ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2021-1001460
atm: iphase: fix possible use-after-free in ia_module_exit()
atm: iphase: fix possible use-after-free in ia_module_exit() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.276 by commit a832ee2f2145f57443b2d565f8cb5490e8339f42. For more details please see the references link.
null
2021-12-19T22:50:29.398779Z
2021-08-03T02:47:23.762652Z
null
null
null
null
null
Linux
GSD-2021-1000621
net: fec: fix the potential memory leak in fec_enet_init()
net: fec: fix the potential memory leak in fec_enet_init() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.124 by commit 20255d41ac560397b6a07d8d87dcc5e2efc7672a, it was introduced in version v3.18 by commit 59d0f746564495c7f54526674deabfcf101236a1. For more details please see the references link.
null
2021-12-19T23:09:13.698036Z
2021-06-04T19:49:05.826710Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/59d0f746564495c7f54526674deabfcf101236a1'}
Linux
GSD-2021-1001933
NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()
NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.288 by commit a67d47e32c91e2b10402cb8c081774cbf08edb2e, it was introduced in version v3.13 by commit 1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8. For more details please see the references link.
null
2021-12-20T00:10:49.669110Z
2021-11-14T15:12:18.131633Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8'}
Linux
GSD-2021-1001899
drm/msm: Fix null pointer dereference on pointer edp
drm/msm: Fix null pointer dereference on pointer edp This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit 46c8ddede0273d1d132beefa9de8b820326982be, it was introduced in version v4.0 by commit ab5b0107ccf3821a6837b0f2819270d6fa0b278f. For more details please see the references link.
null
2021-12-19T23:22:15.295713Z
2021-10-28T13:54:44.439069Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab5b0107ccf3821a6837b0f2819270d6fa0b278f'}
Linux
GSD-2021-1000271
media: [next] staging: media: atomisp: fix memory leak of object flash
media: [next] staging: media: atomisp: fix memory leak of object flash This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 27d2eab69f7da8e94e4751ac5c6d22d809275484, it was introduced in version v5.10 by commit 9289cdf399922a1bd801a8cd946a79581c00a380. For more details please see the references link.
null
2021-12-19T22:51:55.441370Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9289cdf399922a1bd801a8cd946a79581c00a380'}
Linux
GSD-2022-1002219
ext4: don't BUG if someone dirty pages without asking ext4 first
ext4: don't BUG if someone dirty pages without asking ext4 first This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 5a016c053f426a73752c3b41b60b497b58694d48. For more details please see the references link.
null
2022-04-25T04:28:39.095138Z
2022-04-24T22:22:47.897251Z
null
null
null
null
null
Linux
GSD-2022-1000224
RDMA/cma: Use correct address when leaving multicast group
RDMA/cma: Use correct address when leaving multicast group This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.99 by commit 371979069a577ee5bc1bcaaa39fb53d9e4dc7e3f, it was introduced in version v5.10 by commit b5de0c60cc30c2a3513c7188c73f3f29acc29234. For more details please see the references link.
null
2022-02-20T02:14:25.124010Z
2022-02-18T21:57:29.228335Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b5de0c60cc30c2a3513c7188c73f3f29acc29234'}
Linux
GSD-2021-1001749
md: fix a lock order reversal in md_alloc
md: fix a lock order reversal in md_alloc This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.9 by commit a46d5e3603bdc8e36b518a67cf9073a107906b68, it was introduced in version v3.0 by commit b0140891a8cea36469f58d23859e599b1122bd37. For more details please see the references link.
null
2021-12-19T23:25:27.063657Z
2021-10-19T16:34:51.520723Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b0140891a8cea36469f58d23859e599b1122bd37'}
Linux
GSD-2022-1001966
gpio: Restrict usage of GPIO chip irq members before initialization
gpio: Restrict usage of GPIO chip irq members before initialization This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit 7e88a50704b0c49ad3f2d11e8b963341cf68a89f. For more details please see the references link.
null
2022-04-25T04:25:32.895865Z
2022-04-24T21:59:13.527485Z
null
null
null
null
null
Linux
GSD-2022-1000674
net, neigh: Do not trigger immediate probes on NUD_FAILED from neigh_managed_work
net, neigh: Do not trigger immediate probes on NUD_FAILED from neigh_managed_work This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.8 by commit 203a35ebb49cdce377416b0690215d3ce090d364, it was introduced in version v5.16 by commit 7482e3841d520a368426ac196720601687e2dc47. For more details please see the references link.
null
2022-03-07T01:36:59.897590Z
2022-02-27T03:39:32.937208Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7482e3841d520a368426ac196720601687e2dc47'}
Linux
GSD-2021-1001319
net: fddi: fix UAF in fza_probe
net: fddi: fix UAF in fza_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.135 by commit 04b06716838bfc26742dbed3ae1d3697fe5317ee, it was introduced in version v4.20 by commit 61414f5ec9834df8aa4f55c90de16b71a3d6ca8d. For more details please see the references link.
null
2021-12-20T00:18:33.943288Z
2021-08-03T02:07:18.335576Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61414f5ec9834df8aa4f55c90de16b71a3d6ca8d'}
Linux
GSD-2022-1001435
can: mcba_usb: properly check endpoint type
can: mcba_usb: properly check endpoint type This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 88272b4a37913bdf6f339162a7920bd8e9b49de2, it was introduced in version v4.12 by commit 51f3baad7de943780ce0c17bd7975df567dd6e14. For more details please see the references link.
null
2022-04-25T04:21:34.134539Z
2022-04-24T21:12:54.032393Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/51f3baad7de943780ce0c17bd7975df567dd6e14'}
Linux
GSD-2021-1000158
vhost-vdpa: fix vm_flags for virtqueue doorbell mapping
vhost-vdpa: fix vm_flags for virtqueue doorbell mapping This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.36 by commit 3b8b6399666a29daa30b0bb3f5c9e3fc81c5a6a6, it was introduced in version v5.8 by commit ddd89d0a059d8e9740c75a97e0efe9bf07ee51f9. For more details please see the references link.
null
2021-12-19T23:49:19.467719Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ddd89d0a059d8e9740c75a97e0efe9bf07ee51f9'}
Linux
GSD-2021-1002165
netfilter: xt_IDLETIMER: fix panic that occurs when timer_type has garbage value
netfilter: xt_IDLETIMER: fix panic that occurs when timer_type has garbage value This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 902c0b1887522a099aa4e1e6b4b476c2fe5dd13e, it was introduced in version v5.7 by commit 68983a354a655c35d3fb204489d383a2a051fda7. For more details please see the references link.
null
2021-12-20T00:19:13.134500Z
2021-11-14T15:22:51.685265Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/68983a354a655c35d3fb204489d383a2a051fda7'}
Linux
GSD-2022-1001065
tcp: Don't acquire inet_listen_hashbucket::lock with disabled BH.
tcp: Don't acquire inet_listen_hashbucket::lock with disabled BH. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 20a0b7c3279ab6e5b2ea942d2d64855a6136d6a9. For more details please see the references link.
null
2022-04-25T04:45:25.740110Z
2022-04-24T20:43:11.195543Z
null
null
null
null
null
Linux
GSD-2021-1000508
platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios
platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.40 by commit 0cf036a0d325200e6c27b90908e51195bbc557b1, it was introduced in version v4.15 by commit 1a258e670434f404a4500b65ba1afea2c2b29bba. For more details please see the references link.
null
2021-12-20T00:04:29.879775Z
2021-05-31T23:47:56.267769Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1a258e670434f404a4500b65ba1afea2c2b29bba'}
Linux
GSD-2021-1002535
ice: avoid bpf_prog refcount underflow
ice: avoid bpf_prog refcount underflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.6 by commit 1f10b09ccc832698ef4624a6ab9a213b6ccbda76, it was introduced in version v5.5 by commit efc2214b6047b6f5b4ca53151eba62521b9452d6. For more details please see the references link.
null
2021-12-19T22:01:54.209153Z
2021-12-19T19:41:39.367399Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/efc2214b6047b6f5b4ca53151eba62521b9452d6'}
Linux
GSD-2021-1002020
net: batman-adv: fix error handling
net: batman-adv: fix error handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.157 by commit 6422e8471890273994fe8cc6d452b0dcd2c9483e, it was introduced in version v2.6.38 by commit c6c8fea29769d998d94fcec9b9f14d4b52b349d3. For more details please see the references link.
null
2021-12-19T23:06:19.191913Z
2021-11-14T15:16:14.076917Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6c8fea29769d998d94fcec9b9f14d4b52b349d3'}
Linux
GSD-2022-1001570
ASoC: codecs: rx-macro: fix accessing array out of bounds for enum type
ASoC: codecs: rx-macro: fix accessing array out of bounds for enum type This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 7e3629e256d1cabf801d00050550ade4d036cafe, it was introduced in version v5.12 by commit 4f692926f562ff48abfcca6b16f36ff8d57473b6. For more details please see the references link.
null
2022-04-25T02:59:14.015686Z
2022-04-24T21:24:47.683587Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4f692926f562ff48abfcca6b16f36ff8d57473b6'}
Linux
GSD-2021-1002470
ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE
ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.83 by commit 0effb7f51b65840bb129f52ddc765105c48c87ba, it was introduced in version v3.8 by commit 9c4566a117a6fe404a0e49b27ac71b631945a70f. For more details please see the references link.
null
2021-12-19T22:16:19.103843Z
2021-12-19T19:38:42.545144Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9c4566a117a6fe404a0e49b27ac71b631945a70f'}
Linux
GSD-2022-1001120
ubifs: rename_whiteout: Fix double free for whiteout_ui->data
ubifs: rename_whiteout: Fix double free for whiteout_ui->data This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 6d7a158a7363c1f6604aa47ae1a280a5c65123dd, it was introduced in version v4.9 by commit 9e0a1fff8db56eaaebb74b4a3ef65f86811c4798. For more details please see the references link.
null
2022-04-25T05:08:43.066155Z
2022-04-24T20:47:19.180491Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9e0a1fff8db56eaaebb74b4a3ef65f86811c4798'}
Linux
GSD-2022-1001989
jfs: prevent NULL deref in diFree
jfs: prevent NULL deref in diFree This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit b9c5ac0a15f24d63b20f899072fa6dd8c93af136. For more details please see the references link.
null
2022-04-25T05:37:08.357193Z
2022-04-24T22:01:33.131414Z
null
null
null
null
null
Linux
GSD-2022-1000361
usb: f_fs: Fix use-after-free for epfile
usb: f_fs: Fix use-after-free for epfile This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.101 by commit 0042178a69eb77a979e36a50dcce9794a3140ef8, it was introduced in version v4.9 by commit a9e6f83c2df199187a5248f824f31b6787ae23ae. For more details please see the references link.
null
2022-03-07T01:44:22.156476Z
2022-02-27T02:56:28.827821Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a9e6f83c2df199187a5248f824f31b6787ae23ae'}
Linux
GSD-2022-1001823
net: bcmgenet: Use stronger register read/writes to assure ordering
net: bcmgenet: Use stronger register read/writes to assure ordering This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 06d836801cd82ded282aaf9e888ff9e7e4a88b91, it was introduced in version v4.14 by commit 69d2ea9c798983c4a7157278ec84ff969d1cd8e8. For more details please see the references link.
null
2022-04-25T06:14:39.073926Z
2022-04-24T21:45:24.584526Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69d2ea9c798983c4a7157278ec84ff969d1cd8e8'}
Linux
GSD-2022-1000731
iio: adc: tsc2046: fix memory corruption by preventing array overflow
iio: adc: tsc2046: fix memory corruption by preventing array overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.12 by commit 082d2c047b0d305bb0b6e9f9d671a09470e2db2d, it was introduced in version v5.14 by commit 9374e8f5a38defe90bc65b2decf317c1c62d91dd. For more details please see the references link.
null
2022-03-18T03:00:03.606731Z
2022-03-18T00:13:08.815825Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9374e8f5a38defe90bc65b2decf317c1c62d91dd'}
Linux
GSD-2021-1001088
net: ll_temac: Make sure to free skb when it is completely used
net: ll_temac: Make sure to free skb when it is completely used This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit e8afe05bd359ebe12a61dbdc94c06c00ea3e8d4b. For more details please see the references link.
null
2021-12-19T22:02:52.640195Z
2021-06-30T00:38:49.320920Z
null
null
null
null
null
Linux
GSD-2022-1002022
io_uring: fix memory leak of uid in files registration
io_uring: fix memory leak of uid in files registration This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit b27de7011cb3ba14b047be2cee0ed8278368665b, it was introduced in version v5.5 by commit 08a451739a9b5783f67de51e84cb6d9559bb9dc4. For more details please see the references link.
null
2022-04-25T06:19:16.293295Z
2022-04-24T22:03:32.681559Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/08a451739a9b5783f67de51e84cb6d9559bb9dc4'}
Linux
GSD-2021-1001572
net: macb: fix use after free on rmmod
net: macb: fix use after free on rmmod This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.209 by commit 46670fb832ee80943715df618632ca13c2e96f2b. For more details please see the references link.
null
2021-12-20T00:55:06.293251Z
2021-10-19T16:24:21.339735Z
null
null
null
null
null
Linux
GSD-2022-1002472
virtio_console: eliminate anonymous module_init & module_exit
virtio_console: eliminate anonymous module_init & module_exit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit 93e3d88321d2274fa4e26b006e19cc10fec331c2. For more details please see the references link.
null
2022-04-25T05:02:32.844319Z
2022-04-24T22:52:00.927742Z
null
null
null
null
null
Linux
GSD-2022-1002188
Drivers: hv: vmbus: Fix potential crash on module unload
Drivers: hv: vmbus: Fix potential crash on module unload This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 2133c422a103cf7c7768c37b9ac382e73b691892, it was introduced in version v5.4.35 by commit 9f38f7b46de0747c1909e8c557aa21715dce20c5. For more details please see the references link.
null
2022-04-25T02:59:42.691425Z
2022-04-24T22:20:06.224138Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9f38f7b46de0747c1909e8c557aa21715dce20c5'}
Linux
GSD-2021-1001122
mac80211: remove warning in ieee80211_get_sband()
mac80211: remove warning in ieee80211_get_sband() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.47 by commit 8cfe765afd5a8d127770780f45fd971a28897484. For more details please see the references link.
null
2021-12-19T22:22:09.481950Z
2021-07-08T01:57:47.673199Z
null
null
null
null
null
Linux
GSD-2021-1000699
mld: fix panic in mld_newpack()
mld: fix panic in mld_newpack() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.271 by commit 0e35b7457b7b6e73ffeaaca1a577fdf1af0feca1, it was introduced in version v2.6.35 by commit 72e09ad107e78d69ff4d3b97a69f0aad2b77280f. For more details please see the references link.
null
2021-12-19T23:39:47.939202Z
2021-06-04T20:05:15.246569Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/72e09ad107e78d69ff4d3b97a69f0aad2b77280f'}
Linux
GSD-2021-1000363
iommu/vt-d: Remove WO permissions on second-level paging entries
iommu/vt-d: Remove WO permissions on second-level paging entries This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit c848416cc05afc1589edba04fe00b85c2f797ee3, it was introduced in version v5.6 by commit b802d070a52a1565b47daaa808872cfbd4a17b01. For more details please see the references link.
null
2021-12-20T00:42:36.305553Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b802d070a52a1565b47daaa808872cfbd4a17b01'}
Linux
GSD-2021-1000733
ocfs2: fix data corruption by fallocate
ocfs2: fix data corruption by fallocate This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.236 by commit a1700479524bb9cb5e8ae720236a6fabd003acae, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T00:26:27.122287Z
2021-06-24T23:59:54.762055Z
null
null
null
null
null
Linux
GSD-2021-1001821
can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv
can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.156 by commit a0e47d2833b4f65e6c799f28c6b636d36b8b936d, it was introduced in version v5.4 by commit 9d71dd0c70099914fcd063135da3c580865e924c. For more details please see the references link.
null
2021-12-19T22:21:01.834184Z
2021-10-28T13:50:40.108102Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9d71dd0c70099914fcd063135da3c580865e924c'}
Linux
GSD-2021-1000226
mm: memcontrol: slab: fix obtain a reference to a freeing memcg
mm: memcontrol: slab: fix obtain a reference to a freeing memcg This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit c3ae6a3f3ca4f02f6ccddf213c027302586580d0, it was introduced in version v5.11 by commit 3de7d4f25a7438f09fef4e71ef111f1805cd8e7c. For more details please see the references link.
null
2021-12-20T01:08:18.492872Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3de7d4f25a7438f09fef4e71ef111f1805cd8e7c'}
Linux
GSD-2022-1000859
nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac()
nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.103 by commit af4bc921d39dffdb83076e0a7eed1321242b7d87, it was introduced in version v5.1 by commit 20cce88650981ec504d328dbbdd004d991eb8535. For more details please see the references link.
null
2022-03-18T03:43:48.358582Z
2022-03-18T00:25:14.142247Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/20cce88650981ec504d328dbbdd004d991eb8535'}
Linux
GSD-2021-1000676
Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails
Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.235 by commit 6f6ac2a7959b1864886d07fcf3b9cec587dfe635, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T22:51:56.187825Z
2021-06-04T19:59:59.480015Z
null
null
null
null
null
Linux
GSD-2021-1001964
IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields
IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.255 by commit 60833707b968d5ae02a75edb7886dcd4a957cf0d, it was introduced in version v2.6.35 by commit f931551bafe1f10ded7f5282e2aa162c267a2e5d. For more details please see the references link.
null
2021-12-19T22:59:30.236456Z
2021-11-14T15:13:40.660428Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f931551bafe1f10ded7f5282e2aa162c267a2e5d'}
Linux
GSD-2021-1001437
netrom: Decrease sock refcount when sock timers expire
netrom: Decrease sock refcount when sock timers expire This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.277 by commit a01634bf91f2b6c42583770eb6815fb6d1e251cf, it was introduced in version v4.9.155 by commit baa9e32336bf6d0d74a7c3486d2a27feaf57cd5f. For more details please see the references link.
null
2021-12-19T23:39:00.086561Z
2021-08-03T02:40:49.666772Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/baa9e32336bf6d0d74a7c3486d2a27feaf57cd5f'}
Linux
GSD-2022-1002167
net/smc: Fix NULL pointer dereference in smc_pnet_find_ib()
net/smc: Fix NULL pointer dereference in smc_pnet_find_ib() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.190 by commit a05f5e26cb8bb4d07e0595545fcad1bb406f0085, it was introduced in version v5.1 by commit af5f60c7e3d593c2fa31b9a62c16eae75f074de3. For more details please see the references link.
null
2022-04-25T03:11:06.045397Z
2022-04-24T22:17:53.184156Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/af5f60c7e3d593c2fa31b9a62c16eae75f074de3'}
Linux
GSD-2021-1001067
bpf: Fix leakage under speculation on mispredicted branches
bpf: Fix leakage under speculation on mispredicted branches This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit 4a99047ed51c98a09a537fe2c12420d815dfe296, it was introduced in version v4.15 by commit b2157399cc9898260d6031c5bfe45fe137c1fbe7. For more details please see the references link.
null
2021-12-20T01:09:28.434018Z
2021-06-30T00:37:28.368111Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b2157399cc9898260d6031c5bfe45fe137c1fbe7'}
Linux
GSD-2021-1002562
net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources()
net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.7 by commit 75917372eef0dbfb290ae45474314d35f97aea18, it was introduced in version v4.7 by commit ec25bc04ed8e12947738468cbe2191f1529f9e39. For more details please see the references link.
null
2021-12-20T01:19:55.142183Z
2021-12-19T19:42:45.887899Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ec25bc04ed8e12947738468cbe2191f1529f9e39'}
Linux
GSD-2022-1001032
xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu>=32
xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu>=32 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit b6f6b353d6c765b83c9e5e518a44ca1ae40fe227. For more details please see the references link.
null
2022-04-25T05:47:10.535431Z
2022-04-24T20:41:23.570789Z
null
null
null
null
null
Linux
GSD-2021-1002098
ptp: Fix possible memory leak in ptp_clock_register()
ptp: Fix possible memory leak in ptp_clock_register() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit 95c0a0c5ec8839f8f21672be786e87a100319ca8, it was introduced in version v5.5 by commit a33121e5487b424339636b25c35d3a180eaa5f5e. For more details please see the references link.
null
2021-12-20T01:21:19.027983Z
2021-11-14T15:19:49.369533Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a33121e5487b424339636b25c35d3a180eaa5f5e'}
Linux
GSD-2021-1002132
IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields
IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.16 by commit 0d4395477741608d123dad51def9fe50b7ebe952, it was introduced in version v2.6.35 by commit f931551bafe1f10ded7f5282e2aa162c267a2e5d. For more details please see the references link.
null
2021-12-20T00:03:58.732386Z
2021-11-14T15:21:22.182586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f931551bafe1f10ded7f5282e2aa162c267a2e5d'}
Linux
GSD-2022-1001198
Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt
Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 6d7be5afbb41c918d2f12f857f8c7efa50500be2, it was introduced in version v5.2 by commit 9aebfd4a2200ab8075e44379c758bccefdc589bb. For more details please see the references link.
null
2022-04-25T06:56:15.082021Z
2022-04-24T20:53:01.852034Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9aebfd4a2200ab8075e44379c758bccefdc589bb'}
Linux
GSD-2022-1001462
media: ir_toy: free before error exiting
media: ir_toy: free before error exiting This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 382e0f6958ef34eb093127b6d74c12f3b8fd0904. For more details please see the references link.
null
2022-04-25T04:36:01.025132Z
2022-04-24T21:15:00.871640Z
null
null
null
null
null
Linux
GSD-2022-1001931
tpm: use try_get_ops() in tpm-space.c
tpm: use try_get_ops() in tpm-space.c This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.32 by commit 476ddd23f818fb94cf86fb5617f3bb9a7c92113d. For more details please see the references link.
null
2022-04-25T05:17:28.424920Z
2022-04-24T21:55:57.200713Z
null
null
null
null
null
Linux
GSD-2022-1000623
net: fix information leakage in /proc/net/ptype
net: fix information leakage in /proc/net/ptype This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit 839ec7039513a4f84bfbaff953a9393471176bee, it was introduced in version v2.6.26 by commit 2feb27dbe00cbb4f7d31f90acf6bd0d751dd0a50. For more details please see the references link.
null
2022-03-07T01:41:40.408810Z
2022-02-27T03:32:29.164993Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2feb27dbe00cbb4f7d31f90acf6bd0d751dd0a50'}
Linux
GSD-2021-1002831
ipmi: ssif: initialize ssif_info->client early
ipmi: ssif: initialize ssif_info->client early This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.12 by commit 77a7311ca167aa5b7055c549a940a56e73ee5f29, it was introduced in version v5.4 by commit c4436c9149c5d2bc0c49ab57ec85c75ea1c4d61c. For more details please see the references link.
null
2022-01-11T05:54:59.902893Z
2021-12-30T02:45:19.010076Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c4436c9149c5d2bc0c49ab57ec85c75ea1c4d61c'}
Linux
GSD-2022-1000789
sched/fair: Fix fault in reweight_entity
sched/fair: Fix fault in reweight_entity This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.27 by commit e0bcd6b5779352aed88f2e538a82a39f1a7715bb, it was introduced in version v5.15.3 by commit 3869eecf050416a1d19bac60926f6b5d64b0aa58. For more details please see the references link.
null
2022-03-18T02:50:24.655312Z
2022-03-18T00:18:05.790718Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3869eecf050416a1d19bac60926f6b5d64b0aa58'}
Linux
GSD-2022-1000273
ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback
ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.20 by commit 86186352e36db1dc8906c855fae41f2a966f3bca, it was introduced in version v5.10 by commit f33d9e2b48a34e1558b67a473a1fc1d6e793f93c. For more details please see the references link.
null
2022-02-20T06:17:13.558513Z
2022-02-18T22:04:49.926568Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f33d9e2b48a34e1558b67a473a1fc1d6e793f93c'}
Linux
GSD-2022-1001874
ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe
ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit a0bc36b247dcf4d21bf820bfc4bcbaf7f6cf19b5, it was introduced in version v3.8 by commit 531f67e41dcde1e358cf821d056241a66355cf03. For more details please see the references link.
null
2022-04-25T03:13:28.972887Z
2022-04-24T21:50:42.521052Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/531f67e41dcde1e358cf821d056241a66355cf03'}
Linux
GSD-2022-1000766
auxdisplay: lcd2s: Fix memory leak in ->remove()
auxdisplay: lcd2s: Fix memory leak in ->remove() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.27 by commit 5d53cd33f4253aa4cf02bf7e670b3c6a99674351, it was introduced in version v5.11 by commit 8c9108d014c5bd0f0da2e3544eb45dc56a6da92b. For more details please see the references link.
null
2022-03-18T02:58:08.452607Z
2022-03-18T00:16:13.715892Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c9108d014c5bd0f0da2e3544eb45dc56a6da92b'}
Linux
GSD-2022-1000336
usb: f_fs: Fix use-after-free for epfile
usb: f_fs: Fix use-after-free for epfile This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.180 by commit c9fc422c9a43e3d58d246334a71f3390401781dc, it was introduced in version v4.9 by commit a9e6f83c2df199187a5248f824f31b6787ae23ae. For more details please see the references link.
null
2022-03-07T01:38:00.221715Z
2022-02-27T02:52:55.012225Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a9e6f83c2df199187a5248f824f31b6787ae23ae'}
Linux
GSD-2021-1000949
kvm: avoid speculation-based attacks from out-of-range memslot accesses
kvm: avoid speculation-based attacks from out-of-range memslot accesses This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.44 by commit 7af299b97734c7e7f465b42a2139ce4d77246975. For more details please see the references link.
null
2021-12-20T00:18:16.160002Z
2021-06-30T00:28:40.078550Z
null
null
null
null
null
Linux
GSD-2022-1001177
clk: visconti: prevent array overflow in visconti_clk_register_gates()
clk: visconti: prevent array overflow in visconti_clk_register_gates() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 2723543c1d60278d5aef1c4ad732dbad24b84a81, it was introduced in version v5.17 by commit b4cbe606dc3674b25cb661e7cd1a1c6ddaaafaaa. For more details please see the references link.
null
2022-04-25T03:11:17.340371Z
2022-04-24T20:50:55.983588Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b4cbe606dc3674b25cb661e7cd1a1c6ddaaafaaa'}
Linux
GSD-2021-1002427
seg6: fix the iif in the IPv6 socket control block
seg6: fix the iif in the IPv6 socket control block This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.221 by commit 6431e71093f3da586a00c6d931481ffb0dc2db0e, it was introduced in version v4.19.20 by commit 2f704348c93ff8119e642dae6a72327f90b82810. For more details please see the references link.
null
2021-12-19T23:06:36.985626Z
2021-12-19T19:36:51.543043Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2f704348c93ff8119e642dae6a72327f90b82810'}
Linux
GSD-2022-1001527
mips: cdmm: Fix refcount leak in mips_cdmm_phys_base
mips: cdmm: Fix refcount leak in mips_cdmm_phys_base This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 4680c2ac9aabda82acd23ebbd1f900fb6a889cd3, it was introduced in version v5.9 by commit 2121aa3e2312ccc1d6299154dc4f07a6ab8beee2. For more details please see the references link.
null
2022-04-25T05:53:24.053687Z
2022-04-24T21:20:15.140392Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2121aa3e2312ccc1d6299154dc4f07a6ab8beee2'}
Linux
GSD-2021-1002077
comedi: vmk80xx: fix bulk-buffer overflow
comedi: vmk80xx: fix bulk-buffer overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.79 by commit b7fd7f3387f070215e6be341e68eb5c087eeecc0, it was introduced in version v2.6.31 by commit 985cafccbf9b7f862aa1c5ee566801e18b5161fb. For more details please see the references link.
null
2021-12-20T01:21:52.405743Z
2021-11-14T15:18:48.623501Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/985cafccbf9b7f862aa1c5ee566801e18b5161fb'}
Linux
GSD-2021-1002563
KVM: MMU: shadow nested paging does not have PKU
KVM: MMU: shadow nested paging does not have PKU This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.7 by commit 87d9c628be264a4d2dbb9eb0e7d629aef8b66339. For more details please see the references link.
null
2021-12-20T00:28:54.417876Z
2021-12-19T19:42:48.357013Z
null
null
null
null
null
Linux
GSD-2021-1002099
can: peak_pci: peak_pci_remove(): fix UAF
can: peak_pci: peak_pci_remove(): fix UAF This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit 0e5afdc2315b0737edcf55bede4ee1640d2d464d, it was introduced in version v3.4 by commit e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd. For more details please see the references link.
null
2021-12-19T23:18:40.404776Z
2021-11-14T15:19:51.794662Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd'}
Linux
GSD-2022-1001033
habanalabs: fix possible memory leak in MMU DR fini
habanalabs: fix possible memory leak in MMU DR fini This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 30058d3a83cfe8c6aacbfe5ab13c01dd0c1799e3. For more details please see the references link.
null
2022-04-25T04:28:26.145666Z
2022-04-24T20:41:26.449290Z
null
null
null
null
null
Linux
GSD-2022-1001199
ibmvnic: fix race between xmit and reset
ibmvnic: fix race between xmit and reset This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 8507c6ade73cdbbbda5c3d31d67f52f2e1cf03fe, it was introduced in version v5.4 by commit 7ed5b31f4a6695a21f617df07646e9b15c6c1d29. For more details please see the references link.
null
2022-04-25T03:10:46.725420Z
2022-04-24T20:53:07.358680Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ed5b31f4a6695a21f617df07646e9b15c6c1d29'}
Linux
GSD-2021-1002133
nvme-tcp: fix possible req->offset corruption
nvme-tcp: fix possible req->offset corruption This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.16 by commit c7752ec9ad39708c85859ada3417d85bc4b6cf69, it was introduced in version v5.8 by commit db5ad6b7f8cdd6d78efef62a1557461d0cbaee54. For more details please see the references link.
null
2021-12-19T23:04:01.881552Z
2021-11-14T15:21:24.528193Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/db5ad6b7f8cdd6d78efef62a1557461d0cbaee54'}
Linux
GSD-2022-1001463
video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow
video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 6a5226e544ac043bb2d8dc1bfe8920d02282f7cd. For more details please see the references link.
null
2022-04-25T06:42:09.216285Z
2022-04-24T21:15:03.798086Z
null
null
null
null
null
Linux
GSD-2022-1001930
f2fs: quota: fix loop condition at f2fs_quota_sync()
f2fs: quota: fix loop condition at f2fs_quota_sync() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit f9156db0987f1b426015d56505e2c58dee70c90d, it was introduced in version v5.15 by commit 9de71ede81e6d1a111fdd868b2d78d459fa77f80. For more details please see the references link.
null
2022-04-25T06:42:16.247625Z
2022-04-24T21:55:54.262720Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9de71ede81e6d1a111fdd868b2d78d459fa77f80'}
Linux
GSD-2022-1000622
ARM: 9170/1: fix panic when kasan and kprobe are enabled
ARM: 9170/1: fix panic when kasan and kprobe are enabled This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit ba1863be105b06e10d0e2f6b1b8a0570801cfc71, it was introduced in version v2.6.25 by commit 35aa1df4328340f38edc46f00837f08d33d49f63. For more details please see the references link.
null
2022-03-07T01:57:32.564069Z
2022-02-27T03:32:22.611691Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/35aa1df4328340f38edc46f00837f08d33d49f63'}
Linux
GSD-2022-1000788
btrfs: get rid of warning on transaction commit when using flushoncommit
btrfs: get rid of warning on transaction commit when using flushoncommit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.27 by commit 850a77c999b81dd2724efd2684068d6f90db8c16. For more details please see the references link.
null
2022-03-18T02:57:25.832708Z
2022-03-18T00:18:03.109662Z
null
null
null
null
null
Linux
GSD-2021-1002830
ALSA: rawmidi - fix the uninitalized user_pversion
ALSA: rawmidi - fix the uninitalized user_pversion This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.12 by commit b398fcbe4de1e1100867fdb6f447c6fbc8fe7085, it was introduced in version v5.15 by commit 09d23174402da0f10e98da2c61bb5ac8e7d79fdd. For more details please see the references link.
null
2022-01-11T05:57:14.254246Z
2021-12-30T02:45:16.785006Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/09d23174402da0f10e98da2c61bb5ac8e7d79fdd'}
Linux
GSD-2022-1000272
net/mlx5: Use del_timer_sync in fw reset flow of halting poll
net/mlx5: Use del_timer_sync in fw reset flow of halting poll This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.20 by commit f895ebeb44d09d02674cfdd0cfc2bf687603918c, it was introduced in version v5.10 by commit 38b9f903f22b9baa5c4b9bfb07c8bbc49f5efbba. For more details please see the references link.
null
2022-02-19T10:25:24.469819Z
2022-02-18T22:04:42.913683Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/38b9f903f22b9baa5c4b9bfb07c8bbc49f5efbba'}
Linux
GSD-2022-1001875
media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED
media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit a09e9882800fdfc5aab93f77c3f0132071d2191b, it was introduced in version v3.7 by commit 8ac456495a33d9466076fea94594181ceefb76d9. For more details please see the references link.
null
2022-04-25T05:25:39.198055Z
2022-04-24T21:50:52.990592Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ac456495a33d9466076fea94594181ceefb76d9'}
Linux
GSD-2022-1000767
net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe()
net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.27 by commit ea372aab54903310756217d81610901a8e66cb7d, it was introduced in version v3.18 by commit 8c14f9c70327a6fb75534c4c61d7ea9c82ccf78f. For more details please see the references link.
null
2022-03-18T02:52:05.616220Z
2022-03-18T00:16:24.050166Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c14f9c70327a6fb75534c4c61d7ea9c82ccf78f'}
Linux
GSD-2022-1000337
misc: fastrpc: avoid double fput() on failed usercopy
misc: fastrpc: avoid double fput() on failed usercopy This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.180 by commit 4e6fd2b5fcf8e7119305a6042bd92e7f2b9ed215, it was introduced in version v5.1 by commit 6cffd79504ce040f460831030d3069fa1c99bb71. For more details please see the references link.
null
2022-03-07T01:33:33.672256Z
2022-02-27T02:53:01.703711Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6cffd79504ce040f460831030d3069fa1c99bb71'}
Linux
GSD-2021-1000948
drm: Lock pointer access in drm_master_release()
drm: Lock pointer access in drm_master_release() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.44 by commit aa8591a58cbd2986090709e4202881f18e8ae30e. For more details please see the references link.
null
2021-12-20T01:02:31.993267Z
2021-06-30T00:28:36.427423Z
null
null
null
null
null
Linux
GSD-2022-1001176
virt: acrn: fix a memory leak in acrn_dev_ioctl()
virt: acrn: fix a memory leak in acrn_dev_ioctl() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit f8e6e18d117e461110c849a11c6a396dcccdbd4e, it was introduced in version v5.12 by commit 9c5137aedd112f78a968bdd2325de2ea06df46c0. For more details please see the references link.
null
2022-04-25T06:40:56.896502Z
2022-04-24T20:50:52.731877Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9c5137aedd112f78a968bdd2325de2ea06df46c0'}
Linux
GSD-2021-1002426
nfp: Fix memory leak in nfp_cpp_area_cache_add()
nfp: Fix memory leak in nfp_cpp_area_cache_add() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.221 by commit eb51f639ef3fd5498b7def290ed8681b6aadd9a7, it was introduced in version v4.11 by commit 4cb584e0ee7df70fd0376aee60cf701855ea8c81. For more details please see the references link.
null
2021-12-19T23:17:10.025321Z
2021-12-19T19:36:49.219210Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4cb584e0ee7df70fd0376aee60cf701855ea8c81'}
Linux
GSD-2022-1001526
mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init
mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 8baea2b96fa90af8d0f937caf4cf2105ee094d93, it was introduced in version v4.12 by commit f88fc122cc34c2545dec9562eaab121494e401ef. For more details please see the references link.
null
2022-04-25T04:32:59.306360Z
2022-04-24T21:20:10.432839Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f88fc122cc34c2545dec9562eaab121494e401ef'}
Linux
GSD-2021-1002076
comedi: vmk80xx: fix transfer-buffer overflows
comedi: vmk80xx: fix transfer-buffer overflows This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.79 by commit 33d7a470730dfe7c9bfc8da84575cf2cedd60d00, it was introduced in version v2.6.31 by commit 985cafccbf9b7f862aa1c5ee566801e18b5161fb. For more details please see the references link.
null
2021-12-20T00:35:45.263886Z
2021-11-14T15:18:46.279201Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/985cafccbf9b7f862aa1c5ee566801e18b5161fb'}
Linux
GSD-2022-1002023
ACPI: CPPC: Avoid out of bounds access when parsing _CPC data
ACPI: CPPC: Avoid out of bounds access when parsing _CPC data This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit e5b681822cac1f8093759b02e16c06b2c64b6788, it was introduced in version v4.4 by commit 337aadff8e4567e39669e07d9a88b789d78458b5. For more details please see the references link.
null
2022-04-25T04:31:00.924680Z
2022-04-24T22:03:41.237617Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/337aadff8e4567e39669e07d9a88b789d78458b5'}
Linux
GSD-2021-1001089
net: bridge: fix vlan tunnel dst null pointer dereference
net: bridge: fix vlan tunnel dst null pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit abb02e05cb1c0a30dd873a29f33bc092067dc35d, it was introduced in version v4.11 by commit 11538d039ac6efcf4f1a6c536e1b87cd3668a9fd. For more details please see the references link.
null
2021-12-20T01:30:52.495886Z
2021-06-30T00:38:53.174071Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/11538d039ac6efcf4f1a6c536e1b87cd3668a9fd'}
Linux
GSD-2021-1001573
xen/x86: fix PV trap handling on secondary processors
xen/x86: fix PV trap handling on secondary processors This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.209 by commit 9cb9be56013c0c54a9b442ccc1535b06e47b81e3, it was introduced in version v2.6.23 by commit f87e4cac4f4e940b328d3deb5b53e642e3881f43. For more details please see the references link.
null
2021-12-19T23:45:38.098092Z
2021-10-19T16:24:23.896721Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f87e4cac4f4e940b328d3deb5b53e642e3881f43'}
Linux
GSD-2022-1002473
drm/imx: Fix memory leak in imx_pd_connector_get_modes
drm/imx: Fix memory leak in imx_pd_connector_get_modes This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit d2c2758cfb0262637fd93350bdc8ad485fb1dd61, it was introduced in version v4.8 by commit 76ecd9c9fb24b014a6f33fbb1287ede3be12158b. For more details please see the references link.
null
2022-04-25T05:20:25.157194Z
2022-04-24T22:52:08.997768Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/76ecd9c9fb24b014a6f33fbb1287ede3be12158b'}
Linux
GSD-2021-1001123
cfg80211: call cfg80211_leave_ocb when switching away from OCB
cfg80211: call cfg80211_leave_ocb when switching away from OCB This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.47 by commit 6a07cf36064afb14849d8e038fcca3538fe94bd4. For more details please see the references link.
null
2021-12-19T22:07:05.131577Z
2021-07-08T01:57:59.513620Z
null
null
null
null
null
Linux
GSD-2022-1002189
scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one()
scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 34a47f7ddb4fd1cbd12397aa6f7dad1de08b4050, it was introduced in version v2.6.23 by commit 45804fbb00eea27bdf4d62751681228a9e2844e9. For more details please see the references link.
null
2022-04-25T06:47:05.255132Z
2022-04-24T22:20:18.612884Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/45804fbb00eea27bdf4d62751681228a9e2844e9'}
Linux
GSD-2021-1000698
NFC: nci: fix memory leak in nci_allocate_device
NFC: nci: fix memory leak in nci_allocate_device This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.271 by commit 4a621621c7af3cec21c47c349b30cd9c3cea11c8, it was introduced in version v4.0 by commit 11f54f228643d0248ec00ce8c9fb8d872f87e7b8. For more details please see the references link.
null
2021-12-20T01:10:07.023571Z
2021-06-04T20:04:52.158543Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/11f54f228643d0248ec00ce8c9fb8d872f87e7b8'}
Linux
GSD-2021-1000362
powerpc/64s: Fix pte update for kernel memory on radix
powerpc/64s: Fix pte update for kernel memory on radix This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 84c0762633f2a7ac8399e6b97d3b9bb8e6e1d50f, it was introduced in version v4.18 by commit f1cb8f9beba8699dd1b4518418191499e53f7b17. For more details please see the references link.
null
2021-12-20T01:03:36.674859Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f1cb8f9beba8699dd1b4518418191499e53f7b17'}
Linux
GSD-2021-1000732
pid: take a reference when initializing `cad_pid`
pid: take a reference when initializing `cad_pid` This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.236 by commit 4dbd8808a591b49b717862e6e0081bcf14a87788, it was introduced in version v2.6.19 by commit 9ec52099e4b8678a60e9f93e41ad87885d64f3e6. For more details please see the references link.
null
2021-12-19T22:56:28.820205Z
2021-06-24T23:59:51.180762Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9ec52099e4b8678a60e9f93e41ad87885d64f3e6'}
Linux
GSD-2021-1001820
ocfs2: fix data corruption after conversion from inline format
ocfs2: fix data corruption after conversion from inline format This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.156 by commit b05caf023b14cbed9223bb5b48ecc7bffe38f632, it was introduced in version v5.4.75 by commit f8a6a2ed4b7d1c3c8631eeb6d00572bc853094a8. For more details please see the references link.
null
2021-12-19T22:59:57.317277Z
2021-10-28T13:50:37.445765Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f8a6a2ed4b7d1c3c8631eeb6d00572bc853094a8'}
Linux
GSD-2021-1000227
RDMA/siw: Fix a use after free in siw_alloc_mr
RDMA/siw: Fix a use after free in siw_alloc_mr This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit ad9ce7188432650469a6c7625bf479f5ed0b6155, it was introduced in version v5.3 by commit 2251334dcac9eb337575d8767e2a6a7e81848f7f. For more details please see the references link.
null
2021-12-19T22:39:34.259293Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2251334dcac9eb337575d8767e2a6a7e81848f7f'}
Linux
GSD-2022-1000858
netfilter: nf_tables: fix memory leak during stateful obj update
netfilter: nf_tables: fix memory leak during stateful obj update This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.103 by commit 7e9880e81d3fd6a43c202f205717485290432826, it was introduced in version v5.4 by commit d62d0ba97b5803183e70cfded7f7b9da76893bf5. For more details please see the references link.
null
2022-03-18T02:55:29.851023Z
2022-03-18T00:25:07.807050Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d62d0ba97b5803183e70cfded7f7b9da76893bf5'}
Linux
GSD-2021-1000677
NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()
NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.235 by commit c757c1f1e65d89429db1409429436cf40d47c008, it was introduced in version v4.0 by commit a7d42ddb3099727f58366fa006f850a219cce6c8. For more details please see the references link.
null
2021-12-19T22:46:12.814127Z
2021-06-04T20:00:03.250554Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a7d42ddb3099727f58366fa006f850a219cce6c8'}
Linux
GSD-2021-1001965
regmap: Fix possible double-free in regcache_rbtree_exit()
regmap: Fix possible double-free in regcache_rbtree_exit() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.254 by commit 758ced2c3878ff789801e6fee808e185c5cf08d6, it was introduced in version v3.12 by commit 3f4ff561bc88b074d5e868dde4012d89cbb06c87. For more details please see the references link.
null
2021-12-19T23:05:26.254312Z
2021-11-14T15:13:43.042520Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f4ff561bc88b074d5e868dde4012d89cbb06c87'}
Linux
GSD-2021-1001436
KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow
KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.277 by commit 8c46b4b2749c4b3b7e602403addc32ec2b48baed, it was introduced in version v3.10 by commit 8e591cb7204739efa8e15967ea334eb367039dde. For more details please see the references link.
null
2021-12-20T01:34:34.493442Z
2021-08-03T02:40:34.517306Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8e591cb7204739efa8e15967ea334eb367039dde'}
Linux
GSD-2022-1002166
net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link
net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.190 by commit 7e59fdf9547c4f948d1d917ec7ffa5fb5ac53bdb, it was introduced in version v4.8 by commit fb3bbdb859891e6bc27fd1afb3a07319f82c2ee4. For more details please see the references link.
null
2022-04-25T04:50:32.960942Z
2022-04-24T22:17:47.175197Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb3bbdb859891e6bc27fd1afb3a07319f82c2ee4'}
Linux
GSD-2021-1001066
net: qrtr: fix OOB Read in qrtr_endpoint_post
net: qrtr: fix OOB Read in qrtr_endpoint_post This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit 19892ab9c9d838e2e5a7744d36e4bb8b7c3292fe, it was introduced in version v4.15 by commit 194ccc88297ae78d0803adad83c6dcc369787c9e. For more details please see the references link.
null
2021-12-19T23:12:54.704076Z
2021-06-30T00:37:24.543079Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/194ccc88297ae78d0803adad83c6dcc369787c9e'}
Linux
GSD-2022-1000225
RDMA/ucma: Protect mc during concurrent multicast leaves
RDMA/ucma: Protect mc during concurrent multicast leaves This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.99 by commit 75c610212b9f1756b9384911d3a2c347eee8031c, it was introduced in version v5.10 by commit 95fe51096b7adf1d1e7315c49c75e2f75f162584. For more details please see the references link.
null
2022-02-19T03:07:18.725539Z
2022-02-18T21:57:36.059074Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/95fe51096b7adf1d1e7315c49c75e2f75f162584'}
Linux
GSD-2022-1002218
ntfs: add sanity check on allocation size
ntfs: add sanity check on allocation size This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit fe41ad8be036a3de3e4bdde709551aeb4de2fe7d. For more details please see the references link.
null
2022-04-25T06:48:59.270001Z
2022-04-24T22:22:45.022664Z
null
null
null
null
null
Linux
GSD-2021-1001748
blktrace: Fix uaf in blk_trace access after removing by sysfs
blktrace: Fix uaf in blk_trace access after removing by sysfs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.9 by commit a5f8e86192612d0183047448d8bbe7918b3f1a26, it was introduced in version v2.6.30 by commit c71a896154119f4ca9e89d6078f5f63ad60ef199. For more details please see the references link.
null
2021-12-19T22:31:28.406195Z
2021-10-19T16:34:48.748577Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c71a896154119f4ca9e89d6078f5f63ad60ef199'}