ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2022-1000701 | netfilter: nf_queue: fix possible use-after-free | netfilter: nf_queue: fix possible use-after-free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.13 by commit dcc3cb920bf7ba66ac5e9272293a9ba5f80917ee, it was introduced in version v2.6.29 by commit 271b72c7fa82c2c7a795bc16896149933110672d. For more details please see the references link. | null | 2022-03-18T04:53:03.714704Z | 2022-03-18T00:10:56.573422Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/271b72c7fa82c2c7a795bc16896149933110672d'} |
Linux | GSD-2022-1001813 | clk: qcom: clk-rcg2: Update logic to calculate D value for RCG | clk: qcom: clk-rcg2: Update logic to calculate D value for RCG
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 34dca60982e93e69ae442aa2d36ce61c9a3bb563, it was introduced in version v3.16 by commit 99cbd064b059f222c8839ba433a68b2d6ee33066. For more details please see the references link. | null | 2022-04-25T03:56:06.272165Z | 2022-04-24T21:44:17.141649Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/99cbd064b059f222c8839ba433a68b2d6ee33066'} |
Linux | GSD-2022-1000351 | nvme-tcp: fix possible use-after-free in transport error_recovery work | nvme-tcp: fix possible use-after-free in transport error_recovery work
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.181 by commit 61a26ffd5ad3ece456d74c4c79f7b5e3f440a141. For more details please see the references link. | null | 2022-03-07T03:18:49.736570Z | 2022-02-27T02:54:38.880523Z | null | null | null | null | null |
Linux | GSD-2022-1000644 | net: amd-xgbe: Fix skb data length underflow | net: amd-xgbe: Fix skb data length underflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.6 by commit e8f73f620fee5f52653ed2da360121e4446575c5, it was introduced in version v4.11 by commit 622c36f143fc9566ba49d7cec994c2da1182d9e2. For more details please see the references link. | null | 2022-03-07T02:22:17.607805Z | 2022-02-27T03:35:29.390987Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/622c36f143fc9566ba49d7cec994c2da1182d9e2'} |
Linux | GSD-2022-1001956 | drm/amdkfd: Check for potential null return of kmalloc_array() | drm/amdkfd: Check for potential null return of kmalloc_array()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.112 by commit 1d7a5aae884ca727d41c7ed15d4c82fdb67c040c. For more details please see the references link. | null | 2022-04-25T06:17:17.198185Z | 2022-04-24T21:57:52.391750Z | null | null | null | null | null |
Linux | GSD-2022-1002383 | ALSA: pcm: Test for "silence" field in struct "pcm_format_data" | ALSA: pcm: Test for "silence" field in struct "pcm_format_data"
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit c3b2f23bfe5452b00eb1c842bc71098449e4ad9f. For more details please see the references link. | null | 2022-04-25T03:52:17.512759Z | 2022-04-24T22:41:20.427410Z | null | null | null | null | null |
Linux | GSD-2021-1001329 | watchdog: Fix possible use-after-free in wdt_startup() | watchdog: Fix possible use-after-free in wdt_startup()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.134 by commit 146cc288fb80c662c9c35e7bc58325d1ac0a7875. For more details please see the references link. | null | 2021-12-19T23:41:35.100689Z | 2021-08-03T02:10:36.012331Z | null | null | null | null | null |
Linux | GSD-2021-1001283 | f2fs: fix to avoid racing on fsync_entry_slab by multi filesystem instances | f2fs: fix to avoid racing on fsync_entry_slab by multi filesystem instances
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.51 by commit 86786603014e0a22d0d6af8e80ae4b8687927048. For more details please see the references link. | null | 2021-12-19T23:46:08.713660Z | 2021-08-03T01:57:12.460587Z | null | null | null | null | null |
Linux | GSD-2022-1000214 | selinux: fix double free of cond_list on error paths | selinux: fix double free of cond_list on error paths
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.99 by commit f446089a268c8fc6908488e991d28a9b936293db. For more details please see the references link. | null | 2022-02-19T08:09:43.953525Z | 2022-02-18T21:56:21.644904Z | null | null | null | null | null |
Linux | GSD-2022-1002229 | kgdboc: fix return value of __setup handler | kgdboc: fix return value of __setup handler
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 16fe77f86aa58418f20de13d614db88d608537bb, it was introduced in version v4.20 by commit 1bd54d851f50dea6af30c3e6ff4f3e9aab5558f9. For more details please see the references link. | null | 2022-04-25T05:54:52.091171Z | 2022-04-24T22:23:31.892477Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1bd54d851f50dea6af30c3e6ff4f3e9aab5558f9'} |
Linux | GSD-2021-1001779 | can: peak_pci: peak_pci_remove(): fix UAF | can: peak_pci: peak_pci_remove(): fix UAF
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.288 by commit 447d44cd2f67a20b596ede3ca3cd67086dfd9ca9, it was introduced in version v3.4 by commit e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd. For more details please see the references link. | null | 2021-12-20T01:34:03.154606Z | 2021-10-28T13:48:29.239301Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd'} |
Linux | GSD-2022-1001055 | scsi: pm8001: Fix memory leak in pm8001_chip_fw_flash_update_req() | scsi: pm8001: Fix memory leak in pm8001_chip_fw_flash_update_req()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit a25ed5f21f94f9ae4bcc8dd747e978668890c921. For more details please see the references link. | null | 2022-04-25T03:55:36.028079Z | 2022-04-24T20:42:42.460620Z | null | null | null | null | null |
Linux | GSD-2021-1002505 | HID: bigbenff: prevent null pointer dereference | HID: bigbenff: prevent null pointer dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.85 by commit 6272b17001e6fdcf7b4a16206287010a1523fa6e. For more details please see the references link. | null | 2021-12-20T01:22:03.124100Z | 2021-12-19T19:40:21.044637Z | null | null | null | null | null |
Linux | GSD-2021-1000538 | drm/amd/amdgpu: fix refcount leak | drm/amd/amdgpu: fix refcount leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit 95a4ec905e51a30c64cf2d78b04a7acbeae5ca94, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T02:14:46.631223Z | 2021-06-04T19:35:17.621386Z | null | null | null | null | null |
Linux | GSD-2021-1000492 | x86/sev-es: Don't return NULL from sev_es_get_ghcb() | x86/sev-es: Don't return NULL from sev_es_get_ghcb()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.7 by commit efbfc33b0b1c241311553d3c2229974ec1d684e2, it was introduced in version v5.10 by commit 0786138c78e79343c7b015d77507cbf9d5f15d00. For more details please see the references link. | null | 2021-12-19T22:44:06.973826Z | 2021-05-31T23:45:31.507294Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0786138c78e79343c7b015d77507cbf9d5f15d00'} |
Linux | GSD-2022-1001405 | iommu/arm-smmu-v3: fix event handling soft lockup | iommu/arm-smmu-v3: fix event handling soft lockup
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit f42258fddea631bad727b3f4489ceb76a292f4dc. For more details please see the references link. | null | 2022-04-25T05:40:35.143130Z | 2022-04-24T21:10:43.479297Z | null | null | null | null | null |
Linux | GSD-2021-1002155 | NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() | NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 58e7dcc9ca29c14e44267a4d0ea61e3229124907, it was introduced in version v3.13 by commit 1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8. For more details please see the references link. | null | 2021-12-20T01:29:29.543349Z | 2021-11-14T15:22:26.632697Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8'} |
Linux | GSD-2021-1000168 | tracing: Restructure trace_clock_global() to never block | tracing: Restructure trace_clock_global() to never block
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.118 by commit c64da3294a7d59a4bf6874c664c13be892f15f44, it was introduced in version v5.4.76 by commit aef59b5e5bdfc800f0e7aec7e74a33e98bf142c0. For more details please see the references link. | null | 2021-12-19T22:48:26.572571Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/aef59b5e5bdfc800f0e7aec7e74a33e98bf142c0'} |
Linux | GSD-2022-1002100 | udmabuf: validate ubuf->pagecount | udmabuf: validate ubuf->pagecount
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit b267a8118c2b171bf7d67b90ed64154eeab9fae0, it was introduced in version v4.20 by commit fbb0de795078190a9834b3409e4b009cfb18a6d4. For more details please see the references link. | null | 2022-04-25T06:44:23.567776Z | 2022-04-24T22:11:10.744856Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fbb0de795078190a9834b3409e4b009cfb18a6d4'} |
Linux | GSD-2021-1001450 | nfs: fix acl memory leak of posix_acl_create() | nfs: fix acl memory leak of posix_acl_create()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.276 by commit cef9d9acb7c80ed6bace894b6334557fd493863b, it was introduced in version v3.14 by commit 013cdf1088d7235da9477a2375654921d9b9ba9f. For more details please see the references link. | null | 2021-12-20T01:14:55.099735Z | 2021-08-03T02:45:07.008775Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/013cdf1088d7235da9477a2375654921d9b9ba9f'} |
Linux | GSD-2021-1001000 | x86/ioremap: Map EFI-reserved memory as encrypted for SEV | x86/ioremap: Map EFI-reserved memory as encrypted for SEV
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.46 by commit 208bb686e7fa7fff16e8fa78ff0db34aa9acdbd7, it was introduced in version v5.10 by commit 58c909022a5a56cd1d9e89c8c5461fd1f6a27bb5. For more details please see the references link. | null | 2021-12-19T23:23:01.554020Z | 2021-06-30T00:32:22.126890Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/58c909022a5a56cd1d9e89c8c5461fd1f6a27bb5'} |
Linux | GSD-2022-1000097 | udf: Fix NULL ptr deref when converting from inline format | udf: Fix NULL ptr deref when converting from inline format
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.265 by commit a312cbdb9045a52e5c1fec4ac7b86895f508dc76, it was introduced in version v4.2 by commit 52ebea749aaed195245701a8f90a23d672c7a933. For more details please see the references link. | null | 2022-02-20T06:16:05.976344Z | 2022-02-18T21:34:52.021830Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/52ebea749aaed195245701a8f90a23d672c7a933'} |
Linux | GSD-2021-1002786 | IB/qib: Fix memory leak in qib_user_sdma_queue_pkts() | IB/qib: Fix memory leak in qib_user_sdma_queue_pkts()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.223 by commit 0aaec9c5f60754b56f84460ea439b8c5e91f4caa, it was introduced in version v4.19.216 by commit 73d2892148aa4397a885b4f4afcfc5b27a325c42. For more details please see the references link. | null | 2022-01-11T05:53:06.193520Z | 2021-12-30T02:43:22.513512Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/73d2892148aa4397a885b4f4afcfc5b27a325c42'} |
Linux | GSD-2021-1000241 | i2c: xiic: fix reference leak when pm_runtime_get_sync fails | i2c: xiic: fix reference leak when pm_runtime_get_sync fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit a42ac16e6573f19c78f556ea292f5b534fcc4514, it was introduced in version v5.6 by commit 10b17004a74c384c6f410af355b0d6d7a168f613. For more details please see the references link. | null | 2021-12-19T22:48:14.797587Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/10b17004a74c384c6f410af355b0d6d7a168f613'} |
Linux | GSD-2021-1001903 | mlxsw: thermal: Fix out-of-bounds memory accesses | mlxsw: thermal: Fix out-of-bounds memory accesses
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit df8e58716afb3bee2b59de66b1ba1033f2e26303, it was introduced in version v4.10 by commit a50c1e35650b929500bd89be61c89d95a267ce56. For more details please see the references link. | null | 2021-12-19T23:49:57.829613Z | 2021-10-28T13:54:54.822027Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a50c1e35650b929500bd89be61c89d95a267ce56'} |
Linux | GSD-2021-1000611 | net/sched: fq_pie: fix OOB access in the traffic path | net/sched: fq_pie: fix OOB access in the traffic path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.42 by commit e6294c06e7c62ffdd5bf3df696d3a4fcbb753d3c, it was introduced in version v5.6 by commit ec97ecf1ebe485a17cd8395a5f35e6b80b57665a. For more details please see the references link. | null | 2021-12-19T22:26:13.206356Z | 2021-06-04T19:47:21.192854Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ec97ecf1ebe485a17cd8395a5f35e6b80b57665a'} |
Linux | GSD-2022-1000994 | io_uring: drop the old style inflight file tracking | io_uring: drop the old style inflight file tracking
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit a8344ace69ffa5adc75220e0a98380cea4df08a4, it was introduced in version v5.17.3 by commit 2c443b22756cf75dc594d4d32bf64505bf4ce84b. For more details please see the references link. | null | 2022-04-24T20:37:58.868897Z | 2022-04-24T20:37:58.868897Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c443b22756cf75dc594d4d32bf64505bf4ce84b'} |
Linux | GSD-2022-1001686 | dpaa2-ptp: Fix refcount leak in dpaa2_ptp_probe | dpaa2-ptp: Fix refcount leak in dpaa2_ptp_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 599874bbc4ed832ccb578d48ac0ae7344382ef43, it was introduced in version v5.3 by commit d346c9e86d8685d7cdceddf5b2e9c4376334620c. For more details please see the references link. | null | 2022-04-25T06:05:28.263695Z | 2022-04-24T21:35:10.956679Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d346c9e86d8685d7cdceddf5b2e9c4376334620c'} |
Linux | GSD-2021-1000304 | mt76: fix potential DMA mapping leak | mt76: fix potential DMA mapping leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 91b9548d413fda488ea853cd1b9f59b572db3a0c, it was introduced in version v5.10 by commit 27d5c528a7ca08dcd44877fdd9fc08b76630bf77. For more details please see the references link. | null | 2021-12-19T23:03:20.094789Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/27d5c528a7ca08dcd44877fdd9fc08b76630bf77'} |
Linux | GSD-2021-1002339 | scsi: advansys: Fix kernel pointer leak | scsi: advansys: Fix kernel pointer leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit 27490ae6a85a70242d80615ca74d0362a820d6a7. For more details please see the references link. | null | 2021-12-19T22:26:50.516145Z | 2021-11-29T02:39:30.849534Z | null | null | null | null | null |
Linux | GSD-2022-1001393 | mips: ralink: fix a refcount leak in ill_acc_of_setup() | mips: ralink: fix a refcount leak in ill_acc_of_setup()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 8d7f7ef7980f287ace1c15f2ac03d6754e12f071. For more details please see the references link. | null | 2022-04-25T04:56:18.734673Z | 2022-04-24T21:10:08.670854Z | null | null | null | null | null |
Linux | GSD-2022-1001669 | gpio: Restrict usage of GPIO chip irq members before initialization | gpio: Restrict usage of GPIO chip irq members before initialization
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 0912cf021fb5749372b3782611d8b1de4986c13a. For more details please see the references link. | null | 2022-04-25T06:51:31.151758Z | 2022-04-24T21:33:35.114888Z | null | null | null | null | null |
Linux | GSD-2021-1001846 | ocfs2: mount fails with buffer overflow in strlen | ocfs2: mount fails with buffer overflow in strlen
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit 93be0eeea14cf39235e585c8f56df3b3859deaad. For more details please see the references link. | null | 2021-12-19T23:10:56.967607Z | 2021-10-28T13:51:55.681664Z | null | null | null | null | null |
Linux | GSD-2021-1000754 | nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect | nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.125 by commit 5d4c4b06ed9fb7a69d0b2e2a73fc73226d25ab70, it was introduced in version v3.3 by commit d646960f7986fefb460a2b062d5ccc8ccfeacc3a. For more details please see the references link. | null | 2021-12-20T00:00:29.445570Z | 2021-06-25T00:02:36.849416Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d646960f7986fefb460a2b062d5ccc8ccfeacc3a'} |
Linux | GSD-2021-1002769 | xen/console: harden hvc_xen against event channel storms | xen/console: harden hvc_xen against event channel storms
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit 153d1ea3272209fc970116f09051002d14422cde. For more details please see the references link. | null | 2022-01-11T05:50:06.029952Z | 2021-12-27T05:53:02.589902Z | null | null | null | null | null |
Linux | GSD-2022-1001239 | drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes() | drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 639b3b9def0a6a3f316a195d705d14113236e89c, it was introduced in version v4.15 by commit e7b07ceef2a650e5ed8ca37997689e086c680daf. For more details please see the references link. | null | 2022-04-25T03:08:05.411966Z | 2022-04-24T20:56:48.316754Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e7b07ceef2a650e5ed8ca37997689e086c680daf'} |
Linux | GSD-2021-1002293 | tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc | tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.82 by commit 77e9fed33056f2a88eba9dd4d2d5412f0c7d1f41. For more details please see the references link. | null | 2021-12-19T23:25:17.229401Z | 2021-11-29T02:37:22.487426Z | null | null | null | null | null |
Linux | GSD-2021-1001515 | cpufreq: schedutil: Use kobject release() method to free sugov_tunables | cpufreq: schedutil: Use kobject release() method to free sugov_tunables
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.285 by commit cb4a53ba37532c861a5f3f22803391018a41849a, it was introduced in version v4.7 by commit 9bdcb44e391da5c41b98573bf0305a0e0b1c9569. For more details please see the references link. | null | 2021-12-19T22:46:58.325075Z | 2021-10-19T16:21:43.436526Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9bdcb44e391da5c41b98573bf0305a0e0b1c9569'} |
Linux | GSD-2022-1000582 | RDMA/ucma: Protect mc during concurrent multicast leaves | RDMA/ucma: Protect mc during concurrent multicast leaves
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.22 by commit 2923948ffe0835f7114e948b35bcc42bc9b3baa1, it was introduced in version v5.10 by commit 95fe51096b7adf1d1e7315c49c75e2f75f162584. For more details please see the references link. | null | 2022-03-07T01:44:59.913440Z | 2022-02-27T03:27:13.693095Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/95fe51096b7adf1d1e7315c49c75e2f75f162584'} |
Linux | GSD-2022-1002045 | media: staging: media: zoran: move videodev alloc | media: staging: media: zoran: move videodev alloc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit bd01629315ffd5b63da91d0bd529a77d30e55028. For more details please see the references link. | null | 2022-04-25T03:53:04.819042Z | 2022-04-24T22:05:39.502625Z | null | null | null | null | null |
Linux | GSD-2022-1000078 | Bluetooth: refactor malicious adv data check | Bluetooth: refactor malicious adv data check
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.300 by commit 7889b38a7f21ed19314f83194622b195d328465c. For more details please see the references link. | null | 2022-02-19T02:35:55.554614Z | 2022-02-18T21:32:43.807728Z | null | null | null | null | null |
Linux | GSD-2021-1001145 | s390/stack: fix possible register corruption with stack switch helper | s390/stack: fix possible register corruption with stack switch helper
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13 by commit 67147e96a332b56c7206238162771d82467f86c0, it was introduced in version v4.20 by commit ff340d2472ec7618443913928af9fb85a7009270. For more details please see the references link. | null | 2021-12-20T00:24:37.584068Z | 2021-07-08T01:59:29.254119Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ff340d2472ec7618443913928af9fb85a7009270'} |
Linux | GSD-2022-1002415 | can: mcba_usb: properly check endpoint type | can: mcba_usb: properly check endpoint type
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 5598442edc29e8f6f2380e4b471dc1a3fcd80508, it was introduced in version v4.12 by commit 51f3baad7de943780ce0c17bd7975df567dd6e14. For more details please see the references link. | null | 2022-04-25T06:14:13.289053Z | 2022-04-24T22:44:56.349251Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/51f3baad7de943780ce0c17bd7975df567dd6e14'} |
Linux | GSD-2022-1000428 | net: dsa: mv88e6xxx: don't use devres for mdiobus | net: dsa: mv88e6xxx: don't use devres for mdiobus
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit 8b626d45127d6f5ada7d815b83cfdc09e8cb1394, it was introduced in version v5.9 by commit ac3a68d56651c3dad2c12c7afce065fe15267f44. For more details please see the references link. | null | 2022-03-07T01:51:40.487685Z | 2022-02-27T03:06:12.193824Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac3a68d56651c3dad2c12c7afce065fe15267f44'} |
Linux | GSD-2021-1001352 | RDMA/cma: Fix rdma_resolve_route() memory leak | RDMA/cma: Fix rdma_resolve_route() memory leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.133 by commit 032c68b4f5be128a2167f35b558b7cec88fe4972. For more details please see the references link. | null | 2021-12-20T01:21:39.284920Z | 2021-08-03T02:15:42.250757Z | null | null | null | null | null |
Linux | GSD-2022-1002252 | power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init | power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 41ed61364285ff38bbbe9ca8a45c8372ba72921d, it was introduced in version v4.9 by commit 8c0984e5a75337df513047ec92a6c09d78e3e5cd. For more details please see the references link. | null | 2022-04-25T07:57:02.350942Z | 2022-04-24T22:26:25.198741Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c0984e5a75337df513047ec92a6c09d78e3e5cd'} |
Linux | GSD-2021-1001702 | io_uring: allow conditional reschedule for intensive iterators | io_uring: allow conditional reschedule for intensive iterators
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.11 by commit 648f59a06b0e1fec7a4158cdee9acd362e493ce1. For more details please see the references link. | null | 2021-12-20T00:28:32.206939Z | 2021-10-19T16:32:36.549100Z | null | null | null | null | null |
Linux | GSD-2021-1000810 | HID: magicmouse: fix NULL-deref on disconnect | HID: magicmouse: fix NULL-deref on disconnect
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit 9cf27473f21913a3eaf4702dd2a25415afd5f33f, it was introduced in version v4.20 by commit 9d7b18668956c411a422d04c712994c5fdb23a4b. For more details please see the references link. | null | 2021-12-19T23:51:57.864890Z | 2021-06-25T00:08:49.410743Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9d7b18668956c411a422d04c712994c5fdb23a4b'} |
Linux | GSD-2022-1000795 | xhci: Prevent futile URB re-submissions due to incorrect return value. | xhci: Prevent futile URB re-submissions due to incorrect return value.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.26 by commit ce94606060d7f4306774d919fd219546c589c56a, it was introduced in version v3.11 by commit 203a86613fb3bf2767335659513fa98563a3eb71. For more details please see the references link. | null | 2022-03-18T02:52:40.369653Z | 2022-03-18T00:18:38.333904Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/203a86613fb3bf2767335659513fa98563a3eb71'} |
Linux | GSD-2022-1001887 | soc: qcom: rpmpd: Check for null return of devm_kcalloc | soc: qcom: rpmpd: Check for null return of devm_kcalloc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 724376c30af5a57686b223dbcd6188e07d2a1de2, it was introduced in version v5.1 by commit bbe3a66c3f5a65fb3d702351bac2a6033944d389. For more details please see the references link. | null | 2022-04-25T06:20:32.512679Z | 2022-04-24T21:52:07.495660Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bbe3a66c3f5a65fb3d702351bac2a6033944d389'} |
Linux | GSD-2021-1002084 | nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells | nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit 0e822e5413da1af28cca350cb1cb42b6133bdcae, it was introduced in version v4.3 by commit 69aba7948cbe53f2f1827e84e9dd0ae470a5072e. For more details please see the references link. | null | 2021-12-20T01:22:03.494449Z | 2021-11-14T15:19:08.503522Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69aba7948cbe53f2f1827e84e9dd0ae470a5072e'} |
Linux | GSD-2021-1000543 | net: fujitsu: fix potential null-ptr-deref | net: fujitsu: fix potential null-ptr-deref
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit f14bf57a08779a5dee9936f63ada0149ea89c5e6, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T00:31:09.198213Z | 2021-06-04T19:35:58.468929Z | null | null | null | null | null |
Linux | GSD-2021-1000113 | btrfs: fix race between transaction aborts and fsyncs leading to use-after-free | btrfs: fix race between transaction aborts and fsyncs leading to use-after-free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.20 by commit 633f7f216663587f17601eaa1cf2ac3d5654874c, it was introduced in version v5.7 by commit ef67963dac255b293e19815ea3d440567be4626f. For more details please see the references link. | null | 2021-12-19T22:12:04.269072Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef67963dac255b293e19815ea3d440567be4626f'} |
Linux | GSD-2022-1001184 | cpufreq: qcom-cpufreq-nvmem: fix reading of PVS Valid fuse | cpufreq: qcom-cpufreq-nvmem: fix reading of PVS Valid fuse
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 50b65f410814a2891505ed9bdfff3486abdc8d0b, it was introduced in version v5.7 by commit a8811ec764f95a04ba82f6f457e28c5e9e36e36b. For more details please see the references link. | null | 2022-04-25T03:33:52.754815Z | 2022-04-24T20:51:49.574059Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a8811ec764f95a04ba82f6f457e28c5e9e36e36b'} |
Linux | GSD-2021-1000406 | kyber: fix out of bounds access when preempted | kyber: fix out of bounds access when preempted
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.120 by commit 0b6b4b90b74c27bea968c214d820ba4254b903a5, it was introduced in version v4.18 by commit a6088845c2bf754d6cb2572b484180680b037804. For more details please see the references link. | null | 2021-12-20T00:56:38.427920Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a6088845c2bf754d6cb2572b484180680b037804'} |
Linux | GSD-2022-1001491 | net: hns3: add vlan list lock to protect vlan list | net: hns3: add vlan list lock to protect vlan list
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 09e383ca97e798f9954189b741af54b5c51e7a97, it was introduced in version v5.1 by commit c6075b193462d9a3930fb41f587f94720658752a. For more details please see the references link. | null | 2022-04-25T06:46:10.015145Z | 2022-04-24T21:16:36.274076Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6075b193462d9a3930fb41f587f94720658752a'} |
Linux | GSD-2021-1000056 | usb: dwc3: core: Do core softreset when switch mode | usb: dwc3: core: Do core softreset when switch mode
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.3 by commit 1c10fd60c8595ea7ff7e29d3cf1fa88069941da3, it was introduced in version v4.12 by commit 41ce1456e1dbbc7355d0fcc10cf7c337c13def24. For more details please see the references link. | null | 2021-12-20T00:03:14.376067Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41ce1456e1dbbc7355d0fcc10cf7c337c13def24'} |
Linux | GSD-2021-1002591 | seg6: fix the iif in the IPv6 socket control block | seg6: fix the iif in the IPv6 socket control block
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.8 by commit 98adb2bbfa407c9290bda299d4c6f7a1c4ebd5e1, it was introduced in version v5.0 by commit ef489749aae508e6f17886775c075f12ff919fb1. For more details please see the references link. | null | 2021-12-19T23:36:36.926808Z | 2021-12-19T19:44:04.295469Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef489749aae508e6f17886775c075f12ff919fb1'} |
Linux | GSD-2021-1001217 | KVM: mmio: Fix use-after-free Read in kvm_vm_ioctl_unregister_coalesced_mmio | KVM: mmio: Fix use-after-free Read in kvm_vm_ioctl_unregister_coalesced_mmio
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.4 by commit 069d44a24c0ff8f85adf49233aae7a8ca16f5c7e, it was introduced in version v5.13 by commit 5d3c4c79384af06e3c8e25b7770b6247496b4417. For more details please see the references link. | null | 2021-12-19T22:22:44.655606Z | 2021-08-03T01:38:52.535228Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5d3c4c79384af06e3c8e25b7770b6247496b4417'} |
Linux | GSD-2022-1000280 | ASoC: hdmi-codec: Fix OOB memory accesses | ASoC: hdmi-codec: Fix OOB memory accesses
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.22 by commit 10007bd96b6c4c3cfaea9e76c311b06a07a5e260. For more details please see the references link. | null | 2022-02-19T09:28:29.319947Z | 2022-02-18T22:05:38.668004Z | null | null | null | null | null |
Linux | GSD-2022-1001868 | libbpf: Fix possible NULL pointer dereference when destroying skeleton | libbpf: Fix possible NULL pointer dereference when destroying skeleton
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit b385ebe91ae917677ae8cdd3240828155248ff0c, it was introduced in version v5.6 by commit d66562fba1ce66975bd61b0786fb8b1810f33caa. For more details please see the references link. | null | 2022-04-25T03:30:51.649791Z | 2022-04-24T21:49:57.022762Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d66562fba1ce66975bd61b0786fb8b1810f33caa'} |
Linux | GSD-2021-1001647 | sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb | sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.71 by commit 9c6591ae8e63f93c895ad5e2703c36c548aac997, it was introduced in version v4.8 by commit 3acb50c18d8d6650f10919464ade4dcdaf41d62f. For more details please see the references link. | null | 2021-12-19T22:52:48.240637Z | 2021-10-19T16:29:51.889555Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3acb50c18d8d6650f10919464ade4dcdaf41d62f'} |
Linux | GSD-2021-1000955 | usb: dwc3: ep0: fix NULL pointer exception | usb: dwc3: ep0: fix NULL pointer exception
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.44 by commit 470403639114895e2697c766fbe17be8d0e9b67a. For more details please see the references link. | null | 2021-12-19T22:46:06.248094Z | 2021-06-30T00:29:03.856947Z | null | null | null | null | null |
Linux | GSD-2022-1002317 | scsi: libfc: Fix use after free in fc_exch_abts_resp() | scsi: libfc: Fix use after free in fc_exch_abts_resp()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 6044ad64f41c87382cfeeca281573d1886d80cbe. For more details please see the references link. | null | 2022-04-25T06:55:18.873186Z | 2022-04-24T22:33:46.798036Z | null | null | null | null | null |
Linux | GSD-2021-1002342 | arm64: dts: qcom: msm8998: Fix CPU/L2 idle state latency and residency | arm64: dts: qcom: msm8998: Fix CPU/L2 idle state latency and residency
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit 118c826ef8b43efe0fda8faf419673707ee8c5e5. For more details please see the references link. | null | 2021-12-19T23:30:23.744075Z | 2021-11-29T02:39:38.299788Z | null | null | null | null | null |
Linux | GSD-2021-1001997 | xhci: Fix command ring pointer corruption while aborting a command | xhci: Fix command ring pointer corruption while aborting a command
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.155 by commit 01c2dcb67e71c351006dd17cbba86c26b7f61eaf. For more details please see the references link. | null | 2021-12-19T22:21:56.787911Z | 2021-11-14T15:15:09.866574Z | null | null | null | null | null |
Linux | GSD-2021-1000685 | drm/amdgpu: Fix a use-after-free | drm/amdgpu: Fix a use-after-free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.271 by commit 3293cf3513d69f00c14d43e2020826d45ea0e46a, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T00:06:47.835672Z | 2021-06-04T20:02:15.129542Z | null | null | null | null | null |
Linux | GSD-2022-1000900 | netfilter: fix use-after-free in __nf_register_net_hook() | netfilter: fix use-after-free in __nf_register_net_hook()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.233 by commit bdd8fc1b826e6f23963f5bef3f7431c6188ec954, it was introduced in version v4.14 by commit 2420b79f8c18a75ee2417cace381f4604b9b4365. For more details please see the references link. | null | 2022-03-18T03:36:03.942333Z | 2022-03-18T00:29:49.632898Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2420b79f8c18a75ee2417cace381f4604b9b4365'} |
Linux | GSD-2022-1001612 | rtc: pl031: fix rtc features null pointer dereference | rtc: pl031: fix rtc features null pointer dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit d274ce4a3dfd0b9a292667535578359b865765cb, it was introduced in version v5.12 by commit d9b0dd54a1943f47a381a474f8ea2c94466110c0. For more details please see the references link. | null | 2022-04-25T05:29:23.498719Z | 2022-04-24T21:28:11.410006Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9b0dd54a1943f47a381a474f8ea2c94466110c0'} |
Linux | GSD-2021-1002712 | scsi: scsi_debug: Don't call kcalloc() if size arg is zero | scsi: scsi_debug: Don't call kcalloc() if size arg is zero
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.88 by commit aa1f912712a109b6306746133de7e5343f016b26. For more details please see the references link. | null | 2022-01-11T05:53:08.978835Z | 2021-12-27T05:38:27.755166Z | null | null | null | null | null |
Linux | GSD-2022-1001242 | ath9k_htc: fix uninit value bugs | ath9k_htc: fix uninit value bugs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 5abf2b761b998063f5e2bae93fd4ab10e2a80f10, it was introduced in version v2.6.35 by commit fb9987d0f748c983bb795a86f47522313f701a08. For more details please see the references link. | null | 2022-04-25T03:51:45.539128Z | 2022-04-24T20:57:09.129075Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb9987d0f748c983bb795a86f47522313f701a08'} |
Linux | GSD-2021-1001094 | net: caif: fix memory leak in ldisc_open | net: caif: fix memory leak in ldisc_open
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.274 by commit dede006783102f26a49e9eb33fd673b2937ed692. For more details please see the references link. | null | 2021-12-20T00:02:27.181367Z | 2021-07-08T01:55:55.332309Z | null | null | null | null | null |
Linux | GSD-2022-1002194 | MIPS: fix fortify panic when copying asm exception handlers | MIPS: fix fortify panic when copying asm exception handlers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 0aeaadc52b05b976c587182d234e3f18e8fce389. For more details please see the references link. | null | 2022-04-25T06:40:21.053995Z | 2022-04-24T22:20:37.568778Z | null | null | null | null | null |
Linux | GSD-2022-1000453 | scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task | scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit d9d93f32534a0a80a1c26bdb0746d90a7b19c2c2. For more details please see the references link. | null | 2022-03-07T02:24:42.271252Z | 2022-02-27T03:09:05.416639Z | null | null | null | null | null |
Linux | GSD-2022-1000146 | drm/vmwgfx: Fix stale file descriptors on failed usercopy | drm/vmwgfx: Fix stale file descriptors on failed usercopy
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.175 by commit 84b1259fe36ae0915f3d6ddcea6377779de48b82, it was introduced in version v4.14 by commit c906965dee22d5e95d0651759ba107b420212a9f. For more details please see the references link. | null | 2022-02-19T12:12:58.292115Z | 2022-02-18T21:47:06.372503Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c906965dee22d5e95d0651759ba107b420212a9f'} |
Linux | GSD-2022-1002481 | ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 | ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit f4de974019a0adf34d0e7de6b86252f1bd266b06. For more details please see the references link. | null | 2022-04-25T05:58:56.625573Z | 2022-04-24T22:52:53.873487Z | null | null | null | null | null |
Linux | GSD-2021-1001581 | net_sched: fix NULL deref in fifo_set_limit() | net_sched: fix NULL deref in fifo_set_limit()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.153 by commit c951a3be5e8803e93bb49a0aca0d30457d3c1b67, it was introduced in version v2.6.27 by commit fb0305ce1b03f6ff17f84f2c63daccecb45f2805. For more details please see the references link. | null | 2021-12-20T01:37:58.303563Z | 2021-10-19T16:24:45.346402Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb0305ce1b03f6ff17f84f2c63daccecb45f2805'} |
Linux | GSD-2022-1000516 | net: do not keep the dst cache when uncloning an skb dst and its metadata | net: do not keep the dst cache when uncloning an skb dst and its metadata
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit ff6962c6c9570856f32306859eb92e8b3ea78cc1, it was introduced in version v4.6 by commit d71785ffc7e7cae3fbdc4ea8a9d05b7a1c59f7b8. For more details please see the references link. | null | 2022-03-07T01:39:10.762785Z | 2022-02-27T03:17:31.901920Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d71785ffc7e7cae3fbdc4ea8a9d05b7a1c59f7b8'} |
Linux | GSD-2022-1000845 | mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work | mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.104 by commit 13f0ea8d11934a017f5c353fa049a09de3c37ec0. For more details please see the references link. | null | 2022-03-18T03:00:31.402218Z | 2022-03-18T00:23:22.339713Z | null | null | null | null | null |
Linux | GSD-2022-1001757 | can: mcba_usb: properly check endpoint type | can: mcba_usb: properly check endpoint type
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit fa9c1f14002dc0d5293e16a2007bd89b6e79207b, it was introduced in version v4.12 by commit 51f3baad7de943780ce0c17bd7975df567dd6e14. For more details please see the references link. | null | 2022-04-25T04:26:12.559650Z | 2022-04-24T21:40:07.172168Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/51f3baad7de943780ce0c17bd7975df567dd6e14'} |
Linux | GSD-2021-1002207 | RDMA/mlx5: Initialize the ODP xarray when creating an ODP MR | RDMA/mlx5: Initialize the ODP xarray when creating an ODP MR
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 5508546631a0f555d7088203dec2614e41b5106e, it was introduced in version v5.13 by commit a639e66703ee45745dc4057c7c2013ed9e1963a7. For more details please see the references link. | null | 2021-12-19T22:21:57.946338Z | 2021-11-14T15:24:42.606665Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a639e66703ee45745dc4057c7c2013ed9e1963a7'} |
Linux | GSD-2021-1000390 | crypto: sun8i-ss - Fix memory leak of object d when dma_iv fails to map | crypto: sun8i-ss - Fix memory leak of object d when dma_iv fails to map
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 617ec35ed51f731a593ae7274228ef2cfc9cb781, it was introduced in version v5.10 by commit ac2614d721dea2ff273af19c6c5d508d58a2bb3e. For more details please see the references link. | null | 2021-12-20T00:24:12.525001Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac2614d721dea2ff273af19c6c5d508d58a2bb3e'} |
Linux | GSD-2022-1001307 | mm: invalidate hwpoison page cache page in fault path | mm: invalidate hwpoison page cache page in fault path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 6ab5aba503c6d3b926453f5ca18491e8a075e5cf. For more details please see the references link. | null | 2022-04-25T05:59:40.856861Z | 2022-04-24T21:02:42.415174Z | null | null | null | null | null |
Linux | GSD-2021-1001978 | drm/msm: Fix null pointer dereference on pointer edp | drm/msm: Fix null pointer dereference on pointer edp
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.213 by commit 7f642b93710b6b1119bdff90be01e6b5a2a5d669, it was introduced in version v4.0 by commit ab5b0107ccf3821a6837b0f2819270d6fa0b278f. For more details please see the references link. | null | 2021-12-19T22:29:47.993346Z | 2021-11-14T15:14:21.606251Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab5b0107ccf3821a6837b0f2819270d6fa0b278f'} |
Linux | GSD-2021-1002657 | net: systemport: Add global locking for descriptor lifecycle | net: systemport: Add global locking for descriptor lifecycle
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.222 by commit 595a684fa6f23b21958379a18cfa83862c73c2e1, it was introduced in version v3.16 by commit 80105befdb4b8cea924711b40b2462b87df65b62. For more details please see the references link. | null | 2022-01-11T05:58:13.086715Z | 2021-12-27T05:33:29.972987Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80105befdb4b8cea924711b40b2462b87df65b62'} |
Linux | GSD-2021-1002179 | mm, slub: fix mismatch between reconstructed freelist depth and cnt | mm, slub: fix mismatch between reconstructed freelist depth and cnt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 899447f669da76cc3605665e1a95ee877bc464cc, it was introduced in version v4.17 by commit c3895391df385c6628638f014c87e16f5e2efd45. For more details please see the references link. | null | 2021-12-19T22:36:05.391978Z | 2021-11-14T15:23:26.410633Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c3895391df385c6628638f014c87e16f5e2efd45'} |
Linux | GSD-2021-1000144 | ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure | ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.36 by commit e0f2d86481eaa83df33b0793f75212919db7a19d, it was introduced in version v4.12 by commit ca9ae5ec4ef0ed13833b03297ab319676965492c. For more details please see the references link. | null | 2021-12-20T01:02:24.098256Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca9ae5ec4ef0ed13833b03297ab319676965492c'} |
Linux | GSD-2022-1001429 | virtio: use virtio_device_ready() in virtio_device_restore() | virtio: use virtio_device_ready() in virtio_device_restore()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 94e9f5da39ee5f8ea31be1585de31c54f10dedce, it was introduced in version v5.16 by commit d50497eb4e554e1f0351e1836ee7241c059592e6. For more details please see the references link. | null | 2022-04-25T04:44:40.059330Z | 2022-04-24T21:12:18.650041Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d50497eb4e554e1f0351e1836ee7241c059592e6'} |
Linux | GSD-2021-1002483 | drm/amd/amdgpu: fix potential memleak | drm/amd/amdgpu: fix potential memleak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.84 by commit c746945fb6bcbe3863c9ea6369c7ef376e38e5eb. For more details please see the references link. | null | 2021-12-20T01:15:02.689706Z | 2021-12-19T19:39:20.755612Z | null | null | null | null | null |
Linux | GSD-2021-1002529 | powerpc/32: Fix hardlockup on vmap stack overflow | powerpc/32: Fix hardlockup on vmap stack overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.6 by commit c4e3ff8b8b1d54f0c755670174c453b06e17114b, it was introduced in version v5.10 by commit c118c7303ad528be8ff2aea8cd1ee15452c763f0. For more details please see the references link. | null | 2021-12-20T00:02:07.386579Z | 2021-12-19T19:41:18.248761Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c118c7303ad528be8ff2aea8cd1ee15452c763f0'} |
Linux | GSD-2021-1000514 | RDMA/core: Prevent divide-by-zero error triggered by the user | RDMA/core: Prevent divide-by-zero error triggered by the user
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.40 by commit 66ab7fcdac34b890017f04f391507ef5b2b89a13, it was introduced in version v5.10 by commit 9f85cbe50aa044a46f0a22fda323fa27b80c82da. For more details please see the references link. | null | 2021-12-19T23:37:52.615492Z | 2021-05-31T23:48:54.746616Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9f85cbe50aa044a46f0a22fda323fa27b80c82da'} |
Linux | GSD-2022-1001583 | block: don't delete queue kobject before its children | block: don't delete queue kobject before its children
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit cf0cb8686e55d9c022944bc6ba9e19e832889e83, it was introduced in version v4.16 by commit 2c2086afc2b8b974fac32cb028e73dc27bfae442. For more details please see the references link. | null | 2022-04-25T05:49:54.502088Z | 2022-04-24T21:26:12.028041Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c2086afc2b8b974fac32cb028e73dc27bfae442'} |
Linux | GSD-2022-1001079 | net/mlx5e: TC, Hold sample_attr on stack instead of pointer | net/mlx5e: TC, Hold sample_attr on stack instead of pointer
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit cdd08fa7be90e7340cff631326188d5fcc9b6594. For more details please see the references link. | null | 2022-04-25T05:38:30.899968Z | 2022-04-24T20:43:51.715570Z | null | null | null | null | null |
Linux | GSD-2021-1001755 | s390/qeth: fix NULL deref in qeth_clear_working_pool_list() | s390/qeth: fix NULL deref in qeth_clear_working_pool_list()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.9 by commit 9b00fb12cdc9d8d1c3ffe82a78e74738127803fc, it was introduced in version v5.9 by commit eff73e16ee116f6eafa2be48fab42659a27cb453. For more details please see the references link. | null | 2021-12-20T00:54:47.031594Z | 2021-10-19T16:35:09.741367Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/eff73e16ee116f6eafa2be48fab42659a27cb453'} |
Linux | GSD-2021-1000847 | perf: Fix data race between pin_count increment/decrement | perf: Fix data race between pin_count increment/decrement
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.273 by commit 0c78dc6cbd99cad6445e1981211efc9bbbd56596, it was introduced in version v2.6.39 by commit fe4b04fa31a6dcf4358aa84cf81e5a7fd079469b. For more details please see the references link. | null | 2021-12-19T22:50:49.864836Z | 2021-06-30T00:01:06.045659Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fe4b04fa31a6dcf4358aa84cf81e5a7fd079469b'} |
Linux | GSD-2022-1000238 | select: Fix indefinitely sleeping task in poll_schedule_timeout() | select: Fix indefinitely sleeping task in poll_schedule_timeout()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.18 by commit 145407e54fd15fd2a87ee7d6c66077e614036a9b. For more details please see the references link. | null | 2022-02-19T09:41:02.384941Z | 2022-02-18T21:59:54.784589Z | null | null | null | null | null |
Linux | GSD-2022-1002205 | ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl | ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit d727fd32cbd1abf3465f607021bc9c746f17b5a8, it was introduced in version v4.8 by commit 714fb87e8bc05ff78255afc0dca981e8c5242785. For more details please see the references link. | null | 2022-04-25T06:05:07.783789Z | 2022-04-24T22:21:38.396013Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/714fb87e8bc05ff78255afc0dca981e8c5242785'} |
Linux | GSD-2021-1001305 | media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() | media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.136 by commit e617fa62f6cf859a7b042cdd6c73af905ff8fca3, it was introduced in version v2.6.34 by commit dae52d009fc950b5c209260d50fcc000f5becd3c. For more details please see the references link. | null | 2021-12-20T00:24:51.202133Z | 2021-08-03T02:03:13.139805Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/dae52d009fc950b5c209260d50fcc000f5becd3c'} |
Linux | GSD-2022-1000392 | nvme: fix a possible use-after-free in controller reset during load | nvme: fix a possible use-after-free in controller reset during load
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.102 by commit 0ead57ceb21bbf15963b4874c2ac67143455382f. For more details please see the references link. | null | 2022-03-07T02:27:42.833894Z | 2022-02-27T03:00:40.379607Z | null | null | null | null | null |
Linux | GSD-2022-1000668 | RDMA/siw: Fix refcounting leak in siw_create_qp() | RDMA/siw: Fix refcounting leak in siw_create_qp()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.8 by commit fa3b844a50845c817660146c27c0fc29b08d3116, it was introduced in version v5.15 by commit 514aee660df493cd673154a6ba6bab745ec47b8c. For more details please see the references link. | null | 2022-03-07T01:43:56.176044Z | 2022-02-27T03:38:52.050143Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/514aee660df493cd673154a6ba6bab745ec47b8c'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.