ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2022-1000269 | PCI: pciehp: Fix infinite loop in IRQ handler upon power fault | PCI: pciehp: Fix infinite loop in IRQ handler upon power fault
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.20 by commit 1db58c6584a72102e98af2e600ea184ddaf2b8af, it was introduced in version v5.7 by commit 8edf5332c39340b9583cf9cba659eb7ec71f75b5. For more details please see the references link. | null | 2022-02-19T05:01:03.939675Z | 2022-02-18T22:04:22.319982Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8edf5332c39340b9583cf9cba659eb7ec71f75b5'} |
Linux | GSD-2021-1001211 | fbmem: Do not delete the mode that is still in use | fbmem: Do not delete the mode that is still in use
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.4 by commit d6e76469157d8f240e5dec6f8411aa8d306b1126, it was introduced in version v5.3 by commit 13ff178ccd6d3b8074c542a911300b79c4eec255. For more details please see the references link. | null | 2021-12-20T00:48:18.712797Z | 2021-08-03T01:37:59.772606Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/13ff178ccd6d3b8074c542a911300b79c4eec255'} |
Linux | GSD-2022-1000286 | scsi: target: iscsi: Make sure the np under each tpg is unique | scsi: target: iscsi: Make sure the np under each tpg is unique
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.302 by commit 2953394b3129aaf5df3b61918ea2570ff878a7b8. For more details please see the references link. | null | 2022-03-07T01:50:12.301991Z | 2022-02-27T02:38:26.248Z | null | null | null | null | null |
Linux | GSD-2022-1002311 | jfs: prevent NULL deref in diFree | jfs: prevent NULL deref in diFree
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 2ef74e3e0089b6615ee124e1183746974c6bb561. For more details please see the references link. | null | 2022-04-25T03:52:37.122975Z | 2022-04-24T22:33:13.519395Z | null | null | null | null | null |
Linux | GSD-2021-1001641 | HID: betop: fix slab-out-of-bounds Write in betop_probe | HID: betop: fix slab-out-of-bounds Write in betop_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.71 by commit dedfc35a2de2bae9fa3da8210a05bfd515f83fee. For more details please see the references link. | null | 2021-12-19T22:37:26.465443Z | 2021-10-19T16:29:33.148170Z | null | null | null | null | null |
Linux | GSD-2021-1000953 | usb: dwc3-meson-g12a: fix usb2 PHY glue init when phy0 is disabled | usb: dwc3-meson-g12a: fix usb2 PHY glue init when phy0 is disabled
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.44 by commit 750a0d75564293be3ed50f13ef7f38ab75106421, it was introduced in version v5.8 by commit 013af227f58a97ffc61b99301f8f4448dc7e7f55. For more details please see the references link. | null | 2021-12-19T23:15:27.980373Z | 2021-06-30T00:28:56.498720Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/013af227f58a97ffc61b99301f8f4448dc7e7f55'} |
Linux | GSD-2021-1000400 | async_xor: increase src_offs when dropping destination page | async_xor: increase src_offs when dropping destination page
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit cab2e8e5997b592fdb7d02cf2387b4b8e3057174, it was introduced in version v5.10 by commit 29bcff787a2593b2126cfaff612c0b4e560022e9. For more details please see the references link. | null | 2021-12-20T00:03:32.121737Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/29bcff787a2593b2126cfaff612c0b4e560022e9'} |
Linux | GSD-2022-1001497 | clk: Fix clk_hw_get_clk() when dev is NULL | clk: Fix clk_hw_get_clk() when dev is NULL
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit d183f20cf5a7b546d4108e796b98210ceb317579, it was introduced in version v5.11 by commit 30d6f8c15d2cd877c1f3d47d8a1064649ebe58e2. For more details please see the references link. | null | 2022-04-25T05:58:20.542209Z | 2022-04-24T21:17:15.695789Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/30d6f8c15d2cd877c1f3d47d8a1064649ebe58e2'} |
Linux | GSD-2021-1002597 | ALSA: pcm: oss: Limit the period size to 16MB | ALSA: pcm: oss: Limit the period size to 16MB
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.8 by commit 35a3e511032146941085f87dd9fb5b82ea5c00a2. For more details please see the references link. | null | 2021-12-20T01:11:42.149065Z | 2021-12-19T19:44:27.069170Z | null | null | null | null | null |
Linux | GSD-2021-1000050 | locking/qrwlock: Fix ordering in queued_write_lock_slowpath() | locking/qrwlock: Fix ordering in queued_write_lock_slowpath()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.115 by commit 82808cc026811fbc3ecf0c0b267a12a339eead56, it was introduced in version v4.15 by commit b519b56e378ee82caf9b079b04f5db87dedc3251. For more details please see the references link. | null | 2021-12-20T00:47:51.437259Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b519b56e378ee82caf9b079b04f5db87dedc3251'} |
Linux | GSD-2021-1001092 | usb: dwc3: core: fix kernel panic when do reboot | usb: dwc3: core: fix kernel panic when do reboot
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit fa8c413e6b74ae5d12daf911c73238c5bdacd8e6, it was introduced in version v5.12.13 by commit afd8b0d091d5b4febe2d0ac3b7735c1826329302. For more details please see the references link. | null | 2021-06-30T00:39:04.674242Z | 2021-06-30T00:39:04.674242Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/afd8b0d091d5b4febe2d0ac3b7735c1826329302'} |
Linux | GSD-2022-1002038 | mmc: host: Return an error when ->enable_sdio_irq() ops is missing | mmc: host: Return an error when ->enable_sdio_irq() ops is missing
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 2412a5d29411d404698a15cd2f2b965afd57acd6. For more details please see the references link. | null | 2022-04-25T05:10:36.465510Z | 2022-04-24T22:05:16.767759Z | null | null | null | null | null |
Linux | GSD-2021-1001568 | blktrace: Fix uaf in blk_trace access after removing by sysfs | blktrace: Fix uaf in blk_trace access after removing by sysfs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.209 by commit 677e362ba807f3aafe6f405c07e0b37244da5222, it was introduced in version v2.6.30 by commit c71a896154119f4ca9e89d6078f5f63ad60ef199. For more details please see the references link. | null | 2021-12-19T22:28:13.554547Z | 2021-10-19T16:24:10.735377Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c71a896154119f4ca9e89d6078f5f63ad60ef199'} |
Linux | GSD-2022-1000455 | KVM: x86: nSVM: fix potential NULL derefernce on nested migration | KVM: x86: nSVM: fix potential NULL derefernce on nested migration
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit 74b426bea4f7e3b081add2b88d4fba16d3af7ab6, it was introduced in version v5.13 by commit 232f75d3b4b5456de6f0b671aa86345d62de1473. For more details please see the references link. | null | 2022-03-07T01:33:39.177215Z | 2022-02-27T03:09:19.683079Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/232f75d3b4b5456de6f0b671aa86345d62de1473'} |
Linux | GSD-2022-1002468 | mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0) | mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0)
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit a05540f3903bd8295e8c4cd90dd3d416239a115b. For more details please see the references link. | null | 2022-04-25T04:44:36.905353Z | 2022-04-24T22:51:36.823932Z | null | null | null | null | null |
Linux | GSD-2022-1002192 | Bluetooth: Fix use after free in hci_send_acl | Bluetooth: Fix use after free in hci_send_acl
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 3803d896ddd97c7c16689a5381c0960040727647. For more details please see the references link. | null | 2022-04-25T05:48:22.332770Z | 2022-04-24T22:20:31.879574Z | null | null | null | null | null |
Linux | GSD-2021-1001138 | psi: Fix psi state corruption when schedule() races with cgroup move | psi: Fix psi state corruption when schedule() races with cgroup move
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13 by commit d583d360a620e6229422b3455d0be082b8255f5e, it was introduced in version v5.13 by commit 4117cebf1a9fcbf35b9aabf0e37b6c5eea296798. For more details please see the references link. | null | 2021-12-19T23:10:58.988224Z | 2021-07-08T01:59:00.273246Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4117cebf1a9fcbf35b9aabf0e37b6c5eea296798'} |
Linux | GSD-2021-1001991 | media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt() | media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.216 by commit 53ec9dab4eb0a8140fc85760fb50effb526fe219. For more details please see the references link. | null | 2021-12-19T23:04:37.763128Z | 2021-11-14T15:14:54.393953Z | null | null | null | null | null |
Linux | GSD-2021-1000683 | iommu/vt-d: Fix sysfs leak in alloc_iommu() | iommu/vt-d: Fix sysfs leak in alloc_iommu()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.235 by commit 22da9f4978381a99f1abaeaf6c9b83be6ab5ddd8, it was introduced in version v4.11 by commit 39ab9555c24110671f8dc671311a26e5c985b592. For more details please see the references link. | null | 2021-12-19T23:01:06.894424Z | 2021-06-04T20:01:33.812739Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/39ab9555c24110671f8dc671311a26e5c985b592'} |
Linux | GSD-2022-1000906 | mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work | mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.233 by commit 4aee73beb5c8434416206d7c783fa487f24f0391. For more details please see the references link. | null | 2022-03-18T03:44:59.687024Z | 2022-03-18T00:30:09.791826Z | null | null | null | null | null |
Linux | GSD-2022-1001614 | riscv: Increase stack size under KASAN | riscv: Increase stack size under KASAN
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit f32e1212e579b6faaa9b4afb303f4d7dd2ecd898, it was introduced in version v5.6 by commit 8ad8b72721d0f07fa02dbe71f901743f9c71c8e6. For more details please see the references link. | null | 2022-04-25T03:24:43.256126Z | 2022-04-24T21:28:19.581596Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ad8b72721d0f07fa02dbe71f901743f9c71c8e6'} |
Linux | GSD-2021-1002344 | staging: rtl8723bs: remove a second possible deadlock | staging: rtl8723bs: remove a second possible deadlock
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit 12cfdef56c3b809c3e25dba5366f01856b734c0b. For more details please see the references link. | null | 2021-12-20T00:31:04.336168Z | 2021-11-29T02:39:43.184178Z | null | null | null | null | null |
Linux | GSD-2021-1000379 | Drivers: hv: vmbus: Use after free in __vmbus_open() | Drivers: hv: vmbus: Use after free in __vmbus_open()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit d5c7b42c9f56ca46b286daa537d181bd7f69214f, it was introduced in version v4.14 by commit 6f3d791f300618caf82a2be0c27456edd76d5164. For more details please see the references link. | null | 2021-12-19T22:26:22.387461Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6f3d791f300618caf82a2be0c27456edd76d5164'} |
Linux | GSD-2022-1001244 | drm/selftests/test-drm_dp_mst_helper: Fix memory leak in sideband_msg_req_encode_decode | drm/selftests/test-drm_dp_mst_helper: Fix memory leak in sideband_msg_req_encode_decode
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit f6d1fd0abaacce95fdccfc19fc2175d8d9b37bfb, it was introduced in version v5.11 by commit 09234b88ef5598252d1cee37e4d7b26a48b6557f. For more details please see the references link. | null | 2022-04-25T03:58:58.403516Z | 2022-04-24T20:57:20.648354Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/09234b88ef5598252d1cee37e4d7b26a48b6557f'} |
Linux | GSD-2021-1002714 | scsi: scsi_debug: Fix type in min_t to avoid stack OOB | scsi: scsi_debug: Fix type in min_t to avoid stack OOB
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.88 by commit bdb854f134b964528fa543e0351022eb45bd7346. For more details please see the references link. | null | 2022-01-11T05:48:10.859615Z | 2021-12-27T05:38:32.417231Z | null | null | null | null | null |
Linux | GSD-2021-1000729 | net: caif: fix memory leak in caif_device_notify | net: caif: fix memory leak in caif_device_notify
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.236 by commit 4bca2034b41c15b62d47a19158bb76235fd4455d, it was introduced in version v3.3 by commit 7c18d2205ea76eef9674e59e1ecae4f332a53e9e. For more details please see the references link. | null | 2021-12-20T00:12:34.537438Z | 2021-06-24T23:59:40.409453Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7c18d2205ea76eef9674e59e1ecae4f332a53e9e'} |
Linux | GSD-2021-1002201 | IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields | IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit d39bf40e55e666b5905fdbd46a0dced030ce87be, it was introduced in version v2.6.35 by commit f931551bafe1f10ded7f5282e2aa162c267a2e5d. For more details please see the references link. | null | 2021-12-20T01:15:19.307465Z | 2021-11-14T15:24:27.882761Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f931551bafe1f10ded7f5282e2aa162c267a2e5d'} |
Linux | GSD-2022-1000843 | tipc: fix a bit overflow in tipc_crypto_key_rcv() | tipc: fix a bit overflow in tipc_crypto_key_rcv()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.104 by commit e3850e211df6817e7a6c3999080a8bc4a63092c0. For more details please see the references link. | null | 2022-03-18T03:00:43.451803Z | 2022-03-18T00:23:14.770346Z | null | null | null | null | null |
Linux | GSD-2022-1001751 | io_uring: fix memory leak of uid in files registration | io_uring: fix memory leak of uid in files registration
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 0853bd6885c2f293d88aaa7f7f1702c959b31680, it was introduced in version v5.5 by commit 08a451739a9b5783f67de51e84cb6d9559bb9dc4. For more details please see the references link. | null | 2022-04-25T05:25:24.971367Z | 2022-04-24T21:39:30.662937Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/08a451739a9b5783f67de51e84cb6d9559bb9dc4'} |
Linux | GSD-2021-1002651 | dm btree remove: fix use after free in rebalance_children() | dm btree remove: fix use after free in rebalance_children()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.222 by commit 293f957be5e39720778fb1851ced7f5fba6d51c3. For more details please see the references link. | null | 2022-01-11T05:53:25.104450Z | 2021-12-27T05:33:15.372571Z | null | null | null | null | null |
Linux | GSD-2021-1000396 | KVM: x86/mmu: Alloc page for PDPTEs when shadowing 32-bit NPT with 64-bit | KVM: x86/mmu: Alloc page for PDPTEs when shadowing 32-bit NPT with 64-bit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit c8b49e01a23b0f5a97dc977812adaf042b474eb7, it was introduced in version v4.19 by commit ee6268ba3a6861b2806e569bff7fe91fbdf846dd. For more details please see the references link. | null | 2021-12-19T23:18:12.238602Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ee6268ba3a6861b2806e569bff7fe91fbdf846dd'} |
Linux | GSD-2022-1001301 | mm,hwpoison: unmap poisoned page before invalidation | mm,hwpoison: unmap poisoned page before invalidation
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 622012d83efaa08c2b7cf32a00756920b8009aaa, it was introduced in version v5.17.2 by commit 6ab5aba503c6d3b926453f5ca18491e8a075e5cf. For more details please see the references link. | null | 2022-04-24T21:02:22.973217Z | 2022-04-24T21:02:22.973217Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6ab5aba503c6d3b926453f5ca18491e8a075e5cf'} |
Linux | GSD-2022-1002487 | video: fbdev: cirrusfb: check pixclock to avoid divide by zero | video: fbdev: cirrusfb: check pixclock to avoid divide by zero
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit c656d04247a2654ede5cead2ecbf83431dad5261. For more details please see the references link. | null | 2022-04-25T04:34:28.443482Z | 2022-04-24T22:53:22.436139Z | null | null | null | null | null |
Linux | GSD-2022-1000140 | net: ieee802154: ca8210: Stop leaking skb's | net: ieee802154: ca8210: Stop leaking skb's
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.228 by commit d6a44feb2f28d71a7e725f72d09c97c81561cd9a, it was introduced in version v4.12 by commit ded845a781a578dfb0b5b2c138e5a067aa3b1242. For more details please see the references link. | null | 2022-02-19T15:41:24.366657Z | 2022-02-18T21:46:25.765964Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ded845a781a578dfb0b5b2c138e5a067aa3b1242'} |
Linux | GSD-2021-1001587 | netfilter: ipset: Fix oversized kvmalloc() calls | netfilter: ipset: Fix oversized kvmalloc() calls
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.151 by commit 6f2f68640b8478b3bd385bc541ee517d7bdddf76. For more details please see the references link. | null | 2021-12-19T22:27:49.478268Z | 2021-10-19T16:25:06.394969Z | null | null | null | null | null |
Linux | GSD-2022-1000510 | net: dsa: bcm_sf2: don't use devres for mdiobus | net: dsa: bcm_sf2: don't use devres for mdiobus
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 08e1a3554e99a1a5bd2835907381e2383ee85cae, it was introduced in version v5.9 by commit ac3a68d56651c3dad2c12c7afce065fe15267f44. For more details please see the references link. | null | 2022-03-07T01:33:01.533432Z | 2022-02-27T03:16:50.616684Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac3a68d56651c3dad2c12c7afce065fe15267f44'} |
Linux | GSD-2022-1002203 | ax25: fix UAF bug in ax25_send_control() | ax25: fix UAF bug in ax25_send_control()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.190 by commit eaa7eb23fa76db45f7da1b6192518705863d0ebe, it was introduced in version v5.4.190 by commit 9e1e088a57c23251f1cfe9601bbd90ade2ea73b9. For more details please see the references link. | null | 2022-04-24T22:21:21.932910Z | 2022-04-24T22:21:21.932910Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9e1e088a57c23251f1cfe9601bbd90ade2ea73b9'} |
Linux | GSD-2021-1001753 | nexthop: Fix memory leaks in nexthop notification chain listeners | nexthop: Fix memory leaks in nexthop notification chain listeners
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.9 by commit 741760fa6252628a3d3afad439b72437d4b123d9, it was introduced in version v5.11 by commit 2a014b200bbd973cc96e082a5bc445fe20b50f32. For more details please see the references link. | null | 2021-12-19T23:36:00.108458Z | 2021-10-19T16:35:02.573087Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2a014b200bbd973cc96e082a5bc445fe20b50f32'} |
Linux | GSD-2021-1000841 | net/qla3xxx: fix schedule while atomic in ql_sem_spinlock | net/qla3xxx: fix schedule while atomic in ql_sem_spinlock
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.273 by commit f77d9c0c3aa0a1bc4f5882457b4e3d68938659f8. For more details please see the references link. | null | 2021-12-20T00:12:48.763552Z | 2021-06-30T00:00:42.625432Z | null | null | null | null | null |
Linux | GSD-2021-1001303 | mISDN: fix possible use-after-free in HFC_cleanup() | mISDN: fix possible use-after-free in HFC_cleanup()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.51 by commit b7ee9ae1e0cf55a037c4a99af2acc5d78cb7802d. For more details please see the references link. | null | 2021-12-20T00:36:29.483329Z | 2021-08-03T02:02:27.631709Z | null | null | null | null | null |
Linux | GSD-2022-1000394 | vsock: remove vsock from connected table when connect is interrupted by a signal | vsock: remove vsock from connected table when connect is interrupted by a signal
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.102 by commit 87cd1bbd6677411e17369cd4b7389ab1e1fdba44, it was introduced in version v3.9 by commit d021c344051af91f42c5ba9fdedc176740cbd238. For more details please see the references link. | null | 2022-03-07T01:31:53.485261Z | 2022-02-27T03:00:53.800460Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d021c344051af91f42c5ba9fdedc176740cbd238'} |
Linux | GSD-2021-1002485 | net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound | net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.84 by commit f059fa40f0fcc6bc7a12e0f2a2504e9a4ff74f1f. For more details please see the references link. | null | 2021-12-19T23:04:49.698167Z | 2021-12-19T19:39:25.798456Z | null | null | null | null | null |
Linux | GSD-2021-1000142 | NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds | NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.36 by commit 96fa26b74cdcf9f5c98996bf36bec9fb5b19ffe2, it was introduced in version v5.6 by commit 9954bf92c0cddd50a2a470be302e1c1ffdf21d42. For more details please see the references link. | null | 2021-12-20T00:25:07.772979Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9954bf92c0cddd50a2a470be302e1c1ffdf21d42'} |
Linux | GSD-2021-1000512 | RDMA/rxe: Clear all QP fields if creation failed | RDMA/rxe: Clear all QP fields if creation failed
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.40 by commit 2ee4d79c364914989c80de382c0b1a7259a7e4b3, it was introduced in version v4.8 by commit 8700e3e7c4857d28ebaa824509934556da0b3e76. For more details please see the references link. | null | 2021-12-20T01:39:48.583068Z | 2021-05-31T23:48:40.851101Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8700e3e7c4857d28ebaa824509934556da0b3e76'} |
Linux | GSD-2022-1001585 | crypto: hisilicon/sec - fix the aead software fallback for engine | crypto: hisilicon/sec - fix the aead software fallback for engine
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit ef7b10f3cac7810ddcfd976304fd125aca33d144, it was introduced in version v5.14 by commit 6c46a3297beae4ae2d22b26da5e091f058381c7c. For more details please see the references link. | null | 2022-04-25T04:37:08.756666Z | 2022-04-24T21:26:26.016369Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6c46a3297beae4ae2d22b26da5e091f058381c7c'} |
Linux | GSD-2022-1001090 | net: dsa: felix: fix possible NULL pointer dereference | net: dsa: felix: fix possible NULL pointer dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit b7ff8b5e75d4e91ec8c62d621aac8dfb84c57aa9, it was introduced in version v5.17 by commit 23ae3a7877718931474684ef4fbbaf1d1511ee84. For more details please see the references link. | null | 2022-04-25T06:27:41.492122Z | 2022-04-24T20:44:25.558434Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/23ae3a7877718931474684ef4fbbaf1d1511ee84'} |
Linux | GSD-2021-1000457 | spi: Fix use-after-free with devm_spi_alloc_* | spi: Fix use-after-free with devm_spi_alloc_*
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.191 by commit 28a5529068c51cdf0295ab1e11a99a3a909a03e4, it was introduced in version v4.19.163 by commit 234b432c7b6184b2d6c5ba2c55f0dd5023c0edf0. For more details please see the references link. | null | 2021-12-19T22:43:42.608044Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/234b432c7b6184b2d6c5ba2c55f0dd5023c0edf0'} |
Linux | GSD-2021-1002190 | usbnet: sanity check for maxpacket | usbnet: sanity check for maxpacket
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 397430b50a363d8b7bdda00522123f82df6adc5e. For more details please see the references link. | null | 2021-12-20T01:01:08.737172Z | 2021-11-14T15:24:00.180361Z | null | null | null | null | null |
Linux | GSD-2021-1001616 | xen/x86: fix PV trap handling on secondary processors | xen/x86: fix PV trap handling on secondary processors
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.150 by commit d4e7647695c9b8cd7e75a208f0fd170bc15c50f1, it was introduced in version v2.6.23 by commit f87e4cac4f4e940b328d3deb5b53e642e3881f43. For more details please see the references link. | null | 2021-12-20T01:34:30.390170Z | 2021-10-19T16:28:27.100323Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f87e4cac4f4e940b328d3deb5b53e642e3881f43'} |
Linux | GSD-2021-1000904 | IB/mlx5: Fix initializing CQ fragments buffer | IB/mlx5: Fix initializing CQ fragments buffer
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.126 by commit e3ecd9c09fcc10cf6b2bc67e2990c397c40a8c26, it was introduced in version v4.17 by commit 388ca8be00370db132464e27f745b8a0add19fcb. For more details please see the references link. | null | 2021-12-19T23:17:17.356424Z | 2021-06-30T00:05:35.800068Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/388ca8be00370db132464e27f745b8a0add19fcb'} |
Linux | GSD-2022-1000681 | perf/x86/intel/pt: Fix crash with stop filters in single-range mode | perf/x86/intel/pt: Fix crash with stop filters in single-range mode
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.8 by commit feffb6ae2c80b9a8206450cdef90f5943baced99, it was introduced in version v5.5 by commit 670638477aede0d7a355ced04b569214aa3feacd. For more details please see the references link. | null | 2022-03-07T01:46:30.827150Z | 2022-02-27T03:40:20.013749Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/670638477aede0d7a355ced04b569214aa3feacd'} |
Linux | GSD-2022-1001993 | staging: wfx: fix an error handling in wfx_init_common() | staging: wfx: fix an error handling in wfx_init_common()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit 93498c6e775ae91732a8109dba1bdcd324908f84. For more details please see the references link. | null | 2022-04-25T05:13:52.433252Z | 2022-04-24T22:01:44.511006Z | null | null | null | null | null |
Linux | GSD-2022-1002346 | NFS: remove unneeded check in decode_devicenotify_args() | NFS: remove unneeded check in decode_devicenotify_args()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 97cc035bdfe754dbfbc2c9b04bc46bc71ef5bc93, it was introduced in version v4.0 by commit a4f743a6bb201662962fa888e3f978583d61691e. For more details please see the references link. | null | 2022-04-25T03:52:17.398242Z | 2022-04-24T22:36:24.124572Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a4f743a6bb201662962fa888e3f978583d61691e'} |
Linux | GSD-2021-1001246 | xdp, net: Fix use-after-free in bpf_xdp_link_release | xdp, net: Fix use-after-free in bpf_xdp_link_release
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.54 by commit ca9ba1de8f09976b45ccc8e655c51c6201992139, it was introduced in version v5.9 by commit aa8d3a716b59db6c1ad6c68fb8aa05e31980da60. For more details please see the references link. | null | 2021-12-19T22:54:09.448334Z | 2021-08-03T01:48:07.550408Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/aa8d3a716b59db6c1ad6c68fb8aa05e31980da60'} |
Linux | GSD-2022-1001839 | mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init | mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit fe0e2ce5c87e9c0b9485ff566362030aa55972cf, it was introduced in version v4.12 by commit f88fc122cc34c2545dec9562eaab121494e401ef. For more details please see the references link. | null | 2022-04-25T06:42:11.740718Z | 2022-04-24T21:46:52.750181Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f88fc122cc34c2545dec9562eaab121494e401ef'} |
Linux | GSD-2021-1002743 | rds: memory leak in __rds_conn_create() | rds: memory leak in __rds_conn_create()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit 68014890e4382ff9192e1357be39b7d0455665fa, it was introduced in version v5.13 by commit aced3ce57cd37b5ca332bcacd370d01f5a8c5371. For more details please see the references link. | null | 2022-01-11T05:52:46.258343Z | 2021-12-27T05:46:08.106683Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/aced3ce57cd37b5ca332bcacd370d01f5a8c5371'} |
Linux | GSD-2021-1000284 | crypto: sa2ul - Fix memory leak of rxd | crypto: sa2ul - Fix memory leak of rxd
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit b7bd0657c2036add71981d88a7fae50188150b6e, it was introduced in version v5.10 by commit 00c9211f60db2dead16856f81a3e6ab86b31f275. For more details please see the references link. | null | 2021-12-20T00:21:07.603323Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/00c9211f60db2dead16856f81a3e6ab86b31f275'} |
Linux | GSD-2022-1001213 | powerpc: 8xx: fix a return value error in mpc8xx_pic_init | powerpc: 8xx: fix a return value error in mpc8xx_pic_init
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit b3795097173784c9985dcf374c995274d199f3ef, it was introduced in version v5.2 by commit cc76404feaed597bb4f5234d34d3f49e2d1139bf. For more details please see the references link. | null | 2022-04-25T06:27:58.499309Z | 2022-04-24T20:54:17.349852Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cc76404feaed597bb4f5234d34d3f49e2d1139bf'} |
Linux | GSD-2021-1002313 | NFC: reorder the logic in nfc_{un,}register_device | NFC: reorder the logic in nfc_{un,}register_device
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit 8a9c61c3ef187d8891225f9b932390670a43a0d3, it was introduced in version v3.10 by commit be055b2f89b5842f41363b5655a33dffb51a8294. For more details please see the references link. | null | 2021-12-20T01:33:44.347881Z | 2021-11-29T02:38:19.519781Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/be055b2f89b5842f41363b5655a33dffb51a8294'} |
Linux | GSD-2022-1000951 | openvswitch: Fix setting ipv6 fields causing hw csum failure | openvswitch: Fix setting ipv6 fields causing hw csum failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.304 by commit 952d01d70a5b90808e8c808f96fbfd432644975e, it was introduced in version v3.8 by commit 3fdbd1ce11e5c0d7cafbe44c942c5cad61113d7b. For more details please see the references link. | null | 2022-03-18T02:49:53.841744Z | 2022-03-18T00:36:14.818497Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3fdbd1ce11e5c0d7cafbe44c942c5cad61113d7b'} |
Linux | GSD-2022-1001643 | ipv6: fix panic when forwarding a pkt with no in6 dev | ipv6: fix panic when forwarding a pkt with no in6 dev
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.35 by commit adee01bbf6cb5b3e4ed08be8ff866aac90f13836, it was introduced in version v5.14 by commit ccd27f05ae7b8ebc40af5b004e94517a919aa862. For more details please see the references link. | null | 2022-04-25T06:38:43.593641Z | 2022-04-24T21:31:04.176215Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ccd27f05ae7b8ebc40af5b004e94517a919aa862'} |
Linux | GSD-2021-1001495 | ipack: ipoctal: fix module reference leak | ipack: ipoctal: fix module reference leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.286 by commit 31398849b84ebae0d43a1cf379cb9895597f221a, it was introduced in version v3.18 by commit 82a82340bab6c251e0705339f60763718eaa2a22. For more details please see the references link. | null | 2021-12-20T01:39:35.130459Z | 2021-10-19T16:20:48.958149Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/82a82340bab6c251e0705339f60763718eaa2a22'} |
Linux | GSD-2022-1000402 | perf bpf: Defer freeing string after possible strlen() on it | perf bpf: Defer freeing string after possible strlen() on it
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.102 by commit d3018a19622115e1126f6abb3657c65877a99410, it was introduced in version v5.8 by commit 04f9bf2bac72480ca1d289b751b956dd1707a5d5. For more details please see the references link. | null | 2022-03-07T01:34:07.733489Z | 2022-02-27T03:01:49.400647Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/04f9bf2bac72480ca1d289b751b956dd1707a5d5'} |
Linux | GSD-2022-1000052 | net/smc: fix kernel panic caused by race of smc_sock | net/smc: fix kernel panic caused by race of smc_sock
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.13 by commit b85f751d71ae8e2a15e9bda98852ea9af35282eb, it was introduced in version v4.11 by commit 5f08318f617b05b6ee389d8bd174c7af921ebf19. For more details please see the references link. | null | 2022-01-11T05:54:40.804223Z | 2022-01-10T19:51:56.319975Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5f08318f617b05b6ee389d8bd174c7af921ebf19'} |
Linux | GSD-2022-1000547 | ipv4: fix data races in fib_alias_hw_flags_set | ipv4: fix data races in fib_alias_hw_flags_set
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit 7ab65ea30c174e3a7e1bb4fe9cd92cc2625002e7, it was introduced in version v5.6 by commit 90b93f1b31f86dcde2fa3c57f1ae33d28d87a1f8. For more details please see the references link. | null | 2022-03-07T01:34:52.377855Z | 2022-02-27T03:21:51.843265Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/90b93f1b31f86dcde2fa3c57f1ae33d28d87a1f8'} |
Linux | GSD-2022-1002080 | RDMA/mlx5: Fix memory leak in error flow for subscribe event routine | RDMA/mlx5: Fix memory leak in error flow for subscribe event routine
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit c98d903ff9e79c210beddea4e6bc15ac38e25aa5, it was introduced in version v5.3 by commit 7597385371425febdaa8c6a1da3625d4ffff16f5. For more details please see the references link. | null | 2022-04-25T06:23:53.462066Z | 2022-04-24T22:08:48.889863Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7597385371425febdaa8c6a1da3625d4ffff16f5'} |
Linux | GSD-2021-1001180 | memory: fsl_ifc: fix leak of private memory on probe failure | memory: fsl_ifc: fix leak of private memory on probe failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.4 by commit a6b45b4932f7b0c36b41fb56a35ad679ece939a0, it was introduced in version v3.3 by commit a20cbdeffce247a2b6fb83cd8d22433994068565. For more details please see the references link. | null | 2021-12-19T22:51:10.523189Z | 2021-08-03T01:32:51.502174Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a20cbdeffce247a2b6fb83cd8d22433994068565'} |
Linux | GSD-2022-1000117 | tipc: improve size validations for received domain records | tipc: improve size validations for received domain records
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.266 by commit fde4ddeadd099bf9fbb9ccbee8e1b5c20d530a2d, it was introduced in version v4.8 by commit 35c55c9877f8de0ab129fa1a309271d0ecc868b9. For more details please see the references link. | null | 2022-02-19T10:55:42.933505Z | 2022-02-18T21:43:00.646814Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/35c55c9877f8de0ab129fa1a309271d0ecc868b9'} |
Linux | GSD-2022-1001356 | rxrpc: fix a race in rxrpc_exit_net() | rxrpc: fix a race in rxrpc_exit_net()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 41024a40f6c793abbb916a857f18fb009f07464c, it was introduced in version v4.17 by commit ace45bec6d77bc061c3c3d8ad99e298ea9800c2b. For more details please see the references link. | null | 2022-04-25T06:16:59.481403Z | 2022-04-24T21:07:20.908764Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ace45bec6d77bc061c3c3d8ad99e298ea9800c2b'} |
Linux | GSD-2021-1001929 | comedi: ni_usb6501: fix NULL-deref in command paths | comedi: ni_usb6501: fix NULL-deref in command paths
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.292 by commit 58478143771b20ab219937b1c30a706590a59224, it was introduced in version v3.18 by commit a03bb00e50ab4c07107da58a52a0bff7943f360c. For more details please see the references link. | null | 2021-12-19T23:57:11.845963Z | 2021-11-14T15:12:08.112612Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a03bb00e50ab4c07107da58a52a0bff7943f360c'} |
Linux | GSD-2021-1002606 | i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc | i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.8 by commit 16431e442db248ecd8aa9457cf0a656f1885f56e, it was introduced in version v3.12 by commit 02e9c290814cc143ceccecb14eac3e7a05da745e. For more details please see the references link. | null | 2021-12-19T23:57:37.623376Z | 2021-12-19T19:44:48.203342Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/02e9c290814cc143ceccecb14eac3e7a05da745e'} |
Linux | GSD-2021-1001883 | ocfs2: fix data corruption after conversion from inline format | ocfs2: fix data corruption after conversion from inline format
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit fa9b6b6c953e3f6441ed6cf83b4c771dac2dae08, it was introduced in version v5.10 by commit 6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b. For more details please see the references link. | null | 2021-12-20T01:26:35.963215Z | 2021-10-28T13:53:48.747361Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b'} |
Linux | GSD-2021-1000791 | efi/fdt: fix panic when no valid fdt found | efi/fdt: fix panic when no valid fdt found
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit 8a7e8b4e5631a03ea2fee27957857a56612108ca, it was introduced in version v5.10 by commit b91540d52a08b65eb6a2b09132e1bd54fa82754c. For more details please see the references link. | null | 2021-12-20T01:37:27.511705Z | 2021-06-25T00:05:52.674457Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b91540d52a08b65eb6a2b09132e1bd54fa82754c'} |
Linux | GSD-2022-1000814 | ice: fix concurrent reset and removal of VFs | ice: fix concurrent reset and removal of VFs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.26 by commit 3c805fce07c9dbc47d8a9129c7c5458025951957, it was introduced in version v5.14 by commit c503e63200c679e362afca7aca9d3dc63a0f45ed. For more details please see the references link. | null | 2022-03-18T03:00:09.375231Z | 2022-03-18T00:21:01.170389Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c503e63200c679e362afca7aca9d3dc63a0f45ed'} |
Linux | GSD-2022-1001706 | staging: wfx: fix an error handling in wfx_init_common() | staging: wfx: fix an error handling in wfx_init_common()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 86efcb524ae1889ae73f2a2f0bb7fff2ec757ab0. For more details please see the references link. | null | 2022-04-25T04:23:21.749196Z | 2022-04-24T21:36:43.591601Z | null | null | null | null | null |
Linux | GSD-2021-1002256 | cfg80211: call cfg80211_stop_ap when switch from P2P_GO type | cfg80211: call cfg80211_stop_ap when switch from P2P_GO type
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.162 by commit 52affc201fc22a1ab9a59ef0ed641a9adfcb8d13, it was introduced in version v3.6 by commit ac800140c20e7ae51117e71289065bedd4930fc2. For more details please see the references link. | null | 2021-12-20T00:40:02.283533Z | 2021-11-29T02:35:38.439272Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac800140c20e7ae51117e71289065bedd4930fc2'} |
Linux | GSD-2022-1001593 | exec: Force single empty string when argv is empty | exec: Force single empty string when argv is empty
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit a8054d3fa5deb84b215d6be1b910a978f3cb840d. For more details please see the references link. | null | 2022-04-25T04:13:28.708022Z | 2022-04-24T21:27:00.856866Z | null | null | null | null | null |
Linux | GSD-2021-1002539 | arm64: uaccess: avoid blocking within critical sections | arm64: uaccess: avoid blocking within critical sections
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.6 by commit ff1a30740f7aa78699cea964640df6ff4f034bb5, it was introduced in version v5.11 by commit f253d827f33cb5a5990b5cfd271941d1a21ecd85. For more details please see the references link. | null | 2021-12-20T01:27:53.981741Z | 2021-12-19T19:41:49.267994Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f253d827f33cb5a5990b5cfd271941d1a21ecd85'} |
Linux | GSD-2021-1000504 | habanalabs/gaudi: Fix a potential use after free in gaudi_memset_device_memory | habanalabs/gaudi: Fix a potential use after free in gaudi_memset_device_memory
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.7 by commit b49f5af30b0e4064fbd91e83823a4bfcb2c7a3e7, it was introduced in version v5.12 by commit 423815bf02e257091d5337be5c63b57fc29e4254. For more details please see the references link. | null | 2021-12-19T22:45:08.998857Z | 2021-05-31T23:47:22.860213Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/423815bf02e257091d5337be5c63b57fc29e4254'} |
Linux | GSD-2022-1001069 | drm/amdgpu: Fix recursive locking warning | drm/amdgpu: Fix recursive locking warning
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit c6e64930e0f0587591c849db137b4a1ffbf4f546. For more details please see the references link. | null | 2022-04-25T04:42:19.466807Z | 2022-04-24T20:43:22.848800Z | null | null | null | null | null |
Linux | GSD-2021-1002169 | can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv | can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit d9d52a3ebd284882f5562c88e55991add5d01586, it was introduced in version v5.4 by commit 9d71dd0c70099914fcd063135da3c580865e924c. For more details please see the references link. | null | 2021-12-20T00:57:00.044995Z | 2021-11-14T15:23:01.913232Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9d71dd0c70099914fcd063135da3c580865e924c'} |
Linux | GSD-2021-1000154 | ACPI: custom_method: fix potential use-after-free issue | ACPI: custom_method: fix potential use-after-free issue
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.36 by commit 62dc2440ebb552aa0d7f635e1697e077d9d21203, it was introduced in version v5.4 by commit 03d1571d9513369c17e6848476763ebbd10ec2cb. For more details please see the references link. | null | 2021-12-19T22:58:06.481252Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/03d1571d9513369c17e6848476763ebbd10ec2cb'} |
Linux | GSD-2021-1002493 | net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources() | net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.84 by commit f1d43efa59f1edd3e7eca0e94559b4c6b1cd4e2b, it was introduced in version v4.7 by commit ec25bc04ed8e12947738468cbe2191f1529f9e39. For more details please see the references link. | null | 2021-12-20T00:56:13.954387Z | 2021-12-19T19:39:45.849251Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ec25bc04ed8e12947738468cbe2191f1529f9e39'} |
Linux | GSD-2022-1001439 | KVM: SVM: fix panic on out-of-bounds guest IRQ | KVM: SVM: fix panic on out-of-bounds guest IRQ
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit e4d153d53d9648513481eb4ef8c212e7f1f8173d. For more details please see the references link. | null | 2022-04-25T05:14:59.078289Z | 2022-04-24T21:13:19.754517Z | null | null | null | null | null |
Linux | GSD-2022-1000382 | perf: Fix list corruption in perf_cgroup_switch() | perf: Fix list corruption in perf_cgroup_switch()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.101 by commit f6b5d51976fcefef5732da3e3feb3ccff680f7c8, it was introduced in version v4.11 by commit 058fe1c0440e68a1ba3c2270ae43e9f0298b27d8. For more details please see the references link. | null | 2022-03-07T01:43:59.221579Z | 2022-02-27T02:58:50.142415Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/058fe1c0440e68a1ba3c2270ae43e9f0298b27d8'} |
Linux | GSD-2021-1001315 | cifs: prevent NULL deref in cifs_compose_mount_options() | cifs: prevent NULL deref in cifs_compose_mount_options()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.135 by commit f7d1fa65e74263d11f90ddd33b4d4cd905a93759. For more details please see the references link. | null | 2021-12-20T00:09:48.370675Z | 2021-08-03T02:06:29.694916Z | null | null | null | null | null |
Linux | GSD-2022-1000678 | scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe | scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.8 by commit 2d24336c7214b281b51860e54783dfc65f1248df, it was introduced in version v3.16 by commit d576a5e80cd07ea7049f8fd7b303c14df7b5d7d2. For more details please see the references link. | null | 2022-03-07T01:44:47.253740Z | 2022-02-27T03:39:59.564022Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d576a5e80cd07ea7049f8fd7b303c14df7b5d7d2'} |
Linux | GSD-2021-1000857 | kvm: avoid speculation-based attacks from out-of-range memslot accesses | kvm: avoid speculation-based attacks from out-of-range memslot accesses
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.237 by commit 361ce3b917aff93123e9e966d8608655c967f438. For more details please see the references link. | null | 2021-12-19T23:56:47.592946Z | 2021-06-30T00:01:50.479337Z | null | null | null | null | null |
Linux | GSD-2021-1001745 | nvme-rdma: destroy cm id before destroy qp to avoid use after free | nvme-rdma: destroy cm id before destroy qp to avoid use after free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.9 by commit d268a182c56e8361e19fb781137411643312b994. For more details please see the references link. | null | 2021-12-19T22:49:33.740424Z | 2021-10-19T16:34:38.998183Z | null | null | null | null | null |
Linux | GSD-2022-1000228 | iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() | iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.99 by commit 9d9995b0371e4e8c18d4f955479e5d47efe7b2d4, it was introduced in version v5.8 by commit e3beca48a45b5e0e6e6a4e0124276b8248dcc9bb. For more details please see the references link. | null | 2022-02-19T09:37:21.559873Z | 2022-02-18T21:58:43.161556Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e3beca48a45b5e0e6e6a4e0124276b8248dcc9bb'} |
Linux | GSD-2022-1002215 | video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow | video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 055cdd2e7b992921424d4daaa285ced787fb205f. For more details please see the references link. | null | 2022-04-25T04:06:17.865681Z | 2022-04-24T22:22:33.755334Z | null | null | null | null | null |
Linux | GSD-2021-1001250 | igb: Fix use-after-free error during reset | igb: Fix use-after-free error during reset
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.54 by commit f153664d8e70c11d0371341613651e1130e20240, it was introduced in version v4.12 by commit 7cc6fd4c60f267e17b0baef1580d7a6258c0a6f0. For more details please see the references link. | null | 2021-12-19T22:53:52.458681Z | 2021-08-03T01:48:37.699992Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7cc6fd4c60f267e17b0baef1580d7a6258c0a6f0'} |
Linux | GSD-2022-1002350 | mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init | mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 9843c9c98f26c6ad843260b19bfdaa2598f2ae1e, it was introduced in version v4.12 by commit f88fc122cc34c2545dec9562eaab121494e401ef. For more details please see the references link. | null | 2022-04-25T04:20:25.510060Z | 2022-04-24T22:37:06.001950Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f88fc122cc34c2545dec9562eaab121494e401ef'} |
Linux | GSD-2022-1001985 | Drivers: hv: vmbus: Fix potential crash on module unload | Drivers: hv: vmbus: Fix potential crash on module unload
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit cf580d2e3884dbafd6b90269b03a24d661578624, it was introduced in version v5.7 by commit 74347a99e73ae00b8385f1209aaea193c670f901. For more details please see the references link. | null | 2022-04-25T06:23:13.211504Z | 2022-04-24T22:01:07.680806Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/74347a99e73ae00b8385f1209aaea193c670f901'} |
Linux | GSD-2022-1000697 | net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe() | net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.13 by commit ca0bdff4249a644f2ca7a49d410d95b8dacf1f72, it was introduced in version v3.18 by commit 8c14f9c70327a6fb75534c4c61d7ea9c82ccf78f. For more details please see the references link. | null | 2022-03-18T02:52:07.863769Z | 2022-03-18T00:10:23.781652Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c14f9c70327a6fb75534c4c61d7ea9c82ccf78f'} |
Linux | GSD-2021-1000912 | mm/memory-failure: make sure wait for page writeback in memory_failure | mm/memory-failure: make sure wait for page writeback in memory_failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.128 by commit 566345aaabac853aa866f53a219c4b02a6beb527, it was introduced in version v3.16 by commit 0bc1f8b0682caa39f45ce1e0228ebf43acb46111. For more details please see the references link. | null | 2021-12-20T01:09:09.300936Z | 2021-06-30T00:06:05.693380Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0bc1f8b0682caa39f45ce1e0228ebf43acb46111'} |
Linux | GSD-2021-1001600 | cpufreq: schedutil: Use kobject release() method to free sugov_tunables | cpufreq: schedutil: Use kobject release() method to free sugov_tunables
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.151 by commit 67c98e023135ff81b8d52998a6fdb8ca0c518d82, it was introduced in version v4.7 by commit 9bdcb44e391da5c41b98573bf0305a0e0b1c9569. For more details please see the references link. | null | 2021-12-20T00:48:47.185525Z | 2021-10-19T16:27:42.451767Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9bdcb44e391da5c41b98573bf0305a0e0b1c9569'} |
Linux | GSD-2021-1002186 | scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() | scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 7fb223d0ad801f633c78cbe42b1d1b55f5d163ad, it was introduced in version v3.11 by commit 8c0eb596baa51f2b43949c698c644727ef17805c. For more details please see the references link. | null | 2021-12-20T01:14:31.564203Z | 2021-11-14T15:23:50.358560Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c0eb596baa51f2b43949c698c644727ef17805c'} |
Linux | GSD-2021-1000441 | rtw88: Fix array overrun in rtw_get_tx_power_params() | rtw88: Fix array overrun in rtw_get_tx_power_params()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.119 by commit 6b5aa0cf321c25f41e09a61c83ee4dc7ab9549cb, it was introduced in version v5.3 by commit fa6dfe6bff246ddd5be3cfe81637f137acd6c294. For more details please see the references link. | null | 2021-12-19T23:26:31.138913Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fa6dfe6bff246ddd5be3cfe81637f137acd6c294'} |
Linux | GSD-2022-1001086 | Bluetooth: fix null ptr deref on hci_sync_conn_complete_evt | Bluetooth: fix null ptr deref on hci_sync_conn_complete_evt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit f61c23e73dc653b957781066abfa8105c3fa3f5b. For more details please see the references link. | null | 2022-04-25T04:20:34.143876Z | 2022-04-24T20:44:11.834275Z | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.