ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2022-1002340 | Revert "Revert "block, bfq: honor already-setup queue merges"" | Revert "Revert "block, bfq: honor already-setup queue merges""
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit f990f0985eda59d4f29fc83fcf300c92b1225d39. For more details please see the references link. | null | 2022-04-25T06:42:30.486377Z | 2022-04-24T22:35:45.452982Z | null | null | null | null | null |
Linux | GSD-2021-1001610 | blktrace: Fix uaf in blk_trace access after removing by sysfs | blktrace: Fix uaf in blk_trace access after removing by sysfs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.150 by commit ebb8d26d93c3ec3c7576c52a8373a2309423c069, it was introduced in version v2.6.30 by commit c71a896154119f4ca9e89d6078f5f63ad60ef199. For more details please see the references link. | null | 2021-12-19T23:13:01.920052Z | 2021-10-19T16:28:08.258834Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c71a896154119f4ca9e89d6078f5f63ad60ef199'} |
Linux | GSD-2021-1000902 | perf: Fix data race between pin_count increment/decrement | perf: Fix data race between pin_count increment/decrement
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.126 by commit 26ab08df86565cde5cdfcdc3c81660ef2dca0ad4, it was introduced in version v2.6.39 by commit fe4b04fa31a6dcf4358aa84cf81e5a7fd079469b. For more details please see the references link. | null | 2021-12-19T22:19:59.183788Z | 2021-06-30T00:05:28.343633Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fe4b04fa31a6dcf4358aa84cf81e5a7fd079469b'} |
Linux | GSD-2022-1000687 | xen/xenbus: don't let xenbus_grant_ring() remove grants in error case | xen/xenbus: don't let xenbus_grant_ring() remove grants in error case
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.14 by commit 69e581afd2eafd51df6d4a24ab488cb8863c2dcd. For more details please see the references link. | null | 2022-03-18T03:02:18.309701Z | 2022-03-18T00:09:41.514076Z | null | null | null | null | null |
Linux | GSD-2022-1001995 | ceph: fix memory leak in ceph_readdir when note_last_dentry returns error | ceph: fix memory leak in ceph_readdir when note_last_dentry returns error
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit f4429786129648a8f4bb1e5faa143c4478cc5c4a. For more details please see the references link. | null | 2022-04-25T06:55:48.332325Z | 2022-04-24T22:01:50.162515Z | null | null | null | null | null |
Linux | GSD-2021-1001240 | net/sched: act_skbmod: Skip non-Ethernet packets | net/sched: act_skbmod: Skip non-Ethernet packets
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.54 by commit 071729150be9e1d1b851b70efb6d91ee9269d57b, it was introduced in version v4.9 by commit 86da71b57383d40993cb90baafb3735cffe5d800. For more details please see the references link. | null | 2021-12-19T23:58:53.625353Z | 2021-08-03T01:46:21.467812Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/86da71b57383d40993cb90baafb3735cffe5d800'} |
Linux | GSD-2022-1001096 | mips: Enable KCSAN - take 2 | mips: Enable KCSAN - take 2
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 89e346c881522f3551de65d2a1d3f1b2c8648904, it was introduced in version v5.17.2 by commit 958b5990153934ba68436305f53f48ed87a1ae9a. For more details please see the references link. | null | 2022-04-24T20:44:57.363642Z | 2022-04-24T20:44:57.363642Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/958b5990153934ba68436305f53f48ed87a1ae9a'} |
Linux | GSD-2021-1002196 | drm/amdgpu: Fix even more out of bound writes from debugfs | drm/amdgpu: Fix even more out of bound writes from debugfs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 3f4e54bd312d3dafb59daf2b97ffa08abebe60f5, it was introduced in version v5.10 by commit 918698d5c2b50433714d2042f55b55b090faa167. For more details please see the references link. | null | 2021-12-20T00:41:56.131295Z | 2021-11-14T15:24:15.703790Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/918698d5c2b50433714d2042f55b55b090faa167'} |
Linux | GSD-2021-1000451 | net: Only allow init netns to set default tcp cong to a restricted algo | net: Only allow init netns to set default tcp cong to a restricted algo
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.191 by commit 992de06308d9a9584d59b96d294ac676f924e437, it was introduced in version v4.15 by commit 6670e152447732ba90626f36dfc015a13fbf150e. For more details please see the references link. | null | 2021-12-20T00:33:40.892057Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6670e152447732ba90626f36dfc015a13fbf150e'} |
Linux | GSD-2021-1001493 | net_sched: fix NULL deref in fifo_set_limit() | net_sched: fix NULL deref in fifo_set_limit()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.289 by commit 0dd7ddc462b9c2d31eb5a9926a2cc63eaa3e9f52, it was introduced in version v2.6.27 by commit fb0305ce1b03f6ff17f84f2c63daccecb45f2805. For more details please see the references link. | null | 2021-12-19T22:40:06.029422Z | 2021-10-19T16:20:44.022842Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb0305ce1b03f6ff17f84f2c63daccecb45f2805'} |
Linux | GSD-2022-1002439 | power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init | power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 19aa3c98ed7b2616e105946cec804f897837ab84, it was introduced in version v4.9 by commit 8c0984e5a75337df513047ec92a6c09d78e3e5cd. For more details please see the references link. | null | 2022-04-25T03:18:40.767264Z | 2022-04-24T22:47:36.897230Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c0984e5a75337df513047ec92a6c09d78e3e5cd'} |
Linux | GSD-2022-1000404 | copy_process(): Move fd_install() out of sighand->siglock critical section | copy_process(): Move fd_install() out of sighand->siglock critical section
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.102 by commit 9fee985f9afa2fd5ee2c024d1a35b86e56bd1b63, it was introduced in version v5.2 by commit 6fd2fe494b17bf2dec37b610d23a43a72b16923a. For more details please see the references link. | null | 2022-03-07T01:31:05.923630Z | 2022-02-27T03:02:03.609995Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6fd2fe494b17bf2dec37b610d23a43a72b16923a'} |
Linux | GSD-2021-1001169 | scsi: target: Fix NULL dereference on XCOPY completion | scsi: target: Fix NULL dereference on XCOPY completion
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.6 by commit e7732c5a19a15a62b0b23fd683a639b0483e1f40, it was introduced in version v5.13 by commit 39ae3edda325e9cf9e978c9788affe88231f3b34. For more details please see the references link. | null | 2021-12-19T23:10:41.930479Z | 2021-08-03T01:32:02.200197Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/39ae3edda325e9cf9e978c9788affe88231f3b34'} |
Linux | GSD-2022-1002069 | cpufreq: qcom-cpufreq-nvmem: fix reading of PVS Valid fuse | cpufreq: qcom-cpufreq-nvmem: fix reading of PVS Valid fuse
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 091704a9a7f4611dae2f2332319bcf1e862d64a1, it was introduced in version v5.7 by commit a8811ec764f95a04ba82f6f457e28c5e9e36e36b. For more details please see the references link. | null | 2022-04-25T04:21:05.318050Z | 2022-04-24T22:07:32.614720Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a8811ec764f95a04ba82f6f457e28c5e9e36e36b'} |
Linux | GSD-2022-1000054 | sctp: use call_rcu to free endpoint | sctp: use call_rcu to free endpoint
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.13 by commit 75799e71df1da11394740b43ae5686646179561d, it was introduced in version v4.14 by commit d25adbeb0cdb860fb39e09cdd025e9cfc954c5ab. For more details please see the references link. | null | 2022-01-11T07:00:03.246588Z | 2022-01-10T19:52:01.078500Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d25adbeb0cdb860fb39e09cdd025e9cfc954c5ab'} |
Linux | GSD-2021-1001539 | tty: Fix out-of-bound vmalloc access in imageblit | tty: Fix out-of-bound vmalloc access in imageblit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.249 by commit 067c694d06040db6f0c65281bb358452ca6d85b9. For more details please see the references link. | null | 2021-12-19T22:40:37.595690Z | 2021-10-19T16:22:50.407164Z | null | null | null | null | null |
Linux | GSD-2021-1000282 | Drivers: hv: vmbus: Use after free in __vmbus_open() | Drivers: hv: vmbus: Use after free in __vmbus_open()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 2728f289b3270b0e273292b46c534421a33bbfd5, it was introduced in version v4.14 by commit 6f3d791f300618caf82a2be0c27456edd76d5164. For more details please see the references link. | null | 2021-12-19T23:27:56.166852Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6f3d791f300618caf82a2be0c27456edd76d5164'} |
Linux | GSD-2022-1001215 | PCI: Reduce warnings on possible RW1C corruption | PCI: Reduce warnings on possible RW1C corruption
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 54054e4ea188d99cfcdaafc255477f51b296c655, it was introduced in version v4.10 by commit fb26592301200dbbe4a9943fe188b57a46716900. For more details please see the references link. | null | 2022-04-25T06:57:05.766512Z | 2022-04-24T20:54:30.584652Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb26592301200dbbe4a9943fe188b57a46716900'} |
Linux | GSD-2021-1000778 | ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed | ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.43 by commit d3b668b96ad3192c0581a248ae2f596cd054792a, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T00:33:33.005062Z | 2021-06-25T00:05:00.232824Z | null | null | null | null | null |
Linux | GSD-2021-1002745 | mptcp: never allow the PM to close a listener subflow | mptcp: never allow the PM to close a listener subflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit 1456a0004cc54c58adb2501cb0c95dc8b3c83e9e, it was introduced in version v5.13 by commit 740d798e8767d8a449902b1a1bbc70facfce19b5. For more details please see the references link. | null | 2022-01-11T05:46:29.735438Z | 2021-12-27T05:46:13.237864Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/740d798e8767d8a449902b1a1bbc70facfce19b5'} |
Linux | GSD-2022-1000957 | dm integrity: fix memory corruption when tag_size is less than digest size | dm integrity: fix memory corruption when tag_size is less than digest size
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.4 by commit 4d485cf9b609709e45d5113e6e2b1b01254b2fe9. For more details please see the references link. | null | 2022-04-25T05:17:03.759584Z | 2022-04-24T20:34:58.468030Z | null | null | null | null | null |
Linux | GSD-2022-1001645 | perf/imx_ddr: Fix undefined behavior due to shift overflowing the constant | perf/imx_ddr: Fix undefined behavior due to shift overflowing the constant
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.35 by commit 4cdf0e7a5be8fb50fb7d46a9ff1f8bdf2aa0f0f0. For more details please see the references link. | null | 2022-04-25T03:54:08.500447Z | 2022-04-24T21:31:18.758714Z | null | null | null | null | null |
Linux | GSD-2021-1000328 | arm64: entry: always set GIC_PRIO_PSR_I_SET during entry | arm64: entry: always set GIC_PRIO_PSR_I_SET during entry
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.38 by commit 51524fa8b5f7b879ba569227738375d283b79382, it was introduced in version v5.10 by commit 23529049c68423820487304f244144e0d576e85a. For more details please see the references link. | null | 2021-12-20T00:14:23.828243Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/23529049c68423820487304f244144e0d576e85a'} |
Linux | GSD-2021-1002315 | net: dpaa2-eth: fix use-after-free in dpaa2_eth_remove | net: dpaa2-eth: fix use-after-free in dpaa2_eth_remove
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit 32d4686224744819ddcae58b666c21d2a4ef4c88, it was introduced in version v4.17 by commit 7472dd9f649958be6a8880ed439233c8414a7b34. For more details please see the references link. | null | 2021-12-20T01:23:28.343379Z | 2021-11-29T02:38:24.056937Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7472dd9f649958be6a8880ed439233c8414a7b34'} |
Linux | GSD-2021-1002600 | nfsd: fix use-after-free due to delegation race | nfsd: fix use-after-free due to delegation race
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.8 by commit 148c816f10fd11df27ca6a9b3238cdd42fa72cd3. For more details please see the references link. | null | 2021-12-20T00:21:43.022205Z | 2021-12-19T19:44:34.289667Z | null | null | null | null | null |
Linux | GSD-2022-1001350 | lz4: fix LZ4_decompress_safe_partial read out of bound | lz4: fix LZ4_decompress_safe_partial read out of bound
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit e64dbe97c05c769525cbca099ddbd22485630235. For more details please see the references link. | null | 2022-04-25T04:47:56.956429Z | 2022-04-24T21:06:41.808234Z | null | null | null | null | null |
Linux | GSD-2021-1002250 | tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc | tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.218 by commit 4f300f47dbcf9c3d4b2ea76c8554c8f360400725. For more details please see the references link. | null | 2021-12-19T23:21:37.519735Z | 2021-11-29T02:35:23.150514Z | null | null | null | null | null |
Linux | GSD-2021-1001885 | ocfs2: mount fails with buffer overflow in strlen | ocfs2: mount fails with buffer overflow in strlen
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit 0e677ea5b7396f715a76b6b0ef441430e4c4b57f. For more details please see the references link. | null | 2021-12-19T23:23:20.404110Z | 2021-10-28T13:53:54.877511Z | null | null | null | null | null |
Linux | GSD-2021-1000797 | nvmet: fix freeing unallocated p2pmem | nvmet: fix freeing unallocated p2pmem
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit 8a452d62e7cea3c8a2676a3b89a9118755a1a271, it was introduced in version v5.8 by commit c6e3f13398123a008cd2ee28f93510b113a32791. For more details please see the references link. | null | 2021-12-20T00:02:05.511502Z | 2021-06-25T00:08:00.016976Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6e3f13398123a008cd2ee28f93510b113a32791'} |
Linux | GSD-2022-1000812 | bpf: Add schedule points in batch ops | bpf: Add schedule points in batch ops
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.26 by commit 8628f489b749a4f9767991631921dbe3fbcdc784, it was introduced in version v5.6 by commit aa2e93b8e58e18442edfb2427446732415bc215e. For more details please see the references link. | null | 2022-03-18T03:01:08.829892Z | 2022-03-18T00:20:54.940892Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/aa2e93b8e58e18442edfb2427446732415bc215e'} |
Linux | GSD-2022-1001700 | x86: Annotate call_on_stack() | x86: Annotate call_on_stack()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit e3c961c56ad522eaf2716afa42c59346675ee4b1. For more details please see the references link. | null | 2022-04-25T06:42:01.737335Z | 2022-04-24T21:36:21.550405Z | null | null | null | null | null |
Linux | GSD-2022-1002086 | powerpc: 8xx: fix a return value error in mpc8xx_pic_init | powerpc: 8xx: fix a return value error in mpc8xx_pic_init
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 3c2a39784974fb7dc88cc27b71569d13e45fc4b2, it was introduced in version v5.2 by commit cc76404feaed597bb4f5234d34d3f49e2d1139bf. For more details please see the references link. | null | 2022-04-25T03:59:03.392918Z | 2022-04-24T22:09:23.434207Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cc76404feaed597bb4f5234d34d3f49e2d1139bf'} |
Linux | GSD-2022-1000541 | nvme-tcp: fix possible use-after-free in transport error_recovery work | nvme-tcp: fix possible use-after-free in transport error_recovery work
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit bb0d8fb35c4ff00a503c2c4dca4cce8d102a21c4. For more details please see the references link. | null | 2022-03-07T01:56:59.244224Z | 2022-02-27T03:21:11.173021Z | null | null | null | null | null |
Linux | GSD-2021-1001186 | virtio-blk: Fix memory leak among suspend/resume procedure | virtio-blk: Fix memory leak among suspend/resume procedure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.4 by commit 29a2f4a3214aa14d61cc9737c9f886dae9dbb710. For more details please see the references link. | null | 2021-12-19T23:30:53.198360Z | 2021-08-03T01:33:21.218297Z | null | null | null | null | null |
Linux | GSD-2022-1000111 | ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() | ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.265 by commit 54abca038e287d3746dd40016514670a7f654c5c. For more details please see the references link. | null | 2022-02-20T02:16:47.221164Z | 2022-02-18T21:42:19.865549Z | null | null | null | null | null |
Linux | GSD-2022-1000384 | vt_ioctl: fix array_index_nospec in vt_setactivate | vt_ioctl: fix array_index_nospec in vt_setactivate
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.101 by commit 778302ca09498b448620edd372dc908bebf80bdf. For more details please see the references link. | null | 2022-03-07T02:18:16.225308Z | 2022-02-27T02:59:45.346268Z | null | null | null | null | null |
Linux | GSD-2021-1001313 | net: fix uninit-value in caif_seqpkt_sendmsg | net: fix uninit-value in caif_seqpkt_sendmsg
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.136 by commit 9413c0abb57f70a953b1116318d6aa478013c35d, it was introduced in version v2.6.35 by commit bece7b2398d073d11b2e352405a3ecd3a1e39c60. For more details please see the references link. | null | 2021-12-20T00:28:47.204096Z | 2021-08-03T02:05:59.413470Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bece7b2398d073d11b2e352405a3ecd3a1e39c60'} |
Linux | GSD-2022-1002213 | ARM: mmp: Fix failure to remove sram device | ARM: mmp: Fix failure to remove sram device
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 11186875ba8fcfeec7ece310871f5ffbde20a556. For more details please see the references link. | null | 2022-04-25T05:17:18.744359Z | 2022-04-24T22:22:28.063040Z | null | null | null | null | null |
Linux | GSD-2021-1000851 | isdn: mISDN: netjet: Fix crash in nj_probe: | isdn: mISDN: netjet: Fix crash in nj_probe:
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.237 by commit a0a37e4454ca1c0b424edc2c9c2487c2c46a1be6. For more details please see the references link. | null | 2021-12-19T23:50:16.755102Z | 2021-06-30T00:01:20.804832Z | null | null | null | null | null |
Linux | GSD-2021-1001743 | HID: amd_sfh: Fix potential NULL pointer dereference | HID: amd_sfh: Fix potential NULL pointer dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit 283e4bee701dfcd409dd293f19a268bb2bc8ff38. For more details please see the references link. | null | 2021-12-20T01:14:56.151028Z | 2021-10-19T16:34:33.695455Z | null | null | null | null | null |
Linux | GSD-2022-1001595 | samples/landlock: Fix path_list memory leak | samples/landlock: Fix path_list memory leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 49b0d8bf05809df5f87e5c03e26d74bdfdab4571. For more details please see the references link. | null | 2022-04-25T05:24:56.072093Z | 2022-04-24T21:27:06.706340Z | null | null | null | null | null |
Linux | GSD-2021-1000502 | RDMA/core: Prevent divide-by-zero error triggered by the user | RDMA/core: Prevent divide-by-zero error triggered by the user
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.7 by commit e6871b4270c05f8b212e7d98aee82b357972c80a, it was introduced in version v5.10 by commit 9f85cbe50aa044a46f0a22fda323fa27b80c82da. For more details please see the references link. | null | 2021-12-19T22:24:41.751272Z | 2021-05-31T23:47:11.750443Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9f85cbe50aa044a46f0a22fda323fa27b80c82da'} |
Linux | GSD-2021-1002495 | rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle() | rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.84 by commit 35b40f724c4ef0f683d94dab3af9ab38261d782b, it was introduced in version v5.10 by commit 245500d853e9f20036cec7df4f6984ece4c6bf26. For more details please see the references link. | null | 2021-12-19T23:36:35.269150Z | 2021-12-19T19:39:50.440650Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/245500d853e9f20036cec7df4f6984ece4c6bf26'} |
Linux | GSD-2021-1000152 | mtd: physmap: physmap-bt1-rom: Fix unintentional stack access | mtd: physmap: physmap-bt1-rom: Fix unintentional stack access
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.36 by commit 34ec706bf0b7c4ca249a729c1bcb91f706c7a7be, it was introduced in version v5.10 by commit b3e79e7682e075326df8041b826b03453acacd0a. For more details please see the references link. | null | 2021-12-19T22:19:14.159403Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b3e79e7682e075326df8041b826b03453acacd0a'} |
Linux | GSD-2021-1000447 | netfilter: nftables: avoid overflows in nft_hash_buckets() | netfilter: nftables: avoid overflows in nft_hash_buckets()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.191 by commit efcd730ddd6f25578bd31bfe703e593e2421d708, it was introduced in version v4.9 by commit 0ed6389c483dc77cdbdd48de0ca7ce41723dd667. For more details please see the references link. | null | 2021-12-20T01:05:15.265255Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0ed6389c483dc77cdbdd48de0ca7ce41723dd667'} |
Linux | GSD-2021-1002180 | mm, slub: fix potential memoryleak in kmem_cache_open() | mm, slub: fix potential memoryleak in kmem_cache_open()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 9037c57681d25e4dcc442d940d6dbe24dd31f461, it was introduced in version v4.8 by commit 210e7a43fa905bccafa9bb5966fba1d71f33eb8b. For more details please see the references link. | null | 2021-12-20T00:43:15.948353Z | 2021-11-14T15:23:28.748514Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/210e7a43fa905bccafa9bb5966fba1d71f33eb8b'} |
Linux | GSD-2022-1001080 | drm/amdkfd: Ensure mm remain valid in svm deferred_list work | drm/amdkfd: Ensure mm remain valid in svm deferred_list work
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 699d03880a8c52912d0899b4d0c8936db7cb5038. For more details please see the references link. | null | 2022-04-25T04:19:14.835625Z | 2022-04-24T20:43:54.587107Z | null | null | null | null | null |
Linux | GSD-2021-1000017 | net: Make tcp_allowed_congestion_control readonly in non-init netns | net: Make tcp_allowed_congestion_control readonly in non-init netns
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.16 by commit 1ccdf1bed140820240e383ba0accc474ffc7f006, it was introduced in version v5.7 by commit 9cb8e048e5d93825ec5e8dfb5b8df4987ea25745. For more details please see the references link. | null | 2021-12-20T00:55:24.460822Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9cb8e048e5d93825ec5e8dfb5b8df4987ea25745'} |
Linux | GSD-2021-1001256 | dma-buf/sync_file: Don't leak fences on merge failure | dma-buf/sync_file: Don't leak fences on merge failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.53 by commit 0d514185ae792d3a1903c8e1a83899aa996705ce, it was introduced in version v4.9 by commit a02b9dc90d844cc7df7b63264e7920cc425052d9. For more details please see the references link. | null | 2021-12-20T01:09:21.170996Z | 2021-08-03T01:49:38.295977Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a02b9dc90d844cc7df7b63264e7920cc425052d9'} |
Linux | GSD-2022-1001829 | Bluetooth: hci_uart: add missing NULL check in h5_enqueue | Bluetooth: hci_uart: add missing NULL check in h5_enqueue
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 7235485433d290367d60ae22fcdfc565e61d42ab, it was introduced in version v5.15 by commit d9dd833cf6d29695682ec7e7924c0d0992b906bc. For more details please see the references link. | null | 2022-04-25T04:28:37.821493Z | 2022-04-24T21:45:58.525993Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9dd833cf6d29695682ec7e7924c0d0992b906bc'} |
Linux | GSD-2022-1001983 | NFS: Avoid writeback threads getting stuck in mempool_alloc() | NFS: Avoid writeback threads getting stuck in mempool_alloc()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit c74e2f6ecc51bd08bb5b0335477dba954a50592e. For more details please see the references link. | null | 2022-04-25T04:51:59.362460Z | 2022-04-24T22:00:56.811232Z | null | null | null | null | null |
Linux | GSD-2022-1000691 | btrfs: do not WARN_ON() if we have PageError set | btrfs: do not WARN_ON() if we have PageError set
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.13 by commit 9efcc83b33b576302147634eca9bece8e3737e34. For more details please see the references link. | null | 2022-03-18T02:52:07.075140Z | 2022-03-18T00:09:51.001331Z | null | null | null | null | null |
Linux | GSD-2021-1000914 | batman-adv: Avoid WARN_ON timing related checks | batman-adv: Avoid WARN_ON timing related checks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.128 by commit e7fbd8184fa9e85f0d648c499841cb7ff6dec9f4, it was introduced in version v3.14 by commit ef0a937f7a1450d3a133ccd83c9c7d07587e7a00. For more details please see the references link. | null | 2021-12-19T23:15:19.345751Z | 2021-06-30T00:06:13.074362Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef0a937f7a1450d3a133ccd83c9c7d07587e7a00'} |
Linux | GSD-2021-1001606 | blk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd | blk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.150 by commit d12ddd843f1877de1f7dd2aeea4907cf9ff3ac08. For more details please see the references link. | null | 2021-12-19T22:58:34.235432Z | 2021-10-19T16:27:57.404286Z | null | null | null | null | null |
Linux | GSD-2022-1002356 | power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init | power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit db3a61ef8e6aef3b888baa6a85926c2230c2cc56, it was introduced in version v4.9 by commit 8c0984e5a75337df513047ec92a6c09d78e3e5cd. For more details please see the references link. | null | 2022-04-25T03:18:59.571494Z | 2022-04-24T22:37:58.408159Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c0984e5a75337df513047ec92a6c09d78e3e5cd'} |
Linux | GSD-2021-1002303 | selinux: fix NULL-pointer dereference when hashtab allocation fails | selinux: fix NULL-pointer dereference when hashtab allocation fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit 83c8ab8503adf56bf68dafc7a382f4946c87da79, it was introduced in version v5.8 by commit 03414a49ad5f3c56988c36d2070e402ffa17feaf. For more details please see the references link. | null | 2021-12-20T00:08:45.761161Z | 2021-11-29T02:37:48.264823Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/03414a49ad5f3c56988c36d2070e402ffa17feaf'} |
Linux | GSD-2022-1001653 | scsi: target: tcmu: Fix possible page UAF | scsi: target: tcmu: Fix possible page UAF
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.35 by commit b7f3b5d70c834f49f7d87a2f2ed1c6284d9a0322. For more details please see the references link. | null | 2022-04-25T05:40:49.495379Z | 2022-04-24T21:31:52.851048Z | null | null | null | null | null |
Linux | GSD-2022-1000941 | xfrm: fix MTU regression | xfrm: fix MTU regression
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.305 by commit 80080bbcb25d386add6482aea9969e89834a8678, it was introduced in version v4.9.79 by commit fb50d8c9169ee0e90cd7a733d65cb86876d795c7. For more details please see the references link. | null | 2022-03-18T02:54:44.667924Z | 2022-03-18T00:34:54.044077Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb50d8c9169ee0e90cd7a733d65cb86876d795c7'} |
Linux | GSD-2021-1002753 | sit: do not call ipip6_dev_free() from sit_init_net() | sit: do not call ipip6_dev_free() from sit_init_net()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit 44a6c846bc3a7efe7d394bab8b2ae3b7f580e190, it was introduced in version v4.12 by commit cf124db566e6b036b8bcbe8decbed740bdfac8c6. For more details please see the references link. | null | 2022-01-11T05:49:06.281853Z | 2021-12-27T05:48:20.929483Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cf124db566e6b036b8bcbe8decbed740bdfac8c6'} |
Linux | GSD-2022-1001203 | Revert "RDMA/core: Fix ib_qp_usecnt_dec() called when error" | Revert "RDMA/core: Fix ib_qp_usecnt_dec() called when error"
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 7826a1f517e17fe47b33cd7fb2efeff2f1913d6b, it was introduced in version v5.17.2 by commit a75a91a3ac514cc2c849a4bb8141e6cbf2573da5. For more details please see the references link. | null | 2022-04-24T20:53:23.800904Z | 2022-04-24T20:53:23.800904Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a75a91a3ac514cc2c849a4bb8141e6cbf2573da5'} |
Linux | GSD-2021-1000294 | spi: stm32: Fix use-after-free on unbind | spi: stm32: Fix use-after-free on unbind
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 7bd798abad613855f80f7a205a60ccad17ad9487, it was introduced in version v5.12.4 by commit 1251ef565c1e31541019248a95eea5ffd5baa616. For more details please see the references link. | null | 2021-06-24T22:55:39.184950Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1251ef565c1e31541019248a95eea5ffd5baa616'} |
Linux | GSD-2022-1000042 | i2c: validate user data in compat ioctl | i2c: validate user data in compat ioctl
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.90 by commit 8d31cbab4c295d7010ebb729e9d02d0e9cece18f, it was introduced in version v4.15 by commit 7d5cb45655f2e9e37ef75d18f50c0072ef14a38b. For more details please see the references link. | null | 2022-01-11T05:47:35.463114Z | 2022-01-10T19:51:31.207700Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7d5cb45655f2e9e37ef75d18f50c0072ef14a38b'} |
Linux | GSD-2022-1000412 | NFSD: Fix ia_size underflow | NFSD: Fix ia_size underflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit 8e0ecaf7a7e57b30284d6b3289cc436100fadc48. For more details please see the references link. | null | 2022-03-07T02:55:12.024661Z | 2022-02-27T03:02:57.076848Z | null | null | null | null | null |
Linux | GSD-2021-1001485 | media: zr364xx: fix memory leak in zr364xx_start_readpipe | media: zr364xx: fix memory leak in zr364xx_start_readpipe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.276 by commit c57b2bd3247925e253729dce283d6bf6abc9339d, it was introduced in version v2.6.32 by commit ccbf035ae5de4c535160fc99f73feb44cc55b534. For more details please see the references link. | null | 2021-12-19T23:31:59.162014Z | 2021-08-03T02:55:30.711781Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ccbf035ae5de4c535160fc99f73feb44cc55b534'} |
Linux | GSD-2022-1000107 | rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() | rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.265 by commit 7d9211678c0f0624f74cdff36117ab8316697bb8, it was introduced in version v3.14 by commit ba7d49b1f0f8e5f24294a880ed576964059af5ef. For more details please see the references link. | null | 2022-02-20T02:01:59.932226Z | 2022-02-18T21:35:59.447624Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ba7d49b1f0f8e5f24294a880ed576964059af5ef'} |
Linux | GSD-2021-1001190 | watchdog: Fix possible use-after-free by calling del_timer_sync() | watchdog: Fix possible use-after-free by calling del_timer_sync()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.4 by commit 1a053c4d716898a53c2e31c574a70ea0c37044a3. For more details please see the references link. | null | 2021-12-19T23:21:43.294707Z | 2021-08-03T01:33:42.412493Z | null | null | null | null | null |
Linux | GSD-2022-1000557 | net: mscc: ocelot: fix use-after-free in ocelot_vlan_del() | net: mscc: ocelot: fix use-after-free in ocelot_vlan_del()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit c98bed60cdd7f22237ae256cc9c1c3087206b8a2, it was introduced in version v5.16 by commit d4004422f6f9fa8e55c04482008c1c9f9edd2d19. For more details please see the references link. | null | 2022-03-07T01:43:09.863965Z | 2022-02-27T03:23:40.762363Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d4004422f6f9fa8e55c04482008c1c9f9edd2d19'} |
Linux | GSD-2022-1002090 | ext2: correct max file size computing | ext2: correct max file size computing
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 9ffa07c699a72fc351620ee3cf6797d1a8abe37f, it was introduced in version v5.1 by commit 1c2d14212b15a60300a2d4f6364753e87394c521. For more details please see the references link. | null | 2022-04-25T03:10:41.431482Z | 2022-04-24T22:09:58.232613Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c2d14212b15a60300a2d4f6364753e87394c521'} |
Linux | GSD-2022-1001716 | MIPS: fix fortify panic when copying asm exception handlers | MIPS: fix fortify panic when copying asm exception handlers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 9b85e31309c2fe0f21c181ef7eaf2368c61565fb. For more details please see the references link. | null | 2022-04-25T06:31:00.111214Z | 2022-04-24T21:37:24.994538Z | null | null | null | null | null |
Linux | GSD-2022-1000804 | spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() | spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.26 by commit 3c32405d6474a21f7d742828e73c13e326dcae82, it was introduced in version v5.2 by commit 67dca5e580f1e93a66177389981541cac208c817. For more details please see the references link. | null | 2022-03-18T03:00:13.232035Z | 2022-03-18T00:19:58.184492Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/67dca5e580f1e93a66177389981541cac208c817'} |
Linux | GSD-2021-1000781 | ocfs2: fix data corruption by fallocate | ocfs2: fix data corruption by fallocate
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.43 by commit c8d5faee46242c3f33b8a71a4d7d52214785bfcc, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T23:11:05.212177Z | 2021-06-25T00:05:13.840213Z | null | null | null | null | null |
Linux | GSD-2021-1001893 | netfilter: xt_IDLETIMER: fix panic that occurs when timer_type has garbage value | netfilter: xt_IDLETIMER: fix panic that occurs when timer_type has garbage value
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit cae7cab804c943d723d52724a3aeb07a3f4a2650, it was introduced in version v5.7 by commit 68983a354a655c35d3fb204489d383a2a051fda7. For more details please see the references link. | null | 2021-12-19T22:09:29.528986Z | 2021-10-28T13:54:27.029129Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/68983a354a655c35d3fb204489d383a2a051fda7'} |
Linux | GSD-2021-1002246 | x86/hyperv: Fix NULL deref in set_hv_tscchange_cb() if Hyper-V setup fails | x86/hyperv: Fix NULL deref in set_hv_tscchange_cb() if Hyper-V setup fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.218 by commit b20ec58f8a6f4fef32cc71480ddf824584e24743, it was introduced in version v4.16 by commit 93286261de1b46339aa27cd4c639b21778f6cade. For more details please see the references link. | null | 2021-12-19T22:42:04.461675Z | 2021-11-29T02:35:13.003409Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/93286261de1b46339aa27cd4c639b21778f6cade'} |
Linux | GSD-2022-1001346 | btrfs: fix qgroup reserve overflow the qgroup limit | btrfs: fix qgroup reserve overflow the qgroup limit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 6bfff81286d4491f02dad7814bae5c77c9ad2320. For more details please see the references link. | null | 2022-04-25T05:57:08.148504Z | 2022-04-24T21:06:28.298402Z | null | null | null | null | null |
Linux | GSD-2021-1002616 | xen/blkfront: harden blkfront against event channel storms | xen/blkfront: harden blkfront against event channel storms
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.296 by commit 3e04b9e6aa7d77287e70a400be83060d2b7b2cfe. For more details please see the references link. | null | 2022-01-11T06:49:39.019760Z | 2021-12-27T05:27:22.019308Z | null | null | null | null | null |
Linux | GSD-2021-1001939 | isdn: cpai: check ctr->cnr to avoid array index out of bound | isdn: cpai: check ctr->cnr to avoid array index out of bound
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.288 by commit 24219a977bfe3d658687e45615c70998acdbac5a. For more details please see the references link. | null | 2021-12-20T00:24:16.979834Z | 2021-11-14T15:12:32.406287Z | null | null | null | null | null |
Linux | GSD-2022-1001192 | ax25: Fix refcount leaks caused by ax25_cb_del() | ax25: Fix refcount leaks caused by ax25_cb_del()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 534156dd4ed768e30a43de0036f45dca7c54818f, it was introduced in version v5.17 by commit d01ffb9eee4af165d83b08dd73ebdf9fe94a519b. For more details please see the references link. | null | 2022-04-25T06:13:52.436341Z | 2022-04-24T20:52:25.331777Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d01ffb9eee4af165d83b08dd73ebdf9fe94a519b'} |
Linux | GSD-2021-1000105 | tpm: efi: Use local variable for calculating final log size | tpm: efi: Use local variable for calculating final log size
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.20 by commit 3818b753277f5ca0c170bf5b98e0a5a225542fcb, it was introduced in version v5.3 by commit 166a2809d65b282272c474835ec22c882a39ca1b. For more details please see the references link. | null | 2021-12-19T22:21:32.227728Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/166a2809d65b282272c474835ec22c882a39ca1b'} |
Linux | GSD-2021-1002138 | RDMA/mlx5: Initialize the ODP xarray when creating an ODP MR | RDMA/mlx5: Initialize the ODP xarray when creating an ODP MR
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.16 by commit 5f6995295f65d1ee6f36d466d26afd98eb797afe, it was introduced in version v5.13 by commit a639e66703ee45745dc4057c7c2013ed9e1963a7. For more details please see the references link. | null | 2021-12-20T01:21:31.864088Z | 2021-11-14T15:21:36.790847Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a639e66703ee45745dc4057c7c2013ed9e1963a7'} |
Linux | GSD-2022-1001468 | ntfs: add sanity check on allocation size | ntfs: add sanity check on allocation size
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 115fae2c1566eacc5ad2055f72521354612e72c3. For more details please see the references link. | null | 2022-04-25T05:21:49.163356Z | 2022-04-24T21:15:18.471958Z | null | null | null | null | null |
Linux | GSD-2021-1000555 | tipc: wait and exit until all work queues are done | tipc: wait and exit until all work queues are done
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit b9f5b7ad4ac3af006443f535b1ce7bff1d130d7d, it was introduced in version v4.1 by commit d0f91938bede204a343473792529e0db7d599836. For more details please see the references link. | null | 2021-12-19T23:08:25.980229Z | 2021-06-04T19:38:04.904951Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0f91938bede204a343473792529e0db7d599836'} |
Linux | GSD-2021-1002568 | net/smc: fix wrong list_del in smc_lgr_cleanup_early | net/smc: fix wrong list_del in smc_lgr_cleanup_early
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.7 by commit 95518fe354d712dca6f431cf2a11b8f63bc9a66c, it was introduced in version v5.5 by commit a0a62ee15a829ebf8aeec55a4f1688230439b3e0. For more details please see the references link. | null | 2021-12-20T00:59:32.479716Z | 2021-12-19T19:43:09.670536Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a0a62ee15a829ebf8aeec55a4f1688230439b3e0'} |
Linux | GSD-2021-1002092 | mptcp: fix possible stall on recvmsg() | mptcp: fix possible stall on recvmsg()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit 1a4554e94f0deff9fc1dc5addf93fa579cc29711, it was introduced in version v5.6 by commit 7a6a6cbc3e592e339ad23e4e8ede9a3f6160bda8. For more details please see the references link. | null | 2021-12-20T01:14:13.795718Z | 2021-11-14T15:19:27.800646Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7a6a6cbc3e592e339ad23e4e8ede9a3f6160bda8'} |
Linux | GSD-2022-1001038 | ceph: fix memory leak in ceph_readdir when note_last_dentry returns error | ceph: fix memory leak in ceph_readdir when note_last_dentry returns error
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 7f740ede35132d3d5d19747cad56a511d21bb156. For more details please see the references link. | null | 2022-04-25T06:38:07.182696Z | 2022-04-24T20:41:40.888270Z | null | null | null | null | null |
Linux | GSD-2022-1001891 | crypto: ccree - Fix use after free in cc_cipher_exit() | crypto: ccree - Fix use after free in cc_cipher_exit()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 335bf1fc74f775a8255257aa3e33763f2257b676, it was introduced in version v4.17 by commit 63ee04c8b491ee148489347e7da9fbfd982ca2bb. For more details please see the references link. | null | 2022-04-25T04:55:55.495170Z | 2022-04-24T21:52:30.657798Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63ee04c8b491ee148489347e7da9fbfd982ca2bb'} |
Linux | GSD-2022-1000783 | riscv: Fix config KASAN && DEBUG_VIRTUAL | riscv: Fix config KASAN && DEBUG_VIRTUAL
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.27 by commit 728fb555882baf12399764c6a19b33c6a286410f, it was introduced in version v5.6 by commit 8ad8b72721d0f07fa02dbe71f901743f9c71c8e6. For more details please see the references link. | null | 2022-03-18T02:56:43.679584Z | 2022-03-18T00:17:48.501965Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ad8b72721d0f07fa02dbe71f901743f9c71c8e6'} |
Linux | GSD-2021-1000806 | wireguard: allowedips: free empty intermediate nodes when removing single node | wireguard: allowedips: free empty intermediate nodes when removing single node
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit 5ceb59f40c094e6de1265c1d0e4bd560f692e272, it was introduced in version v5.6 by commit e7096c131e5161fa3b8e52a650d7719d2857adfd. For more details please see the references link. | null | 2021-12-20T00:43:18.768642Z | 2021-06-25T00:08:34.499105Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e7096c131e5161fa3b8e52a650d7719d2857adfd'} |
Linux | GSD-2021-1001714 | HID: betop: fix slab-out-of-bounds Write in betop_probe | HID: betop: fix slab-out-of-bounds Write in betop_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit 708107b80aa616976d1c5fa60ac0c1390749db5e. For more details please see the references link. | null | 2021-12-20T00:07:09.051489Z | 2021-10-19T16:33:11.364312Z | null | null | null | null | null |
Linux | GSD-2022-1002244 | powerpc: 8xx: fix a return value error in mpc8xx_pic_init | powerpc: 8xx: fix a return value error in mpc8xx_pic_init
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 6f259b1a4ab04261d9a471c9cc9ab8cd8d53007f, it was introduced in version v5.2 by commit cc76404feaed597bb4f5234d34d3f49e2d1139bf. For more details please see the references link. | null | 2022-04-25T04:51:13.741527Z | 2022-04-24T22:25:20.413860Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cc76404feaed597bb4f5234d34d3f49e2d1139bf'} |
Linux | GSD-2022-1000279 | selinux: fix double free of cond_list on error paths | selinux: fix double free of cond_list on error paths
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.22 by commit 70caa32e6d81f45f0702070c0e4dfe945e92fbd7. For more details please see the references link. | null | 2022-02-20T02:07:40.793099Z | 2022-02-18T22:05:31.454351Z | null | null | null | null | null |
Linux | GSD-2021-1001344 | cgroup: verify that source is a string | cgroup: verify that source is a string
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.134 by commit c17363ccd620c1a57ede00d5c777f0b8624debe6, it was introduced in version v5.1 by commit 8d2451f4994fa60a57617282bab91b98266a00b1. For more details please see the references link. | null | 2021-12-19T22:49:34.050089Z | 2021-08-03T02:13:41.184321Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8d2451f4994fa60a57617282bab91b98266a00b1'} |
Linux | GSD-2022-1000629 | powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending | powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.5 by commit fa4ad064a6bd49208221df5e62adf27b426d1720, it was introduced in version v5.16.3 by commit 215a90ce3754fe509efbce6b73a4bb643c7e7528. For more details please see the references link. | null | 2022-03-07T01:43:50.393384Z | 2022-02-27T03:33:09.852482Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/215a90ce3754fe509efbce6b73a4bb643c7e7528'} |
Linux | GSD-2022-1002301 | btrfs: fix qgroup reserve overflow the qgroup limit | btrfs: fix qgroup reserve overflow the qgroup limit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit f3d97b22a708bf9e3f3ac2ba232bcefd0b0c136b. For more details please see the references link. | null | 2022-04-25T03:44:10.547802Z | 2022-04-24T22:32:09.082302Z | null | null | null | null | null |
Linux | GSD-2021-1000943 | dm verity: fix require_signatures module_param permissions | dm verity: fix require_signatures module_param permissions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.44 by commit 90547d5db50bcb2705709e420e0af51535109113. For more details please see the references link. | null | 2021-12-19T23:16:22.426704Z | 2021-06-30T00:26:04.217050Z | null | null | null | null | null |
Linux | GSD-2021-1001651 | RDMA/cma: Fix listener leak in rdma_cma_listen_on_all() failure | RDMA/cma: Fix listener leak in rdma_cma_listen_on_all() failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.71 by commit 3f4e68902d2e545033c80d7ad62fd9a439e573f4, it was introduced in version v5.10.4 by commit 70ba8b1697e35c04ea5f22edb6e401aeb1208d96. For more details please see the references link. | null | 2021-12-19T23:31:41.701926Z | 2021-10-19T16:30:02.776155Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/70ba8b1697e35c04ea5f22edb6e401aeb1208d96'} |
Linux | GSD-2022-1000296 | libsubcmd: Fix use-after-free for realloc(..., 0) | libsubcmd: Fix use-after-free for realloc(..., 0)
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.303 by commit 3c5ba8d82f5c4df4fbe30e6c5fff49853dad19d1, it was introduced in version v4.5 by commit 2f4ce5ec1d447beb42143a9653716a2ab025161e. For more details please see the references link. | null | 2022-03-07T01:43:07.924322Z | 2022-02-27T02:47:42.240535Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2f4ce5ec1d447beb42143a9653716a2ab025161e'} |
Linux | GSD-2021-1001201 | scsi: megaraid_sas: Fix resource leak in case of probe failure | scsi: megaraid_sas: Fix resource leak in case of probe failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.4 by commit e623f79691c5104317669ab36ec316a90c05062f. For more details please see the references link. | null | 2021-12-19T23:45:13.591350Z | 2021-08-03T01:35:58.594542Z | null | null | null | null | null |
Linux | GSD-2021-1002587 | can: m_can: m_can_read_fifo: fix memory leak in error branch | can: m_can: m_can_read_fifo: fix memory leak in error branch
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.8 by commit 75a422165477dd12d2d20aa7c9ee7c9a281c9908, it was introduced in version v5.15 by commit e39381770ec9ca3c51d8b9bd9cc6e01d78ea974a. For more details please see the references link. | null | 2021-12-19T22:20:47.820719Z | 2021-12-19T19:43:54.185229Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e39381770ec9ca3c51d8b9bd9cc6e01d78ea974a'} |
Linux | GSD-2022-1001487 | net/sched: act_ct: fix ref leak when switching zones | net/sched: act_ct: fix ref leak when switching zones
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 4bb42d73def9411e5cad885b9811987d72431df1, it was introduced in version v5.16.12 by commit e9408de00e5ecd0dbe91cf061c7da23711c4febb. For more details please see the references link. | null | 2022-04-25T06:16:52.176046Z | 2022-04-24T21:16:14.220781Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e9408de00e5ecd0dbe91cf061c7da23711c4febb'} |
Linux | GSD-2021-1000410 | i40e: Fix use-after-free in i40e_client_subtask() | i40e: Fix use-after-free in i40e_client_subtask()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.120 by commit d718c15a2bf9ae082d5ae4d177fb19ef23cb4132, it was introduced in version v4.16 by commit 7b0b1a6d0ac983ce1928432285d0222d4fb7c38b. For more details please see the references link. | null | 2021-12-19T23:12:39.604527Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7b0b1a6d0ac983ce1928432285d0222d4fb7c38b'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.