ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2022-1000842 | cifs: fix double free race when mount fails in cifs_get_root() | cifs: fix double free race when mount fails in cifs_get_root()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.104 by commit df9db1a2af37f39ad1653c7b9b0d275d72d0bc67. For more details please see the references link. | null | 2022-03-18T03:37:36.533329Z | 2022-03-18T00:23:12.399895Z | null | null | null | null | null |
Linux | GSD-2022-1001750 | ACPI: CPPC: Avoid out of bounds access when parsing _CPC data | ACPI: CPPC: Avoid out of bounds access when parsing _CPC data
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 97b5593fd1b182b3fdb180b6bbe64ec09669988b, it was introduced in version v4.4 by commit 337aadff8e4567e39669e07d9a88b789d78458b5. For more details please see the references link. | null | 2022-04-25T05:16:21.718996Z | 2022-04-24T21:39:25.190604Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/337aadff8e4567e39669e07d9a88b789d78458b5'} |
Linux | GSD-2021-1002650 | net: netlink: af_netlink: Prevent empty skb by adding a check on len. | net: netlink: af_netlink: Prevent empty skb by adding a check on len.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.222 by commit ff3f517bf7138e01a17369042908a3f345c0ee41. For more details please see the references link. | null | 2022-01-11T06:41:55.123193Z | 2021-12-27T05:33:03.550872Z | null | null | null | null | null |
Linux | GSD-2022-1001300 | dm: fix use-after-free in dm_cleanup_zoned_dev() | dm: fix use-after-free in dm_cleanup_zoned_dev()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 43a043aed964659bc69ef81f266912b73c80d837, it was introduced in version v5.14 by commit bb37d77239af25cde59693dbe3fac04dd17d7b29. For more details please see the references link. | null | 2022-04-25T04:59:33.883538Z | 2022-04-24T21:02:19.874302Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bb37d77239af25cde59693dbe3fac04dd17d7b29'} |
Linux | GSD-2021-1000397 | mt76: fix potential DMA mapping leak | mt76: fix potential DMA mapping leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 9fa26701cd1fc4d932d431971efc5746325bdfce, it was introduced in version v5.10 by commit 27d5c528a7ca08dcd44877fdd9fc08b76630bf77. For more details please see the references link. | null | 2021-12-19T23:08:23.855683Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/27d5c528a7ca08dcd44877fdd9fc08b76630bf77'} |
Linux | GSD-2022-1002486 | ARM: mmp: Fix failure to remove sram device | ARM: mmp: Fix failure to remove sram device
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit 734ff1117d5f7d7ca41bda5666366bb95fbc062b. For more details please see the references link. | null | 2022-04-25T05:40:56.850941Z | 2022-04-24T22:53:19.577430Z | null | null | null | null | null |
Linux | GSD-2022-1000141 | ASoC: max9759: fix underflow in speaker_gain_control_put() | ASoC: max9759: fix underflow in speaker_gain_control_put()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.228 by commit a0f49d12547d45ea8b0f356a96632dd503941c1e, it was introduced in version v4.17 by commit fa8d915172b8c10ec0734c4021e99e9705023b07. For more details please see the references link. | null | 2022-02-20T06:17:24.036178Z | 2022-02-18T21:46:32.836064Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fa8d915172b8c10ec0734c4021e99e9705023b07'} |
Linux | GSD-2022-1000511 | net: dsa: seville: register the mdiobus under devres | net: dsa: seville: register the mdiobus under devres
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 0e816362d823cd46c666e64d8bffe329ee22f4cc, it was introduced in version v5.9 by commit ac3a68d56651c3dad2c12c7afce065fe15267f44. For more details please see the references link. | null | 2022-03-07T01:32:33.086850Z | 2022-02-27T03:16:57.621522Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac3a68d56651c3dad2c12c7afce065fe15267f44'} |
Linux | GSD-2021-1001586 | HID: usbhid: free raw_report buffers in usbhid_stop | HID: usbhid: free raw_report buffers in usbhid_stop
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.151 by commit 965147067fa1bedff3ae1f07ce3f89f1a14d2df3. For more details please see the references link. | null | 2021-12-19T23:04:17.786464Z | 2021-10-19T16:25:02.343658Z | null | null | null | null | null |
Linux | GSD-2021-1002579 | serial: core: fix transmit-buffer reset and memleak | serial: core: fix transmit-buffer reset and memleak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.7 by commit 64e491c1634b73d3bddc081d08620bdc92ab2c12, it was introduced in version v4.9 by commit 761ed4a94582ab291aa24dcbea4e01e8936488c8. For more details please see the references link. | null | 2021-12-19T23:48:15.067870Z | 2021-12-19T19:43:35.450578Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/761ed4a94582ab291aa24dcbea4e01e8936488c8'} |
Linux | GSD-2021-1000544 | octeontx2-pf: fix a buffer overflow in otx2_set_rxfh_context() | octeontx2-pf: fix a buffer overflow in otx2_set_rxfh_context()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit 389146bc6d2bbb20714d06624b74856320ce40f7, it was introduced in version v5.12 by commit 81a4362016e7d8b17031fe1aa43cdb58a7f0f163. For more details please see the references link. | null | 2021-12-20T00:31:02.446075Z | 2021-06-04T19:36:01.837801Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/81a4362016e7d8b17031fe1aa43cdb58a7f0f163'} |
Linux | GSD-2021-1002083 | misc: fastrpc: Add missing lock before accessing find_vma() | misc: fastrpc: Add missing lock before accessing find_vma()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit d22592f1fd8d4bf54fa1cc0ef9122c983d82f30a, it was introduced in version v5.2 by commit 80f3afd72bd4149c57daf852905476b43bb47647. For more details please see the references link. | null | 2021-12-20T00:03:40.873644Z | 2021-11-14T15:19:05.643181Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80f3afd72bd4149c57daf852905476b43bb47647'} |
Linux | GSD-2022-1001029 | virtio_console: eliminate anonymous module_init & module_exit | virtio_console: eliminate anonymous module_init & module_exit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 71612aee09ecea3475f8751dc841d75a011b1fd0. For more details please see the references link. | null | 2022-04-25T06:17:27.264658Z | 2022-04-24T20:41:15.024145Z | null | null | null | null | null |
Linux | GSD-2022-1001183 | mxser: fix xmit_buf leak in activate when LSR == 0xff | mxser: fix xmit_buf leak in activate when LSR == 0xff
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 6dffc2035fbaada60ca8db59e0962e34f760370a, it was introduced in version v2.6.33 by commit 6769140d304731f0a3b177470a2adb4bacd9036b. For more details please see the references link. | null | 2022-04-25T06:10:46.021673Z | 2022-04-24T20:51:44.447740Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6769140d304731f0a3b177470a2adb4bacd9036b'} |
Linux | GSD-2021-1002129 | cgroup: Fix memory leak caused by missing cgroup_bpf_offline | cgroup: Fix memory leak caused by missing cgroup_bpf_offline
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.16 by commit b529f88d93884cf8ccafda793ee3d27b82fa578d, it was introduced in version v5.10 by commit 2b0d3d3e4fcfb19d10f9a82910b8f0f05c56ee3e. For more details please see the references link. | null | 2021-12-19T23:08:55.014602Z | 2021-11-14T15:21:15.061166Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2b0d3d3e4fcfb19d10f9a82910b8f0f05c56ee3e'} |
Linux | GSD-2021-1000114 | cifs: Return correct error code from smb2_get_enc_key | cifs: Return correct error code from smb2_get_enc_key
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.20 by commit f59a9242942fef0de7b926e438ba4eae65d4b4dd, it was introduced in version v4.11 by commit 61cfac6f267dabcf2740a7ec8a0295833b28b5f5. For more details please see the references link. | null | 2021-12-19T22:33:20.108746Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61cfac6f267dabcf2740a7ec8a0295833b28b5f5'} |
Linux | GSD-2022-1001479 | Revert "Revert "block, bfq: honor already-setup queue merges"" | Revert "Revert "block, bfq: honor already-setup queue merges""
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit abc2129e646af7b43025d90a071f83043f1ae76c. For more details please see the references link. | null | 2022-04-25T05:46:46.785258Z | 2022-04-24T21:15:50.559124Z | null | null | null | null | null |
Linux | GSD-2021-1001355 | drm/sched: Avoid data corruptions | drm/sched: Avoid data corruptions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.133 by commit c32d0f0e164ffab2a56c7cf8e612584b4b740e2e. For more details please see the references link. | null | 2021-12-19T23:17:38.079452Z | 2021-08-03T02:16:27.568093Z | null | null | null | null | null |
Linux | GSD-2022-1000638 | net/mlx5e: Fix handling of wrong devices during bond netevent | net/mlx5e: Fix handling of wrong devices during bond netevent
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.6 by commit 4fad499d7fece448e7230d5e5b92f6d8a073e0bb, it was introduced in version v5.8 by commit 7e51891a237f9ea319f53f9beb83afb0077d88e6. For more details please see the references link. | null | 2022-03-07T01:34:26.155133Z | 2022-02-27T03:34:48.358002Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7e51891a237f9ea319f53f9beb83afb0077d88e6'} |
Linux | GSD-2022-1000792 | thermal: int340x: fix memory leak in int3400_notify() | thermal: int340x: fix memory leak in int3400_notify()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.26 by commit ba9efbbf6745750d34c1e87c9539ce9db645ca0a, it was introduced in version v4.14 by commit 38e44da591303d08b0d965a033e11ade284999d0. For more details please see the references link. | null | 2022-03-18T02:59:10.038824Z | 2022-03-18T00:18:18.411243Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/38e44da591303d08b0d965a033e11ade284999d0'} |
Linux | GSD-2022-1001880 | ASoC: codecs: rx-macro: fix accessing array out of bounds for enum type | ASoC: codecs: rx-macro: fix accessing array out of bounds for enum type
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit eb15c6ea692fd88d70698d874d9a0d667fb4cde9, it was introduced in version v5.12 by commit 4f692926f562ff48abfcca6b16f36ff8d57473b6. For more details please see the references link. | null | 2022-04-25T03:09:37.225415Z | 2022-04-24T21:51:20.425025Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4f692926f562ff48abfcca6b16f36ff8d57473b6'} |
Linux | GSD-2021-1001705 | usb: dwc2: check return value after calling platform_get_resource() | usb: dwc2: check return value after calling platform_get_resource()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.11 by commit 337f00a0bc62d7cb7d10ec0b872c79009a1641df. For more details please see the references link. | null | 2021-12-19T23:09:33.500783Z | 2021-10-19T16:32:46.174020Z | null | null | null | null | null |
Linux | GSD-2021-1000817 | btrfs: fix fsync failure and transaction abort after writes to prealloc extents | btrfs: fix fsync failure and transaction abort after writes to prealloc extents
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit b37885cc013516f0412d7d2e99f043dd112c99a6, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T01:01:58.777300Z | 2021-06-25T00:09:15.534336Z | null | null | null | null | null |
Linux | GSD-2022-1000268 | block: Fix wrong offset in bio_truncate() | block: Fix wrong offset in bio_truncate()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.19 by commit 4633a79ff8bc82770486a063a08b55e5162521d8. For more details please see the references link. | null | 2022-02-19T02:54:44.404045Z | 2022-02-18T22:04:15.608049Z | null | null | null | null | null |
Linux | GSD-2022-1002255 | Bluetooth: hci_serdev: call init_rwsem() before p->open() | Bluetooth: hci_serdev: call init_rwsem() before p->open()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit d58d281d6a3f49ce83b82f8211c396ba34c0304f, it was introduced in version v4.16 by commit d73e172816652772114827abaa2dbc053eecbbd7. For more details please see the references link. | null | 2022-04-25T06:22:23.982739Z | 2022-04-24T22:26:50.966786Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d73e172816652772114827abaa2dbc053eecbbd7'} |
Linux | GSD-2022-1000287 | net: do not keep the dst cache when uncloning an skb dst and its metadata | net: do not keep the dst cache when uncloning an skb dst and its metadata
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.302 by commit cbb43514c830cdf0f021ea74e7375a29baf80f8f, it was introduced in version v4.6 by commit d71785ffc7e7cae3fbdc4ea8a9d05b7a1c59f7b8. For more details please see the references link. | null | 2022-03-07T01:53:36.542085Z | 2022-02-27T02:38:33.408711Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d71785ffc7e7cae3fbdc4ea8a9d05b7a1c59f7b8'} |
Linux | GSD-2021-1001210 | btrfs: fix deadlock with concurrent chunk allocations involving system chunks | btrfs: fix deadlock with concurrent chunk allocations involving system chunks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.4 by commit 789b24d9950d3e67b227f81b3fab912a8fb257af, it was introduced in version v5.13 by commit eafa4fd0ad06074da8be4e28ff93b4dca9ffa407. For more details please see the references link. | null | 2021-12-20T00:11:45.832060Z | 2021-08-03T01:37:48.716851Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/eafa4fd0ad06074da8be4e28ff93b4dca9ffa407'} |
Linux | GSD-2022-1002310 | virtio_console: eliminate anonymous module_init & module_exit | virtio_console: eliminate anonymous module_init & module_exit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 0f3d824bd70a1303464d5e93ee3e7afe7832fe89. For more details please see the references link. | null | 2022-04-25T05:18:39.799708Z | 2022-04-24T22:33:10.699790Z | null | null | null | null | null |
Linux | GSD-2021-1001640 | ext4: fix reserved space counter leakage | ext4: fix reserved space counter leakage
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.71 by commit 9ccf35492b084ecbc916761a5c6f42599450f013, it was introduced in version v3.8 by commit 51865fda28e585bdcc164474ff6438a9ccdbfada. For more details please see the references link. | null | 2021-12-19T23:36:10.732592Z | 2021-10-19T16:29:30.384327Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/51865fda28e585bdcc164474ff6438a9ccdbfada'} |
Linux | GSD-2021-1000952 | tracing: Correct the length check which causes memory corruption | tracing: Correct the length check which causes memory corruption
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.44 by commit 43c32c22254b9328d7abb1c2b0f689dc67838e60, it was introduced in version v5.10.17 by commit 7c93d8cff582c459350d6f8906eea6e4cd60d959. For more details please see the references link. | null | 2021-12-20T00:57:20.413326Z | 2021-06-30T00:28:52.852610Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7c93d8cff582c459350d6f8906eea6e4cd60d959'} |
Linux | GSD-2022-1001496 | pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe | pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 9511c6018cd772668def8b034bc67269847e591a, it was introduced in version v3.9 by commit 32e67eee670e1254ee5ab41e2f454680acb9c17c. For more details please see the references link. | null | 2022-04-25T03:38:06.540477Z | 2022-04-24T21:17:11.350116Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/32e67eee670e1254ee5ab41e2f454680acb9c17c'} |
Linux | GSD-2021-1000401 | soc/tegra: regulators: Fix locking up when voltage-spread is out of range | soc/tegra: regulators: Fix locking up when voltage-spread is out of range
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit a1ad124c836816fac8bd5e461d36eaf33cee4e24, it was introduced in version v5.5 by commit 783807436f363e5b1ad4d43ba7debbedfcadbb99. For more details please see the references link. | null | 2021-12-20T00:49:31.822752Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/783807436f363e5b1ad4d43ba7debbedfcadbb99'} |
Linux | GSD-2021-1002596 | btrfs: fix re-dirty process of tree-log nodes | btrfs: fix re-dirty process of tree-log nodes
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.8 by commit 477675049ca803aa95ff77468ffbddd966b415b0, it was introduced in version v5.12 by commit d3575156f6623eecf086a20bcf99a63f1598109c. For more details please see the references link. | null | 2021-12-19T23:01:21.781147Z | 2021-12-19T19:44:24.654900Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d3575156f6623eecf086a20bcf99a63f1598109c'} |
Linux | GSD-2021-1000246 | i2c: img-scb: fix reference leak when pm_runtime_get_sync fails | i2c: img-scb: fix reference leak when pm_runtime_get_sync fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 7ee35cde1e810ad6ca589980b9ec2b7b62946a5b, it was introduced in version v4.15 by commit 93222bd9b966105f43418fd336654ad10045783a. For more details please see the references link. | null | 2021-12-19T22:27:17.642467Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/93222bd9b966105f43418fd336654ad10045783a'} |
Linux | GSD-2021-1002781 | f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr() | f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.260 by commit 88dedecc24763c2e0bc1e8eeb35f9f2cd785a7e5. For more details please see the references link. | null | 2022-01-11T05:53:38.879606Z | 2021-12-30T02:43:10.935625Z | null | null | null | null | null |
Linux | GSD-2022-1000839 | ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min | ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.104 by commit 6951a5888165a38bb7c39a2d18f5668b2f1241c7, it was introduced in version v5.10.99 by commit a9394f21fba027147bf275b083c77955864c366a. For more details please see the references link. | null | 2022-03-18T02:54:44.847060Z | 2022-03-18T00:23:02.556776Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a9394f21fba027147bf275b083c77955864c366a'} |
Linux | GSD-2022-1000993 | KVM: avoid NULL pointer dereference in kvm_dirty_ring_push | KVM: avoid NULL pointer dereference in kvm_dirty_ring_push
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit e8d7f0dad29e634e26d4614cfbd081514c16e042. For more details please see the references link. | null | 2022-04-25T03:43:31.342614Z | 2022-04-24T20:37:55.811763Z | null | null | null | null | null |
Linux | GSD-2022-1001681 | drbd: Fix five use after free bugs in get_initial_state | drbd: Fix five use after free bugs in get_initial_state
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit a972c768723359ec995579902473028fe3cd64b1, it was introduced in version v4.5 by commit a29728463b254ce81ecefdf20c1a02e01d9361da. For more details please see the references link. | null | 2022-04-25T04:58:47.137668Z | 2022-04-24T21:34:38.102136Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a29728463b254ce81ecefdf20c1a02e01d9361da'} |
Linux | GSD-2021-1001904 | net: encx24j600: check error in devm_regmap_init_encx24j600 | net: encx24j600: check error in devm_regmap_init_encx24j600
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit 322c0e53496309e634d9db7349678eaad1d25b55, it was introduced in version v4.4 by commit 04fbfce7a222327b97ca165294ef19f0faa45960. For more details please see the references link. | null | 2021-12-19T23:19:29.699909Z | 2021-10-28T13:54:57.339746Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/04fbfce7a222327b97ca165294ef19f0faa45960'} |
Linux | GSD-2021-1000616 | net: lantiq: fix memory corruption in RX ring | net: lantiq: fix memory corruption in RX ring
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.124 by commit 8bb1077448d43a871ed667520763e3b9f9b7975d, it was introduced in version v4.20 by commit fe1a56420cf2ec28c8eceef672b87de0bbe1a260. For more details please see the references link. | null | 2021-12-20T00:44:03.143504Z | 2021-06-04T19:48:05.957959Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fe1a56420cf2ec28c8eceef672b87de0bbe1a260'} |
Linux | GSD-2021-1001457 | RDMA/cma: Fix rdma_resolve_route() memory leak | RDMA/cma: Fix rdma_resolve_route() memory leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.276 by commit e2da8ce2a9543f3ca5c93369bd1fe6eeb572101a. For more details please see the references link. | null | 2021-12-19T22:39:43.823093Z | 2021-08-03T02:46:52.899518Z | null | null | null | null | null |
Linux | GSD-2022-1002107 | ASoC: soc-compress: prevent the potentially use of null pointer | ASoC: soc-compress: prevent the potentially use of null pointer
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 4639c1d97f385f4784f44d66a3da0672f4951ada, it was introduced in version v5.4 by commit 467fece8fbc6774a3a3bd0981e1a342fb5022706. For more details please see the references link. | null | 2022-04-25T04:56:27.744965Z | 2022-04-24T22:12:11.808908Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/467fece8fbc6774a3a3bd0981e1a342fb5022706'} |
Linux | GSD-2022-1000090 | ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() | ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.300 by commit 17e16a66b4f9a310713d8599e6e1ca4a0c9fd28c. For more details please see the references link. | null | 2022-02-20T02:10:00.015014Z | 2022-02-18T21:34:04.999111Z | null | null | null | null | null |
Linux | GSD-2021-1001007 | net: bridge: fix vlan tunnel dst refcnt when egressing | net: bridge: fix vlan tunnel dst refcnt when egressing
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.46 by commit fc7fdd8c5c2ad2fe3e297698be9d4dbe4a4e0579, it was introduced in version v4.11 by commit 11538d039ac6efcf4f1a6c536e1b87cd3668a9fd. For more details please see the references link. | null | 2021-12-20T01:40:10.231641Z | 2021-06-30T00:33:31.526263Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/11538d039ac6efcf4f1a6c536e1b87cd3668a9fd'} |
Linux | GSD-2022-1002042 | powerpc/kasan: Fix early region not updated correctly | powerpc/kasan: Fix early region not updated correctly
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit f39a3309393a4a484532f6ba745c6acbcfe06115, it was introduced in version v5.4 by commit cbd18991e24fea2c31da3bb117c83e4a3538cd11. For more details please see the references link. | null | 2022-04-25T03:00:30.574987Z | 2022-04-24T22:05:30.882734Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cbd18991e24fea2c31da3bb117c83e4a3538cd11'} |
Linux | GSD-2022-1000585 | spi: uniphier: fix reference count leak in uniphier_spi_probe() | spi: uniphier: fix reference count leak in uniphier_spi_probe()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.22 by commit dd00b4f8f768d81c3788a8ac88fdb3d745e55ea3, it was introduced in version v5.6 by commit 28d1dddc59f6b7fc085093e7c1e978b33f0caf4c. For more details please see the references link. | null | 2022-03-07T01:30:31.720120Z | 2022-02-27T03:27:33.880384Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/28d1dddc59f6b7fc085093e7c1e978b33f0caf4c'} |
Linux | GSD-2021-1001512 | HID: betop: fix slab-out-of-bounds Write in betop_probe | HID: betop: fix slab-out-of-bounds Write in betop_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.285 by commit 6fc4476dda58f6c00097c7ddec3b772513f57525. For more details please see the references link. | null | 2021-12-20T00:15:26.357899Z | 2021-10-19T16:21:35.550687Z | null | null | null | null | null |
Linux | GSD-2022-1002412 | ACPI: CPPC: Avoid out of bounds access when parsing _CPC data | ACPI: CPPC: Avoid out of bounds access when parsing _CPC data
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit d208ea44e25b31db5a4d5e8c31df51787a3e9303, it was introduced in version v4.4 by commit 337aadff8e4567e39669e07d9a88b789d78458b5. For more details please see the references link. | null | 2022-04-25T04:55:32.673542Z | 2022-04-24T22:44:37.933072Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/337aadff8e4567e39669e07d9a88b789d78458b5'} |
Linux | GSD-2021-1001142 | net: caif: fix memory leak in ldisc_open | net: caif: fix memory leak in ldisc_open
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13 by commit 58af3d3d54e87bfc1f936e16c04ade3369d34011. For more details please see the references link. | null | 2021-12-20T00:06:42.011322Z | 2021-07-08T01:59:17.680696Z | null | null | null | null | null |
Linux | GSD-2022-1001394 | scsi: hisi_sas: Free irq vectors in order for v3 HW | scsi: hisi_sas: Free irq vectors in order for v3 HW
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 8b6eab9d683bae7f88dc894b8c851f866032301c. For more details please see the references link. | null | 2022-04-25T04:22:19.088824Z | 2022-04-24T21:10:11.596922Z | null | null | null | null | null |
Linux | GSD-2021-1000303 | rtw88: Fix array overrun in rtw_get_tx_power_params() | rtw88: Fix array overrun in rtw_get_tx_power_params()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 9cd09722e18a08b6a3d68b8bccfac39ddc22434c, it was introduced in version v5.3 by commit fa6dfe6bff246ddd5be3cfe81637f137acd6c294. For more details please see the references link. | null | 2021-12-20T00:44:32.855490Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fa6dfe6bff246ddd5be3cfe81637f137acd6c294'} |
Linux | GSD-2021-1002294 | usb: host: ohci-tmio: check return value after calling platform_get_resource() | usb: host: ohci-tmio: check return value after calling platform_get_resource()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.82 by commit 2474eb7fc3bfbce10f7b8ea431fcffe5dd5f5100. For more details please see the references link. | null | 2021-12-20T00:17:23.802259Z | 2021-11-29T02:37:25.222928Z | null | null | null | null | null |
Linux | GSD-2021-1001841 | powerpc/idle: Don't corrupt back chain when going idle | powerpc/idle: Don't corrupt back chain when going idle
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit c5c2a80368e97ac179d6a101c99f1e1f36146ec2, it was introduced in version v5.10.76 by commit fbd724c49bead048ae9fc1a5b7bff2fb3e54f855. For more details please see the references link. | null | 2021-10-28T13:51:42.165391Z | 2021-10-28T13:51:42.165391Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fbd724c49bead048ae9fc1a5b7bff2fb3e54f855'} |
Linux | GSD-2021-1000753 | ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed | ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.125 by commit 920697b004e49cb026e2e15fe91be065bf0741b7, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T23:38:52.603560Z | 2021-06-25T00:02:32.759848Z | null | null | null | null | null |
Linux | GSD-2022-1000706 | mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls | mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.13 by commit da0fccd842cdd4d15cc620241145e0648bfdd753, it was introduced in version v5.15 by commit 7661809d493b426e979f39ab512e3adf41fbcc69. For more details please see the references link. | null | 2022-03-18T02:49:32.597310Z | 2022-03-18T00:11:22.866952Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7661809d493b426e979f39ab512e3adf41fbcc69'} |
Linux | GSD-2022-1001814 | pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe | pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit c52703355766c347f270df222a744e0c491a02f2, it was introduced in version v3.9 by commit 32e67eee670e1254ee5ab41e2f454680acb9c17c. For more details please see the references link. | null | 2022-04-25T04:14:29.022361Z | 2022-04-24T21:44:27.282473Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/32e67eee670e1254ee5ab41e2f454680acb9c17c'} |
Linux | GSD-2021-1001791 | ocfs2: mount fails with buffer overflow in strlen | ocfs2: mount fails with buffer overflow in strlen
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.253 by commit 232ed9752510de4436468b653d145565669c8498. For more details please see the references link. | null | 2021-12-19T23:28:38.935435Z | 2021-10-28T13:49:02.010510Z | null | null | null | null | null |
Linux | GSD-2021-1000883 | NFS: Fix use-after-free in nfs4_init_client() | NFS: Fix use-after-free in nfs4_init_client()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.195 by commit 42c10b0db064e45f5c5ae7019bbf2168ffab766c, it was introduced in version v4.13 by commit 8dcbec6d20eb881ba368d0aebc3a8a678aebb1da. For more details please see the references link. | null | 2021-12-20T00:10:31.291765Z | 2021-06-30T00:03:29.374204Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8dcbec6d20eb881ba368d0aebc3a8a678aebb1da'} |
Linux | GSD-2022-1000356 | mtd: rawnand: gpmi: don't leak PM reference in error path | mtd: rawnand: gpmi: don't leak PM reference in error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.181 by commit 4cd3281a910a5adf73b2a0a82241dd67844d0b25, it was introduced in version v5.4.174 by commit 29218853877a748a2ca41d9957a84b2d6a7f56a7. For more details please see the references link. | null | 2022-03-07T01:33:25.076946Z | 2022-02-27T02:55:54.602538Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/29218853877a748a2ca41d9957a84b2d6a7f56a7'} |
Linux | GSD-2021-1000929 | can: mcba_usb: fix memory leak in mcba_usb | can: mcba_usb: fix memory leak in mcba_usb
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.128 by commit 6f87c0e21ad20dd3d22108e33db1c552dfa352a0, it was introduced in version v4.12 by commit 51f3baad7de943780ce0c17bd7975df567dd6e14. For more details please see the references link. | null | 2021-12-20T00:15:19.528293Z | 2021-06-30T00:25:09.988305Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/51f3baad7de943780ce0c17bd7975df567dd6e14'} |
Linux | GSD-2022-1001117 | KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast() | KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 9fa2b94443ff41cdecdff6f4d4324d83af01089a. For more details please see the references link. | null | 2022-04-25T05:10:12.926884Z | 2022-04-24T20:46:55.568910Z | null | null | null | null | null |
Linux | GSD-2021-1000180 | mmc: uniphier-sd: Fix a resource leak in the remove function | mmc: uniphier-sd: Fix a resource leak in the remove function
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.118 by commit 0d8941b9b2d3e7b3481fdf43b1a6189d162175b7, it was introduced in version v4.20 by commit 3fd784f745dd1747863775a99ec749619ee6759c. For more details please see the references link. | null | 2021-12-20T01:01:37.628188Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3fd784f745dd1747863775a99ec749619ee6759c'} |
Linux | GSD-2021-1002447 | ipv6: fix memory leak in fib6_rule_suppress | ipv6: fix memory leak in fib6_rule_suppress
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.164 by commit ee38eb8cf9a7323884c2b8e0adbbeb2192d31e29, it was introduced in version v5.4 by commit ca7a03c4175366a92cee0ccc4fec0038c3266e26. For more details please see the references link. | null | 2021-12-20T00:10:19.452776Z | 2021-12-19T19:37:46.953613Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca7a03c4175366a92cee0ccc4fec0038c3266e26'} |
Linux | GSD-2022-1001547 | igc: avoid kernel warning when changing RX ring parameters | igc: avoid kernel warning when changing RX ring parameters
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 3ddb49af08094ebee250b461172ee7b8e27a35d3, it was introduced in version v5.13 by commit 73f1071c1d2952b8c93cd6cd99744768c59ec840. For more details please see the references link. | null | 2022-04-25T03:14:05.623967Z | 2022-04-24T21:22:23.457134Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/73f1071c1d2952b8c93cd6cd99744768c59ec840'} |
Linux | GSD-2021-1002017 | drm/ttm: fix memleak in ttm_transfered_destroy | drm/ttm: fix memleak in ttm_transfered_destroy
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.157 by commit bd99782f3ca491879e8524c89b1c0f40071903bd. For more details please see the references link. | null | 2021-12-19T23:48:38.840569Z | 2021-11-14T15:16:06.238597Z | null | null | null | null | null |
Linux | GSD-2021-1002502 | IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr | IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.85 by commit 2c08271f4ed0e24633b3f81ceff61052b9d45efc, it was introduced in version v4.5 by commit 46b010d3eeb8eb29c740c4ef09c666485f5c07e6. For more details please see the references link. | null | 2021-12-19T23:25:29.842981Z | 2021-12-19T19:40:07.167873Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/46b010d3eeb8eb29c740c4ef09c666485f5c07e6'} |
Linux | GSD-2022-1001052 | mips: ralink: fix a refcount leak in ill_acc_of_setup() | mips: ralink: fix a refcount leak in ill_acc_of_setup()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit c74c755daed551b9aceb8388159180861474bdfe. For more details please see the references link. | null | 2022-04-25T05:27:28.886070Z | 2022-04-24T20:42:33.825198Z | null | null | null | null | null |
Linux | GSD-2021-1002152 | xhci: Fix command ring pointer corruption while aborting a command | xhci: Fix command ring pointer corruption while aborting a command
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit ff0e50d3564f33b7f4b35cadeabd951d66cfc570. For more details please see the references link. | null | 2021-12-20T00:40:54.934580Z | 2021-11-14T15:22:12.198323Z | null | null | null | null | null |
Linux | GSD-2022-1001402 | scsi: mpi3mr: Fix memory leaks | scsi: mpi3mr: Fix memory leaks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 27fc9e90171ab0a94a411f3fdb3522ef5acb9537. For more details please see the references link. | null | 2022-04-25T05:48:49.474128Z | 2022-04-24T21:10:34.850514Z | null | null | null | null | null |
Linux | GSD-2021-1000495 | uio_hv_generic: Fix a memory leak in error handling paths | uio_hv_generic: Fix a memory leak in error handling paths
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.7 by commit 53486c467e356e06aa37047c984fccd64d78c827, it was introduced in version v4.20 by commit cdfa835c6e5e87d145f9f632b58843de97509f2b. For more details please see the references link. | null | 2021-12-19T23:18:17.275463Z | 2021-05-31T23:45:56.468200Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cdfa835c6e5e87d145f9f632b58843de97509f2b'} |
Linux | GSD-2022-1002384 | drivers: net: slip: fix NPD bug in sl_tx_timeout() | drivers: net: slip: fix NPD bug in sl_tx_timeout()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 3fdb033f8f8c978489c7702a4a44494b7ae63424. For more details please see the references link. | null | 2022-04-25T06:38:42.879269Z | 2022-04-24T22:41:23.320072Z | null | null | null | null | null |
Linux | GSD-2022-1000643 | ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback | ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.6 by commit 7bf02718b736e66609fc1002a358727a945f46a6, it was introduced in version v5.10 by commit f33d9e2b48a34e1558b67a473a1fc1d6e793f93c. For more details please see the references link. | null | 2022-03-07T01:35:10.098205Z | 2022-02-27T03:35:22.744862Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f33d9e2b48a34e1558b67a473a1fc1d6e793f93c'} |
Linux | GSD-2022-1001951 | gcc-plugins: latent_entropy: use /dev/urandom | gcc-plugins: latent_entropy: use /dev/urandom
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.112 by commit cc21ae932656483b07982afcec7e38a5bd6acc0c, it was introduced in version v4.9 by commit 38addce8b600ca335dc86fa3d48c890f1c6fa1f4. For more details please see the references link. | null | 2022-04-25T06:35:56.380219Z | 2022-04-24T21:57:33.754217Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/38addce8b600ca335dc86fa3d48c890f1c6fa1f4'} |
Linux | GSD-2022-1000213 | af_packet: fix data-race in packet_setsockopt / packet_setsockopt | af_packet: fix data-race in packet_setsockopt / packet_setsockopt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.97 by commit 32e179971085832f5335e308774a04dd1147a316, it was introduced in version v4.3 by commit 47dceb8ecdc1c3ad1818dfea3d659a05b74c3fc2. For more details please see the references link. | null | 2022-02-19T02:38:04.144957Z | 2022-02-18T21:56:15.030162Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/47dceb8ecdc1c3ad1818dfea3d659a05b74c3fc2'} |
Linux | GSD-2021-1001284 | cgroup: verify that source is a string | cgroup: verify that source is a string
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.52 by commit 811763e3beb6c922d168e9f509ec593e9240842e, it was introduced in version v5.1 by commit 8d2451f4994fa60a57617282bab91b98266a00b1. For more details please see the references link. | null | 2021-12-20T00:24:23.159311Z | 2021-08-03T01:57:16.084769Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8d2451f4994fa60a57617282bab91b98266a00b1'} |
Linux | GSD-2022-1002500 | drm/tegra: Fix reference leak in tegra_dsi_ganged_probe | drm/tegra: Fix reference leak in tegra_dsi_ganged_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit 0e2f4e434e71dffd1085c3dccd676514bd71d316, it was introduced in version v3.19 by commit e94236cde4d519cdecd45e2435defba33abdc99f. For more details please see the references link. | null | 2022-04-25T06:51:42.052029Z | 2022-04-24T22:54:54.415640Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e94236cde4d519cdecd45e2435defba33abdc99f'} |
Linux | GSD-2021-1001050 | kvm: LAPIC: Restore guard to prevent illegal APIC register access | kvm: LAPIC: Restore guard to prevent illegal APIC register access
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit a2aff09807fbe4018c269d3773a629949058b210, it was introduced in version v5.3 by commit 01402cf81051f796dac7c60ca11d6147153ca46a. For more details please see the references link. | null | 2021-12-20T01:17:02.836486Z | 2021-06-30T00:36:20.924806Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/01402cf81051f796dac7c60ca11d6147153ca46a'} |
Linux | GSD-2022-1002150 | netfilter: nf_tables: initialize registers in nft_do_chain() | netfilter: nf_tables: initialize registers in nft_do_chain()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.109 by commit 2c74374c2e88c7b7992bf808d9f9391f7452f9d9, it was introduced in version v3.13 by commit 96518518cc417bb0a8c80b9fb736202e28acdf96. For more details please see the references link. | null | 2022-04-25T04:20:59.682930Z | 2022-04-24T22:16:25.426030Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/96518518cc417bb0a8c80b9fb736202e28acdf96'} |
Linux | GSD-2022-1000497 | Revert "gfs2: check context in gfs2_glock_put" | Revert "gfs2: check context in gfs2_glock_put"
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 4ad70fad65d7faf7d3d3126218eba48651d0674a, it was introduced in version v5.16 by commit 660a6126f8c3208f6df8d552039cda078a8426d1. For more details please see the references link. | null | 2022-03-07T01:39:11.748482Z | 2022-02-27T03:15:23.458290Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/660a6126f8c3208f6df8d552039cda078a8426d1'} |
Linux | GSD-2021-1001400 | media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() | media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.241 by commit e818f2ff648581a6c553ae2bebc5dcef9a8bb90c, it was introduced in version v2.6.34 by commit dae52d009fc950b5c209260d50fcc000f5becd3c. For more details please see the references link. | null | 2021-12-20T00:39:54.718873Z | 2021-08-03T02:29:25.500907Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/dae52d009fc950b5c209260d50fcc000f5becd3c'} |
Linux | GSD-2021-1002386 | staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() | staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.257 by commit c0ef0e75a858cbd8618b473f22fbca36106dcf82, it was introduced in version v3.2 by commit 66898177e7e5486dc77a4ba742efa4e2e9e900a4. For more details please see the references link. | null | 2021-12-19T22:19:48.568905Z | 2021-12-19T19:35:05.206057Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/66898177e7e5486dc77a4ba742efa4e2e9e900a4'} |
Linux | GSD-2021-1001953 | nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells | nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.252 by commit 2df6c023050205c4d04ffc121bc549f65cb8d1df, it was introduced in version v4.3 by commit 69aba7948cbe53f2f1827e84e9dd0ae470a5072e. For more details please see the references link. | null | 2021-12-19T22:21:59.262673Z | 2021-11-14T15:13:13.670989Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69aba7948cbe53f2f1827e84e9dd0ae470a5072e'} |
Linux | GSD-2021-1000641 | USB: usbfs: Don't WARN about excessively large memory allocations | USB: usbfs: Don't WARN about excessively large memory allocations
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.124 by commit 2c835fede13e03f2743a333e4370b5ed2db91e83, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T22:19:26.106995Z | 2021-06-04T19:52:57.584166Z | null | null | null | null | null |
Linux | GSD-2022-1001286 | video: fbdev: sm712fb: Fix crash in smtcfb_read() | video: fbdev: sm712fb: Fix crash in smtcfb_read()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit e46779a5706941fb9cd6e0264427953eb77d7888. For more details please see the references link. | null | 2022-04-25T06:25:09.031467Z | 2022-04-24T21:01:26.142340Z | null | null | null | null | null |
Linux | GSD-2021-1000211 | arm64: entry: always set GIC_PRIO_PSR_I_SET during entry | arm64: entry: always set GIC_PRIO_PSR_I_SET during entry
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.5 by commit d8d52005f57bbb4a4ec02f647e2555d327135c68, it was introduced in version v5.10 by commit 23529049c68423820487304f244144e0d576e85a. For more details please see the references link. | null | 2021-12-19T22:39:04.663622Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/23529049c68423820487304f244144e0d576e85a'} |
Linux | GSD-2022-1000881 | mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work | mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.183 by commit 964f155c382f80242a0ba15034a2e792788f5c1c. For more details please see the references link. | null | 2022-03-18T02:50:15.049887Z | 2022-03-18T00:27:13.107029Z | null | null | null | null | null |
Linux | GSD-2022-1001793 | ext4: don't BUG if someone dirty pages without asking ext4 first | ext4: don't BUG if someone dirty pages without asking ext4 first
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit a0856764dc1276ad2dc7891288c2e9246bf11a37. For more details please see the references link. | null | 2022-04-25T06:23:31.560786Z | 2022-04-24T21:42:38.409067Z | null | null | null | null | null |
Linux | GSD-2021-1001816 | mm, slub: fix mismatch between reconstructed freelist depth and cnt | mm, slub: fix mismatch between reconstructed freelist depth and cnt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.156 by commit a1ec195a1943c39fffa96e47ab6532d74a9f4c78, it was introduced in version v4.17 by commit c3895391df385c6628638f014c87e16f5e2efd45. For more details please see the references link. | null | 2021-12-20T00:50:03.654005Z | 2021-10-28T13:50:26.796632Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c3895391df385c6628638f014c87e16f5e2efd45'} |
Linux | GSD-2021-1000704 | tipc: skb_linearize the head skb when reassembling msgs | tipc: skb_linearize the head skb when reassembling msgs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.271 by commit b2c8d28c34b3070407cb1741f9ba3f15d0284b8b, it was introduced in version v4.3 by commit 45c8b7b175ceb2d542e0fe15247377bf3bce29ec. For more details please see the references link. | null | 2021-12-19T23:34:42.495466Z | 2021-06-04T20:06:11.054366Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/45c8b7b175ceb2d542e0fe15247377bf3bce29ec'} |
Linux | GSD-2021-1002739 | sch_cake: do not call cake_destroy() from cake_init() | sch_cake: do not call cake_destroy() from cake_init()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit f6deae2e2d83bd267e1986f5d71d8c458e18fd99, it was introduced in version v4.19 by commit 046f6fd5daefac7f5abdafb436b30f63bc7c602b. For more details please see the references link. | null | 2022-01-11T05:59:03.782397Z | 2021-12-27T05:45:53.208318Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/046f6fd5daefac7f5abdafb436b30f63bc7c602b'} |
Linux | GSD-2022-1001269 | f2fs: fix missing free nid in f2fs_handle_failed_inode | f2fs: fix missing free nid in f2fs_handle_failed_inode
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 8579b413af100ec5f3592bd6cf11559312b380c0, it was introduced in version v4.19 by commit 7735730d39d75e70476c1b01435b9b1f41637f0e. For more details please see the references link. | null | 2022-04-25T03:59:18.029941Z | 2022-04-24T20:59:55.377942Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7735730d39d75e70476c1b01435b9b1f41637f0e'} |
Linux | GSD-2021-1000354 | i2c: imx: fix reference leak when pm_runtime_get_sync fails | i2c: imx: fix reference leak when pm_runtime_get_sync fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 3a0cdd336d92c429b51a79bf4f64b17eafa0325d, it was introduced in version v5.7 by commit 3a5ee18d2a32bda6b9a1260136f6805848e3839d. For more details please see the references link. | null | 2021-12-19T23:39:41.854096Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3a5ee18d2a32bda6b9a1260136f6805848e3839d'} |
Linux | GSD-2021-1002369 | staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() | staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.292 by commit 9186680382934b0e7529d3d70dcc0a21d087683b, it was introduced in version v3.2 by commit 66898177e7e5486dc77a4ba742efa4e2e9e900a4. For more details please see the references link. | null | 2021-12-19T23:38:40.308474Z | 2021-12-19T19:34:16.821381Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/66898177e7e5486dc77a4ba742efa4e2e9e900a4'} |
Linux | GSD-2021-1002693 | sch_cake: do not call cake_destroy() from cake_init() | sch_cake: do not call cake_destroy() from cake_init()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.88 by commit 20ad1ef02f9ad5e1dda9eeb113e4c158b4806986, it was introduced in version v4.19 by commit 046f6fd5daefac7f5abdafb436b30f63bc7c602b. For more details please see the references link. | null | 2022-01-11T05:48:00.182082Z | 2021-12-27T05:37:05.913773Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/046f6fd5daefac7f5abdafb436b30f63bc7c602b'} |
Linux | GSD-2022-1001639 | ax25: Fix UAF bugs in ax25 timers | ax25: Fix UAF bugs in ax25 timers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.35 by commit 85f25bb9a0051198af48ac2f3afc9f16f2277114. For more details please see the references link. | null | 2022-04-25T06:25:44.261333Z | 2022-04-24T21:30:49.684968Z | null | null | null | null | null |
Linux | GSD-2022-1000182 | bpf: Guard against accessing NULL pt_regs in bpf_get_task_stack() | bpf: Guard against accessing NULL pt_regs in bpf_get_task_stack()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.96 by commit ff6bdc205fd0a83bd365405d4e31fb5905826996, it was introduced in version v5.9 by commit fa28dcb82a38f8e3993b0fae9106b1a80b59e4f0. For more details please see the references link. | null | 2022-02-19T11:00:09.418980Z | 2022-02-18T21:51:57.077581Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fa28dcb82a38f8e3993b0fae9106b1a80b59e4f0'} |
Linux | GSD-2021-1001115 | mac80211: remove warning in ieee80211_get_sband() | mac80211: remove warning in ieee80211_get_sband()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.129 by commit ae9de9444b54c867c9fc1383a6dcba1018cddaea. For more details please see the references link. | null | 2021-12-20T01:10:07.719963Z | 2021-07-08T01:57:19.202296Z | null | null | null | null | null |
Linux | GSD-2022-1002445 | media: usb: go7007: s2250-board: fix leak in probe() | media: usb: go7007: s2250-board: fix leak in probe()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit a97130cd5b0c00eec169b10a16d922b9ea67324a, it was introduced in version v3.10 by commit d3b2ccd9e307eae80b4b4eeb0ede46cb02212df2. For more details please see the references link. | null | 2022-04-25T04:18:04.539524Z | 2022-04-24T22:48:38.495645Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d3b2ccd9e307eae80b4b4eeb0ede46cb02212df2'} |
Linux | GSD-2022-1000478 | Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj | Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit c377e2ba78d3fe9a1f0b4ec424e75f81da7e81e9, it was introduced in version v4.15 by commit c2e5df616e1ae6c2a074cb241ebb65a318ebaf7c. For more details please see the references link. | null | 2022-03-07T01:31:54.747925Z | 2022-02-27T03:12:35.263890Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c2e5df616e1ae6c2a074cb241ebb65a318ebaf7c'} |
Linux | GSD-2021-1001545 | mcb: fix error handling in mcb_alloc_bus() | mcb: fix error handling in mcb_alloc_bus()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.249 by commit 115b07d9f47e3996430b8f2007edd9768e1f807f, it was introduced in version v4.7 by commit 5d9e2ab9fea4cdf0a2522f5cbed2e7fbb220d757. For more details please see the references link. | null | 2021-12-19T22:49:39.800550Z | 2021-10-19T16:23:06.790625Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5d9e2ab9fea4cdf0a2522f5cbed2e7fbb220d757'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.