ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2022-1001967 | btrfs: fix qgroup reserve overflow the qgroup limit | btrfs: fix qgroup reserve overflow the qgroup limit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit 82ae73ac963cee877ce34f7c31b2b456b516e96c. For more details please see the references link. | null | 2022-04-25T06:30:57.632158Z | 2022-04-24T21:59:16.461932Z | null | null | null | null | null |
Linux | GSD-2022-1000675 | drm: mxsfb: Fix NULL pointer dereference | drm: mxsfb: Fix NULL pointer dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.8 by commit 6f9267e01cca749137349d8ffb0d0ebbadf567f4, it was introduced in version v5.15 by commit b776b0f00f246d093c595bac4453c6e51541d5c5. For more details please see the references link. | null | 2022-03-07T01:43:24.823528Z | 2022-02-27T03:39:39.562390Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b776b0f00f246d093c595bac4453c6e51541d5c5'} |
Linux | GSD-2021-1001318 | dma-buf/sync_file: Don't leak fences on merge failure | dma-buf/sync_file: Don't leak fences on merge failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.135 by commit 41f45e91c92c8480242ea448d54e28c753b13902, it was introduced in version v4.9 by commit a02b9dc90d844cc7df7b63264e7920cc425052d9. For more details please see the references link. | null | 2021-12-19T22:27:20.665352Z | 2021-08-03T02:07:06.577639Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a02b9dc90d844cc7df7b63264e7920cc425052d9'} |
Linux | GSD-2022-1001434 | rxrpc: fix some null-ptr-deref bugs in server_key.c | rxrpc: fix some null-ptr-deref bugs in server_key.c
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit c3c415ae0c82da1349d85b8c9b18e6480aa6a230, it was introduced in version v5.11 by commit 12da59fcab5a05d01773e7cb413b8b8f3bb4e334. For more details please see the references link. | null | 2022-04-25T06:34:37.995772Z | 2022-04-24T21:12:46.529584Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/12da59fcab5a05d01773e7cb413b8b8f3bb4e334'} |
Linux | GSD-2021-1002164 | KVM: arm64: Fix host stage-2 PGD refcount | KVM: arm64: Fix host stage-2 PGD refcount
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 1d58a17ef54599506d44c45ac95be27273a4d2b1, it was introduced in version v5.13 by commit 1025c8c0c6accfcbdc8f52ca1940160f65cd87d6. For more details please see the references link. | null | 2021-12-19T22:32:23.884988Z | 2021-11-14T15:22:49.278590Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1025c8c0c6accfcbdc8f52ca1940160f65cd87d6'} |
Linux | GSD-2021-1000159 | ACPI: custom_method: fix potential use-after-free issue | ACPI: custom_method: fix potential use-after-free issue
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.36 by commit 62dc2440ebb552aa0d7f635e1697e077d9d21203, it was introduced in version v5.4 by commit 03d1571d9513369c17e6848476763ebbd10ec2cb. For more details please see the references link. | null | 2021-12-19T22:52:52.402008Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/03d1571d9513369c17e6848476763ebbd10ec2cb'} |
Linux | GSD-2022-1001064 | drm/sprd: fix potential NULL dereference | drm/sprd: fix potential NULL dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit c3acc8db1bc221604e2db9807f01d8a44b97a64d. For more details please see the references link. | null | 2022-04-25T06:42:09.047563Z | 2022-04-24T20:43:08.308154Z | null | null | null | null | null |
Linux | GSD-2021-1002534 | net: marvell: prestera: fix double free issue on err path | net: marvell: prestera: fix double free issue on err path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.6 by commit 03e5203d2161a00afe4d97d206d2293e40b2f253, it was introduced in version v5.10 by commit e1189d9a5fbec8153dbe03f3589bc2baa96694e2. For more details please see the references link. | null | 2021-12-19T22:33:57.520075Z | 2021-12-19T19:41:36.952523Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e1189d9a5fbec8153dbe03f3589bc2baa96694e2'} |
Linux | GSD-2021-1000509 | nvme-loop: fix memory leak in nvme_loop_create_ctrl() | nvme-loop: fix memory leak in nvme_loop_create_ctrl()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.40 by commit 9c980795ccd77e8abec33dd6fe28dfe1c4083e65, it was introduced in version v4.8 by commit 3a85a5de29ea779634ddfd768059e06196687aba. For more details please see the references link. | null | 2021-12-20T01:10:37.426374Z | 2021-05-31T23:48:07.340532Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3a85a5de29ea779634ddfd768059e06196687aba'} |
Linux | GSD-2021-1002021 | scsi: core: Put LLD module refcnt after SCSI device is released | scsi: core: Put LLD module refcnt after SCSI device is released
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.158 by commit 1ce287eff9f23181d5644db787f472463a61f68b. For more details please see the references link. | null | 2021-12-20T01:16:29.539501Z | 2021-11-14T15:16:16.449682Z | null | null | null | null | null |
Linux | GSD-2022-1001571 | ASoC: codecs: rx-macro: fix accessing compander for aux | ASoC: codecs: rx-macro: fix accessing compander for aux
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 87a2b44cb3005d30c3a72234d1e47b03ae3bb29a, it was introduced in version v5.12 by commit 4f692926f562ff48abfcca6b16f36ff8d57473b6. For more details please see the references link. | null | 2022-04-25T03:33:34.031743Z | 2022-04-24T21:24:51.821229Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4f692926f562ff48abfcca6b16f36ff8d57473b6'} |
Linux | GSD-2021-1002471 | scsi: mpt3sas: Fix kernel panic during drive powercycle test | scsi: mpt3sas: Fix kernel panic during drive powercycle test
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.83 by commit 2bf9c5a5039c8f4b037236aed505e6a25c1d5f7b, it was introduced in version v3.8 by commit f92363d12359498f9a9960511de1a550f0ec41c2. For more details please see the references link. | null | 2021-12-19T22:56:06.025984Z | 2021-12-19T19:38:44.954418Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f92363d12359498f9a9960511de1a550f0ec41c2'} |
Linux | GSD-2022-1001121 | scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() | scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit a669a22aef0ceff706b885370af74b5a60a8ac85. For more details please see the references link. | null | 2022-04-25T05:32:21.967611Z | 2022-04-24T20:47:22.089107Z | null | null | null | null | null |
Linux | GSD-2022-1001988 | virtio_console: eliminate anonymous module_init & module_exit | virtio_console: eliminate anonymous module_init & module_exit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit c69b442125bf009fce26e15aa5616caf8a3673c3. For more details please see the references link. | null | 2022-04-25T03:36:24.305038Z | 2022-04-24T22:01:30.211410Z | null | null | null | null | null |
Linux | GSD-2022-1000360 | powerpc/fixmap: Fix VM debug warning on unmap | powerpc/fixmap: Fix VM debug warning on unmap
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.101 by commit 67baac10dd5ad1e9f50e8f2659984b3b0728d54e. For more details please see the references link. | null | 2022-03-07T01:30:56.749009Z | 2022-02-27T02:56:21.947003Z | null | null | null | null | null |
Linux | GSD-2022-1001822 | mxser: fix xmit_buf leak in activate when LSR == 0xff | mxser: fix xmit_buf leak in activate when LSR == 0xff
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit b125b08dbee3611f03f53b71471813ed4ccafcdd, it was introduced in version v2.6.33 by commit 6769140d304731f0a3b177470a2adb4bacd9036b. For more details please see the references link. | null | 2022-04-25T08:02:27.440456Z | 2022-04-24T21:45:17.188837Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6769140d304731f0a3b177470a2adb4bacd9036b'} |
Linux | GSD-2022-1000730 | iio: imu: st_lsm6dsx: wait for settling time in st_lsm6dsx_read_oneshot | iio: imu: st_lsm6dsx: wait for settling time in st_lsm6dsx_read_oneshot
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.12 by commit 9445c508883270e1093494e6654dd5ccaf507d97, it was introduced in version v4.11 by commit 290a6ce11d938be52634b3ce1bbc6b78be4d23c1. For more details please see the references link. | null | 2022-03-18T02:56:23.770878Z | 2022-03-18T00:13:05.380058Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/290a6ce11d938be52634b3ce1bbc6b78be4d23c1'} |
Linux | GSD-2021-1000765 | net/tls: Fix use-after-free after the TLS device goes down and up | net/tls: Fix use-after-free after the TLS device goes down and up
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.43 by commit f1d4184f128dede82a59a841658ed40d4e6d3aa2, it was introduced in version v4.18 by commit e8f69799810c32dd40c6724d829eccc70baad07f. For more details please see the references link. | null | 2021-12-19T23:29:19.726870Z | 2021-06-25T00:03:21.145731Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e8f69799810c32dd40c6724d829eccc70baad07f'} |
Linux | GSD-2021-1002758 | usb: xhci-mtk: fix list_del warning when enable list debug | usb: xhci-mtk: fix list_del warning when enable list debug
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit 67cbcd3fb8e6412cc5220315c7266e52c2b66268, it was introduced in version v5.15 by commit b8731209958a1dffccc2888121f4c0280c990550. For more details please see the references link. | null | 2022-01-11T05:47:43.160320Z | 2021-12-27T05:49:08.569281Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b8731209958a1dffccc2888121f4c0280c990550'} |
Linux | GSD-2021-1001877 | ucounts: Proper error handling in set_cred_ucounts | ucounts: Proper error handling in set_cred_ucounts
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit 1eb825343d636bcf7198a9cdbacd07867e313f51, it was introduced in version v5.14 by commit 905ae01c4ae2ae3df05bb141801b1db4b7d83c61. For more details please see the references link. | null | 2021-12-19T22:39:50.471904Z | 2021-10-28T13:53:32.552493Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/905ae01c4ae2ae3df05bb141801b1db4b7d83c61'} |
Linux | GSD-2022-1001208 | bpf, sockmap: Fix memleak in tcp_bpf_sendmsg while sk msg is full | bpf, sockmap: Fix memleak in tcp_bpf_sendmsg while sk msg is full
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit d0b85dfc6f01d26808e2576c6537c131b590e270, it was introduced in version v4.20 by commit 604326b41a6fb9b4a78b6179335decee0365cd8c. For more details please see the references link. | null | 2022-04-25T03:35:36.024265Z | 2022-04-24T20:53:49.674156Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/604326b41a6fb9b4a78b6179335decee0365cd8c'} |
Linux | GSD-2021-1000335 | PCI: endpoint: Fix NULL pointer dereference for ->get_features() | PCI: endpoint: Fix NULL pointer dereference for ->get_features()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.38 by commit bbed83d7060e07a5d309104d25a00f0a24441428, it was introduced in version v5.1 by commit 2c04c5b8eef797dca99699cfb55ff42dd3c12c23. For more details please see the references link. | null | 2021-12-20T00:19:02.227867Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c04c5b8eef797dca99699cfb55ff42dd3c12c23'} |
Linux | GSD-2021-1002308 | spi: fix use-after-free of the add_lock mutex | spi: fix use-after-free of the add_lock mutex
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit 37330f37f6666c7739a44b2b6b95b047ccdbed2d, it was introduced in version v5.15 by commit 6098475d4cb48d821bdf453c61118c56e26294f0. For more details please see the references link. | null | 2021-12-20T00:44:33.166402Z | 2021-11-29T02:38:07.892924Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6098475d4cb48d821bdf453c61118c56e26294f0'} |
Linux | GSD-2022-1001658 | nfc: nci: add flush_workqueue to prevent uaf | nfc: nci: add flush_workqueue to prevent uaf
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.35 by commit 9ded5ae40f4fe37fcc28f36d76bf45df20be5432, it was introduced in version v3.2 by commit 6a2968aaf50c7a22fced77a5e24aa636281efca8. For more details please see the references link. | null | 2022-04-25T06:30:01.614332Z | 2022-04-24T21:32:19.401341Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6a2968aaf50c7a22fced77a5e24aa636281efca8'} |
Linux | GSD-2021-1001174 | driver core: auxiliary bus: Fix memory leak when driver_register() fail | driver core: auxiliary bus: Fix memory leak when driver_register() fail
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.6 by commit ce5b3de58fc21303722df46551f7eb9a91afb409, it was introduced in version v5.11 by commit 7de3697e9cbd4bd3d62bafa249d57990e1b8f294. For more details please see the references link. | null | 2021-12-20T01:39:04.692972Z | 2021-08-03T01:32:22.071453Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7de3697e9cbd4bd3d62bafa249d57990e1b8f294'} |
Linux | GSD-2022-1002424 | PM: core: keep irq flags in device_pm_check_callbacks() | PM: core: keep irq flags in device_pm_check_callbacks()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 78c4d68b952f5f537788dbd454031ea9bf50f642. For more details please see the references link. | null | 2022-04-25T04:18:15.854101Z | 2022-04-24T22:45:27.059561Z | null | null | null | null | null |
Linux | GSD-2022-1000419 | scsi: qedf: Fix refcount issue when LOGO is received during TMF | scsi: qedf: Fix refcount issue when LOGO is received during TMF
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit 6be8eaad75ca73131e2a697f0270dc8ee73814a8. For more details please see the references link. | null | 2022-03-07T02:20:01.962264Z | 2022-02-27T03:04:24.733238Z | null | null | null | null | null |
Linux | GSD-2021-1001524 | net_sched: fix NULL deref in fifo_set_limit() | net_sched: fix NULL deref in fifo_set_limit()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.251 by commit 26af64d71b6277841285fa40e3f7164a378dfda9, it was introduced in version v2.6.27 by commit fb0305ce1b03f6ff17f84f2c63daccecb45f2805. For more details please see the references link. | null | 2021-12-19T22:40:11.076420Z | 2021-10-19T16:22:11.084528Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb0305ce1b03f6ff17f84f2c63daccecb45f2805'} |
Linux | GSD-2022-1002074 | net: bcmgenet: Use stronger register read/writes to assure ordering | net: bcmgenet: Use stronger register read/writes to assure ordering
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit b26091a02093104259ca64aeca73601e56160d62, it was introduced in version v4.14 by commit 69d2ea9c798983c4a7157278ec84ff969d1cd8e8. For more details please see the references link. | null | 2022-04-25T07:24:48.422642Z | 2022-04-24T22:08:03.936513Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69d2ea9c798983c4a7157278ec84ff969d1cd8e8'} |
Linux | GSD-2022-1000049 | Input: appletouch - initialize work before device registration | Input: appletouch - initialize work before device registration
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.13 by commit e79ff8c68acb1eddf709d3ac84716868f2a91012, it was introduced in version v2.6.23 by commit 5a6eb676d3bc4d7a6feab200a92437b62ad298da. For more details please see the references link. | null | 2022-01-11T07:35:05.987092Z | 2022-01-10T19:51:48.822294Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5a6eb676d3bc4d7a6feab200a92437b62ad298da'} |
Linux | GSD-2021-1001031 | usb: cdnsp: Fix deadlock issue in cdnsp_thread_irq_handler | usb: cdnsp: Fix deadlock issue in cdnsp_thread_irq_handler
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.11 by commit ae746b6f4ce619cf4032fd798a232b010907a397, it was introduced in version v5.12 by commit 3d82904559f4f5a2622db1b21de3edf2eded7664. For more details please see the references link. | null | 2021-12-19T22:49:44.889781Z | 2021-06-30T00:35:04.400588Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3d82904559f4f5a2622db1b21de3edf2eded7664'} |
Linux | GSD-2022-1002131 | mm: invalidate hwpoison page cache page in fault path | mm: invalidate hwpoison page cache page in fault path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit fa37c1714367e530f592d451607433ab58d56643. For more details please see the references link. | null | 2022-04-25T06:44:56.583559Z | 2022-04-24T22:14:17.014034Z | null | null | null | null | null |
Linux | GSD-2021-1001461 | mISDN: fix possible use-after-free in HFC_cleanup() | mISDN: fix possible use-after-free in HFC_cleanup()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.276 by commit 54ff3202928952a100c477248e65ac6db01258a7. For more details please see the references link. | null | 2021-12-19T23:02:50.397905Z | 2021-08-03T02:47:27.449080Z | null | null | null | null | null |
Linux | GSD-2021-1000620 | drm/amd/amdgpu: fix a potential deadlock in gpu reset | drm/amd/amdgpu: fix a potential deadlock in gpu reset
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.124 by commit de2bf5de17be2b552d18ddea9a16b233f4f009e3, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T23:33:18.326512Z | 2021-06-04T19:49:02.128617Z | null | null | null | null | null |
Linux | GSD-2021-1001932 | nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells | nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.288 by commit 60df06bbdf497e37ed25ad40572c362e5b0998df, it was introduced in version v4.3 by commit 69aba7948cbe53f2f1827e84e9dd0ae470a5072e. For more details please see the references link. | null | 2021-12-19T23:47:03.212001Z | 2021-11-14T15:12:15.486466Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69aba7948cbe53f2f1827e84e9dd0ae470a5072e'} |
Linux | GSD-2021-1001898 | drm/msm/a4xx: fix error handling in a4xx_gpu_init() | drm/msm/a4xx: fix error handling in a4xx_gpu_init()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit 3962d626eb3e3b23ebb2e2a61537fa764acbfe11, it was introduced in version v5.11 by commit 5785dd7a8ef0de8049f40a1a109de6a1bf17b479. For more details please see the references link. | null | 2021-12-19T22:22:04.836700Z | 2021-10-28T13:54:41.058048Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5785dd7a8ef0de8049f40a1a109de6a1bf17b479'} |
Linux | GSD-2021-1000270 | drm/amd/display: Free local data after use | drm/amd/display: Free local data after use
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 296443139f893b554dddd56a99ba8471ab5802d4, it was introduced in version v5.12 by commit 3a00c04212d1cfe1426338b78f4ead623508c874. For more details please see the references link. | null | 2021-12-19T23:15:43.386307Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3a00c04212d1cfe1426338b78f4ead623508c874'} |
Linux | GSD-2021-1002522 | iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove | iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.85 by commit ee86d0bad80bdcd11a87e188a596727f41b62320, it was introduced in version v4.2 by commit a25691c1f9674090fb66586cf4c5d60d3efdf339. For more details please see the references link. | null | 2021-12-19T22:50:43.573909Z | 2021-12-19T19:41:01.270303Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a25691c1f9674090fb66586cf4c5d60d3efdf339'} |
Linux | GSD-2022-1001588 | drm/i915/gem: add missing boundary check in vm_access | drm/i915/gem: add missing boundary check in vm_access
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 5f6e560e3e86ac053447524224e411034f41f5c7, it was introduced in version v5.8 by commit 9f909e215fea0652023b9ed09d3d7bfe10386423. For more details please see the references link. | null | 2022-04-25T05:55:18.770781Z | 2022-04-24T21:26:37.147469Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9f909e215fea0652023b9ed09d3d7bfe10386423'} |
Linux | GSD-2022-1001072 | drm/bridge: Add missing pm_runtime_put_sync | drm/bridge: Add missing pm_runtime_put_sync
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 9df80dc738926a2ea4bd1ce5993c3d0f4b0e855c. For more details please see the references link. | null | 2022-04-25T04:41:35.276479Z | 2022-04-24T20:43:31.502230Z | null | null | null | null | null |
Linux | GSD-2021-1002172 | userfaultfd: fix a race between writeprotect and exit_mmap() | userfaultfd: fix a race between writeprotect and exit_mmap()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit cb185d5f1ebf900f4ae3bf84cee212e6dd035aca, it was introduced in version v5.7 by commit 63b2d4174c4ad1f40b48d7138e71bcb564c1fe03. For more details please see the references link. | null | 2021-12-20T00:19:50.163069Z | 2021-11-14T15:23:09.385919Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63b2d4174c4ad1f40b48d7138e71bcb564c1fe03'} |
Linux | GSD-2022-1001422 | net: preserve skb_end_offset() in skb_unclone_keeptruesize() | net: preserve skb_end_offset() in skb_unclone_keeptruesize()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit a9a6d30264327d8ff7f23da33e7a77ffb793fa3f, it was introduced in version v5.16 by commit c4777efa751d293e369aec464ce6875e957be255. For more details please see the references link. | null | 2022-04-25T03:19:01.796861Z | 2022-04-24T21:11:40.488667Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c4777efa751d293e369aec464ce6875e957be255'} |
Linux | GSD-2021-1002488 | net: ethernet: dec: tulip: de4x5: fix possible array overflows in type3_infoblock() | net: ethernet: dec: tulip: de4x5: fix possible array overflows in type3_infoblock()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.84 by commit 2c15d2a6ba2709dd8e209e597d1ff2a1a1996936. For more details please see the references link. | null | 2021-12-19T22:58:43.800927Z | 2021-12-19T19:39:33.691594Z | null | null | null | null | null |
Linux | GSD-2022-1000399 | net: dsa: lantiq_gswip: fix use after free in gswip_remove() | net: dsa: lantiq_gswip: fix use after free in gswip_remove()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.102 by commit f48bd34137718042872d06f2c7332b3267a29165, it was introduced in version v5.10.101 by commit e177d2e85ebcd3008c4b2abc293f4118e04eedef. For more details please see the references link. | null | 2022-03-07T01:43:21.978765Z | 2022-02-27T03:01:29.107551Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e177d2e85ebcd3008c4b2abc293f4118e04eedef'} |
Linux | GSD-2022-1000663 | IB/hfi1: Fix alloc failure with larger txqueuelen | IB/hfi1: Fix alloc failure with larger txqueuelen
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.8 by commit 2d0587a70e5356e42c8427eb8e954c129bd97ece, it was introduced in version v5.8 by commit d99dc602e2a55a99940ba9506a7126dfa54d54ea. For more details please see the references link. | null | 2022-03-07T01:34:09.443954Z | 2022-02-27T03:37:38.469466Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d99dc602e2a55a99940ba9506a7126dfa54d54ea'} |
Linux | GSD-2022-1001971 | mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0) | mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0)
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit 7d659cb1763ff17d1c6ee082fa6feb4267c7a30b. For more details please see the references link. | null | 2022-04-25T04:15:49.214715Z | 2022-04-24T21:59:39.654945Z | null | null | null | null | null |
Linux | GSD-2022-1000233 | bpf: Use VM_MAP instead of VM_ALLOC for ringbuf | bpf: Use VM_MAP instead of VM_ALLOC for ringbuf
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.99 by commit 6304a613a97d6dcd49b93fbad31e9f39d1e138d6, it was introduced in version v5.8 by commit 457f44363a8894135c85b7a9afd2bd8196db24ab. For more details please see the references link. | null | 2022-02-19T15:32:15.286636Z | 2022-02-18T21:59:20.328193Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/457f44363a8894135c85b7a9afd2bd8196db24ab'} |
Linux | GSD-2022-1000726 | RDMA/cma: Do not change route.addr.src_addr outside state checks | RDMA/cma: Do not change route.addr.src_addr outside state checks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.12 by commit d350724795c7a48b05bf921d94699fbfecf7da0b, it was introduced in version v5.10 by commit 732d41c545bb359cbb8c94698bdc1f8bcf82279c. For more details please see the references link. | null | 2022-03-18T03:33:02.079031Z | 2022-03-18T00:12:31.711557Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/732d41c545bb359cbb8c94698bdc1f8bcf82279c'} |
Linux | GSD-2022-1001834 | bpf, sockmap: Fix memleak in tcp_bpf_sendmsg while sk msg is full | bpf, sockmap: Fix memleak in tcp_bpf_sendmsg while sk msg is full
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit de3a8d8fab0710186f7864ec812836d8d70da3c9, it was introduced in version v4.20 by commit 604326b41a6fb9b4a78b6179335decee0365cd8c. For more details please see the references link. | null | 2022-04-25T06:04:14.289838Z | 2022-04-24T21:46:28.933029Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/604326b41a6fb9b4a78b6179335decee0365cd8c'} |
Linux | GSD-2022-1000376 | veth: fix races around rq->rx_notify_masked | veth: fix races around rq->rx_notify_masked
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.101 by commit bf99c144360dc0ba338eedc0917953157ce211ec, it was introduced in version v4.19 by commit 948d4f214fde43743c57aae0c708bff44f6345f2. For more details please see the references link. | null | 2022-03-07T01:38:06.568554Z | 2022-02-27T02:58:09.729272Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/948d4f214fde43743c57aae0c708bff44f6345f2'} |
Linux | GSD-2021-1000909 | HID: usbhid: fix info leak in hid_submit_ctrl | HID: usbhid: fix info leak in hid_submit_ctrl
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.127 by commit 7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1. For more details please see the references link. | null | 2021-12-19T23:24:31.589373Z | 2021-06-30T00:05:54.408390Z | null | null | null | null | null |
Linux | GSD-2022-1001137 | powerpc/kasan: Fix early region not updated correctly | powerpc/kasan: Fix early region not updated correctly
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit e3d157a4b4f4e0268c98be5b7013bf4b31234bb6, it was introduced in version v5.4 by commit cbd18991e24fea2c31da3bb117c83e4a3538cd11. For more details please see the references link. | null | 2022-04-25T04:57:13.368487Z | 2022-04-24T20:48:18.361240Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cbd18991e24fea2c31da3bb117c83e4a3538cd11'} |
Linux | GSD-2021-1002467 | staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() | staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.83 by commit 8d0163cec7de995f9eb9c3128c83fb84f0cb1c64, it was introduced in version v3.2 by commit 66898177e7e5486dc77a4ba742efa4e2e9e900a4. For more details please see the references link. | null | 2021-12-20T00:34:41.315866Z | 2021-12-19T19:38:35.376996Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/66898177e7e5486dc77a4ba742efa4e2e9e900a4'} |
Linux | GSD-2022-1001567 | ASoC: codecs: va-macro: fix accessing array out of bounds for enum type | ASoC: codecs: va-macro: fix accessing array out of bounds for enum type
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 4a799972a283ab4ec031041304d7e2d34e1a16eb, it was introduced in version v5.11 by commit 908e6b1df26efc9d2df70c9a7bf4f5eae5c5702f. For more details please see the references link. | null | 2022-04-25T06:36:47.179286Z | 2022-04-24T21:24:33.948176Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/908e6b1df26efc9d2df70c9a7bf4f5eae5c5702f'} |
Linux | GSD-2021-1002037 | drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read | drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.75 by commit a7b45024f66f9ec769e8dbb1a51ae83cd05929c7, it was introduced in version v5.7 by commit e11f5bd8228fc3760c221f940b9f6365dbf3e7ed. For more details please see the references link. | null | 2021-12-19T22:18:29.472196Z | 2021-11-14T15:17:02.004193Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e11f5bd8228fc3760c221f940b9f6365dbf3e7ed'} |
Linux | GSD-2022-1002062 | xen: fix is_xen_pmu() | xen: fix is_xen_pmu()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit e9445a7a59d84ed3ae6c85f299d2a6c4930b1ee9, it was introduced in version v4.3 by commit bf6dfb154d935725c9a2005033ca33017b9df439. For more details please see the references link. | null | 2022-04-25T06:44:20.383446Z | 2022-04-24T22:06:41.134371Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf6dfb154d935725c9a2005033ca33017b9df439'} |
Linux | GSD-2021-1001532 | ipack: ipoctal: fix stack information leak | ipack: ipoctal: fix stack information leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.249 by commit 2725925982dc96a78069cd118ea3d66759bfdad7, it was introduced in version v3.5 by commit ba4dc61fe8c545a5d6a68b63616776556b771f51. For more details please see the references link. | null | 2021-12-20T01:33:50.875560Z | 2021-10-19T16:22:32.315346Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ba4dc61fe8c545a5d6a68b63616776556b771f51'} |
Linux | GSD-2021-1001498 | netfilter: ipset: Fix oversized kvmalloc() calls | netfilter: ipset: Fix oversized kvmalloc() calls
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.286 by commit c55127a19d3cc334978eaddc2d7cdb19e2c2b29f. For more details please see the references link. | null | 2021-12-20T01:27:02.161990Z | 2021-10-19T16:20:57.150811Z | null | null | null | null | null |
Linux | GSD-2022-1002432 | af_netlink: Fix shift out of bounds in group mask calculation | af_netlink: Fix shift out of bounds in group mask calculation
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit ac5883a8890a11c00b32a19949a25d4afeaa2f5a, it was introduced in version v2.6.14 by commit f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198. For more details please see the references link. | null | 2022-04-25T05:00:38.234389Z | 2022-04-24T22:46:36.773135Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198'} |
Linux | GSD-2021-1001162 | usb: hso: fix error handling code of hso_create_net_device | usb: hso: fix error handling code of hso_create_net_device
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.6 by commit eeaa4b8d1e2e6f10362673d283a97dccc7275afa, it was introduced in version v5.9 by commit 5fcfb6d0bfcda17f0d0656e4e5b3710af2bbaae5. For more details please see the references link. | null | 2021-12-19T23:43:41.356682Z | 2021-08-03T01:31:35.157582Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5fcfb6d0bfcda17f0d0656e4e5b3710af2bbaae5'} |
Linux | GSD-2021-1000323 | i40e: Fix use-after-free in i40e_client_subtask() | i40e: Fix use-after-free in i40e_client_subtask()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.38 by commit 829a713450b8fb127cbabfc1244c1d8179ec5107, it was introduced in version v4.16 by commit 7b0b1a6d0ac983ce1928432285d0222d4fb7c38b. For more details please see the references link. | null | 2021-12-20T00:54:58.832027Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7b0b1a6d0ac983ce1928432285d0222d4fb7c38b'} |
Linux | GSD-2021-1000289 | bus: qcom: Put child node before return | bus: qcom: Put child node before return
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit c6f8e0dc8da1cd78d640dee392071cc2326ec1b2, it was introduced in version v4.9 by commit 335a127548081322bd2b294d715418648912f20c. For more details please see the references link. | null | 2021-12-19T23:26:49.508853Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/335a127548081322bd2b294d715418648912f20c'} |
Linux | GSD-2021-1001861 | usb: musb: dsps: Fix the probe error path | usb: musb: dsps: Fix the probe error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.75 by commit 9d89e287116796bf987cc48f5c8632ef3048f8eb, it was introduced in version v5.10.67 by commit 8de01a896c1bc14b6b65b8d26013626597a45eda. For more details please see the references link. | null | 2021-12-20T00:00:31.292231Z | 2021-10-28T13:52:46.676581Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8de01a896c1bc14b6b65b8d26013626597a45eda'} |
Linux | GSD-2021-1000773 | net: caif: fix memory leak in caif_device_notify | net: caif: fix memory leak in caif_device_notify
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.43 by commit af2806345a37313f01b1c9f15e046745b8ee2daa, it was introduced in version v3.3 by commit 7c18d2205ea76eef9674e59e1ecae4f332a53e9e. For more details please see the references link. | null | 2021-12-20T00:16:50.368996Z | 2021-06-25T00:04:41.692570Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7c18d2205ea76eef9674e59e1ecae4f332a53e9e'} |
Linux | GSD-2021-1000266 | drm: xlnx: zynqmp: fix a memset in zynqmp_dp_train() | drm: xlnx: zynqmp: fix a memset in zynqmp_dp_train()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 58a54902ec869b8d051a0a282f252c750c1f33c8, it was introduced in version v5.9 by commit d76271d22694e874ed70791702db9252ffe96a4c. For more details please see the references link. | null | 2021-12-19T22:00:48.442686Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d76271d22694e874ed70791702db9252ffe96a4c'} |
Linux | GSD-2022-1000819 | io_uring: disallow modification of rsrc_data during quiesce | io_uring: disallow modification of rsrc_data during quiesce
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.26 by commit 0d773aaf5a90e2856301bd30781bf107db917a66. For more details please see the references link. | null | 2022-03-18T02:52:27.527882Z | 2022-03-18T00:21:15.244375Z | null | null | null | null | null |
Linux | GSD-2021-1001924 | IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields | IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.292 by commit bda41654b6e0c125a624ca35d6d20beb8015b5d0, it was introduced in version v2.6.35 by commit f931551bafe1f10ded7f5282e2aa162c267a2e5d. For more details please see the references link. | null | 2021-12-19T23:04:00.234698Z | 2021-11-14T15:11:55.667931Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f931551bafe1f10ded7f5282e2aa162c267a2e5d'} |
Linux | GSD-2021-1000636 | NFS: Fix an Oopsable condition in __nfs_pageio_add_request() | NFS: Fix an Oopsable condition in __nfs_pageio_add_request()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.124 by commit 1fc5f4eb9d31268ac3ce152d74ad5501ad24ca3e, it was introduced in version v4.0 by commit a7d42ddb3099727f58366fa006f850a219cce6c8. For more details please see the references link. | null | 2021-12-19T23:35:04.877569Z | 2021-06-04T19:51:53.733879Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a7d42ddb3099727f58366fa006f850a219cce6c8'} |
Linux | GSD-2021-1001477 | virtio-blk: Fix memory leak among suspend/resume procedure | virtio-blk: Fix memory leak among suspend/resume procedure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.276 by commit 381bde79d11e596002edfd914e6714291826967a. For more details please see the references link. | null | 2021-12-20T01:06:27.895465Z | 2021-08-03T02:53:14.471490Z | null | null | null | null | null |
Linux | GSD-2022-1002127 | can: isotp: sanitize CAN ID checks in isotp_bind() | can: isotp: sanitize CAN ID checks in isotp_bind()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit d72866a7f5326160d2a9d945a33eb6ef1883e25d, it was introduced in version v5.10 by commit e057dd3fc20ffb3d7f150af46542a51b59b90127. For more details please see the references link. | null | 2022-04-25T05:56:55.151951Z | 2022-04-24T22:14:02.346725Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e057dd3fc20ffb3d7f150af46542a51b59b90127'} |
Linux | GSD-2021-1001027 | tracing: Correct the length check which causes memory corruption | tracing: Correct the length check which causes memory corruption
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.11 by commit b16a249eca2230c2cd66fa1d4b94743bd9b6ef92, it was introduced in version v5.11 by commit b220c049d5196dd94d992dd2dc8cba1a5e6123bf. For more details please see the references link. | null | 2021-12-20T00:52:47.505966Z | 2021-06-30T00:34:49.187520Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b220c049d5196dd94d992dd2dc8cba1a5e6123bf'} |
Linux | GSD-2022-1002259 | media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED | media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 3cc050df73e3d973f1870a8dc0e177e77670bc7f, it was introduced in version v3.7 by commit 8ac456495a33d9466076fea94594181ceefb76d9. For more details please see the references link. | null | 2022-04-25T07:16:56.388941Z | 2022-04-24T22:27:28.106213Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ac456495a33d9466076fea94594181ceefb76d9'} |
Linux | GSD-2022-1000264 | net/smc: Transitional solution for clcsock race issue | net/smc: Transitional solution for clcsock race issue
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.19 by commit 38f0bdd548fd2ef5d481b88d8a2bfef968452e34, it was introduced in version v5.1 by commit fd57770dd198f5b2ddd5b9e6bf282cf98d63adb9. For more details please see the references link. | null | 2022-02-19T02:38:03.184361Z | 2022-02-18T22:03:46.437021Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fd57770dd198f5b2ddd5b9e6bf282cf98d63adb9'} |
Linux | GSD-2021-1001709 | crypto: aesni - xts_crypt() return if walk.nbytes is 0 | crypto: aesni - xts_crypt() return if walk.nbytes is 0
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit 38c84dfafed5b1193d083e0121ccd985ce5f5bdc. For more details please see the references link. | null | 2021-12-19T23:03:35.635868Z | 2021-10-19T16:32:57.089464Z | null | null | null | null | null |
Linux | GSD-2021-1002826 | veth: ensure skb entering GRO are not cloned. | veth: ensure skb entering GRO are not cloned.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.12 by commit d2269ae48598e05b59ec9ea9e6e44fd33941130d, it was introduced in version v5.13 by commit d3256efd8e8b234a6251e4d4580bd2c3c31fdc4c. For more details please see the references link. | null | 2022-01-11T05:58:08.168655Z | 2021-12-30T02:45:07.375826Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d3256efd8e8b234a6251e4d4580bd2c3c31fdc4c'} |
Linux | GSD-2022-1000634 | net: bridge: vlan: fix memory leak in __allowed_ingress | net: bridge: vlan: fix memory leak in __allowed_ingress
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.5 by commit 14be8d448fca6fe7b2a413831eedd55aef6c6511, it was introduced in version v5.6 by commit a580c76d534c7360ba68042b19cb255e8420e987. For more details please see the references link. | null | 2022-03-07T01:52:09.539089Z | 2022-02-27T03:33:43.457847Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a580c76d534c7360ba68042b19cb255e8420e987'} |
Linux | GSD-2022-1001926 | pinctrl: samsung: drop pin banks references on error paths | pinctrl: samsung: drop pin banks references on error paths
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 89d369454267123bc2986a3bb49b7eaef6de2d7e, it was introduced in version v3.8 by commit ab663789d69760d2735402f66501f20b60312a3d. For more details please see the references link. | null | 2022-04-25T06:45:24.771615Z | 2022-04-24T21:55:41.733201Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab663789d69760d2735402f66501f20b60312a3d'} |
Linux | GSD-2021-1001359 | ubifs: Fix races between xattr_{set|get} and listxattr operations | ubifs: Fix races between xattr_{set|get} and listxattr operations
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.133 by commit 7adc05b73d91a5e3d4ca7714fa53ad9b70c53d08, it was introduced in version v2.6.27 by commit 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d. For more details please see the references link. | null | 2021-12-20T01:05:54.656799Z | 2021-08-03T02:17:58.421297Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d'} |
Linux | GSD-2022-1001475 | ext4: don't BUG if someone dirty pages without asking ext4 first | ext4: don't BUG if someone dirty pages without asking ext4 first
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 343117559ef41e992e326f7a92da1a8f254dfa8c. For more details please see the references link. | null | 2022-04-25T05:49:35.528391Z | 2022-04-24T21:15:38.830738Z | null | null | null | null | null |
Linux | GSD-2021-1000118 | scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() | scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.20 by commit 80ef24175df2cba3860d0369d1c662b49ee2de56, it was introduced in version v5.5 by commit af2a0c51b1205327f55a7e82e530403ae1d42cbb. For more details please see the references link. | null | 2021-12-19T23:59:31.662989Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/af2a0c51b1205327f55a7e82e530403ae1d42cbb'} |
Linux | GSD-2021-1002125 | mm, thp: bail out early in collapse_file for writeback page | mm, thp: bail out early in collapse_file for writeback page
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.16 by commit 5e669d8ab30ab61dec3c36e27b4711f07611e6fc, it was introduced in version v5.4 by commit 99cb0dbd47a15d395bf3faa78dc122bc5efe3fc0. For more details please see the references link. | null | 2021-12-20T00:19:38.990083Z | 2021-11-14T15:21:05.041071Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/99cb0dbd47a15d395bf3faa78dc122bc5efe3fc0'} |
Linux | GSD-2022-1001025 | NFS: Avoid writeback threads getting stuck in mempool_alloc() | NFS: Avoid writeback threads getting stuck in mempool_alloc()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit a6caeddd68977a1aaaf62fbd1955b41dd5c3c5d3. For more details please see the references link. | null | 2022-04-25T04:30:30.931558Z | 2022-04-24T20:40:56.394108Z | null | null | null | null | null |
Linux | GSD-2021-1000548 | i2c: i801: Don't generate an interrupt on bus reset | i2c: i801: Don't generate an interrupt on bus reset
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit 1f583d3813f204449037cd2acbfc09168171362a, it was introduced in version v3.6 by commit 636752bcb5177a301d0266270661581de8624828. For more details please see the references link. | null | 2021-12-19T23:27:53.674935Z | 2021-06-04T19:36:43.041865Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/636752bcb5177a301d0266270661581de8624828'} |
Linux | GSD-2021-1002575 | iwlwifi: Fix memory leaks in error handling path | iwlwifi: Fix memory leaks in error handling path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.7 by commit 4768935c25403ba96e7a745645df24a51a774b7e, it was introduced in version v5.14 by commit 9dad325f9d57508b154f0bebbc341a8528e5729c. For more details please see the references link. | null | 2021-12-20T00:34:25.163254Z | 2021-12-19T19:43:26.132693Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9dad325f9d57508b154f0bebbc341a8528e5729c'} |
Linux | GSD-2021-1002060 | mm, thp: bail out early in collapse_file for writeback page | mm, thp: bail out early in collapse_file for writeback page
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.77 by commit 69a7fa5cb0de06c8956b040f19a7248c8c8308ca, it was introduced in version v5.4 by commit 99cb0dbd47a15d395bf3faa78dc122bc5efe3fc0. For more details please see the references link. | null | 2021-12-19T22:22:57.533187Z | 2021-11-14T15:17:59.417165Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/99cb0dbd47a15d395bf3faa78dc122bc5efe3fc0'} |
Linux | GSD-2022-1001530 | powerpc/64s: Don't use DSISR for SLB faults | powerpc/64s: Don't use DSISR for SLB faults
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit a3dae36d632b2cf6eb20314273e512a96cb43c9a, it was introduced in version v5.5 by commit 46ddcb3950a28c0df4815e8dbb8d4b91d5d9f22d. For more details please see the references link. | null | 2022-04-25T04:11:38.245857Z | 2022-04-24T21:20:31.306660Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/46ddcb3950a28c0df4815e8dbb8d4b91d5d9f22d'} |
Linux | GSD-2021-1002430 | aio: fix use-after-free due to missing POLLFREE handling | aio: fix use-after-free due to missing POLLFREE handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.221 by commit 321fba81ec034f88aea4898993c1bf15605c023f, it was introduced in version v4.18 by commit 2c14fa838cbefc23cf1c73ca167ed85b274b2913. For more details please see the references link. | null | 2021-12-20T01:34:12.222147Z | 2021-12-19T19:36:58.454418Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c14fa838cbefc23cf1c73ca167ed85b274b2913'} |
Linux | GSD-2022-1001160 | memstick/mspro_block: fix handling of read-only devices | memstick/mspro_block: fix handling of read-only devices
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 6a0725b9d78ff6efdc95a37e4f05072e79c63918. For more details please see the references link. | null | 2022-04-25T04:38:40.637105Z | 2022-04-24T20:49:32.564868Z | null | null | null | null | null |
Linux | GSD-2022-1000321 | perf: Fix list corruption in perf_cgroup_switch() | perf: Fix list corruption in perf_cgroup_switch()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.230 by commit 30d9f3cbe47e1018ddc8069ac5b5c9e66fbdf727, it was introduced in version v4.11 by commit 058fe1c0440e68a1ba3c2270ae43e9f0298b27d8. For more details please see the references link. | null | 2022-03-07T01:38:20.738703Z | 2022-02-27T02:50:32.055158Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/058fe1c0440e68a1ba3c2270ae43e9f0298b27d8'} |
Linux | GSD-2022-1000771 | net: fix up skbs delta_truesize in UDP GRO frag_list | net: fix up skbs delta_truesize in UDP GRO frag_list
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.27 by commit 3a65b82b1ef28ec97233e77e93a265035f948ea5, it was introduced in version v5.11 by commit 53475c5dd856212e91538a9501162e821cc1f791. For more details please see the references link. | null | 2022-03-18T02:55:23.964933Z | 2022-03-18T00:16:58.056797Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/53475c5dd856212e91538a9501162e821cc1f791'} |
Linux | GSD-2022-1001863 | drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes() | drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit bdc7429708a0772d90c208975694f7c2133b1202, it was introduced in version v4.15 by commit e7b07ceef2a650e5ed8ca37997689e086c680daf. For more details please see the references link. | null | 2022-04-25T05:43:20.124943Z | 2022-04-24T21:49:29.496446Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e7b07ceef2a650e5ed8ca37997689e086c680daf'} |
Linux | GSD-2021-1001836 | net: mdiobus: Fix memory leak in __mdiobus_register | net: mdiobus: Fix memory leak in __mdiobus_register
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit 3a0dc2e35a5d6546b1db87fe985582dadc64fe7b. For more details please see the references link. | null | 2021-12-20T00:00:42.345978Z | 2021-10-28T13:51:28.587555Z | null | null | null | null | null |
Linux | GSD-2021-1002719 | RDMA: Fix use-after-free in rxe_queue_cleanup | RDMA: Fix use-after-free in rxe_queue_cleanup
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.10 by commit acb53e47db1fbc7cd37ab10b46388f045a76e383, it was introduced in version v5.15 by commit 514aee660df493cd673154a6ba6bab745ec47b8c. For more details please see the references link. | null | 2022-01-11T05:58:10.302434Z | 2021-12-27T05:38:53.107022Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/514aee660df493cd673154a6ba6bab745ec47b8c'} |
Linux | GSD-2021-1000724 | pid: take a reference when initializing `cad_pid` | pid: take a reference when initializing `cad_pid`
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.272 by commit f86c80515a8a3703e0ca2e56deb50fc2879c5ea4, it was introduced in version v2.6.19 by commit 9ec52099e4b8678a60e9f93e41ad87885d64f3e6. For more details please see the references link. | null | 2021-12-20T01:23:11.373816Z | 2021-06-24T23:59:22.181410Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9ec52099e4b8678a60e9f93e41ad87885d64f3e6'} |
Linux | GSD-2022-1001249 | ath11k: free peer for station when disconnect from AP for QCA6390/WCN6855 | ath11k: free peer for station when disconnect from AP for QCA6390/WCN6855
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 400705c50bbf184794c885d1efad7fe9ccf1471a, it was introduced in version v5.17 by commit b4a0f54156ac7720de1750b6ea06657c91c52163. For more details please see the references link. | null | 2022-04-25T06:36:02.859981Z | 2022-04-24T20:57:43.318600Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b4a0f54156ac7720de1750b6ea06657c91c52163'} |
Linux | GSD-2021-1002349 | scsi: pm80xx: Fix memory leak during rmmod | scsi: pm80xx: Fix memory leak during rmmod
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit 269a4311b15f68d24e816f43f123888f241ed13d. For more details please see the references link. | null | 2021-12-20T01:35:22.849876Z | 2021-11-29T02:39:56.384832Z | null | null | null | null | null |
Linux | GSD-2021-1000374 | sched/fair: Fix shift-out-of-bounds in load_balance() | sched/fair: Fix shift-out-of-bounds in load_balance()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 80862cbf76c2646f709a57c4517aefe0b094c774, it was introduced in version v5.10 by commit 5a7f555904671c0737819fe4d19bd6143de3f6c0. For more details please see the references link. | null | 2021-12-19T23:00:26.953002Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5a7f555904671c0737819fe4d19bd6143de3f6c0'} |
Linux | GSD-2022-1001619 | mm/pages_alloc.c: don't create ZONE_MOVABLE beyond the end of a node | mm/pages_alloc.c: don't create ZONE_MOVABLE beyond the end of a node
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit fde1dd4f4b3c29c605846777a92f2eb49d806f81, it was introduced in version v2.6.23 by commit 2a1e274acf0b1c192face19a4be7c12d4503eaaf. For more details please see the references link. | null | 2022-04-25T06:36:16.109912Z | 2022-04-24T21:29:19.005106Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2a1e274acf0b1c192face19a4be7c12d4503eaaf'} |
Linux | GSD-2021-1001135 | net: qed: Fix memcpy() overflow of qed_dcbx_params() | net: qed: Fix memcpy() overflow of qed_dcbx_params()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.14 by commit 961535de34950d3f1920c11a712c541c0a9018a4. For more details please see the references link. | null | 2021-12-20T00:24:43.553155Z | 2021-07-08T01:58:48.394966Z | null | null | null | null | null |
Linux | GSD-2022-1000458 | nvme-rdma: fix possible use-after-free in transport error_recovery work | nvme-rdma: fix possible use-after-free in transport error_recovery work
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit 646952b2210f19e584d2bf9eb5d092abdca2fcc1. For more details please see the references link. | null | 2022-03-07T02:19:36.856692Z | 2022-02-27T03:10:19.064738Z | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.