft_do_chain() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.1 by commit dd03640529204ef4b8189fbdea08217d8d98271f, it was introduced in version v3.13 by commit 96518518cc417bb0a8c80b9fb736202e28acdf96. For more details please see the references link.
null
2022-04-25T03:38:48.983508Z
2022-04-24T21:05:22.620039Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/96518518cc417bb0a8c80b9fb736202e28acdf96'}
Linux
GSD-2022-1001299
can: isotp: sanitize CAN ID checks in isotp_bind()
can: isotp: sanitize CAN ID checks in isotp_bind() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 7b4652fc71dcec043977a6def80ef5034c913615, it was introduced in version v5.10 by commit e057dd3fc20ffb3d7f150af46542a51b59b90127. For more details please see the references link.
null
2022-04-25T07:55:01.294909Z
2022-04-24T21:02:16.047188Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e057dd3fc20ffb3d7f150af46542a51b59b90127'}
Linux
GSD-2021-1002233
scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()
scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.291 by commit ec70d80a8642900086447ba0cdc79e3f44d42e8f. For more details please see the references link.
null
2021-12-20T00:21:49.603391Z
2021-11-29T02:34:32.185587Z
null
null
null
null
null
Linux
GSD-2022-1000871
xen/xenbus: don't let xenbus_grant_ring() remove grants in error case
xen/xenbus: don't let xenbus_grant_ring() remove grants in error case This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.184 by commit 95ff82383266a7720d596eb8b4499ed01746a730. For more details please see the references link.
null
2022-03-18T02:56:01.326133Z
2022-03-18T00:26:14.459222Z
null
null
null
null
null
Linux
GSD-2022-1001763
ubifs: Fix deadlock in concurrent rename whiteout and inode writeback
ubifs: Fix deadlock in concurrent rename whiteout and inode writeback This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit c58af8564a7b08757173009030b74baf4b2b762b, it was introduced in version v4.9 by commit 9e0a1fff8db56eaaebb74b4a3ef65f86811c4798. For more details please see the references link.
null
2022-04-25T05:24:18.786244Z
2022-04-24T21:40:57.905350Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9e0a1fff8db56eaaebb74b4a3ef65f86811c4798'}
Linux
GSD-2021-1000520
RDMA/rxe: Clear all QP fields if creation failed
RDMA/rxe: Clear all QP fields if creation failed This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.270 by commit c65391dd9f0a47617e96e38bd27e277cbe1c40b0, it was introduced in version v4.8 by commit 8700e3e7c4857d28ebaa824509934556da0b3e76. For more details please see the references link.
null
2021-12-20T00:03:10.806024Z
2021-05-31T23:50:10.744274Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8700e3e7c4857d28ebaa824509934556da0b3e76'}
Linux
GSD-2021-1000170
media: staging/intel-ipu3: Fix set_fmt error handling
media: staging/intel-ipu3: Fix set_fmt error handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.118 by commit a03fb1e8a110658215a4cefc3e2ad53279e496a6, it was introduced in version v5.2 by commit 6d5f26f2e045f2377b524516194657c00efbbce8. For more details please see the references link.
null
2021-12-20T01:39:39.232375Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6d5f26f2e045f2377b524516194657c00efbbce8'}
Linux
GSD-2021-1001331
virtio_console: Assure used length from device is limited
virtio_console: Assure used length from device is limited This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.134 by commit 52bd1bce8624acb861fa96b7c8fc2e75422dc8f7. For more details please see the references link.
null
2021-12-19T22:02:20.153645Z
2021-08-03T02:11:06.419988Z
null
null
null
null
null
Linux
GSD-2022-1002231
pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe
pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit bc1e29a35147c1ba6ea2b06a16cb0028f7c852d2, it was introduced in version v3.9 by commit 32e67eee670e1254ee5ab41e2f454680acb9c17c. For more details please see the references link.
null
2022-04-25T06:45:06.870716Z
2022-04-24T22:23:50.946630Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/32e67eee670e1254ee5ab41e2f454680acb9c17c'}
Linux
GSD-2021-1001761
comedi: Fix memory leak in compat_insnlist()
comedi: Fix memory leak in compat_insnlist() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.9 by commit f217b6c1e28ed0b353634ce4d92a155b80bd1671, it was introduced in version v5.8 by commit b8d47d8813055ce38c0d2ad913d5462017e52692. For more details please see the references link.
null
2021-12-19T23:36:00.219585Z
2021-10-19T16:35:26.839801Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b8d47d8813055ce38c0d2ad913d5462017e52692'}
Linux
GSD-2021-1000873
drm: Lock pointer access in drm_master_release()
drm: Lock pointer access in drm_master_release() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.195 by commit a376f7e66b654cb290fa9d16d8dab5bfef744463. For more details please see the references link.
null
2021-12-20T01:02:17.239183Z
2021-06-30T00:02:51.180620Z
null
null
null
null
null
Linux
GSD-2021-1001274
iommu/arm-smmu: Fix arm_smmu_device refcount leak when arm_smmu_rpm_get fails
iommu/arm-smmu: Fix arm_smmu_device refcount leak when arm_smmu_rpm_get fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.52 by commit c4007596fbdabc29f858dc2e1990858a146b60b2. For more details please see the references link.
null
2021-12-19T23:18:32.763086Z
2021-08-03T01:55:12.790077Z
null
null
null
null
null
Linux
GSD-2022-1000719
btrfs: get rid of warning on transaction commit when using flushoncommit
btrfs: get rid of warning on transaction commit when using flushoncommit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.13 by commit e4d044dbffcd570351f21c747fc77ff90aed7f2e. For more details please see the references link.
null
2022-03-18T02:52:37.013435Z
2022-03-18T00:12:05.217250Z
null
null
null
null
null
Linux
GSD-2021-1001624
drm/nouveau/debugfs: fix file release memory leak
drm/nouveau/debugfs: fix file release memory leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.73 by commit f69556a42043b5444ca712ee889829ba89fdcba8, it was introduced in version v4.5 by commit 6e9fc177399f08446293fec7607913fdbc95e191. For more details please see the references link.
null
2021-12-19T22:17:00.507318Z
2021-10-19T16:28:47.682223Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6e9fc177399f08446293fec7607913fdbc95e191'}
Linux
GSD-2021-1000936
usb: dwc3: core: fix kernel panic when do reboot
usb: dwc3: core: fix kernel panic when do reboot This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.128 by commit fd7c4bd582494934be15d41aebe0dbe23790605f, it was introduced in version v5.4.128 by commit d7e403eea007f47776186d4d572f234b1221e6e3. For more details please see the references link.
null
2021-06-30T00:25:36.510907Z
2021-06-30T00:25:36.510907Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d7e403eea007f47776186d4d572f234b1221e6e3'}
Linux
GSD-2022-1002374
jffs2: fix use-after-free in jffs2_clear_xattr_subsystem
jffs2: fix use-after-free in jffs2_clear_xattr_subsystem This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit c3b07c875fa8f906f932976460fd14798596f101, it was introduced in version v2.6.18 by commit aa98d7cf59b5b0764d3502662053489585faf2fe. For more details please see the references link.
null
2022-04-25T03:44:07.282474Z
2022-04-24T22:40:33.873702Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/aa98d7cf59b5b0764d3502662053489585faf2fe'}
Linux
GSD-2022-1000349
net: ieee802154: at86rf230: Stop leaking skb's
net: ieee802154: at86rf230: Stop leaking skb's This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.181 by commit 455ef08d6e5473526fa6763f75a93f7198206966. For more details please see the references link.
null
2022-03-07T01:38:42.696218Z
2022-02-27T02:54:23.531643Z
null
null
null
null
null
Linux
GSD-2021-1000465
userfaultfd: release page in error path to avoid BUG_ON
userfaultfd: release page in error path to avoid BUG_ON This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.233 by commit 319116227e52d49eee671f0aa278bac89b3c1b69, it was introduced in version v4.11 by commit cb658a453b9327ce96ce5222c24d162b5b65b564. For more details please see the references link.
null
2021-12-19T22:32:21.502460Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cb658a453b9327ce96ce5222c24d162b5b65b564'}
Linux
GSD-2021-1002458
HID: bigbenff: prevent null pointer dereference
HID: bigbenff: prevent null pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.165 by commit 8e0ceff632f48175ec7fb4706129c55ca8a7c7bd. For more details please see the references link.
null
2021-12-19T22:14:57.640281Z
2021-12-19T19:38:14.206104Z
null
null
null
null
null
Linux
GSD-2022-1001108
gfs2: Fix gfs2_file_buffered_write endless loop workaround
gfs2: Fix gfs2_file_buffered_write endless loop workaround This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit fbb74bc00f9a2a63b646945fd179aaf7249c3a77, it was introduced in version v5.16 by commit 554c577cee95bdc1d03d9f457e57dc96eb791845. For more details please see the references link.
null
2022-04-25T04:19:07.990893Z
2022-04-24T20:46:00.596301Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/554c577cee95bdc1d03d9f457e57dc96eb791845'}
Linux
GSD-2021-1000035
net: Make tcp_allowed_congestion_control readonly in non-init netns
net: Make tcp_allowed_congestion_control readonly in non-init netns This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.32 by commit 35d7491e2f77ce480097cabcaf93ed409e916e12, it was introduced in version v5.7 by commit 9cb8e048e5d93825ec5e8dfb5b8df4987ea25745. For more details please see the references link.
null
2021-12-19T22:50:55.246772Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9cb8e048e5d93825ec5e8dfb5b8df4987ea25745'}
Linux
GSD-2021-1002008
KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest()
KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.156 by commit 80bbb0bc3a0288442f7fe6fc514f4ee1cb06ccb7, it was introduced in version v5.2 by commit 10d91611f426d4bafd2a83d966c36da811b2f7ad. For more details please see the references link.
null
2021-12-19T22:20:32.578098Z
2021-11-14T15:15:43.374066Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/10d91611f426d4bafd2a83d966c36da811b2f7ad'}
Linux
GSD-2022-1001558
ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data
ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit f3793eeb7b94a5eeed6f5c7a44bce403c6681a12, it was introduced in version v5.6 by commit a61f3b4f476eceb25274161e5a53a8d18e42610b. For more details please see the references link.
null
2022-04-25T03:33:51.415689Z
2022-04-24T21:23:26.073006Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a61f3b4f476eceb25274161e5a53a8d18e42610b'}
Linux
GSD-2022-1000060
fs/mount_setattr: always cleanup mount_kattr
fs/mount_setattr: always cleanup mount_kattr This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.13 by commit 47b5d0a7532d39e42a938f81e3904268145c341d, it was introduced in version v5.12 by commit 9caccd41541a6f7d6279928d9f971f6642c361af. For more details please see the references link.
null
2022-01-11T05:53:54.578245Z
2022-01-10T19:52:17.790486Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9caccd41541a6f7d6279928d9f971f6642c361af'}
Linux
GSD-2022-1000430
net: dsa: felix: don't use devres for mdiobus
net: dsa: felix: don't use devres for mdiobus This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit 8cda7577a0b4018572f31e0caadfabd305ea2786, it was introduced in version v5.9 by commit ac3a68d56651c3dad2c12c7afce065fe15267f44. For more details please see the references link.
null
2022-03-07T01:43:08.087632Z
2022-02-27T03:06:26.053396Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac3a68d56651c3dad2c12c7afce065fe15267f44'}
Linux
GSD-2021-1002321
net/mlx5e: kTLS, Fix crash in RX resync flow
net/mlx5e: kTLS, Fix crash in RX resync flow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit ebeda7a9528ae690e6bf12791a868f0cca8391f2, it was introduced in version v5.13 by commit e9ce991bce5bacf71641bd0f72f4b7c589529f40. For more details please see the references link.
null
2021-12-19T22:28:19.236420Z
2021-11-29T02:38:38.871086Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e9ce991bce5bacf71641bd0f72f4b7c589529f40'}
Linux
GSD-2022-1000963
gcc-plugins: latent_entropy: use /dev/urandom
gcc-plugins: latent_entropy: use /dev/urandom This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.4 by commit 4b0202961a303537cd74554feeafd4d4b45451c5, it was introduced in version v4.9 by commit 38addce8b600ca335dc86fa3d48c890f1c6fa1f4. For more details please see the references link.
null
2022-04-25T06:52:22.100576Z
2022-04-24T20:35:33.452465Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/38addce8b600ca335dc86fa3d48c890f1c6fa1f4'}
Linux
GSD-2022-1001671
drm/panel: ili9341: fix optional regulator handling
drm/panel: ili9341: fix optional regulator handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 28dc1503a9d36654f9c61adb2915682515a30f71, it was introduced in version v5.15 by commit 5a04227326b04c15b015181772f5c853172fdb68. For more details please see the references link.
null
2022-04-25T04:11:10.608523Z
2022-04-24T21:33:45.425381Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5a04227326b04c15b015181772f5c853172fdb68'}
Linux
GSD-2021-1002771
xen/blkfront: harden blkfront against event channel storms
xen/blkfront: harden blkfront against event channel storms This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit caf9b51829a50590b84daea924a0fd62d32bc952. For more details please see the references link.
null
2022-01-11T05:56:18.363388Z
2021-12-27T05:53:40.136128Z
null
null
null
null
null
Linux
GSD-2022-1001221
scsi: pm8001: Fix abort all task initialization
scsi: pm8001: Fix abort all task initialization This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 16cd02e0951b520bef324adb9a35afcc92501caf, it was introduced in version v3.10 by commit c6b9ef5779c3e1edfa9de949d2a51252bc347663. For more details please see the references link.
null
2022-04-25T05:18:00.489609Z
2022-04-24T20:55:21.061048Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6b9ef5779c3e1edfa9de949d2a51252bc347663'}
Linux
GSD-2022-1000826
ibmvnic: free reset-work-item when flushing
ibmvnic: free reset-work-item when flushing This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.104 by commit 6acbc8875282d3ca8a73fa93cd7a9b166de5019c, it was introduced in version v4.18 by commit 2770a7984db588913e11a6dfcfe3461dbba9b7b2. For more details please see the references link.
null
2022-03-18T02:59:40.319459Z
2022-03-18T00:21:44.102512Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2770a7984db588913e11a6dfcfe3461dbba9b7b2'}
Linux
GSD-2022-1001734
ath11k: mhi: use mhi_sync_power_up()
ath11k: mhi: use mhi_sync_power_up() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 20d01a11efde2e05e47d5c66101f5c26eaca68e2. For more details please see the references link.
null
2022-04-25T05:11:30.293114Z
2022-04-24T21:38:17.207599Z
null
null
null
null
null
Linux
GSD-2021-1002264
perf bench futex: Fix memory leak of perf_cpu_map__new()
perf bench futex: Fix memory leak of perf_cpu_map__new() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.162 by commit 9e0df711f8dbe5650ad4f557c12a5cb302432a37, it was introduced in version v5.4 by commit 9c3516d1b850ea938b074df33e4c86d721c77720. For more details please see the references link.
null
2021-12-20T01:14:58.383766Z
2021-11-29T02:36:01.814833Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9c3516d1b850ea938b074df33e4c86d721c77720'}
Linux
GSD-2021-1000259
udp: skip L4 aggregation for UDP tunnel packets
udp: skip L4 aggregation for UDP tunnel packets This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 450687386cd16d081b58cd7a342acff370a96078, it was introduced in version v5.6 by commit 9fd1ff5d2ac7181844735806b0a703c942365291. For more details please see the references link.
null
2021-12-20T01:12:55.628318Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9fd1ff5d2ac7181844735806b0a703c942365291'}
Linux
GSD-2022-1001364
net: ipv4: fix route with nexthop object delete warning
net: ipv4: fix route with nexthop object delete warning This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit dcd689f9e2640c992f94eae9955b106f71c6825d, it was introduced in version v5.3 by commit 4c7e8084fd467ddb2b0e6c6011f9c1064afb7e56. For more details please see the references link.
null
2022-04-25T05:09:08.007105Z
2022-04-24T21:08:09.796544Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4c7e8084fd467ddb2b0e6c6011f9c1064afb7e56'}
Linux
GSD-2021-1002634
igbvf: fix double free in `igbvf_probe`
igbvf: fix double free in `igbvf_probe` This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.259 by commit 8d0c927a9fb2b4065230936b77b54f857a3754fc, it was introduced in version v2.6.30 by commit d4e0fe01a38a073568aee541a0247fe734095979. For more details please see the references link.
null
2022-01-11T05:48:17.573349Z
2021-12-27T05:28:15.961647Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d4e0fe01a38a073568aee541a0247fe734095979'}
Linux
GSD-2021-1000609
misc/uss720: fix memory leak in uss720_probe
misc/uss720: fix memory leak in uss720_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit 5394ae9d8c7961dd93807fdf1b12a1dde96b0a55, it was introduced in version v2.6.14 by commit 0f36163d3abefbda1b21a330b3fdf3c2dc076d94. For more details please see the references link.
null
2021-12-20T00:19:26.345072Z
2021-06-04T19:46:58.719027Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0f36163d3abefbda1b21a330b3fdf3c2dc076d94'}
Linux
GSD-2022-1000125
rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev
rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.228 by commit 70cb4295ec806b663665e1d2ed15caab6159880e, it was introduced in version v4.11 by commit c0cdc19f84a4712cf74888f83af286e3c2e14efd. For more details please see the references link.
null
2022-02-19T08:45:07.155057Z
2022-02-18T21:43:55.118974Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c0cdc19f84a4712cf74888f83af286e3c2e14efd'}
Linux
GSD-2022-1002118
exec: Force single empty string when argv is empty
exec: Force single empty string when argv is empty This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 27a6f495b63a1804cc71be45911065db7757a98c. For more details please see the references link.
null
2022-04-25T05:43:41.586502Z
2022-04-24T22:13:26.094300Z
null
null
null
null
null
Linux
GSD-2021-1001448
watchdog: Fix possible use-after-free in wdt_startup()
watchdog: Fix possible use-after-free in wdt_startup() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.276 by commit 862f2b5a7c38762ac9e369daefbf361a91aca685. For more details please see the references link.
null
2021-12-20T00:11:13.665155Z
2021-08-03T02:44:36.726323Z
null
null
null
null
null
Linux
GSD-2022-1000575
drm/nouveau: fix off by one in BIOS boundary checking
drm/nouveau: fix off by one in BIOS boundary checking This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.22 by commit d877e814a62b7de9069aeff8bc1d979dfc996e06, it was introduced in version v4.8 by commit 4d4e9907ff572bb1d1c0f6913ad6e3d6d4525077. For more details please see the references link.
null
2022-03-07T01:39:00.971747Z
2022-02-27T03:25:43.256866Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4d4e9907ff572bb1d1c0f6913ad6e3d6d4525077'}
Linux
GSD-2021-1001018
ALSA: seq: Fix race of snd_seq_timer_open()
ALSA: seq: Fix race of snd_seq_timer_open() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit 536a7646c00a0f14fee49e5e313109e5da2f6031. For more details please see the references link.
null
2021-12-19T22:54:14.948871Z
2021-06-30T00:34:14.098349Z
null
null
null
null
null
Linux
GSD-2021-1001595
mac80211-hwsim: fix late beacon hrtimer handling
mac80211-hwsim: fix late beacon hrtimer handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.151 by commit 9bee85de2c8155388c09a2e1530a243ec1c96f05, it was introduced in version v3.9 by commit 01e59e467ecf976c782eecd4dc99644802cc60e2. For more details please see the references link.
null
2021-12-19T23:49:09.665484Z
2021-10-19T16:25:29.343888Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/01e59e467ecf976c782eecd4dc99644802cc60e2'}
Linux
GSD-2022-1000502
phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable()
phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 0ad1a88fa3eb0ded7798f52b79bc33f75fc9a6d2, it was introduced in version v5.12 by commit 5b1af71280abd82efbe28cd28d553363dfde0a34. For more details please see the references link.
null
2022-03-07T01:51:09.200527Z
2022-02-27T03:15:56.750483Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5b1af71280abd82efbe28cd28d553363dfde0a34'}
Linux
GSD-2022-1002495
NFS: remove unneeded check in decode_devicenotify_args()
NFS: remove unneeded check in decode_devicenotify_args() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit e893ca9a5d1738a36d3a54c05d283fecd91fcd65, it was introduced in version v4.0 by commit a4f743a6bb201662962fa888e3f978583d61691e. For more details please see the references link.
null
2022-04-25T04:54:57.710533Z
2022-04-24T22:54:03.452425Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a4f743a6bb201662962fa888e3f978583d61691e'}
Linux
GSD-2022-1000152
USB: core: Fix hang in usb_kill_urb by adding memory barriers
USB: core: Fix hang in usb_kill_urb by adding memory barriers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.176 by commit 9c61fce322ac2ef7fecf025285353570d60e41d6. For more details please see the references link.
null
2022-02-19T02:39:47.739989Z
2022-02-18T21:47:46.981217Z
null
null
null
null
null
Linux
GSD-2021-1002643
xen/console: harden hvc_xen against event channel storms
xen/console: harden hvc_xen against event channel storms This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.259 by commit 68b78f976ca47d52c03c41eded207a312e46b934. For more details please see the references link.
null
2022-01-11T05:48:12.180373Z
2021-12-27T05:29:12.503859Z
null
null
null
null
null
Linux
GSD-2021-1000384
m68k: mvme147,mvme16x: Don't wipe PCC timer config bits
m68k: mvme147,mvme16x: Don't wipe PCC timer config bits This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 1dfb26df15fc7036a74221d43de7427f74293dae, it was introduced in version v5.2 by commit 7529b90d051e4629884771ba2b1d3a87d2c6a9d7. For more details please see the references link.
null
2021-12-20T00:58:17.568934Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7529b90d051e4629884771ba2b1d3a87d2c6a9d7'}
Linux
GSD-2022-1001313
jffs2: fix memory leak in jffs2_do_mount_fs
jffs2: fix memory leak in jffs2_do_mount_fs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit c94128470e6fe53d9bd9d16d2d3271813f9d37af, it was introduced in version v2.6.15 by commit e631ddba588783edd521c5a89f7b2902772fb691. For more details please see the references link.
null
2022-04-25T04:39:24.167883Z
2022-04-24T21:03:47.287087Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e631ddba588783edd521c5a89f7b2902772fb691'}
Linux
GSD-2021-1002213
comedi: ni_usb6501: fix NULL-deref in command paths
comedi: ni_usb6501: fix NULL-deref in command paths This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.2 by commit d6a727a681a39ae4f73081a9bedb45d14f95bdd1, it was introduced in version v3.18 by commit a03bb00e50ab4c07107da58a52a0bff7943f360c. For more details please see the references link.
null
2021-12-19T22:26:46.452674Z
2021-11-14T15:24:57.313687Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a03bb00e50ab4c07107da58a52a0bff7943f360c'}
Linux
GSD-2022-1000851
sc16is7xx: Fix for incorrect data being transmitted
sc16is7xx: Fix for incorrect data being transmitted This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.103 by commit 18701d8afaa1c609b3cbf7c63ef5423ab2c8d252, it was introduced in version v5.8 by commit 6393ff1c4435acc343b1481f5b834b918cb42b12. For more details please see the references link.
null
2022-03-18T02:56:01.659540Z
2022-03-18T00:24:04.161111Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6393ff1c4435acc343b1481f5b834b918cb42b12'}
Linux
GSD-2022-1001743
KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs
KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit e7bab9898249ee21c46a722ae8e3c67f1712573a, it was introduced in version v4.2 by commit ca724305a2b02abcbecbf22577536fc8e965ab4f. For more details please see the references link.
null
2022-04-25T03:01:25.375221Z
2022-04-24T21:38:49.226403Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca724305a2b02abcbecbf22577536fc8e965ab4f'}
Linux
GSD-2022-1001256
ASoC: rockchip: Fix PM usage reference of rockchip_i2s_tdm_resume
ASoC: rockchip: Fix PM usage reference of rockchip_i2s_tdm_resume This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 5c1834aac759ddfd0f17c9f38db1b30adc8eb4e8, it was introduced in version v5.16 by commit 081068fd641403994f0505e6b91e021d3925f348. For more details please see the references link.
null
2022-04-25T06:56:13.705950Z
2022-04-24T20:58:29.162029Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/081068fd641403994f0505e6b91e021d3925f348'}
Linux
GSD-2021-1001829
NFC: digital: fix possible memory leak in digital_in_send_sdd_req()
NFC: digital: fix possible memory leak in digital_in_send_sdd_req() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.155 by commit 2bde4aca56db9fe25405d39ddb062531493a65db, it was introduced in version v3.13 by commit 2c66daecc4092e6049673c281b2e6f0d5e59a94c. For more details please see the references link.
null
2021-12-19T23:08:09.018720Z
2021-10-28T13:51:08.414180Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c66daecc4092e6049673c281b2e6f0d5e59a94c'}
Linux
GSD-2021-1002706
net: systemport: Add global locking for descriptor lifecycle
net: systemport: Add global locking for descriptor lifecycle This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.88 by commit 6e1011cd183faae8daff275c72444edcdfe0d473, it was introduced in version v3.16 by commit 80105befdb4b8cea924711b40b2462b87df65b62. For more details please see the references link.
null
2022-01-11T05:58:33.221242Z
2021-12-27T05:38:12.513633Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80105befdb4b8cea924711b40b2462b87df65b62'}
Linux
GSD-2021-1001983
isdn: cpai: check ctr->cnr to avoid array index out of bound
isdn: cpai: check ctr->cnr to avoid array index out of bound This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.214 by commit 7d91adc0ccb060ce564103315189466eb822cc6a. For more details please see the references link.
null
2021-12-20T00:24:31.112895Z
2021-11-14T15:14:34.550237Z
null
null
null
null
null
Linux
GSD-2021-1000691
Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails
Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.271 by commit 77c559407276ed4a8854dafc4a5efc8608e51906, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T00:23:52.712184Z
2021-06-04T20:03:23.263125Z
null
null
null
null
null
Linux
GSD-2022-1000914
gso: do not skip outer ip header in case of ipip and net_failover
gso: do not skip outer ip header in case of ipip and net_failover This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.232 by commit e9ffbe63f6f32f526a461756309b61c395168d73, it was introduced in version v3.13 by commit cb32f511a70be8967ac9025cf49c44324ced9a39. For more details please see the references link.
null
2022-03-18T02:50:44.708585Z
2022-03-18T00:31:34.273063Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cb32f511a70be8967ac9025cf49c44324ced9a39'}
Linux
GSD-2022-1001606
dm: fix use-after-free in dm_cleanup_zoned_dev()
dm: fix use-after-free in dm_cleanup_zoned_dev() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit fdfe414ca28ddfd562c233fb27385cf820de03e8, it was introduced in version v5.14 by commit bb37d77239af25cde59693dbe3fac04dd17d7b29. For more details please see the references link.
null
2022-04-25T05:33:28.276272Z
2022-04-24T21:27:51.435085Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bb37d77239af25cde59693dbe3fac04dd17d7b29'}
Linux
GSD-2021-1002356
ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE
ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.294 by commit e11b0f401c5b768bc337bd7c226f9e83d5c64394, it was introduced in version v3.8 by commit 9c4566a117a6fe404a0e49b27ac71b631945a70f. For more details please see the references link.
null
2021-12-20T00:29:19.045322Z
2021-12-19T19:33:45.177098Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9c4566a117a6fe404a0e49b27ac71b631945a70f'}
Linux
GSD-2022-1000447
mm: don't try to NUMA-migrate COW pages that have other uses
mm: don't try to NUMA-migrate COW pages that have other uses This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit b3dc4b9d3ca68b370c4aeab5355007eedf948849, it was introduced in version v5.9 by commit 09854ba94c6aad7886996bfbee2530b3d8a7f4f4. For more details please see the references link.
null
2022-03-07T01:54:23.264935Z
2022-02-27T03:08:21.828419Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/09854ba94c6aad7886996bfbee2530b3d8a7f4f4'}
Linux
GSD-2022-1002180
IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition
IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 8a50937227c385a477177c9ffa122b4230e40666, it was introduced in version v5.1 by commit d757c60eca9b22f4d108929a24401e0fdecda0b1. For more details please see the references link.
null
2022-04-25T06:46:37.920501Z
2022-04-24T22:19:23.515601Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d757c60eca9b22f4d108929a24401e0fdecda0b1'}
Linux
GSD-2021-1001080
KVM: X86: Fix x86_emulator slab cache leak
KVM: X86: Fix x86_emulator slab cache leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit a4edc506abd5ad0f46d1aa9f7cdf20efaee0618c, it was introduced in version v5.7 by commit c9b8b07cded58c55ad2bf67e68b9bfae96092293. For more details please see the references link.
null
2021-12-19T22:48:55.011542Z
2021-06-30T00:38:17.650299Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c9b8b07cded58c55ad2bf67e68b9bfae96092293'}
Linux
GSD-2022-1000017
NFC: st21nfca: Fix memory leak in device probe and remove
NFC: st21nfca: Fix memory leak in device probe and remove This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.261 by commit 38c3e320e7ff46f2dc67bc5045333e63d9f8918d, it was introduced in version v3.16 by commit 68957303f44a501af5cf37913208a2acaa6bcdf1. For more details please see the references link.
null
2022-01-11T05:58:21.713037Z
2022-01-10T19:50:20.440865Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/68957303f44a501af5cf37913208a2acaa6bcdf1'}
Linux
GSD-2021-1002585
can: sja1000: fix use after free in ems_pcmcia_add_card()
can: sja1000: fix use after free in ems_pcmcia_add_card() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.8 by commit 474f9a8534f5f89841240a7e978bafd6e1e039ce, it was introduced in version v3.2 by commit fd734c6f25aea4b2b44b045e489aec67b388577e. For more details please see the references link.
null
2021-12-20T00:44:08.639024Z
2021-12-19T19:43:49.440105Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fd734c6f25aea4b2b44b045e489aec67b388577e'}
Linux
GSD-2021-1000042
net: hso: fix NULL-deref on disconnect regression
net: hso: fix NULL-deref on disconnect regression This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.17 by commit 0f000005da31f6947f843ce6b3e3a960540c6e00, it was introduced in version v5.11.14 by commit 388d05f70f1ee0cac4a2068fd295072f1a44152a. For more details please see the references link.
null
2021-12-19T23:57:11.682178Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/388d05f70f1ee0cac4a2068fd295072f1a44152a'}
Linux
GSD-2021-1000412
sched: Fix out-of-bound access in uclamp
sched: Fix out-of-bound access in uclamp This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.120 by commit 687f523c134b7f0bd040ee1230f6d17990d54172, it was introduced in version v5.3 by commit 69842cba9ace84849bb9b8edcdf2cefccd97901c. For more details please see the references link.
null
2021-12-19T23:56:13.498849Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69842cba9ace84849bb9b8edcdf2cefccd97901c'}
Linux
GSD-2022-1001485
LSM: general protection fault in legacy_parse_param
LSM: general protection fault in legacy_parse_param This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 00fc07fa0b4a004711b6e1a944f0d2e46f7093b7. For more details please see the references link.
null
2022-04-25T05:22:17.490647Z
2022-04-24T21:16:08.124742Z
null
null
null
null
null
Linux
GSD-2022-1002303
irqchip/gic-v3: Fix GICR_CTLR.RWP polling
irqchip/gic-v3: Fix GICR_CTLR.RWP polling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit c7daf1b4ad809692d5c26f33c02ed8a031066548, it was introduced in version v3.17 by commit 021f653791ad17e03f98aaa7fb933816ae16f161. For more details please see the references link.
null
2022-04-25T06:06:27.703970Z
2022-04-24T22:32:21.151893Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/021f653791ad17e03f98aaa7fb933816ae16f161'}
Linux
GSD-2021-1001653
KVM: x86: Fix stack-out-of-bounds memory access from ioapic_write_indirect()
KVM: x86: Fix stack-out-of-bounds memory access from ioapic_write_indirect() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.71 by commit bebabb76ad9acca8858e0371e102fb60d708e25b, it was introduced in version v5.5 by commit 7ee30bc132c683d06a6d9e360e39e483e3990708. For more details please see the references link.
null
2021-12-20T01:04:44.058149Z
2021-10-19T16:30:11.102030Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ee30bc132c683d06a6d9e360e39e483e3990708'}
Linux
GSD-2021-1000941
net/qla3xxx: fix schedule while atomic in ql_sem_spinlock
net/qla3xxx: fix schedule while atomic in ql_sem_spinlock This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.44 by commit 4353eb42180dbc48fe7a8b69c6d2490d310537bf. For more details please see the references link.
null
2021-12-20T01:06:27.006653Z
2021-06-30T00:25:56.691919Z
null
null
null
null
null
Linux
GSD-2021-1001203
usb: common: usb-conn-gpio: fix NULL pointer dereference of charger
usb: common: usb-conn-gpio: fix NULL pointer dereference of charger This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.4 by commit 1a133a0996d6b4c83509d570ed4edcba34c44f25. For more details please see the references link.
null
2021-12-19T23:40:48.073911Z
2021-08-03T01:36:28.740905Z
null
null
null
null
null
Linux
GSD-2022-1000294
drop_monitor: fix data-race in dropmon_net_event / trace_napi_poll_hit
drop_monitor: fix data-race in dropmon_net_event / trace_napi_poll_hit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.303 by commit aeeaa9c5c2283a64cefdc4ea88e1935de82b3b56, it was introduced in version v2.6.31 by commit 4ea7e38696c7e798c47ebbecadfd392f23f814f9. For more details please see the references link.
null
2022-03-07T01:38:30.370155Z
2022-02-27T02:47:28.798282Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4ea7e38696c7e798c47ebbecadfd392f23f814f9'}
Linux
GSD-2021-1001716
net: sched: flower: protect fl_walk() with rcu
net: sched: flower: protect fl_walk() with rcu This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit dab4677bdbffa5c8270e79e34e51c89efa0728a0, it was introduced in version v5.3 by commit d39d714969cda5cbda291402c8c6b1fb1047f42e. For more details please see the references link.
null
2021-12-19T22:56:04.083446Z
2021-10-19T16:33:16.463579Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d39d714969cda5cbda291402c8c6b1fb1047f42e'}
Linux
GSD-2021-1002839
mm/damon/dbgfs: protect targets destructions with kdamond_lock
mm/damon/dbgfs: protect targets destructions with kdamond_lock This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.12 by commit 330c6117a82c16a9a365a51cec5c9ab30b13245c, it was introduced in version v5.15 by commit 4bc05954d0076655cfaf6f0135585bdc20cd6b11. For more details please see the references link.
null
2022-01-11T05:47:28.917717Z
2021-12-30T02:45:45.680924Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4bc05954d0076655cfaf6f0135585bdc20cd6b11'}
Linux
GSD-2021-1000804
io_uring: fix link timeout refs
io_uring: fix link timeout refs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.10 by commit 876808dba2ff7509bdd7f230c4f374a0caf4f410, it was introduced in version v5.12 by commit 9ae1f8dd372e0e4c020b345cf9e09f519265e981. For more details please see the references link.
null
2021-12-19T22:55:26.403380Z
2021-06-25T00:08:26.830200Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9ae1f8dd372e0e4c020b345cf9e09f519265e981'}
Linux
GSD-2022-1000781
ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min
ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.27 by commit 050b1821f27c5d4fd5a298f6e62c3d3c9335e622, it was introduced in version v5.15.22 by commit 9e8895f1b3d4433f6d78aa6578e9db61ca6e6830. For more details please see the references link.
null
2022-03-18T02:49:27.037187Z
2022-03-18T00:17:39.652770Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9e8895f1b3d4433f6d78aa6578e9db61ca6e6830'}
Linux
GSD-2022-1001893
arm64: prevent instrumentation of bp hardening callbacks
arm64: prevent instrumentation of bp hardening callbacks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit d362998e8df9ada2e9e1b5f5f154959df287402d, it was introduced in version v4.16 by commit ec82b567a74fbdffdf418d4bb381d55f6a9096af. For more details please see the references link.
null
2022-04-25T04:20:54.129698Z
2022-04-24T21:52:44.796071Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ec82b567a74fbdffdf418d4bb381d55f6a9096af'}
Linux
GSD-2022-1002246
power: supply: wm8350-power: Add missing free in free_charger_irq
power: supply: wm8350-power: Add missing free in free_charger_irq This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 90bec38f6a4c81814775c7f3dfc9acf281d5dcfa, it was introduced in version v2.6.29 by commit 14431aa0c5a443d13d24e6f865a8838f97dab973. For more details please see the references link.
null
2022-04-25T06:30:40.332406Z
2022-04-24T22:25:40.031943Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/14431aa0c5a443d13d24e6f865a8838f97dab973'}
Linux
GSD-2021-1001346
KVM: mmio: Fix use-after-free Read in kvm_vm_ioctl_unregister_coalesced_mmio
KVM: mmio: Fix use-after-free Read in kvm_vm_ioctl_unregister_coalesced_mmio This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.134 by commit f2ff9d03432fcb160e9f7d4be26174d89de2779a, it was introduced in version v5.4.119 by commit 7d1bc32d6477ff96a32695ea4be8144e4513ab2d. For more details please see the references link.
null
2021-12-20T00:33:26.761889Z
2021-08-03T02:13:56.780015Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7d1bc32d6477ff96a32695ea4be8144e4513ab2d'}
Linux
GSD-2022-1001939
ALSA: pcm: Fix races among concurrent prealloc proc writes
ALSA: pcm: Fix races among concurrent prealloc proc writes This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.32 by commit 51fce708ab8986a9879ee5da946a2cc120f1036d. For more details please see the references link.
null
2022-04-25T05:03:42.951199Z
2022-04-24T21:56:31.343179Z
null
null
null
null
null
Linux
GSD-2021-1000107
NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds
NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.20 by commit 2f3380121d49e829fb73ba86240c181bc32ad897, it was introduced in version v5.6 by commit 9954bf92c0cddd50a2a470be302e1c1ffdf21d42. For more details please see the references link.
null
2021-12-19T22:44:50.965823Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9954bf92c0cddd50a2a470be302e1c1ffdf21d42'}
Linux
GSD-2022-1001190
net: dsa: fix panic on shutdown if multi-chip tree failed to probe
net: dsa: fix panic on shutdown if multi-chip tree failed to probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit b864d5350c18bea9369d0bdd9e7eb6f6172cc283, it was introduced in version v5.15 by commit 0650bf52b31ff35dc6430fc2e37969c36baba724. For more details please see the references link.
null
2022-04-25T05:25:39.454214Z
2022-04-24T20:52:18.888379Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0650bf52b31ff35dc6430fc2e37969c36baba724'}
Linux
GSD-2021-1000557
NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()
NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit 2fe1cac336b55a1f79e603e9ce3552c3623e90eb, it was introduced in version v4.0 by commit a7d42ddb3099727f58366fa006f850a219cce6c8. For more details please see the references link.
null
2021-12-20T01:27:59.545677Z
2021-06-04T19:38:23.529313Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a7d42ddb3099727f58366fa006f850a219cce6c8'}
Linux
GSD-2021-1002090
drm/msm: Fix null pointer dereference on pointer edp
drm/msm: Fix null pointer dereference on pointer edp This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit 46c8ddede0273d1d132beefa9de8b820326982be, it was introduced in version v4.0 by commit ab5b0107ccf3821a6837b0f2819270d6fa0b278f. For more details please see the references link.
null
2021-12-19T23:30:41.549265Z
2021-11-14T15:19:22.883280Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab5b0107ccf3821a6837b0f2819270d6fa0b278f'}
Linux
GSD-2021-1001891
dma-debug: fix sg checks in debug_dma_map_sg()
dma-debug: fix sg checks in debug_dma_map_sg() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit 2b7d598b9651c182b4b71923a00d3f904aff21ed, it was introduced in version v2.6.31 by commit 884d05970bfbc3db368f23460dc4ce63257f240d. For more details please see the references link.
null
2021-12-20T00:47:16.126465Z
2021-10-28T13:54:21.499565Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/884d05970bfbc3db368f23460dc4ce63257f240d'}
Linux
GSD-2021-1000783
mm, hugetlb: fix simple resv_huge_pages underflow on UFFDIO_COPY
mm, hugetlb: fix simple resv_huge_pages underflow on UFFDIO_COPY This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.43 by commit 2eb4ec9c2c3535b9755c484183cc5c4d90fd37ff, it was introduced in version v4.11 by commit 8fb5debc5fcd450470cdd789c2d80ef95ebb8cf4. For more details please see the references link.
null
2021-12-20T01:26:45.039923Z
2021-06-25T00:05:22.066586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8fb5debc5fcd450470cdd789c2d80ef95ebb8cf4'}
Linux
GSD-2022-1000806
netfilter: nf_tables: fix memory leak during stateful obj update
netfilter: nf_tables: fix memory leak during stateful obj update This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.26 by commit e96e204ee6fa46702f6c94c3c69a09e69e0eac52, it was introduced in version v5.4 by commit d62d0ba97b5803183e70cfded7f7b9da76893bf5. For more details please see the references link.
null
2022-03-18T03:49:17.282420Z
2022-03-18T00:20:10.078489Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d62d0ba97b5803183e70cfded7f7b9da76893bf5'}
Linux
GSD-2022-1001714
powerpc/secvar: fix refcount leak in format_show()
powerpc/secvar: fix refcount leak in format_show() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 2a71e3ecd829a82013cf095c55068c61d991e885. For more details please see the references link.
null
2022-04-25T05:57:44.832407Z
2022-04-24T21:37:06.710390Z
null
null
null
null
null
Linux
GSD-2021-1000279
btrfs: zoned: bail out in btrfs_alloc_chunk for bad input
btrfs: zoned: bail out in btrfs_alloc_chunk for bad input This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit c3a5a3597ea944985b12dab3f91842068fdcd054, it was introduced in version v5.12 by commit 1cd6121f2a382a840f01f506694b54bf403fddc9. For more details please see the references link.
null
2021-12-20T01:19:08.436145Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1cd6121f2a382a840f01f506694b54bf403fddc9'}
Linux
GSD-2021-1002244
cfg80211: call cfg80211_stop_ap when switch from P2P_GO type
cfg80211: call cfg80211_stop_ap when switch from P2P_GO type This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.218 by commit b8a045e2a9b234cfbc06cf36923886164358ddec, it was introduced in version v3.6 by commit ac800140c20e7ae51117e71289065bedd4930fc2. For more details please see the references link.
null
2021-12-19T23:51:57.997914Z
2021-11-29T02:35:00.319206Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac800140c20e7ae51117e71289065bedd4930fc2'}
Linux
GSD-2022-1001344
fbdev: Fix unregistering of framebuffers without device
fbdev: Fix unregistering of framebuffers without device This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit de33df481545974ba47c46f05194e769e4307843, it was introduced in version v5.16.19 by commit 9565a3b5203a4d57acbc1d0e981c6df71864b4ab. For more details please see the references link.
null
2022-04-25T06:36:06.319145Z
2022-04-24T21:06:18.666644Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9565a3b5203a4d57acbc1d0e981c6df71864b4ab'}
Linux
GSD-2021-1000629
net: dsa: mt7530: fix VLAN traffic leaks
net: dsa: mt7530: fix VLAN traffic leaks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.124 by commit 4fe4e1f48ba119bdbc7c897c83b04ba0d08f5488, it was introduced in version v4.16 by commit 83163f7dca5684816d01c8ccf4857aa74801e7b7. For more details please see the references link.
null
2021-12-19T22:54:07.627301Z
2021-06-04T19:50:20.279282Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/83163f7dca5684816d01c8ccf4857aa74801e7b7'}
Linux
GSD-2021-1002614
net: systemport: Add global locking for descriptor lifecycle
net: systemport: Add global locking for descriptor lifecycle This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.296 by commit 8ed2f5d08d6e59f8c78b2869bfb95d0be32c094c, it was introduced in version v3.16 by commit 80105befdb4b8cea924711b40b2462b87df65b62. For more details please see the references link.
null
2022-01-11T05:47:31.078481Z
2021-12-27T05:27:17.370207Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80105befdb4b8cea924711b40b2462b87df65b62'}
Linux
GSD-2021-1001192
NFSv4: Fix an Oops in pnfs_mark_request_commit() when doing O_DIRECT
NFSv4: Fix an Oops in pnfs_mark_request_commit() when doing O_DIRECT This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.4 by commit 7aec9f862411906f8c27071ba65a1e110ad7d2fd, it was introduced in version v5.7 by commit 9c455a8c1e146dac3a6d1405fe6a7096177b9546. For more details please see the references link.
null
2021-12-19T23:02:42.062554Z
2021-08-03T01:33:57.532962Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9c455a8c1e146dac3a6d1405fe6a7096177b9546'}
Linux
GSD-2022-1002138
jffs2: fix use-after-free in jffs2_clear_xattr_subsystem
jffs2: fix use-after-free in jffs2_clear_xattr_subsystem This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 7bb7428dd73991bf4b3a7a61b493ca50046c2b13, it was introduced in version v2.6.18 by commit aa98d7cf59b5b0764d3502662053489585faf2fe. For more details please see the references link.
null
2022-04-25T05:32:08.714275Z
2022-04-24T22:15:24.369125Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/aa98d7cf59b5b0764d3502662053489585faf2fe'}
Linux
GSD-2022-1000105
ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback
ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.265 by commit 56ecacbd73769b3142ed83bf9c1a2ebb7a761eb0, it was introduced in version v4.14.211 by commit 8de4963b2b22869d7314dbc5381c32d9763cfcc6. For more details please see the references link.
null
2022-02-20T01:59:50.308322Z
2022-02-18T21:35:46.086348Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8de4963b2b22869d7314dbc5381c32d9763cfcc6'}
Linux
GSD-2021-1001468
netrom: Decrease sock refcount when sock timers expire
netrom: Decrease sock refcount when sock timers expire This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.277 by commit 853262355518cd1247515b74e83fabf038aa6c29, it was introduced in version v4.4.173 by commit ce29e8a259de767f7210d346ad2b031cb8ab2732. For more details please see the references link.
null
2021-12-20T00:44:33.908930Z
2021-08-03T02:49:57.795244Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ce29e8a259de767f7210d346ad2b031cb8ab2732'}
Linux
GSD-2022-1000555
libsubcmd: Fix use-after-free for realloc(..., 0)
libsubcmd: Fix use-after-free for realloc(..., 0) This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit 754db970b075490448ce7d0a5716224339314873, it was introduced in version v4.5 by commit 2f4ce5ec1d447beb42143a9653716a2ab025161e. For more details please see the references link.
null
2022-03-07T01:46:45.190532Z
2022-02-27T03:23:26.485930Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2f4ce5ec1d447beb42143a9653716a2ab025161e'}