ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2021-1000011 | bpf: Use correct permission flag for mixed signed bounds arithmetic | bpf: Use correct permission flag for mixed signed bounds arithmetic
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.16 by commit 4ccdc6c6cae38b91c871293fb0ed8c6845a61b51, it was introduced in version v5.8 by commit 2c78ee898d8f10ae6fb2fa23a3fbaec96b1b7366. For more details please see the references link. | null | 2021-12-19T23:42:39.775596Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c78ee898d8f10ae6fb2fa23a3fbaec96b1b7366'} |
Linux | GSD-2022-1002079 | bpf, sockmap: Fix memleak in tcp_bpf_sendmsg while sk msg is full | bpf, sockmap: Fix memleak in tcp_bpf_sendmsg while sk msg is full
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit bec34a91eba3483e1830c02bdd36f8f968642047, it was introduced in version v4.20 by commit 604326b41a6fb9b4a78b6179335decee0365cd8c. For more details please see the references link. | null | 2022-04-25T04:43:47.250059Z | 2022-04-24T22:08:43.235058Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/604326b41a6fb9b4a78b6179335decee0365cd8c'} |
Linux | GSD-2022-1000044 | net/smc: fix kernel panic caused by race of smc_sock | net/smc: fix kernel panic caused by race of smc_sock
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.90 by commit e8a5988a85c719ce7205cb00dcf0716dcf611332, it was introduced in version v4.11 by commit 5f08318f617b05b6ee389d8bd174c7af921ebf19. For more details please see the references link. | null | 2022-01-11T05:47:08.564460Z | 2022-01-10T19:51:36.290632Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5f08318f617b05b6ee389d8bd174c7af921ebf19'} |
Linux | GSD-2021-1001529 | netfilter: ipset: Fix oversized kvmalloc() calls | netfilter: ipset: Fix oversized kvmalloc() calls
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.249 by commit 633bd6d69eac5deffbaeab4b33b34c7a98a7fc2c. For more details please see the references link. | null | 2021-12-20T00:52:37.572857Z | 2021-10-19T16:22:24.806776Z | null | null | null | null | null |
Linux | GSD-2022-1002429 | pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe | pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 0356d4b64a03d23daf99a2a29d7d7d91d6ec2ea8, it was introduced in version v3.9 by commit 32e67eee670e1254ee5ab41e2f454680acb9c17c. For more details please see the references link. | null | 2022-04-25T06:29:59.194848Z | 2022-04-24T22:46:03.765081Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/32e67eee670e1254ee5ab41e2f454680acb9c17c'} |
Linux | GSD-2022-1000414 | net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change | net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit 4b22aa42bd4d2d630ef1854c139275c3532937cb. For more details please see the references link. | null | 2022-03-07T01:50:13.964698Z | 2022-02-27T03:03:50.722132Z | null | null | null | null | null |
Linux | GSD-2021-1001483 | jfs: fix GPF in diFree | jfs: fix GPF in diFree
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.276 by commit 7bde24bde490f3139eee147efc6d60d6040fe975. For more details please see the references link. | null | 2021-12-19T23:43:28.955454Z | 2021-08-03T02:54:45.255195Z | null | null | null | null | null |
Linux | GSD-2021-1001179 | memory: fsl_ifc: fix leak of IO mapping on probe failure | memory: fsl_ifc: fix leak of IO mapping on probe failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.4 by commit 28f71fd81ebd3b386bf5c7c5539664156f7d72c1, it was introduced in version v3.3 by commit a20cbdeffce247a2b6fb83cd8d22433994068565. For more details please see the references link. | null | 2021-12-19T23:05:38.698568Z | 2021-08-03T01:32:47.733135Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a20cbdeffce247a2b6fb83cd8d22433994068565'} |
Linux | GSD-2022-1001655 | drm/amdkfd: Check for potential null return of kmalloc_array() | drm/amdkfd: Check for potential null return of kmalloc_array()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.35 by commit f2658d5966bcee8c3eb487875f459756d4f7cdfc. For more details please see the references link. | null | 2022-04-25T04:45:12.293675Z | 2022-04-24T21:31:58.575213Z | null | null | null | null | null |
Linux | GSD-2022-1000947 | usb: gadget: rndis: add spinlock for rndis response list | usb: gadget: rndis: add spinlock for rndis response list
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.304 by commit 9f5d8ba538ef81cd86ea587ca3f8c77e26bea405, it was introduced in version v4.6 by commit f6281af9d62e128aa6efad29cf7265062af114f2. For more details please see the references link. | null | 2022-03-18T02:55:12.020251Z | 2022-03-18T00:35:24.938101Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f6281af9d62e128aa6efad29cf7265062af114f2'} |
Linux | GSD-2021-1000338 | ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook | ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.38 by commit 630146203108bf6b8934eec0dfdb3e46dcb917de, it was introduced in version v4.7 by commit 1879445dfa7bbd6fe21b09c5cc72f4934798afed. For more details please see the references link. | null | 2021-12-19T22:01:38.803362Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1879445dfa7bbd6fe21b09c5cc72f4934798afed'} |
Linux | GSD-2021-1002305 | drm/prime: Fix use after free in mmap with drm_gem_ttm_mmap | drm/prime: Fix use after free in mmap with drm_gem_ttm_mmap
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit 4f8e469a2384dfa4047145b0093126462cbb6dc0, it was introduced in version v5.5 by commit 9786b65bc61acec63f923978c75e707afbb74bc7. For more details please see the references link. | null | 2021-12-20T01:20:40.686458Z | 2021-11-29T02:37:53.367552Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9786b65bc61acec63f923978c75e707afbb74bc7'} |
Linux | GSD-2022-1001205 | RDMA/mlx5: Fix memory leak in error flow for subscribe event routine | RDMA/mlx5: Fix memory leak in error flow for subscribe event routine
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 414b4e8738484379f18d6c4e780787c80dbf8a2c, it was introduced in version v5.3 by commit 7597385371425febdaa8c6a1da3625d4ffff16f5. For more details please see the references link. | null | 2022-04-25T04:26:09.185518Z | 2022-04-24T20:53:35.860556Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7597385371425febdaa8c6a1da3625d4ffff16f5'} |
Linux | GSD-2021-1000292 | crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init | crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 1ea500ce6f7c9106e4a561d28e69215f3d451818, it was introduced in version v4.7 by commit 25c6ffb249f612c56a48ce48a3887adf57b8f4bd. For more details please see the references link. | null | 2021-12-19T23:17:04.736792Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/25c6ffb249f612c56a48ce48a3887adf57b8f4bd'} |
Linux | GSD-2021-1000768 | bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks | bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.43 by commit ff5039ec75c83d2ed5b781dc7733420ee8c985fc, it was introduced in version v5.6 by commit 59438b46471ae6cdfb761afc8c9beaf1e428a331. For more details please see the references link. | null | 2021-12-20T01:10:50.803448Z | 2021-06-25T00:04:23.006028Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/59438b46471ae6cdfb761afc8c9beaf1e428a331'} |
Linux | GSD-2021-1002755 | net: stmmac: dwmac-rk: fix oob read in rk_gmac_setup | net: stmmac: dwmac-rk: fix oob read in rk_gmac_setup
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit 0b4a5d1e15ce72f69be48f38dc0401dab890ae0f, it was introduced in version v5.14 by commit 3bb3d6b1c1957e88bfc5e77a4557f7e6ba761fe3. For more details please see the references link. | null | 2022-01-11T05:52:38.831136Z | 2021-12-27T05:48:25.600817Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3bb3d6b1c1957e88bfc5e77a4557f7e6ba761fe3'} |
Linux | GSD-2021-1002240 | usb: host: ohci-tmio: check return value after calling platform_get_resource() | usb: host: ohci-tmio: check return value after calling platform_get_resource()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.256 by commit bb6ed2e05eb6e8619b30fa854f9becd50c11723f. For more details please see the references link. | null | 2021-12-20T00:51:43.729812Z | 2021-11-29T02:34:49.526482Z | null | null | null | null | null |
Linux | GSD-2022-1001710 | netfilter: conntrack: revisit gc autotuning | netfilter: conntrack: revisit gc autotuning
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 58d52743ae85d28c9335c6034d6ce350b8689951. For more details please see the references link. | null | 2022-04-25T03:20:53.967958Z | 2022-04-24T21:36:55.154415Z | null | null | null | null | null |
Linux | GSD-2022-1000802 | configfs: fix a race in configfs_{,un}register_subsystem() | configfs: fix a race in configfs_{,un}register_subsystem()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.26 by commit e7a66dd2687758718eddd79b542a95cf3aa488cc, it was introduced in version v2.6.16 by commit 7063fbf2261194f72ee75afca67b3b38b554b5fa. For more details please see the references link. | null | 2022-03-18T03:03:59.320115Z | 2022-03-18T00:19:41.644974Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7063fbf2261194f72ee75afca67b3b38b554b5fa'} |
Linux | GSD-2021-1000787 | xen-netback: take a reference to the RX task thread | xen-netback: take a reference to the RX task thread
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.43 by commit 6b53db8c4c14b4e7256f058d202908b54a7b85b4, it was introduced in version v5.5 by commit 2ac061ce97f413bfbbdd768f7d2e0fda2e8170df. For more details please see the references link. | null | 2021-12-20T00:53:26.051384Z | 2021-06-25T00:05:38.133445Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2ac061ce97f413bfbbdd768f7d2e0fda2e8170df'} |
Linux | GSD-2021-1001895 | ice: fix locking for Tx timestamp tracking flush | ice: fix locking for Tx timestamp tracking flush
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit 61616be899975404df44c20ab902464b60882cd7, it was introduced in version v5.14.4 by commit 46720ac66c21bf85e08823664b7b314b85e43f26. For more details please see the references link. | null | 2021-12-19T22:54:13.686749Z | 2021-10-28T13:54:32.559581Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/46720ac66c21bf85e08823664b7b314b85e43f26'} |
Linux | GSD-2021-1002610 | nfc: fix segfault in nfc_genl_dump_devices_done | nfc: fix segfault in nfc_genl_dump_devices_done
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.296 by commit ea55b3797878752aa076b118afb727dcf79cac34. For more details please see the references link. | null | 2022-01-11T05:56:55.340739Z | 2021-12-27T05:27:07.621865Z | null | null | null | null | null |
Linux | GSD-2022-1001340 | SUNRPC: Ensure we flush any closed sockets before xs_xprt_free() | SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 7a0921a23cae42e9fa5ce964f6907181b6dc80d8, it was introduced in version v5.1 by commit a73881c96d73ee72b7dbbd38a6eeef66182a8ef7. For more details please see the references link. | null | 2022-04-25T04:34:09.901903Z | 2022-04-24T21:05:59.598928Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a73881c96d73ee72b7dbbd38a6eeef66182a8ef7'} |
Linux | GSD-2022-1000101 | scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() | scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.265 by commit c93a290c862ccfa404e42d7420565730d67cbff9, it was introduced in version v3.2 by commit 0cbf32e1681d870632a1772601cbaadd996dc978. For more details please see the references link. | null | 2022-02-20T06:16:40.596811Z | 2022-02-18T21:35:18.562548Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0cbf32e1681d870632a1772601cbaadd996dc978'} |
Linux | GSD-2021-1001196 | iommu/arm-smmu: Fix arm_smmu_device refcount leak in address translation | iommu/arm-smmu: Fix arm_smmu_device refcount leak in address translation
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.4 by commit 5f9741a9a91f25c89e04b408cd61e3ab050ce24b. For more details please see the references link. | null | 2021-12-19T22:54:07.702725Z | 2021-08-03T01:34:42.753856Z | null | null | null | null | null |
Linux | GSD-2022-1002096 | drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes() | drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 19a7eba284790cfbba2945deb2363cf03ce41648, it was introduced in version v4.15 by commit e7b07ceef2a650e5ed8ca37997689e086c680daf. For more details please see the references link. | null | 2022-04-25T06:31:30.129199Z | 2022-04-24T22:10:40.197072Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e7b07ceef2a650e5ed8ca37997689e086c680daf'} |
Linux | GSD-2022-1000551 | mctp: fix use after free | mctp: fix use after free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit 1dd3ecbec5f606b2a526c47925c8634b1a6bb81e, it was introduced in version v5.16 by commit 4f9e1ba6de45aa8797a83f1fe5b82ec4bac16899. For more details please see the references link. | null | 2022-03-07T01:37:35.230262Z | 2022-02-27T03:22:58.351677Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4f9e1ba6de45aa8797a83f1fe5b82ec4bac16899'} |
Linux | GSD-2022-1002242 | RDMA/mlx5: Fix memory leak in error flow for subscribe event routine | RDMA/mlx5: Fix memory leak in error flow for subscribe event routine
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 0174a89663a5ef83617da15bf24c0af2f62b6c7f, it was introduced in version v5.3 by commit 7597385371425febdaa8c6a1da3625d4ffff16f5. For more details please see the references link. | null | 2022-04-25T02:56:20.842911Z | 2022-04-24T22:25:06.950319Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7597385371425febdaa8c6a1da3625d4ffff16f5'} |
Linux | GSD-2022-1001897 | crypto: hisilicon/sec - fix the aead software fallback for engine | crypto: hisilicon/sec - fix the aead software fallback for engine
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 40dba7c26e897c637e91312b35f664f1d4d0073c, it was introduced in version v5.14 by commit 6c46a3297beae4ae2d22b26da5e091f058381c7c. For more details please see the references link. | null | 2022-04-25T06:39:21.904418Z | 2022-04-24T21:53:06.150082Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6c46a3297beae4ae2d22b26da5e091f058381c7c'} |
Linux | GSD-2022-1000785 | usb: gadget: clear related members when goto fail | usb: gadget: clear related members when goto fail
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.27 by commit ab3656acb7b4f33a30970a920ed90f0db36d940b. For more details please see the references link. | null | 2022-03-18T02:57:32.365935Z | 2022-03-18T00:17:55.988136Z | null | null | null | null | null |
Linux | GSD-2021-1000800 | ice: track AF_XDP ZC enabled queues in bitmap | ice: track AF_XDP ZC enabled queues in bitmap
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit 1d34fa4fcf06649036ba0c97854fcf7a741ee18c, it was introduced in version v5.12 by commit c7a219048e459cf99c6fec0f7c1e42414e9e6202. For more details please see the references link. | null | 2021-12-20T01:25:14.995465Z | 2021-06-25T00:08:12.108676Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c7a219048e459cf99c6fec0f7c1e42414e9e6202'} |
Linux | GSD-2021-1001712 | HID: usbhid: free raw_report buffers in usbhid_stop | HID: usbhid: free raw_report buffers in usbhid_stop
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit 2b704864c92dcec2b295f276fcfbfb81d9831f81. For more details please see the references link. | null | 2021-12-20T00:18:04.669701Z | 2021-10-19T16:33:05.834517Z | null | null | null | null | null |
Linux | GSD-2021-1001342 | fbmem: Do not delete the mode that is still in use | fbmem: Do not delete the mode that is still in use
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.134 by commit 359311b85ebec7c07c3a08ae2f3def946cad33fa, it was introduced in version v5.3 by commit 13ff178ccd6d3b8074c542a911300b79c4eec255. For more details please see the references link. | null | 2021-12-19T23:59:30.995985Z | 2021-08-03T02:13:22.411947Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/13ff178ccd6d3b8074c542a911300b79c4eec255'} |
Linux | GSD-2022-1001194 | af_netlink: Fix shift out of bounds in group mask calculation | af_netlink: Fix shift out of bounds in group mask calculation
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit e23e1e981247feb3c7d0236fe58aceb685f234ae, it was introduced in version v2.6.14 by commit f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198. For more details please see the references link. | null | 2022-04-25T06:03:48.500490Z | 2022-04-24T20:52:45.977869Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198'} |
Linux | GSD-2021-1000103 | ext4: fix check to prevent false positive report of incorrect used inodes | ext4: fix check to prevent false positive report of incorrect used inodes
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.20 by commit f42789ee5f96743cdb5f69445cab3609458733f7, it was introduced in version v4.18 by commit 5012284700775a4e6e3fbe7eac4c543c4874b559. For more details please see the references link. | null | 2021-12-20T01:36:20.907590Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5012284700775a4e6e3fbe7eac4c543c4874b559'} |
Linux | GSD-2021-1002094 | net: mscc: ocelot: avoid overflowing the PTP timestamp FIFO | net: mscc: ocelot: avoid overflowing the PTP timestamp FIFO
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit 3b4241817601a2f59beea471baa51763d7262232, it was introduced in version v5.4 by commit 4e3b0468e6d7f3c38ce52320803769b49ba87930. For more details please see the references link. | null | 2021-12-20T01:09:39.605263Z | 2021-11-14T15:19:39.837428Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4e3b0468e6d7f3c38ce52320803769b49ba87930'} |
Linux | GSD-2021-1000553 | tipc: skb_linearize the head skb when reassembling msgs | tipc: skb_linearize the head skb when reassembling msgs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit ace300eecbccaa698e2b472843c74a5f33f7dce8, it was introduced in version v4.3 by commit 45c8b7b175ceb2d542e0fe15247377bf3bce29ec. For more details please see the references link. | null | 2021-12-19T22:15:31.772318Z | 2021-06-04T19:37:38.821224Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/45c8b7b175ceb2d542e0fe15247377bf3bce29ec'} |
Linux | GSD-2021-1000046 | net: hso: fix NULL-deref on disconnect regression | net: hso: fix NULL-deref on disconnect regression
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.33 by commit 90642ee9eb581a13569b1c0bd57e85d962215273, it was introduced in version v5.10.30 by commit dc195928d7e4ec7b5cfc6cd10dc4c8d87a7c72ac. For more details please see the references link. | null | 2021-12-20T01:29:19.747096Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/dc195928d7e4ec7b5cfc6cd10dc4c8d87a7c72ac'} |
Linux | GSD-2021-1002581 | serial: liteuart: fix use-after-free and memleak on unbind | serial: liteuart: fix use-after-free and memleak on unbind
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.7 by commit 602824cf9aa9db8830ffe5cfb2cd54365cada4fe, it was introduced in version v5.11 by commit 1da81e5562fac8286567422cc56a7fbd0dc646d4. For more details please see the references link. | null | 2021-12-19T22:55:33.983269Z | 2021-12-19T19:43:40.171813Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1da81e5562fac8286567422cc56a7fbd0dc646d4'} |
Linux | GSD-2022-1001481 | selinux: allow FIOCLEX and FIONCLEX with policy capability | selinux: allow FIOCLEX and FIONCLEX with policy capability
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit b2ec24277169ea5b68d6c25f9885afe5b711ff5a. For more details please see the references link. | null | 2022-04-25T04:49:27.202800Z | 2022-04-24T21:15:56.369764Z | null | null | null | null | null |
Linux | GSD-2021-1000416 | ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook | ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.120 by commit 3ed8832aeaa9a37b0fc386bb72ff604352567c80, it was introduced in version v4.7 by commit 1879445dfa7bbd6fe21b09c5cc72f4934798afed. For more details please see the references link. | null | 2021-12-19T23:40:57.165617Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1879445dfa7bbd6fe21b09c5cc72f4934798afed'} |
Linux | GSD-2021-1000945 | ALSA: seq: Fix race of snd_seq_timer_open() | ALSA: seq: Fix race of snd_seq_timer_open()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.44 by commit bd7d88b0874f82f7b29d1a53e574cedaf23166ba. For more details please see the references link. | null | 2021-12-19T23:15:34.777412Z | 2021-06-30T00:26:11.672359Z | null | null | null | null | null |
Linux | GSD-2021-1001657 | cpufreq: schedutil: Use kobject release() method to free sugov_tunables | cpufreq: schedutil: Use kobject release() method to free sugov_tunables
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.71 by commit a7d4fc84404d45d72f4490417e8cc3efa4af93f1, it was introduced in version v4.7 by commit 9bdcb44e391da5c41b98573bf0305a0e0b1c9569. For more details please see the references link. | null | 2021-12-20T00:38:17.124196Z | 2021-10-19T16:30:21.206052Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9bdcb44e391da5c41b98573bf0305a0e0b1c9569'} |
Linux | GSD-2022-1002307 | qede: confirm skb is allocated before using | qede: confirm skb is allocated before using
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 9648adb1b3ece55c657d3a4f52bfee663b710dfe, it was introduced in version v4.18 by commit 8a8633978b842c88fbcfe00d4e5dde96048f630e. For more details please see the references link. | null | 2022-04-25T04:44:08.858248Z | 2022-04-24T22:32:51.330951Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8a8633978b842c88fbcfe00d4e5dde96048f630e'} |
Linux | GSD-2022-1000290 | net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup | net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.303 by commit 711b6bf3fb052f0a6b5b3205d50e30c0c2980382, it was introduced in version v3.9 by commit e2ca90c276e1fc410d7cd3c1a4eee245ec902a20. For more details please see the references link. | null | 2022-03-07T01:33:35.719041Z | 2022-02-27T02:38:53.661607Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e2ca90c276e1fc410d7cd3c1a4eee245ec902a20'} |
Linux | GSD-2021-1001207 | smackfs: restrict bytes count in smk_set_cipso() | smackfs: restrict bytes count in smk_set_cipso()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.3 by commit 258fd821f69378453c071b9dd767b298810fc766. For more details please see the references link. | null | 2021-12-19T22:20:14.166561Z | 2021-08-03T01:37:29.477790Z | null | null | null | null | null |
Linux | GSD-2022-1001878 | ASoC: codecs: va-macro: fix accessing array out of bounds for enum type | ASoC: codecs: va-macro: fix accessing array out of bounds for enum type
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 966408e37d84b762d11978b7bfb03fff0c6222ad, it was introduced in version v5.11 by commit 908e6b1df26efc9d2df70c9a7bf4f5eae5c5702f. For more details please see the references link. | null | 2022-04-25T03:35:08.832915Z | 2022-04-24T21:51:10.569913Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/908e6b1df26efc9d2df70c9a7bf4f5eae5c5702f'} |
Linux | GSD-2021-1002702 | rds: memory leak in __rds_conn_create() | rds: memory leak in __rds_conn_create()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.88 by commit 74dc97dfb276542f12746d706abef63364d816bb, it was introduced in version v5.10.44 by commit e806df71eed223ab8ca099c61a41f3e9a576733f. For more details please see the references link. | null | 2022-01-11T05:52:17.920510Z | 2021-12-27T05:37:51.971268Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e806df71eed223ab8ca099c61a41f3e9a576733f'} |
Linux | GSD-2022-1001252 | ASoC: atmel: Fix error handling in sam9x5_wm8731_driver_probe | ASoC: atmel: Fix error handling in sam9x5_wm8731_driver_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit f43ad5dc43240289f4cf13c16cc506f4f7087931, it was introduced in version v3.12 by commit fdbcb3cba54b29a37dfe42acdc0e72c543e0807d. For more details please see the references link. | null | 2022-04-25T03:38:53.217745Z | 2022-04-24T20:58:01.696759Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fdbcb3cba54b29a37dfe42acdc0e72c543e0807d'} |
Linux | GSD-2022-1001602 | drbd: fix potential silent data corruption | drbd: fix potential silent data corruption
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit b5073d72d06d95ad406a99acbdd499026b55f8e0. For more details please see the references link. | null | 2022-04-25T04:42:24.573673Z | 2022-04-24T21:27:34.221485Z | null | null | null | null | null |
Linux | GSD-2022-1000910 | RDMA/ib_srp: Fix a deadlock | RDMA/ib_srp: Fix a deadlock
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.232 by commit d7997d19dfa7001ca41e971cd9efd091bb195b51, it was introduced in version v3.8 by commit ef6c49d87c3418c442a22e55e3ce2f91b163d69e. For more details please see the references link. | null | 2022-03-18T03:00:27.561924Z | 2022-03-18T00:30:53.839948Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef6c49d87c3418c442a22e55e3ce2f91b163d69e'} |
Linux | GSD-2021-1000695 | net: usb: fix memory leak in smsc75xx_bind | net: usb: fix memory leak in smsc75xx_bind
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.271 by commit 22c840596af0c09068b6cf948616e6496e59e07f, it was introduced in version v2.6.34 by commit d0cad871703b898a442e4049c532ec39168e5b57. For more details please see the references link. | null | 2021-12-20T00:56:21.397541Z | 2021-06-04T20:04:07.734215Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0cad871703b898a442e4049c532ec39168e5b57'} |
Linux | GSD-2021-1001987 | IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields | IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.216 by commit 73d2892148aa4397a885b4f4afcfc5b27a325c42, it was introduced in version v2.6.35 by commit f931551bafe1f10ded7f5282e2aa162c267a2e5d. For more details please see the references link. | null | 2021-12-19T22:26:59.778400Z | 2021-11-14T15:14:44.314078Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f931551bafe1f10ded7f5282e2aa162c267a2e5d'} |
Linux | GSD-2022-1002184 | net: ipv4: fix route with nexthop object delete warning | net: ipv4: fix route with nexthop object delete warning
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit f5064531c23ad646da7be8b938292b00a7e61438, it was introduced in version v5.3 by commit 4c7e8084fd467ddb2b0e6c6011f9c1064afb7e56. For more details please see the references link. | null | 2022-04-25T05:16:42.456242Z | 2022-04-24T22:19:49.716259Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4c7e8084fd467ddb2b0e6c6011f9c1064afb7e56'} |
Linux | GSD-2022-1000443 | s390/cio: verify the driver availability for path_event call | s390/cio: verify the driver availability for path_event call
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit fe990b7bf6ac93f1d850d076b8f0e758268aa4ab, it was introduced in version v5.11 by commit 32ef938815c1fb42d65212aac860ab153a64de1a. For more details please see the references link. | null | 2022-03-07T01:44:12.878804Z | 2022-02-27T03:07:54.571245Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/32ef938815c1fb42d65212aac860ab153a64de1a'} |
Linux | GSD-2022-1000013 | net: fix use-after-free in tw_timer_handler | net: fix use-after-free in tw_timer_handler
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.296 by commit e73164e89d1be561228a4534e1091369ee4ba41a, it was introduced in version v2.6.27 by commit 61a7e26028b94805fd686a6dc9dbd9941f8f19b0. For more details please see the references link. | null | 2022-01-11T06:33:52.070961Z | 2022-01-10T19:50:10.460337Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61a7e26028b94805fd686a6dc9dbd9941f8f19b0'} |
Linux | GSD-2021-1001084 | powerpc/perf: Fix crash in perf_instruction_pointer() when ppmu is not set | powerpc/perf: Fix crash in perf_instruction_pointer() when ppmu is not set
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit 74c3c34a04bc226f77b9e515aa067072cff44e52, it was introduced in version v5.11 by commit 2ca13a4cc56c920a6c9fc8ee45d02bccacd7f46c. For more details please see the references link. | null | 2021-12-19T22:12:04.589402Z | 2021-06-30T00:38:33.569650Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2ca13a4cc56c920a6c9fc8ee45d02bccacd7f46c'} |
Linux | GSD-2022-1000506 | tcp: take care of mixed splice()/sendmsg(MSG_ZEROCOPY) case | tcp: take care of mixed splice()/sendmsg(MSG_ZEROCOPY) case
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 47f3860c4931175f112f28dcac66eacca9b1040f, it was introduced in version v5.16 by commit f1a456f8f3fc5828d8abcad941860380ae147b1d. For more details please see the references link. | null | 2022-03-07T01:33:00.863965Z | 2022-02-27T03:16:23.610740Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f1a456f8f3fc5828d8abcad941860380ae147b1d'} |
Linux | GSD-2021-1001591 | ipack: ipoctal: fix stack information leak | ipack: ipoctal: fix stack information leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.151 by commit 8657158a3b68c85234e6da3d8eae33d6183588b7, it was introduced in version v3.5 by commit ba4dc61fe8c545a5d6a68b63616776556b771f51. For more details please see the references link. | null | 2021-12-20T01:18:33.520153Z | 2021-10-19T16:25:18.067871Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ba4dc61fe8c545a5d6a68b63616776556b771f51'} |
Linux | GSD-2022-1000156 | net: fix information leakage in /proc/net/ptype | net: fix information leakage in /proc/net/ptype
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.176 by commit e372ecd455b6ebc7720f52bf4b5f5d44d02f2092, it was introduced in version v2.6.26 by commit 2feb27dbe00cbb4f7d31f90acf6bd0d751dd0a50. For more details please see the references link. | null | 2022-02-19T03:01:03.533912Z | 2022-02-18T21:48:15.222582Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2feb27dbe00cbb4f7d31f90acf6bd0d751dd0a50'} |
Linux | GSD-2022-1002491 | PM: core: keep irq flags in device_pm_check_callbacks() | PM: core: keep irq flags in device_pm_check_callbacks()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit 3ec80d52b9b74b9e691997632a543c73eddfeba0. For more details please see the references link. | null | 2022-04-25T04:52:19.072975Z | 2022-04-24T22:53:33.817666Z | null | null | null | null | null |
Linux | GSD-2022-1001317 | NFSD: prevent underflow in nfssvc_decode_writeargs() | NFSD: prevent underflow in nfssvc_decode_writeargs()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 413d8fefafe531a9442bb623e3fe292a38f88d65. For more details please see the references link. | null | 2022-04-25T05:04:13.012328Z | 2022-04-24T21:04:08.181697Z | null | null | null | null | null |
Linux | GSD-2021-1000380 | memory: renesas-rpc-if: fix possible NULL pointer dereference of resource | memory: renesas-rpc-if: fix possible NULL pointer dereference of resource
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 71bcc1b4a1743534d8abdcb57ff912e6bc390438, it was introduced in version v5.9 by commit ca7d8b980b67f133317525c4273e144116ee1ae5. For more details please see the references link. | null | 2021-12-19T23:31:25.105136Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca7d8b980b67f133317525c4273e144116ee1ae5'} |
Linux | GSD-2021-1002647 | mac80211: track only QoS data frames for admission control | mac80211: track only QoS data frames for admission control
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.222 by commit 69f054d6642c8f6173724ce17e7ee3ff66b8f682, it was introduced in version v3.19 by commit 02219b3abca59fca81711bfe7ee78df7abad97ce. For more details please see the references link. | null | 2022-01-11T05:48:02.526012Z | 2021-12-27T05:32:42.900337Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/02219b3abca59fca81711bfe7ee78df7abad97ce'} |
Linux | GSD-2021-1001968 | media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt() | media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.255 by commit 8d6c05da808f8351db844b69a9d6ce7f295214bb. For more details please see the references link. | null | 2021-12-20T01:07:04.003042Z | 2021-11-14T15:13:50.226246Z | null | null | null | null | null |
Linux | GSD-2022-1001747 | docs: sysctl/kernel: add missing bit to panic_print | docs: sysctl/kernel: add missing bit to panic_print
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 3fc38521fc3007af03c606d37997cbb75caa4361, it was introduced in version v5.2 by commit de6da1e8bcf0dd2058b950b127491821207679dc. For more details please see the references link. | null | 2022-04-25T06:47:00.529311Z | 2022-04-24T21:39:05.871267Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/de6da1e8bcf0dd2058b950b127491821207679dc'} |
Linux | GSD-2022-1000855 | configfs: fix a race in configfs_{,un}register_subsystem() | configfs: fix a race in configfs_{,un}register_subsystem()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.103 by commit a7ab53d3c27dfe83bb594456b9f38a37796ec39b, it was introduced in version v2.6.16 by commit 7063fbf2261194f72ee75afca67b3b38b554b5fa. For more details please see the references link. | null | 2022-03-18T04:18:31.959470Z | 2022-03-18T00:24:49.921183Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7063fbf2261194f72ee75afca67b3b38b554b5fa'} |
Linux | GSD-2021-1002217 | cfg80211: call cfg80211_stop_ap when switch from P2P_GO type | cfg80211: call cfg80211_stop_ap when switch from P2P_GO type
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.293 by commit 8f06bb8c216bcd172394f61e557727e691b4cb24, it was introduced in version v3.6 by commit ac800140c20e7ae51117e71289065bedd4930fc2. For more details please see the references link. | null | 2021-12-19T23:29:30.058311Z | 2021-11-29T02:33:53.483670Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac800140c20e7ae51117e71289065bedd4930fc2'} |
Linux | GSD-2021-1002260 | i40e: Fix NULL ptr dereference on VSI filter sync | i40e: Fix NULL ptr dereference on VSI filter sync
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.162 by commit c30162da91327e4cdf7cd03079f096bb3654738c, it was introduced in version v3.12 by commit 41c445ff0f482bb6e6b72dcee9e598e20575f743. For more details please see the references link. | null | 2021-12-20T00:00:59.403154Z | 2021-11-29T02:35:49.421195Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41c445ff0f482bb6e6b72dcee9e598e20575f743'} |
Linux | GSD-2022-1001730 | tcp: Don't acquire inet_listen_hashbucket::lock with disabled BH. | tcp: Don't acquire inet_listen_hashbucket::lock with disabled BH.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit aa9c9fd0ef9d83bdca5203fa72ebeadedd2a8400. For more details please see the references link. | null | 2022-04-25T06:35:55.387552Z | 2022-04-24T21:38:05.798507Z | null | null | null | null | null |
Linux | GSD-2022-1000822 | xen/netfront: react properly to failing gnttab_end_foreign_access_ref() | xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.105 by commit 206c8e271ba2630f1d809123945d9c428f93b0f0. For more details please see the references link. | null | 2022-03-18T03:01:06.104070Z | 2022-03-18T00:21:30.066955Z | null | null | null | null | null |
Linux | GSD-2021-1002630 | firmware: arm_scpi: Fix string overflow in SCPI genpd driver | firmware: arm_scpi: Fix string overflow in SCPI genpd driver
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.259 by commit 4694b1ec425a2d20d6f8ca3db594829fdf5f2672, it was introduced in version v4.8 by commit 8bec4337ad4023b26de35d3b0c3a3b2735ffc5c7. For more details please see the references link. | null | 2022-01-11T05:52:27.796166Z | 2021-12-27T05:28:01.478395Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8bec4337ad4023b26de35d3b0c3a3b2735ffc5c7'} |
Linux | GSD-2022-1000988 | veth: Ensure eth header is in skb's linear part | veth: Ensure eth header is in skb's linear part
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.4 by commit 46bc359fec0c6d87b70d7a008bcd9a5e30dd6f27, it was introduced in version v2.6.24 by commit e314dbdc1c0dc6a548ecf0afce28ecfd538ff568. For more details please see the references link. | null | 2022-04-25T08:03:28.374821Z | 2022-04-24T20:37:40.580673Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e314dbdc1c0dc6a548ecf0afce28ecfd538ff568'} |
Linux | GSD-2022-1001360 | IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition | IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 77ffb2495a41098f9d6a14f8aefde3188da75944, it was introduced in version v5.1 by commit d757c60eca9b22f4d108929a24401e0fdecda0b1. For more details please see the references link. | null | 2022-04-25T04:23:30.169901Z | 2022-04-24T21:07:48.190262Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d757c60eca9b22f4d108929a24401e0fdecda0b1'} |
Linux | GSD-2022-1000121 | udf: Fix NULL ptr deref when converting from inline format | udf: Fix NULL ptr deref when converting from inline format
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.228 by commit a23a59717f9f01a49394488f515550f9382fbada, it was introduced in version v4.2 by commit 52ebea749aaed195245701a8f90a23d672c7a933. For more details please see the references link. | null | 2022-02-19T02:47:32.312051Z | 2022-02-18T21:43:28.140454Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/52ebea749aaed195245701a8f90a23d672c7a933'} |
Linux | GSD-2022-1000571 | ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() | ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.22 by commit b0a7836ecf1345814a7d8ef748fb797c520dad18. For more details please see the references link. | null | 2022-03-07T03:22:47.942294Z | 2022-02-27T03:25:16.188678Z | null | null | null | null | null |
Linux | GSD-2022-1000064 | tomoyo: Check exceeded quota early in tomoyo_domain_quota_is_ok(). | tomoyo: Check exceeded quota early in tomoyo_domain_quota_is_ok().
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.13 by commit 3fe6a63b5dbdc0864f01d3171046af03d34ee747. For more details please see the references link. | null | 2022-01-11T05:56:45.876512Z | 2022-01-10T19:52:30.876811Z | null | null | null | null | null |
Linux | GSD-2022-1002059 | fs: fix fd table size alignment properly | fs: fix fd table size alignment properly
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit e600b5973e808848a23eeba3fdbb9b288e5558c1, it was introduced in version v5.10.110 by commit 00d2b9fe5e02b41c6e4d7a4c1171cc6dd3008617. For more details please see the references link. | null | 2022-04-24T22:06:20.175918Z | 2022-04-24T22:06:20.175918Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/00d2b9fe5e02b41c6e4d7a4c1171cc6dd3008617'} |
Linux | GSD-2021-1001509 | ipack: ipoctal: fix module reference leak | ipack: ipoctal: fix module reference leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.285 by commit c0adb5a947dec6cff7050ec56d78ecd3916f9ce6, it was introduced in version v3.18 by commit 82a82340bab6c251e0705339f60763718eaa2a22. For more details please see the references link. | null | 2021-12-20T00:05:51.660669Z | 2021-10-19T16:21:27.053562Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/82a82340bab6c251e0705339f60763718eaa2a22'} |
Linux | GSD-2022-1000434 | net: do not keep the dst cache when uncloning an skb dst and its metadata | net: do not keep the dst cache when uncloning an skb dst and its metadata
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit f1ab1ba32d36bae06fabe41c0ff2edc5b2ce628d, it was introduced in version v4.6 by commit d71785ffc7e7cae3fbdc4ea8a9d05b7a1c59f7b8. For more details please see the references link. | null | 2022-03-07T01:35:43.343422Z | 2022-02-27T03:06:53.644609Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d71785ffc7e7cae3fbdc4ea8a9d05b7a1c59f7b8'} |
Linux | GSD-2022-1002409 | iommu/arm-smmu-v3: fix event handling soft lockup | iommu/arm-smmu-v3: fix event handling soft lockup
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 5e580cce4d58b35e0ceb875578a53b49cc2e98b1. For more details please see the references link. | null | 2022-04-25T05:31:15.870975Z | 2022-04-24T22:44:17.927809Z | null | null | null | null | null |
Linux | GSD-2021-1001159 | xdp, net: Fix use-after-free in bpf_xdp_link_release | xdp, net: Fix use-after-free in bpf_xdp_link_release
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.6 by commit a7537dc73e69ad9c0b67ad24ad3ebee954ed0af6, it was introduced in version v5.9 by commit aa8d3a716b59db6c1ad6c68fb8aa05e31980da60. For more details please see the references link. | null | 2021-12-20T00:58:46.682900Z | 2021-08-03T01:31:23.793929Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/aa8d3a716b59db6c1ad6c68fb8aa05e31980da60'} |
Linux | GSD-2022-1001675 | RDMA/hfi1: Fix use-after-free bug for mm struct | RDMA/hfi1: Fix use-after-free bug for mm struct
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 9ca11bd8222a612de0d2f54d050bfcf61ae2883f, it was introduced in version v5.10 by commit 3d2a9d642512c21a12d19b9250e7a835dcb41a79. For more details please see the references link. | null | 2022-04-25T06:52:49.336380Z | 2022-04-24T21:34:04.896723Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3d2a9d642512c21a12d19b9250e7a835dcb41a79'} |
Linux | GSD-2022-1000967 | net: usb: aqc111: Fix out-of-bounds accesses in RX fixup | net: usb: aqc111: Fix out-of-bounds accesses in RX fixup
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.4 by commit 36311fe98f55dea9200c69e2dd6d6ddb8fc94080. For more details please see the references link. | null | 2022-04-25T06:45:12.318452Z | 2022-04-24T20:35:46.876217Z | null | null | null | null | null |
Linux | GSD-2021-1002325 | NFSD: Fix exposure in nfsd4_decode_bitmap() | NFSD: Fix exposure in nfsd4_decode_bitmap()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit 10c22d9519f3f5939de61a1500aa3a926b778d3a, it was introduced in version v5.11 by commit d1c263a031e876ac3ca5223c728e4d98ed50b3c0. For more details please see the references link. | null | 2021-12-20T01:26:31.639887Z | 2021-11-29T02:38:49.016586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d1c263a031e876ac3ca5223c728e4d98ed50b3c0'} |
Linux | GSD-2021-1000318 | usb: dwc3: gadget: Free gadget structure only after freeing endpoints | usb: dwc3: gadget: Free gadget structure only after freeing endpoints
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.38 by commit 1ea775021282d90e1d08d696b7ab54aa75d688e5, it was introduced in version v5.10 by commit e81a7018d93a7de31a3f121c9a7eecd0a5ec58b0. For more details please see the references link. | null | 2021-12-20T00:35:17.477134Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e81a7018d93a7de31a3f121c9a7eecd0a5ec58b0'} |
Linux | GSD-2022-1001225 | drm/msm/dp: populate connector of struct dp_panel | drm/msm/dp: populate connector of struct dp_panel
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 104074ebc0c3f358dd1ee944fbcde92c6e5a21dd, it was introduced in version v5.15 by commit 7948fe12d47a946fb8025a0534c900e3dd4b5839. For more details please see the references link. | null | 2022-04-25T05:11:41.585238Z | 2022-04-24T20:55:43.806664Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7948fe12d47a946fb8025a0534c900e3dd4b5839'} |
Linux | GSD-2021-1002775 | phonet/pep: refuse to enable an unbound pipe | phonet/pep: refuse to enable an unbound pipe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.297 by commit 0bbdd62ce9d44f3a22059b3d20a0df977d9f6d59. For more details please see the references link. | null | 2022-01-11T05:47:54.990195Z | 2021-12-30T02:42:55.607713Z | null | null | null | null | null |
Linux | GSD-2021-1000748 | net: caif: add proper error handling | net: caif: add proper error handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.125 by commit c97cdb70b72d0eb81ad43c8722a78522c4a9b5be, it was introduced in version v3.3 by commit 7c18d2205ea76eef9674e59e1ecae4f332a53e9e. For more details please see the references link. | null | 2021-12-19T23:34:29.975338Z | 2021-06-25T00:02:13.136104Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7c18d2205ea76eef9674e59e1ecae4f332a53e9e'} |
Linux | GSD-2021-1000898 | usb: dwc3: ep0: fix NULL pointer exception | usb: dwc3: ep0: fix NULL pointer exception
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.126 by commit 366369b89bedd59b1425386e8d4a18a466e420e4. For more details please see the references link. | null | 2021-12-20T01:09:02.317564Z | 2021-06-30T00:05:13.770044Z | null | null | null | null | null |
Linux | GSD-2021-1001270 | NFSv4: Initialise connection to the server in nfs4_alloc_client() | NFSv4: Initialise connection to the server in nfs4_alloc_client()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.52 by commit ff4023d0194263a0827c954f623c314978cf7ddd, it was introduced in version v4.8 by commit 5c6e5b60aae4347223f176966455010a5715b863. For more details please see the references link. | null | 2021-12-20T01:01:32.259540Z | 2021-08-03T01:53:55.718992Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5c6e5b60aae4347223f176966455010a5715b863'} |
Linux | GSD-2022-1002370 | mm,hwpoison: unmap poisoned page before invalidation | mm,hwpoison: unmap poisoned page before invalidation
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 79a8b36e124001547906f3612959fa548b58bb95, it was introduced in version v4.19.238 by commit e83d4184908c4ebd6adfd3e1252439af91d6b0e9. For more details please see the references link. | null | 2022-04-24T22:39:43.894627Z | 2022-04-24T22:39:43.894627Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e83d4184908c4ebd6adfd3e1252439af91d6b0e9'} |
Linux | GSD-2021-1000932 | net: ll_temac: Fix TX BD buffer overwrite | net: ll_temac: Fix TX BD buffer overwrite
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.128 by commit b6c0ab11c88fb016bfc85fa4f6f878f5f4263646, it was introduced in version v5.4.27 by commit 0c050d6554757f1be861b9f288406989c4053449. For more details please see the references link. | null | 2021-12-19T23:30:44.142250Z | 2021-06-30T00:25:21.355857Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0c050d6554757f1be861b9f288406989c4053449'} |
Linux | GSD-2021-1001620 | drm/amdgpu: fix gart.bo pin_count leak | drm/amdgpu: fix gart.bo pin_count leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.74 by commit 621ddffb70db824eabd63d18ac635180fe9500f9. For more details please see the references link. | null | 2021-12-20T01:25:33.790165Z | 2021-10-19T16:28:37.750498Z | null | null | null | null | null |
Linux | GSD-2021-1000461 | crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init | crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.191 by commit 09d16cee6285d37cc76311c29add6d97a7e4acda, it was introduced in version v4.7 by commit 25c6ffb249f612c56a48ce48a3887adf57b8f4bd. For more details please see the references link. | null | 2021-12-19T22:57:29.402085Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/25c6ffb249f612c56a48ce48a3887adf57b8f4bd'} |
Linux | GSD-2021-1000031 | dmaengine: idxd: fix wq cleanup of WQCFG registers | dmaengine: idxd: fix wq cleanup of WQCFG registers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.32 by commit e5eb9757fe4c2392e069246ae78badc573af1833, it was introduced in version v5.8 by commit da32b28c95a79e399e18c03f8178f41aec9c66e4. For more details please see the references link. | null | 2021-12-19T23:10:06.015530Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/da32b28c95a79e399e18c03f8178f41aec9c66e4'} |
Linux | GSD-2021-1000524 | Bluetooth: SMP: Fail if remote and local public keys are identical | Bluetooth: SMP: Fail if remote and local public keys are identical
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.192 by commit 30126d4ba73119565f1748b116b9869ac6bbda6b, it was introduced in version v3.17 by commit bfe01a5ba2490f299e1d2d5508cbbbadd897bbe9. For more details please see the references link. | null | 2021-12-19T23:23:01.720647Z | 2021-05-31T23:51:06.203776Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bfe01a5ba2490f299e1d2d5508cbbbadd897bbe9'} |
Linux | GSD-2021-1002519 | iio: mma8452: Fix trigger reference couting | iio: mma8452: Fix trigger reference couting
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.85 by commit db12d95085367de8b0223929d1332731024441f1, it was introduced in version v4.2 by commit ae6d9ce05691bf79694074db7c7da980080548af. For more details please see the references link. | null | 2021-12-20T01:22:04.619653Z | 2021-12-19T19:40:54.110932Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ae6d9ce05691bf79694074db7c7da980080548af'} |
Linux | GSD-2022-1001049 | PCI: endpoint: Fix misused goto label | PCI: endpoint: Fix misused goto label
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit d3642fc64276b06446290f82fd45630aeaa4b007. For more details please see the references link. | null | 2022-04-25T08:29:55.004820Z | 2022-04-24T20:42:25.192483Z | null | null | null | null | null |
Linux | GSD-2021-1000174 | tpm: efi: Use local variable for calculating final log size | tpm: efi: Use local variable for calculating final log size
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.118 by commit 2f12258b5224cfaa808c54fd29345f3c1cbfca76, it was introduced in version v5.3 by commit 166a2809d65b282272c474835ec22c882a39ca1b. For more details please see the references link. | null | 2021-12-19T21:44:27.035480Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/166a2809d65b282272c474835ec22c882a39ca1b'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.