ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2022-1000170 | btrfs: fix deadlock between quota disable and qgroup rescan worker | btrfs: fix deadlock between quota disable and qgroup rescan worker
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.178 by commit 26b3901d20bf9da2c6a00cb1fb48932166f80a45. For more details please see the references link. | null | 2022-02-19T05:09:51.601438Z | 2022-02-18T21:50:36.208032Z | null | null | null | null | null |
Linux | GSD-2022-1002458 | netfilter: nf_tables: initialize registers in nft_do_chain() | netfilter: nf_tables: initialize registers in nft_do_chain()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.274 by commit a3cc32863b175168283cb0a5fde08de6a1e27df9, it was introduced in version v3.13 by commit 96518518cc417bb0a8c80b9fb736202e28acdf96. For more details please see the references link. | null | 2022-04-25T05:53:43.383307Z | 2022-04-24T22:50:23.385373Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/96518518cc417bb0a8c80b9fb736202e28acdf96'} |
Linux | GSD-2022-1000465 | cfg80211: fix race in netlink owner interface destruction | cfg80211: fix race in netlink owner interface destruction
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit 241e633cb379c4f332fc1baf2abec95ec840cbeb, it was introduced in version v5.13 by commit ea6b2098dd02789f68770fd3d5a373732207be2f. For more details please see the references link. | null | 2022-03-07T01:30:58.309999Z | 2022-02-27T03:11:06.770330Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ea6b2098dd02789f68770fd3d5a373732207be2f'} |
Linux | GSD-2021-1001108 | i2c: robotfuzz-osif: fix control-request directions | i2c: robotfuzz-osif: fix control-request directions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.238 by commit 8ab0e49cc8eeabae4f31805e979173bb00ee472e, it was introduced in version v3.14 by commit 83e53a8f120f2f273cf0ad717f5372ab79ac24fe. For more details please see the references link. | null | 2021-12-19T23:26:10.941121Z | 2021-07-08T01:56:51.246044Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/83e53a8f120f2f273cf0ad717f5372ab79ac24fe'} |
Linux | GSD-2022-1002008 | scsi: pm8001: Fix task leak in pm8001_send_abort_all() | scsi: pm8001: Fix task leak in pm8001_send_abort_all()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit 2051044d7901f1a9d7be95d0d32e53b88e9548f7. For more details please see the references link. | null | 2022-04-25T05:47:13.716767Z | 2022-04-24T22:02:39.686787Z | null | null | null | null | null |
Linux | GSD-2022-1000035 | usb: mtu3: fix list_head check warning | usb: mtu3: fix list_head check warning
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.170 by commit 585e2b244dda7ea733274e4b8fa27853d625d3bf, it was introduced in version v5.2 by commit 83374e035b6286731c5aa617844c7b724294c2a7. For more details please see the references link. | null | 2022-01-11T05:46:45.127415Z | 2022-01-10T19:51:06.126767Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/83374e035b6286731c5aa617844c7b724294c2a7'} |
Linux | GSD-2021-1001558 | netfilter: ipset: Fix oversized kvmalloc() calls | netfilter: ipset: Fix oversized kvmalloc() calls
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.209 by commit c4bc456cb5b028e6a2a63e5d54b9f08e827c0504. For more details please see the references link. | null | 2021-12-19T22:14:40.020279Z | 2021-10-19T16:23:42.631078Z | null | null | null | null | null |
Linux | GSD-2022-1001274 | arm64: prevent instrumentation of bp hardening callbacks | arm64: prevent instrumentation of bp hardening callbacks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 9778d9f04f3db8900cf87ea41d36130722a65206, it was introduced in version v4.16 by commit ec82b567a74fbdffdf418d4bb381d55f6a9096af. For more details please see the references link. | null | 2022-04-25T07:08:29.479678Z | 2022-04-24T21:00:23.673062Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ec82b567a74fbdffdf418d4bb381d55f6a9096af'} |
Linux | GSD-2021-1000719 | btrfs: fixup error handling in fixup_inode_link_counts | btrfs: fixup error handling in fixup_inode_link_counts
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.272 by commit 9d20683fb38d7e990a03d7c4423f1bae72139520, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T01:38:48.154856Z | 2021-06-24T23:59:02.296797Z | null | null | null | null | null |
Linux | GSD-2021-1002724 | nfc: fix segfault in nfc_genl_dump_devices_done | nfc: fix segfault in nfc_genl_dump_devices_done
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.10 by commit d89e4211b51752daf063d638af50abed2fd5f96d. For more details please see the references link. | null | 2022-01-11T06:52:22.580479Z | 2021-12-27T05:39:11.165052Z | null | null | null | null | null |
Linux | GSD-2022-1001624 | NFSD: prevent underflow in nfssvc_decode_writeargs() | NFSD: prevent underflow in nfssvc_decode_writeargs()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 2764af8ce0bf03cc43ee4a11897cab96bde6caae. For more details please see the references link. | null | 2022-04-25T03:32:42.832024Z | 2022-04-24T21:29:43.552468Z | null | null | null | null | null |
Linux | GSD-2022-1000936 | xen/netfront: react properly to failing gnttab_end_foreign_access_ref() | xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.306 by commit c4497b057b14274e159434f0ed70439a21f3d2a9. For more details please see the references link. | null | 2022-03-18T03:00:38.961157Z | 2022-03-18T00:34:16.581878Z | null | null | null | null | null |
Linux | GSD-2021-1000349 | net: marvell: prestera: fix port event handling on init | net: marvell: prestera: fix port event handling on init
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 0ce6052802be2cb61a57b753e41301339c88c839, it was introduced in version v5.10 by commit 501ef3066c89d7f9045315e1be58749cf9e6814d. For more details please see the references link. | null | 2021-12-19T23:04:20.981327Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/501ef3066c89d7f9045315e1be58749cf9e6814d'} |
Linux | GSD-2021-1002374 | net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound | net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.292 by commit 142ead3dc70411bd5977e8c47a6d8bf22287b3f8. For more details please see the references link. | null | 2021-12-20T00:08:40.045414Z | 2021-12-19T19:34:28.249971Z | null | null | null | null | null |
Linux | GSD-2022-1002321 | iommu/arm-smmu-v3: fix event handling soft lockup | iommu/arm-smmu-v3: fix event handling soft lockup
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit b58e90be71733a11e0c3d0237d48934a8c7f3ad2. For more details please see the references link. | null | 2022-04-25T03:34:42.244407Z | 2022-04-24T22:34:10.857933Z | null | null | null | null | null |
Linux | GSD-2021-1000963 | KVM: x86: Ensure liveliness of nested VM-Enter fail tracepoint message | KVM: x86: Ensure liveliness of nested VM-Enter fail tracepoint message
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.44 by commit d046f724bbd725a24007b7e52b2d675249870888, it was introduced in version v5.4 by commit 380e0055bc7e4a5c687436ba3ccebb4667836b95. For more details please see the references link. | null | 2021-12-19T23:10:37.800538Z | 2021-06-30T00:29:34.533474Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/380e0055bc7e4a5c687436ba3ccebb4667836b95'} |
Linux | GSD-2021-1001671 | net/smc: fix 'workqueue leaked lock' in smc_conn_abort_work | net/smc: fix 'workqueue leaked lock' in smc_conn_abort_work
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.70 by commit b4561bd29e62b24b245a53391e64b6880f0792cc, it was introduced in version v5.8 by commit b286a0651e4404ab96cdfdcdad8a839a26b3751e. For more details please see the references link. | null | 2021-12-20T00:05:37.846292Z | 2021-10-19T16:31:03.362939Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b286a0651e4404ab96cdfdcdad8a839a26b3751e'} |
Linux | GSD-2021-1001221 | wl1251: Fix possible buffer overflow in wl1251_cmd_scan | wl1251: Fix possible buffer overflow in wl1251_cmd_scan
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.3 by commit 40af3960a15339e8bbd3be50c3bc7b35e1a0b6ea. For more details please see the references link. | null | 2021-12-19T23:43:36.114644Z | 2021-08-03T01:40:04.123469Z | null | null | null | null | null |
Linux | GSD-2021-1000060 | ext4: always panic when errors=panic is specified | ext4: always panic when errors=panic is specified
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.3 by commit 1e9ea8f4637026b8e965128953f2da061ccae9c4, it was introduced in version v5.11 by commit 014c9caa29d3a44e0de695c99ef18bec3e887d52. For more details please see the references link. | null | 2021-12-20T01:35:31.736633Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/014c9caa29d3a44e0de695c99ef18bec3e887d52'} |
Linux | GSD-2021-1000430 | Drivers: hv: vmbus: Increase wait time for VMbus unload | Drivers: hv: vmbus: Increase wait time for VMbus unload
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.119 by commit e83dcf255a136a4c8c454e2271d046f69dd58037, it was introduced in version v5.4.67 by commit e03e0498b45309a1abd3fa33b1651d22594e9011. For more details please see the references link. | null | 2021-12-19T23:51:16.475598Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e03e0498b45309a1abd3fa33b1651d22594e9011'} |
Linux | GSD-2021-1002118 | s390/pci: fix zpci_zdev_put() on reserve | s390/pci: fix zpci_zdev_put() on reserve
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit 4e5d794a2743f5a1e13ee1066ce37711f2696044, it was introduced in version v5.14 by commit 2a671f77ee49f3e78997b77fdee139467ff6a598. For more details please see the references link. | null | 2021-12-20T00:52:28.318073Z | 2021-11-14T15:20:38.510362Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2a671f77ee49f3e78997b77fdee139467ff6a598'} |
Linux | GSD-2021-1000125 | net: qrtr: Avoid potential use after free in MHI send | net: qrtr: Avoid potential use after free in MHI send
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.19 by commit ea474054c2cc6e1284604b21361f475c7cc8c0a0, it was introduced in version v5.8 by commit 6e728f321393b1fce9e1c2c3e55f9f7c15991321. For more details please see the references link. | null | 2021-12-19T23:49:25.655868Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6e728f321393b1fce9e1c2c3e55f9f7c15991321'} |
Linux | GSD-2022-1001448 | KVM: x86/mmu: do compare-and-exchange of gPTE via the user address | KVM: x86/mmu: do compare-and-exchange of gPTE via the user address
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 9a611c57530050dc359a83177c2f97678b1f961e, it was introduced in version v5.2 by commit bd53cb35a3e9adb73a834a36586e9ad80e877767. For more details please see the references link. | null | 2022-04-25T05:56:19.364966Z | 2022-04-24T21:14:13.182448Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bd53cb35a3e9adb73a834a36586e9ad80e877767'} |
Linux | GSD-2021-1002548 | f2fs: set SBI_NEED_FSCK flag when inconsistent node block found | f2fs: set SBI_NEED_FSCK flag when inconsistent node block found
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.6 by commit 8984bba3b4c0b36be6cbcd7ac4a8779a045bd670. For more details please see the references link. | null | 2021-12-20T00:33:24.887717Z | 2021-12-19T19:42:11.946143Z | null | null | null | null | null |
Linux | GSD-2021-1000575 | net: zero-initialize tc skb extension on allocation | net: zero-initialize tc skb extension on allocation
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.42 by commit ac493452e937b8939eaf2d24cac51a4804b6c20e, it was introduced in version v5.9 by commit 038ebb1a713d114d54dbf14868a73181c0c92758. For more details please see the references link. | null | 2021-12-19T23:13:55.313559Z | 2021-06-04T19:41:22.768693Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/038ebb1a713d114d54dbf14868a73181c0c92758'} |
Linux | GSD-2022-1001018 | drm/imx: Fix memory leak in imx_pd_connector_get_modes | drm/imx: Fix memory leak in imx_pd_connector_get_modes
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 7526102d908ec5ae777aa77723d52fce12916093, it was introduced in version v4.8 by commit 76ecd9c9fb24b014a6f33fbb1287ede3be12158b. For more details please see the references link. | null | 2022-04-25T07:19:30.100021Z | 2022-04-24T20:40:17.387742Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/76ecd9c9fb24b014a6f33fbb1287ede3be12158b'} |
Linux | GSD-2021-1000826 | net/nfc/rawsock.c: fix a permission check bug | net/nfc/rawsock.c: fix a permission check bug
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.273 by commit c08e0be44759d0b5affc5888be4aa5e536873335. For more details please see the references link. | null | 2021-12-20T01:34:37.232224Z | 2021-06-29T23:59:47.141865Z | null | null | null | null | null |
Linux | GSD-2021-1001734 | cpufreq: schedutil: Use kobject release() method to free sugov_tunables | cpufreq: schedutil: Use kobject release() method to free sugov_tunables
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit 8d62aec52a8c5b1d25a2364b243fcc5098a2ede9, it was introduced in version v4.7 by commit 9bdcb44e391da5c41b98573bf0305a0e0b1c9569. For more details please see the references link. | null | 2021-12-19T23:01:31.339202Z | 2021-10-19T16:34:06.868498Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9bdcb44e391da5c41b98573bf0305a0e0b1c9569'} |
Linux | GSD-2022-1000259 | drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable | drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.19 by commit 56480fb10b976581a363fd168dc2e4fbee87a1a7, it was introduced in version v4.3 by commit 5c8290284402bf7d2c12269402b3177b899c78b7. For more details please see the references link. | null | 2022-02-19T12:52:49.238169Z | 2022-02-18T22:03:12.158647Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5c8290284402bf7d2c12269402b3177b899c78b7'} |
Linux | GSD-2022-1002264 | soc: qcom: rpmpd: Check for null return of devm_kcalloc | soc: qcom: rpmpd: Check for null return of devm_kcalloc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 755dbc3d73789ac9f0017c729abf5e4b153bf799, it was introduced in version v5.1 by commit bbe3a66c3f5a65fb3d702351bac2a6033944d389. For more details please see the references link. | null | 2022-04-25T06:51:55.821109Z | 2022-04-24T22:28:05.499691Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bbe3a66c3f5a65fb3d702351bac2a6033944d389'} |
Linux | GSD-2021-1001364 | KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow | KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.199 by commit 0493b10c06021796ba80cbe53c961defd5aca6e5, it was introduced in version v3.10 by commit 8e591cb7204739efa8e15967ea334eb367039dde. For more details please see the references link. | null | 2021-12-19T23:37:20.949067Z | 2021-08-03T02:19:44.287769Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8e591cb7204739efa8e15967ea334eb367039dde'} |
Linux | GSD-2022-1000609 | drm/amd/display: Wrap dcn301_calculate_wm_and_dlg for FPU. | drm/amd/display: Wrap dcn301_calculate_wm_and_dlg for FPU.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.5 by commit 456ba2433844a6483cc4c933aa8f43d24575e341. For more details please see the references link. | null | 2022-03-07T01:34:58.723709Z | 2022-02-27T03:30:54.514987Z | null | null | null | null | null |
Linux | GSD-2022-1000166 | af_packet: fix data-race in packet_setsockopt / packet_setsockopt | af_packet: fix data-race in packet_setsockopt / packet_setsockopt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.177 by commit 4fc41403f0b6e4ac454f2ec27c05564fdbdf036b, it was introduced in version v4.3 by commit 47dceb8ecdc1c3ad1818dfea3d659a05b74c3fc2. For more details please see the references link. | null | 2022-02-19T15:32:45.789149Z | 2022-02-18T21:49:23.634118Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/47dceb8ecdc1c3ad1818dfea3d659a05b74c3fc2'} |
Linux | GSD-2022-1000536 | ax25: improve the incomplete fix to avoid UAF and NPD bugs | ax25: improve the incomplete fix to avoid UAF and NPD bugs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit 1e1f02d36d3e73f4a24e8c95c50a796bc3662d09. For more details please see the references link. | null | 2022-03-07T01:35:35.921620Z | 2022-02-27T03:20:37.202960Z | null | null | null | null | null |
Linux | GSD-2022-1000865 | hwmon: Handle failure to register sensor with thermal zone correctly | hwmon: Handle failure to register sensor with thermal zone correctly
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.103 by commit 962b2a3188bfa5388756ffbc47dfa5ff59cb8011, it was introduced in version v5.8 by commit 1597b374af22266266e1e20612208c4b11359ad4. For more details please see the references link. | null | 2022-03-18T04:10:17.755751Z | 2022-03-18T00:25:54.090155Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1597b374af22266266e1e20612208c4b11359ad4'} |
Linux | GSD-2022-1001777 | drm/dp: Fix off-by-one in register cache size | drm/dp: Fix off-by-one in register cache size
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit e912d697400c5f4bc8c1c8090416dad6c59cb28c, it was introduced in version v5.12 by commit e2e16da398d9149ede0162a55f44537582aed2e7. For more details please see the references link. | null | 2022-04-25T04:21:20.526487Z | 2022-04-24T21:41:48.039787Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e2e16da398d9149ede0162a55f44537582aed2e7'} |
Linux | GSD-2021-1002227 | NFC: reorder the logic in nfc_{un,}register_device | NFC: reorder the logic in nfc_{un,}register_device
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.291 by commit ff169909eac9e00bf1aa0af739ba6ddfb1b1d135, it was introduced in version v3.10 by commit be055b2f89b5842f41363b5655a33dffb51a8294. For more details please see the references link. | null | 2021-12-19T22:34:45.235675Z | 2021-11-29T02:34:17.639233Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/be055b2f89b5842f41363b5655a33dffb51a8294'} |
Linux | GSD-2022-1001327 | ALSA: pcm: Fix races among concurrent prealloc proc writes | ALSA: pcm: Fix races among concurrent prealloc proc writes
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.1 by commit 5ed8f8e3c4e59d0396b9ccf2e639711e24295bb6. For more details please see the references link. | null | 2022-04-25T04:29:54.896542Z | 2022-04-24T21:04:52.824937Z | null | null | null | null | null |
Linux | GSD-2021-1001958 | ocfs2: fix data corruption after conversion from inline format | ocfs2: fix data corruption after conversion from inline format
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.253 by commit 8e6bfb4f70168ddfd32fb6dc028ad52faaf1f32e, it was introduced in version v4.14.204 by commit 7ed80e77c908cbaa686529a49f8ae0060c5caee7. For more details please see the references link. | null | 2021-12-20T01:00:05.031957Z | 2021-11-14T15:13:26.412181Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ed80e77c908cbaa686529a49f8ae0060c5caee7'} |
Linux | GSD-2021-1002677 | igbvf: fix double free in `igbvf_probe` | igbvf: fix double free in `igbvf_probe`
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.168 by commit 8addba6cab94ce01686ea2e80ed1530f9dc33a9a, it was introduced in version v2.6.30 by commit d4e0fe01a38a073568aee541a0247fe734095979. For more details please see the references link. | null | 2022-01-11T05:53:30.862937Z | 2021-12-27T05:36:20.582679Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d4e0fe01a38a073568aee541a0247fe734095979'} |
Linux | GSD-2021-1002362 | can: sja1000: fix use after free in ems_pcmcia_add_card() | can: sja1000: fix use after free in ems_pcmcia_add_card()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.295 by commit cbd86110546f7f730a1f5d7de56c944a336c15c4, it was introduced in version v3.2 by commit fd734c6f25aea4b2b44b045e489aec67b388577e. For more details please see the references link. | null | 2021-12-19T23:59:24.105366Z | 2021-12-19T19:33:59.003403Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fd734c6f25aea4b2b44b045e489aec67b388577e'} |
Linux | GSD-2021-1002698 | net/sched: sch_ets: don't remove idle classes from the round-robin list | net/sched: sch_ets: don't remove idle classes from the round-robin list
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.88 by commit 81fbdd45652d8605a029e78ef14a6aaa529c4e72, it was introduced in version v5.10.83 by commit ae2659d2c670252759ee9c823c4e039c0e05a6f2. For more details please see the references link. | null | 2022-01-11T05:57:39.976695Z | 2021-12-27T05:37:28.813033Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ae2659d2c670252759ee9c823c4e039c0e05a6f2'} |
Linux | GSD-2022-1000920 | netfilter: nf_queue: fix possible use-after-free | netfilter: nf_queue: fix possible use-after-free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.270 by commit ef97921ccdc243170fcef857ba2a17cf697aece5, it was introduced in version v2.6.29 by commit 271b72c7fa82c2c7a795bc16896149933110672d. For more details please see the references link. | null | 2022-03-18T03:00:36.591581Z | 2022-03-18T00:32:15.216344Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/271b72c7fa82c2c7a795bc16896149933110672d'} |
Linux | GSD-2022-1001632 | ALSA: pcm: Fix races among concurrent prealloc proc writes | ALSA: pcm: Fix races among concurrent prealloc proc writes
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.18 by commit a21d2f323b5a978dedf9ff1d50f101f85e39b3f2. For more details please see the references link. | null | 2022-04-25T05:46:56.419570Z | 2022-04-24T21:30:15.967591Z | null | null | null | null | null |
Linux | GSD-2022-1001798 | block, bfq: don't move oom_bfqq | block, bfq: don't move oom_bfqq
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 8f34dea99cd7761156a146a5258a67d045d862f7. For more details please see the references link. | null | 2022-04-25T05:20:11.749349Z | 2022-04-24T21:42:52.972055Z | null | null | null | null | null |
Linux | GSD-2021-1002732 | vduse: fix memory corruption in vduse_dev_ioctl() | vduse: fix memory corruption in vduse_dev_ioctl()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit e6c67560b4341914bec32ec536e931c22062af65, it was introduced in version v5.15 by commit c8a6153b6c59d95c0e091f053f6f180952ade91e. For more details please see the references link. | null | 2022-01-11T05:53:25.696653Z | 2021-12-27T05:45:19.186033Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c8a6153b6c59d95c0e091f053f6f180952ade91e'} |
Linux | GSD-2022-1001262 | ASoC: codecs: rx-macro: fix accessing compander for aux | ASoC: codecs: rx-macro: fix accessing compander for aux
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 6aa8ef9535dbd561293406608ebe791627b10196, it was introduced in version v5.12 by commit 4f692926f562ff48abfcca6b16f36ff8d57473b6. For more details please see the references link. | null | 2022-04-25T03:36:19.333089Z | 2022-04-24T20:59:08.872220Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4f692926f562ff48abfcca6b16f36ff8d57473b6'} |
Linux | GSD-2022-1000023 | usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. | usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.224 by commit 33f6a0cbb7772146e1c11f38028fffbfed14728b, it was introduced in version v4.0 by commit 5e33f6fdf735cda1d4580fe6f1878da05718fe73. For more details please see the references link. | null | 2022-01-11T05:53:37.208572Z | 2022-01-10T19:50:35.676992Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5e33f6fdf735cda1d4580fe6f1878da05718fe73'} |
Linux | GSD-2022-1000189 | usb: xhci-plat: fix crash when suspend if remote wake enable | usb: xhci-plat: fix crash when suspend if remote wake enable
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.96 by commit 20c51a4c52208f98e27308c456a1951778f41fa5. For more details please see the references link. | null | 2022-02-20T06:40:48.190421Z | 2022-02-18T21:52:43.711520Z | null | null | null | null | null |
Linux | GSD-2022-1000473 | mtd: parsers: qcom: Fix missing free for pparts in cleanup | mtd: parsers: qcom: Fix missing free for pparts in cleanup
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit 3eb5185896a68373714dc7d0009111744adc3345, it was introduced in version v5.14 by commit 10f3b4d79958d6f9f71588c6fa862159c83fa80f. For more details please see the references link. | null | 2022-03-07T01:42:58.824357Z | 2022-02-27T03:12:01.502020Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/10f3b4d79958d6f9f71588c6fa862159c83fa80f'} |
Linux | GSD-2021-1000426 | liquidio: Fix unintented sign extension of a left shift of a u16 | liquidio: Fix unintented sign extension of a left shift of a u16
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.119 by commit 440fead0fc81192d2f893e238378574f6d9fb3c3, it was introduced in version v4.9 by commit 5bc67f587ba7eaa8dd3976bfeff8f2b60718c871. For more details please see the references link. | null | 2021-12-19T23:16:04.378910Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5bc67f587ba7eaa8dd3976bfeff8f2b60718c871'} |
Linux | GSD-2021-1000076 | cifs: Return correct error code from smb2_get_enc_key | cifs: Return correct error code from smb2_get_enc_key
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.3 by commit b399c1a3ea0b9d10047ff266d65533df7f15532f, it was introduced in version v4.11 by commit 61cfac6f267dabcf2740a7ec8a0295833b28b5f5. For more details please see the references link. | null | 2021-12-19T23:56:17.317067Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61cfac6f267dabcf2740a7ec8a0295833b28b5f5'} |
Linux | GSD-2021-1001237 | KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow | KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.54 by commit c1fbdf0f3c26004a2803282fdc1c35086908a99e, it was introduced in version v3.10 by commit 8e591cb7204739efa8e15967ea334eb367039dde. For more details please see the references link. | null | 2021-12-20T01:23:18.164264Z | 2021-08-03T01:45:36.134894Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8e591cb7204739efa8e15967ea334eb367039dde'} |
Linux | GSD-2022-1001848 | power: supply: wm8350-power: Add missing free in free_charger_irq | power: supply: wm8350-power: Add missing free in free_charger_irq
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 4124966fbd95eeecca26d52433f393e2b9649a33, it was introduced in version v2.6.29 by commit 14431aa0c5a443d13d24e6f865a8838f97dab973. For more details please see the references link. | null | 2022-04-25T03:56:14.780279Z | 2022-04-24T21:47:51.282674Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/14431aa0c5a443d13d24e6f865a8838f97dab973'} |
Linux | GSD-2021-1001667 | bpf: Add oversize check before call kvcalloc() | bpf: Add oversize check before call kvcalloc()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.70 by commit 6345a0bee80139ea00a341c4202ebfd1534b5eb0. For more details please see the references link. | null | 2021-12-20T00:38:37.385846Z | 2021-10-19T16:30:50.650090Z | null | null | null | null | null |
Linux | GSD-2021-1000975 | batman-adv: Avoid WARN_ON timing related checks | batman-adv: Avoid WARN_ON timing related checks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.46 by commit 282baa8104af44e04c4af3e7f933b44267c7f86f, it was introduced in version v3.14 by commit ef0a937f7a1450d3a133ccd83c9c7d07587e7a00. For more details please see the references link. | null | 2021-12-20T00:01:14.338713Z | 2021-06-30T00:30:20.207689Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef0a937f7a1450d3a133ccd83c9c7d07587e7a00'} |
Linux | GSD-2022-1002337 | ntfs: add sanity check on allocation size | ntfs: add sanity check on allocation size
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 07793d2e55563124108762f4e5f811db92ffe02f. For more details please see the references link. | null | 2022-04-25T04:39:42.788794Z | 2022-04-24T22:35:36.908998Z | null | null | null | null | null |
Linux | GSD-2021-1001688 | drm/nouveau/kms/nv50-: fix file release memory leak | drm/nouveau/kms/nv50-: fix file release memory leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.12 by commit 0b4e9fc14973a94ac0520f19b3633493ae13c912, it was introduced in version v5.9 by commit 12885ecbfe62df4358d452080d3b8feef54ec8cb. For more details please see the references link. | null | 2021-12-20T01:03:39.147043Z | 2021-10-19T16:31:55.178060Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/12885ecbfe62df4358d452080d3b8feef54ec8cb'} |
Linux | GSD-2021-1001372 | watchdog: Fix possible use-after-free by calling del_timer_sync() | watchdog: Fix possible use-after-free by calling del_timer_sync()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.198 by commit ecd620e0fb1ff7f78fdb593379b2e6938c99707a. For more details please see the references link. | null | 2021-12-20T01:31:34.434801Z | 2021-08-03T02:21:45.392176Z | null | null | null | null | null |
Linux | GSD-2022-1002272 | mm: invalidate hwpoison page cache page in fault path | mm: invalidate hwpoison page cache page in fault path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit d1313f5e8fe50ce84ec3eac162873ee028a30631. For more details please see the references link. | null | 2022-04-25T03:12:14.300627Z | 2022-04-24T22:28:46.426556Z | null | null | null | null | null |
Linux | GSD-2021-1001722 | mac80211-hwsim: fix late beacon hrtimer handling | mac80211-hwsim: fix late beacon hrtimer handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit ed2adf69e29848d1eb9df99633dde655421c92ed, it was introduced in version v3.9 by commit 01e59e467ecf976c782eecd4dc99644802cc60e2. For more details please see the references link. | null | 2021-12-20T00:14:23.862065Z | 2021-10-19T16:33:31.844023Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/01e59e467ecf976c782eecd4dc99644802cc60e2'} |
Linux | GSD-2021-1000830 | ftrace: Do not blindly read the ip address in ftrace_bug() | ftrace: Do not blindly read the ip address in ftrace_bug()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.273 by commit 0bc62e398bbd9e600959e610def5109957437b28, it was introduced in version v2.6.28 by commit 05736a427f7e16be948ccbf39782bd3a6ae16b14. For more details please see the references link. | null | 2021-12-20T00:00:58.474448Z | 2021-06-30T00:00:01.950763Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/05736a427f7e16be948ccbf39782bd3a6ae16b14'} |
Linux | GSD-2021-1000099 | media: staging/intel-ipu3: Fix memory leak in imu_fmt | media: staging/intel-ipu3: Fix memory leak in imu_fmt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.20 by commit 14d0e99c3ef6b0648535a31bf2eaabb4eff97b9e, it was introduced in version v5.2 by commit 6d5f26f2e045f2377b524516194657c00efbbce8. For more details please see the references link. | null | 2021-12-20T00:20:02.910853Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6d5f26f2e045f2377b524516194657c00efbbce8'} |
Linux | GSD-2021-1000563 | net: usb: fix memory leak in smsc75xx_bind | net: usb: fix memory leak in smsc75xx_bind
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit 70c886ac93f87ae7214a0c69151a28a8075dd95b, it was introduced in version v2.6.34 by commit d0cad871703b898a442e4049c532ec39168e5b57. For more details please see the references link. | null | 2021-12-19T23:18:57.205684Z | 2021-06-04T19:39:30.573056Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0cad871703b898a442e4049c532ec39168e5b57'} |
Linux | GSD-2021-1000133 | tracing: Restructure trace_clock_global() to never block | tracing: Restructure trace_clock_global() to never block
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.36 by commit a33614d52e97fc8077eb0b292189ca7d964cc534, it was introduced in version v5.10 by commit b02414c8f045ab3b9afc816c3735bc98c5c3d262. For more details please see the references link. | null | 2021-12-19T22:39:59.358904Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b02414c8f045ab3b9afc816c3735bc98c5c3d262'} |
Linux | GSD-2022-1000998 | drm/panel: ili9341: fix optional regulator handling | drm/panel: ili9341: fix optional regulator handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 4ea189854b1e625ed5ec80d30147870f984db44c, it was introduced in version v5.15 by commit 5a04227326b04c15b015181772f5c853172fdb68. For more details please see the references link. | null | 2022-04-25T03:54:21.992121Z | 2022-04-24T20:38:24.161095Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5a04227326b04c15b015181772f5c853172fdb68'} |
Linux | GSD-2021-1002620 | nfc: fix segfault in nfc_genl_dump_devices_done | nfc: fix segfault in nfc_genl_dump_devices_done
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.294 by commit 214af18abbe39db05beb305b2d11e87d09a6529c. For more details please see the references link. | null | 2022-01-11T05:53:46.050775Z | 2021-12-27T05:27:32.026523Z | null | null | null | null | null |
Linux | GSD-2022-1001370 | x86: Annotate call_on_stack() | x86: Annotate call_on_stack()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit d3af356af6909c0f0156c5b6093752d0570feb24. For more details please see the references link. | null | 2022-04-25T06:42:01.885836Z | 2022-04-24T21:08:34.968330Z | null | null | null | null | null |
Linux | GSD-2021-1002270 | ASoC: SOF: Intel: hda-dai: fix potential locking issue | ASoC: SOF: Intel: hda-dai: fix potential locking issue
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.162 by commit e5f8c43c854656897def0161ea09fc29bde33a79. For more details please see the references link. | null | 2021-12-20T01:01:28.167675Z | 2021-11-29T02:36:17.247874Z | null | null | null | null | null |
Linux | GSD-2022-1000832 | bpf, sockmap: Do not ignore orig_len parameter | bpf, sockmap: Do not ignore orig_len parameter
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.104 by commit 24efaae03b0d093a40e91dce2b820bab03664bca, it was introduced in version v5.10 by commit ef5659280eb13e8ac31c296f58cfdfa1684ac06b. For more details please see the references link. | null | 2022-03-18T03:00:07.733772Z | 2022-03-18T00:22:32.501989Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef5659280eb13e8ac31c296f58cfdfa1684ac06b'} |
Linux | GSD-2022-1001720 | scsi: hisi_sas: Free irq vectors in order for v3 HW | scsi: hisi_sas: Free irq vectors in order for v3 HW
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit f05a0d8de2ea49af36821a20b0b501e20ced937e. For more details please see the references link. | null | 2022-04-25T06:14:18.932581Z | 2022-04-24T21:37:36.620891Z | null | null | null | null | null |
Linux | GSD-2022-1000561 | mtd: parsers: qcom: Fix missing free for pparts in cleanup | mtd: parsers: qcom: Fix missing free for pparts in cleanup
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit 1b37889f9a151d26a3fb0d3870f6e1046dee2e24, it was introduced in version v5.14 by commit 10f3b4d79958d6f9f71588c6fa862159c83fa80f. For more details please see the references link. | null | 2022-03-07T01:43:39.969285Z | 2022-02-27T03:24:08.183281Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/10f3b4d79958d6f9f71588c6fa862159c83fa80f'} |
Linux | GSD-2022-1000131 | ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback | ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.228 by commit 0ea863e2c9459ce62608a9ff28f8fec1380cfb6e, it was introduced in version v4.19.162 by commit 39553ecdea4743da7b6ce9096ae0a831fe881f75. For more details please see the references link. | null | 2022-02-19T09:27:42.630321Z | 2022-02-18T21:44:35.607103Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/39553ecdea4743da7b6ce9096ae0a831fe881f75'} |
Linux | GSD-2022-1000424 | misc: fastrpc: avoid double fput() on failed usercopy | misc: fastrpc: avoid double fput() on failed usercopy
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit e4382d0a39f9a1e260d62fdc079ddae5293c037d, it was introduced in version v5.1 by commit 6cffd79504ce040f460831030d3069fa1c99bb71. For more details please see the references link. | null | 2022-03-07T01:35:57.914881Z | 2022-02-27T03:04:58.036079Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6cffd79504ce040f460831030d3069fa1c99bb71'} |
Linux | GSD-2022-1002419 | ARM: mmp: Fix failure to remove sram device | ARM: mmp: Fix failure to remove sram device
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 82d919fbdea37f2281457c97fde5a56ed6265e61. For more details please see the references link. | null | 2022-04-25T05:29:10.983017Z | 2022-04-24T22:45:12.765038Z | null | null | null | null | null |
Linux | GSD-2021-1001149 | scsi: libfc: Fix array index out of bound exception | scsi: libfc: Fix array index out of bound exception
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.5 by commit 8511293e643a18b248510ae5734e4f360754348c. For more details please see the references link. | null | 2021-12-19T23:35:02.398885Z | 2021-08-03T01:30:38.212092Z | null | null | null | null | null |
Linux | GSD-2022-1002049 | f2fs: fix to do sanity check on curseg->alloc_type | f2fs: fix to do sanity check on curseg->alloc_type
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 498b7088db71f9707359448cd6800bbb1882f4c3. For more details please see the references link. | null | 2022-04-25T05:55:04.420077Z | 2022-04-24T22:05:51.056226Z | null | null | null | null | null |
Linux | GSD-2021-1001519 | staging: greybus: uart: fix tty use after free | staging: greybus: uart: fix tty use after free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.285 by commit 92b67aaafb7c449db9f0c3dcabc0ff967cb3a42d, it was introduced in version v4.9 by commit a18e15175708d39abbe9746ddc3479466b7800c3. For more details please see the references link. | null | 2021-12-20T00:33:54.230354Z | 2021-10-19T16:21:53.573036Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a18e15175708d39abbe9746ddc3479466b7800c3'} |
Linux | GSD-2022-1001235 | bpf: Fix a btf decl_tag bug when tagging a function | bpf: Fix a btf decl_tag bug when tagging a function
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 796d5666f6422ddadc938fb888044fcc16f2dbe3, it was introduced in version v5.16 by commit b5ea834dde6b6e7f75e51d5f66dac8cd7c97b5ef. For more details please see the references link. | null | 2022-04-25T03:50:40.810422Z | 2022-04-24T20:56:30.511187Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b5ea834dde6b6e7f75e51d5f66dac8cd7c97b5ef'} |
Linux | GSD-2021-1002765 | ovl: fix warning in ovl_create_real() | ovl: fix warning in ovl_create_real()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit d2ccdd4e4efab06178608a34d7bfb20a54104c02. For more details please see the references link. | null | 2022-01-11T05:50:56.554065Z | 2021-12-27T05:49:36.930862Z | null | null | null | null | null |
Linux | GSD-2021-1000758 | x86/kvm: Teardown PV features on boot CPU as well | x86/kvm: Teardown PV features on boot CPU as well
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.125 by commit 7620a669111b52f224d006dea9e1e688e2d62c54, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T22:54:02.417577Z | 2021-06-25T00:02:52.965737Z | null | null | null | null | null |
Linux | GSD-2022-1000977 | cifs: potential buffer overflow in handling symlinks | cifs: potential buffer overflow in handling symlinks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.4 by commit 515e7ba11ef043d6febe69389949c8ef5f25e9d0, it was introduced in version v2.6.37 by commit c69c1b6eaea1b3e1eecf7ad2fba0208ac4a11131. For more details please see the references link. | null | 2022-04-25T05:12:48.061984Z | 2022-04-24T20:36:28.848773Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c69c1b6eaea1b3e1eecf7ad2fba0208ac4a11131'} |
Linux | GSD-2022-1001665 | SUNRPC: Fix the svc_deferred_event trace class | SUNRPC: Fix the svc_deferred_event trace class
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.35 by commit 726ae7300fcc25fefa46d188cc07eb16dc908f9e, it was introduced in version v4.17 by commit ece200ddd54b9ce840cfee554fb812560c545c7d. For more details please see the references link. | null | 2022-04-25T04:26:30.852593Z | 2022-04-24T21:33:13.662975Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ece200ddd54b9ce840cfee554fb812560c545c7d'} |
Linux | GSD-2021-1002335 | scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs() | scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit 66523553fa62c7878fc5441dc4e82be71934eb77. For more details please see the references link. | null | 2021-12-20T00:15:59.623315Z | 2021-11-29T02:39:14.171196Z | null | null | null | null | null |
Linux | GSD-2021-1000308 | iio: sx9310: Fix access to variable DT array | iio: sx9310: Fix access to variable DT array
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 99f8854ad3dadda15fd46deca57fc9205f888980, it was introduced in version v5.11 by commit 5b19ca2c78a0838976064c0347e46a2c859b541d. For more details please see the references link. | null | 2021-12-20T01:09:47.273659Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5b19ca2c78a0838976064c0347e46a2c859b541d'} |
Linux | GSD-2022-1002360 | ASoC: mxs: Fix error handling in mxs_sgtl5000_probe | ASoC: mxs: Fix error handling in mxs_sgtl5000_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit f8d38056bcd220ea6f0802a5586d1a12ebcce849, it was introduced in version v3.5 by commit e968194b45c4e8077dada75c5bae5660b37628fe. For more details please see the references link. | null | 2022-04-25T03:34:36.654843Z | 2022-04-24T22:38:34.580360Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e968194b45c4e8077dada75c5bae5660b37628fe'} |
Linux | GSD-2021-1001630 | bpf: Fix integer overflow in prealloc_elems_and_freelist() | bpf: Fix integer overflow in prealloc_elems_and_freelist()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.73 by commit 064faa8e8a9b50f5010c5aa5740e06d477677a89, it was introduced in version v4.6 by commit 557c0c6e7df8e14a46bd7560d193fa5bbc00a858. For more details please see the references link. | null | 2021-12-20T00:03:51.005136Z | 2021-10-19T16:29:02.941826Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/557c0c6e7df8e14a46bd7560d193fa5bbc00a858'} |
Linux | GSD-2021-1000922 | net: usb: fix possible use-after-free in smsc75xx_bind | net: usb: fix possible use-after-free in smsc75xx_bind
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.128 by commit 4252bf6c2b245f47011098113d405ffad6ad5d5b, it was introduced in version v5.4.124 by commit b95fb96e6339e34694dd578fb6bde3575b01af17. For more details please see the references link. | null | 2021-12-19T23:34:35.520284Z | 2021-06-30T00:24:42.355002Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b95fb96e6339e34694dd578fb6bde3575b01af17'} |
Linux | GSD-2021-1000888 | wq: handle VM suspension in stall detection | wq: handle VM suspension in stall detection
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.126 by commit f9e7a38d148eb660dbcfad40bfb60dcc16997b15. For more details please see the references link. | null | 2021-12-19T22:55:20.282346Z | 2021-06-30T00:04:35.318340Z | null | null | null | null | null |
Linux | GSD-2021-1001260 | net: qcom/emac: fix UAF in emac_remove | net: qcom/emac: fix UAF in emac_remove
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.53 by commit b560521eca03d0a2db6093a5a632cbdd0a0cf833, it was introduced in version v4.9 by commit 54e19bc74f3380d414681762ceed9f7245bc6a6e. For more details please see the references link. | null | 2021-12-19T23:19:50.538496Z | 2021-08-03T01:50:53.917185Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/54e19bc74f3380d414681762ceed9f7245bc6a6e'} |
Linux | GSD-2021-1000021 | bpf: Use correct permission flag for mixed signed bounds arithmetic | bpf: Use correct permission flag for mixed signed bounds arithmetic
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.32 by commit 4f3ff11204eac0ee23acf64deecb3bad7b0db0c6, it was introduced in version v5.8 by commit 2c78ee898d8f10ae6fb2fa23a3fbaec96b1b7366. For more details please see the references link. | null | 2021-12-20T01:20:41.627881Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c78ee898d8f10ae6fb2fa23a3fbaec96b1b7366'} |
Linux | GSD-2021-1000471 | powerpc: Fix HAVE_HARDLOCKUP_DETECTOR_ARCH build configuration | powerpc: Fix HAVE_HARDLOCKUP_DETECTOR_ARCH build configuration
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.233 by commit a09398b7e39daec6d10fc3c658459ae09a60599f, it was introduced in version v4.13 by commit 2104180a53698df5aec35aed5f840a26ade0551d. For more details please see the references link. | null | 2021-12-20T00:07:59.874841Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2104180a53698df5aec35aed5f840a26ade0551d'} |
Linux | GSD-2021-1000164 | netfilter: conntrack: Make global sysctls readonly in non-init netns | netfilter: conntrack: Make global sysctls readonly in non-init netns
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.35 by commit d3598eb3915cc0c0d8cab42f4a6258ff44c4033e, it was introduced in version v5.7 by commit d0febd81ae77a0e13717f1412ff9589e43fc4f8b. For more details please see the references link. | null | 2021-12-20T00:52:40.659038Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0febd81ae77a0e13717f1412ff9589e43fc4f8b'} |
Linux | GSD-2021-1002159 | drm/msm: Fix null pointer dereference on pointer edp | drm/msm: Fix null pointer dereference on pointer edp
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 2133c4fc8e1348dcb752f267a143fe2254613b34, it was introduced in version v4.0 by commit ab5b0107ccf3821a6837b0f2819270d6fa0b278f. For more details please see the references link. | null | 2021-12-20T01:37:32.199130Z | 2021-11-14T15:22:36.542077Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab5b0107ccf3821a6837b0f2819270d6fa0b278f'} |
Linux | GSD-2022-1001409 | drm/bridge: Add missing pm_runtime_put_sync | drm/bridge: Add missing pm_runtime_put_sync
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 792533e54cd6e89191798ccd1abd590c62b9077e. For more details please see the references link. | null | 2022-04-25T06:20:46.501527Z | 2022-04-24T21:10:55.103111Z | null | null | null | null | null |
Linux | GSD-2021-1000534 | drm/amdgpu: Fix a use-after-free | drm/amdgpu: Fix a use-after-free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit d4ea141fd4b40636a8326df5a377d9c5cf9b3faa, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T00:51:28.671242Z | 2021-06-04T19:34:51.155631Z | null | null | null | null | null |
Linux | GSD-2021-1002509 | devlink: fix netns refcount leak in devlink_nl_cmd_reload() | devlink: fix netns refcount leak in devlink_nl_cmd_reload()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.85 by commit 4b7e90672af8e0c78205db006f1b0a20ebd07f5f, it was introduced in version v5.10 by commit ccdf07219da6bd1f43c6ddcde4c0e36993c7365a. For more details please see the references link. | null | 2021-12-19T22:26:18.657356Z | 2021-12-19T19:40:30.771796Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ccdf07219da6bd1f43c6ddcde4c0e36993c7365a'} |
Linux | GSD-2022-1001059 | ath11k: Fix frames flush failure caused by deadlock | ath11k: Fix frames flush failure caused by deadlock
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 33e723dc054edfc94da90eecca3b72cb424ce4a3. For more details please see the references link. | null | 2022-04-25T05:04:00.327058Z | 2022-04-24T20:42:53.928563Z | null | null | null | null | null |
Linux | GSD-2021-1001775 | NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() | NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.290 by commit 429054ec51e648d241a7e0b465cf44f6633334c5, it was introduced in version v3.13 by commit 1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8. For more details please see the references link. | null | 2021-12-19T22:24:24.844543Z | 2021-10-28T13:48:17.874610Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8'} |
Linux | GSD-2021-1000867 | net/nfc/rawsock.c: fix a permission check bug | net/nfc/rawsock.c: fix a permission check bug
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.195 by commit ec72482564ff99c6832d33610d9f8ab7ecc81b6d. For more details please see the references link. | null | 2021-12-20T01:13:16.747724Z | 2021-06-30T00:02:27.310482Z | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.