ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2021-1001460 | atm: iphase: fix possible use-after-free in ia_module_exit() | atm: iphase: fix possible use-after-free in ia_module_exit()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.276 by commit a832ee2f2145f57443b2d565f8cb5490e8339f42. For more details please see the references link. | null | 2021-12-19T22:50:29.398779Z | 2021-08-03T02:47:23.762652Z | null | null | null | null | null |
Linux | GSD-2021-1000621 | net: fec: fix the potential memory leak in fec_enet_init() | net: fec: fix the potential memory leak in fec_enet_init()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.124 by commit 20255d41ac560397b6a07d8d87dcc5e2efc7672a, it was introduced in version v3.18 by commit 59d0f746564495c7f54526674deabfcf101236a1. For more details please see the references link. | null | 2021-12-19T23:09:13.698036Z | 2021-06-04T19:49:05.826710Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/59d0f746564495c7f54526674deabfcf101236a1'} |
Linux | GSD-2021-1001933 | NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() | NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.288 by commit a67d47e32c91e2b10402cb8c081774cbf08edb2e, it was introduced in version v3.13 by commit 1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8. For more details please see the references link. | null | 2021-12-20T00:10:49.669110Z | 2021-11-14T15:12:18.131633Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8'} |
Linux | GSD-2021-1001899 | drm/msm: Fix null pointer dereference on pointer edp | drm/msm: Fix null pointer dereference on pointer edp
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit 46c8ddede0273d1d132beefa9de8b820326982be, it was introduced in version v4.0 by commit ab5b0107ccf3821a6837b0f2819270d6fa0b278f. For more details please see the references link. | null | 2021-12-19T23:22:15.295713Z | 2021-10-28T13:54:44.439069Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab5b0107ccf3821a6837b0f2819270d6fa0b278f'} |
Linux | GSD-2021-1000271 | media: [next] staging: media: atomisp: fix memory leak of object flash | media: [next] staging: media: atomisp: fix memory leak of object flash
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 27d2eab69f7da8e94e4751ac5c6d22d809275484, it was introduced in version v5.10 by commit 9289cdf399922a1bd801a8cd946a79581c00a380. For more details please see the references link. | null | 2021-12-19T22:51:55.441370Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9289cdf399922a1bd801a8cd946a79581c00a380'} |
Linux | GSD-2022-1002219 | ext4: don't BUG if someone dirty pages without asking ext4 first | ext4: don't BUG if someone dirty pages without asking ext4 first
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 5a016c053f426a73752c3b41b60b497b58694d48. For more details please see the references link. | null | 2022-04-25T04:28:39.095138Z | 2022-04-24T22:22:47.897251Z | null | null | null | null | null |
Linux | GSD-2022-1000224 | RDMA/cma: Use correct address when leaving multicast group | RDMA/cma: Use correct address when leaving multicast group
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.99 by commit 371979069a577ee5bc1bcaaa39fb53d9e4dc7e3f, it was introduced in version v5.10 by commit b5de0c60cc30c2a3513c7188c73f3f29acc29234. For more details please see the references link. | null | 2022-02-20T02:14:25.124010Z | 2022-02-18T21:57:29.228335Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b5de0c60cc30c2a3513c7188c73f3f29acc29234'} |
Linux | GSD-2021-1001749 | md: fix a lock order reversal in md_alloc | md: fix a lock order reversal in md_alloc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.9 by commit a46d5e3603bdc8e36b518a67cf9073a107906b68, it was introduced in version v3.0 by commit b0140891a8cea36469f58d23859e599b1122bd37. For more details please see the references link. | null | 2021-12-19T23:25:27.063657Z | 2021-10-19T16:34:51.520723Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b0140891a8cea36469f58d23859e599b1122bd37'} |
Linux | GSD-2022-1001966 | gpio: Restrict usage of GPIO chip irq members before initialization | gpio: Restrict usage of GPIO chip irq members before initialization
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit 7e88a50704b0c49ad3f2d11e8b963341cf68a89f. For more details please see the references link. | null | 2022-04-25T04:25:32.895865Z | 2022-04-24T21:59:13.527485Z | null | null | null | null | null |
Linux | GSD-2022-1000674 | net, neigh: Do not trigger immediate probes on NUD_FAILED from neigh_managed_work | net, neigh: Do not trigger immediate probes on NUD_FAILED from neigh_managed_work
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.8 by commit 203a35ebb49cdce377416b0690215d3ce090d364, it was introduced in version v5.16 by commit 7482e3841d520a368426ac196720601687e2dc47. For more details please see the references link. | null | 2022-03-07T01:36:59.897590Z | 2022-02-27T03:39:32.937208Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7482e3841d520a368426ac196720601687e2dc47'} |
Linux | GSD-2021-1001319 | net: fddi: fix UAF in fza_probe | net: fddi: fix UAF in fza_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.135 by commit 04b06716838bfc26742dbed3ae1d3697fe5317ee, it was introduced in version v4.20 by commit 61414f5ec9834df8aa4f55c90de16b71a3d6ca8d. For more details please see the references link. | null | 2021-12-20T00:18:33.943288Z | 2021-08-03T02:07:18.335576Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61414f5ec9834df8aa4f55c90de16b71a3d6ca8d'} |
Linux | GSD-2022-1001435 | can: mcba_usb: properly check endpoint type | can: mcba_usb: properly check endpoint type
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 88272b4a37913bdf6f339162a7920bd8e9b49de2, it was introduced in version v4.12 by commit 51f3baad7de943780ce0c17bd7975df567dd6e14. For more details please see the references link. | null | 2022-04-25T04:21:34.134539Z | 2022-04-24T21:12:54.032393Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/51f3baad7de943780ce0c17bd7975df567dd6e14'} |
Linux | GSD-2021-1000158 | vhost-vdpa: fix vm_flags for virtqueue doorbell mapping | vhost-vdpa: fix vm_flags for virtqueue doorbell mapping
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.36 by commit 3b8b6399666a29daa30b0bb3f5c9e3fc81c5a6a6, it was introduced in version v5.8 by commit ddd89d0a059d8e9740c75a97e0efe9bf07ee51f9. For more details please see the references link. | null | 2021-12-19T23:49:19.467719Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ddd89d0a059d8e9740c75a97e0efe9bf07ee51f9'} |
Linux | GSD-2021-1002165 | netfilter: xt_IDLETIMER: fix panic that occurs when timer_type has garbage value | netfilter: xt_IDLETIMER: fix panic that occurs when timer_type has garbage value
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 902c0b1887522a099aa4e1e6b4b476c2fe5dd13e, it was introduced in version v5.7 by commit 68983a354a655c35d3fb204489d383a2a051fda7. For more details please see the references link. | null | 2021-12-20T00:19:13.134500Z | 2021-11-14T15:22:51.685265Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/68983a354a655c35d3fb204489d383a2a051fda7'} |
Linux | GSD-2022-1001065 | tcp: Don't acquire inet_listen_hashbucket::lock with disabled BH. | tcp: Don't acquire inet_listen_hashbucket::lock with disabled BH.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 20a0b7c3279ab6e5b2ea942d2d64855a6136d6a9. For more details please see the references link. | null | 2022-04-25T04:45:25.740110Z | 2022-04-24T20:43:11.195543Z | null | null | null | null | null |
Linux | GSD-2021-1000508 | platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios | platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.40 by commit 0cf036a0d325200e6c27b90908e51195bbc557b1, it was introduced in version v4.15 by commit 1a258e670434f404a4500b65ba1afea2c2b29bba. For more details please see the references link. | null | 2021-12-20T00:04:29.879775Z | 2021-05-31T23:47:56.267769Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1a258e670434f404a4500b65ba1afea2c2b29bba'} |
Linux | GSD-2021-1002535 | ice: avoid bpf_prog refcount underflow | ice: avoid bpf_prog refcount underflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.6 by commit 1f10b09ccc832698ef4624a6ab9a213b6ccbda76, it was introduced in version v5.5 by commit efc2214b6047b6f5b4ca53151eba62521b9452d6. For more details please see the references link. | null | 2021-12-19T22:01:54.209153Z | 2021-12-19T19:41:39.367399Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/efc2214b6047b6f5b4ca53151eba62521b9452d6'} |
Linux | GSD-2021-1002020 | net: batman-adv: fix error handling | net: batman-adv: fix error handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.157 by commit 6422e8471890273994fe8cc6d452b0dcd2c9483e, it was introduced in version v2.6.38 by commit c6c8fea29769d998d94fcec9b9f14d4b52b349d3. For more details please see the references link. | null | 2021-12-19T23:06:19.191913Z | 2021-11-14T15:16:14.076917Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6c8fea29769d998d94fcec9b9f14d4b52b349d3'} |
Linux | GSD-2022-1001570 | ASoC: codecs: rx-macro: fix accessing array out of bounds for enum type | ASoC: codecs: rx-macro: fix accessing array out of bounds for enum type
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 7e3629e256d1cabf801d00050550ade4d036cafe, it was introduced in version v5.12 by commit 4f692926f562ff48abfcca6b16f36ff8d57473b6. For more details please see the references link. | null | 2022-04-25T02:59:14.015686Z | 2022-04-24T21:24:47.683587Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4f692926f562ff48abfcca6b16f36ff8d57473b6'} |
Linux | GSD-2021-1002470 | ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE | ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.83 by commit 0effb7f51b65840bb129f52ddc765105c48c87ba, it was introduced in version v3.8 by commit 9c4566a117a6fe404a0e49b27ac71b631945a70f. For more details please see the references link. | null | 2021-12-19T22:16:19.103843Z | 2021-12-19T19:38:42.545144Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9c4566a117a6fe404a0e49b27ac71b631945a70f'} |
Linux | GSD-2022-1001120 | ubifs: rename_whiteout: Fix double free for whiteout_ui->data | ubifs: rename_whiteout: Fix double free for whiteout_ui->data
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 6d7a158a7363c1f6604aa47ae1a280a5c65123dd, it was introduced in version v4.9 by commit 9e0a1fff8db56eaaebb74b4a3ef65f86811c4798. For more details please see the references link. | null | 2022-04-25T05:08:43.066155Z | 2022-04-24T20:47:19.180491Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9e0a1fff8db56eaaebb74b4a3ef65f86811c4798'} |
Linux | GSD-2022-1001989 | jfs: prevent NULL deref in diFree | jfs: prevent NULL deref in diFree
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit b9c5ac0a15f24d63b20f899072fa6dd8c93af136. For more details please see the references link. | null | 2022-04-25T05:37:08.357193Z | 2022-04-24T22:01:33.131414Z | null | null | null | null | null |
Linux | GSD-2022-1000361 | usb: f_fs: Fix use-after-free for epfile | usb: f_fs: Fix use-after-free for epfile
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.101 by commit 0042178a69eb77a979e36a50dcce9794a3140ef8, it was introduced in version v4.9 by commit a9e6f83c2df199187a5248f824f31b6787ae23ae. For more details please see the references link. | null | 2022-03-07T01:44:22.156476Z | 2022-02-27T02:56:28.827821Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a9e6f83c2df199187a5248f824f31b6787ae23ae'} |
Linux | GSD-2022-1001823 | net: bcmgenet: Use stronger register read/writes to assure ordering | net: bcmgenet: Use stronger register read/writes to assure ordering
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 06d836801cd82ded282aaf9e888ff9e7e4a88b91, it was introduced in version v4.14 by commit 69d2ea9c798983c4a7157278ec84ff969d1cd8e8. For more details please see the references link. | null | 2022-04-25T06:14:39.073926Z | 2022-04-24T21:45:24.584526Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69d2ea9c798983c4a7157278ec84ff969d1cd8e8'} |
Linux | GSD-2022-1000731 | iio: adc: tsc2046: fix memory corruption by preventing array overflow | iio: adc: tsc2046: fix memory corruption by preventing array overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.12 by commit 082d2c047b0d305bb0b6e9f9d671a09470e2db2d, it was introduced in version v5.14 by commit 9374e8f5a38defe90bc65b2decf317c1c62d91dd. For more details please see the references link. | null | 2022-03-18T03:00:03.606731Z | 2022-03-18T00:13:08.815825Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9374e8f5a38defe90bc65b2decf317c1c62d91dd'} |
Linux | GSD-2021-1001088 | net: ll_temac: Make sure to free skb when it is completely used | net: ll_temac: Make sure to free skb when it is completely used
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit e8afe05bd359ebe12a61dbdc94c06c00ea3e8d4b. For more details please see the references link. | null | 2021-12-19T22:02:52.640195Z | 2021-06-30T00:38:49.320920Z | null | null | null | null | null |
Linux | GSD-2022-1002022 | io_uring: fix memory leak of uid in files registration | io_uring: fix memory leak of uid in files registration
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit b27de7011cb3ba14b047be2cee0ed8278368665b, it was introduced in version v5.5 by commit 08a451739a9b5783f67de51e84cb6d9559bb9dc4. For more details please see the references link. | null | 2022-04-25T06:19:16.293295Z | 2022-04-24T22:03:32.681559Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/08a451739a9b5783f67de51e84cb6d9559bb9dc4'} |
Linux | GSD-2021-1001572 | net: macb: fix use after free on rmmod | net: macb: fix use after free on rmmod
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.209 by commit 46670fb832ee80943715df618632ca13c2e96f2b. For more details please see the references link. | null | 2021-12-20T00:55:06.293251Z | 2021-10-19T16:24:21.339735Z | null | null | null | null | null |
Linux | GSD-2022-1002472 | virtio_console: eliminate anonymous module_init & module_exit | virtio_console: eliminate anonymous module_init & module_exit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit 93e3d88321d2274fa4e26b006e19cc10fec331c2. For more details please see the references link. | null | 2022-04-25T05:02:32.844319Z | 2022-04-24T22:52:00.927742Z | null | null | null | null | null |
Linux | GSD-2022-1002188 | Drivers: hv: vmbus: Fix potential crash on module unload | Drivers: hv: vmbus: Fix potential crash on module unload
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 2133c422a103cf7c7768c37b9ac382e73b691892, it was introduced in version v5.4.35 by commit 9f38f7b46de0747c1909e8c557aa21715dce20c5. For more details please see the references link. | null | 2022-04-25T02:59:42.691425Z | 2022-04-24T22:20:06.224138Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9f38f7b46de0747c1909e8c557aa21715dce20c5'} |
Linux | GSD-2021-1001122 | mac80211: remove warning in ieee80211_get_sband() | mac80211: remove warning in ieee80211_get_sband()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.47 by commit 8cfe765afd5a8d127770780f45fd971a28897484. For more details please see the references link. | null | 2021-12-19T22:22:09.481950Z | 2021-07-08T01:57:47.673199Z | null | null | null | null | null |
Linux | GSD-2021-1000699 | mld: fix panic in mld_newpack() | mld: fix panic in mld_newpack()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.271 by commit 0e35b7457b7b6e73ffeaaca1a577fdf1af0feca1, it was introduced in version v2.6.35 by commit 72e09ad107e78d69ff4d3b97a69f0aad2b77280f. For more details please see the references link. | null | 2021-12-19T23:39:47.939202Z | 2021-06-04T20:05:15.246569Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/72e09ad107e78d69ff4d3b97a69f0aad2b77280f'} |
Linux | GSD-2021-1000363 | iommu/vt-d: Remove WO permissions on second-level paging entries | iommu/vt-d: Remove WO permissions on second-level paging entries
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit c848416cc05afc1589edba04fe00b85c2f797ee3, it was introduced in version v5.6 by commit b802d070a52a1565b47daaa808872cfbd4a17b01. For more details please see the references link. | null | 2021-12-20T00:42:36.305553Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b802d070a52a1565b47daaa808872cfbd4a17b01'} |
Linux | GSD-2021-1000733 | ocfs2: fix data corruption by fallocate | ocfs2: fix data corruption by fallocate
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.236 by commit a1700479524bb9cb5e8ae720236a6fabd003acae, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T00:26:27.122287Z | 2021-06-24T23:59:54.762055Z | null | null | null | null | null |
Linux | GSD-2021-1001821 | can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv | can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.156 by commit a0e47d2833b4f65e6c799f28c6b636d36b8b936d, it was introduced in version v5.4 by commit 9d71dd0c70099914fcd063135da3c580865e924c. For more details please see the references link. | null | 2021-12-19T22:21:01.834184Z | 2021-10-28T13:50:40.108102Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9d71dd0c70099914fcd063135da3c580865e924c'} |
Linux | GSD-2021-1000226 | mm: memcontrol: slab: fix obtain a reference to a freeing memcg | mm: memcontrol: slab: fix obtain a reference to a freeing memcg
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit c3ae6a3f3ca4f02f6ccddf213c027302586580d0, it was introduced in version v5.11 by commit 3de7d4f25a7438f09fef4e71ef111f1805cd8e7c. For more details please see the references link. | null | 2021-12-20T01:08:18.492872Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3de7d4f25a7438f09fef4e71ef111f1805cd8e7c'} |
Linux | GSD-2022-1000859 | nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() | nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.103 by commit af4bc921d39dffdb83076e0a7eed1321242b7d87, it was introduced in version v5.1 by commit 20cce88650981ec504d328dbbdd004d991eb8535. For more details please see the references link. | null | 2022-03-18T03:43:48.358582Z | 2022-03-18T00:25:14.142247Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/20cce88650981ec504d328dbbdd004d991eb8535'} |
Linux | GSD-2021-1000676 | Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails | Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.235 by commit 6f6ac2a7959b1864886d07fcf3b9cec587dfe635, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T22:51:56.187825Z | 2021-06-04T19:59:59.480015Z | null | null | null | null | null |
Linux | GSD-2021-1001964 | IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields | IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.255 by commit 60833707b968d5ae02a75edb7886dcd4a957cf0d, it was introduced in version v2.6.35 by commit f931551bafe1f10ded7f5282e2aa162c267a2e5d. For more details please see the references link. | null | 2021-12-19T22:59:30.236456Z | 2021-11-14T15:13:40.660428Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f931551bafe1f10ded7f5282e2aa162c267a2e5d'} |
Linux | GSD-2021-1001437 | netrom: Decrease sock refcount when sock timers expire | netrom: Decrease sock refcount when sock timers expire
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.277 by commit a01634bf91f2b6c42583770eb6815fb6d1e251cf, it was introduced in version v4.9.155 by commit baa9e32336bf6d0d74a7c3486d2a27feaf57cd5f. For more details please see the references link. | null | 2021-12-19T23:39:00.086561Z | 2021-08-03T02:40:49.666772Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/baa9e32336bf6d0d74a7c3486d2a27feaf57cd5f'} |
Linux | GSD-2022-1002167 | net/smc: Fix NULL pointer dereference in smc_pnet_find_ib() | net/smc: Fix NULL pointer dereference in smc_pnet_find_ib()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.190 by commit a05f5e26cb8bb4d07e0595545fcad1bb406f0085, it was introduced in version v5.1 by commit af5f60c7e3d593c2fa31b9a62c16eae75f074de3. For more details please see the references link. | null | 2022-04-25T03:11:06.045397Z | 2022-04-24T22:17:53.184156Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/af5f60c7e3d593c2fa31b9a62c16eae75f074de3'} |
Linux | GSD-2021-1001067 | bpf: Fix leakage under speculation on mispredicted branches | bpf: Fix leakage under speculation on mispredicted branches
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit 4a99047ed51c98a09a537fe2c12420d815dfe296, it was introduced in version v4.15 by commit b2157399cc9898260d6031c5bfe45fe137c1fbe7. For more details please see the references link. | null | 2021-12-20T01:09:28.434018Z | 2021-06-30T00:37:28.368111Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b2157399cc9898260d6031c5bfe45fe137c1fbe7'} |
Linux | GSD-2021-1002562 | net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources() | net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.7 by commit 75917372eef0dbfb290ae45474314d35f97aea18, it was introduced in version v4.7 by commit ec25bc04ed8e12947738468cbe2191f1529f9e39. For more details please see the references link. | null | 2021-12-20T01:19:55.142183Z | 2021-12-19T19:42:45.887899Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ec25bc04ed8e12947738468cbe2191f1529f9e39'} |
Linux | GSD-2022-1001032 | xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu>=32 | xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu>=32
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit b6f6b353d6c765b83c9e5e518a44ca1ae40fe227. For more details please see the references link. | null | 2022-04-25T05:47:10.535431Z | 2022-04-24T20:41:23.570789Z | null | null | null | null | null |
Linux | GSD-2021-1002098 | ptp: Fix possible memory leak in ptp_clock_register() | ptp: Fix possible memory leak in ptp_clock_register()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit 95c0a0c5ec8839f8f21672be786e87a100319ca8, it was introduced in version v5.5 by commit a33121e5487b424339636b25c35d3a180eaa5f5e. For more details please see the references link. | null | 2021-12-20T01:21:19.027983Z | 2021-11-14T15:19:49.369533Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a33121e5487b424339636b25c35d3a180eaa5f5e'} |
Linux | GSD-2021-1002132 | IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields | IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.16 by commit 0d4395477741608d123dad51def9fe50b7ebe952, it was introduced in version v2.6.35 by commit f931551bafe1f10ded7f5282e2aa162c267a2e5d. For more details please see the references link. | null | 2021-12-20T00:03:58.732386Z | 2021-11-14T15:21:22.182586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f931551bafe1f10ded7f5282e2aa162c267a2e5d'} |
Linux | GSD-2022-1001198 | Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt | Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 6d7be5afbb41c918d2f12f857f8c7efa50500be2, it was introduced in version v5.2 by commit 9aebfd4a2200ab8075e44379c758bccefdc589bb. For more details please see the references link. | null | 2022-04-25T06:56:15.082021Z | 2022-04-24T20:53:01.852034Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9aebfd4a2200ab8075e44379c758bccefdc589bb'} |
Linux | GSD-2022-1001462 | media: ir_toy: free before error exiting | media: ir_toy: free before error exiting
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 382e0f6958ef34eb093127b6d74c12f3b8fd0904. For more details please see the references link. | null | 2022-04-25T04:36:01.025132Z | 2022-04-24T21:15:00.871640Z | null | null | null | null | null |
Linux | GSD-2022-1001931 | tpm: use try_get_ops() in tpm-space.c | tpm: use try_get_ops() in tpm-space.c
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.32 by commit 476ddd23f818fb94cf86fb5617f3bb9a7c92113d. For more details please see the references link. | null | 2022-04-25T05:17:28.424920Z | 2022-04-24T21:55:57.200713Z | null | null | null | null | null |
Linux | GSD-2022-1000623 | net: fix information leakage in /proc/net/ptype | net: fix information leakage in /proc/net/ptype
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.5 by commit 839ec7039513a4f84bfbaff953a9393471176bee, it was introduced in version v2.6.26 by commit 2feb27dbe00cbb4f7d31f90acf6bd0d751dd0a50. For more details please see the references link. | null | 2022-03-07T01:41:40.408810Z | 2022-02-27T03:32:29.164993Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2feb27dbe00cbb4f7d31f90acf6bd0d751dd0a50'} |
Linux | GSD-2021-1002831 | ipmi: ssif: initialize ssif_info->client early | ipmi: ssif: initialize ssif_info->client early
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.12 by commit 77a7311ca167aa5b7055c549a940a56e73ee5f29, it was introduced in version v5.4 by commit c4436c9149c5d2bc0c49ab57ec85c75ea1c4d61c. For more details please see the references link. | null | 2022-01-11T05:54:59.902893Z | 2021-12-30T02:45:19.010076Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c4436c9149c5d2bc0c49ab57ec85c75ea1c4d61c'} |
Linux | GSD-2022-1000789 | sched/fair: Fix fault in reweight_entity | sched/fair: Fix fault in reweight_entity
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.27 by commit e0bcd6b5779352aed88f2e538a82a39f1a7715bb, it was introduced in version v5.15.3 by commit 3869eecf050416a1d19bac60926f6b5d64b0aa58. For more details please see the references link. | null | 2022-03-18T02:50:24.655312Z | 2022-03-18T00:18:05.790718Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3869eecf050416a1d19bac60926f6b5d64b0aa58'} |
Linux | GSD-2022-1000273 | ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback | ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.20 by commit 86186352e36db1dc8906c855fae41f2a966f3bca, it was introduced in version v5.10 by commit f33d9e2b48a34e1558b67a473a1fc1d6e793f93c. For more details please see the references link. | null | 2022-02-20T06:17:13.558513Z | 2022-02-18T22:04:49.926568Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f33d9e2b48a34e1558b67a473a1fc1d6e793f93c'} |
Linux | GSD-2022-1001874 | ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe | ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit a0bc36b247dcf4d21bf820bfc4bcbaf7f6cf19b5, it was introduced in version v3.8 by commit 531f67e41dcde1e358cf821d056241a66355cf03. For more details please see the references link. | null | 2022-04-25T03:13:28.972887Z | 2022-04-24T21:50:42.521052Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/531f67e41dcde1e358cf821d056241a66355cf03'} |
Linux | GSD-2022-1000766 | auxdisplay: lcd2s: Fix memory leak in ->remove() | auxdisplay: lcd2s: Fix memory leak in ->remove()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.27 by commit 5d53cd33f4253aa4cf02bf7e670b3c6a99674351, it was introduced in version v5.11 by commit 8c9108d014c5bd0f0da2e3544eb45dc56a6da92b. For more details please see the references link. | null | 2022-03-18T02:58:08.452607Z | 2022-03-18T00:16:13.715892Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c9108d014c5bd0f0da2e3544eb45dc56a6da92b'} |
Linux | GSD-2022-1000336 | usb: f_fs: Fix use-after-free for epfile | usb: f_fs: Fix use-after-free for epfile
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.180 by commit c9fc422c9a43e3d58d246334a71f3390401781dc, it was introduced in version v4.9 by commit a9e6f83c2df199187a5248f824f31b6787ae23ae. For more details please see the references link. | null | 2022-03-07T01:38:00.221715Z | 2022-02-27T02:52:55.012225Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a9e6f83c2df199187a5248f824f31b6787ae23ae'} |
Linux | GSD-2021-1000949 | kvm: avoid speculation-based attacks from out-of-range memslot accesses | kvm: avoid speculation-based attacks from out-of-range memslot accesses
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.44 by commit 7af299b97734c7e7f465b42a2139ce4d77246975. For more details please see the references link. | null | 2021-12-20T00:18:16.160002Z | 2021-06-30T00:28:40.078550Z | null | null | null | null | null |
Linux | GSD-2022-1001177 | clk: visconti: prevent array overflow in visconti_clk_register_gates() | clk: visconti: prevent array overflow in visconti_clk_register_gates()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 2723543c1d60278d5aef1c4ad732dbad24b84a81, it was introduced in version v5.17 by commit b4cbe606dc3674b25cb661e7cd1a1c6ddaaafaaa. For more details please see the references link. | null | 2022-04-25T03:11:17.340371Z | 2022-04-24T20:50:55.983588Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b4cbe606dc3674b25cb661e7cd1a1c6ddaaafaaa'} |
Linux | GSD-2021-1002427 | seg6: fix the iif in the IPv6 socket control block | seg6: fix the iif in the IPv6 socket control block
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.221 by commit 6431e71093f3da586a00c6d931481ffb0dc2db0e, it was introduced in version v4.19.20 by commit 2f704348c93ff8119e642dae6a72327f90b82810. For more details please see the references link. | null | 2021-12-19T23:06:36.985626Z | 2021-12-19T19:36:51.543043Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2f704348c93ff8119e642dae6a72327f90b82810'} |
Linux | GSD-2022-1001527 | mips: cdmm: Fix refcount leak in mips_cdmm_phys_base | mips: cdmm: Fix refcount leak in mips_cdmm_phys_base
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 4680c2ac9aabda82acd23ebbd1f900fb6a889cd3, it was introduced in version v5.9 by commit 2121aa3e2312ccc1d6299154dc4f07a6ab8beee2. For more details please see the references link. | null | 2022-04-25T05:53:24.053687Z | 2022-04-24T21:20:15.140392Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2121aa3e2312ccc1d6299154dc4f07a6ab8beee2'} |
Linux | GSD-2021-1002077 | comedi: vmk80xx: fix bulk-buffer overflow | comedi: vmk80xx: fix bulk-buffer overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.79 by commit b7fd7f3387f070215e6be341e68eb5c087eeecc0, it was introduced in version v2.6.31 by commit 985cafccbf9b7f862aa1c5ee566801e18b5161fb. For more details please see the references link. | null | 2021-12-20T01:21:52.405743Z | 2021-11-14T15:18:48.623501Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/985cafccbf9b7f862aa1c5ee566801e18b5161fb'} |
Linux | GSD-2021-1002563 | KVM: MMU: shadow nested paging does not have PKU | KVM: MMU: shadow nested paging does not have PKU
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.7 by commit 87d9c628be264a4d2dbb9eb0e7d629aef8b66339. For more details please see the references link. | null | 2021-12-20T00:28:54.417876Z | 2021-12-19T19:42:48.357013Z | null | null | null | null | null |
Linux | GSD-2021-1002099 | can: peak_pci: peak_pci_remove(): fix UAF | can: peak_pci: peak_pci_remove(): fix UAF
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit 0e5afdc2315b0737edcf55bede4ee1640d2d464d, it was introduced in version v3.4 by commit e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd. For more details please see the references link. | null | 2021-12-19T23:18:40.404776Z | 2021-11-14T15:19:51.794662Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd'} |
Linux | GSD-2022-1001033 | habanalabs: fix possible memory leak in MMU DR fini | habanalabs: fix possible memory leak in MMU DR fini
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 30058d3a83cfe8c6aacbfe5ab13c01dd0c1799e3. For more details please see the references link. | null | 2022-04-25T04:28:26.145666Z | 2022-04-24T20:41:26.449290Z | null | null | null | null | null |
Linux | GSD-2022-1001199 | ibmvnic: fix race between xmit and reset | ibmvnic: fix race between xmit and reset
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 8507c6ade73cdbbbda5c3d31d67f52f2e1cf03fe, it was introduced in version v5.4 by commit 7ed5b31f4a6695a21f617df07646e9b15c6c1d29. For more details please see the references link. | null | 2022-04-25T03:10:46.725420Z | 2022-04-24T20:53:07.358680Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ed5b31f4a6695a21f617df07646e9b15c6c1d29'} |
Linux | GSD-2021-1002133 | nvme-tcp: fix possible req->offset corruption | nvme-tcp: fix possible req->offset corruption
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.16 by commit c7752ec9ad39708c85859ada3417d85bc4b6cf69, it was introduced in version v5.8 by commit db5ad6b7f8cdd6d78efef62a1557461d0cbaee54. For more details please see the references link. | null | 2021-12-19T23:04:01.881552Z | 2021-11-14T15:21:24.528193Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/db5ad6b7f8cdd6d78efef62a1557461d0cbaee54'} |
Linux | GSD-2022-1001463 | video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow | video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 6a5226e544ac043bb2d8dc1bfe8920d02282f7cd. For more details please see the references link. | null | 2022-04-25T06:42:09.216285Z | 2022-04-24T21:15:03.798086Z | null | null | null | null | null |
Linux | GSD-2022-1001930 | f2fs: quota: fix loop condition at f2fs_quota_sync() | f2fs: quota: fix loop condition at f2fs_quota_sync()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit f9156db0987f1b426015d56505e2c58dee70c90d, it was introduced in version v5.15 by commit 9de71ede81e6d1a111fdd868b2d78d459fa77f80. For more details please see the references link. | null | 2022-04-25T06:42:16.247625Z | 2022-04-24T21:55:54.262720Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9de71ede81e6d1a111fdd868b2d78d459fa77f80'} |
Linux | GSD-2022-1000622 | ARM: 9170/1: fix panic when kasan and kprobe are enabled | ARM: 9170/1: fix panic when kasan and kprobe are enabled
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.5 by commit ba1863be105b06e10d0e2f6b1b8a0570801cfc71, it was introduced in version v2.6.25 by commit 35aa1df4328340f38edc46f00837f08d33d49f63. For more details please see the references link. | null | 2022-03-07T01:57:32.564069Z | 2022-02-27T03:32:22.611691Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/35aa1df4328340f38edc46f00837f08d33d49f63'} |
Linux | GSD-2022-1000788 | btrfs: get rid of warning on transaction commit when using flushoncommit | btrfs: get rid of warning on transaction commit when using flushoncommit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.27 by commit 850a77c999b81dd2724efd2684068d6f90db8c16. For more details please see the references link. | null | 2022-03-18T02:57:25.832708Z | 2022-03-18T00:18:03.109662Z | null | null | null | null | null |
Linux | GSD-2021-1002830 | ALSA: rawmidi - fix the uninitalized user_pversion | ALSA: rawmidi - fix the uninitalized user_pversion
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.12 by commit b398fcbe4de1e1100867fdb6f447c6fbc8fe7085, it was introduced in version v5.15 by commit 09d23174402da0f10e98da2c61bb5ac8e7d79fdd. For more details please see the references link. | null | 2022-01-11T05:57:14.254246Z | 2021-12-30T02:45:16.785006Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/09d23174402da0f10e98da2c61bb5ac8e7d79fdd'} |
Linux | GSD-2022-1000272 | net/mlx5: Use del_timer_sync in fw reset flow of halting poll | net/mlx5: Use del_timer_sync in fw reset flow of halting poll
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.20 by commit f895ebeb44d09d02674cfdd0cfc2bf687603918c, it was introduced in version v5.10 by commit 38b9f903f22b9baa5c4b9bfb07c8bbc49f5efbba. For more details please see the references link. | null | 2022-02-19T10:25:24.469819Z | 2022-02-18T22:04:42.913683Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/38b9f903f22b9baa5c4b9bfb07c8bbc49f5efbba'} |
Linux | GSD-2022-1001875 | media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED | media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit a09e9882800fdfc5aab93f77c3f0132071d2191b, it was introduced in version v3.7 by commit 8ac456495a33d9466076fea94594181ceefb76d9. For more details please see the references link. | null | 2022-04-25T05:25:39.198055Z | 2022-04-24T21:50:52.990592Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ac456495a33d9466076fea94594181ceefb76d9'} |
Linux | GSD-2022-1000767 | net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe() | net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.27 by commit ea372aab54903310756217d81610901a8e66cb7d, it was introduced in version v3.18 by commit 8c14f9c70327a6fb75534c4c61d7ea9c82ccf78f. For more details please see the references link. | null | 2022-03-18T02:52:05.616220Z | 2022-03-18T00:16:24.050166Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c14f9c70327a6fb75534c4c61d7ea9c82ccf78f'} |
Linux | GSD-2022-1000337 | misc: fastrpc: avoid double fput() on failed usercopy | misc: fastrpc: avoid double fput() on failed usercopy
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.180 by commit 4e6fd2b5fcf8e7119305a6042bd92e7f2b9ed215, it was introduced in version v5.1 by commit 6cffd79504ce040f460831030d3069fa1c99bb71. For more details please see the references link. | null | 2022-03-07T01:33:33.672256Z | 2022-02-27T02:53:01.703711Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6cffd79504ce040f460831030d3069fa1c99bb71'} |
Linux | GSD-2021-1000948 | drm: Lock pointer access in drm_master_release() | drm: Lock pointer access in drm_master_release()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.44 by commit aa8591a58cbd2986090709e4202881f18e8ae30e. For more details please see the references link. | null | 2021-12-20T01:02:31.993267Z | 2021-06-30T00:28:36.427423Z | null | null | null | null | null |
Linux | GSD-2022-1001176 | virt: acrn: fix a memory leak in acrn_dev_ioctl() | virt: acrn: fix a memory leak in acrn_dev_ioctl()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit f8e6e18d117e461110c849a11c6a396dcccdbd4e, it was introduced in version v5.12 by commit 9c5137aedd112f78a968bdd2325de2ea06df46c0. For more details please see the references link. | null | 2022-04-25T06:40:56.896502Z | 2022-04-24T20:50:52.731877Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9c5137aedd112f78a968bdd2325de2ea06df46c0'} |
Linux | GSD-2021-1002426 | nfp: Fix memory leak in nfp_cpp_area_cache_add() | nfp: Fix memory leak in nfp_cpp_area_cache_add()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.221 by commit eb51f639ef3fd5498b7def290ed8681b6aadd9a7, it was introduced in version v4.11 by commit 4cb584e0ee7df70fd0376aee60cf701855ea8c81. For more details please see the references link. | null | 2021-12-19T23:17:10.025321Z | 2021-12-19T19:36:49.219210Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4cb584e0ee7df70fd0376aee60cf701855ea8c81'} |
Linux | GSD-2022-1001526 | mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init | mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 8baea2b96fa90af8d0f937caf4cf2105ee094d93, it was introduced in version v4.12 by commit f88fc122cc34c2545dec9562eaab121494e401ef. For more details please see the references link. | null | 2022-04-25T04:32:59.306360Z | 2022-04-24T21:20:10.432839Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f88fc122cc34c2545dec9562eaab121494e401ef'} |
Linux | GSD-2021-1002076 | comedi: vmk80xx: fix transfer-buffer overflows | comedi: vmk80xx: fix transfer-buffer overflows
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.79 by commit 33d7a470730dfe7c9bfc8da84575cf2cedd60d00, it was introduced in version v2.6.31 by commit 985cafccbf9b7f862aa1c5ee566801e18b5161fb. For more details please see the references link. | null | 2021-12-20T00:35:45.263886Z | 2021-11-14T15:18:46.279201Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/985cafccbf9b7f862aa1c5ee566801e18b5161fb'} |
Linux | GSD-2022-1002023 | ACPI: CPPC: Avoid out of bounds access when parsing _CPC data | ACPI: CPPC: Avoid out of bounds access when parsing _CPC data
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit e5b681822cac1f8093759b02e16c06b2c64b6788, it was introduced in version v4.4 by commit 337aadff8e4567e39669e07d9a88b789d78458b5. For more details please see the references link. | null | 2022-04-25T04:31:00.924680Z | 2022-04-24T22:03:41.237617Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/337aadff8e4567e39669e07d9a88b789d78458b5'} |
Linux | GSD-2021-1001089 | net: bridge: fix vlan tunnel dst null pointer dereference | net: bridge: fix vlan tunnel dst null pointer dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit abb02e05cb1c0a30dd873a29f33bc092067dc35d, it was introduced in version v4.11 by commit 11538d039ac6efcf4f1a6c536e1b87cd3668a9fd. For more details please see the references link. | null | 2021-12-20T01:30:52.495886Z | 2021-06-30T00:38:53.174071Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/11538d039ac6efcf4f1a6c536e1b87cd3668a9fd'} |
Linux | GSD-2021-1001573 | xen/x86: fix PV trap handling on secondary processors | xen/x86: fix PV trap handling on secondary processors
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.209 by commit 9cb9be56013c0c54a9b442ccc1535b06e47b81e3, it was introduced in version v2.6.23 by commit f87e4cac4f4e940b328d3deb5b53e642e3881f43. For more details please see the references link. | null | 2021-12-19T23:45:38.098092Z | 2021-10-19T16:24:23.896721Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f87e4cac4f4e940b328d3deb5b53e642e3881f43'} |
Linux | GSD-2022-1002473 | drm/imx: Fix memory leak in imx_pd_connector_get_modes | drm/imx: Fix memory leak in imx_pd_connector_get_modes
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit d2c2758cfb0262637fd93350bdc8ad485fb1dd61, it was introduced in version v4.8 by commit 76ecd9c9fb24b014a6f33fbb1287ede3be12158b. For more details please see the references link. | null | 2022-04-25T05:20:25.157194Z | 2022-04-24T22:52:08.997768Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/76ecd9c9fb24b014a6f33fbb1287ede3be12158b'} |
Linux | GSD-2021-1001123 | cfg80211: call cfg80211_leave_ocb when switching away from OCB | cfg80211: call cfg80211_leave_ocb when switching away from OCB
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.47 by commit 6a07cf36064afb14849d8e038fcca3538fe94bd4. For more details please see the references link. | null | 2021-12-19T22:07:05.131577Z | 2021-07-08T01:57:59.513620Z | null | null | null | null | null |
Linux | GSD-2022-1002189 | scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one() | scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 34a47f7ddb4fd1cbd12397aa6f7dad1de08b4050, it was introduced in version v2.6.23 by commit 45804fbb00eea27bdf4d62751681228a9e2844e9. For more details please see the references link. | null | 2022-04-25T06:47:05.255132Z | 2022-04-24T22:20:18.612884Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/45804fbb00eea27bdf4d62751681228a9e2844e9'} |
Linux | GSD-2021-1000698 | NFC: nci: fix memory leak in nci_allocate_device | NFC: nci: fix memory leak in nci_allocate_device
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.271 by commit 4a621621c7af3cec21c47c349b30cd9c3cea11c8, it was introduced in version v4.0 by commit 11f54f228643d0248ec00ce8c9fb8d872f87e7b8. For more details please see the references link. | null | 2021-12-20T01:10:07.023571Z | 2021-06-04T20:04:52.158543Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/11f54f228643d0248ec00ce8c9fb8d872f87e7b8'} |
Linux | GSD-2021-1000362 | powerpc/64s: Fix pte update for kernel memory on radix | powerpc/64s: Fix pte update for kernel memory on radix
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 84c0762633f2a7ac8399e6b97d3b9bb8e6e1d50f, it was introduced in version v4.18 by commit f1cb8f9beba8699dd1b4518418191499e53f7b17. For more details please see the references link. | null | 2021-12-20T01:03:36.674859Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f1cb8f9beba8699dd1b4518418191499e53f7b17'} |
Linux | GSD-2021-1000732 | pid: take a reference when initializing `cad_pid` | pid: take a reference when initializing `cad_pid`
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.236 by commit 4dbd8808a591b49b717862e6e0081bcf14a87788, it was introduced in version v2.6.19 by commit 9ec52099e4b8678a60e9f93e41ad87885d64f3e6. For more details please see the references link. | null | 2021-12-19T22:56:28.820205Z | 2021-06-24T23:59:51.180762Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9ec52099e4b8678a60e9f93e41ad87885d64f3e6'} |
Linux | GSD-2021-1001820 | ocfs2: fix data corruption after conversion from inline format | ocfs2: fix data corruption after conversion from inline format
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.156 by commit b05caf023b14cbed9223bb5b48ecc7bffe38f632, it was introduced in version v5.4.75 by commit f8a6a2ed4b7d1c3c8631eeb6d00572bc853094a8. For more details please see the references link. | null | 2021-12-19T22:59:57.317277Z | 2021-10-28T13:50:37.445765Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f8a6a2ed4b7d1c3c8631eeb6d00572bc853094a8'} |
Linux | GSD-2021-1000227 | RDMA/siw: Fix a use after free in siw_alloc_mr | RDMA/siw: Fix a use after free in siw_alloc_mr
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit ad9ce7188432650469a6c7625bf479f5ed0b6155, it was introduced in version v5.3 by commit 2251334dcac9eb337575d8767e2a6a7e81848f7f. For more details please see the references link. | null | 2021-12-19T22:39:34.259293Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2251334dcac9eb337575d8767e2a6a7e81848f7f'} |
Linux | GSD-2022-1000858 | netfilter: nf_tables: fix memory leak during stateful obj update | netfilter: nf_tables: fix memory leak during stateful obj update
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.103 by commit 7e9880e81d3fd6a43c202f205717485290432826, it was introduced in version v5.4 by commit d62d0ba97b5803183e70cfded7f7b9da76893bf5. For more details please see the references link. | null | 2022-03-18T02:55:29.851023Z | 2022-03-18T00:25:07.807050Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d62d0ba97b5803183e70cfded7f7b9da76893bf5'} |
Linux | GSD-2021-1000677 | NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() | NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.235 by commit c757c1f1e65d89429db1409429436cf40d47c008, it was introduced in version v4.0 by commit a7d42ddb3099727f58366fa006f850a219cce6c8. For more details please see the references link. | null | 2021-12-19T22:46:12.814127Z | 2021-06-04T20:00:03.250554Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a7d42ddb3099727f58366fa006f850a219cce6c8'} |
Linux | GSD-2021-1001965 | regmap: Fix possible double-free in regcache_rbtree_exit() | regmap: Fix possible double-free in regcache_rbtree_exit()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.254 by commit 758ced2c3878ff789801e6fee808e185c5cf08d6, it was introduced in version v3.12 by commit 3f4ff561bc88b074d5e868dde4012d89cbb06c87. For more details please see the references link. | null | 2021-12-19T23:05:26.254312Z | 2021-11-14T15:13:43.042520Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f4ff561bc88b074d5e868dde4012d89cbb06c87'} |
Linux | GSD-2021-1001436 | KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow | KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.277 by commit 8c46b4b2749c4b3b7e602403addc32ec2b48baed, it was introduced in version v3.10 by commit 8e591cb7204739efa8e15967ea334eb367039dde. For more details please see the references link. | null | 2021-12-20T01:34:34.493442Z | 2021-08-03T02:40:34.517306Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8e591cb7204739efa8e15967ea334eb367039dde'} |
Linux | GSD-2022-1002166 | net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link | net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.190 by commit 7e59fdf9547c4f948d1d917ec7ffa5fb5ac53bdb, it was introduced in version v4.8 by commit fb3bbdb859891e6bc27fd1afb3a07319f82c2ee4. For more details please see the references link. | null | 2022-04-25T04:50:32.960942Z | 2022-04-24T22:17:47.175197Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb3bbdb859891e6bc27fd1afb3a07319f82c2ee4'} |
Linux | GSD-2021-1001066 | net: qrtr: fix OOB Read in qrtr_endpoint_post | net: qrtr: fix OOB Read in qrtr_endpoint_post
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit 19892ab9c9d838e2e5a7744d36e4bb8b7c3292fe, it was introduced in version v4.15 by commit 194ccc88297ae78d0803adad83c6dcc369787c9e. For more details please see the references link. | null | 2021-12-19T23:12:54.704076Z | 2021-06-30T00:37:24.543079Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/194ccc88297ae78d0803adad83c6dcc369787c9e'} |
Linux | GSD-2022-1000225 | RDMA/ucma: Protect mc during concurrent multicast leaves | RDMA/ucma: Protect mc during concurrent multicast leaves
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.99 by commit 75c610212b9f1756b9384911d3a2c347eee8031c, it was introduced in version v5.10 by commit 95fe51096b7adf1d1e7315c49c75e2f75f162584. For more details please see the references link. | null | 2022-02-19T03:07:18.725539Z | 2022-02-18T21:57:36.059074Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/95fe51096b7adf1d1e7315c49c75e2f75f162584'} |
Linux | GSD-2022-1002218 | ntfs: add sanity check on allocation size | ntfs: add sanity check on allocation size
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit fe41ad8be036a3de3e4bdde709551aeb4de2fe7d. For more details please see the references link. | null | 2022-04-25T06:48:59.270001Z | 2022-04-24T22:22:45.022664Z | null | null | null | null | null |
Linux | GSD-2021-1001748 | blktrace: Fix uaf in blk_trace access after removing by sysfs | blktrace: Fix uaf in blk_trace access after removing by sysfs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.9 by commit a5f8e86192612d0183047448d8bbe7918b3f1a26, it was introduced in version v2.6.30 by commit c71a896154119f4ca9e89d6078f5f63ad60ef199. For more details please see the references link. | null | 2021-12-19T22:31:28.406195Z | 2021-10-19T16:34:48.748577Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c71a896154119f4ca9e89d6078f5f63ad60ef199'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.