ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2021-1000608 | iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers | iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.42 by commit f70122825076117787b91e7f219e21c09f11a5b9, it was introduced in version v5.5 by commit d7857e4ee1ba69732b16c73b2f2dde83ecd78ee4. For more details please see the references link. | null | 2021-12-20T01:16:36.541503Z | 2021-06-04T19:46:47.525350Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d7857e4ee1ba69732b16c73b2f2dde83ecd78ee4'} |
Linux | GSD-2021-1002635 | sit: do not call ipip6_dev_free() from sit_init_net() | sit: do not call ipip6_dev_free() from sit_init_net()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.259 by commit 4e1797914d8f223726ff6ae5ece4f97d73f21bab, it was introduced in version v4.12 by commit cf124db566e6b036b8bcbe8decbed740bdfac8c6. For more details please see the references link. | null | 2022-01-11T05:57:41.676414Z | 2021-12-27T05:28:18.186978Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cf124db566e6b036b8bcbe8decbed740bdfac8c6'} |
Linux | GSD-2022-1002119 | video: fbdev: sm712fb: Fix crash in smtcfb_read() | video: fbdev: sm712fb: Fix crash in smtcfb_read()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 72af8810922eb143ed4f116db246789ead2d8543. For more details please see the references link. | null | 2022-04-25T06:22:42.772004Z | 2022-04-24T22:13:28.961664Z | null | null | null | null | null |
Linux | GSD-2022-1000124 | i40e: Fix queues reservation for XDP | i40e: Fix queues reservation for XDP
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.228 by commit d46fa4ea9756ef6cbcf9752d0832cc66e2d7121b, it was introduced in version v3.12 by commit 41c445ff0f482bb6e6b72dcee9e598e20575f743. For more details please see the references link. | null | 2022-02-19T10:55:54.013849Z | 2022-02-18T21:43:48.615565Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41c445ff0f482bb6e6b72dcee9e598e20575f743'} |
Linux | GSD-2021-1001449 | watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() | watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.276 by commit b4565a8a2d6bffb05bfbec11399d261ec16fe373. For more details please see the references link. | null | 2021-12-20T00:09:16.945303Z | 2021-08-03T02:44:51.810479Z | null | null | null | null | null |
Linux | GSD-2022-1000574 | btrfs: fix use-after-free after failure to create a snapshot | btrfs: fix use-after-free after failure to create a snapshot
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.22 by commit a7b717fa15165d3d9245614680bebc48a52ac05d. For more details please see the references link. | null | 2022-03-07T02:39:22.543491Z | 2022-02-27T03:25:36.398517Z | null | null | null | null | null |
Linux | GSD-2021-1001019 | drm: Fix use-after-free read in drm_getunique() | drm: Fix use-after-free read in drm_getunique()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.11 by commit f773f8cccac13c7e7bbd9182e7996c727742488e. For more details please see the references link. | null | 2021-12-20T00:47:05.652590Z | 2021-06-30T00:34:17.872934Z | null | null | null | null | null |
Linux | GSD-2021-1000521 | Bluetooth: SMP: Fail if remote and local public keys are identical | Bluetooth: SMP: Fail if remote and local public keys are identical
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.7 by commit 58cca5ec43be72a1af95f11966381e9953b0c9f5, it was introduced in version v3.17 by commit bfe01a5ba2490f299e1d2d5508cbbbadd897bbe9. For more details please see the references link. | null | 2021-12-19T22:36:45.367337Z | 2021-05-31T23:50:21.706053Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bfe01a5ba2490f299e1d2d5508cbbbadd897bbe9'} |
Linux | GSD-2021-1000171 | ext4: fix check to prevent false positive report of incorrect used inodes | ext4: fix check to prevent false positive report of incorrect used inodes
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.118 by commit 9c61387630a54e35b96a90608aafd369ffb86f39, it was introduced in version v4.18 by commit 5012284700775a4e6e3fbe7eac4c543c4874b559. For more details please see the references link. | null | 2021-12-20T00:45:30.242836Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5012284700775a4e6e3fbe7eac4c543c4874b559'} |
Linux | GSD-2021-1001330 | watchdog: Fix possible use-after-free by calling del_timer_sync() | watchdog: Fix possible use-after-free by calling del_timer_sync()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.134 by commit db222f1477ad5692cd454709b714949807e5d111. For more details please see the references link. | null | 2021-12-19T22:27:27.373680Z | 2021-08-03T02:10:51.248920Z | null | null | null | null | null |
Linux | GSD-2022-1002230 | NFS: remove unneeded check in decode_devicenotify_args() | NFS: remove unneeded check in decode_devicenotify_args()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit efc605469e4773690bfd09aee946ebd62bde7609, it was introduced in version v4.0 by commit a4f743a6bb201662962fa888e3f978583d61691e. For more details please see the references link. | null | 2022-04-25T04:25:39.178941Z | 2022-04-24T22:23:40.864077Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a4f743a6bb201662962fa888e3f978583d61691e'} |
Linux | GSD-2021-1001760 | afs: Fix page leak | afs: Fix page leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.9 by commit d130b5fdd42254d92948d06347940276140c927e, it was introduced in version v5.13 by commit e87b03f5830ecd8ca21836d3ee48c74f8d58fa31. For more details please see the references link. | null | 2021-12-20T00:09:41.249935Z | 2021-10-19T16:35:24.465648Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e87b03f5830ecd8ca21836d3ee48c74f8d58fa31'} |
Linux | GSD-2021-1000872 | drm: Fix use-after-free read in drm_getunique() | drm: Fix use-after-free read in drm_getunique()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.195 by commit 7d233ba700ceb593905ea82b42dadb4ec8ef85e9. For more details please see the references link. | null | 2021-12-20T00:54:06.732860Z | 2021-06-30T00:02:46.319031Z | null | null | null | null | null |
Linux | GSD-2021-1001275 | scsi: megaraid_sas: Fix resource leak in case of probe failure | scsi: megaraid_sas: Fix resource leak in case of probe failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.52 by commit 0680db6f41920b2c91c7df3cc9cd5968701a6f74. For more details please see the references link. | null | 2021-12-19T22:22:46.050384Z | 2021-08-03T01:55:26.717802Z | null | null | null | null | null |
Linux | GSD-2022-1000718 | tipc: fix a bit overflow in tipc_crypto_key_rcv() | tipc: fix a bit overflow in tipc_crypto_key_rcv()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.13 by commit 35f4fa41a7eafd5bfbc1c440c38e87cf83857762. For more details please see the references link. | null | 2022-03-18T02:57:39.272332Z | 2022-03-18T00:12:02.885763Z | null | null | null | null | null |
Linux | GSD-2021-1001625 | drm/nouveau/kms/nv50-: fix file release memory leak | drm/nouveau/kms/nv50-: fix file release memory leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.73 by commit 65fff0a8efcdca8d84ffe3e23057c3b32403482d, it was introduced in version v5.9 by commit 12885ecbfe62df4358d452080d3b8feef54ec8cb. For more details please see the references link. | null | 2021-12-19T23:45:02.326446Z | 2021-10-19T16:28:50.038993Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/12885ecbfe62df4358d452080d3b8feef54ec8cb'} |
Linux | GSD-2021-1000937 | net/nfc/rawsock.c: fix a permission check bug | net/nfc/rawsock.c: fix a permission check bug
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.44 by commit 1e5cab50208c8fb7351b798cb1d569debfeb994a. For more details please see the references link. | null | 2021-12-20T01:26:37.629304Z | 2021-06-30T00:25:40.059887Z | null | null | null | null | null |
Linux | GSD-2022-1000348 | iwlwifi: fix use-after-free | iwlwifi: fix use-after-free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.181 by commit 494de920d98f125b099f27a2d274850750aff957, it was introduced in version v5.4.174 by commit 0446cafa843e6db4982731c167e11c80d42be7e2. For more details please see the references link. | null | 2022-03-07T01:34:24.341319Z | 2022-02-27T02:54:16.861282Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0446cafa843e6db4982731c167e11c80d42be7e2'} |
Linux | GSD-2022-1002375 | NFSD: prevent underflow in nfssvc_decode_writeargs() | NFSD: prevent underflow in nfssvc_decode_writeargs()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 9f0f048c1bfa7867d565a95fd8c28f4484ba1043. For more details please see the references link. | null | 2022-04-25T05:28:15.767085Z | 2022-04-24T22:40:36.714610Z | null | null | null | null | null |
Linux | GSD-2021-1002459 | ALSA: pcm: oss: Fix negative period/buffer sizes | ALSA: pcm: oss: Fix negative period/buffer sizes
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.165 by commit f12c8a7515f641885677960af450082569a87243. For more details please see the references link. | null | 2021-12-20T02:18:51.599785Z | 2021-12-19T19:38:16.578890Z | null | null | null | null | null |
Linux | GSD-2021-1000464 | ACPI: scan: Fix a memory leak in an error handling path | ACPI: scan: Fix a memory leak in an error handling path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.233 by commit 5ab9857dde7c3ea3faef6b128d718cf8ba98721b, it was introduced in version v4.14.228 by commit 717d9d88fbd956ab03fad97266f6ce63a036e7f8. For more details please see the references link. | null | 2021-12-19T23:01:31.762930Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/717d9d88fbd956ab03fad97266f6ce63a036e7f8'} |
Linux | GSD-2022-1001109 | rtc: gamecube: Fix refcount leak in gamecube_rtc_read_offset_from_sram | rtc: gamecube: Fix refcount leak in gamecube_rtc_read_offset_from_sram
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit de66e4f28dfd11f954966c447b4430529ed040a2, it was introduced in version v5.17 by commit 86559400b3ef9de93ba50523cffe767c35cd531a. For more details please see the references link. | null | 2022-04-25T03:35:15.185208Z | 2022-04-24T20:46:03.897267Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/86559400b3ef9de93ba50523cffe767c35cd531a'} |
Linux | GSD-2021-1002009 | powerpc/idle: Don't corrupt back chain when going idle | powerpc/idle: Don't corrupt back chain when going idle
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.156 by commit 8e25a62e8dab7bb09da337354ed1be5df61f83a0, it was introduced in version v5.4.156 by commit 80bbb0bc3a0288442f7fe6fc514f4ee1cb06ccb7. For more details please see the references link. | null | 2021-11-14T15:15:46.054537Z | 2021-11-14T15:15:46.054537Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80bbb0bc3a0288442f7fe6fc514f4ee1cb06ccb7'} |
Linux | GSD-2021-1000034 | libbpf: Fix potential NULL pointer dereference | libbpf: Fix potential NULL pointer dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.32 by commit 7f8e59c4c5e5142e3f0d78f8f01b523027bbf151, it was introduced in version v5.10.30 by commit 4cc9177b099e251bd1f7713a0517d622b1b442b1. For more details please see the references link. | null | 2021-12-20T00:48:15.396566Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4cc9177b099e251bd1f7713a0517d622b1b442b1'} |
Linux | GSD-2022-1001559 | ASoC: mediatek: mt8192-mt6359: Fix error handling in mt8192_mt6359_dev_probe | ASoC: mediatek: mt8192-mt6359: Fix error handling in mt8192_mt6359_dev_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit d5a38629f1aaf397fd471b27e49d55289ddc0656, it was introduced in version v5.16.3 by commit d1be8577f0b2f679095d237aaf281dca344f06c4. For more details please see the references link. | null | 2022-04-25T03:11:21.026674Z | 2022-04-24T21:23:29.305671Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d1be8577f0b2f679095d237aaf281dca344f06c4'} |
Linux | GSD-2022-1001277 | clocksource/drivers/exynos_mct: Handle DTS with higher number of interrupts | clocksource/drivers/exynos_mct: Handle DTS with higher number of interrupts
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit f154834fc36aa70d65801e49e2b09fb303aae296, it was introduced in version v3.10 by commit 36ba5d527e9567ed303bad6e86a5f3c2723470f6. For more details please see the references link. | null | 2022-04-25T05:28:09.599038Z | 2022-04-24T21:00:47.738655Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/36ba5d527e9567ed303bad6e86a5f3c2723470f6'} |
Linux | GSD-2021-1001808 | NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() | NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.213 by commit 9881b0c860649f27ef2565deef011e516390f416, it was introduced in version v3.13 by commit 1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8. For more details please see the references link. | null | 2021-12-20T01:37:25.256018Z | 2021-10-28T13:49:58.598763Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8'} |
Linux | GSD-2021-1002727 | firmware: arm_scpi: Fix string overflow in SCPI genpd driver | firmware: arm_scpi: Fix string overflow in SCPI genpd driver
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit 976389cbb16cee46847e5d06250a3a0b5506781e, it was introduced in version v4.8 by commit 8bec4337ad4023b26de35d3b0c3a3b2735ffc5c7. For more details please see the references link. | null | 2022-01-11T06:00:14.340890Z | 2021-12-27T05:39:27.531180Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8bec4337ad4023b26de35d3b0c3a3b2735ffc5c7'} |
Linux | GSD-2022-1000935 | vhost/vsock: don't check owner in vhost_vsock_stop() while releasing | vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.269 by commit 6ac6ca7907d7e6057a0aa4e9af48cbd2a8b2afaa, it was introduced in version v4.8 by commit 433fc58e6bf2c8bd97e57153ed28e64fd78207b8. For more details please see the references link. | null | 2022-03-18T03:43:50.473146Z | 2022-03-18T00:34:14.221423Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/433fc58e6bf2c8bd97e57153ed28e64fd78207b8'} |
Linux | GSD-2022-1001627 | tpm: use try_get_ops() in tpm-space.c | tpm: use try_get_ops() in tpm-space.c
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.18 by commit eda1662cce964c8a65bb86321f8d9cfa6e9ceaab. For more details please see the references link. | null | 2022-04-25T05:01:48.252523Z | 2022-04-24T21:29:52.649133Z | null | null | null | null | null |
Linux | GSD-2021-1002377 | net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() | net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.292 by commit b4f217d6fcc00c3fdc0921a7691f30be7490b073, it was introduced in version v3.9 by commit 7f9664525f9cb507de9198a395a111371413f230. For more details please see the references link. | null | 2021-12-19T22:30:32.802492Z | 2021-12-19T19:34:36.396283Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7f9664525f9cb507de9198a395a111371413f230'} |
Linux | GSD-2022-1000466 | drop_monitor: fix data-race in dropmon_net_event / trace_napi_poll_hit | drop_monitor: fix data-race in dropmon_net_event / trace_napi_poll_hit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit 3077976a752aa45392d0683f428ead099bc74661, it was introduced in version v2.6.31 by commit 4ea7e38696c7e798c47ebbecadfd392f23f814f9. For more details please see the references link. | null | 2022-03-07T01:38:21.696172Z | 2022-02-27T03:11:13.438007Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4ea7e38696c7e798c47ebbecadfd392f23f814f9'} |
Linux | GSD-2022-1000036 | tomoyo: Check exceeded quota early in tomoyo_domain_quota_is_ok(). | tomoyo: Check exceeded quota early in tomoyo_domain_quota_is_ok().
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.170 by commit 930d4986a432e89447ebf38be5244732c58ec9a3. For more details please see the references link. | null | 2022-01-11T05:47:11.498002Z | 2022-01-10T19:51:08.671646Z | null | null | null | null | null |
Linux | GSD-2022-1000523 | net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup | net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 9681823f96a811268265f35307072ad80713c274, it was introduced in version v3.9 by commit e2ca90c276e1fc410d7cd3c1a4eee245ec902a20. For more details please see the references link. | null | 2022-03-07T01:41:04.555494Z | 2022-02-27T03:19:08.593882Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e2ca90c276e1fc410d7cd3c1a4eee245ec902a20'} |
Linux | GSD-2022-1000489 | net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change | net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 5f6024c05a2c0fdd180b29395aaf686d25af3a0f. For more details please see the references link. | null | 2022-03-07T02:53:58.628364Z | 2022-02-27T03:14:29.262765Z | null | null | null | null | null |
Linux | GSD-2022-1000173 | iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() | iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.178 by commit 5c43d46daa0d2928234dd2792ebebc35d29ee2d1, it was introduced in version v5.4.54 by commit 36f7355545725c5e9400520ae33e6ee16cf78c0e. For more details please see the references link. | null | 2022-02-19T02:59:01.653993Z | 2022-02-18T21:50:56.283656Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/36f7355545725c5e9400520ae33e6ee16cf78c0e'} |
Linux | GSD-2021-1002662 | xen/blkfront: harden blkfront against event channel storms | xen/blkfront: harden blkfront against event channel storms
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.222 by commit 269d7124bcfad2558d2329d0fe603ca20b20d3f4. For more details please see the references link. | null | 2022-01-11T06:43:24.283447Z | 2021-12-27T05:34:50.359111Z | null | null | null | null | null |
Linux | GSD-2022-1001332 | ALSA: oss: Fix PCM OSS buffer allocation overflow | ALSA: oss: Fix PCM OSS buffer allocation overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.1 by commit e74a069c6a7bb505f3ade141dddf85f4b0b5145a. For more details please see the references link. | null | 2022-04-25T05:38:58.239814Z | 2022-04-24T21:05:12.805812Z | null | null | null | null | null |
Linux | GSD-2021-1002398 | serial: core: fix transmit-buffer reset and memleak | serial: core: fix transmit-buffer reset and memleak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.257 by commit e74d9663fd57640fc3394abb5c76fa95b9cc2f2e, it was introduced in version v4.9 by commit 761ed4a94582ab291aa24dcbea4e01e8936488c8. For more details please see the references link. | null | 2021-12-20T00:45:01.321968Z | 2021-12-19T19:35:34.364601Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/761ed4a94582ab291aa24dcbea4e01e8936488c8'} |
Linux | GSD-2021-1002232 | usb: musb: tusb6010: check return value after calling platform_get_resource() | usb: musb: tusb6010: check return value after calling platform_get_resource()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.291 by commit b3f43659eb0b9af2e6ef18a8d829374610b19e7a. For more details please see the references link. | null | 2021-12-19T22:34:05.411774Z | 2021-11-29T02:34:29.982744Z | null | null | null | null | null |
Linux | GSD-2022-1001298 | mm/kmemleak: reset tag when compare object pointer | mm/kmemleak: reset tag when compare object pointer
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit cf67c97a3064f8da06f499efc661b9303cef7720. For more details please see the references link. | null | 2022-04-25T04:27:07.623512Z | 2022-04-24T21:02:11.634480Z | null | null | null | null | null |
Linux | GSD-2022-1000870 | xen/gnttab: fix gnttab_end_foreign_access() without page specified | xen/gnttab: fix gnttab_end_foreign_access() without page specified
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.184 by commit 782e5ebcc888003731e6256048c758fc1ab84d3f. For more details please see the references link. | null | 2022-03-18T02:50:48.490789Z | 2022-03-18T00:26:12.150583Z | null | null | null | null | null |
Linux | GSD-2022-1001762 | ubifs: Fix 'ui->dirty' race between do_tmpfile() and writeback work | ubifs: Fix 'ui->dirty' race between do_tmpfile() and writeback work
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit a9662bec5a4dfc87b1503e26aec1aadfdf521658, it was introduced in version v4.9 by commit 474b93704f32163af4bfa728fddc570eba357353. For more details please see the references link. | null | 2022-04-25T06:12:56.089344Z | 2022-04-24T21:40:49.953334Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/474b93704f32163af4bfa728fddc570eba357353'} |
Linux | GSD-2021-1001737 | hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field | hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit 746011193f44f97f8784edcf8327c587946745fc. For more details please see the references link. | null | 2021-12-20T00:17:01.597560Z | 2021-10-19T16:34:16.389853Z | null | null | null | null | null |
Linux | GSD-2021-1002818 | NFSD: Fix READDIR buffer overflow | NFSD: Fix READDIR buffer overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.12 by commit eabc0aab98e5218ceecd82069b0d6fdfff5ee885, it was introduced in version v5.13 by commit f5dcccd647da513a89f3b6ca392b0c1eb050b9fc. For more details please see the references link. | null | 2022-01-11T05:57:58.439641Z | 2021-12-30T02:44:46.461866Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f5dcccd647da513a89f3b6ca392b0c1eb050b9fc'} |
Linux | GSD-2021-1000825 | x86/kvm: Disable all PV features on crash | x86/kvm: Disable all PV features on crash
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit 9b77839fd4b636c78ae75b2fc4fe8321ea0c9da3, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T00:40:37.008412Z | 2021-06-25T00:09:44.922896Z | null | null | null | null | null |
Linux | GSD-2022-1002267 | video: fbdev: sm712fb: Fix crash in smtcfb_read() | video: fbdev: sm712fb: Fix crash in smtcfb_read()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 478154be3a8c21ff106310bb1037b1fc9d81dc62. For more details please see the references link. | null | 2022-04-25T03:26:46.269782Z | 2022-04-24T22:28:26.315555Z | null | null | null | null | null |
Linux | GSD-2021-1001367 | netrom: Decrease sock refcount when sock timers expire | netrom: Decrease sock refcount when sock timers expire
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.199 by commit 9619cc7d97c3aa8ed3cfd2b8678b74fb6d6c7950, it was introduced in version v4.19.20 by commit 2c6b572458a9127e8070df13fa7f115c29ab1d92. For more details please see the references link. | null | 2021-12-19T22:40:36.009664Z | 2021-08-03T02:20:18.294018Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c6b572458a9127e8070df13fa7f115c29ab1d92'} |
Linux | GSD-2022-1001918 | mm: invalidate hwpoison page cache page in fault path | mm: invalidate hwpoison page cache page in fault path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 3bae72c2db693ec421647fbf7e7a097842e73276. For more details please see the references link. | null | 2022-04-25T06:46:53.941013Z | 2022-04-24T21:54:22.130091Z | null | null | null | null | null |
Linux | GSD-2021-1000126 | ovl: fix leaked dentry | ovl: fix leaked dentry
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.19 by commit cf3e3330bc5719fa9d658e3e2f596bde89344a94, it was introduced in version v5.8 by commit 6815f479ca90ee7fd2e28b2a420f796b974155fe. For more details please see the references link. | null | 2021-12-20T01:05:36.136626Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6815f479ca90ee7fd2e28b2a420f796b974155fe'} |
Linux | GSD-2021-1000576 | cxgb4: avoid accessing registers when clearing filters | cxgb4: avoid accessing registers when clearing filters
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.42 by commit 02f03883fdb10ad7e66717c70ea163a8d27ae6e7, it was introduced in version v5.2 by commit b1a79360ee862f8ada4798ad2346fa45bb41b527. For more details please see the references link. | null | 2021-12-20T01:19:47.344501Z | 2021-06-04T19:41:33.887433Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b1a79360ee862f8ada4798ad2346fa45bb41b527'} |
Linux | GSD-2021-1000599 | net/mlx5e: Fix null deref accessing lag dev | net/mlx5e: Fix null deref accessing lag dev
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.42 by commit 2e4b0b95a489259f9d35a3db17023061f8f3d587, it was introduced in version v5.8 by commit 7e51891a237f9ea319f53f9beb83afb0077d88e6. For more details please see the references link. | null | 2021-12-19T22:11:28.280147Z | 2021-06-04T19:45:06.988214Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7e51891a237f9ea319f53f9beb83afb0077d88e6'} |
Linux | GSD-2021-1000063 | sfc: farch: fix TX queue lookup in TX event handling | sfc: farch: fix TX queue lookup in TX event handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.3 by commit e531db1ea6f98c9612cb2de093a107c7eadfb96c, it was introduced in version v5.10 by commit 12804793b17c0e19115a90d98f2f3df0cb79e233. For more details please see the references link. | null | 2021-12-19T23:40:21.787747Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/12804793b17c0e19115a90d98f2f3df0cb79e233'} |
Linux | GSD-2021-1000433 | m68k: mvme147,mvme16x: Don't wipe PCC timer config bits | m68k: mvme147,mvme16x: Don't wipe PCC timer config bits
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.119 by commit f6a90818a32058fca62cda3a2027a6a2364e1878, it was introduced in version v5.2 by commit 7529b90d051e4629884771ba2b1d3a87d2c6a9d7. For more details please see the references link. | null | 2021-12-20T00:52:22.889689Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7529b90d051e4629884771ba2b1d3a87d2c6a9d7'} |
Linux | GSD-2021-1001388 | dm btree remove: assign new_root only when removal succeeds | dm btree remove: assign new_root only when removal succeeds
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.198 by commit 8fbae4a1bdb5b889490cdee929e68540151536e5. For more details please see the references link. | null | 2021-12-20T00:05:22.441782Z | 2021-08-03T02:26:32.925620Z | null | null | null | null | null |
Linux | GSD-2022-1002322 | drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj | drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 72d77ddb2224ebc00648f4f78f8a9a259dccbdf7. For more details please see the references link. | null | 2022-04-25T06:26:01.328240Z | 2022-04-24T22:34:13.725415Z | null | null | null | null | null |
Linux | GSD-2021-1001672 | enetc: Fix illegal access when reading affinity_hint | enetc: Fix illegal access when reading affinity_hint
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.70 by commit 6c3f1b741c6c2914ea120e3a5790d3e900152f7b, it was introduced in version v5.1 by commit d4fd0404c1c95b17880f254ebfee3485693fa8ba. For more details please see the references link. | null | 2021-12-19T21:43:54.239523Z | 2021-10-19T16:31:06.438433Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d4fd0404c1c95b17880f254ebfee3485693fa8ba'} |
Linux | GSD-2021-1000960 | ASoC: core: Fix Null-point-dereference in fmt_single_name() | ASoC: core: Fix Null-point-dereference in fmt_single_name()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.44 by commit 0e2c9aeb00289f279b8181fbd4c20765127d8943, it was introduced in version v5.10 by commit 45dd9943fce08f1b38352ff9453682253bdf19b7. For more details please see the references link. | null | 2021-12-20T00:34:12.232736Z | 2021-06-30T00:29:23.068345Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/45dd9943fce08f1b38352ff9453682253bdf19b7'} |
Linux | GSD-2022-1002288 | ALSA: pcm: Test for "silence" field in struct "pcm_format_data" | ALSA: pcm: Test for "silence" field in struct "pcm_format_data"
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.239 by commit eb04e3112a3516e483d60a9af9762961702a6c1b. For more details please see the references link. | null | 2022-04-25T05:42:56.691495Z | 2022-04-24T22:30:32.334132Z | null | null | null | null | null |
Linux | GSD-2021-1001222 | seq_buf: Fix overflow in seq_buf_putmem_hex() | seq_buf: Fix overflow in seq_buf_putmem_hex()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.3 by commit d57fcab190b60f43046d5836c3c56114b4f50080, it was introduced in version v2.6.27 by commit 5e3ca0ec76fce92daa4eed0d02de9c79b1fe3920. For more details please see the references link. | null | 2021-12-20T00:24:40.049148Z | 2021-08-03T01:40:33.349246Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5e3ca0ec76fce92daa4eed0d02de9c79b1fe3920'} |
Linux | GSD-2022-1000020 | Input: appletouch - initialize work before device registration | Input: appletouch - initialize work before device registration
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.261 by commit 292d2ac61fb0d9276a0f7b7ce4f50426f2a1c99f, it was introduced in version v2.6.23 by commit 5a6eb676d3bc4d7a6feab200a92437b62ad298da. For more details please see the references link. | null | 2022-01-11T05:48:24.806849Z | 2022-01-10T19:50:28.240530Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5a6eb676d3bc4d7a6feab200a92437b62ad298da'} |
Linux | GSD-2022-1000470 | perf bpf: Defer freeing string after possible strlen() on it | perf bpf: Defer freeing string after possible strlen() on it
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit bf4161eb7e3bc63986eab516b147196d2240d743, it was introduced in version v5.8 by commit 04f9bf2bac72480ca1d289b751b956dd1707a5d5. For more details please see the references link. | null | 2022-03-07T01:44:28.164191Z | 2022-02-27T03:11:40.761814Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/04f9bf2bac72480ca1d289b751b956dd1707a5d5'} |
Linux | GSD-2021-1002361 | net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() | net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.294 by commit 3a061d54e260b701b538873b43e399d9b8b83e03, it was introduced in version v3.9 by commit 7f9664525f9cb507de9198a395a111371413f230. For more details please see the references link. | null | 2021-12-19T23:50:46.957127Z | 2021-12-19T19:33:56.668393Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7f9664525f9cb507de9198a395a111371413f230'} |
Linux | GSD-2022-1001631 | llc: only change llc->dev when bind() succeeds | llc: only change llc->dev when bind() succeeds
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.18 by commit 313ab7d716675b12cfde3d78981f21785b139279, it was introduced in version v5.16.18 by commit 6f5bf395c60ed2643de51f2b1041cb0882e9d97f. For more details please see the references link. | null | 2022-04-24T21:30:13.029205Z | 2022-04-24T21:30:13.029205Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6f5bf395c60ed2643de51f2b1041cb0882e9d97f'} |
Linux | GSD-2022-1000923 | usb: gadget: clear related members when goto fail | usb: gadget: clear related members when goto fail
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.270 by commit 70959fa1a003cb7c6ed2fd0e0f887125d08b8bf6. For more details please see the references link. | null | 2022-03-18T02:56:27.747689Z | 2022-03-18T00:32:33.115958Z | null | null | null | null | null |
Linux | GSD-2022-1000889 | nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() | nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.182 by commit 5ad5886f85b6bd893e3ed19013765fb0c243c069, it was introduced in version v5.1 by commit 20cce88650981ec504d328dbbdd004d991eb8535. For more details please see the references link. | null | 2022-03-18T02:58:18.049881Z | 2022-03-18T00:28:28.761604Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/20cce88650981ec504d328dbbdd004d991eb8535'} |
Linux | GSD-2021-1002731 | net: netlink: af_netlink: Prevent empty skb by adding a check on len. | net: netlink: af_netlink: Prevent empty skb by adding a check on len.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.10 by commit 4c986072a8c9249b9398c7a18f216dc26a9f0e35. For more details please see the references link. | null | 2022-01-11T05:51:04.423714Z | 2021-12-27T05:45:16.820516Z | null | null | null | null | null |
Linux | GSD-2022-1001261 | ASoC: soc-compress: prevent the potentially use of null pointer | ASoC: soc-compress: prevent the potentially use of null pointer
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit f69a75cb8a98c6c487d620442c68595726a69f60, it was introduced in version v5.4 by commit 467fece8fbc6774a3a3bd0981e1a342fb5022706. For more details please see the references link. | null | 2022-04-25T05:30:22.610924Z | 2022-04-24T20:59:04.743101Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/467fece8fbc6774a3a3bd0981e1a342fb5022706'} |
Linux | GSD-2022-1001774 | mmc: host: Return an error when ->enable_sdio_irq() ops is missing | mmc: host: Return an error when ->enable_sdio_irq() ops is missing
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 251a11699fe5007363cb1ae9700256a3c777a551. For more details please see the references link. | null | 2022-04-25T06:57:55.759175Z | 2022-04-24T21:41:37.888384Z | null | null | null | null | null |
Linux | GSD-2022-1000866 | sr9700: sanity check for packet length | sr9700: sanity check for packet length
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.103 by commit 4f5f5411f0c14ac0b61d5e6a77d996dd3d5b5fd3. For more details please see the references link. | null | 2022-03-18T03:00:50.690161Z | 2022-03-18T00:25:56.408440Z | null | null | null | null | null |
Linux | GSD-2021-1002224 | scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq() | scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.293 by commit ad4776b5eb2e58af1226847fcd3b4f6d051674dd. For more details please see the references link. | null | 2021-12-20T00:55:21.340334Z | 2021-11-29T02:34:10.470086Z | null | null | null | null | null |
Linux | GSD-2021-1000219 | dmaengine: idxd: Fix potential null dereference on pointer status | dmaengine: idxd: Fix potential null dereference on pointer status
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.5 by commit 7bc402f843e7817a4a808e7b9ab0bcd7ffd55bfa, it was introduced in version v5.11 by commit 89e3becd8f821e507052e012d2559dcda59f538e. For more details please see the references link. | null | 2021-12-20T00:19:41.295653Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/89e3becd8f821e507052e012d2559dcda59f538e'} |
Linux | GSD-2022-1001324 | llc: only change llc->dev when bind() succeeds | llc: only change llc->dev when bind() succeeds
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.1 by commit d5ac598705e1eb40e952cf7c8fe8b48c8dea897e, it was introduced in version v5.17.1 by commit ef1a6fe3563cf47ce4fd555727ca80085cf18884. For more details please see the references link. | null | 2022-04-24T21:04:36.292813Z | 2022-04-24T21:04:36.292813Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef1a6fe3563cf47ce4fd555727ca80085cf18884'} |
Linux | GSD-2021-1002674 | rds: memory leak in __rds_conn_create() | rds: memory leak in __rds_conn_create()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.168 by commit 166f0adf7e7525c87595ceadb21a91e2a9519a1e, it was introduced in version v5.4.126 by commit a3842219a69d23d3b7cc72274af1beb51434449a. For more details please see the references link. | null | 2022-01-11T05:47:32.565452Z | 2021-12-27T05:36:13.820667Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a3842219a69d23d3b7cc72274af1beb51434449a'} |
Linux | GSD-2021-1000649 | drm/amd/amdgpu: fix refcount leak | drm/amd/amdgpu: fix refcount leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.193 by commit 599e5d61ace952b0bb9bd942b198bbd0cfded1d7, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T01:02:31.695613Z | 2021-06-04T19:54:45.368657Z | null | null | null | null | null |
Linux | GSD-2022-1000165 | rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() | rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.177 by commit bd43771ee9759dd9dfae946bff190e2c5a120de5, it was introduced in version v3.14 by commit ba7d49b1f0f8e5f24294a880ed576964059af5ef. For more details please see the references link. | null | 2022-02-19T02:53:38.269713Z | 2022-02-18T21:49:16.919767Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ba7d49b1f0f8e5f24294a880ed576964059af5ef'} |
Linux | GSD-2022-1002158 | gcc-plugins: latent_entropy: use /dev/urandom | gcc-plugins: latent_entropy: use /dev/urandom
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.190 by commit 7a9e1327ccb27fc87c51a943270992c3250454e4, it was introduced in version v4.9 by commit 38addce8b600ca335dc86fa3d48c890f1c6fa1f4. For more details please see the references link. | null | 2022-04-25T05:09:22.709172Z | 2022-04-24T22:16:54.090710Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/38addce8b600ca335dc86fa3d48c890f1c6fa1f4'} |
Linux | GSD-2021-1001408 | net: ti: fix UAF in tlan_remove_one | net: ti: fix UAF in tlan_remove_one
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.241 by commit 0538b0ab7d2c396e385694228c7cdcd2d2c514e9, it was introduced in version v3.10 by commit 1e0a8b13d35510e711fdf72e9a3e30bcb2bd49fa. For more details please see the references link. | null | 2021-12-20T00:18:20.505527Z | 2021-08-03T02:32:27.105872Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e0a8b13d35510e711fdf72e9a3e30bcb2bd49fa'} |
Linux | GSD-2022-1000535 | net: ieee802154: at86rf230: Stop leaking skb's | net: ieee802154: at86rf230: Stop leaking skb's
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit 1c72f04d52b7200bb83426a9bed378668271ea4a. For more details please see the references link. | null | 2022-03-07T02:59:40.857954Z | 2022-02-27T03:20:30.312670Z | null | null | null | null | null |
Linux | GSD-2022-1002508 | video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() | video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit d1b6a1f0c23b7164250479bf92e2893291dca539, it was introduced in version v3.2 by commit 3c8a63e22a0802fd56380f6ab305b419f18eb6f5. For more details please see the references link. | null | 2022-04-25T05:14:09.462084Z | 2022-04-24T22:56:14.650836Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c8a63e22a0802fd56380f6ab305b419f18eb6f5'} |
Linux | GSD-2021-1001058 | udp: fix race between close() and udp_abort() | udp: fix race between close() and udp_abort()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit 65310b0aff86980a011c7c7bfa487a333d4ca241, it was introduced in version v4.9 by commit 5d77dca82839ef016a93ad7acd7058b14d967752. For more details please see the references link. | null | 2021-12-20T00:52:58.494720Z | 2021-06-30T00:36:51.115979Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5d77dca82839ef016a93ad7acd7058b14d967752'} |
Linux | GSD-2021-1000560 | NFS: fix an incorrect limit in filelayout_decode_layout() | NFS: fix an incorrect limit in filelayout_decode_layout()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit d34fb628f6ef522f996205a9e578216bbee09e84, it was introduced in version v2.6.37 by commit 16b374ca439fb406e46e071f75428f5b033056f8. For more details please see the references link. | null | 2021-12-19T23:08:20.327958Z | 2021-06-04T19:38:57.087884Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/16b374ca439fb406e46e071f75428f5b033056f8'} |
Linux | GSD-2021-1000130 | thermal/drivers/cpufreq_cooling: Fix slab OOB issue | thermal/drivers/cpufreq_cooling: Fix slab OOB issue
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.36 by commit c24a20912eef00587416628149c438e885eb1304, it was introduced in version v5.8 by commit 371a3bc79c11b707d7a1b7a2c938dc3cc042fffb. For more details please see the references link. | null | 2021-12-20T00:08:09.204578Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/371a3bc79c11b707d7a1b7a2c938dc3cc042fffb'} |
Linux | GSD-2021-1000999 | KVM: X86: Fix x86_emulator slab cache leak | KVM: X86: Fix x86_emulator slab cache leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.46 by commit 3a9934d6b8dd8a91d61ed2d0d538fa27cb9192a3, it was introduced in version v5.7 by commit c9b8b07cded58c55ad2bf67e68b9bfae96092293. For more details please see the references link. | null | 2021-12-19T22:42:40.722675Z | 2021-06-30T00:32:18.498348Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c9b8b07cded58c55ad2bf67e68b9bfae96092293'} |
Linux | GSD-2021-1001371 | net: validate lwtstate->data before returning from skb_tunnel_info() | net: validate lwtstate->data before returning from skb_tunnel_info()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.199 by commit 8bb1589c89e61e3b182dd546f1021928ebb5c2a6, it was introduced in version v4.3 by commit 61adedf3e3f1d3f032c5a6a299978d91eff6d555. For more details please see the references link. | null | 2021-12-19T23:14:52.284204Z | 2021-08-03T02:21:30.235238Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61adedf3e3f1d3f032c5a6a299978d91eff6d555'} |
Linux | GSD-2022-1002271 | ASoC: SOF: Intel: Fix NULL ptr dereference when ENOMEM | ASoC: SOF: Intel: Fix NULL ptr dereference when ENOMEM
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 01df5f7627f1624d6bb0b8c0870a569b32adfbf8, it was introduced in version v5.2 by commit d16046ffa6de040bf580a64d5f4d0aa18258a854. For more details please see the references link. | null | 2022-04-25T07:27:49.805038Z | 2022-04-24T22:28:43.549100Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d16046ffa6de040bf580a64d5f4d0aa18258a854'} |
Linux | GSD-2021-1000833 | perf: Fix data race between pin_count increment/decrement | perf: Fix data race between pin_count increment/decrement
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.273 by commit 668bd53c549e1d6de8873c9037de98f042240b1e, it was introduced in version v2.6.39 by commit fe4b04fa31a6dcf4358aa84cf81e5a7fd079469b. For more details please see the references link. | null | 2021-12-19T23:04:49.515615Z | 2021-06-30T00:00:12.856709Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fe4b04fa31a6dcf4358aa84cf81e5a7fd079469b'} |
Linux | GSD-2021-1001721 | sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb | sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit 8180611c238e11676612eb2a9828b1c7a3a4d77b, it was introduced in version v4.8 by commit 3acb50c18d8d6650f10919464ade4dcdaf41d62f. For more details please see the references link. | null | 2021-12-19T23:37:39.388957Z | 2021-10-19T16:33:29.389459Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3acb50c18d8d6650f10919464ade4dcdaf41d62f'} |
Linux | GSD-2021-1001234 | bus: mhi: core: Validate channel ID when processing command completions | bus: mhi: core: Validate channel ID when processing command completions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.54 by commit 3efec3b4b16fc7af25676a94230a8ab2a3bb867c, it was introduced in version v5.7 by commit 1d3173a3bae7039b765a0956e3e4bf846dbaacb8. For more details please see the references link. | null | 2021-12-20T00:06:49.760083Z | 2021-08-03T01:44:35.700198Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1d3173a3bae7039b765a0956e3e4bf846dbaacb8'} |
Linux | GSD-2022-1000759 | arm64: entry.S: Add ventry overflow sanity checks | arm64: entry.S: Add ventry overflow sanity checks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.28 by commit b7beeab84f02091124b176ba34c71a601762d1de. For more details please see the references link. | null | 2022-03-18T02:53:08.047133Z | 2022-03-18T00:15:46.700767Z | null | null | null | null | null |
Linux | GSD-2021-1000976 | mac80211: fix skb length check in ieee80211_scan_rx() | mac80211: fix skb length check in ieee80211_scan_rx()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.46 by commit 5a1cd67a801cf5ef989c4783e07b86a25b143126, it was introduced in version v5.10 by commit cd418ba63f0c2f6157f35a41c9accc6ecb52590a. For more details please see the references link. | null | 2021-12-19T22:21:24.874120Z | 2021-06-30T00:30:52.573789Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cd418ba63f0c2f6157f35a41c9accc6ecb52590a'} |
Linux | GSD-2021-1001664 | blktrace: Fix uaf in blk_trace access after removing by sysfs | blktrace: Fix uaf in blk_trace access after removing by sysfs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.70 by commit 3815fe7371d2411ce164281cef40d9fc7b323dee, it was introduced in version v2.6.30 by commit c71a896154119f4ca9e89d6078f5f63ad60ef199. For more details please see the references link. | null | 2021-12-20T01:11:58.177256Z | 2021-10-19T16:30:40.016524Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c71a896154119f4ca9e89d6078f5f63ad60ef199'} |
Linux | GSD-2022-1002334 | ARM: mmp: Fix failure to remove sram device | ARM: mmp: Fix failure to remove sram device
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 609d47b36516f8dd894cf5997e755553b471baef. For more details please see the references link. | null | 2022-04-25T03:24:56.480310Z | 2022-04-24T22:35:28.368239Z | null | null | null | null | null |
Linux | GSD-2022-1000309 | net: ieee802154: at86rf230: Stop leaking skb's | net: ieee802154: at86rf230: Stop leaking skb's
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.268 by commit af649e5c95f56df64363bc46f6746b87819f9c0d. For more details please see the references link. | null | 2022-03-07T01:49:40.355150Z | 2022-02-27T02:49:11.135751Z | null | null | null | null | null |
Linux | GSD-2021-1000425 | powerpc/64s: Fix pte update for kernel memory on radix | powerpc/64s: Fix pte update for kernel memory on radix
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.119 by commit 73f9dccb29e4f82574bec2765c0090cdb0404301, it was introduced in version v4.18 by commit f1cb8f9beba8699dd1b4518418191499e53f7b17. For more details please see the references link. | null | 2021-12-20T01:30:29.711073Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f1cb8f9beba8699dd1b4518418191499e53f7b17'} |
Linux | GSD-2021-1002418 | net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() | net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.220 by commit 57af54a56024435d83e44c78449513b414eb6edf, it was introduced in version v3.9 by commit 7f9664525f9cb507de9198a395a111371413f230. For more details please see the references link. | null | 2021-12-19T23:12:40.117570Z | 2021-12-19T19:36:30.783520Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7f9664525f9cb507de9198a395a111371413f230'} |
Linux | GSD-2022-1001148 | btrfs: do not double complete bio on errors during compressed reads | btrfs: do not double complete bio on errors during compressed reads
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 987b5df1d10355d377315a26e7fb6c72ded83c9f. For more details please see the references link. | null | 2022-04-25T04:53:38.882131Z | 2022-04-24T20:48:57.705748Z | null | null | null | null | null |
Linux | GSD-2021-1000075 | cifs: fix regression when mounting shares with prefix paths | cifs: fix regression when mounting shares with prefix paths
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.3 by commit ee3b051cd948f3cc3e049f3b5049c3b0b7fc4b88, it was introduced in version v5.12.3 by commit 0049109550011245df45d4a2abf60960f3eac6af. For more details please see the references link. | null | 2021-06-24T22:55:39.077047Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0049109550011245df45d4a2abf60960f3eac6af'} |
Linux | GSD-2021-1002048 | mm, slub: fix mismatch between reconstructed freelist depth and cnt | mm, slub: fix mismatch between reconstructed freelist depth and cnt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit 48843dd23c7bfcb0f0c3a02926d660f939dc2b9f, it was introduced in version v4.17 by commit c3895391df385c6628638f014c87e16f5e2efd45. For more details please see the references link. | null | 2021-12-19T23:49:10.338339Z | 2021-11-14T15:17:30.068643Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c3895391df385c6628638f014c87e16f5e2efd45'} |
Linux | GSD-2022-1001518 | bpf, sockmap: Fix memleak in tcp_bpf_sendmsg while sk msg is full | bpf, sockmap: Fix memleak in tcp_bpf_sendmsg while sk msg is full
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit f677328f05f52d535cbdc15cb04476db49477eb4, it was introduced in version v4.20 by commit 604326b41a6fb9b4a78b6179335decee0365cd8c. For more details please see the references link. | null | 2022-04-25T06:52:42.767838Z | 2022-04-24T21:19:29.367002Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/604326b41a6fb9b4a78b6179335decee0365cd8c'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.