ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2021-1002149 | dm rq: don't queue request to blk-mq during DM suspend | dm rq: don't queue request to blk-mq during DM suspend
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit b4459b11e84092658fa195a2587aff3b9637f0e7. For more details please see the references link. | null | 2021-12-20T01:21:21.637111Z | 2021-11-14T15:22:04.109950Z | null | null | null | null | null |
Linux | GSD-2022-1001419 | Revert "nbd: fix possible overflow on 'first_minor' in nbd_dev_add()" | Revert "nbd: fix possible overflow on 'first_minor' in nbd_dev_add()"
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 24781c1b691c60c42748c669973d567a90573337. For more details please see the references link. | null | 2022-04-25T06:49:06.189939Z | 2022-04-24T21:11:23.876676Z | null | null | null | null | null |
Linux | GSD-2021-1001335 | scsi: iscsi: Fix conn use after free during resets | scsi: iscsi: Fix conn use after free during resets
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.134 by commit d04958a348e560938410e04a12fb99da9c7e6a00. For more details please see the references link. | null | 2021-12-20T00:53:04.487487Z | 2021-08-03T02:11:52.177572Z | null | null | null | null | null |
Linux | GSD-2022-1000658 | drm/amd/display: Update watermark values for DCN301 | drm/amd/display: Update watermark values for DCN301
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.8 by commit bd6e1b930e12dd8f5d1d84f4d9729c2cce441ebb. For more details please see the references link. | null | 2022-03-07T01:35:48.756886Z | 2022-02-27T03:37:04.841254Z | null | null | null | null | null |
Linux | GSD-2021-1000877 | usb: dwc3: ep0: fix NULL pointer exception | usb: dwc3: ep0: fix NULL pointer exception
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.195 by commit bd551e7c85939de2182010273450bfa78c3742fc. For more details please see the references link. | null | 2021-12-19T23:06:45.305552Z | 2021-06-30T00:03:06.535636Z | null | null | null | null | null |
Linux | GSD-2021-1001765 | xen/x86: fix PV trap handling on secondary processors | xen/x86: fix PV trap handling on secondary processors
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.9 by commit 842f8bde1ed922dd8e3ba3e013352f4055ae4e85, it was introduced in version v2.6.23 by commit f87e4cac4f4e940b328d3deb5b53e642e3881f43. For more details please see the references link. | null | 2021-12-20T01:05:37.854871Z | 2021-10-19T16:35:39.029022Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f87e4cac4f4e940b328d3deb5b53e642e3881f43'} |
Linux | GSD-2022-1002235 | ax25: Fix NULL pointer dereferences in ax25 timers | ax25: Fix NULL pointer dereferences in ax25 timers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.190 by commit 40cb8b3b19c087a4e20f6740701e53fefbe19a7b, it was introduced in version v5.4.190 by commit d2be5b563ef391f684592a28440067f4fa3735f4. For more details please see the references link. | null | 2022-04-24T22:24:21.067593Z | 2022-04-24T22:24:21.067593Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d2be5b563ef391f684592a28440067f4fa3735f4'} |
Linux | GSD-2022-1000208 | net/mlx5: Use del_timer_sync in fw reset flow of halting poll | net/mlx5: Use del_timer_sync in fw reset flow of halting poll
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.97 by commit 502c37b033fab7cde3e95a570af4f073306be45e, it was introduced in version v5.10 by commit 38b9f903f22b9baa5c4b9bfb07c8bbc49f5efbba. For more details please see the references link. | null | 2022-02-20T06:31:28.501910Z | 2022-02-18T21:55:40.541129Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/38b9f903f22b9baa5c4b9bfb07c8bbc49f5efbba'} |
Linux | GSD-2022-1000526 | fs/proc: task_mmu.c: don't read mapcount for migration entry | fs/proc: task_mmu.c: don't read mapcount for migration entry
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 05d3f8045efa59457b323caf00bdb9273b7962fa, it was introduced in version v4.5 by commit e9b61f19858a5d6c42ce2298cf138279375d0d9b. For more details please see the references link. | null | 2022-03-07T01:35:00.523938Z | 2022-02-27T03:19:29.003093Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e9b61f19858a5d6c42ce2298cf138279375d0d9b'} |
Linux | GSD-2022-1000176 | scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe | scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.178 by commit 53e4f71763c61a557283eb43301efd671922d1e8, it was introduced in version v3.16 by commit d576a5e80cd07ea7049f8fd7b303c14df7b5d7d2. For more details please see the references link. | null | 2022-02-19T04:05:15.818142Z | 2022-02-18T21:51:17.304476Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d576a5e80cd07ea7049f8fd7b303c14df7b5d7d2'} |
Linux | GSD-2022-1001337 | drm/amd/display: Fix by adding FPU protection for dcn30_internal_validate_bw | drm/amd/display: Fix by adding FPU protection for dcn30_internal_validate_bw
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit e995c5d52ec7415644eee617fc7e906b51aec7ae. For more details please see the references link. | null | 2022-04-25T05:47:27.554146Z | 2022-04-24T21:05:35.414404Z | null | null | null | null | null |
Linux | GSD-2021-1002667 | audit: improve robustness of the audit queue handling | audit: improve robustness of the audit queue handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.168 by commit 0d3277eabd542fb662be23696e5ec9f390d688e1, it was introduced in version v4.11 by commit 5b52330bbfe63b3305765354d6046c9f7f89c011. For more details please see the references link. | null | 2022-01-11T05:52:50.157459Z | 2021-12-27T05:35:17.973824Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5b52330bbfe63b3305765354d6046c9f7f89c011'} |
Linux | GSD-2021-1001948 | comedi: dt9812: fix DMA buffers on stack | comedi: dt9812: fix DMA buffers on stack
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.290 by commit 365a346cda82f51d835c49136a00a9df8a78c7f2, it was introduced in version v2.6.29 by commit 63274cd7d38a3322d90b66a5bc976de1fb899051. For more details please see the references link. | null | 2021-12-20T01:07:56.696821Z | 2021-11-14T15:13:01.001520Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63274cd7d38a3322d90b66a5bc976de1fb899051'} |
Linux | GSD-2022-1001767 | scsi: qla2xxx: Fix premature hw access after PCI error | scsi: qla2xxx: Fix premature hw access after PCI error
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 5ef6319f9882699613d5182fbd7929b017e8c5ab. For more details please see the references link. | null | 2022-04-25T04:30:23.117038Z | 2022-04-24T21:41:09.588179Z | null | null | null | null | null |
Linux | GSD-2022-1000875 | netfilter: fix use-after-free in __nf_register_net_hook() | netfilter: fix use-after-free in __nf_register_net_hook()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.183 by commit 49c24579cec41e32f13d57b337fd28fb208d4a5b, it was introduced in version v4.14 by commit 2420b79f8c18a75ee2417cace381f4604b9b4365. For more details please see the references link. | null | 2022-03-18T02:59:29.520203Z | 2022-03-18T00:26:53.495408Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2420b79f8c18a75ee2417cace381f4604b9b4365'} |
Linux | GSD-2021-1002237 | i40e: Fix NULL ptr dereference on VSI filter sync | i40e: Fix NULL ptr dereference on VSI filter sync
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.256 by commit 78f2a9e831f9610e3655a0be5e675e1aa2472089, it was introduced in version v3.12 by commit 41c445ff0f482bb6e6b72dcee9e598e20575f743. For more details please see the references link. | null | 2021-12-19T22:34:42.490835Z | 2021-11-29T02:34:42.077638Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41c445ff0f482bb6e6b72dcee9e598e20575f743'} |
Linux | GSD-2021-1002722 | RDMA/irdma: Fix a user-after-free in add_pble_prm | RDMA/irdma: Fix a user-after-free in add_pble_prm
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.10 by commit 11eebcf63e98fcf047a876a51d76afdabc3b8b9b, it was introduced in version v5.14 by commit e8c4dbc2fcacf5a7468d312168bb120c27c38b32. For more details please see the references link. | null | 2022-01-11T05:58:03.921547Z | 2021-12-27T05:39:02.064849Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e8c4dbc2fcacf5a7468d312168bb120c27c38b32'} |
Linux | GSD-2022-1001788 | ntfs: add sanity check on allocation size | ntfs: add sanity check on allocation size
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 24ab2d4ef52c2dbb62a60844b87fc8872383407a. For more details please see the references link. | null | 2022-04-25T06:26:59.222655Z | 2022-04-24T21:42:23.730821Z | null | null | null | null | null |
Linux | GSD-2022-1001272 | watch_queue: Actually free the watch | watch_queue: Actually free the watch
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 31824613a42aacdcbeb325bf07a1c8247a11ebe2, it was introduced in version v5.8 by commit c73be61cede5882f9605a852414db559c0ebedfd. For more details please see the references link. | null | 2022-04-25T04:34:17.845979Z | 2022-04-24T21:00:11.747123Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c73be61cede5882f9605a852414db559c0ebedfd'} |
Linux | GSD-2021-1002372 | scsi: mpt3sas: Fix kernel panic during drive powercycle test | scsi: mpt3sas: Fix kernel panic during drive powercycle test
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.292 by commit 58ef2c7a6de13721865d84b80eecf56d6cba0937, it was introduced in version v3.8 by commit f92363d12359498f9a9960511de1a550f0ec41c2. For more details please see the references link. | null | 2021-12-19T22:38:48.202261Z | 2021-12-19T19:34:23.546358Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f92363d12359498f9a9960511de1a550f0ec41c2'} |
Linux | GSD-2022-1001622 | f2fs: quota: fix loop condition at f2fs_quota_sync() | f2fs: quota: fix loop condition at f2fs_quota_sync()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit e9ebf1e8fc50b6a9336f9aea1082d7845e568d0e, it was introduced in version v5.15 by commit 9de71ede81e6d1a111fdd868b2d78d459fa77f80. For more details please see the references link. | null | 2022-04-25T06:02:08.239830Z | 2022-04-24T21:29:37.661873Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9de71ede81e6d1a111fdd868b2d78d459fa77f80'} |
Linux | GSD-2022-1000930 | RDMA/ib_srp: Fix a deadlock | RDMA/ib_srp: Fix a deadlock
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.269 by commit 4752fafb461821f8c8581090c923ababba68c5bd, it was introduced in version v3.8 by commit ef6c49d87c3418c442a22e55e3ce2f91b163d69e. For more details please see the references link. | null | 2022-03-18T02:55:42.303718Z | 2022-03-18T00:33:24.552183Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef6c49d87c3418c442a22e55e3ce2f91b163d69e'} |
Linux | GSD-2021-1002688 | mac80211: validate extended element ID is present | mac80211: validate extended element ID is present
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.88 by commit 7fd214fc7f2ee3a89f91e717e3cfad55f5a27045, it was introduced in version v4.19 by commit 41cbb0f5a29592874355e4159489eb08337cd50e. For more details please see the references link. | null | 2022-01-11T05:53:28.808170Z | 2021-12-27T05:36:53.278019Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41cbb0f5a29592874355e4159489eb08337cd50e'} |
Linux | GSD-2022-1000199 | phylib: fix potential use-after-free | phylib: fix potential use-after-free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.96 by commit bd024e36f68174b1793906c39ca16cee0c9295c2, it was introduced in version v4.16 by commit bafbdd527d569c8200521f2f7579f65a044271be. For more details please see the references link. | null | 2022-02-19T09:46:52.533046Z | 2022-02-18T21:54:40.124236Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bafbdd527d569c8200521f2f7579f65a044271be'} |
Linux | GSD-2022-1000463 | gcc-plugins/stackleak: Use noinstr in favor of notrace | gcc-plugins/stackleak: Use noinstr in favor of notrace
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit effdcc25058484aaf64b1557efb124c87a733045. For more details please see the references link. | null | 2022-03-07T03:17:38.524610Z | 2022-02-27T03:10:53.303060Z | null | null | null | null | null |
Linux | GSD-2022-1000033 | usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. | usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.170 by commit 240fc586e83d645912accce081a48aa63a45f6ee, it was introduced in version v4.0 by commit 5e33f6fdf735cda1d4580fe6f1878da05718fe73. For more details please see the references link. | null | 2022-01-11T05:47:50.946994Z | 2022-01-10T19:51:00.369114Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5e33f6fdf735cda1d4580fe6f1878da05718fe73'} |
Linux | GSD-2021-1000066 | tpm: efi: Use local variable for calculating final log size | tpm: efi: Use local variable for calculating final log size
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.3 by commit ac07c557ca12ec9276c0375517bac7ae5be4e50c, it was introduced in version v5.3 by commit 166a2809d65b282272c474835ec22c882a39ca1b. For more details please see the references link. | null | 2021-12-20T00:25:28.246371Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/166a2809d65b282272c474835ec22c882a39ca1b'} |
Linux | GSD-2021-1000436 | mtd: require write permissions for locking and badblock ioctls | mtd: require write permissions for locking and badblock ioctls
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.119 by commit 5880afefe0cb9b2d5e801816acd58bfe91a96981, it was introduced in version v5.4.58 by commit 9a53e8bd59d9f070505e51d3fd19606a270e6b93. For more details please see the references link. | null | 2021-12-19T23:06:06.091826Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9a53e8bd59d9f070505e51d3fd19606a270e6b93'} |
Linux | GSD-2021-1000965 | NFS: Fix a potential NULL dereference in nfs_get_client() | NFS: Fix a potential NULL dereference in nfs_get_client()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.44 by commit 279ad78a00f8b9c5ff24171a59297187a3bd44b7, it was introduced in version v3.17 by commit 31434f496abb9f3410b10f541462fe58613dd3ad. For more details please see the references link. | null | 2021-12-19T23:13:47.956054Z | 2021-06-30T00:29:42.092852Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/31434f496abb9f3410b10f541462fe58613dd3ad'} |
Linux | GSD-2021-1001677 | drm/amd/pm: Update intermediate power state for SI | drm/amd/pm: Update intermediate power state for SI
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.70 by commit 68d4fbe6220cd1f3d07cab0a4901e62f8c12cc68. For more details please see the references link. | null | 2021-12-20T01:20:52.869139Z | 2021-10-19T16:31:22.512052Z | null | null | null | null | null |
Linux | GSD-2022-1002327 | can: mcba_usb: properly check endpoint type | can: mcba_usb: properly check endpoint type
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit b48d1bb3f1ca337ad653022aefb5a40a47dfe5cd, it was introduced in version v4.12 by commit 51f3baad7de943780ce0c17bd7975df567dd6e14. For more details please see the references link. | null | 2022-04-25T04:39:46.087746Z | 2022-04-24T22:34:49.159106Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/51f3baad7de943780ce0c17bd7975df567dd6e14'} |
Linux | GSD-2021-1001227 | virtio-net: Add validation for used length | virtio-net: Add validation for used length
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.3 by commit ba710baa1cc1b17a0483f7befe03e696efd17292. For more details please see the references link. | null | 2021-12-20T01:11:52.803999Z | 2021-08-03T01:42:04.731996Z | null | null | null | null | null |
Linux | GSD-2022-1001858 | power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init | power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit ffb8e92b4cef92bd25563cf3d8b4489eb22bc61f, it was introduced in version v4.9 by commit 8c0984e5a75337df513047ec92a6c09d78e3e5cd. For more details please see the references link. | null | 2022-04-25T04:57:19.278811Z | 2022-04-24T21:48:54.853511Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c0984e5a75337df513047ec92a6c09d78e3e5cd'} |
Linux | GSD-2022-1002262 | media: usb: go7007: s2250-board: fix leak in probe() | media: usb: go7007: s2250-board: fix leak in probe()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 14cd5a8e61c654828a1f1056d56f0b0a524d2c69, it was introduced in version v3.10 by commit d3b2ccd9e307eae80b4b4eeb0ede46cb02212df2. For more details please see the references link. | null | 2022-04-25T06:36:51.501477Z | 2022-04-24T22:27:52.963236Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d3b2ccd9e307eae80b4b4eeb0ede46cb02212df2'} |
Linux | GSD-2021-1000820 | btrfs: abort in rename_exchange if we fail to insert the second ref | btrfs: abort in rename_exchange if we fail to insert the second ref
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit ff8de2cec65a8c8521faade12a31b39c80e49f5b, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T23:06:26.425665Z | 2021-06-25T00:09:26.424218Z | null | null | null | null | null |
Linux | GSD-2021-1001732 | mac80211: fix use-after-free in CCMP/GCMP RX | mac80211: fix use-after-free in CCMP/GCMP RX
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit 27d3eb5616ee2c0a3b30c3fa34813368ed1f3dc9, it was introduced in version v5.13 by commit bf30ca922a0c0176007e074b0acc77ed345e9990. For more details please see the references link. | null | 2021-12-19T23:44:57.291654Z | 2021-10-19T16:33:57.238693Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf30ca922a0c0176007e074b0acc77ed345e9990'} |
Linux | GSD-2021-1001698 | riscv: Flush current cpu icache before other cpus | riscv: Flush current cpu icache before other cpus
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.12 by commit f1c7aa87c423e765e3862349c2f095fdfccdd9b3, it was introduced in version v4.15 by commit fab957c11efe2f405e08b9f0d080524bc2631428. For more details please see the references link. | null | 2021-12-20T00:44:16.638224Z | 2021-10-19T16:32:25.074412Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fab957c11efe2f405e08b9f0d080524bc2631428'} |
Linux | GSD-2021-1001362 | usb: max-3421: Prevent corruption of freed memory | usb: max-3421: Prevent corruption of freed memory
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.199 by commit 51fc12f4d37622fa0c481604833f98f11b1cac4f, it was introduced in version v3.16 by commit 2d53139f31626bad6f8983d8e519ddde2cbba921. For more details please see the references link. | null | 2021-12-20T00:15:33.452275Z | 2021-08-03T02:18:58.974097Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2d53139f31626bad6f8983d8e519ddde2cbba921'} |
Linux | GSD-2021-1000123 | s390/zcrypt: fix zcard and zqueue hot-unplug memleak | s390/zcrypt: fix zcard and zqueue hot-unplug memleak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.20 by commit 055a063a18bcd19b93709e3eac8078d6b2f04599, it was introduced in version v5.10 by commit 29c2680fd2bf3862ff5cf2957f198512493156f9. For more details please see the references link. | null | 2021-12-20T00:40:07.481330Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/29c2680fd2bf3862ff5cf2957f198512493156f9'} |
Linux | GSD-2021-1000089 | bpf: Fix masking negation logic upon negative dst register | bpf: Fix masking negation logic upon negative dst register
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.2 by commit 7cf64d8679ca1cb20cf57d6a88bfee79a0922a66, it was introduced in version v5.0 by commit 979d63d50c0c0f7bc537bf821e056cc9fe5abd38. For more details please see the references link. | null | 2021-12-19T22:28:48.328273Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/979d63d50c0c0f7bc537bf821e056cc9fe5abd38'} |
Linux | GSD-2021-1000573 | bpf: No need to simulate speculative domain for immediates | bpf: No need to simulate speculative domain for immediates
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.8 by commit f3ab9709b00ed389f870f6b20d323193bcf572c8, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T22:23:34.610959Z | 2021-06-04T19:41:00.781663Z | null | null | null | null | null |
Linux | GSD-2021-1002221 | usb: host: ohci-tmio: check return value after calling platform_get_resource() | usb: host: ohci-tmio: check return value after calling platform_get_resource()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.293 by commit 28e016e02118917e50a667bc72fb80098cf2b460. For more details please see the references link. | null | 2021-12-20T01:14:30.301243Z | 2021-11-29T02:34:03.816308Z | null | null | null | null | null |
Linux | GSD-2022-1000863 | CDC-NCM: avoid overflow in sanity checking | CDC-NCM: avoid overflow in sanity checking
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.103 by commit 69560efa001397ebb8dc1c3e6a3ce00302bb9f7f. For more details please see the references link. | null | 2022-03-18T02:50:50.025660Z | 2022-03-18T00:25:44.284367Z | null | null | null | null | null |
Linux | GSD-2022-1001771 | scsi: qla2xxx: Implement ref count for SRB | scsi: qla2xxx: Implement ref count for SRB
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit e17111dd2fda81c35f309b1e5b6ab35809a375e7. For more details please see the references link. | null | 2022-04-25T06:36:11.063766Z | 2022-04-24T21:41:29.136899Z | null | null | null | null | null |
Linux | GSD-2021-1002671 | inet_diag: fix kernel-infoleak for UDP sockets | inet_diag: fix kernel-infoleak for UDP sockets
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.168 by commit 7b5596e531253ce84213d9daa7120b71c9d83198, it was introduced in version v3.3 by commit 3c4d05c8056724aff3abc20650807dd828fded54. For more details please see the references link. | null | 2022-01-11T05:54:22.292517Z | 2021-12-27T05:35:58.197346Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c4d05c8056724aff3abc20650807dd828fded54'} |
Linux | GSD-2022-1001321 | coresight: syscfg: Fix memleak on registration failure in cscfg_create_device | coresight: syscfg: Fix memleak on registration failure in cscfg_create_device
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 412225b32986d5b11c3c1ad9234c50a3f5c52c76, it was introduced in version v5.15 by commit 85e2414c518a03a21dddd4bc88fec2723c5e1197. For more details please see the references link. | null | 2022-04-25T05:18:56.732924Z | 2022-04-24T21:04:21.713752Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/85e2414c518a03a21dddd4bc88fec2723c5e1197'} |
Linux | GSD-2022-1000160 | block: Fix wrong offset in bio_truncate() | block: Fix wrong offset in bio_truncate()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.176 by commit 6cbf4c731d7812518cd857c2cfc3da9fd120f6ae. For more details please see the references link. | null | 2022-02-19T03:10:19.654960Z | 2022-02-18T21:48:42.085407Z | null | null | null | null | null |
Linux | GSD-2022-1000530 | mm: memcg: synchronize objcg lists with a dedicated spinlock | mm: memcg: synchronize objcg lists with a dedicated spinlock
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit babfa07e9594373e10b9c01ada6278d0248665e1, it was introduced in version v5.9 by commit bf4f059954dcb221384b2f784677e19a13cd4bdb. For more details please see the references link. | null | 2022-03-07T01:38:26.565805Z | 2022-02-27T03:19:55.902349Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf4f059954dcb221384b2f784677e19a13cd4bdb'} |
Linux | GSD-2022-1002018 | KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs | KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit 66b0fa6b22187caf4d789bdac8dcca49940628b0, it was introduced in version v4.2 by commit ca724305a2b02abcbecbf22577536fc8e965ab4f. For more details please see the references link. | null | 2022-04-25T06:30:54.205359Z | 2022-04-24T22:03:14.143463Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca724305a2b02abcbecbf22577536fc8e965ab4f'} |
Linux | GSD-2022-1000025 | Input: appletouch - initialize work before device registration | Input: appletouch - initialize work before device registration
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.224 by commit a02e1404e27855089d2b0a0acc4652c2ce65fe46, it was introduced in version v2.6.23 by commit 5a6eb676d3bc4d7a6feab200a92437b62ad298da. For more details please see the references link. | null | 2022-01-11T05:53:29.596805Z | 2022-01-10T19:50:40.368435Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5a6eb676d3bc4d7a6feab200a92437b62ad298da'} |
Linux | GSD-2021-1001548 | i2c: acpi: fix resource leak in reconfiguration device addition | i2c: acpi: fix resource leak in reconfiguration device addition
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.211 by commit 3d9d458a8aaafa47268ea4f1b4114a9f12927989, it was introduced in version v4.8 by commit 525e6fabeae286848592363bda13bc34b59bb5ac. For more details please see the references link. | null | 2021-12-19T23:06:13.116720Z | 2021-10-19T16:23:15.189208Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/525e6fabeae286848592363bda13bc34b59bb5ac'} |
Linux | GSD-2022-1002448 | drbd: fix potential silent data corruption | drbd: fix potential silent data corruption
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 0452d32bfb419df65f8e200f5ddbf460fef48082. For more details please see the references link. | null | 2022-04-25T04:39:05.635751Z | 2022-04-24T22:48:55.190636Z | null | null | null | null | null |
Linux | GSD-2022-1000475 | copy_process(): Move fd_install() out of sighand->siglock critical section | copy_process(): Move fd_install() out of sighand->siglock critical section
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit 795feafb7234f63e975e181f2298811818d85354, it was introduced in version v5.2 by commit 6fd2fe494b17bf2dec37b610d23a43a72b16923a. For more details please see the references link. | null | 2022-03-07T01:37:55.423683Z | 2022-02-27T03:12:15.210336Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6fd2fe494b17bf2dec37b610d23a43a72b16923a'} |
Linux | GSD-2021-1001118 | net: caif: fix memory leak in ldisc_open | net: caif: fix memory leak in ldisc_open
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.129 by commit 343406f9c198c5f8e38720bd168c04ef666fe5d9. For more details please see the references link. | null | 2021-12-19T23:36:45.312455Z | 2021-07-08T01:57:31.400579Z | null | null | null | null | null |
Linux | GSD-2022-1000926 | mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work | mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.270 by commit 0f7f9b02f97edc2e1135b5172f4eda4aa3cc6535. For more details please see the references link. | null | 2022-03-18T03:45:07.765589Z | 2022-03-18T00:32:40.529248Z | null | null | null | null | null |
Linux | GSD-2022-1001634 | ALSA: pcm: Fix races among concurrent hw_params and hw_free calls | ALSA: pcm: Fix races among concurrent hw_params and hw_free calls
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.18 by commit 0090c13cbbdffd7da079ac56f80373a9a1be0bf8. For more details please see the references link. | null | 2022-04-25T06:51:02.458424Z | 2022-04-24T21:30:23.611057Z | null | null | null | null | null |
Linux | GSD-2021-1000359 | RDMA/rtrs-clt: destroy sysfs after removing session from active list | RDMA/rtrs-clt: destroy sysfs after removing session from active list
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit b64415c6b3476cf9fa4d0aea3807065b8403a937, it was introduced in version v5.8 by commit 6a98d71daea186247005099758af549e6afdd244. For more details please see the references link. | null | 2021-12-20T00:46:45.156775Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6a98d71daea186247005099758af549e6afdd244'} |
Linux | GSD-2021-1002364 | nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done | nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.295 by commit 87cdb8789c38e44ae5454aafe277997c950d00ed, it was introduced in version v3.12 by commit ac22ac466a659f1b2e02a2e2ee23fc5c42da2c95. For more details please see the references link. | null | 2021-12-20T00:01:00.796178Z | 2021-12-19T19:34:04.013319Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac22ac466a659f1b2e02a2e2ee23fc5c42da2c95'} |
Linux | GSD-2022-1001264 | ASoC: codecs: rx-macro: fix accessing array out of bounds for enum type | ASoC: codecs: rx-macro: fix accessing array out of bounds for enum type
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit aed43e92e4b9187029903880d5db608f7fa1c53c, it was introduced in version v5.12 by commit 4f692926f562ff48abfcca6b16f36ff8d57473b6. For more details please see the references link. | null | 2022-04-25T05:46:34.859640Z | 2022-04-24T20:59:17.381611Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4f692926f562ff48abfcca6b16f36ff8d57473b6'} |
Linux | GSD-2021-1000709 | serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' | serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.271 by commit 1e04d5d5fe5e76af68f834e1941fcbfa439653be, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T00:51:40.142231Z | 2021-06-04T20:07:18.062599Z | null | null | null | null | null |
Linux | GSD-2021-1002734 | audit: improve robustness of the audit queue handling | audit: improve robustness of the audit queue handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit a5f4d17daf2e6cd7c1d9676b476147f6b4ac53f2, it was introduced in version v4.11 by commit 5b52330bbfe63b3305765354d6046c9f7f89c011. For more details please see the references link. | null | 2022-01-11T05:50:13.548689Z | 2021-12-27T05:45:27.915312Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5b52330bbfe63b3305765354d6046c9f7f89c011'} |
Linux | GSD-2021-1001231 | drm/sched: Avoid data corruptions | drm/sched: Avoid data corruptions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.3 by commit 50d7e03ad487cc45fc85164a299b945a41756ac0. For more details please see the references link. | null | 2021-12-20T00:21:11.385005Z | 2021-08-03T01:43:35.057016Z | null | null | null | null | null |
Linux | GSD-2022-1002331 | scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() | scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit f68776f28d9134fa65056e7e63bfc734049730b7. For more details please see the references link. | null | 2022-04-25T05:47:19.502828Z | 2022-04-24T22:35:19.754959Z | null | null | null | null | null |
Linux | GSD-2021-1001661 | tty: Fix out-of-bound vmalloc access in imageblit | tty: Fix out-of-bound vmalloc access in imageblit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.71 by commit d570c48dd37dbe8fc6875d4461d01a9554ae2560. For more details please see the references link. | null | 2021-12-20T00:08:35.428917Z | 2021-10-19T16:30:31.987372Z | null | null | null | null | null |
Linux | GSD-2021-1000973 | kvm: LAPIC: Restore guard to prevent illegal APIC register access | kvm: LAPIC: Restore guard to prevent illegal APIC register access
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.46 by commit 018685461a5b9a9a70e664ac77aef0d7415a3fd5, it was introduced in version v5.3 by commit 01402cf81051f796dac7c60ca11d6147153ca46a. For more details please see the references link. | null | 2021-12-19T23:55:57.188238Z | 2021-06-30T00:30:12.239440Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/01402cf81051f796dac7c60ca11d6147153ca46a'} |
Linux | GSD-2021-1000420 | bnxt_en: Fix RX consumer index logic in the error path. | bnxt_en: Fix RX consumer index logic in the error path.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.119 by commit b1523e4ba293b2a32d9fabaf70c1dcaa6e3e2847, it was introduced in version v5.1 by commit a1b0e4e684e9c300b9e759b46cb7a0147e61ddff. For more details please see the references link. | null | 2021-12-20T01:25:25.794648Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a1b0e4e684e9c300b9e759b46cb7a0147e61ddff'} |
Linux | GSD-2021-1000070 | net/sched: sch_frag: fix stack OOB read while fragmenting IPv4 packets | net/sched: sch_frag: fix stack OOB read while fragmenting IPv4 packets
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.3 by commit 8e6dfb7beeb6489ac1365b8a71052e737f5da76e, it was introduced in version v5.11 by commit c129412f74e99b609f0a8e95fc3915af1fd40f34. For more details please see the references link. | null | 2021-12-20T00:43:13.331055Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c129412f74e99b609f0a8e95fc3915af1fd40f34'} |
Linux | GSD-2021-1002558 | perf hist: Fix memory leak of a perf_hpp_fmt | perf hist: Fix memory leak of a perf_hpp_fmt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.7 by commit 5b5c6f57a1f81499db4c8ea597898cb1b87de0b6. For more details please see the references link. | null | 2021-12-20T00:21:33.730305Z | 2021-12-19T19:42:36.001769Z | null | null | null | null | null |
Linux | GSD-2021-1000565 | netfilter: nft_set_pipapo_avx2: Add irq_fpu_usable() check, fallback to non-AVX2 version | netfilter: nft_set_pipapo_avx2: Add irq_fpu_usable() check, fallback to non-AVX2 version
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit 727a2b4fc951ee69847d4904d98961856ea9fbe6, it was introduced in version v5.7 by commit 7400b063969bdca4a06cd97f1294d765c8eecbe1. For more details please see the references link. | null | 2021-12-19T23:16:54.815675Z | 2021-06-04T19:40:04.763239Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7400b063969bdca4a06cd97f1294d765c8eecbe1'} |
Linux | GSD-2022-1001008 | highmem: fix checks in __kmap_local_sched_{in,out} | highmem: fix checks in __kmap_local_sched_{in,out}
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 7dd5b3b97716a611fcf67d92fd2370fcb8d50372, it was introduced in version v5.11 by commit 5fbda3ecd14a5343644979c98d6eb65b7e7de9d8. For more details please see the references link. | null | 2022-04-25T05:38:03.429364Z | 2022-04-24T20:39:13.887877Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5fbda3ecd14a5343644979c98d6eb65b7e7de9d8'} |
Linux | GSD-2021-1002108 | KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest() | KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit 6d077c37c4643394b1bae9682da48164fc147ea8, it was introduced in version v5.2 by commit 10d91611f426d4bafd2a83d966c36da811b2f7ad. For more details please see the references link. | null | 2021-12-19T23:27:55.292429Z | 2021-11-14T15:20:14.020905Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/10d91611f426d4bafd2a83d966c36da811b2f7ad'} |
Linux | GSD-2021-1000135 | media: staging/intel-ipu3: Fix set_fmt error handling | media: staging/intel-ipu3: Fix set_fmt error handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.36 by commit c6b81b897f6f9445d57f8d47c4e060ec21556137, it was introduced in version v5.2 by commit 6d5f26f2e045f2377b524516194657c00efbbce8. For more details please see the references link. | null | 2021-12-20T00:44:36.364622Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6d5f26f2e045f2377b524516194657c00efbbce8'} |
Linux | GSD-2022-1001458 | KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU | KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 0c8a8da182d4333d9bbb9131d765145568c847b2, it was introduced in version v5.13 by commit b7cccd397f310739fb85383033e95580f99927e0. For more details please see the references link. | null | 2022-04-25T03:49:08.175589Z | 2022-04-24T21:14:46.732204Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b7cccd397f310739fb85383033e95580f99927e0'} |
Linux | GSD-2021-1001374 | memory: fsl_ifc: fix leak of private memory on probe failure | memory: fsl_ifc: fix leak of private memory on probe failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.198 by commit ee1aa737ba0b75ab8af3444c4ae5bdba36aed6e6, it was introduced in version v3.3 by commit a20cbdeffce247a2b6fb83cd8d22433994068565. For more details please see the references link. | null | 2021-12-19T22:28:06.140061Z | 2021-08-03T02:22:30.769147Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a20cbdeffce247a2b6fb83cd8d22433994068565'} |
Linux | GSD-2022-1000619 | i40e: Fix queues reservation for XDP | i40e: Fix queues reservation for XDP
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.5 by commit 4b3aa858268b7b9aeef02e5f9c4cd8f8fac101c8, it was introduced in version v3.12 by commit 41c445ff0f482bb6e6b72dcee9e598e20575f743. For more details please see the references link. | null | 2022-03-07T01:36:53.978761Z | 2022-02-27T03:32:02.598811Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41c445ff0f482bb6e6b72dcee9e598e20575f743'} |
Linux | GSD-2021-1001724 | netfilter: nf_tables: unlink table before deleting it | netfilter: nf_tables: unlink table before deleting it
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit f65c73d3aabb87d4353e0bc4a718b5ae8c43fd04, it was introduced in version v5.12 by commit 6001a930ce0378b62210d4f83583fc88a903d89d. For more details please see the references link. | null | 2021-12-20T00:36:09.536091Z | 2021-10-19T16:33:36.966131Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6001a930ce0378b62210d4f83583fc88a903d89d'} |
Linux | GSD-2021-1000836 | isdn: mISDN: netjet: Fix crash in nj_probe: | isdn: mISDN: netjet: Fix crash in nj_probe:
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.273 by commit 4c1fcb6ec964b44edbf84235134582a5ffae1521. For more details please see the references link. | null | 2021-12-20T01:35:42.201164Z | 2021-06-30T00:00:24.440177Z | null | null | null | null | null |
Linux | GSD-2022-1000249 | usb: xhci-plat: fix crash when suspend if remote wake enable | usb: xhci-plat: fix crash when suspend if remote wake enable
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.19 by commit d5755832a1e47f5d8773f0776e211ecd4e02da72. For more details please see the references link. | null | 2022-02-19T08:06:53.721486Z | 2022-02-18T22:01:12.023714Z | null | null | null | null | null |
Linux | GSD-2022-1002274 | mm/pages_alloc.c: don't create ZONE_MOVABLE beyond the end of a node | mm/pages_alloc.c: don't create ZONE_MOVABLE beyond the end of a node
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 2efe956a74dc9c214237e3d470ca598a1e0fa8af, it was introduced in version v2.6.23 by commit 2a1e274acf0b1c192face19a4be7c12d4503eaaf. For more details please see the references link. | null | 2022-04-25T04:44:09.325702Z | 2022-04-24T22:29:01.620698Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2a1e274acf0b1c192face19a4be7c12d4503eaaf'} |
Linux | GSD-2022-1000567 | scsi: ufs: Fix a deadlock in the error handler | scsi: ufs: Fix a deadlock in the error handler
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit d69d98d8edf90e25e4e09930dd36dd6d09dd6768. For more details please see the references link. | null | 2022-03-07T01:40:44.105486Z | 2022-02-27T03:24:48.649396Z | null | null | null | null | null |
Linux | GSD-2022-1000137 | ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() | ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.228 by commit 7659f25a80e6affb784b690df8994b79b4212fd4. For more details please see the references link. | null | 2022-02-19T04:11:20.495317Z | 2022-02-18T21:45:16.326154Z | null | null | null | null | null |
Linux | GSD-2022-1001376 | habanalabs: fix possible memory leak in MMU DR fini | habanalabs: fix possible memory leak in MMU DR fini
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 6d421fb7a9eddd8ce0a05641a3db97283fe20699. For more details please see the references link. | null | 2022-04-25T03:36:40.615874Z | 2022-04-24T21:09:06.752341Z | null | null | null | null | null |
Linux | GSD-2021-1001909 | usb: musb: dsps: Fix the probe error path | usb: musb: dsps: Fix the probe error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit ff9249aab39820be11b6975a10d94253b7d426fc, it was introduced in version v5.14.6 by commit 72bb3eafcfdd156713a3ea0c9c95d536bd6e6e55. For more details please see the references link. | null | 2021-12-19T23:00:13.760942Z | 2021-10-28T13:55:14.620260Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/72bb3eafcfdd156713a3ea0c9c95d536bd6e6e55'} |
Linux | GSD-2021-1002626 | scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select() | scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.294 by commit adcecd50da6cab7b4957cba0606771dcc846c5a9. For more details please see the references link. | null | 2022-01-11T05:57:59.771208Z | 2021-12-27T05:27:50.031946Z | null | null | null | null | null |
Linux | GSD-2022-1000834 | xfrm: fix MTU regression | xfrm: fix MTU regression
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.104 by commit 4952faa77d8d1c4c146ac077e13d6245738979f4, it was introduced in version v4.15 by commit 749439bfac6e1a2932c582e2699f91d329658196. For more details please see the references link. | null | 2022-03-18T02:55:38.971987Z | 2022-03-18T00:22:47.858474Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/749439bfac6e1a2932c582e2699f91d329658196'} |
Linux | GSD-2022-1001726 | powerpc/set_memory: Avoid spinlock recursion in change_page_attr() | powerpc/set_memory: Avoid spinlock recursion in change_page_attr()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 6def4eaf0391f24be541633a954c0e4876858b1e. For more details please see the references link. | null | 2022-04-25T06:36:36.892351Z | 2022-04-24T21:37:54.090143Z | null | null | null | null | null |
Linux | GSD-2021-1002276 | cfg80211: call cfg80211_stop_ap when switch from P2P_GO type | cfg80211: call cfg80211_stop_ap when switch from P2P_GO type
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.82 by commit 7b97b5776daa0b39dbdadfea176f9cc0646d4a66, it was introduced in version v3.6 by commit ac800140c20e7ae51117e71289065bedd4930fc2. For more details please see the references link. | null | 2021-12-20T01:12:23.687581Z | 2021-11-29T02:36:39.648291Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac800140c20e7ae51117e71289065bedd4930fc2'} |
Linux | GSD-2021-1002763 | xen/netback: don't queue unlimited number of packages | xen/netback: don't queue unlimited number of packages
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit bd926d189210cd1d5b4e618e45898053be6b4b3b, it was introduced in version v3.18 by commit f48da8b14d04ca87ffcffe68829afd45f926ec6a. For more details please see the references link. | null | 2022-01-11T05:56:12.784490Z | 2021-12-27T05:49:27.663609Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f48da8b14d04ca87ffcffe68829afd45f926ec6a'} |
Linux | GSD-2021-1002299 | usb: typec: tipd: Remove WARN_ON in tps6598x_block_read | usb: typec: tipd: Remove WARN_ON in tps6598x_block_read
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.82 by commit eff8b7628410cb2eb562ca0d5d1f12e27063733e. For more details please see the references link. | null | 2021-12-20T01:29:05.208593Z | 2021-11-29T02:37:37.475859Z | null | null | null | null | null |
Linux | GSD-2022-1001233 | net: asix: add proper error handling of usb read errors | net: asix: add proper error handling of usb read errors
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 662ff765470ad0d11a1153d6d8e99d69a98e60b4, it was introduced in version v4.9 by commit d9fe64e511144c1ee7d7555b4111f09dde9692ef. For more details please see the references link. | null | 2022-04-25T05:16:45.808955Z | 2022-04-24T20:56:22.951157Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9fe64e511144c1ee7d7555b4111f09dde9692ef'} |
Linux | GSD-2022-1001399 | rtw89: fix RCU usage in rtw89_core_txq_push() | rtw89: fix RCU usage in rtw89_core_txq_push()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 6a2d29cb71d5d2e112a6f1cf479385135ede6384. For more details please see the references link. | null | 2022-04-25T05:34:29.667754Z | 2022-04-24T21:10:26.097871Z | null | null | null | null | null |
Linux | GSD-2021-1002333 | scsi: lpfc: Fix link down processing to address NULL pointer dereference | scsi: lpfc: Fix link down processing to address NULL pointer dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit 28de48a7cea495ab48082d9ff4ef63f7cb4e563a. For more details please see the references link. | null | 2021-12-19T22:59:48.853575Z | 2021-11-29T02:39:09.039567Z | null | null | null | null | null |
Linux | GSD-2022-1000971 | scsi: target: tcmu: Fix possible page UAF | scsi: target: tcmu: Fix possible page UAF
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.4 by commit a9564d84ed9f6ee71017d062d0d2182154294a4b. For more details please see the references link. | null | 2022-04-25T05:00:50.023883Z | 2022-04-24T20:36:02.545799Z | null | null | null | null | null |
Linux | GSD-2022-1001663 | gpiolib: acpi: use correct format characters | gpiolib: acpi: use correct format characters
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.35 by commit d40cf3492277d203c1f676cb9df88ab55d0c5d0f, it was introduced in version v4.14 by commit e40a3ae1f794a35c4af3746291ed6fedc1fa0f6f. For more details please see the references link. | null | 2022-04-25T06:41:00.181585Z | 2022-04-24T21:32:54.639237Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e40a3ae1f794a35c4af3746291ed6fedc1fa0f6f'} |
Linux | GSD-2022-1000422 | usb: f_fs: Fix use-after-free for epfile | usb: f_fs: Fix use-after-free for epfile
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit 72a8aee863af099d4434314c4536d6c9a61dcf3c, it was introduced in version v4.9 by commit a9e6f83c2df199187a5248f824f31b6787ae23ae. For more details please see the references link. | null | 2022-03-07T01:36:19.617362Z | 2022-02-27T03:04:44.821890Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a9e6f83c2df199187a5248f824f31b6787ae23ae'} |
Linux | GSD-2022-1000588 | net: macsec: Fix offload support for NETDEV_UNREGISTER event | net: macsec: Fix offload support for NETDEV_UNREGISTER event
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.22 by commit e7a0b3a0806dae3cc81931f0e83055ca2ac6f455, it was introduced in version v5.6 by commit 3cf3227a21d1fb020fe26128e60321bd2151e922. For more details please see the references link. | null | 2022-03-07T01:38:30.633611Z | 2022-02-27T03:27:54.061790Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3cf3227a21d1fb020fe26128e60321bd2151e922'} |
Linux | GSD-2021-1000027 | ixgbe: Fix NULL pointer dereference in ethtool loopback test | ixgbe: Fix NULL pointer dereference in ethtool loopback test
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.16 by commit 758d19098df4b0bbca9f40d6ae6c82c9c18b9bba, it was introduced in version v5.11 by commit b02e5a0ebb172c8276cea3151942aac681f7a4a6. For more details please see the references link. | null | 2021-12-19T22:47:42.924676Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b02e5a0ebb172c8276cea3151942aac681f7a4a6'} |
Linux | GSD-2021-1000477 | ACPI: scan: Fix a memory leak in an error handling path | ACPI: scan: Fix a memory leak in an error handling path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.269 by commit 6901a4f795e0e8d65ae779cb37fc22e0bf294712, it was introduced in version v4.9.264 by commit e5cdbe419004e172f642e876a671a9ff1c52f8bb. For more details please see the references link. | null | 2021-12-20T00:32:07.566016Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e5cdbe419004e172f642e876a671a9ff1c52f8bb'} |
Linux | GSD-2021-1001636 | netfilter: conntrack: serialize hash resizes and cleanups | netfilter: conntrack: serialize hash resizes and cleanups
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.71 by commit e2d192301a0df8160d1555b66ae8611e8050e424. For more details please see the references link. | null | 2021-12-20T00:35:52.087561Z | 2021-10-19T16:29:19.530573Z | null | null | null | null | null |
Linux | GSD-2021-1000924 | net: hamradio: fix memory leak in mkiss_close | net: hamradio: fix memory leak in mkiss_close
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.128 by commit a49cbb762ef20655f5c91abdc13658b0af5e159d, it was introduced in version v2.6.14 by commit 815f62bf742718458ba822a7e1f51f285eb997f2. For more details please see the references link. | null | 2021-12-19T22:17:22.290755Z | 2021-06-30T00:24:51.082443Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/815f62bf742718458ba822a7e1f51f285eb997f2'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.