ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2022-1000445 | perf: Fix list corruption in perf_cgroup_switch() | perf: Fix list corruption in perf_cgroup_switch()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit 7969fe91c9830e045901970e9d755b7505881d4a, it was introduced in version v4.11 by commit 058fe1c0440e68a1ba3c2270ae43e9f0298b27d8. For more details please see the references link. | null | 2022-03-07T01:34:28.762184Z | 2022-02-27T03:08:08.172897Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/058fe1c0440e68a1ba3c2270ae43e9f0298b27d8'} |
Linux | GSD-2022-1002478 | dm ioctl: prevent potential spectre v1 gadget | dm ioctl: prevent potential spectre v1 gadget
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit 76c94651005f58885facf9c973007f5ea01ab01f. For more details please see the references link. | null | 2022-04-25T05:17:52.394135Z | 2022-04-24T22:52:32.661943Z | null | null | null | null | null |
Linux | GSD-2021-1001128 | s390/stack: fix possible register corruption with stack switch helper | s390/stack: fix possible register corruption with stack switch helper
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.47 by commit 5fd0c2cf7b11c23aebbbc512cfed08485f0a422a, it was introduced in version v4.20 by commit ff340d2472ec7618443913928af9fb85a7009270. For more details please see the references link. | null | 2021-12-20T01:30:36.536162Z | 2021-07-08T01:58:20.132359Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ff340d2472ec7618443913928af9fb85a7009270'} |
Linux | GSD-2022-1002182 | qede: confirm skb is allocated before using | qede: confirm skb is allocated before using
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 034a92c6a81048128fc7b18d278d52438a13902a, it was introduced in version v4.18 by commit 8a8633978b842c88fbcfe00d4e5dde96048f630e. For more details please see the references link. | null | 2022-04-25T06:09:23.513587Z | 2022-04-24T22:19:35.870657Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8a8633978b842c88fbcfe00d4e5dde96048f630e'} |
Linux | GSD-2022-1000015 | binder: fix async_free_space accounting for empty parcels | binder: fix async_free_space accounting for empty parcels
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.261 by commit 2d2df539d05205fd83c404d5f2dff48d36f9b495, it was introduced in version v4.14 by commit 74310e06be4d74dcf67cd108366710dee5c576d5. For more details please see the references link. | null | 2022-01-11T05:56:43.576990Z | 2022-01-10T19:50:15.580101Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/74310e06be4d74dcf67cd108366710dee5c576d5'} |
Linux | GSD-2022-1002028 | wireguard: socket: free skb in send6 when ipv6 is disabled | wireguard: socket: free skb in send6 when ipv6 is disabled
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 096f9d35cac0a0c95ffafc00db84786b665a4837, it was introduced in version v5.6 by commit e7096c131e5161fa3b8e52a650d7719d2857adfd. For more details please see the references link. | null | 2022-04-25T03:35:41.228898Z | 2022-04-24T22:04:14.182205Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e7096c131e5161fa3b8e52a650d7719d2857adfd'} |
Linux | GSD-2021-1001082 | x86/fpu: Prevent state corruption in __fpu__restore_sig() | x86/fpu: Prevent state corruption in __fpu__restore_sig()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit ec25ea1f3f05d6f8ee51d1277efea986eafd4f2a, it was introduced in version v5.8 by commit b860eb8dce5906b14e3a7f3c771e0b3d6ef61b94. For more details please see the references link. | null | 2021-12-19T23:02:37.729304Z | 2021-06-30T00:38:25.011601Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b860eb8dce5906b14e3a7f3c771e0b3d6ef61b94'} |
Linux | GSD-2021-1001578 | bpf, s390: Fix potential memory leak about jit_data | bpf, s390: Fix potential memory leak about jit_data
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.153 by commit a326f9c01cfbee4450ae49ce618ae6cbc0f76842, it was introduced in version v5.4 by commit 1c8f9b91c456f5b47a377a0c8c5d4130fc39433a. For more details please see the references link. | null | 2021-12-19T23:53:24.223556Z | 2021-10-19T16:24:37.485594Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c8f9b91c456f5b47a377a0c8c5d4130fc39433a'} |
Linux | GSD-2022-1001254 | ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe | ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 4793a02deb31b71b3984abc67bf1011a03c13b18, it was introduced in version v3.8 by commit 531f67e41dcde1e358cf821d056241a66355cf03. For more details please see the references link. | null | 2022-04-25T06:13:26.470361Z | 2022-04-24T20:58:22.396007Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/531f67e41dcde1e358cf821d056241a66355cf03'} |
Linux | GSD-2021-1002704 | netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc | netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.88 by commit 1a34fb9e2bf3029f7c0882069d67ff69cbd645d8, it was introduced in version v4.16 by commit 395cacb5f1a0a290f1ae9ca4692c400d2b57a705. For more details please see the references link. | null | 2022-01-11T05:53:39.431858Z | 2021-12-27T05:38:07.944597Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/395cacb5f1a0a290f1ae9ca4692c400d2b57a705'} |
Linux | GSD-2021-1000739 | net: caif: fix memory leak in cfusbl_device_notify | net: caif: fix memory leak in cfusbl_device_notify
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.194 by commit 9ea0ab48e755d8f29fe89eb235fb86176fdb597f, it was introduced in version v3.3 by commit 7ad65bf68d705b445ef10b77ab50dab22be185ee. For more details please see the references link. | null | 2021-12-19T23:24:59.466933Z | 2021-06-25T00:00:20.587529Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ad65bf68d705b445ef10b77ab50dab22be185ee'} |
Linux | GSD-2022-1001604 | ASoC: SOF: Intel: Fix NULL ptr dereference when ENOMEM | ASoC: SOF: Intel: Fix NULL ptr dereference when ENOMEM
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 09eca322d4118dc26570ca6100fa34e59e5a5143, it was introduced in version v5.2 by commit d16046ffa6de040bf580a64d5f4d0aa18258a854. For more details please see the references link. | null | 2022-04-25T03:23:57.928894Z | 2022-04-24T21:27:43.125193Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d16046ffa6de040bf580a64d5f4d0aa18258a854'} |
Linux | GSD-2022-1000916 | xen/netfront: react properly to failing gnttab_end_foreign_access_ref() | xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.271 by commit 1b9f4115738af90427a8c94a3980bc52fbb23296. For more details please see the references link. | null | 2022-03-18T02:55:32.573153Z | 2022-03-18T00:31:45.652916Z | null | null | null | null | null |
Linux | GSD-2021-1000693 | serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' | serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.271 by commit c697244ce940ec07e2d745ccb63ca97fc0266fbc, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T23:28:21.827074Z | 2021-06-04T20:03:45.470470Z | null | null | null | null | null |
Linux | GSD-2021-1001981 | ocfs2: mount fails with buffer overflow in strlen | ocfs2: mount fails with buffer overflow in strlen
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.214 by commit 7623b1035ca2d17bde0f6a086ad6844a34648df1. For more details please see the references link. | null | 2021-12-19T22:11:31.964731Z | 2021-11-14T15:14:29.298541Z | null | null | null | null | null |
Linux | GSD-2021-1002354 | staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() | staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.294 by commit d43aecb694b10db9a4228ce2d38b5ae8de374443, it was introduced in version v3.2 by commit 66898177e7e5486dc77a4ba742efa4e2e9e900a4. For more details please see the references link. | null | 2021-12-19T22:44:23.040763Z | 2021-12-19T19:33:40.484289Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/66898177e7e5486dc77a4ba742efa4e2e9e900a4'} |
Linux | GSD-2021-1000369 | nvmet-tcp: fix incorrect locking in state_change sk callback | nvmet-tcp: fix incorrect locking in state_change sk callback
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 60ade0d56b06537a28884745059b3801c78e03bc, it was introduced in version v5.0 by commit 872d26a391da92ed8f0c0f5cb5fef428067b7f30. For more details please see the references link. | null | 2021-12-19T23:13:44.019274Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/872d26a391da92ed8f0c0f5cb5fef428067b7f30'} |
Linux | GSD-2021-1002641 | xen/blkfront: harden blkfront against event channel storms | xen/blkfront: harden blkfront against event channel storms
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.259 by commit 5ac3b68b79c9e964dd6f3cf80ff825518e502b79. For more details please see the references link. | null | 2022-01-11T05:53:06.308251Z | 2021-12-27T05:29:04.591788Z | null | null | null | null | null |
Linux | GSD-2022-1001311 | mm/pages_alloc.c: don't create ZONE_MOVABLE beyond the end of a node | mm/pages_alloc.c: don't create ZONE_MOVABLE beyond the end of a node
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 00fd0bbd8c8f7e3d2d370097b9475aaa3446a25c, it was introduced in version v2.6.23 by commit 2a1e274acf0b1c192face19a4be7c12d4503eaaf. For more details please see the references link. | null | 2022-04-25T06:38:31.021295Z | 2022-04-24T21:03:21.885214Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2a1e274acf0b1c192face19a4be7c12d4503eaaf'} |
Linux | GSD-2021-1000386 | soundwire: stream: fix memory leak in stream config error path | soundwire: stream: fix memory leak in stream config error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 7c468deae306d0cbbd539408c26cfec04c66159a, it was introduced in version v4.18 by commit 89e590535f32d4bc548bcf266f3b046e50942f6d. For more details please see the references link. | null | 2021-12-20T01:02:13.986054Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/89e590535f32d4bc548bcf266f3b046e50942f6d'} |
Linux | GSD-2021-1002211 | isofs: Fix out of bound access for corrupted isofs image | isofs: Fix out of bound access for corrupted isofs image
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.2 by commit e7fb722586a2936b37bdff096c095c30ca06404d. For more details please see the references link. | null | 2021-12-19T22:16:03.534711Z | 2021-11-14T15:24:52.376974Z | null | null | null | null | null |
Linux | GSD-2022-1001741 | ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 | ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit be2f81024e7981565d90a4c9ca3067d11b6bca7f. For more details please see the references link. | null | 2022-04-25T03:26:15.763963Z | 2022-04-24T21:38:37.549362Z | null | null | null | null | null |
Linux | GSD-2022-1000853 | iio: adc: men_z188_adc: Fix a resource leak in an error handling path | iio: adc: men_z188_adc: Fix a resource leak in an error handling path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.103 by commit 1aa12ecfdcbafebc218910ec47acf6262e600cf5, it was introduced in version v3.15 by commit 74aeac4da66fbfa246edbfc849002eac9b5af9ca. For more details please see the references link. | null | 2022-03-18T03:33:48.088277Z | 2022-03-18T00:24:23.418691Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/74aeac4da66fbfa246edbfc849002eac9b5af9ca'} |
Linux | GSD-2022-1000500 | usb: f_fs: Fix use-after-free for epfile | usb: f_fs: Fix use-after-free for epfile
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 3e078b18753669615301d946297bafd69294ad2c, it was introduced in version v4.9 by commit a9e6f83c2df199187a5248f824f31b6787ae23ae. For more details please see the references link. | null | 2022-03-07T01:53:35.092691Z | 2022-02-27T03:15:43.276694Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a9e6f83c2df199187a5248f824f31b6787ae23ae'} |
Linux | GSD-2021-1001597 | hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs | hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.151 by commit a6c42ae1530f94724d3c42cf91fe3d3c5e394f8a, it was introduced in version v4.19 by commit 65afb4c8e7e4e7e74b28efa1df62da503ca3e7a6. For more details please see the references link. | null | 2021-12-20T00:07:43.467204Z | 2021-10-19T16:25:34.862495Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/65afb4c8e7e4e7e74b28efa1df62da503ca3e7a6'} |
Linux | GSD-2022-1002497 | af_netlink: Fix shift out of bounds in group mask calculation | af_netlink: Fix shift out of bounds in group mask calculation
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit e1c5d46f05aa23d740daae5cd3a6472145afac42, it was introduced in version v2.6.14 by commit f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198. For more details please see the references link. | null | 2022-04-25T06:25:44.177124Z | 2022-04-24T22:54:27.597366Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198'} |
Linux | GSD-2022-1000150 | psi: Fix uaf issue when psi trigger is destroyed while being polled | psi: Fix uaf issue when psi trigger is destroyed while being polled
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.177 by commit 2fd752ed77ab9880da927257b73294f29a199f1a, it was introduced in version v5.2 by commit 0e94682b73bfa6c44c98af7a26771c9c08c055d5. For more details please see the references link. | null | 2022-02-19T03:05:24.405657Z | 2022-02-18T21:47:33.442794Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0e94682b73bfa6c44c98af7a26771c9c08c055d5'} |
Linux | GSD-2022-1002479 | netlabel: fix out-of-bounds memory accesses | netlabel: fix out-of-bounds memory accesses
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.163 by commit 1c973f9c7cc2b3caae93192fdc8ecb3f0b4ac000, it was introduced in version v2.6.19 by commit 446fda4f26822b2d42ab3396aafcedf38a9ff2b6. For more details please see the references link. | null | 2022-04-25T04:44:50.005567Z | 2022-04-24T22:52:48.127514Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/446fda4f26822b2d42ab3396aafcedf38a9ff2b6'} |
Linux | GSD-2022-1000444 | mm: memcg: synchronize objcg lists with a dedicated spinlock | mm: memcg: synchronize objcg lists with a dedicated spinlock
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit 956cf21cd1ae1de63dd5850e2e287641cb4cc34a, it was introduced in version v5.9 by commit bf4f059954dcb221384b2f784677e19a13cd4bdb. For more details please see the references link. | null | 2022-03-07T01:34:06.744520Z | 2022-02-27T03:08:01.306871Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf4f059954dcb221384b2f784677e19a13cd4bdb'} |
Linux | GSD-2022-1002183 | drm/imx: Fix memory leak in imx_pd_connector_get_modes | drm/imx: Fix memory leak in imx_pd_connector_get_modes
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit c539a6a5896ed92bfb91494e46996d013f3d5967, it was introduced in version v4.8 by commit 76ecd9c9fb24b014a6f33fbb1287ede3be12158b. For more details please see the references link. | null | 2022-04-25T06:03:32.278170Z | 2022-04-24T22:19:43.967520Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/76ecd9c9fb24b014a6f33fbb1287ede3be12158b'} |
Linux | GSD-2021-1001129 | i2c: robotfuzz-osif: fix control-request directions | i2c: robotfuzz-osif: fix control-request directions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.47 by commit de0af2651daac89dac3eab73bcd1bfd653ccd36f, it was introduced in version v3.14 by commit 83e53a8f120f2f273cf0ad717f5372ab79ac24fe. For more details please see the references link. | null | 2021-12-19T22:54:13.584333Z | 2021-07-08T01:58:24.437886Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/83e53a8f120f2f273cf0ad717f5372ab79ac24fe'} |
Linux | GSD-2021-1001083 | x86/fpu: Invalidate FPU state after a failed XRSTOR from a user buffer | x86/fpu: Invalidate FPU state after a failed XRSTOR from a user buffer
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit 002665dcba4bbec8c82f0aeb4bd3f44334ed2c14, it was introduced in version v5.2 by commit 1d731e731c4cd7cbd3b1aa295f0932e7610da82f. For more details please see the references link. | null | 2021-12-20T01:21:50.178577Z | 2021-06-30T00:38:28.878789Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1d731e731c4cd7cbd3b1aa295f0932e7610da82f'} |
Linux | GSD-2022-1002029 | wireguard: socket: ignore v6 endpoints when ipv6 is disabled | wireguard: socket: ignore v6 endpoints when ipv6 is disabled
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 49f77ab50a31ffad7b61fef01e42d8f105835cdb, it was introduced in version v5.6 by commit e7096c131e5161fa3b8e52a650d7719d2857adfd. For more details please see the references link. | null | 2022-04-25T04:59:31.973360Z | 2022-04-24T22:04:19.467107Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e7096c131e5161fa3b8e52a650d7719d2857adfd'} |
Linux | GSD-2022-1000014 | usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. | usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.296 by commit cc8c8028c21b2a3842a1e98e99e55028df275919, it was introduced in version v4.0 by commit 5e33f6fdf735cda1d4580fe6f1878da05718fe73. For more details please see the references link. | null | 2022-01-11T05:47:35.195793Z | 2022-01-10T19:50:13.084792Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5e33f6fdf735cda1d4580fe6f1878da05718fe73'} |
Linux | GSD-2021-1001579 | i40e: Fix freeing of uninitialized misc IRQ vector | i40e: Fix freeing of uninitialized misc IRQ vector
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.153 by commit 17063cac4088b8e2fc0f633abddca5426ed58312, it was introduced in version v4.15 by commit c17401a1dd210a5f22ab1ec7c7366037c158a14c. For more details please see the references link. | null | 2021-12-20T01:00:29.523637Z | 2021-10-19T16:24:40.180684Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c17401a1dd210a5f22ab1ec7c7366037c158a14c'} |
Linux | GSD-2022-1001255 | ASoC: mediatek: mt8192-mt6359: Fix error handling in mt8192_mt6359_dev_probe | ASoC: mediatek: mt8192-mt6359: Fix error handling in mt8192_mt6359_dev_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 1765787ec02e824f4f5e672cf269280a5da09d2f, it was introduced in version v5.17 by commit 4e28491a7a198c668437f2be8a91a76aa52f20eb. For more details please see the references link. | null | 2022-04-25T03:11:14.353356Z | 2022-04-24T20:58:25.685831Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4e28491a7a198c668437f2be8a91a76aa52f20eb'} |
Linux | GSD-2021-1000738 | net: caif: fix memory leak in caif_device_notify | net: caif: fix memory leak in caif_device_notify
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.194 by commit 3be863c11cab725add9fef4237ed4e232c3fc3bb, it was introduced in version v3.3 by commit 7c18d2205ea76eef9674e59e1ecae4f332a53e9e. For more details please see the references link. | null | 2021-12-19T22:25:32.032417Z | 2021-06-25T00:00:16.839372Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7c18d2205ea76eef9674e59e1ecae4f332a53e9e'} |
Linux | GSD-2021-1002705 | sit: do not call ipip6_dev_free() from sit_init_net() | sit: do not call ipip6_dev_free() from sit_init_net()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.88 by commit 6f46c59e60b64620d5d386c8ee2eaa11ebe3b595, it was introduced in version v4.12 by commit cf124db566e6b036b8bcbe8decbed740bdfac8c6. For more details please see the references link. | null | 2022-01-11T05:53:51.792829Z | 2021-12-27T05:38:10.291623Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cf124db566e6b036b8bcbe8decbed740bdfac8c6'} |
Linux | GSD-2021-1000692 | NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() | NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.271 by commit b291baae24f876acd5a5dd57d0bb2bbac8a68b0c, it was introduced in version v4.0 by commit a7d42ddb3099727f58366fa006f850a219cce6c8. For more details please see the references link. | null | 2021-12-20T00:00:44.806217Z | 2021-06-04T20:03:26.821716Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a7d42ddb3099727f58366fa006f850a219cce6c8'} |
Linux | GSD-2021-1001980 | ocfs2: fix data corruption after conversion from inline format | ocfs2: fix data corruption after conversion from inline format
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.214 by commit a3a089c241cd49b33a8cdd7fcb37cc87a086912a, it was introduced in version v4.19.155 by commit 7ce2b16bad2cbfa3fa7bbc42c4448914f639ca47. For more details please see the references link. | null | 2021-12-20T00:10:50.271626Z | 2021-11-14T15:14:26.946790Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ce2b16bad2cbfa3fa7bbc42c4448914f639ca47'} |
Linux | GSD-2022-1001605 | can: isotp: sanitize CAN ID checks in isotp_bind() | can: isotp: sanitize CAN ID checks in isotp_bind()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit cf522d741f5301223cc94b978eb1603c7590d65e, it was introduced in version v5.10 by commit e057dd3fc20ffb3d7f150af46542a51b59b90127. For more details please see the references link. | null | 2022-04-25T04:58:40.761007Z | 2022-04-24T21:27:47.569662Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e057dd3fc20ffb3d7f150af46542a51b59b90127'} |
Linux | GSD-2022-1000917 | xen/gnttab: fix gnttab_end_foreign_access() without page specified | xen/gnttab: fix gnttab_end_foreign_access() without page specified
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.271 by commit 94b8ccbcc063325d23daa1cea89ef799c8c673e9. For more details please see the references link. | null | 2022-03-18T02:55:38.337544Z | 2022-03-18T00:31:48.068546Z | null | null | null | null | null |
Linux | GSD-2021-1000368 | io_uring: fix overflows checks in provide buffers | io_uring: fix overflows checks in provide buffers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit cbbc13b115b8f18e0a714d89f87fbdc499acfe2d, it was introduced in version v5.8 by commit efe68c1ca8f49e8c06afd74b699411bfbb8ba1ff. For more details please see the references link. | null | 2021-12-19T22:29:52.007618Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/efe68c1ca8f49e8c06afd74b699411bfbb8ba1ff'} |
Linux | GSD-2021-1002355 | proc/vmcore: fix clearing user buffer by properly using clear_user() | proc/vmcore: fix clearing user buffer by properly using clear_user()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.294 by commit a9e164bd160be8cbee1df70acb379129e3cd2e7c, it was introduced in version v3.0 by commit 997c136f518c5debd63847e78e2a8694f56dcf90. For more details please see the references link. | null | 2021-12-20T00:07:17.872461Z | 2021-12-19T19:33:42.891957Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/997c136f518c5debd63847e78e2a8694f56dcf90'} |
Linux | GSD-2021-1002640 | scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select() | scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.259 by commit 90491283b4064220682e4b0687d07b05df01e3bf. For more details please see the references link. | null | 2022-01-11T07:17:48.740788Z | 2021-12-27T05:28:40.069634Z | null | null | null | null | null |
Linux | GSD-2021-1000387 | bus: qcom: Put child node before return | bus: qcom: Put child node before return
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 00f6abd3509b1d70d0ab0fbe65ce5685cebed8be, it was introduced in version v4.9 by commit 335a127548081322bd2b294d715418648912f20c. For more details please see the references link. | null | 2021-12-19T22:15:51.043907Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/335a127548081322bd2b294d715418648912f20c'} |
Linux | GSD-2022-1001310 | jffs2: fix memory leak in jffs2_scan_medium | jffs2: fix memory leak in jffs2_scan_medium
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 82462324bf35b6b553400af1c1aa265069cee28f, it was introduced in version v2.6.15 by commit e631ddba588783edd521c5a89f7b2902772fb691. For more details please see the references link. | null | 2022-04-25T06:16:48.562134Z | 2022-04-24T21:03:09.551980Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e631ddba588783edd521c5a89f7b2902772fb691'} |
Linux | GSD-2021-1002210 | media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt() | media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.1 by commit cb667140875a3b1db92e4c50b4617a7cbf84659b. For more details please see the references link. | null | 2021-12-19T22:36:25.047996Z | 2021-11-14T15:24:50.001497Z | null | null | null | null | null |
Linux | GSD-2022-1001740 | drm/amd/display: Fix memory leak | drm/amd/display: Fix memory leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 7e10369c72db7a0e2f77b2e306aadc07aef6b07a. For more details please see the references link. | null | 2022-04-25T05:53:23.857566Z | 2022-04-24T21:38:34.628160Z | null | null | null | null | null |
Linux | GSD-2022-1000852 | iio: imu: st_lsm6dsx: wait for settling time in st_lsm6dsx_read_oneshot | iio: imu: st_lsm6dsx: wait for settling time in st_lsm6dsx_read_oneshot
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.103 by commit eabcc609cb8accf16a5c53fd9b91a827854b1ca9, it was introduced in version v4.11 by commit 290a6ce11d938be52634b3ce1bbc6b78be4d23c1. For more details please see the references link. | null | 2022-03-18T03:00:35.202082Z | 2022-03-18T00:24:12.602015Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/290a6ce11d938be52634b3ce1bbc6b78be4d23c1'} |
Linux | GSD-2021-1001596 | mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap | mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.151 by commit ab85997465b972d39d9747fc16311fa5773374b2, it was introduced in version v4.7 by commit 646e76bb5daf4ca38438c69ffb72cccb605f3466. For more details please see the references link. | null | 2021-12-20T01:35:13.146395Z | 2021-10-19T16:25:32.096298Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/646e76bb5daf4ca38438c69ffb72cccb605f3466'} |
Linux | GSD-2022-1000501 | misc: fastrpc: avoid double fput() on failed usercopy | misc: fastrpc: avoid double fput() on failed usercopy
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 76f85c307ef9f10aa2cef1b1d5ee654c1f3345fc, it was introduced in version v5.1 by commit 6cffd79504ce040f460831030d3069fa1c99bb71. For more details please see the references link. | null | 2022-03-07T01:35:05.412744Z | 2022-02-27T03:15:50.046455Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6cffd79504ce040f460831030d3069fa1c99bb71'} |
Linux | GSD-2022-1002496 | mxser: fix xmit_buf leak in activate when LSR == 0xff | mxser: fix xmit_buf leak in activate when LSR == 0xff
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit 376922045009f8ea2d20a8fa3475e95b47c41690, it was introduced in version v2.6.33 by commit 6769140d304731f0a3b177470a2adb4bacd9036b. For more details please see the references link. | null | 2022-04-25T04:18:45.467150Z | 2022-04-24T22:54:14.994808Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6769140d304731f0a3b177470a2adb4bacd9036b'} |
Linux | GSD-2022-1000151 | usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS | usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.176 by commit 4fc6519bdecb051afb0d2010e6f548d27830c4c3, it was introduced in version v5.4.126 by commit b4903f7fdc484628d0b8022daf86e2439d3ab4db. For more details please see the references link. | null | 2022-02-19T03:04:20.468800Z | 2022-02-18T21:47:40.237084Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b4903f7fdc484628d0b8022daf86e2439d3ab4db'} |
Linux | GSD-2021-1002139 | staging: rtl8712: fix use-after-free in rtl8712_dl_fw | staging: rtl8712: fix use-after-free in rtl8712_dl_fw
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.18 by commit befd23bd3b17f1a3f9c943a8580b47444c7c63ed, it was introduced in version v3.3 by commit 8c213fa59199f9673d66970d6940fa093186642f. For more details please see the references link. | null | 2021-12-20T00:06:10.168433Z | 2021-11-14T15:21:39.175912Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c213fa59199f9673d66970d6940fa093186642f'} |
Linux | GSD-2021-1000104 | sfc: farch: fix TX queue lookup in TX flush done handling | sfc: farch: fix TX queue lookup in TX flush done handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.20 by commit a1570985ec04116cc665b760faf666a104154170, it was introduced in version v5.10 by commit 12804793b17c0e19115a90d98f2f3df0cb79e233. For more details please see the references link. | null | 2021-12-19T22:51:37.465274Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/12804793b17c0e19115a90d98f2f3df0cb79e233'} |
Linux | GSD-2022-1001193 | powerpc/pseries: Fix use after free in remove_phb_dynamic() | powerpc/pseries: Fix use after free in remove_phb_dynamic()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 895ca4ae1f72e0a0160ab162723e59c9f265ec93, it was introduced in version v4.8 by commit 2dd9c11b9d4dfbd6c070eab7b81197f65e82f1a0. For more details please see the references link. | null | 2022-04-25T06:35:55.027533Z | 2022-04-24T20:52:33.345621Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2dd9c11b9d4dfbd6c070eab7b81197f65e82f1a0'} |
Linux | GSD-2022-1001469 | btrfs: do not clean up repair bio if submit fails | btrfs: do not clean up repair bio if submit fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit e76c78c48902dae6fa612749f59162bca0a79e0b. For more details please see the references link. | null | 2022-04-25T04:23:10.723874Z | 2022-04-24T21:15:21.404331Z | null | null | null | null | null |
Linux | GSD-2021-1002569 | drm/msm/a6xx: Allocate enough space for GMU registers | drm/msm/a6xx: Allocate enough space for GMU registers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.7 by commit 83e54fcf0b14ca2d869dd37abe1bb6542805f538, it was introduced in version v5.9 by commit 142639a52a01e90c512a9a8d2156997e02a65b53. For more details please see the references link. | null | 2021-12-20T01:10:26.107988Z | 2021-12-19T19:43:12.296256Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/142639a52a01e90c512a9a8d2156997e02a65b53'} |
Linux | GSD-2021-1000554 | net/mlx5e: Fix null deref accessing lag dev | net/mlx5e: Fix null deref accessing lag dev
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit bdfd3593a8248eea6ecfcbf7b47b56b86515672d, it was introduced in version v5.8 by commit 7e51891a237f9ea319f53f9beb83afb0077d88e6. For more details please see the references link. | null | 2021-12-19T23:34:04.200149Z | 2021-06-04T19:38:01.257473Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7e51891a237f9ea319f53f9beb83afb0077d88e6'} |
Linux | GSD-2022-1001039 | clk: mediatek: Fix memory leaks on probe | clk: mediatek: Fix memory leaks on probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 02742d1d5c95cff8b6e9379aae4ab12674f7265d. For more details please see the references link. | null | 2022-04-25T03:53:38.649877Z | 2022-04-24T20:41:43.783972Z | null | null | null | null | null |
Linux | GSD-2021-1002093 | ice: fix locking for Tx timestamp tracking flush | ice: fix locking for Tx timestamp tracking flush
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit 61616be899975404df44c20ab902464b60882cd7, it was introduced in version v5.14.4 by commit 46720ac66c21bf85e08823664b7b314b85e43f26. For more details please see the references link. | null | 2021-12-19T22:49:10.786791Z | 2021-11-14T15:19:30.289159Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/46720ac66c21bf85e08823664b7b314b85e43f26'} |
Linux | GSD-2021-1000807 | net: caif: add proper error handling | net: caif: add proper error handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit 88550e9c900b8800f54963ca2c9a6b4744d13e3d, it was introduced in version v3.3 by commit 7c18d2205ea76eef9674e59e1ecae4f332a53e9e. For more details please see the references link. | null | 2021-12-19T23:41:32.517409Z | 2021-06-25T00:08:38.481556Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7c18d2205ea76eef9674e59e1ecae4f332a53e9e'} |
Linux | GSD-2021-1001715 | ipack: ipoctal: fix module reference leak | ipack: ipoctal: fix module reference leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit 811178f296b16af30264def74c8d2179a72d5562, it was introduced in version v3.18 by commit 82a82340bab6c251e0705339f60763718eaa2a22. For more details please see the references link. | null | 2021-12-20T01:23:52.873333Z | 2021-10-19T16:33:14.028149Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/82a82340bab6c251e0705339f60763718eaa2a22'} |
Linux | GSD-2022-1001890 | watch_queue: Actually free the watch | watch_queue: Actually free the watch
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit f69aecb49968e14196366bbe896eab0a904229f5, it was introduced in version v5.8 by commit c73be61cede5882f9605a852414db559c0ebedfd. For more details please see the references link. | null | 2022-04-25T05:04:07.651568Z | 2022-04-24T21:52:23.740004Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c73be61cede5882f9605a852414db559c0ebedfd'} |
Linux | GSD-2022-1000782 | iwlwifi: mvm: check debugfs_dir ptr before use | iwlwifi: mvm: check debugfs_dir ptr before use
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.27 by commit 7de1ed755e1ace30d97a724bad32452ed86b653b, it was introduced in version v5.12 by commit 8c082a99edb997d7999eb7cdb648e47a2bf4a638. For more details please see the references link. | null | 2022-03-18T02:55:08.079294Z | 2022-03-18T00:17:43.362042Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c082a99edb997d7999eb7cdb648e47a2bf4a638'} |
Linux | GSD-2022-1000278 | ovl: fix NULL pointer dereference in copy up warning | ovl: fix NULL pointer dereference in copy up warning
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.20 by commit e6b678c1a3673de6a5d2f4e22bb725a086a0701a, it was introduced in version v5.15.3 by commit 5cffa333a2b263821561328cc75a3ffc8097d093. For more details please see the references link. | null | 2022-02-20T06:42:56.984048Z | 2022-02-18T22:05:24.586301Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5cffa333a2b263821561328cc75a3ffc8097d093'} |
Linux | GSD-2022-1002245 | PCI: Reduce warnings on possible RW1C corruption | PCI: Reduce warnings on possible RW1C corruption
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 10705a4305579518da06662c045a90a4bcdd15f7, it was introduced in version v4.10 by commit fb26592301200dbbe4a9943fe188b57a46716900. For more details please see the references link. | null | 2022-04-25T06:07:24.725529Z | 2022-04-24T22:25:28.185062Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb26592301200dbbe4a9943fe188b57a46716900'} |
Linux | GSD-2021-1001345 | jfs: fix GPF in diFree | jfs: fix GPF in diFree
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.133 by commit a21e5cb1a64c904f1f0ef7b2d386fc7d2b1d2ce2. For more details please see the references link. | null | 2021-12-20T01:08:53.955Z | 2021-08-03T02:13:52.741005Z | null | null | null | null | null |
Linux | GSD-2022-1000628 | block: fix memory leak in disk_register_independent_access_ranges | block: fix memory leak in disk_register_independent_access_ranges
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.5 by commit fe4214a07e0b53d2af711f57519e33739c5df23f, it was introduced in version v5.16 by commit a2247f19ee1c5ad75ef095cdfb909a3244b88aa8. For more details please see the references link. | null | 2022-03-07T01:51:32.160959Z | 2022-02-27T03:33:03.104724Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a2247f19ee1c5ad75ef095cdfb909a3244b88aa8'} |
Linux | GSD-2022-1002300 | mm/sparsemem: fix 'mem_section' will never be NULL gcc 12 warning | mm/sparsemem: fix 'mem_section' will never be NULL gcc 12 warning
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit ff929e3abef16c409a9beef08bcc29ab940d0ce6, it was introduced in version v2.6.14 by commit 3e347261a80b57df792ab9464b5f0ed59add53a8. For more details please see the references link. | null | 2022-04-25T06:41:24.053294Z | 2022-04-24T22:32:06.259603Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3e347261a80b57df792ab9464b5f0ed59add53a8'} |
Linux | GSD-2021-1000942 | net:sfc: fix non-freed irq in legacy irq mode | net:sfc: fix non-freed irq in legacy irq mode
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.44 by commit 8d717c9135a3340ae62d1699484850bfb4112b0c. For more details please see the references link. | null | 2021-12-19T22:27:41.175541Z | 2021-06-30T00:26:00.525181Z | null | null | null | null | null |
Linux | GSD-2021-1001650 | hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs | hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.71 by commit 76bbb482d33bfcd7e9070ecf594c9ec73e01c930, it was introduced in version v4.19 by commit 65afb4c8e7e4e7e74b28efa1df62da503ca3e7a6. For more details please see the references link. | null | 2021-12-19T23:11:15.651201Z | 2021-10-19T16:29:59.876169Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/65afb4c8e7e4e7e74b28efa1df62da503ca3e7a6'} |
Linux | GSD-2021-1001200 | scsi: iscsi: Fix conn use after free during resets | scsi: iscsi: Fix conn use after free during resets
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.4 by commit fa9542b35ceb4202e8f8d65f440529a63524dca9. For more details please see the references link. | null | 2021-12-19T23:44:35.706592Z | 2021-08-03T01:35:43.317875Z | null | null | null | null | null |
Linux | GSD-2022-1000297 | ax25: improve the incomplete fix to avoid UAF and NPD bugs | ax25: improve the incomplete fix to avoid UAF and NPD bugs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.303 by commit 851901d339b2ba766ffcf754d37a6f52fa07cea2. For more details please see the references link. | null | 2022-03-07T02:17:53.117215Z | 2022-02-27T02:47:49.176351Z | null | null | null | null | null |
Linux | GSD-2021-1002586 | can: pch_can: pch_can_rx_normal: fix use after free | can: pch_can: pch_can_rx_normal: fix use after free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.8 by commit 6c73fc931658d8cbc8a1714b326cb31eb71d16a7, it was introduced in version v2.6.37 by commit b21d18b51b31a24d17f883b678432fbdee3d5675. For more details please see the references link. | null | 2021-12-19T23:42:32.355771Z | 2021-12-19T19:43:51.816647Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b21d18b51b31a24d17f883b678432fbdee3d5675'} |
Linux | GSD-2021-1000041 | KEYS: trusted: Fix TPM reservation for seal/unseal | KEYS: trusted: Fix TPM reservation for seal/unseal
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.17 by commit 39c8d760d44cb3fa0d67e8cd505df81cf4d80999, it was introduced in version v5.11.3 by commit 498b8fc1cdc13b57b02dd28544b18323900fae10. For more details please see the references link. | null | 2021-12-19T23:11:38.810823Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/498b8fc1cdc13b57b02dd28544b18323900fae10'} |
Linux | GSD-2021-1000411 | netfilter: nftables: avoid overflows in nft_hash_buckets() | netfilter: nftables: avoid overflows in nft_hash_buckets()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.120 by commit c77e2ef18167ad334e27610ced9a7f6af5ec1787, it was introduced in version v4.9 by commit 0ed6389c483dc77cdbdd48de0ca7ce41723dd667. For more details please see the references link. | null | 2021-12-19T22:51:49.704748Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0ed6389c483dc77cdbdd48de0ca7ce41723dd667'} |
Linux | GSD-2022-1001486 | fs: fix fd table size alignment properly | fs: fix fd table size alignment properly
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit afc46998a32e7670fe77321e33f10e31e980d56f, it was introduced in version v5.16.19 by commit 2ee9660213b7aee78b7a6bd7c91b3cbcfc965d2e. For more details please see the references link. | null | 2022-04-24T21:16:11.136390Z | 2022-04-24T21:16:11.136390Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2ee9660213b7aee78b7a6bd7c91b3cbcfc965d2e'} |
Linux | GSD-2021-1002302 | thermal: Fix NULL pointer dereferences in of_thermal_ functions | thermal: Fix NULL pointer dereferences in of_thermal_ functions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.81 by commit 6a315471cb6a07f651e1d3adc8962730f4fcccac. For more details please see the references link. | null | 2021-12-20T00:50:15.300877Z | 2021-11-29T02:37:46.076605Z | null | null | null | null | null |
Linux | GSD-2022-1001652 | net: usb: aqc111: Fix out-of-bounds accesses in RX fixup | net: usb: aqc111: Fix out-of-bounds accesses in RX fixup
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.35 by commit b416898442f2b6aa9f1b2f2968ce07e3abaa05f7. For more details please see the references link. | null | 2022-04-25T05:02:47.401453Z | 2022-04-24T21:31:49.950561Z | null | null | null | null | null |
Linux | GSD-2022-1000940 | netfilter: nf_queue: fix possible use-after-free | netfilter: nf_queue: fix possible use-after-free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.305 by commit 21b27b2baa27423286e9b8d3f0b194d587083d95, it was introduced in version v2.6.29 by commit 271b72c7fa82c2c7a795bc16896149933110672d. For more details please see the references link. | null | 2022-03-18T02:50:33.977055Z | 2022-03-18T00:34:46.337174Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/271b72c7fa82c2c7a795bc16896149933110672d'} |
Linux | GSD-2021-1002752 | netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc | netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit 27358aa81a7d60e6bd36f0bb1db65cd084c2cad0, it was introduced in version v4.16 by commit 395cacb5f1a0a290f1ae9ca4692c400d2b57a705. For more details please see the references link. | null | 2022-01-11T05:55:05.910826Z | 2021-12-27T05:48:18.606565Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/395cacb5f1a0a290f1ae9ca4692c400d2b57a705'} |
Linux | GSD-2021-1000295 | regmap: set debugfs_name to NULL after it is freed | regmap: set debugfs_name to NULL after it is freed
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit b9e569ae1da3a113b3acee8703c94777fd20938a, it was introduced in version v5.11 by commit cffa4b2122f5f3e53cf3d529bbc74651f95856d5. For more details please see the references link. | null | 2021-12-20T00:09:31.840496Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cffa4b2122f5f3e53cf3d529bbc74651f95856d5'} |
Linux | GSD-2022-1001202 | bpf, sockmap: Fix more uncharged while msg has more_data | bpf, sockmap: Fix more uncharged while msg has more_data
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit abb4caa477a5450817d2aa1198edce66450aecf8, it was introduced in version v4.20 by commit 604326b41a6fb9b4a78b6179335decee0365cd8c. For more details please see the references link. | null | 2022-04-25T06:22:07.265147Z | 2022-04-24T20:53:20.728476Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/604326b41a6fb9b4a78b6179335decee0365cd8c'} |
Linux | GSD-2022-1000043 | NFC: st21nfca: Fix memory leak in device probe and remove | NFC: st21nfca: Fix memory leak in device probe and remove
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.90 by commit e553265ea56482da5700f56319fda9ff53e7dcb4, it was introduced in version v3.16 by commit 68957303f44a501af5cf37913208a2acaa6bcdf1. For more details please see the references link. | null | 2022-01-11T05:53:25.122500Z | 2022-01-10T19:51:33.683736Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/68957303f44a501af5cf37913208a2acaa6bcdf1'} |
Linux | GSD-2021-1001484 | dm btree remove: assign new_root only when removal succeeds | dm btree remove: assign new_root only when removal succeeds
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.276 by commit 4c84b3e0728ffe10d89c633694c35a02b5c477dc. For more details please see the references link. | null | 2021-12-20T00:16:09.210117Z | 2021-08-03T02:55:00.384552Z | null | null | null | null | null |
Linux | GSD-2022-1000413 | NFSD: Fix the behavior of READ near OFFSET_MAX | NFSD: Fix the behavior of READ near OFFSET_MAX
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit c6eff5c4277146a78b4fb8c9b668dd64542c41b0. For more details please see the references link. | null | 2022-03-07T01:57:17.177063Z | 2022-02-27T03:03:43.968722Z | null | null | null | null | null |
Linux | GSD-2021-1001191 | nfs: fix acl memory leak of posix_acl_create() | nfs: fix acl memory leak of posix_acl_create()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.4 by commit 687cf32865b2d6960214bce523f2afac58dd3cd2, it was introduced in version v3.14 by commit 013cdf1088d7235da9477a2375654921d9b9ba9f. For more details please see the references link. | null | 2021-12-20T00:42:26.797589Z | 2021-08-03T01:33:46.135143Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/013cdf1088d7235da9477a2375654921d9b9ba9f'} |
Linux | GSD-2022-1000106 | net: amd-xgbe: Fix skb data length underflow | net: amd-xgbe: Fix skb data length underflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.265 by commit 617f9934bb37993b9813832516f318ba874bcb7d, it was introduced in version v4.11 by commit 622c36f143fc9566ba49d7cec994c2da1182d9e2. For more details please see the references link. | null | 2022-02-19T02:55:29.457403Z | 2022-02-18T21:35:52.798577Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/622c36f143fc9566ba49d7cec994c2da1182d9e2'} |
Linux | GSD-2022-1000556 | net/smc: Avoid overwriting the copies of clcsock callback functions | net/smc: Avoid overwriting the copies of clcsock callback functions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit f00b6c976ae0dfbd9b891175f713f59095d23842, it was introduced in version v5.16.8 by commit 504078fbe9dd570d685361b57784a6050bc40aaa. For more details please see the references link. | null | 2022-03-07T01:42:11.687805Z | 2022-02-27T03:23:33.479382Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/504078fbe9dd570d685361b57784a6050bc40aaa'} |
Linux | GSD-2022-1002091 | scsi: pm8001: Fix abort all task initialization | scsi: pm8001: Fix abort all task initialization
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 279f318bd7d6e04e6e0bc7b8cd8e190da8fa37a4, it was introduced in version v3.10 by commit c6b9ef5779c3e1edfa9de949d2a51252bc347663. For more details please see the references link. | null | 2022-04-25T05:43:23.856444Z | 2022-04-24T22:10:08.321716Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6b9ef5779c3e1edfa9de949d2a51252bc347663'} |
Linux | GSD-2021-1000780 | nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect | nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.43 by commit 48ee0db61c8299022ec88c79ad137f290196cac2, it was introduced in version v3.3 by commit d646960f7986fefb460a2b062d5ccc8ccfeacc3a. For more details please see the references link. | null | 2021-12-19T23:45:49.525244Z | 2021-06-25T00:05:09.988806Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d646960f7986fefb460a2b062d5ccc8ccfeacc3a'} |
Linux | GSD-2021-1001892 | netfilter: nf_tables: skip netdev events generated on netns removal | netfilter: nf_tables: skip netdev events generated on netns removal
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit 90c7c58aa2bd02c65a4c63b7dfe0b16eab12cf9f, it was introduced in version v5.11 by commit 767d1216bff82507c945e92fe719dff2083bb2f4. For more details please see the references link. | null | 2021-12-19T23:21:26.290650Z | 2021-10-28T13:54:24.367246Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/767d1216bff82507c945e92fe719dff2083bb2f4'} |
Linux | GSD-2022-1001717 | PCI: endpoint: Fix misused goto label | PCI: endpoint: Fix misused goto label
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit dc9d33b2d8d09e6478e8ef817a81cf26930acc3e. For more details please see the references link. | null | 2022-04-25T06:57:14.287061Z | 2022-04-24T21:37:27.981656Z | null | null | null | null | null |
Linux | GSD-2022-1000805 | net/smc: Use a mutex for locking "struct smc_pnettable" | net/smc: Use a mutex for locking "struct smc_pnettable"
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.26 by commit 062772d5cc8cd4018585cdbc2c03457dfb5a3d88, it was introduced in version v5.1 by commit 64e28b52c7a6616217bee67ba2ad886f478f9737. For more details please see the references link. | null | 2022-03-18T03:01:02.769985Z | 2022-03-18T00:20:04.416311Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/64e28b52c7a6616217bee67ba2ad886f478f9737'} |
Linux | GSD-2021-1002247 | NFC: reorder the logic in nfc_{un,}register_device | NFC: reorder the logic in nfc_{un,}register_device
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.218 by commit c45cea83e13699bdfd47842e04d09dd43af4c371, it was introduced in version v3.10 by commit be055b2f89b5842f41363b5655a33dffb51a8294. For more details please see the references link. | null | 2021-12-20T01:38:06.662534Z | 2021-11-29T02:35:15.702174Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/be055b2f89b5842f41363b5655a33dffb51a8294'} |
Linux | GSD-2022-1001347 | RDMA/hfi1: Fix use-after-free bug for mm struct | RDMA/hfi1: Fix use-after-free bug for mm struct
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 0b7186d657ee55e2cdefae498f07d5c1961e8023, it was introduced in version v5.10 by commit 3d2a9d642512c21a12d19b9250e7a835dcb41a79. For more details please see the references link. | null | 2022-04-25T04:05:08.631926Z | 2022-04-24T21:06:32.609284Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3d2a9d642512c21a12d19b9250e7a835dcb41a79'} |
Linux | GSD-2021-1002617 | xen/netfront: harden netfront against event channel storms | xen/netfront: harden netfront against event channel storms
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.296 by commit 81900aa7d7a130dec4c55b68875e30fb8c9effec. For more details please see the references link. | null | 2022-01-11T05:53:08.082991Z | 2021-12-27T05:27:24.385107Z | null | null | null | null | null |
Linux | GSD-2021-1001938 | ocfs2: mount fails with buffer overflow in strlen | ocfs2: mount fails with buffer overflow in strlen
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.288 by commit 4b74ddcc22ee6455946e80a9c4808801f8f8561e. For more details please see the references link. | null | 2021-12-19T23:17:06.655273Z | 2021-11-14T15:12:30.023715Z | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.