ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2021-1000917 | udp: fix race between close() and udp_abort() | udp: fix race between close() and udp_abort()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.128 by commit 5a88477c1c85e4baa51e91f2d40f2166235daa56, it was introduced in version v4.9 by commit 5d77dca82839ef016a93ad7acd7058b14d967752. For more details please see the references link. | null | 2021-12-19T23:55:20.787364Z | 2021-06-30T00:24:23.501424Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5d77dca82839ef016a93ad7acd7058b14d967752'} |
Linux | GSD-2022-1002355 | scsi: pm8001: Fix abort all task initialization | scsi: pm8001: Fix abort all task initialization
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 1824a21b2cedc5774a5adfa74f5f7b90472d8677, it was introduced in version v3.10 by commit c6b9ef5779c3e1edfa9de949d2a51252bc347663. For more details please see the references link. | null | 2022-04-25T05:57:32.117445Z | 2022-04-24T22:37:50.438636Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6b9ef5779c3e1edfa9de949d2a51252bc347663'} |
Linux | GSD-2022-1000368 | net: dsa: mv88e6xxx: don't use devres for mdiobus | net: dsa: mv88e6xxx: don't use devres for mdiobus
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.101 by commit 8ccebe77df6e0d88c72ba5e69cf1835927e53b6c, it was introduced in version v5.9 by commit ac3a68d56651c3dad2c12c7afce065fe15267f44. For more details please see the references link. | null | 2022-03-07T01:43:25.114344Z | 2022-02-27T02:57:15.488317Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac3a68d56651c3dad2c12c7afce065fe15267f44'} |
Linux | GSD-2021-1000444 | powerpc/64s: Fix crashes when toggling entry flush barrier | powerpc/64s: Fix crashes when toggling entry flush barrier
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.191 by commit 2db22ba4e0e103f00e0512e0ecce36ac78c644f8, it was introduced in version v4.19.159 by commit f69bb4e51f41973fb7594be1479fa689831efe1a. For more details please see the references link. | null | 2021-12-19T22:23:22.994842Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f69bb4e51f41973fb7594be1479fa689831efe1a'} |
Linux | GSD-2021-1002479 | sched/scs: Reset task stack state in bringup_cpu() | sched/scs: Reset task stack state in bringup_cpu()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.83 by commit e6ee7abd6bfe559ad9989004b34c320fd638c526, it was introduced in version v5.10.50 by commit 3c51d82d0b7862d7d246016c74b4390fb1fa1f11. For more details please see the references link. | null | 2021-12-20T00:01:33.856013Z | 2021-12-19T19:39:11.224983Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c51d82d0b7862d7d246016c74b4390fb1fa1f11'} |
Linux | GSD-2021-1002183 | drm: mxsfb: Fix NULL pointer dereference crash on unload | drm: mxsfb: Fix NULL pointer dereference crash on unload
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 3cfc183052c3dbf8eae57b6c1685dab00ed3db4a, it was introduced in version v5.10 by commit ae1ed0093281939b80664a687689f12436c0e874. For more details please see the references link. | null | 2021-12-19T22:43:30.616252Z | 2021-11-14T15:23:35.955448Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ae1ed0093281939b80664a687689f12436c0e874'} |
Linux | GSD-2022-1001129 | ASoC: mediatek: Fix error handling in mt8183_da7219_max98357_dev_probe | ASoC: mediatek: Fix error handling in mt8183_da7219_max98357_dev_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 9b9f6227e8d0c7c46b6d9d7b8a5c4e0536049fcf. For more details please see the references link. | null | 2022-04-25T04:20:09.355064Z | 2022-04-24T20:47:50.092744Z | null | null | null | null | null |
Linux | GSD-2022-1001083 | usb: cdnsp: fix cdnsp_decode_trb function to properly handle ret value | usb: cdnsp: fix cdnsp_decode_trb function to properly handle ret value
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 185918644ec10a6308e892ee6880e292971321b7. For more details please see the references link. | null | 2022-04-25T05:20:32.911075Z | 2022-04-24T20:44:03.213933Z | null | null | null | null | null |
Linux | GSD-2021-1000014 | ixgbe: fix unbalanced device enable/disable in suspend/resume | ixgbe: fix unbalanced device enable/disable in suspend/resume
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.16 by commit f1b4be4a753caa4056496f679d70550d0c11a264, it was introduced in version v5.9 by commit 6f82b25587354ce7c9c42e0b53d8b0770b900847. For more details please see the references link. | null | 2021-12-20T00:08:07.343340Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6f82b25587354ce7c9c42e0b53d8b0770b900847'} |
Linux | GSD-2021-1002029 | btrfs: fix abort logic in btrfs_replace_file_extents | btrfs: fix abort logic in btrfs_replace_file_extents
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.75 by commit 0e32a2b85c7d92ece86c17dfef390c5ed79c6378. For more details please see the references link. | null | 2021-12-19T23:19:13.585481Z | 2021-11-14T15:16:36.219676Z | null | null | null | null | null |
Linux | GSD-2022-1001579 | arm64: prevent instrumentation of bp hardening callbacks | arm64: prevent instrumentation of bp hardening callbacks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit cdf805717b28ff8c587121c4e0590d7fdb63bc23, it was introduced in version v4.16 by commit ec82b567a74fbdffdf418d4bb381d55f6a9096af. For more details please see the references link. | null | 2022-04-25T04:45:50.158611Z | 2022-04-24T21:25:48.277533Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ec82b567a74fbdffdf418d4bb381d55f6a9096af'} |
Linux | GSD-2022-1001596 | media: omap3isp: Use struct_group() for memcpy() region | media: omap3isp: Use struct_group() for memcpy() region
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 2b4584b5d631af625ad812bf06dcea7fa1ac3fa3, it was introduced in version v4.18 by commit 378e3f81cb5653b28100d3231db6da07b0581ff4. For more details please see the references link. | null | 2022-04-25T04:28:33.644684Z | 2022-04-24T21:27:13.465440Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/378e3f81cb5653b28100d3231db6da07b0581ff4'} |
Linux | GSD-2021-1000501 | RDMA/rxe: Clear all QP fields if creation failed | RDMA/rxe: Clear all QP fields if creation failed
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.7 by commit 03344e843ab6dd3b3f2cadfb65ed910590856c70, it was introduced in version v4.8 by commit 8700e3e7c4857d28ebaa824509934556da0b3e76. For more details please see the references link. | null | 2021-12-20T00:49:06.527275Z | 2021-05-31T23:47:00.520433Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8700e3e7c4857d28ebaa824509934556da0b3e76'} |
Linux | GSD-2021-1002496 | rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() | rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.84 by commit 60f0b9c42cb80833a03ca57c1c8b078d716e71d1, it was introduced in version v5.4 by commit 9ebeddef58c41bd700419cdcece24cf64ce32276. For more details please see the references link. | null | 2021-12-19T22:35:49.271075Z | 2021-12-19T19:39:52.755695Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9ebeddef58c41bd700419cdcece24cf64ce32276'} |
Linux | GSD-2021-1000151 | scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() | scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.36 by commit 702cdaa2c6283c135ef16d52e0e4e3c1005aa538, it was introduced in version v5.5 by commit af2a0c51b1205327f55a7e82e530403ae1d42cbb. For more details please see the references link. | null | 2021-12-20T00:00:10.639531Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/af2a0c51b1205327f55a7e82e530403ae1d42cbb'} |
Linux | GSD-2022-1000387 | parisc: Fix data TLB miss in sba_unmap_sg | parisc: Fix data TLB miss in sba_unmap_sg
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.102 by commit f8f519d7df66c334b5e08f896ac70ee3b53add3b. For more details please see the references link. | null | 2022-03-07T02:42:41.004382Z | 2022-02-27T03:00:05.816223Z | null | null | null | null | null |
Linux | GSD-2021-1001310 | netrom: Decrease sock refcount when sock timers expire | netrom: Decrease sock refcount when sock timers expire
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.136 by commit 25df44e90ff5959b5c24ad361b648504a7e39ef3, it was introduced in version v5.0 by commit 63346650c1a94a92be61a57416ac88c0a47c4327. For more details please see the references link. | null | 2021-12-19T22:11:03.921589Z | 2021-08-03T02:04:45.257761Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63346650c1a94a92be61a57416ac88c0a47c4327'} |
Linux | GSD-2022-1002210 | ubifs: rename_whiteout: Fix double free for whiteout_ui->data | ubifs: rename_whiteout: Fix double free for whiteout_ui->data
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 14276d38c89a170363e90b6ac0a53c3cf61b87fc, it was introduced in version v4.9 by commit 9e0a1fff8db56eaaebb74b4a3ef65f86811c4798. For more details please see the references link. | null | 2022-04-25T04:23:45.652086Z | 2022-04-24T22:22:16.529312Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9e0a1fff8db56eaaebb74b4a3ef65f86811c4798'} |
Linux | GSD-2021-1001740 | s390/qeth: fix deadlock during failing recovery | s390/qeth: fix deadlock during failing recovery
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit 0bfe741741327822d1482c7edef0184636d08b40, it was introduced in version v5.11 by commit b41b554c1ee75070a14c02a88496b1f231c7eacc. For more details please see the references link. | null | 2021-12-20T01:12:28.209505Z | 2021-10-19T16:34:25.091169Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b41b554c1ee75070a14c02a88496b1f231c7eacc'} |
Linux | GSD-2021-1000852 | bonding: init notify_work earlier to avoid uninitialized use | bonding: init notify_work earlier to avoid uninitialized use
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.237 by commit 1fb72dd4bcbce6eca085f7c1403e5b03d4e70f83. For more details please see the references link. | null | 2021-12-19T22:54:00.530065Z | 2021-06-30T00:01:24.745179Z | null | null | null | null | null |
Linux | GSD-2022-1000807 | nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() | nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.26 by commit 9d8097caa73200710d52b9f4d9f430548f46a900, it was introduced in version v5.1 by commit 20cce88650981ec504d328dbbdd004d991eb8535. For more details please see the references link. | null | 2022-03-18T03:58:30.031874Z | 2022-03-18T00:20:16.687369Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/20cce88650981ec504d328dbbdd004d991eb8535'} |
Linux | GSD-2022-1001715 | netlabel: fix out-of-bounds memory accesses | netlabel: fix out-of-bounds memory accesses
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.0 by commit 5578de4834fe0f2a34fedc7374be691443396d1f, it was introduced in version v2.6.19 by commit 446fda4f26822b2d42ab3396aafcedf38a9ff2b6. For more details please see the references link. | null | 2022-04-25T06:59:05.271673Z | 2022-04-24T21:37:22.133242Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/446fda4f26822b2d42ab3396aafcedf38a9ff2b6'} |
Linux | GSD-2021-1001890 | ice: Avoid crash from unnecessary IDA free | ice: Avoid crash from unnecessary IDA free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit 777682e59840e24e6c5672197e6ffbcf4bff823b, it was introduced in version v5.14 by commit d25a0fc41c1f927bb914e72a03c1898052557406. For more details please see the references link. | null | 2021-12-19T22:47:57.647571Z | 2021-10-28T13:54:18.632658Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d25a0fc41c1f927bb914e72a03c1898052557406'} |
Linux | GSD-2021-1000782 | btrfs: fixup error handling in fixup_inode_link_counts | btrfs: fixup error handling in fixup_inode_link_counts
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.43 by commit 48568f3944ee7357e8fed394804745bd981e978a, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T23:18:43.345151Z | 2021-06-25T00:05:17.855189Z | null | null | null | null | null |
Linux | GSD-2021-1002245 | btrfs: fix memory ordering between normal and ordered work functions | btrfs: fix memory ordering between normal and ordered work functions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.218 by commit ed058d735a70f4b063323f1a7bb33cda0f987513, it was introduced in version v3.15 by commit 08a9ff3264181986d1d692a4e6fce3669700c9f8. For more details please see the references link. | null | 2021-12-20T00:31:44.516684Z | 2021-11-29T02:35:03.215274Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/08a9ff3264181986d1d692a4e6fce3669700c9f8'} |
Linux | GSD-2021-1000278 | spi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails | spi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit bad5a23cf2b477fa78b85fd392736dae09a1e818, it was introduced in version v5.10 by commit 1c26372e5aa9e53391a1f8fe0dc7cd93a7e5ba9e. For more details please see the references link. | null | 2021-12-20T00:38:20.942497Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c26372e5aa9e53391a1f8fe0dc7cd93a7e5ba9e'} |
Linux | GSD-2022-1001345 | ata: sata_dwc_460ex: Fix crash due to OOB write | ata: sata_dwc_460ex: Fix crash due to OOB write
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 234c0132f76f0676d175757f61b0025191a3d935, it was introduced in version v4.18 by commit 28361c403683c2b00d4f5e76045f3ccd299bf99d. For more details please see the references link. | null | 2022-04-25T05:22:35.224647Z | 2022-04-24T21:06:25.387127Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/28361c403683c2b00d4f5e76045f3ccd299bf99d'} |
Linux | GSD-2021-1002615 | xen/netback: don't queue unlimited number of packages | xen/netback: don't queue unlimited number of packages
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.296 by commit 0928efb09178e01d3dc8e8849aa1c807436c3c37, it was introduced in version v3.18 by commit f48da8b14d04ca87ffcffe68829afd45f926ec6a. For more details please see the references link. | null | 2022-01-11T05:56:52.591803Z | 2021-12-27T05:27:19.695198Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f48da8b14d04ca87ffcffe68829afd45f926ec6a'} |
Linux | GSD-2021-1000628 | net: dsa: fix a crash if ->get_sset_count() fails | net: dsa: fix a crash if ->get_sset_count() fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.124 by commit ce5355f140a7987011388c7e30c4f8fbe180d3e8, it was introduced in version v4.7 by commit badf3ada60ab8f76f9488dc8f5c0c57f70682f5a. For more details please see the references link. | null | 2021-12-20T01:26:38.599481Z | 2021-06-04T19:50:09.066889Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/badf3ada60ab8f76f9488dc8f5c0c57f70682f5a'} |
Linux | GSD-2022-1000104 | yam: fix a memory leak in yam_siocdevprivate() | yam: fix a memory leak in yam_siocdevprivate()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.265 by commit 4bbdfb71d2898a9d6e777a948a7484903a4ad2c3, it was introduced in version v4.14.79 by commit d0539c56391d449603f7ff2bcddf38995df49749. For more details please see the references link. | null | 2022-02-19T09:35:57.047594Z | 2022-02-18T21:35:39.462224Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0539c56391d449603f7ff2bcddf38995df49749'} |
Linux | GSD-2022-1002139 | NFSD: prevent underflow in nfssvc_decode_writeargs() | NFSD: prevent underflow in nfssvc_decode_writeargs()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 65e21cc042f4c1518c8c55283f53bc725b78419d. For more details please see the references link. | null | 2022-04-25T05:48:26.138326Z | 2022-04-24T22:15:27.267989Z | null | null | null | null | null |
Linux | GSD-2021-1001193 | sunrpc: Avoid a KASAN slab-out-of-bounds bug in xdr_set_page_base() | sunrpc: Avoid a KASAN slab-out-of-bounds bug in xdr_set_page_base()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.4 by commit a02357d7532b88e97329bd7786c7e72601109704, it was introduced in version v5.11 by commit 8d86e373b0ef52d091ced9583ffbb33ad2771576. For more details please see the references link. | null | 2021-12-20T00:38:09.039247Z | 2021-08-03T01:34:01.170625Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8d86e373b0ef52d091ced9583ffbb33ad2771576'} |
Linux | GSD-2021-1001469 | net: fix uninit-value in caif_seqpkt_sendmsg | net: fix uninit-value in caif_seqpkt_sendmsg
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.277 by commit d9d646acad2c3590e189bb5d5c86ab8bd8a2dfc3, it was introduced in version v2.6.35 by commit bece7b2398d073d11b2e352405a3ecd3a1e39c60. For more details please see the references link. | null | 2021-12-19T22:12:31.391758Z | 2021-08-03T02:50:28.028060Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bece7b2398d073d11b2e352405a3ecd3a1e39c60'} |
Linux | GSD-2022-1000554 | crypto: af_alg - get rid of alg_memory_allocated | crypto: af_alg - get rid of alg_memory_allocated
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit 9d06f489b9e901580159e21fdc29f73df7ed08dc, it was introduced in version v5.16 by commit 2bb2f5fb21b0486ff69b7b4a1fe03a760527d133. For more details please see the references link. | null | 2022-03-07T01:44:37.728248Z | 2022-02-27T03:23:18.840642Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2bb2f5fb21b0486ff69b7b4a1fe03a760527d133'} |
Linux | GSD-2021-1001039 | gpio: wcd934x: Fix shift-out-of-bounds error | gpio: wcd934x: Fix shift-out-of-bounds error
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.11 by commit dd55331d493b7ea75c5db1f24d6822946fde2862, it was introduced in version v5.6 by commit 59c324683400b41caa6d85b091e812ee3d5415c3. For more details please see the references link. | null | 2021-12-20T00:16:37.436141Z | 2021-06-30T00:35:39.669891Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/59c324683400b41caa6d85b091e812ee3d5415c3'} |
Linux | GSD-2022-1002093 | dax: make sure inodes are flushed before destroy cache | dax: make sure inodes are flushed before destroy cache
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit ec376f5c11c88c0215d173599db8449cd4196759, it was introduced in version v4.12 by commit 7b6be8444e0f0dd675b54d059793423d3c9b4c03. For more details please see the references link. | null | 2022-04-25T05:46:26.772251Z | 2022-04-24T22:10:19.599208Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7b6be8444e0f0dd675b54d059793423d3c9b4c03'} |
Linux | GSD-2022-1000041 | usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. | usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.90 by commit 1c4ace3e6b8575745c50dca9e76e0021e697d645, it was introduced in version v4.0 by commit 5e33f6fdf735cda1d4580fe6f1878da05718fe73. For more details please see the references link. | null | 2022-01-11T05:57:12.420102Z | 2022-01-10T19:51:28.687092Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5e33f6fdf735cda1d4580fe6f1878da05718fe73'} |
Linux | GSD-2022-1000411 | NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes | NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit 37f2d2cd8eadddbbd9c7bda327a9393399b2f89b. For more details please see the references link. | null | 2022-03-07T02:33:04.535526Z | 2022-02-27T03:02:50.432770Z | null | null | null | null | null |
Linux | GSD-2021-1001486 | seq_buf: Fix overflow in seq_buf_putmem_hex() | seq_buf: Fix overflow in seq_buf_putmem_hex()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.276 by commit 7ad5c2f4dff68a00d24f0692e027b99c7231b995, it was introduced in version v2.6.27 by commit 5e3ca0ec76fce92daa4eed0d02de9c79b1fe3920. For more details please see the references link. | null | 2021-12-20T00:37:44.730393Z | 2021-08-03T02:56:00.967460Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5e3ca0ec76fce92daa4eed0d02de9c79b1fe3920'} |
Linux | GSD-2021-1002300 | usb: musb: tusb6010: check return value after calling platform_get_resource() | usb: musb: tusb6010: check return value after calling platform_get_resource()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.82 by commit 679eee466d0f9ffa60a2b0c6ec19be5128927f04. For more details please see the references link. | null | 2021-12-19T23:51:46.438999Z | 2021-11-29T02:37:40.197870Z | null | null | null | null | null |
Linux | GSD-2022-1000942 | usb: gadget: clear related members when goto fail | usb: gadget: clear related members when goto fail
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.305 by commit e09100044e658fb7906494ed5109323ba64f3e7a. For more details please see the references link. | null | 2022-03-18T02:55:09.594327Z | 2022-03-18T00:34:56.415416Z | null | null | null | null | null |
Linux | GSD-2022-1001650 | memory: renesas-rpc-if: fix platform-device leak in error path | memory: renesas-rpc-if: fix platform-device leak in error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.35 by commit 05d1824a7fb43ab9adb1eb82404954af81d8c984, it was introduced in version v5.9 by commit ca7d8b980b67f133317525c4273e144116ee1ae5. For more details please see the references link. | null | 2022-04-25T06:51:13.526454Z | 2022-04-24T21:31:44.277443Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca7d8b980b67f133317525c4273e144116ee1ae5'} |
Linux | GSD-2021-1002750 | igbvf: fix double free in `igbvf_probe` | igbvf: fix double free in `igbvf_probe`
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit 944b8be08131f5faf2cd2440aa1c24a39a163a54, it was introduced in version v2.6.30 by commit d4e0fe01a38a073568aee541a0247fe734095979. For more details please see the references link. | null | 2022-01-11T05:57:43.942475Z | 2021-12-27T05:46:59.441709Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d4e0fe01a38a073568aee541a0247fe734095979'} |
Linux | GSD-2022-1001200 | Bluetooth: hci_uart: add missing NULL check in h5_enqueue | Bluetooth: hci_uart: add missing NULL check in h5_enqueue
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 8a3896c30f542439d36303183dc96f65df8cc528, it was introduced in version v5.15 by commit d9dd833cf6d29695682ec7e7924c0d0992b906bc. For more details please see the references link. | null | 2022-04-25T05:50:06.266335Z | 2022-04-24T20:53:11.016250Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9dd833cf6d29695682ec7e7924c0d0992b906bc'} |
Linux | GSD-2021-1000297 | crypto: sun8i-ss - fix result memory leak on error path | crypto: sun8i-ss - fix result memory leak on error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 50e7b39b808430ad49a637dc6fb72ca93b451b13, it was introduced in version v5.10 by commit d9b45418a91773b7672e4c60037a28074b495c6d. For more details please see the references link. | null | 2021-12-19T23:51:27.914423Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9b45418a91773b7672e4c60037a28074b495c6d'} |
Linux | GSD-2021-1002584 | HID: bigbenff: prevent null pointer dereference | HID: bigbenff: prevent null pointer dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.8 by commit 58f15f5ae7786c824868f3a7e093859b74669ce7. For more details please see the references link. | null | 2021-12-20T01:35:38.156918Z | 2021-12-19T19:43:47.093352Z | null | null | null | null | null |
Linux | GSD-2021-1000043 | net: hso: fix NULL-deref on disconnect regression | net: hso: fix NULL-deref on disconnect regression
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.115 by commit d7fad2ce15bdbbd0fec3ebe999fd7cab2267f53e, it was introduced in version v5.4.112 by commit 4a2933c88399c0ebc738db39bbce3ae89786d723. For more details please see the references link. | null | 2021-12-20T01:30:08.111854Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4a2933c88399c0ebc738db39bbce3ae89786d723'} |
Linux | GSD-2022-1001484 | gcc-plugins/stackleak: Exactly match strings instead of prefixes | gcc-plugins/stackleak: Exactly match strings instead of prefixes
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 59a1131272663ebfcb58b80b926c1aad6fd6d75b. For more details please see the references link. | null | 2022-04-25T06:37:20.340583Z | 2022-04-24T21:16:05.188569Z | null | null | null | null | null |
Linux | GSD-2021-1000413 | sctp: do asoc update earlier in sctp_sf_do_dupcook_a | sctp: do asoc update earlier in sctp_sf_do_dupcook_a
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.120 by commit b1b31948c0af44628e43353828453461bb74098f, it was introduced in version v5.4.41 by commit a204d577be70e0a0a6023cf1b9859c9ebffaeecd. For more details please see the references link. | null | 2021-12-19T22:34:24.608645Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a204d577be70e0a0a6023cf1b9859c9ebffaeecd'} |
Linux | GSD-2022-1002302 | mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0) | mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0)
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit e2c328c2a8f9de8b761bd4025b66c63120c55761. For more details please see the references link. | null | 2022-04-25T05:45:26.533598Z | 2022-04-24T22:32:11.944780Z | null | null | null | null | null |
Linux | GSD-2021-1001652 | RDMA/cma: Do not change route.addr.src_addr.ss_family | RDMA/cma: Do not change route.addr.src_addr.ss_family
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.71 by commit 0a16c9751e0f1de96f08643216cf1f19e8a5a787, it was introduced in version v5.10 by commit 732d41c545bb359cbb8c94698bdc1f8bcf82279c. For more details please see the references link. | null | 2021-12-20T00:01:53.858347Z | 2021-10-19T16:30:08.067943Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/732d41c545bb359cbb8c94698bdc1f8bcf82279c'} |
Linux | GSD-2021-1000940 | wq: handle VM suspension in stall detection | wq: handle VM suspension in stall detection
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.44 by commit ad241cb1cffbe7f9d121ba728a381416e8540954. For more details please see the references link. | null | 2021-12-20T00:28:55.020056Z | 2021-06-30T00:25:52.649591Z | null | null | null | null | null |
Linux | GSD-2022-1000295 | parisc: Fix data TLB miss in sba_unmap_sg | parisc: Fix data TLB miss in sba_unmap_sg
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.303 by commit f23f0444ead4d941165aa82ce2fcbb997dc00e97. For more details please see the references link. | null | 2022-03-07T01:49:43.300169Z | 2022-02-27T02:47:35.524773Z | null | null | null | null | null |
Linux | GSD-2021-1001202 | tty: serial: 8250: serial_cs: Fix a memory leak in error handling path | tty: serial: 8250: serial_cs: Fix a memory leak in error handling path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.4 by commit b2ef1f5de40342de44fc5355321595f91774dab5. For more details please see the references link. | null | 2021-12-20T01:19:42.175358Z | 2021-08-03T01:36:13.606733Z | null | null | null | null | null |
Linux | GSD-2022-1000780 | iommu/vt-d: Fix double list_add when enabling VMD in scalable mode | iommu/vt-d: Fix double list_add when enabling VMD in scalable mode
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.27 by commit 2aaa085bd012a83be7104356301828585a2253ed, it was introduced in version v5.14 by commit 474dd1c6506411752a9b2f2233eec11f1733a099. For more details please see the references link. | null | 2022-03-18T02:49:43.311849Z | 2022-03-18T00:17:37.156971Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/474dd1c6506411752a9b2f2233eec11f1733a099'} |
Linux | GSD-2022-1001892 | block: don't delete queue kobject before its children | block: don't delete queue kobject before its children
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit efaa0e969261e97c1fdd8e0338e5dd3ba5b9219c, it was introduced in version v4.16 by commit 2c2086afc2b8b974fac32cb028e73dc27bfae442. For more details please see the references link. | null | 2022-04-25T03:11:49.869527Z | 2022-04-24T21:52:37.705101Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c2086afc2b8b974fac32cb028e73dc27bfae442'} |
Linux | GSD-2021-1001717 | ipack: ipoctal: fix stack information leak | ipack: ipoctal: fix stack information leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit 0a9c36a2e06a249acbed64e8e0b84637c2ad7575, it was introduced in version v3.5 by commit ba4dc61fe8c545a5d6a68b63616776556b771f51. For more details please see the references link. | null | 2021-12-20T00:15:07.872406Z | 2021-10-19T16:33:18.935161Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ba4dc61fe8c545a5d6a68b63616776556b771f51'} |
Linux | GSD-2021-1000805 | io_uring: fix ltout double free on completion race | io_uring: fix ltout double free on completion race
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit 1f64f5e903b9d1d157875721e02adadc9d6f0a5d, it was introduced in version v5.11 by commit 90cd7e424969d29aff653333b4dcb4e2e199d791. For more details please see the references link. | null | 2021-12-20T01:35:52.209441Z | 2021-06-25T00:08:30.486275Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/90cd7e424969d29aff653333b4dcb4e2e199d791'} |
Linux | GSD-2021-1002838 | kfence: fix memory leak when cat kfence objects | kfence: fix memory leak when cat kfence objects
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.12 by commit 2f06c8293d27f6337f907042c602c9c953988c48, it was introduced in version v5.12 by commit 0ce20dd840897b12ae70869c69f1ba34d6d16965. For more details please see the references link. | null | 2022-01-11T05:57:55.770190Z | 2021-12-30T02:45:43.403363Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0ce20dd840897b12ae70869c69f1ba34d6d16965'} |
Linux | GSD-2022-1002247 | drm/tegra: Fix reference leak in tegra_dsi_ganged_probe | drm/tegra: Fix reference leak in tegra_dsi_ganged_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit a725070701883fe62266ee6d2f31d67e6cdd31df, it was introduced in version v3.19 by commit e94236cde4d519cdecd45e2435defba33abdc99f. For more details please see the references link. | null | 2022-04-25T05:28:37.890814Z | 2022-04-24T22:25:49.068001Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e94236cde4d519cdecd45e2435defba33abdc99f'} |
Linux | GSD-2021-1001347 | smackfs: restrict bytes count in smk_set_cipso() | smackfs: restrict bytes count in smk_set_cipso()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.133 by commit 135122f174c357b7a3e58f40fa5792156c5e93e6. For more details please see the references link. | null | 2021-12-19T23:44:31.206758Z | 2021-08-03T02:14:00.667610Z | null | null | null | null | null |
Linux | GSD-2022-1001938 | ALSA: pcm: Fix races among concurrent hw_params and hw_free calls | ALSA: pcm: Fix races among concurrent hw_params and hw_free calls
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.32 by commit 33061d0fba51d2bf70a2ef9645f703c33fe8e438. For more details please see the references link. | null | 2022-04-25T05:51:13.257108Z | 2022-04-24T21:56:28.440946Z | null | null | null | null | null |
Linux | GSD-2022-1001191 | ax25: Fix NULL pointer dereferences in ax25 timers | ax25: Fix NULL pointer dereferences in ax25 timers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit a45dba71849a963c427637b3330e2ccf098f42d1, it was introduced in version v5.17 by commit 7ec02f5ac8a5be5a3f20611731243dc5e1d9ba10. For more details please see the references link. | null | 2022-04-25T03:14:02.987246Z | 2022-04-24T20:52:22.129112Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ec02f5ac8a5be5a3f20611731243dc5e1d9ba10'} |
Linux | GSD-2021-1000106 | md/raid1: properly indicate failure when ending a failed write request | md/raid1: properly indicate failure when ending a failed write request
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.20 by commit 59452e551784b7a57a45d971727e9db63b192515, it was introduced in version v5.4 by commit eeba6809d8d58908b5ed1b5ceb5fcb09a98a7cad. For more details please see the references link. | null | 2021-12-20T00:53:31.573415Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/eeba6809d8d58908b5ed1b5ceb5fcb09a98a7cad'} |
Linux | GSD-2021-1000556 | drm/meson: fix shutdown crash when component not probed | drm/meson: fix shutdown crash when component not probed
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit b4b91033a0b11fe9ade58156cd9168f89f4a8c1a, it was introduced in version v5.12 by commit fa0c16caf3d73ab4d2e5d6fa2ef2394dbec91791. For more details please see the references link. | null | 2021-12-20T00:53:29.484183Z | 2021-06-04T19:38:12.655017Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fa0c16caf3d73ab4d2e5d6fa2ef2394dbec91791'} |
Linux | GSD-2021-1002091 | drm/msm/submit: fix overflow check on 64-bit architectures | drm/msm/submit: fix overflow check on 64-bit architectures
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit 00ba7a3951f4ea7c91b29e2bfbb3a4ecf72bf542, it was introduced in version v5.11 by commit 20224d715a882210428ea62bba93f1bc4a0afe23. For more details please see the references link. | null | 2021-12-19T22:45:38.142228Z | 2021-11-14T15:19:25.342915Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/20224d715a882210428ea62bba93f1bc4a0afe23'} |
Linux | GSD-2022-1000503 | arm64: dts: meson-sm1-odroid: use correct enable-gpio pin for tf-io regulator | arm64: dts: meson-sm1-odroid: use correct enable-gpio pin for tf-io regulator
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 0a0a0be9ed6144ffb1698487d7c7bff3543cfe9c, it was introduced in version v5.14 by commit 1f80a5cf74a60997b92d2cde772edec093bec4d9. For more details please see the references link. | null | 2022-03-07T01:44:22.658569Z | 2022-02-27T03:16:03.604739Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1f80a5cf74a60997b92d2cde772edec093bec4d9'} |
Linux | GSD-2021-1001594 | sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb | sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.151 by commit ec018021cf445abbe8e2f3e2a7f1dcc813cb8ea1, it was introduced in version v4.8 by commit 3acb50c18d8d6650f10919464ade4dcdaf41d62f. For more details please see the references link. | null | 2021-12-19T22:39:38.560729Z | 2021-10-19T16:25:26.670929Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3acb50c18d8d6650f10919464ade4dcdaf41d62f'} |
Linux | GSD-2022-1002494 | kgdboc: fix return value of __setup handler | kgdboc: fix return value of __setup handler
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit 1e7e9c5794bed0bc87c687d9496c83f1c389e7b4, it was introduced in version v4.9.137 by commit c90ea7d8b3109d2a09af1791908f0edd91bbe745. For more details please see the references link. | null | 2022-04-25T06:13:56.449241Z | 2022-04-24T22:53:54.601923Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c90ea7d8b3109d2a09af1791908f0edd91bbe745'} |
Linux | GSD-2022-1000153 | i40e: Fix queues reservation for XDP | i40e: Fix queues reservation for XDP
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.176 by commit be6998f232b8e4ca8225029e305b8329d89bfd59, it was introduced in version v3.12 by commit 41c445ff0f482bb6e6b72dcee9e598e20575f743. For more details please see the references link. | null | 2022-02-19T10:59:54.451322Z | 2022-02-18T21:47:53.785475Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41c445ff0f482bb6e6b72dcee9e598e20575f743'} |
Linux | GSD-2021-1002642 | xen/netfront: harden netfront against event channel storms | xen/netfront: harden netfront against event channel storms
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.259 by commit 4bf81386e3d6e5083c93d51eff70260bcec091bb. For more details please see the references link. | null | 2022-01-11T06:43:51.881657Z | 2021-12-27T05:29:09.800510Z | null | null | null | null | null |
Linux | GSD-2022-1001312 | jffs2: fix use-after-free in jffs2_clear_xattr_subsystem | jffs2: fix use-after-free in jffs2_clear_xattr_subsystem
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 8c0f024f29e055840a5a89fe23b96ae3f921afed, it was introduced in version v2.6.18 by commit aa98d7cf59b5b0764d3502662053489585faf2fe. For more details please see the references link. | null | 2022-04-25T05:22:48.859727Z | 2022-04-24T21:03:34.577670Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/aa98d7cf59b5b0764d3502662053489585faf2fe'} |
Linux | GSD-2021-1000385 | spi: Fix use-after-free with devm_spi_alloc_* | spi: Fix use-after-free with devm_spi_alloc_*
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit c7fabe372a9031acd00498bc718ce27c253abfd1, it was introduced in version v5.10 by commit 5e844cc37a5cbaa460e68f9a989d321d63088a89. For more details please see the references link. | null | 2021-12-19T23:57:15.800993Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5e844cc37a5cbaa460e68f9a989d321d63088a89'} |
Linux | GSD-2021-1002212 | comedi: dt9812: fix DMA buffers on stack | comedi: dt9812: fix DMA buffers on stack
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.2 by commit 20cebb8b620dc987e55ddc46801de986e081757e, it was introduced in version v2.6.29 by commit 63274cd7d38a3322d90b66a5bc976de1fb899051. For more details please see the references link. | null | 2021-12-20T01:35:01.324459Z | 2021-11-14T15:24:54.795770Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63274cd7d38a3322d90b66a5bc976de1fb899051'} |
Linux | GSD-2022-1000850 | usb: gadget: rndis: add spinlock for rndis response list | usb: gadget: rndis: add spinlock for rndis response list
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.103 by commit 4ce247af3f30078d5b97554f1ae6200a0222c15a, it was introduced in version v4.6 by commit f6281af9d62e128aa6efad29cf7265062af114f2. For more details please see the references link. | null | 2022-03-18T02:58:25.735374Z | 2022-03-18T00:23:59.526351Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f6281af9d62e128aa6efad29cf7265062af114f2'} |
Linux | GSD-2022-1001742 | Revert "nbd: fix possible overflow on 'first_minor' in nbd_dev_add()" | Revert "nbd: fix possible overflow on 'first_minor' in nbd_dev_add()"
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 3b14aa053181709d42319d4145855025c23ddd12. For more details please see the references link. | null | 2022-04-25T06:35:46.415292Z | 2022-04-24T21:38:40.485643Z | null | null | null | null | null |
Linux | GSD-2022-1001257 | ASoC: atmel: Fix error handling in snd_proto_probe | ASoC: atmel: Fix error handling in snd_proto_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 8fa969cd8485031294f91fc7184399000cae6355, it was introduced in version v4.20 by commit a45f8853a5f95e3760dfbd7ba09d3d597d247040. For more details please see the references link. | null | 2022-04-25T04:00:14.568303Z | 2022-04-24T20:58:35.560205Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a45f8853a5f95e3760dfbd7ba09d3d597d247040'} |
Linux | GSD-2021-1001828 | NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() | NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.155 by commit 7ab488d7228a9dceb2456867f1f0919decf6efed, it was introduced in version v3.13 by commit 1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8. For more details please see the references link. | null | 2021-12-19T23:03:52.154724Z | 2021-10-28T13:50:58.541494Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8'} |
Linux | GSD-2021-1002707 | net/packet: rx_owner_map depends on pg_vec | net/packet: rx_owner_map depends on pg_vec
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.88 by commit 7da349f07e457cad135df0920a3f670e423fb5e9, it was introduced in version v5.6 by commit 61fad6816fc10fb8793a925d5c1256d1c3db0cd2. For more details please see the references link. | null | 2022-01-11T05:47:42.223106Z | 2021-12-27T05:38:16.032420Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61fad6816fc10fb8793a925d5c1256d1c3db0cd2'} |
Linux | GSD-2022-1000915 | vhost/vsock: don't check owner in vhost_vsock_stop() while releasing | vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.232 by commit 914f93fee61a05b524ed8d8d795fa236d19f4400, it was introduced in version v4.8 by commit 433fc58e6bf2c8bd97e57153ed28e64fd78207b8. For more details please see the references link. | null | 2022-03-18T03:44:04.501486Z | 2022-03-18T00:31:43.244912Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/433fc58e6bf2c8bd97e57153ed28e64fd78207b8'} |
Linux | GSD-2022-1001607 | cifs: fix NULL ptr dereference in smb2_ioctl_query_info() | cifs: fix NULL ptr dereference in smb2_ioctl_query_info()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 0f0ce73e7dad17084222da19989049ebfb8be541. For more details please see the references link. | null | 2022-04-25T05:26:13.269247Z | 2022-04-24T21:27:54.458192Z | null | null | null | null | null |
Linux | GSD-2021-1001982 | mm, slub: fix mismatch between reconstructed freelist depth and cnt | mm, slub: fix mismatch between reconstructed freelist depth and cnt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.214 by commit 21e23e4c02fc9aa1f4b037f30e47d215d1a27f21, it was introduced in version v4.17 by commit c3895391df385c6628638f014c87e16f5e2efd45. For more details please see the references link. | null | 2021-12-19T23:56:58.245214Z | 2021-11-14T15:14:31.760215Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c3895391df385c6628638f014c87e16f5e2efd45'} |
Linux | GSD-2021-1000690 | tipc: skb_linearize the head skb when reassembling msgs | tipc: skb_linearize the head skb when reassembling msgs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.271 by commit 5489f30bb78ff0dafb4229a69632afc2ba20765c, it was introduced in version v4.3 by commit 45c8b7b175ceb2d542e0fe15247377bf3bce29ec. For more details please see the references link. | null | 2021-12-19T23:00:10.336099Z | 2021-06-04T20:03:00.675178Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/45c8b7b175ceb2d542e0fe15247377bf3bce29ec'} |
Linux | GSD-2021-1002357 | scsi: mpt3sas: Fix kernel panic during drive powercycle test | scsi: mpt3sas: Fix kernel panic during drive powercycle test
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.294 by commit 5d4d50b1f159a5ebab7617f47121b4370aa58afe, it was introduced in version v3.8 by commit f92363d12359498f9a9960511de1a550f0ec41c2. For more details please see the references link. | null | 2021-12-20T01:00:01.774027Z | 2021-12-19T19:33:47.459392Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f92363d12359498f9a9960511de1a550f0ec41c2'} |
Linux | GSD-2022-1000446 | vt_ioctl: fix array_index_nospec in vt_setactivate | vt_ioctl: fix array_index_nospec in vt_setactivate
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit ffe54289b02e9c732d6f04c8ebbe3b2d90d32118. For more details please see the references link. | null | 2022-03-07T01:40:11.304183Z | 2022-02-27T03:08:14.980331Z | null | null | null | null | null |
Linux | GSD-2022-1002181 | dpaa2-ptp: Fix refcount leak in dpaa2_ptp_probe | dpaa2-ptp: Fix refcount leak in dpaa2_ptp_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit fbe5f4c0dd3475178f17ddd8b8d5044ebeae0be7, it was introduced in version v5.3 by commit d346c9e86d8685d7cdceddf5b2e9c4376334620c. For more details please see the references link. | null | 2022-04-25T07:37:08.858786Z | 2022-04-24T22:19:29.269038Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d346c9e86d8685d7cdceddf5b2e9c4376334620c'} |
Linux | GSD-2022-1000016 | net: fix use-after-free in tw_timer_handler | net: fix use-after-free in tw_timer_handler
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.261 by commit 5c2fe20ad37ff56070ae0acb34152333976929b4, it was introduced in version v2.6.27 by commit 61a7e26028b94805fd686a6dc9dbd9941f8f19b0. For more details please see the references link. | null | 2022-01-11T05:54:01.028263Z | 2022-01-10T19:50:17.942238Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61a7e26028b94805fd686a6dc9dbd9941f8f19b0'} |
Linux | GSD-2021-1001081 | x86/ioremap: Map EFI-reserved memory as encrypted for SEV | x86/ioremap: Map EFI-reserved memory as encrypted for SEV
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit b7a05aba39f733ec337c5b952e112dd2dc4fc404, it was introduced in version v5.10 by commit 58c909022a5a56cd1d9e89c8c5461fd1f6a27bb5. For more details please see the references link. | null | 2021-12-19T23:41:00.046268Z | 2021-06-30T00:38:21.249314Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/58c909022a5a56cd1d9e89c8c5461fd1f6a27bb5'} |
Linux | GSD-2022-1000061 | usb: mtu3: fix list_head check warning | usb: mtu3: fix list_head check warning
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.13 by commit 249ddfbe00570d6dc76208e88017937d4d374c79, it was introduced in version v5.2 by commit 83374e035b6286731c5aa617844c7b724294c2a7. For more details please see the references link. | null | 2022-01-11T05:48:20.554431Z | 2022-01-10T19:52:20.263637Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/83374e035b6286731c5aa617844c7b724294c2a7'} |
Linux | GSD-2022-1000431 | net: dsa: lantiq_gswip: don't use devres for mdiobus | net: dsa: lantiq_gswip: don't use devres for mdiobus
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit b5652bc50dde7b84e93dfb25479b64b817e377c1, it was introduced in version v5.9 by commit ac3a68d56651c3dad2c12c7afce065fe15267f44. For more details please see the references link. | null | 2022-03-07T01:33:50.227090Z | 2022-02-27T03:06:32.884313Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac3a68d56651c3dad2c12c7afce065fe15267f44'} |
Linux | GSD-2021-1002320 | net/mlx5e: nullify cq->dbg pointer in mlx5_debug_cq_remove() | net/mlx5e: nullify cq->dbg pointer in mlx5_debug_cq_remove()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit 2ae38157080616a13a9fe3f0b4b6ec0070aa408a, it was introduced in version v5.15 by commit 94b960b9deffc02fc0747afc01f72cc62ab099e3. For more details please see the references link. | null | 2021-12-20T00:07:07.517108Z | 2021-11-29T02:38:36.306378Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/94b960b9deffc02fc0747afc01f72cc62ab099e3'} |
Linux | GSD-2022-1000962 | ipv6: fix panic when forwarding a pkt with no in6 dev | ipv6: fix panic when forwarding a pkt with no in6 dev
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.4 by commit e69fb3de87a8923e5931a272a38fa3cceb01da44, it was introduced in version v5.14 by commit ccd27f05ae7b8ebc40af5b004e94517a919aa862. For more details please see the references link. | null | 2022-04-25T04:20:04.577827Z | 2022-04-24T20:35:25.515301Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ccd27f05ae7b8ebc40af5b004e94517a919aa862'} |
Linux | GSD-2022-1001670 | ata: sata_dwc_460ex: Fix crash due to OOB write | ata: sata_dwc_460ex: Fix crash due to OOB write
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 8a05a6952ecd59aaa62cbdcdaf523ae2c8f436e8, it was introduced in version v4.18 by commit 28361c403683c2b00d4f5e76045f3ccd299bf99d. For more details please see the references link. | null | 2022-04-25T03:50:09.978496Z | 2022-04-24T21:33:41.812064Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/28361c403683c2b00d4f5e76045f3ccd299bf99d'} |
Linux | GSD-2021-1002770 | xen/netfront: harden netfront against event channel storms | xen/netfront: harden netfront against event channel storms
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit a29c8b5226eda52e6d6ff151d9343558ea3ad451. For more details please see the references link. | null | 2022-01-11T08:30:41.995794Z | 2021-12-27T05:53:37.770205Z | null | null | null | null | null |
Linux | GSD-2022-1001220 | drm/tegra: Fix reference leak in tegra_dsi_ganged_probe | drm/tegra: Fix reference leak in tegra_dsi_ganged_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit f3c99c686e098300c246e5e8a1474133e3dacb05, it was introduced in version v3.19 by commit e94236cde4d519cdecd45e2435defba33abdc99f. For more details please see the references link. | null | 2022-04-25T05:15:41.503055Z | 2022-04-24T20:55:10.972907Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e94236cde4d519cdecd45e2435defba33abdc99f'} |
Linux | GSD-2022-1000827 | net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe() | net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.104 by commit 5f394102ee27dbf051a4e283390cd8d1759dacea, it was introduced in version v3.18 by commit 8c14f9c70327a6fb75534c4c61d7ea9c82ccf78f. For more details please see the references link. | null | 2022-03-18T02:50:13.170519Z | 2022-03-18T00:21:54.418277Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c14f9c70327a6fb75534c4c61d7ea9c82ccf78f'} |
Linux | GSD-2022-1001735 | ath11k: pci: fix crash on suspend if board file is not found | ath11k: pci: fix crash on suspend if board file is not found
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit fed4cef115ab21a18faf499b3fa9b9a4b544f941. For more details please see the references link. | null | 2022-04-25T06:01:46.086571Z | 2022-04-24T21:38:20.087561Z | null | null | null | null | null |
Linux | GSD-2021-1000258 | liquidio: Fix unintented sign extension of a left shift of a u16 | liquidio: Fix unintented sign extension of a left shift of a u16
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 769003fd970c05a2ad21fee5429dd5a49feefd09, it was introduced in version v4.9 by commit 5bc67f587ba7eaa8dd3976bfeff8f2b60718c871. For more details please see the references link. | null | 2021-12-19T22:01:57.196005Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5bc67f587ba7eaa8dd3976bfeff8f2b60718c871'} |
Linux | GSD-2021-1002265 | perf bpf: Avoid memory leak from perf_env__insert_btf() | perf bpf: Avoid memory leak from perf_env__insert_btf()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.162 by commit 642fc22210a5e59d40b1e4d56d21ec3effd401f2, it was introduced in version v5.1 by commit 3792cb2ff43b1b193136a03ce1336462a827d792. For more details please see the references link. | null | 2021-12-20T00:35:44.924460Z | 2021-11-29T02:36:04.247909Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3792cb2ff43b1b193136a03ce1336462a827d792'} |
Linux | GSD-2022-1001365 | net/tls: fix slab-out-of-bounds bug in decrypt_internal | net/tls: fix slab-out-of-bounds bug in decrypt_internal
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 29be1816cbab9a0dc6243120939fd10a92753756, it was introduced in version v5.2 by commit f295b3ae9f5927e084bd5decdff82390e3471801. For more details please see the references link. | null | 2022-04-25T06:36:44.690794Z | 2022-04-24T21:08:15.719926Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f295b3ae9f5927e084bd5decdff82390e3471801'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.