ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2022-1001599 | PM: domains: Fix sleep-in-atomic bug caused by genpd_debug_remove() | PM: domains: Fix sleep-in-atomic bug caused by genpd_debug_remove()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit d1b6840d8fb9b35193d45d8fe6b4d830bfd20c3c, it was introduced in version v5.11 by commit 718072ceb211833f3c71724f49d733d636067191. For more details please see the references link. | null | 2022-04-25T03:23:22.465531Z | 2022-04-24T21:27:23.626087Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/718072ceb211833f3c71724f49d733d636067191'} |
Linux | GSD-2022-1001063 | powerpc/set_memory: Avoid spinlock recursion in change_page_attr() | powerpc/set_memory: Avoid spinlock recursion in change_page_attr()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 6ebe5ca2cbe438a688f2ae238ef5a0b0b5f3468a. For more details please see the references link. | null | 2022-04-25T05:09:45.763356Z | 2022-04-24T20:43:05.465403Z | null | null | null | null | null |
Linux | GSD-2022-1000222 | dma-buf: heaps: Fix potential spectre v1 gadget | dma-buf: heaps: Fix potential spectre v1 gadget
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.99 by commit 5d40f1bdad3dd1a177f21a90ad4353c1ed40ba3a, it was introduced in version v5.5 by commit a69b0e855d3fd278ff6f09a23e1edf929538e304. For more details please see the references link. | null | 2022-02-20T01:57:47.432813Z | 2022-02-18T21:57:15.558172Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a69b0e855d3fd278ff6f09a23e1edf929538e304'} |
Linux | GSD-2022-1000388 | net: ieee802154: at86rf230: Stop leaking skb's | net: ieee802154: at86rf230: Stop leaking skb's
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.102 by commit 0fd484644c68897c490a3307bfcc8bf767df5a43. For more details please see the references link. | null | 2022-03-07T01:34:14.690205Z | 2022-02-27T03:00:12.789528Z | null | null | null | null | null |
Linux | GSD-2022-1001960 | net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link | net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.112 by commit 08d5e3e954537931c8da7428034808d202e98299, it was introduced in version v4.8 by commit fb3bbdb859891e6bc27fd1afb3a07319f82c2ee4. For more details please see the references link. | null | 2022-04-25T03:10:55.065822Z | 2022-04-24T21:58:28.767750Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb3bbdb859891e6bc27fd1afb3a07319f82c2ee4'} |
Linux | GSD-2022-1000672 | net/smc: Forward wakeup to smc socket waitqueue after fallback | net/smc: Forward wakeup to smc socket waitqueue after fallback
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.8 by commit 504078fbe9dd570d685361b57784a6050bc40aaa, it was introduced in version v5.16 by commit 2153bd1e3d3dbf6a3403572084ef6ed31c53c5f0. For more details please see the references link. | null | 2022-03-07T01:51:32.418120Z | 2022-02-27T03:39:19.260435Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2153bd1e3d3dbf6a3403572084ef6ed31c53c5f0'} |
Linux | GSD-2022-1000367 | KVM: eventfd: Fix false positive RCU usage warning | KVM: eventfd: Fix false positive RCU usage warning
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.101 by commit dc129275a7f7076f2773d57061bca45af14396dd. For more details please see the references link. | null | 2022-03-07T01:39:53.709685Z | 2022-02-27T02:57:08.840242Z | null | null | null | null | null |
Linux | GSD-2021-1000918 | net/mlx5e: Fix page reclaim for dead peer hairpin | net/mlx5e: Fix page reclaim for dead peer hairpin
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.128 by commit 4b16118665e94c90a3e84a5190486fd0e4eedd74, it was introduced in version v4.19 by commit 4d8fcf216c90bc25e34ae2200aa8985ee3158898. For more details please see the references link. | null | 2021-12-19T23:34:03.772212Z | 2021-06-30T00:24:27.239968Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4d8fcf216c90bc25e34ae2200aa8985ee3158898'} |
Linux | GSD-2022-1001825 | ax25: Fix refcount leaks caused by ax25_cb_del() | ax25: Fix refcount leaks caused by ax25_cb_del()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.35 by commit 452ae92b99062d2f6a34324eaf705a3b7eac9f8b, it was introduced in version v5.15.35 by commit 9af0fd5c4453a44c692be0cbb3724859b75d739b. For more details please see the references link. | null | 2022-04-24T21:45:31.199204Z | 2022-04-24T21:45:31.199204Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9af0fd5c4453a44c692be0cbb3724859b75d739b'} |
Linux | GSD-2022-1000737 | spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() | spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.12 by commit b9dd08cbebe0c593c49bf86d2012a431494e54cb, it was introduced in version v5.2 by commit 67dca5e580f1e93a66177389981541cac208c817. For more details please see the references link. | null | 2022-03-18T03:00:49.321723Z | 2022-03-18T00:14:05.164973Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/67dca5e580f1e93a66177389981541cac208c817'} |
Linux | GSD-2022-1001576 | soc: qcom: rpmpd: Check for null return of devm_kcalloc | soc: qcom: rpmpd: Check for null return of devm_kcalloc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 84b89fa877ad576e9ee8130f412cfd592f274508, it was introduced in version v5.1 by commit bbe3a66c3f5a65fb3d702351bac2a6033944d389. For more details please see the references link. | null | 2022-04-25T06:09:10.305607Z | 2022-04-24T21:25:28.590216Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bbe3a66c3f5a65fb3d702351bac2a6033944d389'} |
Linux | GSD-2021-1002026 | comedi: vmk80xx: fix transfer-buffer overflows | comedi: vmk80xx: fix transfer-buffer overflows
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.159 by commit 199acd8c110e3ae62833c24f632b0bb1c9f012a9, it was introduced in version v2.6.31 by commit 985cafccbf9b7f862aa1c5ee566801e18b5161fb. For more details please see the references link. | null | 2021-12-20T01:25:48.874045Z | 2021-11-14T15:16:28.930292Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/985cafccbf9b7f862aa1c5ee566801e18b5161fb'} |
Linux | GSD-2022-1001126 | scsi: qla2xxx: Implement ref count for SRB | scsi: qla2xxx: Implement ref count for SRB
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit ceda7f794f3dfe272491e93e3e93049f8be5f07b. For more details please see the references link. | null | 2022-04-25T06:56:40.266031Z | 2022-04-24T20:47:39.494741Z | null | null | null | null | null |
Linux | GSD-2021-1002476 | net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk() | net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.83 by commit c94cbd262b6aa3b54d73a1ed1f9c0d19df57f4ff, it was introduced in version v4.18 by commit cb9d43f6775457cac75544bc4197f26ac2b6f294. For more details please see the references link. | null | 2021-12-20T01:04:30.522195Z | 2021-12-19T19:39:03.870401Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cb9d43f6775457cac75544bc4197f26ac2b6f294'} |
Linux | GSD-2021-1000365 | powerpc: Fix HAVE_HARDLOCKUP_DETECTOR_ARCH build configuration | powerpc: Fix HAVE_HARDLOCKUP_DETECTOR_ARCH build configuration
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 19c990c9fad3eaafbf3d7dbc9c8f62679ab63726, it was introduced in version v4.13 by commit 2104180a53698df5aec35aed5f840a26ade0551d. For more details please see the references link. | null | 2021-12-19T23:36:04.878943Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2104180a53698df5aec35aed5f840a26ade0551d'} |
Linux | GSD-2021-1002358 | net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound | net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.294 by commit ec5bd0aef1cec96830d0c7e06d3597d9e786cc98. For more details please see the references link. | null | 2021-12-19T23:49:29.322108Z | 2021-12-19T19:33:49.779528Z | null | null | null | null | null |
Linux | GSD-2022-1001608 | ALSA: pcm: Fix potential AB/BA lock with buffer_mutex and mmap_lock | ALSA: pcm: Fix potential AB/BA lock with buffer_mutex and mmap_lock
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit abedf0d08c79d76da0d6fa0d5dbbc98871dcbc2e, it was introduced in version v5.16.18 by commit 4d1b0ace2d56dc27cc4921eda7fae57f77f03eb5. For more details please see the references link. | null | 2022-04-25T06:32:58.258215Z | 2022-04-24T21:27:57.564834Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4d1b0ace2d56dc27cc4921eda7fae57f77f03eb5'} |
Linux | GSD-2021-1000735 | btrfs: fixup error handling in fixup_inode_link_counts | btrfs: fixup error handling in fixup_inode_link_counts
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.236 by commit 0c7086ee625e0a12474fc63824a4a8dfab663838, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T01:07:50.937648Z | 2021-06-25T00:00:01.764009Z | null | null | null | null | null |
Linux | GSD-2021-1002708 | btrfs: fix memory leak in __add_inode_ref() | btrfs: fix memory leak in __add_inode_ref()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.88 by commit 005d9292b5b2e71a009f911bd85d755009b37242, it was introduced in version v5.5 by commit d3316c8233bb05e0dd855d30aac347bb8ad76ee4. For more details please see the references link. | null | 2022-01-11T05:47:15.504358Z | 2021-12-27T05:38:18.437987Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d3316c8233bb05e0dd855d30aac347bb8ad76ee4'} |
Linux | GSD-2021-1001827 | net: encx24j600: check error in devm_regmap_init_encx24j600 | net: encx24j600: check error in devm_regmap_init_encx24j600
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.155 by commit 4c2eb80fc90b05559ce6ed1b8dfb2348420b5644, it was introduced in version v4.4 by commit 04fbfce7a222327b97ca165294ef19f0faa45960. For more details please see the references link. | null | 2021-12-20T00:55:44.799116Z | 2021-10-28T13:50:55.877747Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/04fbfce7a222327b97ca165294ef19f0faa45960'} |
Linux | GSD-2022-1001258 | media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED | media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit f66e6fd1488d26229f11d86616de1b658c70fa8a, it was introduced in version v3.7 by commit 8ac456495a33d9466076fea94594181ceefb76d9. For more details please see the references link. | null | 2022-04-25T04:18:27.231148Z | 2022-04-24T20:58:45.882911Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ac456495a33d9466076fea94594181ceefb76d9'} |
Linux | GSD-2021-1001574 | mcb: fix error handling in mcb_alloc_bus() | mcb: fix error handling in mcb_alloc_bus()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.209 by commit 66f74ba9be9daf9c47fface6af3677f602774f6b, it was introduced in version v4.7 by commit 5d9e2ab9fea4cdf0a2522f5cbed2e7fbb220d757. For more details please see the references link. | null | 2021-12-19T22:19:42.642561Z | 2021-10-19T16:24:26.447252Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5d9e2ab9fea4cdf0a2522f5cbed2e7fbb220d757'} |
Linux | GSD-2022-1002024 | ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl | ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 432b057f8e847ae5a2306515606f8d2defaca178, it was introduced in version v4.8 by commit 714fb87e8bc05ff78255afc0dca981e8c5242785. For more details please see the references link. | null | 2022-04-25T03:49:51.441773Z | 2022-04-24T22:03:49.262311Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/714fb87e8bc05ff78255afc0dca981e8c5242785'} |
Linux | GSD-2022-1000019 | usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. | usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.261 by commit 52500239e3f2d6fc77b6f58632a9fb98fe74ac09, it was introduced in version v4.0 by commit 5e33f6fdf735cda1d4580fe6f1878da05718fe73. For more details please see the references link. | null | 2022-01-11T05:53:22.544286Z | 2022-01-10T19:50:25.757831Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5e33f6fdf735cda1d4580fe6f1878da05718fe73'} |
Linux | GSD-2021-1001124 | dmaengine: mediatek: free the proper desc in desc_free handler | dmaengine: mediatek: free the proper desc in desc_free handler
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.47 by commit 63fa5b2d4b55ebf4d12e7b4d536ae3e63117cd1a. For more details please see the references link. | null | 2021-12-19T23:21:04.255866Z | 2021-07-08T01:58:03.848796Z | null | null | null | null | null |
Linux | GSD-2022-1002474 | scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one() | scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit ce430cfad6a5385d5b7f7c1dc3fa50f10abfd41b, it was introduced in version v2.6.23 by commit 45804fbb00eea27bdf4d62751681228a9e2844e9. For more details please see the references link. | null | 2022-04-25T06:10:20.545213Z | 2022-04-24T22:52:21.181006Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/45804fbb00eea27bdf4d62751681228a9e2844e9'} |
Linux | GSD-2022-1000449 | parisc: Fix data TLB miss in sba_unmap_sg | parisc: Fix data TLB miss in sba_unmap_sg
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit 8c8e949ae81e7f5ab58f9f9f8e9b573b93173dd2. For more details please see the references link. | null | 2022-03-07T01:41:05.140050Z | 2022-02-27T03:08:35.405911Z | null | null | null | null | null |
Linux | GSD-2022-1002161 | net: usb: aqc111: Fix out-of-bounds accesses in RX fixup | net: usb: aqc111: Fix out-of-bounds accesses in RX fixup
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.190 by commit 404998a137bcb8a926f7c949030afbe285472593. For more details please see the references link. | null | 2022-04-25T04:26:01.222975Z | 2022-04-24T22:17:11.306067Z | null | null | null | null | null |
Linux | GSD-2021-1001431 | atm: nicstar: Fix possible use-after-free in nicstar_cleanup() | atm: nicstar: Fix possible use-after-free in nicstar_cleanup()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.240 by commit c471569632654e57c83512e0fc1ba0dbb4544ad6. For more details please see the references link. | null | 2021-12-19T23:17:12.533074Z | 2021-08-03T02:38:33.329835Z | null | null | null | null | null |
Linux | GSD-2021-1001061 | netfilter: synproxy: Fix out of bounds when parsing TCP options | netfilter: synproxy: Fix out of bounds when parsing TCP options
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit f648089337cb8ed40b2bb96e244f72b9d97dc96b, it was introduced in version v3.12 by commit 48b1de4c110a7afa4b85862f6c75af817db26fad. For more details please see the references link. | null | 2021-12-19T23:02:43.502549Z | 2021-06-30T00:37:01.905605Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/48b1de4c110a7afa4b85862f6c75af817db26fad'} |
Linux | GSD-2021-1000220 | PCI: endpoint: Fix NULL pointer dereference for ->get_features() | PCI: endpoint: Fix NULL pointer dereference for ->get_features()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.5 by commit 0169d4f0bee44fdfef908c13ed21fcb326c38695, it was introduced in version v5.1 by commit 2c04c5b8eef797dca99699cfb55ff42dd3c12c23. For more details please see the references link. | null | 2021-12-20T00:19:57.317102Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c04c5b8eef797dca99699cfb55ff42dd3c12c23'} |
Linux | GSD-2021-1000670 | btrfs: do not BUG_ON in link_to_fixup_dir | btrfs: do not BUG_ON in link_to_fixup_dir
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.235 by commit 0eaf383c6a4a83c09f60fd07a1bea9f1a9181611, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T22:14:54.301336Z | 2021-06-04T19:58:51.788660Z | null | null | null | null | null |
Linux | GSD-2021-1001962 | net: mdiobus: Fix memory leak in __mdiobus_register | net: mdiobus: Fix memory leak in __mdiobus_register
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.253 by commit 4ec0f9abc512cc02fb04daa89ccf6697e80ab417. For more details please see the references link. | null | 2021-12-19T23:11:18.555079Z | 2021-11-14T15:13:35.963497Z | null | null | null | null | null |
Linux | GSD-2022-1001937 | mac80211: fix potential double free on mesh join | mac80211: fix potential double free on mesh join
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.32 by commit 12e407a8ef17623823fd0c066fbd7f103953d28d, it was introduced in version v5.8 by commit 6a01afcf8468d3ca2bd8bbb27503f60dcf643b20. For more details please see the references link. | null | 2022-04-25T04:59:22.006406Z | 2022-04-24T21:56:25.545896Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6a01afcf8468d3ca2bd8bbb27503f60dcf643b20'} |
Linux | GSD-2022-1000625 | KVM: arm64: pkvm: Use the mm_ops indirection for cache maintenance | KVM: arm64: pkvm: Use the mm_ops indirection for cache maintenance
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.5 by commit 14c9086ea246b84e0d35e8a0b7f706202bd72f0a, it was introduced in version v5.14 by commit 25aa28691bb960a76f0cffd8862144a29487f6ff. For more details please see the references link. | null | 2022-03-07T01:35:24.592070Z | 2022-02-27T03:32:42.562268Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/25aa28691bb960a76f0cffd8862144a29487f6ff'} |
Linux | GSD-2021-1001348 | dm btree remove: assign new_root only when removal succeeds | dm btree remove: assign new_root only when removal succeeds
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.133 by commit 964d57d1962d7e68f0f578f05d9ae4a104d74851. For more details please see the references link. | null | 2021-12-20T00:48:27.226588Z | 2021-08-03T02:14:11.382937Z | null | null | null | null | null |
Linux | GSD-2022-1000275 | net: sched: fix use-after-free in tc_new_tfilter() | net: sched: fix use-after-free in tc_new_tfilter()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.20 by commit f36cacd6c933183c1a8827d5987cf2cfc0a44c76, it was introduced in version v5.1 by commit 470502de5bdb1ed0def643a4458593a40b8f6b66. For more details please see the references link. | null | 2022-02-19T04:03:30.325096Z | 2022-02-18T22:05:03.723568Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/470502de5bdb1ed0def643a4458593a40b8f6b66'} |
Linux | GSD-2022-1002248 | ext2: correct max file size computing | ext2: correct max file size computing
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit cc16d0bc1c695645a5c1426e81d33931cc32f558, it was introduced in version v5.1 by commit 1c2d14212b15a60300a2d4f6364753e87394c521. For more details please see the references link. | null | 2022-04-25T06:48:53.724202Z | 2022-04-24T22:25:55.092610Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c2d14212b15a60300a2d4f6364753e87394c521'} |
Linux | GSD-2021-1002837 | mm/hwpoison: clear MF_COUNT_INCREASED before retrying get_any_page() | mm/hwpoison: clear MF_COUNT_INCREASED before retrying get_any_page()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.12 by commit c691e7575eff76e563b0199c23ec46bd454f43e3, it was introduced in version v5.10 by commit b94e02822debdf0cc473556aad7dcc859f216653. For more details please see the references link. | null | 2022-01-11T05:58:08.802090Z | 2021-12-30T02:45:41.001489Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b94e02822debdf0cc473556aad7dcc859f216653'} |
Linux | GSD-2021-1001718 | net: hns3: do not allow call hns3_nic_net_open repeatedly | net: hns3: do not allow call hns3_nic_net_open repeatedly
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit 3dac38bdce7932901b9f0b71c62331852c809e61, it was introduced in version v5.0 by commit e888402789b9db5de4fcda361331d66dbf0cd9fd. For more details please see the references link. | null | 2021-12-19T22:43:40.170976Z | 2021-10-19T16:33:21.811045Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e888402789b9db5de4fcda361331d66dbf0cd9fd'} |
Linux | GSD-2022-1001034 | NFSv4.2: fix reference count leaks in _nfs42_proc_copy_notify() | NFSv4.2: fix reference count leaks in _nfs42_proc_copy_notify()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit f46f632f9cfae4b2e3635fa58840a8ec584c42e3. For more details please see the references link. | null | 2022-04-25T03:15:38.155817Z | 2022-04-24T20:41:29.379858Z | null | null | null | null | null |
Linux | GSD-2021-1002564 | mt76: mt7915: fix NULL pointer dereference in mt7915_get_phy_mode | mt76: mt7915: fix NULL pointer dereference in mt7915_get_phy_mode
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.7 by commit 14b03b8cebdf18ff13c39d58501b625411314de2, it was introduced in version v5.8 by commit 37f4ca907c462d7c8a1ac9e7e3473681b5f893dd. For more details please see the references link. | null | 2021-12-20T01:18:09.919082Z | 2021-12-19T19:42:57.794546Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/37f4ca907c462d7c8a1ac9e7e3473681b5f893dd'} |
Linux | GSD-2021-1000559 | NFS: Fix an Oopsable condition in __nfs_pageio_add_request() | NFS: Fix an Oopsable condition in __nfs_pageio_add_request()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit 15ac6f14787649e8ebd75c142e2c5d2a243c8490, it was introduced in version v4.0 by commit a7d42ddb3099727f58366fa006f850a219cce6c8. For more details please see the references link. | null | 2021-12-20T01:39:44.846773Z | 2021-06-04T19:38:46.016765Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a7d42ddb3099727f58366fa006f850a219cce6c8'} |
Linux | GSD-2022-1001464 | media: imx-jpeg: Prevent decoding NV12M jpegs into single-planar buffers | media: imx-jpeg: Prevent decoding NV12M jpegs into single-planar buffers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 8d075ede7d24f19dc817c5bd517a53f0524f9031. For more details please see the references link. | null | 2022-04-25T06:11:51.107656Z | 2022-04-24T21:15:06.698890Z | null | null | null | null | null |
Linux | GSD-2021-1002134 | octeontx2-af: Fix possible null pointer dereference. | octeontx2-af: Fix possible null pointer dereference.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.16 by commit f1e3cd1cc80204fd02b9e9843450925a2af90dc0, it was introduced in version v5.5 by commit 8756828a81485f7b28b588adbf0bac9bf6fc6651. For more details please see the references link. | null | 2021-12-19T23:11:19.372238Z | 2021-11-14T15:21:26.967642Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8756828a81485f7b28b588adbf0bac9bf6fc6651'} |
Linux | GSD-2021-1000109 | net/sched: sch_frag: fix stack OOB read while fragmenting IPv4 packets | net/sched: sch_frag: fix stack OOB read while fragmenting IPv4 packets
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.20 by commit 018bb8da5b5888e19585f9b802f036afe643fcef, it was introduced in version v5.11 by commit c129412f74e99b609f0a8e95fc3915af1fd40f34. For more details please see the references link. | null | 2021-12-20T00:43:55.546713Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c129412f74e99b609f0a8e95fc3915af1fd40f34'} |
Linux | GSD-2021-1002421 | xhci: Fix commad ring abort, write all 64 bits to CRCR register. | xhci: Fix commad ring abort, write all 64 bits to CRCR register.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.220 by commit abba418a9c73dcffecbe19ef93c7ae5d2e8e38d3, it was introduced in version v4.19.213 by commit 62c182b5e763e5f4062e72678e72ce3e02dd4d1b. For more details please see the references link. | null | 2021-12-19T23:10:32.198278Z | 2021-12-19T19:36:37.623573Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/62c182b5e763e5f4062e72678e72ce3e02dd4d1b'} |
Linux | GSD-2022-1001171 | net/x25: Fix null-ptr-deref caused by x25_disconnect | net/x25: Fix null-ptr-deref caused by x25_disconnect
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 671529db75e6be777bb1c76aa07c2bdd2992be6d, it was introduced in version v5.7 by commit 4becb7ee5b3d2829ed7b9261a245a77d5b7de902. For more details please see the references link. | null | 2022-04-25T04:21:24.905682Z | 2022-04-24T20:50:20.175873Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4becb7ee5b3d2829ed7b9261a245a77d5b7de902'} |
Linux | GSD-2021-1002071 | media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt() | media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.78 by commit d7fc85f6104259541ec136199d3bf7c8a736613d. For more details please see the references link. | null | 2021-12-19T22:57:31.699778Z | 2021-11-14T15:18:34.093552Z | null | null | null | null | null |
Linux | GSD-2022-1001521 | RDMA/mlx5: Fix memory leak in error flow for subscribe event routine | RDMA/mlx5: Fix memory leak in error flow for subscribe event routine
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit d66498507801fd9a20307a15a0814a0a016c3cde, it was introduced in version v5.3 by commit 7597385371425febdaa8c6a1da3625d4ffff16f5. For more details please see the references link. | null | 2022-04-25T04:03:58.101432Z | 2022-04-24T21:19:47.740473Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7597385371425febdaa8c6a1da3625d4ffff16f5'} |
Linux | GSD-2022-1001872 | ASoC: mediatek: mt8192-mt6359: Fix error handling in mt8192_mt6359_dev_probe | ASoC: mediatek: mt8192-mt6359: Fix error handling in mt8192_mt6359_dev_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 87e04a89c31e792eef62bcba6ebb77fd323d28a1, it was introduced in version v5.15.17 by commit 286c6f7b28fab19d649c2e1f3bc18fdecdbadfe5. For more details please see the references link. | null | 2022-04-25T05:55:42.681753Z | 2022-04-24T21:50:21.836885Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/286c6f7b28fab19d649c2e1f3bc18fdecdbadfe5'} |
Linux | GSD-2022-1000760 | btrfs: do not start relocation until in progress drops are done | btrfs: do not start relocation until in progress drops are done
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.27 by commit 6599d5e8bd758d897fd2ef4dc388ae50278b1f7e. For more details please see the references link. | null | 2022-03-18T02:57:40.833725Z | 2022-03-18T00:15:49.093064Z | null | null | null | null | null |
Linux | GSD-2022-1000330 | nvme-rdma: fix possible use-after-free in transport error_recovery work | nvme-rdma: fix possible use-after-free in transport error_recovery work
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.231 by commit 5593f72d1922403c11749532e3a0aa4cf61414e9. For more details please see the references link. | null | 2022-03-07T02:33:56.278138Z | 2022-02-27T02:52:14.158182Z | null | null | null | null | null |
Linux | GSD-2022-1000347 | vsock: remove vsock from connected table when connect is interrupted by a signal | vsock: remove vsock from connected table when connect is interrupted by a signal
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.181 by commit 5f326fe2aef411a6575628f92bd861463ea91df7, it was introduced in version v3.9 by commit d021c344051af91f42c5ba9fdedc176740cbd238. For more details please see the references link. | null | 2022-03-07T01:35:07.722698Z | 2022-02-27T02:54:10.009821Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d021c344051af91f42c5ba9fdedc176740cbd238'} |
Linux | GSD-2021-1000938 | isdn: mISDN: netjet: Fix crash in nj_probe: | isdn: mISDN: netjet: Fix crash in nj_probe:
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.44 by commit 143fc7220961220eecc04669e5909af8847bf8c8. For more details please see the references link. | null | 2021-12-20T00:53:02.138059Z | 2021-06-30T00:25:44.280046Z | null | null | null | null | null |
Linux | GSD-2022-1001805 | xen: fix is_xen_pmu() | xen: fix is_xen_pmu()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit af884b276b08e2b7e74c2b9208df35f36fa6a54c, it was introduced in version v4.3 by commit bf6dfb154d935725c9a2005033ca33017b9df439. For more details please see the references link. | null | 2022-04-25T05:10:58.534552Z | 2022-04-24T21:43:24.579280Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf6dfb154d935725c9a2005033ca33017b9df439'} |
Linux | GSD-2022-1000717 | cifs: fix double free race when mount fails in cifs_get_root() | cifs: fix double free race when mount fails in cifs_get_root()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.13 by commit 563431c1f3c8f2230e4a9c445fa23758742bc4f0. For more details please see the references link. | null | 2022-03-18T02:57:22.483005Z | 2022-03-18T00:12:00.512181Z | null | null | null | null | null |
Linux | GSD-2021-1000892 | drm: Fix use-after-free read in drm_getunique() | drm: Fix use-after-free read in drm_getunique()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.126 by commit b246b4c70c1250e7814f409b243000f9c0bf79a3. For more details please see the references link. | null | 2021-12-19T22:13:14.420018Z | 2021-06-30T00:04:51.535074Z | null | null | null | null | null |
Linux | GSD-2021-1001780 | ocfs2: fix data corruption after conversion from inline format | ocfs2: fix data corruption after conversion from inline format
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.288 by commit 560edd14de2bf9dbc0129681eeb4d5ef87cc105f, it was introduced in version v4.9.242 by commit acef5107e2eacb08a16ad5db60320d65bd26a6c0. For more details please see the references link. | null | 2021-12-19T23:23:14.209861Z | 2021-10-28T13:48:31.903459Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/acef5107e2eacb08a16ad5db60320d65bd26a6c0'} |
Linux | GSD-2022-1001556 | udmabuf: validate ubuf->pagecount | udmabuf: validate ubuf->pagecount
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit a3728d32fc61eb0fe283cb8ff60b2c8f751e2202, it was introduced in version v4.20 by commit fbb0de795078190a9834b3409e4b009cfb18a6d4. For more details please see the references link. | null | 2022-04-25T05:23:56.489596Z | 2022-04-24T21:23:15.451946Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fbb0de795078190a9834b3409e4b009cfb18a6d4'} |
Linux | GSD-2021-1002006 | ocfs2: mount fails with buffer overflow in strlen | ocfs2: mount fails with buffer overflow in strlen
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.156 by commit d3a83576378b4c904f711598dde2c5e881c4295c. For more details please see the references link. | null | 2021-12-20T00:56:07.980446Z | 2021-11-14T15:15:38.645356Z | null | null | null | null | null |
Linux | GSD-2022-1001106 | rxrpc: fix some null-ptr-deref bugs in server_key.c | rxrpc: fix some null-ptr-deref bugs in server_key.c
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 4e1f670e1b440dc783dbeb881d575bca31474f73, it was introduced in version v5.11 by commit 12da59fcab5a05d01773e7cb413b8b8f3bb4e334. For more details please see the references link. | null | 2022-04-25T06:25:00.999838Z | 2022-04-24T20:45:50.005642Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/12da59fcab5a05d01773e7cb413b8b8f3bb4e334'} |
Linux | GSD-2021-1000191 | drm/i915: Fix crash in auto_retire | drm/i915: Fix crash in auto_retire
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.5 by commit f7520970d5353cb1fa4d9089a1b23669c5da97fe, it was introduced in version v5.8 by commit 229007e02d697b0662f85378aae53531b0dfea05. For more details please see the references link. | null | 2021-12-20T00:44:36.897377Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/229007e02d697b0662f85378aae53531b0dfea05'} |
Linux | GSD-2021-1002456 | nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done | nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.165 by commit 48fcd08fdbe05e35b650a252ec2a2d96057a1c7a, it was introduced in version v3.12 by commit ac22ac466a659f1b2e02a2e2ee23fc5c42da2c95. For more details please see the references link. | null | 2021-12-20T00:20:28.366499Z | 2021-12-19T19:38:09.397415Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac22ac466a659f1b2e02a2e2ee23fc5c42da2c95'} |
Linux | GSD-2021-1002143 | comedi: vmk80xx: fix bulk-buffer overflow | comedi: vmk80xx: fix bulk-buffer overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.18 by commit 7b0e356189327287d0eb98ec081bd6dd97068cd3, it was introduced in version v2.6.31 by commit 985cafccbf9b7f862aa1c5ee566801e18b5161fb. For more details please see the references link. | null | 2021-12-20T00:13:58.671182Z | 2021-11-14T15:21:48.922526Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/985cafccbf9b7f862aa1c5ee566801e18b5161fb'} |
Linux | GSD-2022-1001413 | drm/amdkfd: svm range restore work deadlock when process exit | drm/amdkfd: svm range restore work deadlock when process exit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit a6be83086e91891081e0589e4b4645bf4643e897. For more details please see the references link. | null | 2022-04-25T06:00:25.890381Z | 2022-04-24T21:11:06.603212Z | null | null | null | null | null |
Linux | GSD-2021-1000484 | mtd: require write permissions for locking and badblock ioctls | mtd: require write permissions for locking and badblock ioctls
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.269 by commit 9625b00cac6630479c0ff4b9fafa88bee636e1f0, it was introduced in version v4.9.233 by commit 583d42400532fbd6228b0254d7c732b771e4750d. For more details please see the references link. | null | 2021-12-20T00:36:52.737258Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/583d42400532fbd6228b0254d7c732b771e4750d'} |
Linux | GSD-2021-1002513 | ALSA: pcm: oss: Limit the period size to 16MB | ALSA: pcm: oss: Limit the period size to 16MB
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.85 by commit ad45babf7886e7a212ee1d5eda9ef49f696db43c. For more details please see the references link. | null | 2021-12-19T23:17:05.201226Z | 2021-12-19T19:40:39.758222Z | null | null | null | null | null |
Linux | GSD-2022-1001043 | mt76: fix monitor mode crash with sdio driver | mt76: fix monitor mode crash with sdio driver
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 95e2af01669c7a3cb7a933cefa06361f9db15059. For more details please see the references link. | null | 2022-04-25T06:55:14.248169Z | 2022-04-24T20:41:55.311004Z | null | null | null | null | null |
Linux | GSD-2021-1002840 | mm, hwpoison: fix condition in free hugetlb page path | mm, hwpoison: fix condition in free hugetlb page path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.12 by commit 7a77e22fde6349d276f862a521d190ad932e711d. For more details please see the references link. | null | 2022-01-11T06:02:03.009758Z | 2021-12-30T02:45:47.888657Z | null | null | null | null | null |
Linux | GSD-2022-1000202 | yam: fix a memory leak in yam_siocdevprivate() | yam: fix a memory leak in yam_siocdevprivate()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.96 by commit 729e54636b3ebefb77796702a5b1f1ed5586895e, it was introduced in version v4.19 by commit 0781168e23a2fc8dceb989f11fc5b39b3ccacc35. For more details please see the references link. | null | 2022-02-20T02:11:47.452769Z | 2022-02-18T21:55:00.252490Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0781168e23a2fc8dceb989f11fc5b39b3ccacc35'} |
Linux | GSD-2021-1001295 | powerpc/mm: Fix lockup on kernel exec fault | powerpc/mm: Fix lockup on kernel exec fault
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.51 by commit d2e52d4664097a6c1f591d869ec594bd7a0d4925, it was introduced in version v4.14 by commit d3ca587404b36943b02df87406054ce73cc49500. For more details please see the references link. | null | 2021-12-20T01:14:39.569805Z | 2021-08-03T02:00:01.542746Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d3ca587404b36943b02df87406054ce73cc49500'} |
Linux | GSD-2022-1002395 | btrfs: fix qgroup reserve overflow the qgroup limit | btrfs: fix qgroup reserve overflow the qgroup limit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 0355387ea5b02d353c9415613fab908fac5c52a6. For more details please see the references link. | null | 2022-04-25T06:02:33.385434Z | 2022-04-24T22:42:53.615605Z | null | null | null | null | null |
Linux | GSD-2022-1001940 | uaccess: fix integer overflow on access_ok() | uaccess: fix integer overflow on access_ok()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.32 by commit e65d28d4e9bf90a35ba79c06661a572a38391dec, it was introduced in version v4.20 by commit da551281947cb2c0ab6e0045529a706af5d79584. For more details please see the references link. | null | 2022-04-25T06:32:38.250679Z | 2022-04-24T21:56:37.682700Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/da551281947cb2c0ab6e0045529a706af5d79584'} |
Linux | GSD-2022-1000652 | ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() | ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.8 by commit ef6cd9eeb38062a145802b7b56be7ae1090e165e. For more details please see the references link. | null | 2022-03-07T03:20:32.041909Z | 2022-02-27T03:36:24.484653Z | null | null | null | null | null |
Linux | GSD-2022-1001690 | net: ipv4: fix route with nexthop object delete warning | net: ipv4: fix route with nexthop object delete warning
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 907c97986d6fa77318d17659dd76c94b65dd27c5, it was introduced in version v5.3 by commit 4c7e8084fd467ddb2b0e6c6011f9c1064afb7e56. For more details please see the references link. | null | 2022-04-25T06:42:13.250480Z | 2022-04-24T21:35:34.744441Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4c7e8084fd467ddb2b0e6c6011f9c1064afb7e56'} |
Linux | GSD-2022-1000982 | net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link | net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.4 by commit 6c020f05253df04c3480b586fe188a3582740049, it was introduced in version v4.8 by commit fb3bbdb859891e6bc27fd1afb3a07319f82c2ee4. For more details please see the references link. | null | 2022-04-25T06:07:47.260311Z | 2022-04-24T20:37:03.089248Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb3bbdb859891e6bc27fd1afb3a07319f82c2ee4'} |
Linux | GSD-2021-1000607 | USB: usbfs: Don't WARN about excessively large memory allocations | USB: usbfs: Don't WARN about excessively large memory allocations
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.42 by commit 8d83f109e920d2776991fa142bb904d985dca2ed, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T01:11:25.837858Z | 2021-06-04T19:46:36.385195Z | null | null | null | null | null |
Linux | GSD-2021-1001915 | NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() | NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.290 by commit 429054ec51e648d241a7e0b465cf44f6633334c5, it was introduced in version v3.13 by commit 1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8. For more details please see the references link. | null | 2021-12-20T01:09:52.802638Z | 2021-11-14T15:11:32.583364Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8'} |
Linux | GSD-2021-1000257 | powerpc/64s: Fix pte update for kernel memory on radix | powerpc/64s: Fix pte update for kernel memory on radix
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit e40c52ee67b155ad59f59e73ea136d02685f0e0d, it was introduced in version v4.18 by commit f1cb8f9beba8699dd1b4518418191499e53f7b17. For more details please see the references link. | null | 2021-12-19T23:07:42.430466Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f1cb8f9beba8699dd1b4518418191499e53f7b17'} |
Linux | GSD-2021-1002790 | hamradio: improve the incomplete fix to avoid NPD | hamradio: improve the incomplete fix to avoid NPD
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.223 by commit b68f41c6320b2b7fbb54a95f07a69f3dc7e56c59. For more details please see the references link. | null | 2022-01-11T05:53:54.114067Z | 2021-12-30T02:43:31.857780Z | null | null | null | null | null |
Linux | GSD-2022-1000828 | net/smc: fix connection leak | net/smc: fix connection leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.104 by commit 2e8d465b83db307f04ad265848f8ab3f78f6918f, it was introduced in version v5.3 by commit 39f41f367b08650e9aa314e3a13fb6dda1e9eec7. For more details please see the references link. | null | 2022-03-18T02:54:38.876970Z | 2022-03-18T00:22:00.140659Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/39f41f367b08650e9aa314e3a13fb6dda1e9eec7'} |
Linux | GSD-2022-1000081 | USB: core: Fix hang in usb_kill_urb by adding memory barriers | USB: core: Fix hang in usb_kill_urb by adding memory barriers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.300 by commit b50f5ca60475710bbc9a3af32fbfc17b1e69c2f0. For more details please see the references link. | null | 2022-02-19T10:26:13.320151Z | 2022-02-18T21:33:04.453755Z | null | null | null | null | null |
Linux | GSD-2021-1001016 | dm verity: fix require_signatures module_param permissions | dm verity: fix require_signatures module_param permissions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.11 by commit fb429fad145a987056ac315b2c859197c3daa890. For more details please see the references link. | null | 2021-12-20T00:29:02.324281Z | 2021-06-30T00:34:06.811315Z | null | null | null | null | null |
Linux | GSD-2021-1001446 | virtio-blk: Fix memory leak among suspend/resume procedure | virtio-blk: Fix memory leak among suspend/resume procedure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.276 by commit 102d6bc6475ab09bab579c18704e6cf8d898e93c. For more details please see the references link. | null | 2021-12-19T22:33:50.439266Z | 2021-08-03T02:44:07.087036Z | null | null | null | null | null |
Linux | GSD-2022-1002116 | crypto: ccree - Fix use after free in cc_cipher_exit() | crypto: ccree - Fix use after free in cc_cipher_exit()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit c93017c8d5ebf55a4e453ac7c84cc84cf92ab570, it was introduced in version v4.17 by commit 63ee04c8b491ee148489347e7da9fbfd982ca2bb. For more details please see the references link. | null | 2022-04-25T06:26:55.536795Z | 2022-04-24T22:13:13.255842Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63ee04c8b491ee148489347e7da9fbfd982ca2bb'} |
Linux | GSD-2022-1002403 | drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire() | drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit dd3a74d9e1b7ce143f0aec04da8691a764392f67, it was introduced in version v4.13 by commit 71c37505e7eaa01fa259debad1a71a7ae061039d. For more details please see the references link. | null | 2022-04-25T05:48:25.787102Z | 2022-04-24T22:43:48.301281Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/71c37505e7eaa01fa259debad1a71a7ae061039d'} |
Linux | GSD-2021-1001153 | tcp: fix tcp_init_transfer() to not reset icsk_ca_initialized | tcp: fix tcp_init_transfer() to not reset icsk_ca_initialized
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.5 by commit fe77b85828ca9ddc42977b79de9e40d18545b4fe, it was introduced in version v5.10 by commit 8919a9b31eb4fb4c0a93e5fb350a626924302aa6. For more details please see the references link. | null | 2021-12-19T22:40:43.210710Z | 2021-08-03T01:30:57.038982Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8919a9b31eb4fb4c0a93e5fb350a626924302aa6'} |
Linux | GSD-2022-1002053 | PM: core: keep irq flags in device_pm_check_callbacks() | PM: core: keep irq flags in device_pm_check_callbacks()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit ede1ef1a7de973321699736ef96d01a4b9a6fe9e. For more details please see the references link. | null | 2022-04-25T05:59:38.779858Z | 2022-04-24T22:06:02.670795Z | null | null | null | null | null |
Linux | GSD-2022-1000594 | perf/x86/intel/pt: Fix crash with stop filters in single-range mode | perf/x86/intel/pt: Fix crash with stop filters in single-range mode
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.22 by commit e83d941fd3445f660d2f43647c580a320cc384f6, it was introduced in version v5.5 by commit 670638477aede0d7a355ced04b569214aa3feacd. For more details please see the references link. | null | 2022-03-07T01:44:06.227484Z | 2022-02-27T03:28:34.480687Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/670638477aede0d7a355ced04b569214aa3feacd'} |
Linux | GSD-2021-1001503 | tty: Fix out-of-bound vmalloc access in imageblit | tty: Fix out-of-bound vmalloc access in imageblit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.286 by commit 7e71fcedfda6f7de18f850a6b36e78d78b04476f. For more details please see the references link. | null | 2021-12-20T01:34:35.946250Z | 2021-10-19T16:21:11.587083Z | null | null | null | null | null |
Linux | GSD-2021-1002285 | net/mlx5e: nullify cq->dbg pointer in mlx5_debug_cq_remove() | net/mlx5e: nullify cq->dbg pointer in mlx5_debug_cq_remove()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.82 by commit 471c492890557bd58f73314bb4ad85d5a8fd5026, it was introduced in version v5.10.75 by commit 4f7bddf8c5c01cac74373443b13a68e1c6723a94. For more details please see the references link. | null | 2021-12-19T22:36:09.497630Z | 2021-11-29T02:37:03.092192Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4f7bddf8c5c01cac74373443b13a68e1c6723a94'} |
Linux | GSD-2021-1000742 | nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect | nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.194 by commit 93e4ac2a9979a9a4ecc158409ed9c3044dc0ae1f, it was introduced in version v3.3 by commit d646960f7986fefb460a2b062d5ccc8ccfeacc3a. For more details please see the references link. | null | 2021-12-19T23:13:08.857137Z | 2021-06-25T00:01:50.972170Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d646960f7986fefb460a2b062d5ccc8ccfeacc3a'} |
Linux | GSD-2021-1001850 | dma-debug: fix sg checks in debug_dma_map_sg() | dma-debug: fix sg checks in debug_dma_map_sg()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit 39afed394cc62365d54b02e091668bd68c3a5299, it was introduced in version v2.6.31 by commit 884d05970bfbc3db368f23460dc4ce63257f240d. For more details please see the references link. | null | 2021-12-19T22:43:49.771888Z | 2021-10-28T13:52:07.967464Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/884d05970bfbc3db368f23460dc4ce63257f240d'} |
Linux | GSD-2022-1001385 | netfilter: conntrack: revisit gc autotuning | netfilter: conntrack: revisit gc autotuning
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 7cd361d5e6d986c0d4cafb9ceaa803359048ae15. For more details please see the references link. | null | 2022-04-25T05:23:52.226142Z | 2022-04-24T21:09:32.815579Z | null | null | null | null | null |
Linux | GSD-2021-1000312 | usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4 | usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.38 by commit e5366bea0277425e1868ba20eeb27c879d5a6e2d, it was introduced in version v5.8 by commit 992a60ed0d5e312ce9a485c9e12097ac82ae4b3e. For more details please see the references link. | null | 2021-12-19T23:01:52.684242Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/992a60ed0d5e312ce9a485c9e12097ac82ae4b3e'} |
Linux | GSD-2021-1002401 | nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done | nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.258 by commit 811a7576747760bcaf60502f096d1e6e91d566fa, it was introduced in version v3.12 by commit ac22ac466a659f1b2e02a2e2ee23fc5c42da2c95. For more details please see the references link. | null | 2021-12-19T23:39:44.769847Z | 2021-12-19T19:35:42.083270Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac22ac466a659f1b2e02a2e2ee23fc5c42da2c95'} |
Linux | GSD-2022-1001151 | f2fs: fix to do sanity check on curseg->alloc_type | f2fs: fix to do sanity check on curseg->alloc_type
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit c12765e3f129b144421c80d3383df885f85ee290. For more details please see the references link. | null | 2022-04-25T06:51:34.995647Z | 2022-04-24T20:49:06.407781Z | null | null | null | null | null |
Linux | GSD-2021-1002051 | drm: mxsfb: Fix NULL pointer dereference crash on unload | drm: mxsfb: Fix NULL pointer dereference crash on unload
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit f40c2281d2c0674d32ba732fee45222d76495472, it was introduced in version v5.10 by commit ae1ed0093281939b80664a687689f12436c0e874. For more details please see the references link. | null | 2021-12-19T23:02:08.956831Z | 2021-11-14T15:17:37.259006Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ae1ed0093281939b80664a687689f12436c0e874'} |
Linux | GSD-2022-1001501 | clk: qcom: ipq8074: fix PCI-E clock oops | clk: qcom: ipq8074: fix PCI-E clock oops
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit d02b3d4a8c525068bc5cfb4341e0023d8eb82ace, it was introduced in version v5.9 by commit f0cfcf1ade201dcfd3365f231efc90e846fa46df. For more details please see the references link. | null | 2022-04-25T03:11:26.093488Z | 2022-04-24T21:17:45.550569Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f0cfcf1ade201dcfd3365f231efc90e846fa46df'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.