ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2021-1000112 | cifs: fix regression when mounting shares with prefix paths | cifs: fix regression when mounting shares with prefix paths
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.20 by commit e69ceb7d193d8af1d312880f33a52d7df3a413bf, it was introduced in version v5.11.20 by commit a69d17010f9c18b24ef6266a154b9a20d195d815. For more details please see the references link. | null | 2021-06-24T22:55:39.097434Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a69d17010f9c18b24ef6266a154b9a20d195d815'} |
Linux | GSD-2022-1001490 | net/x25: Fix null-ptr-deref caused by x25_disconnect | net/x25: Fix null-ptr-deref caused by x25_disconnect
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 4a279d7ee1c65411b4055ecd428b8aa2b1711c1f, it was introduced in version v5.7 by commit 4becb7ee5b3d2829ed7b9261a245a77d5b7de902. For more details please see the references link. | null | 2022-04-25T06:32:13.104915Z | 2022-04-24T21:16:30.264667Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4becb7ee5b3d2829ed7b9261a245a77d5b7de902'} |
Linux | GSD-2021-1000407 | userfaultfd: release page in error path to avoid BUG_ON | userfaultfd: release page in error path to avoid BUG_ON
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.120 by commit b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43, it was introduced in version v4.11 by commit cb658a453b9327ce96ce5222c24d162b5b65b564. For more details please see the references link. | null | 2021-12-19T22:03:16.072158Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cb658a453b9327ce96ce5222c24d162b5b65b564'} |
Linux | GSD-2021-1000057 | io_uring: fix shared sqpoll cancellation hangs | io_uring: fix shared sqpoll cancellation hangs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.3 by commit cb5e0b3d0f993a6268c1a2c7ede2f9aa0c17ef68, it was introduced in version v5.12 by commit 37d1e2e3642e2380750d7f35279180826f29660e. For more details please see the references link. | null | 2021-12-19T23:38:22.305428Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/37d1e2e3642e2380750d7f35279180826f29660e'} |
Linux | GSD-2021-1002590 | nfp: Fix memory leak in nfp_cpp_area_cache_add() | nfp: Fix memory leak in nfp_cpp_area_cache_add()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.8 by commit f707820c09239d6f67699d9b2ff57863cc7905b0, it was introduced in version v4.11 by commit 4cb584e0ee7df70fd0376aee60cf701855ea8c81. For more details please see the references link. | null | 2021-12-19T22:49:13.397969Z | 2021-12-19T19:44:01.792616Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4cb584e0ee7df70fd0376aee60cf701855ea8c81'} |
Linux | GSD-2022-1000281 | ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() | ASoC: ops: Reject out of bounds values in snd_soc_put_volsw()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.22 by commit 9e8895f1b3d4433f6d78aa6578e9db61ca6e6830. For more details please see the references link. | null | 2022-02-19T09:24:51.496694Z | 2022-02-18T22:05:45.546540Z | null | null | null | null | null |
Linux | GSD-2021-1001216 | ext4: fix possible UAF when remounting r/o a mmp-protected file system | ext4: fix possible UAF when remounting r/o a mmp-protected file system
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.3 by commit 7ed572cdf11081f8f9e07abd4bea56a3f2c4edbd. For more details please see the references link. | null | 2021-12-19T23:21:54.980377Z | 2021-08-03T01:38:48.739252Z | null | null | null | null | null |
Linux | GSD-2022-1001869 | ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data | ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 2f44eca78cc6d4e1779eb95765ec79e433accab4, it was introduced in version v5.6 by commit a61f3b4f476eceb25274161e5a53a8d18e42610b. For more details please see the references link. | null | 2022-04-25T05:04:38.739390Z | 2022-04-24T21:50:02.321987Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a61f3b4f476eceb25274161e5a53a8d18e42610b'} |
Linux | GSD-2021-1001646 | ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup | ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.71 by commit 20f6c4a31a525edd9ea6243712b868ba0e4e331e, it was introduced in version v5.0 by commit 4a9b32f30f805ca596d76605903a48eab58e0b88. For more details please see the references link. | null | 2021-12-20T01:14:45.925754Z | 2021-10-19T16:29:48.347640Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4a9b32f30f805ca596d76605903a48eab58e0b88'} |
Linux | GSD-2021-1000954 | usb: dwc3: gadget: Bail from dwc3_gadget_exit() if dwc->gadget is NULL | usb: dwc3: gadget: Bail from dwc3_gadget_exit() if dwc->gadget is NULL
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.44 by commit 851dee5a5da56564a70290713aee665403bb0b24, it was introduced in version v5.10 by commit e81a7018d93a7de31a3f121c9a7eecd0a5ec58b0. For more details please see the references link. | null | 2021-12-19T23:49:46.067639Z | 2021-06-30T00:29:00.152055Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e81a7018d93a7de31a3f121c9a7eecd0a5ec58b0'} |
Linux | GSD-2022-1002316 | Bluetooth: Fix use after free in hci_send_acl | Bluetooth: Fix use after free in hci_send_acl
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 684e505406abaeabe0058e9776f9210bf2747953. For more details please see the references link. | null | 2022-04-25T06:23:27.311135Z | 2022-04-24T22:33:43.926984Z | null | null | null | null | null |
Linux | GSD-2022-1002101 | ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data | ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 1f24716e38220fc9e52e208d20591d2bc9b7f020, it was introduced in version v5.6 by commit a61f3b4f476eceb25274161e5a53a8d18e42610b. For more details please see the references link. | null | 2022-04-25T06:18:25.527916Z | 2022-04-24T22:11:15.939678Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a61f3b4f476eceb25274161e5a53a8d18e42610b'} |
Linux | GSD-2021-1001451 | tty: serial: 8250: serial_cs: Fix a memory leak in error handling path | tty: serial: 8250: serial_cs: Fix a memory leak in error handling path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.276 by commit 331f5923fce4f45b8170ccf06c529e8eb28f37bc. For more details please see the references link. | null | 2021-12-19T23:36:47.236150Z | 2021-08-03T02:45:22.028175Z | null | null | null | null | null |
Linux | GSD-2022-1000096 | Bluetooth: refactor malicious adv data check | Bluetooth: refactor malicious adv data check
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.265 by commit 5a539c08d743d9910631448da78af5e961664c0e. For more details please see the references link. | null | 2022-02-19T04:59:14.437997Z | 2022-02-18T21:34:45.236127Z | null | null | null | null | null |
Linux | GSD-2021-1001001 | x86/fpu: Prevent state corruption in __fpu__restore_sig() | x86/fpu: Prevent state corruption in __fpu__restore_sig()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.46 by commit 076f732b16a5bf842686e1b43ab6021a2d98233e, it was introduced in version v5.8 by commit b860eb8dce5906b14e3a7f3c771e0b3d6ef61b94. For more details please see the references link. | null | 2021-12-20T00:40:56.468391Z | 2021-06-30T00:32:25.743174Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b860eb8dce5906b14e3a7f3c771e0b3d6ef61b94'} |
Linux | GSD-2021-1002787 | ipmi: fix initialization when workqueue allocation fails | ipmi: fix initialization when workqueue allocation fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.223 by commit eb84855d3e8799b67cdbadc7a5c53997cbfc3580, it was introduced in version v4.19.220 by commit 36fbc46a792969650a44702ddd2143fe722e4d00. For more details please see the references link. | null | 2022-01-11T05:57:50.383745Z | 2021-12-30T02:43:24.803352Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/36fbc46a792969650a44702ddd2143fe722e4d00'} |
Linux | GSD-2021-1000240 | vsock/virtio: free queued packets when closing socket | vsock/virtio: free queued packets when closing socket
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 37c38674ef2f8d7e8629e5d433c37d6c1273d16b, it was introduced in version v5.2 by commit ac03046ece2b158ebd204dfc4896fd9f39f0e6c8. For more details please see the references link. | null | 2021-12-20T00:42:41.120720Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac03046ece2b158ebd204dfc4896fd9f39f0e6c8'} |
Linux | GSD-2022-1000995 | mm/sparsemem: fix 'mem_section' will never be NULL gcc 12 warning | mm/sparsemem: fix 'mem_section' will never be NULL gcc 12 warning
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 84e2a3bbedf78c5d8fe4fa8dccf34d2b70e7ddd0, it was introduced in version v2.6.14 by commit 3e347261a80b57df792ab9464b5f0ed59add53a8. For more details please see the references link. | null | 2022-04-25T05:28:11.194683Z | 2022-04-24T20:38:11.451797Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3e347261a80b57df792ab9464b5f0ed59add53a8'} |
Linux | GSD-2022-1001687 | drm/imx: Fix memory leak in imx_pd_connector_get_modes | drm/imx: Fix memory leak in imx_pd_connector_get_modes
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 31e449302ed00c38d4068443cf0243279701ab28, it was introduced in version v4.8 by commit 76ecd9c9fb24b014a6f33fbb1287ede3be12158b. For more details please see the references link. | null | 2022-04-25T06:17:41.662036Z | 2022-04-24T21:35:19.070445Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/76ecd9c9fb24b014a6f33fbb1287ede3be12158b'} |
Linux | GSD-2021-1001902 | NFC: digital: fix possible memory leak in digital_in_send_sdd_req() | NFC: digital: fix possible memory leak in digital_in_send_sdd_req()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit 6432d7f1d1c3aa74cfe8f5e3afdf81b786c32e86, it was introduced in version v3.13 by commit 2c66daecc4092e6049673c281b2e6f0d5e59a94c. For more details please see the references link. | null | 2021-12-20T01:22:53.235727Z | 2021-10-28T13:54:52.286878Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c66daecc4092e6049673c281b2e6f0d5e59a94c'} |
Linux | GSD-2021-1000610 | netfilter: nft_set_pipapo_avx2: Add irq_fpu_usable() check, fallback to non-AVX2 version | netfilter: nft_set_pipapo_avx2: Add irq_fpu_usable() check, fallback to non-AVX2 version
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.42 by commit b1f45a26bd322525c14edd9504f6d46dfad679a4, it was introduced in version v5.7 by commit 7400b063969bdca4a06cd97f1294d765c8eecbe1. For more details please see the references link. | null | 2021-12-20T00:37:25.900280Z | 2021-06-04T19:47:09.917879Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7400b063969bdca4a06cd97f1294d765c8eecbe1'} |
Linux | GSD-2022-1001392 | Bluetooth: use memset avoid memory leaks | Bluetooth: use memset avoid memory leaks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit e9e55acee9b7a737ec7f5161b94a78932a5514c8. For more details please see the references link. | null | 2022-04-25T06:54:40.109233Z | 2022-04-24T21:10:05.778351Z | null | null | null | null | null |
Linux | GSD-2021-1002338 | usb: host: ohci-tmio: check return value after calling platform_get_resource() | usb: host: ohci-tmio: check return value after calling platform_get_resource()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit 065334f6640d074a1caec2f8b0091467a22f9483. For more details please see the references link. | null | 2021-12-20T01:20:48.481302Z | 2021-11-29T02:39:28.766995Z | null | null | null | null | null |
Linux | GSD-2021-1000305 | async_xor: increase src_offs when dropping destination page | async_xor: increase src_offs when dropping destination page
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 53f8208e11abd6dde9480dfcb97fecdb1bc2ac18, it was introduced in version v5.10 by commit 29bcff787a2593b2126cfaff612c0b4e560022e9. For more details please see the references link. | null | 2021-12-19T23:29:39.915045Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/29bcff787a2593b2126cfaff612c0b4e560022e9'} |
Linux | GSD-2022-1001668 | KVM: avoid NULL pointer dereference in kvm_dirty_ring_push | KVM: avoid NULL pointer dereference in kvm_dirty_ring_push
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 226b4327ef5c88572fc12187193f1b5073c10837. For more details please see the references link. | null | 2022-04-25T04:57:23.207187Z | 2022-04-24T21:33:32.238421Z | null | null | null | null | null |
Linux | GSD-2021-1001847 | can: isotp: isotp_sendmsg(): add result check for wait_event_interruptible() | can: isotp: isotp_sendmsg(): add result check for wait_event_interruptible()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit 053bc12df0d6097c1126d0e14fa778a0a8faeb64, it was introduced in version v5.10 by commit e057dd3fc20ffb3d7f150af46542a51b59b90127. For more details please see the references link. | null | 2021-12-19T23:58:16.077862Z | 2021-10-28T13:51:58.343736Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e057dd3fc20ffb3d7f150af46542a51b59b90127'} |
Linux | GSD-2021-1002768 | scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select() | scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit dfc3fff63793c571147930b13c0f8c689c4281ac. For more details please see the references link. | null | 2022-01-11T05:51:03.441187Z | 2021-12-27T05:52:59.772545Z | null | null | null | null | null |
Linux | GSD-2021-1000755 | ocfs2: fix data corruption by fallocate | ocfs2: fix data corruption by fallocate
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.125 by commit cc2edb99ea606a45182b5ea38cc8f4e583aa0774, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T01:27:48.109686Z | 2021-06-25T00:02:40.625293Z | null | null | null | null | null |
Linux | GSD-2021-1002292 | scsi: scsi_debug: Fix out-of-bound read in resp_readcap16() | scsi: scsi_debug: Fix out-of-bound read in resp_readcap16()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.82 by commit 3e20cb072679bdb47747ccc8bee3233a4cf0765a. For more details please see the references link. | null | 2021-12-20T00:55:04.884106Z | 2021-11-29T02:37:20.323577Z | null | null | null | null | null |
Linux | GSD-2022-1001238 | rtw88: fix memory overrun and memory leak during hw_scan | rtw88: fix memory overrun and memory leak during hw_scan
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit ec5da191bfcd5fd22b95459b623694f66c1cc10b, it was introduced in version v5.17 by commit 10d162b2ed395e69720926b4f8d87f1f25ca920f. For more details please see the references link. | null | 2022-04-25T04:11:48.806445Z | 2022-04-24T20:56:40.978121Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/10d162b2ed395e69720926b4f8d87f1f25ca920f'} |
Linux | GSD-2022-1000583 | RDMA/siw: Fix refcounting leak in siw_create_qp() | RDMA/siw: Fix refcounting leak in siw_create_qp()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.22 by commit 2989ba9532babac66e79997ccff73c015b69700c, it was introduced in version v5.15 by commit 514aee660df493cd673154a6ba6bab745ec47b8c. For more details please see the references link. | null | 2022-03-07T01:34:07.047880Z | 2022-02-27T03:27:20.533066Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/514aee660df493cd673154a6ba6bab745ec47b8c'} |
Linux | GSD-2021-1001514 | mac80211: fix use-after-free in CCMP/GCMP RX | mac80211: fix use-after-free in CCMP/GCMP RX
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.285 by commit 31de381aef0ab1b342f62485118dc8a19363dc78, it was introduced in version v4.9.271 by commit d0f613fe6de344dc17ba04a88921a2094c13d3fa. For more details please see the references link. | null | 2021-12-19T23:37:06.960995Z | 2021-10-19T16:21:40.775296Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0f613fe6de344dc17ba04a88921a2094c13d3fa'} |
Linux | GSD-2022-1000079 | udf: Fix NULL ptr deref when converting from inline format | udf: Fix NULL ptr deref when converting from inline format
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.300 by commit f24454e42b5a58267928b0de53b0dd9b43e4dd46, it was introduced in version v4.2 by commit 52ebea749aaed195245701a8f90a23d672c7a933. For more details please see the references link. | null | 2022-02-19T15:42:01.223810Z | 2022-02-18T21:32:51.034319Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/52ebea749aaed195245701a8f90a23d672c7a933'} |
Linux | GSD-2022-1002044 | video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow | video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 08dff482012758935c185532b1ad7d584785a86e. For more details please see the references link. | null | 2022-04-25T05:49:31.608982Z | 2022-04-24T22:05:36.620761Z | null | null | null | null | null |
Linux | GSD-2021-1001144 | net: qed: Fix memcpy() overflow of qed_dcbx_params() | net: qed: Fix memcpy() overflow of qed_dcbx_params()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13 by commit 1c200f832e14420fa770193f9871f4ce2df00d07. For more details please see the references link. | null | 2021-12-20T00:59:42.951824Z | 2021-07-08T01:59:25.363632Z | null | null | null | null | null |
Linux | GSD-2022-1000429 | net: dsa: bcm_sf2: don't use devres for mdiobus | net: dsa: bcm_sf2: don't use devres for mdiobus
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit caabb5f64f5c32fceed93356bb688ef1ec6c5783, it was introduced in version v5.9 by commit ac3a68d56651c3dad2c12c7afce065fe15267f44. For more details please see the references link. | null | 2022-03-07T01:50:39.712415Z | 2022-02-27T03:06:18.991941Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac3a68d56651c3dad2c12c7afce065fe15267f44'} |
Linux | GSD-2022-1002414 | scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() | scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 43195a0c620761fbb88db04e2475313855b948a4. For more details please see the references link. | null | 2022-04-25T05:50:57.093122Z | 2022-04-24T22:44:48.805266Z | null | null | null | null | null |
Linux | GSD-2021-1002441 | ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() | ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.164 by commit 99bb25cb6753beaf2c2bc37927c2ecc0ceff3f6d. For more details please see the references link. | null | 2021-12-19T23:24:27.434430Z | 2021-12-19T19:37:25.103854Z | null | null | null | null | null |
Linux | GSD-2022-1001111 | can: mcba_usb: properly check endpoint type | can: mcba_usb: properly check endpoint type
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit f2ec3cd0f34f8c3f94bc21fbba14868301c9c49d, it was introduced in version v4.12 by commit 51f3baad7de943780ce0c17bd7975df567dd6e14. For more details please see the references link. | null | 2022-04-25T04:54:45.765570Z | 2022-04-24T20:46:16.848704Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/51f3baad7de943780ce0c17bd7975df567dd6e14'} |
Linux | GSD-2021-1000186 | net: hso: fix NULL-deref on disconnect regression | net: hso: fix NULL-deref on disconnect regression
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.115 by commit d7fad2ce15bdbbd0fec3ebe999fd7cab2267f53e, it was introduced in version v5.4.112 by commit 4a2933c88399c0ebc738db39bbce3ae89786d723. For more details please see the references link. | null | 2021-12-20T00:10:34.773153Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4a2933c88399c0ebc738db39bbce3ae89786d723'} |
Linux | GSD-2021-1002011 | mm, slub: fix potential memoryleak in kmem_cache_open() | mm, slub: fix potential memoryleak in kmem_cache_open()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.156 by commit 4f5d1c29cfab5cb0ab885059818751bdef32e2bb, it was introduced in version v4.8 by commit 210e7a43fa905bccafa9bb5966fba1d71f33eb8b. For more details please see the references link. | null | 2021-12-19T22:44:17.528163Z | 2021-11-14T15:15:50.880542Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/210e7a43fa905bccafa9bb5966fba1d71f33eb8b'} |
Linux | GSD-2022-1001541 | dax: make sure inodes are flushed before destroy cache | dax: make sure inodes are flushed before destroy cache
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit f2a1e0eb70c2d954176c07d75d28742bde30e9f3, it was introduced in version v4.12 by commit 7b6be8444e0f0dd675b54d059793423d3c9b4c03. For more details please see the references link. | null | 2022-04-25T06:22:09.550375Z | 2022-04-24T21:21:50.550397Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7b6be8444e0f0dd675b54d059793423d3c9b4c03'} |
Linux | GSD-2022-1000700 | net: ipv6: ensure we call ipv6_mc_down() at most once | net: ipv6: ensure we call ipv6_mc_down() at most once
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.13 by commit 72124e65a70b84e6303a5cd21b0ac1f27d7d61a4, it was introduced in version v3.18 by commit 3ce62a84d53cd3d3cc5377bbf339e9b08ddf9c36. For more details please see the references link. | null | 2022-03-18T04:27:18.782746Z | 2022-03-18T00:10:42.676096Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3ce62a84d53cd3d3cc5377bbf339e9b08ddf9c36'} |
Linux | GSD-2022-1001812 | remoteproc: qcom_q6v5_mss: Fix some leaks in q6v5_alloc_memory_region | remoteproc: qcom_q6v5_mss: Fix some leaks in q6v5_alloc_memory_region
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit bd4771ba2cf9e18473a42b5b70175e50d67a64bb, it was introduced in version v4.17 by commit 278d744c46fd4f1925aec77752d18a0e4a9cbec3. For more details please see the references link. | null | 2022-04-25T05:17:09.824563Z | 2022-04-24T21:44:07.741538Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/278d744c46fd4f1925aec77752d18a0e4a9cbec3'} |
Linux | GSD-2021-1001797 | xhci: Fix command ring pointer corruption while aborting a command | xhci: Fix command ring pointer corruption while aborting a command
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.252 by commit 22bcb65ea41072ab5d03c0c6290e04e0df6d09a0. For more details please see the references link. | null | 2021-12-19T23:13:15.087728Z | 2021-10-28T13:49:20.031259Z | null | null | null | null | null |
Linux | GSD-2021-1000885 | net/nfc/rawsock.c: fix a permission check bug | net/nfc/rawsock.c: fix a permission check bug
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.126 by commit f3ed12af6bbbaf79eddb0ae14656b8ecacea74f0. For more details please see the references link. | null | 2021-12-20T01:14:55.746667Z | 2021-06-30T00:03:36.841013Z | null | null | null | null | null |
Linux | GSD-2022-1000350 | ax25: improve the incomplete fix to avoid UAF and NPD bugs | ax25: improve the incomplete fix to avoid UAF and NPD bugs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.181 by commit cfc8b37ef0418529e3719c2d128e59e74a3114b0. For more details please see the references link. | null | 2022-03-07T02:27:01.257414Z | 2022-02-27T02:54:31.100550Z | null | null | null | null | null |
Linux | GSD-2022-1000645 | net: sched: fix use-after-free in tc_new_tfilter() | net: sched: fix use-after-free in tc_new_tfilter()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.6 by commit 95e34f61b58a152656cbe8d6e19843cc343fb089, it was introduced in version v5.1 by commit 470502de5bdb1ed0def643a4458593a40b8f6b66. For more details please see the references link. | null | 2022-03-07T01:44:33.970615Z | 2022-02-27T03:35:36.175615Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/470502de5bdb1ed0def643a4458593a40b8f6b66'} |
Linux | GSD-2022-1001957 | nfc: nci: add flush_workqueue to prevent uaf | nfc: nci: add flush_workqueue to prevent uaf
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.112 by commit 67677050cecbe0edfdd81cd508415e9636ba7c65, it was introduced in version v3.2 by commit 6a2968aaf50c7a22fced77a5e24aa636281efca8. For more details please see the references link. | null | 2022-04-25T04:32:24.263974Z | 2022-04-24T21:58:03.435326Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6a2968aaf50c7a22fced77a5e24aa636281efca8'} |
Linux | GSD-2021-1001328 | watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() | watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.134 by commit 7c56c5508dc20a6b133bc669fc34327a6711c24c. For more details please see the references link. | null | 2021-12-20T00:56:51.596938Z | 2021-08-03T02:10:20.945446Z | null | null | null | null | null |
Linux | GSD-2022-1002382 | netfilter: nf_tables: initialize registers in nft_do_chain() | netfilter: nf_tables: initialize registers in nft_do_chain()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.237 by commit 88791b79a1eb2ba94e95d039243e28433583a67b, it was introduced in version v3.13 by commit 96518518cc417bb0a8c80b9fb736202e28acdf96. For more details please see the references link. | null | 2022-04-25T03:24:19.660320Z | 2022-04-24T22:41:17.582969Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/96518518cc417bb0a8c80b9fb736202e28acdf96'} |
Linux | GSD-2022-1002228 | net/x25: Fix null-ptr-deref caused by x25_disconnect | net/x25: Fix null-ptr-deref caused by x25_disconnect
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 9acf05b4e7b55fdb712ef7b331dbce5bcd391d0f, it was introduced in version v5.4.56 by commit 69cd304cfa5cfb0f130488af579c143382432766. For more details please see the references link. | null | 2022-04-25T03:55:30.829944Z | 2022-04-24T22:23:25.576824Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69cd304cfa5cfb0f130488af579c143382432766'} |
Linux | GSD-2022-1000215 | ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() | ASoC: ops: Reject out of bounds values in snd_soc_put_volsw()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.99 by commit a9394f21fba027147bf275b083c77955864c366a. For more details please see the references link. | null | 2022-02-19T15:35:04.834590Z | 2022-02-18T21:56:28.298481Z | null | null | null | null | null |
Linux | GSD-2021-1001282 | fbmem: Do not delete the mode that is still in use | fbmem: Do not delete the mode that is still in use
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.52 by commit 087bff9acd2ec6db3f61aceb3224bde90fe0f7f8, it was introduced in version v5.3 by commit 13ff178ccd6d3b8074c542a911300b79c4eec255. For more details please see the references link. | null | 2021-12-19T22:54:44.176460Z | 2021-08-03T01:56:57.343715Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/13ff178ccd6d3b8074c542a911300b79c4eec255'} |
Linux | GSD-2021-1001778 | isdn: mISDN: Fix sleeping function called from invalid context | isdn: mISDN: Fix sleeping function called from invalid context
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.288 by commit ef269a8808cb1759245a98a7fe16fceaebad894c. For more details please see the references link. | null | 2021-12-20T01:33:02.664922Z | 2021-10-28T13:48:26.373144Z | null | null | null | null | null |
Linux | GSD-2022-1001054 | scsi: hisi_sas: Free irq vectors in order for v3 HW | scsi: hisi_sas: Free irq vectors in order for v3 HW
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit b4cc04fa8f1fc3816c8494d77abab3f72b9d2292. For more details please see the references link. | null | 2022-04-25T03:47:43.989422Z | 2022-04-24T20:42:39.600175Z | null | null | null | null | null |
Linux | GSD-2021-1000539 | btrfs: release path before starting transaction when cloning inline extent | btrfs: release path before starting transaction when cloning inline extent
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit 8bf7fa718152fcccac0376b443c0a6a2613a997e, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T00:12:07.356796Z | 2021-06-04T19:35:35.998537Z | null | null | null | null | null |
Linux | GSD-2021-1002504 | can: pch_can: pch_can_rx_normal: fix use after free | can: pch_can: pch_can_rx_normal: fix use after free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.85 by commit 703dde112021c93d6e89443c070e7dbd4dea612e, it was introduced in version v2.6.37 by commit b21d18b51b31a24d17f883b678432fbdee3d5675. For more details please see the references link. | null | 2021-12-19T23:00:56.068643Z | 2021-12-19T19:40:18.714372Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b21d18b51b31a24d17f883b678432fbdee3d5675'} |
Linux | GSD-2022-1001404 | PCI: endpoint: Fix alignment fault error in copy tests | PCI: endpoint: Fix alignment fault error in copy tests
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 399549fd0b1606691a0dce6cc44a41c308d1bfbe. For more details please see the references link. | null | 2022-04-25T04:30:07.618913Z | 2022-04-24T21:10:40.625017Z | null | null | null | null | null |
Linux | GSD-2021-1000493 | uio_hv_generic: Fix another memory leak in error handling paths | uio_hv_generic: Fix another memory leak in error handling paths
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.7 by commit 5f59240cf25b2f7a0fdffc2701482a70310fec07, it was introduced in version v4.20 by commit cdfa835c6e5e87d145f9f632b58843de97509f2b. For more details please see the references link. | null | 2021-12-20T00:08:52.881542Z | 2021-05-31T23:45:42.598179Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cdfa835c6e5e87d145f9f632b58843de97509f2b'} |
Linux | GSD-2021-1000169 | media: staging/intel-ipu3: Fix memory leak in imu_fmt | media: staging/intel-ipu3: Fix memory leak in imu_fmt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.118 by commit ff792ae52005c85a2d829c153e08d99a356e007d, it was introduced in version v5.2 by commit 6d5f26f2e045f2377b524516194657c00efbbce8. For more details please see the references link. | null | 2021-12-19T22:30:08.221016Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6d5f26f2e045f2377b524516194657c00efbbce8'} |
Linux | GSD-2021-1002154 | nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells | nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 5d388fa01fa6eb310ac023a363a6cb216d9d8fe9, it was introduced in version v4.3 by commit 69aba7948cbe53f2f1827e84e9dd0ae470a5072e. For more details please see the references link. | null | 2021-12-20T01:11:44.276524Z | 2021-11-14T15:22:24.379383Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69aba7948cbe53f2f1827e84e9dd0ae470a5072e'} |
Linux | GSD-2021-1001955 | NFC: digital: fix possible memory leak in digital_in_send_sdd_req() | NFC: digital: fix possible memory leak in digital_in_send_sdd_req()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.252 by commit fcce6e5255474ca33c27dda0cdf9bf5087278873, it was introduced in version v3.13 by commit 2c66daecc4092e6049673c281b2e6f0d5e59a94c. For more details please see the references link. | null | 2021-12-20T01:13:04.982979Z | 2021-11-14T15:13:19.376193Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c66daecc4092e6049673c281b2e6f0d5e59a94c'} |
Linux | GSD-2021-1000647 | mld: fix panic in mld_newpack() | mld: fix panic in mld_newpack()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.193 by commit 4b77ad9097067b31237eeeee0bf70f80849680a0, it was introduced in version v2.6.35 by commit 72e09ad107e78d69ff4d3b97a69f0aad2b77280f. For more details please see the references link. | null | 2021-12-20T00:29:41.803674Z | 2021-06-04T19:54:22.666194Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/72e09ad107e78d69ff4d3b97a69f0aad2b77280f'} |
Linux | GSD-2021-1002380 | can: pch_can: pch_can_rx_normal: fix use after free | can: pch_can: pch_can_rx_normal: fix use after free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.293 by commit 3a3c46e2eff0577454860a203be1a8295f4acb76, it was introduced in version v2.6.37 by commit b21d18b51b31a24d17f883b678432fbdee3d5675. For more details please see the references link. | null | 2021-12-19T22:34:15.201414Z | 2021-12-19T19:34:43.423844Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b21d18b51b31a24d17f883b678432fbdee3d5675'} |
Linux | GSD-2022-1001280 | crypto: ccp - Ensure psp_ret is always init'd in __sev_platform_init_locked() | crypto: ccp - Ensure psp_ret is always init'd in __sev_platform_init_locked()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 590c08b061214268a1fe3b2def65969deac075f2, it was introduced in version v5.17 by commit e423b9d75e779d921e6adf5ac3d0b59400d6ba7e. For more details please see the references link. | null | 2022-04-25T04:56:16.841171Z | 2022-04-24T21:00:57.731584Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e423b9d75e779d921e6adf5ac3d0b59400d6ba7e'} |
Linux | GSD-2021-1000217 | SUNRPC: Fix null pointer dereference in svc_rqst_free() | SUNRPC: Fix null pointer dereference in svc_rqst_free()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.5 by commit c664aaec9aee544538a78ba4893a44bc73a6d742, it was introduced in version v5.11 by commit 5191955d6fc65e6d4efe8f4f10a6028298f57281. For more details please see the references link. | null | 2021-12-19T21:43:56.995309Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5191955d6fc65e6d4efe8f4f10a6028298f57281'} |
Linux | GSD-2022-1000868 | vhost/vsock: don't check owner in vhost_vsock_stop() while releasing | vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.103 by commit 698dc7d13c4e972214458996455447651a657264, it was introduced in version v4.8 by commit 433fc58e6bf2c8bd97e57153ed28e64fd78207b8. For more details please see the references link. | null | 2022-03-18T02:55:49.403325Z | 2022-03-18T00:26:07.570102Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/433fc58e6bf2c8bd97e57153ed28e64fd78207b8'} |
Linux | GSD-2021-1001056 | net: rds: fix memory leak in rds_recvmsg | net: rds: fix memory leak in rds_recvmsg
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit b25b60d076164edb3025e85aabd2cf50a5215b91, it was introduced in version v2.6.30 by commit bdbe6fbc6a2f2ccfb384b141b257677d2a8d36fb. For more details please see the references link. | null | 2021-12-19T23:28:08.905642Z | 2021-06-30T00:36:43.344172Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bdbe6fbc6a2f2ccfb384b141b257677d2a8d36fb'} |
Linux | GSD-2022-1002506 | ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction | ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit 99582e4b19f367fa95bdd150b3034d7ce8113342, it was introduced in version v3.16 by commit 00a7bb81c20f3e81711e28e0f6c08cee8fd18514. For more details please see the references link. | null | 2022-04-25T05:19:48.754676Z | 2022-04-24T22:55:53.662502Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/00a7bb81c20f3e81711e28e0f6c08cee8fd18514'} |
Linux | GSD-2022-1000491 | powerpc/fixmap: Fix VM debug warning on unmap | powerpc/fixmap: Fix VM debug warning on unmap
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 033fd42c18d9b2121595b6f1e8419a115f9ac5b7. For more details please see the references link. | null | 2022-03-07T03:12:51.754844Z | 2022-02-27T03:14:42.747827Z | null | null | null | null | null |
Linux | GSD-2021-1001406 | dma-buf/sync_file: Don't leak fences on merge failure | dma-buf/sync_file: Don't leak fences on merge failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.241 by commit 19f51c2529339280d2c8c6427cd3e21ddf1ac3f8, it was introduced in version v4.9 by commit a02b9dc90d844cc7df7b63264e7920cc425052d9. For more details please see the references link. | null | 2021-12-19T23:56:12.224787Z | 2021-08-03T02:31:41.716617Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a02b9dc90d844cc7df7b63264e7920cc425052d9'} |
Linux | GSD-2022-1002156 | perf/imx_ddr: Fix undefined behavior due to shift overflowing the constant | perf/imx_ddr: Fix undefined behavior due to shift overflowing the constant
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.190 by commit e07a70ca831e8ee05d25f887b161c8f6aa6f5d8d. For more details please see the references link. | null | 2022-04-25T04:54:51.278275Z | 2022-04-24T22:16:42.654808Z | null | null | null | null | null |
Linux | GSD-2022-1002443 | ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe | ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit f8b7b9a0594715ecfbe6f18db2328d992242654a, it was introduced in version v3.8 by commit 531f67e41dcde1e358cf821d056241a66355cf03. For more details please see the references link. | null | 2022-04-25T04:25:22.559410Z | 2022-04-24T22:48:18.267002Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/531f67e41dcde1e358cf821d056241a66355cf03'} |
Linux | GSD-2022-1000184 | efi: runtime: avoid EFIv2 runtime services on Apple x86 machines | efi: runtime: avoid EFIv2 runtime services on Apple x86 machines
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.96 by commit b0f1cc093bc2493ac259c53766fd2b800e085807. For more details please see the references link. | null | 2022-02-19T02:38:10.229445Z | 2022-02-18T21:52:10.714134Z | null | null | null | null | null |
Linux | GSD-2021-1001113 | nilfs2: fix memory leak in nilfs_sysfs_delete_device_group | nilfs2: fix memory leak in nilfs_sysfs_delete_device_group
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.196 by commit 9436cdffaf5bc83f41e72dfbd4d9ec885ff7b4f2, it was introduced in version v3.17 by commit da7141fb78db915680616e15677539fc8140cf53. For more details please see the references link. | null | 2021-12-20T01:30:19.732938Z | 2021-07-08T01:57:11.318708Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/da7141fb78db915680616e15677539fc8140cf53'} |
Linux | GSD-2022-1002013 | mt76: dma: initialize skip_unmap in mt76_dma_rx_fill | mt76: dma: initialize skip_unmap in mt76_dma_rx_fill
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit 9a56e2b271bc65116d1e44454b244b18d289a26b. For more details please see the references link. | null | 2022-04-25T04:15:46.072625Z | 2022-04-24T22:02:53.991538Z | null | null | null | null | null |
Linux | GSD-2021-1001543 | xen/balloon: use a kernel thread instead a workqueue | xen/balloon: use a kernel thread instead a workqueue
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.249 by commit c5d5a43dd2b649a0a290bfed00fb76d1aff89be6. For more details please see the references link. | null | 2021-12-20T01:37:56.123065Z | 2021-10-19T16:23:00.747257Z | null | null | null | null | null |
Linux | GSD-2022-1000887 | spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() | spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.182 by commit df14d2bed8e2455878e046e67123d9ecb2e79056, it was introduced in version v5.2 by commit 67dca5e580f1e93a66177389981541cac208c817. For more details please see the references link. | null | 2022-03-18T03:43:46.749196Z | 2022-03-18T00:28:16.861656Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/67dca5e580f1e93a66177389981541cac208c817'} |
Linux | GSD-2022-1001795 | PM: core: keep irq flags in device_pm_check_callbacks() | PM: core: keep irq flags in device_pm_check_callbacks()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit c29642ba72f87c0a3d7449f7db5d6d76a7ed53c3. For more details please see the references link. | null | 2022-04-25T04:09:50.642604Z | 2022-04-24T21:42:44.200591Z | null | null | null | null | null |
Linux | GSD-2021-1001810 | usb: musb: dsps: Fix the probe error path | usb: musb: dsps: Fix the probe error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.213 by commit e923bce31ffefe4f60edfc6b84f62d4a858f3676, it was introduced in version v4.19.207 by commit ffc825049ed2e8c849d318e987fd5073e0be462f. For more details please see the references link. | null | 2021-12-19T23:32:14.668588Z | 2021-10-28T13:50:07.137310Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ffc825049ed2e8c849d318e987fd5073e0be462f'} |
Linux | GSD-2021-1000702 | net: fujitsu: fix potential null-ptr-deref | net: fujitsu: fix potential null-ptr-deref
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.271 by commit b92170e209f7746ed72eaac98f2c2f4b9af734e6, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T22:18:24.647447Z | 2021-06-04T20:05:37.517455Z | null | null | null | null | null |
Linux | GSD-2021-1002695 | inet_diag: fix kernel-infoleak for UDP sockets | inet_diag: fix kernel-infoleak for UDP sockets
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.88 by commit 3a4f6dba1eb98101abc012ef968a8b10dac1ce50, it was introduced in version v3.3 by commit 3c4d05c8056724aff3abc20650807dd828fded54. For more details please see the references link. | null | 2022-01-11T05:49:13.440462Z | 2021-12-27T05:37:12.373860Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c4d05c8056724aff3abc20650807dd828fded54'} |
Linux | GSD-2021-1000352 | i2c: xiic: fix reference leak when pm_runtime_get_sync fails | i2c: xiic: fix reference leak when pm_runtime_get_sync fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit c977426db644ba476938125597947979e8aba725, it was introduced in version v5.6 by commit 10b17004a74c384c6f410af355b0d6d7a168f613. For more details please see the references link. | null | 2021-12-19T22:48:28.965357Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/10b17004a74c384c6f410af355b0d6d7a168f613'} |
Linux | GSD-2022-1000307 | iwlwifi: fix use-after-free | iwlwifi: fix use-after-free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.268 by commit d3b98fe36f8a06ce654049540773256ab59cb53d, it was introduced in version v4.14.263 by commit 8e10749fa1a454c1e7214f36cec83241f5a36ef1. For more details please see the references link. | null | 2022-03-07T01:43:11.472572Z | 2022-02-27T02:48:56.550574Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8e10749fa1a454c1e7214f36cec83241f5a36ef1'} |
Linux | GSD-2021-1001390 | smackfs: restrict bytes count in smk_set_cipso() | smackfs: restrict bytes count in smk_set_cipso()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.198 by commit cbd87ba6a13891acf6180783f8234a8b7a3e3d4d. For more details please see the references link. | null | 2021-12-20T01:26:36.388904Z | 2021-08-03T02:26:40.648678Z | null | null | null | null | null |
Linux | GSD-2021-1000978 | net: rds: fix memory leak in rds_recvmsg | net: rds: fix memory leak in rds_recvmsg
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.46 by commit 5946fbf48355f5a8caeff72580c7658da5966b86, it was introduced in version v2.6.30 by commit bdbe6fbc6a2f2ccfb384b141b257677d2a8d36fb. For more details please see the references link. | null | 2021-12-20T02:13:39.963245Z | 2021-06-30T00:30:59.955464Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bdbe6fbc6a2f2ccfb384b141b257677d2a8d36fb'} |
Linux | GSD-2022-1000757 | xen/gnttab: fix gnttab_end_foreign_access() without page specified | xen/gnttab: fix gnttab_end_foreign_access() without page specified
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.28 by commit 27dc69aa55687ea288d0be6ce8f036330d1dddb5. For more details please see the references link. | null | 2022-03-18T04:17:22.506919Z | 2022-03-18T00:15:42.049441Z | null | null | null | null | null |
Linux | GSD-2022-1001845 | powerpc/64s: Don't use DSISR for SLB faults | powerpc/64s: Don't use DSISR for SLB faults
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 4a852ff9b7bea9c640540e2c1bc70bd3ba455d61, it was introduced in version v5.5 by commit 46ddcb3950a28c0df4815e8dbb8d4b91d5d9f22d. For more details please see the references link. | null | 2022-04-25T04:48:18.928637Z | 2022-04-24T21:47:26.192866Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/46ddcb3950a28c0df4815e8dbb8d4b91d5d9f22d'} |
Linux | GSD-2022-1002290 | drm/amdkfd: Check for potential null return of kmalloc_array() | drm/amdkfd: Check for potential null return of kmalloc_array()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.239 by commit 94869bb0de69a812f70231b0eb480bb2f7ae73a6. For more details please see the references link. | null | 2022-04-25T05:33:05.783502Z | 2022-04-24T22:30:37.883401Z | null | null | null | null | null |
Linux | GSD-2022-1001516 | Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt | Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 4d3d1f2c35a19988d3c5f0ee86038b525e830840, it was introduced in version v5.2 by commit 9aebfd4a2200ab8075e44379c758bccefdc589bb. For more details please see the references link. | null | 2022-04-25T04:44:31.216201Z | 2022-04-24T21:19:19.301828Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9aebfd4a2200ab8075e44379c758bccefdc589bb'} |
Linux | GSD-2021-1000581 | mld: fix panic in mld_newpack() | mld: fix panic in mld_newpack()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.42 by commit beb39adb150f8f3b516ddf7c39835a9788704d23, it was introduced in version v2.6.35 by commit 72e09ad107e78d69ff4d3b97a69f0aad2b77280f. For more details please see the references link. | null | 2021-12-19T22:23:31.369926Z | 2021-06-04T19:42:29.697011Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/72e09ad107e78d69ff4d3b97a69f0aad2b77280f'} |
Linux | GSD-2021-1002046 | KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest() | KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit fbd724c49bead048ae9fc1a5b7bff2fb3e54f855, it was introduced in version v5.2 by commit 10d91611f426d4bafd2a83d966c36da811b2f7ad. For more details please see the references link. | null | 2021-12-20T00:38:02.871796Z | 2021-11-14T15:17:25.300623Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/10d91611f426d4bafd2a83d966c36da811b2f7ad'} |
Linux | GSD-2022-1001146 | btrfs: handle csum lookup errors properly on reads | btrfs: handle csum lookup errors properly on reads
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 50658068dce91207a93300325d4831c3dd8f77b4. For more details please see the references link. | null | 2022-04-25T04:46:34.739111Z | 2022-04-24T20:48:51.902852Z | null | null | null | null | null |
Linux | GSD-2021-1002416 | perf hist: Fix memory leak of a perf_hpp_fmt | perf hist: Fix memory leak of a perf_hpp_fmt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.220 by commit 24a139c105fa0f7f99888cf328bf6a02fc841675. For more details please see the references link. | null | 2021-12-20T00:56:48.791734Z | 2021-12-19T19:36:25.853751Z | null | null | null | null | null |
Linux | GSD-2021-1002103 | ocfs2: mount fails with buffer overflow in strlen | ocfs2: mount fails with buffer overflow in strlen
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit 0e677ea5b7396f715a76b6b0ef441430e4c4b57f. For more details please see the references link. | null | 2021-12-19T23:12:34.519280Z | 2021-11-14T15:20:01.504620Z | null | null | null | null | null |
Linux | GSD-2022-1001453 | mmc: host: Return an error when ->enable_sdio_irq() ops is missing | mmc: host: Return an error when ->enable_sdio_irq() ops is missing
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit b6283cc505cfc7f23c9d6e062a948e0455e35270. For more details please see the references link. | null | 2022-04-25T04:42:46.473234Z | 2022-04-24T21:14:29.584016Z | null | null | null | null | null |
Linux | GSD-2021-1002553 | sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl | sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.7 by commit adf098e2a8a1e1fc075d6a5ba2edd13cf7189082, it was introduced in version v2.6.24 by commit faf0b2e5afe7dae072d2715763c7f992b612b628. For more details please see the references link. | null | 2021-12-20T00:23:26.923147Z | 2021-12-19T19:42:24.263292Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/faf0b2e5afe7dae072d2715763c7f992b612b628'} |
Linux | GSD-2022-1001003 | RDMA/hfi1: Fix use-after-free bug for mm struct | RDMA/hfi1: Fix use-after-free bug for mm struct
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 5a9a1b24ddb510715f8f621263938186579a965c, it was introduced in version v5.10 by commit 3d2a9d642512c21a12d19b9250e7a835dcb41a79. For more details please see the references link. | null | 2022-04-25T06:09:10.025713Z | 2022-04-24T20:38:50.174033Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3d2a9d642512c21a12d19b9250e7a835dcb41a79'} |
Linux | GSD-2021-1000094 | dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails | dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.20 by commit 6086f957416a6e87236c06079fcaba7a3998aeca, it was introduced in version v4.6 by commit 1c357a1e86a4227a6b6059f2de118ae47659cebc. For more details please see the references link. | null | 2021-12-19T23:19:43.775876Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c357a1e86a4227a6b6059f2de118ae47659cebc'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.