ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2022-1000842
cifs: fix double free race when mount fails in cifs_get_root()
cifs: fix double free race when mount fails in cifs_get_root() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.104 by commit df9db1a2af37f39ad1653c7b9b0d275d72d0bc67. For more details please see the references link.
null
2022-03-18T03:37:36.533329Z
2022-03-18T00:23:12.399895Z
null
null
null
null
null
Linux
GSD-2022-1001750
ACPI: CPPC: Avoid out of bounds access when parsing _CPC data
ACPI: CPPC: Avoid out of bounds access when parsing _CPC data This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 97b5593fd1b182b3fdb180b6bbe64ec09669988b, it was introduced in version v4.4 by commit 337aadff8e4567e39669e07d9a88b789d78458b5. For more details please see the references link.
null
2022-04-25T05:16:21.718996Z
2022-04-24T21:39:25.190604Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/337aadff8e4567e39669e07d9a88b789d78458b5'}
Linux
GSD-2021-1002650
net: netlink: af_netlink: Prevent empty skb by adding a check on len.
net: netlink: af_netlink: Prevent empty skb by adding a check on len. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.222 by commit ff3f517bf7138e01a17369042908a3f345c0ee41. For more details please see the references link.
null
2022-01-11T06:41:55.123193Z
2021-12-27T05:33:03.550872Z
null
null
null
null
null
Linux
GSD-2022-1001300
dm: fix use-after-free in dm_cleanup_zoned_dev()
dm: fix use-after-free in dm_cleanup_zoned_dev() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 43a043aed964659bc69ef81f266912b73c80d837, it was introduced in version v5.14 by commit bb37d77239af25cde59693dbe3fac04dd17d7b29. For more details please see the references link.
null
2022-04-25T04:59:33.883538Z
2022-04-24T21:02:19.874302Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bb37d77239af25cde59693dbe3fac04dd17d7b29'}
Linux
GSD-2021-1000397
mt76: fix potential DMA mapping leak
mt76: fix potential DMA mapping leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 9fa26701cd1fc4d932d431971efc5746325bdfce, it was introduced in version v5.10 by commit 27d5c528a7ca08dcd44877fdd9fc08b76630bf77. For more details please see the references link.
null
2021-12-19T23:08:23.855683Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/27d5c528a7ca08dcd44877fdd9fc08b76630bf77'}
Linux
GSD-2022-1002486
ARM: mmp: Fix failure to remove sram device
ARM: mmp: Fix failure to remove sram device This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit 734ff1117d5f7d7ca41bda5666366bb95fbc062b. For more details please see the references link.
null
2022-04-25T05:40:56.850941Z
2022-04-24T22:53:19.577430Z
null
null
null
null
null
Linux
GSD-2022-1000141
ASoC: max9759: fix underflow in speaker_gain_control_put()
ASoC: max9759: fix underflow in speaker_gain_control_put() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.228 by commit a0f49d12547d45ea8b0f356a96632dd503941c1e, it was introduced in version v4.17 by commit fa8d915172b8c10ec0734c4021e99e9705023b07. For more details please see the references link.
null
2022-02-20T06:17:24.036178Z
2022-02-18T21:46:32.836064Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fa8d915172b8c10ec0734c4021e99e9705023b07'}
Linux
GSD-2022-1000511
net: dsa: seville: register the mdiobus under devres
net: dsa: seville: register the mdiobus under devres This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 0e816362d823cd46c666e64d8bffe329ee22f4cc, it was introduced in version v5.9 by commit ac3a68d56651c3dad2c12c7afce065fe15267f44. For more details please see the references link.
null
2022-03-07T01:32:33.086850Z
2022-02-27T03:16:57.621522Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac3a68d56651c3dad2c12c7afce065fe15267f44'}
Linux
GSD-2021-1001586
HID: usbhid: free raw_report buffers in usbhid_stop
HID: usbhid: free raw_report buffers in usbhid_stop This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.151 by commit 965147067fa1bedff3ae1f07ce3f89f1a14d2df3. For more details please see the references link.
null
2021-12-19T23:04:17.786464Z
2021-10-19T16:25:02.343658Z
null
null
null
null
null
Linux
GSD-2021-1002579
serial: core: fix transmit-buffer reset and memleak
serial: core: fix transmit-buffer reset and memleak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.7 by commit 64e491c1634b73d3bddc081d08620bdc92ab2c12, it was introduced in version v4.9 by commit 761ed4a94582ab291aa24dcbea4e01e8936488c8. For more details please see the references link.
null
2021-12-19T23:48:15.067870Z
2021-12-19T19:43:35.450578Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/761ed4a94582ab291aa24dcbea4e01e8936488c8'}
Linux
GSD-2021-1000544
octeontx2-pf: fix a buffer overflow in otx2_set_rxfh_context()
octeontx2-pf: fix a buffer overflow in otx2_set_rxfh_context() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit 389146bc6d2bbb20714d06624b74856320ce40f7, it was introduced in version v5.12 by commit 81a4362016e7d8b17031fe1aa43cdb58a7f0f163. For more details please see the references link.
null
2021-12-20T00:31:02.446075Z
2021-06-04T19:36:01.837801Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/81a4362016e7d8b17031fe1aa43cdb58a7f0f163'}
Linux
GSD-2021-1002083
misc: fastrpc: Add missing lock before accessing find_vma()
misc: fastrpc: Add missing lock before accessing find_vma() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit d22592f1fd8d4bf54fa1cc0ef9122c983d82f30a, it was introduced in version v5.2 by commit 80f3afd72bd4149c57daf852905476b43bb47647. For more details please see the references link.
null
2021-12-20T00:03:40.873644Z
2021-11-14T15:19:05.643181Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80f3afd72bd4149c57daf852905476b43bb47647'}
Linux
GSD-2022-1001029
virtio_console: eliminate anonymous module_init & module_exit
virtio_console: eliminate anonymous module_init & module_exit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 71612aee09ecea3475f8751dc841d75a011b1fd0. For more details please see the references link.
null
2022-04-25T06:17:27.264658Z
2022-04-24T20:41:15.024145Z
null
null
null
null
null
Linux
GSD-2022-1001183
mxser: fix xmit_buf leak in activate when LSR == 0xff
mxser: fix xmit_buf leak in activate when LSR == 0xff This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 6dffc2035fbaada60ca8db59e0962e34f760370a, it was introduced in version v2.6.33 by commit 6769140d304731f0a3b177470a2adb4bacd9036b. For more details please see the references link.
null
2022-04-25T06:10:46.021673Z
2022-04-24T20:51:44.447740Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6769140d304731f0a3b177470a2adb4bacd9036b'}
Linux
GSD-2021-1002129
cgroup: Fix memory leak caused by missing cgroup_bpf_offline
cgroup: Fix memory leak caused by missing cgroup_bpf_offline This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.16 by commit b529f88d93884cf8ccafda793ee3d27b82fa578d, it was introduced in version v5.10 by commit 2b0d3d3e4fcfb19d10f9a82910b8f0f05c56ee3e. For more details please see the references link.
null
2021-12-19T23:08:55.014602Z
2021-11-14T15:21:15.061166Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2b0d3d3e4fcfb19d10f9a82910b8f0f05c56ee3e'}
Linux
GSD-2021-1000114
cifs: Return correct error code from smb2_get_enc_key
cifs: Return correct error code from smb2_get_enc_key This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.20 by commit f59a9242942fef0de7b926e438ba4eae65d4b4dd, it was introduced in version v4.11 by commit 61cfac6f267dabcf2740a7ec8a0295833b28b5f5. For more details please see the references link.
null
2021-12-19T22:33:20.108746Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61cfac6f267dabcf2740a7ec8a0295833b28b5f5'}
Linux
GSD-2022-1001479
Revert "Revert "block, bfq: honor already-setup queue merges""
Revert "Revert "block, bfq: honor already-setup queue merges"" This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit abc2129e646af7b43025d90a071f83043f1ae76c. For more details please see the references link.
null
2022-04-25T05:46:46.785258Z
2022-04-24T21:15:50.559124Z
null
null
null
null
null
Linux
GSD-2021-1001355
drm/sched: Avoid data corruptions
drm/sched: Avoid data corruptions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.133 by commit c32d0f0e164ffab2a56c7cf8e612584b4b740e2e. For more details please see the references link.
null
2021-12-19T23:17:38.079452Z
2021-08-03T02:16:27.568093Z
null
null
null
null
null
Linux
GSD-2022-1000638
net/mlx5e: Fix handling of wrong devices during bond netevent
net/mlx5e: Fix handling of wrong devices during bond netevent This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.6 by commit 4fad499d7fece448e7230d5e5b92f6d8a073e0bb, it was introduced in version v5.8 by commit 7e51891a237f9ea319f53f9beb83afb0077d88e6. For more details please see the references link.
null
2022-03-07T01:34:26.155133Z
2022-02-27T03:34:48.358002Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7e51891a237f9ea319f53f9beb83afb0077d88e6'}
Linux
GSD-2022-1000792
thermal: int340x: fix memory leak in int3400_notify()
thermal: int340x: fix memory leak in int3400_notify() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.26 by commit ba9efbbf6745750d34c1e87c9539ce9db645ca0a, it was introduced in version v4.14 by commit 38e44da591303d08b0d965a033e11ade284999d0. For more details please see the references link.
null
2022-03-18T02:59:10.038824Z
2022-03-18T00:18:18.411243Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/38e44da591303d08b0d965a033e11ade284999d0'}
Linux
GSD-2022-1001880
ASoC: codecs: rx-macro: fix accessing array out of bounds for enum type
ASoC: codecs: rx-macro: fix accessing array out of bounds for enum type This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit eb15c6ea692fd88d70698d874d9a0d667fb4cde9, it was introduced in version v5.12 by commit 4f692926f562ff48abfcca6b16f36ff8d57473b6. For more details please see the references link.
null
2022-04-25T03:09:37.225415Z
2022-04-24T21:51:20.425025Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4f692926f562ff48abfcca6b16f36ff8d57473b6'}
Linux
GSD-2021-1001705
usb: dwc2: check return value after calling platform_get_resource()
usb: dwc2: check return value after calling platform_get_resource() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.11 by commit 337f00a0bc62d7cb7d10ec0b872c79009a1641df. For more details please see the references link.
null
2021-12-19T23:09:33.500783Z
2021-10-19T16:32:46.174020Z
null
null
null
null
null
Linux
GSD-2021-1000817
btrfs: fix fsync failure and transaction abort after writes to prealloc extents
btrfs: fix fsync failure and transaction abort after writes to prealloc extents This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.10 by commit b37885cc013516f0412d7d2e99f043dd112c99a6, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T01:01:58.777300Z
2021-06-25T00:09:15.534336Z
null
null
null
null
null
Linux
GSD-2022-1000268
block: Fix wrong offset in bio_truncate()
block: Fix wrong offset in bio_truncate() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.19 by commit 4633a79ff8bc82770486a063a08b55e5162521d8. For more details please see the references link.
null
2022-02-19T02:54:44.404045Z
2022-02-18T22:04:15.608049Z
null
null
null
null
null
Linux
GSD-2022-1002255
Bluetooth: hci_serdev: call init_rwsem() before p->open()
Bluetooth: hci_serdev: call init_rwsem() before p->open() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit d58d281d6a3f49ce83b82f8211c396ba34c0304f, it was introduced in version v4.16 by commit d73e172816652772114827abaa2dbc053eecbbd7. For more details please see the references link.
null
2022-04-25T06:22:23.982739Z
2022-04-24T22:26:50.966786Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d73e172816652772114827abaa2dbc053eecbbd7'}
Linux
GSD-2022-1000287
net: do not keep the dst cache when uncloning an skb dst and its metadata
net: do not keep the dst cache when uncloning an skb dst and its metadata This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.302 by commit cbb43514c830cdf0f021ea74e7375a29baf80f8f, it was introduced in version v4.6 by commit d71785ffc7e7cae3fbdc4ea8a9d05b7a1c59f7b8. For more details please see the references link.
null
2022-03-07T01:53:36.542085Z
2022-02-27T02:38:33.408711Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d71785ffc7e7cae3fbdc4ea8a9d05b7a1c59f7b8'}
Linux
GSD-2021-1001210
btrfs: fix deadlock with concurrent chunk allocations involving system chunks
btrfs: fix deadlock with concurrent chunk allocations involving system chunks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.4 by commit 789b24d9950d3e67b227f81b3fab912a8fb257af, it was introduced in version v5.13 by commit eafa4fd0ad06074da8be4e28ff93b4dca9ffa407. For more details please see the references link.
null
2021-12-20T00:11:45.832060Z
2021-08-03T01:37:48.716851Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/eafa4fd0ad06074da8be4e28ff93b4dca9ffa407'}
Linux
GSD-2022-1002310
virtio_console: eliminate anonymous module_init & module_exit
virtio_console: eliminate anonymous module_init & module_exit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 0f3d824bd70a1303464d5e93ee3e7afe7832fe89. For more details please see the references link.
null
2022-04-25T05:18:39.799708Z
2022-04-24T22:33:10.699790Z
null
null
null
null
null
Linux
GSD-2021-1001640
ext4: fix reserved space counter leakage
ext4: fix reserved space counter leakage This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.71 by commit 9ccf35492b084ecbc916761a5c6f42599450f013, it was introduced in version v3.8 by commit 51865fda28e585bdcc164474ff6438a9ccdbfada. For more details please see the references link.
null
2021-12-19T23:36:10.732592Z
2021-10-19T16:29:30.384327Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/51865fda28e585bdcc164474ff6438a9ccdbfada'}
Linux
GSD-2021-1000952
tracing: Correct the length check which causes memory corruption
tracing: Correct the length check which causes memory corruption This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.44 by commit 43c32c22254b9328d7abb1c2b0f689dc67838e60, it was introduced in version v5.10.17 by commit 7c93d8cff582c459350d6f8906eea6e4cd60d959. For more details please see the references link.
null
2021-12-20T00:57:20.413326Z
2021-06-30T00:28:52.852610Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7c93d8cff582c459350d6f8906eea6e4cd60d959'}
Linux
GSD-2022-1001496
pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe
pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 9511c6018cd772668def8b034bc67269847e591a, it was introduced in version v3.9 by commit 32e67eee670e1254ee5ab41e2f454680acb9c17c. For more details please see the references link.
null
2022-04-25T03:38:06.540477Z
2022-04-24T21:17:11.350116Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/32e67eee670e1254ee5ab41e2f454680acb9c17c'}
Linux
GSD-2021-1000401
soc/tegra: regulators: Fix locking up when voltage-spread is out of range
soc/tegra: regulators: Fix locking up when voltage-spread is out of range This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit a1ad124c836816fac8bd5e461d36eaf33cee4e24, it was introduced in version v5.5 by commit 783807436f363e5b1ad4d43ba7debbedfcadbb99. For more details please see the references link.
null
2021-12-20T00:49:31.822752Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/783807436f363e5b1ad4d43ba7debbedfcadbb99'}
Linux
GSD-2021-1002596
btrfs: fix re-dirty process of tree-log nodes
btrfs: fix re-dirty process of tree-log nodes This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.8 by commit 477675049ca803aa95ff77468ffbddd966b415b0, it was introduced in version v5.12 by commit d3575156f6623eecf086a20bcf99a63f1598109c. For more details please see the references link.
null
2021-12-19T23:01:21.781147Z
2021-12-19T19:44:24.654900Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d3575156f6623eecf086a20bcf99a63f1598109c'}
Linux
GSD-2021-1000246
i2c: img-scb: fix reference leak when pm_runtime_get_sync fails
i2c: img-scb: fix reference leak when pm_runtime_get_sync fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 7ee35cde1e810ad6ca589980b9ec2b7b62946a5b, it was introduced in version v4.15 by commit 93222bd9b966105f43418fd336654ad10045783a. For more details please see the references link.
null
2021-12-19T22:27:17.642467Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/93222bd9b966105f43418fd336654ad10045783a'}
Linux
GSD-2021-1002781
f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()
f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.260 by commit 88dedecc24763c2e0bc1e8eeb35f9f2cd785a7e5. For more details please see the references link.
null
2022-01-11T05:53:38.879606Z
2021-12-30T02:43:10.935625Z
null
null
null
null
null
Linux
GSD-2022-1000839
ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min
ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.104 by commit 6951a5888165a38bb7c39a2d18f5668b2f1241c7, it was introduced in version v5.10.99 by commit a9394f21fba027147bf275b083c77955864c366a. For more details please see the references link.
null
2022-03-18T02:54:44.847060Z
2022-03-18T00:23:02.556776Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a9394f21fba027147bf275b083c77955864c366a'}
Linux
GSD-2022-1000993
KVM: avoid NULL pointer dereference in kvm_dirty_ring_push
KVM: avoid NULL pointer dereference in kvm_dirty_ring_push This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit e8d7f0dad29e634e26d4614cfbd081514c16e042. For more details please see the references link.
null
2022-04-25T03:43:31.342614Z
2022-04-24T20:37:55.811763Z
null
null
null
null
null
Linux
GSD-2022-1001681
drbd: Fix five use after free bugs in get_initial_state
drbd: Fix five use after free bugs in get_initial_state This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit a972c768723359ec995579902473028fe3cd64b1, it was introduced in version v4.5 by commit a29728463b254ce81ecefdf20c1a02e01d9361da. For more details please see the references link.
null
2022-04-25T04:58:47.137668Z
2022-04-24T21:34:38.102136Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a29728463b254ce81ecefdf20c1a02e01d9361da'}
Linux
GSD-2021-1001904
net: encx24j600: check error in devm_regmap_init_encx24j600
net: encx24j600: check error in devm_regmap_init_encx24j600 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit 322c0e53496309e634d9db7349678eaad1d25b55, it was introduced in version v4.4 by commit 04fbfce7a222327b97ca165294ef19f0faa45960. For more details please see the references link.
null
2021-12-19T23:19:29.699909Z
2021-10-28T13:54:57.339746Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/04fbfce7a222327b97ca165294ef19f0faa45960'}
Linux
GSD-2021-1000616
net: lantiq: fix memory corruption in RX ring
net: lantiq: fix memory corruption in RX ring This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.124 by commit 8bb1077448d43a871ed667520763e3b9f9b7975d, it was introduced in version v4.20 by commit fe1a56420cf2ec28c8eceef672b87de0bbe1a260. For more details please see the references link.
null
2021-12-20T00:44:03.143504Z
2021-06-04T19:48:05.957959Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fe1a56420cf2ec28c8eceef672b87de0bbe1a260'}
Linux
GSD-2021-1001457
RDMA/cma: Fix rdma_resolve_route() memory leak
RDMA/cma: Fix rdma_resolve_route() memory leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.276 by commit e2da8ce2a9543f3ca5c93369bd1fe6eeb572101a. For more details please see the references link.
null
2021-12-19T22:39:43.823093Z
2021-08-03T02:46:52.899518Z
null
null
null
null
null
Linux
GSD-2022-1002107
ASoC: soc-compress: prevent the potentially use of null pointer
ASoC: soc-compress: prevent the potentially use of null pointer This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 4639c1d97f385f4784f44d66a3da0672f4951ada, it was introduced in version v5.4 by commit 467fece8fbc6774a3a3bd0981e1a342fb5022706. For more details please see the references link.
null
2022-04-25T04:56:27.744965Z
2022-04-24T22:12:11.808908Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/467fece8fbc6774a3a3bd0981e1a342fb5022706'}
Linux
GSD-2022-1000090
ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx()
ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.300 by commit 17e16a66b4f9a310713d8599e6e1ca4a0c9fd28c. For more details please see the references link.
null
2022-02-20T02:10:00.015014Z
2022-02-18T21:34:04.999111Z
null
null
null
null
null
Linux
GSD-2021-1001007
net: bridge: fix vlan tunnel dst refcnt when egressing
net: bridge: fix vlan tunnel dst refcnt when egressing This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit fc7fdd8c5c2ad2fe3e297698be9d4dbe4a4e0579, it was introduced in version v4.11 by commit 11538d039ac6efcf4f1a6c536e1b87cd3668a9fd. For more details please see the references link.
null
2021-12-20T01:40:10.231641Z
2021-06-30T00:33:31.526263Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/11538d039ac6efcf4f1a6c536e1b87cd3668a9fd'}
Linux
GSD-2022-1002042
powerpc/kasan: Fix early region not updated correctly
powerpc/kasan: Fix early region not updated correctly This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit f39a3309393a4a484532f6ba745c6acbcfe06115, it was introduced in version v5.4 by commit cbd18991e24fea2c31da3bb117c83e4a3538cd11. For more details please see the references link.
null
2022-04-25T03:00:30.574987Z
2022-04-24T22:05:30.882734Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cbd18991e24fea2c31da3bb117c83e4a3538cd11'}
Linux
GSD-2022-1000585
spi: uniphier: fix reference count leak in uniphier_spi_probe()
spi: uniphier: fix reference count leak in uniphier_spi_probe() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.22 by commit dd00b4f8f768d81c3788a8ac88fdb3d745e55ea3, it was introduced in version v5.6 by commit 28d1dddc59f6b7fc085093e7c1e978b33f0caf4c. For more details please see the references link.
null
2022-03-07T01:30:31.720120Z
2022-02-27T03:27:33.880384Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/28d1dddc59f6b7fc085093e7c1e978b33f0caf4c'}
Linux
GSD-2021-1001512
HID: betop: fix slab-out-of-bounds Write in betop_probe
HID: betop: fix slab-out-of-bounds Write in betop_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.285 by commit 6fc4476dda58f6c00097c7ddec3b772513f57525. For more details please see the references link.
null
2021-12-20T00:15:26.357899Z
2021-10-19T16:21:35.550687Z
null
null
null
null
null
Linux
GSD-2022-1002412
ACPI: CPPC: Avoid out of bounds access when parsing _CPC data
ACPI: CPPC: Avoid out of bounds access when parsing _CPC data This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit d208ea44e25b31db5a4d5e8c31df51787a3e9303, it was introduced in version v4.4 by commit 337aadff8e4567e39669e07d9a88b789d78458b5. For more details please see the references link.
null
2022-04-25T04:55:32.673542Z
2022-04-24T22:44:37.933072Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/337aadff8e4567e39669e07d9a88b789d78458b5'}
Linux
GSD-2021-1001142
net: caif: fix memory leak in ldisc_open
net: caif: fix memory leak in ldisc_open This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13 by commit 58af3d3d54e87bfc1f936e16c04ade3369d34011. For more details please see the references link.
null
2021-12-20T00:06:42.011322Z
2021-07-08T01:59:17.680696Z
null
null
null
null
null
Linux
GSD-2022-1001394
scsi: hisi_sas: Free irq vectors in order for v3 HW
scsi: hisi_sas: Free irq vectors in order for v3 HW This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 8b6eab9d683bae7f88dc894b8c851f866032301c. For more details please see the references link.
null
2022-04-25T04:22:19.088824Z
2022-04-24T21:10:11.596922Z
null
null
null
null
null
Linux
GSD-2021-1000303
rtw88: Fix array overrun in rtw_get_tx_power_params()
rtw88: Fix array overrun in rtw_get_tx_power_params() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 9cd09722e18a08b6a3d68b8bccfac39ddc22434c, it was introduced in version v5.3 by commit fa6dfe6bff246ddd5be3cfe81637f137acd6c294. For more details please see the references link.
null
2021-12-20T00:44:32.855490Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fa6dfe6bff246ddd5be3cfe81637f137acd6c294'}
Linux
GSD-2021-1002294
usb: host: ohci-tmio: check return value after calling platform_get_resource()
usb: host: ohci-tmio: check return value after calling platform_get_resource() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.82 by commit 2474eb7fc3bfbce10f7b8ea431fcffe5dd5f5100. For more details please see the references link.
null
2021-12-20T00:17:23.802259Z
2021-11-29T02:37:25.222928Z
null
null
null
null
null
Linux
GSD-2021-1001841
powerpc/idle: Don't corrupt back chain when going idle
powerpc/idle: Don't corrupt back chain when going idle This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit c5c2a80368e97ac179d6a101c99f1e1f36146ec2, it was introduced in version v5.10.76 by commit fbd724c49bead048ae9fc1a5b7bff2fb3e54f855. For more details please see the references link.
null
2021-10-28T13:51:42.165391Z
2021-10-28T13:51:42.165391Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fbd724c49bead048ae9fc1a5b7bff2fb3e54f855'}
Linux
GSD-2021-1000753
ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed
ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.125 by commit 920697b004e49cb026e2e15fe91be065bf0741b7, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T23:38:52.603560Z
2021-06-25T00:02:32.759848Z
null
null
null
null
null
Linux
GSD-2022-1000706
mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls
mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.13 by commit da0fccd842cdd4d15cc620241145e0648bfdd753, it was introduced in version v5.15 by commit 7661809d493b426e979f39ab512e3adf41fbcc69. For more details please see the references link.
null
2022-03-18T02:49:32.597310Z
2022-03-18T00:11:22.866952Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7661809d493b426e979f39ab512e3adf41fbcc69'}
Linux
GSD-2022-1001814
pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe
pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit c52703355766c347f270df222a744e0c491a02f2, it was introduced in version v3.9 by commit 32e67eee670e1254ee5ab41e2f454680acb9c17c. For more details please see the references link.
null
2022-04-25T04:14:29.022361Z
2022-04-24T21:44:27.282473Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/32e67eee670e1254ee5ab41e2f454680acb9c17c'}
Linux
GSD-2021-1001791
ocfs2: mount fails with buffer overflow in strlen
ocfs2: mount fails with buffer overflow in strlen This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.253 by commit 232ed9752510de4436468b653d145565669c8498. For more details please see the references link.
null
2021-12-19T23:28:38.935435Z
2021-10-28T13:49:02.010510Z
null
null
null
null
null
Linux
GSD-2021-1000883
NFS: Fix use-after-free in nfs4_init_client()
NFS: Fix use-after-free in nfs4_init_client() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.195 by commit 42c10b0db064e45f5c5ae7019bbf2168ffab766c, it was introduced in version v4.13 by commit 8dcbec6d20eb881ba368d0aebc3a8a678aebb1da. For more details please see the references link.
null
2021-12-20T00:10:31.291765Z
2021-06-30T00:03:29.374204Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8dcbec6d20eb881ba368d0aebc3a8a678aebb1da'}
Linux
GSD-2022-1000356
mtd: rawnand: gpmi: don't leak PM reference in error path
mtd: rawnand: gpmi: don't leak PM reference in error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.181 by commit 4cd3281a910a5adf73b2a0a82241dd67844d0b25, it was introduced in version v5.4.174 by commit 29218853877a748a2ca41d9957a84b2d6a7f56a7. For more details please see the references link.
null
2022-03-07T01:33:25.076946Z
2022-02-27T02:55:54.602538Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/29218853877a748a2ca41d9957a84b2d6a7f56a7'}
Linux
GSD-2021-1000929
can: mcba_usb: fix memory leak in mcba_usb
can: mcba_usb: fix memory leak in mcba_usb This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.128 by commit 6f87c0e21ad20dd3d22108e33db1c552dfa352a0, it was introduced in version v4.12 by commit 51f3baad7de943780ce0c17bd7975df567dd6e14. For more details please see the references link.
null
2021-12-20T00:15:19.528293Z
2021-06-30T00:25:09.988305Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/51f3baad7de943780ce0c17bd7975df567dd6e14'}
Linux
GSD-2022-1001117
KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()
KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 9fa2b94443ff41cdecdff6f4d4324d83af01089a. For more details please see the references link.
null
2022-04-25T05:10:12.926884Z
2022-04-24T20:46:55.568910Z
null
null
null
null
null
Linux
GSD-2021-1000180
mmc: uniphier-sd: Fix a resource leak in the remove function
mmc: uniphier-sd: Fix a resource leak in the remove function This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.118 by commit 0d8941b9b2d3e7b3481fdf43b1a6189d162175b7, it was introduced in version v4.20 by commit 3fd784f745dd1747863775a99ec749619ee6759c. For more details please see the references link.
null
2021-12-20T01:01:37.628188Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3fd784f745dd1747863775a99ec749619ee6759c'}
Linux
GSD-2021-1002447
ipv6: fix memory leak in fib6_rule_suppress
ipv6: fix memory leak in fib6_rule_suppress This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.164 by commit ee38eb8cf9a7323884c2b8e0adbbeb2192d31e29, it was introduced in version v5.4 by commit ca7a03c4175366a92cee0ccc4fec0038c3266e26. For more details please see the references link.
null
2021-12-20T00:10:19.452776Z
2021-12-19T19:37:46.953613Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca7a03c4175366a92cee0ccc4fec0038c3266e26'}
Linux
GSD-2022-1001547
igc: avoid kernel warning when changing RX ring parameters
igc: avoid kernel warning when changing RX ring parameters This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 3ddb49af08094ebee250b461172ee7b8e27a35d3, it was introduced in version v5.13 by commit 73f1071c1d2952b8c93cd6cd99744768c59ec840. For more details please see the references link.
null
2022-04-25T03:14:05.623967Z
2022-04-24T21:22:23.457134Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/73f1071c1d2952b8c93cd6cd99744768c59ec840'}
Linux
GSD-2021-1002017
drm/ttm: fix memleak in ttm_transfered_destroy
drm/ttm: fix memleak in ttm_transfered_destroy This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.157 by commit bd99782f3ca491879e8524c89b1c0f40071903bd. For more details please see the references link.
null
2021-12-19T23:48:38.840569Z
2021-11-14T15:16:06.238597Z
null
null
null
null
null
Linux
GSD-2021-1002502
IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr
IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.85 by commit 2c08271f4ed0e24633b3f81ceff61052b9d45efc, it was introduced in version v4.5 by commit 46b010d3eeb8eb29c740c4ef09c666485f5c07e6. For more details please see the references link.
null
2021-12-19T23:25:29.842981Z
2021-12-19T19:40:07.167873Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/46b010d3eeb8eb29c740c4ef09c666485f5c07e6'}
Linux
GSD-2022-1001052
mips: ralink: fix a refcount leak in ill_acc_of_setup()
mips: ralink: fix a refcount leak in ill_acc_of_setup() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit c74c755daed551b9aceb8388159180861474bdfe. For more details please see the references link.
null
2022-04-25T05:27:28.886070Z
2022-04-24T20:42:33.825198Z
null
null
null
null
null
Linux
GSD-2021-1002152
xhci: Fix command ring pointer corruption while aborting a command
xhci: Fix command ring pointer corruption while aborting a command This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit ff0e50d3564f33b7f4b35cadeabd951d66cfc570. For more details please see the references link.
null
2021-12-20T00:40:54.934580Z
2021-11-14T15:22:12.198323Z
null
null
null
null
null
Linux
GSD-2022-1001402
scsi: mpi3mr: Fix memory leaks
scsi: mpi3mr: Fix memory leaks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 27fc9e90171ab0a94a411f3fdb3522ef5acb9537. For more details please see the references link.
null
2022-04-25T05:48:49.474128Z
2022-04-24T21:10:34.850514Z
null
null
null
null
null
Linux
GSD-2021-1000495
uio_hv_generic: Fix a memory leak in error handling paths
uio_hv_generic: Fix a memory leak in error handling paths This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.7 by commit 53486c467e356e06aa37047c984fccd64d78c827, it was introduced in version v4.20 by commit cdfa835c6e5e87d145f9f632b58843de97509f2b. For more details please see the references link.
null
2021-12-19T23:18:17.275463Z
2021-05-31T23:45:56.468200Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cdfa835c6e5e87d145f9f632b58843de97509f2b'}
Linux
GSD-2022-1002384
drivers: net: slip: fix NPD bug in sl_tx_timeout()
drivers: net: slip: fix NPD bug in sl_tx_timeout() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 3fdb033f8f8c978489c7702a4a44494b7ae63424. For more details please see the references link.
null
2022-04-25T06:38:42.879269Z
2022-04-24T22:41:23.320072Z
null
null
null
null
null
Linux
GSD-2022-1000643
ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback
ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.6 by commit 7bf02718b736e66609fc1002a358727a945f46a6, it was introduced in version v5.10 by commit f33d9e2b48a34e1558b67a473a1fc1d6e793f93c. For more details please see the references link.
null
2022-03-07T01:35:10.098205Z
2022-02-27T03:35:22.744862Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f33d9e2b48a34e1558b67a473a1fc1d6e793f93c'}
Linux
GSD-2022-1001951
gcc-plugins: latent_entropy: use /dev/urandom
gcc-plugins: latent_entropy: use /dev/urandom This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.112 by commit cc21ae932656483b07982afcec7e38a5bd6acc0c, it was introduced in version v4.9 by commit 38addce8b600ca335dc86fa3d48c890f1c6fa1f4. For more details please see the references link.
null
2022-04-25T06:35:56.380219Z
2022-04-24T21:57:33.754217Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/38addce8b600ca335dc86fa3d48c890f1c6fa1f4'}
Linux
GSD-2022-1000213
af_packet: fix data-race in packet_setsockopt / packet_setsockopt
af_packet: fix data-race in packet_setsockopt / packet_setsockopt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.97 by commit 32e179971085832f5335e308774a04dd1147a316, it was introduced in version v4.3 by commit 47dceb8ecdc1c3ad1818dfea3d659a05b74c3fc2. For more details please see the references link.
null
2022-02-19T02:38:04.144957Z
2022-02-18T21:56:15.030162Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/47dceb8ecdc1c3ad1818dfea3d659a05b74c3fc2'}
Linux
GSD-2021-1001284
cgroup: verify that source is a string
cgroup: verify that source is a string This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.52 by commit 811763e3beb6c922d168e9f509ec593e9240842e, it was introduced in version v5.1 by commit 8d2451f4994fa60a57617282bab91b98266a00b1. For more details please see the references link.
null
2021-12-20T00:24:23.159311Z
2021-08-03T01:57:16.084769Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8d2451f4994fa60a57617282bab91b98266a00b1'}
Linux
GSD-2022-1002500
drm/tegra: Fix reference leak in tegra_dsi_ganged_probe
drm/tegra: Fix reference leak in tegra_dsi_ganged_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit 0e2f4e434e71dffd1085c3dccd676514bd71d316, it was introduced in version v3.19 by commit e94236cde4d519cdecd45e2435defba33abdc99f. For more details please see the references link.
null
2022-04-25T06:51:42.052029Z
2022-04-24T22:54:54.415640Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e94236cde4d519cdecd45e2435defba33abdc99f'}
Linux
GSD-2021-1001050
kvm: LAPIC: Restore guard to prevent illegal APIC register access
kvm: LAPIC: Restore guard to prevent illegal APIC register access This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit a2aff09807fbe4018c269d3773a629949058b210, it was introduced in version v5.3 by commit 01402cf81051f796dac7c60ca11d6147153ca46a. For more details please see the references link.
null
2021-12-20T01:17:02.836486Z
2021-06-30T00:36:20.924806Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/01402cf81051f796dac7c60ca11d6147153ca46a'}
Linux
GSD-2022-1002150
netfilter: nf_tables: initialize registers in nft_do_chain()
netfilter: nf_tables: initialize registers in nft_do_chain() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.109 by commit 2c74374c2e88c7b7992bf808d9f9391f7452f9d9, it was introduced in version v3.13 by commit 96518518cc417bb0a8c80b9fb736202e28acdf96. For more details please see the references link.
null
2022-04-25T04:20:59.682930Z
2022-04-24T22:16:25.426030Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/96518518cc417bb0a8c80b9fb736202e28acdf96'}
Linux
GSD-2022-1000497
Revert "gfs2: check context in gfs2_glock_put"
Revert "gfs2: check context in gfs2_glock_put" This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 4ad70fad65d7faf7d3d3126218eba48651d0674a, it was introduced in version v5.16 by commit 660a6126f8c3208f6df8d552039cda078a8426d1. For more details please see the references link.
null
2022-03-07T01:39:11.748482Z
2022-02-27T03:15:23.458290Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/660a6126f8c3208f6df8d552039cda078a8426d1'}
Linux
GSD-2021-1001400
media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf()
media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.241 by commit e818f2ff648581a6c553ae2bebc5dcef9a8bb90c, it was introduced in version v2.6.34 by commit dae52d009fc950b5c209260d50fcc000f5becd3c. For more details please see the references link.
null
2021-12-20T00:39:54.718873Z
2021-08-03T02:29:25.500907Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/dae52d009fc950b5c209260d50fcc000f5becd3c'}
Linux
GSD-2021-1002386
staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect()
staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.257 by commit c0ef0e75a858cbd8618b473f22fbca36106dcf82, it was introduced in version v3.2 by commit 66898177e7e5486dc77a4ba742efa4e2e9e900a4. For more details please see the references link.
null
2021-12-19T22:19:48.568905Z
2021-12-19T19:35:05.206057Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/66898177e7e5486dc77a4ba742efa4e2e9e900a4'}
Linux
GSD-2021-1001953
nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells
nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.252 by commit 2df6c023050205c4d04ffc121bc549f65cb8d1df, it was introduced in version v4.3 by commit 69aba7948cbe53f2f1827e84e9dd0ae470a5072e. For more details please see the references link.
null
2021-12-19T22:21:59.262673Z
2021-11-14T15:13:13.670989Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69aba7948cbe53f2f1827e84e9dd0ae470a5072e'}
Linux
GSD-2021-1000641
USB: usbfs: Don't WARN about excessively large memory allocations
USB: usbfs: Don't WARN about excessively large memory allocations This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.124 by commit 2c835fede13e03f2743a333e4370b5ed2db91e83, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T22:19:26.106995Z
2021-06-04T19:52:57.584166Z
null
null
null
null
null
Linux
GSD-2022-1001286
video: fbdev: sm712fb: Fix crash in smtcfb_read()
video: fbdev: sm712fb: Fix crash in smtcfb_read() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit e46779a5706941fb9cd6e0264427953eb77d7888. For more details please see the references link.
null
2022-04-25T06:25:09.031467Z
2022-04-24T21:01:26.142340Z
null
null
null
null
null
Linux
GSD-2021-1000211
arm64: entry: always set GIC_PRIO_PSR_I_SET during entry
arm64: entry: always set GIC_PRIO_PSR_I_SET during entry This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit d8d52005f57bbb4a4ec02f647e2555d327135c68, it was introduced in version v5.10 by commit 23529049c68423820487304f244144e0d576e85a. For more details please see the references link.
null
2021-12-19T22:39:04.663622Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/23529049c68423820487304f244144e0d576e85a'}
Linux
GSD-2022-1000881
mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work
mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.183 by commit 964f155c382f80242a0ba15034a2e792788f5c1c. For more details please see the references link.
null
2022-03-18T02:50:15.049887Z
2022-03-18T00:27:13.107029Z
null
null
null
null
null
Linux
GSD-2022-1001793
ext4: don't BUG if someone dirty pages without asking ext4 first
ext4: don't BUG if someone dirty pages without asking ext4 first This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit a0856764dc1276ad2dc7891288c2e9246bf11a37. For more details please see the references link.
null
2022-04-25T06:23:31.560786Z
2022-04-24T21:42:38.409067Z
null
null
null
null
null
Linux
GSD-2021-1001816
mm, slub: fix mismatch between reconstructed freelist depth and cnt
mm, slub: fix mismatch between reconstructed freelist depth and cnt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.156 by commit a1ec195a1943c39fffa96e47ab6532d74a9f4c78, it was introduced in version v4.17 by commit c3895391df385c6628638f014c87e16f5e2efd45. For more details please see the references link.
null
2021-12-20T00:50:03.654005Z
2021-10-28T13:50:26.796632Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c3895391df385c6628638f014c87e16f5e2efd45'}
Linux
GSD-2021-1000704
tipc: skb_linearize the head skb when reassembling msgs
tipc: skb_linearize the head skb when reassembling msgs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.271 by commit b2c8d28c34b3070407cb1741f9ba3f15d0284b8b, it was introduced in version v4.3 by commit 45c8b7b175ceb2d542e0fe15247377bf3bce29ec. For more details please see the references link.
null
2021-12-19T23:34:42.495466Z
2021-06-04T20:06:11.054366Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/45c8b7b175ceb2d542e0fe15247377bf3bce29ec'}
Linux
GSD-2021-1002739
sch_cake: do not call cake_destroy() from cake_init()
sch_cake: do not call cake_destroy() from cake_init() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit f6deae2e2d83bd267e1986f5d71d8c458e18fd99, it was introduced in version v4.19 by commit 046f6fd5daefac7f5abdafb436b30f63bc7c602b. For more details please see the references link.
null
2022-01-11T05:59:03.782397Z
2021-12-27T05:45:53.208318Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/046f6fd5daefac7f5abdafb436b30f63bc7c602b'}
Linux
GSD-2022-1001269
f2fs: fix missing free nid in f2fs_handle_failed_inode
f2fs: fix missing free nid in f2fs_handle_failed_inode This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 8579b413af100ec5f3592bd6cf11559312b380c0, it was introduced in version v4.19 by commit 7735730d39d75e70476c1b01435b9b1f41637f0e. For more details please see the references link.
null
2022-04-25T03:59:18.029941Z
2022-04-24T20:59:55.377942Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7735730d39d75e70476c1b01435b9b1f41637f0e'}
Linux
GSD-2021-1000354
i2c: imx: fix reference leak when pm_runtime_get_sync fails
i2c: imx: fix reference leak when pm_runtime_get_sync fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 3a0cdd336d92c429b51a79bf4f64b17eafa0325d, it was introduced in version v5.7 by commit 3a5ee18d2a32bda6b9a1260136f6805848e3839d. For more details please see the references link.
null
2021-12-19T23:39:41.854096Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3a5ee18d2a32bda6b9a1260136f6805848e3839d'}
Linux
GSD-2021-1002369
staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect()
staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.292 by commit 9186680382934b0e7529d3d70dcc0a21d087683b, it was introduced in version v3.2 by commit 66898177e7e5486dc77a4ba742efa4e2e9e900a4. For more details please see the references link.
null
2021-12-19T23:38:40.308474Z
2021-12-19T19:34:16.821381Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/66898177e7e5486dc77a4ba742efa4e2e9e900a4'}
Linux
GSD-2021-1002693
sch_cake: do not call cake_destroy() from cake_init()
sch_cake: do not call cake_destroy() from cake_init() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.88 by commit 20ad1ef02f9ad5e1dda9eeb113e4c158b4806986, it was introduced in version v4.19 by commit 046f6fd5daefac7f5abdafb436b30f63bc7c602b. For more details please see the references link.
null
2022-01-11T05:48:00.182082Z
2021-12-27T05:37:05.913773Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/046f6fd5daefac7f5abdafb436b30f63bc7c602b'}
Linux
GSD-2022-1001639
ax25: Fix UAF bugs in ax25 timers
ax25: Fix UAF bugs in ax25 timers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.35 by commit 85f25bb9a0051198af48ac2f3afc9f16f2277114. For more details please see the references link.
null
2022-04-25T06:25:44.261333Z
2022-04-24T21:30:49.684968Z
null
null
null
null
null
Linux
GSD-2022-1000182
bpf: Guard against accessing NULL pt_regs in bpf_get_task_stack()
bpf: Guard against accessing NULL pt_regs in bpf_get_task_stack() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.96 by commit ff6bdc205fd0a83bd365405d4e31fb5905826996, it was introduced in version v5.9 by commit fa28dcb82a38f8e3993b0fae9106b1a80b59e4f0. For more details please see the references link.
null
2022-02-19T11:00:09.418980Z
2022-02-18T21:51:57.077581Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fa28dcb82a38f8e3993b0fae9106b1a80b59e4f0'}
Linux
GSD-2021-1001115
mac80211: remove warning in ieee80211_get_sband()
mac80211: remove warning in ieee80211_get_sband() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.129 by commit ae9de9444b54c867c9fc1383a6dcba1018cddaea. For more details please see the references link.
null
2021-12-20T01:10:07.719963Z
2021-07-08T01:57:19.202296Z
null
null
null
null
null
Linux
GSD-2022-1002445
media: usb: go7007: s2250-board: fix leak in probe()
media: usb: go7007: s2250-board: fix leak in probe() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit a97130cd5b0c00eec169b10a16d922b9ea67324a, it was introduced in version v3.10 by commit d3b2ccd9e307eae80b4b4eeb0ede46cb02212df2. For more details please see the references link.
null
2022-04-25T04:18:04.539524Z
2022-04-24T22:48:38.495645Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d3b2ccd9e307eae80b4b4eeb0ede46cb02212df2'}
Linux
GSD-2022-1000478
Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj
Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit c377e2ba78d3fe9a1f0b4ec424e75f81da7e81e9, it was introduced in version v4.15 by commit c2e5df616e1ae6c2a074cb241ebb65a318ebaf7c. For more details please see the references link.
null
2022-03-07T01:31:54.747925Z
2022-02-27T03:12:35.263890Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c2e5df616e1ae6c2a074cb241ebb65a318ebaf7c'}
Linux
GSD-2021-1001545
mcb: fix error handling in mcb_alloc_bus()
mcb: fix error handling in mcb_alloc_bus() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.249 by commit 115b07d9f47e3996430b8f2007edd9768e1f807f, it was introduced in version v4.7 by commit 5d9e2ab9fea4cdf0a2522f5cbed2e7fbb220d757. For more details please see the references link.
null
2021-12-19T22:49:39.800550Z
2021-10-19T16:23:06.790625Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5d9e2ab9fea4cdf0a2522f5cbed2e7fbb220d757'}