ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2022-1000282 | ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() | ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.22 by commit e8e07c5e25a29e2a6f119fd947f55d7a55eb8a13. For more details please see the references link. | null | 2022-02-19T11:01:54.289949Z | 2022-02-18T22:05:52.266778Z | null | null | null | null | null |
Linux | GSD-2021-1001215 | dm btree remove: assign new_root only when removal succeeds | dm btree remove: assign new_root only when removal succeeds
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.3 by commit ad365e9351ac2b450e7e79932ff6abf59342d91a. For more details please see the references link. | null | 2021-12-19T22:25:19.347552Z | 2021-08-03T01:38:45.117085Z | null | null | null | null | null |
Linux | GSD-2022-1000778 | thermal: core: Fix TZ_GET_TRIP NULL pointer dereference | thermal: core: Fix TZ_GET_TRIP NULL pointer dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.27 by commit 3dafbf915c05f83469e791949b5590da2aca2afb, it was introduced in version v5.9 by commit 1ce50e7d408ef2bdc8ca021363fd46d1b8bfad00. For more details please see the references link. | null | 2022-03-18T02:56:31.247411Z | 2022-03-18T00:17:31.319956Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1ce50e7d408ef2bdc8ca021363fd46d1b8bfad00'} |
Linux | GSD-2021-1000957 | usb: typec: tcpm: cancel vdm and state machine hrtimer when unregister tcpm port | usb: typec: tcpm: cancel vdm and state machine hrtimer when unregister tcpm port
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.44 by commit 18eaf0de50eadeeb395b83310b259b21ad8ed0a6, it was introduced in version v5.10 by commit 3ed8e1c2ac9914a2fcb08ec13476b85319536cea. For more details please see the references link. | null | 2021-12-19T23:43:30.007749Z | 2021-06-30T00:29:11.101443Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3ed8e1c2ac9914a2fcb08ec13476b85319536cea'} |
Linux | GSD-2021-1001645 | net: hns3: do not allow call hns3_nic_net_open repeatedly | net: hns3: do not allow call hns3_nic_net_open repeatedly
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.71 by commit f8ba689cb69523144d10606096ef686002dd7285, it was introduced in version v5.0 by commit e888402789b9db5de4fcda361331d66dbf0cd9fd. For more details please see the references link. | null | 2021-12-19T23:55:05.974707Z | 2021-10-19T16:29:45.948992Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e888402789b9db5de4fcda361331d66dbf0cd9fd'} |
Linux | GSD-2022-1002315 | xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu>=32 | xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu>=32
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 0848767dee78c00c5646eef9b3201ee14ce68563. For more details please see the references link. | null | 2022-04-25T05:48:54.659767Z | 2022-04-24T22:33:41.087544Z | null | null | null | null | null |
Linux | GSD-2022-1000328 | nvme: fix a possible use-after-free in controller reset during load | nvme: fix a possible use-after-free in controller reset during load
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.231 by commit a25e460fbb0340488d119fb2e28fe3f829b7417e. For more details please see the references link. | null | 2022-03-07T03:21:31.364032Z | 2022-02-27T02:52:00.673931Z | null | null | null | null | null |
Linux | GSD-2022-1001493 | vsock/virtio: initialize vdev->priv before using VQs | vsock/virtio: initialize vdev->priv before using VQs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 27cb7d136224a81904ead19d9da2c82357bcc9a9, it was introduced in version v5.3 by commit 9c7a5582f5d720dc35cfcc42ccaded69f0642e4a. For more details please see the references link. | null | 2022-04-25T05:23:22.451436Z | 2022-04-24T21:16:50.544738Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9c7a5582f5d720dc35cfcc42ccaded69f0642e4a'} |
Linux | GSD-2021-1000404 | nbd: Fix NULL pointer in flush_workqueue | nbd: Fix NULL pointer in flush_workqueue
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.120 by commit 1c4962df938891af9ab4775f5224ef8601764107, it was introduced in version v5.4 by commit e9e006f5fcf2bab59149cb38a48a4817c1b538b4. For more details please see the references link. | null | 2021-12-19T23:28:57.328562Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e9e006f5fcf2bab59149cb38a48a4817c1b538b4'} |
Linux | GSD-2021-1002439 | f2fs: set SBI_NEED_FSCK flag when inconsistent node block found | f2fs: set SBI_NEED_FSCK flag when inconsistent node block found
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.163 by commit 51be334da375058694043224a0941275a353eaac. For more details please see the references link. | null | 2021-12-20T00:55:43.035208Z | 2021-12-19T19:37:20.410287Z | null | null | null | null | null |
Linux | GSD-2022-1001169 | net/sched: act_ct: fix ref leak when switching zones | net/sched: act_ct: fix ref leak when switching zones
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit b24793a37d91aacad7cb9893b226a7924a89636a, it was introduced in version v5.17 by commit 2f131de361f6d0eaff17db26efdb844c178432f8. For more details please see the references link. | null | 2022-04-25T02:54:56.498557Z | 2022-04-24T20:50:07.820265Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2f131de361f6d0eaff17db26efdb844c178432f8'} |
Linux | GSD-2021-1000054 | tools/power turbostat: Fix offset overflow issue in index converting | tools/power turbostat: Fix offset overflow issue in index converting
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.3 by commit 337b1546cde87fb8588ddaedf0201b769baa572a, it was introduced in version v5.10 by commit 9972d5d84d76982606806b2ce887f70c2f8ba60a. For more details please see the references link. | null | 2021-12-20T00:02:23.589707Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9972d5d84d76982606806b2ce887f70c2f8ba60a'} |
Linux | GSD-2021-1002069 | net: batman-adv: fix error handling | net: batman-adv: fix error handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.77 by commit b0a2cd38553c77928ef1646ed1518486b1e70ae8, it was introduced in version v2.6.38 by commit c6c8fea29769d998d94fcec9b9f14d4b52b349d3. For more details please see the references link. | null | 2021-12-20T00:54:52.271607Z | 2021-11-14T15:18:29.335848Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6c8fea29769d998d94fcec9b9f14d4b52b349d3'} |
Linux | GSD-2021-1002593 | net: dsa: felix: Fix memory leak in felix_setup_mmio_filtering | net: dsa: felix: Fix memory leak in felix_setup_mmio_filtering
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.8 by commit 973a0373e88cc19129bd6ef0ec193040535397d9, it was introduced in version v5.15 by commit 8d5f7954b7c8de54902a8beda141064a7e2e6ee0. For more details please see the references link. | null | 2021-12-20T00:49:21.813845Z | 2021-12-19T19:44:09.286133Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8d5f7954b7c8de54902a8beda141064a7e2e6ee0'} |
Linux | GSD-2022-1001539 | cxl/port: Hold port reference until decoder release | cxl/port: Hold port reference until decoder release
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit b0022ca445d5fc4d0c89d15dcd0f855977b22c1d, it was introduced in version v5.14 by commit 40ba17afdfabb01688c61565dbe02a916241bc05. For more details please see the references link. | null | 2022-04-25T03:54:46.775367Z | 2022-04-24T21:21:39.389150Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/40ba17afdfabb01688c61565dbe02a916241bc05'} |
Linux | GSD-2021-1002086 | NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() | NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit 564249219e5b5673a8416b5181875d828c3f1e8c, it was introduced in version v3.13 by commit 1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8. For more details please see the references link. | null | 2021-12-20T00:52:18.212740Z | 2021-11-14T15:19:13.207949Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8'} |
Linux | GSD-2021-1000541 | btrfs: return whole extents in fiemap | btrfs: return whole extents in fiemap
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit afd1fca36d26f3896c99a363fc3dbe9c05411e3a, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T23:28:20.684894Z | 2021-06-04T19:35:47.075817Z | null | null | null | null | null |
Linux | GSD-2022-1001186 | drivers: ethernet: cpsw: fix panic when interrupt coaleceing is set via ethtool | drivers: ethernet: cpsw: fix panic when interrupt coaleceing is set via ethtool
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 30ad11bff021a94aff6dab1ec9236fdfd884fbff, it was introduced in version v5.15 by commit d43c65b05b848e0b2db1a6c78b02c189da3a95b5. For more details please see the references link. | null | 2022-04-25T06:56:24.138174Z | 2022-04-24T20:51:57.898038Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d43c65b05b848e0b2db1a6c78b02c189da3a95b5'} |
Linux | GSD-2021-1000111 | openvswitch: fix stack OOB read while fragmenting IPv4 packets | openvswitch: fix stack OOB read while fragmenting IPv4 packets
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.20 by commit d841d3cf5297fde4ce6a41ff35451d0e82917f3e, it was introduced in version v4.16 by commit d52e5a7e7ca49457dd31fc8b42fb7c0d58a31221. For more details please see the references link. | null | 2021-12-19T22:35:48.935266Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d52e5a7e7ca49457dd31fc8b42fb7c0d58a31221'} |
Linux | GSD-2021-1001350 | coresight: tmc-etf: Fix global-out-of-bounds in tmc_update_etf_buffer() | coresight: tmc-etf: Fix global-out-of-bounds in tmc_update_etf_buffer()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.133 by commit ef0a06acc6b16388640ad367eedfa2a17f1945db, it was introduced in version v4.14 by commit 0c3fc4d5fa26092853278145aca9b21fa52a3e93. For more details please see the references link. | null | 2021-12-19T23:55:23.138991Z | 2021-08-03T02:14:56.696666Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0c3fc4d5fa26092853278145aca9b21fa52a3e93'} |
Linux | GSD-2022-1002250 | dax: make sure inodes are flushed before destroy cache | dax: make sure inodes are flushed before destroy cache
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 770d42fff12d8595adda9025a0b92091f543e775, it was introduced in version v4.12 by commit 7b6be8444e0f0dd675b54d059793423d3c9b4c03. For more details please see the references link. | null | 2022-04-25T06:03:16.766124Z | 2022-04-24T22:26:12.547163Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7b6be8444e0f0dd675b54d059793423d3c9b4c03'} |
Linux | GSD-2022-1001885 | ASoC: xilinx: xlnx_formatter_pcm: Handle sysclk setting | ASoC: xilinx: xlnx_formatter_pcm: Handle sysclk setting
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit bb0a0e23dd0070e6f407387f3822daef95e5815d, it was introduced in version v5.1 by commit 6f6c3c36f0917be24587eeba818ab4fdfcb5465a. For more details please see the references link. | null | 2022-04-25T03:00:12.487536Z | 2022-04-24T21:51:56.102031Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6f6c3c36f0917be24587eeba818ab4fdfcb5465a'} |
Linux | GSD-2022-1000797 | sc16is7xx: Fix for incorrect data being transmitted | sc16is7xx: Fix for incorrect data being transmitted
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.26 by commit 4e508c59357310a41b8fa69a576dfea4208f2518, it was introduced in version v5.8 by commit 6393ff1c4435acc343b1481f5b834b918cb42b12. For more details please see the references link. | null | 2022-03-18T03:46:39.126543Z | 2022-03-18T00:18:52.303519Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6393ff1c4435acc343b1481f5b834b918cb42b12'} |
Linux | GSD-2021-1000812 | pid: take a reference when initializing `cad_pid` | pid: take a reference when initializing `cad_pid`
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit b8ff869f20152fbe66b6c2e2715d26a2f9897cca, it was introduced in version v2.6.19 by commit 9ec52099e4b8678a60e9f93e41ad87885d64f3e6. For more details please see the references link. | null | 2021-12-20T00:20:42.933186Z | 2021-06-25T00:08:57.046925Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9ec52099e4b8678a60e9f93e41ad87885d64f3e6'} |
Linux | GSD-2021-1001700 | block: don't call rq_qos_ops->done_bio if the bio isn't tracked | block: don't call rq_qos_ops->done_bio if the bio isn't tracked
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.11 by commit 004b8f8a691205a93d9e80d98b786b2b97424d6e. For more details please see the references link. | null | 2021-12-20T00:08:23.847675Z | 2021-10-19T16:32:30.817671Z | null | null | null | null | null |
Linux | GSD-2022-1000580 | KVM: arm64: Avoid consuming a stale esr value when SError occur | KVM: arm64: Avoid consuming a stale esr value when SError occur
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.22 by commit e1e852746997500f1873f60b954da5f02cc2dba3, it was introduced in version v5.11 by commit defe21f49bc98b095300752aa1e19bb608f3e97d. For more details please see the references link. | null | 2022-03-07T01:33:29.258312Z | 2022-02-27T03:27:00.124192Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/defe21f49bc98b095300752aa1e19bb608f3e97d'} |
Linux | GSD-2021-1001517 | blktrace: Fix uaf in blk_trace access after removing by sysfs | blktrace: Fix uaf in blk_trace access after removing by sysfs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.285 by commit dacfd5e4d1142bfb3809aab3634a375f6f373269, it was introduced in version v2.6.30 by commit c71a896154119f4ca9e89d6078f5f63ad60ef199. For more details please see the references link. | null | 2021-12-19T23:44:50.403321Z | 2021-10-19T16:21:48.784341Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c71a896154119f4ca9e89d6078f5f63ad60ef199'} |
Linux | GSD-2022-1002047 | media: ir_toy: free before error exiting | media: ir_toy: free before error exiting
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 99e3f83539cac6884a4df02cb204a57a184ea12b. For more details please see the references link. | null | 2022-04-25T06:00:59.642380Z | 2022-04-24T22:05:45.252305Z | null | null | null | null | null |
Linux | GSD-2022-1002417 | mmc: host: Return an error when ->enable_sdio_irq() ops is missing | mmc: host: Return an error when ->enable_sdio_irq() ops is missing
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 3fac2cb56ba5205547e296b193e52871f9dc3845. For more details please see the references link. | null | 2022-04-25T05:46:27.251385Z | 2022-04-24T22:45:07.068551Z | null | null | null | null | null |
Linux | GSD-2022-1001391 | PCI: endpoint: Fix misused goto label | PCI: endpoint: Fix misused goto label
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 70236a0d2d62b081d52076de22d8d017d6cbe99f. For more details please see the references link. | null | 2022-04-25T05:08:49.392760Z | 2022-04-24T21:10:02.897681Z | null | null | null | null | null |
Linux | GSD-2021-1000306 | selinux: add proper NULL termination to the secclass_map permissions | selinux: add proper NULL termination to the secclass_map permissions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 336dc1d637f3c889785a718fe791580e01bc2a93, it was introduced in version v4.15 by commit ec27c3568a34c7fe5fcf4ac0a354eda77687f7eb. For more details please see the references link. | null | 2021-12-20T01:08:11.581130Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ec27c3568a34c7fe5fcf4ac0a354eda77687f7eb'} |
Linux | GSD-2022-1000979 | nfc: nci: add flush_workqueue to prevent uaf | nfc: nci: add flush_workqueue to prevent uaf
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.4 by commit edd4600120641e1714e30112e69a548cfb68e067, it was introduced in version v3.2 by commit 6a2968aaf50c7a22fced77a5e24aa636281efca8. For more details please see the references link. | null | 2022-04-25T05:02:53.057993Z | 2022-04-24T20:36:43.659623Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6a2968aaf50c7a22fced77a5e24aa636281efca8'} |
Linux | GSD-2021-1000756 | btrfs: fixup error handling in fixup_inode_link_counts | btrfs: fixup error handling in fixup_inode_link_counts
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.125 by commit 6d4da27bd9efdbdffbaf6aa12617a2b549a3b752, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T00:20:48.769052Z | 2021-06-25T00:02:44.713794Z | null | null | null | null | null |
Linux | GSD-2021-1001844 | ocfs2: fix data corruption after conversion from inline format | ocfs2: fix data corruption after conversion from inline format
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit f1b98569e81c37d7e0deada7172f8f60860c1360, it was introduced in version v5.10 by commit 6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b. For more details please see the references link. | null | 2021-12-20T00:20:52.576639Z | 2021-10-28T13:51:50.049276Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b'} |
Linux | GSD-2021-1002291 | scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs() | scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.82 by commit 8440377e1a5644779b4c8d013aa2a917f5fc83c3. For more details please see the references link. | null | 2021-12-20T00:27:33.753679Z | 2021-11-29T02:37:18.089256Z | null | null | null | null | null |
Linux | GSD-2021-1002784 | phonet/pep: refuse to enable an unbound pipe | phonet/pep: refuse to enable an unbound pipe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.260 by commit 311601f114859d586d5ef8833d60d3aa23282161. For more details please see the references link. | null | 2022-01-11T05:47:42.729453Z | 2021-12-30T02:43:17.820010Z | null | null | null | null | null |
Linux | GSD-2021-1000243 | i2c: imx: fix reference leak when pm_runtime_get_sync fails | i2c: imx: fix reference leak when pm_runtime_get_sync fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit ff406f6cd09c273337ab4854292e4aca48f8affd, it was introduced in version v5.7 by commit 3a5ee18d2a32bda6b9a1260136f6805848e3839d. For more details please see the references link. | null | 2021-12-19T23:37:17.016666Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3a5ee18d2a32bda6b9a1260136f6805848e3839d'} |
Linux | GSD-2022-1001684 | qede: confirm skb is allocated before using | qede: confirm skb is allocated before using
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit c9bdce2359b5f4986eb38d1e81865b3586cc20d2, it was introduced in version v4.18 by commit 8a8633978b842c88fbcfe00d4e5dde96048f630e. For more details please see the references link. | null | 2022-04-25T04:38:44.353784Z | 2022-04-24T21:34:56.476055Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8a8633978b842c88fbcfe00d4e5dde96048f630e'} |
Linux | GSD-2022-1000996 | SUNRPC: Ensure we flush any closed sockets before xs_xprt_free() | SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit d21287d8a4589dd8513038f887ece980fbc399cf, it was introduced in version v5.1 by commit a73881c96d73ee72b7dbbd38a6eeef66182a8ef7. For more details please see the references link. | null | 2022-04-25T05:48:09.232419Z | 2022-04-24T20:38:17.438916Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a73881c96d73ee72b7dbbd38a6eeef66182a8ef7'} |
Linux | GSD-2021-1000613 | iommu/vt-d: Fix sysfs leak in alloc_iommu() | iommu/vt-d: Fix sysfs leak in alloc_iommu()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.42 by commit f01134321d04f47c718bb41b799bcdeda27873d2, it was introduced in version v4.11 by commit 39ab9555c24110671f8dc671311a26e5c985b592. For more details please see the references link. | null | 2021-12-19T23:11:26.653976Z | 2021-06-04T19:47:35.457558Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/39ab9555c24110671f8dc671311a26e5c985b592'} |
Linux | GSD-2021-1001901 | NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() | NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit 564249219e5b5673a8416b5181875d828c3f1e8c, it was introduced in version v3.13 by commit 1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8. For more details please see the references link. | null | 2021-12-19T22:56:09.218171Z | 2021-10-28T13:54:49.555681Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8'} |
Linux | GSD-2022-1002102 | ASoC: atmel: Fix error handling in sam9x5_wm8731_driver_probe | ASoC: atmel: Fix error handling in sam9x5_wm8731_driver_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 90ac679aa6a01841da90ec5a4aaa4b5e0badddf0, it was introduced in version v3.12 by commit fdbcb3cba54b29a37dfe42acdc0e72c543e0807d. For more details please see the references link. | null | 2022-04-25T05:28:08.432254Z | 2022-04-24T22:11:25.888125Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fdbcb3cba54b29a37dfe42acdc0e72c543e0807d'} |
Linux | GSD-2021-1001452 | misc/libmasm/module: Fix two use after free in ibmasm_init_one | misc/libmasm/module: Fix two use after free in ibmasm_init_one
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.276 by commit 29ba8e2ba89ee2862a26d91204dd5fe77ceee25a. For more details please see the references link. | null | 2021-12-19T23:30:10.495828Z | 2021-08-03T02:45:37.203506Z | null | null | null | null | null |
Linux | GSD-2022-1000095 | drm/vmwgfx: Fix stale file descriptors on failed usercopy | drm/vmwgfx: Fix stale file descriptors on failed usercopy
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.264 by commit e8d092a62449dcfc73517ca43963d2b8f44d0516, it was introduced in version v4.14 by commit c906965dee22d5e95d0651759ba107b420212a9f. For more details please see the references link. | null | 2022-02-19T04:27:05.081053Z | 2022-02-18T21:34:38.661782Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c906965dee22d5e95d0651759ba107b420212a9f'} |
Linux | GSD-2021-1001002 | x86/fpu: Invalidate FPU state after a failed XRSTOR from a user buffer | x86/fpu: Invalidate FPU state after a failed XRSTOR from a user buffer
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.46 by commit a7748e021b9fb7739e3cb88449296539de0b6817, it was introduced in version v5.2 by commit 1d731e731c4cd7cbd3b1aa295f0932e7610da82f. For more details please see the references link. | null | 2021-12-20T00:12:45.998181Z | 2021-06-30T00:32:29.338555Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1d731e731c4cd7cbd3b1aa295f0932e7610da82f'} |
Linux | GSD-2022-1001057 | scsi: pm8001: Fix tag leaks on error | scsi: pm8001: Fix tag leaks on error
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 9cc72bcc1c096ed42c91646f130d4b4191580a4c. For more details please see the references link. | null | 2022-04-25T04:25:47.034815Z | 2022-04-24T20:42:48.193369Z | null | null | null | null | null |
Linux | GSD-2021-1002507 | nfp: Fix memory leak in nfp_cpp_area_cache_add() | nfp: Fix memory leak in nfp_cpp_area_cache_add()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.85 by commit 484069b5de9d223cc1c64c6f80389a99cfef51f1, it was introduced in version v4.11 by commit 4cb584e0ee7df70fd0376aee60cf701855ea8c81. For more details please see the references link. | null | 2021-12-19T22:44:12.629378Z | 2021-12-19T19:40:25.684109Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4cb584e0ee7df70fd0376aee60cf701855ea8c81'} |
Linux | GSD-2022-1001407 | mt76: dma: initialize skip_unmap in mt76_dma_rx_fill | mt76: dma: initialize skip_unmap in mt76_dma_rx_fill
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit db0e611405eb32f8d60531853a5c5210347b5d57. For more details please see the references link. | null | 2022-04-25T05:42:55.157435Z | 2022-04-24T21:10:49.296150Z | null | null | null | null | null |
Linux | GSD-2021-1000490 | net/nfc: fix use-after-free llcp_sock_bind/connect | net/nfc: fix use-after-free llcp_sock_bind/connect
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.269 by commit 26157c82ba756767b2bd66d28a71b1bc454447f6, it was introduced in version v4.4.267 by commit a1cdd18c49d23ec38097ac2c5b0d761146fc0109. For more details please see the references link. | null | 2021-12-20T01:01:00.514252Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a1cdd18c49d23ec38097ac2c5b0d761146fc0109'} |
Linux | GSD-2021-1002157 | mlxsw: thermal: Fix out-of-bounds memory accesses | mlxsw: thermal: Fix out-of-bounds memory accesses
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 332fdf951df8b870e3da86b122ae304e2aabe88c, it was introduced in version v4.10 by commit a50c1e35650b929500bd89be61c89d95a267ce56. For more details please see the references link. | null | 2021-12-19T23:45:51.920013Z | 2021-11-14T15:22:31.487100Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a50c1e35650b929500bd89be61c89d95a267ce56'} |
Linux | GSD-2022-1001954 | net: usb: aqc111: Fix out-of-bounds accesses in RX fixup | net: usb: aqc111: Fix out-of-bounds accesses in RX fixup
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.112 by commit d90df6da50c56ad8b1a132e3cf86b6cdf8f507b7. For more details please see the references link. | null | 2022-04-25T06:57:32.502181Z | 2022-04-24T21:57:46.722949Z | null | null | null | null | null |
Linux | GSD-2022-1000646 | rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() | rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.6 by commit 36a9a0aee881940476b254e0352581401b23f210, it was introduced in version v3.14 by commit ba7d49b1f0f8e5f24294a880ed576964059af5ef. For more details please see the references link. | null | 2022-03-07T02:29:43.171177Z | 2022-02-27T03:35:43.092642Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ba7d49b1f0f8e5f24294a880ed576964059af5ef'} |
Linux | GSD-2022-1002381 | tpm: fix reference counting for struct tpm_chip | tpm: fix reference counting for struct tpm_chip
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit cb64bd038beacb4331fe464a36c8b5481e8f51e2, it was introduced in version v4.12 by commit fdc915f7f71939ad5a3dda3389b8d2d7a7c5ee66. For more details please see the references link. | null | 2022-04-25T03:10:36.200222Z | 2022-04-24T22:41:07.844779Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fdc915f7f71939ad5a3dda3389b8d2d7a7c5ee66'} |
Linux | GSD-2022-1000216 | ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() | ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.99 by commit 038f8b7caa74d29e020949a43ca368c93f6b29b9. For more details please see the references link. | null | 2022-02-19T02:39:14.290880Z | 2022-02-18T21:56:34.870748Z | null | null | null | null | null |
Linux | GSD-2021-1001281 | misc/libmasm/module: Fix two use after free in ibmasm_init_one | misc/libmasm/module: Fix two use after free in ibmasm_init_one
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.52 by commit b9c87ce3bc6331f82811a8cf8e930423c22523a3. For more details please see the references link. | null | 2021-12-19T22:19:50.299917Z | 2021-08-03T01:56:42.210387Z | null | null | null | null | null |
Linux | GSD-2021-1000869 | bonding: init notify_work earlier to avoid uninitialized use | bonding: init notify_work earlier to avoid uninitialized use
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.195 by commit f583748c2a4a1dc731812ae2c12cadca5c1a88b5. For more details please see the references link. | null | 2021-12-19T23:14:51.841086Z | 2021-06-30T00:02:34.690769Z | null | null | null | null | null |
Linux | GSD-2022-1001811 | NFS: remove unneeded check in decode_devicenotify_args() | NFS: remove unneeded check in decode_devicenotify_args()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 75ee75cc360a8ce0ba3a3e796658152f9b3c4694, it was introduced in version v4.0 by commit a4f743a6bb201662962fa888e3f978583d61691e. For more details please see the references link. | null | 2022-04-25T05:07:57.830097Z | 2022-04-24T21:44:00.898409Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a4f743a6bb201662962fa888e3f978583d61691e'} |
Linux | GSD-2022-1000703 | bpf, sockmap: Do not ignore orig_len parameter | bpf, sockmap: Do not ignore orig_len parameter
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.13 by commit 518f8a21ce73755254165729ce3272f8504a69b7, it was introduced in version v5.10 by commit ef5659280eb13e8ac31c296f58cfdfa1684ac06b. For more details please see the references link. | null | 2022-03-18T03:47:51.899936Z | 2022-03-18T00:11:04.575889Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef5659280eb13e8ac31c296f58cfdfa1684ac06b'} |
Linux | GSD-2021-1000886 | isdn: mISDN: netjet: Fix crash in nj_probe: | isdn: mISDN: netjet: Fix crash in nj_probe:
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.126 by commit 9d7d4649dc1c53acf76df260fd519db698ed20d7. For more details please see the references link. | null | 2021-12-20T01:13:22.780257Z | 2021-06-30T00:04:28.016639Z | null | null | null | null | null |
Linux | GSD-2021-1001794 | net: encx24j600: check error in devm_regmap_init_encx24j600 | net: encx24j600: check error in devm_regmap_init_encx24j600
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.252 by commit fddc7f678d7fb93caa0d7bc512f968ff1e2bddbc, it was introduced in version v4.4 by commit 04fbfce7a222327b97ca165294ef19f0faa45960. For more details please see the references link. | null | 2021-12-20T01:02:42.046767Z | 2021-10-28T13:49:11.430009Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/04fbfce7a222327b97ca165294ef19f0faa45960'} |
Linux | GSD-2022-1000353 | drop_monitor: fix data-race in dropmon_net_event / trace_napi_poll_hit | drop_monitor: fix data-race in dropmon_net_event / trace_napi_poll_hit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.181 by commit aeb993412eb29bdb7e95845e1b16e0b8167e121e, it was introduced in version v2.6.31 by commit 4ea7e38696c7e798c47ebbecadfd392f23f814f9. For more details please see the references link. | null | 2022-03-07T02:22:34.471861Z | 2022-02-27T02:55:33.965016Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4ea7e38696c7e798c47ebbecadfd392f23f814f9'} |
Linux | GSD-2021-1002442 | net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound | net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.164 by commit 77ff166909458646e66450e42909e0adacc99049. For more details please see the references link. | null | 2021-12-20T01:13:00.180707Z | 2021-12-19T19:37:28.157238Z | null | null | null | null | null |
Linux | GSD-2022-1001112 | XArray: Fix xas_create_range() when multi-order entry present | XArray: Fix xas_create_range() when multi-order entry present
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 18f13edf3424b3b61814b69d5269b2e14584800c, it was introduced in version v5.17 by commit 6b24ca4a1a8d4ee3221d6d44ddbb99f542e4bda3. For more details please see the references link. | null | 2022-04-25T05:19:51.153738Z | 2022-04-24T20:46:20.144770Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6b24ca4a1a8d4ee3221d6d44ddbb99f542e4bda3'} |
Linux | GSD-2021-1000185 | bpf: Fix masking negation logic upon negative dst register | bpf: Fix masking negation logic upon negative dst register
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.190 by commit 0e2dfdc74a7f4036127356d42ea59388f153f42c, it was introduced in version v4.19.19 by commit f92a819b4cbef8c9527d9797110544b2055a4b96. For more details please see the references link. | null | 2021-12-19T23:10:29.024239Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f92a819b4cbef8c9527d9797110544b2055a4b96'} |
Linux | GSD-2021-1002012 | isdn: cpai: check ctr->cnr to avoid array index out of bound | isdn: cpai: check ctr->cnr to avoid array index out of bound
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.156 by commit 285e9210b1fab96a11c0be3ed5cea9dd48b6ac54. For more details please see the references link. | null | 2021-12-19T22:56:08.727924Z | 2021-11-14T15:15:53.274506Z | null | null | null | null | null |
Linux | GSD-2022-1001542 | libbpf: Fix memleak in libbpf_netlink_recv() | libbpf: Fix memleak in libbpf_netlink_recv()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 7cedd22f1a8db371b0937bad0ec1c3020d8ebf51, it was introduced in version v5.16.19 by commit 723644ebfdb2ef7dccdaf4f1b05be9186fdba6b1. For more details please see the references link. | null | 2022-04-24T21:21:53.673514Z | 2022-04-24T21:21:53.673514Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/723644ebfdb2ef7dccdaf4f1b05be9186fdba6b1'} |
Linux | GSD-2022-1001796 | bfq: fix use-after-free in bfq_dispatch_request | bfq: fix use-after-free in bfq_dispatch_request
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 080665e2c3cbfc68359b9a348a3546ed9b908e7a. For more details please see the references link. | null | 2022-04-25T06:26:40.119991Z | 2022-04-24T21:42:47.131721Z | null | null | null | null | null |
Linux | GSD-2022-1000884 | iio: adc: men_z188_adc: Fix a resource leak in an error handling path | iio: adc: men_z188_adc: Fix a resource leak in an error handling path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.182 by commit ce1076b33e299dc8d270e4450a420a18bfb3e190, it was introduced in version v3.15 by commit 74aeac4da66fbfa246edbfc849002eac9b5af9ca. For more details please see the references link. | null | 2022-03-18T03:45:09.305759Z | 2022-03-18T00:27:44.371076Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/74aeac4da66fbfa246edbfc849002eac9b5af9ca'} |
Linux | GSD-2021-1000701 | drm/amdgpu: Fix a use-after-free | drm/amdgpu: Fix a use-after-free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.271 by commit 0707c3fea8102d211631ba515ef2159707561b0d, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T23:04:23.864352Z | 2021-06-04T20:05:29.497871Z | null | null | null | null | null |
Linux | GSD-2021-1001813 | net: mdiobus: Fix memory leak in __mdiobus_register | net: mdiobus: Fix memory leak in __mdiobus_register
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.156 by commit b0feaa8376f52357bf2fd020d0c471713a859728. For more details please see the references link. | null | 2021-12-20T00:26:52.216671Z | 2021-10-28T13:50:17.170737Z | null | null | null | null | null |
Linux | GSD-2021-1002696 | tee: amdtee: fix an IS_ERR() vs NULL bug | tee: amdtee: fix an IS_ERR() vs NULL bug
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.88 by commit 640e28d618e82be78fb43b4bf5113bc90d6aa442, it was introduced in version v5.6 by commit 757cc3e9ff1d72d014096399d6e2bf03974d9da1. For more details please see the references link. | null | 2022-01-11T05:46:17.637283Z | 2021-12-27T05:37:24.274743Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/757cc3e9ff1d72d014096399d6e2bf03974d9da1'} |
Linux | GSD-2021-1000351 | i2c: stm32f7: fix reference leak when pm_runtime_get_sync fails | i2c: stm32f7: fix reference leak when pm_runtime_get_sync fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit c323b270a52a26aa8038a4d1fd9a850904a41166, it was introduced in version v5.6 by commit ea6dd25deeb5b797a145be7f860e3085e7d104c3. For more details please see the references link. | null | 2021-12-20T00:04:38.039118Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ea6dd25deeb5b797a145be7f860e3085e7d104c3'} |
Linux | GSD-2022-1002440 | ath9k_htc: fix uninit value bugs | ath9k_htc: fix uninit value bugs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit e352acdd378e9263cc4c6018e588f2dac7161d07, it was introduced in version v2.6.35 by commit fb9987d0f748c983bb795a86f47522313f701a08. For more details please see the references link. | null | 2022-04-25T05:04:35.830970Z | 2022-04-24T22:47:48.332738Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb9987d0f748c983bb795a86f47522313f701a08'} |
Linux | GSD-2022-1000187 | psi: Fix uaf issue when psi trigger is destroyed while being polled | psi: Fix uaf issue when psi trigger is destroyed while being polled
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.97 by commit d4e4e61d4a5b87bfc9953c306a11d35d869417fd, it was introduced in version v5.2 by commit 0e94682b73bfa6c44c98af7a26771c9c08c055d5. For more details please see the references link. | null | 2022-02-19T04:08:00.458078Z | 2022-02-18T21:52:30.656200Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0e94682b73bfa6c44c98af7a26771c9c08c055d5'} |
Linux | GSD-2021-1001110 | cfg80211: call cfg80211_leave_ocb when switching away from OCB | cfg80211: call cfg80211_leave_ocb when switching away from OCB
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.196 by commit 24e2441b102db48bf8eec1f6b789db49b5e86adb. For more details please see the references link. | null | 2021-12-20T00:11:51.812195Z | 2021-07-08T01:56:59.232234Z | null | null | null | null | null |
Linux | GSD-2022-1002010 | tcp: Don't acquire inet_listen_hashbucket::lock with disabled BH. | tcp: Don't acquire inet_listen_hashbucket::lock with disabled BH.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit b1b27b0e8d489b40607127e26af70e5571bf9201. For more details please see the references link. | null | 2022-04-25T05:36:29.913865Z | 2022-04-24T22:02:45.400233Z | null | null | null | null | null |
Linux | GSD-2021-1001540 | blktrace: Fix uaf in blk_trace access after removing by sysfs | blktrace: Fix uaf in blk_trace access after removing by sysfs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.249 by commit d56171d9360c0170c5c5f8f7e2362a2e999eca40, it was introduced in version v2.6.30 by commit c71a896154119f4ca9e89d6078f5f63ad60ef199. For more details please see the references link. | null | 2021-12-20T01:19:33.639951Z | 2021-10-19T16:22:53.069378Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c71a896154119f4ca9e89d6078f5f63ad60ef199'} |
Linux | GSD-2021-1001055 | net: ipv4: fix memory leak in netlbl_cipsov4_add_std | net: ipv4: fix memory leak in netlbl_cipsov4_add_std
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit 0ffb460be3abac86f884a8c548bb02724ec370f4, it was introduced in version v2.6.19 by commit 96cb8e3313c7a12e026c1ed510522ae6f6023875. For more details please see the references link. | null | 2021-12-19T23:15:55.416693Z | 2021-06-30T00:36:39.628776Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/96cb8e3313c7a12e026c1ed510522ae6f6023875'} |
Linux | GSD-2022-1000538 | scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task | scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit f61f9fccb2cb4bb275674a79d638704db6bc2171. For more details please see the references link. | null | 2022-03-07T02:31:36.875188Z | 2022-02-27T03:20:50.594748Z | null | null | null | null | null |
Linux | GSD-2022-1002505 | ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe | ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit 81f266396237cea09a8c6322a6a78535f06ed345, it was introduced in version v3.8 by commit 531f67e41dcde1e358cf821d056241a66355cf03. For more details please see the references link. | null | 2022-04-25T04:17:59.936873Z | 2022-04-24T22:55:44.396853Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/531f67e41dcde1e358cf821d056241a66355cf03'} |
Linux | GSD-2022-1000492 | scsi: target: iscsi: Make sure the np under each tpg is unique | scsi: target: iscsi: Make sure the np under each tpg is unique
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit fe4de5330c774e2e0c1621e6a72d60391568b94d. For more details please see the references link. | null | 2022-03-07T01:35:37.012310Z | 2022-02-27T03:14:49.468409Z | null | null | null | null | null |
Linux | GSD-2021-1001405 | igb: Fix use-after-free error during reset | igb: Fix use-after-free error during reset
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.241 by commit d7367f781e5a9ca5df9082b15b272b55e76931f8, it was introduced in version v4.12 by commit 7cc6fd4c60f267e17b0baef1580d7a6258c0a6f0. For more details please see the references link. | null | 2021-12-19T23:52:06.003242Z | 2021-08-03T02:31:11.596571Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7cc6fd4c60f267e17b0baef1580d7a6258c0a6f0'} |
Linux | GSD-2022-1000168 | ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() | ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.178 by commit c33402b056de61104b6146dedbe138ca8d7ec62b. For more details please see the references link. | null | 2022-02-19T09:37:04.812348Z | 2022-02-18T21:50:22.563380Z | null | null | null | null | null |
Linux | GSD-2022-1002155 | ALSA: pcm: Test for "silence" field in struct "pcm_format_data" | ALSA: pcm: Test for "silence" field in struct "pcm_format_data"
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.190 by commit 377a80ca6590f40ec8a85227b889a5d399fe26c3. For more details please see the references link. | null | 2022-04-25T04:29:42.894589Z | 2022-04-24T22:16:39.764819Z | null | null | null | null | null |
Linux | GSD-2021-1002679 | netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc | netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.168 by commit 699e794c12a3cd79045ff135bc87a53b97024e43, it was introduced in version v4.16 by commit 395cacb5f1a0a290f1ae9ca4692c400d2b57a705. For more details please see the references link. | null | 2022-01-11T05:51:54.226387Z | 2021-12-27T05:36:25.360775Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/395cacb5f1a0a290f1ae9ca4692c400d2b57a705'} |
Linux | GSD-2021-1000644 | NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() | NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.124 by commit aba3c7795f51717ae316f3566442dee7cc3eeccb, it was introduced in version v5.4.118 by commit 6be0e4b59314e4a836495f6ffdc5d2c5b079deeb. For more details please see the references link. | null | 2021-12-19T22:23:51.604822Z | 2021-06-04T19:53:37.766889Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6be0e4b59314e4a836495f6ffdc5d2c5b079deeb'} |
Linux | GSD-2021-1001956 | drm/msm: Fix null pointer dereference on pointer edp | drm/msm: Fix null pointer dereference on pointer edp
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.252 by commit 0cd063aa0a09822cc1620fc59a67fe2f9f6338ac, it was introduced in version v4.0 by commit ab5b0107ccf3821a6837b0f2819270d6fa0b278f. For more details please see the references link. | null | 2021-12-19T23:32:18.938060Z | 2021-11-14T15:13:21.727720Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab5b0107ccf3821a6837b0f2819270d6fa0b278f'} |
Linux | GSD-2021-1002383 | ALSA: pcm: oss: Limit the period size to 16MB | ALSA: pcm: oss: Limit the period size to 16MB
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.293 by commit b02a41eebcc36d4f07196780f2e165ca2c499257. For more details please see the references link. | null | 2021-12-20T00:15:56.843804Z | 2021-12-19T19:34:51.054458Z | null | null | null | null | null |
Linux | GSD-2022-1001329 | mac80211: fix potential double free on mesh join | mac80211: fix potential double free on mesh join
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.1 by commit 46bb87d40683337757a2f902fcd4244b32bb4e86, it was introduced in version v5.8 by commit 6a01afcf8468d3ca2bd8bbb27503f60dcf643b20. For more details please see the references link. | null | 2022-04-25T04:43:12.514792Z | 2022-04-24T21:05:03.797440Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6a01afcf8468d3ca2bd8bbb27503f60dcf643b20'} |
Linux | GSD-2022-1001283 | crypto: octeontx2 - remove CONFIG_DM_CRYPT check | crypto: octeontx2 - remove CONFIG_DM_CRYPT check
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit a1bf728f3388ac3a2c2dffa57e25622e90b9f6f2, it was introduced in version v5.12 by commit 6f03f0e8b6c8a82d8e740ff3a87ed407ad423243. For more details please see the references link. | null | 2022-04-25T05:36:01.452776Z | 2022-04-24T21:01:10.243044Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6f03f0e8b6c8a82d8e740ff3a87ed407ad423243'} |
Linux | GSD-2021-1002229 | tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc | tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.291 by commit b1ffc16ec05ae40d82b6e373322d62e9d6b54fbc. For more details please see the references link. | null | 2021-12-20T00:16:57.908042Z | 2021-11-29T02:34:22.432477Z | null | null | null | null | null |
Linux | GSD-2021-1000214 | sctp: do asoc update earlier in sctp_sf_do_dupcook_a | sctp: do asoc update earlier in sctp_sf_do_dupcook_a
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.5 by commit 0bfd913c2121b3d553bfd52810fe6061d542d625, it was introduced in version v5.7 by commit 145cb2f7177d94bc54563ed26027e952ee0ae03c. For more details please see the references link. | null | 2021-12-19T23:57:36.632171Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/145cb2f7177d94bc54563ed26027e952ee0ae03c'} |
Linux | GSD-2022-1001779 | powerpc/kasan: Fix early region not updated correctly | powerpc/kasan: Fix early region not updated correctly
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 5a3d8f3192a409893c57808cc935e16484df1068, it was introduced in version v5.4 by commit cbd18991e24fea2c31da3bb117c83e4a3538cd11. For more details please see the references link. | null | 2022-04-25T03:11:02.141138Z | 2022-04-24T21:41:57.571504Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cbd18991e24fea2c31da3bb117c83e4a3538cd11'} |
Linux | GSD-2021-1002803 | IB/qib: Fix memory leak in qib_user_sdma_queue_pkts() | IB/qib: Fix memory leak in qib_user_sdma_queue_pkts()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.89 by commit 7cf6466e00a77b0a914b7b2c28a1fc7947d55e59, it was introduced in version v5.10.77 by commit c3e17e58f571f34c51aeb17274ed02c2ed5cf780. For more details please see the references link. | null | 2022-01-11T05:53:28.300221Z | 2021-12-30T02:44:09.747027Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c3e17e58f571f34c51aeb17274ed02c2ed5cf780'} |
Linux | GSD-2022-1000241 | bpf: Guard against accessing NULL pt_regs in bpf_get_task_stack() | bpf: Guard against accessing NULL pt_regs in bpf_get_task_stack()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.19 by commit 0bcd484587b3b3092e448d27dc369e347e1810c3, it was introduced in version v5.9 by commit fa28dcb82a38f8e3993b0fae9106b1a80b59e4f0. For more details please see the references link. | null | 2022-02-20T06:38:42.673827Z | 2022-02-18T22:00:15.687845Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fa28dcb82a38f8e3993b0fae9106b1a80b59e4f0'} |
Linux | GSD-2022-1001903 | samples/landlock: Fix path_list memory leak | samples/landlock: Fix path_list memory leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 20fbf100f84b9aeb9c91421abe1927bc152bc32b. For more details please see the references link. | null | 2022-04-25T06:29:58.818057Z | 2022-04-24T21:53:28.210822Z | null | null | null | null | null |
Linux | GSD-2022-1000611 | KVM: x86: Free kvm_cpuid_entry2 array on post-KVM_RUN KVM_SET_CPUID{,2} | KVM: x86: Free kvm_cpuid_entry2 array on post-KVM_RUN KVM_SET_CPUID{,2}
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.5 by commit b9ee734a14bb685b2088f2176d82b34cb4e30dbc, it was introduced in version v5.16.3 by commit 24e7590c60aa9487b8e43583dc9885f62f8216c1. For more details please see the references link. | null | 2022-03-07T01:30:08.185591Z | 2022-02-27T03:31:08.321160Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/24e7590c60aa9487b8e43583dc9885f62f8216c1'} |
Linux | GSD-2021-1000994 | regulator: rt4801: Fix NULL pointer dereference if priv->enable_gpios is NULL | regulator: rt4801: Fix NULL pointer dereference if priv->enable_gpios is NULL
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.46 by commit ba8a26a7ce8617f9f3d6230de34b2302df086b41. For more details please see the references link. | null | 2021-12-20T00:14:36.777101Z | 2021-06-30T00:32:00.045174Z | null | null | null | null | null |
Linux | GSD-2021-1001686 | i40e: Fix freeing of uninitialized misc IRQ vector | i40e: Fix freeing of uninitialized misc IRQ vector
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.12 by commit 75099439209d3cda439a1d9b00d19a50f0066fef, it was introduced in version v4.15 by commit c17401a1dd210a5f22ab1ec7c7366037c158a14c. For more details please see the references link. | null | 2021-12-19T23:35:04.407734Z | 2021-10-19T16:31:49.647769Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c17401a1dd210a5f22ab1ec7c7366037c158a14c'} |
Linux | GSD-2021-1002100 | can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv | can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit 6e8811707e2df0c6ba920f0cad3a3bca7b42132f, it was introduced in version v5.4 by commit 9d71dd0c70099914fcd063135da3c580865e924c. For more details please see the references link. | null | 2021-12-20T01:28:07.815119Z | 2021-11-14T15:19:54.251307Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9d71dd0c70099914fcd063135da3c580865e924c'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.