ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2021-1001723 | mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap | mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit 997ee230e4f5285cd98445c102d9033c7ec4814b, it was introduced in version v4.7 by commit 646e76bb5daf4ca38438c69ffb72cccb605f3466. For more details please see the references link. | null | 2021-12-19T22:48:36.162488Z | 2021-10-19T16:33:34.305798Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/646e76bb5daf4ca38438c69ffb72cccb605f3466'} |
Linux | GSD-2021-1000831 | kvm: avoid speculation-based attacks from out-of-range memslot accesses | kvm: avoid speculation-based attacks from out-of-range memslot accesses
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.273 by commit 3098b86390a6b9ea52657689f08410baf130ceff. For more details please see the references link. | null | 2021-12-20T00:20:12.669662Z | 2021-06-30T00:00:05.614947Z | null | null | null | null | null |
Linux | GSD-2021-1000098 | usb: dwc3: core: Do core softreset when switch mode | usb: dwc3: core: Do core softreset when switch mode
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.20 by commit 800f58217626c8b147aa40660e572ed8a0d56e3b, it was introduced in version v4.12 by commit 41ce1456e1dbbc7355d0fcc10cf7c337c13def24. For more details please see the references link. | null | 2021-12-20T00:46:09.637876Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41ce1456e1dbbc7355d0fcc10cf7c337c13def24'} |
Linux | GSD-2021-1000562 | serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' | serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit 9b07b6973f7359e2dd6a9fe6db0c142634c823b7, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T01:02:31.436591Z | 2021-06-04T19:39:11.795903Z | null | null | null | null | null |
Linux | GSD-2021-1000132 | tools/power turbostat: Fix offset overflow issue in index converting | tools/power turbostat: Fix offset overflow issue in index converting
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.36 by commit ea6803ff2cd1a2d7d880256bf562172b708a76ff, it was introduced in version v5.10 by commit 9972d5d84d76982606806b2ce887f70c2f8ba60a. For more details please see the references link. | null | 2021-12-19T23:58:50.071572Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9972d5d84d76982606806b2ce887f70c2f8ba60a'} |
Linux | GSD-2022-1000167 | ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() | ASoC: ops: Reject out of bounds values in snd_soc_put_volsw()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.178 by commit 68fd718724284788fc5f379e0b7cac541429ece7. For more details please see the references link. | null | 2022-02-19T12:53:52.895972Z | 2022-02-18T21:49:30.228291Z | null | null | null | null | null |
Linux | GSD-2022-1000537 | KVM: x86: nSVM: fix potential NULL derefernce on nested migration | KVM: x86: nSVM: fix potential NULL derefernce on nested migration
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit 352193edda48e08e8824a7ece09aec830a603cfe, it was introduced in version v5.13 by commit 232f75d3b4b5456de6f0b671aa86345d62de1473. For more details please see the references link. | null | 2022-03-07T01:31:12.181563Z | 2022-02-27T03:20:43.895061Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/232f75d3b4b5456de6f0b671aa86345d62de1473'} |
Linux | GSD-2022-1000864 | bpf: Add schedule points in batch ops | bpf: Add schedule points in batch ops
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.103 by commit 7ef94bfb08fb9e73defafbd5ddef6b5a0e2ee12b, it was introduced in version v5.6 by commit aa2e93b8e58e18442edfb2427446732415bc215e. For more details please see the references link. | null | 2022-03-18T03:02:36.253609Z | 2022-03-18T00:25:49.479866Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/aa2e93b8e58e18442edfb2427446732415bc215e'} |
Linux | GSD-2022-1001776 | video: fbdev: sm712fb: Fix crash in smtcfb_write() | video: fbdev: sm712fb: Fix crash in smtcfb_write()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit eae90015d10f0c9a47fc4adccba4cd79dce664e4. For more details please see the references link. | null | 2022-04-25T06:39:54.677205Z | 2022-04-24T21:41:43.752081Z | null | null | null | null | null |
Linux | GSD-2021-1002226 | btrfs: fix memory ordering between normal and ordered work functions | btrfs: fix memory ordering between normal and ordered work functions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.291 by commit 637d652d351fd4f263ef302dc52f3971d314e500, it was introduced in version v3.15 by commit 08a9ff3264181986d1d692a4e6fce3669700c9f8. For more details please see the references link. | null | 2021-12-19T23:20:02.741644Z | 2021-11-29T02:34:15.386417Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/08a9ff3264181986d1d692a4e6fce3669700c9f8'} |
Linux | GSD-2022-1001326 | tpm: fix reference counting for struct tpm_chip | tpm: fix reference counting for struct tpm_chip
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.1 by commit 6e7baf84149fb43950631415de231b3a41915aa3, it was introduced in version v4.12 by commit fdc915f7f71939ad5a3dda3389b8d2d7a7c5ee66. For more details please see the references link. | null | 2022-04-25T06:23:49.699994Z | 2022-04-24T21:04:49.918548Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fdc915f7f71939ad5a3dda3389b8d2d7a7c5ee66'} |
Linux | GSD-2021-1001959 | ocfs2: mount fails with buffer overflow in strlen | ocfs2: mount fails with buffer overflow in strlen
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.253 by commit 232ed9752510de4436468b653d145565669c8498. For more details please see the references link. | null | 2021-12-20T01:10:36.255960Z | 2021-11-14T15:13:28.938720Z | null | null | null | null | null |
Linux | GSD-2021-1002676 | net/packet: rx_owner_map depends on pg_vec | net/packet: rx_owner_map depends on pg_vec
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.168 by commit 027a13973dadb64ef4f19db56c9b619ee82c3375, it was introduced in version v5.4.29 by commit 86137342fd4cf52882842aa8d1318b2661f08e8a. For more details please see the references link. | null | 2022-01-11T05:52:27.284957Z | 2021-12-27T05:36:18.347898Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/86137342fd4cf52882842aa8d1318b2661f08e8a'} |
Linux | GSD-2021-1002363 | can: pch_can: pch_can_rx_normal: fix use after free | can: pch_can: pch_can_rx_normal: fix use after free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.295 by commit bafe343a885c70dddf358379cf0b2a1c07355d8d, it was introduced in version v2.6.37 by commit b21d18b51b31a24d17f883b678432fbdee3d5675. For more details please see the references link. | null | 2021-12-20T01:25:35.664686Z | 2021-12-19T19:34:01.458755Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b21d18b51b31a24d17f883b678432fbdee3d5675'} |
Linux | GSD-2022-1000921 | netfilter: fix use-after-free in __nf_register_net_hook() | netfilter: fix use-after-free in __nf_register_net_hook()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.270 by commit 05f7927b25d2635e87267ff6c79db79fb46cf313, it was introduced in version v4.14 by commit 2420b79f8c18a75ee2417cace381f4604b9b4365. For more details please see the references link. | null | 2022-03-18T02:59:45.204894Z | 2022-03-18T00:32:23.241824Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2420b79f8c18a75ee2417cace381f4604b9b4365'} |
Linux | GSD-2022-1001633 | mac80211: fix potential double free on mesh join | mac80211: fix potential double free on mesh join
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.18 by commit 582d8c60c0c053684f7138875e8150d5749ffc17, it was introduced in version v5.8 by commit 6a01afcf8468d3ca2bd8bbb27503f60dcf643b20. For more details please see the references link. | null | 2022-04-25T04:34:58.626460Z | 2022-04-24T21:30:20.656414Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6a01afcf8468d3ca2bd8bbb27503f60dcf643b20'} |
Linux | GSD-2021-1002699 | dm btree remove: fix use after free in rebalance_children() | dm btree remove: fix use after free in rebalance_children()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.88 by commit 0e21e6cd5eebfc929ac5fa3b97ca2d4ace3cb6a3. For more details please see the references link. | null | 2022-01-11T07:15:29.217824Z | 2021-12-27T05:37:34.093740Z | null | null | null | null | null |
Linux | GSD-2021-1002733 | vduse: check that offset is within bounds in get_config() | vduse: check that offset is within bounds in get_config()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit ebbbc5fea3f648175df1aa3f127c78eb0252cc2a, it was introduced in version v5.15 by commit c8a6153b6c59d95c0e091f053f6f180952ade91e. For more details please see the references link. | null | 2022-01-11T05:58:08.340939Z | 2021-12-27T05:45:21.517252Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c8a6153b6c59d95c0e091f053f6f180952ade91e'} |
Linux | GSD-2022-1001799 | gcc-plugins/stackleak: Exactly match strings instead of prefixes | gcc-plugins/stackleak: Exactly match strings instead of prefixes
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 999ee266531bb38497a1ddef03f482961f3ae0e4. For more details please see the references link. | null | 2022-04-25T06:42:32.596044Z | 2022-04-24T21:42:55.828838Z | null | null | null | null | null |
Linux | GSD-2022-1001263 | ASoC: codecs: va-macro: fix accessing array out of bounds for enum type | ASoC: codecs: va-macro: fix accessing array out of bounds for enum type
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit c0099bbf8bc85d30c4cf38220fca3c8d4253fa7f, it was introduced in version v5.11 by commit 908e6b1df26efc9d2df70c9a7bf4f5eae5c5702f. For more details please see the references link. | null | 2022-04-25T04:08:49.945291Z | 2022-04-24T20:59:13.227763Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/908e6b1df26efc9d2df70c9a7bf4f5eae5c5702f'} |
Linux | GSD-2022-1000022 | NFC: st21nfca: Fix memory leak in device probe and remove | NFC: st21nfca: Fix memory leak in device probe and remove
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.224 by commit a1e0080a35a16ce3808f7040fe0c3a8fdb052349, it was introduced in version v3.16 by commit 68957303f44a501af5cf37913208a2acaa6bcdf1. For more details please see the references link. | null | 2022-01-11T05:53:58.679991Z | 2022-01-10T19:50:33.081639Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/68957303f44a501af5cf37913208a2acaa6bcdf1'} |
Linux | GSD-2022-1000188 | KVM: x86: Forcibly leave nested virt when SMM state is toggled | KVM: x86: Forcibly leave nested virt when SMM state is toggled
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.97 by commit 080dbe7e9b86a0392d8dffc00d9971792afc121f. For more details please see the references link. | null | 2022-02-19T03:18:01.085716Z | 2022-02-18T21:52:37.119190Z | null | null | null | null | null |
Linux | GSD-2022-1000472 | mtd: parsers: qcom: Fix kernel panic on skipped partition | mtd: parsers: qcom: Fix kernel panic on skipped partition
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit eb03cb6e03ffd9173e18e5fe87e4e3ce83820453, it was introduced in version v5.12 by commit 803eb124e1a64e42888542c3444bfe6dac412c7f. For more details please see the references link. | null | 2022-03-07T01:38:10.273818Z | 2022-02-27T03:11:54.514557Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/803eb124e1a64e42888542c3444bfe6dac412c7f'} |
Linux | GSD-2022-1002320 | netlabel: fix out-of-bounds memory accesses | netlabel: fix out-of-bounds memory accesses
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.28 by commit e3713abc4248aa6bcc11173d754c418b02a62cbb, it was introduced in version v2.6.19 by commit 446fda4f26822b2d42ab3396aafcedf38a9ff2b6. For more details please see the references link. | null | 2022-04-25T04:48:41.095970Z | 2022-04-24T22:34:08.014377Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/446fda4f26822b2d42ab3396aafcedf38a9ff2b6'} |
Linux | GSD-2021-1000962 | perf: Fix data race between pin_count increment/decrement | perf: Fix data race between pin_count increment/decrement
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.44 by commit c64a3be39fa9fe473dd85cf1e6a4a7b27c0d935f, it was introduced in version v2.6.39 by commit fe4b04fa31a6dcf4358aa84cf81e5a7fd079469b. For more details please see the references link. | null | 2021-12-19T23:31:59.116020Z | 2021-06-30T00:29:30.828209Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fe4b04fa31a6dcf4358aa84cf81e5a7fd079469b'} |
Linux | GSD-2021-1001670 | s390/qeth: fix NULL deref in qeth_clear_working_pool_list() | s390/qeth: fix NULL deref in qeth_clear_working_pool_list()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.70 by commit db94f89e1dadf693c15c2d60de0c34777cea5779, it was introduced in version v5.9 by commit eff73e16ee116f6eafa2be48fab42659a27cb453. For more details please see the references link. | null | 2021-12-20T00:33:25.519877Z | 2021-10-19T16:31:00.088067Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/eff73e16ee116f6eafa2be48fab42659a27cb453'} |
Linux | GSD-2021-1001220 | coresight: tmc-etf: Fix global-out-of-bounds in tmc_update_etf_buffer() | coresight: tmc-etf: Fix global-out-of-bounds in tmc_update_etf_buffer()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.3 by commit 0115687be7b13993066aef602253a53d55f5b11f, it was introduced in version v4.14 by commit 0c3fc4d5fa26092853278145aca9b21fa52a3e93. For more details please see the references link. | null | 2021-12-19T22:37:29.846154Z | 2021-08-03T01:39:48.024474Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0c3fc4d5fa26092853278145aca9b21fa52a3e93'} |
Linux | GSD-2021-1000061 | media: dvbdev: Fix memory leak in dvb_media_device_free() | media: dvbdev: Fix memory leak in dvb_media_device_free()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.3 by commit cede24d13be6c2a62be6d7ceea63c2719b0cfa82, it was introduced in version v4.5 by commit 0230d60e4661d9ced6fb0b9a30f182ebdafbba7a. For more details please see the references link. | null | 2021-12-19T23:14:33.813390Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0230d60e4661d9ced6fb0b9a30f182ebdafbba7a'} |
Linux | GSD-2021-1000431 | spi: Fix use-after-free with devm_spi_alloc_* | spi: Fix use-after-free with devm_spi_alloc_*
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.119 by commit 001c8e83646ad3b847b18f6ac55a54367d917d74, it was introduced in version v5.4.80 by commit 3e04a4976addbedcad326f47b0dd4efc570a1fac. For more details please see the references link. | null | 2021-12-19T22:54:08.583747Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3e04a4976addbedcad326f47b0dd4efc570a1fac'} |
Linux | GSD-2021-1000124 | perf/core: Fix unconditional security_locked_down() call | perf/core: Fix unconditional security_locked_down() call
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.19 by commit f5809ca4c311b71bfaba6d13f4e39eab0557895e, it was introduced in version v5.4 by commit b0c8fdc7fdb77586c3d1937050925b960743306e. For more details please see the references link. | null | 2021-12-20T01:14:14.186153Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b0c8fdc7fdb77586c3d1937050925b960743306e'} |
Linux | GSD-2021-1002119 | net: mdiobus: Fix memory leak in __mdiobus_register | net: mdiobus: Fix memory leak in __mdiobus_register
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit 0c4e87ba11eb331dca2315d484d08441b8c13193. For more details please see the references link. | null | 2021-12-19T22:46:35.634209Z | 2021-11-14T15:20:41.258575Z | null | null | null | null | null |
Linux | GSD-2022-1001449 | scsi: qla2xxx: Fix warning message due to adisc being flushed | scsi: qla2xxx: Fix warning message due to adisc being flushed
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit b13baf97ddbc1a7e7536168383bc0d84c2204b03. For more details please see the references link. | null | 2022-04-25T06:11:30.200760Z | 2022-04-24T21:14:16.062992Z | null | null | null | null | null |
Linux | GSD-2021-1000574 | NFC: nci: fix memory leak in nci_allocate_device | NFC: nci: fix memory leak in nci_allocate_device
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.8 by commit 65234f50a90b64b335cbb9164b8a98c2a0d031dd, it was introduced in version v4.0 by commit 11f54f228643d0248ec00ce8c9fb8d872f87e7b8. For more details please see the references link. | null | 2021-12-19T23:14:49.650056Z | 2021-06-04T19:41:11.675829Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/11f54f228643d0248ec00ce8c9fb8d872f87e7b8'} |
Linux | GSD-2021-1002549 | blk-mq: cancel blk-mq dispatch work in both blk_cleanup_queue and disk_release() | blk-mq: cancel blk-mq dispatch work in both blk_cleanup_queue and disk_release()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.6 by commit e03513f58919d9e2bc6df765ca2c9da863d03d90. For more details please see the references link. | null | 2021-12-19T22:35:51.758015Z | 2021-12-19T19:42:14.430581Z | null | null | null | null | null |
Linux | GSD-2022-1001019 | net: ipv4: fix route with nexthop object delete warning | net: ipv4: fix route with nexthop object delete warning
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit f8db5743d09523c0bb35f16e13691e3b7eb5dba0, it was introduced in version v5.3 by commit 4c7e8084fd467ddb2b0e6c6011f9c1064afb7e56. For more details please see the references link. | null | 2022-04-25T06:57:31.909956Z | 2022-04-24T20:40:23.199702Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4c7e8084fd467ddb2b0e6c6011f9c1064afb7e56'} |
Linux | GSD-2021-1000827 | isdn: mISDN: netjet: Fix crash in nj_probe: | isdn: mISDN: netjet: Fix crash in nj_probe:
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.273 by commit 958cb1078ca60d214826fd90a0961a447fade59a. For more details please see the references link. | null | 2021-12-20T01:07:06.634815Z | 2021-06-29T23:59:50.898485Z | null | null | null | null | null |
Linux | GSD-2021-1001735 | hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field | hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit 16887ae4e3defd2c4e7913b6c539f33eaf4eac5c. For more details please see the references link. | null | 2021-12-19T22:03:50.843577Z | 2021-10-19T16:34:09.733020Z | null | null | null | null | null |
Linux | GSD-2022-1002265 | video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() | video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit da8b269cc0a2526ebeaccbe2484c999eb0f822cf, it was introduced in version v3.2 by commit 3c8a63e22a0802fd56380f6ab305b419f18eb6f5. For more details please see the references link. | null | 2022-04-25T04:37:00.979Z | 2022-04-24T22:28:16.446480Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c8a63e22a0802fd56380f6ab305b419f18eb6f5'} |
Linux | GSD-2022-1000258 | net: fix information leakage in /proc/net/ptype | net: fix information leakage in /proc/net/ptype
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.19 by commit e43669c77cb3a742b7d84ecdc7c68c4167a7709b, it was introduced in version v2.6.26 by commit 2feb27dbe00cbb4f7d31f90acf6bd0d751dd0a50. For more details please see the references link. | null | 2022-02-19T03:08:02.788260Z | 2022-02-18T22:03:05.072614Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2feb27dbe00cbb4f7d31f90acf6bd0d751dd0a50'} |
Linux | GSD-2021-1001365 | virtio_console: Assure used length from device is limited | virtio_console: Assure used length from device is limited
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.198 by commit b5fba782ccd3d12a14f884cd20f255fc9c0eec0c. For more details please see the references link. | null | 2021-12-20T00:10:17.313451Z | 2021-08-03T02:19:59.464156Z | null | null | null | null | null |
Linux | GSD-2022-1000608 | psi: Fix uaf issue when psi trigger is destroyed while being polled | psi: Fix uaf issue when psi trigger is destroyed while being polled
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.5 by commit 991ced6a3a926e58df1f446819b9f2790e1c0daa, it was introduced in version v5.2 by commit 0e94682b73bfa6c44c98af7a26771c9c08c055d5. For more details please see the references link. | null | 2022-03-07T01:49:58.597034Z | 2022-02-27T03:30:47.768943Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0e94682b73bfa6c44c98af7a26771c9c08c055d5'} |
Linux | GSD-2021-1002660 | ovl: fix warning in ovl_create_real() | ovl: fix warning in ovl_create_real()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.222 by commit 445d2dc63e5871d218f21b8f62ab29ac72f2e6b8. For more details please see the references link. | null | 2022-01-11T05:54:52.387235Z | 2021-12-27T05:34:44.326706Z | null | null | null | null | null |
Linux | GSD-2022-1001330 | jbd2: fix use-after-free of transaction_t race | jbd2: fix use-after-free of transaction_t race
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.1 by commit bff94c57bd130e3062afa94414c2294871314096, it was introduced in version v5.17 by commit 4f98186848707f530669238d90e0562d92a78aab. For more details please see the references link. | null | 2022-04-25T05:32:20.127477Z | 2022-04-24T21:05:06.971057Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4f98186848707f530669238d90e0562d92a78aab'} |
Linux | GSD-2021-1002230 | usb: host: ohci-tmio: check return value after calling platform_get_resource() | usb: host: ohci-tmio: check return value after calling platform_get_resource()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.291 by commit 2f18f97a1a787154a372c0738f1576f14b693d91. For more details please see the references link. | null | 2021-12-19T23:03:08.313876Z | 2021-11-29T02:34:24.832667Z | null | null | null | null | null |
Linux | GSD-2022-1001760 | ubifs: Fix to add refcount once page is set private | ubifs: Fix to add refcount once page is set private
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 4f75bab98565afd4f905059c56ec4caba88a7eec, it was introduced in version v2.6.27 by commit 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d. For more details please see the references link. | null | 2022-04-25T04:12:47.412997Z | 2022-04-24T21:40:29.864200Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d'} |
Linux | GSD-2022-1000872 | ibmvnic: free reset-work-item when flushing | ibmvnic: free reset-work-item when flushing
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.183 by commit 58b07100c20e95c78b8cb4d6d28ca53eb9ef81f2, it was introduced in version v4.18 by commit 2770a7984db588913e11a6dfcfe3461dbba9b7b2. For more details please see the references link. | null | 2022-03-18T02:55:27.153795Z | 2022-03-18T00:26:21.534566Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2770a7984db588913e11a6dfcfe3461dbba9b7b2'} |
Linux | GSD-2022-1000521 | ice: Fix KASAN error in LAG NETDEV_UNREGISTER handler | ice: Fix KASAN error in LAG NETDEV_UNREGISTER handler
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit faa9bcf700ca1a0d09f92502a6b65d3ce313fb46, it was introduced in version v5.15 by commit 6a8b357278f5f8b9817147277ab8f12879dce8a8. For more details please see the references link. | null | 2022-03-07T01:37:56.239425Z | 2022-02-27T03:18:54.913946Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6a8b357278f5f8b9817147277ab8f12879dce8a8'} |
Linux | GSD-2022-1000171 | drm/nouveau: fix off by one in BIOS boundary checking | drm/nouveau: fix off by one in BIOS boundary checking
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.178 by commit acc887ba88333f5fec49631f12d8cc7ebd95781c, it was introduced in version v4.8 by commit 4d4e9907ff572bb1d1c0f6913ad6e3d6d4525077. For more details please see the references link. | null | 2022-02-19T04:24:26.305329Z | 2022-02-18T21:50:42.826092Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4d4e9907ff572bb1d1c0f6913ad6e3d6d4525077'} |
Linux | GSD-2022-1000464 | net: dsa: lantiq_gswip: fix use after free in gswip_remove() | net: dsa: lantiq_gswip: fix use after free in gswip_remove()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit df2495f329b08ac0d0d3e6334a01955ae839005e, it was introduced in version v5.15.24 by commit b5652bc50dde7b84e93dfb25479b64b817e377c1. For more details please see the references link. | null | 2022-03-07T01:32:16.201814Z | 2022-02-27T03:10:59.967207Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b5652bc50dde7b84e93dfb25479b64b817e377c1'} |
Linux | GSD-2022-1002459 | ALSA: pcm: Test for "silence" field in struct "pcm_format_data" | ALSA: pcm: Test for "silence" field in struct "pcm_format_data"
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit 77af45df08768401602472f3e3879dce14f55497. For more details please see the references link. | null | 2022-04-25T04:20:35.121625Z | 2022-04-24T22:50:26.217803Z | null | null | null | null | null |
Linux | GSD-2021-1001109 | mac80211: remove warning in ieee80211_get_sband() | mac80211: remove warning in ieee80211_get_sband()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.196 by commit 25487a5ff100398cb214ae854358609e4bbd4e7d. For more details please see the references link. | null | 2021-12-20T01:07:28.418898Z | 2021-07-08T01:56:55.269086Z | null | null | null | null | null |
Linux | GSD-2022-1000034 | i2c: validate user data in compat ioctl | i2c: validate user data in compat ioctl
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.170 by commit 9e4a3f47eff476097e0c7faac04d1831fc70237d, it was introduced in version v4.15 by commit 7d5cb45655f2e9e37ef75d18f50c0072ef14a38b. For more details please see the references link. | null | 2022-01-11T05:46:56.604390Z | 2022-01-10T19:51:03.415718Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7d5cb45655f2e9e37ef75d18f50c0072ef14a38b'} |
Linux | GSD-2022-1002009 | iommu/arm-smmu-v3: fix event handling soft lockup | iommu/arm-smmu-v3: fix event handling soft lockup
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit 0b9cf0b599258dfbc8f3b4f21a0ef1faec8c455e. For more details please see the references link. | null | 2022-04-25T06:29:11.441081Z | 2022-04-24T22:02:42.534509Z | null | null | null | null | null |
Linux | GSD-2021-1001559 | HID: betop: fix slab-out-of-bounds Write in betop_probe | HID: betop: fix slab-out-of-bounds Write in betop_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.209 by commit bb8b72374db69afa25a5b65cf1c092860c6fe914. For more details please see the references link. | null | 2021-12-19T23:36:43.973721Z | 2021-10-19T16:23:45.089906Z | null | null | null | null | null |
Linux | GSD-2022-1001275 | crypto: ccree - Fix use after free in cc_cipher_exit() | crypto: ccree - Fix use after free in cc_cipher_exit()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit cffb5382bd8d3cf21b874ab5b84bf7618932286b, it was introduced in version v4.17 by commit 63ee04c8b491ee148489347e7da9fbfd982ca2bb. For more details please see the references link. | null | 2022-04-25T03:37:47.195742Z | 2022-04-24T21:00:30.565749Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63ee04c8b491ee148489347e7da9fbfd982ca2bb'} |
Linux | GSD-2021-1002725 | mac80211: validate extended element ID is present | mac80211: validate extended element ID is present
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit c62b16f98688ae7bc0ab23a6490481f4ce9b3a49, it was introduced in version v4.19 by commit 41cbb0f5a29592874355e4159489eb08337cd50e. For more details please see the references link. | null | 2022-01-11T05:48:48.129926Z | 2021-12-27T05:39:13.447540Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41cbb0f5a29592874355e4159489eb08337cd50e'} |
Linux | GSD-2021-1000718 | nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect | nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.272 by commit eb6875d48590d8e564092e831ff07fa384d7e477, it was introduced in version v3.3 by commit d646960f7986fefb460a2b062d5ccc8ccfeacc3a. For more details please see the references link. | null | 2021-12-19T23:39:22.039169Z | 2021-06-24T23:58:58.738441Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d646960f7986fefb460a2b062d5ccc8ccfeacc3a'} |
Linux | GSD-2022-1001625 | cifs: fix handlecache and multiuser | cifs: fix handlecache and multiuser
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit ffa631c4bff59dde59b598011f570e27dfba3515. For more details please see the references link. | null | 2022-04-25T05:18:59.093491Z | 2022-04-24T21:29:46.450982Z | null | null | null | null | null |
Linux | GSD-2022-1000937 | xen/gnttab: fix gnttab_end_foreign_access() without page specified | xen/gnttab: fix gnttab_end_foreign_access() without page specified
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.306 by commit ae6f8a67b98144827e78874c8dba41cccb02be5b. For more details please see the references link. | null | 2022-03-18T02:59:55.823701Z | 2022-03-18T00:34:19.015388Z | null | null | null | null | null |
Linux | GSD-2021-1002375 | net: ethernet: dec: tulip: de4x5: fix possible array overflows in type3_infoblock() | net: ethernet: dec: tulip: de4x5: fix possible array overflows in type3_infoblock()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.292 by commit 890fefa2d24d4c653b1b425127488a7f8c14ff5c. For more details please see the references link. | null | 2021-12-20T00:24:54.458214Z | 2021-12-19T19:34:30.486527Z | null | null | null | null | null |
Linux | GSD-2021-1000348 | powerpc/64: Fix the definition of the fixmap area | powerpc/64: Fix the definition of the fixmap area
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 4b9fb2c9039a206d37f215936a4d5bee7b1bf9cd, it was introduced in version v5.5 by commit 265c3491c4bc8d40587996d6ee2f447a7ccfb4f3. For more details please see the references link. | null | 2021-12-20T00:54:16.931237Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/265c3491c4bc8d40587996d6ee2f447a7ccfb4f3'} |
Linux | GSD-2021-1000466 | powerpc/64s: Fix crashes when toggling entry flush barrier | powerpc/64s: Fix crashes when toggling entry flush barrier
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.233 by commit ee4b7aab93c2631c3bb0753023c5dda592bb666b, it was introduced in version v4.14.208 by commit db01cad9efe3c3838a6b3a3f68affd295c4b92d6. For more details please see the references link. | null | 2021-12-19T23:15:21.399295Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/db01cad9efe3c3838a6b3a3f68affd295c4b92d6'} |
Linux | GSD-2021-1000036 | ch_ktls: Fix kernel panic | ch_ktls: Fix kernel panic
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.32 by commit 8d5a9dbd2116a852f8f0f91f6fbc42a0afe1091f, it was introduced in version v5.7 by commit 5a4b9fe7fece62ecab6fb28fe92362f83b41c33e. For more details please see the references link. | null | 2021-12-19T22:57:34.989796Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5a4b9fe7fece62ecab6fb28fe92362f83b41c33e'} |
Linux | GSD-2021-1001277 | tty: serial: 8250: serial_cs: Fix a memory leak in error handling path | tty: serial: 8250: serial_cs: Fix a memory leak in error handling path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.52 by commit 7a80f71601af015856a0aeb1e3c294037ac3dd32. For more details please see the references link. | null | 2021-12-20T01:25:55.572536Z | 2021-08-03T01:55:41.622457Z | null | null | null | null | null |
Linux | GSD-2022-1001808 | vsock/virtio: initialize vdev->priv before using VQs | vsock/virtio: initialize vdev->priv before using VQs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 10c6cb867ffa827a8364d0c481ec1438cd594652, it was introduced in version v5.3 by commit 9c7a5582f5d720dc35cfcc42ccaded69f0642e4a. For more details please see the references link. | null | 2022-04-25T04:18:42.809852Z | 2022-04-24T21:43:41.340486Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9c7a5582f5d720dc35cfcc42ccaded69f0642e4a'} |
Linux | GSD-2021-1000935 | net: bridge: fix vlan tunnel dst refcnt when egressing | net: bridge: fix vlan tunnel dst refcnt when egressing
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.128 by commit 79855be6445b6592bddb7bd7167083ec8cdbd73f, it was introduced in version v4.11 by commit 11538d039ac6efcf4f1a6c536e1b87cd3668a9fd. For more details please see the references link. | null | 2021-12-19T23:12:44.517399Z | 2021-06-30T00:25:32.530042Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/11538d039ac6efcf4f1a6c536e1b87cd3668a9fd'} |
Linux | GSD-2021-1001627 | net/sched: sch_taprio: properly cancel timer from taprio_destroy() | net/sched: sch_taprio: properly cancel timer from taprio_destroy()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.73 by commit 3ec73ffeef54596c32aff0e73fe60971b9c8b866, it was introduced in version v5.10.5 by commit a969a632cbe7165d448a5528806ad120c2599397. For more details please see the references link. | null | 2021-12-20T01:01:09.844963Z | 2021-10-19T16:28:55.157179Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a969a632cbe7165d448a5528806ad120c2599397'} |
Linux | GSD-2022-1002377 | pinctrl: samsung: drop pin banks references on error paths | pinctrl: samsung: drop pin banks references on error paths
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 2ec7782cf5ce45d09bfc988125a2526ed41c41b7, it was introduced in version v3.8 by commit ab663789d69760d2735402f66501f20b60312a3d. For more details please see the references link. | null | 2022-04-25T06:44:29.334598Z | 2022-04-24T22:40:49.720469Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab663789d69760d2735402f66501f20b60312a3d'} |
Linux | GSD-2021-1001332 | virtio-blk: Fix memory leak among suspend/resume procedure | virtio-blk: Fix memory leak among suspend/resume procedure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.134 by commit 04c6e60b884cb5e94ff32af46867fb41d5848358. For more details please see the references link. | null | 2021-12-19T22:35:55.002345Z | 2021-08-03T02:11:10.225514Z | null | null | null | null | null |
Linux | GSD-2022-1002398 | drbd: Fix five use after free bugs in get_initial_state | drbd: Fix five use after free bugs in get_initial_state
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit dcf6be17b5c53b741898d2223b23e66d682de300, it was introduced in version v4.5 by commit a29728463b254ce81ecefdf20c1a02e01d9361da. For more details please see the references link. | null | 2022-04-25T04:15:28.763261Z | 2022-04-24T22:43:14.915042Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a29728463b254ce81ecefdf20c1a02e01d9361da'} |
Linux | GSD-2022-1002232 | clk: qcom: clk-rcg2: Update logic to calculate D value for RCG | clk: qcom: clk-rcg2: Update logic to calculate D value for RCG
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 52592f9afbfe01bce8f8953e4f19cbe3bcbdbd3a, it was introduced in version v3.16 by commit 99cbd064b059f222c8839ba433a68b2d6ee33066. For more details please see the references link. | null | 2022-04-25T06:31:21.360639Z | 2022-04-24T22:24:00.257564Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/99cbd064b059f222c8839ba433a68b2d6ee33066'} |
Linux | GSD-2021-1001298 | ext4: fix memory leak in ext4_fill_super | ext4: fix memory leak in ext4_fill_super
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.43 by commit 01d349a481f0591230300a9171330136f9159bcd, it was introduced in version v2.6.25 by commit ce40733ce93de402ed629762f0e912d9af187cef. For more details please see the references link. | null | 2021-12-20T00:19:29.064779Z | 2021-08-03T02:00:56.775122Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ce40733ce93de402ed629762f0e912d9af187cef'} |
Linux | GSD-2021-1000870 | wq: handle VM suspension in stall detection | wq: handle VM suspension in stall detection
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.195 by commit 50316635e644a0b9e62d3263fb4e8be2104605b6. For more details please see the references link. | null | 2021-12-19T22:18:59.251884Z | 2021-06-30T00:02:38.905271Z | null | null | null | null | null |
Linux | GSD-2021-1001762 | nexthop: Fix division by zero while replacing a resilient group | nexthop: Fix division by zero while replacing a resilient group
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.9 by commit e9d32ec26e7f01d1af13bdc687f586362546aa25, it was introduced in version v5.13 by commit 283a72a5599e80750699d2021830a294ed9ab3f3. For more details please see the references link. | null | 2021-12-20T01:14:13.863546Z | 2021-10-19T16:35:29.402699Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/283a72a5599e80750699d2021830a294ed9ab3f3'} |
Linux | GSD-2021-1000523 | Bluetooth: SMP: Fail if remote and local public keys are identical | Bluetooth: SMP: Fail if remote and local public keys are identical
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.122 by commit f97257cde764ad6979a7dbeb460b9fb69276342e, it was introduced in version v3.17 by commit bfe01a5ba2490f299e1d2d5508cbbbadd897bbe9. For more details please see the references link. | null | 2021-12-19T23:33:20.275181Z | 2021-05-31T23:50:44.006203Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bfe01a5ba2490f299e1d2d5508cbbbadd897bbe9'} |
Linux | GSD-2021-1000489 | powerpc/64s: Fix crashes when toggling entry flush barrier | powerpc/64s: Fix crashes when toggling entry flush barrier
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.269 by commit 8382b15864e5014261b4f36c2aa89723612ee058, it was introduced in version v4.4.245 by commit 4a1e90af718d1489ffcecc8f52486c4f5dc0f7a6. For more details please see the references link. | null | 2021-12-20T00:53:37.575216Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4a1e90af718d1489ffcecc8f52486c4f5dc0f7a6'} |
Linux | GSD-2021-1000173 | md/raid1: properly indicate failure when ending a failed write request | md/raid1: properly indicate failure when ending a failed write request
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.118 by commit 6920cef604fa57f9409e3960413e9cc11f5c5a40, it was introduced in version v5.4 by commit eeba6809d8d58908b5ed1b5ceb5fcb09a98a7cad. For more details please see the references link. | null | 2021-12-20T01:32:14.468986Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/eeba6809d8d58908b5ed1b5ceb5fcb09a98a7cad'} |
Linux | GSD-2022-1000126 | scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() | scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.228 by commit de6336b17a1376db1c0f7a528cce8783db0881c0, it was introduced in version v3.2 by commit 0cbf32e1681d870632a1772601cbaadd996dc978. For more details please see the references link. | null | 2022-02-19T12:50:33.468436Z | 2022-02-18T21:44:01.724690Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0cbf32e1681d870632a1772601cbaadd996dc978'} |
Linux | GSD-2022-1000576 | drm/amd/display: watermark latencies is not enough on DCN31 | drm/amd/display: watermark latencies is not enough on DCN31
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.22 by commit 7ff0ed88e4eb6bd7ccd7cf422ab855032ed0528c. For more details please see the references link. | null | 2022-03-07T01:36:48.777667Z | 2022-02-27T03:25:49.973799Z | null | null | null | null | null |
Linux | GSD-2022-1001737 | drm/bridge: Add missing pm_runtime_put_sync | drm/bridge: Add missing pm_runtime_put_sync
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit ff13c90d7f7ab606b37be6d15140d19013d6736c. For more details please see the references link. | null | 2022-04-25T06:39:52.755626Z | 2022-04-24T21:38:25.862951Z | null | null | null | null | null |
Linux | GSD-2022-1000825 | arm64: entry.S: Add ventry overflow sanity checks | arm64: entry.S: Add ventry overflow sanity checks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.105 by commit dc5b630c0d532140e194997d350f587dbcc78bfb. For more details please see the references link. | null | 2022-03-18T04:26:12.125841Z | 2022-03-18T00:21:37.075994Z | null | null | null | null | null |
Linux | GSD-2021-1002267 | tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc | tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.162 by commit d491c84df5c469dd9621863b6a770b3428137063. For more details please see the references link. | null | 2021-12-20T00:35:52.644675Z | 2021-11-29T02:36:09.599871Z | null | null | null | null | null |
Linux | GSD-2022-1001367 | jfs: prevent NULL deref in diFree | jfs: prevent NULL deref in diFree
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit ffe1d40aec3f6f8cc620369ba07eb5e9bd449d85. For more details please see the references link. | null | 2022-04-25T04:56:18.344770Z | 2022-04-24T21:08:24.049453Z | null | null | null | null | null |
Linux | GSD-2021-1002637 | net: systemport: Add global locking for descriptor lifecycle | net: systemport: Add global locking for descriptor lifecycle
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.259 by commit f3fde37d3f0d429f0fcce214cb52588a9e21260e, it was introduced in version v3.16 by commit 80105befdb4b8cea924711b40b2462b87df65b62. For more details please see the references link. | null | 2022-01-11T05:58:15.314999Z | 2021-12-27T05:28:22.782630Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80105befdb4b8cea924711b40b2462b87df65b62'} |
Linux | GSD-2021-1001918 | can: peak_pci: peak_pci_remove(): fix UAF | can: peak_pci: peak_pci_remove(): fix UAF
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.290 by commit 1c616528ba4aeb1125a06b407572ab7b56acae38, it was introduced in version v3.4 by commit e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd. For more details please see the references link. | null | 2021-12-20T00:16:42.560242Z | 2021-11-14T15:11:39.892775Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd'} |
Linux | GSD-2022-1001388 | scsi: libfc: Fix use after free in fc_exch_abts_resp() | scsi: libfc: Fix use after free in fc_exch_abts_resp()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 87909291762d08fdb60d19069d7a89b5b308d0ef. For more details please see the references link. | null | 2022-04-25T06:31:15.209943Z | 2022-04-24T21:09:41.536699Z | null | null | null | null | null |
Linux | GSD-2021-1002322 | RDMA/core: Set send and receive CQ before forwarding to the driver | RDMA/core: Set send and receive CQ before forwarding to the driver
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit b70e072feffa0ba5c41a99b9524b9878dee7748e, it was introduced in version v5.15 by commit 514aee660df493cd673154a6ba6bab745ec47b8c. For more details please see the references link. | null | 2021-12-19T22:33:58.896076Z | 2021-11-29T02:38:41.864866Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/514aee660df493cd673154a6ba6bab745ec47b8c'} |
Linux | GSD-2022-1001672 | fbdev: Fix unregistering of framebuffers without device | fbdev: Fix unregistering of framebuffers without device
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 2388f826cdc9af2651991adc0feb79de9bdf2232, it was introduced in version v5.15.33 by commit c894ac44786cfed383a6c6b20c1bfb12eb96018a. For more details please see the references link. | null | 2022-04-25T03:36:38.601857Z | 2022-04-24T21:33:48.499099Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c894ac44786cfed383a6c6b20c1bfb12eb96018a'} |
Linux | GSD-2022-1000960 | ARM: davinci: da850-evm: Avoid NULL pointer dereference | ARM: davinci: da850-evm: Avoid NULL pointer dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.4 by commit c5628533a3ece64235d04fe11ec44d2be99e423d, it was introduced in version v2.6.33 by commit bae105879f2f2404155da6f50b3636193d228a62. For more details please see the references link. | null | 2022-04-25T04:35:26.780394Z | 2022-04-24T20:35:18.391283Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bae105879f2f2404155da6f50b3636193d228a62'} |
Linux | GSD-2021-1002772 | IB/qib: Fix memory leak in qib_user_sdma_queue_pkts() | IB/qib: Fix memory leak in qib_user_sdma_queue_pkts()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.297 by commit 1ced0a3015a95c6a6db45e37250912c4c86697ab, it was introduced in version v4.4.292 by commit bda41654b6e0c125a624ca35d6d20beb8015b5d0. For more details please see the references link. | null | 2022-01-11T05:52:47.019856Z | 2021-12-30T02:42:48.640254Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bda41654b6e0c125a624ca35d6d20beb8015b5d0'} |
Linux | GSD-2021-1002288 | perf bpf: Avoid memory leak from perf_env__insert_btf() | perf bpf: Avoid memory leak from perf_env__insert_btf()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.82 by commit 11589d3144bc4e272e0aae46ce8156162e99babc, it was introduced in version v5.1 by commit 3792cb2ff43b1b193136a03ce1336462a827d792. For more details please see the references link. | null | 2021-12-20T01:35:06.473026Z | 2021-11-29T02:37:10.629888Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3792cb2ff43b1b193136a03ce1336462a827d792'} |
Linux | GSD-2022-1001222 | drm/dp: Fix OOB read when handling Post Cursor2 register | drm/dp: Fix OOB read when handling Post Cursor2 register
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit aeaed9a9fe694f8b1462fb81e2d33298c929180b, it was introduced in version v5.5 by commit 79465e0ffeb9e4866939ea562bc55367be91e595. For more details please see the references link. | null | 2022-04-25T03:11:05.292803Z | 2022-04-24T20:55:26.440547Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/79465e0ffeb9e4866939ea562bc55367be91e595'} |
Linux | GSD-2022-1000599 | drm/vmwgfx: Fix stale file descriptors on failed usercopy | drm/vmwgfx: Fix stale file descriptors on failed usercopy
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.4 by commit 1d833b27fb708d6fdf5de9f6b3a8be4bd4321565, it was introduced in version v4.14 by commit c906965dee22d5e95d0651759ba107b420212a9f. For more details please see the references link. | null | 2022-03-07T01:49:58.627372Z | 2022-02-27T03:29:07.972503Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c906965dee22d5e95d0651759ba107b420212a9f'} |
Linux | GSD-2022-1000063 | ALSA: hda: intel-sdw-acpi: harden detection of controller | ALSA: hda: intel-sdw-acpi: harden detection of controller
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.13 by commit cce476954401e3421afafb25bbaa926050688b1d. For more details please see the references link. | null | 2022-01-11T06:56:14.816646Z | 2022-01-10T19:52:28.579312Z | null | null | null | null | null |
Linux | GSD-2022-1000433 | net: fix a memleak when uncloning an skb dst and its metadata | net: fix a memleak when uncloning an skb dst and its metadata
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit fdcb263fa5cda15b8cb24a641fa2718c47605314, it was introduced in version v4.3 by commit fc4099f17240767554ff3a73977acb78ef615404. For more details please see the references link. | null | 2022-03-07T01:39:11.054656Z | 2022-02-27T03:06:46.807976Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fc4099f17240767554ff3a73977acb78ef615404'} |
Linux | GSD-2021-1002000 | NFC: digital: fix possible memory leak in digital_in_send_sdd_req() | NFC: digital: fix possible memory leak in digital_in_send_sdd_req()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.155 by commit 2bde4aca56db9fe25405d39ddb062531493a65db, it was introduced in version v3.13 by commit 2c66daecc4092e6049673c281b2e6f0d5e59a94c. For more details please see the references link. | null | 2021-12-19T22:10:47.702972Z | 2021-11-14T15:15:17.163219Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c66daecc4092e6049673c281b2e6f0d5e59a94c'} |
Linux | GSD-2022-1001550 | mt76: mt7915: fix possible memory leak in mt7915_mcu_add_sta | mt76: mt7915: fix possible memory leak in mt7915_mcu_add_sta
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit daf02c7e3c3dc82ffa925999597bd455cf799551, it was introduced in version v5.16 by commit 89bbd3730f382f15cfcc2c9264c65b5901ce02fa. For more details please see the references link. | null | 2022-04-25T06:31:36.018509Z | 2022-04-24T21:22:34.281308Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/89bbd3730f382f15cfcc2c9264c65b5901ce02fa'} |
Linux | GSD-2021-1002450 | rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() | rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.164 by commit 3e70e3a72d80b16094faccbe438cd53761c3503a, it was introduced in version v5.4 by commit 9ebeddef58c41bd700419cdcece24cf64ce32276. For more details please see the references link. | null | 2021-12-20T00:32:07.265678Z | 2021-12-19T19:37:54.132483Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9ebeddef58c41bd700419cdcece24cf64ce32276'} |
Linux | GSD-2022-1001100 | ACPI: CPPC: Avoid out of bounds access when parsing _CPC data | ACPI: CPPC: Avoid out of bounds access when parsing _CPC data
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit d7339f2a3938fb56b5f28d53f5345900b5fa0e74, it was introduced in version v4.4 by commit 337aadff8e4567e39669e07d9a88b789d78458b5. For more details please see the references link. | null | 2022-04-25T03:55:49.935650Z | 2022-04-24T20:45:21.795619Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/337aadff8e4567e39669e07d9a88b789d78458b5'} |
Linux | GSD-2021-1000197 | f2fs: compress: fix race condition of overwrite vs truncate | f2fs: compress: fix race condition of overwrite vs truncate
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.5 by commit 936158b15e2648253afb824d252c910c496d34b5, it was introduced in version v5.6 by commit 4c8ff7095bef64fc47e996a938f7d57f9e077da3. For more details please see the references link. | null | 2021-12-19T22:26:51.226381Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4c8ff7095bef64fc47e996a938f7d57f9e077da3'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.