ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2022-1002366 | video: fbdev: sm712fb: Fix crash in smtcfb_read() | video: fbdev: sm712fb: Fix crash in smtcfb_read()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 1caa40af491dcfe17b3ae870a854388d8ea01984. For more details please see the references link. | null | 2022-04-25T05:35:55.714807Z | 2022-04-24T22:39:28.304349Z | null | null | null | null | null |
Linux | GSD-2021-1001266 | NFSv4: Fix an Oops in pnfs_mark_request_commit() when doing O_DIRECT | NFSv4: Fix an Oops in pnfs_mark_request_commit() when doing O_DIRECT
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.52 by commit 5c7ef8a3705542136a1e19b070e951f0730b2153, it was introduced in version v5.7 by commit 9c455a8c1e146dac3a6d1405fe6a7096177b9546. For more details please see the references link. | null | 2021-12-19T23:30:14.872335Z | 2021-08-03T01:53:25.523838Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9c455a8c1e146dac3a6d1405fe6a7096177b9546'} |
Linux | GSD-2022-1001819 | tipc: fix the timer expires after interval 100ms | tipc: fix the timer expires after interval 100ms
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 21a2b4ab48a4878205825f2c8344a49edad8476d, it was introduced in version v4.20 by commit 6787927475e52f6933e3affce365dabb2aa2fadf. For more details please see the references link. | null | 2022-04-25T03:19:28.166370Z | 2022-04-24T21:44:51.581235Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6787927475e52f6933e3affce365dabb2aa2fadf'} |
Linux | GSD-2022-1002223 | block, bfq: don't move oom_bfqq | block, bfq: don't move oom_bfqq
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit c4f5a678add58a8a0e7ee5e038496b376ea6d205. For more details please see the references link. | null | 2022-04-25T06:10:46.954134Z | 2022-04-24T22:22:59.248238Z | null | null | null | null | null |
Linux | GSD-2021-1001289 | KVM: mmio: Fix use-after-free Read in kvm_vm_ioctl_unregister_coalesced_mmio | KVM: mmio: Fix use-after-free Read in kvm_vm_ioctl_unregister_coalesced_mmio
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.52 by commit 679837dc0abaa2c6e2a7bcd86483e05eee1d5066, it was introduced in version v5.10.37 by commit 2a20592baff59c5351c5200ec667e1a2aa22af85. For more details please see the references link. | null | 2021-12-19T22:39:39.477878Z | 2021-08-03T01:57:50.266867Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2a20592baff59c5351c5200ec667e1a2aa22af85'} |
Linux | GSD-2021-1001773 | net: encx24j600: check error in devm_regmap_init_encx24j600 | net: encx24j600: check error in devm_regmap_init_encx24j600
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.290 by commit 66358471fa75a713fd76bc8a4bd74cb14cd50a4f, it was introduced in version v4.4 by commit 04fbfce7a222327b97ca165294ef19f0faa45960. For more details please see the references link. | null | 2021-12-20T01:12:35.732008Z | 2021-10-28T13:48:12.241495Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/04fbfce7a222327b97ca165294ef19f0faa45960'} |
Linux | GSD-2021-1000861 | usb: fix various gadgets null ptr deref on 10gbps cabling. | usb: fix various gadgets null ptr deref on 10gbps cabling.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.237 by commit 8cd5f45c1b769e3e9e0f4325dd08b6c3749dc7ee, it was introduced in version v4.6 by commit eaef50c760576bca70b87fdc26eb87a3660529f8. For more details please see the references link. | null | 2021-12-19T22:00:49.995718Z | 2021-06-30T00:02:05.229215Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/eaef50c760576bca70b87fdc26eb87a3660529f8'} |
Linux | GSD-2021-1001323 | seq_file: disallow extremely large seq buffer allocations | seq_file: disallow extremely large seq buffer allocations
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.134 by commit c1dafbb26164f43f2bb70bee9e5c4e1cad228ca7, it was introduced in version v3.16 by commit 058504edd02667eef8fac9be27ab3ea74332e9b4. For more details please see the references link. | null | 2021-12-19T23:36:28.057169Z | 2021-08-03T02:08:34.997614Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/058504edd02667eef8fac9be27ab3ea74332e9b4'} |
Linux | GSD-2022-1002389 | nfc: nci: add flush_workqueue to prevent uaf | nfc: nci: add flush_workqueue to prevent uaf
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 9d243aff5f7e6b04e907c617426bbdf26e996ac8, it was introduced in version v3.2 by commit 6a2968aaf50c7a22fced77a5e24aa636281efca8. For more details please see the references link. | null | 2022-04-25T06:09:47.129711Z | 2022-04-24T22:41:59.316699Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6a2968aaf50c7a22fced77a5e24aa636281efca8'} |
Linux | GSD-2021-1000498 | nvmet: fix memory leak in nvmet_alloc_ctrl() | nvmet: fix memory leak in nvmet_alloc_ctrl()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.7 by commit afb680ed7ecbb7fd66ddb43650e9b533fd8b4b9a, it was introduced in version v5.7 by commit 94a39d61f80fcd679debda11e1ca02b88d90e67e. For more details please see the references link. | null | 2021-12-19T23:52:28.668108Z | 2021-05-31T23:46:27.218325Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/94a39d61f80fcd679debda11e1ca02b88d90e67e'} |
Linux | GSD-2021-1000162 | perf/core: Fix unconditional security_locked_down() call | perf/core: Fix unconditional security_locked_down() call
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.35 by commit 4348d3b5027bc3ff6336368b6c60605d4ef8e1ce, it was introduced in version v5.4 by commit b0c8fdc7fdb77586c3d1937050925b960743306e. For more details please see the references link. | null | 2021-12-20T01:10:08.846523Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b0c8fdc7fdb77586c3d1937050925b960743306e'} |
Linux | GSD-2021-1000532 | net: hns3: put off calling register_netdev() until client initialize complete | net: hns3: put off calling register_netdev() until client initialize complete
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit 0921a0620b5077796fddffb22a8e6bc635a4bb50, it was introduced in version v5.6 by commit 08a100689d4baf296d6898c687ea8d005da8d234. For more details please see the references link. | null | 2021-12-20T01:29:14.745091Z | 2021-06-04T19:34:32.131798Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/08a100689d4baf296d6898c687ea8d005da8d234'} |
Linux | GSD-2021-1001837 | isdn: mISDN: Fix sleeping function called from invalid context | isdn: mISDN: Fix sleeping function called from invalid context
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit 9f591cbdbed3d7822b2bdba89b34a6d7b434317d. For more details please see the references link. | null | 2021-12-20T00:25:53.224998Z | 2021-10-28T13:51:31.514215Z | null | null | null | null | null |
Linux | GSD-2021-1000725 | ocfs2: fix data corruption by fallocate | ocfs2: fix data corruption by fallocate
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.272 by commit 33e03adafb29eedae1bae9cdb50c1385279fcf65, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T01:02:21.744915Z | 2021-06-24T23:59:25.742192Z | null | null | null | null | null |
Linux | GSD-2021-1002718 | xen/console: harden hvc_xen against event channel storms | xen/console: harden hvc_xen against event channel storms
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.88 by commit 8fa3a370cc2af858a9ba662ca4f2bd0917550563. For more details please see the references link. | null | 2022-01-11T05:54:12.604369Z | 2021-12-27T05:38:49.731402Z | null | null | null | null | null |
Linux | GSD-2022-1001248 | libbpf: Fix possible NULL pointer dereference when destroying skeleton | libbpf: Fix possible NULL pointer dereference when destroying skeleton
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 31e124e77dc2dad3dfd9eb16088345460cfdfe15, it was introduced in version v5.6 by commit d66562fba1ce66975bd61b0786fb8b1810f33caa. For more details please see the references link. | null | 2022-04-25T04:12:00.379660Z | 2022-04-24T20:57:39.904457Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d66562fba1ce66975bd61b0786fb8b1810f33caa'} |
Linux | GSD-2021-1000375 | Drivers: hv: vmbus: Increase wait time for VMbus unload | Drivers: hv: vmbus: Increase wait time for VMbus unload
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 8b4d4bd1f1ce21f74e1af561b74538e5c98ea603, it was introduced in version v5.9 by commit 911e1987efc8f3e6445955fbae7f54b428b92bd3. For more details please see the references link. | null | 2021-12-20T00:25:52.874085Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/911e1987efc8f3e6445955fbae7f54b428b92bd3'} |
Linux | GSD-2021-1002348 | scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq() | scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit 814d3610c4ce86e8cf285b2cdac0057a42e82de5. For more details please see the references link. | null | 2021-12-19T22:28:02.365522Z | 2021-11-29T02:39:52.932714Z | null | null | null | null | null |
Linux | GSD-2022-1001618 | jffs2: fix memory leak in jffs2_scan_medium | jffs2: fix memory leak in jffs2_scan_medium
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit b26bbc0c122cad038831f226a4cb4de702225e16, it was introduced in version v2.6.15 by commit e631ddba588783edd521c5a89f7b2902772fb691. For more details please see the references link. | null | 2022-04-25T06:59:46.095093Z | 2022-04-24T21:29:06.591986Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e631ddba588783edd521c5a89f7b2902772fb691'} |
Linux | GSD-2021-1001134 | nilfs2: fix memory leak in nilfs_sysfs_delete_device_group | nilfs2: fix memory leak in nilfs_sysfs_delete_device_group
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.14 by commit 2eb327bf4de3d1713496f231ea7ede5e4df06458, it was introduced in version v3.17 by commit da7141fb78db915680616e15677539fc8140cf53. For more details please see the references link. | null | 2021-12-19T22:29:55.293810Z | 2021-07-08T01:58:44.350749Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/da7141fb78db915680616e15677539fc8140cf53'} |
Linux | GSD-2022-1002464 | cifs: potential buffer overflow in handling symlinks | cifs: potential buffer overflow in handling symlinks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit 3e582749e742e662a8e9bb37cffac62dccaaa1e2, it was introduced in version v2.6.37 by commit c69c1b6eaea1b3e1eecf7ad2fba0208ac4a11131. For more details please see the references link. | null | 2022-04-25T03:31:11.695212Z | 2022-04-24T22:51:02.686537Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c69c1b6eaea1b3e1eecf7ad2fba0208ac4a11131'} |
Linux | GSD-2022-1000459 | vsock: remove vsock from connected table when connect is interrupted by a signal | vsock: remove vsock from connected table when connect is interrupted by a signal
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit 787468ee7a435777521d33399d012fd591ae2f94, it was introduced in version v3.9 by commit d021c344051af91f42c5ba9fdedc176740cbd238. For more details please see the references link. | null | 2022-03-07T01:36:59.271237Z | 2022-02-27T03:10:26.006973Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d021c344051af91f42c5ba9fdedc176740cbd238'} |
Linux | GSD-2021-1001564 | cpufreq: schedutil: Use kobject release() method to free sugov_tunables | cpufreq: schedutil: Use kobject release() method to free sugov_tunables
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.209 by commit 30d57cf2c4116ca6d34ecd1cac94ad84f8bc446c, it was introduced in version v4.7 by commit 9bdcb44e391da5c41b98573bf0305a0e0b1c9569. For more details please see the references link. | null | 2021-12-20T00:02:34.612776Z | 2021-10-19T16:23:58.196813Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9bdcb44e391da5c41b98573bf0305a0e0b1c9569'} |
Linux | GSD-2022-1002034 | KVM: SVM: fix panic on out-of-bounds guest IRQ | KVM: SVM: fix panic on out-of-bounds guest IRQ
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 0fb470eb48892e131d10aa3be6915239e65758f3. For more details please see the references link. | null | 2022-04-25T04:25:57.137767Z | 2022-04-24T22:05:02.263244Z | null | null | null | null | null |
Linux | GSD-2022-1000009 | net: fix use-after-free in tw_timer_handler | net: fix use-after-free in tw_timer_handler
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.298 by commit 15579e1301f856ad9385d720c9267c11032a5022, it was introduced in version v2.6.27 by commit 61a7e26028b94805fd686a6dc9dbd9941f8f19b0. For more details please see the references link. | null | 2022-01-11T05:48:06.154934Z | 2022-01-10T19:49:58.814266Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61a7e26028b94805fd686a6dc9dbd9941f8f19b0'} |
Linux | GSD-2021-1001071 | net: cdc_eem: fix tx fixup skb leak | net: cdc_eem: fix tx fixup skb leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit b4f7a9fc9d094c0c4a66f2ad7c37b1dbe9e78f88, it was introduced in version v2.6.30 by commit 9f722c0978b04acba209f8ca1896ad05814bc3a3. For more details please see the references link. | null | 2021-12-19T22:14:54.639110Z | 2021-06-30T00:37:43.421009Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9f722c0978b04acba209f8ca1896ad05814bc3a3'} |
Linux | GSD-2022-1002171 | btrfs: fix qgroup reserve overflow the qgroup limit | btrfs: fix qgroup reserve overflow the qgroup limit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 44277c50fdba5019ca25bfad1b71e2561b0de11b. For more details please see the references link. | null | 2022-04-25T03:27:24.371048Z | 2022-04-24T22:18:18.285343Z | null | null | null | null | null |
Linux | GSD-2021-1001421 | misc/libmasm/module: Fix two use after free in ibmasm_init_one | misc/libmasm/module: Fix two use after free in ibmasm_init_one
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.240 by commit 5b06ca113bf197aab2ab61288f42506e0049fbab. For more details please see the references link. | null | 2021-12-19T23:33:19.219861Z | 2021-08-03T02:35:59.077092Z | null | null | null | null | null |
Linux | GSD-2021-1001972 | comedi: vmk80xx: fix transfer-buffer overflows | comedi: vmk80xx: fix transfer-buffer overflows
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.255 by commit 40d2a7e278e2e7c0a5fd7e997e7eb63945bf93f7, it was introduced in version v2.6.31 by commit 985cafccbf9b7f862aa1c5ee566801e18b5161fb. For more details please see the references link. | null | 2021-12-19T22:27:02.151561Z | 2021-11-14T15:13:59.840249Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/985cafccbf9b7f862aa1c5ee566801e18b5161fb'} |
Linux | GSD-2021-1000660 | serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' | serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.193 by commit 35265552c7fe9553c75e324c80f45e28ff14eb6e, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T22:58:58.455684Z | 2021-06-04T19:56:48.572047Z | null | null | null | null | null |
Linux | GSD-2021-1000230 | bnxt_en: Fix RX consumer index logic in the error path. | bnxt_en: Fix RX consumer index logic in the error path.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 3fbc5bc651d688fbea2a59cdc91520a2f5334d0a, it was introduced in version v5.1 by commit a1b0e4e684e9c300b9e759b46cb7a0147e61ddff. For more details please see the references link. | null | 2021-12-19T23:19:48.128280Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a1b0e4e684e9c300b9e759b46cb7a0147e61ddff'} |
Linux | GSD-2022-1000265 | drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc | drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.19 by commit 8f069f6dde518dfebe86e848508c07e497bd9298, it was introduced in version v5.8 by commit 4259ff7ae509ed880b3a7bb685972c3a3bf4b74b. For more details please see the references link. | null | 2022-02-20T06:17:54.349125Z | 2022-02-18T22:03:54.378659Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4259ff7ae509ed880b3a7bb685972c3a3bf4b74b'} |
Linux | GSD-2022-1002258 | ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe | ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 0325193cf40dc3a6e27d55a5b98680936deebcd0, it was introduced in version v3.8 by commit 531f67e41dcde1e358cf821d056241a66355cf03. For more details please see the references link. | null | 2022-04-25T06:33:54.679039Z | 2022-04-24T22:27:17.907115Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/531f67e41dcde1e358cf821d056241a66355cf03'} |
Linux | GSD-2021-1001708 | KVM: x86: Handle SRCU initialization failure during page track init | KVM: x86: Handle SRCU initialization failure during page track init
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit 4664318f73e496cd22c71b10888e75434a123e23. For more details please see the references link. | null | 2021-12-19T23:45:45.654767Z | 2021-10-19T16:32:53.957524Z | null | null | null | null | null |
Linux | GSD-2021-1002827 | hwmon: (lm90) Prevent integer overflow/underflow in hysteresis calculations | hwmon: (lm90) Prevent integer overflow/underflow in hysteresis calculations
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.12 by commit d105f30bea9104c590a9e5b495cb8a49bdfe405f, it was introduced in version v5.14 by commit b50aa49638c7e12abf4ecc483f4e928c5cccc1b0. For more details please see the references link. | null | 2022-01-11T05:47:12.080788Z | 2021-12-30T02:45:09.754142Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b50aa49638c7e12abf4ecc483f4e928c5cccc1b0'} |
Linux | GSD-2022-1000635 | block: Fix wrong offset in bio_truncate() | block: Fix wrong offset in bio_truncate()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.5 by commit 941d5180c430ce5b0f7a3622ef9b76077bfa3d82. For more details please see the references link. | null | 2022-03-07T02:34:43.819278Z | 2022-02-27T03:33:50.106903Z | null | null | null | null | null |
Linux | GSD-2022-1001927 | NFSD: prevent underflow in nfssvc_decode_writeargs() | NFSD: prevent underflow in nfssvc_decode_writeargs()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 614a61e1592051cc42d3c38f899c9f7bdaad8a1d. For more details please see the references link. | null | 2022-04-25T03:54:58.040281Z | 2022-04-24T21:55:44.663722Z | null | null | null | null | null |
Linux | GSD-2021-1001358 | atm: iphase: fix possible use-after-free in ia_module_exit() | atm: iphase: fix possible use-after-free in ia_module_exit()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.133 by commit c9172498d4d62c9b64e5fb37c1ee0343e65fe51b. For more details please see the references link. | null | 2021-12-19T23:38:56.817680Z | 2021-08-03T02:17:28.070977Z | null | null | null | null | null |
Linux | GSD-2022-1001474 | ext4: fix ext4_mb_mark_bb() with flex_bg with fast_commit | ext4: fix ext4_mb_mark_bb() with flex_bg with fast_commit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit b07eedd0222e9548ffc568ec429bb1f61d21a39c. For more details please see the references link. | null | 2022-04-25T06:30:22.066919Z | 2022-04-24T21:15:35.915263Z | null | null | null | null | null |
Linux | GSD-2021-1002124 | mm: filemap: check if THP has hwpoisoned subpage for PMD page fault | mm: filemap: check if THP has hwpoisoned subpage for PMD page fault
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.16 by commit 6ac017254b597709f39a083e1b1dfe09ef684f04, it was introduced in version v4.8 by commit 800d8c63b2e989c2e349632d1648119bf5862f01. For more details please see the references link. | null | 2021-12-20T00:25:19.950531Z | 2021-11-14T15:21:02.494439Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/800d8c63b2e989c2e349632d1648119bf5862f01'} |
Linux | GSD-2021-1000119 | mtd: physmap: physmap-bt1-rom: Fix unintentional stack access | mtd: physmap: physmap-bt1-rom: Fix unintentional stack access
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.20 by commit 4e4ebb827bf09311469ffd9d0c14ed40ed9747aa, it was introduced in version v5.10 by commit b3e79e7682e075326df8041b826b03453acacd0a. For more details please see the references link. | null | 2021-12-20T00:32:17.466978Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b3e79e7682e075326df8041b826b03453acacd0a'} |
Linux | GSD-2022-1001024 | jfs: prevent NULL deref in diFree | jfs: prevent NULL deref in diFree
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 2e0e1de4f7a17e0886524c1d6701b8e2bf5a7363. For more details please see the references link. | null | 2022-04-25T05:54:13.942787Z | 2022-04-24T20:40:53.509345Z | null | null | null | null | null |
Linux | GSD-2021-1002574 | drm/msm: Fix wait_fence submitqueue leak | drm/msm: Fix wait_fence submitqueue leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.7 by commit 4c3cdbf2540319ea674f1f3c54f31f14c6f39647, it was introduced in version v5.15 by commit a61acbbe9cf873f869fc634ae6f72f214f5994cc. For more details please see the references link. | null | 2021-12-19T23:20:33.827130Z | 2021-12-19T19:43:23.885043Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a61acbbe9cf873f869fc634ae6f72f214f5994cc'} |
Linux | GSD-2021-1000549 | net: dsa: sja1105: add error handling in sja1105_setup() | net: dsa: sja1105: add error handling in sja1105_setup()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit 987e4ab8b8a4fcbf783069e03e7524cd39ffd563, it was introduced in version v5.10 by commit 0a7bdbc23d8a1d5e6f6f74abf00ba572f7369dd6. For more details please see the references link. | null | 2021-12-20T01:32:13.228775Z | 2021-06-04T19:36:54.227372Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0a7bdbc23d8a1d5e6f6f74abf00ba572f7369dd6'} |
Linux | GSD-2021-1002061 | mm: khugepaged: skip huge page collapse for special files | mm: khugepaged: skip huge page collapse for special files
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.78 by commit 6d67b2a73b8e3a079c355bab3c1aef7d85a044b8, it was introduced in version v5.4 by commit 99cb0dbd47a15d395bf3faa78dc122bc5efe3fc0. For more details please see the references link. | null | 2021-12-19T23:45:18.324306Z | 2021-11-14T15:18:01.856601Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/99cb0dbd47a15d395bf3faa78dc122bc5efe3fc0'} |
Linux | GSD-2022-1001531 | PCI: Reduce warnings on possible RW1C corruption | PCI: Reduce warnings on possible RW1C corruption
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 2167b75ad88fe3e97a8d326e7252ac6a05530a23, it was introduced in version v4.10 by commit fb26592301200dbbe4a9943fe188b57a46716900. For more details please see the references link. | null | 2022-04-25T03:37:52.415425Z | 2022-04-24T21:20:39.113566Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb26592301200dbbe4a9943fe188b57a46716900'} |
Linux | GSD-2021-1002431 | iio: mma8452: Fix trigger reference couting | iio: mma8452: Fix trigger reference couting
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.221 by commit f5deab10ced368c807866283f8b79144c4823be8, it was introduced in version v4.2 by commit ae6d9ce05691bf79694074db7c7da980080548af. For more details please see the references link. | null | 2021-12-19T22:00:23.386594Z | 2021-12-19T19:37:00.894427Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ae6d9ce05691bf79694074db7c7da980080548af'} |
Linux | GSD-2022-1001161 | block, bfq: don't move oom_bfqq | block, bfq: don't move oom_bfqq
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit c01fced8d38fbccc82787065229578006f28e020. For more details please see the references link. | null | 2022-04-25T04:12:19.092420Z | 2022-04-24T20:49:35.483655Z | null | null | null | null | null |
Linux | GSD-2022-1000320 | net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup | net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.231 by commit 1668781ed24da43498799aa4f65714a7de201930, it was introduced in version v3.9 by commit e2ca90c276e1fc410d7cd3c1a4eee245ec902a20. For more details please see the references link. | null | 2022-03-07T01:52:09.392618Z | 2022-02-27T02:50:25.138638Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e2ca90c276e1fc410d7cd3c1a4eee245ec902a20'} |
Linux | GSD-2022-1000770 | netfilter: nf_queue: fix possible use-after-free | netfilter: nf_queue: fix possible use-after-free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.27 by commit dd648bd1b33a828f62befa696b206c688da0ec43, it was introduced in version v2.6.29 by commit 271b72c7fa82c2c7a795bc16896149933110672d. For more details please see the references link. | null | 2022-03-18T03:03:32.174483Z | 2022-03-18T00:16:54.216182Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/271b72c7fa82c2c7a795bc16896149933110672d'} |
Linux | GSD-2022-1001862 | ath9k_htc: fix uninit value bugs | ath9k_htc: fix uninit value bugs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 0b700f7d06492de34964b6f414120043364f8191, it was introduced in version v2.6.35 by commit fb9987d0f748c983bb795a86f47522313f701a08. For more details please see the references link. | null | 2022-04-25T05:31:06.746444Z | 2022-04-24T21:49:22.187729Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb9987d0f748c983bb795a86f47522313f701a08'} |
Linux | GSD-2022-1002063 | kgdboc: fix return value of __setup handler | kgdboc: fix return value of __setup handler
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 45e95a7bf8c4fd2e5408e89bafe7ccf2a52f7864, it was introduced in version v4.20 by commit 1bd54d851f50dea6af30c3e6ff4f3e9aab5558f9. For more details please see the references link. | null | 2022-04-25T05:04:37.305712Z | 2022-04-24T22:06:47.444583Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1bd54d851f50dea6af30c3e6ff4f3e9aab5558f9'} |
Linux | GSD-2021-1001533 | mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap | mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.249 by commit ce5f372f5f084ff51c285fc27b232f15a3d00f0b, it was introduced in version v4.7 by commit 646e76bb5daf4ca38438c69ffb72cccb605f3466. For more details please see the references link. | null | 2021-12-19T22:58:31.919784Z | 2021-10-19T16:22:35.047221Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/646e76bb5daf4ca38438c69ffb72cccb605f3466'} |
Linux | GSD-2022-1002433 | mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init | mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 0856bf27057561f42b37df111603cf5a0d040294, it was introduced in version v4.12 by commit f88fc122cc34c2545dec9562eaab121494e401ef. For more details please see the references link. | null | 2022-04-25T06:50:16.305490Z | 2022-04-24T22:46:44.280212Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f88fc122cc34c2545dec9562eaab121494e401ef'} |
Linux | GSD-2021-1001499 | HID: betop: fix slab-out-of-bounds Write in betop_probe | HID: betop: fix slab-out-of-bounds Write in betop_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.286 by commit a4faa7153b87fbcfe4be15f4278676f79ca6e019. For more details please see the references link. | null | 2021-12-19T23:51:13.348851Z | 2021-10-19T16:21:00.019877Z | null | null | null | null | null |
Linux | GSD-2021-1001163 | KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak | KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.6 by commit a4a488915feaad38345cc01b80d52e8200ff5209, it was introduced in version v4.18 by commit b3cebfe8c1cadf1817939dcc3688a2504a69c662. For more details please see the references link. | null | 2021-12-20T00:04:53.432618Z | 2021-08-03T01:31:38.858689Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b3cebfe8c1cadf1817939dcc3688a2504a69c662'} |
Linux | GSD-2021-1000322 | powerpc/64s: Fix crashes when toggling entry flush barrier | powerpc/64s: Fix crashes when toggling entry flush barrier
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.38 by commit d2e3590ca39ccfd8a5a46d8c7f095cb6c7b9ae92, it was introduced in version v5.10 by commit f79643787e0a0762d2409b7b8334e83f22d85695. For more details please see the references link. | null | 2021-12-20T00:37:40.637244Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f79643787e0a0762d2409b7b8334e83f22d85695'} |
Linux | GSD-2021-1000288 | soundwire: stream: fix memory leak in stream config error path | soundwire: stream: fix memory leak in stream config error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit effd2bd62b416f6629e18e3ce077c60de14cfdea, it was introduced in version v4.18 by commit 89e590535f32d4bc548bcf266f3b046e50942f6d. For more details please see the references link. | null | 2021-12-20T00:29:22.681612Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/89e590535f32d4bc548bcf266f3b046e50942f6d'} |
Linux | GSD-2021-1001860 | nvme-pci: Fix abort command id | nvme-pci: Fix abort command id
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.75 by commit 6fecdb5b54a5d37e5c018307ea9180502c85d158, it was introduced in version v5.10.67 by commit 240a7025a6f89f9596c36134bd07f3855c56c712. For more details please see the references link. | null | 2021-12-19T22:09:32.338361Z | 2021-10-28T13:52:43.834105Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/240a7025a6f89f9596c36134bd07f3855c56c712'} |
Linux | GSD-2021-1000772 | net: caif: add proper error handling | net: caif: add proper error handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.43 by commit d6db727457dd29938524f04b301c83ac67cccb87, it was introduced in version v3.3 by commit 7c18d2205ea76eef9674e59e1ecae4f332a53e9e. For more details please see the references link. | null | 2021-12-19T22:39:28.414283Z | 2021-06-25T00:04:37.912994Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7c18d2205ea76eef9674e59e1ecae4f332a53e9e'} |
Linux | GSD-2021-1000267 | bcache: Use 64-bit arithmetic instead of 32-bit | bcache: Use 64-bit arithmetic instead of 32-bit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 4fa8634493253c3f8932410a65680f588c7b7e4a, it was introduced in version v5.12 by commit d0cf9503e908ee7b235a5efecedeb74aabc482f3. For more details please see the references link. | null | 2021-12-19T23:28:30.688237Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0cf9503e908ee7b235a5efecedeb74aabc482f3'} |
Linux | GSD-2022-1000818 | KVM: x86/mmu: make apf token non-zero to fix bug | KVM: x86/mmu: make apf token non-zero to fix bug
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.26 by commit 4c3644b6c96c5daa5149e5abddc07234eea47c7c. For more details please see the references link. | null | 2022-03-18T02:57:40.515778Z | 2022-03-18T00:21:12.886210Z | null | null | null | null | null |
Linux | GSD-2021-1001925 | regmap: Fix possible double-free in regcache_rbtree_exit() | regmap: Fix possible double-free in regcache_rbtree_exit()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.291 by commit e72dce9afbdbfa70d9b44f5908a50ff6c4858999, it was introduced in version v3.12 by commit 3f4ff561bc88b074d5e868dde4012d89cbb06c87. For more details please see the references link. | null | 2021-12-19T23:29:48.730080Z | 2021-11-14T15:11:58.022860Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f4ff561bc88b074d5e868dde4012d89cbb06c87'} |
Linux | GSD-2021-1000637 | NFS: fix an incorrect limit in filelayout_decode_layout() | NFS: fix an incorrect limit in filelayout_decode_layout()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.124 by commit e411df81cd862ef3d5b878120b2a2fef0ca9cdb1, it was introduced in version v2.6.37 by commit 16b374ca439fb406e46e071f75428f5b033056f8. For more details please see the references link. | null | 2021-12-20T00:37:06.652404Z | 2021-06-04T19:52:12.342712Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/16b374ca439fb406e46e071f75428f5b033056f8'} |
Linux | GSD-2021-1001476 | virtio_console: Assure used length from device is limited | virtio_console: Assure used length from device is limited
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.276 by commit 187f14fb88a9e62d55924748a274816fe6f34de6. For more details please see the references link. | null | 2021-12-19T23:30:14.208971Z | 2021-08-03T02:52:59.339521Z | null | null | null | null | null |
Linux | GSD-2022-1002126 | cifs: fix NULL ptr dereference in smb2_ioctl_query_info() | cifs: fix NULL ptr dereference in smb2_ioctl_query_info()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit edefc4b2a8e8310eee8e2b1714709ad5b2a93928. For more details please see the references link. | null | 2022-04-25T06:56:52.312836Z | 2022-04-24T22:13:57.966313Z | null | null | null | null | null |
Linux | GSD-2021-1001026 | bcache: avoid oversized read request in cache missing code path | bcache: avoid oversized read request in cache missing code path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.11 by commit 555002a840ab88468e252b0eedf0b05e2ce7099c. For more details please see the references link. | null | 2021-12-20T00:32:52.531684Z | 2021-06-30T00:34:44.020136Z | null | null | null | null | null |
Linux | GSD-2022-1001589 | crypto: octeontx2 - remove CONFIG_DM_CRYPT check | crypto: octeontx2 - remove CONFIG_DM_CRYPT check
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit a462214866eebbca87e13ff6d73092b1c4895624, it was introduced in version v5.12 by commit 6f03f0e8b6c8a82d8e740ff3a87ed407ad423243. For more details please see the references link. | null | 2022-04-25T05:11:22.103302Z | 2022-04-24T21:26:41.340379Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6f03f0e8b6c8a82d8e740ff3a87ed407ad423243'} |
Linux | GSD-2021-1002523 | net: nexthop: fix null pointer dereference when IPv6 is not enabled | net: nexthop: fix null pointer dereference when IPv6 is not enabled
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.6 by commit 39509d76a9a3d02f379d52cb4b1449469c56c0e0, it was introduced in version v5.3 by commit 53010f991a9f5e4ed2db705ddde6ff32709192a2. For more details please see the references link. | null | 2021-12-19T22:14:10.245012Z | 2021-12-19T19:41:03.854120Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/53010f991a9f5e4ed2db705ddde6ff32709192a2'} |
Linux | GSD-2022-1001073 | mt76: mt7921: fix crash when startup fails. | mt76: mt7921: fix crash when startup fails.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit ac1260b661c2ef0d0a56680cdb5672b931b7be8f. For more details please see the references link. | null | 2022-04-25T05:04:20.775319Z | 2022-04-24T20:43:34.374730Z | null | null | null | null | null |
Linux | GSD-2021-1002173 | mm/mempolicy: do not allow illegal MPOL_F_NUMA_BALANCING | MPOL_LOCAL in mbind() | mm/mempolicy: do not allow illegal MPOL_F_NUMA_BALANCING | MPOL_LOCAL in mbind()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 6d2aec9e123bb9c49cb5c7fc654f25f81e688e8c, it was introduced in version v5.12 by commit bda420b985054a3badafef23807c4b4fa38a3dff. For more details please see the references link. | null | 2021-12-19T23:56:53.790417Z | 2021-11-14T15:23:11.776335Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bda420b985054a3badafef23807c4b4fa38a3dff'} |
Linux | GSD-2021-1002489 | perf hist: Fix memory leak of a perf_hpp_fmt | perf hist: Fix memory leak of a perf_hpp_fmt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.84 by commit a4c17ebdd6249cb4e061358d3693383f6628e069. For more details please see the references link. | null | 2021-12-20T00:34:18.019783Z | 2021-12-19T19:39:36.074924Z | null | null | null | null | null |
Linux | GSD-2022-1001423 | docs: sysctl/kernel: add missing bit to panic_print | docs: sysctl/kernel: add missing bit to panic_print
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 9eff62b7b8ae0e322897aa54f23b615f90d99084, it was introduced in version v5.2 by commit de6da1e8bcf0dd2058b950b127491821207679dc. For more details please see the references link. | null | 2022-04-25T05:54:51.145278Z | 2022-04-24T21:11:46.303369Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/de6da1e8bcf0dd2058b950b127491821207679dc'} |
Linux | GSD-2022-1000398 | drop_monitor: fix data-race in dropmon_net_event / trace_napi_poll_hit | drop_monitor: fix data-race in dropmon_net_event / trace_napi_poll_hit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.102 by commit 877a05672f95d819ba2e45af3b7e95e01ece4c28, it was introduced in version v2.6.31 by commit 4ea7e38696c7e798c47ebbecadfd392f23f814f9. For more details please see the references link. | null | 2022-03-07T01:33:30.705573Z | 2022-02-27T03:01:22.377190Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4ea7e38696c7e798c47ebbecadfd392f23f814f9'} |
Linux | GSD-2022-1000662 | IB/hfi1: Fix panic with larger ipoib send_queue_size | IB/hfi1: Fix panic with larger ipoib send_queue_size
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.8 by commit 1530d84fba1e459ba55f46aa42649b88773210e7, it was introduced in version v5.16 by commit d47dfc2b00e69001c8eeae71f7e25066ccc36144. For more details please see the references link. | null | 2022-03-07T01:38:51.234364Z | 2022-02-27T03:37:31.731993Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d47dfc2b00e69001c8eeae71f7e25066ccc36144'} |
Linux | GSD-2022-1001970 | RDMA/hfi1: Fix use-after-free bug for mm struct | RDMA/hfi1: Fix use-after-free bug for mm struct
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit 5f54364ff6cfcd14cddf5441c4a490bb28dd69f7, it was introduced in version v5.10 by commit 3d2a9d642512c21a12d19b9250e7a835dcb41a79. For more details please see the references link. | null | 2022-04-25T06:09:20.486915Z | 2022-04-24T21:59:36.728309Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3d2a9d642512c21a12d19b9250e7a835dcb41a79'} |
Linux | GSD-2022-1000232 | gve: fix the wrong AdminQ buffer queue index check | gve: fix the wrong AdminQ buffer queue index check
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.99 by commit f744a064041cc1d84e1ad9d6a8e571f371850648, it was introduced in version v5.10 by commit 5cdad90de62c27c6af53edb1b4b91712622b892b. For more details please see the references link. | null | 2022-02-20T02:08:26.691740Z | 2022-02-18T21:59:13.568179Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5cdad90de62c27c6af53edb1b4b91712622b892b'} |
Linux | GSD-2022-1000727 | xhci: Prevent futile URB re-submissions due to incorrect return value. | xhci: Prevent futile URB re-submissions due to incorrect return value.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.12 by commit 12231153fa97aeef8e478da3c3bd4081cbf10bdb, it was introduced in version v3.11 by commit 203a86613fb3bf2767335659513fa98563a3eb71. For more details please see the references link. | null | 2022-03-18T03:02:43.339312Z | 2022-03-18T00:12:43.023471Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/203a86613fb3bf2767335659513fa98563a3eb71'} |
Linux | GSD-2022-1001835 | bpf, sockmap: Fix memleak in sk_psock_queue_msg | bpf, sockmap: Fix memleak in sk_psock_queue_msg
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit ef9785f429794567792561a584901faa9291d3ee, it was introduced in version v5.14 by commit 9635720b7c88592214562cb72605bdab6708006c. For more details please see the references link. | null | 2022-04-25T03:23:37.397260Z | 2022-04-24T21:46:32.580676Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9635720b7c88592214562cb72605bdab6708006c'} |
Linux | GSD-2022-1000377 | net: dsa: mv88e6xxx: fix use-after-free in mv88e6xxx_mdios_unregister | net: dsa: mv88e6xxx: fix use-after-free in mv88e6xxx_mdios_unregister
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.101 by commit 22249886dc5bc3d6bcc212f07e65b49d85c582fe, it was introduced in version v5.10.101 by commit 8ccebe77df6e0d88c72ba5e69cf1835927e53b6c. For more details please see the references link. | null | 2022-02-27T02:58:16.546016Z | 2022-02-27T02:58:16.546016Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ccebe77df6e0d88c72ba5e69cf1835927e53b6c'} |
Linux | GSD-2021-1000908 | net: ieee802154: fix null deref in parse dev addr | net: ieee802154: fix null deref in parse dev addr
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.127 by commit d0f47648b87b6d5f204cb7f3cbce6d36dab85a67. For more details please see the references link. | null | 2021-12-19T22:39:38.757033Z | 2021-06-30T00:05:50.728786Z | null | null | null | null | null |
Linux | GSD-2022-1001136 | KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU | KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 8cf6f98ab1d16d5e607635a0c21c4231eb15367e, it was introduced in version v5.13 by commit b7cccd397f310739fb85383033e95580f99927e0. For more details please see the references link. | null | 2022-04-25T03:14:12.558289Z | 2022-04-24T20:48:12.853309Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b7cccd397f310739fb85383033e95580f99927e0'} |
Linux | GSD-2021-1002466 | net: nexthop: fix null pointer dereference when IPv6 is not enabled | net: nexthop: fix null pointer dereference when IPv6 is not enabled
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.83 by commit b70ff391deeec35cdd8a05f5f63f5fe28bc4f225, it was introduced in version v5.3 by commit 53010f991a9f5e4ed2db705ddde6ff32709192a2. For more details please see the references link. | null | 2021-12-20T00:47:55.826670Z | 2021-12-19T19:38:32.879169Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/53010f991a9f5e4ed2db705ddde6ff32709192a2'} |
Linux | GSD-2022-1001566 | ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction | ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit d07e4bbaff6fbba6f70c04b092ea7d9afcdf392e, it was introduced in version v3.16 by commit 00a7bb81c20f3e81711e28e0f6c08cee8fd18514. For more details please see the references link. | null | 2022-04-25T06:28:22.286599Z | 2022-04-24T21:24:29.592298Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/00a7bb81c20f3e81711e28e0f6c08cee8fd18514'} |
Linux | GSD-2021-1002036 | mlxsw: thermal: Fix out-of-bounds memory accesses | mlxsw: thermal: Fix out-of-bounds memory accesses
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.75 by commit e59d839743b50cb1d3f42a786bea48cc5621d254, it was introduced in version v4.10 by commit a50c1e35650b929500bd89be61c89d95a267ce56. For more details please see the references link. | null | 2021-12-19T23:44:03.700648Z | 2021-11-14T15:16:59.603309Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a50c1e35650b929500bd89be61c89d95a267ce56'} |
Linux | GSD-2021-1002759 | iocost: Fix divide-by-zero on donation from low hweight cgroup | iocost: Fix divide-by-zero on donation from low hweight cgroup
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit 3a1a4eb574178c21241a6200f4785572e661c472, it was introduced in version v5.10 by commit f1de2439ec43b74764f2a26e3a310b24407e3bde. For more details please see the references link. | null | 2022-01-11T05:54:10.534395Z | 2021-12-27T05:49:10.899226Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f1de2439ec43b74764f2a26e3a310b24407e3bde'} |
Linux | GSD-2021-1000764 | perf probe: Fix NULL pointer dereference in convert_variable_location() | perf probe: Fix NULL pointer dereference in convert_variable_location()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.43 by commit 091283e3d5eb9f424b85e71804fc26092c3c4915, it was introduced in version v5.5 by commit 66f69b2197167cb99330c77a550da50f1f597abc. For more details please see the references link. | null | 2021-12-20T00:05:16.843254Z | 2021-06-25T00:03:17.298772Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/66f69b2197167cb99330c77a550da50f1f597abc'} |
Linux | GSD-2021-1001876 | KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest() | KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit 6d077c37c4643394b1bae9682da48164fc147ea8, it was introduced in version v5.2 by commit 10d91611f426d4bafd2a83d966c36da811b2f7ad. For more details please see the references link. | null | 2021-12-20T00:10:22.136768Z | 2021-10-28T13:53:29.384417Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/10d91611f426d4bafd2a83d966c36da811b2f7ad'} |
Linux | GSD-2022-1001209 | MIPS: pgalloc: fix memory leak caused by pgd_free() | MIPS: pgalloc: fix memory leak caused by pgd_free()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 1bf0d78c8cc3cf615a6e7bf33ada70b73592f0a1, it was introduced in version v5.9 by commit f9cb654cb550b7b87e8608b14fc3eca432429ffe. For more details please see the references link. | null | 2022-04-25T03:10:56.930521Z | 2022-04-24T20:53:54.289835Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f9cb654cb550b7b87e8608b14fc3eca432429ffe'} |
Linux | GSD-2021-1002309 | x86/hyperv: Fix NULL deref in set_hv_tscchange_cb() if Hyper-V setup fails | x86/hyperv: Fix NULL deref in set_hv_tscchange_cb() if Hyper-V setup fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit 8823ea27fff6084bbb4bc71d15378fae0220b1d8, it was introduced in version v4.16 by commit 93286261de1b46339aa27cd4c639b21778f6cade. For more details please see the references link. | null | 2021-12-20T01:25:29.671945Z | 2021-11-29T02:38:10.420957Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/93286261de1b46339aa27cd4c639b21778f6cade'} |
Linux | GSD-2021-1000334 | dmaengine: idxd: Fix potential null dereference on pointer status | dmaengine: idxd: Fix potential null dereference on pointer status
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.38 by commit 5756f757c72501ef1a16f5f63f940623044180e9, it was introduced in version v5.10.17 by commit 40e3b5c128645d2ddad12310c7be98758cafb2b0. For more details please see the references link. | null | 2021-12-19T23:48:36.559102Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/40e3b5c128645d2ddad12310c7be98758cafb2b0'} |
Linux | GSD-2022-1001659 | cifs: potential buffer overflow in handling symlinks | cifs: potential buffer overflow in handling symlinks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.35 by commit 9901b07ba42b39266b34a888e48d7306fd707bee, it was introduced in version v2.6.37 by commit c69c1b6eaea1b3e1eecf7ad2fba0208ac4a11131. For more details please see the references link. | null | 2022-04-25T06:36:45.117879Z | 2022-04-24T21:32:30.960713Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c69c1b6eaea1b3e1eecf7ad2fba0208ac4a11131'} |
Linux | GSD-2021-1001175 | btrfs: fix lock inversion problem when doing qgroup extent tracing | btrfs: fix lock inversion problem when doing qgroup extent tracing
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.6 by commit f5ef2fe05d386995b951476ffc8d6a6023888d99. For more details please see the references link. | null | 2021-12-20T00:55:36.974020Z | 2021-08-03T01:32:25.781178Z | null | null | null | null | null |
Linux | GSD-2022-1000418 | scsi: qedf: Add stag_work to all the vports | scsi: qedf: Add stag_work to all the vports
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit 1f53bbf27a876f7e61262bd74c18680ac11d4c31. For more details please see the references link. | null | 2022-03-07T02:19:32.920414Z | 2022-02-27T03:04:17.971814Z | null | null | null | null | null |
Linux | GSD-2022-1002425 | lib/test: use after free in register_test_dev_kmod() | lib/test: use after free in register_test_dev_kmod()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit fdf2c2e4ff14dab7648e7d4431e10c0c18df2ff8, it was introduced in version v4.13 by commit d9c6a72d6fa29d3a7999dda726577e5d1fccafa5. For more details please see the references link. | null | 2022-04-25T04:53:01.630696Z | 2022-04-24T22:45:34.396005Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9c6a72d6fa29d3a7999dda726577e5d1fccafa5'} |
Linux | GSD-2021-1001525 | phy: mdio: fix memory leak | phy: mdio: fix memory leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.251 by commit f4f502a04ee1e543825af78f47eb7785015cd9f6, it was introduced in version v2.6.28 by commit 46abc02175b3c246dd5141d878f565a8725060c9. For more details please see the references link. | null | 2021-12-19T22:38:41.267111Z | 2021-10-19T16:22:13.747693Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/46abc02175b3c246dd5141d878f565a8725060c9'} |
Linux | GSD-2022-1000048 | tomoyo: Check exceeded quota early in tomoyo_domain_quota_is_ok(). | tomoyo: Check exceeded quota early in tomoyo_domain_quota_is_ok().
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.90 by commit e2048a1f91869d0226a0bfc867ecc40fc5897107. For more details please see the references link. | null | 2022-01-11T05:48:21.492221Z | 2022-01-10T19:51:46.417147Z | null | null | null | null | null |
Linux | GSD-2022-1002075 | af_netlink: Fix shift out of bounds in group mask calculation | af_netlink: Fix shift out of bounds in group mask calculation
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit b0898362188e05b2202656058cc32d98fabf3bac, it was introduced in version v2.6.14 by commit f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198. For more details please see the references link. | null | 2022-04-25T04:51:11.764350Z | 2022-04-24T22:08:16.789587Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198'} |
Linux | GSD-2021-1001030 | usb: dwc3: gadget: Bail from dwc3_gadget_exit() if dwc->gadget is NULL | usb: dwc3: gadget: Bail from dwc3_gadget_exit() if dwc->gadget is NULL
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.11 by commit 4aad390363d2b9b3e92428dd34d27bb7ea8f1ee8, it was introduced in version v5.10 by commit e81a7018d93a7de31a3f121c9a7eecd0a5ec58b0. For more details please see the references link. | null | 2021-12-20T00:13:51.595309Z | 2021-06-30T00:35:00.597329Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e81a7018d93a7de31a3f121c9a7eecd0a5ec58b0'} |
Linux | GSD-2022-1002130 | cifs: prevent bad output lengths in smb2_ioctl_query_info() | cifs: prevent bad output lengths in smb2_ioctl_query_info()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 9963ccea6087268e1275b992dca5d0dd4b938765. For more details please see the references link. | null | 2022-04-25T05:37:01.748234Z | 2022-04-24T22:14:14.137098Z | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.