ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2021-1000716 | pid: take a reference when initializing `cad_pid` | pid: take a reference when initializing `cad_pid`
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.272 by commit 764c2e892d1fe895392aff62fb353fdce43bb529, it was introduced in version v2.6.19 by commit 9ec52099e4b8678a60e9f93e41ad87885d64f3e6. For more details please see the references link. | null | 2021-12-20T00:12:01.728706Z | 2021-06-24T23:58:51.745652Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9ec52099e4b8678a60e9f93e41ad87885d64f3e6'} |
Linux | GSD-2022-1001294 | ext4: make mb_optimize_scan performance mount option work with extents | ext4: make mb_optimize_scan performance mount option work with extents
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit b017c9a1abee723689204bea86b0cc36e480d187, it was introduced in version v5.13 by commit 196e402adf2e4cd66f101923409f1970ec5f1af3. For more details please see the references link. | null | 2022-04-25T05:40:14.623261Z | 2022-04-24T21:01:56.902385Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/196e402adf2e4cd66f101923409f1970ec5f1af3'} |
Linux | GSD-2021-1000203 | hfsplus: prevent corruption in shrinking truncate | hfsplus: prevent corruption in shrinking truncate
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.5 by commit 97314e45aa1223a42d60256a62c5d9af54baf446, it was introduced in version v4.19 by commit 31651c607151f1034cfb57e5a78678bea54c362b. For more details please see the references link. | null | 2021-12-19T22:53:56.778928Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/31651c607151f1034cfb57e5a78678bea54c362b'} |
Linux | GSD-2021-1002394 | perf hist: Fix memory leak of a perf_hpp_fmt | perf hist: Fix memory leak of a perf_hpp_fmt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.257 by commit c5c8a26c0dc69a400553245e92d741fe55f91095. For more details please see the references link. | null | 2021-12-19T22:54:43.961333Z | 2021-12-19T19:35:25.185038Z | null | null | null | null | null |
Linux | GSD-2021-1001941 | net: mdiobus: Fix memory leak in __mdiobus_register | net: mdiobus: Fix memory leak in __mdiobus_register
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.288 by commit bc5f2f3431ced08300e4cb3aff35f1da14c26433. For more details please see the references link. | null | 2021-12-20T00:24:12.736411Z | 2021-11-14T15:12:37.189107Z | null | null | null | null | null |
Linux | GSD-2021-1000653 | i2c: i801: Don't generate an interrupt on bus reset | i2c: i801: Don't generate an interrupt on bus reset
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.193 by commit c70e1ba2e7e65255a0ce004f531dd90dada97a8c, it was introduced in version v3.6 by commit 636752bcb5177a301d0266270661581de8624828. For more details please see the references link. | null | 2021-12-20T00:22:50.180910Z | 2021-06-04T19:55:19.015717Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/636752bcb5177a301d0266270661581de8624828'} |
Linux | GSD-2022-1002142 | pinctrl: samsung: drop pin banks references on error paths | pinctrl: samsung: drop pin banks references on error paths
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit be22ebe79e64c3a8eb76f68743d97771f244cb18, it was introduced in version v3.8 by commit ab663789d69760d2735402f66501f20b60312a3d. For more details please see the references link. | null | 2022-04-25T03:12:15.404567Z | 2022-04-24T22:15:43.903884Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab663789d69760d2735402f66501f20b60312a3d'} |
Linux | GSD-2022-1000485 | can: isotp: fix potential CAN frame reception race in isotp_rcv() | can: isotp: fix potential CAN frame reception race in isotp_rcv()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 5b068f33bc8acfcfd5ea7992a2dafb30d89bad30, it was introduced in version v5.10 by commit e057dd3fc20ffb3d7f150af46542a51b59b90127. For more details please see the references link. | null | 2022-03-07T01:44:11.353780Z | 2022-02-27T03:13:22.575741Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e057dd3fc20ffb3d7f150af46542a51b59b90127'} |
Linux | GSD-2021-1001412 | virtio_console: Assure used length from device is limited | virtio_console: Assure used length from device is limited
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.240 by commit 56cf748562d3cbfd33d1ba2eb4a7603a5e20da88. For more details please see the references link. | null | 2021-12-19T23:50:15.240023Z | 2021-08-03T02:33:12.568081Z | null | null | null | null | null |
Linux | GSD-2022-1002512 | jffs2: fix memory leak in jffs2_do_mount_fs | jffs2: fix memory leak in jffs2_do_mount_fs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit 2a9d8184458562e6bf2f40d0e677fc85e2dd3834, it was introduced in version v2.6.15 by commit e631ddba588783edd521c5a89f7b2902772fb691. For more details please see the references link. | null | 2022-04-25T03:57:56.446865Z | 2022-04-24T22:56:45.317482Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e631ddba588783edd521c5a89f7b2902772fb691'} |
Linux | GSD-2021-1001042 | IB/mlx5: Fix initializing CQ fragments buffer | IB/mlx5: Fix initializing CQ fragments buffer
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.11 by commit 3e670c54eda238cb8a1ea93538a79ae89285c1c4, it was introduced in version v4.17 by commit 388ca8be00370db132464e27f745b8a0add19fcb. For more details please see the references link. | null | 2021-12-20T00:32:04.235600Z | 2021-06-30T00:35:51.539898Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/388ca8be00370db132464e27f745b8a0add19fcb'} |
Linux | GSD-2021-1002802 | phonet/pep: refuse to enable an unbound pipe | phonet/pep: refuse to enable an unbound pipe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.169 by commit 48c76fc53582e7f13c1e0b11c916e503256c4d0b. For more details please see the references link. | null | 2022-01-11T05:53:23.313593Z | 2021-12-30T02:44:07.231004Z | null | null | null | null | null |
Linux | GSD-2022-1000240 | Bluetooth: refactor malicious adv data check | Bluetooth: refactor malicious adv data check
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.19 by commit bcea886771c3f22a590c8c8b9139a107bd7f1e1c. For more details please see the references link. | null | 2022-02-19T02:51:57.051583Z | 2022-02-18T22:00:08.728079Z | null | null | null | null | null |
Linux | GSD-2021-1000995 | can: j1939: fix Use-after-Free, hold skb ref while in use | can: j1939: fix Use-after-Free, hold skb ref while in use
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.46 by commit 509ab6bfdd0c76daebbad0f0af07da712116de22, it was introduced in version v5.4 by commit 9d71dd0c70099914fcd063135da3c580865e924c. For more details please see the references link. | null | 2021-12-20T01:20:41.317761Z | 2021-06-30T00:32:03.841152Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9d71dd0c70099914fcd063135da3c580865e924c'} |
Linux | GSD-2021-1001687 | drm/nouveau/debugfs: fix file release memory leak | drm/nouveau/debugfs: fix file release memory leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.12 by commit 88c3610045ca6e699331b6bb5c095c5565f30721, it was introduced in version v4.5 by commit 6e9fc177399f08446293fec7607913fdbc95e191. For more details please see the references link. | null | 2021-12-20T00:58:39.310187Z | 2021-10-19T16:31:52.208386Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6e9fc177399f08446293fec7607913fdbc95e191'} |
Linux | GSD-2022-1001902 | brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path | brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit a88337a06966f2d733ad9a97714b874469133f14, it was introduced in version v5.4 by commit 82f93cf46d6007ffa003b2d4a2834563b6b84d21. For more details please see the references link. | null | 2022-04-25T04:38:57.529856Z | 2022-04-24T21:53:25.282965Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/82f93cf46d6007ffa003b2d4a2834563b6b84d21'} |
Linux | GSD-2022-1000610 | KVM: LAPIC: Also cancel preemption timer during SET_LAPIC | KVM: LAPIC: Also cancel preemption timer during SET_LAPIC
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.5 by commit ce55f63f6cea4cab8ae9212f73285648a5baa30d. For more details please see the references link. | null | 2022-03-07T02:33:55.297593Z | 2022-02-27T03:31:01.554809Z | null | null | null | null | null |
Linux | GSD-2021-1002101 | ocfs2: fix data corruption after conversion from inline format | ocfs2: fix data corruption after conversion from inline format
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit fa9b6b6c953e3f6441ed6cf83b4c771dac2dae08, it was introduced in version v5.10 by commit 6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b. For more details please see the references link. | null | 2021-12-20T01:11:03.017468Z | 2021-11-14T15:19:56.585007Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b'} |
Linux | GSD-2022-1001451 | scsi: qla2xxx: Implement ref count for SRB | scsi: qla2xxx: Implement ref count for SRB
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit e140723f78ff418c8df7d990e102e07b65c87d4a. For more details please see the references link. | null | 2022-04-25T05:45:21.948891Z | 2022-04-24T21:14:23.694350Z | null | null | null | null | null |
Linux | GSD-2021-1002551 | drm/amd/amdkfd: Fix kernel panic when reset failed and been triggered again | drm/amd/amdkfd: Fix kernel panic when reset failed and been triggered again
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.7 by commit 06c6f8f86ec243b89e52f0c3dc7062bcb9de74df. For more details please see the references link. | null | 2021-12-19T22:43:01.462671Z | 2021-12-19T19:42:19.511294Z | null | null | null | null | null |
Linux | GSD-2021-1000096 | tools/power turbostat: Fix offset overflow issue in index converting | tools/power turbostat: Fix offset overflow issue in index converting
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.20 by commit dbdf22fc825fdb1d97f23230064e0f9819471628, it was introduced in version v5.10 by commit 9972d5d84d76982606806b2ce887f70c2f8ba60a. For more details please see the references link. | null | 2021-12-20T01:03:15.432258Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9972d5d84d76982606806b2ce887f70c2f8ba60a'} |
Linux | GSD-2022-1001001 | irqchip/gic-v3: Fix GICR_CTLR.RWP polling | irqchip/gic-v3: Fix GICR_CTLR.RWP polling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 6fef3e3179e6ed8fecdd004ede541674ffa7749d, it was introduced in version v3.17 by commit 021f653791ad17e03f98aaa7fb933816ae16f161. For more details please see the references link. | null | 2022-04-25T04:52:06.017337Z | 2022-04-24T20:38:43.006664Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/021f653791ad17e03f98aaa7fb933816ae16f161'} |
Linux | GSD-2021-1000583 | drm/amd/amdgpu: fix a potential deadlock in gpu reset | drm/amd/amdgpu: fix a potential deadlock in gpu reset
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.42 by commit 4951dd498d483fa961c92541b55ffb32db7f2dbf, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T22:57:52.325160Z | 2021-06-04T19:42:51.953377Z | null | null | null | null | null |
Linux | GSD-2022-1001514 | RDMA/rxe: Change variable and function argument to proper type | RDMA/rxe: Change variable and function argument to proper type
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 4bf26b79a1d8a73e271a31aeb8c6193d07f60b44. For more details please see the references link. | null | 2022-04-25T04:41:24.468924Z | 2022-04-24T21:19:07.820089Z | null | null | null | null | null |
Linux | GSD-2021-1002044 | userfaultfd: fix a race between writeprotect and exit_mmap() | userfaultfd: fix a race between writeprotect and exit_mmap()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit 3cda4bfffd4f755645577aaa9e96a606657b4525, it was introduced in version v5.7 by commit 63b2d4174c4ad1f40b48d7138e71bcb564c1fe03. For more details please see the references link. | null | 2021-12-20T00:14:37.113957Z | 2021-11-14T15:17:20.500151Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63b2d4174c4ad1f40b48d7138e71bcb564c1fe03'} |
Linux | GSD-2021-1000079 | mmc: uniphier-sd: Fix a resource leak in the remove function | mmc: uniphier-sd: Fix a resource leak in the remove function
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.3 by commit d6e7fda496978f2763413b5523557b38dc2bf6c2, it was introduced in version v4.20 by commit 3fd784f745dd1747863775a99ec749619ee6759c. For more details please see the references link. | null | 2021-12-20T01:05:43.340516Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3fd784f745dd1747863775a99ec749619ee6759c'} |
Linux | GSD-2022-1001144 | media: staging: media: zoran: calculate the right buffer number for zoran_reap_stat_com | media: staging: media: zoran: calculate the right buffer number for zoran_reap_stat_com
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 20811bbe685ca3eddd34b0c750860427d7030910. For more details please see the references link. | null | 2022-04-25T04:56:26.077266Z | 2022-04-24T20:48:46.088720Z | null | null | null | null | null |
Linux | GSD-2021-1002414 | net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound | net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.220 by commit 2c1a6a9a011d622a7c61324a97a49801ba425eff. For more details please see the references link. | null | 2021-12-20T01:06:56.534539Z | 2021-12-19T19:36:21.137508Z | null | null | null | null | null |
Linux | GSD-2021-1000429 | media: aspeed: fix clock handling logic | media: aspeed: fix clock handling logic
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.119 by commit 1dc1d30ac101bb8335d9852de2107af60c2580e7, it was introduced in version v5.0 by commit d2b4387f3bdf016e266d23cf657465f557721488. For more details please see the references link. | null | 2021-12-19T22:34:37.100072Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d2b4387f3bdf016e266d23cf657465f557721488'} |
Linux | GSD-2021-1001392 | wl1251: Fix possible buffer overflow in wl1251_cmd_scan | wl1251: Fix possible buffer overflow in wl1251_cmd_scan
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.198 by commit 115103f6e3f1c26c473766c16439c7c8b235529a. For more details please see the references link. | null | 2021-12-19T23:09:51.464370Z | 2021-08-03T02:26:55.070139Z | null | null | null | null | null |
Linux | GSD-2022-1000305 | vt_ioctl: fix array_index_nospec in vt_setactivate | vt_ioctl: fix array_index_nospec in vt_setactivate
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.267 by commit 2a45a6bd1e6d651770aafff57ab3e1d3bb0b42e0. For more details please see the references link. | null | 2022-03-07T01:29:16.357139Z | 2022-02-27T02:48:43.359443Z | null | null | null | null | null |
Linux | GSD-2022-1002338 | ext4: don't BUG if someone dirty pages without asking ext4 first | ext4: don't BUG if someone dirty pages without asking ext4 first
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 0d3a6926f7e8be3c897fa46216ce13b119a9f56a. For more details please see the references link. | null | 2022-04-25T07:17:23.998706Z | 2022-04-24T22:35:39.720049Z | null | null | null | null | null |
Linux | GSD-2021-1001668 | irqchip/gic-v3-its: Fix potential VPE leak on error | irqchip/gic-v3-its: Fix potential VPE leak on error
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.70 by commit 568662e37f927e3dc3e475f3ff7cf4ab7719c5e7, it was introduced in version v4.14 by commit 7d75bbb4bc1ad90386776459d37e4ddfe605671e. For more details please see the references link. | null | 2021-12-19T23:49:00.228624Z | 2021-10-19T16:30:54.458650Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7d75bbb4bc1ad90386776459d37e4ddfe605671e'} |
Linux | GSD-2022-1001847 | gpu: host1x: Fix a memory leak in 'host1x_remove()' | gpu: host1x: Fix a memory leak in 'host1x_remove()'
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit c06577a80485511b894cb688e881ef0bc2d1d296, it was introduced in version v4.13 by commit 8474b02531c4881a762c52ef869c52429e38633f. For more details please see the references link. | null | 2022-04-25T05:09:27.005912Z | 2022-04-24T21:47:39.309989Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8474b02531c4881a762c52ef869c52429e38633f'} |
Linux | GSD-2022-1000755 | mm/filemap: Fix handling of THPs in generic_file_buffered_read() | mm/filemap: Fix handling of THPs in generic_file_buffered_read()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.12 by commit ace802caf3de0f31792fcf654e7df4a294aab950, it was introduced in version v5.12 by commit cbd59c48ae2bcadc4a7599c29cf32fd3f9b78251. For more details please see the references link. | null | 2022-03-18T02:45:10.939154Z | 2022-03-18T00:15:37.372478Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cbd59c48ae2bcadc4a7599c29cf32fd3f9b78251'} |
Linux | GSD-2022-1002292 | ARM: davinci: da850-evm: Avoid NULL pointer dereference | ARM: davinci: da850-evm: Avoid NULL pointer dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.239 by commit c64e2ed5cc376e137e572babfd2edc38b2cfb61b, it was introduced in version v2.6.33 by commit bae105879f2f2404155da6f50b3636193d228a62. For more details please see the references link. | null | 2022-04-25T05:50:47.944035Z | 2022-04-24T22:30:52.322696Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bae105879f2f2404155da6f50b3636193d228a62'} |
Linux | GSD-2021-1001238 | usb: max-3421: Prevent corruption of freed memory | usb: max-3421: Prevent corruption of freed memory
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.54 by commit 7af54a4e221e5619a87714567e2258445dc35435, it was introduced in version v3.16 by commit 2d53139f31626bad6f8983d8e519ddde2cbba921. For more details please see the references link. | null | 2021-12-19T22:24:04.788103Z | 2021-08-03T01:45:51.362547Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2d53139f31626bad6f8983d8e519ddde2cbba921'} |
Linux | GSD-2021-1000700 | btrfs: do not BUG_ON in link_to_fixup_dir | btrfs: do not BUG_ON in link_to_fixup_dir
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.271 by commit 76bfd8ac20bebeae599452a03dfc5724c0475dcf, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T01:31:22.260698Z | 2021-06-04T20:05:26.350088Z | null | null | null | null | null |
Linux | GSD-2021-1001812 | efi: Change down_interruptible() in virt_efi_reset_system() to down_trylock() | efi: Change down_interruptible() in virt_efi_reset_system() to down_trylock()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.213 by commit 853985927c5629bbe43e3f1abb9a5c673b86bd61. For more details please see the references link. | null | 2021-12-19T22:31:59.346682Z | 2021-10-28T13:50:14.187748Z | null | null | null | null | null |
Linux | GSD-2022-1001797 | selinux: allow FIOCLEX and FIONCLEX with policy capability | selinux: allow FIOCLEX and FIONCLEX with policy capability
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 55d192691b4b7063166e7feafbe44db24dbe205c. For more details please see the references link. | null | 2022-04-25T05:05:23.862891Z | 2022-04-24T21:42:50.051322Z | null | null | null | null | null |
Linux | GSD-2022-1000885 | RDMA/ib_srp: Fix a deadlock | RDMA/ib_srp: Fix a deadlock
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.182 by commit 901206f71e6ad2b2e7accefc5199a438d173c25f, it was introduced in version v3.8 by commit ef6c49d87c3418c442a22e55e3ce2f91b163d69e. For more details please see the references link. | null | 2022-03-18T02:50:23.497012Z | 2022-03-18T00:27:56.066258Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef6c49d87c3418c442a22e55e3ce2f91b163d69e'} |
Linux | GSD-2021-1002697 | net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg | net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.88 by commit 12512bc8f25b8ba9795dfbae0e9ca57ff13fd542, it was introduced in version v5.8 by commit d8355240cf8fb8b9e002b5c8458578435cea85c2. For more details please see the references link. | null | 2022-01-11T05:56:40.465230Z | 2021-12-27T05:37:26.470982Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d8355240cf8fb8b9e002b5c8458578435cea85c2'} |
Linux | GSD-2021-1000350 | vsock/virtio: free queued packets when closing socket | vsock/virtio: free queued packets when closing socket
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit b605673b523fe33abeafb2136759bcbc9c1e6ebf, it was introduced in version v5.2 by commit ac03046ece2b158ebd204dfc4896fd9f39f0e6c8. For more details please see the references link. | null | 2021-12-20T00:09:34.236068Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac03046ece2b158ebd204dfc4896fd9f39f0e6c8'} |
Linux | GSD-2022-1002441 | ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction | ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit b2b65c9013dc28836d82e25d0f0c94d794a14aba, it was introduced in version v3.16 by commit 00a7bb81c20f3e81711e28e0f6c08cee8fd18514. For more details please see the references link. | null | 2022-04-25T04:26:03.336566Z | 2022-04-24T22:47:57.638931Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/00a7bb81c20f3e81711e28e0f6c08cee8fd18514'} |
Linux | GSD-2021-1001111 | net: caif: fix memory leak in ldisc_open | net: caif: fix memory leak in ldisc_open
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.196 by commit 568ce04020f5fca707d67d36db2d551966212cfa. For more details please see the references link. | null | 2021-12-20T01:23:51.694313Z | 2021-07-08T01:57:03.234151Z | null | null | null | null | null |
Linux | GSD-2022-1000186 | ceph: properly put ceph_string reference after async create attempt | ceph: properly put ceph_string reference after async create attempt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.96 by commit e7be12ca7d3947765b0d7c1c7e0537e748da993a, it was introduced in version v5.7 by commit 9a8d03ca2e2c334d08ee91a3e07dcce31a02fdc6. For more details please see the references link. | null | 2022-02-19T04:35:11.913624Z | 2022-02-18T21:52:23.957456Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9a8d03ca2e2c334d08ee91a3e07dcce31a02fdc6'} |
Linux | GSD-2022-1002011 | PCI: endpoint: Fix alignment fault error in copy tests | PCI: endpoint: Fix alignment fault error in copy tests
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit b02a1a65023f46b970486be38f7d209761084a7c. For more details please see the references link. | null | 2022-04-25T06:36:00.236408Z | 2022-04-24T22:02:48.222835Z | null | null | null | null | null |
Linux | GSD-2021-1001541 | md: fix a lock order reversal in md_alloc | md: fix a lock order reversal in md_alloc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.249 by commit 9252a5f39df073d364d72662cb8a45dc2f0da328, it was introduced in version v3.0 by commit b0140891a8cea36469f58d23859e599b1122bd37. For more details please see the references link. | null | 2021-12-19T22:21:21.459608Z | 2021-10-19T16:22:55.730145Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b0140891a8cea36469f58d23859e599b1122bd37'} |
Linux | GSD-2021-1001054 | mac80211: fix skb length check in ieee80211_scan_rx() | mac80211: fix skb length check in ieee80211_scan_rx()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit d1b949c70206178b12027f66edc088d40375b5cb, it was introduced in version v5.10 by commit cd418ba63f0c2f6157f35a41c9accc6ecb52590a. For more details please see the references link. | null | 2021-12-20T01:00:40.579077Z | 2021-06-30T00:36:35.977798Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cd418ba63f0c2f6157f35a41c9accc6ecb52590a'} |
Linux | GSD-2022-1002504 | ASoC: mxs: Fix error handling in mxs_sgtl5000_probe | ASoC: mxs: Fix error handling in mxs_sgtl5000_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit f16ad2c0e22687f80e5981c67374023f51c204b9, it was introduced in version v3.5 by commit e968194b45c4e8077dada75c5bae5660b37628fe. For more details please see the references link. | null | 2022-04-25T06:03:24.954633Z | 2022-04-24T22:55:34.199142Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e968194b45c4e8077dada75c5bae5660b37628fe'} |
Linux | GSD-2022-1000539 | scsi: pm8001: Fix use-after-free for aborted TMF sas_task | scsi: pm8001: Fix use-after-free for aborted TMF sas_task
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit 510b21442c3a2e3ecc071ba3e666b320e7acdd61. For more details please see the references link. | null | 2022-03-07T02:24:36.362449Z | 2022-02-27T03:20:57.343923Z | null | null | null | null | null |
Linux | GSD-2021-1001404 | net: fix uninit-value in caif_seqpkt_sendmsg | net: fix uninit-value in caif_seqpkt_sendmsg
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.241 by commit ffe31dd70b70a40cd6b21b78c1713a23e021843a, it was introduced in version v2.6.35 by commit bece7b2398d073d11b2e352405a3ecd3a1e39c60. For more details please see the references link. | null | 2021-12-19T22:59:53.532048Z | 2021-08-03T02:30:56.420258Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bece7b2398d073d11b2e352405a3ecd3a1e39c60'} |
Linux | GSD-2022-1000493 | scsi: qedf: Add stag_work to all the vports | scsi: qedf: Add stag_work to all the vports
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 0be556512cd0dfcf5ec1a140d9f42d88221a5d4e. For more details please see the references link. | null | 2022-03-07T01:40:01.437913Z | 2022-02-27T03:14:56.298871Z | null | null | null | null | null |
Linux | GSD-2022-1002154 | dm integrity: fix memory corruption when tag_size is less than digest size | dm integrity: fix memory corruption when tag_size is less than digest size
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.190 by commit 7f84c937222944c03f4615ca4742df6bed0e5adf. For more details please see the references link. | null | 2022-04-25T04:52:32.624123Z | 2022-04-24T22:16:36.943498Z | null | null | null | null | null |
Linux | GSD-2022-1000169 | ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() | ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.178 by commit fd9a23319f16e7031f0d8c98eed6e093c2927229. For more details please see the references link. | null | 2022-02-19T02:51:54.668450Z | 2022-02-18T21:50:29.367729Z | null | null | null | null | null |
Linux | GSD-2021-1000645 | NFC: nci: fix memory leak in nci_allocate_device | NFC: nci: fix memory leak in nci_allocate_device
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.123 by commit af2a4426baf71163c0c354580ae98c7888a9aba7, it was introduced in version v4.0 by commit 11f54f228643d0248ec00ce8c9fb8d872f87e7b8. For more details please see the references link. | null | 2021-12-20T00:13:09.658277Z | 2021-06-04T19:53:48.911688Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/11f54f228643d0248ec00ce8c9fb8d872f87e7b8'} |
Linux | GSD-2021-1002678 | sit: do not call ipip6_dev_free() from sit_init_net() | sit: do not call ipip6_dev_free() from sit_init_net()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.168 by commit ad0ed314d6167b212939e3839428ba0c8bb16adb, it was introduced in version v4.12 by commit cf124db566e6b036b8bcbe8decbed740bdfac8c6. For more details please see the references link. | null | 2022-01-11T05:47:34.591536Z | 2021-12-27T05:36:23.035010Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cf124db566e6b036b8bcbe8decbed740bdfac8c6'} |
Linux | GSD-2021-1001957 | can: peak_pci: peak_pci_remove(): fix UAF | can: peak_pci: peak_pci_remove(): fix UAF
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.253 by commit 34914971bb3244db4ce2be44e9438a9b30c56250, it was introduced in version v3.4 by commit e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd. For more details please see the references link. | null | 2021-12-19T22:47:34.878888Z | 2021-11-14T15:13:24.013969Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd'} |
Linux | GSD-2022-1001328 | uaccess: fix integer overflow on access_ok() | uaccess: fix integer overflow on access_ok()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.1 by commit a1ad747fc1a0e06d1bf26b996ee8a56b5c8d02d8, it was introduced in version v4.20 by commit da551281947cb2c0ab6e0045529a706af5d79584. For more details please see the references link. | null | 2022-04-25T03:30:25.584816Z | 2022-04-24T21:04:59.151958Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/da551281947cb2c0ab6e0045529a706af5d79584'} |
Linux | GSD-2021-1002382 | ALSA: pcm: oss: Fix negative period/buffer sizes | ALSA: pcm: oss: Fix negative period/buffer sizes
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.293 by commit 502e1146873d870f87da3b8f93d6bf2de5f38d0c. For more details please see the references link. | null | 2021-12-19T23:05:01.877248Z | 2021-12-19T19:34:48.657996Z | null | null | null | null | null |
Linux | GSD-2021-1000215 | xprtrdma: Fix cwnd update ordering | xprtrdma: Fix cwnd update ordering
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.5 by commit 19b5fa9489b5706bc878c3a522a7f771079e2fa0, it was introduced in version v5.5 by commit 2ae50ad68cd79224198b525f7bd645c9da98b6ff. For more details please see the references link. | null | 2021-12-20T01:13:41.981210Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2ae50ad68cd79224198b525f7bd645c9da98b6ff'} |
Linux | GSD-2021-1002228 | ALSA: gus: fix null pointer dereference on pointer block | ALSA: gus: fix null pointer dereference on pointer block
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.291 by commit cb09c760c201f82df83babc92a5ffea0a01807fc. For more details please see the references link. | null | 2021-12-19T22:36:41.423770Z | 2021-11-29T02:34:20.227452Z | null | null | null | null | null |
Linux | GSD-2022-1001282 | drm/i915/gem: add missing boundary check in vm_access | drm/i915/gem: add missing boundary check in vm_access
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 8f0ebea8f6e8c474264ed97d7a64c9c09ed4f5aa, it was introduced in version v5.8 by commit 9f909e215fea0652023b9ed09d3d7bfe10386423. For more details please see the references link. | null | 2022-04-25T06:29:43.469306Z | 2022-04-24T21:01:05.989937Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9f909e215fea0652023b9ed09d3d7bfe10386423'} |
Linux | GSD-2022-1001778 | KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU | KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit af47248407c0c5ae52a752af1ab5ce5b0db91502, it was introduced in version v5.13 by commit b7cccd397f310739fb85383033e95580f99927e0. For more details please see the references link. | null | 2022-04-25T03:00:22.652766Z | 2022-04-24T21:41:52.034901Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b7cccd397f310739fb85383033e95580f99927e0'} |
Linux | GSD-2022-1001056 | scsi: pm8001: Fix task leak in pm8001_send_abort_all() | scsi: pm8001: Fix task leak in pm8001_send_abort_all()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 34c79d16ee69cb53288c202bb1ab0ba0130d9674. For more details please see the references link. | null | 2022-04-25T05:02:41.380983Z | 2022-04-24T20:42:45.327587Z | null | null | null | null | null |
Linux | GSD-2021-1002506 | nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done | nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.85 by commit 83ea620a1be840bf05089a5061fb8323ca42f38c, it was introduced in version v3.12 by commit ac22ac466a659f1b2e02a2e2ee23fc5c42da2c95. For more details please see the references link. | null | 2021-12-19T23:31:31.659363Z | 2021-12-19T19:40:23.381102Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac22ac466a659f1b2e02a2e2ee23fc5c42da2c95'} |
Linux | GSD-2021-1000491 | ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry | ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.7 by commit 807fa14536b26803b858da878b643be72952a097, it was introduced in version v5.6 by commit c5b2cbdbdac563f46ecd5e187253ab1abbd6fc04. For more details please see the references link. | null | 2021-12-20T00:03:47.937132Z | 2021-05-31T23:45:20.564402Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c5b2cbdbdac563f46ecd5e187253ab1abbd6fc04'} |
Linux | GSD-2022-1001406 | drm/amdgpu: Fix recursive locking warning | drm/amdgpu: Fix recursive locking warning
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit c8c93088a51c9b27f311296a81769bd835d30f2e. For more details please see the references link. | null | 2022-04-25T04:27:03.723757Z | 2022-04-24T21:10:46.352601Z | null | null | null | null | null |
Linux | GSD-2021-1002156 | NFC: digital: fix possible memory leak in digital_in_send_sdd_req() | NFC: digital: fix possible memory leak in digital_in_send_sdd_req()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 291c932fc3692e4d211a445ba8aa35663831bac7, it was introduced in version v3.13 by commit 2c66daecc4092e6049673c281b2e6f0d5e59a94c. For more details please see the references link. | null | 2021-12-19T22:46:56.670416Z | 2021-11-14T15:22:29.018836Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c66daecc4092e6049673c281b2e6f0d5e59a94c'} |
Linux | GSD-2022-1001955 | scsi: target: tcmu: Fix possible page UAF | scsi: target: tcmu: Fix possible page UAF
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.112 by commit aec36b98a1bbaa84bfd8299a306e4c12314af626. For more details please see the references link. | null | 2022-04-25T04:48:04.406963Z | 2022-04-24T21:57:49.562730Z | null | null | null | null | null |
Linux | GSD-2022-1000647 | af_packet: fix data-race in packet_setsockopt / packet_setsockopt | af_packet: fix data-race in packet_setsockopt / packet_setsockopt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.6 by commit c074e2c8d67af5f0b1fb953d4ff960a8dc854eab, it was introduced in version v4.3 by commit 47dceb8ecdc1c3ad1818dfea3d659a05b74c3fc2. For more details please see the references link. | null | 2022-03-07T01:39:57.749294Z | 2022-02-27T03:35:49.813477Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/47dceb8ecdc1c3ad1818dfea3d659a05b74c3fc2'} |
Linux | GSD-2022-1002380 | llc: only change llc->dev when bind() succeeds | llc: only change llc->dev when bind() succeeds
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.237 by commit c106f9aa6cd8913af9188ad361899ae696b5de37, it was introduced in version v4.19.237 by commit d14193111c436fc5de33206c67c7afd45c730099. For more details please see the references link. | null | 2022-04-24T22:41:00.313966Z | 2022-04-24T22:41:00.313966Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d14193111c436fc5de33206c67c7afd45c730099'} |
Linux | GSD-2021-1001280 | misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge | misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.52 by commit 58f69684ba03e5b0e0a3ae844a845280c0f06309. For more details please see the references link. | null | 2021-12-19T22:25:47.724087Z | 2021-08-03T01:56:27.052110Z | null | null | null | null | null |
Linux | GSD-2022-1000217 | ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() | ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.99 by commit 6877f87579ed830f9ff6d478539074f035d04bfb. For more details please see the references link. | null | 2022-02-19T10:24:05.879807Z | 2022-02-18T21:56:41.556776Z | null | null | null | null | null |
Linux | GSD-2021-1000868 | isdn: mISDN: netjet: Fix crash in nj_probe: | isdn: mISDN: netjet: Fix crash in nj_probe:
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.195 by commit bf78e25bd3f487208e042c67c8a31706c2dba265. For more details please see the references link. | null | 2021-12-19T23:12:06.352997Z | 2021-06-30T00:02:30.992096Z | null | null | null | null | null |
Linux | GSD-2021-1000887 | bonding: init notify_work earlier to avoid uninitialized use | bonding: init notify_work earlier to avoid uninitialized use
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.126 by commit e0172831c61a7684ff63160c22a627747e6c5268. For more details please see the references link. | null | 2021-12-20T01:30:37.036994Z | 2021-06-30T00:04:31.672502Z | null | null | null | null | null |
Linux | GSD-2021-1001795 | NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() | NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.252 by commit b7b023e6ff567e991c31cd425b0e1d16779c938b, it was introduced in version v3.13 by commit 1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8. For more details please see the references link. | null | 2021-12-20T01:14:26.280219Z | 2021-10-28T13:49:14.324549Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8'} |
Linux | GSD-2022-1001810 | kgdboc: fix return value of __setup handler | kgdboc: fix return value of __setup handler
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit a885e17cf5f2dd6606abe825a001fd09a5c29c2e, it was introduced in version v4.20 by commit 1bd54d851f50dea6af30c3e6ff4f3e9aab5558f9. For more details please see the references link. | null | 2022-04-25T04:20:50.336899Z | 2022-04-24T21:43:51.959682Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1bd54d851f50dea6af30c3e6ff4f3e9aab5558f9'} |
Linux | GSD-2022-1000702 | net: fix up skbs delta_truesize in UDP GRO frag_list | net: fix up skbs delta_truesize in UDP GRO frag_list
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.13 by commit 334b4736a22bfd482c71bfc13375248362b08768, it was introduced in version v5.11 by commit 53475c5dd856212e91538a9501162e821cc1f791. For more details please see the references link. | null | 2022-03-18T02:55:05.746044Z | 2022-03-18T00:11:00.432914Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/53475c5dd856212e91538a9501162e821cc1f791'} |
Linux | GSD-2022-1000352 | nvme: fix a possible use-after-free in controller reset during load | nvme: fix a possible use-after-free in controller reset during load
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.181 by commit 70356b756a58704e5c8818cb09da5854af87e765. For more details please see the references link. | null | 2022-03-07T01:34:41.072282Z | 2022-02-27T02:54:45.586460Z | null | null | null | null | null |
Linux | GSD-2021-1002443 | net: ethernet: dec: tulip: de4x5: fix possible array overflows in type3_infoblock() | net: ethernet: dec: tulip: de4x5: fix possible array overflows in type3_infoblock()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.164 by commit 57247f7035393c12a5819c589d52b6ee3edde8aa. For more details please see the references link. | null | 2021-12-19T23:49:10.508691Z | 2021-12-19T19:37:30.567229Z | null | null | null | null | null |
Linux | GSD-2021-1000184 | bpf: Fix masking negation logic upon negative dst register | bpf: Fix masking negation logic upon negative dst register
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.117 by commit 53e0db429b37a32b8fc706d0d90eb4583ad13848, it was introduced in version v5.0 by commit 979d63d50c0c0f7bc537bf821e056cc9fe5abd38. For more details please see the references link. | null | 2021-12-19T23:11:02.585331Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/979d63d50c0c0f7bc537bf821e056cc9fe5abd38'} |
Linux | GSD-2022-1001113 | wireguard: socket: free skb in send6 when ipv6 is disabled | wireguard: socket: free skb in send6 when ipv6 is disabled
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 0b19bcb753dbfb74710d12bb2761ec5ed706c726, it was introduced in version v5.6 by commit e7096c131e5161fa3b8e52a650d7719d2857adfd. For more details please see the references link. | null | 2022-04-25T03:10:15.741298Z | 2022-04-24T20:46:25.490157Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e7096c131e5161fa3b8e52a650d7719d2857adfd'} |
Linux | GSD-2021-1002013 | isdn: mISDN: Fix sleeping function called from invalid context | isdn: mISDN: Fix sleeping function called from invalid context
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.156 by commit 4054b869dc263228d30a4755800b78f0f2ba0c89. For more details please see the references link. | null | 2021-12-20T00:35:47.490570Z | 2021-11-14T15:15:55.557315Z | null | null | null | null | null |
Linux | GSD-2022-1001543 | drm/bridge: anx7625: Fix overflow issue on reading EDID | drm/bridge: anx7625: Fix overflow issue on reading EDID
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit f0d5d938d51af4eb08d9d8684fd9903425a0a87d, it was introduced in version v5.11 by commit 8bdfc5dae4e3ba4d99dfb430ef43249e5f1b7730. For more details please see the references link. | null | 2022-04-25T03:31:34.704459Z | 2022-04-24T21:21:58.152955Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8bdfc5dae4e3ba4d99dfb430ef43249e5f1b7730'} |
Linux | GSD-2021-1001516 | cpufreq: schedutil: Destroy mutex before kobject_put() frees the memory | cpufreq: schedutil: Destroy mutex before kobject_put() frees the memory
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.285 by commit 1ba2e770481905b06f5684d6cbd0817a1432da2b, it was introduced in version v4.9.285 by commit cb4a53ba37532c861a5f3f22803391018a41849a. For more details please see the references link. | null | 2021-10-19T16:21:46.097860Z | 2021-10-19T16:21:46.097860Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cb4a53ba37532c861a5f3f22803391018a41849a'} |
Linux | GSD-2022-1000581 | RDMA/cma: Use correct address when leaving multicast group | RDMA/cma: Use correct address when leaving multicast group
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.22 by commit 7715682f357db296cbc70faa945994f75bd06357, it was introduced in version v5.10 by commit b5de0c60cc30c2a3513c7188c73f3f29acc29234. For more details please see the references link. | null | 2022-03-07T01:54:16.550696Z | 2022-02-27T03:27:06.973956Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b5de0c60cc30c2a3513c7188c73f3f29acc29234'} |
Linux | GSD-2022-1002046 | media: staging: media: zoran: calculate the right buffer number for zoran_reap_stat_com | media: staging: media: zoran: calculate the right buffer number for zoran_reap_stat_com
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit bafec1a6ba4b187a7fcdcfce0faebdc623d4ef8e. For more details please see the references link. | null | 2022-04-25T04:59:34.503667Z | 2022-04-24T22:05:42.389182Z | null | null | null | null | null |
Linux | GSD-2021-1001146 | i2c: robotfuzz-osif: fix control-request directions | i2c: robotfuzz-osif: fix control-request directions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13 by commit 4ca070ef0dd885616ef294d269a9bf8e3b258e1a, it was introduced in version v3.14 by commit 83e53a8f120f2f273cf0ad717f5372ab79ac24fe. For more details please see the references link. | null | 2021-12-20T00:44:19.625989Z | 2021-07-08T01:59:33.145005Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/83e53a8f120f2f273cf0ad717f5372ab79ac24fe'} |
Linux | GSD-2022-1002416 | ubifs: rename_whiteout: Fix double free for whiteout_ui->data | ubifs: rename_whiteout: Fix double free for whiteout_ui->data
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 8b3c7be16f3f4dfd6e15ac651484e59d3fa36274, it was introduced in version v4.9 by commit 9e0a1fff8db56eaaebb74b4a3ef65f86811c4798. For more details please see the references link. | null | 2022-04-25T04:37:53.038359Z | 2022-04-24T22:45:04.208002Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9e0a1fff8db56eaaebb74b4a3ef65f86811c4798'} |
Linux | GSD-2021-1000307 | soc/tegra: regulators: Fix locking up when voltage-spread is out of range | soc/tegra: regulators: Fix locking up when voltage-spread is out of range
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit ff39adf5d31c72025bba799aec69c5c86d81d549, it was introduced in version v5.5 by commit 783807436f363e5b1ad4d43ba7debbedfcadbb99. For more details please see the references link. | null | 2021-12-20T00:17:03.617023Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/783807436f363e5b1ad4d43ba7debbedfcadbb99'} |
Linux | GSD-2022-1001390 | MIPS: fix fortify panic when copying asm exception handlers | MIPS: fix fortify panic when copying asm exception handlers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 3c6c4d4ac8b17adc7db797bf4b25ef22abc2dd1c. For more details please see the references link. | null | 2022-04-25T06:58:54.831673Z | 2022-04-24T21:10:00.024947Z | null | null | null | null | null |
Linux | GSD-2022-1000978 | macvlan: Fix leaking skb in source mode with nodst option | macvlan: Fix leaking skb in source mode with nodst option
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.4 by commit f382df5ff36bc9fa10e0f898f3051d0702085304, it was introduced in version v5.13 by commit 427f0c8c194b22edcafef1b0a42995ddc5c2227d. For more details please see the references link. | null | 2022-04-25T03:51:23.115842Z | 2022-04-24T20:36:32.738353Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/427f0c8c194b22edcafef1b0a42995ddc5c2227d'} |
Linux | GSD-2021-1000757 | mm, hugetlb: fix simple resv_huge_pages underflow on UFFDIO_COPY | mm, hugetlb: fix simple resv_huge_pages underflow on UFFDIO_COPY
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.125 by commit 14fd3da3e8d3de7f34d69dd4bfa5fd9e73d99911, it was introduced in version v4.11 by commit 8fb5debc5fcd450470cdd789c2d80ef95ebb8cf4. For more details please see the references link. | null | 2021-12-20T00:59:41.789759Z | 2021-06-25T00:02:48.831323Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8fb5debc5fcd450470cdd789c2d80ef95ebb8cf4'} |
Linux | GSD-2021-1001845 | can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv | can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit 864e77771a24c877aaf53aee019f78619cbcd668, it was introduced in version v5.4 by commit 9d71dd0c70099914fcd063135da3c580865e924c. For more details please see the references link. | null | 2021-12-20T00:29:20.874221Z | 2021-10-28T13:51:52.711503Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9d71dd0c70099914fcd063135da3c580865e924c'} |
Linux | GSD-2021-1002290 | ALSA: gus: fix null pointer dereference on pointer block | ALSA: gus: fix null pointer dereference on pointer block
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.82 by commit 1ac6cd87d8ddd36c43620f82c4d65b058f725f0f. For more details please see the references link. | null | 2021-12-20T00:02:47.922837Z | 2021-11-29T02:37:15.125595Z | null | null | null | null | null |
Linux | GSD-2021-1002785 | ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module | ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.223 by commit 925229d552724e1bba1abf01d3a0b1318539b012, it was introduced in version v4.15 by commit b2cfd8ab4add53c2070367bfee2f5b738f51698d. For more details please see the references link. | null | 2022-01-11T05:52:41.922082Z | 2021-12-30T02:43:20.156878Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b2cfd8ab4add53c2070367bfee2f5b738f51698d'} |
Linux | GSD-2021-1000242 | i2c: stm32f7: fix reference leak when pm_runtime_get_sync fails | i2c: stm32f7: fix reference leak when pm_runtime_get_sync fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit c7ea772c9fcf711ed566814b92eecaffc0e2bfd0, it was introduced in version v5.6 by commit ea6dd25deeb5b797a145be7f860e3085e7d104c3. For more details please see the references link. | null | 2021-12-19T23:12:21.873166Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ea6dd25deeb5b797a145be7f860e3085e7d104c3'} |
Linux | GSD-2021-1000612 | NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() | NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.42 by commit f9890652185b72b8de9ebeb4406037640b6e1b53, it was introduced in version v5.10.36 by commit 2fafe7d5047f98791afd9a1d90d2afb70debc590. For more details please see the references link. | null | 2021-12-19T22:36:01.188542Z | 2021-06-04T19:47:32.268144Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2fafe7d5047f98791afd9a1d90d2afb70debc590'} |
Linux | GSD-2021-1001900 | drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read | drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit 09f3946bb452918dbfb1982add56f9ffaae393dc, it was introduced in version v5.7 by commit e11f5bd8228fc3760c221f940b9f6365dbf3e7ed. For more details please see the references link. | null | 2021-12-19T22:32:57.887574Z | 2021-10-28T13:54:46.855807Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e11f5bd8228fc3760c221f940b9f6365dbf3e7ed'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.