ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2022-1001236 | ptp: unregister virtual clocks when unregistering physical clock. | ptp: unregister virtual clocks when unregistering physical clock.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit c49eafe6249f844c26f9866886cc6719d81762df, it was introduced in version v5.14 by commit 73f37068d540eba5f93ba3a0019bf479d35ebd76. For more details please see the references link. | null | 2022-04-25T03:20:41.703677Z | 2022-04-24T20:56:34.275284Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/73f37068d540eba5f93ba3a0019bf479d35ebd76'} |
Linux | GSD-2021-1002766 | scsi: scsi_debug: Don't call kcalloc() if size arg is zero | scsi: scsi_debug: Don't call kcalloc() if size arg is zero
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit 47d11d35203b0aa13533634e270fe2c3610e531b. For more details please see the references link. | null | 2022-01-11T05:51:26.813098Z | 2021-12-27T05:52:49.632255Z | null | null | null | null | null |
Linux | GSD-2021-1001849 | powerpc/smp: do not decrement idle task preempt count in CPU offline | powerpc/smp: do not decrement idle task preempt count in CPU offline
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit 53770a411559cf7bc0906d1df319cc533d2f4f58, it was introduced in version v5.10.50 by commit bdf4d33e8342b90386156204e1da0cdfdb4bf146. For more details please see the references link. | null | 2021-12-20T00:36:06.139498Z | 2021-10-28T13:52:04.691288Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bdf4d33e8342b90386156204e1da0cdfdb4bf146'} |
Linux | GSD-2022-1001666 | btrfs: release correct delalloc amount in direct IO write path | btrfs: release correct delalloc amount in direct IO write path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.35 by commit 07cacfd9d9dc134557ac8866c73d570a59b3d1f3, it was introduced in version v5.15.27 by commit 5afd80c393f4e87451f14eefb7f2f24daf434e06. For more details please see the references link. | null | 2022-04-25T03:18:27.768247Z | 2022-04-24T21:33:16.771073Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5afd80c393f4e87451f14eefb7f2f24daf434e06'} |
Linux | GSD-2022-1000974 | drm/amdkfd: Check for potential null return of kmalloc_array() | drm/amdkfd: Check for potential null return of kmalloc_array()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.4 by commit 0a692c625e373fef692ffbc7fc41f8a025f01cb7. For more details please see the references link. | null | 2022-04-25T05:07:02.890146Z | 2022-04-24T20:36:11.163169Z | null | null | null | null | null |
Linux | GSD-2021-1002336 | scsi: scsi_debug: Fix out-of-bound read in resp_readcap16() | scsi: scsi_debug: Fix out-of-bound read in resp_readcap16()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit 5b8bed6464ad6653586e30df046185fd816ad999. For more details please see the references link. | null | 2021-12-19T22:23:45.437016Z | 2021-11-29T02:39:23.221292Z | null | null | null | null | null |
Linux | GSD-2022-1000427 | net: dsa: ar9331: register the mdiobus under devres | net: dsa: ar9331: register the mdiobus under devres
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit aae1c6a1d3d696fc33b609fb12fe744a556d1dc5, it was introduced in version v5.9 by commit ac3a68d56651c3dad2c12c7afce065fe15267f44. For more details please see the references link. | null | 2022-03-07T01:43:05.849679Z | 2022-02-27T03:05:18.468677Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac3a68d56651c3dad2c12c7afce065fe15267f44'} |
Linux | GSD-2022-1000098 | usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS | usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.265 by commit 973e0d9e5fcd975bd95ddf544b279f764940b835, it was introduced in version v4.14.237 by commit 8cd5f45c1b769e3e9e0f4325dd08b6c3749dc7ee. For more details please see the references link. | null | 2022-02-20T06:19:06.197213Z | 2022-02-18T21:34:58.682206Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8cd5f45c1b769e3e9e0f4325dd08b6c3749dc7ee'} |
Linux | GSD-2022-1000562 | Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj | Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit 92e25b637cd4e010f776c86e4810300e773eac5c, it was introduced in version v4.15 by commit c2e5df616e1ae6c2a074cb241ebb65a318ebaf7c. For more details please see the references link. | null | 2022-03-07T01:39:08.211251Z | 2022-02-27T03:24:14.944816Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c2e5df616e1ae6c2a074cb241ebb65a318ebaf7c'} |
Linux | GSD-2022-1000132 | net: amd-xgbe: Fix skb data length underflow | net: amd-xgbe: Fix skb data length underflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.228 by commit 34aeb4da20f93ac80a6291a2dbe7b9c6460e9b26, it was introduced in version v4.11 by commit 622c36f143fc9566ba49d7cec994c2da1182d9e2. For more details please see the references link. | null | 2022-02-19T09:24:58.352535Z | 2022-02-18T21:44:42.403325Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/622c36f143fc9566ba49d7cec994c2da1182d9e2'} |
Linux | GSD-2022-1001689 | arch/arm64: Fix topology initialization for core scheduling | arch/arm64: Fix topology initialization for core scheduling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 87f5d66daa5f457449bb95d6b8d18bb7596aa627, it was introduced in version v5.14 by commit 9edeaea1bc452372718837ed2ba775811baf1ba1. For more details please see the references link. | null | 2022-04-25T03:00:07.262292Z | 2022-04-24T21:35:28.974809Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9edeaea1bc452372718837ed2ba775811baf1ba1'} |
Linux | GSD-2021-1002623 | net: systemport: Add global locking for descriptor lifecycle | net: systemport: Add global locking for descriptor lifecycle
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.294 by commit de57f62f76450b934de8203711bdc4f7953c3421, it was introduced in version v3.16 by commit 80105befdb4b8cea924711b40b2462b87df65b62. For more details please see the references link. | null | 2022-01-11T05:53:14.055474Z | 2021-12-27T05:27:42.979692Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80105befdb4b8cea924711b40b2462b87df65b62'} |
Linux | GSD-2022-1001373 | virtio_console: eliminate anonymous module_init & module_exit | virtio_console: eliminate anonymous module_init & module_exit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 3fd5dee7404ce40c79cba468bb2510115639d975. For more details please see the references link. | null | 2022-04-25T04:49:14.051122Z | 2022-04-24T21:08:53.217516Z | null | null | null | null | null |
Linux | GSD-2021-1002273 | usb: musb: tusb6010: check return value after calling platform_get_resource() | usb: musb: tusb6010: check return value after calling platform_get_resource()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.162 by commit 3ee15f1af17407be381bcf06a78fa60b471242dd. For more details please see the references link. | null | 2021-12-19T23:23:32.391949Z | 2021-11-29T02:36:25.227472Z | null | null | null | null | null |
Linux | GSD-2021-1002789 | hamradio: defer ax25 kfree after unregister_netdev | hamradio: defer ax25 kfree after unregister_netdev
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.223 by commit 896193a02a2981e60c40d4614fd095ce92135ccd. For more details please see the references link. | null | 2022-01-11T05:47:26.667364Z | 2021-12-30T02:43:29.419902Z | null | null | null | null | null |
Linux | GSD-2022-1001723 | scsi: pm8001: Fix tag leaks on error | scsi: pm8001: Fix tag leaks on error
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 43c617eefab7077d69f5989ad3e2a273da1d728b. For more details please see the references link. | null | 2022-04-25T04:40:38.694241Z | 2022-04-24T21:37:45.324569Z | null | null | null | null | null |
Linux | GSD-2022-1000831 | net: fix up skbs delta_truesize in UDP GRO frag_list | net: fix up skbs delta_truesize in UDP GRO frag_list
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.104 by commit 4e178ed14bda47942c1ccad3f60b774870b45db9, it was introduced in version v5.10.10 by commit 24cd3317418955fd9489e4e7e9c2b643691b270b. For more details please see the references link. | null | 2022-03-18T02:55:09.221742Z | 2022-03-18T00:22:28.255292Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/24cd3317418955fd9489e4e7e9c2b643691b270b'} |
Linux | GSD-2021-1000864 | NFS: Fix a potential NULL dereference in nfs_get_client() | NFS: Fix a potential NULL dereference in nfs_get_client()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.237 by commit 634f17ff1d59905eb3b4bbbc00805961d08beaee, it was introduced in version v3.17 by commit 31434f496abb9f3410b10f541462fe58613dd3ad. For more details please see the references link. | null | 2021-12-19T22:54:40.868295Z | 2021-06-30T00:02:16.450320Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/31434f496abb9f3410b10f541462fe58613dd3ad'} |
Linux | GSD-2021-1001776 | can: peak_pci: peak_pci_remove(): fix UAF | can: peak_pci: peak_pci_remove(): fix UAF
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.290 by commit 1c616528ba4aeb1125a06b407572ab7b56acae38, it was introduced in version v3.4 by commit e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd. For more details please see the references link. | null | 2021-12-19T22:30:13.981658Z | 2021-10-28T13:48:20.639240Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd'} |
Linux | GSD-2022-1002226 | lib/test: use after free in register_test_dev_kmod() | lib/test: use after free in register_test_dev_kmod()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 1f316b42a8e30ccb6524d2f3812b122f46a6e40d, it was introduced in version v4.13 by commit d9c6a72d6fa29d3a7999dda726577e5d1fccafa5. For more details please see the references link. | null | 2022-04-25T06:19:33.532331Z | 2022-04-24T22:23:12.393973Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9c6a72d6fa29d3a7999dda726577e5d1fccafa5'} |
Linux | GSD-2021-1001326 | nfs: fix acl memory leak of posix_acl_create() | nfs: fix acl memory leak of posix_acl_create()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.134 by commit d0b32dc1409f7e65e4fcc34e236462268e69a357, it was introduced in version v3.14 by commit 013cdf1088d7235da9477a2375654921d9b9ba9f. For more details please see the references link. | null | 2021-12-19T23:50:20.874436Z | 2021-08-03T02:09:52.320662Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/013cdf1088d7235da9477a2375654921d9b9ba9f'} |
Linux | GSD-2022-1001959 | net/smc: Fix NULL pointer dereference in smc_pnet_find_ib() | net/smc: Fix NULL pointer dereference in smc_pnet_find_ib()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.112 by commit 35b91e49bc80ca944a8679c3b139ddaf2f8eea0f, it was introduced in version v5.1 by commit af5f60c7e3d593c2fa31b9a62c16eae75f074de3. For more details please see the references link. | null | 2022-04-25T04:13:06.793438Z | 2022-04-24T21:58:20.723756Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/af5f60c7e3d593c2fa31b9a62c16eae75f074de3'} |
Linux | GSD-2021-1000167 | dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails | dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.118 by commit a992a283c0b77d0a7c2c348add0e6a21fb1dab67, it was introduced in version v4.6 by commit 1c357a1e86a4227a6b6059f2de118ae47659cebc. For more details please see the references link. | null | 2021-12-19T23:24:56.147722Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c357a1e86a4227a6b6059f2de118ae47659cebc'} |
Linux | GSD-2021-1000537 | btrfs: do not BUG_ON in link_to_fixup_dir | btrfs: do not BUG_ON in link_to_fixup_dir
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit b545442133580dcb2f2496133bf850824d41255c, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T00:10:17.828004Z | 2021-06-04T19:35:13.916465Z | null | null | null | null | null |
Linux | GSD-2021-1000022 | KVM: VMX: Don't use vcpu->run->internal.ndata as an array index | KVM: VMX: Don't use vcpu->run->internal.ndata as an array index
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.32 by commit 7f64753835a78c7d2cc2932a5808ef3b7fd4c050, it was introduced in version v5.9 by commit 1aa561b1a4c0ae2a9a9b9c21a84b5ca66b4775d8. For more details please see the references link. | null | 2021-12-20T00:18:11.648016Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1aa561b1a4c0ae2a9a9b9c21a84b5ca66b4775d8'} |
Linux | GSD-2021-1000472 | spi: Fix use-after-free with devm_spi_alloc_* | spi: Fix use-after-free with devm_spi_alloc_*
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.233 by commit 8e029707f50a82c53172359c686b2536ab54e58c, it was introduced in version v4.14.212 by commit 8c45a1c6c951bbe7f95db78fcab46f7337364468. For more details please see the references link. | null | 2021-12-19T22:31:41.970918Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c45a1c6c951bbe7f95db78fcab46f7337364468'} |
Linux | GSD-2022-1002363 | ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe | ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit b0c56a0071116a37c24df998166c22a7e4684626, it was introduced in version v3.8 by commit 531f67e41dcde1e358cf821d056241a66355cf03. For more details please see the references link. | null | 2022-04-25T05:29:07.009353Z | 2022-04-24T22:39:04.440747Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/531f67e41dcde1e358cf821d056241a66355cf03'} |
Linux | GSD-2021-1000921 | net: qrtr: fix OOB Read in qrtr_endpoint_post | net: qrtr: fix OOB Read in qrtr_endpoint_post
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.128 by commit 26b8d10703a9be45d6097946b2b4011f7dd2c56f, it was introduced in version v4.15 by commit 194ccc88297ae78d0803adad83c6dcc369787c9e. For more details please see the references link. | null | 2021-12-19T22:49:25.299451Z | 2021-06-30T00:24:38.613212Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/194ccc88297ae78d0803adad83c6dcc369787c9e'} |
Linux | GSD-2021-1001633 | usb: dwc2: check return value after calling platform_get_resource() | usb: dwc2: check return value after calling platform_get_resource()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.72 by commit 2754fa3b73df7d0ae042f3ed6cfd9df9042f6262. For more details please see the references link. | null | 2021-12-20T00:03:46.462241Z | 2021-10-19T16:29:11.747558Z | null | null | null | null | null |
Linux | GSD-2021-1001799 | mm, slub: fix mismatch between reconstructed freelist depth and cnt | mm, slub: fix mismatch between reconstructed freelist depth and cnt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.214 by commit 21e23e4c02fc9aa1f4b037f30e47d215d1a27f21, it was introduced in version v4.17 by commit c3895391df385c6628638f014c87e16f5e2efd45. For more details please see the references link. | null | 2021-12-20T00:22:55.218666Z | 2021-10-28T13:49:31.970478Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c3895391df385c6628638f014c87e16f5e2efd45'} |
Linux | GSD-2021-1001263 | memory: fsl_ifc: fix leak of private memory on probe failure | memory: fsl_ifc: fix leak of private memory on probe failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.52 by commit b5789e23773f4a852fbfe244b63f675e265d3a7f, it was introduced in version v3.3 by commit a20cbdeffce247a2b6fb83cd8d22433994068565. For more details please see the references link. | null | 2021-12-19T23:40:52.638382Z | 2021-08-03T01:52:24.978508Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a20cbdeffce247a2b6fb83cd8d22433994068565'} |
Linux | GSD-2021-1001074 | phy: phy-mtk-tphy: Fix some resource leaks in mtk_phy_init() | phy: phy-mtk-tphy: Fix some resource leaks in mtk_phy_init()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit 6472955af5e88b5489b6d78316082ad56ea3e489. For more details please see the references link. | null | 2021-12-20T00:19:10.647351Z | 2021-06-30T00:37:55.229713Z | null | null | null | null | null |
Linux | GSD-2022-1000519 | net: dsa: fix panic when DSA master device unbinds on shutdown | net: dsa: fix panic when DSA master device unbinds on shutdown
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 89b60402d43cdab4387dbbf24afebda5cf092ae7, it was introduced in version v5.15 by commit 0650bf52b31ff35dc6430fc2e37969c36baba724. For more details please see the references link. | null | 2022-03-07T01:38:11.169133Z | 2022-02-27T03:18:41.220424Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0650bf52b31ff35dc6430fc2e37969c36baba724'} |
Linux | GSD-2021-1001424 | scsi: core: Fix bad pointer dereference when ehandler kthread is invalid | scsi: core: Fix bad pointer dereference when ehandler kthread is invalid
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.240 by commit f3d0a109240c9bed5c60d819014786be3a2fe515, it was introduced in version v4.14.237 by commit db08ce595dd64ea9859f7d088b51cbfc8e685c66. For more details please see the references link. | null | 2021-12-20T00:24:10.530483Z | 2021-08-03T02:36:21.989542Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/db08ce595dd64ea9859f7d088b51cbfc8e685c66'} |
Linux | GSD-2022-1000149 | tracing/histogram: Fix a potential memory leak for kstrdup() | tracing/histogram: Fix a potential memory leak for kstrdup()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.176 by commit 8a8878ebb596281f50fc0b9a6e1f23f0d7f154e8, it was introduced in version v5.4.19 by commit 38b67e60b6b582e81f9db1b2e7176cbbfbd3e574. For more details please see the references link. | null | 2022-02-19T09:49:42.714778Z | 2022-02-18T21:47:26.761207Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/38b67e60b6b582e81f9db1b2e7176cbbfbd3e574'} |
Linux | GSD-2022-1002174 | mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0) | mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0)
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit c19d8de4e682ec4b0ea2b04a832cd8cc0be3bb31. For more details please see the references link. | null | 2022-04-25T03:19:21.262346Z | 2022-04-24T22:18:36.515886Z | null | null | null | null | null |
Linux | GSD-2021-1002658 | media: mxl111sf: change mutex_init() location | media: mxl111sf: change mutex_init() location
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.222 by commit 4b2d9600b31f9ba7adbc9f3c54a068615d27b390, it was introduced in version v3.7 by commit 8572211842afc53c8450fb470f2b8d02ba7592e0. For more details please see the references link. | null | 2022-01-11T05:47:43.126731Z | 2021-12-27T05:33:32.147393Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8572211842afc53c8450fb470f2b8d02ba7592e0'} |
Linux | GSD-2021-1000665 | iommu/vt-d: Fix sysfs leak in alloc_iommu() | iommu/vt-d: Fix sysfs leak in alloc_iommu()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.193 by commit 2ec5e9bb6b0560c90d315559c28a99723c80b996, it was introduced in version v4.11 by commit 39ab9555c24110671f8dc671311a26e5c985b592. For more details please see the references link. | null | 2021-12-19T23:12:22.498967Z | 2021-06-04T19:57:55.753508Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/39ab9555c24110671f8dc671311a26e5c985b592'} |
Linux | GSD-2021-1001977 | NFC: digital: fix possible memory leak in digital_in_send_sdd_req() | NFC: digital: fix possible memory leak in digital_in_send_sdd_req()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.213 by commit 071bdef36391958c89af5fa2172f691b31baa212, it was introduced in version v3.13 by commit 2c66daecc4092e6049673c281b2e6f0d5e59a94c. For more details please see the references link. | null | 2021-12-19T22:43:33.867434Z | 2021-11-14T15:14:19.084374Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c66daecc4092e6049673c281b2e6f0d5e59a94c'} |
Linux | GSD-2022-1001308 | riscv: Increase stack size under KASAN | riscv: Increase stack size under KASAN
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit b91e1db8a8fa56ce57410368b230527e1547439e, it was introduced in version v5.6 by commit 8ad8b72721d0f07fa02dbe71f901743f9c71c8e6. For more details please see the references link. | null | 2022-04-25T06:28:21.097698Z | 2022-04-24T21:02:47.661564Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ad8b72721d0f07fa02dbe71f901743f9c71c8e6'} |
Linux | GSD-2021-1002208 | scsi: core: Put LLD module refcnt after SCSI device is released | scsi: core: Put LLD module refcnt after SCSI device is released
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit f2b85040acec9a928b4eb1b57a989324e8e38d3f. For more details please see the references link. | null | 2021-12-19T22:18:34.655600Z | 2021-11-14T15:24:45.063941Z | null | null | null | null | null |
Linux | GSD-2021-1000235 | mt76: mt7921: fix possible invalid register access | mt76: mt7921: fix possible invalid register access
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit b13cbc536990ff609afa878b6211cd6f6265ba60, it was introduced in version v5.12 by commit ffa1bf97425bd511b105ce769976e20a845a71e9. For more details please see the references link. | null | 2021-12-19T22:10:07.164734Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ffa1bf97425bd511b105ce769976e20a845a71e9'} |
Linux | GSD-2022-1001758 | wireguard: socket: free skb in send6 when ipv6 is disabled | wireguard: socket: free skb in send6 when ipv6 is disabled
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 402991a9771587acc2947cf6c4d689c5397f2258, it was introduced in version v5.6 by commit e7096c131e5161fa3b8e52a650d7719d2857adfd. For more details please see the references link. | null | 2022-04-25T05:43:06.547663Z | 2022-04-24T21:40:12.516988Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e7096c131e5161fa3b8e52a650d7719d2857adfd'} |
Linux | GSD-2021-1000720 | net: caif: add proper error handling | net: caif: add proper error handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.272 by commit 4f6da6c526a0bf470536b59fdb219d11336e390e, it was introduced in version v3.3 by commit 7c18d2205ea76eef9674e59e1ecae4f332a53e9e. For more details please see the references link. | null | 2021-12-19T22:57:55.117090Z | 2021-06-24T23:59:07.014641Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7c18d2205ea76eef9674e59e1ecae4f332a53e9e'} |
Linux | GSD-2021-1001832 | xhci: Fix command ring pointer corruption while aborting a command | xhci: Fix command ring pointer corruption while aborting a command
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.155 by commit 01c2dcb67e71c351006dd17cbba86c26b7f61eaf. For more details please see the references link. | null | 2021-12-19T23:13:53.518417Z | 2021-10-28T13:51:16.765395Z | null | null | null | null | null |
Linux | GSD-2021-1001998 | nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells | nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.155 by commit 0594f1d048d8dc338eb9a240021b1d00ae1eb082, it was introduced in version v4.3 by commit 69aba7948cbe53f2f1827e84e9dd0ae470a5072e. For more details please see the references link. | null | 2021-12-19T23:29:13.941229Z | 2021-11-14T15:15:12.388515Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69aba7948cbe53f2f1827e84e9dd0ae470a5072e'} |
Linux | GSD-2021-1000370 | media: atomisp: Fix use after free in atomisp_alloc_css_stat_bufs() | media: atomisp: Fix use after free in atomisp_alloc_css_stat_bufs()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit d218c7a0284f6b92a7b82d2e19706e18663b4193, it was introduced in version v5.8 by commit ad85094b293e40e7a2f831b0311a389d952ebd5e. For more details please see the references link. | null | 2021-12-19T22:59:11.740412Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ad85094b293e40e7a2f831b0311a389d952ebd5e'} |
Linux | GSD-2022-1002461 | drm/amdkfd: Check for potential null return of kmalloc_array() | drm/amdkfd: Check for potential null return of kmalloc_array()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit 32cf90a521dcc0f136db7ee5ba32bfe5f79e460e. For more details please see the references link. | null | 2022-04-25T05:06:02.397858Z | 2022-04-24T22:50:31.951502Z | null | null | null | null | null |
Linux | GSD-2021-1001131 | cfg80211: call cfg80211_leave_ocb when switching away from OCB | cfg80211: call cfg80211_leave_ocb when switching away from OCB
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.14 by commit c84ccd00b25521f349ceca3f0b36b2410635c225. For more details please see the references link. | null | 2021-12-19T23:55:07.853353Z | 2021-07-08T01:58:32.319123Z | null | null | null | null | null |
Linux | GSD-2022-1002031 | ubifs: rename_whiteout: Fix double free for whiteout_ui->data | ubifs: rename_whiteout: Fix double free for whiteout_ui->data
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit a90e2dbe66d2647ff95a0442ad2e86482d977fd8, it was introduced in version v4.9 by commit 9e0a1fff8db56eaaebb74b4a3ef65f86811c4798. For more details please see the references link. | null | 2022-04-25T04:31:16.483184Z | 2022-04-24T22:04:39.390837Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9e0a1fff8db56eaaebb74b4a3ef65f86811c4798'} |
Linux | GSD-2021-1001561 | mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap | mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.209 by commit 76538c7b4df314bb937e44c5cb1782f37d47443c, it was introduced in version v4.7 by commit 646e76bb5daf4ca38438c69ffb72cccb605f3466. For more details please see the references link. | null | 2021-12-20T01:09:23.645821Z | 2021-10-19T16:23:50.413677Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/646e76bb5daf4ca38438c69ffb72cccb605f3466'} |
Linux | GSD-2022-1001534 | xsk: Fix race at socket teardown | xsk: Fix race at socket teardown
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit d1579253ffce39986e7a6ab757ac93b2680a665f, it was introduced in version v5.4 by commit 42fddcc7c64b723a867c7b2f5f7505e244212f13. For more details please see the references link. | null | 2022-04-25T05:12:17.851160Z | 2022-04-24T21:21:04.204568Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/42fddcc7c64b723a867c7b2f5f7505e244212f13'} |
Linux | GSD-2021-1000059 | media: staging/intel-ipu3: Fix memory leak in imu_fmt | media: staging/intel-ipu3: Fix memory leak in imu_fmt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.3 by commit 74ba0adb5e983503b18a96121d965cad34ac7ce3, it was introduced in version v5.2 by commit 6d5f26f2e045f2377b524516194657c00efbbce8. For more details please see the references link. | null | 2021-12-20T01:12:00.087572Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6d5f26f2e045f2377b524516194657c00efbbce8'} |
Linux | GSD-2021-1002064 | cgroup: Fix memory leak caused by missing cgroup_bpf_offline | cgroup: Fix memory leak caused by missing cgroup_bpf_offline
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.77 by commit 01599bf7cc2b49c3d2be886cb438647dc25446ed, it was introduced in version v5.10 by commit 2b0d3d3e4fcfb19d10f9a82910b8f0f05c56ee3e. For more details please see the references link. | null | 2021-12-19T22:50:08.562574Z | 2021-11-14T15:18:16.781243Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2b0d3d3e4fcfb19d10f9a82910b8f0f05c56ee3e'} |
Linux | GSD-2022-1001164 | gcc-plugins/stackleak: Exactly match strings instead of prefixes | gcc-plugins/stackleak: Exactly match strings instead of prefixes
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 0a639f01f90dea71462320d2e477d716a2479a61. For more details please see the references link. | null | 2022-04-25T05:44:18.442779Z | 2022-04-24T20:49:44.110591Z | null | null | null | null | null |
Linux | GSD-2021-1000409 | powerpc/64s: Fix crashes when toggling entry flush barrier | powerpc/64s: Fix crashes when toggling entry flush barrier
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.120 by commit 0b4eb172cc12dc102cd0ad013e53ee4463db9508, it was introduced in version v5.4.79 by commit b65458b6be8032c5179d4f562038575d7b3a6be3. For more details please see the references link. | null | 2021-12-19T23:39:47.896593Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b65458b6be8032c5179d4f562038575d7b3a6be3'} |
Linux | GSD-2021-1002434 | ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE | ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.163 by commit dc9eb93d5a0ab4c096d9aa45113be5d0a9aa6201, it was introduced in version v3.8 by commit 9c4566a117a6fe404a0e49b27ac71b631945a70f. For more details please see the references link. | null | 2021-12-20T01:07:18.081197Z | 2021-12-19T19:37:08.119618Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9c4566a117a6fe404a0e49b27ac71b631945a70f'} |
Linux | GSD-2022-1002318 | MIPS: fix fortify panic when copying asm exception handlers | MIPS: fix fortify panic when copying asm exception handlers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 5176c671afb67130298cf5653949309decf4ae66. For more details please see the references link. | null | 2022-04-25T03:35:05.819542Z | 2022-04-24T22:33:49.676038Z | null | null | null | null | null |
Linux | GSD-2022-1000325 | net: ieee802154: at86rf230: Stop leaking skb's | net: ieee802154: at86rf230: Stop leaking skb's
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.231 by commit 6312f6a53fd3ea38125dcaca5e3c9aa7d8a60cf7. For more details please see the references link. | null | 2022-03-07T01:35:27.101603Z | 2022-02-27T02:51:40.656212Z | null | null | null | null | null |
Linux | GSD-2021-1001648 | mac80211-hwsim: fix late beacon hrtimer handling | mac80211-hwsim: fix late beacon hrtimer handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.71 by commit 2c204cf594df3b9468368dc9d0b24d482d93cda7, it was introduced in version v3.9 by commit 01e59e467ecf976c782eecd4dc99644802cc60e2. For more details please see the references link. | null | 2021-12-19T22:54:00.845044Z | 2021-10-19T16:29:54.758881Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/01e59e467ecf976c782eecd4dc99644802cc60e2'} |
Linux | GSD-2022-1001867 | udmabuf: validate ubuf->pagecount | udmabuf: validate ubuf->pagecount
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 811b667cefbea9cb7511a874b169d6a92907137e, it was introduced in version v4.20 by commit fbb0de795078190a9834b3409e4b009cfb18a6d4. For more details please see the references link. | null | 2022-04-25T04:26:17.419869Z | 2022-04-24T21:49:51.702162Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fbb0de795078190a9834b3409e4b009cfb18a6d4'} |
Linux | GSD-2022-1000775 | iommu/amd: Recover from event log overflow | iommu/amd: Recover from event log overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.27 by commit a8a86631f4ce1ee4c70217b7a72cd8157cc0d070. For more details please see the references link. | null | 2022-03-18T02:57:18.793121Z | 2022-03-18T00:17:19.960692Z | null | null | null | null | null |
Linux | GSD-2021-1001218 | media: zr364xx: fix memory leak in zr364xx_start_readpipe | media: zr364xx: fix memory leak in zr364xx_start_readpipe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.3 by commit d69b39d89f362cfeeb54a68690768d0d257b2c8f, it was introduced in version v2.6.32 by commit ccbf035ae5de4c535160fc99f73feb44cc55b534. For more details please see the references link. | null | 2021-12-20T00:00:30.624506Z | 2021-08-03T01:39:18.098395Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ccbf035ae5de4c535160fc99f73feb44cc55b534'} |
Linux | GSD-2022-1001888 | f2fs: fix missing free nid in f2fs_handle_failed_inode | f2fs: fix missing free nid in f2fs_handle_failed_inode
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit d1eaaf6cadedf638e17017b0a04d56308405ac10, it was introduced in version v4.19 by commit 7735730d39d75e70476c1b01435b9b1f41637f0e. For more details please see the references link. | null | 2022-04-25T03:36:24.790335Z | 2022-04-24T21:52:14.043684Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7735730d39d75e70476c1b01435b9b1f41637f0e'} |
Linux | GSD-2021-1002822 | inet: fully convert sk->sk_rx_dst to RCU rules | inet: fully convert sk->sk_rx_dst to RCU rules
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.12 by commit 0249a4b8a554f2eb6a27b62516fa50168584faa4, it was introduced in version v3.6 by commit 41063e9dd11956f2d285e12e4342e1d232ba0ea2. For more details please see the references link. | null | 2022-01-11T05:51:38.591434Z | 2021-12-30T02:44:57.049829Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41063e9dd11956f2d285e12e4342e1d232ba0ea2'} |
Linux | GSD-2022-1000260 | KVM: arm64: pkvm: Use the mm_ops indirection for cache maintenance | KVM: arm64: pkvm: Use the mm_ops indirection for cache maintenance
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.19 by commit 19d4d09c2f163d90ed6bfea778f9bc4f70a3c534, it was introduced in version v5.14 by commit 25aa28691bb960a76f0cffd8862144a29487f6ff. For more details please see the references link. | null | 2022-02-19T08:56:08.582480Z | 2022-02-18T22:03:19.031036Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/25aa28691bb960a76f0cffd8862144a29487f6ff'} |
Linux | GSD-2022-1001922 | jffs2: fix memory leak in jffs2_do_mount_fs | jffs2: fix memory leak in jffs2_do_mount_fs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 4392e8aeebc5a4f8073620bccba7de1b1f6d7c88, it was introduced in version v2.6.15 by commit e631ddba588783edd521c5a89f7b2902772fb691. For more details please see the references link. | null | 2022-04-25T04:37:44.541433Z | 2022-04-24T21:55:04.892268Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e631ddba588783edd521c5a89f7b2902772fb691'} |
Linux | GSD-2022-1000630 | net/smc: Transitional solution for clcsock race issue | net/smc: Transitional solution for clcsock race issue
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.5 by commit 4284225cd8001e134f5cf533a7cd244bbb654d0f, it was introduced in version v5.1 by commit fd57770dd198f5b2ddd5b9e6bf282cf98d63adb9. For more details please see the references link. | null | 2022-03-07T01:35:55.434948Z | 2022-02-27T03:33:16.554898Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fd57770dd198f5b2ddd5b9e6bf282cf98d63adb9'} |
Linux | GSD-2021-1002121 | usbnet: sanity check for maxpacket | usbnet: sanity check for maxpacket
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.16 by commit 7e8b6a4f18edee070213cb6a77118e8a412253c5. For more details please see the references link. | null | 2021-12-19T23:18:34.908524Z | 2021-11-14T15:20:47.361011Z | null | null | null | null | null |
Linux | GSD-2022-1001471 | btrfs: do not double complete bio on errors during compressed reads | btrfs: do not double complete bio on errors during compressed reads
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 4a4ceb2b990771c374d85d496a1a45255dde48e3. For more details please see the references link. | null | 2022-04-25T03:53:49.568966Z | 2022-04-24T21:15:27.239818Z | null | null | null | null | null |
Linux | GSD-2021-1002571 | drm/vc4: kms: Clear the HVS FIFO commit pointer once done | drm/vc4: kms: Clear the HVS FIFO commit pointer once done
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.7 by commit 2931db9a5ed219546cf2ae0546698faf78281b89, it was introduced in version v5.12 by commit 9ec03d7f1ed394897891319a4dda75f52c5d292d. For more details please see the references link. | null | 2021-12-20T00:50:40.880152Z | 2021-12-19T19:43:16.924419Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9ec03d7f1ed394897891319a4dda75f52c5d292d'} |
Linux | GSD-2022-1001021 | net/tls: fix slab-out-of-bounds bug in decrypt_internal | net/tls: fix slab-out-of-bounds bug in decrypt_internal
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 2304660ab6c425df64d95301b601424c6a50f28b, it was introduced in version v5.2 by commit f295b3ae9f5927e084bd5decdff82390e3471801. For more details please see the references link. | null | 2022-04-25T06:49:46.422604Z | 2022-04-24T20:40:32.785734Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f295b3ae9f5927e084bd5decdff82390e3471801'} |
Linux | GSD-2021-1000798 | netfilter: nft_ct: skip expectations for confirmed conntrack | netfilter: nft_ct: skip expectations for confirmed conntrack
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit 2c0e6b35b88a961127066a1028bce9c727cbc3e5, it was introduced in version v5.3 by commit 857b46027d6f91150797295752581b7155b9d0e1. For more details please see the references link. | null | 2021-12-19T23:33:25.614240Z | 2021-06-25T00:08:03.912291Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/857b46027d6f91150797295752581b7155b9d0e1'} |
Linux | GSD-2021-1000262 | powerpc: Fix HAVE_HARDLOCKUP_DETECTOR_ARCH build configuration | powerpc: Fix HAVE_HARDLOCKUP_DETECTOR_ARCH build configuration
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 5a54afcc73bccd4c31a2c94b00fbb1ad733430ea, it was introduced in version v4.13 by commit 2104180a53698df5aec35aed5f840a26ade0551d. For more details please see the references link. | null | 2021-12-20T00:00:58.448571Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2104180a53698df5aec35aed5f840a26ade0551d'} |
Linux | GSD-2021-1000632 | tipc: wait and exit until all work queues are done | tipc: wait and exit until all work queues are done
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.124 by commit d1f76dfadaf8f47ed1753f97dbcbd41c16215ffa, it was introduced in version v4.1 by commit d0f91938bede204a343473792529e0db7d599836. For more details please see the references link. | null | 2021-12-20T01:25:40.268838Z | 2021-06-04T19:51:05.376292Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0f91938bede204a343473792529e0db7d599836'} |
Linux | GSD-2021-1001920 | isdn: cpai: check ctr->cnr to avoid array index out of bound | isdn: cpai: check ctr->cnr to avoid array index out of bound
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.290 by commit e8b8de17e164c9f1b7777f1c6f99d05539000036. For more details please see the references link. | null | 2021-12-20T00:42:07.926944Z | 2021-11-14T15:11:45.882540Z | null | null | null | null | null |
Linux | GSD-2022-1002123 | ext4: fix fs corruption when tring to remove a non-empty directory with IO error | ext4: fix fs corruption when tring to remove a non-empty directory with IO error
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit b35eb48471822a60f3dda67c57d49fd515c9a121. For more details please see the references link. | null | 2022-04-25T05:59:45.083782Z | 2022-04-24T22:13:49.285982Z | null | null | null | null | null |
Linux | GSD-2021-1001189 | powerpc/bpf: Fix detecting BPF atomic instructions | powerpc/bpf: Fix detecting BPF atomic instructions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.4 by commit 0d435b6d94b05dcfd836d758a63145aa566618e2, it was introduced in version v5.12 by commit 91c960b0056672e74627776655c926388350fa30. For more details please see the references link. | null | 2021-12-19T22:16:46.331801Z | 2021-08-03T01:33:31.965138Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/91c960b0056672e74627776655c926388350fa30'} |
Linux | GSD-2021-1001473 | memory: fsl_ifc: fix leak of private memory on probe failure | memory: fsl_ifc: fix leak of private memory on probe failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.276 by commit 8018476756066e97ecb886c3dc024aeb7d5792ad, it was introduced in version v3.3 by commit a20cbdeffce247a2b6fb83cd8d22433994068565. For more details please see the references link. | null | 2021-12-19T22:41:04.976043Z | 2021-08-03T02:51:58.901005Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a20cbdeffce247a2b6fb83cd8d22433994068565'} |
Linux | GSD-2021-1001023 | bus: mhi: pci_generic: Fix possible use-after-free in mhi_pci_remove() | bus: mhi: pci_generic: Fix possible use-after-free in mhi_pci_remove()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.11 by commit c597d5c59c7a6417dba06590f59b922e01188e8d, it was introduced in version v5.12 by commit 8562d4fe34a3ef52da077f77985994bb9ad1f83e. For more details please see the references link. | null | 2021-12-19T23:10:13.894862Z | 2021-06-30T00:34:32.724767Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8562d4fe34a3ef52da077f77985994bb9ad1f83e'} |
Linux | GSD-2022-1002089 | drm/tegra: Fix reference leak in tegra_dsi_ganged_probe | drm/tegra: Fix reference leak in tegra_dsi_ganged_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 1e06710c43a090f14bb67714265a01cd1d7a37c5, it was introduced in version v3.19 by commit e94236cde4d519cdecd45e2435defba33abdc99f. For more details please see the references link. | null | 2022-04-25T06:46:18.839422Z | 2022-04-24T22:09:52.076598Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e94236cde4d519cdecd45e2435defba33abdc99f'} |
Linux | GSD-2021-1001536 | cpufreq: schedutil: Use kobject release() method to free sugov_tunables | cpufreq: schedutil: Use kobject release() method to free sugov_tunables
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.249 by commit 463c46705f321201090b69c4ad5da0cd2ce614c9, it was introduced in version v4.7 by commit 9bdcb44e391da5c41b98573bf0305a0e0b1c9569. For more details please see the references link. | null | 2021-12-19T22:21:36.244631Z | 2021-10-19T16:22:42.403957Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9bdcb44e391da5c41b98573bf0305a0e0b1c9569'} |
Linux | GSD-2022-1002066 | remoteproc: qcom_q6v5_mss: Fix some leaks in q6v5_alloc_memory_region | remoteproc: qcom_q6v5_mss: Fix some leaks in q6v5_alloc_memory_region
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit f7210ca29a783c94478da02368731e4c9cf7cdb7, it was introduced in version v4.17 by commit 278d744c46fd4f1925aec77752d18a0e4a9cbec3. For more details please see the references link. | null | 2022-04-25T04:51:32.500837Z | 2022-04-24T22:07:13.396171Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/278d744c46fd4f1925aec77752d18a0e4a9cbec3'} |
Linux | GSD-2021-1001166 | net/sched: act_skbmod: Skip non-Ethernet packets | net/sched: act_skbmod: Skip non-Ethernet packets
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.6 by commit 34f1e1f657fae2891b485a3b2b95fe4d2aef9f0d, it was introduced in version v4.9 by commit 86da71b57383d40993cb90baafb3735cffe5d800. For more details please see the references link. | null | 2021-12-19T23:36:42.706723Z | 2021-08-03T01:31:50.650068Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/86da71b57383d40993cb90baafb3735cffe5d800'} |
Linux | GSD-2022-1002436 | ext2: correct max file size computing | ext2: correct max file size computing
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 94fe9ee8d6d48235b44e14820c07271be3c25cff, it was introduced in version v4.14.108 by commit 7412f34ff819f530461bfe57773f83e1d4419421. For more details please see the references link. | null | 2022-04-25T03:05:32.397420Z | 2022-04-24T22:47:09.912445Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7412f34ff819f530461bfe57773f83e1d4419421'} |
Linux | GSD-2021-1000327 | netfilter: nftables: Fix a memleak from userdata error path in new objects | netfilter: nftables: Fix a memleak from userdata error path in new objects
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.38 by commit 2c784a500f5edd337258b0fdb2f31bc9abde1a23, it was introduced in version v5.10 by commit b131c96496b369c7b14125e7c50e89ac7cec8051. For more details please see the references link. | null | 2021-12-19T23:43:41.545360Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b131c96496b369c7b14125e7c50e89ac7cec8051'} |
Linux | GSD-2022-1000958 | ALSA: pcm: Test for "silence" field in struct "pcm_format_data" | ALSA: pcm: Test for "silence" field in struct "pcm_format_data"
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.4 by commit 97345c90235b1bb7661e7a428d9dcb96b1d7f5d4. For more details please see the references link. | null | 2022-04-25T05:47:37.711256Z | 2022-04-24T20:35:01.467909Z | null | null | null | null | null |
Linux | GSD-2021-1000777 | pid: take a reference when initializing `cad_pid` | pid: take a reference when initializing `cad_pid`
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.43 by commit 7178be006d495ffb741c329012da289b62dddfe6, it was introduced in version v2.6.19 by commit 9ec52099e4b8678a60e9f93e41ad87885d64f3e6. For more details please see the references link. | null | 2021-12-20T00:31:45.149116Z | 2021-06-25T00:04:56.734210Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9ec52099e4b8678a60e9f93e41ad87885d64f3e6'} |
Linux | GSD-2021-1001865 | scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() | scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit a7fbb56e6c941d9f59437b96412a348e66388d3e, it was introduced in version v3.11 by commit 8c0eb596baa51f2b43949c698c644727ef17805c. For more details please see the references link. | null | 2021-12-20T00:37:25.017344Z | 2021-10-28T13:52:57.786281Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c0eb596baa51f2b43949c698c644727ef17805c'} |
Linux | GSD-2022-1001830 | Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt | Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 770a97d3f34b801de1b04737b43e02c55118c41a, it was introduced in version v5.2 by commit 9aebfd4a2200ab8075e44379c758bccefdc589bb. For more details please see the references link. | null | 2022-04-25T05:30:01.671958Z | 2022-04-24T21:46:04.390736Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9aebfd4a2200ab8075e44379c758bccefdc589bb'} |
Linux | GSD-2022-1000722 | riscv: fix oops caused by irqsoff latency tracer | riscv: fix oops caused by irqsoff latency tracer
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.12 by commit b5e180490db4af8c0f80c4b65ee482d333d0e8ee, it was introduced in version v5.9 by commit 3c46979829824da5af8766d89fa877976bdae884. For more details please see the references link. | null | 2022-03-18T02:59:49.790419Z | 2022-03-18T00:12:14.863975Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c46979829824da5af8766d89fa877976bdae884'} |
Linux | GSD-2022-1000688 | arm64: entry.S: Add ventry overflow sanity checks | arm64: entry.S: Add ventry overflow sanity checks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.14 by commit d1e3d6d26d9eab22548c3b7373ec12bbfecc765f. For more details please see the references link. | null | 2022-03-18T03:02:06.271590Z | 2022-03-18T00:09:43.846456Z | null | null | null | null | null |
Linux | GSD-2022-1000372 | net: dsa: felix: don't use devres for mdiobus | net: dsa: felix: don't use devres for mdiobus
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.101 by commit 95e5402f9430b3c7d885dd3ec4c8c02c17936923, it was introduced in version v5.9 by commit ac3a68d56651c3dad2c12c7afce065fe15267f44. For more details please see the references link. | null | 2022-03-07T01:38:08.486129Z | 2022-02-27T02:57:42.765568Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac3a68d56651c3dad2c12c7afce065fe15267f44'} |
Linux | GSD-2021-1002463 | mtd: rawnand: fsmc: Fix timing computation | mtd: rawnand: fsmc: Fix timing computation
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.165 by commit b78a27fa58cc7090ec4c4137e6afd0d477452844, it was introduced in version v4.13 by commit d9fb0795718333e36f7e472d7d81b7b8efe347c8. For more details please see the references link. | null | 2021-12-19T23:11:33.852645Z | 2021-12-19T19:38:26.065409Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9fb0795718333e36f7e472d7d81b7b8efe347c8'} |
Linux | GSD-2021-1002199 | riscv, bpf: Fix potential NULL dereference | riscv, bpf: Fix potential NULL dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 27de809a3d83a6199664479ebb19712533d6fd9b, it was introduced in version v5.7 by commit ca6cb5447ceca6a87d6b62c9e5d41042c34f7ffa. For more details please see the references link. | null | 2021-12-19T22:16:08.092021Z | 2021-11-14T15:24:23.120751Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca6cb5447ceca6a87d6b62c9e5d41042c34f7ffa'} |
Linux | GSD-2022-1001133 | media: imx-jpeg: fix a bug of accessing array out of bounds | media: imx-jpeg: fix a bug of accessing array out of bounds
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit e209e6db2e527db6a93b14c2deedf969caca78fc. For more details please see the references link. | null | 2022-04-25T05:58:18.757666Z | 2022-04-24T20:48:01.706047Z | null | null | null | null | null |
Linux | GSD-2022-1001099 | io_uring: fix memory leak of uid in files registration | io_uring: fix memory leak of uid in files registration
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 7fa8b228c3f30060b9f4b24bb9aaaf41b0ae83fe, it was introduced in version v5.5 by commit 08a451739a9b5783f67de51e84cb6d9559bb9dc4. For more details please see the references link. | null | 2022-04-25T06:03:11.876779Z | 2022-04-24T20:45:13.234354Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/08a451739a9b5783f67de51e84cb6d9559bb9dc4'} |
Linux | GSD-2021-1002033 | net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path | net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.75 by commit 4f7bddf8c5c01cac74373443b13a68e1c6723a94, it was introduced in version v3.11 by commit e126ba97dba9edeb6fafa3665b5f8497fc9cdf8c. For more details please see the references link. | null | 2021-12-19T22:20:02.930563Z | 2021-11-14T15:16:45.787278Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e126ba97dba9edeb6fafa3665b5f8497fc9cdf8c'} |
Linux | GSD-2022-1001563 | ASoC: atmel: Fix error handling in snd_proto_probe | ASoC: atmel: Fix error handling in snd_proto_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 0f517480d5888cd54487c5662ce4da95b30ad798, it was introduced in version v4.20 by commit a45f8853a5f95e3760dfbd7ba09d3d597d247040. For more details please see the references link. | null | 2022-04-25T04:26:23.688746Z | 2022-04-24T21:23:59.511831Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a45f8853a5f95e3760dfbd7ba09d3d597d247040'} |
Linux | GSD-2022-1001076 | ath11k: pci: fix crash on suspend if board file is not found | ath11k: pci: fix crash on suspend if board file is not found
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit aeed776c00e804a0f7896db39c7c661cea34ee1f. For more details please see the references link. | null | 2022-04-25T08:52:22.492875Z | 2022-04-24T20:43:43.045685Z | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.