ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2022-1001654
Drivers: hv: vmbus: Deactivate sysctl_record_panic_msg by default in isolated guests
Drivers: hv: vmbus: Deactivate sysctl_record_panic_msg by default in isolated guests This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.35 by commit 1b576e81d31b56b248316b8ff816b1cc5c4407c7. For more details please see the references link.
null
2022-04-25T06:42:04.516294Z
2022-04-24T21:31:55.711253Z
null
null
null
null
null
Linux
GSD-2022-1000946
xhci: Prevent futile URB re-submissions due to incorrect return value.
xhci: Prevent futile URB re-submissions due to incorrect return value. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.304 by commit a750d0ee17404ee03b338894ebe763cbfa021397, it was introduced in version v3.11 by commit 203a86613fb3bf2767335659513fa98563a3eb71. For more details please see the references link.
null
2022-03-18T02:58:07.365478Z
2022-03-18T00:35:15.496260Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/203a86613fb3bf2767335659513fa98563a3eb71'}
Linux
GSD-2021-1002304
bpf: Forbid bpf_ktime_get_coarse_ns and bpf_timer_* in tracing progs
bpf: Forbid bpf_ktime_get_coarse_ns and bpf_timer_* in tracing progs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit 439b99314b635b40f2e0622eabe62d7055bb409b, it was introduced in version v5.11 by commit d055126180564a57fe533728a4e93d0cb53d49b3. For more details please see the references link.
null
2021-12-20T01:31:10.928212Z
2021-11-29T02:37:50.497136Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d055126180564a57fe533728a4e93d0cb53d49b3'}
Linux
GSD-2021-1000339
KEYS: trusted: Fix memory leak on object td
KEYS: trusted: Fix memory leak on object td This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.38 by commit 31c9a4b24d86cbb36ff0d7a085725a3b4f0138c8, it was introduced in version v5.10.20 by commit 9d83cc1a1e7f494aedee2aa108e801d11525fccf. For more details please see the references link.
null
2021-12-19T22:00:44.995069Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9d83cc1a1e7f494aedee2aa108e801d11525fccf'}
Linux
GSD-2021-1000293
crypto: sun8i-ss - Fix memory leak of object d when dma_iv fails to map
crypto: sun8i-ss - Fix memory leak of object d when dma_iv fails to map This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 6516cb852d704ff8d615de1f93cd443a99736c3d, it was introduced in version v5.10 by commit ac2614d721dea2ff273af19c6c5d508d58a2bb3e. For more details please see the references link.
null
2021-12-19T22:11:39.070143Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac2614d721dea2ff273af19c6c5d508d58a2bb3e'}
Linux
GSD-2022-1001204
bpf, sockmap: Fix double uncharge the mem of sk_msg
bpf, sockmap: Fix double uncharge the mem of sk_msg This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit ac3ecb7760c750c8e4fc09c719241d8e6e88028c, it was introduced in version v4.20 by commit 604326b41a6fb9b4a78b6179335decee0365cd8c. For more details please see the references link.
null
2022-04-25T06:52:44.782085Z
2022-04-24T20:53:30.169299Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/604326b41a6fb9b4a78b6179335decee0365cd8c'}
Linux
GSD-2021-1002754
net: systemport: Add global locking for descriptor lifecycle
net: systemport: Add global locking for descriptor lifecycle This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit eb4687c7442942e115420a30185f8d83faf37696, it was introduced in version v3.16 by commit 80105befdb4b8cea924711b40b2462b87df65b62. For more details please see the references link.
null
2022-01-11T06:00:04.750457Z
2021-12-27T05:48:23.238174Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80105befdb4b8cea924711b40b2462b87df65b62'}
Linux
GSD-2021-1000769
ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions
ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.43 by commit 09870235827451409ff546b073d754a19fd17e2e, it was introduced in version v5.3 by commit f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74. For more details please see the references link.
null
2021-12-20T00:05:59.153212Z
2021-06-25T00:04:26.759646Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74'}
Linux
GSD-2021-1002241
scsi: advansys: Fix kernel pointer leak
scsi: advansys: Fix kernel pointer leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.256 by commit 5612287991debe310c914600599bd59511ababfb. For more details please see the references link.
null
2021-12-19T22:46:49.169209Z
2021-11-29T02:34:51.821078Z
null
null
null
null
null
Linux
GSD-2021-1000786
x86/kvm: Disable kvmclock on all CPUs on shutdown
x86/kvm: Disable kvmclock on all CPUs on shutdown This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.43 by commit 3b0becf8b1ecf642a9edaf4c9628ffc641e490d6, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T22:40:58.715062Z
2021-06-25T00:05:34.436713Z
null
null
null
null
null
Linux
GSD-2021-1001894
KVM: arm64: Fix host stage-2 PGD refcount
KVM: arm64: Fix host stage-2 PGD refcount This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit b372264c66ef78f2cab44e877fbd765ad6d24c39, it was introduced in version v5.13 by commit 1025c8c0c6accfcbdc8f52ca1940160f65cd87d6. For more details please see the references link.
null
2021-12-20T00:48:59.393921Z
2021-10-28T13:54:29.729318Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1025c8c0c6accfcbdc8f52ca1940160f65cd87d6'}
Linux
GSD-2022-1001711
Bluetooth: Fix use after free in hci_send_acl
Bluetooth: Fix use after free in hci_send_acl This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit d404765dffdbd8dcd14758695d0c96c52fb2e624. For more details please see the references link.
null
2022-04-25T04:10:32.582527Z
2022-04-24T21:36:58.035483Z
null
null
null
null
null
Linux
GSD-2022-1000803
net-timestamp: convert sk->sk_tskey to atomic_t
net-timestamp: convert sk->sk_tskey to atomic_t This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.26 by commit ff999198ec2149a6b83edb083293c91ec027f56f, it was introduced in version v3.17 by commit 09c2d251b70723650ba47e83571ff49281320f7c. For more details please see the references link.
null
2022-03-18T02:57:12.796411Z
2022-03-18T00:19:52.076466Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/09c2d251b70723650ba47e83571ff49281320f7c'}
Linux
GSD-2021-1002611
net: netlink: af_netlink: Prevent empty skb by adding a check on len.
net: netlink: af_netlink: Prevent empty skb by adding a check on len. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.296 by commit c54a60c8fbaa774f828e26df79f66229a8a0e010. For more details please see the references link.
null
2022-01-11T05:46:16.649516Z
2021-12-27T05:27:09.963506Z
null
null
null
null
null
Linux
GSD-2022-1001341
drm/panel: ili9341: fix optional regulator handling
drm/panel: ili9341: fix optional regulator handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit e3d982c111a6c033671dd6084b07f62fbf50f76f, it was introduced in version v5.15 by commit 5a04227326b04c15b015181772f5c853172fdb68. For more details please see the references link.
null
2022-04-25T04:56:49.410667Z
2022-04-24T21:06:03.220513Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5a04227326b04c15b015181772f5c853172fdb68'}
Linux
GSD-2021-1001197
NFSv4: Initialise connection to the server in nfs4_alloc_client()
NFSv4: Initialise connection to the server in nfs4_alloc_client() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.4 by commit b0bfac939030181177373f549398ba94c384713d, it was introduced in version v4.8 by commit 5c6e5b60aae4347223f176966455010a5715b863. For more details please see the references link.
null
2021-12-20T01:11:00.812853Z
2021-08-03T01:34:46.428855Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5c6e5b60aae4347223f176966455010a5715b863'}
Linux
GSD-2022-1000100
rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev
rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.265 by commit 74d85e9fbc7022a4011102c7474a9c7aeb704a35, it was introduced in version v4.11 by commit c0cdc19f84a4712cf74888f83af286e3c2e14efd. For more details please see the references link.
null
2022-02-19T15:30:51.285708Z
2022-02-18T21:35:11.969552Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c0cdc19f84a4712cf74888f83af286e3c2e14efd'}
Linux
GSD-2022-1002097
ath9k_htc: fix uninit value bugs
ath9k_htc: fix uninit value bugs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 11f11ac281f0c0b363d2940204f28bae0422ed71, it was introduced in version v2.6.35 by commit fb9987d0f748c983bb795a86f47522313f701a08. For more details please see the references link.
null
2022-04-25T06:42:19.813268Z
2022-04-24T22:10:51.878536Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb9987d0f748c983bb795a86f47522313f701a08'}
Linux
GSD-2022-1000550
net: dsa: lantiq_gswip: fix use after free in gswip_remove()
net: dsa: lantiq_gswip: fix use after free in gswip_remove() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit c61f599b8d33adfa256126a6695c734c0de331cb, it was introduced in version v5.16.10 by commit 2443ba2fe396bdde187a2fdfa6a57375643ae93c. For more details please see the references link.
null
2022-03-07T01:32:56.415950Z
2022-02-27T03:22:51.593854Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2443ba2fe396bdde187a2fdfa6a57375643ae93c'}
Linux
GSD-2021-1000505
x86/sev-es: Don't return NULL from sev_es_get_ghcb()
x86/sev-es: Don't return NULL from sev_es_get_ghcb() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.40 by commit be4cba71b2d068f783ede32775212ef4da3238c4, it was introduced in version v5.10 by commit 0786138c78e79343c7b015d77507cbf9d5f15d00. For more details please see the references link.
null
2021-12-20T00:08:00.922650Z
2021-05-31T23:47:34.071790Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0786138c78e79343c7b015d77507cbf9d5f15d00'}
Linux
GSD-2021-1002538
mlxsw: spectrum: Protect driver from buggy firmware
mlxsw: spectrum: Protect driver from buggy firmware This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.6 by commit da4d70199e5d82da664a80077508d6c18f5e76df, it was introduced in version v5.4 by commit 28b1987ef5064dd5c43538ba1168ef7b801f3cad. For more details please see the references link.
null
2021-12-20T01:35:15.833809Z
2021-12-19T19:41:46.813236Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/28b1987ef5064dd5c43538ba1168ef7b801f3cad'}
Linux
GSD-2022-1001592
media: venus: vdec: fixed possible memory leak issue
media: venus: vdec: fixed possible memory leak issue This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 55bccafc246b2e64763a155ec454470c07a54a6e, it was introduced in version v5.16 by commit 40d87aafee29fb01ce1e1868502fb2059a6a7f34. For more details please see the references link.
null
2022-04-25T06:52:55.752253Z
2022-04-24T21:26:57.936564Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/40d87aafee29fb01ce1e1868502fb2059a6a7f34'}
Linux
GSD-2022-1001068
PCI: endpoint: Fix alignment fault error in copy tests
PCI: endpoint: Fix alignment fault error in copy tests This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 6d16d35fad657acc7aa479e6686724a383792bd9. For more details please see the references link.
null
2022-04-25T05:50:55.112243Z
2022-04-24T20:43:19.954054Z
null
null
null
null
null
Linux
GSD-2021-1000155
perf/core: Fix unconditional security_locked_down() call
perf/core: Fix unconditional security_locked_down() call This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.35 by commit 4348d3b5027bc3ff6336368b6c60605d4ef8e1ce, it was introduced in version v5.4 by commit b0c8fdc7fdb77586c3d1937050925b960743306e. For more details please see the references link.
null
2021-12-19T22:21:54.612146Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b0c8fdc7fdb77586c3d1937050925b960743306e'}
Linux
GSD-2021-1002168
can: peak_pci: peak_pci_remove(): fix UAF
can: peak_pci: peak_pci_remove(): fix UAF This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 949fe9b35570361bc6ee2652f89a0561b26eec98, it was introduced in version v3.4 by commit e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd. For more details please see the references link.
null
2021-12-19T23:14:41.729441Z
2021-11-14T15:22:59.278144Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd'}
Linux
GSD-2022-1001438
ubifs: Fix to add refcount once page is set private
ubifs: Fix to add refcount once page is set private This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 5aaa2c0f0052b02c4a982993d4c5bb68fb7cbe22, it was introduced in version v2.6.27 by commit 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d. For more details please see the references link.
null
2022-04-25T06:37:00.045556Z
2022-04-24T21:13:16.820313Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d'}
Linux
GSD-2021-1002492
net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings()
net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.84 by commit 15fa12c119f869173f9b710cbe6a4a14071d2105, it was introduced in version v3.9 by commit 7f9664525f9cb507de9198a395a111371413f230. For more details please see the references link.
null
2021-12-19T22:26:18.124223Z
2021-12-19T19:39:43.391502Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7f9664525f9cb507de9198a395a111371413f230'}
Linux
GSD-2021-1001314
igb: Fix use-after-free error during reset
igb: Fix use-after-free error during reset This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.136 by commit 88e0720133d42d34851c8721cf5f289a50a8710f, it was introduced in version v4.12 by commit 7cc6fd4c60f267e17b0baef1580d7a6258c0a6f0. For more details please see the references link.
null
2021-12-20T00:51:40.658727Z
2021-08-03T02:06:14.909989Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7cc6fd4c60f267e17b0baef1580d7a6258c0a6f0'}
Linux
GSD-2022-1000383
mm: memcg: synchronize objcg lists with a dedicated spinlock
mm: memcg: synchronize objcg lists with a dedicated spinlock This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.102 by commit 8c8385972ea96adeb9b678c9390beaa4d94c4aae, it was introduced in version v5.9 by commit bf4f059954dcb221384b2f784677e19a13cd4bdb. For more details please see the references link.
null
2022-03-07T01:48:39.697123Z
2022-02-27T02:59:38.473811Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf4f059954dcb221384b2f784677e19a13cd4bdb'}
Linux
GSD-2022-1000679
gve: fix the wrong AdminQ buffer queue index check
gve: fix the wrong AdminQ buffer queue index check This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.8 by commit 7d9c470134104dfecb753b7b4add7037a7403c6e, it was introduced in version v5.10 by commit 5cdad90de62c27c6af53edb1b4b91712622b892b. For more details please see the references link.
null
2022-03-07T01:43:35.101767Z
2022-02-27T03:40:06.394619Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5cdad90de62c27c6af53edb1b4b91712622b892b'}
Linux
GSD-2021-1000856
drm: Lock pointer access in drm_master_release()
drm: Lock pointer access in drm_master_release() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.237 by commit b235f1037c0f9253ae45ff440a33a93e964ad2ec. For more details please see the references link.
null
2021-12-19T22:15:57.741671Z
2021-06-30T00:01:45.892221Z
null
null
null
null
null
Linux
GSD-2021-1001744
blk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd
blk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.9 by commit 7c2c69e010431b0157c9454adcdd2305809bf9fb. For more details please see the references link.
null
2021-12-20T00:02:46.556815Z
2021-10-19T16:34:36.284423Z
null
null
null
null
null
Linux
GSD-2022-1002214
video: fbdev: sm712fb: Fix crash in smtcfb_write()
video: fbdev: sm712fb: Fix crash in smtcfb_write() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 3b36c05f68ba32d0dfb63abc9016d6fe9117829f. For more details please see the references link.
null
2022-04-25T06:45:05.690740Z
2022-04-24T22:22:30.904641Z
null
null
null
null
null
Linux
GSD-2022-1000229
net: macsec: Fix offload support for NETDEV_UNREGISTER event
net: macsec: Fix offload support for NETDEV_UNREGISTER event This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.99 by commit 2e7f5b6ee1a7a2c628253a95b0a95b582901ef1b, it was introduced in version v5.6 by commit 3cf3227a21d1fb020fe26128e60321bd2151e922. For more details please see the references link.
null
2022-02-19T02:42:49.132833Z
2022-02-18T21:58:51.853269Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3cf3227a21d1fb020fe26128e60321bd2151e922'}
Linux
GSD-2021-1001251
igc: Fix use-after-free error during reset
igc: Fix use-after-free error during reset This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.54 by commit e15f629036bac005fc758b4ad17896cf2312add4, it was introduced in version v4.20 by commit 13b5b7fd6a4a96dffe604f25e7b64cfbd9520924. For more details please see the references link.
null
2021-12-19T22:03:43.403873Z
2021-08-03T01:48:53.130562Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/13b5b7fd6a4a96dffe604f25e7b64cfbd9520924'}
Linux
GSD-2022-1002351
PCI: Reduce warnings on possible RW1C corruption
PCI: Reduce warnings on possible RW1C corruption This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit b09700574652d0e9cf0b3b35e48ca542e9830255, it was introduced in version v4.10 by commit fb26592301200dbbe4a9943fe188b57a46716900. For more details please see the references link.
null
2022-04-25T05:21:29.843681Z
2022-04-24T22:37:13.769997Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb26592301200dbbe4a9943fe188b57a46716900'}
Linux
GSD-2021-1000913
kvm: LAPIC: Restore guard to prevent illegal APIC register access
kvm: LAPIC: Restore guard to prevent illegal APIC register access This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.128 by commit bf99ea52970caeb4583bdba1192c1f9b53b12c84, it was introduced in version v5.3 by commit 01402cf81051f796dac7c60ca11d6147153ca46a. For more details please see the references link.
null
2021-12-19T23:19:08.584850Z
2021-06-30T00:06:09.406632Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/01402cf81051f796dac7c60ca11d6147153ca46a'}
Linux
GSD-2021-1001601
cpufreq: schedutil: Destroy mutex before kobject_put() frees the memory
cpufreq: schedutil: Destroy mutex before kobject_put() frees the memory This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.151 by commit e2370e1935190054c10d476b5a33fa9e9a18b7e3, it was introduced in version v5.4.151 by commit 67c98e023135ff81b8d52998a6fdb8ca0c518d82. For more details please see the references link.
null
2021-10-19T16:27:44.960135Z
2021-10-19T16:27:44.960135Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/67c98e023135ff81b8d52998a6fdb8ca0c518d82'}
Linux
GSD-2022-1001984
net/tls: fix slab-out-of-bounds bug in decrypt_internal
net/tls: fix slab-out-of-bounds bug in decrypt_internal This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit 589154d0f18945f41d138a5b4e49e518d294474b, it was introduced in version v5.2 by commit f295b3ae9f5927e084bd5decdff82390e3471801. For more details please see the references link.
null
2022-04-25T04:45:23.057205Z
2022-04-24T22:01:02.742628Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f295b3ae9f5927e084bd5decdff82390e3471801'}
Linux
GSD-2022-1000696
auxdisplay: lcd2s: Fix memory leak in ->remove()
auxdisplay: lcd2s: Fix memory leak in ->remove() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.13 by commit 3585ed5f9b11a6094dd991d76a1541e5d03b986a, it was introduced in version v5.11 by commit 8c9108d014c5bd0f0da2e3544eb45dc56a6da92b. For more details please see the references link.
null
2022-03-18T03:00:05.351702Z
2022-03-18T00:10:13.411747Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c9108d014c5bd0f0da2e3544eb45dc56a6da92b'}
Linux
GSD-2021-1002187
s390/pci: fix zpci_zdev_put() on reserve
s390/pci: fix zpci_zdev_put() on reserve This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit a46044a92add6a400f4dada7b943b30221f7cc80, it was introduced in version v5.14 by commit 2a671f77ee49f3e78997b77fdee139467ff6a598. For more details please see the references link.
null
2021-12-20T00:24:14.870743Z
2021-11-14T15:23:52.766385Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2a671f77ee49f3e78997b77fdee139467ff6a598'}
Linux
GSD-2021-1000440
net/nfc: fix use-after-free llcp_sock_bind/connect
net/nfc: fix use-after-free llcp_sock_bind/connect This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.119 by commit e32352070bcac22be6ed8ab635debc280bb65b8c, it was introduced in version v5.4.112 by commit c89903c9eff219a4695e63715cf922748d743f65. For more details please see the references link.
null
2021-12-20T01:13:44.702146Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c89903c9eff219a4695e63715cf922748d743f65'}
Linux
GSD-2022-1001087
ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111
ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit cbd96d6cad6625feba9c8d101ed4977d53e82f8e. For more details please see the references link.
null
2022-04-25T04:35:36.427917Z
2022-04-24T20:44:14.693731Z
null
null
null
null
null
Linux
GSD-2021-1002742
net/sched: sch_ets: don't remove idle classes from the round-robin list
net/sched: sch_ets: don't remove idle classes from the round-robin list This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit 491c1253441e2fdc8f6a6f4976e3f13440419b7a, it was introduced in version v5.15.6 by commit e25bdbc7e951ae5728fee1f4c09485df113d013c. For more details please see the references link.
null
2022-01-11T05:46:54.477994Z
2021-12-27T05:46:05.040495Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e25bdbc7e951ae5728fee1f4c09485df113d013c'}
Linux
GSD-2022-1001212
ath10k: Fix error handling in ath10k_setup_msa_resources
ath10k: Fix error handling in ath10k_setup_msa_resources This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 4ed37d611ea5d222c3ecb3549e4c2d34b8f3c335, it was introduced in version v5.8 by commit 727fec790ead3d75e2735f66209949c2163523ea. For more details please see the references link.
null
2022-04-25T05:18:36.692875Z
2022-04-24T20:54:11.419693Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/727fec790ead3d75e2735f66209949c2163523ea'}
Linux
GSD-2021-1000285
spi: Fix use-after-free with devm_spi_alloc_*
spi: Fix use-after-free with devm_spi_alloc_* This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 8735248ebb918d25427965f0db07939ed0473ec6, it was introduced in version v5.10 by commit 5e844cc37a5cbaa460e68f9a989d321d63088a89. For more details please see the references link.
null
2021-12-20T01:39:17.237142Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5e844cc37a5cbaa460e68f9a989d321d63088a89'}
Linux
GSD-2021-1002312
NFC: add NCI_UNREG flag to eliminate the race
NFC: add NCI_UNREG flag to eliminate the race This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit ed35e950d8e5658db5b45526be2c4e3778746909, it was introduced in version v3.2 by commit 6a2968aaf50c7a22fced77a5e24aa636281efca8. For more details please see the references link.
null
2021-12-20T00:02:54.045332Z
2021-11-29T02:38:17.236311Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6a2968aaf50c7a22fced77a5e24aa636281efca8'}
Linux
GSD-2022-1000950
configfs: fix a race in configfs_{,un}register_subsystem()
configfs: fix a race in configfs_{,un}register_subsystem() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.304 by commit 40805099af11f68c5ca7dbcfacf455da8f99f622, it was introduced in version v2.6.16 by commit 7063fbf2261194f72ee75afca67b3b38b554b5fa. For more details please see the references link.
null
2022-03-18T02:56:45.644421Z
2022-03-18T00:36:02.932613Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7063fbf2261194f72ee75afca67b3b38b554b5fa'}
Linux
GSD-2022-1001642
i2c: dev: check return value when calling dev_set_name()
i2c: dev: check return value when calling dev_set_name() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.35 by commit 2f345bb14ad4744950499ff222e2899209297afa, it was introduced in version v5.7 by commit 1413ef638abae4ab5621901cf4d8ef08a4a48ba6. For more details please see the references link.
null
2022-04-25T06:37:11.643852Z
2022-04-24T21:31:00.486826Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1413ef638abae4ab5621901cf4d8ef08a4a48ba6'}
Linux
GSD-2022-1000403
mtd: rawnand: gpmi: don't leak PM reference in error path
mtd: rawnand: gpmi: don't leak PM reference in error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.102 by commit a4eeeaca50199e3f19eb13ac3b7e0bbb93e22de4, it was introduced in version v5.10.94 by commit 538a5e208e7d29e8b3cb1d79bbb757e8c763b680. For more details please see the references link.
null
2022-03-07T01:50:59.391453Z
2022-02-27T03:01:56.716549Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/538a5e208e7d29e8b3cb1d79bbb757e8c763b680'}
Linux
GSD-2021-1001494
phy: mdio: fix memory leak
phy: mdio: fix memory leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.289 by commit 25e9f88c7e3cc35f5e3d3db199660d28a15df639, it was introduced in version v2.6.28 by commit 46abc02175b3c246dd5141d878f565a8725060c9. For more details please see the references link.
null
2021-12-19T23:36:01.178222Z
2021-10-19T16:20:46.502011Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/46abc02175b3c246dd5141d878f565a8725060c9'}
Linux
GSD-2022-1000053
net: fix use-after-free in tw_timer_handler
net: fix use-after-free in tw_timer_handler This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.13 by commit 08eacbd141e2495d2fcdde84358a06c4f95cbb13, it was introduced in version v2.6.27 by commit 61a7e26028b94805fd686a6dc9dbd9941f8f19b0. For more details please see the references link.
null
2022-01-11T06:53:37.778763Z
2022-01-10T19:51:58.606398Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61a7e26028b94805fd686a6dc9dbd9941f8f19b0'}
Linux
GSD-2022-1000546
ipv6: fix data-race in fib6_info_hw_flags_set / fib6_purge_rt
ipv6: fix data-race in fib6_info_hw_flags_set / fib6_purge_rt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit d5e80a1840121ba727e1ca92c2cc4234e2390d2b, it was introduced in version v5.12 by commit 0c5fcf9e249ee1d94cf872c99baf9cba7ff9ce27. For more details please see the references link.
null
2022-03-07T01:52:34.561350Z
2022-02-27T03:21:45.164877Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0c5fcf9e249ee1d94cf872c99baf9cba7ff9ce27'}
Linux
GSD-2022-1002081
bpf, sockmap: Fix more uncharged while msg has more_data
bpf, sockmap: Fix more uncharged while msg has more_data This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 7b812a369e6416ab06d83cdd39d8e3f752781dd0, it was introduced in version v4.20 by commit 604326b41a6fb9b4a78b6179335decee0365cd8c. For more details please see the references link.
null
2022-04-25T06:33:25.824289Z
2022-04-24T22:08:55.285970Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/604326b41a6fb9b4a78b6179335decee0365cd8c'}
Linux
GSD-2022-1000116
moxart: fix potential use-after-free on remove path
moxart: fix potential use-after-free on remove path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.266 by commit e6f580d0b3349646d4ee1ce0057eb273e8fb7e2e. For more details please see the references link.
null
2022-02-19T09:37:57.122758Z
2022-02-18T21:42:53.607439Z
null
null
null
null
null
Linux
GSD-2021-1001181
cpufreq: CPPC: Fix potential memleak in cppc_cpufreq_cpu_init
cpufreq: CPPC: Fix potential memleak in cppc_cpufreq_cpu_init This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.4 by commit e1b2b2b61d30d7ce057ec17237c217d152ed97f2, it was introduced in version v5.11 by commit a28b2bfc099c6b9caa6ef697660408e076a32019. For more details please see the references link.
null
2021-12-19T22:13:29.577709Z
2021-08-03T01:32:55.196251Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a28b2bfc099c6b9caa6ef697660408e076a32019'}
Linux
GSD-2022-1001357
qede: confirm skb is allocated before using
qede: confirm skb is allocated before using This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit b2d6b3db9d1cf80908964036dbe1c52a86b1afb1, it was introduced in version v4.18 by commit 8a8633978b842c88fbcfe00d4e5dde96048f630e. For more details please see the references link.
null
2022-04-25T05:22:54.152295Z
2022-04-24T21:07:27.623010Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8a8633978b842c88fbcfe00d4e5dde96048f630e'}
Linux
GSD-2021-1001928
comedi: dt9812: fix DMA buffers on stack
comedi: dt9812: fix DMA buffers on stack This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.292 by commit a6af69768d5cb4b2528946d53be5fa19ade37723, it was introduced in version v2.6.29 by commit 63274cd7d38a3322d90b66a5bc976de1fb899051. For more details please see the references link.
null
2021-12-19T22:50:25.189124Z
2021-11-14T15:12:05.674778Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63274cd7d38a3322d90b66a5bc976de1fb899051'}
Linux
GSD-2021-1002607
iio: mma8452: Fix trigger reference couting
iio: mma8452: Fix trigger reference couting This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.8 by commit c43517071dfc9fce34f8f69dbb98a86017f6b739, it was introduced in version v4.2 by commit ae6d9ce05691bf79694074db7c7da980080548af. For more details please see the references link.
null
2021-12-19T23:22:30.996574Z
2021-12-19T19:44:51.609118Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ae6d9ce05691bf79694074db7c7da980080548af'}
Linux
GSD-2022-1000815
hwmon: Handle failure to register sensor with thermal zone correctly
hwmon: Handle failure to register sensor with thermal zone correctly This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.26 by commit 7efe8499cb90651c540753f4269d2d43ede14223, it was introduced in version v5.8 by commit 1597b374af22266266e1e20612208c4b11359ad4. For more details please see the references link.
null
2022-03-18T02:55:27.650453Z
2022-03-18T00:21:05.795027Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1597b374af22266266e1e20612208c4b11359ad4'}
Linux
GSD-2022-1001707
staging: vchiq_arm: Avoid NULL ptr deref in vchiq_dump_platform_instances
staging: vchiq_arm: Avoid NULL ptr deref in vchiq_dump_platform_instances This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 176df12b38c70b0a45e6392a0ee5bc83489dfc29. For more details please see the references link.
null
2022-04-25T03:55:04.663985Z
2022-04-24T21:36:46.486542Z
null
null
null
null
null
Linux
GSD-2021-1001882
userfaultfd: fix a race between writeprotect and exit_mmap()
userfaultfd: fix a race between writeprotect and exit_mmap() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit 149958ecd0627a9f1e9c678c25c665400054cd6a, it was introduced in version v5.7 by commit 63b2d4174c4ad1f40b48d7138e71bcb564c1fe03. For more details please see the references link.
null
2021-12-20T00:33:51.029788Z
2021-10-28T13:53:46.065111Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63b2d4174c4ad1f40b48d7138e71bcb564c1fe03'}
Linux
GSD-2021-1000790
mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report
mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.10 by commit 6919e8a24e70b6ba148fe07f44f835bcdd1a8d02, it was introduced in version v5.12 by commit 1c099ab44727c8e42fe4de4d91b53cec3ef02860. For more details please see the references link.
null
2021-12-19T22:28:26.603582Z
2021-06-25T00:05:48.938227Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c099ab44727c8e42fe4de4d91b53cec3ef02860'}
Linux
GSD-2021-1002257
btrfs: fix memory ordering between normal and ordered work functions
btrfs: fix memory ordering between normal and ordered work functions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.162 by commit 670f6b3867c8f0f11e5097f353b164cecfec6179, it was introduced in version v3.15 by commit 08a9ff3264181986d1d692a4e6fce3669700c9f8. For more details please see the references link.
null
2021-12-19T22:59:56.755536Z
2021-11-29T02:35:41.067261Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/08a9ff3264181986d1d692a4e6fce3669700c9f8'}
Linux
GSD-2022-1002202
KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs
KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 01f700bae439fdfc56f0e2c0d0f56b0d20aaa999, it was introduced in version v4.2 by commit ca724305a2b02abcbecbf22577536fc8e965ab4f. For more details please see the references link.
null
2022-04-25T05:58:36.035115Z
2022-04-24T22:21:18.917200Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca724305a2b02abcbecbf22577536fc8e965ab4f'}
Linux
GSD-2021-1001752
net: macb: fix use after free on rmmod
net: macb: fix use after free on rmmod This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.9 by commit 4ad6f2d23b0f6ac0d3e5f3102a4256d1c86c90f5. For more details please see the references link.
null
2021-12-19T23:55:51.507406Z
2021-10-19T16:34:59.546142Z
null
null
null
null
null
Linux
GSD-2021-1000840
wq: handle VM suspension in stall detection
wq: handle VM suspension in stall detection This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.273 by commit a8f2c7bbbdf433d726a3f1ac81379da9e09b11e7. For more details please see the references link.
null
2021-12-20T01:29:18.031174Z
2021-06-30T00:00:39.109177Z
null
null
null
null
null
Linux
GSD-2022-1000395
nvme-tcp: fix possible use-after-free in transport error_recovery work
nvme-tcp: fix possible use-after-free in transport error_recovery work This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.102 by commit e192184cf8bce8dd55d619f5611a2eaba996fa05. For more details please see the references link.
null
2022-03-07T01:35:10.308036Z
2022-02-27T03:01:00.479333Z
null
null
null
null
null
Linux
GSD-2021-1001302
atm: nicstar: Fix possible use-after-free in nicstar_cleanup()
atm: nicstar: Fix possible use-after-free in nicstar_cleanup() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.51 by commit a7f7c42e31157d1f0871d6a8e1a0b73a6b4ea785. For more details please see the references link.
null
2021-12-20T00:35:43.916814Z
2021-08-03T02:02:12.788482Z
null
null
null
null
null
Linux
GSD-2021-1002484
ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()
ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.84 by commit 22519eff7df2d88adcc2568d86046ce1e2b52803. For more details please see the references link.
null
2021-12-20T00:57:26.519688Z
2021-12-19T19:39:23.554203Z
null
null
null
null
null
Linux
GSD-2021-1000143
tpm: efi: Use local variable for calculating final log size
tpm: efi: Use local variable for calculating final log size This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.36 by commit 60a01ecc9f68067e4314a0b55148e39e5d58a51b, it was introduced in version v5.3 by commit 166a2809d65b282272c474835ec22c882a39ca1b. For more details please see the references link.
null
2021-12-20T00:11:34.654270Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/166a2809d65b282272c474835ec22c882a39ca1b'}
Linux
GSD-2022-1001584
clocksource/drivers/exynos_mct: Handle DTS with higher number of interrupts
clocksource/drivers/exynos_mct: Handle DTS with higher number of interrupts This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit ff37c4784dedb5b815bb2f8a0de23e4a5f51371f, it was introduced in version v3.10 by commit 36ba5d527e9567ed303bad6e86a5f3c2723470f6. For more details please see the references link.
null
2022-04-25T05:37:30.209488Z
2022-04-24T21:26:22.204038Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/36ba5d527e9567ed303bad6e86a5f3c2723470f6'}
Linux
GSD-2021-1000513
uio_hv_generic: Fix a memory leak in error handling paths
uio_hv_generic: Fix a memory leak in error handling paths This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.122 by commit cdd91637d4ef33e2be19a8e16e72e7d00c996d76, it was introduced in version v4.20 by commit cdfa835c6e5e87d145f9f632b58843de97509f2b. For more details please see the references link.
null
2021-12-19T22:20:24.829037Z
2021-05-31T23:48:51.960880Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cdfa835c6e5e87d145f9f632b58843de97509f2b'}
Linux
GSD-2022-1001091
KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs
KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit f801e9ee0d94caae479b3ff2bd6a762c0e1c61d6, it was introduced in version v4.2 by commit ca724305a2b02abcbecbf22577536fc8e965ab4f. For more details please see the references link.
null
2022-04-25T03:37:58.161447Z
2022-04-24T20:44:34.354830Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca724305a2b02abcbecbf22577536fc8e965ab4f'}
Linux
GSD-2021-1000456
Drivers: hv: vmbus: Increase wait time for VMbus unload
Drivers: hv: vmbus: Increase wait time for VMbus unload This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.191 by commit feb4750ef9b8cb26c8ae5933479cad9f16451f6a, it was introduced in version v4.19.147 by commit 1dcf055a46ba41c971b0d4f7a19c584db4d01bac. For more details please see the references link.
null
2021-12-19T22:57:15.000725Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1dcf055a46ba41c971b0d4f7a19c584db4d01bac'}
Linux
GSD-2021-1002191
cfg80211: fix management registrations locking
cfg80211: fix management registrations locking This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 09b1d5dc6ce1c9151777f6c4e128a59457704c97, it was introduced in version v5.8 by commit 6cd536fe62ef58d7c4eac2da07ab0ed7fd19010d. For more details please see the references link.
null
2021-12-20T01:06:24.419338Z
2021-11-14T15:24:02.964185Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6cd536fe62ef58d7c4eac2da07ab0ed7fd19010d'}
Linux
GSD-2022-1000680
bpf: Use VM_MAP instead of VM_ALLOC for ringbuf
bpf: Use VM_MAP instead of VM_ALLOC for ringbuf This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.8 by commit d578933f6226d5419af9306746efa1c693cbaf9c, it was introduced in version v5.8 by commit 457f44363a8894135c85b7a9afd2bd8196db24ab. For more details please see the references link.
null
2022-03-07T01:34:04.835271Z
2022-02-27T03:40:13.181934Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/457f44363a8894135c85b7a9afd2bd8196db24ab'}
Linux
GSD-2022-1001992
NFSv4.2: fix reference count leaks in _nfs42_proc_copy_notify()
NFSv4.2: fix reference count leaks in _nfs42_proc_copy_notify() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit 9b9feec97c1fc7dd9bb69f62c4905cddf1801599. For more details please see the references link.
null
2022-04-25T04:15:57.997104Z
2022-04-24T22:01:41.642133Z
null
null
null
null
null
Linux
GSD-2021-1001617
binder: make sure fd closes complete
binder: make sure fd closes complete This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.150 by commit aa2c274c279ff365a06a4cba263f04965895166e, it was introduced in version v5.0 by commit 80cd795630d6526ba729a089a435bf74a57af927. For more details please see the references link.
null
2021-12-19T23:02:37.168976Z
2021-10-19T16:28:29.967434Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80cd795630d6526ba729a089a435bf74a57af927'}
Linux
GSD-2021-1000905
NFS: Fix a potential NULL dereference in nfs_get_client()
NFS: Fix a potential NULL dereference in nfs_get_client() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.126 by commit 0057ecef9f324007c0ba5fcca4ddd131178ce78b, it was introduced in version v3.17 by commit 31434f496abb9f3410b10f541462fe58613dd3ad. For more details please see the references link.
null
2021-12-20T00:27:43.541483Z
2021-06-30T00:05:39.328830Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/31434f496abb9f3410b10f541462fe58613dd3ad'}
Linux
GSD-2022-1002347
pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe
pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 0067ba448f1c29ca06e5aee00d8506889ed1f9d0, it was introduced in version v3.9 by commit 32e67eee670e1254ee5ab41e2f454680acb9c17c. For more details please see the references link.
null
2022-04-25T06:33:38.498997Z
2022-04-24T22:36:34.301925Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/32e67eee670e1254ee5ab41e2f454680acb9c17c'}
Linux
GSD-2021-1001247
bpf, sockmap: Fix potential memory leak on unlikely error case
bpf, sockmap: Fix potential memory leak on unlikely error case This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.54 by commit 715f378f42909c401ec043f5150c4fdf57fb8889, it was introduced in version v5.10 by commit 4363023d2668e621b0743db351a9555d6e6ea57e. For more details please see the references link.
null
2021-12-20T01:25:17.151293Z
2021-08-03T01:48:11.525811Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4363023d2668e621b0743db351a9555d6e6ea57e'}
Linux
GSD-2022-1001838
RDMA/mlx5: Fix memory leak in error flow for subscribe event routine
RDMA/mlx5: Fix memory leak in error flow for subscribe event routine This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 8dd392e352d3269938fea32061a74655a613f929, it was introduced in version v5.3 by commit 7597385371425febdaa8c6a1da3625d4ffff16f5. For more details please see the references link.
null
2022-04-25T03:18:41.648002Z
2022-04-24T21:46:45.181997Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7597385371425febdaa8c6a1da3625d4ffff16f5'}
Linux
GSD-2022-1002039
ARM: mmp: Fix failure to remove sram device
ARM: mmp: Fix failure to remove sram device This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit e7bb29df2a149f466c660209ea1aa3783b3e0e1c. For more details please see the references link.
null
2022-04-25T06:33:05.929642Z
2022-04-24T22:05:19.645367Z
null
null
null
null
null
Linux
GSD-2021-1001093
cfg80211: call cfg80211_leave_ocb when switching away from OCB
cfg80211: call cfg80211_leave_ocb when switching away from OCB This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.274 by commit c49b86ba5a25541531c501c4fa3c6a53bf8160ff. For more details please see the references link.
null
2021-12-19T23:00:37.625268Z
2021-07-08T01:55:51.361294Z
null
null
null
null
null
Linux
GSD-2021-1001569
md: fix a lock order reversal in md_alloc
md: fix a lock order reversal in md_alloc This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.209 by commit 906b4dcc180808f0ba74ec1e07a5cf708463bc48, it was introduced in version v3.0 by commit b0140891a8cea36469f58d23859e599b1122bd37. For more details please see the references link.
null
2021-12-19T23:57:49.597511Z
2021-10-19T16:24:13.554533Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b0140891a8cea36469f58d23859e599b1122bd37'}
Linux
GSD-2022-1002469
mm/mempolicy: fix mpol_new leak in shared_policy_replace
mm/mempolicy: fix mpol_new leak in shared_policy_replace This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit 8510c2346d9e47a72b7f018a36ef0c39483e53d6, it was introduced in version v3.8 by commit 42288fe366c4f1ce7522bc9f27d0bc2a81c55264. For more details please see the references link.
null
2022-04-25T05:39:27.210008Z
2022-04-24T22:51:46.814811Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/42288fe366c4f1ce7522bc9f27d0bc2a81c55264'}
Linux
GSD-2022-1000454
nvme: fix a possible use-after-free in controller reset during load
nvme: fix a possible use-after-free in controller reset during load This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit e043fb5a0336ee74614e26f0d9f36f1f5bb6d606. For more details please see the references link.
null
2022-03-07T01:37:44.397750Z
2022-02-27T03:09:13.040054Z
null
null
null
null
null
Linux
GSD-2021-1001139
mac80211: remove warning in ieee80211_get_sband()
mac80211: remove warning in ieee80211_get_sband() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13 by commit 0ee4d55534f82a0624701d0bb9fc2304d4529086. For more details please see the references link.
null
2021-12-20T01:15:02.251816Z
2021-07-08T01:59:05.600074Z
null
null
null
null
null
Linux
GSD-2022-1002193
scsi: libfc: Fix use after free in fc_exch_abts_resp()
scsi: libfc: Fix use after free in fc_exch_abts_resp() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 5cf2ce8967b0d98c8cfa4dc42ef4fcf080f5c836. For more details please see the references link.
null
2022-04-25T05:46:09.613870Z
2022-04-24T22:20:34.729775Z
null
null
null
null
null
Linux
GSD-2022-1000907
xhci: Prevent futile URB re-submissions due to incorrect return value.
xhci: Prevent futile URB re-submissions due to incorrect return value. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.232 by commit 4cf9a3da2b555f77a9a8956a754ac9e3c53c3384, it was introduced in version v3.11 by commit 203a86613fb3bf2767335659513fa98563a3eb71. For more details please see the references link.
null
2022-03-18T02:55:05.822197Z
2022-03-18T00:30:21.367969Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/203a86613fb3bf2767335659513fa98563a3eb71'}
Linux
GSD-2022-1001615
can: m_can: m_can_tx_handler(): fix use after free of skb
can: m_can: m_can_tx_handler(): fix use after free of skb This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 4db7d6f481990dd179a9ee7126dc7aa31ea4fff3, it was introduced in version v3.18 by commit 80646733f11c2e9de3b6339f7e635047e6087280. For more details please see the references link.
null
2022-04-25T03:27:50.241759Z
2022-04-24T21:28:28.689076Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80646733f11c2e9de3b6339f7e635047e6087280'}
Linux
GSD-2021-1001990
scsi: core: Put LLD module refcnt after SCSI device is released
scsi: core: Put LLD module refcnt after SCSI device is released This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.216 by commit c2df161f69fb1c67f63adbd193368b47f511edc0. For more details please see the references link.
null
2021-12-20T00:23:07.479948Z
2021-11-14T15:14:51.934283Z
null
null
null
null
null
Linux
GSD-2021-1000682
NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()
NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.235 by commit 42637ca25c7d7b5a92804a679af5192e8c1a9f48, it was introduced in version v4.14.233 by commit 7b7b9774643220e53eef58c15bb29bd4182fe053. For more details please see the references link.
null
2021-12-19T22:23:32.026343Z
2021-06-04T20:01:30.239453Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7b7b9774643220e53eef58c15bb29bd4182fe053'}
Linux
GSD-2021-1000378
spi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails
spi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 5980a3b9c933408bc22b0e349b78c3ebd7cbf880, it was introduced in version v5.10 by commit 1c26372e5aa9e53391a1f8fe0dc7cd93a7e5ba9e. For more details please see the references link.
null
2021-12-20T00:26:44.770447Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c26372e5aa9e53391a1f8fe0dc7cd93a7e5ba9e'}
Linux
GSD-2021-1002345
staging: rtl8723bs: remove possible deadlock when disconnect (v2)
staging: rtl8723bs: remove possible deadlock when disconnect (v2) This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit 353a6e9acb45a66f8fb80b07c2f4097cf4b826d1. For more details please see the references link.
null
2021-12-19T22:30:45.583951Z
2021-11-29T02:39:45.312842Z
null
null
null
null
null
Linux
GSD-2022-1001245
bpf: Fix UAF due to race between btf_try_get_module and load_module
bpf: Fix UAF due to race between btf_try_get_module and load_module This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 0481baa2318cb1ab13277715da6cdbb657807b3f, it was introduced in version v5.12 by commit 541c3bad8dc51b253ba8686d0cd7628e6b9b5f4c. For more details please see the references link.
null
2022-04-25T05:54:15.609130Z
2022-04-24T20:57:24.880480Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/541c3bad8dc51b253ba8686d0cd7628e6b9b5f4c'}
Linux
GSD-2021-1000728
net: caif: add proper error handling
net: caif: add proper error handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.236 by commit 676d6d02de3f6b7f3a072b08d0dda819b09d31dd, it was introduced in version v3.3 by commit 7c18d2205ea76eef9674e59e1ecae4f332a53e9e. For more details please see the references link.
null
2021-12-20T01:37:15.700898Z
2021-06-24T23:59:36.680764Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7c18d2205ea76eef9674e59e1ecae4f332a53e9e'}
Linux
GSD-2021-1002715
scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select()
scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.88 by commit a9078e791426c2cbbdf28a320c3670f6e0a611e6. For more details please see the references link.
null
2022-01-11T06:52:27.324537Z
2021-12-27T05:38:38.594173Z
null
null
null
null
null
Linux
GSD-2021-1002200
drm/amdgpu: fix out of bounds write
drm/amdgpu: fix out of bounds write This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 5afa7898ab7a0ec9c28556a91df714bf3c2f725e. For more details please see the references link.
null
2021-12-20T01:23:55.502116Z
2021-11-14T15:24:25.579119Z
null
null
null
null
null