ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2021-1002526 | io_uring: fix link traversal locking | io_uring: fix link traversal locking
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.6 by commit 1c939a53b26b6b39378a77f76a49be8dd6df7af0, it was introduced in version v5.15.6 by commit 09eb40f6776c8b50c2e46a504bf5483440ca607d. For more details please see the references link. | null | 2021-12-19T19:41:10.978046Z | 2021-12-19T19:41:10.978046Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/09eb40f6776c8b50c2e46a504bf5483440ca607d'} |
Linux | GSD-2022-1001426 | ACPI: CPPC: Avoid out of bounds access when parsing _CPC data | ACPI: CPPC: Avoid out of bounds access when parsing _CPC data
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit b80b19b32a432c9eee1cd200ef7aaddf608f54d1, it was introduced in version v4.4 by commit 337aadff8e4567e39669e07d9a88b789d78458b5. For more details please see the references link. | null | 2022-04-25T03:21:13.956251Z | 2022-04-24T21:12:05.456905Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/337aadff8e4567e39669e07d9a88b789d78458b5'} |
Linux | GSD-2021-1002176 | audit: fix possible null-pointer dereference in audit_filter_rules | audit: fix possible null-pointer dereference in audit_filter_rules
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 6e3ee990c90494561921c756481d0e2125d8b895, it was introduced in version v5.3 by commit bf361231c295d92a28ca283ea713f56e93e55796. For more details please see the references link. | null | 2021-12-20T01:14:36.714153Z | 2021-11-14T15:23:19.237092Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf361231c295d92a28ca283ea713f56e93e55796'} |
Linux | GSD-2022-1001975 | iommu/omap: Fix regression in probe for NULL pointer dereference | iommu/omap: Fix regression in probe for NULL pointer dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit bd905fed87ce01ac010011bb8f44ed0140116ceb, it was introduced in version v5.8 by commit 6785eb9105e3363aa51408c700a55e8b5f88fcf6. For more details please see the references link. | null | 2022-04-25T05:18:48.388091Z | 2022-04-24T22:00:06.298608Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6785eb9105e3363aa51408c700a55e8b5f88fcf6'} |
Linux | GSD-2022-1000667 | RDMA/ucma: Protect mc during concurrent multicast leaves | RDMA/ucma: Protect mc during concurrent multicast leaves
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.8 by commit ee2477e8ccd3d978eeac0dc5a981b286d9bb7b0a, it was introduced in version v5.10 by commit 95fe51096b7adf1d1e7315c49c75e2f75f162584. For more details please see the references link. | null | 2022-03-07T01:37:56.750399Z | 2022-02-27T03:38:05.252471Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/95fe51096b7adf1d1e7315c49c75e2f75f162584'} |
Linux | GSD-2022-1000237 | tipc: improve size validations for received domain records | tipc: improve size validations for received domain records
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.100 by commit 3c7e5943553594f68bbc070683db6bb6f6e9e78e, it was introduced in version v4.8 by commit 35c55c9877f8de0ab129fa1a309271d0ecc868b9. For more details please see the references link. | null | 2022-02-19T08:04:33.275976Z | 2022-02-18T21:59:47.800540Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/35c55c9877f8de0ab129fa1a309271d0ecc868b9'} |
Linux | GSD-2021-1000848 | NFS: Fix a potential NULL dereference in nfs_get_client() | NFS: Fix a potential NULL dereference in nfs_get_client()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.273 by commit a979e601000982a3ca693171a6d4dffc47f8ad00, it was introduced in version v3.17 by commit 31434f496abb9f3410b10f541462fe58613dd3ad. For more details please see the references link. | null | 2021-12-19T22:27:16.948727Z | 2021-06-30T00:01:09.736927Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/31434f496abb9f3410b10f541462fe58613dd3ad'} |
Linux | GSD-2021-1001035 | usb: fix various gadget panics on 10gbps cabling | usb: fix various gadget panics on 10gbps cabling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.11 by commit ca6bc277430d90375452b60b047763a090b7673e. For more details please see the references link. | null | 2021-12-19T23:01:52.934049Z | 2021-06-30T00:35:19.328806Z | null | null | null | null | null |
Linux | GSD-2022-1000558 | mtd: rawnand: gpmi: don't leak PM reference in error path | mtd: rawnand: gpmi: don't leak PM reference in error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit 58d3111eafce9e4398654b07f0b1dac27f26ee5b, it was introduced in version v5.16.3 by commit c447696e2f825df7800b0630352bea2d45d09baa. For more details please see the references link. | null | 2022-03-07T01:50:21.735444Z | 2022-02-27T03:23:47.575508Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c447696e2f825df7800b0630352bea2d45d09baa'} |
Linux | GSD-2021-1001465 | media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() | media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.277 by commit 4487b968e5eacd02c493303dc2b61150bb7fe4b2, it was introduced in version v2.6.34 by commit dae52d009fc950b5c209260d50fcc000f5becd3c. For more details please see the references link. | null | 2021-12-20T00:36:09.591652Z | 2021-08-03T02:48:57.253293Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/dae52d009fc950b5c209260d50fcc000f5becd3c'} |
Linux | GSD-2022-1002135 | jffs2: fix memory leak in jffs2_do_mount_fs | jffs2: fix memory leak in jffs2_do_mount_fs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 607d3aab7349f18e0d9dba4100d09d16fe27caca, it was introduced in version v2.6.15 by commit e631ddba588783edd521c5a89f7b2902772fb691. For more details please see the references link. | null | 2022-04-25T02:57:12.307755Z | 2022-04-24T22:14:50.202799Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e631ddba588783edd521c5a89f7b2902772fb691'} |
Linux | GSD-2022-1000108 | af_packet: fix data-race in packet_setsockopt / packet_setsockopt | af_packet: fix data-race in packet_setsockopt / packet_setsockopt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.265 by commit 899e0319b3f58d85ac9a2f1d2895a71a275e2f4e, it was introduced in version v4.3 by commit 47dceb8ecdc1c3ad1818dfea3d659a05b74c3fc2. For more details please see the references link. | null | 2022-02-19T08:00:13.022705Z | 2022-02-18T21:41:58.771702Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/47dceb8ecdc1c3ad1818dfea3d659a05b74c3fc2'} |
Linux | GSD-2021-1001936 | can: peak_pci: peak_pci_remove(): fix UAF | can: peak_pci: peak_pci_remove(): fix UAF
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.288 by commit 447d44cd2f67a20b596ede3ca3cd67086dfd9ca9, it was introduced in version v3.4 by commit e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd. For more details please see the references link. | null | 2021-12-19T22:33:16.543897Z | 2021-11-14T15:12:25.164319Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd'} |
Linux | GSD-2021-1000624 | btrfs: return whole extents in fiemap | btrfs: return whole extents in fiemap
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.124 by commit 55575c08502f291cdeff09428189b84084ffa91b, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T23:28:58.609128Z | 2021-06-04T19:49:24.361374Z | null | null | null | null | null |
Linux | GSD-2021-1002619 | firmware: arm_scpi: Fix string overflow in SCPI genpd driver | firmware: arm_scpi: Fix string overflow in SCPI genpd driver
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.294 by commit 639901b9429a3195e0fead981ed74b51f5f31538, it was introduced in version v4.8 by commit 8bec4337ad4023b26de35d3b0c3a3b2735ffc5c7. For more details please see the references link. | null | 2022-01-11T05:52:18.603306Z | 2021-12-27T05:27:29.860684Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8bec4337ad4023b26de35d3b0c3a3b2735ffc5c7'} |
Linux | GSD-2022-1001349 | mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0) | mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0)
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 2358aa84ef6dafcf544a557caaa6b91afb4a0bd2. For more details please see the references link. | null | 2022-04-25T04:31:00.810857Z | 2022-04-24T21:06:38.941064Z | null | null | null | null | null |
Linux | GSD-2021-1000274 | media: aspeed: fix clock handling logic | media: aspeed: fix clock handling logic
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 75321dc8aebe3f30eff226028fe6da340fe0bf02, it was introduced in version v5.0 by commit d2b4387f3bdf016e266d23cf657465f557721488. For more details please see the references link. | null | 2021-12-19T22:03:42.641589Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d2b4387f3bdf016e266d23cf657465f557721488'} |
Linux | GSD-2021-1002249 | ALSA: gus: fix null pointer dereference on pointer block | ALSA: gus: fix null pointer dereference on pointer block
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.218 by commit ab4c1ebc40f699f48346f634d7b72b9c5193f315. For more details please see the references link. | null | 2021-12-20T00:34:25.337630Z | 2021-11-29T02:35:20.877435Z | null | null | null | null | null |
Linux | GSD-2022-1001719 | mips: ralink: fix a refcount leak in ill_acc_of_setup() | mips: ralink: fix a refcount leak in ill_acc_of_setup()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 5fb47ca3490813d3884d8ad0b2ce511aa3537551. For more details please see the references link. | null | 2022-04-25T04:17:00.233595Z | 2022-04-24T21:37:33.737052Z | null | null | null | null | null |
Linux | GSD-2021-1001873 | mm, slub: fix potential memoryleak in kmem_cache_open() | mm, slub: fix potential memoryleak in kmem_cache_open()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit 42b81946e3ac9ea0372ba16e05160dc11e02694f, it was introduced in version v4.8 by commit 210e7a43fa905bccafa9bb5966fba1d71f33eb8b. For more details please see the references link. | null | 2021-12-20T01:26:15.131167Z | 2021-10-28T13:53:20.878579Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/210e7a43fa905bccafa9bb5966fba1d71f33eb8b'} |
Linux | GSD-2021-1000761 | neighbour: allow NUD_NOARP entries to be forced GCed | neighbour: allow NUD_NOARP entries to be forced GCed
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.125 by commit d99029e6aab62aef0a0251588b2867e77e83b137, it was introduced in version v5.0 by commit 58956317c8de52009d1a38a721474c24aef74fe7. For more details please see the references link. | null | 2021-12-19T23:46:02.606442Z | 2021-06-25T00:03:04.976655Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/58956317c8de52009d1a38a721474c24aef74fe7'} |
Linux | GSD-2021-1000331 | sctp: do asoc update earlier in sctp_sf_do_dupcook_a | sctp: do asoc update earlier in sctp_sf_do_dupcook_a
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.38 by commit f01988ecf3654f805282dce2d3bb9afe68d2691e, it was introduced in version v5.7 by commit 145cb2f7177d94bc54563ed26027e952ee0ae03c. For more details please see the references link. | null | 2021-12-19T23:20:09.327144Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/145cb2f7177d94bc54563ed26027e952ee0ae03c'} |
Linux | GSD-2022-1002420 | video: fbdev: cirrusfb: check pixclock to avoid divide by zero | video: fbdev: cirrusfb: check pixclock to avoid divide by zero
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 1d3fb46439ad4e8f0c5739eb33d1875ac9e0f135. For more details please see the references link. | null | 2022-04-25T05:17:34.183690Z | 2022-04-24T22:45:15.616058Z | null | null | null | null | null |
Linux | GSD-2021-1001170 | KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow | KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.6 by commit 35e114e6f84ab559eb35a5ac73590d23a43f22ba, it was introduced in version v3.10 by commit 8e591cb7204739efa8e15967ea334eb367039dde. For more details please see the references link. | null | 2021-12-19T23:25:35.730974Z | 2021-08-03T01:32:06.921747Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8e591cb7204739efa8e15967ea334eb367039dde'} |
Linux | GSD-2022-1002070 | mxser: fix xmit_buf leak in activate when LSR == 0xff | mxser: fix xmit_buf leak in activate when LSR == 0xff
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 2cd05c38a27bee7fb42aa4d43174d68ac55dac0f, it was introduced in version v2.6.33 by commit 6769140d304731f0a3b177470a2adb4bacd9036b. For more details please see the references link. | null | 2022-04-25T05:38:28.035647Z | 2022-04-24T22:07:44.131975Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6769140d304731f0a3b177470a2adb4bacd9036b'} |
Linux | GSD-2021-1001520 | xen/x86: fix PV trap handling on secondary processors | xen/x86: fix PV trap handling on secondary processors
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.285 by commit 2c3b07818dc05fb71928b4d87c1e958c911baa20, it was introduced in version v2.6.23 by commit f87e4cac4f4e940b328d3deb5b53e642e3881f43. For more details please see the references link. | null | 2021-12-19T23:56:50.841915Z | 2021-10-19T16:21:56.336325Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f87e4cac4f4e940b328d3deb5b53e642e3881f43'} |
Linux | GSD-2022-1001575 | f2fs: fix compressed file start atomic write may cause data corruption | f2fs: fix compressed file start atomic write may cause data corruption
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 89b1c23591e0a86e7b82e013ca6ca62ffebf8a1c, it was introduced in version v5.6 by commit 4c8ff7095bef64fc47e996a938f7d57f9e077da3. For more details please see the references link. | null | 2022-04-25T05:25:28.596739Z | 2022-04-24T21:25:22.483584Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4c8ff7095bef64fc47e996a938f7d57f9e077da3'} |
Linux | GSD-2021-1002025 | comedi: ni_usb6501: fix NULL-deref in command paths | comedi: ni_usb6501: fix NULL-deref in command paths
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.159 by commit b0156b7c9649d8f55a2ce3d3258509f1b2a181c3, it was introduced in version v3.18 by commit a03bb00e50ab4c07107da58a52a0bff7943f360c. For more details please see the references link. | null | 2021-12-19T22:28:59.542832Z | 2021-11-14T15:16:26.016884Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a03bb00e50ab4c07107da58a52a0bff7943f360c'} |
Linux | GSD-2021-1000018 | ch_ktls: Fix kernel panic | ch_ktls: Fix kernel panic
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.16 by commit 8348665d4181c68b0ca1205b48e1753d78bc810f, it was introduced in version v5.7 by commit 5a4b9fe7fece62ecab6fb28fe92362f83b41c33e. For more details please see the references link. | null | 2021-12-20T00:04:21.534604Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5a4b9fe7fece62ecab6fb28fe92362f83b41c33e'} |
Linux | GSD-2022-1001125 | scsi: qla2xxx: Fix warning message due to adisc being flushed | scsi: qla2xxx: Fix warning message due to adisc being flushed
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit d8fb8da69e194e0249b3cdb746ef09ce823ae26b. For more details please see the references link. | null | 2022-04-25T05:07:52.268358Z | 2022-04-24T20:47:36.536774Z | null | null | null | null | null |
Linux | GSD-2021-1002475 | mlxsw: spectrum: Protect driver from buggy firmware | mlxsw: spectrum: Protect driver from buggy firmware
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.83 by commit 90d0736876c50ecde1a3275636a06b9ddb1cace9, it was introduced in version v5.4 by commit 28b1987ef5064dd5c43538ba1168ef7b801f3cad. For more details please see the references link. | null | 2021-12-19T23:34:57.284845Z | 2021-12-19T19:39:01.465552Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/28b1987ef5064dd5c43538ba1168ef7b801f3cad'} |
Linux | GSD-2021-1000448 | sctp: do asoc update earlier in sctp_sf_do_dupcook_a | sctp: do asoc update earlier in sctp_sf_do_dupcook_a
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.191 by commit d624f2991b977821375fbd56c91b0c91d456a697, it was introduced in version v4.19.123 by commit db8bf823e70f239372c62f13e4eb6f08a1665e8c. For more details please see the references link. | null | 2021-12-20T01:19:52.185773Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/db8bf823e70f239372c62f13e4eb6f08a1665e8c'} |
Linux | GSD-2022-1000364 | misc: fastrpc: avoid double fput() on failed usercopy | misc: fastrpc: avoid double fput() on failed usercopy
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.101 by commit a5ce7ee5fcc07583159f54ab4af5164de00148f5, it was introduced in version v5.1 by commit 6cffd79504ce040f460831030d3069fa1c99bb71. For more details please see the references link. | null | 2022-03-07T01:33:50.585171Z | 2022-02-27T02:56:48.798573Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6cffd79504ce040f460831030d3069fa1c99bb71'} |
Linux | GSD-2022-1002359 | ath9k_htc: fix uninit value bugs | ath9k_htc: fix uninit value bugs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit ee4222052a76559c20e821bc3519cefb58b6d3e9, it was introduced in version v2.6.35 by commit fb9987d0f748c983bb795a86f47522313f701a08. For more details please see the references link. | null | 2022-04-25T03:35:13.348516Z | 2022-04-24T22:38:24.202404Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb9987d0f748c983bb795a86f47522313f701a08'} |
Linux | GSD-2021-1001609 | md: fix a lock order reversal in md_alloc | md: fix a lock order reversal in md_alloc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.150 by commit 2b5befcd404522caae0df7e085b699122f5196a3, it was introduced in version v3.0 by commit b0140891a8cea36469f58d23859e599b1122bd37. For more details please see the references link. | null | 2021-12-20T01:04:10.625830Z | 2021-10-19T16:28:05.662356Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b0140891a8cea36469f58d23859e599b1122bd37'} |
Linux | GSD-2022-1000734 | RDMA/ib_srp: Fix a deadlock | RDMA/ib_srp: Fix a deadlock
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.12 by commit 98d056603ce55ceb90631b3927151c190dfb1b27, it was introduced in version v3.8 by commit ef6c49d87c3418c442a22e55e3ce2f91b163d69e. For more details please see the references link. | null | 2022-03-18T02:53:01.657831Z | 2022-03-18T00:13:33.848774Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef6c49d87c3418c442a22e55e3ce2f91b163d69e'} |
Linux | GSD-2022-1001826 | ax25: Fix NULL pointer dereferences in ax25 timers | ax25: Fix NULL pointer dereferences in ax25 timers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.35 by commit 43c107021d9160f6a1610bafba6dadc0323ae548, it was introduced in version v5.15.35 by commit da6509fba636f7f8b2e902b1e4742fdbf1bf059f. For more details please see the references link. | null | 2022-04-24T21:45:34.189961Z | 2022-04-24T21:45:34.189961Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/da6509fba636f7f8b2e902b1e4742fdbf1bf059f'} |
Linux | GSD-2021-1001259 | net: ti: fix UAF in tlan_remove_one | net: ti: fix UAF in tlan_remove_one
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.53 by commit f2a062fcfe1d6f1b0a86fa76ae21c277d65f4405, it was introduced in version v3.10 by commit 1e0a8b13d35510e711fdf72e9a3e30bcb2bd49fa. For more details please see the references link. | null | 2021-12-20T00:45:28.376068Z | 2021-08-03T01:50:38.801711Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e0a8b13d35510e711fdf72e9a3e30bcb2bd49fa'} |
Linux | GSD-2022-1000221 | mm/kmemleak: avoid scanning potential huge holes | mm/kmemleak: avoid scanning potential huge holes
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.99 by commit 352715593e81b917ce1b321e794549815b850134. For more details please see the references link. | null | 2022-02-19T04:01:44.356708Z | 2022-02-18T21:57:08.935598Z | null | null | null | null | null |
Linux | GSD-2022-1000671 | net: ieee802154: ca8210: Stop leaking skb's | net: ieee802154: ca8210: Stop leaking skb's
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.8 by commit 21feb6df3967541931242c427fe0958276af81cc, it was introduced in version v4.12 by commit ded845a781a578dfb0b5b2c138e5a067aa3b1242. For more details please see the references link. | null | 2022-03-07T01:35:31.415571Z | 2022-02-27T03:39:12.456550Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ded845a781a578dfb0b5b2c138e5a067aa3b1242'} |
Linux | GSD-2022-1001963 | veth: Ensure eth header is in skb's linear part | veth: Ensure eth header is in skb's linear part
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.112 by commit d67c900f1947d64ba8a64f693504bcaab8d9000c, it was introduced in version v2.6.24 by commit e314dbdc1c0dc6a548ecf0afce28ecfd538ff568. For more details please see the references link. | null | 2022-04-25T03:38:07.393057Z | 2022-04-24T21:58:55.197748Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e314dbdc1c0dc6a548ecf0afce28ecfd538ff568'} |
Linux | GSD-2021-1002160 | drm/msm/submit: fix overflow check on 64-bit architectures | drm/msm/submit: fix overflow check on 64-bit architectures
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 95c58291ee709424557996891926a05a32c5b13a, it was introduced in version v5.11 by commit 20224d715a882210428ea62bba93f1bc4a0afe23. For more details please see the references link. | null | 2021-12-20T00:26:33.803375Z | 2021-11-14T15:22:39.130189Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/20224d715a882210428ea62bba93f1bc4a0afe23'} |
Linux | GSD-2022-1001430 | ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl | ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit c32fe764191b8ae8b128588beb96e3718d9179d8, it was introduced in version v4.8 by commit 714fb87e8bc05ff78255afc0dca981e8c5242785. For more details please see the references link. | null | 2022-04-25T04:20:14.429797Z | 2022-04-24T21:12:26.764026Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/714fb87e8bc05ff78255afc0dca981e8c5242785'} |
Linux | GSD-2021-1002530 | proc/vmcore: fix clearing user buffer by properly using clear_user() | proc/vmcore: fix clearing user buffer by properly using clear_user()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.6 by commit 7b3a34f08d11e7f05cd00b8e09adaa15192f0ad1, it was introduced in version v3.0 by commit 997c136f518c5debd63847e78e2a8694f56dcf90. For more details please see the references link. | null | 2021-12-19T23:52:49.120894Z | 2021-12-19T19:41:20.713871Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/997c136f518c5debd63847e78e2a8694f56dcf90'} |
Linux | GSD-2022-1001060 | x86/mce: Work around an erratum on fast string copy instructions | x86/mce: Work around an erratum on fast string copy instructions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit ba37c73be3d5632f6fb9fa20b250ce45560ca85d. For more details please see the references link. | null | 2022-04-25T05:26:50.878794Z | 2022-04-24T20:42:56.780182Z | null | null | null | null | null |
Linux | GSD-2021-1000223 | KEYS: trusted: Fix memory leak on object td | KEYS: trusted: Fix memory leak on object td
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.5 by commit 3e24fbd37e72e8a67b74991970fecc82d14f57af, it was introduced in version v5.12 by commit 5df16caada3fba3b21cb09b85cdedf99507f4ec1. For more details please see the references link. | null | 2021-12-19T22:29:18.773465Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5df16caada3fba3b21cb09b85cdedf99507f4ec1'} |
Linux | GSD-2021-1000389 | crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init | crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 1f50392650ae794a1aea41c213c6a3e1c824413c, it was introduced in version v4.7 by commit 25c6ffb249f612c56a48ce48a3887adf57b8f4bd. For more details please see the references link. | null | 2021-12-19T23:12:03.589927Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/25c6ffb249f612c56a48ce48a3887adf57b8f4bd'} |
Linux | GSD-2021-1001961 | isdn: mISDN: Fix sleeping function called from invalid context | isdn: mISDN: Fix sleeping function called from invalid context
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.253 by commit 37e4f57b22cc5ebb3f80cf0f74fdeb487f082367. For more details please see the references link. | null | 2021-12-20T01:20:43.643927Z | 2021-11-14T15:13:33.660555Z | null | null | null | null | null |
Linux | GSD-2021-1000673 | i2c: i801: Don't generate an interrupt on bus reset | i2c: i801: Don't generate an interrupt on bus reset
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.235 by commit dfa8929e117b0228a7765f5c3f5988a4a028f3c6, it was introduced in version v3.6 by commit 636752bcb5177a301d0266270661581de8624828. For more details please see the references link. | null | 2021-12-19T23:06:50.399242Z | 2021-06-04T19:59:25.767841Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/636752bcb5177a301d0266270661581de8624828'} |
Linux | GSD-2022-1002162 | scsi: target: tcmu: Fix possible page UAF | scsi: target: tcmu: Fix possible page UAF
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.190 by commit fb7a5115422fbd6a4d505e8844f1ef5529f10489. For more details please see the references link. | null | 2022-04-25T03:49:44.789892Z | 2022-04-24T22:17:14.147304Z | null | null | null | null | null |
Linux | GSD-2022-1002498 | power: supply: wm8350-power: Add missing free in free_charger_irq | power: supply: wm8350-power: Add missing free in free_charger_irq
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit a6a3ec1626846fba62609330673a2dd5007d6a53, it was introduced in version v2.6.29 by commit 14431aa0c5a443d13d24e6f865a8838f97dab973. For more details please see the references link. | null | 2022-04-25T05:22:39.453329Z | 2022-04-24T22:54:39.448552Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/14431aa0c5a443d13d24e6f865a8838f97dab973'} |
Linux | GSD-2021-1001432 | mISDN: fix possible use-after-free in HFC_cleanup() | mISDN: fix possible use-after-free in HFC_cleanup()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.240 by commit 7867ddc5f3de7f289aee63233afc0df4b62834c5. For more details please see the references link. | null | 2021-12-19T22:45:43.592322Z | 2021-08-03T02:39:04.240391Z | null | null | null | null | null |
Linux | GSD-2021-1001598 | mac80211: fix use-after-free in CCMP/GCMP RX | mac80211: fix use-after-free in CCMP/GCMP RX
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.151 by commit 50149e0866a82cef33e680ee68dc380a5bc75d32, it was introduced in version v5.4.124 by commit c8b3a6150dc8ac78d5fdd5fbdfc4806249ef8b2c. For more details please see the references link. | null | 2021-12-19T23:17:19.311795Z | 2021-10-19T16:27:37.539557Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c8b3a6150dc8ac78d5fdd5fbdfc4806249ef8b2c'} |
Linux | GSD-2021-1001062 | mptcp: Fix out of bounds when parsing TCP options | mptcp: Fix out of bounds when parsing TCP options
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit 76e02b8905d0691e89e104a882f3bba7dd0f6037, it was introduced in version v5.6 by commit cec37a6e41aae7bf3df9a3da783380a4d9325fd8. For more details please see the references link. | null | 2021-12-20T00:22:11.583537Z | 2021-06-30T00:37:05.538043Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cec37a6e41aae7bf3df9a3da783380a4d9325fd8'} |
Linux | GSD-2021-1001577 | i2c: acpi: fix resource leak in reconfiguration device addition | i2c: acpi: fix resource leak in reconfiguration device addition
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.153 by commit 60bacf259e8c2eb2324f3e13275200baaee9494b, it was introduced in version v4.8 by commit 525e6fabeae286848592363bda13bc34b59bb5ac. For more details please see the references link. | null | 2021-12-19T23:20:35.081390Z | 2021-10-19T16:24:34.125935Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/525e6fabeae286848592363bda13bc34b59bb5ac'} |
Linux | GSD-2022-1002027 | can: mcba_usb: properly check endpoint type | can: mcba_usb: properly check endpoint type
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit ef0acc514123140157b19a9ff2e2de5d91d612bc, it was introduced in version v4.12 by commit 51f3baad7de943780ce0c17bd7975df567dd6e14. For more details please see the references link. | null | 2022-04-25T04:25:32.516254Z | 2022-04-24T22:04:08.880342Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/51f3baad7de943780ce0c17bd7975df567dd6e14'} |
Linux | GSD-2021-1001127 | net: qed: Fix memcpy() overflow of qed_dcbx_params() | net: qed: Fix memcpy() overflow of qed_dcbx_params()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.47 by commit ca0e1fefbb534cc86296d9e5d116b0bf49084112. For more details please see the references link. | null | 2021-12-19T22:23:21.300730Z | 2021-07-08T01:58:15.727528Z | null | null | null | null | null |
Linux | GSD-2022-1002477 | MIPS: fix fortify panic when copying asm exception handlers | MIPS: fix fortify panic when copying asm exception handlers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit fc283677599b5b13e5e2734abb8829adb8c02ce1. For more details please see the references link. | null | 2022-04-25T06:27:37.236471Z | 2022-04-24T22:52:29.813999Z | null | null | null | null | null |
Linux | GSD-2021-1000366 | Bluetooth: avoid deadlock between hci_dev->lock and socket lock | Bluetooth: avoid deadlock between hci_dev->lock and socket lock
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 7cc0ba67883c6c8d3bddb283f56c167fc837a555, it was introduced in version v5.7 by commit eab2404ba798a8efda2a970f44071c3406d94e57. For more details please see the references link. | null | 2021-12-20T00:31:06.603179Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/eab2404ba798a8efda2a970f44071c3406d94e57'} |
Linux | GSD-2022-1000919 | net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe() | net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.270 by commit b1ee6b9340a38bdb9e5c90f0eac5b22b122c3049, it was introduced in version v3.18 by commit 8c14f9c70327a6fb75534c4c61d7ea9c82ccf78f. For more details please see the references link. | null | 2022-03-18T02:55:06.177047Z | 2022-03-18T00:32:01.028936Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c14f9c70327a6fb75534c4c61d7ea9c82ccf78f'} |
Linux | GSD-2021-1001824 | ocfs2: mount fails with buffer overflow in strlen | ocfs2: mount fails with buffer overflow in strlen
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.156 by commit d3a83576378b4c904f711598dde2c5e881c4295c. For more details please see the references link. | null | 2021-12-20T00:15:06.056969Z | 2021-10-28T13:50:48.096013Z | null | null | null | null | null |
Linux | GSD-2021-1000736 | mm, hugetlb: fix simple resv_huge_pages underflow on UFFDIO_COPY | mm, hugetlb: fix simple resv_huge_pages underflow on UFFDIO_COPY
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.236 by commit b5869ed8a39a4c6599f1d6c52e9ece785ceb8e16, it was introduced in version v4.11 by commit 8fb5debc5fcd450470cdd789c2d80ef95ebb8cf4. For more details please see the references link. | null | 2021-12-19T23:21:43.711843Z | 2021-06-25T00:00:05.765751Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8fb5debc5fcd450470cdd789c2d80ef95ebb8cf4'} |
Linux | GSD-2022-1000299 | usb: f_fs: Fix use-after-free for epfile | usb: f_fs: Fix use-after-free for epfile
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.267 by commit 32048f4be071f9a6966744243f1786f45bb22dc2, it was introduced in version v4.9 by commit a9e6f83c2df199187a5248f824f31b6787ae23ae. For more details please see the references link. | null | 2022-03-07T01:43:28.845929Z | 2022-02-27T02:48:02.716077Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a9e6f83c2df199187a5248f824f31b6787ae23ae'} |
Linux | GSD-2022-1000763 | iommu/amd: Fix I/O page table memory leak | iommu/amd: Fix I/O page table memory leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.27 by commit 378e2fe1eb58d5c2ed55c8fe5e11f9db5033cdd6, it was introduced in version v5.12 by commit e42ba0633064ef23eb1c8c21edf96bac1541bd4b. For more details please see the references link. | null | 2022-03-18T03:00:04.503966Z | 2022-03-18T00:15:59.051183Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e42ba0633064ef23eb1c8c21edf96bac1541bd4b'} |
Linux | GSD-2022-1001871 | ASoC: atmel: Fix error handling in snd_proto_probe | ASoC: atmel: Fix error handling in snd_proto_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit f32ac9bf5e3f594ef9bfedb410aebc98cf784e69, it was introduced in version v4.20 by commit a45f8853a5f95e3760dfbd7ba09d3d597d247040. For more details please see the references link. | null | 2022-04-25T05:25:01.866536Z | 2022-04-24T21:50:18.586871Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a45f8853a5f95e3760dfbd7ba09d3d597d247040'} |
Linux | GSD-2022-1000333 | scsi: target: iscsi: Make sure the np under each tpg is unique | scsi: target: iscsi: Make sure the np under each tpg is unique
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.180 by commit c6a7077144ed291cfbf736875ad0fe89e6291f02. For more details please see the references link. | null | 2022-03-07T01:38:50.003512Z | 2022-02-27T02:52:34.702798Z | null | null | null | null | null |
Linux | GSD-2021-1002422 | serial: core: fix transmit-buffer reset and memleak | serial: core: fix transmit-buffer reset and memleak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.220 by commit 1179b168fa3f3a6aae3bd140000455a0e58457db, it was introduced in version v4.9 by commit 761ed4a94582ab291aa24dcbea4e01e8936488c8. For more details please see the references link. | null | 2021-12-19T23:17:10.480665Z | 2021-12-19T19:36:39.968395Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/761ed4a94582ab291aa24dcbea4e01e8936488c8'} |
Linux | GSD-2022-1001488 | lib/test: use after free in register_test_dev_kmod() | lib/test: use after free in register_test_dev_kmod()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 0d26d371130d0edd59e9db0cf8142d460953d402, it was introduced in version v4.13 by commit d9c6a72d6fa29d3a7999dda726577e5d1fccafa5. For more details please see the references link. | null | 2022-04-25T06:03:40.601411Z | 2022-04-24T21:16:21.635332Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9c6a72d6fa29d3a7999dda726577e5d1fccafa5'} |
Linux | GSD-2022-1001172 | net: sparx5: switchdev: fix possible NULL pointer dereference | net: sparx5: switchdev: fix possible NULL pointer dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit e7e1fff76c4c57688dc7d53a3b6212182d5628d0, it was introduced in version v5.15 by commit 10615907e9b51c9ae92f3a6ecabd01c482f20f32. For more details please see the references link. | null | 2022-04-25T07:26:32.841787Z | 2022-04-24T20:50:23.801687Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/10615907e9b51c9ae92f3a6ecabd01c482f20f32'} |
Linux | GSD-2021-1002072 | staging: rtl8712: fix use-after-free in rtl8712_dl_fw | staging: rtl8712: fix use-after-free in rtl8712_dl_fw
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.79 by commit c430094541a80575259a94ff879063ef01473506, it was introduced in version v3.3 by commit 8c213fa59199f9673d66970d6940fa093186642f. For more details please see the references link. | null | 2021-12-20T00:50:49.145697Z | 2021-11-14T15:18:36.385463Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c213fa59199f9673d66970d6940fa093186642f'} |
Linux | GSD-2022-1001522 | Revert "RDMA/core: Fix ib_qp_usecnt_dec() called when error" | Revert "RDMA/core: Fix ib_qp_usecnt_dec() called when error"
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit eed4e3e752c2f8dfa290d3cd872e2945d30b46e7, it was introduced in version v5.16.19 by commit c62452bd75f59b13019d3f4ce508a30949fb6375. For more details please see the references link. | null | 2022-04-24T21:19:50.789836Z | 2022-04-24T21:19:50.789836Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c62452bd75f59b13019d3f4ce508a30949fb6375'} |
Linux | GSD-2021-1002588 | nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done | nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.8 by commit fae9705d281091254d4a81fa2da9d22346097dca, it was introduced in version v3.12 by commit ac22ac466a659f1b2e02a2e2ee23fc5c42da2c95. For more details please see the references link. | null | 2021-12-20T00:40:45.402868Z | 2021-12-19T19:43:56.746002Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac22ac466a659f1b2e02a2e2ee23fc5c42da2c95'} |
Linux | GSD-2022-1001037 | staging: vchiq_arm: Avoid NULL ptr deref in vchiq_dump_platform_instances | staging: vchiq_arm: Avoid NULL ptr deref in vchiq_dump_platform_instances
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 51e5e5c34c22c0bfec0808d8c33e0b2fcf4c7c89. For more details please see the references link. | null | 2022-04-25T04:28:28.595453Z | 2022-04-24T20:41:38.003805Z | null | null | null | null | null |
Linux | GSD-2021-1002567 | octeontx2-af: Fix a memleak bug in rvu_mbox_init() | octeontx2-af: Fix a memleak bug in rvu_mbox_init()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.7 by commit 1c0ddef45b7e3dbe3ed073695d20faa572b7056a, it was introduced in version v5.12 by commit 98c5611163603d3d8012b1bf64ab48fd932cf734. For more details please see the references link. | null | 2021-12-19T22:19:32.256797Z | 2021-12-19T19:43:07.242551Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/98c5611163603d3d8012b1bf64ab48fd932cf734'} |
Linux | GSD-2022-1001467 | f2fs: use spin_lock to avoid hang | f2fs: use spin_lock to avoid hang
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 738886004bd2885ac2db0bc63b4874aa471ca87e. For more details please see the references link. | null | 2022-04-25T04:01:04.187418Z | 2022-04-24T21:15:15.545652Z | null | null | null | null | null |
Linux | GSD-2021-1002137 | net: batman-adv: fix error handling | net: batman-adv: fix error handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.16 by commit a8f7359259dd5923adc6129284fdad12fc5db347, it was introduced in version v2.6.38 by commit c6c8fea29769d998d94fcec9b9f14d4b52b349d3. For more details please see the references link. | null | 2021-12-20T01:00:24.597045Z | 2021-11-14T15:21:34.299524Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6c8fea29769d998d94fcec9b9f14d4b52b349d3'} |
Linux | GSD-2022-1000626 | powerpc64/bpf: Limit 'ldbrx' to processors compliant with ISA v2.06 | powerpc64/bpf: Limit 'ldbrx' to processors compliant with ISA v2.06
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.5 by commit aaccfeeee1630b155e8ff0d6c449d3de1ef86e73, it was introduced in version v4.8 by commit 156d0e290e969caba25f1851c52417c14d141b24. For more details please see the references link. | null | 2022-03-07T01:39:34.600317Z | 2022-02-27T03:32:49.103480Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/156d0e290e969caba25f1851c52417c14d141b24'} |
Linux | GSD-2022-1001934 | locking/lockdep: Avoid potential access of invalid memory in lock_class | locking/lockdep: Avoid potential access of invalid memory in lock_class
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 03f836fcb655417693aef350dcb830451ab7d388, it was introduced in version v5.1 by commit 8b39adbee805c539a461dbf208b125b096152b1c. For more details please see the references link. | null | 2022-04-25T06:55:23.003775Z | 2022-04-24T21:56:09.529634Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8b39adbee805c539a461dbf208b125b096152b1c'} |
Linux | GSD-2022-1000276 | rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() | rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.20 by commit def5e7070079b2a214b3b1a2fbec623e6fbfe34a, it was introduced in version v3.14 by commit ba7d49b1f0f8e5f24294a880ed576964059af5ef. For more details please see the references link. | null | 2022-02-19T03:05:38.312571Z | 2022-02-18T22:05:10.715844Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ba7d49b1f0f8e5f24294a880ed576964059af5ef'} |
Linux | GSD-2021-1002834 | platform/x86: intel_pmc_core: fix memleak on registration failure | platform/x86: intel_pmc_core: fix memleak on registration failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.12 by commit 9ca1324755f1f8629a370af5cc315b175331f5d1, it was introduced in version v5.9 by commit 938835aa903ae19ad62805134f79bbcf20fc3bea. For more details please see the references link. | null | 2022-01-11T05:47:52.129337Z | 2021-12-30T02:45:33.181463Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/938835aa903ae19ad62805134f79bbcf20fc3bea'} |
Linux | GSD-2021-1000809 | net: caif: fix memory leak in cfusbl_device_notify | net: caif: fix memory leak in cfusbl_device_notify
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit dde8686985ec24d6b00487080a906609bd613ea1, it was introduced in version v3.3 by commit 7ad65bf68d705b445ef10b77ab50dab22be185ee. For more details please see the references link. | null | 2021-12-20T00:19:27.044600Z | 2021-06-25T00:08:45.779960Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ad65bf68d705b445ef10b77ab50dab22be185ee'} |
Maven | GHSA-37pw-qw47-4jxm | Privilege escalation vulnerability in Apache Hadoop | In Apache Hadoop versions 3.0.0-alpha1 to 3.1.0, 2.9.0 to 2.9.1, and 2.2.0 to 2.8.4, a user who can escalate to yarn user can possibly run arbitrary commands as root user. | {'CVE-2018-8029'} | 2022-03-03T05:14:19.336565Z | 2019-05-31T16:09:15Z | HIGH | null | {'CWE-285'} | {'https://lists.apache.org/thread.html/a0164b87660223a2d491f83c88f905fe1a9fa8dc795148d9b0d968c8@%3Cdev.hbase.apache.org%3E', 'http://www.securityfocus.com/bid/108518', 'https://lists.apache.org/thread.html/r4dddf1705dbedfa94392913b2dad1cd2d1d89040facd389eea0b3510@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/a97c53a81e639ca2fc7b8f61a4fcd1842c2a78544041244a7c624727@%3Cissues.hbase.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8029', 'https://lists.apache.org/thread.html/rb21df54a4e39732ce653d2aa5672e36a792b59eb6717f2a06bb8d02a@%3Ccommits.druid.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190617-0001/', 'https://lists.apache.org/thread.html/17084c09e6dedf60efe08028b429c92ffd28aacc28454e4fa924578a@%3Cgeneral.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/0b8d58e02dbd0fb8bf7320c514fe58da1d6728bdc150f1ba04e0d9fc@%3Cissues.hbase.apache.org%3E'} | null |
Maven | GHSA-wfcc-pff6-rgc5 | Exposure of Sensitive Information in org.eclipse.jetty:jetty-server | Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords. | {'CVE-2017-9735'} | 2022-03-18T20:32:00.842689Z | 2018-10-19T16:15:46Z | HIGH | null | {'CWE-200', 'CWE-203'} | {'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/36870f6c51f5bc25e6f7bb1fcace0e57e81f1524019b11f466738559@%3Ccommon-dev.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E', 'https://github.com/advisories/GHSA-wfcc-pff6-rgc5', 'https://github.com/eclipse/jetty.project/issues/1556', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/f887a5978f5e4c62b9cfe876336628385cff429e796962649649ec8a@%3Ccommon-issues.hadoop.apache.org%3E', 'http://www.securityfocus.com/bid/99104', 'https://nvd.nist.gov/vuln/detail/CVE-2017-9735', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://bugs.debian.org/864631', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'} | null |
Maven | GHSA-vqwg-4v6f-h6x5 | Stored XSS vulnerability in Matrix Project Plugin | Jenkins Matrix Project Plugin 1.19 and earlier does not escape HTML metacharacters in node and label names, and label descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure permission. | {'CVE-2022-20615'} | 2022-04-29T04:33:51Z | 2022-01-13T00:01:04Z | MODERATE | null | {'CWE-79'} | {'https://github.com/jenkinsci/matrix-project-plugin', 'https://nvd.nist.gov/vuln/detail/CVE-2022-20615', 'http://www.openwall.com/lists/oss-security/2022/01/12/6', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2017'} | null |
Maven | GHSA-cf2j-vf36-c6w8 | Communities and collections administrators can escalate their privilege up to system administrator | ### Impact
Any community or collection administrator can escalate their permission up to become system administrator.
This vulnerability only existed in 7.0 and does not impact 6.x or below.
### Patches
Fix is included in [7.1](https://github.com/DSpace/DSpace/releases/tag/dspace-7.1). Please upgrade to 7.1 at your earliest convenience.
### Workarounds
In 7.0, temporarily disable the ability for community or collection administrators to manage permissions or workflows settings, i.e. set the following properties in your local.cfg / dspace.cfg file
```
core.authorization.collection-admin.policies = false
core.authorization.community-admin.policies = false
core.authorization.community-admin.collection.workflows = false
```
Once upgraded to 7.1, these settings can be safely reverted to the default values of `true`.
### References
Discovered during investigation of https://github.com/DSpace/DSpace/issues/7928
### For more information
If you have any questions or comments about this advisory:
* Email us at security@dspace.org
| {'CVE-2021-41189'} | 2022-03-03T05:13:25.172783Z | 2021-11-01T19:18:16Z | HIGH | null | {'CWE-863'} | {'https://github.com/DSpace/DSpace/security/advisories/GHSA-cf2j-vf36-c6w8', 'https://github.com/DSpace/DSpace/issues/7928', 'https://github.com/DSpace/DSpace/commit/277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41189', 'https://github.com/DSpace/DSpace/commit/c3bea16ab911606e15ae96c97a1575e1ffb14f8a', 'https://github.com/DSpace/DSpace'} | null |
Maven | GHSA-gwp4-hfv6-p7hw | Deserialization of untrusted data in FasterXML jackson-databind | A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logback jar in the classpath. | {'CVE-2019-14439'} | 2022-03-03T05:13:30.808736Z | 2019-08-01T19:18:06Z | HIGH | null | {'CWE-502'} | {'https://lists.apache.org/thread.html/0d4b630d9ee724aee50703397d9d1afa2b2befc9395ba7797d0ccea9@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/2d2a76440becb610b9a9cb49b15eac3934b02c2dbcaacde1000353e4@%3Cdev.tomee.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14439', 'https://lists.apache.org/thread.html/34717424b4d08b74f65c09a083d6dd1cb0763f37a15d6de135998c1d@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/ee0a051428d2c719acfa297d0854a189ea5e284ef3ed491fa672f4be@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://www.debian.org/security/2019/dsa-4542', 'https://lists.apache.org/thread.html/87e46591de8925f719664a845572d184027258c5a7af0a471b53c77b@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/3f99ae8dcdbd69438cb733d745ee3ad5e852068490719a66509b4592@%3Ccommits.cassandra.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/08/msg00011.html', 'https://github.com/FasterXML/jackson-databind/compare/jackson-databind-2.9.9.1...jackson-databind-2.9.9.2', 'https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef@%3Cdev.struts.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3200', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/5ecc333113b139429f4f05000d4aa2886974d4df3269c1dd990bb319@%3Cdev.tomee.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/commit/ad418eeb974e357f2797aef64aa0e3ffaaa6125b', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://security.netapp.com/advisory/ntap-20190814-0001/', 'https://lists.apache.org/thread.html/5fc0e16b7af2590bf1e97c76c136291c4fdb244ee63c65c485c9a7a1@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/56c8042873595b8c863054c7bfccab4bf2c01c6f5abedae249d914b9@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2389', 'https://seclists.org/bugtraq/2019/Oct/6', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'} | null |
Maven | GHSA-6rxj-58jh-436r | Moderate severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core | The URL pattern of "" (the empty string) which exactly maps to the context root was not correctly handled in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 when used as part of a security constraint definition. This caused the constraint to be ignored. It was, therefore, possible for unauthorised users to gain access to web application resources that should have been protected. Only security constraints with a URL pattern of the empty string were affected. | {'CVE-2018-1304'} | 2022-03-03T05:13:22.078352Z | 2018-10-17T16:31:17Z | MODERATE | null | null | {'https://security.netapp.com/advisory/ntap-20180706-0001/', 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:1448', 'https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E', 'https://usn.ubuntu.com/3665-1/', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:1449', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/b1d7e2425d6fd2cebed40d318f9365b44546077e10949b01b1f8a0fb@%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:1451', 'https://lists.debian.org/debian-lts-announce/2018/03/msg00004.html', 'https://access.redhat.com/errata/RHSA-2018:2939', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00044.html', 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:1447', 'http://www.securityfocus.com/bid/103170', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1304', 'https://access.redhat.com/errata/RHSA-2018:0465', 'https://access.redhat.com/errata/RHSA-2019:2205', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:1320', 'https://access.redhat.com/errata/RHSA-2018:0466', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:1450', 'https://www.debian.org/security/2018/dsa-4281', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'http://www.securitytracker.com/id/1040427', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-6rxj-58jh-436r'} | null |
Maven | GHSA-c69w-jj56-834w | Improper Certificate Validation and Improper Validation of Certificate with Host Mismatch in Apache Sling Commons Messaging Mail | Apache Sling Commons Messaging Mail provides a simple layer on top of JavaMail/Jakarta Mail for OSGi to send mails via SMTPS. To reduce the risk of "man in the middle" attacks additional server identity checks must be performed when accessing mail servers. For compatibility reasons these additional checks are disabled by default in JavaMail/Jakarta Mail. The SimpleMailService in Apache Sling Commons Messaging Mail 1.0 lacks an option to enable these checks for the shared mail session. A user could enable these checks nevertheless by accessing the session via the message created by SimpleMessageBuilder and setting the property mail.smtps.ssl.checkserveridentity to true. Apache Sling Commons Messaging Mail 2.0 adds support for enabling server identity checks and these checks are enabled by default. - https://javaee.github.io/javamail/docs/SSLNOTES.txt - https://javaee.github.io/javamail/docs/api/com/sun/mail/smtp/package-summary.html - https://github.com/eclipse-ee4j/mail/issues/429 | {'CVE-2021-44549'} | 2022-03-03T05:13:21.721284Z | 2021-12-16T14:12:49Z | HIGH | null | {'CWE-295', 'CWE-297'} | {'https://javaee.github.io/javamail/docs/api/com/sun/mail/smtp/package-summary.html', 'https://lists.apache.org/thread/l8p9h2bqvkj6rhv4w8kzctb817415b7f', 'https://github.com/eclipse-ee4j', 'https://javaee.github.io/javamail/docs/SSLNOTES.txt', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44549', 'https://github.com/eclipse-ee4j/mail/issues/429'} | null |
Maven | GHSA-7x9j-7223-rg5m | High severity vulnerability that affects commons-fileupload:commons-fileupload | Apache Commons FileUpload before 1.3.3 DiskFileItem File Manipulation Remote Code Execution | {'CVE-2016-1000031'} | 2022-03-03T05:13:50.464252Z | 2018-12-21T17:51:51Z | CRITICAL | null | {'CWE-284'} | {'https://www.oracle.com/security-alerts/cpujan2020.html', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://www.tenable.com/security/research/tra-2016-23', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000031', 'http://www.zerodayinitiative.com/advisories/ZDI-16-570/', 'https://issues.apache.org/jira/browse/WW-4812', 'https://issues.apache.org/jira/browse/FILEUPLOAD-279', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.tenable.com/security/research/tra-2016-12', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/d66657323fd25e437face5e84899c8ca404ccd187e81c3f2fa8b6080@%3Cannounce.apache.org%3E', 'https://github.com/advisories/GHSA-7x9j-7223-rg5m', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00036.html', 'http://www.securityfocus.com/bid/93604', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html', 'https://security.netapp.com/advisory/ntap-20190212-0001/', 'https://www.tenable.com/security/research/tra-2016-30', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'} | null |
Maven | GHSA-g5vf-v6wf-7w2r | Ciphertext Malleability Issue in Tink Java | ### Impact
Tink's Java version before 1.5 under some circumstances allowed attackers to change the key ID part of the ciphertext, resulting in the attacker creating a second ciphertext that will decrypt to the same plaintext. This can be a problem in particular in the case of encrypting with a deterministic AEAD with a single key, and relying on the fact that there is only a single valid ciphertext per plaintext.
No loss of confidentiality or loss of plaintext integrity occurs due to this problem, only ciphertext integrity is compromised.
### Patches
The issue was fixed in this [pull request](https://github.com/google/tink/commit/93d839a5865b9d950dffdc9d0bc99b71280a8899).
### Workarounds
The only workaround is to backport the fixing [pull request](https://github.com/google/tink/commit/93d839a5865b9d950dffdc9d0bc99b71280a8899).
### Details
Tink uses the first five bytes of a ciphertext for a version byte and a four byte key ID. Since each key has a well defined prefix, this extends non-malleability properties (but technically not indistinguishability). However, in the Java version this prefix lookup used a hash map indexed by unicode strings instead of the byte array, which means that invalid Unicode characters would be [replaced by U+FFFD](https://en.wikipedia.org/wiki/UTF-8#Invalid_sequences_and_error_handling) by the [Java API's default behavior](https://docs.oracle.com/javase/7/docs/api/java/lang/String.html#String(byte[],%20java.nio.charset.Charset)). This means several different values for the five bytes would result in the same hash table key, which allows an attacker to exchange one invalid byte sequence for another, creating a mutated ciphertext that still decrypts (to the same plaintext).
### Acknowledgements
We'd like to thank Peter Esbensen for finding this issue and raising it internally.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [Tink](https://github.com/google/tink/issues) | {'CVE-2020-8929'} | 2022-03-03T05:14:16.042047Z | 2020-10-16T00:51:24Z | LOW | null | {'CWE-327', 'CWE-176'} | {'https://github.com/google/tink/commit/93d839a5865b9d950dffdc9d0bc99b71280a8899', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8929', 'https://github.com/google/tink/security/advisories/GHSA-g5vf-v6wf-7w2r'} | null |
Maven | GHSA-p639-xxv5-j383 | Moderate severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service | In Apache Hive 2.1.0 to 2.3.2, when 'COPY FROM FTP' statement is run using HPL/SQL extension to Hive, a compromised/malicious FTP server can cause the file to be written to an arbitrary location on the cluster where the command is run from. This is because FTP client code in HPL/SQL does not verify the destination location of the downloaded file. This does not affect hive cli user and hiveserver2 user as hplsql is a separate command line script and needs to be invoked differently. | {'CVE-2018-1315'} | 2022-03-03T05:13:24.824100Z | 2018-11-21T22:24:08Z | LOW | null | {'CWE-732'} | {'https://lists.apache.org/thread.html/d5da94ef60312c01a8d2348466680d1b5fb70702c71a3e84e94f7933@%3Cdev.hive.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1315', 'https://github.com/advisories/GHSA-p639-xxv5-j383'} | null |
Maven | GHSA-5h9j-q6j2-253f | Unescaped exception messages in error responses in Jetty | In Eclipse Jetty versions 9.4.21.v20190926, 9.4.22.v20191022, and 9.4.23.v20191118, the generation of default unhandled Error response content (in text/html and text/json Content-Type) does not escape Exception messages in stacktraces included in error output. | {'CVE-2019-17632'} | 2022-03-03T05:13:46.287233Z | 2019-12-02T18:13:28Z | MODERATE | null | {'CWE-79'} | {'https://bugs.eclipse.org/bugs/show_bug.cgi?id=553443', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAITZ27GKPD2CCNHGT2VBT4VWIBUJJNS/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17632'} | null |
Maven | GHSA-cqxr-xf2w-943w | Creation of Temporary File in Directory with Insecure Permissions in auto-generated Java, Scala code | ### Impact
**This vulnerability impacts generated code.** If this code was generated as a one-off occasion, not as a part of an automated CI/CD process, this code will remain vulnerable until fixed manually!
On Unix-Like systems, the system temporary directory is shared between all local users. When files/directories are created, the default `umask` settings for the process are respected. As a result, by default, most processes/apis will create files/directories with the permissions `-rw-r--r--` and `drwxr-xr-x` respectively, unless an API that explicitly sets safe file permissions is used.
This vulnerability exists due to the use of the JDK method `File.createTempFile`. This method creates an insecure temporary files that can leave application and system data vulnerable to exposure.
Auto-generated code (Java, Scala) that deals with uploading or downloading binary data through API endpoints will create insecure temporary files during the process. For example, if the API endpoint returns a PDF file, the auto-generated clients will first download the PDF into a insecure temporary file that can be read by anyone on the system.
Affected generators:
- Java
- `okhttp-gson` (default library)
https://github.com/OpenAPITools/openapi-generator/blob/d85f61ff0cfd6b8cd7063a63f302998a51466269/modules/openapi-generator/src/main/resources/Java/libraries/okhttp-gson/ApiClient.mustache#L1085-L1088
- `jersey2`
https://github.com/OpenAPITools/openapi-generator/blob/d85f61ff0cfd6b8cd7063a63f302998a51466269/modules/openapi-generator/src/main/resources/Java/libraries/jersey2/ApiClient.mustache#L1035-L1038
- `resteasy`
https://github.com/OpenAPITools/openapi-generator/blob/d85f61ff0cfd6b8cd7063a63f302998a51466269/modules/openapi-generator/src/main/resources/Java/libraries/resteasy/ApiClient.mustache#L604-L607
- `retrofit2`
https://github.com/OpenAPITools/openapi-generator/blob/d85f61ff0cfd6b8cd7063a63f302998a51466269/modules/openapi-generator/src/main/resources/Java/libraries/retrofit2/play26/ApiClient.mustache#L202-L208
- Scala
- `scala-finch`
https://github.com/OpenAPITools/openapi-generator/blob/764a3b044c19fadf4a0789473cde96a65b77868a/modules/openapi-generator/src/main/resources/scala-finch/api.mustache#L83-L88
- `scala-akka`
https://github.com/OpenAPITools/openapi-generator/blob/150e24dc553a8ea5230ffb938ed3e6020e972faa/modules/openapi-generator/src/main/resources/scala-akka-http-server/multipartDirectives.mustache#L71-L73
### Patches
The issue has been patched by changing the generated code to use the JDK method `Files.createTempFile` and released in the v5.1.0 stable version.
This vulnerability has the same root cause as CVE-2021-21364 from the `swagger-api/swagger-codegen` project as this project and that one both share the same original source tree.
https://github.com/swagger-api/swagger-codegen/security/advisories/GHSA-hpv8-9rq5-hq7w
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [OpenAPI Generator Github repo](https://github.com/openAPITools/openapi-generator/)
* Email us at [security@openapitools.org](mailto:security@openapitools.org) | {'CVE-2021-21430'} | 2022-03-03T05:13:31.298974Z | 2021-05-11T00:05:06Z | MODERATE | null | {'CWE-269', 'CWE-377', 'CWE-379', 'CWE-378'} | {'https://github.com/OpenAPITools/openapi-generator/pull/8791', 'https://github.com/OpenAPITools/openapi-generator/pull/8787', 'https://github.com/OpenAPITools/openapi-generator/security/advisories/GHSA-cqxr-xf2w-943w', 'https://github.com/OpenAPITools/openapi-generator/pull/9348', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21430'} | null |
Maven | GHSA-vmqm-g3vh-847m | Denial of service in Apache Xerces2 | Apache Xerces2 Java Parser before 2.12.0 allows remote attackers to cause a denial of service (CPU consumption) via a crafted message to an XML service, which triggers hash table collisions. | {'CVE-2012-0881'} | 2022-03-03T05:13:08.829332Z | 2020-06-15T18:51:38Z | HIGH | null | {'CWE-400'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=787104', 'https://github.com/apache/xerces2-j/commit/992b5d9c24102ad20330d36c0a71162753a37449', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/rea7b831dceeb2a2fa817be6f63b08722042e3647fb2d47c144370a56@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73@%3Cj-users.xerces.apache.org%3E', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://issues.apache.org/jira/browse/XERCESJ-1685', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2014/07/08/11', 'https://nvd.nist.gov/vuln/detail/CVE-2012-0881', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'} | null |
Maven | GHSA-jxgm-9f58-w4xp | Improper Input Validation in Apache Archiva | In Apache Archiva 2.0.0 - 2.2.3, it is possible to write files to the archiva server at arbitrary locations by using the artifact upload mechanism. Existing files can be overwritten, if the archiva run user has appropriate permission on the filesystem for the target file. | {'CVE-2019-0214'} | 2022-03-03T05:13:50.663577Z | 2019-05-14T04:00:21Z | MODERATE | null | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2019-0214', 'http://www.securityfocus.com/bid/108124', 'http://archiva.apache.org/security.html#CVE-2019-0214', 'http://www.openwall.com/lists/oss-security/2019/04/30/8', 'https://seclists.org/bugtraq/2019/Apr/48', 'https://lists.apache.org/thread.html/239349b6dd8f66cf87a70c287b03af451dea158b776d3dfc550b4f0e@%3Cusers.maven.apache.org%3E', 'https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb@%3Cissues.archiva.apache.org%3E', 'http://packetstormsecurity.com/files/152684/Apache-Archiva-2.2.3-File-Write-Delete.html', 'https://lists.apache.org/thread.html/5851cb0214f22ba681fb445870eeb6b01afd1fb614e45a22978d7dda@%3Cusers.archiva.apache.org%3E', 'https://lists.apache.org/thread.html/18b670afc2f83034f47ebeb2f797c350fe60f1f2b33c95b95f467ef8@%3Cannounce.apache.org%3E'} | null |
Maven | GHSA-6h2c-g688-q9qr | Path traversal in Jenkins Phoenix AutoTest Plugin | Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Item/Configure permission to copy arbitrary files and directories from the Jenkins controller to the agent workspace. | {'CVE-2022-28156'} | 2022-04-07T22:01:59.815971Z | 2022-03-30T00:00:24Z | MODERATE | null | {'CWE-22'} | {'http://www.openwall.com/lists/oss-security/2022/03/29/1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28156', 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2683'} | null |
Maven | GHSA-qwfw-gxx2-mmv2 | Command Injection in Kylin | Similar to CVE-2020-1956, Kylin has one more restful API which concatenates the API inputs into OS commands and then executes them on the server; while the reported API misses necessary input validation, which causes the hackers to have the possibility to execute OS command remotely. Users of all previous versions after 2.3 should upgrade to 3.1.0. | {'CVE-2020-13925'} | 2022-03-03T05:13:05.012142Z | 2020-07-27T22:51:37Z | CRITICAL | null | {'CWE-78'} | {'https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb%40%3Cuser.kylin.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEKYLIN-584373', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13925', 'https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E'} | null |
Maven | GHSA-84wg-rgp8-2hg4 | Command Injection in Apache James | Apache James prior to release 3.6.1 is vulnerable to a buffering attack relying on the use of the STARTTLS command. This can result in Man-in -the-middle command injection attacks, leading potentially to leakage of sensible information. | {'CVE-2021-38542'} | 2022-03-03T05:14:10.044848Z | 2022-01-08T00:40:33Z | MODERATE | null | {'CWE-77'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-38542', 'http://www.openwall.com/lists/oss-security/2022/01/04/1', 'https://www.openwall.com/lists/oss-security/2022/01/04/1'} | null |
Maven | GHSA-w3f4-3q6j-rh82 | Deserialization of Untrusted Data in jackson-databind | FasterXML jackson-databind through 2.8.11 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 and CVE-2017-17485 deserialization flaws. This is exploitable via two different gadgets that bypass a blacklist. | {'CVE-2018-5968'} | 2022-03-03T05:13:07.865218Z | 2020-06-30T20:40:50Z | HIGH | null | {'CWE-502', 'CWE-184'} | {'https://access.redhat.com/errata/RHSA-2018:0480', 'https://github.com/GulajavaMinistudio/jackson-databind/pull/92/commits/038b471e2efde2e8f96b4e0be958d3e5a1ff1d05', 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://access.redhat.com/errata/RHSA-2018:0479', 'https://nvd.nist.gov/vuln/detail/CVE-2018-5968', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://www.debian.org/security/2018/dsa-4114', 'https://github.com/FasterXML/jackson-databind', 'https://security.netapp.com/advisory/ntap-20180423-0002/', 'https://access.redhat.com/errata/RHSA-2018:1525', 'https://github.com/FasterXML/jackson-databind/issues/1899', 'https://access.redhat.com/errata/RHSA-2018:0481', 'https://access.redhat.com/errata/RHSA-2018:0478'} | null |
Maven | GHSA-83r3-c79w-f6wc | High severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service | The authorization framework in Apache Hive 1.0.0, 1.0.1, 1.1.0, 1.1.1, 1.2.0 and 1.2.1, on clusters protected by Ranger and SqlStdHiveAuthorization, allows attackers to bypass intended parent table access restrictions via unspecified partition-level operations. | {'CVE-2015-7521'} | 2022-03-03T05:13:09.353587Z | 2018-11-21T22:23:49Z | HIGH | null | {'CWE-287'} | {'http://www.openwall.com/lists/oss-security/2016/01/28/12', 'http://mail-archives.apache.org/mod_mbox/hive-user/201601.mbox/%3C20160128205008.2154F185EB%40minotaur.apache.org%3E', 'http://packetstormsecurity.com/files/135836/Apache-Hive-Authorization-Bypass.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7521', 'https://github.com/advisories/GHSA-83r3-c79w-f6wc', 'http://www.securityfocus.com/archive/1/537549/100/0/threaded'} | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.