ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2021-1002526
io_uring: fix link traversal locking
io_uring: fix link traversal locking This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.6 by commit 1c939a53b26b6b39378a77f76a49be8dd6df7af0, it was introduced in version v5.15.6 by commit 09eb40f6776c8b50c2e46a504bf5483440ca607d. For more details please see the references link.
null
2021-12-19T19:41:10.978046Z
2021-12-19T19:41:10.978046Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/09eb40f6776c8b50c2e46a504bf5483440ca607d'}
Linux
GSD-2022-1001426
ACPI: CPPC: Avoid out of bounds access when parsing _CPC data
ACPI: CPPC: Avoid out of bounds access when parsing _CPC data This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit b80b19b32a432c9eee1cd200ef7aaddf608f54d1, it was introduced in version v4.4 by commit 337aadff8e4567e39669e07d9a88b789d78458b5. For more details please see the references link.
null
2022-04-25T03:21:13.956251Z
2022-04-24T21:12:05.456905Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/337aadff8e4567e39669e07d9a88b789d78458b5'}
Linux
GSD-2021-1002176
audit: fix possible null-pointer dereference in audit_filter_rules
audit: fix possible null-pointer dereference in audit_filter_rules This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 6e3ee990c90494561921c756481d0e2125d8b895, it was introduced in version v5.3 by commit bf361231c295d92a28ca283ea713f56e93e55796. For more details please see the references link.
null
2021-12-20T01:14:36.714153Z
2021-11-14T15:23:19.237092Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf361231c295d92a28ca283ea713f56e93e55796'}
Linux
GSD-2022-1001975
iommu/omap: Fix regression in probe for NULL pointer dereference
iommu/omap: Fix regression in probe for NULL pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit bd905fed87ce01ac010011bb8f44ed0140116ceb, it was introduced in version v5.8 by commit 6785eb9105e3363aa51408c700a55e8b5f88fcf6. For more details please see the references link.
null
2022-04-25T05:18:48.388091Z
2022-04-24T22:00:06.298608Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6785eb9105e3363aa51408c700a55e8b5f88fcf6'}
Linux
GSD-2022-1000667
RDMA/ucma: Protect mc during concurrent multicast leaves
RDMA/ucma: Protect mc during concurrent multicast leaves This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.8 by commit ee2477e8ccd3d978eeac0dc5a981b286d9bb7b0a, it was introduced in version v5.10 by commit 95fe51096b7adf1d1e7315c49c75e2f75f162584. For more details please see the references link.
null
2022-03-07T01:37:56.750399Z
2022-02-27T03:38:05.252471Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/95fe51096b7adf1d1e7315c49c75e2f75f162584'}
Linux
GSD-2022-1000237
tipc: improve size validations for received domain records
tipc: improve size validations for received domain records This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.100 by commit 3c7e5943553594f68bbc070683db6bb6f6e9e78e, it was introduced in version v4.8 by commit 35c55c9877f8de0ab129fa1a309271d0ecc868b9. For more details please see the references link.
null
2022-02-19T08:04:33.275976Z
2022-02-18T21:59:47.800540Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/35c55c9877f8de0ab129fa1a309271d0ecc868b9'}
Linux
GSD-2021-1000848
NFS: Fix a potential NULL dereference in nfs_get_client()
NFS: Fix a potential NULL dereference in nfs_get_client() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.273 by commit a979e601000982a3ca693171a6d4dffc47f8ad00, it was introduced in version v3.17 by commit 31434f496abb9f3410b10f541462fe58613dd3ad. For more details please see the references link.
null
2021-12-19T22:27:16.948727Z
2021-06-30T00:01:09.736927Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/31434f496abb9f3410b10f541462fe58613dd3ad'}
Linux
GSD-2021-1001035
usb: fix various gadget panics on 10gbps cabling
usb: fix various gadget panics on 10gbps cabling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit ca6bc277430d90375452b60b047763a090b7673e. For more details please see the references link.
null
2021-12-19T23:01:52.934049Z
2021-06-30T00:35:19.328806Z
null
null
null
null
null
Linux
GSD-2022-1000558
mtd: rawnand: gpmi: don't leak PM reference in error path
mtd: rawnand: gpmi: don't leak PM reference in error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit 58d3111eafce9e4398654b07f0b1dac27f26ee5b, it was introduced in version v5.16.3 by commit c447696e2f825df7800b0630352bea2d45d09baa. For more details please see the references link.
null
2022-03-07T01:50:21.735444Z
2022-02-27T03:23:47.575508Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c447696e2f825df7800b0630352bea2d45d09baa'}
Linux
GSD-2021-1001465
media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf()
media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.277 by commit 4487b968e5eacd02c493303dc2b61150bb7fe4b2, it was introduced in version v2.6.34 by commit dae52d009fc950b5c209260d50fcc000f5becd3c. For more details please see the references link.
null
2021-12-20T00:36:09.591652Z
2021-08-03T02:48:57.253293Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/dae52d009fc950b5c209260d50fcc000f5becd3c'}
Linux
GSD-2022-1002135
jffs2: fix memory leak in jffs2_do_mount_fs
jffs2: fix memory leak in jffs2_do_mount_fs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 607d3aab7349f18e0d9dba4100d09d16fe27caca, it was introduced in version v2.6.15 by commit e631ddba588783edd521c5a89f7b2902772fb691. For more details please see the references link.
null
2022-04-25T02:57:12.307755Z
2022-04-24T22:14:50.202799Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e631ddba588783edd521c5a89f7b2902772fb691'}
Linux
GSD-2022-1000108
af_packet: fix data-race in packet_setsockopt / packet_setsockopt
af_packet: fix data-race in packet_setsockopt / packet_setsockopt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.265 by commit 899e0319b3f58d85ac9a2f1d2895a71a275e2f4e, it was introduced in version v4.3 by commit 47dceb8ecdc1c3ad1818dfea3d659a05b74c3fc2. For more details please see the references link.
null
2022-02-19T08:00:13.022705Z
2022-02-18T21:41:58.771702Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/47dceb8ecdc1c3ad1818dfea3d659a05b74c3fc2'}
Linux
GSD-2021-1001936
can: peak_pci: peak_pci_remove(): fix UAF
can: peak_pci: peak_pci_remove(): fix UAF This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.288 by commit 447d44cd2f67a20b596ede3ca3cd67086dfd9ca9, it was introduced in version v3.4 by commit e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd. For more details please see the references link.
null
2021-12-19T22:33:16.543897Z
2021-11-14T15:12:25.164319Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd'}
Linux
GSD-2021-1000624
btrfs: return whole extents in fiemap
btrfs: return whole extents in fiemap This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.124 by commit 55575c08502f291cdeff09428189b84084ffa91b, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T23:28:58.609128Z
2021-06-04T19:49:24.361374Z
null
null
null
null
null
Linux
GSD-2021-1002619
firmware: arm_scpi: Fix string overflow in SCPI genpd driver
firmware: arm_scpi: Fix string overflow in SCPI genpd driver This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.294 by commit 639901b9429a3195e0fead981ed74b51f5f31538, it was introduced in version v4.8 by commit 8bec4337ad4023b26de35d3b0c3a3b2735ffc5c7. For more details please see the references link.
null
2022-01-11T05:52:18.603306Z
2021-12-27T05:27:29.860684Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8bec4337ad4023b26de35d3b0c3a3b2735ffc5c7'}
Linux
GSD-2022-1001349
mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0)
mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0) This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 2358aa84ef6dafcf544a557caaa6b91afb4a0bd2. For more details please see the references link.
null
2022-04-25T04:31:00.810857Z
2022-04-24T21:06:38.941064Z
null
null
null
null
null
Linux
GSD-2021-1000274
media: aspeed: fix clock handling logic
media: aspeed: fix clock handling logic This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 75321dc8aebe3f30eff226028fe6da340fe0bf02, it was introduced in version v5.0 by commit d2b4387f3bdf016e266d23cf657465f557721488. For more details please see the references link.
null
2021-12-19T22:03:42.641589Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d2b4387f3bdf016e266d23cf657465f557721488'}
Linux
GSD-2021-1002249
ALSA: gus: fix null pointer dereference on pointer block
ALSA: gus: fix null pointer dereference on pointer block This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.218 by commit ab4c1ebc40f699f48346f634d7b72b9c5193f315. For more details please see the references link.
null
2021-12-20T00:34:25.337630Z
2021-11-29T02:35:20.877435Z
null
null
null
null
null
Linux
GSD-2022-1001719
mips: ralink: fix a refcount leak in ill_acc_of_setup()
mips: ralink: fix a refcount leak in ill_acc_of_setup() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 5fb47ca3490813d3884d8ad0b2ce511aa3537551. For more details please see the references link.
null
2022-04-25T04:17:00.233595Z
2022-04-24T21:37:33.737052Z
null
null
null
null
null
Linux
GSD-2021-1001873
mm, slub: fix potential memoryleak in kmem_cache_open()
mm, slub: fix potential memoryleak in kmem_cache_open() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit 42b81946e3ac9ea0372ba16e05160dc11e02694f, it was introduced in version v4.8 by commit 210e7a43fa905bccafa9bb5966fba1d71f33eb8b. For more details please see the references link.
null
2021-12-20T01:26:15.131167Z
2021-10-28T13:53:20.878579Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/210e7a43fa905bccafa9bb5966fba1d71f33eb8b'}
Linux
GSD-2021-1000761
neighbour: allow NUD_NOARP entries to be forced GCed
neighbour: allow NUD_NOARP entries to be forced GCed This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.125 by commit d99029e6aab62aef0a0251588b2867e77e83b137, it was introduced in version v5.0 by commit 58956317c8de52009d1a38a721474c24aef74fe7. For more details please see the references link.
null
2021-12-19T23:46:02.606442Z
2021-06-25T00:03:04.976655Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/58956317c8de52009d1a38a721474c24aef74fe7'}
Linux
GSD-2021-1000331
sctp: do asoc update earlier in sctp_sf_do_dupcook_a
sctp: do asoc update earlier in sctp_sf_do_dupcook_a This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.38 by commit f01988ecf3654f805282dce2d3bb9afe68d2691e, it was introduced in version v5.7 by commit 145cb2f7177d94bc54563ed26027e952ee0ae03c. For more details please see the references link.
null
2021-12-19T23:20:09.327144Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/145cb2f7177d94bc54563ed26027e952ee0ae03c'}
Linux
GSD-2022-1002420
video: fbdev: cirrusfb: check pixclock to avoid divide by zero
video: fbdev: cirrusfb: check pixclock to avoid divide by zero This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 1d3fb46439ad4e8f0c5739eb33d1875ac9e0f135. For more details please see the references link.
null
2022-04-25T05:17:34.183690Z
2022-04-24T22:45:15.616058Z
null
null
null
null
null
Linux
GSD-2021-1001170
KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow
KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.6 by commit 35e114e6f84ab559eb35a5ac73590d23a43f22ba, it was introduced in version v3.10 by commit 8e591cb7204739efa8e15967ea334eb367039dde. For more details please see the references link.
null
2021-12-19T23:25:35.730974Z
2021-08-03T01:32:06.921747Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8e591cb7204739efa8e15967ea334eb367039dde'}
Linux
GSD-2022-1002070
mxser: fix xmit_buf leak in activate when LSR == 0xff
mxser: fix xmit_buf leak in activate when LSR == 0xff This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 2cd05c38a27bee7fb42aa4d43174d68ac55dac0f, it was introduced in version v2.6.33 by commit 6769140d304731f0a3b177470a2adb4bacd9036b. For more details please see the references link.
null
2022-04-25T05:38:28.035647Z
2022-04-24T22:07:44.131975Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6769140d304731f0a3b177470a2adb4bacd9036b'}
Linux
GSD-2021-1001520
xen/x86: fix PV trap handling on secondary processors
xen/x86: fix PV trap handling on secondary processors This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.285 by commit 2c3b07818dc05fb71928b4d87c1e958c911baa20, it was introduced in version v2.6.23 by commit f87e4cac4f4e940b328d3deb5b53e642e3881f43. For more details please see the references link.
null
2021-12-19T23:56:50.841915Z
2021-10-19T16:21:56.336325Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f87e4cac4f4e940b328d3deb5b53e642e3881f43'}
Linux
GSD-2022-1001575
f2fs: fix compressed file start atomic write may cause data corruption
f2fs: fix compressed file start atomic write may cause data corruption This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 89b1c23591e0a86e7b82e013ca6ca62ffebf8a1c, it was introduced in version v5.6 by commit 4c8ff7095bef64fc47e996a938f7d57f9e077da3. For more details please see the references link.
null
2022-04-25T05:25:28.596739Z
2022-04-24T21:25:22.483584Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4c8ff7095bef64fc47e996a938f7d57f9e077da3'}
Linux
GSD-2021-1002025
comedi: ni_usb6501: fix NULL-deref in command paths
comedi: ni_usb6501: fix NULL-deref in command paths This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.159 by commit b0156b7c9649d8f55a2ce3d3258509f1b2a181c3, it was introduced in version v3.18 by commit a03bb00e50ab4c07107da58a52a0bff7943f360c. For more details please see the references link.
null
2021-12-19T22:28:59.542832Z
2021-11-14T15:16:26.016884Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a03bb00e50ab4c07107da58a52a0bff7943f360c'}
Linux
GSD-2021-1000018
ch_ktls: Fix kernel panic
ch_ktls: Fix kernel panic This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.16 by commit 8348665d4181c68b0ca1205b48e1753d78bc810f, it was introduced in version v5.7 by commit 5a4b9fe7fece62ecab6fb28fe92362f83b41c33e. For more details please see the references link.
null
2021-12-20T00:04:21.534604Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5a4b9fe7fece62ecab6fb28fe92362f83b41c33e'}
Linux
GSD-2022-1001125
scsi: qla2xxx: Fix warning message due to adisc being flushed
scsi: qla2xxx: Fix warning message due to adisc being flushed This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit d8fb8da69e194e0249b3cdb746ef09ce823ae26b. For more details please see the references link.
null
2022-04-25T05:07:52.268358Z
2022-04-24T20:47:36.536774Z
null
null
null
null
null
Linux
GSD-2021-1002475
mlxsw: spectrum: Protect driver from buggy firmware
mlxsw: spectrum: Protect driver from buggy firmware This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.83 by commit 90d0736876c50ecde1a3275636a06b9ddb1cace9, it was introduced in version v5.4 by commit 28b1987ef5064dd5c43538ba1168ef7b801f3cad. For more details please see the references link.
null
2021-12-19T23:34:57.284845Z
2021-12-19T19:39:01.465552Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/28b1987ef5064dd5c43538ba1168ef7b801f3cad'}
Linux
GSD-2021-1000448
sctp: do asoc update earlier in sctp_sf_do_dupcook_a
sctp: do asoc update earlier in sctp_sf_do_dupcook_a This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.191 by commit d624f2991b977821375fbd56c91b0c91d456a697, it was introduced in version v4.19.123 by commit db8bf823e70f239372c62f13e4eb6f08a1665e8c. For more details please see the references link.
null
2021-12-20T01:19:52.185773Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/db8bf823e70f239372c62f13e4eb6f08a1665e8c'}
Linux
GSD-2022-1000364
misc: fastrpc: avoid double fput() on failed usercopy
misc: fastrpc: avoid double fput() on failed usercopy This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.101 by commit a5ce7ee5fcc07583159f54ab4af5164de00148f5, it was introduced in version v5.1 by commit 6cffd79504ce040f460831030d3069fa1c99bb71. For more details please see the references link.
null
2022-03-07T01:33:50.585171Z
2022-02-27T02:56:48.798573Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6cffd79504ce040f460831030d3069fa1c99bb71'}
Linux
GSD-2022-1002359
ath9k_htc: fix uninit value bugs
ath9k_htc: fix uninit value bugs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit ee4222052a76559c20e821bc3519cefb58b6d3e9, it was introduced in version v2.6.35 by commit fb9987d0f748c983bb795a86f47522313f701a08. For more details please see the references link.
null
2022-04-25T03:35:13.348516Z
2022-04-24T22:38:24.202404Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb9987d0f748c983bb795a86f47522313f701a08'}
Linux
GSD-2021-1001609
md: fix a lock order reversal in md_alloc
md: fix a lock order reversal in md_alloc This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.150 by commit 2b5befcd404522caae0df7e085b699122f5196a3, it was introduced in version v3.0 by commit b0140891a8cea36469f58d23859e599b1122bd37. For more details please see the references link.
null
2021-12-20T01:04:10.625830Z
2021-10-19T16:28:05.662356Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b0140891a8cea36469f58d23859e599b1122bd37'}
Linux
GSD-2022-1000734
RDMA/ib_srp: Fix a deadlock
RDMA/ib_srp: Fix a deadlock This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.12 by commit 98d056603ce55ceb90631b3927151c190dfb1b27, it was introduced in version v3.8 by commit ef6c49d87c3418c442a22e55e3ce2f91b163d69e. For more details please see the references link.
null
2022-03-18T02:53:01.657831Z
2022-03-18T00:13:33.848774Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef6c49d87c3418c442a22e55e3ce2f91b163d69e'}
Linux
GSD-2022-1001826
ax25: Fix NULL pointer dereferences in ax25 timers
ax25: Fix NULL pointer dereferences in ax25 timers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.35 by commit 43c107021d9160f6a1610bafba6dadc0323ae548, it was introduced in version v5.15.35 by commit da6509fba636f7f8b2e902b1e4742fdbf1bf059f. For more details please see the references link.
null
2022-04-24T21:45:34.189961Z
2022-04-24T21:45:34.189961Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/da6509fba636f7f8b2e902b1e4742fdbf1bf059f'}
Linux
GSD-2021-1001259
net: ti: fix UAF in tlan_remove_one
net: ti: fix UAF in tlan_remove_one This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.53 by commit f2a062fcfe1d6f1b0a86fa76ae21c277d65f4405, it was introduced in version v3.10 by commit 1e0a8b13d35510e711fdf72e9a3e30bcb2bd49fa. For more details please see the references link.
null
2021-12-20T00:45:28.376068Z
2021-08-03T01:50:38.801711Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e0a8b13d35510e711fdf72e9a3e30bcb2bd49fa'}
Linux
GSD-2022-1000221
mm/kmemleak: avoid scanning potential huge holes
mm/kmemleak: avoid scanning potential huge holes This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.99 by commit 352715593e81b917ce1b321e794549815b850134. For more details please see the references link.
null
2022-02-19T04:01:44.356708Z
2022-02-18T21:57:08.935598Z
null
null
null
null
null
Linux
GSD-2022-1000671
net: ieee802154: ca8210: Stop leaking skb's
net: ieee802154: ca8210: Stop leaking skb's This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.8 by commit 21feb6df3967541931242c427fe0958276af81cc, it was introduced in version v4.12 by commit ded845a781a578dfb0b5b2c138e5a067aa3b1242. For more details please see the references link.
null
2022-03-07T01:35:31.415571Z
2022-02-27T03:39:12.456550Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ded845a781a578dfb0b5b2c138e5a067aa3b1242'}
Linux
GSD-2022-1001963
veth: Ensure eth header is in skb's linear part
veth: Ensure eth header is in skb's linear part This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.112 by commit d67c900f1947d64ba8a64f693504bcaab8d9000c, it was introduced in version v2.6.24 by commit e314dbdc1c0dc6a548ecf0afce28ecfd538ff568. For more details please see the references link.
null
2022-04-25T03:38:07.393057Z
2022-04-24T21:58:55.197748Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e314dbdc1c0dc6a548ecf0afce28ecfd538ff568'}
Linux
GSD-2021-1002160
drm/msm/submit: fix overflow check on 64-bit architectures
drm/msm/submit: fix overflow check on 64-bit architectures This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 95c58291ee709424557996891926a05a32c5b13a, it was introduced in version v5.11 by commit 20224d715a882210428ea62bba93f1bc4a0afe23. For more details please see the references link.
null
2021-12-20T00:26:33.803375Z
2021-11-14T15:22:39.130189Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/20224d715a882210428ea62bba93f1bc4a0afe23'}
Linux
GSD-2022-1001430
ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl
ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit c32fe764191b8ae8b128588beb96e3718d9179d8, it was introduced in version v4.8 by commit 714fb87e8bc05ff78255afc0dca981e8c5242785. For more details please see the references link.
null
2022-04-25T04:20:14.429797Z
2022-04-24T21:12:26.764026Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/714fb87e8bc05ff78255afc0dca981e8c5242785'}
Linux
GSD-2021-1002530
proc/vmcore: fix clearing user buffer by properly using clear_user()
proc/vmcore: fix clearing user buffer by properly using clear_user() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.6 by commit 7b3a34f08d11e7f05cd00b8e09adaa15192f0ad1, it was introduced in version v3.0 by commit 997c136f518c5debd63847e78e2a8694f56dcf90. For more details please see the references link.
null
2021-12-19T23:52:49.120894Z
2021-12-19T19:41:20.713871Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/997c136f518c5debd63847e78e2a8694f56dcf90'}
Linux
GSD-2022-1001060
x86/mce: Work around an erratum on fast string copy instructions
x86/mce: Work around an erratum on fast string copy instructions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit ba37c73be3d5632f6fb9fa20b250ce45560ca85d. For more details please see the references link.
null
2022-04-25T05:26:50.878794Z
2022-04-24T20:42:56.780182Z
null
null
null
null
null
Linux
GSD-2021-1000223
KEYS: trusted: Fix memory leak on object td
KEYS: trusted: Fix memory leak on object td This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit 3e24fbd37e72e8a67b74991970fecc82d14f57af, it was introduced in version v5.12 by commit 5df16caada3fba3b21cb09b85cdedf99507f4ec1. For more details please see the references link.
null
2021-12-19T22:29:18.773465Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5df16caada3fba3b21cb09b85cdedf99507f4ec1'}
Linux
GSD-2021-1000389
crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init
crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 1f50392650ae794a1aea41c213c6a3e1c824413c, it was introduced in version v4.7 by commit 25c6ffb249f612c56a48ce48a3887adf57b8f4bd. For more details please see the references link.
null
2021-12-19T23:12:03.589927Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/25c6ffb249f612c56a48ce48a3887adf57b8f4bd'}
Linux
GSD-2021-1001961
isdn: mISDN: Fix sleeping function called from invalid context
isdn: mISDN: Fix sleeping function called from invalid context This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.253 by commit 37e4f57b22cc5ebb3f80cf0f74fdeb487f082367. For more details please see the references link.
null
2021-12-20T01:20:43.643927Z
2021-11-14T15:13:33.660555Z
null
null
null
null
null
Linux
GSD-2021-1000673
i2c: i801: Don't generate an interrupt on bus reset
i2c: i801: Don't generate an interrupt on bus reset This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.235 by commit dfa8929e117b0228a7765f5c3f5988a4a028f3c6, it was introduced in version v3.6 by commit 636752bcb5177a301d0266270661581de8624828. For more details please see the references link.
null
2021-12-19T23:06:50.399242Z
2021-06-04T19:59:25.767841Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/636752bcb5177a301d0266270661581de8624828'}
Linux
GSD-2022-1002162
scsi: target: tcmu: Fix possible page UAF
scsi: target: tcmu: Fix possible page UAF This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.190 by commit fb7a5115422fbd6a4d505e8844f1ef5529f10489. For more details please see the references link.
null
2022-04-25T03:49:44.789892Z
2022-04-24T22:17:14.147304Z
null
null
null
null
null
Linux
GSD-2022-1002498
power: supply: wm8350-power: Add missing free in free_charger_irq
power: supply: wm8350-power: Add missing free in free_charger_irq This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit a6a3ec1626846fba62609330673a2dd5007d6a53, it was introduced in version v2.6.29 by commit 14431aa0c5a443d13d24e6f865a8838f97dab973. For more details please see the references link.
null
2022-04-25T05:22:39.453329Z
2022-04-24T22:54:39.448552Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/14431aa0c5a443d13d24e6f865a8838f97dab973'}
Linux
GSD-2021-1001432
mISDN: fix possible use-after-free in HFC_cleanup()
mISDN: fix possible use-after-free in HFC_cleanup() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.240 by commit 7867ddc5f3de7f289aee63233afc0df4b62834c5. For more details please see the references link.
null
2021-12-19T22:45:43.592322Z
2021-08-03T02:39:04.240391Z
null
null
null
null
null
Linux
GSD-2021-1001598
mac80211: fix use-after-free in CCMP/GCMP RX
mac80211: fix use-after-free in CCMP/GCMP RX This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.151 by commit 50149e0866a82cef33e680ee68dc380a5bc75d32, it was introduced in version v5.4.124 by commit c8b3a6150dc8ac78d5fdd5fbdfc4806249ef8b2c. For more details please see the references link.
null
2021-12-19T23:17:19.311795Z
2021-10-19T16:27:37.539557Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c8b3a6150dc8ac78d5fdd5fbdfc4806249ef8b2c'}
Linux
GSD-2021-1001062
mptcp: Fix out of bounds when parsing TCP options
mptcp: Fix out of bounds when parsing TCP options This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit 76e02b8905d0691e89e104a882f3bba7dd0f6037, it was introduced in version v5.6 by commit cec37a6e41aae7bf3df9a3da783380a4d9325fd8. For more details please see the references link.
null
2021-12-20T00:22:11.583537Z
2021-06-30T00:37:05.538043Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cec37a6e41aae7bf3df9a3da783380a4d9325fd8'}
Linux
GSD-2021-1001577
i2c: acpi: fix resource leak in reconfiguration device addition
i2c: acpi: fix resource leak in reconfiguration device addition This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.153 by commit 60bacf259e8c2eb2324f3e13275200baaee9494b, it was introduced in version v4.8 by commit 525e6fabeae286848592363bda13bc34b59bb5ac. For more details please see the references link.
null
2021-12-19T23:20:35.081390Z
2021-10-19T16:24:34.125935Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/525e6fabeae286848592363bda13bc34b59bb5ac'}
Linux
GSD-2022-1002027
can: mcba_usb: properly check endpoint type
can: mcba_usb: properly check endpoint type This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit ef0acc514123140157b19a9ff2e2de5d91d612bc, it was introduced in version v4.12 by commit 51f3baad7de943780ce0c17bd7975df567dd6e14. For more details please see the references link.
null
2022-04-25T04:25:32.516254Z
2022-04-24T22:04:08.880342Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/51f3baad7de943780ce0c17bd7975df567dd6e14'}
Linux
GSD-2021-1001127
net: qed: Fix memcpy() overflow of qed_dcbx_params()
net: qed: Fix memcpy() overflow of qed_dcbx_params() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.47 by commit ca0e1fefbb534cc86296d9e5d116b0bf49084112. For more details please see the references link.
null
2021-12-19T22:23:21.300730Z
2021-07-08T01:58:15.727528Z
null
null
null
null
null
Linux
GSD-2022-1002477
MIPS: fix fortify panic when copying asm exception handlers
MIPS: fix fortify panic when copying asm exception handlers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit fc283677599b5b13e5e2734abb8829adb8c02ce1. For more details please see the references link.
null
2022-04-25T06:27:37.236471Z
2022-04-24T22:52:29.813999Z
null
null
null
null
null
Linux
GSD-2021-1000366
Bluetooth: avoid deadlock between hci_dev->lock and socket lock
Bluetooth: avoid deadlock between hci_dev->lock and socket lock This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 7cc0ba67883c6c8d3bddb283f56c167fc837a555, it was introduced in version v5.7 by commit eab2404ba798a8efda2a970f44071c3406d94e57. For more details please see the references link.
null
2021-12-20T00:31:06.603179Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/eab2404ba798a8efda2a970f44071c3406d94e57'}
Linux
GSD-2022-1000919
net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe()
net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.270 by commit b1ee6b9340a38bdb9e5c90f0eac5b22b122c3049, it was introduced in version v3.18 by commit 8c14f9c70327a6fb75534c4c61d7ea9c82ccf78f. For more details please see the references link.
null
2022-03-18T02:55:06.177047Z
2022-03-18T00:32:01.028936Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c14f9c70327a6fb75534c4c61d7ea9c82ccf78f'}
Linux
GSD-2021-1001824
ocfs2: mount fails with buffer overflow in strlen
ocfs2: mount fails with buffer overflow in strlen This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.156 by commit d3a83576378b4c904f711598dde2c5e881c4295c. For more details please see the references link.
null
2021-12-20T00:15:06.056969Z
2021-10-28T13:50:48.096013Z
null
null
null
null
null
Linux
GSD-2021-1000736
mm, hugetlb: fix simple resv_huge_pages underflow on UFFDIO_COPY
mm, hugetlb: fix simple resv_huge_pages underflow on UFFDIO_COPY This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.236 by commit b5869ed8a39a4c6599f1d6c52e9ece785ceb8e16, it was introduced in version v4.11 by commit 8fb5debc5fcd450470cdd789c2d80ef95ebb8cf4. For more details please see the references link.
null
2021-12-19T23:21:43.711843Z
2021-06-25T00:00:05.765751Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8fb5debc5fcd450470cdd789c2d80ef95ebb8cf4'}
Linux
GSD-2022-1000299
usb: f_fs: Fix use-after-free for epfile
usb: f_fs: Fix use-after-free for epfile This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.267 by commit 32048f4be071f9a6966744243f1786f45bb22dc2, it was introduced in version v4.9 by commit a9e6f83c2df199187a5248f824f31b6787ae23ae. For more details please see the references link.
null
2022-03-07T01:43:28.845929Z
2022-02-27T02:48:02.716077Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a9e6f83c2df199187a5248f824f31b6787ae23ae'}
Linux
GSD-2022-1000763
iommu/amd: Fix I/O page table memory leak
iommu/amd: Fix I/O page table memory leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.27 by commit 378e2fe1eb58d5c2ed55c8fe5e11f9db5033cdd6, it was introduced in version v5.12 by commit e42ba0633064ef23eb1c8c21edf96bac1541bd4b. For more details please see the references link.
null
2022-03-18T03:00:04.503966Z
2022-03-18T00:15:59.051183Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e42ba0633064ef23eb1c8c21edf96bac1541bd4b'}
Linux
GSD-2022-1001871
ASoC: atmel: Fix error handling in snd_proto_probe
ASoC: atmel: Fix error handling in snd_proto_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit f32ac9bf5e3f594ef9bfedb410aebc98cf784e69, it was introduced in version v4.20 by commit a45f8853a5f95e3760dfbd7ba09d3d597d247040. For more details please see the references link.
null
2022-04-25T05:25:01.866536Z
2022-04-24T21:50:18.586871Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a45f8853a5f95e3760dfbd7ba09d3d597d247040'}
Linux
GSD-2022-1000333
scsi: target: iscsi: Make sure the np under each tpg is unique
scsi: target: iscsi: Make sure the np under each tpg is unique This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.180 by commit c6a7077144ed291cfbf736875ad0fe89e6291f02. For more details please see the references link.
null
2022-03-07T01:38:50.003512Z
2022-02-27T02:52:34.702798Z
null
null
null
null
null
Linux
GSD-2021-1002422
serial: core: fix transmit-buffer reset and memleak
serial: core: fix transmit-buffer reset and memleak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.220 by commit 1179b168fa3f3a6aae3bd140000455a0e58457db, it was introduced in version v4.9 by commit 761ed4a94582ab291aa24dcbea4e01e8936488c8. For more details please see the references link.
null
2021-12-19T23:17:10.480665Z
2021-12-19T19:36:39.968395Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/761ed4a94582ab291aa24dcbea4e01e8936488c8'}
Linux
GSD-2022-1001488
lib/test: use after free in register_test_dev_kmod()
lib/test: use after free in register_test_dev_kmod() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 0d26d371130d0edd59e9db0cf8142d460953d402, it was introduced in version v4.13 by commit d9c6a72d6fa29d3a7999dda726577e5d1fccafa5. For more details please see the references link.
null
2022-04-25T06:03:40.601411Z
2022-04-24T21:16:21.635332Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9c6a72d6fa29d3a7999dda726577e5d1fccafa5'}
Linux
GSD-2022-1001172
net: sparx5: switchdev: fix possible NULL pointer dereference
net: sparx5: switchdev: fix possible NULL pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit e7e1fff76c4c57688dc7d53a3b6212182d5628d0, it was introduced in version v5.15 by commit 10615907e9b51c9ae92f3a6ecabd01c482f20f32. For more details please see the references link.
null
2022-04-25T07:26:32.841787Z
2022-04-24T20:50:23.801687Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/10615907e9b51c9ae92f3a6ecabd01c482f20f32'}
Linux
GSD-2021-1002072
staging: rtl8712: fix use-after-free in rtl8712_dl_fw
staging: rtl8712: fix use-after-free in rtl8712_dl_fw This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.79 by commit c430094541a80575259a94ff879063ef01473506, it was introduced in version v3.3 by commit 8c213fa59199f9673d66970d6940fa093186642f. For more details please see the references link.
null
2021-12-20T00:50:49.145697Z
2021-11-14T15:18:36.385463Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c213fa59199f9673d66970d6940fa093186642f'}
Linux
GSD-2022-1001522
Revert "RDMA/core: Fix ib_qp_usecnt_dec() called when error"
Revert "RDMA/core: Fix ib_qp_usecnt_dec() called when error" This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit eed4e3e752c2f8dfa290d3cd872e2945d30b46e7, it was introduced in version v5.16.19 by commit c62452bd75f59b13019d3f4ce508a30949fb6375. For more details please see the references link.
null
2022-04-24T21:19:50.789836Z
2022-04-24T21:19:50.789836Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c62452bd75f59b13019d3f4ce508a30949fb6375'}
Linux
GSD-2021-1002588
nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done
nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.8 by commit fae9705d281091254d4a81fa2da9d22346097dca, it was introduced in version v3.12 by commit ac22ac466a659f1b2e02a2e2ee23fc5c42da2c95. For more details please see the references link.
null
2021-12-20T00:40:45.402868Z
2021-12-19T19:43:56.746002Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac22ac466a659f1b2e02a2e2ee23fc5c42da2c95'}
Linux
GSD-2022-1001037
staging: vchiq_arm: Avoid NULL ptr deref in vchiq_dump_platform_instances
staging: vchiq_arm: Avoid NULL ptr deref in vchiq_dump_platform_instances This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 51e5e5c34c22c0bfec0808d8c33e0b2fcf4c7c89. For more details please see the references link.
null
2022-04-25T04:28:28.595453Z
2022-04-24T20:41:38.003805Z
null
null
null
null
null
Linux
GSD-2021-1002567
octeontx2-af: Fix a memleak bug in rvu_mbox_init()
octeontx2-af: Fix a memleak bug in rvu_mbox_init() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.7 by commit 1c0ddef45b7e3dbe3ed073695d20faa572b7056a, it was introduced in version v5.12 by commit 98c5611163603d3d8012b1bf64ab48fd932cf734. For more details please see the references link.
null
2021-12-19T22:19:32.256797Z
2021-12-19T19:43:07.242551Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/98c5611163603d3d8012b1bf64ab48fd932cf734'}
Linux
GSD-2022-1001467
f2fs: use spin_lock to avoid hang
f2fs: use spin_lock to avoid hang This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 738886004bd2885ac2db0bc63b4874aa471ca87e. For more details please see the references link.
null
2022-04-25T04:01:04.187418Z
2022-04-24T21:15:15.545652Z
null
null
null
null
null
Linux
GSD-2021-1002137
net: batman-adv: fix error handling
net: batman-adv: fix error handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.16 by commit a8f7359259dd5923adc6129284fdad12fc5db347, it was introduced in version v2.6.38 by commit c6c8fea29769d998d94fcec9b9f14d4b52b349d3. For more details please see the references link.
null
2021-12-20T01:00:24.597045Z
2021-11-14T15:21:34.299524Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6c8fea29769d998d94fcec9b9f14d4b52b349d3'}
Linux
GSD-2022-1000626
powerpc64/bpf: Limit 'ldbrx' to processors compliant with ISA v2.06
powerpc64/bpf: Limit 'ldbrx' to processors compliant with ISA v2.06 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit aaccfeeee1630b155e8ff0d6c449d3de1ef86e73, it was introduced in version v4.8 by commit 156d0e290e969caba25f1851c52417c14d141b24. For more details please see the references link.
null
2022-03-07T01:39:34.600317Z
2022-02-27T03:32:49.103480Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/156d0e290e969caba25f1851c52417c14d141b24'}
Linux
GSD-2022-1001934
locking/lockdep: Avoid potential access of invalid memory in lock_class
locking/lockdep: Avoid potential access of invalid memory in lock_class This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 03f836fcb655417693aef350dcb830451ab7d388, it was introduced in version v5.1 by commit 8b39adbee805c539a461dbf208b125b096152b1c. For more details please see the references link.
null
2022-04-25T06:55:23.003775Z
2022-04-24T21:56:09.529634Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8b39adbee805c539a461dbf208b125b096152b1c'}
Linux
GSD-2022-1000276
rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink()
rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.20 by commit def5e7070079b2a214b3b1a2fbec623e6fbfe34a, it was introduced in version v3.14 by commit ba7d49b1f0f8e5f24294a880ed576964059af5ef. For more details please see the references link.
null
2022-02-19T03:05:38.312571Z
2022-02-18T22:05:10.715844Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ba7d49b1f0f8e5f24294a880ed576964059af5ef'}
Linux
GSD-2021-1002834
platform/x86: intel_pmc_core: fix memleak on registration failure
platform/x86: intel_pmc_core: fix memleak on registration failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.12 by commit 9ca1324755f1f8629a370af5cc315b175331f5d1, it was introduced in version v5.9 by commit 938835aa903ae19ad62805134f79bbcf20fc3bea. For more details please see the references link.
null
2022-01-11T05:47:52.129337Z
2021-12-30T02:45:33.181463Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/938835aa903ae19ad62805134f79bbcf20fc3bea'}
Linux
GSD-2021-1000809
net: caif: fix memory leak in cfusbl_device_notify
net: caif: fix memory leak in cfusbl_device_notify This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.10 by commit dde8686985ec24d6b00487080a906609bd613ea1, it was introduced in version v3.3 by commit 7ad65bf68d705b445ef10b77ab50dab22be185ee. For more details please see the references link.
null
2021-12-20T00:19:27.044600Z
2021-06-25T00:08:45.779960Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ad65bf68d705b445ef10b77ab50dab22be185ee'}
Maven
GHSA-37pw-qw47-4jxm
Privilege escalation vulnerability in Apache Hadoop
In Apache Hadoop versions 3.0.0-alpha1 to 3.1.0, 2.9.0 to 2.9.1, and 2.2.0 to 2.8.4, a user who can escalate to yarn user can possibly run arbitrary commands as root user.
{'CVE-2018-8029'}
2022-03-03T05:14:19.336565Z
2019-05-31T16:09:15Z
HIGH
null
{'CWE-285'}
{'https://lists.apache.org/thread.html/a0164b87660223a2d491f83c88f905fe1a9fa8dc795148d9b0d968c8@%3Cdev.hbase.apache.org%3E', 'http://www.securityfocus.com/bid/108518', 'https://lists.apache.org/thread.html/r4dddf1705dbedfa94392913b2dad1cd2d1d89040facd389eea0b3510@%3Ccommits.druid.apache.org%3E', 'https://lists.apache.org/thread.html/a97c53a81e639ca2fc7b8f61a4fcd1842c2a78544041244a7c624727@%3Cissues.hbase.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-8029', 'https://lists.apache.org/thread.html/rb21df54a4e39732ce653d2aa5672e36a792b59eb6717f2a06bb8d02a@%3Ccommits.druid.apache.org%3E', 'https://security.netapp.com/advisory/ntap-20190617-0001/', 'https://lists.apache.org/thread.html/17084c09e6dedf60efe08028b429c92ffd28aacc28454e4fa924578a@%3Cgeneral.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/0b8d58e02dbd0fb8bf7320c514fe58da1d6728bdc150f1ba04e0d9fc@%3Cissues.hbase.apache.org%3E'}
null
Maven
GHSA-wfcc-pff6-rgc5
Exposure of Sensitive Information in org.eclipse.jetty:jetty-server
Jetty through 9.4.x is prone to a timing channel in util/security/Password.java, which makes it easier for remote attackers to obtain access by observing elapsed times before rejection of incorrect passwords.
{'CVE-2017-9735'}
2022-03-18T20:32:00.842689Z
2018-10-19T16:15:46Z
HIGH
null
{'CWE-200', 'CWE-203'}
{'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/36870f6c51f5bc25e6f7bb1fcace0e57e81f1524019b11f466738559@%3Ccommon-dev.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/053d9ce4d579b02203db18545fee5e33f35f2932885459b74d1e4272@%3Cissues.activemq.apache.org%3E', 'https://github.com/advisories/GHSA-wfcc-pff6-rgc5', 'https://github.com/eclipse/jetty.project/issues/1556', 'https://lists.apache.org/thread.html/ff8dcfe29377088ab655fda9d585dccd5b1f07fabd94ae84fd60a7f8@%3Ccommits.pulsar.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2021/05/msg00016.html', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://lists.apache.org/thread.html/f887a5978f5e4c62b9cfe876336628385cff429e796962649649ec8a@%3Ccommon-issues.hadoop.apache.org%3E', 'http://www.securityfocus.com/bid/99104', 'https://nvd.nist.gov/vuln/detail/CVE-2017-9735', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html', 'https://bugs.debian.org/864631', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}
null
Maven
GHSA-vqwg-4v6f-h6x5
Stored XSS vulnerability in Matrix Project Plugin
Jenkins Matrix Project Plugin 1.19 and earlier does not escape HTML metacharacters in node and label names, and label descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure permission.
{'CVE-2022-20615'}
2022-04-29T04:33:51Z
2022-01-13T00:01:04Z
MODERATE
null
{'CWE-79'}
{'https://github.com/jenkinsci/matrix-project-plugin', 'https://nvd.nist.gov/vuln/detail/CVE-2022-20615', 'http://www.openwall.com/lists/oss-security/2022/01/12/6', 'https://www.oracle.com/security-alerts/cpuapr2022.html', 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-2017'}
null
Maven
GHSA-cf2j-vf36-c6w8
Communities and collections administrators can escalate their privilege up to system administrator
### Impact Any community or collection administrator can escalate their permission up to become system administrator. This vulnerability only existed in 7.0 and does not impact 6.x or below. ### Patches Fix is included in [7.1](https://github.com/DSpace/DSpace/releases/tag/dspace-7.1). Please upgrade to 7.1 at your earliest convenience. ### Workarounds In 7.0, temporarily disable the ability for community or collection administrators to manage permissions or workflows settings, i.e. set the following properties in your local.cfg / dspace.cfg file ``` core.authorization.collection-admin.policies = false core.authorization.community-admin.policies = false core.authorization.community-admin.collection.workflows = false ``` Once upgraded to 7.1, these settings can be safely reverted to the default values of `true`. ### References Discovered during investigation of https://github.com/DSpace/DSpace/issues/7928 ### For more information If you have any questions or comments about this advisory: * Email us at security@dspace.org
{'CVE-2021-41189'}
2022-03-03T05:13:25.172783Z
2021-11-01T19:18:16Z
HIGH
null
{'CWE-863'}
{'https://github.com/DSpace/DSpace/security/advisories/GHSA-cf2j-vf36-c6w8', 'https://github.com/DSpace/DSpace/issues/7928', 'https://github.com/DSpace/DSpace/commit/277b499a5cd3a4f5eb2370513a1b7e4ec2a6e041', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41189', 'https://github.com/DSpace/DSpace/commit/c3bea16ab911606e15ae96c97a1575e1ffb14f8a', 'https://github.com/DSpace/DSpace'}
null
Maven
GHSA-gwp4-hfv6-p7hw
Deserialization of untrusted data in FasterXML jackson-databind
A Polymorphic Typing issue was discovered in FasterXML jackson-databind 2.x before 2.9.9.2. This occurs when Default Typing is enabled (either globally or for a specific property) for an externally exposed JSON endpoint and the service has the logback jar in the classpath.
{'CVE-2019-14439'}
2022-03-03T05:13:30.808736Z
2019-08-01T19:18:06Z
HIGH
null
{'CWE-502'}
{'https://lists.apache.org/thread.html/0d4b630d9ee724aee50703397d9d1afa2b2befc9395ba7797d0ccea9@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/2d2a76440becb610b9a9cb49b15eac3934b02c2dbcaacde1000353e4@%3Cdev.tomee.apache.org%3E', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OVRZDN2T6AZ6DJCZJ3VSIQIVHBVMVWBL/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14439', 'https://lists.apache.org/thread.html/34717424b4d08b74f65c09a083d6dd1cb0763f37a15d6de135998c1d@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://www.oracle.com/security-alerts/cpujan2020.html', 'https://lists.apache.org/thread.html/ee0a051428d2c719acfa297d0854a189ea5e284ef3ed491fa672f4be@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E', 'https://www.debian.org/security/2019/dsa-4542', 'https://lists.apache.org/thread.html/87e46591de8925f719664a845572d184027258c5a7af0a471b53c77b@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/3f99ae8dcdbd69438cb733d745ee3ad5e852068490719a66509b4592@%3Ccommits.cassandra.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2019/08/msg00011.html', 'https://github.com/FasterXML/jackson-databind/compare/jackson-databind-2.9.9.1...jackson-databind-2.9.9.2', 'https://lists.apache.org/thread.html/940b4c3fef002461b89a050935337056d4a036a65ef68e0bbd4621ef@%3Cdev.struts.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2019:3200', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXRVXNRFHJSQWFHPRJQRI5UPMZ63B544/', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/5ecc333113b139429f4f05000d4aa2886974d4df3269c1dd990bb319@%3Cdev.tomee.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/commit/ad418eeb974e357f2797aef64aa0e3ffaaa6125b', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://security.netapp.com/advisory/ntap-20190814-0001/', 'https://lists.apache.org/thread.html/5fc0e16b7af2590bf1e97c76c136291c4fdb244ee63c65c485c9a7a1@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/56c8042873595b8c863054c7bfccab4bf2c01c6f5abedae249d914b9@%3Cdev.tomee.apache.org%3E', 'https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E', 'https://github.com/FasterXML/jackson-databind/issues/2389', 'https://seclists.org/bugtraq/2019/Oct/6', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}
null
Maven
GHSA-6rxj-58jh-436r
Moderate severity vulnerability that affects org.apache.tomcat.embed:tomcat-embed-core
The URL pattern of "" (the empty string) which exactly maps to the context root was not correctly handled in Apache Tomcat 9.0.0.M1 to 9.0.4, 8.5.0 to 8.5.27, 8.0.0.RC1 to 8.0.49 and 7.0.0 to 7.0.84 when used as part of a security constraint definition. This caused the constraint to be ignored. It was, therefore, possible for unauthorised users to gain access to web application resources that should have been protected. Only security constraints with a URL pattern of the empty string were affected.
{'CVE-2018-1304'}
2022-03-03T05:13:22.078352Z
2018-10-17T16:31:17Z
MODERATE
null
null
{'https://security.netapp.com/advisory/ntap-20180706-0001/', 'https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:1448', 'https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E', 'https://usn.ubuntu.com/3665-1/', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:1449', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/b1d7e2425d6fd2cebed40d318f9365b44546077e10949b01b1f8a0fb@%3Cannounce.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:1451', 'https://lists.debian.org/debian-lts-announce/2018/03/msg00004.html', 'https://access.redhat.com/errata/RHSA-2018:2939', 'https://lists.debian.org/debian-lts-announce/2018/07/msg00044.html', 'https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:1447', 'http://www.securityfocus.com/bid/103170', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://lists.apache.org/thread.html/e85e83e9954f169bbb77b44baae5a33d8de878df557bb32b7f793661@%3Cdev.tomcat.apache.org%3E', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/eb6efa8d59c45a7a9eff94c4b925467d3b3fec8ba7697f3daa314b04@%3Cdev.tomcat.apache.org%3E', 'https://lists.debian.org/debian-lts-announce/2018/06/msg00008.html', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1304', 'https://access.redhat.com/errata/RHSA-2018:0465', 'https://access.redhat.com/errata/RHSA-2019:2205', 'https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:1320', 'https://access.redhat.com/errata/RHSA-2018:0466', 'http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html', 'https://lists.apache.org/thread.html/1dd0a59c1295cc08ce4c9e7edae5ad2268acc9ba55adcefa0532e5ba@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/5c0e00fd31efc11e147bf99d0f03c00a734447d3b131ab0818644cdb@%3Cdev.tomcat.apache.org%3E', 'https://lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E', 'https://access.redhat.com/errata/RHSA-2018:1450', 'https://www.debian.org/security/2018/dsa-4281', 'https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E', 'http://www.securitytracker.com/id/1040427', 'https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3E', 'https://github.com/advisories/GHSA-6rxj-58jh-436r'}
null
Maven
GHSA-c69w-jj56-834w
Improper Certificate Validation and Improper Validation of Certificate with Host Mismatch in Apache Sling Commons Messaging Mail
Apache Sling Commons Messaging Mail provides a simple layer on top of JavaMail/Jakarta Mail for OSGi to send mails via SMTPS. To reduce the risk of "man in the middle" attacks additional server identity checks must be performed when accessing mail servers. For compatibility reasons these additional checks are disabled by default in JavaMail/Jakarta Mail. The SimpleMailService in Apache Sling Commons Messaging Mail 1.0 lacks an option to enable these checks for the shared mail session. A user could enable these checks nevertheless by accessing the session via the message created by SimpleMessageBuilder and setting the property mail.smtps.ssl.checkserveridentity to true. Apache Sling Commons Messaging Mail 2.0 adds support for enabling server identity checks and these checks are enabled by default. - https://javaee.github.io/javamail/docs/SSLNOTES.txt - https://javaee.github.io/javamail/docs/api/com/sun/mail/smtp/package-summary.html - https://github.com/eclipse-ee4j/mail/issues/429
{'CVE-2021-44549'}
2022-03-03T05:13:21.721284Z
2021-12-16T14:12:49Z
HIGH
null
{'CWE-295', 'CWE-297'}
{'https://javaee.github.io/javamail/docs/api/com/sun/mail/smtp/package-summary.html', 'https://lists.apache.org/thread/l8p9h2bqvkj6rhv4w8kzctb817415b7f', 'https://github.com/eclipse-ee4j', 'https://javaee.github.io/javamail/docs/SSLNOTES.txt', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44549', 'https://github.com/eclipse-ee4j/mail/issues/429'}
null
Maven
GHSA-7x9j-7223-rg5m
High severity vulnerability that affects commons-fileupload:commons-fileupload
Apache Commons FileUpload before 1.3.3 DiskFileItem File Manipulation Remote Code Execution
{'CVE-2016-1000031'}
2022-03-03T05:13:50.464252Z
2018-12-21T17:51:51Z
CRITICAL
null
{'CWE-284'}
{'https://www.oracle.com/security-alerts/cpujan2020.html', 'http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html', 'https://www.oracle.com/security-alerts/cpujan2021.html', 'https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html', 'https://www.tenable.com/security/research/tra-2016-23', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://nvd.nist.gov/vuln/detail/CVE-2016-1000031', 'http://www.zerodayinitiative.com/advisories/ZDI-16-570/', 'https://issues.apache.org/jira/browse/WW-4812', 'https://issues.apache.org/jira/browse/FILEUPLOAD-279', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://www.oracle.com/security-alerts/cpuapr2020.html', 'https://www.oracle.com/security-alerts/cpujul2020.html', 'https://www.tenable.com/security/research/tra-2016-12', 'https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html', 'https://lists.apache.org/thread.html/d66657323fd25e437face5e84899c8ca404ccd187e81c3f2fa8b6080@%3Cannounce.apache.org%3E', 'https://github.com/advisories/GHSA-7x9j-7223-rg5m', 'https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html', 'http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00036.html', 'http://www.securityfocus.com/bid/93604', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html', 'https://security.netapp.com/advisory/ntap-20190212-0001/', 'https://www.tenable.com/security/research/tra-2016-30', 'https://www.oracle.com/security-alerts/cpuoct2021.html', 'https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html'}
null
Maven
GHSA-g5vf-v6wf-7w2r
Ciphertext Malleability Issue in Tink Java
### Impact Tink's Java version before 1.5 under some circumstances allowed attackers to change the key ID part of the ciphertext, resulting in the attacker creating a second ciphertext that will decrypt to the same plaintext. This can be a problem in particular in the case of encrypting with a deterministic AEAD with a single key, and relying on the fact that there is only a single valid ciphertext per plaintext. No loss of confidentiality or loss of plaintext integrity occurs due to this problem, only ciphertext integrity is compromised. ### Patches The issue was fixed in this [pull request](https://github.com/google/tink/commit/93d839a5865b9d950dffdc9d0bc99b71280a8899). ### Workarounds The only workaround is to backport the fixing [pull request](https://github.com/google/tink/commit/93d839a5865b9d950dffdc9d0bc99b71280a8899). ### Details Tink uses the first five bytes of a ciphertext for a version byte and a four byte key ID. Since each key has a well defined prefix, this extends non-malleability properties (but technically not indistinguishability). However, in the Java version this prefix lookup used a hash map indexed by unicode strings instead of the byte array, which means that invalid Unicode characters would be [replaced by U+FFFD](https://en.wikipedia.org/wiki/UTF-8#Invalid_sequences_and_error_handling) by the [Java API's default behavior](https://docs.oracle.com/javase/7/docs/api/java/lang/String.html#String(byte[],%20java.nio.charset.Charset)). This means several different values for the five bytes would result in the same hash table key, which allows an attacker to exchange one invalid byte sequence for another, creating a mutated ciphertext that still decrypts (to the same plaintext). ### Acknowledgements We'd like to thank Peter Esbensen for finding this issue and raising it internally. ### For more information If you have any questions or comments about this advisory: * Open an issue in [Tink](https://github.com/google/tink/issues)
{'CVE-2020-8929'}
2022-03-03T05:14:16.042047Z
2020-10-16T00:51:24Z
LOW
null
{'CWE-327', 'CWE-176'}
{'https://github.com/google/tink/commit/93d839a5865b9d950dffdc9d0bc99b71280a8899', 'https://nvd.nist.gov/vuln/detail/CVE-2020-8929', 'https://github.com/google/tink/security/advisories/GHSA-g5vf-v6wf-7w2r'}
null
Maven
GHSA-p639-xxv5-j383
Moderate severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service
In Apache Hive 2.1.0 to 2.3.2, when 'COPY FROM FTP' statement is run using HPL/SQL extension to Hive, a compromised/malicious FTP server can cause the file to be written to an arbitrary location on the cluster where the command is run from. This is because FTP client code in HPL/SQL does not verify the destination location of the downloaded file. This does not affect hive cli user and hiveserver2 user as hplsql is a separate command line script and needs to be invoked differently.
{'CVE-2018-1315'}
2022-03-03T05:13:24.824100Z
2018-11-21T22:24:08Z
LOW
null
{'CWE-732'}
{'https://lists.apache.org/thread.html/d5da94ef60312c01a8d2348466680d1b5fb70702c71a3e84e94f7933@%3Cdev.hive.apache.org%3E', 'https://nvd.nist.gov/vuln/detail/CVE-2018-1315', 'https://github.com/advisories/GHSA-p639-xxv5-j383'}
null
Maven
GHSA-5h9j-q6j2-253f
Unescaped exception messages in error responses in Jetty
In Eclipse Jetty versions 9.4.21.v20190926, 9.4.22.v20191022, and 9.4.23.v20191118, the generation of default unhandled Error response content (in text/html and text/json Content-Type) does not escape Exception messages in stacktraces included in error output.
{'CVE-2019-17632'}
2022-03-03T05:13:46.287233Z
2019-12-02T18:13:28Z
MODERATE
null
{'CWE-79'}
{'https://bugs.eclipse.org/bugs/show_bug.cgi?id=553443', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SAITZ27GKPD2CCNHGT2VBT4VWIBUJJNS/', 'https://www.oracle.com/security-alerts/cpuApr2021.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-17632'}
null
Maven
GHSA-cqxr-xf2w-943w
Creation of Temporary File in Directory with Insecure Permissions in auto-generated Java, Scala code
### Impact **This vulnerability impacts generated code.** If this code was generated as a one-off occasion, not as a part of an automated CI/CD process, this code will remain vulnerable until fixed manually! On Unix-Like systems, the system temporary directory is shared between all local users. When files/directories are created, the default `umask` settings for the process are respected. As a result, by default, most processes/apis will create files/directories with the permissions `-rw-r--r--` and `drwxr-xr-x` respectively, unless an API that explicitly sets safe file permissions is used. This vulnerability exists due to the use of the JDK method `File.createTempFile`. This method creates an insecure temporary files that can leave application and system data vulnerable to exposure. Auto-generated code (Java, Scala) that deals with uploading or downloading binary data through API endpoints will create insecure temporary files during the process. For example, if the API endpoint returns a PDF file, the auto-generated clients will first download the PDF into a insecure temporary file that can be read by anyone on the system. Affected generators: - Java - `okhttp-gson` (default library) https://github.com/OpenAPITools/openapi-generator/blob/d85f61ff0cfd6b8cd7063a63f302998a51466269/modules/openapi-generator/src/main/resources/Java/libraries/okhttp-gson/ApiClient.mustache#L1085-L1088 - `jersey2` https://github.com/OpenAPITools/openapi-generator/blob/d85f61ff0cfd6b8cd7063a63f302998a51466269/modules/openapi-generator/src/main/resources/Java/libraries/jersey2/ApiClient.mustache#L1035-L1038 - `resteasy` https://github.com/OpenAPITools/openapi-generator/blob/d85f61ff0cfd6b8cd7063a63f302998a51466269/modules/openapi-generator/src/main/resources/Java/libraries/resteasy/ApiClient.mustache#L604-L607 - `retrofit2` https://github.com/OpenAPITools/openapi-generator/blob/d85f61ff0cfd6b8cd7063a63f302998a51466269/modules/openapi-generator/src/main/resources/Java/libraries/retrofit2/play26/ApiClient.mustache#L202-L208 - Scala - `scala-finch` https://github.com/OpenAPITools/openapi-generator/blob/764a3b044c19fadf4a0789473cde96a65b77868a/modules/openapi-generator/src/main/resources/scala-finch/api.mustache#L83-L88 - `scala-akka` https://github.com/OpenAPITools/openapi-generator/blob/150e24dc553a8ea5230ffb938ed3e6020e972faa/modules/openapi-generator/src/main/resources/scala-akka-http-server/multipartDirectives.mustache#L71-L73 ### Patches The issue has been patched by changing the generated code to use the JDK method `Files.createTempFile` and released in the v5.1.0 stable version. This vulnerability has the same root cause as CVE-2021-21364 from the `swagger-api/swagger-codegen` project as this project and that one both share the same original source tree. https://github.com/swagger-api/swagger-codegen/security/advisories/GHSA-hpv8-9rq5-hq7w ### For more information If you have any questions or comments about this advisory: * Open an issue in [OpenAPI Generator Github repo](https://github.com/openAPITools/openapi-generator/) * Email us at [security@openapitools.org](mailto:security@openapitools.org)
{'CVE-2021-21430'}
2022-03-03T05:13:31.298974Z
2021-05-11T00:05:06Z
MODERATE
null
{'CWE-269', 'CWE-377', 'CWE-379', 'CWE-378'}
{'https://github.com/OpenAPITools/openapi-generator/pull/8791', 'https://github.com/OpenAPITools/openapi-generator/pull/8787', 'https://github.com/OpenAPITools/openapi-generator/security/advisories/GHSA-cqxr-xf2w-943w', 'https://github.com/OpenAPITools/openapi-generator/pull/9348', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21430'}
null
Maven
GHSA-vmqm-g3vh-847m
Denial of service in Apache Xerces2
Apache Xerces2 Java Parser before 2.12.0 allows remote attackers to cause a denial of service (CPU consumption) via a crafted message to an XML service, which triggers hash table collisions.
{'CVE-2012-0881'}
2022-03-03T05:13:08.829332Z
2020-06-15T18:51:38Z
HIGH
null
{'CWE-400'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=787104', 'https://github.com/apache/xerces2-j/commit/992b5d9c24102ad20330d36c0a71162753a37449', 'https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451@%3Csolr-user.lucene.apache.org%3E', 'https://www.oracle.com//security-alerts/cpujul2021.html', 'https://lists.apache.org/thread.html/rea7b831dceeb2a2fa817be6f63b08722042e3647fb2d47c144370a56@%3Ccommon-issues.hadoop.apache.org%3E', 'https://lists.apache.org/thread.html/b0656d359c7d40ec9f39c8cc61bca66802ef9a2a12ee199f5b0c1442@%3Cdev.drill.apache.org%3E', 'https://lists.apache.org/thread.html/49dc6702104a86ecbb40292dcd329ce9ae4c32b74733199ecab14a73@%3Cj-users.xerces.apache.org%3E', 'https://lists.apache.org/thread.html/f9bc3e55f4e28d1dcd1a69aae6d53e609a758e34d2869b4d798e13cc@%3Cissues.drill.apache.org%3E', 'https://issues.apache.org/jira/browse/XERCESJ-1685', 'https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E', 'http://www.openwall.com/lists/oss-security/2014/07/08/11', 'https://nvd.nist.gov/vuln/detail/CVE-2012-0881', 'https://lists.apache.org/thread.html/519eb0fd45642dcecd9ff74cb3e71c20a4753f7d82e2f07864b5108f@%3Cdev.drill.apache.org%3E'}
null
Maven
GHSA-jxgm-9f58-w4xp
Improper Input Validation in Apache Archiva
In Apache Archiva 2.0.0 - 2.2.3, it is possible to write files to the archiva server at arbitrary locations by using the artifact upload mechanism. Existing files can be overwritten, if the archiva run user has appropriate permission on the filesystem for the target file.
{'CVE-2019-0214'}
2022-03-03T05:13:50.663577Z
2019-05-14T04:00:21Z
MODERATE
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-0214', 'http://www.securityfocus.com/bid/108124', 'http://archiva.apache.org/security.html#CVE-2019-0214', 'http://www.openwall.com/lists/oss-security/2019/04/30/8', 'https://seclists.org/bugtraq/2019/Apr/48', 'https://lists.apache.org/thread.html/239349b6dd8f66cf87a70c287b03af451dea158b776d3dfc550b4f0e@%3Cusers.maven.apache.org%3E', 'https://lists.apache.org/thread.html/ada0052409d8a4a8c4eb2c7fd6b9cd9423bc753d5fce87eb826662fb@%3Cissues.archiva.apache.org%3E', 'http://packetstormsecurity.com/files/152684/Apache-Archiva-2.2.3-File-Write-Delete.html', 'https://lists.apache.org/thread.html/5851cb0214f22ba681fb445870eeb6b01afd1fb614e45a22978d7dda@%3Cusers.archiva.apache.org%3E', 'https://lists.apache.org/thread.html/18b670afc2f83034f47ebeb2f797c350fe60f1f2b33c95b95f467ef8@%3Cannounce.apache.org%3E'}
null
Maven
GHSA-6h2c-g688-q9qr
Path traversal in Jenkins Phoenix AutoTest Plugin
Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Item/Configure permission to copy arbitrary files and directories from the Jenkins controller to the agent workspace.
{'CVE-2022-28156'}
2022-04-07T22:01:59.815971Z
2022-03-30T00:00:24Z
MODERATE
null
{'CWE-22'}
{'http://www.openwall.com/lists/oss-security/2022/03/29/1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-28156', 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2683'}
null
Maven
GHSA-qwfw-gxx2-mmv2
Command Injection in Kylin
Similar to CVE-2020-1956, Kylin has one more restful API which concatenates the API inputs into OS commands and then executes them on the server; while the reported API misses necessary input validation, which causes the hackers to have the possibility to execute OS command remotely. Users of all previous versions after 2.3 should upgrade to 3.1.0.
{'CVE-2020-13925'}
2022-03-03T05:13:05.012142Z
2020-07-27T22:51:37Z
CRITICAL
null
{'CWE-78'}
{'https://lists.apache.org/thread.html/r250a867961cfd6e0506240a9c7eaee782d84c6ab0091c7c4bc45f3eb%40%3Cuser.kylin.apache.org%3E', 'https://snyk.io/vuln/SNYK-JAVA-ORGAPACHEKYLIN-584373', 'https://nvd.nist.gov/vuln/detail/CVE-2020-13925', 'https://lists.apache.org/thread.html/r021baf9d8d4ae41e8c8332c167c4fa96c91b5086563d9be55d2d7acf@%3Ccommits.kylin.apache.org%3E'}
null
Maven
GHSA-84wg-rgp8-2hg4
Command Injection in Apache James
Apache James prior to release 3.6.1 is vulnerable to a buffering attack relying on the use of the STARTTLS command. This can result in Man-in -the-middle command injection attacks, leading potentially to leakage of sensible information.
{'CVE-2021-38542'}
2022-03-03T05:14:10.044848Z
2022-01-08T00:40:33Z
MODERATE
null
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-38542', 'http://www.openwall.com/lists/oss-security/2022/01/04/1', 'https://www.openwall.com/lists/oss-security/2022/01/04/1'}
null
Maven
GHSA-w3f4-3q6j-rh82
Deserialization of Untrusted Data in jackson-databind
FasterXML jackson-databind through 2.8.11 and 2.9.x through 2.9.3 allows unauthenticated remote code execution because of an incomplete fix for the CVE-2017-7525 and CVE-2017-17485 deserialization flaws. This is exploitable via two different gadgets that bypass a blacklist.
{'CVE-2018-5968'}
2022-03-03T05:13:07.865218Z
2020-06-30T20:40:50Z
HIGH
null
{'CWE-502', 'CWE-184'}
{'https://access.redhat.com/errata/RHSA-2018:0480', 'https://github.com/GulajavaMinistudio/jackson-databind/pull/92/commits/038b471e2efde2e8f96b4e0be958d3e5a1ff1d05', 'https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03902en_us', 'https://www.oracle.com/security-alerts/cpuoct2020.html', 'https://access.redhat.com/errata/RHSA-2018:0479', 'https://nvd.nist.gov/vuln/detail/CVE-2018-5968', 'https://access.redhat.com/errata/RHSA-2019:3149', 'https://access.redhat.com/errata/RHSA-2019:2858', 'https://www.debian.org/security/2018/dsa-4114', 'https://github.com/FasterXML/jackson-databind', 'https://security.netapp.com/advisory/ntap-20180423-0002/', 'https://access.redhat.com/errata/RHSA-2018:1525', 'https://github.com/FasterXML/jackson-databind/issues/1899', 'https://access.redhat.com/errata/RHSA-2018:0481', 'https://access.redhat.com/errata/RHSA-2018:0478'}
null
Maven
GHSA-83r3-c79w-f6wc
High severity vulnerability that affects org.apache.hive:hive, org.apache.hive:hive-exec, and org.apache.hive:hive-service
The authorization framework in Apache Hive 1.0.0, 1.0.1, 1.1.0, 1.1.1, 1.2.0 and 1.2.1, on clusters protected by Ranger and SqlStdHiveAuthorization, allows attackers to bypass intended parent table access restrictions via unspecified partition-level operations.
{'CVE-2015-7521'}
2022-03-03T05:13:09.353587Z
2018-11-21T22:23:49Z
HIGH
null
{'CWE-287'}
{'http://www.openwall.com/lists/oss-security/2016/01/28/12', 'http://mail-archives.apache.org/mod_mbox/hive-user/201601.mbox/%3C20160128205008.2154F185EB%40minotaur.apache.org%3E', 'http://packetstormsecurity.com/files/135836/Apache-Hive-Authorization-Bypass.html', 'https://nvd.nist.gov/vuln/detail/CVE-2015-7521', 'https://github.com/advisories/GHSA-83r3-c79w-f6wc', 'http://www.securityfocus.com/archive/1/537549/100/0/threaded'}
null