ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2022-1000341 | veth: fix races around rq->rx_notify_masked | veth: fix races around rq->rx_notify_masked
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.180 by commit c99e66350ca01d2e7836d80f6f451c0e648bcbe0, it was introduced in version v4.19 by commit 948d4f214fde43743c57aae0c708bff44f6345f2. For more details please see the references link. | null | 2022-03-07T01:33:55.580435Z | 2022-02-27T02:53:28.875168Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/948d4f214fde43743c57aae0c708bff44f6345f2'} |
Linux | GSD-2022-1001803 | net/sched: act_ct: fix ref leak when switching zones | net/sched: act_ct: fix ref leak when switching zones
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit bcbf4e5c3b5b373cd61528392dd1ec8e9c0fd33d, it was introduced in version v5.15.26 by commit a95ea90deb3071c1ded77a05e91cfebc5238d908. For more details please see the references link. | null | 2022-04-25T03:59:27.791017Z | 2022-04-24T21:43:12.400516Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a95ea90deb3071c1ded77a05e91cfebc5238d908'} |
Linux | GSD-2022-1000711 | iommu/vt-d: Fix double list_add when enabling VMD in scalable mode | iommu/vt-d: Fix double list_add when enabling VMD in scalable mode
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.13 by commit d5ad4214d9c6c6e465c192789020a091282dfee7, it was introduced in version v5.14 by commit 474dd1c6506411752a9b2f2233eec11f1733a099. For more details please see the references link. | null | 2022-03-18T02:49:31.144404Z | 2022-03-18T00:11:39.224153Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/474dd1c6506411752a9b2f2233eec11f1733a099'} |
Linux | GSD-2021-1000894 | kvm: avoid speculation-based attacks from out-of-range memslot accesses | kvm: avoid speculation-based attacks from out-of-range memslot accesses
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.126 by commit bff1fbf0cf0712686f1df59a83fba6e31d2746a0. For more details please see the references link. | null | 2021-12-20T01:17:57.053257Z | 2021-06-30T00:04:59.056926Z | null | null | null | null | null |
Linux | GSD-2021-1001786 | efi: Change down_interruptible() in virt_efi_reset_system() to down_trylock() | efi: Change down_interruptible() in virt_efi_reset_system() to down_trylock()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.288 by commit 1882965c67475bbc4448b1d03051e3f9f6746042. For more details please see the references link. | null | 2021-12-20T00:46:49.274918Z | 2021-10-28T13:48:48.062076Z | null | null | null | null | null |
Linux | GSD-2022-1000204 | PCI: pciehp: Fix infinite loop in IRQ handler upon power fault | PCI: pciehp: Fix infinite loop in IRQ handler upon power fault
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.97 by commit 3b4c966fb156ff3e70b2526d964952ff7c1574d9, it was introduced in version v5.7 by commit 8edf5332c39340b9583cf9cba659eb7ec71f75b5. For more details please see the references link. | null | 2022-02-19T08:11:12.809743Z | 2022-02-18T21:55:14.015235Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8edf5332c39340b9583cf9cba659eb7ec71f75b5'} |
Linux | GSD-2022-1002239 | bpf, sockmap: Fix double uncharge the mem of sk_msg | bpf, sockmap: Fix double uncharge the mem of sk_msg
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 94c6ac22abcdede72bfaa0f4c22fb370891f4002, it was introduced in version v4.20 by commit 604326b41a6fb9b4a78b6179335decee0365cd8c. For more details please see the references link. | null | 2022-04-25T03:36:44.631174Z | 2022-04-24T22:24:48.777517Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/604326b41a6fb9b4a78b6179335decee0365cd8c'} |
Linux | GSD-2021-1001293 | RDMA/cma: Fix rdma_resolve_route() memory leak | RDMA/cma: Fix rdma_resolve_route() memory leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.51 by commit 3d08b5917984f737f32d5bee9737b9075c3895c6. For more details please see the references link. | null | 2021-12-20T00:45:56.512569Z | 2021-08-03T01:59:16.746045Z | null | null | null | null | null |
Linux | GSD-2021-1002846 | pinctrl: mediatek: fix global-out-of-bounds issue | pinctrl: mediatek: fix global-out-of-bounds issue
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.12 by commit fb563baa3eb8e7a15f2cff3c2695e2cca0493e69. For more details please see the references link. | null | 2022-01-11T08:26:32.536622Z | 2021-12-30T02:46:02.571169Z | null | null | null | null | null |
Linux | GSD-2021-1001769 | net: mdiobus: Fix memory leak in __mdiobus_register | net: mdiobus: Fix memory leak in __mdiobus_register
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.290 by commit fd2400dd4f1b8bd7a309b1b424d9e0d188151b01. For more details please see the references link. | null | 2021-12-19T23:38:03.516987Z | 2021-10-28T13:47:59.985888Z | null | null | null | null | null |
Linux | GSD-2022-1001946 | ALSA: pcm: Test for "silence" field in struct "pcm_format_data" | ALSA: pcm: Test for "silence" field in struct "pcm_format_data"
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.112 by commit 912797e54c99a98f0722f21313e13a3938bb6dba. For more details please see the references link. | null | 2022-04-25T06:28:37.033541Z | 2022-04-24T21:57:03.183510Z | null | null | null | null | null |
Linux | GSD-2022-1000654 | ALSA: hda: Fix UAF of leds class devs at unbinding | ALSA: hda: Fix UAF of leds class devs at unbinding
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.8 by commit 813e9f3e06d22e29872d4fd51b54992d89cf66c8. For more details please see the references link. | null | 2022-03-07T01:40:11.433006Z | 2022-02-27T03:36:37.819041Z | null | null | null | null | null |
Linux | GSD-2021-1001339 | misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge | misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.134 by commit d2639ffdcad463b358b6bef8645ff81715daffcb. For more details please see the references link. | null | 2021-12-20T00:53:26.008474Z | 2021-08-03T02:12:37.111485Z | null | null | null | null | null |
Linux | GSD-2022-1002393 | veth: Ensure eth header is in skb's linear part | veth: Ensure eth header is in skb's linear part
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit d417a859221f127e8edf09c14b76ab50f825e171, it was introduced in version v2.6.24 by commit e314dbdc1c0dc6a548ecf0afce28ecfd538ff568. For more details please see the references link. | null | 2022-04-25T05:35:40.914153Z | 2022-04-24T22:42:38.260150Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e314dbdc1c0dc6a548ecf0afce28ecfd538ff568'} |
Linux | GSD-2022-1001415 | drm/amd/display: Fix memory leak | drm/amd/display: Fix memory leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 3ce1497add6d17b48cc9df65095bd20202d93994. For more details please see the references link. | null | 2022-04-25T04:51:07.644086Z | 2022-04-24T21:11:12.407463Z | null | null | null | null | null |
Linux | GSD-2021-1000482 | liquidio: Fix unintented sign extension of a left shift of a u16 | liquidio: Fix unintented sign extension of a left shift of a u16
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.269 by commit 7c8e283fff5059a2b4ed2ef22292bfde10c975c0, it was introduced in version v4.9 by commit 5bc67f587ba7eaa8dd3976bfeff8f2b60718c871. For more details please see the references link. | null | 2021-12-19T23:04:15.004727Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5bc67f587ba7eaa8dd3976bfeff8f2b60718c871'} |
Linux | GSD-2021-1002145 | isofs: Fix out of bound access for corrupted isofs image | isofs: Fix out of bound access for corrupted isofs image
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.18 by commit b2fa1f52d22c5455217b294629346ad23a744945. For more details please see the references link. | null | 2021-12-19T23:07:07.505Z | 2021-11-14T15:21:53.736023Z | null | null | null | null | null |
Linux | GSD-2021-1000178 | cifs: Return correct error code from smb2_get_enc_key | cifs: Return correct error code from smb2_get_enc_key
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.118 by commit 93f3339b22ba17e66f0808737467b70ba087eaec, it was introduced in version v4.11 by commit 61cfac6f267dabcf2740a7ec8a0295833b28b5f5. For more details please see the references link. | null | 2021-12-20T00:57:24.537251Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61cfac6f267dabcf2740a7ec8a0295833b28b5f5'} |
Linux | GSD-2022-1001045 | scsi: libfc: Fix use after free in fc_exch_abts_resp() | scsi: libfc: Fix use after free in fc_exch_abts_resp()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 412dd8299b02e4410fe77b8396953c1a8dde183a. For more details please see the references link. | null | 2022-04-25T05:50:30.537641Z | 2022-04-24T20:42:01.101946Z | null | null | null | null | null |
Linux | GSD-2021-1002515 | ASoC: codecs: wcd934x: handle channel mappping list correctly | ASoC: codecs: wcd934x: handle channel mappping list correctly
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.85 by commit 1089dac26c6b4b833323ae6c0ceab29fb30ede72, it was introduced in version v5.6 by commit a70d9245759a48e57bb1dc9f63213dcf3017db32. For more details please see the references link. | null | 2021-12-19T22:45:09.582614Z | 2021-12-19T19:40:44.504511Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a70d9245759a48e57bb1dc9f63213dcf3017db32'} |
Linux | GSD-2021-1000528 | net: zero-initialize tc skb extension on allocation | net: zero-initialize tc skb extension on allocation
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit 86ab133b695ed7ba1f8786b12f4ca43137ad8c18, it was introduced in version v5.9 by commit 038ebb1a713d114d54dbf14868a73181c0c92758. For more details please see the references link. | null | 2021-12-20T00:01:43.768188Z | 2021-06-04T19:33:55.383601Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/038ebb1a713d114d54dbf14868a73181c0c92758'} |
Linux | GSD-2022-1000087 | af_packet: fix data-race in packet_setsockopt / packet_setsockopt | af_packet: fix data-race in packet_setsockopt / packet_setsockopt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.300 by commit bfce19548a2ba1e007c84fe725d70a9c3caf46a1, it was introduced in version v4.3 by commit 47dceb8ecdc1c3ad1818dfea3d659a05b74c3fc2. For more details please see the references link. | null | 2022-02-19T04:33:36.274999Z | 2022-02-18T21:33:44.984424Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/47dceb8ecdc1c3ad1818dfea3d659a05b74c3fc2'} |
Linux | GSD-2021-1001010 | net/nfc/rawsock.c: fix a permission check bug | net/nfc/rawsock.c: fix a permission check bug
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.11 by commit 90d0a3c76965d7a10fc87c07be3e9714e2130d5c. For more details please see the references link. | null | 2021-12-20T00:39:46.005231Z | 2021-06-30T00:33:42.772778Z | null | null | null | null | null |
Linux | GSD-2022-1002110 | video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() | video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 64ec3e678d76419f207b9cdd338dda438ca10b1c, it was introduced in version v3.2 by commit 3c8a63e22a0802fd56380f6ab305b419f18eb6f5. For more details please see the references link. | null | 2022-04-25T06:29:53.372727Z | 2022-04-24T22:12:38.990010Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c8a63e22a0802fd56380f6ab305b419f18eb6f5'} |
Linux | GSD-2021-1001440 | net: ti: fix UAF in tlan_remove_one | net: ti: fix UAF in tlan_remove_one
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.277 by commit c263ae8c7e4c482387de5e6c89e213f8173fe8b6, it was introduced in version v3.10 by commit 1e0a8b13d35510e711fdf72e9a3e30bcb2bd49fa. For more details please see the references link. | null | 2021-12-19T22:34:47.200621Z | 2021-08-03T02:41:50.285614Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e0a8b13d35510e711fdf72e9a3e30bcb2bd49fa'} |
Linux | GSD-2022-1001696 | scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one() | scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit aefd755a96051aa56b198cb7ecd168b22ba384f6, it was introduced in version v2.6.23 by commit 45804fbb00eea27bdf4d62751681228a9e2844e9. For more details please see the references link. | null | 2022-04-25T05:44:33.124338Z | 2022-04-24T21:36:07.977311Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/45804fbb00eea27bdf4d62751681228a9e2844e9'} |
Linux | GSD-2022-1000984 | ice: arfs: fix use-after-free when freeing @rx_cpu_rmap | ice: arfs: fix use-after-free when freeing @rx_cpu_rmap
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.4 by commit d08d2fb6d99d82da1c63aba5c0d1c6f237e150f3, it was introduced in version v5.8 by commit 28bf26724fdb0e02267d19e280d6717ee810a10d. For more details please see the references link. | null | 2022-04-25T05:16:40.339396Z | 2022-04-24T20:37:11.091256Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/28bf26724fdb0e02267d19e280d6717ee810a10d'} |
Linux | GSD-2021-1000601 | NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() | NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.42 by commit 7087db95c0a06ab201b8ebfac6a7ec1e34257997, it was introduced in version v4.0 by commit a7d42ddb3099727f58366fa006f850a219cce6c8. For more details please see the references link. | null | 2021-12-20T01:37:33.444301Z | 2021-06-04T19:45:29.306930Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a7d42ddb3099727f58366fa006f850a219cce6c8'} |
Linux | GSD-2021-1001913 | btrfs: fix abort logic in btrfs_replace_file_extents | btrfs: fix abort logic in btrfs_replace_file_extents
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit 0e309e1152fc34ef75991d9d69b165dbf75bf26c. For more details please see the references link. | null | 2021-12-20T00:13:03.059112Z | 2021-10-28T13:55:25.807671Z | null | null | null | null | null |
Linux | GSD-2021-1002796 | ipmi: fix initialization when workqueue allocation fails | ipmi: fix initialization when workqueue allocation fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.169 by commit 8467c8cb94a406cc0c54d9306b61d0db86c94048, it was introduced in version v5.4.164 by commit 648813c26d64e005fba943cf3ed19dff19db1cc4. For more details please see the references link. | null | 2022-01-11T05:52:33.445419Z | 2021-12-30T02:43:46.486907Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/648813c26d64e005fba943cf3ed19dff19db1cc4'} |
Linux | GSD-2021-1000251 | mt76: mt7915: fix txrate reporting | mt76: mt7915: fix txrate reporting
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 4bd926e5ca88eac4d95eacb806b229f8729bc62e, it was introduced in version v5.8 by commit e57b7901469fc0b021930b83a8094baaf3d81b09. For more details please see the references link. | null | 2021-12-20T00:41:19.997954Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e57b7901469fc0b021930b83a8094baaf3d81b09'} |
Linux | GSD-2021-1000744 | btrfs: fixup error handling in fixup_inode_link_counts | btrfs: fixup error handling in fixup_inode_link_counts
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.194 by commit c5cfa81562174e585ecc40bf8766835abd058572, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T00:00:37.642964Z | 2021-06-25T00:01:57.970082Z | null | null | null | null | null |
Linux | GSD-2021-1002779 | phonet/pep: refuse to enable an unbound pipe | phonet/pep: refuse to enable an unbound pipe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.295 by commit b10c7d745615a092a50c2e03ce70446d2bec2aca. For more details please see the references link. | null | 2022-01-11T06:48:37.864866Z | 2021-12-30T02:43:05.612936Z | null | null | null | null | null |
Linux | GSD-2021-1001856 | NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() | NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.75 by commit 3f2960b39f22e26cf8addae93c3f5884d1c183c9, it was introduced in version v3.13 by commit 1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8. For more details please see the references link. | null | 2021-12-20T01:31:50.914801Z | 2021-10-28T13:52:25.991525Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8'} |
Linux | GSD-2021-1002283 | net: dpaa2-eth: fix use-after-free in dpaa2_eth_remove | net: dpaa2-eth: fix use-after-free in dpaa2_eth_remove
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.82 by commit 1c4099dc0d6a01e76e4f7dd98e4b3e0d55d80ad9, it was introduced in version v4.17 by commit 7472dd9f649958be6a8880ed439233c8414a7b34. For more details please see the references link. | null | 2021-12-19T23:03:19.765895Z | 2021-11-29T02:36:57.666096Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7472dd9f649958be6a8880ed439233c8414a7b34'} |
Linux | GSD-2022-1001229 | drm/amd/display: Add affected crtcs to atomic state for dsc mst unplug | drm/amd/display: Add affected crtcs to atomic state for dsc mst unplug
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit e96a17a3c909f788fb1064bc9d9542c8b2d09093, it was introduced in version v5.6 by commit 44be939ff7ac5858f0dbd8a2a4af1fe198e14db1. For more details please see the references link. | null | 2022-04-25T04:47:14.909147Z | 2022-04-24T20:56:00.487051Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/44be939ff7ac5858f0dbd8a2a4af1fe198e14db1'} |
Linux | GSD-2022-1001383 | ceph: fix inode reference leakage in ceph_get_snapdir() | ceph: fix inode reference leakage in ceph_get_snapdir()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 9cd21981dedfb4fe9f344529e4be35727cb10940. For more details please see the references link. | null | 2022-04-25T04:27:55.224095Z | 2022-04-24T21:09:27.044672Z | null | null | null | null | null |
Linux | GSD-2021-1000314 | nbd: Fix NULL pointer in flush_workqueue | nbd: Fix NULL pointer in flush_workqueue
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.38 by commit cde4b55cfb24522dcbba80bbdb0c082303e76c43, it was introduced in version v5.4 by commit e9e006f5fcf2bab59149cb38a48a4817c1b538b4. For more details please see the references link. | null | 2021-12-20T00:02:02.375884Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e9e006f5fcf2bab59149cb38a48a4817c1b538b4'} |
Linux | GSD-2021-1002329 | sched/fair: Prevent dead task groups from regaining cfs_rq's | sched/fair: Prevent dead task groups from regaining cfs_rq's
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit 512e21c150c1c3ee298852660f3a796e267e62ec, it was introduced in version v5.13 by commit a7b359fc6a37faaf472125867c8dc5a068c90982. For more details please see the references link. | null | 2021-12-20T01:19:08.069289Z | 2021-11-29T02:38:58.483084Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a7b359fc6a37faaf472125867c8dc5a068c90982'} |
Linux | GSD-2022-1001679 | highmem: fix checks in __kmap_local_sched_{in,out} | highmem: fix checks in __kmap_local_sched_{in,out}
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit c21d040de6225414547d9bd31cd200f290991c85, it was introduced in version v5.11 by commit 5fbda3ecd14a5343644979c98d6eb65b7e7de9d8. For more details please see the references link. | null | 2022-04-25T06:46:33.603082Z | 2022-04-24T21:34:25.120303Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5fbda3ecd14a5343644979c98d6eb65b7e7de9d8'} |
Linux | GSD-2021-1001155 | igc: Fix use-after-free error during reset | igc: Fix use-after-free error during reset
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.6 by commit ea5e36b7367ea0a36ef73a163768f16d2977bd83, it was introduced in version v4.20 by commit 13b5b7fd6a4a96dffe604f25e7b64cfbd9520924. For more details please see the references link. | null | 2021-12-20T01:19:10.253799Z | 2021-08-03T01:31:08.537069Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/13b5b7fd6a4a96dffe604f25e7b64cfbd9520924'} |
Linux | GSD-2022-1002405 | scsi: libfc: Fix use after free in fc_exch_abts_resp() | scsi: libfc: Fix use after free in fc_exch_abts_resp()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 499d198494e77b6533251b9b909baf5c101129cb. For more details please see the references link. | null | 2022-04-25T06:35:34.840605Z | 2022-04-24T22:43:53.972927Z | null | null | null | null | null |
Linux | GSD-2022-1000438 | eeprom: ee1004: limit i2c reads to I2C_SMBUS_BLOCK_MAX | eeprom: ee1004: limit i2c reads to I2C_SMBUS_BLOCK_MAX
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit 9a5f471ae380f9fcb9756d453c12ca1f8595a93c, it was introduced in version v5.15.17 by commit be9313f755a7bfa02230b15731d07074d5255ecb. For more details please see the references link. | null | 2022-03-07T01:49:46.987693Z | 2022-02-27T03:07:20.473106Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/be9313f755a7bfa02230b15731d07074d5255ecb'} |
Linux | GSD-2022-1000592 | gve: fix the wrong AdminQ buffer queue index check | gve: fix the wrong AdminQ buffer queue index check
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.22 by commit 62ab929a8f6bc7717fc26361c967d92924f4e297, it was introduced in version v5.10 by commit 5cdad90de62c27c6af53edb1b4b91712622b892b. For more details please see the references link. | null | 2022-03-07T01:43:02.220768Z | 2022-02-27T03:28:21.220046Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5cdad90de62c27c6af53edb1b4b91712622b892b'} |
Linux | GSD-2021-1001505 | net_sched: fix NULL deref in fifo_set_limit() | net_sched: fix NULL deref in fifo_set_limit()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.287 by commit 08d7056e8e250fd2e67dbea5be5fdecdd75bf6b4, it was introduced in version v2.6.27 by commit fb0305ce1b03f6ff17f84f2c63daccecb45f2805. For more details please see the references link. | null | 2021-12-20T00:34:19.947392Z | 2021-10-19T16:21:16.606561Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb0305ce1b03f6ff17f84f2c63daccecb45f2805'} |
Linux | GSD-2022-1002055 | block, bfq: don't move oom_bfqq | block, bfq: don't move oom_bfqq
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 7507ead1e9d42957c2340f2c4a0e9d00034e3366. For more details please see the references link. | null | 2022-04-25T05:27:01.788636Z | 2022-04-24T22:06:08.417347Z | null | null | null | null | null |
Linux | GSD-2022-1001854 | dax: make sure inodes are flushed before destroy cache | dax: make sure inodes are flushed before destroy cache
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit e2951eaa9398415ac054b7bd80b8163b6838ead4, it was introduced in version v4.12 by commit 7b6be8444e0f0dd675b54d059793423d3c9b4c03. For more details please see the references link. | null | 2022-04-25T02:57:27.655827Z | 2022-04-24T21:48:34.038765Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7b6be8444e0f0dd675b54d059793423d3c9b4c03'} |
Linux | GSD-2022-1000746 | CDC-NCM: avoid overflow in sanity checking | CDC-NCM: avoid overflow in sanity checking
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.12 by commit 7b737e47b87589031f0d4657f6d7b0b770474925. For more details please see the references link. | null | 2022-03-18T02:52:37.131253Z | 2022-03-18T00:15:01.597545Z | null | null | null | null | null |
Linux | GSD-2022-1002281 | f2fs: quota: fix loop condition at f2fs_quota_sync() | f2fs: quota: fix loop condition at f2fs_quota_sync()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit f1d5946d47c0827bae39e1537959ce8d6f0224c5, it was introduced in version v5.4.148 by commit a02982545e61020c23f411b073ba5171381138e4. For more details please see the references link. | null | 2022-04-25T03:10:16.420966Z | 2022-04-24T22:29:58.871350Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a02982545e61020c23f411b073ba5171381138e4'} |
Linux | GSD-2022-1000316 | ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path | ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.230 by commit 12b6703e9546902c56b4b9048b893ad49d62bdd4, it was introduced in version v4.0 by commit f243e5a7859a24d10975afb9a1708cac624ba6f1. For more details please see the references link. | null | 2022-03-07T01:43:03.590144Z | 2022-02-27T02:49:58.153377Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f243e5a7859a24d10975afb9a1708cac624ba6f1'} |
Linux | GSD-2021-1001381 | dma-buf/sync_file: Don't leak fences on merge failure | dma-buf/sync_file: Don't leak fences on merge failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.199 by commit e0355a0ad31a1d677b2a4514206de4902bd550e8, it was introduced in version v4.9 by commit a02b9dc90d844cc7df7b63264e7920cc425052d9. For more details please see the references link. | null | 2021-12-19T21:44:37.890834Z | 2021-08-03T02:24:50.672184Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a02b9dc90d844cc7df7b63264e7920cc425052d9'} |
Linux | GSD-2021-1000969 | HID: usbhid: fix info leak in hid_submit_ctrl | HID: usbhid: fix info leak in hid_submit_ctrl
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.45 by commit b1e3596416d74ce95cc0b7b38472329a3818f8a9. For more details please see the references link. | null | 2021-12-20T00:33:33.765180Z | 2021-06-30T00:29:57.603507Z | null | null | null | null | null |
Linux | GSD-2022-1001157 | Revert "Revert "block, bfq: honor already-setup queue merges"" | Revert "Revert "block, bfq: honor already-setup queue merges""
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 4083925bd6dc89216d156474a8076feec904e607. For more details please see the references link. | null | 2022-04-25T04:14:01.176104Z | 2022-04-24T20:49:23.829502Z | null | null | null | null | null |
Linux | GSD-2021-1002407 | ALSA: pcm: oss: Limit the period size to 16MB | ALSA: pcm: oss: Limit the period size to 16MB
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.258 by commit be55f306396cd62c6889286a7194fd8b53363aeb. For more details please see the references link. | null | 2021-12-20T01:16:10.537028Z | 2021-12-19T19:35:56.957360Z | null | null | null | null | null |
Linux | GSD-2022-1001507 | tipc: fix the timer expires after interval 100ms | tipc: fix the timer expires after interval 100ms
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit b58fa5cf636f66cd3d955b351f15c0e5d9445250, it was introduced in version v4.20 by commit 6787927475e52f6933e3affce365dabb2aa2fadf. For more details please see the references link. | null | 2022-04-25T03:45:39.419666Z | 2022-04-24T21:18:26.073820Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6787927475e52f6933e3affce365dabb2aa2fadf'} |
Linux | GSD-2021-1000590 | btrfs: return whole extents in fiemap | btrfs: return whole extents in fiemap
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.42 by commit c7e0c6047c4f2a9664e48e3671af80c513220a44, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T23:38:31.969193Z | 2021-06-04T19:43:29.550064Z | null | null | null | null | null |
Linux | GSD-2021-1002057 | net/tls: Fix flipped sign in tls_err_abort() calls | net/tls: Fix flipped sign in tls_err_abort() calls
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.77 by commit f3dec7e7ace38224f82cf83f0049159d067c2e19, it was introduced in version v4.17 by commit c46234ebb4d1eee5e09819f49169e51cfc6eb909. For more details please see the references link. | null | 2021-12-19T23:42:40.567103Z | 2021-11-14T15:17:52.264814Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c46234ebb4d1eee5e09819f49169e51cfc6eb909'} |
Linux | GSD-2021-1002542 | net/sched: sch_ets: don't peek at classes beyond 'nbands' | net/sched: sch_ets: don't peek at classes beyond 'nbands'
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.6 by commit e25bdbc7e951ae5728fee1f4c09485df113d013c, it was introduced in version v5.6 by commit dcc68b4d8084e1ac9af0d4022d6b1aff6a139a33. For more details please see the references link. | null | 2021-12-20T01:28:28.358633Z | 2021-12-19T19:41:56.712585Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/dcc68b4d8084e1ac9af0d4022d6b1aff6a139a33'} |
Linux | GSD-2022-1001012 | drbd: Fix five use after free bugs in get_initial_state | drbd: Fix five use after free bugs in get_initial_state
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 226e993c39405292781bfcf4b039a8db56aab362, it was introduced in version v4.5 by commit a29728463b254ce81ecefdf20c1a02e01d9361da. For more details please see the references link. | null | 2022-04-25T06:42:44.307055Z | 2022-04-24T20:39:38.189981Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a29728463b254ce81ecefdf20c1a02e01d9361da'} |
Linux | GSD-2021-1000085 | bus: mhi: core: Fix invalid error returning in mhi_queue | bus: mhi: core: Fix invalid error returning in mhi_queue
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.3 by commit a99b661c3187365f81026d89b1133a76cd2652b3, it was introduced in version v5.12 by commit a8f75cb348fd52e7a5cf25991cdf9c89fb0cfd41. For more details please see the references link. | null | 2021-12-20T01:31:19.310152Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a8f75cb348fd52e7a5cf25991cdf9c89fb0cfd41'} |
Linux | GSD-2021-1002112 | mm, slub: fix potential use-after-free in slab_debugfs_fops | mm, slub: fix potential use-after-free in slab_debugfs_fops
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit 159d8cfbd0428d487c53be4722f33cdab0d25d83, it was introduced in version v5.14 by commit 64dd68497be76ab4e237cca06f5324e220d0f050. For more details please see the references link. | null | 2021-12-20T01:22:37.436151Z | 2021-11-14T15:20:23.875767Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/64dd68497be76ab4e237cca06f5324e220d0f050'} |
Linux | GSD-2022-1001442 | ubifs: Fix deadlock in concurrent rename whiteout and inode writeback | ubifs: Fix deadlock in concurrent rename whiteout and inode writeback
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 70e9090acc32348cedc5def0cd6d5c126efc97b9, it was introduced in version v4.9 by commit 9e0a1fff8db56eaaebb74b4a3ef65f86811c4798. For more details please see the references link. | null | 2022-04-25T05:26:49.604515Z | 2022-04-24T21:13:47.674639Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9e0a1fff8db56eaaebb74b4a3ef65f86811c4798'} |
Linux | GSD-2022-1001911 | dm: fix use-after-free in dm_cleanup_zoned_dev() | dm: fix use-after-free in dm_cleanup_zoned_dev()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 0987f00a76a17aa7213da492c00ed9e5a6210c73, it was introduced in version v5.14 by commit bb37d77239af25cde59693dbe3fac04dd17d7b29. For more details please see the references link. | null | 2022-04-25T06:57:05.624044Z | 2022-04-24T21:53:59.442555Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bb37d77239af25cde59693dbe3fac04dd17d7b29'} |
Linux | GSD-2022-1000603 | bpf: Guard against accessing NULL pt_regs in bpf_get_task_stack() | bpf: Guard against accessing NULL pt_regs in bpf_get_task_stack()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.5 by commit b82ef4985a6d05e80f604624332430351df7b79a, it was introduced in version v5.9 by commit fa28dcb82a38f8e3993b0fae9106b1a80b59e4f0. For more details please see the references link. | null | 2022-03-07T01:34:13.350030Z | 2022-02-27T03:29:35.388673Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fa28dcb82a38f8e3993b0fae9106b1a80b59e4f0'} |
Linux | GSD-2021-1000986 | bpf: Fix leakage under speculation on mispredicted branches | bpf: Fix leakage under speculation on mispredicted branches
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.46 by commit 5fc6ed1831ca5a30fb0ceefd5e33c7c689e7627b, it was introduced in version v4.15 by commit b2157399cc9898260d6031c5bfe45fe137c1fbe7. For more details please see the references link. | null | 2021-12-19T23:48:06.355792Z | 2021-06-30T00:31:29.766256Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b2157399cc9898260d6031c5bfe45fe137c1fbe7'} |
Linux | GSD-2021-1001694 | libbpf: Fix memory leak in strset | libbpf: Fix memory leak in strset
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.12 by commit 9e8e7504e09831c469b67d6dc11d9a72654bdb8c, it was introduced in version v5.13 by commit 90d76d3ececc74bf43b2a97f178dadfa1e52be54. For more details please see the references link. | null | 2021-12-19T22:02:57.228343Z | 2021-10-19T16:32:13.407081Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/90d76d3ececc74bf43b2a97f178dadfa1e52be54'} |
Linux | GSD-2021-1002811 | tee: optee: Fix incorrect page free bug | tee: optee: Fix incorrect page free bug
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.89 by commit ad338d825e3f7b96ee542bf313728af2d19fe9ad, it was introduced in version v5.10.58 by commit 1340dc3fb75ea69221f4f5dcb0cbace55ad0331c. For more details please see the references link. | null | 2022-01-11T05:56:59.308896Z | 2021-12-30T02:44:28.918963Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1340dc3fb75ea69221f4f5dcb0cbace55ad0331c'} |
Linux | GSD-2022-1000253 | powerpc/32s: Fix kasan_init_region() for KASAN | powerpc/32s: Fix kasan_init_region() for KASAN
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.19 by commit db37befafa536d1eed293fa5765ad781c3152071, it was introduced in version v5.8 by commit 7974c4732642f710b5111165ae1f7f7fed822282. For more details please see the references link. | null | 2022-02-19T11:21:59.708482Z | 2022-02-18T22:01:40.087424Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7974c4732642f710b5111165ae1f7f7fed822282'} |
Linux | GSD-2022-1001291 | media: venus: vdec: fixed possible memory leak issue | media: venus: vdec: fixed possible memory leak issue
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 5f89d05ba93df9c2cdfe493843f93288e55e99eb, it was introduced in version v5.16 by commit 40d87aafee29fb01ce1e1868502fb2059a6a7f34. For more details please see the references link. | null | 2022-04-25T03:36:45.555826Z | 2022-04-24T21:01:45.020438Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/40d87aafee29fb01ce1e1868502fb2059a6a7f34'} |
Linux | GSD-2021-1000206 | sched: Fix out-of-bound access in uclamp | sched: Fix out-of-bound access in uclamp
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.5 by commit 42ee47c7e3569d9a0e2cb5053c496d97d380472f, it was introduced in version v5.3 by commit 69842cba9ace84849bb9b8edcdf2cefccd97901c. For more details please see the references link. | null | 2021-12-19T22:36:55.596400Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69842cba9ace84849bb9b8edcdf2cefccd97901c'} |
Linux | GSD-2022-1000879 | cifs: fix double free race when mount fails in cifs_get_root() | cifs: fix double free race when mount fails in cifs_get_root()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.183 by commit e208668ef7ba23efcbf76a8200cab8deee501c4d. For more details please see the references link. | null | 2022-03-18T02:44:37.361258Z | 2022-03-18T00:27:08.282936Z | null | null | null | null | null |
Linux | GSD-2021-1000656 | drm/meson: fix shutdown crash when component not probed | drm/meson: fix shutdown crash when component not probed
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.193 by commit e256a0eb43e17209e347409a80805b1659398d68, it was introduced in version v4.19.181 by commit 8fbbf2b3849419e31731902d7478b0c934732632. For more details please see the references link. | null | 2021-12-20T00:30:30.543252Z | 2021-06-04T19:56:04.022812Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8fbbf2b3849419e31731902d7478b0c934732632'} |
Linux | GSD-2021-1001944 | regmap: Fix possible double-free in regcache_rbtree_exit() | regmap: Fix possible double-free in regcache_rbtree_exit()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.289 by commit fc081477b47dfc3a6cb50a96087fc29674013fc2, it was introduced in version v3.12 by commit 3f4ff561bc88b074d5e868dde4012d89cbb06c87. For more details please see the references link. | null | 2021-12-20T00:24:43.403604Z | 2021-11-14T15:12:51.224022Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f4ff561bc88b074d5e868dde4012d89cbb06c87'} |
Linux | GSD-2021-1002391 | sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl | sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.257 by commit 325ea49fc43cbc03a5e1e37de8f0ca6357ced4b1, it was introduced in version v2.6.24 by commit faf0b2e5afe7dae072d2715763c7f992b612b628. For more details please see the references link. | null | 2021-12-20T01:24:07.704879Z | 2021-12-19T19:35:18.016037Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/faf0b2e5afe7dae072d2715763c7f992b612b628'} |
Linux | GSD-2022-1000480 | staging: vc04_services: Fix RCU dereference check | staging: vc04_services: Fix RCU dereference check
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit 993db6da4aec1a58b35e604d3fa779b1d07ec467. For more details please see the references link. | null | 2022-03-07T02:20:44.754360Z | 2022-02-27T03:12:48.749997Z | null | null | null | null | null |
Linux | GSD-2021-1001417 | memory: fsl_ifc: fix leak of private memory on probe failure | memory: fsl_ifc: fix leak of private memory on probe failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.240 by commit 7626ffbea708e5aba6912295c012d2b409a1769f, it was introduced in version v3.3 by commit a20cbdeffce247a2b6fb83cd8d22433994068565. For more details please see the references link. | null | 2021-12-20T00:03:42.387770Z | 2021-08-03T02:34:43.341514Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a20cbdeffce247a2b6fb83cd8d22433994068565'} |
Linux | GSD-2022-1002147 | locking/lockdep: Avoid potential access of invalid memory in lock_class | locking/lockdep: Avoid potential access of invalid memory in lock_class
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 68c80088f52bfae7fc16ce0ed25ce969ddfb2ded, it was introduced in version v5.1 by commit 8b39adbee805c539a461dbf208b125b096152b1c. For more details please see the references link. | null | 2022-04-25T05:45:34.555246Z | 2022-04-24T22:16:07.859075Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8b39adbee805c539a461dbf208b125b096152b1c'} |
Linux | GSD-2021-1001047 | mm/memory-failure: make sure wait for page writeback in memory_failure | mm/memory-failure: make sure wait for page writeback in memory_failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit 28788dc5c70597395b6b451dae4549bbaa8e2c56, it was introduced in version v3.16 by commit 0bc1f8b0682caa39f45ce1e0228ebf43acb46111. For more details please see the references link. | null | 2021-12-19T23:00:00.180844Z | 2021-06-30T00:36:10.018727Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0bc1f8b0682caa39f45ce1e0228ebf43acb46111'} |
Linux | GSD-2022-1002517 | netfilter: nf_tables: initialize registers in nft_do_chain() | netfilter: nf_tables: initialize registers in nft_do_chain()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.309 by commit 4d28522acd1c4415c85f6b33463713a268f68965, it was introduced in version v3.13 by commit 96518518cc417bb0a8c80b9fb736202e28acdf96. For more details please see the references link. | null | 2022-04-25T05:40:59.566605Z | 2022-04-24T22:57:27.877643Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/96518518cc417bb0a8c80b9fb736202e28acdf96'} |
Linux | GSD-2022-1002002 | Bluetooth: use memset avoid memory leaks | Bluetooth: use memset avoid memory leaks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit 9567d54e70ff58c2695c2cc2e53c86c67551d3e6. For more details please see the references link. | null | 2022-04-25T06:42:41.331314Z | 2022-04-24T22:02:22.688526Z | null | null | null | null | null |
Linux | GSD-2021-1001552 | phy: mdio: fix memory leak | phy: mdio: fix memory leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.211 by commit 2397b9e118721292429fea8807a698e71b94795f, it was introduced in version v2.6.28 by commit 46abc02175b3c246dd5141d878f565a8725060c9. For more details please see the references link. | null | 2021-12-20T01:12:39.535184Z | 2021-10-19T16:23:25.834672Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/46abc02175b3c246dd5141d878f565a8725060c9'} |
Linux | GSD-2022-1002452 | jffs2: fix memory leak in jffs2_do_mount_fs | jffs2: fix memory leak in jffs2_do_mount_fs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 9a0f6610c7daedd2eace430beeb08a8b7ac80699, it was introduced in version v2.6.15 by commit e631ddba588783edd521c5a89f7b2902772fb691. For more details please see the references link. | null | 2022-04-25T07:02:16.859295Z | 2022-04-24T22:49:35.616727Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e631ddba588783edd521c5a89f7b2902772fb691'} |
Linux | GSD-2022-1000195 | scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() | scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.96 by commit 00849de10f798a9538242824a51b1756e7110754, it was introduced in version v3.2 by commit 0cbf32e1681d870632a1772601cbaadd996dc978. For more details please see the references link. | null | 2022-02-19T10:23:02.587147Z | 2022-02-18T21:53:24.649075Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0cbf32e1681d870632a1772601cbaadd996dc978'} |
Linux | GSD-2021-1001102 | i2c: robotfuzz-osif: fix control-request directions | i2c: robotfuzz-osif: fix control-request directions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.274 by commit f6b3e679c7e753b7dfad6de043799ebc5705ed1d, it was introduced in version v3.14 by commit 83e53a8f120f2f273cf0ad717f5372ab79ac24fe. For more details please see the references link. | null | 2021-12-20T00:37:44.439197Z | 2021-07-08T01:56:27.796891Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/83e53a8f120f2f273cf0ad717f5372ab79ac24fe'} |
Linux | GSD-2021-1002684 | xen/blkfront: harden blkfront against event channel storms | xen/blkfront: harden blkfront against event channel storms
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.168 by commit 4ed9f5c511ce95cb8db05ff82026ea901f45fd76. For more details please see the references link. | null | 2022-01-11T06:46:38.950389Z | 2021-12-27T05:36:43.822938Z | null | null | null | null | null |
Linux | GSD-2021-1000343 | net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send | net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 9dc373f74097edd0e35f3393d6248eda8d1ba99d, it was introduced in version v4.9 by commit b9b17debc69d27cd55e21ee51a5ba7fc50a426cf. For more details please see the references link. | null | 2021-12-19T22:50:32.188918Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b9b17debc69d27cd55e21ee51a5ba7fc50a426cf'} |
Linux | GSD-2022-1001784 | media: ir_toy: free before error exiting | media: ir_toy: free before error exiting
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 2011363c196846c083649c91ed30aeef64358d52. For more details please see the references link. | null | 2022-04-25T04:56:18.361025Z | 2022-04-24T21:42:12.089005Z | null | null | null | null | null |
Linux | GSD-2022-1000896 | xen/xenbus: don't let xenbus_grant_ring() remove grants in error case | xen/xenbus: don't let xenbus_grant_ring() remove grants in error case
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.234 by commit 8d521d960aef22781ff499e16899c30af899de8d. For more details please see the references link. | null | 2022-03-18T04:16:42.772259Z | 2022-03-18T00:29:09.965101Z | null | null | null | null | null |
Linux | GSD-2021-1000713 | net: caif: fix memory leak in caif_device_notify | net: caif: fix memory leak in caif_device_notify
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.272 by commit b042e2b2039565eb8f0eb51c14fbe1ef463c8cd8, it was introduced in version v3.3 by commit 7c18d2205ea76eef9674e59e1ecae4f332a53e9e. For more details please see the references link. | null | 2021-12-19T23:41:53.431041Z | 2021-06-24T23:58:41.201060Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7c18d2205ea76eef9674e59e1ecae4f332a53e9e'} |
Linux | GSD-2021-1001801 | isdn: mISDN: Fix sleeping function called from invalid context | isdn: mISDN: Fix sleeping function called from invalid context
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.214 by commit a5b34409d3fc52114c828be4adbc30744fa3258b. For more details please see the references link. | null | 2021-12-20T01:06:43.788714Z | 2021-10-28T13:49:39.487244Z | null | null | null | null | null |
Linux | GSD-2021-1002041 | can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv | can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit 864e77771a24c877aaf53aee019f78619cbcd668, it was introduced in version v5.4 by commit 9d71dd0c70099914fcd063135da3c580865e924c. For more details please see the references link. | null | 2021-12-20T00:08:37.134511Z | 2021-11-14T15:17:11.987280Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9d71dd0c70099914fcd063135da3c580865e924c'} |
Linux | GSD-2021-1000586 | drm/amdgpu: Fix a use-after-free | drm/amdgpu: Fix a use-after-free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.42 by commit f98cdf084405333ee2f5be548a91b2d168e49276, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T01:12:11.936926Z | 2021-06-04T19:43:07.379567Z | null | null | null | null | null |
Linux | GSD-2022-1001511 | af_netlink: Fix shift out of bounds in group mask calculation | af_netlink: Fix shift out of bounds in group mask calculation
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit e8aaf3134bc5e943048eefe9f2ddaabf41d92b1a, it was introduced in version v2.6.14 by commit f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198. For more details please see the references link. | null | 2022-04-25T04:03:42.044694Z | 2022-04-24T21:18:57.849913Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198'} |
Linux | GSD-2021-1002411 | scsi: mpt3sas: Fix kernel panic during drive powercycle test | scsi: mpt3sas: Fix kernel panic during drive powercycle test
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.219 by commit 0d4b29eaadc1f59cec0c7e85eae77d08fcca9824, it was introduced in version v3.8 by commit f92363d12359498f9a9960511de1a550f0ec41c2. For more details please see the references link. | null | 2021-12-19T23:48:55.523869Z | 2021-12-19T19:36:06.670783Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f92363d12359498f9a9960511de1a550f0ec41c2'} |
Linux | GSD-2022-1001141 | media: imx-jpeg: Prevent decoding NV12M jpegs into single-planar buffers | media: imx-jpeg: Prevent decoding NV12M jpegs into single-planar buffers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 4eb591c47c82a6a6ad293ed108c3cb77115fbc25. For more details please see the references link. | null | 2022-04-25T05:19:12.810474Z | 2022-04-24T20:48:37.330840Z | null | null | null | null | null |
Linux | GSD-2021-1001397 | atm: nicstar: Fix possible use-after-free in nicstar_cleanup() | atm: nicstar: Fix possible use-after-free in nicstar_cleanup()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.198 by commit a7a7b2848312cc4c3a42b6e42a8ab2e441857aba. For more details please see the references link. | null | 2021-12-20T00:55:33.305764Z | 2021-08-03T02:28:24.985372Z | null | null | null | null | null |
Linux | GSD-2022-1000300 | scsi: target: iscsi: Make sure the np under each tpg is unique | scsi: target: iscsi: Make sure the np under each tpg is unique
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.267 by commit aeaf67314e4e57df8aff636979a57b5a828a6451. For more details please see the references link. | null | 2022-03-07T01:55:05.316936Z | 2022-02-27T02:48:09.483387Z | null | null | null | null | null |
Linux | GSD-2022-1002297 | net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link | net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.239 by commit e2423aa174e6c3e9805e96db778245ba73cdd88c, it was introduced in version v4.8 by commit fb3bbdb859891e6bc27fd1afb3a07319f82c2ee4. For more details please see the references link. | null | 2022-04-25T06:50:42.791326Z | 2022-04-24T22:31:34.087720Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb3bbdb859891e6bc27fd1afb3a07319f82c2ee4'} |
Linux | GSD-2022-1000750 | hwmon: Handle failure to register sensor with thermal zone correctly | hwmon: Handle failure to register sensor with thermal zone correctly
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.12 by commit 8a1969e14ad93663f9a3ed02ccc2138da9956a0e, it was introduced in version v5.8 by commit 1597b374af22266266e1e20612208c4b11359ad4. For more details please see the references link. | null | 2022-03-18T02:56:22.123396Z | 2022-03-18T00:15:17.702797Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1597b374af22266266e1e20612208c4b11359ad4'} |
Linux | GSD-2022-1001842 | PCI: Reduce warnings on possible RW1C corruption | PCI: Reduce warnings on possible RW1C corruption
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit e37d269734ee9866bef3f965d4f545b86352f326, it was introduced in version v4.10 by commit fb26592301200dbbe4a9943fe188b57a46716900. For more details please see the references link. | null | 2022-04-25T03:35:09.302885Z | 2022-04-24T21:47:09.956551Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb26592301200dbbe4a9943fe188b57a46716900'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.