ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2021-1000596 | spi: spi-fsl-dspi: Fix a resource leak in an error handling path | spi: spi-fsl-dspi: Fix a resource leak in an error handling path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.42 by commit fe6921e3b8451a537e01c031b8212366bb386e3e, it was introduced in version v4.10 by commit 90ba37033cb94207e97c4ced9be575770438213b. For more details please see the references link. | null | 2021-12-19T23:05:07.626237Z | 2021-06-04T19:44:33.067892Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/90ba37033cb94207e97c4ced9be575770438213b'} |
Linux | GSD-2022-1002287 | netfilter: nf_tables: initialize registers in nft_do_chain() | netfilter: nf_tables: initialize registers in nft_do_chain()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.188 by commit 06f0ff82c70241a766a811ae1acf07d6e2734dcb, it was introduced in version v3.13 by commit 96518518cc417bb0a8c80b9fb736202e28acdf96. For more details please see the references link. | null | 2022-04-25T04:44:07.465929Z | 2022-04-24T22:30:29.505189Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/96518518cc417bb0a8c80b9fb736202e28acdf96'} |
Linux | GSD-2022-1001852 | drm/msm/dp: populate connector of struct dp_panel | drm/msm/dp: populate connector of struct dp_panel
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 9525b8bcae8b99188990b56484799cf4b1b43786, it was introduced in version v5.15 by commit 7948fe12d47a946fb8025a0534c900e3dd4b5839. For more details please see the references link. | null | 2022-04-25T05:45:10.080008Z | 2022-04-24T21:48:20.203025Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7948fe12d47a946fb8025a0534c900e3dd4b5839'} |
Linux | GSD-2022-1000740 | netfilter: nf_tables: fix memory leak during stateful obj update | netfilter: nf_tables: fix memory leak during stateful obj update
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.12 by commit 34bb90e407e3288f610558beaae54ecaa32b11c4, it was introduced in version v5.4 by commit d62d0ba97b5803183e70cfded7f7b9da76893bf5. For more details please see the references link. | null | 2022-03-18T03:44:50.640576Z | 2022-03-18T00:14:19.782376Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d62d0ba97b5803183e70cfded7f7b9da76893bf5'} |
Linux | GSD-2022-1000310 | vsock: remove vsock from connected table when connect is interrupted by a signal | vsock: remove vsock from connected table when connect is interrupted by a signal
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.268 by commit e3b3939fd137aab6d00d54bee0ee9244b286a608, it was introduced in version v3.9 by commit d021c344051af91f42c5ba9fdedc176740cbd238. For more details please see the references link. | null | 2022-03-07T01:44:19.395726Z | 2022-02-27T02:49:18.008016Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d021c344051af91f42c5ba9fdedc176740cbd238'} |
Linux | GSD-2021-1001387 | misc/libmasm/module: Fix two use after free in ibmasm_init_one | misc/libmasm/module: Fix two use after free in ibmasm_init_one
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.198 by commit 481a76d4749ee3a27f902ba213fdcbb4bb39720e. For more details please see the references link. | null | 2021-12-19T23:59:36.187301Z | 2021-08-03T02:26:21.655150Z | null | null | null | null | null |
Linux | GSD-2022-1001917 | ALSA: pcm: Fix potential AB/BA lock with buffer_mutex and mmap_lock | ALSA: pcm: Fix potential AB/BA lock with buffer_mutex and mmap_lock
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 7777744e92a0b30e3e0cce2758d911837011ebd9, it was introduced in version v5.15.32 by commit 47711ff10c7e126702cfa725f6d86ef529d15a5f. For more details please see the references link. | null | 2022-04-25T02:54:22.459513Z | 2022-04-24T21:54:19.168666Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/47711ff10c7e126702cfa725f6d86ef529d15a5f'} |
Linux | GSD-2022-1000605 | efi: runtime: avoid EFIv2 runtime services on Apple x86 machines | efi: runtime: avoid EFIv2 runtime services on Apple x86 machines
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.5 by commit a4085859411c825c321c9b55b8a9dc5a128a6684. For more details please see the references link. | null | 2022-03-07T01:54:40.671759Z | 2022-02-27T03:29:48.763335Z | null | null | null | null | null |
Linux | GSD-2021-1000980 | net/mlx5e: Fix page reclaim for dead peer hairpin | net/mlx5e: Fix page reclaim for dead peer hairpin
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.46 by commit be7f3f401d224e1efe8112b2fa8b837eeb8c5e52, it was introduced in version v4.19 by commit 4d8fcf216c90bc25e34ae2200aa8985ee3158898. For more details please see the references link. | null | 2021-12-19T23:24:11.767167Z | 2021-06-30T00:31:07.389357Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4d8fcf216c90bc25e34ae2200aa8985ee3158898'} |
Linux | GSD-2021-1001692 | net/sched: sch_taprio: properly cancel timer from taprio_destroy() | net/sched: sch_taprio: properly cancel timer from taprio_destroy()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.12 by commit 7a1c1af341041221b3acb9d7036cc2b43e0efa75, it was introduced in version v5.11 by commit 44d4775ca51805b376a8db5b34f650434a08e556. For more details please see the references link. | null | 2021-12-20T01:01:55.823572Z | 2021-10-19T16:32:07.673561Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/44d4775ca51805b376a8db5b34f650434a08e556'} |
Linux | GSD-2021-1001368 | KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak | KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.199 by commit 9bafc34dc4ad0cef18727c557f21ed3c3304df50, it was introduced in version v4.18 by commit b3cebfe8c1cadf1817939dcc3688a2504a69c662. For more details please see the references link. | null | 2021-12-20T00:47:42.854406Z | 2021-08-03T02:20:29.738757Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b3cebfe8c1cadf1817939dcc3688a2504a69c662'} |
Linux | GSD-2022-1002268 | brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path | brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit d0ab87f8dcdfe72dc1d763be3392c1fc51a1ace2, it was introduced in version v5.4 by commit 82f93cf46d6007ffa003b2d4a2834563b6b84d21. For more details please see the references link. | null | 2022-04-25T03:33:45.200617Z | 2022-04-24T22:28:31.888588Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/82f93cf46d6007ffa003b2d4a2834563b6b84d21'} |
Linux | GSD-2022-1000255 | rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev | rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.19 by commit 85aba11a8ea92a8eef2de95ebbe063086fd62d9c, it was introduced in version v4.11 by commit c0cdc19f84a4712cf74888f83af286e3c2e14efd. For more details please see the references link. | null | 2022-02-19T03:19:21.634018Z | 2022-02-18T22:01:53.879594Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c0cdc19f84a4712cf74888f83af286e3c2e14efd'} |
Linux | GSD-2021-1002817 | drm/mediatek: hdmi: Perform NULL pointer check for mtk_hdmi_conf | drm/mediatek: hdmi: Perform NULL pointer check for mtk_hdmi_conf
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.12 by commit 71d07ebc5000b9c1d140e99e7493b0bafa954776, it was introduced in version v5.14 by commit 41ca9caaae0bfc959b22dbcd59d88a7107707e17. For more details please see the references link. | null | 2022-01-11T05:47:52.914339Z | 2021-12-30T02:44:44.084729Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41ca9caaae0bfc959b22dbcd59d88a7107707e17'} |
Linux | GSD-2021-1001738 | crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() | crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit e450c422aa233e9f80515f2ee9164e33f158a472, it was introduced in version v4.12 by commit 36cf515b9bbe298e1ce7384620f0d4ec45ad3328. For more details please see the references link. | null | 2021-12-20T00:28:47.993131Z | 2021-10-19T16:34:19.052279Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/36cf515b9bbe298e1ce7384620f0d4ec45ad3328'} |
Linux | GSD-2022-1001014 | rxrpc: fix a race in rxrpc_exit_net() | rxrpc: fix a race in rxrpc_exit_net()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit cd8aef1f30d1215648e4e6686cfb422004851429, it was introduced in version v4.17 by commit ace45bec6d77bc061c3c3d8ad99e298ea9800c2b. For more details please see the references link. | null | 2022-04-25T03:00:59.151406Z | 2022-04-24T20:39:53.519469Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ace45bec6d77bc061c3c3d8ad99e298ea9800c2b'} |
Linux | GSD-2021-1000083 | s390/zcrypt: fix zcard and zqueue hot-unplug memleak | s390/zcrypt: fix zcard and zqueue hot-unplug memleak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.3 by commit 971dc8706cee47393d393905d294ea47e39503d3, it was introduced in version v5.10 by commit 29c2680fd2bf3862ff5cf2957f198512493156f9. For more details please see the references link. | null | 2021-12-20T01:29:52.573546Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/29c2680fd2bf3862ff5cf2957f198512493156f9'} |
Linux | GSD-2021-1000579 | gve: Add NULL pointer checks when freeing irqs. | gve: Add NULL pointer checks when freeing irqs.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.42 by commit da21a35c00ff1a1794d4f166d3b3fa8db4d0f6fb, it was introduced in version v5.3 by commit 893ce44df56580fb878ca5af9c4a5fd87567da50. For more details please see the references link. | null | 2021-12-20T01:33:34.989959Z | 2021-06-04T19:41:56.139326Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/893ce44df56580fb878ca5af9c4a5fd87567da50'} |
Linux | GSD-2021-1002544 | iommu/vt-d: Fix unmap_pages support | iommu/vt-d: Fix unmap_pages support
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.6 by commit 724ee060d0aba28f072fc7357a20366b0a519593, it was introduced in version v5.15 by commit 3f34f125977685e591def32984c77e23a86075b0. For more details please see the references link. | null | 2021-12-20T00:18:21.595656Z | 2021-12-19T19:42:01.692249Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f34f125977685e591def32984c77e23a86075b0'} |
Linux | GSD-2022-1001444 | ubifs: rename_whiteout: Fix double free for whiteout_ui->data | ubifs: rename_whiteout: Fix double free for whiteout_ui->data
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit b9a937f096e608b3368c1abc920d4d640ba2c94f, it was introduced in version v4.9 by commit 9e0a1fff8db56eaaebb74b4a3ef65f86811c4798. For more details please see the references link. | null | 2022-04-25T08:24:16.409764Z | 2022-04-24T21:13:58.504111Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9e0a1fff8db56eaaebb74b4a3ef65f86811c4798'} |
Linux | GSD-2021-1000129 | netfilter: conntrack: Make global sysctls readonly in non-init netns | netfilter: conntrack: Make global sysctls readonly in non-init netns
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.19 by commit fbf85a34ce17c4cf0a37ee253f4c582bbfb8231b, it was introduced in version v5.7 by commit d0febd81ae77a0e13717f1412ff9589e43fc4f8b. For more details please see the references link. | null | 2021-12-20T01:11:01.680303Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0febd81ae77a0e13717f1412ff9589e43fc4f8b'} |
Linux | GSD-2021-1002114 | drm: mxsfb: Fix NULL pointer dereference crash on unload | drm: mxsfb: Fix NULL pointer dereference crash on unload
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit b0e6db0656ddfd8bb57303c2ef61ee1c1cc694a8, it was introduced in version v5.10 by commit ae1ed0093281939b80664a687689f12436c0e874. For more details please see the references link. | null | 2021-12-20T00:11:38.327751Z | 2021-11-14T15:20:28.684491Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ae1ed0093281939b80664a687689f12436c0e874'} |
Linux | GSD-2022-1002141 | f2fs: quota: fix loop condition at f2fs_quota_sync() | f2fs: quota: fix loop condition at f2fs_quota_sync()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit e58ee6bd939b773675240f5d0f5b88a367c037c4, it was introduced in version v5.10.67 by commit 2d586a3f5b7ec2f5a939db4abc9aa053c237545c. For more details please see the references link. | null | 2022-04-25T02:59:25.299639Z | 2022-04-24T22:15:33.686971Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2d586a3f5b7ec2f5a939db4abc9aa053c237545c'} |
Linux | GSD-2022-1000486 | NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes | NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit aa9051ddb4b378bd22e72a67bc77b9fc1482c5f0. For more details please see the references link. | null | 2022-03-07T01:51:10.862323Z | 2022-02-27T03:13:29.317259Z | null | null | null | null | null |
Linux | GSD-2021-1001411 | scsi: libfc: Fix array index out of bound exception | scsi: libfc: Fix array index out of bound exception
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.241 by commit 44651522941c623e20882b3b443f23f77de1ea8b. For more details please see the references link. | null | 2021-12-19T22:50:39.213429Z | 2021-08-03T02:33:01.113194Z | null | null | null | null | null |
Linux | GSD-2022-1002511 | mm/pages_alloc.c: don't create ZONE_MOVABLE beyond the end of a node | mm/pages_alloc.c: don't create ZONE_MOVABLE beyond the end of a node
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit 43397f238aa344b21f101b59e626bb2ddb943f6c, it was introduced in version v2.6.23 by commit 2a1e274acf0b1c192face19a4be7c12d4503eaaf. For more details please see the references link. | null | 2022-04-25T05:06:15.238789Z | 2022-04-24T22:56:32.660033Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2a1e274acf0b1c192face19a4be7c12d4503eaaf'} |
Linux | GSD-2021-1001041 | KVM: x86: Ensure liveliness of nested VM-Enter fail tracepoint message | KVM: x86: Ensure liveliness of nested VM-Enter fail tracepoint message
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.11 by commit 9fb088ce13bc3c59a51260207b487db3e556f275, it was introduced in version v5.4 by commit 380e0055bc7e4a5c687436ba3ccebb4667836b95. For more details please see the references link. | null | 2021-12-19T23:00:17.687426Z | 2021-06-30T00:35:47.741439Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/380e0055bc7e4a5c687436ba3ccebb4667836b95'} |
Linux | GSD-2022-1001297 | ASoC: SOF: Intel: Fix NULL ptr dereference when ENOMEM | ASoC: SOF: Intel: Fix NULL ptr dereference when ENOMEM
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 67f7bd9ff9079c1ee2de58e024fb582905c74c16, it was introduced in version v5.2 by commit d16046ffa6de040bf580a64d5f4d0aa18258a854. For more details please see the references link. | null | 2022-04-25T06:11:21.942947Z | 2022-04-24T21:02:08.753260Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d16046ffa6de040bf580a64d5f4d0aa18258a854'} |
Linux | GSD-2021-1000200 | ACPI: scan: Fix a memory leak in an error handling path | ACPI: scan: Fix a memory leak in an error handling path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.5 by commit a7e17a8d421ae23c920240625b4413c7b94d94a4, it was introduced in version v5.12 by commit eb50aaf960e3bedfef79063411ffd670da94b84b. For more details please see the references link. | null | 2021-12-19T22:24:09.568568Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/eb50aaf960e3bedfef79063411ffd670da94b84b'} |
Linux | GSD-2021-1002397 | can: sja1000: fix use after free in ems_pcmcia_add_card() | can: sja1000: fix use after free in ems_pcmcia_add_card()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.258 by commit c8718026ba287168ff9ad0ccc4f9a413062cba36, it was introduced in version v3.2 by commit fd734c6f25aea4b2b44b045e489aec67b388577e. For more details please see the references link. | null | 2021-12-19T23:02:03.078238Z | 2021-12-19T19:35:32.069461Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fd734c6f25aea4b2b44b045e489aec67b388577e'} |
Linux | GSD-2021-1000650 | drm/amdgpu: Fix a use-after-free | drm/amdgpu: Fix a use-after-free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.193 by commit a849e218556f932576c0fb1c5a88714b61709a17, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T00:35:01.135946Z | 2021-06-04T19:54:49.242824Z | null | null | null | null | null |
Linux | GSD-2021-1001942 | usbnet: sanity check for maxpacket | usbnet: sanity check for maxpacket
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.289 by commit 524f333e98138d909a0a0c574a9ff6737dce2767. For more details please see the references link. | null | 2021-12-20T00:55:51.708908Z | 2021-11-14T15:12:39.547392Z | null | null | null | null | null |
Linux | GSD-2021-1002378 | serial: core: fix transmit-buffer reset and memleak | serial: core: fix transmit-buffer reset and memleak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.292 by commit 011f6c92b5bf6e1fbfdedc8b5232f64c1c493206, it was introduced in version v4.9 by commit 761ed4a94582ab291aa24dcbea4e01e8936488c8. For more details please see the references link. | null | 2021-12-20T01:12:57.022779Z | 2021-12-19T19:34:38.840670Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/761ed4a94582ab291aa24dcbea4e01e8936488c8'} |
Linux | GSD-2021-1000345 | bnxt_en: Fix RX consumer index logic in the error path. | bnxt_en: Fix RX consumer index logic in the error path.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 4fcaad2b7dac3f16704f8118c7e481024ddbd3ed, it was introduced in version v5.1 by commit a1b0e4e684e9c300b9e759b46cb7a0147e61ddff. For more details please see the references link. | null | 2021-12-20T00:19:24.170486Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a1b0e4e684e9c300b9e759b46cb7a0147e61ddff'} |
Linux | GSD-2021-1002682 | ovl: fix warning in ovl_create_real() | ovl: fix warning in ovl_create_real()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.168 by commit f9f300a92297be8250547347fd52216ef0177ae0. For more details please see the references link. | null | 2022-01-11T06:43:35.887292Z | 2021-12-27T05:36:39.065112Z | null | null | null | null | null |
Linux | GSD-2022-1001628 | coresight: syscfg: Fix memleak on registration failure in cscfg_create_device | coresight: syscfg: Fix memleak on registration failure in cscfg_create_device
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit a529af1f5a5c096f3e18f0d5a32cfcc3d82df1ec, it was introduced in version v5.15 by commit 85e2414c518a03a21dddd4bc88fec2723c5e1197. For more details please see the references link. | null | 2022-04-25T05:10:27.267565Z | 2022-04-24T21:29:56.254434Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/85e2414c518a03a21dddd4bc88fec2723c5e1197'} |
Linux | GSD-2022-1001782 | video: fbdev: cirrusfb: check pixclock to avoid divide by zero | video: fbdev: cirrusfb: check pixclock to avoid divide by zero
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 6fe23ff94e7840097202e85c148688940b37c9b1. For more details please see the references link. | null | 2022-04-25T04:28:25.891932Z | 2022-04-24T21:42:06.312906Z | null | null | null | null | null |
Linux | GSD-2022-1000890 | openvswitch: Fix setting ipv6 fields causing hw csum failure | openvswitch: Fix setting ipv6 fields causing hw csum failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.182 by commit d0251c38dff849404ac6bdedba6c1e2f89089b79, it was introduced in version v3.8 by commit 3fdbd1ce11e5c0d7cafbe44c942c5cad61113d7b. For more details please see the references link. | null | 2022-03-18T03:00:48.085845Z | 2022-03-18T00:28:40.566480Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3fdbd1ce11e5c0d7cafbe44c942c5cad61113d7b'} |
Linux | GSD-2021-1002728 | bpf: Fix signed bounds propagation after mov32 | bpf: Fix signed bounds propagation after mov32
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit f77d7a35d4913e4ab27abb36016fbfc1e882a654, it was introduced in version v5.7 by commit 3f50f132d8400e129fc9eb68b5020167ef80a244. For more details please see the references link. | null | 2022-01-11T05:48:47.800004Z | 2021-12-27T05:39:29.828307Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f50f132d8400e129fc9eb68b5020167ef80a244'} |
Linux | GSD-2021-1000715 | ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed | ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.272 by commit e33bafad30d34cfa5e9787cb099cab05e2677fcb, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T23:49:44.884056Z | 2021-06-24T23:58:48.255208Z | null | null | null | null | null |
Linux | GSD-2021-1001807 | NFC: digital: fix possible memory leak in digital_in_send_sdd_req() | NFC: digital: fix possible memory leak in digital_in_send_sdd_req()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.213 by commit 071bdef36391958c89af5fa2172f691b31baa212, it was introduced in version v3.13 by commit 2c66daecc4092e6049673c281b2e6f0d5e59a94c. For more details please see the references link. | null | 2021-12-20T01:28:25.487521Z | 2021-10-28T13:49:56.185339Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c66daecc4092e6049673c281b2e6f0d5e59a94c'} |
Linux | GSD-2022-1001278 | crypto: hisilicon/sec - fix the aead software fallback for engine | crypto: hisilicon/sec - fix the aead software fallback for engine
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 5c1149e2abe0b7489300736b8277b45b113de67f, it was introduced in version v5.14 by commit 6c46a3297beae4ae2d22b26da5e091f058381c7c. For more details please see the references link. | null | 2022-04-25T06:07:06.676463Z | 2022-04-24T21:00:51.564462Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6c46a3297beae4ae2d22b26da5e091f058381c7c'} |
Linux | GSD-2021-1001554 | usb: dwc2: check return value after calling platform_get_resource() | usb: dwc2: check return value after calling platform_get_resource()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.210 by commit a7182993dd8e09f96839ddc3ac54f9b37370d282. For more details please see the references link. | null | 2021-12-19T23:13:51.042988Z | 2021-10-19T16:23:32.594153Z | null | null | null | null | null |
Linux | GSD-2022-1000039 | sctp: use call_rcu to free endpoint | sctp: use call_rcu to free endpoint
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.90 by commit 769d14abd35e0e153b5149c3e1e989a9d719e3ff, it was introduced in version v4.14 by commit d25adbeb0cdb860fb39e09cdd025e9cfc954c5ab. For more details please see the references link. | null | 2022-01-11T05:47:29.864933Z | 2022-01-10T19:51:24.029471Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d25adbeb0cdb860fb39e09cdd025e9cfc954c5ab'} |
Linux | GSD-2022-1002004 | mips: ralink: fix a refcount leak in ill_acc_of_setup() | mips: ralink: fix a refcount leak in ill_acc_of_setup()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit 142ae7d4f21524acfe073e5a3da5667aa85eb970. For more details please see the references link. | null | 2022-04-25T06:04:40.765938Z | 2022-04-24T22:02:28.348054Z | null | null | null | null | null |
Linux | GSD-2022-1000193 | i40e: Fix queues reservation for XDP | i40e: Fix queues reservation for XDP
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.96 by commit 768eb705e6381f0c70ca29d4e66f19790d5d19a1, it was introduced in version v3.12 by commit 41c445ff0f482bb6e6b72dcee9e598e20575f743. For more details please see the references link. | null | 2022-02-19T08:02:51.382326Z | 2022-02-18T21:53:11.160427Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41c445ff0f482bb6e6b72dcee9e598e20575f743'} |
Linux | GSD-2021-1001104 | cfg80211: call cfg80211_leave_ocb when switching away from OCB | cfg80211: call cfg80211_leave_ocb when switching away from OCB
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.238 by commit cb44de1ae03374b9d5c5b87247cef35f0eefdc04. For more details please see the references link. | null | 2021-12-20T00:03:33.416863Z | 2021-07-08T01:56:35.473997Z | null | null | null | null | null |
Linux | GSD-2022-1000469 | net/smc: Avoid overwriting the copies of clcsock callback functions | net/smc: Avoid overwriting the copies of clcsock callback functions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit 7de7ba7a8bd4fde0141de8674c13514d0072f0e6, it was introduced in version v5.15.22 by commit 0ef6049f664941bc0f75828b3a61877635048b27. For more details please see the references link. | null | 2022-03-07T01:43:17.779308Z | 2022-02-27T03:11:34.091259Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0ef6049f664941bc0f75828b3a61877635048b27'} |
Linux | GSD-2022-1002454 | pinctrl: samsung: drop pin banks references on error paths | pinctrl: samsung: drop pin banks references on error paths
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit e4bc03a96374556962a3ba560ca5c9f8c99a72c9, it was introduced in version v3.8 by commit ab663789d69760d2735402f66501f20b60312a3d. For more details please see the references link. | null | 2022-04-25T03:33:29.540569Z | 2022-04-24T22:49:58.254471Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab663789d69760d2735402f66501f20b60312a3d'} |
Linux | GSD-2021-1001391 | udf: Fix NULL pointer dereference in udf_symlink function | udf: Fix NULL pointer dereference in udf_symlink function
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.198 by commit 3638705ecd5ad2785e996f820121c0ad15ce64b5. For more details please see the references link. | null | 2021-12-20T00:08:49.826177Z | 2021-08-03T02:26:51.402692Z | null | null | null | null | null |
Linux | GSD-2022-1000306 | perf: Fix list corruption in perf_cgroup_switch() | perf: Fix list corruption in perf_cgroup_switch()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.267 by commit 5d76ed4223403f90421782adb2f20a9ecbc93186, it was introduced in version v4.11 by commit 058fe1c0440e68a1ba3c2270ae43e9f0298b27d8. For more details please see the references link. | null | 2022-03-07T01:30:13.701182Z | 2022-02-27T02:48:49.919668Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/058fe1c0440e68a1ba3c2270ae43e9f0298b27d8'} |
Linux | GSD-2021-1000979 | udp: fix race between close() and udp_abort() | udp: fix race between close() and udp_abort()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.46 by commit 8729ec8a2238152a4afc212a331a6cd2c61aeeac, it was introduced in version v4.9 by commit 5d77dca82839ef016a93ad7acd7058b14d967752. For more details please see the references link. | null | 2021-12-20T01:37:05.136782Z | 2021-06-30T00:31:03.711286Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5d77dca82839ef016a93ad7acd7058b14d967752'} |
Linux | GSD-2022-1000756 | xen/netfront: react properly to failing gnttab_end_foreign_access_ref() | xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.28 by commit dea18aef2021022a568f4d385a1386f51a9df6ff. For more details please see the references link. | null | 2022-03-18T02:52:50.683253Z | 2022-03-18T00:15:39.759821Z | null | null | null | null | null |
Linux | GSD-2022-1001844 | ath10k: Fix error handling in ath10k_setup_msa_resources | ath10k: Fix error handling in ath10k_setup_msa_resources
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 32939187f254171a5666badc058bc3787fe454af, it was introduced in version v5.8 by commit 727fec790ead3d75e2735f66209949c2163523ea. For more details please see the references link. | null | 2022-04-25T06:25:51.760316Z | 2022-04-24T21:47:20.787961Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/727fec790ead3d75e2735f66209949c2163523ea'} |
Linux | GSD-2022-1002291 | scsi: target: tcmu: Fix possible page UAF | scsi: target: tcmu: Fix possible page UAF
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.239 by commit e3e0e067d5b34e4a68e3cc55f8eebc413f56f8ed. For more details please see the references link. | null | 2022-04-25T06:30:22.786006Z | 2022-04-24T22:30:40.664091Z | null | null | null | null | null |
Linux | GSD-2021-1000580 | net/smc: remove device from smcd_dev_list after failed device_add() | net/smc: remove device from smcd_dev_list after failed device_add()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.42 by commit 8b2cdc004d21a7255f219706dca64411108f7897, it was introduced in version v4.19 by commit c6ba7c9ba43de1b57e9a53946e7ff988554c84ed. For more details please see the references link. | null | 2021-12-19T22:31:13.665751Z | 2021-06-04T19:42:07.528382Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6ba7c9ba43de1b57e9a53946e7ff988554c84ed'} |
Linux | GSD-2022-1001517 | Bluetooth: hci_uart: add missing NULL check in h5_enqueue | Bluetooth: hci_uart: add missing NULL check in h5_enqueue
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit e6b6c904c0f88588b6a3ace20e4c0d61eab124f8, it was introduced in version v5.15 by commit d9dd833cf6d29695682ec7e7924c0d0992b906bc. For more details please see the references link. | null | 2022-04-25T06:18:00.518101Z | 2022-04-24T21:19:22.961450Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9dd833cf6d29695682ec7e7924c0d0992b906bc'} |
Linux | GSD-2021-1002047 | powerpc/idle: Don't corrupt back chain when going idle | powerpc/idle: Don't corrupt back chain when going idle
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit c5c2a80368e97ac179d6a101c99f1e1f36146ec2, it was introduced in version v5.10.76 by commit fbd724c49bead048ae9fc1a5b7bff2fb3e54f855. For more details please see the references link. | null | 2021-11-14T15:17:27.680168Z | 2021-11-14T15:17:27.680168Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fbd724c49bead048ae9fc1a5b7bff2fb3e54f855'} |
Linux | GSD-2022-1001147 | btrfs: make search_csum_tree return 0 if we get -EFBIG | btrfs: make search_csum_tree return 0 if we get -EFBIG
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 93db0c727d2401da13101a075d09bbb75488af09. For more details please see the references link. | null | 2022-04-25T04:49:44.790557Z | 2022-04-24T20:48:54.785074Z | null | null | null | null | null |
Linux | GSD-2021-1002417 | sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl | sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.220 by commit 0769449b0a5eabc3545337217ae690e46673e73a, it was introduced in version v2.6.24 by commit faf0b2e5afe7dae072d2715763c7f992b612b628. For more details please see the references link. | null | 2021-12-19T23:20:21.856102Z | 2021-12-19T19:36:28.252617Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/faf0b2e5afe7dae072d2715763c7f992b612b628'} |
Linux | GSD-2021-1002102 | userfaultfd: fix a race between writeprotect and exit_mmap() | userfaultfd: fix a race between writeprotect and exit_mmap()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit 149958ecd0627a9f1e9c678c25c665400054cd6a, it was introduced in version v5.7 by commit 63b2d4174c4ad1f40b48d7138e71bcb564c1fe03. For more details please see the references link. | null | 2021-12-20T01:20:36.289499Z | 2021-11-14T15:19:58.967643Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63b2d4174c4ad1f40b48d7138e71bcb564c1fe03'} |
Linux | GSD-2022-1001452 | drm/i915: Treat SAGV block time 0 as SAGV disabled | drm/i915: Treat SAGV block time 0 as SAGV disabled
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 1714c5d649ec267b1f98426fe98fa43478b557ff. For more details please see the references link. | null | 2022-04-25T06:32:19.571253Z | 2022-04-24T21:14:26.675620Z | null | null | null | null | null |
Linux | GSD-2021-1002552 | drm/amd/amdgpu: fix potential memleak | drm/amd/amdgpu: fix potential memleak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.7 by commit 75752ada77e0726327adf68018b9f50ae091baeb. For more details please see the references link. | null | 2021-12-19T22:23:16.507914Z | 2021-12-19T19:42:21.925069Z | null | null | null | null | null |
Linux | GSD-2021-1000095 | tracing: Restructure trace_clock_global() to never block | tracing: Restructure trace_clock_global() to never block
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.20 by commit 6e2418576228eeb12e7ba82edb8f9500623942ff, it was introduced in version v5.10 by commit b02414c8f045ab3b9afc816c3735bc98c5c3d262. For more details please see the references link. | null | 2021-12-19T22:46:59.821926Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b02414c8f045ab3b9afc816c3735bc98c5c3d262'} |
Linux | GSD-2022-1001002 | btrfs: fix qgroup reserve overflow the qgroup limit | btrfs: fix qgroup reserve overflow the qgroup limit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 7941b74ed49b6db25efbef2256ebef843c11a010. For more details please see the references link. | null | 2022-04-25T06:09:31.695546Z | 2022-04-24T20:38:45.841090Z | null | null | null | null | null |
Linux | GSD-2021-1002801 | hamradio: improve the incomplete fix to avoid NPD | hamradio: improve the incomplete fix to avoid NPD
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.169 by commit a5c6a13e9056d87805ba3042c208fbd4164ad22b. For more details please see the references link. | null | 2022-01-11T05:53:33.897376Z | 2021-12-30T02:43:58.222220Z | null | null | null | null | null |
Linux | GSD-2022-1000243 | efi: runtime: avoid EFIv2 runtime services on Apple x86 machines | efi: runtime: avoid EFIv2 runtime services on Apple x86 machines
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.19 by commit 3df52448978802ae15dcebf66beba1029df957b4. For more details please see the references link. | null | 2022-02-19T12:54:24.015992Z | 2022-02-18T22:00:29.343790Z | null | null | null | null | null |
Linux | GSD-2021-1001684 | bpf, s390: Fix potential memory leak about jit_data | bpf, s390: Fix potential memory leak about jit_data
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.12 by commit d590a410e472417a22336c7c37685bfb38e801f2, it was introduced in version v5.4 by commit 1c8f9b91c456f5b47a377a0c8c5d4130fc39433a. For more details please see the references link. | null | 2021-12-19T23:18:01.993530Z | 2021-10-19T16:31:43.913028Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c8f9b91c456f5b47a377a0c8c5d4130fc39433a'} |
Linux | GSD-2021-1000996 | can: mcba_usb: fix memory leak in mcba_usb | can: mcba_usb: fix memory leak in mcba_usb
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.46 by commit 6bd3d80d1f019cefa7011056c54b323f1d8b8e83, it was introduced in version v4.12 by commit 51f3baad7de943780ce0c17bd7975df567dd6e14. For more details please see the references link. | null | 2021-12-19T22:42:21.135223Z | 2021-06-30T00:32:07.476756Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/51f3baad7de943780ce0c17bd7975df567dd6e14'} |
Linux | GSD-2022-1000613 | arm64: extable: fix load_unaligned_zeropad() reg indices | arm64: extable: fix load_unaligned_zeropad() reg indices
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.5 by commit 47fe7a1c5e3e011eeb4ab79f2d54a794fdd1c3eb, it was introduced in version v5.16 by commit 753b32368705c396000f95f33c3b7018474e33ad. For more details please see the references link. | null | 2022-03-07T01:44:15.588453Z | 2022-02-27T03:31:21.790788Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/753b32368705c396000f95f33c3b7018474e33ad'} |
Linux | GSD-2022-1001901 | exec: Force single empty string when argv is empty | exec: Force single empty string when argv is empty
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 1290eb4412aa0f0e9f3434b406dc8e255da85f9e. For more details please see the references link. | null | 2022-04-25T04:36:58.641704Z | 2022-04-24T21:53:19.765136Z | null | null | null | null | null |
Linux | GSD-2021-1001954 | NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() | NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.252 by commit b7b023e6ff567e991c31cd425b0e1d16779c938b, it was introduced in version v3.13 by commit 1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8. For more details please see the references link. | null | 2021-12-19T23:18:27.963123Z | 2021-11-14T15:13:16.933616Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8'} |
Linux | GSD-2021-1000646 | bpf: No need to simulate speculative domain for immediates | bpf: No need to simulate speculative domain for immediates
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.123 by commit 3173c7c807854a580c85f04193a6a25aeff3dd96, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T22:09:48.452420Z | 2021-06-04T19:54:00.387396Z | null | null | null | null | null |
Linux | GSD-2021-1002381 | nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done | nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.293 by commit 69bb79a8f5bb9f436b6f1434ca9742591b7bbe18, it was introduced in version v3.12 by commit ac22ac466a659f1b2e02a2e2ee23fc5c42da2c95. For more details please see the references link. | null | 2021-12-19T22:44:56.189540Z | 2021-12-19T19:34:45.829561Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac22ac466a659f1b2e02a2e2ee23fc5c42da2c95'} |
Linux | GSD-2021-1000216 | ceph: fix inode leak on getattr error in __fh_to_dentry | ceph: fix inode leak on getattr error in __fh_to_dentry
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.5 by commit 0a219432127d396120fc88cabd82785e0ff72a2f, it was introduced in version v5.8 by commit 878dabb64117406abd40977b87544d05bb3031fc. For more details please see the references link. | null | 2021-12-19T23:25:11.716015Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/878dabb64117406abd40977b87544d05bb3031fc'} |
Linux | GSD-2022-1001281 | selftests/sgx: Fix NULL-pointer-dereference upon early test failure | selftests/sgx: Fix NULL-pointer-dereference upon early test failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit bc72277b7541756d91c07afee6d768ec97777651, it was introduced in version v5.17 by commit 3200505d4de6436af799d7be743d9dc87450ee5a. For more details please see the references link. | null | 2022-04-25T04:56:59.453647Z | 2022-04-24T21:01:01.113229Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3200505d4de6436af799d7be743d9dc87450ee5a'} |
Linux | GSD-2022-1000869 | xen/netfront: react properly to failing gnttab_end_foreign_access_ref() | xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.184 by commit 0e35f3ab69bcb01fdbf5aadc78f1731778963b1c. For more details please see the references link. | null | 2022-03-18T02:55:55.413205Z | 2022-03-18T00:26:09.863221Z | null | null | null | null | null |
Linux | GSD-2021-1001057 | netfilter: nf_tables: initialize set before expression setup | netfilter: nf_tables: initialize set before expression setup
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit a1f6740fa3938baa2a45c3dfc53402b78122a8a8, it was introduced in version v5.7 by commit 65038428b2c6c5be79d3f78a6b79c0cdc3a58a41. For more details please see the references link. | null | 2021-12-20T00:28:55.006495Z | 2021-06-30T00:36:47.533371Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/65038428b2c6c5be79d3f78a6b79c0cdc3a58a41'} |
Linux | GSD-2022-1002507 | media: usb: go7007: s2250-board: fix leak in probe() | media: usb: go7007: s2250-board: fix leak in probe()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit bbdd0e15738336e6b1208304ae98525117877bbd, it was introduced in version v3.10 by commit d3b2ccd9e307eae80b4b4eeb0ede46cb02212df2. For more details please see the references link. | null | 2022-04-25T04:22:55.760200Z | 2022-04-24T22:56:03.662954Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d3b2ccd9e307eae80b4b4eeb0ede46cb02212df2'} |
Linux | GSD-2021-1001407 | net: validate lwtstate->data before returning from skb_tunnel_info() | net: validate lwtstate->data before returning from skb_tunnel_info()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.241 by commit 83bdcfbd968bcc91a0632b7b625e4a9b0cba5e0d, it was introduced in version v4.3 by commit 61adedf3e3f1d3f032c5a6a299978d91eff6d555. For more details please see the references link. | null | 2021-12-19T22:11:14.095306Z | 2021-08-03T02:31:56.815397Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61adedf3e3f1d3f032c5a6a299978d91eff6d555'} |
Linux | GSD-2022-1000490 | drm/vc4: Fix deadlock on DSI device attach error | drm/vc4: Fix deadlock on DSI device attach error
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit dddd832f35096fbc5004e3a7e58fb4d2cefb8deb. For more details please see the references link. | null | 2022-03-07T01:37:42.564001Z | 2022-02-27T03:14:35.959053Z | null | null | null | null | null |
Linux | GSD-2022-1002157 | ipv6: fix panic when forwarding a pkt with no in6 dev | ipv6: fix panic when forwarding a pkt with no in6 dev
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.190 by commit ab2f5afb7af5c68389e8c7dd29e0a98fbeaaa435, it was introduced in version v5.4.136 by commit 7f4848229e91d508102b30396b8a1b710ac23637. For more details please see the references link. | null | 2022-04-25T05:34:26.699881Z | 2022-04-24T22:16:46.270099Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7f4848229e91d508102b30396b8a1b710ac23637'} |
Linux | GSD-2022-1002442 | ASoC: mxs: Fix error handling in mxs_sgtl5000_probe | ASoC: mxs: Fix error handling in mxs_sgtl5000_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 790d2628e3fcc819d8f5572eb5615113fb2e727a, it was introduced in version v3.5 by commit e968194b45c4e8077dada75c5bae5660b37628fe. For more details please see the references link. | null | 2022-04-25T03:00:10.538597Z | 2022-04-24T22:48:08.125781Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e968194b45c4e8077dada75c5bae5660b37628fe'} |
Linux | GSD-2021-1001112 | net: qed: Fix memcpy() overflow of qed_dcbx_params() | net: qed: Fix memcpy() overflow of qed_dcbx_params()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.196 by commit 144ca5c30c7a97d0c37c404c157db1b1358e2fcf. For more details please see the references link. | null | 2021-12-19T22:15:44.459300Z | 2021-07-08T01:57:07.333282Z | null | null | null | null | null |
Linux | GSD-2022-1000185 | tracing/histogram: Fix a potential memory leak for kstrdup() | tracing/histogram: Fix a potential memory leak for kstrdup()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.96 by commit d71b06aa995007eafd247626d0669b9364c42ad7, it was introduced in version v5.6 by commit d380dcde9a07ca5de4805dee11f58a98ec0ad6ff. For more details please see the references link. | null | 2022-02-20T06:17:24.856693Z | 2022-02-18T21:52:17.390894Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d380dcde9a07ca5de4805dee11f58a98ec0ad6ff'} |
Linux | GSD-2022-1002012 | drm/amdgpu: Fix recursive locking warning | drm/amdgpu: Fix recursive locking warning
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit 6694b8643bde4b940f6b410507960793b922a77d. For more details please see the references link. | null | 2022-04-25T06:27:27.232599Z | 2022-04-24T22:02:51.122203Z | null | null | null | null | null |
Linux | GSD-2021-1001542 | irqchip/gic-v3-its: Fix potential VPE leak on error | irqchip/gic-v3-its: Fix potential VPE leak on error
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.249 by commit 7d39992d45acd6f2d6b2f62389c55b61fb3d486b, it was introduced in version v4.14 by commit 7d75bbb4bc1ad90386776459d37e4ddfe605671e. For more details please see the references link. | null | 2021-12-20T00:39:37.391197Z | 2021-10-19T16:22:58.392827Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7d75bbb4bc1ad90386776459d37e4ddfe605671e'} |
Linux | GSD-2021-1001811 | xhci: Fix command ring pointer corruption while aborting a command | xhci: Fix command ring pointer corruption while aborting a command
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.213 by commit 62c182b5e763e5f4062e72678e72ce3e02dd4d1b. For more details please see the references link. | null | 2021-12-19T23:22:16.473810Z | 2021-10-28T13:50:10.002727Z | null | null | null | null | null |
Linux | GSD-2021-1000703 | i2c: i801: Don't generate an interrupt on bus reset | i2c: i801: Don't generate an interrupt on bus reset
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.271 by commit f9469082126cebb7337db3992d143f5e4edfe629, it was introduced in version v3.6 by commit 636752bcb5177a301d0266270661581de8624828. For more details please see the references link. | null | 2021-12-19T22:29:26.769688Z | 2021-06-04T20:05:48.713079Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/636752bcb5177a301d0266270661581de8624828'} |
Linux | GSD-2022-1000886 | configfs: fix a race in configfs_{,un}register_subsystem() | configfs: fix a race in configfs_{,un}register_subsystem()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.182 by commit b7e2b91fcb5c78c414e33dc8d50642e307ca0c5a, it was introduced in version v2.6.16 by commit 7063fbf2261194f72ee75afca67b3b38b554b5fa. For more details please see the references link. | null | 2022-03-18T02:51:31.488139Z | 2022-03-18T00:28:10.786343Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7063fbf2261194f72ee75afca67b3b38b554b5fa'} |
Linux | GSD-2022-1001794 | Revert "Revert "block, bfq: honor already-setup queue merges"" | Revert "Revert "block, bfq: honor already-setup queue merges""
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 65d8a737452e88f251fe5d925371de6d606df613. For more details please see the references link. | null | 2022-04-25T04:34:48.541431Z | 2022-04-24T21:42:41.292975Z | null | null | null | null | null |
Linux | GSD-2021-1002694 | net: netlink: af_netlink: Prevent empty skb by adding a check on len. | net: netlink: af_netlink: Prevent empty skb by adding a check on len.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.87 by commit dadce61247c6230489527cc5e343b6002d1114c5. For more details please see the references link. | null | 2022-01-11T05:49:00.242393Z | 2021-12-27T05:37:09.613896Z | null | null | null | null | null |
Linux | GSD-2021-1000353 | i2c: sprd: fix reference leak when pm_runtime_get_sync fails | i2c: sprd: fix reference leak when pm_runtime_get_sync fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit e547640cee7981fd751d2c9cde3a61bdb678b755, it was introduced in version v4.14 by commit 8b9ec0719834fe66146d138d62ed66cef025c864. For more details please see the references link. | null | 2021-12-19T23:36:42.124585Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8b9ec0719834fe66146d138d62ed66cef025c864'} |
Linux | GSD-2021-1002440 | atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait | atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.164 by commit 89d15a2e40d7edaaa16da2763b349dd7b056cc09. For more details please see the references link. | null | 2021-12-20T00:38:26.071249Z | 2021-12-19T19:37:22.727224Z | null | null | null | null | null |
Linux | GSD-2021-1000187 | net: hso: fix NULL-deref on disconnect regression | net: hso: fix NULL-deref on disconnect regression
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.189 by commit 5c17cfe155d21954b4c7e2a78fa771cebcd86725, it was introduced in version v4.19.187 by commit 92028d7a31e55d53e41cff679156b9432cffcb36. For more details please see the references link. | null | 2021-12-19T23:27:07.730689Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/92028d7a31e55d53e41cff679156b9432cffcb36'} |
Linux | GSD-2022-1001110 | wireguard: socket: ignore v6 endpoints when ipv6 is disabled | wireguard: socket: ignore v6 endpoints when ipv6 is disabled
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit d277108f9ca223ed649d56024cb6728c1cde65fa, it was introduced in version v5.6 by commit e7096c131e5161fa3b8e52a650d7719d2857adfd. For more details please see the references link. | null | 2022-04-25T06:52:30.284538Z | 2022-04-24T20:46:09.242220Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e7096c131e5161fa3b8e52a650d7719d2857adfd'} |
Linux | GSD-2021-1002010 | mm, slub: fix mismatch between reconstructed freelist depth and cnt | mm, slub: fix mismatch between reconstructed freelist depth and cnt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.156 by commit a1ec195a1943c39fffa96e47ab6532d74a9f4c78, it was introduced in version v4.17 by commit c3895391df385c6628638f014c87e16f5e2efd45. For more details please see the references link. | null | 2021-12-19T22:34:48.497451Z | 2021-11-14T15:15:48.420784Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c3895391df385c6628638f014c87e16f5e2efd45'} |
Linux | GSD-2022-1001540 | drm/msm/dp: populate connector of struct dp_panel | drm/msm/dp: populate connector of struct dp_panel
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit fbba600f432a360b42452fee79d1fb35d3aa8aeb, it was introduced in version v5.15 by commit 7948fe12d47a946fb8025a0534c900e3dd4b5839. For more details please see the references link. | null | 2022-04-25T06:01:41.061330Z | 2022-04-24T21:21:42.994620Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7948fe12d47a946fb8025a0534c900e3dd4b5839'} |
Linux | GSD-2021-1001796 | usb: musb: dsps: Fix the probe error path | usb: musb: dsps: Fix the probe error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.252 by commit 5ed60a430fb5f3d93e7fef66264daef466b4d10c, it was introduced in version v4.14.247 by commit 5269937d1483d3159d5b51907346e4f4b13ef079. For more details please see the references link. | null | 2021-12-20T00:58:44.004283Z | 2021-10-28T13:49:17.369106Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5269937d1483d3159d5b51907346e4f4b13ef079'} |
Linux | GSD-2021-1000884 | scsi: core: Fix error handling of scsi_host_alloc() | scsi: core: Fix error handling of scsi_host_alloc()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.195 by commit 2dc85045ae65b9302a1d2e2ddd7ce4c030153a6a. For more details please see the references link. | null | 2021-12-20T00:22:30.938513Z | 2021-06-30T00:03:33.059465Z | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.