ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2022-1001450 | scsi: qla2xxx: Fix crash during module load unload test | scsi: qla2xxx: Fix crash during module load unload test
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 213e57b42537f1a2e5395caa9d7189854133ed12, it was introduced in version v5.9 by commit 62e9dd177732843ae6c5b9d2ed61e7c9538fa276. For more details please see the references link. | null | 2022-04-25T06:56:03.522188Z | 2022-04-24T21:14:20.793353Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/62e9dd177732843ae6c5b9d2ed61e7c9538fa276'} |
Linux | GSD-2021-1002550 | atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait | atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.7 by commit cec49b6dfdb0b9fefd0f17c32014223f73ee2605. For more details please see the references link. | null | 2021-12-19T22:56:36.512936Z | 2021-12-19T19:42:16.792675Z | null | null | null | null | null |
Linux | GSD-2022-1001000 | ata: sata_dwc_460ex: Fix crash due to OOB write | ata: sata_dwc_460ex: Fix crash due to OOB write
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 3a8751c0d4e24129e72dcec0139e99833b13904a, it was introduced in version v4.18 by commit 28361c403683c2b00d4f5e76045f3ccd299bf99d. For more details please see the references link. | null | 2022-04-25T05:12:22.238847Z | 2022-04-24T20:38:33.733218Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/28361c403683c2b00d4f5e76045f3ccd299bf99d'} |
Linux | GSD-2021-1000097 | media: staging/intel-ipu3: Fix set_fmt error handling | media: staging/intel-ipu3: Fix set_fmt error handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.20 by commit 34892ea938387d83ffcfb7775ec55f0f80767916, it was introduced in version v5.2 by commit 6d5f26f2e045f2377b524516194657c00efbbce8. For more details please see the references link. | null | 2021-12-20T00:39:26.163037Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6d5f26f2e045f2377b524516194657c00efbbce8'} |
Linux | GSD-2022-1001515 | ibmvnic: fix race between xmit and reset | ibmvnic: fix race between xmit and reset
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 475f9cce98b63bc145b4efa66fa51175d4cb345f, it was introduced in version v5.4 by commit 7ed5b31f4a6695a21f617df07646e9b15c6c1d29. For more details please see the references link. | null | 2022-04-25T06:45:05.019208Z | 2022-04-24T21:19:13.313701Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ed5b31f4a6695a21f617df07646e9b15c6c1d29'} |
Linux | GSD-2021-1000582 | net: fec: fix the potential memory leak in fec_enet_init() | net: fec: fix the potential memory leak in fec_enet_init()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.42 by commit 8ee7ef4a57a9e1228b6f345aaa70aa8951c7e9cd, it was introduced in version v3.18 by commit 59d0f746564495c7f54526674deabfcf101236a1. For more details please see the references link. | null | 2021-12-20T00:18:03.504422Z | 2021-06-04T19:42:40.894147Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/59d0f746564495c7f54526674deabfcf101236a1'} |
Linux | GSD-2021-1000078 | scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() | scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.3 by commit a73208e3244127ef9f2cdf24e4adb947aaa32053, it was introduced in version v5.5 by commit af2a0c51b1205327f55a7e82e530403ae1d42cbb. For more details please see the references link. | null | 2021-12-19T22:17:56.693014Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/af2a0c51b1205327f55a7e82e530403ae1d42cbb'} |
Linux | GSD-2021-1002045 | audit: fix possible null-pointer dereference in audit_filter_rules | audit: fix possible null-pointer dereference in audit_filter_rules
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit 16802fa4c33eb1a8efb23f1e93365190e4047d05, it was introduced in version v5.3 by commit bf361231c295d92a28ca283ea713f56e93e55796. For more details please see the references link. | null | 2021-12-19T23:49:01.756286Z | 2021-11-14T15:17:22.943127Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf361231c295d92a28ca283ea713f56e93e55796'} |
Linux | GSD-2022-1001145 | ntfs: add sanity check on allocation size | ntfs: add sanity check on allocation size
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit c641087d381a08363e5f14179bc6b0a23eca7c47. For more details please see the references link. | null | 2022-04-25T06:40:20.888894Z | 2022-04-24T20:48:48.995014Z | null | null | null | null | null |
Linux | GSD-2021-1000428 | nvmet-tcp: fix incorrect locking in state_change sk callback | nvmet-tcp: fix incorrect locking in state_change sk callback
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.119 by commit 999d606a820c36ae9b9e9611360c8b3d8d4bb777, it was introduced in version v5.0 by commit 872d26a391da92ed8f0c0f5cb5fef428067b7f30. For more details please see the references link. | null | 2021-12-19T22:39:07.501954Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/872d26a391da92ed8f0c0f5cb5fef428067b7f30'} |
Linux | GSD-2021-1002415 | net: ethernet: dec: tulip: de4x5: fix possible array overflows in type3_infoblock() | net: ethernet: dec: tulip: de4x5: fix possible array overflows in type3_infoblock()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.220 by commit d959407177adfd9ff7fd2fd831beb6b85c4a4009. For more details please see the references link. | null | 2021-12-19T22:51:02.006289Z | 2021-12-19T19:36:23.527492Z | null | null | null | null | null |
Linux | GSD-2022-1002339 | PM: core: keep irq flags in device_pm_check_callbacks() | PM: core: keep irq flags in device_pm_check_callbacks()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit be8bc05f38d667eda1e820bc6f69234795be7809. For more details please see the references link. | null | 2022-04-25T05:37:45.286545Z | 2022-04-24T22:35:42.589667Z | null | null | null | null | null |
Linux | GSD-2022-1000304 | net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup | net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.268 by commit 63f0cfb36c1f1964a59ce544156677601e2d8740, it was introduced in version v3.9 by commit e2ca90c276e1fc410d7cd3c1a4eee245ec902a20. For more details please see the references link. | null | 2022-03-07T01:49:09.054913Z | 2022-02-27T02:48:36.510413Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e2ca90c276e1fc410d7cd3c1a4eee245ec902a20'} |
Linux | GSD-2021-1001393 | RDMA/cma: Fix rdma_resolve_route() memory leak | RDMA/cma: Fix rdma_resolve_route() memory leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.198 by commit 4893c938f2a140a74be91779e45e4a7fa111198f. For more details please see the references link. | null | 2021-12-20T01:27:57.083270Z | 2021-08-03T02:26:58.961730Z | null | null | null | null | null |
Linux | GSD-2021-1001669 | net: macb: fix use after free on rmmod | net: macb: fix use after free on rmmod
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.70 by commit 7721221e87d25c9840d9ca6b986dbdc410d5ce2b. For more details please see the references link. | null | 2021-12-20T02:24:19.955717Z | 2021-10-19T16:30:57.328174Z | null | null | null | null | null |
Linux | GSD-2022-1001846 | xsk: Fix race at socket teardown | xsk: Fix race at socket teardown
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit ad7219cd8751bd258b9d1e69ae0654ec00f71875, it was introduced in version v5.4 by commit 42fddcc7c64b723a867c7b2f5f7505e244212f13. For more details please see the references link. | null | 2022-04-25T05:59:53.729340Z | 2022-04-24T21:47:31.773896Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/42fddcc7c64b723a867c7b2f5f7505e244212f13'} |
Linux | GSD-2022-1000754 | vhost/vsock: don't check owner in vhost_vsock_stop() while releasing | vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.12 by commit f9919d83aba4c1a57288a33284558de0a41df32f, it was introduced in version v4.8 by commit 433fc58e6bf2c8bd97e57153ed28e64fd78207b8. For more details please see the references link. | null | 2022-03-18T03:01:56.975509Z | 2022-03-18T00:15:33.610911Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/433fc58e6bf2c8bd97e57153ed28e64fd78207b8'} |
Linux | GSD-2021-1001239 | ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions | ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.54 by commit ce8fafb68051fba52546f8bbe8621f7641683680, it was introduced in version v5.3 by commit f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74. For more details please see the references link. | null | 2021-12-20T00:00:16.998434Z | 2021-08-03T01:46:06.419902Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74'} |
Linux | GSD-2022-1002293 | ipv6: fix panic when forwarding a pkt with no in6 dev | ipv6: fix panic when forwarding a pkt with no in6 dev
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.239 by commit 74b68f5249f16c5f7f675d0f604fa6ae20e3a151, it was introduced in version v4.19.199 by commit bff0854e2f804f68d3e93d19e4580dbd69777e1d. For more details please see the references link. | null | 2022-04-25T04:19:52.330243Z | 2022-04-24T22:30:55.990797Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bff0854e2f804f68d3e93d19e4580dbd69777e1d'} |
Linux | GSD-2021-1001556 | ipack: ipoctal: fix module reference leak | ipack: ipoctal: fix module reference leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.209 by commit 9c5b77a7ffc983b2429ce158b50497c5d3c86a69, it was introduced in version v3.18 by commit 82a82340bab6c251e0705339f60763718eaa2a22. For more details please see the references link. | null | 2021-12-19T22:43:28.906484Z | 2021-10-19T16:23:37.512397Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/82a82340bab6c251e0705339f60763718eaa2a22'} |
Linux | GSD-2022-1002006 | dm ioctl: prevent potential spectre v1 gadget | dm ioctl: prevent potential spectre v1 gadget
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit 71c8df33fd777c7628f6fbc09b14e84806c55914. For more details please see the references link. | null | 2022-04-25T05:24:36.132514Z | 2022-04-24T22:02:34.036742Z | null | null | null | null | null |
Linux | GSD-2021-1001106 | nilfs2: fix memory leak in nilfs_sysfs_delete_device_group | nilfs2: fix memory leak in nilfs_sysfs_delete_device_group
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.238 by commit 49e3def271f65f893ca37158d902ad168838bcaf, it was introduced in version v3.17 by commit da7141fb78db915680616e15677539fc8140cf53. For more details please see the references link. | null | 2021-12-19T22:40:46.552301Z | 2021-07-08T01:56:43.329751Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/da7141fb78db915680616e15677539fc8140cf53'} |
Linux | GSD-2022-1000191 | USB: core: Fix hang in usb_kill_urb by adding memory barriers | USB: core: Fix hang in usb_kill_urb by adding memory barriers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.96 by commit e3b131e30e612ff0e32de6c1cb4f69f89db29193. For more details please see the references link. | null | 2022-02-19T09:58:01.550653Z | 2022-02-18T21:52:57.227441Z | null | null | null | null | null |
Linux | GSD-2022-1002456 | tpm: fix reference counting for struct tpm_chip | tpm: fix reference counting for struct tpm_chip
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 473a66f99cb8173c14138c5a5c69bfad04e8f9ac, it was introduced in version v4.12 by commit fdc915f7f71939ad5a3dda3389b8d2d7a7c5ee66. For more details please see the references link. | null | 2022-04-25T04:40:27.430646Z | 2022-04-24T22:50:10.539810Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fdc915f7f71939ad5a3dda3389b8d2d7a7c5ee66'} |
Linux | GSD-2021-1000347 | mt76: mt7615: fix memleak when mt7615_unregister_device() | mt76: mt7615: fix memleak when mt7615_unregister_device()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 4fa28c807da54c1d720b3cc12e48eb9bea1e2c8f, it was introduced in version v5.10.21 by commit aec5719681405af21102c2407b01f83ed19e9833. For more details please see the references link. | null | 2021-12-19T23:04:53.436298Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/aec5719681405af21102c2407b01f83ed19e9833'} |
Linux | GSD-2022-1000938 | xen/xenbus: don't let xenbus_grant_ring() remove grants in error case | xen/xenbus: don't let xenbus_grant_ring() remove grants in error case
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.306 by commit 8f80d12f6946a6fe7c64bfc204c062a57f83c7f8. For more details please see the references link. | null | 2022-03-18T02:55:07.439338Z | 2022-03-18T00:34:21.357973Z | null | null | null | null | null |
Linux | GSD-2021-1002680 | media: mxl111sf: change mutex_init() location | media: mxl111sf: change mutex_init() location
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.168 by commit 96f182c9f48b984447741f054ec301fdc8517035, it was introduced in version v3.7 by commit 8572211842afc53c8450fb470f2b8d02ba7592e0. For more details please see the references link. | null | 2022-01-11T06:48:37.315160Z | 2021-12-27T05:36:27.713967Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8572211842afc53c8450fb470f2b8d02ba7592e0'} |
Linux | GSD-2021-1001805 | ocfs2: mount fails with buffer overflow in strlen | ocfs2: mount fails with buffer overflow in strlen
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.214 by commit 7623b1035ca2d17bde0f6a086ad6844a34648df1. For more details please see the references link. | null | 2021-12-19T22:36:32.070648Z | 2021-10-28T13:49:50.137401Z | null | null | null | null | null |
Linux | GSD-2021-1000717 | ocfs2: fix data corruption by fallocate | ocfs2: fix data corruption by fallocate
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.272 by commit 624fa7baa3788dc9e57840ba5b94bc22b03cda57, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T22:21:56.834252Z | 2021-06-24T23:58:55.245251Z | null | null | null | null | null |
Linux | GSD-2022-1000892 | sr9700: sanity check for packet length | sr9700: sanity check for packet length
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.182 by commit b95d71abeb7d31d4d51cd836d80f99fd783fd6d5. For more details please see the references link. | null | 2022-03-18T02:50:11.746021Z | 2022-03-18T00:28:53.983088Z | null | null | null | null | null |
Linux | GSD-2022-1001780 | media: imx-jpeg: fix a bug of accessing array out of bounds | media: imx-jpeg: fix a bug of accessing array out of bounds
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 02f9f97d54ffc85b50ad77f5b1f3c8f69cd17747. For more details please see the references link. | null | 2022-04-25T06:43:29.847022Z | 2022-04-24T21:42:00.473574Z | null | null | null | null | null |
Linux | GSD-2021-1000202 | userfaultfd: release page in error path to avoid BUG_ON | userfaultfd: release page in error path to avoid BUG_ON
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.5 by commit 2d59a0ed8b26b8f3638d8afc31f839e27759f1f6, it was introduced in version v4.11 by commit cb658a453b9327ce96ce5222c24d162b5b65b564. For more details please see the references link. | null | 2021-12-20T00:05:20.941971Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cb658a453b9327ce96ce5222c24d162b5b65b564'} |
Linux | GSD-2022-1001295 | mmc: core: use sysfs_emit() instead of sprintf() | mmc: core: use sysfs_emit() instead of sprintf()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit c4ab65738ab3e21fe519ee46b2051222bc8e32ef. For more details please see the references link. | null | 2022-04-25T04:52:34.062188Z | 2022-04-24T21:01:59.853177Z | null | null | null | null | null |
Linux | GSD-2021-1002395 | net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() | net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.257 by commit 550658a2d61e4eaf522c8ebc7fad76dc376bfb45, it was introduced in version v3.9 by commit 7f9664525f9cb507de9198a395a111371413f230. For more details please see the references link. | null | 2021-12-19T22:24:28.185658Z | 2021-12-19T19:35:27.400070Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7f9664525f9cb507de9198a395a111371413f230'} |
Linux | GSD-2021-1001940 | isdn: mISDN: Fix sleeping function called from invalid context | isdn: mISDN: Fix sleeping function called from invalid context
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.288 by commit ef269a8808cb1759245a98a7fe16fceaebad894c. For more details please see the references link. | null | 2021-12-19T22:26:42.710546Z | 2021-11-14T15:12:34.857736Z | null | null | null | null | null |
Linux | GSD-2021-1000652 | btrfs: do not BUG_ON in link_to_fixup_dir | btrfs: do not BUG_ON in link_to_fixup_dir
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.193 by commit 6eccfb28f8dca70c9b1b3bb3194ca54cbe73a9fa, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T22:23:15.525855Z | 2021-06-04T19:55:00.082285Z | null | null | null | null | null |
Linux | GSD-2022-1002143 | remoteproc: Fix count check in rproc_coredump_write() | remoteproc: Fix count check in rproc_coredump_write()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit b97b305656a7013690e7b6e310f0e827e0bbff90, it was introduced in version v5.9 by commit 3afdc59e4390487f04f2435b7e8a6289984e0a1e. For more details please see the references link. | null | 2022-04-25T03:57:11.239136Z | 2022-04-24T22:15:48.549476Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3afdc59e4390487f04f2435b7e8a6289984e0a1e'} |
Linux | GSD-2021-1001413 | seq_file: disallow extremely large seq buffer allocations | seq_file: disallow extremely large seq buffer allocations
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.240 by commit 3c07d1335d17ae0411101024de438dbc3734e992, it was introduced in version v3.16 by commit 058504edd02667eef8fac9be27ab3ea74332e9b4. For more details please see the references link. | null | 2021-12-20T00:47:58.247244Z | 2021-08-03T02:33:42.828810Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/058504edd02667eef8fac9be27ab3ea74332e9b4'} |
Linux | GSD-2022-1000484 | ima: fix reference leak in asymmetric_verify() | ima: fix reference leak in asymmetric_verify()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 89f586d3398f4cc0432ed870949dffb702940754, it was introduced in version v5.13 by commit 947d70597236dd5ae65c1f68c8eabfb962ee5a6b. For more details please see the references link. | null | 2022-03-07T01:38:05.634215Z | 2022-02-27T03:13:15.564399Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/947d70597236dd5ae65c1f68c8eabfb962ee5a6b'} |
Linux | GSD-2022-1002513 | jffs2: fix memory leak in jffs2_scan_medium | jffs2: fix memory leak in jffs2_scan_medium
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit 9b0c69182f09b70779817af4dcf89780955d5c4c, it was introduced in version v2.6.15 by commit e631ddba588783edd521c5a89f7b2902772fb691. For more details please see the references link. | null | 2022-04-25T03:35:07.685282Z | 2022-04-24T22:56:57.862182Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e631ddba588783edd521c5a89f7b2902772fb691'} |
Linux | GSD-2021-1001043 | NFS: Fix a potential NULL dereference in nfs_get_client() | NFS: Fix a potential NULL dereference in nfs_get_client()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.11 by commit 58ddf61f10b8f9b7b1341644bfee2f1c6508d4e1, it was introduced in version v3.17 by commit 31434f496abb9f3410b10f541462fe58613dd3ad. For more details please see the references link. | null | 2021-12-19T22:39:32.941149Z | 2021-06-30T00:35:55.330359Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/31434f496abb9f3410b10f541462fe58613dd3ad'} |
Linux | GSD-2021-1000081 | ACPI: custom_method: fix potential use-after-free issue | ACPI: custom_method: fix potential use-after-free issue
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.3 by commit b7a5baaae212a686ceb812c32fceed79c03c0234, it was introduced in version v5.4 by commit 03d1571d9513369c17e6848476763ebbd10ec2cb. For more details please see the references link. | null | 2021-12-19T22:02:56.380579Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/03d1571d9513369c17e6848476763ebbd10ec2cb'} |
Linux | GSD-2022-1001016 | IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition | IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 57800cc36e55db0547461c49acf5cd84c0f502b0, it was introduced in version v5.1 by commit d757c60eca9b22f4d108929a24401e0fdecda0b1. For more details please see the references link. | null | 2022-04-25T06:14:37.303103Z | 2022-04-24T20:40:05.382993Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d757c60eca9b22f4d108929a24401e0fdecda0b1'} |
Linux | GSD-2021-1002546 | vdpa_sim: avoid putting an uninitialized iova_domain | vdpa_sim: avoid putting an uninitialized iova_domain
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.6 by commit e4d58ac67e63727aa45a4a26185876f598e8b3dd, it was introduced in version v5.13 by commit 4080fc1067501707b9693b8003feae7d50d14e35. For more details please see the references link. | null | 2021-12-20T01:02:24.224930Z | 2021-12-19T19:42:06.743062Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4080fc1067501707b9693b8003feae7d50d14e35'} |
Linux | GSD-2022-1001446 | scsi: qla2xxx: Fix premature hw access after PCI error | scsi: qla2xxx: Fix premature hw access after PCI error
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit d7994dff9071555a959a168f9184dd9abae68a6b. For more details please see the references link. | null | 2022-04-25T05:37:10.530503Z | 2022-04-24T21:14:04.391679Z | null | null | null | null | null |
Linux | GSD-2021-1002116 | scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() | scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit a7fbb56e6c941d9f59437b96412a348e66388d3e, it was introduced in version v3.11 by commit 8c0eb596baa51f2b43949c698c644727ef17805c. For more details please see the references link. | null | 2021-12-20T00:33:35.904039Z | 2021-11-14T15:20:33.641128Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c0eb596baa51f2b43949c698c644727ef17805c'} |
Linux | GSD-2021-1001690 | drm/amdgpu: handle the case of pci_channel_io_frozen only in amdgpu_pci_resume | drm/amdgpu: handle the case of pci_channel_io_frozen only in amdgpu_pci_resume
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.12 by commit 72e9a1bf9b722628c28092e0c2cd8717edd201dc, it was introduced in version v5.10 by commit c9a6b82f45e261d247b980a7949aaa6a9bfffe01. For more details please see the references link. | null | 2021-12-20T01:20:52.969712Z | 2021-10-19T16:32:01.118002Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c9a6b82f45e261d247b980a7949aaa6a9bfffe01'} |
Linux | GSD-2021-1000982 | mptcp: Fix out of bounds when parsing TCP options | mptcp: Fix out of bounds when parsing TCP options
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.46 by commit 73eeba71dc9932970befa009e68272a3d5ec4a58, it was introduced in version v5.6 by commit cec37a6e41aae7bf3df9a3da783380a4d9325fd8. For more details please see the references link. | null | 2021-12-20T01:02:22.030312Z | 2021-06-30T00:31:14.739846Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cec37a6e41aae7bf3df9a3da783380a4d9325fd8'} |
Linux | GSD-2022-1000607 | ceph: properly put ceph_string reference after async create attempt | ceph: properly put ceph_string reference after async create attempt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.5 by commit a0c22e970cd78b81c94691e6cb09713e8074d580, it was introduced in version v5.7 by commit 9a8d03ca2e2c334d08ee91a3e07dcce31a02fdc6. For more details please see the references link. | null | 2022-03-07T02:21:58.433783Z | 2022-02-27T03:30:02.848363Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9a8d03ca2e2c334d08ee91a3e07dcce31a02fdc6'} |
Linux | GSD-2022-1001915 | rtc: pl031: fix rtc features null pointer dereference | rtc: pl031: fix rtc features null pointer dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit cd2722e411e8ab7e5ae41102f6925fa13dffdac5, it was introduced in version v5.12 by commit d9b0dd54a1943f47a381a474f8ea2c94466110c0. For more details please see the references link. | null | 2022-04-25T06:00:25.875500Z | 2022-04-24T21:54:12.540721Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9b0dd54a1943f47a381a474f8ea2c94466110c0'} |
Linux | GSD-2022-1000257 | ARM: 9170/1: fix panic when kasan and kprobe are enabled | ARM: 9170/1: fix panic when kasan and kprobe are enabled
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.19 by commit 1515e72aae803fc6b466adf918e71c4e4c9d5b3d, it was introduced in version v2.6.25 by commit 35aa1df4328340f38edc46f00837f08d33d49f63. For more details please see the references link. | null | 2022-02-19T03:06:16.135453Z | 2022-02-18T22:02:08.473232Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/35aa1df4328340f38edc46f00837f08d33d49f63'} |
Linux | GSD-2021-1002815 | hamradio: improve the incomplete fix to avoid NPD | hamradio: improve the incomplete fix to avoid NPD
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.89 by commit 7dd52af1eb5798f590d9d9e1c56ed8f5744ee0ca. For more details please see the references link. | null | 2022-01-11T06:53:35.453475Z | 2021-12-30T02:44:39.465532Z | null | null | null | null | null |
Linux | GSD-2021-1000828 | bonding: init notify_work earlier to avoid uninitialized use | bonding: init notify_work earlier to avoid uninitialized use
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.273 by commit 818298d54aa0d7b3baf5635c94ff3b39b48d037f. For more details please see the references link. | null | 2021-12-19T23:12:01.306993Z | 2021-06-29T23:59:54.546178Z | null | null | null | null | null |
Linux | GSD-2022-1002285 | tpm: fix reference counting for struct tpm_chip | tpm: fix reference counting for struct tpm_chip
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit a27ed2f3695baf15f9b34d2d7a1f9fc105539a81, it was introduced in version v4.12 by commit fdc915f7f71939ad5a3dda3389b8d2d7a7c5ee66. For more details please see the references link. | null | 2022-04-25T06:04:15.954393Z | 2022-04-24T22:30:15.227354Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fdc915f7f71939ad5a3dda3389b8d2d7a7c5ee66'} |
Linux | GSD-2022-1000742 | netfilter: nf_tables: unregister flowtable hooks on netns exit | netfilter: nf_tables: unregister flowtable hooks on netns exit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.12 by commit b4fcc081e527aa2ce12e956912fc47e251f6bd27, it was introduced in version v5.5 by commit ff4bf2f42a40e7dff28379f085b64df322c70b45. For more details please see the references link. | null | 2022-03-18T02:56:15.338425Z | 2022-03-18T00:14:31.508765Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ff4bf2f42a40e7dff28379f085b64df322c70b45'} |
Linux | GSD-2022-1001850 | ext2: correct max file size computing | ext2: correct max file size computing
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 3813591bc046f8c4739a6be0c92acf05a1a1d729, it was introduced in version v5.1 by commit 1c2d14212b15a60300a2d4f6364753e87394c521. For more details please see the references link. | null | 2022-04-25T06:22:01.348236Z | 2022-04-24T21:48:06.610879Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c2d14212b15a60300a2d4f6364753e87394c521'} |
Linux | GSD-2021-1001385 | NFSv4: Initialise connection to the server in nfs4_alloc_client() | NFSv4: Initialise connection to the server in nfs4_alloc_client()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.198 by commit 743f6b973c8ba8a0a5ed15ab11e1d07fa00d5368, it was introduced in version v4.8 by commit 5c6e5b60aae4347223f176966455010a5715b863. For more details please see the references link. | null | 2021-12-19T22:42:42.778845Z | 2021-08-03T02:26:02.642318Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5c6e5b60aae4347223f176966455010a5715b863'} |
Linux | GSD-2022-1000312 | drop_monitor: fix data-race in dropmon_net_event / trace_napi_poll_hit | drop_monitor: fix data-race in dropmon_net_event / trace_napi_poll_hit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.268 by commit cbc0e2a098872c3d510aa492c5e487f52aea0e7c, it was introduced in version v2.6.31 by commit 4ea7e38696c7e798c47ebbecadfd392f23f814f9. For more details please see the references link. | null | 2022-03-07T01:34:51.892510Z | 2022-02-27T02:49:31.288168Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4ea7e38696c7e798c47ebbecadfd392f23f814f9'} |
Linux | GSD-2021-1002403 | seg6: fix the iif in the IPv6 socket control block | seg6: fix the iif in the IPv6 socket control block
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.258 by commit b16d412e5f79734033df04e97d7ea2f50a8e9fe3, it was introduced in version v4.14.98 by commit c630ec8bdadae9d557b1ceb9d6c06e149108a0d4. For more details please see the references link. | null | 2021-12-19T23:46:49.160134Z | 2021-12-19T19:35:46.774237Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c630ec8bdadae9d557b1ceb9d6c06e149108a0d4'} |
Linux | GSD-2022-1001153 | parisc: Fix non-access data TLB cache flush faults | parisc: Fix non-access data TLB cache flush faults
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit ddca4b82027e2a66333dd40fab21a4beff435c7e. For more details please see the references link. | null | 2022-04-25T04:15:23.037772Z | 2022-04-24T20:49:12.190281Z | null | null | null | null | null |
Linux | GSD-2021-1002053 | scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() | scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit 96f0aebf29be25254fa585af43924e34aa21fd9a, it was introduced in version v3.11 by commit 8c0eb596baa51f2b43949c698c644727ef17805c. For more details please see the references link. | null | 2021-12-20T00:19:51.453107Z | 2021-11-14T15:17:42.301777Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c0eb596baa51f2b43949c698c644727ef17805c'} |
Linux | GSD-2021-1000594 | net: dsa: fix a crash if ->get_sset_count() fails | net: dsa: fix a crash if ->get_sset_count() fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.42 by commit caff86f85512b8e0d9830e8b8b0dfe13c68ce5b6, it was introduced in version v4.7 by commit badf3ada60ab8f76f9488dc8f5c0c57f70682f5a. For more details please see the references link. | null | 2021-12-20T00:49:54.893693Z | 2021-06-04T19:44:10.676106Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/badf3ada60ab8f76f9488dc8f5c0c57f70682f5a'} |
Linux | GSD-2022-1001503 | cpufreq: qcom-cpufreq-nvmem: fix reading of PVS Valid fuse | cpufreq: qcom-cpufreq-nvmem: fix reading of PVS Valid fuse
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 22b1ea0421d486b8a7e49cad4a2f3c18f6305300, it was introduced in version v5.7 by commit a8811ec764f95a04ba82f6f457e28c5e9e36e36b. For more details please see the references link. | null | 2022-04-25T06:11:07.903202Z | 2022-04-24T21:18:02.234009Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a8811ec764f95a04ba82f6f457e28c5e9e36e36b'} |
Linux | GSD-2021-1002287 | perf bench futex: Fix memory leak of perf_cpu_map__new() | perf bench futex: Fix memory leak of perf_cpu_map__new()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.82 by commit 2ada5c0877f4aa9b0749e7777557d9a5d2973082, it was introduced in version v5.4 by commit 9c3516d1b850ea938b074df33e4c86d721c77720. For more details please see the references link. | null | 2021-12-20T01:20:14.365096Z | 2021-11-29T02:37:08.146124Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9c3516d1b850ea938b074df33e4c86d721c77720'} |
Linux | GSD-2021-1001852 | drm/msm: Fix null pointer dereference on pointer edp | drm/msm: Fix null pointer dereference on pointer edp
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.75 by commit 91a340768b012f5b910a203a805b97a345b3db37, it was introduced in version v4.0 by commit ab5b0107ccf3821a6837b0f2819270d6fa0b278f. For more details please see the references link. | null | 2021-12-19T22:47:44.444899Z | 2021-10-28T13:52:14.319362Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab5b0107ccf3821a6837b0f2819270d6fa0b278f'} |
Linux | GSD-2021-1000740 | ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed | ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.194 by commit 569496aa3776eea1ff0d49d0174ac1b7e861e107, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T01:13:54.749321Z | 2021-06-25T00:00:24.399787Z | null | null | null | null | null |
Linux | GSD-2021-1000310 | KVM: VMX: Disable preemption when probing user return MSRs | KVM: VMX: Disable preemption when probing user return MSRs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.38 by commit 31f29749ee970c251b3a7e5b914108425940d089, it was introduced in version v5.5 by commit 4be5341026246870818e28b53202b001426a5aec. For more details please see the references link. | null | 2021-12-20T00:37:38.820196Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4be5341026246870818e28b53202b001426a5aec'} |
Linux | GSD-2022-1001387 | mt76: fix monitor mode crash with sdio driver | mt76: fix monitor mode crash with sdio driver
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit c37b4cab3d97ef64b206fca4d9daabd9aff7356e. For more details please see the references link. | null | 2022-04-25T05:30:45.442635Z | 2022-04-24T21:09:38.673724Z | null | null | null | null | null |
Linux | GSD-2022-1002401 | drm/imx: Fix memory leak in imx_pd_connector_get_modes | drm/imx: Fix memory leak in imx_pd_connector_get_modes
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 38bf605bd8c83d942c8dcffaef3633b7d8b37549, it was introduced in version v4.8 by commit 76ecd9c9fb24b014a6f33fbb1287ede3be12158b. For more details please see the references link. | null | 2022-04-25T05:44:22.518830Z | 2022-04-24T22:43:28.685657Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/76ecd9c9fb24b014a6f33fbb1287ede3be12158b'} |
Linux | GSD-2021-1001151 | net: fddi: fix UAF in fza_probe | net: fddi: fix UAF in fza_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.5 by commit bdfbb51f7a437ae8ea91317a5c133ec13adf3c47, it was introduced in version v4.20 by commit 61414f5ec9834df8aa4f55c90de16b71a3d6ca8d. For more details please see the references link. | null | 2021-12-19T23:08:55.682663Z | 2021-08-03T01:30:47.097675Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61414f5ec9834df8aa4f55c90de16b71a3d6ca8d'} |
Linux | GSD-2022-1002051 | ext4: fix ext4_mb_mark_bb() with flex_bg with fast_commit | ext4: fix ext4_mb_mark_bb() with flex_bg with fast_commit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit cd6d719534af993210306f8a13f9cb3e615f7c8d. For more details please see the references link. | null | 2022-04-25T06:17:50.610721Z | 2022-04-24T22:05:56.826044Z | null | null | null | null | null |
Linux | GSD-2021-1001501 | blktrace: Fix uaf in blk_trace access after removing by sysfs | blktrace: Fix uaf in blk_trace access after removing by sysfs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.286 by commit 488da313edf3abea7f7733efe011c96b23740ab5, it was introduced in version v2.6.30 by commit c71a896154119f4ca9e89d6078f5f63ad60ef199. For more details please see the references link. | null | 2021-12-19T23:33:19.773365Z | 2021-10-19T16:21:06.069099Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c71a896154119f4ca9e89d6078f5f63ad60ef199'} |
Linux | GSD-2022-1000596 | moxart: fix potential use-after-free on remove path | moxart: fix potential use-after-free on remove path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.23 by commit af0e6c49438b1596e4be8a267d218a0c88a42323. For more details please see the references link. | null | 2022-03-07T02:30:16.818901Z | 2022-02-27T03:28:47.746542Z | null | null | null | null | null |
Linux | GSD-2021-1001014 | net/qla3xxx: fix schedule while atomic in ql_sem_spinlock | net/qla3xxx: fix schedule while atomic in ql_sem_spinlock
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.11 by commit 2ed296c47e5c545a26bb774ec7a87e5369e6ddf9. For more details please see the references link. | null | 2021-12-20T00:45:57.276447Z | 2021-06-30T00:33:59.213568Z | null | null | null | null | null |
Linux | GSD-2022-1000083 | net: fix information leakage in /proc/net/ptype | net: fix information leakage in /proc/net/ptype
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.300 by commit be1ca30331c7923c6f376610c1bd6059be9b1908, it was introduced in version v2.6.26 by commit 2feb27dbe00cbb4f7d31f90acf6bd0d751dd0a50. For more details please see the references link. | null | 2022-02-19T04:09:41.570383Z | 2022-02-18T21:33:18.040157Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2feb27dbe00cbb4f7d31f90acf6bd0d751dd0a50'} |
Linux | GSD-2022-1000579 | IB/hfi1: Fix AIP early init panic | IB/hfi1: Fix AIP early init panic
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.22 by commit a3dd4d2682f2a796121609e5f3bbeb1243198c53, it was introduced in version v5.8 by commit d99dc602e2a55a99940ba9506a7126dfa54d54ea. For more details please see the references link. | null | 2022-03-07T01:34:07.107489Z | 2022-02-27T03:26:53.201887Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d99dc602e2a55a99940ba9506a7126dfa54d54ea'} |
Linux | GSD-2021-1001444 | memory: fsl_ifc: fix leak of IO mapping on probe failure | memory: fsl_ifc: fix leak of IO mapping on probe failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.276 by commit d0d04b95e8ed0223844a1d58497c686fe2e4a955, it was introduced in version v3.3 by commit a20cbdeffce247a2b6fb83cd8d22433994068565. For more details please see the references link. | null | 2021-12-20T01:03:51.879303Z | 2021-08-03T02:43:36.180287Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a20cbdeffce247a2b6fb83cd8d22433994068565'} |
Linux | GSD-2022-1002114 | watch_queue: Actually free the watch | watch_queue: Actually free the watch
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 9d92be1a09fbb3dd65600dbfe7eedb40e7228e4b, it was introduced in version v5.8 by commit c73be61cede5882f9605a852414db559c0ebedfd. For more details please see the references link. | null | 2022-04-25T06:02:52.619874Z | 2022-04-24T22:12:59.992531Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c73be61cede5882f9605a852414db559c0ebedfd'} |
Linux | GSD-2022-1000129 | phylib: fix potential use-after-free | phylib: fix potential use-after-free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.228 by commit 67d271760b037ce0806d687ee6057edc8afd4205, it was introduced in version v4.16 by commit bafbdd527d569c8200521f2f7579f65a044271be. For more details please see the references link. | null | 2022-02-19T02:33:33.056753Z | 2022-02-18T21:44:21.776130Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bafbdd527d569c8200521f2f7579f65a044271be'} |
Linux | GSD-2021-1001917 | drm/msm: Fix null pointer dereference on pointer edp | drm/msm: Fix null pointer dereference on pointer edp
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.290 by commit f175b9a83e5c252d7c74acddc792840016caae0a, it was introduced in version v4.0 by commit ab5b0107ccf3821a6837b0f2819270d6fa0b278f. For more details please see the references link. | null | 2021-12-20T00:11:01.611210Z | 2021-11-14T15:11:37.427591Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab5b0107ccf3821a6837b0f2819270d6fa0b278f'} |
Linux | GSD-2021-1000605 | serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' | serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.42 by commit 6a931ceb0b9401fe18d0c500e08164bf9cc7be4b, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T23:49:20.479742Z | 2021-06-04T19:46:25.219411Z | null | null | null | null | null |
Linux | GSD-2021-1002638 | dm btree remove: fix use after free in rebalance_children() | dm btree remove: fix use after free in rebalance_children()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.259 by commit b03abd0aa09c05099f537cb05b8460c4298f0861. For more details please see the references link. | null | 2022-01-11T05:53:40.832194Z | 2021-12-27T05:28:25.055325Z | null | null | null | null | null |
Linux | GSD-2022-1000980 | net/smc: Fix NULL pointer dereference in smc_pnet_find_ib() | net/smc: Fix NULL pointer dereference in smc_pnet_find_ib()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.4 by commit 22025513ced3d599ee8b24169141c95cf2467a4a, it was introduced in version v5.1 by commit af5f60c7e3d593c2fa31b9a62c16eae75f074de3. For more details please see the references link. | null | 2022-04-25T06:07:07.987939Z | 2022-04-24T20:36:49.603226Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/af5f60c7e3d593c2fa31b9a62c16eae75f074de3'} |
Linux | GSD-2022-1001692 | net: sfc: add missing xdp queue reinitialization | net: sfc: add missing xdp queue reinitialization
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit ed7a824fda8732578d1014fad1f7fb0363705090, it was introduced in version v5.5 by commit 3990a8fffbdad5765f47ea593f9de66c91762059. For more details please see the references link. | null | 2022-04-25T03:09:27.988825Z | 2022-04-24T21:35:43.858696Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3990a8fffbdad5765f47ea593f9de66c91762059'} |
Linux | GSD-2022-1001368 | NFS: Avoid writeback threads getting stuck in mempool_alloc() | NFS: Avoid writeback threads getting stuck in mempool_alloc()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 1b3fa9a3c420c31e77b406ddc28f3a627100516c. For more details please see the references link. | null | 2022-04-25T04:51:20.378995Z | 2022-04-24T21:08:26.945770Z | null | null | null | null | null |
Linux | GSD-2021-1000255 | mt76: mt7921: fix memory leak in mt7921_coredump_work | mt76: mt7921: fix memory leak in mt7921_coredump_work
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 4811226374453607175ea057777faa7e7f752204, it was introduced in version v5.12 by commit 1c099ab44727c8e42fe4de4d91b53cec3ef02860. For more details please see the references link. | null | 2021-12-19T21:47:23.636459Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c099ab44727c8e42fe4de4d91b53cec3ef02860'} |
Linux | GSD-2021-1002268 | usb: host: ohci-tmio: check return value after calling platform_get_resource() | usb: host: ohci-tmio: check return value after calling platform_get_resource()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.162 by commit f98986b7acb4219f95789095eced93ed69d81d35. For more details please see the references link. | null | 2021-12-20T00:45:13.578002Z | 2021-11-29T02:36:12.127333Z | null | null | null | null | null |
Linux | GSD-2022-1001738 | usb: cdnsp: fix cdnsp_decode_trb function to properly handle ret value | usb: cdnsp: fix cdnsp_decode_trb function to properly handle ret value
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 052fb1c9ddfbee13ec73e73532be66c08531c26b. For more details please see the references link. | null | 2022-04-25T05:03:17.902653Z | 2022-04-24T21:38:28.767333Z | null | null | null | null | null |
Linux | GSD-2021-1002792 | IB/qib: Fix memory leak in qib_user_sdma_queue_pkts() | IB/qib: Fix memory leak in qib_user_sdma_queue_pkts()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.169 by commit 79dcbd8176152b860028b62f81a635d987365752, it was introduced in version v5.4.157 by commit 0f8cdfff06829a0b0348b6debc29ff6a61967724. For more details please see the references link. | null | 2022-01-11T05:57:40.032139Z | 2021-12-30T02:43:36.773683Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0f8cdfff06829a0b0348b6debc29ff6a61967724'} |
Linux | GSD-2021-1002842 | f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr() | f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.12 by commit a8a9d753edd7f71e6a2edaa580d8182530b68791. For more details please see the references link. | null | 2022-01-11T07:52:59.943381Z | 2021-12-30T02:45:52.550926Z | null | null | null | null | null |
Linux | GSD-2021-1001297 | drm/amd/display: Avoid HDCP over-read and corruption | drm/amd/display: Avoid HDCP over-read and corruption
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.51 by commit c5b518f4b98dbb2bc31b6a55e6aaa1e0e2948f2e. For more details please see the references link. | null | 2021-12-19T22:23:36.203780Z | 2021-08-03T02:00:45.754324Z | null | null | null | null | null |
Linux | GSD-2022-1000200 | powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending | powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.96 by commit 55402a4618721f350a9ab660bb42717d8aa18e7c, it was introduced in version v5.10.94 by commit ef798cd035f316a537fee8ed170c127f12407085. For more details please see the references link. | null | 2022-02-19T04:35:34.248954Z | 2022-02-18T21:54:46.751539Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef798cd035f316a537fee8ed170c127f12407085'} |
Linux | GSD-2022-1002397 | mm/mempolicy: fix mpol_new leak in shared_policy_replace | mm/mempolicy: fix mpol_new leak in shared_policy_replace
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 5e16dc5378abd749a836daa9ee4ab2c8d2668999, it was introduced in version v3.8 by commit 42288fe366c4f1ce7522bc9f27d0bc2a81c55264. For more details please see the references link. | null | 2022-04-25T05:24:20.951232Z | 2022-04-24T22:43:06.521915Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/42288fe366c4f1ce7522bc9f27d0bc2a81c55264'} |
Linux | GSD-2022-1000650 | ASoC: hdmi-codec: Fix OOB memory accesses | ASoC: hdmi-codec: Fix OOB memory accesses
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.8 by commit 1552e66be325a21d7eff49f46013fb402165a0ac. For more details please see the references link. | null | 2022-03-07T03:38:42.804956Z | 2022-02-27T03:36:10.958510Z | null | null | null | null | null |
Linux | GSD-2022-1001942 | netfilter: nf_tables: initialize registers in nft_do_chain() | netfilter: nf_tables: initialize registers in nft_do_chain()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.32 by commit fafb904156fbb8f1dd34970cd5223e00b47c33be, it was introduced in version v3.13 by commit 96518518cc417bb0a8c80b9fb736202e28acdf96. For more details please see the references link. | null | 2022-04-25T06:07:21.263379Z | 2022-04-24T21:56:50.417879Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/96518518cc417bb0a8c80b9fb736202e28acdf96'} |
Linux | GSD-2021-1002141 | comedi: vmk80xx: fix transfer-buffer overflows | comedi: vmk80xx: fix transfer-buffer overflows
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.18 by commit 278484ae93297b1bb1ce755f9d3b6d95a48c7d47, it was introduced in version v2.6.31 by commit 985cafccbf9b7f862aa1c5ee566801e18b5161fb. For more details please see the references link. | null | 2021-12-19T22:36:48.670147Z | 2021-11-14T15:21:44.011557Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/985cafccbf9b7f862aa1c5ee566801e18b5161fb'} |
Linux | GSD-2021-1000486 | net/nfc: fix use-after-free llcp_sock_bind/connect | net/nfc: fix use-after-free llcp_sock_bind/connect
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.269 by commit ccddad6dd28530e716448e594c9ca7c76ccd0570, it was introduced in version v4.9.267 by commit 18013007b596771bf5f5e7feee9586fb0386ad14. For more details please see the references link. | null | 2021-12-19T22:48:12.495209Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/18013007b596771bf5f5e7feee9586fb0386ad14'} |
Linux | GSD-2022-1001411 | ath11k: pci: fix crash on suspend if board file is not found | ath11k: pci: fix crash on suspend if board file is not found
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit f3c5ef433da82d257337424b3647ce9dcb37d4b5. For more details please see the references link. | null | 2022-04-25T06:00:55.177967Z | 2022-04-24T21:11:00.826923Z | null | null | null | null | null |
Linux | GSD-2021-1002511 | ALSA: pcm: oss: Fix negative period/buffer sizes | ALSA: pcm: oss: Fix negative period/buffer sizes
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.85 by commit 02b2b691b77cd7b951fa7b6c9d44d4e472cdc823. For more details please see the references link. | null | 2021-12-20T00:57:35.604579Z | 2021-12-19T19:40:35.342223Z | null | null | null | null | null |
Linux | GSD-2022-1001041 | netfilter: conntrack: revisit gc autotuning | netfilter: conntrack: revisit gc autotuning
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 592e57591826f3d09c28d755a39ea8e9d13705ad. For more details please see the references link. | null | 2022-04-25T04:00:52.860421Z | 2022-04-24T20:41:49.564420Z | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.