ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2021-1002399 | can: pch_can: pch_can_rx_normal: fix use after free | can: pch_can: pch_can_rx_normal: fix use after free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.258 by commit affbad02bf80380a7403885b9fe4a1587d1bb4f3, it was introduced in version v2.6.37 by commit b21d18b51b31a24d17f883b678432fbdee3d5675. For more details please see the references link. | null | 2021-12-20T01:18:08.963489Z | 2021-12-19T19:35:36.637429Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b21d18b51b31a24d17f883b678432fbdee3d5675'} |
Linux | GSD-2022-1001333 | netfilter: nf_tables: initialize registers in nft_do_chain() | netfilter: nf_tables: initialize registers in nft_do_chain()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.1 by commit dd03640529204ef4b8189fbdea08217d8d98271f, it was introduced in version v3.13 by commit 96518518cc417bb0a8c80b9fb736202e28acdf96. For more details please see the references link. | null | 2022-04-25T03:38:48.983508Z | 2022-04-24T21:05:22.620039Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/96518518cc417bb0a8c80b9fb736202e28acdf96'} |
Linux | GSD-2022-1001299 | can: isotp: sanitize CAN ID checks in isotp_bind() | can: isotp: sanitize CAN ID checks in isotp_bind()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 7b4652fc71dcec043977a6def80ef5034c913615, it was introduced in version v5.10 by commit e057dd3fc20ffb3d7f150af46542a51b59b90127. For more details please see the references link. | null | 2022-04-25T07:55:01.294909Z | 2022-04-24T21:02:16.047188Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e057dd3fc20ffb3d7f150af46542a51b59b90127'} |
Linux | GSD-2021-1002233 | scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq() | scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.291 by commit ec70d80a8642900086447ba0cdc79e3f44d42e8f. For more details please see the references link. | null | 2021-12-20T00:21:49.603391Z | 2021-11-29T02:34:32.185587Z | null | null | null | null | null |
Linux | GSD-2022-1000871 | xen/xenbus: don't let xenbus_grant_ring() remove grants in error case | xen/xenbus: don't let xenbus_grant_ring() remove grants in error case
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.184 by commit 95ff82383266a7720d596eb8b4499ed01746a730. For more details please see the references link. | null | 2022-03-18T02:56:01.326133Z | 2022-03-18T00:26:14.459222Z | null | null | null | null | null |
Linux | GSD-2022-1001763 | ubifs: Fix deadlock in concurrent rename whiteout and inode writeback | ubifs: Fix deadlock in concurrent rename whiteout and inode writeback
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit c58af8564a7b08757173009030b74baf4b2b762b, it was introduced in version v4.9 by commit 9e0a1fff8db56eaaebb74b4a3ef65f86811c4798. For more details please see the references link. | null | 2022-04-25T05:24:18.786244Z | 2022-04-24T21:40:57.905350Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9e0a1fff8db56eaaebb74b4a3ef65f86811c4798'} |
Linux | GSD-2021-1000520 | RDMA/rxe: Clear all QP fields if creation failed | RDMA/rxe: Clear all QP fields if creation failed
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.270 by commit c65391dd9f0a47617e96e38bd27e277cbe1c40b0, it was introduced in version v4.8 by commit 8700e3e7c4857d28ebaa824509934556da0b3e76. For more details please see the references link. | null | 2021-12-20T00:03:10.806024Z | 2021-05-31T23:50:10.744274Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8700e3e7c4857d28ebaa824509934556da0b3e76'} |
Linux | GSD-2021-1000170 | media: staging/intel-ipu3: Fix set_fmt error handling | media: staging/intel-ipu3: Fix set_fmt error handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.118 by commit a03fb1e8a110658215a4cefc3e2ad53279e496a6, it was introduced in version v5.2 by commit 6d5f26f2e045f2377b524516194657c00efbbce8. For more details please see the references link. | null | 2021-12-20T01:39:39.232375Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6d5f26f2e045f2377b524516194657c00efbbce8'} |
Linux | GSD-2021-1001331 | virtio_console: Assure used length from device is limited | virtio_console: Assure used length from device is limited
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.134 by commit 52bd1bce8624acb861fa96b7c8fc2e75422dc8f7. For more details please see the references link. | null | 2021-12-19T22:02:20.153645Z | 2021-08-03T02:11:06.419988Z | null | null | null | null | null |
Linux | GSD-2022-1002231 | pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe | pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit bc1e29a35147c1ba6ea2b06a16cb0028f7c852d2, it was introduced in version v3.9 by commit 32e67eee670e1254ee5ab41e2f454680acb9c17c. For more details please see the references link. | null | 2022-04-25T06:45:06.870716Z | 2022-04-24T22:23:50.946630Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/32e67eee670e1254ee5ab41e2f454680acb9c17c'} |
Linux | GSD-2021-1001761 | comedi: Fix memory leak in compat_insnlist() | comedi: Fix memory leak in compat_insnlist()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.9 by commit f217b6c1e28ed0b353634ce4d92a155b80bd1671, it was introduced in version v5.8 by commit b8d47d8813055ce38c0d2ad913d5462017e52692. For more details please see the references link. | null | 2021-12-19T23:36:00.219585Z | 2021-10-19T16:35:26.839801Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b8d47d8813055ce38c0d2ad913d5462017e52692'} |
Linux | GSD-2021-1000873 | drm: Lock pointer access in drm_master_release() | drm: Lock pointer access in drm_master_release()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.195 by commit a376f7e66b654cb290fa9d16d8dab5bfef744463. For more details please see the references link. | null | 2021-12-20T01:02:17.239183Z | 2021-06-30T00:02:51.180620Z | null | null | null | null | null |
Linux | GSD-2021-1001274 | iommu/arm-smmu: Fix arm_smmu_device refcount leak when arm_smmu_rpm_get fails | iommu/arm-smmu: Fix arm_smmu_device refcount leak when arm_smmu_rpm_get fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.52 by commit c4007596fbdabc29f858dc2e1990858a146b60b2. For more details please see the references link. | null | 2021-12-19T23:18:32.763086Z | 2021-08-03T01:55:12.790077Z | null | null | null | null | null |
Linux | GSD-2022-1000719 | btrfs: get rid of warning on transaction commit when using flushoncommit | btrfs: get rid of warning on transaction commit when using flushoncommit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.13 by commit e4d044dbffcd570351f21c747fc77ff90aed7f2e. For more details please see the references link. | null | 2022-03-18T02:52:37.013435Z | 2022-03-18T00:12:05.217250Z | null | null | null | null | null |
Linux | GSD-2021-1001624 | drm/nouveau/debugfs: fix file release memory leak | drm/nouveau/debugfs: fix file release memory leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.73 by commit f69556a42043b5444ca712ee889829ba89fdcba8, it was introduced in version v4.5 by commit 6e9fc177399f08446293fec7607913fdbc95e191. For more details please see the references link. | null | 2021-12-19T22:17:00.507318Z | 2021-10-19T16:28:47.682223Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6e9fc177399f08446293fec7607913fdbc95e191'} |
Linux | GSD-2021-1000936 | usb: dwc3: core: fix kernel panic when do reboot | usb: dwc3: core: fix kernel panic when do reboot
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.128 by commit fd7c4bd582494934be15d41aebe0dbe23790605f, it was introduced in version v5.4.128 by commit d7e403eea007f47776186d4d572f234b1221e6e3. For more details please see the references link. | null | 2021-06-30T00:25:36.510907Z | 2021-06-30T00:25:36.510907Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d7e403eea007f47776186d4d572f234b1221e6e3'} |
Linux | GSD-2022-1002374 | jffs2: fix use-after-free in jffs2_clear_xattr_subsystem | jffs2: fix use-after-free in jffs2_clear_xattr_subsystem
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit c3b07c875fa8f906f932976460fd14798596f101, it was introduced in version v2.6.18 by commit aa98d7cf59b5b0764d3502662053489585faf2fe. For more details please see the references link. | null | 2022-04-25T03:44:07.282474Z | 2022-04-24T22:40:33.873702Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/aa98d7cf59b5b0764d3502662053489585faf2fe'} |
Linux | GSD-2022-1000349 | net: ieee802154: at86rf230: Stop leaking skb's | net: ieee802154: at86rf230: Stop leaking skb's
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.181 by commit 455ef08d6e5473526fa6763f75a93f7198206966. For more details please see the references link. | null | 2022-03-07T01:38:42.696218Z | 2022-02-27T02:54:23.531643Z | null | null | null | null | null |
Linux | GSD-2021-1000465 | userfaultfd: release page in error path to avoid BUG_ON | userfaultfd: release page in error path to avoid BUG_ON
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.233 by commit 319116227e52d49eee671f0aa278bac89b3c1b69, it was introduced in version v4.11 by commit cb658a453b9327ce96ce5222c24d162b5b65b564. For more details please see the references link. | null | 2021-12-19T22:32:21.502460Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cb658a453b9327ce96ce5222c24d162b5b65b564'} |
Linux | GSD-2021-1002458 | HID: bigbenff: prevent null pointer dereference | HID: bigbenff: prevent null pointer dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.165 by commit 8e0ceff632f48175ec7fb4706129c55ca8a7c7bd. For more details please see the references link. | null | 2021-12-19T22:14:57.640281Z | 2021-12-19T19:38:14.206104Z | null | null | null | null | null |
Linux | GSD-2022-1001108 | gfs2: Fix gfs2_file_buffered_write endless loop workaround | gfs2: Fix gfs2_file_buffered_write endless loop workaround
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit fbb74bc00f9a2a63b646945fd179aaf7249c3a77, it was introduced in version v5.16 by commit 554c577cee95bdc1d03d9f457e57dc96eb791845. For more details please see the references link. | null | 2022-04-25T04:19:07.990893Z | 2022-04-24T20:46:00.596301Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/554c577cee95bdc1d03d9f457e57dc96eb791845'} |
Linux | GSD-2021-1000035 | net: Make tcp_allowed_congestion_control readonly in non-init netns | net: Make tcp_allowed_congestion_control readonly in non-init netns
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.32 by commit 35d7491e2f77ce480097cabcaf93ed409e916e12, it was introduced in version v5.7 by commit 9cb8e048e5d93825ec5e8dfb5b8df4987ea25745. For more details please see the references link. | null | 2021-12-19T22:50:55.246772Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9cb8e048e5d93825ec5e8dfb5b8df4987ea25745'} |
Linux | GSD-2021-1002008 | KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest() | KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.156 by commit 80bbb0bc3a0288442f7fe6fc514f4ee1cb06ccb7, it was introduced in version v5.2 by commit 10d91611f426d4bafd2a83d966c36da811b2f7ad. For more details please see the references link. | null | 2021-12-19T22:20:32.578098Z | 2021-11-14T15:15:43.374066Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/10d91611f426d4bafd2a83d966c36da811b2f7ad'} |
Linux | GSD-2022-1001558 | ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data | ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit f3793eeb7b94a5eeed6f5c7a44bce403c6681a12, it was introduced in version v5.6 by commit a61f3b4f476eceb25274161e5a53a8d18e42610b. For more details please see the references link. | null | 2022-04-25T03:33:51.415689Z | 2022-04-24T21:23:26.073006Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a61f3b4f476eceb25274161e5a53a8d18e42610b'} |
Linux | GSD-2022-1000060 | fs/mount_setattr: always cleanup mount_kattr | fs/mount_setattr: always cleanup mount_kattr
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.13 by commit 47b5d0a7532d39e42a938f81e3904268145c341d, it was introduced in version v5.12 by commit 9caccd41541a6f7d6279928d9f971f6642c361af. For more details please see the references link. | null | 2022-01-11T05:53:54.578245Z | 2022-01-10T19:52:17.790486Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9caccd41541a6f7d6279928d9f971f6642c361af'} |
Linux | GSD-2022-1000430 | net: dsa: felix: don't use devres for mdiobus | net: dsa: felix: don't use devres for mdiobus
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit 8cda7577a0b4018572f31e0caadfabd305ea2786, it was introduced in version v5.9 by commit ac3a68d56651c3dad2c12c7afce065fe15267f44. For more details please see the references link. | null | 2022-03-07T01:43:08.087632Z | 2022-02-27T03:06:26.053396Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac3a68d56651c3dad2c12c7afce065fe15267f44'} |
Linux | GSD-2021-1002321 | net/mlx5e: kTLS, Fix crash in RX resync flow | net/mlx5e: kTLS, Fix crash in RX resync flow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit ebeda7a9528ae690e6bf12791a868f0cca8391f2, it was introduced in version v5.13 by commit e9ce991bce5bacf71641bd0f72f4b7c589529f40. For more details please see the references link. | null | 2021-12-19T22:28:19.236420Z | 2021-11-29T02:38:38.871086Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e9ce991bce5bacf71641bd0f72f4b7c589529f40'} |
Linux | GSD-2022-1000963 | gcc-plugins: latent_entropy: use /dev/urandom | gcc-plugins: latent_entropy: use /dev/urandom
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.4 by commit 4b0202961a303537cd74554feeafd4d4b45451c5, it was introduced in version v4.9 by commit 38addce8b600ca335dc86fa3d48c890f1c6fa1f4. For more details please see the references link. | null | 2022-04-25T06:52:22.100576Z | 2022-04-24T20:35:33.452465Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/38addce8b600ca335dc86fa3d48c890f1c6fa1f4'} |
Linux | GSD-2022-1001671 | drm/panel: ili9341: fix optional regulator handling | drm/panel: ili9341: fix optional regulator handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 28dc1503a9d36654f9c61adb2915682515a30f71, it was introduced in version v5.15 by commit 5a04227326b04c15b015181772f5c853172fdb68. For more details please see the references link. | null | 2022-04-25T04:11:10.608523Z | 2022-04-24T21:33:45.425381Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5a04227326b04c15b015181772f5c853172fdb68'} |
Linux | GSD-2021-1002771 | xen/blkfront: harden blkfront against event channel storms | xen/blkfront: harden blkfront against event channel storms
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit caf9b51829a50590b84daea924a0fd62d32bc952. For more details please see the references link. | null | 2022-01-11T05:56:18.363388Z | 2021-12-27T05:53:40.136128Z | null | null | null | null | null |
Linux | GSD-2022-1001221 | scsi: pm8001: Fix abort all task initialization | scsi: pm8001: Fix abort all task initialization
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 16cd02e0951b520bef324adb9a35afcc92501caf, it was introduced in version v3.10 by commit c6b9ef5779c3e1edfa9de949d2a51252bc347663. For more details please see the references link. | null | 2022-04-25T05:18:00.489609Z | 2022-04-24T20:55:21.061048Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6b9ef5779c3e1edfa9de949d2a51252bc347663'} |
Linux | GSD-2022-1000826 | ibmvnic: free reset-work-item when flushing | ibmvnic: free reset-work-item when flushing
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.104 by commit 6acbc8875282d3ca8a73fa93cd7a9b166de5019c, it was introduced in version v4.18 by commit 2770a7984db588913e11a6dfcfe3461dbba9b7b2. For more details please see the references link. | null | 2022-03-18T02:59:40.319459Z | 2022-03-18T00:21:44.102512Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2770a7984db588913e11a6dfcfe3461dbba9b7b2'} |
Linux | GSD-2022-1001734 | ath11k: mhi: use mhi_sync_power_up() | ath11k: mhi: use mhi_sync_power_up()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 20d01a11efde2e05e47d5c66101f5c26eaca68e2. For more details please see the references link. | null | 2022-04-25T05:11:30.293114Z | 2022-04-24T21:38:17.207599Z | null | null | null | null | null |
Linux | GSD-2021-1002264 | perf bench futex: Fix memory leak of perf_cpu_map__new() | perf bench futex: Fix memory leak of perf_cpu_map__new()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.162 by commit 9e0df711f8dbe5650ad4f557c12a5cb302432a37, it was introduced in version v5.4 by commit 9c3516d1b850ea938b074df33e4c86d721c77720. For more details please see the references link. | null | 2021-12-20T01:14:58.383766Z | 2021-11-29T02:36:01.814833Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9c3516d1b850ea938b074df33e4c86d721c77720'} |
Linux | GSD-2021-1000259 | udp: skip L4 aggregation for UDP tunnel packets | udp: skip L4 aggregation for UDP tunnel packets
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 450687386cd16d081b58cd7a342acff370a96078, it was introduced in version v5.6 by commit 9fd1ff5d2ac7181844735806b0a703c942365291. For more details please see the references link. | null | 2021-12-20T01:12:55.628318Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9fd1ff5d2ac7181844735806b0a703c942365291'} |
Linux | GSD-2022-1001364 | net: ipv4: fix route with nexthop object delete warning | net: ipv4: fix route with nexthop object delete warning
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit dcd689f9e2640c992f94eae9955b106f71c6825d, it was introduced in version v5.3 by commit 4c7e8084fd467ddb2b0e6c6011f9c1064afb7e56. For more details please see the references link. | null | 2022-04-25T05:09:08.007105Z | 2022-04-24T21:08:09.796544Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4c7e8084fd467ddb2b0e6c6011f9c1064afb7e56'} |
Linux | GSD-2021-1002634 | igbvf: fix double free in `igbvf_probe` | igbvf: fix double free in `igbvf_probe`
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.259 by commit 8d0c927a9fb2b4065230936b77b54f857a3754fc, it was introduced in version v2.6.30 by commit d4e0fe01a38a073568aee541a0247fe734095979. For more details please see the references link. | null | 2022-01-11T05:48:17.573349Z | 2021-12-27T05:28:15.961647Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d4e0fe01a38a073568aee541a0247fe734095979'} |
Linux | GSD-2021-1000609 | misc/uss720: fix memory leak in uss720_probe | misc/uss720: fix memory leak in uss720_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.42 by commit 5394ae9d8c7961dd93807fdf1b12a1dde96b0a55, it was introduced in version v2.6.14 by commit 0f36163d3abefbda1b21a330b3fdf3c2dc076d94. For more details please see the references link. | null | 2021-12-20T00:19:26.345072Z | 2021-06-04T19:46:58.719027Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0f36163d3abefbda1b21a330b3fdf3c2dc076d94'} |
Linux | GSD-2022-1000125 | rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev | rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.228 by commit 70cb4295ec806b663665e1d2ed15caab6159880e, it was introduced in version v4.11 by commit c0cdc19f84a4712cf74888f83af286e3c2e14efd. For more details please see the references link. | null | 2022-02-19T08:45:07.155057Z | 2022-02-18T21:43:55.118974Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c0cdc19f84a4712cf74888f83af286e3c2e14efd'} |
Linux | GSD-2022-1002118 | exec: Force single empty string when argv is empty | exec: Force single empty string when argv is empty
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 27a6f495b63a1804cc71be45911065db7757a98c. For more details please see the references link. | null | 2022-04-25T05:43:41.586502Z | 2022-04-24T22:13:26.094300Z | null | null | null | null | null |
Linux | GSD-2021-1001448 | watchdog: Fix possible use-after-free in wdt_startup() | watchdog: Fix possible use-after-free in wdt_startup()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.276 by commit 862f2b5a7c38762ac9e369daefbf361a91aca685. For more details please see the references link. | null | 2021-12-20T00:11:13.665155Z | 2021-08-03T02:44:36.726323Z | null | null | null | null | null |
Linux | GSD-2022-1000575 | drm/nouveau: fix off by one in BIOS boundary checking | drm/nouveau: fix off by one in BIOS boundary checking
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.22 by commit d877e814a62b7de9069aeff8bc1d979dfc996e06, it was introduced in version v4.8 by commit 4d4e9907ff572bb1d1c0f6913ad6e3d6d4525077. For more details please see the references link. | null | 2022-03-07T01:39:00.971747Z | 2022-02-27T03:25:43.256866Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4d4e9907ff572bb1d1c0f6913ad6e3d6d4525077'} |
Linux | GSD-2021-1001018 | ALSA: seq: Fix race of snd_seq_timer_open() | ALSA: seq: Fix race of snd_seq_timer_open()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.11 by commit 536a7646c00a0f14fee49e5e313109e5da2f6031. For more details please see the references link. | null | 2021-12-19T22:54:14.948871Z | 2021-06-30T00:34:14.098349Z | null | null | null | null | null |
Linux | GSD-2021-1001595 | mac80211-hwsim: fix late beacon hrtimer handling | mac80211-hwsim: fix late beacon hrtimer handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.151 by commit 9bee85de2c8155388c09a2e1530a243ec1c96f05, it was introduced in version v3.9 by commit 01e59e467ecf976c782eecd4dc99644802cc60e2. For more details please see the references link. | null | 2021-12-19T23:49:09.665484Z | 2021-10-19T16:25:29.343888Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/01e59e467ecf976c782eecd4dc99644802cc60e2'} |
Linux | GSD-2022-1000502 | phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable() | phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 0ad1a88fa3eb0ded7798f52b79bc33f75fc9a6d2, it was introduced in version v5.12 by commit 5b1af71280abd82efbe28cd28d553363dfde0a34. For more details please see the references link. | null | 2022-03-07T01:51:09.200527Z | 2022-02-27T03:15:56.750483Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5b1af71280abd82efbe28cd28d553363dfde0a34'} |
Linux | GSD-2022-1002495 | NFS: remove unneeded check in decode_devicenotify_args() | NFS: remove unneeded check in decode_devicenotify_args()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit e893ca9a5d1738a36d3a54c05d283fecd91fcd65, it was introduced in version v4.0 by commit a4f743a6bb201662962fa888e3f978583d61691e. For more details please see the references link. | null | 2022-04-25T04:54:57.710533Z | 2022-04-24T22:54:03.452425Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a4f743a6bb201662962fa888e3f978583d61691e'} |
Linux | GSD-2022-1000152 | USB: core: Fix hang in usb_kill_urb by adding memory barriers | USB: core: Fix hang in usb_kill_urb by adding memory barriers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.176 by commit 9c61fce322ac2ef7fecf025285353570d60e41d6. For more details please see the references link. | null | 2022-02-19T02:39:47.739989Z | 2022-02-18T21:47:46.981217Z | null | null | null | null | null |
Linux | GSD-2021-1002643 | xen/console: harden hvc_xen against event channel storms | xen/console: harden hvc_xen against event channel storms
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.259 by commit 68b78f976ca47d52c03c41eded207a312e46b934. For more details please see the references link. | null | 2022-01-11T05:48:12.180373Z | 2021-12-27T05:29:12.503859Z | null | null | null | null | null |
Linux | GSD-2021-1000384 | m68k: mvme147,mvme16x: Don't wipe PCC timer config bits | m68k: mvme147,mvme16x: Don't wipe PCC timer config bits
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 1dfb26df15fc7036a74221d43de7427f74293dae, it was introduced in version v5.2 by commit 7529b90d051e4629884771ba2b1d3a87d2c6a9d7. For more details please see the references link. | null | 2021-12-20T00:58:17.568934Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7529b90d051e4629884771ba2b1d3a87d2c6a9d7'} |
Linux | GSD-2022-1001313 | jffs2: fix memory leak in jffs2_do_mount_fs | jffs2: fix memory leak in jffs2_do_mount_fs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit c94128470e6fe53d9bd9d16d2d3271813f9d37af, it was introduced in version v2.6.15 by commit e631ddba588783edd521c5a89f7b2902772fb691. For more details please see the references link. | null | 2022-04-25T04:39:24.167883Z | 2022-04-24T21:03:47.287087Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e631ddba588783edd521c5a89f7b2902772fb691'} |
Linux | GSD-2021-1002213 | comedi: ni_usb6501: fix NULL-deref in command paths | comedi: ni_usb6501: fix NULL-deref in command paths
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.2 by commit d6a727a681a39ae4f73081a9bedb45d14f95bdd1, it was introduced in version v3.18 by commit a03bb00e50ab4c07107da58a52a0bff7943f360c. For more details please see the references link. | null | 2021-12-19T22:26:46.452674Z | 2021-11-14T15:24:57.313687Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a03bb00e50ab4c07107da58a52a0bff7943f360c'} |
Linux | GSD-2022-1000851 | sc16is7xx: Fix for incorrect data being transmitted | sc16is7xx: Fix for incorrect data being transmitted
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.103 by commit 18701d8afaa1c609b3cbf7c63ef5423ab2c8d252, it was introduced in version v5.8 by commit 6393ff1c4435acc343b1481f5b834b918cb42b12. For more details please see the references link. | null | 2022-03-18T02:56:01.659540Z | 2022-03-18T00:24:04.161111Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6393ff1c4435acc343b1481f5b834b918cb42b12'} |
Linux | GSD-2022-1001743 | KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs | KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit e7bab9898249ee21c46a722ae8e3c67f1712573a, it was introduced in version v4.2 by commit ca724305a2b02abcbecbf22577536fc8e965ab4f. For more details please see the references link. | null | 2022-04-25T03:01:25.375221Z | 2022-04-24T21:38:49.226403Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca724305a2b02abcbecbf22577536fc8e965ab4f'} |
Linux | GSD-2022-1001256 | ASoC: rockchip: Fix PM usage reference of rockchip_i2s_tdm_resume | ASoC: rockchip: Fix PM usage reference of rockchip_i2s_tdm_resume
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 5c1834aac759ddfd0f17c9f38db1b30adc8eb4e8, it was introduced in version v5.16 by commit 081068fd641403994f0505e6b91e021d3925f348. For more details please see the references link. | null | 2022-04-25T06:56:13.705950Z | 2022-04-24T20:58:29.162029Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/081068fd641403994f0505e6b91e021d3925f348'} |
Linux | GSD-2021-1001829 | NFC: digital: fix possible memory leak in digital_in_send_sdd_req() | NFC: digital: fix possible memory leak in digital_in_send_sdd_req()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.155 by commit 2bde4aca56db9fe25405d39ddb062531493a65db, it was introduced in version v3.13 by commit 2c66daecc4092e6049673c281b2e6f0d5e59a94c. For more details please see the references link. | null | 2021-12-19T23:08:09.018720Z | 2021-10-28T13:51:08.414180Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c66daecc4092e6049673c281b2e6f0d5e59a94c'} |
Linux | GSD-2021-1002706 | net: systemport: Add global locking for descriptor lifecycle | net: systemport: Add global locking for descriptor lifecycle
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.88 by commit 6e1011cd183faae8daff275c72444edcdfe0d473, it was introduced in version v3.16 by commit 80105befdb4b8cea924711b40b2462b87df65b62. For more details please see the references link. | null | 2022-01-11T05:58:33.221242Z | 2021-12-27T05:38:12.513633Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80105befdb4b8cea924711b40b2462b87df65b62'} |
Linux | GSD-2021-1001983 | isdn: cpai: check ctr->cnr to avoid array index out of bound | isdn: cpai: check ctr->cnr to avoid array index out of bound
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.214 by commit 7d91adc0ccb060ce564103315189466eb822cc6a. For more details please see the references link. | null | 2021-12-20T00:24:31.112895Z | 2021-11-14T15:14:34.550237Z | null | null | null | null | null |
Linux | GSD-2021-1000691 | Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails | Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.271 by commit 77c559407276ed4a8854dafc4a5efc8608e51906, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T00:23:52.712184Z | 2021-06-04T20:03:23.263125Z | null | null | null | null | null |
Linux | GSD-2022-1000914 | gso: do not skip outer ip header in case of ipip and net_failover | gso: do not skip outer ip header in case of ipip and net_failover
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.232 by commit e9ffbe63f6f32f526a461756309b61c395168d73, it was introduced in version v3.13 by commit cb32f511a70be8967ac9025cf49c44324ced9a39. For more details please see the references link. | null | 2022-03-18T02:50:44.708585Z | 2022-03-18T00:31:34.273063Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cb32f511a70be8967ac9025cf49c44324ced9a39'} |
Linux | GSD-2022-1001606 | dm: fix use-after-free in dm_cleanup_zoned_dev() | dm: fix use-after-free in dm_cleanup_zoned_dev()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit fdfe414ca28ddfd562c233fb27385cf820de03e8, it was introduced in version v5.14 by commit bb37d77239af25cde59693dbe3fac04dd17d7b29. For more details please see the references link. | null | 2022-04-25T05:33:28.276272Z | 2022-04-24T21:27:51.435085Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bb37d77239af25cde59693dbe3fac04dd17d7b29'} |
Linux | GSD-2021-1002356 | ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE | ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.294 by commit e11b0f401c5b768bc337bd7c226f9e83d5c64394, it was introduced in version v3.8 by commit 9c4566a117a6fe404a0e49b27ac71b631945a70f. For more details please see the references link. | null | 2021-12-20T00:29:19.045322Z | 2021-12-19T19:33:45.177098Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9c4566a117a6fe404a0e49b27ac71b631945a70f'} |
Linux | GSD-2022-1000447 | mm: don't try to NUMA-migrate COW pages that have other uses | mm: don't try to NUMA-migrate COW pages that have other uses
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit b3dc4b9d3ca68b370c4aeab5355007eedf948849, it was introduced in version v5.9 by commit 09854ba94c6aad7886996bfbee2530b3d8a7f4f4. For more details please see the references link. | null | 2022-03-07T01:54:23.264935Z | 2022-02-27T03:08:21.828419Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/09854ba94c6aad7886996bfbee2530b3d8a7f4f4'} |
Linux | GSD-2022-1002180 | IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition | IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 8a50937227c385a477177c9ffa122b4230e40666, it was introduced in version v5.1 by commit d757c60eca9b22f4d108929a24401e0fdecda0b1. For more details please see the references link. | null | 2022-04-25T06:46:37.920501Z | 2022-04-24T22:19:23.515601Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d757c60eca9b22f4d108929a24401e0fdecda0b1'} |
Linux | GSD-2021-1001080 | KVM: X86: Fix x86_emulator slab cache leak | KVM: X86: Fix x86_emulator slab cache leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit a4edc506abd5ad0f46d1aa9f7cdf20efaee0618c, it was introduced in version v5.7 by commit c9b8b07cded58c55ad2bf67e68b9bfae96092293. For more details please see the references link. | null | 2021-12-19T22:48:55.011542Z | 2021-06-30T00:38:17.650299Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c9b8b07cded58c55ad2bf67e68b9bfae96092293'} |
Linux | GSD-2022-1000017 | NFC: st21nfca: Fix memory leak in device probe and remove | NFC: st21nfca: Fix memory leak in device probe and remove
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.261 by commit 38c3e320e7ff46f2dc67bc5045333e63d9f8918d, it was introduced in version v3.16 by commit 68957303f44a501af5cf37913208a2acaa6bcdf1. For more details please see the references link. | null | 2022-01-11T05:58:21.713037Z | 2022-01-10T19:50:20.440865Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/68957303f44a501af5cf37913208a2acaa6bcdf1'} |
Linux | GSD-2021-1002585 | can: sja1000: fix use after free in ems_pcmcia_add_card() | can: sja1000: fix use after free in ems_pcmcia_add_card()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.8 by commit 474f9a8534f5f89841240a7e978bafd6e1e039ce, it was introduced in version v3.2 by commit fd734c6f25aea4b2b44b045e489aec67b388577e. For more details please see the references link. | null | 2021-12-20T00:44:08.639024Z | 2021-12-19T19:43:49.440105Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fd734c6f25aea4b2b44b045e489aec67b388577e'} |
Linux | GSD-2021-1000042 | net: hso: fix NULL-deref on disconnect regression | net: hso: fix NULL-deref on disconnect regression
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.17 by commit 0f000005da31f6947f843ce6b3e3a960540c6e00, it was introduced in version v5.11.14 by commit 388d05f70f1ee0cac4a2068fd295072f1a44152a. For more details please see the references link. | null | 2021-12-19T23:57:11.682178Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/388d05f70f1ee0cac4a2068fd295072f1a44152a'} |
Linux | GSD-2021-1000412 | sched: Fix out-of-bound access in uclamp | sched: Fix out-of-bound access in uclamp
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.120 by commit 687f523c134b7f0bd040ee1230f6d17990d54172, it was introduced in version v5.3 by commit 69842cba9ace84849bb9b8edcdf2cefccd97901c. For more details please see the references link. | null | 2021-12-19T23:56:13.498849Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69842cba9ace84849bb9b8edcdf2cefccd97901c'} |
Linux | GSD-2022-1001485 | LSM: general protection fault in legacy_parse_param | LSM: general protection fault in legacy_parse_param
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 00fc07fa0b4a004711b6e1a944f0d2e46f7093b7. For more details please see the references link. | null | 2022-04-25T05:22:17.490647Z | 2022-04-24T21:16:08.124742Z | null | null | null | null | null |
Linux | GSD-2022-1002303 | irqchip/gic-v3: Fix GICR_CTLR.RWP polling | irqchip/gic-v3: Fix GICR_CTLR.RWP polling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit c7daf1b4ad809692d5c26f33c02ed8a031066548, it was introduced in version v3.17 by commit 021f653791ad17e03f98aaa7fb933816ae16f161. For more details please see the references link. | null | 2022-04-25T06:06:27.703970Z | 2022-04-24T22:32:21.151893Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/021f653791ad17e03f98aaa7fb933816ae16f161'} |
Linux | GSD-2021-1001653 | KVM: x86: Fix stack-out-of-bounds memory access from ioapic_write_indirect() | KVM: x86: Fix stack-out-of-bounds memory access from ioapic_write_indirect()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.71 by commit bebabb76ad9acca8858e0371e102fb60d708e25b, it was introduced in version v5.5 by commit 7ee30bc132c683d06a6d9e360e39e483e3990708. For more details please see the references link. | null | 2021-12-20T01:04:44.058149Z | 2021-10-19T16:30:11.102030Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ee30bc132c683d06a6d9e360e39e483e3990708'} |
Linux | GSD-2021-1000941 | net/qla3xxx: fix schedule while atomic in ql_sem_spinlock | net/qla3xxx: fix schedule while atomic in ql_sem_spinlock
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.44 by commit 4353eb42180dbc48fe7a8b69c6d2490d310537bf. For more details please see the references link. | null | 2021-12-20T01:06:27.006653Z | 2021-06-30T00:25:56.691919Z | null | null | null | null | null |
Linux | GSD-2021-1001203 | usb: common: usb-conn-gpio: fix NULL pointer dereference of charger | usb: common: usb-conn-gpio: fix NULL pointer dereference of charger
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.4 by commit 1a133a0996d6b4c83509d570ed4edcba34c44f25. For more details please see the references link. | null | 2021-12-19T23:40:48.073911Z | 2021-08-03T01:36:28.740905Z | null | null | null | null | null |
Linux | GSD-2022-1000294 | drop_monitor: fix data-race in dropmon_net_event / trace_napi_poll_hit | drop_monitor: fix data-race in dropmon_net_event / trace_napi_poll_hit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.303 by commit aeeaa9c5c2283a64cefdc4ea88e1935de82b3b56, it was introduced in version v2.6.31 by commit 4ea7e38696c7e798c47ebbecadfd392f23f814f9. For more details please see the references link. | null | 2022-03-07T01:38:30.370155Z | 2022-02-27T02:47:28.798282Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4ea7e38696c7e798c47ebbecadfd392f23f814f9'} |
Linux | GSD-2021-1001716 | net: sched: flower: protect fl_walk() with rcu | net: sched: flower: protect fl_walk() with rcu
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit dab4677bdbffa5c8270e79e34e51c89efa0728a0, it was introduced in version v5.3 by commit d39d714969cda5cbda291402c8c6b1fb1047f42e. For more details please see the references link. | null | 2021-12-19T22:56:04.083446Z | 2021-10-19T16:33:16.463579Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d39d714969cda5cbda291402c8c6b1fb1047f42e'} |
Linux | GSD-2021-1002839 | mm/damon/dbgfs: protect targets destructions with kdamond_lock | mm/damon/dbgfs: protect targets destructions with kdamond_lock
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.12 by commit 330c6117a82c16a9a365a51cec5c9ab30b13245c, it was introduced in version v5.15 by commit 4bc05954d0076655cfaf6f0135585bdc20cd6b11. For more details please see the references link. | null | 2022-01-11T05:47:28.917717Z | 2021-12-30T02:45:45.680924Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4bc05954d0076655cfaf6f0135585bdc20cd6b11'} |
Linux | GSD-2021-1000804 | io_uring: fix link timeout refs | io_uring: fix link timeout refs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit 876808dba2ff7509bdd7f230c4f374a0caf4f410, it was introduced in version v5.12 by commit 9ae1f8dd372e0e4c020b345cf9e09f519265e981. For more details please see the references link. | null | 2021-12-19T22:55:26.403380Z | 2021-06-25T00:08:26.830200Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9ae1f8dd372e0e4c020b345cf9e09f519265e981'} |
Linux | GSD-2022-1000781 | ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min | ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.27 by commit 050b1821f27c5d4fd5a298f6e62c3d3c9335e622, it was introduced in version v5.15.22 by commit 9e8895f1b3d4433f6d78aa6578e9db61ca6e6830. For more details please see the references link. | null | 2022-03-18T02:49:27.037187Z | 2022-03-18T00:17:39.652770Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9e8895f1b3d4433f6d78aa6578e9db61ca6e6830'} |
Linux | GSD-2022-1001893 | arm64: prevent instrumentation of bp hardening callbacks | arm64: prevent instrumentation of bp hardening callbacks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit d362998e8df9ada2e9e1b5f5f154959df287402d, it was introduced in version v4.16 by commit ec82b567a74fbdffdf418d4bb381d55f6a9096af. For more details please see the references link. | null | 2022-04-25T04:20:54.129698Z | 2022-04-24T21:52:44.796071Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ec82b567a74fbdffdf418d4bb381d55f6a9096af'} |
Linux | GSD-2022-1002246 | power: supply: wm8350-power: Add missing free in free_charger_irq | power: supply: wm8350-power: Add missing free in free_charger_irq
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 90bec38f6a4c81814775c7f3dfc9acf281d5dcfa, it was introduced in version v2.6.29 by commit 14431aa0c5a443d13d24e6f865a8838f97dab973. For more details please see the references link. | null | 2022-04-25T06:30:40.332406Z | 2022-04-24T22:25:40.031943Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/14431aa0c5a443d13d24e6f865a8838f97dab973'} |
Linux | GSD-2021-1001346 | KVM: mmio: Fix use-after-free Read in kvm_vm_ioctl_unregister_coalesced_mmio | KVM: mmio: Fix use-after-free Read in kvm_vm_ioctl_unregister_coalesced_mmio
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.134 by commit f2ff9d03432fcb160e9f7d4be26174d89de2779a, it was introduced in version v5.4.119 by commit 7d1bc32d6477ff96a32695ea4be8144e4513ab2d. For more details please see the references link. | null | 2021-12-20T00:33:26.761889Z | 2021-08-03T02:13:56.780015Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7d1bc32d6477ff96a32695ea4be8144e4513ab2d'} |
Linux | GSD-2022-1001939 | ALSA: pcm: Fix races among concurrent prealloc proc writes | ALSA: pcm: Fix races among concurrent prealloc proc writes
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.32 by commit 51fce708ab8986a9879ee5da946a2cc120f1036d. For more details please see the references link. | null | 2022-04-25T05:03:42.951199Z | 2022-04-24T21:56:31.343179Z | null | null | null | null | null |
Linux | GSD-2021-1000107 | NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds | NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.20 by commit 2f3380121d49e829fb73ba86240c181bc32ad897, it was introduced in version v5.6 by commit 9954bf92c0cddd50a2a470be302e1c1ffdf21d42. For more details please see the references link. | null | 2021-12-19T22:44:50.965823Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9954bf92c0cddd50a2a470be302e1c1ffdf21d42'} |
Linux | GSD-2022-1001190 | net: dsa: fix panic on shutdown if multi-chip tree failed to probe | net: dsa: fix panic on shutdown if multi-chip tree failed to probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit b864d5350c18bea9369d0bdd9e7eb6f6172cc283, it was introduced in version v5.15 by commit 0650bf52b31ff35dc6430fc2e37969c36baba724. For more details please see the references link. | null | 2022-04-25T05:25:39.454214Z | 2022-04-24T20:52:18.888379Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0650bf52b31ff35dc6430fc2e37969c36baba724'} |
Linux | GSD-2021-1000557 | NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() | NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit 2fe1cac336b55a1f79e603e9ce3552c3623e90eb, it was introduced in version v4.0 by commit a7d42ddb3099727f58366fa006f850a219cce6c8. For more details please see the references link. | null | 2021-12-20T01:27:59.545677Z | 2021-06-04T19:38:23.529313Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a7d42ddb3099727f58366fa006f850a219cce6c8'} |
Linux | GSD-2021-1002090 | drm/msm: Fix null pointer dereference on pointer edp | drm/msm: Fix null pointer dereference on pointer edp
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit 46c8ddede0273d1d132beefa9de8b820326982be, it was introduced in version v4.0 by commit ab5b0107ccf3821a6837b0f2819270d6fa0b278f. For more details please see the references link. | null | 2021-12-19T23:30:41.549265Z | 2021-11-14T15:19:22.883280Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab5b0107ccf3821a6837b0f2819270d6fa0b278f'} |
Linux | GSD-2021-1001891 | dma-debug: fix sg checks in debug_dma_map_sg() | dma-debug: fix sg checks in debug_dma_map_sg()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit 2b7d598b9651c182b4b71923a00d3f904aff21ed, it was introduced in version v2.6.31 by commit 884d05970bfbc3db368f23460dc4ce63257f240d. For more details please see the references link. | null | 2021-12-20T00:47:16.126465Z | 2021-10-28T13:54:21.499565Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/884d05970bfbc3db368f23460dc4ce63257f240d'} |
Linux | GSD-2021-1000783 | mm, hugetlb: fix simple resv_huge_pages underflow on UFFDIO_COPY | mm, hugetlb: fix simple resv_huge_pages underflow on UFFDIO_COPY
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.43 by commit 2eb4ec9c2c3535b9755c484183cc5c4d90fd37ff, it was introduced in version v4.11 by commit 8fb5debc5fcd450470cdd789c2d80ef95ebb8cf4. For more details please see the references link. | null | 2021-12-20T01:26:45.039923Z | 2021-06-25T00:05:22.066586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8fb5debc5fcd450470cdd789c2d80ef95ebb8cf4'} |
Linux | GSD-2022-1000806 | netfilter: nf_tables: fix memory leak during stateful obj update | netfilter: nf_tables: fix memory leak during stateful obj update
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.26 by commit e96e204ee6fa46702f6c94c3c69a09e69e0eac52, it was introduced in version v5.4 by commit d62d0ba97b5803183e70cfded7f7b9da76893bf5. For more details please see the references link. | null | 2022-03-18T03:49:17.282420Z | 2022-03-18T00:20:10.078489Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d62d0ba97b5803183e70cfded7f7b9da76893bf5'} |
Linux | GSD-2022-1001714 | powerpc/secvar: fix refcount leak in format_show() | powerpc/secvar: fix refcount leak in format_show()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 2a71e3ecd829a82013cf095c55068c61d991e885. For more details please see the references link. | null | 2022-04-25T05:57:44.832407Z | 2022-04-24T21:37:06.710390Z | null | null | null | null | null |
Linux | GSD-2021-1000279 | btrfs: zoned: bail out in btrfs_alloc_chunk for bad input | btrfs: zoned: bail out in btrfs_alloc_chunk for bad input
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit c3a5a3597ea944985b12dab3f91842068fdcd054, it was introduced in version v5.12 by commit 1cd6121f2a382a840f01f506694b54bf403fddc9. For more details please see the references link. | null | 2021-12-20T01:19:08.436145Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1cd6121f2a382a840f01f506694b54bf403fddc9'} |
Linux | GSD-2021-1002244 | cfg80211: call cfg80211_stop_ap when switch from P2P_GO type | cfg80211: call cfg80211_stop_ap when switch from P2P_GO type
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.218 by commit b8a045e2a9b234cfbc06cf36923886164358ddec, it was introduced in version v3.6 by commit ac800140c20e7ae51117e71289065bedd4930fc2. For more details please see the references link. | null | 2021-12-19T23:51:57.997914Z | 2021-11-29T02:35:00.319206Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac800140c20e7ae51117e71289065bedd4930fc2'} |
Linux | GSD-2022-1001344 | fbdev: Fix unregistering of framebuffers without device | fbdev: Fix unregistering of framebuffers without device
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit de33df481545974ba47c46f05194e769e4307843, it was introduced in version v5.16.19 by commit 9565a3b5203a4d57acbc1d0e981c6df71864b4ab. For more details please see the references link. | null | 2022-04-25T06:36:06.319145Z | 2022-04-24T21:06:18.666644Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9565a3b5203a4d57acbc1d0e981c6df71864b4ab'} |
Linux | GSD-2021-1000629 | net: dsa: mt7530: fix VLAN traffic leaks | net: dsa: mt7530: fix VLAN traffic leaks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.124 by commit 4fe4e1f48ba119bdbc7c897c83b04ba0d08f5488, it was introduced in version v4.16 by commit 83163f7dca5684816d01c8ccf4857aa74801e7b7. For more details please see the references link. | null | 2021-12-19T22:54:07.627301Z | 2021-06-04T19:50:20.279282Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/83163f7dca5684816d01c8ccf4857aa74801e7b7'} |
Linux | GSD-2021-1002614 | net: systemport: Add global locking for descriptor lifecycle | net: systemport: Add global locking for descriptor lifecycle
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.296 by commit 8ed2f5d08d6e59f8c78b2869bfb95d0be32c094c, it was introduced in version v3.16 by commit 80105befdb4b8cea924711b40b2462b87df65b62. For more details please see the references link. | null | 2022-01-11T05:47:31.078481Z | 2021-12-27T05:27:17.370207Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80105befdb4b8cea924711b40b2462b87df65b62'} |
Linux | GSD-2021-1001192 | NFSv4: Fix an Oops in pnfs_mark_request_commit() when doing O_DIRECT | NFSv4: Fix an Oops in pnfs_mark_request_commit() when doing O_DIRECT
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.4 by commit 7aec9f862411906f8c27071ba65a1e110ad7d2fd, it was introduced in version v5.7 by commit 9c455a8c1e146dac3a6d1405fe6a7096177b9546. For more details please see the references link. | null | 2021-12-19T23:02:42.062554Z | 2021-08-03T01:33:57.532962Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9c455a8c1e146dac3a6d1405fe6a7096177b9546'} |
Linux | GSD-2022-1002138 | jffs2: fix use-after-free in jffs2_clear_xattr_subsystem | jffs2: fix use-after-free in jffs2_clear_xattr_subsystem
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 7bb7428dd73991bf4b3a7a61b493ca50046c2b13, it was introduced in version v2.6.18 by commit aa98d7cf59b5b0764d3502662053489585faf2fe. For more details please see the references link. | null | 2022-04-25T05:32:08.714275Z | 2022-04-24T22:15:24.369125Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/aa98d7cf59b5b0764d3502662053489585faf2fe'} |
Linux | GSD-2022-1000105 | ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback | ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.265 by commit 56ecacbd73769b3142ed83bf9c1a2ebb7a761eb0, it was introduced in version v4.14.211 by commit 8de4963b2b22869d7314dbc5381c32d9763cfcc6. For more details please see the references link. | null | 2022-02-20T01:59:50.308322Z | 2022-02-18T21:35:46.086348Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8de4963b2b22869d7314dbc5381c32d9763cfcc6'} |
Linux | GSD-2021-1001468 | netrom: Decrease sock refcount when sock timers expire | netrom: Decrease sock refcount when sock timers expire
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.277 by commit 853262355518cd1247515b74e83fabf038aa6c29, it was introduced in version v4.4.173 by commit ce29e8a259de767f7210d346ad2b031cb8ab2732. For more details please see the references link. | null | 2021-12-20T00:44:33.908930Z | 2021-08-03T02:49:57.795244Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ce29e8a259de767f7210d346ad2b031cb8ab2732'} |
Linux | GSD-2022-1000555 | libsubcmd: Fix use-after-free for realloc(..., 0) | libsubcmd: Fix use-after-free for realloc(..., 0)
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit 754db970b075490448ce7d0a5716224339314873, it was introduced in version v4.5 by commit 2f4ce5ec1d447beb42143a9653716a2ab025161e. For more details please see the references link. | null | 2022-03-07T01:46:45.190532Z | 2022-02-27T03:23:26.485930Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2f4ce5ec1d447beb42143a9653716a2ab025161e'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.