ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2021-1000196
nvmet-rdma: Fix NULL deref when SEND is completed with error
nvmet-rdma: Fix NULL deref when SEND is completed with error This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit 5bdb34466ad8370546dfa0497594fb1d6f2fed90, it was introduced in version v5.9 by commit ca0f1a8055be2a04073af435dc68419334481638. For more details please see the references link.
null
2021-12-20T01:12:13.688437Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca0f1a8055be2a04073af435dc68419334481638'}
Linux
GSD-2022-1001101
virtio: use virtio_device_ready() in virtio_device_restore()
virtio: use virtio_device_ready() in virtio_device_restore() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 4ae431113179d72c668b61df320af0c06d1aa5c5, it was introduced in version v5.16 by commit d50497eb4e554e1f0351e1836ee7241c059592e6. For more details please see the references link.
null
2022-04-25T02:49:33.451273Z
2022-04-24T20:45:25.191044Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d50497eb4e554e1f0351e1836ee7241c059592e6'}
Linux
GSD-2022-1000340
net: fix a memleak when uncloning an skb dst and its metadata
net: fix a memleak when uncloning an skb dst and its metadata This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.180 by commit a80817adc2a4c1ba26a7aa5f3ed886e4a18dff88, it was introduced in version v4.3 by commit fc4099f17240767554ff3a73977acb78ef615404. For more details please see the references link.
null
2022-03-07T01:33:31.809028Z
2022-02-27T02:53:22.062462Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fc4099f17240767554ff3a73977acb78ef615404'}
Linux
GSD-2021-1000895
ftrace: Do not blindly read the ip address in ftrace_bug()
ftrace: Do not blindly read the ip address in ftrace_bug() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.126 by commit 7e4e824b109f1d41ccf223fbb0565d877d6223a2, it was introduced in version v2.6.28 by commit 05736a427f7e16be948ccbf39782bd3a6ae16b14. For more details please see the references link.
null
2021-12-19T22:20:06.955131Z
2021-06-30T00:05:02.837933Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/05736a427f7e16be948ccbf39782bd3a6ae16b14'}
Linux
GSD-2021-1001787
net: mdiobus: Fix memory leak in __mdiobus_register
net: mdiobus: Fix memory leak in __mdiobus_register This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.253 by commit 4ec0f9abc512cc02fb04daa89ccf6697e80ab417. For more details please see the references link.
null
2021-12-20T00:42:18.721201Z
2021-10-28T13:48:50.949847Z
null
null
null
null
null
Linux
GSD-2022-1001802
lib/test: use after free in register_test_dev_kmod()
lib/test: use after free in register_test_dev_kmod() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 611170142b4244d7d6edba1e3400517d8625296b, it was introduced in version v4.13 by commit d9c6a72d6fa29d3a7999dda726577e5d1fccafa5. For more details please see the references link.
null
2022-04-25T05:54:52.809993Z
2022-04-24T21:43:09.254400Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9c6a72d6fa29d3a7999dda726577e5d1fccafa5'}
Linux
GSD-2022-1000710
thermal: core: Fix TZ_GET_TRIP NULL pointer dereference
thermal: core: Fix TZ_GET_TRIP NULL pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.13 by commit 4c294285cec3964b3291772ac0642c2bf440bd1b, it was introduced in version v5.9 by commit 1ce50e7d408ef2bdc8ca021363fd46d1b8bfad00. For more details please see the references link.
null
2022-03-18T03:00:24.417711Z
2022-03-18T00:11:36.002221Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1ce50e7d408ef2bdc8ca021363fd46d1b8bfad00'}
Linux
GSD-2021-1001292
seq_buf: Fix overflow in seq_buf_putmem_hex()
seq_buf: Fix overflow in seq_buf_putmem_hex() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.51 by commit f9fb4986f4d81182f938d16beb4f983fe71212aa, it was introduced in version v2.6.27 by commit 5e3ca0ec76fce92daa4eed0d02de9c79b1fe3920. For more details please see the references link.
null
2021-12-19T23:51:50.349803Z
2021-08-03T01:59:01.092893Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5e3ca0ec76fce92daa4eed0d02de9c79b1fe3920'}
Linux
GSD-2022-1002238
af_netlink: Fix shift out of bounds in group mask calculation
af_netlink: Fix shift out of bounds in group mask calculation This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 41249fff507387c3323b198d0052faed08b14de4, it was introduced in version v2.6.14 by commit f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198. For more details please see the references link.
null
2022-04-25T04:11:38.053553Z
2022-04-24T22:24:42.507578Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198'}
Linux
GSD-2022-1000205
block: Fix wrong offset in bio_truncate()
block: Fix wrong offset in bio_truncate() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.96 by commit b63e120189fd92aff00096d11e2fc5253f60248b. For more details please see the references link.
null
2022-02-19T10:59:37.061808Z
2022-02-18T21:55:20.676232Z
null
null
null
null
null
Linux
GSD-2021-1002847
tun: avoid double free in tun_free_netdev
tun: avoid double free in tun_free_netdev This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.12 by commit 3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5. For more details please see the references link.
null
2022-01-11T05:56:23.616646Z
2021-12-30T02:46:05.199689Z
null
null
null
null
null
Linux
GSD-2021-1001768
cifs: Fix soft lockup during fsstress
cifs: Fix soft lockup during fsstress This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.9 by commit 9f6c7aff21f81ae8856da1f63847d1362d523409. For more details please see the references link.
null
2021-12-19T22:27:00.808620Z
2021-10-19T16:35:48.653001Z
null
null
null
null
null
Linux
GSD-2022-1001947
ARM: davinci: da850-evm: Avoid NULL pointer dereference
ARM: davinci: da850-evm: Avoid NULL pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.112 by commit 0a312ec66a03133d28570f07bc52749ccfef54da, it was introduced in version v2.6.33 by commit bae105879f2f2404155da6f50b3636193d228a62. For more details please see the references link.
null
2022-04-25T06:30:32.596213Z
2022-04-24T21:57:14.730293Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bae105879f2f2404155da6f50b3636193d228a62'}
Linux
GSD-2022-1000655
btrfs: fix deadlock between quota disable and qgroup rescan worker
btrfs: fix deadlock between quota disable and qgroup rescan worker This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.8 by commit 31198e58c09e21d4f65c49d2361f76b87aca4c3f. For more details please see the references link.
null
2022-03-07T01:35:48.223431Z
2022-02-27T03:36:44.582213Z
null
null
null
null
null
Linux
GSD-2022-1002392
gpiolib: acpi: use correct format characters
gpiolib: acpi: use correct format characters This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 64f42625d8b6a6ac8651cc1520bafebb0ab9552d, it was introduced in version v4.14 by commit e40a3ae1f794a35c4af3746291ed6fedc1fa0f6f. For more details please see the references link.
null
2022-04-25T06:56:27.103659Z
2022-04-24T22:42:25.878248Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e40a3ae1f794a35c4af3746291ed6fedc1fa0f6f'}
Linux
GSD-2021-1001338
ALSA: usx2y: Don't call free_pages_exact() with NULL address
ALSA: usx2y: Don't call free_pages_exact() with NULL address This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.134 by commit 88262229b778f4f7a896da828d966f94dcb35d19. For more details please see the references link.
null
2021-12-20T00:45:25.051642Z
2021-08-03T02:12:21.884211Z
null
null
null
null
null
Linux
GSD-2021-1000483
Drivers: hv: vmbus: Increase wait time for VMbus unload
Drivers: hv: vmbus: Increase wait time for VMbus unload This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.269 by commit 9e5f64bb615b435a9af501dc4167258acc1ba44e, it was introduced in version v4.9.237 by commit 2b557a0612ae0aec89c6649c19467830f6965e76. For more details please see the references link.
null
2021-12-19T22:33:18.374961Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2b557a0612ae0aec89c6649c19467830f6965e76'}
Linux
GSD-2022-1001414
drm/amdkfd: Ensure mm remain valid in svm deferred_list work
drm/amdkfd: Ensure mm remain valid in svm deferred_list work This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 84771f82b6459668cbeae544a13ca05e64c6ee7d. For more details please see the references link.
null
2022-04-25T05:04:06.272841Z
2022-04-24T21:11:09.519940Z
null
null
null
null
null
Linux
GSD-2021-1000179
irqchip/gic-v3: Do not enable irqs when handling spurious interrups
irqchip/gic-v3: Do not enable irqs when handling spurious interrups This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.118 by commit e7ea8e46e3b777be26aa855fe07778c415f24926, it was introduced in version v5.1 by commit 3f1f3234bc2db1c16b9818b9a15a5d58ad45251c. For more details please see the references link.
null
2021-12-19T22:26:36.002268Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f1f3234bc2db1c16b9818b9a15a5d58ad45251c'}
Linux
GSD-2021-1002144
scsi: core: Put LLD module refcnt after SCSI device is released
scsi: core: Put LLD module refcnt after SCSI device is released This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.17 by commit f30822c0b4c35ec86187ab055263943dc71a6836. For more details please see the references link.
null
2021-12-20T00:14:46.390985Z
2021-11-14T15:21:51.292792Z
null
null
null
null
null
Linux
GSD-2022-1001044
powerpc/secvar: fix refcount leak in format_show()
powerpc/secvar: fix refcount leak in format_show() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit d05e4265d33af60b39606c20c731e3e719bfe3d6. For more details please see the references link.
null
2022-04-25T05:43:38.037329Z
2022-04-24T20:41:58.231617Z
null
null
null
null
null
Linux
GSD-2021-1000529
net: lantiq: fix memory corruption in RX ring
net: lantiq: fix memory corruption in RX ring This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit 46dd4abced3cb2c912916f4a5353e0927db0c4a2, it was introduced in version v4.20 by commit fe1a56420cf2ec28c8eceef672b87de0bbe1a260. For more details please see the references link.
null
2021-12-19T22:11:35.294034Z
2021-06-04T19:34:06.443006Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fe1a56420cf2ec28c8eceef672b87de0bbe1a260'}
Linux
GSD-2021-1002514
mtd: rawnand: fsmc: Fix timing computation
mtd: rawnand: fsmc: Fix timing computation This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.85 by commit 347cc9b4d9662aebc3aa7a12c12f0c8c091d1db9, it was introduced in version v4.13 by commit d9fb0795718333e36f7e472d7d81b7b8efe347c8. For more details please see the references link.
null
2021-12-19T23:07:18.664282Z
2021-12-19T19:40:42.060869Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9fb0795718333e36f7e472d7d81b7b8efe347c8'}
Linux
GSD-2021-1000382
spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware()
spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit ce02e58ddf8658a4c3bed2296f32a5873b3f7cce, it was introduced in version v5.2 by commit 944c01a889d97dc08e1b71f4ed868f4023fd6034. For more details please see the references link.
null
2021-12-19T23:41:58.401562Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/944c01a889d97dc08e1b71f4ed868f4023fd6034'}
Linux
GSD-2022-1001315
remoteproc: Fix count check in rproc_coredump_write()
remoteproc: Fix count check in rproc_coredump_write() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 11572dad9fbadbd9269a2550f7e236b5b8c2d80c, it was introduced in version v5.9 by commit 3afdc59e4390487f04f2435b7e8a6289984e0a1e. For more details please see the references link.
null
2022-04-25T03:09:51.428267Z
2022-04-24T21:04:02.358033Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3afdc59e4390487f04f2435b7e8a6289984e0a1e'}
Linux
GSD-2021-1002645
firmware: arm_scpi: Fix string overflow in SCPI genpd driver
firmware: arm_scpi: Fix string overflow in SCPI genpd driver This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.222 by commit 7e8645ca2c0046f7cd2f0f7d569fc036c8abaedb, it was introduced in version v4.8 by commit 8bec4337ad4023b26de35d3b0c3a3b2735ffc5c7. For more details please see the references link.
null
2022-01-11T05:57:56.452798Z
2021-12-27T05:31:22.220704Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8bec4337ad4023b26de35d3b0c3a3b2735ffc5c7'}
Linux
GSD-2021-1000678
NFS: fix an incorrect limit in filelayout_decode_layout()
NFS: fix an incorrect limit in filelayout_decode_layout() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.235 by commit f299522eda1566cbfbae4b15c82970fc41b03714, it was introduced in version v2.6.37 by commit 16b374ca439fb406e46e071f75428f5b033056f8. For more details please see the references link.
null
2021-12-19T23:59:08.759344Z
2021-06-04T20:00:22.193775Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/16b374ca439fb406e46e071f75428f5b033056f8'}
Linux
GSD-2022-1000857
net/smc: Use a mutex for locking "struct smc_pnettable"
net/smc: Use a mutex for locking "struct smc_pnettable" This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.103 by commit 91f56a85278ebd6440ded1a6f82a9706cfcb0a7f, it was introduced in version v5.1 by commit 64e28b52c7a6616217bee67ba2ad886f478f9737. For more details please see the references link.
null
2022-03-18T02:45:27.742200Z
2022-03-18T00:25:02.201047Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/64e28b52c7a6616217bee67ba2ad886f478f9737'}
Linux
GSD-2022-1001745
Reinstate some of "swiotlb: rework "fix info leak with DMA_FROM_DEVICE""
Reinstate some of "swiotlb: rework "fix info leak with DMA_FROM_DEVICE"" This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 7007c894631cf43041dcfa0da7142bbaa7eb673c. For more details please see the references link.
null
2022-04-25T05:51:05.909170Z
2022-04-24T21:38:56.594804Z
null
null
null
null
null
Linux
GSD-2021-1002215
comedi: vmk80xx: fix bulk-buffer overflow
comedi: vmk80xx: fix bulk-buffer overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.2 by commit 47b4636ebdbeba2044b3db937c4d2b6a4fe3d0f2, it was introduced in version v2.6.31 by commit 985cafccbf9b7f862aa1c5ee566801e18b5161fb. For more details please see the references link.
null
2021-12-20T00:06:21.528606Z
2021-11-14T15:25:09.150831Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/985cafccbf9b7f862aa1c5ee566801e18b5161fb'}
Linux
GSD-2021-1000228
net/sched: act_ct: fix wild memory access when clearing fragments
net/sched: act_ct: fix wild memory access when clearing fragments This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 0648941f4c8bbf8b4b6c0b270889ae7aa769b921, it was introduced in version v5.8 by commit ae372cb1750f6c95370f92fe5f5620e0954663ba. For more details please see the references link.
null
2021-12-19T22:16:15.656444Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ae372cb1750f6c95370f92fe5f5620e0954663ba'}
Linux
GSD-2021-1001593
net: sched: flower: protect fl_walk() with rcu
net: sched: flower: protect fl_walk() with rcu This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.151 by commit 694b0cee7f8546b69a80996a29cb3cf4149c0453, it was introduced in version v5.3 by commit d39d714969cda5cbda291402c8c6b1fb1047f42e. For more details please see the references link.
null
2021-12-19T23:15:12.741082Z
2021-10-19T16:25:23.710943Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d39d714969cda5cbda291402c8c6b1fb1047f42e'}
Linux
GSD-2022-1000504
kasan: test: fix compatibility with FORTIFY_SOURCE
kasan: test: fix compatibility with FORTIFY_SOURCE This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 4d4710b7dfea13e7e2793824bf38c36129594ad8. For more details please see the references link.
null
2022-03-07T03:15:10.680843Z
2022-02-27T03:16:10.215455Z
null
null
null
null
null
Linux
GSD-2021-1001069
net: ipv4: fix memory leak in ip_mc_add1_src
net: ipv4: fix memory leak in ip_mc_add1_src This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit 77de6ee73f54a9a89c0afa0bf4c53b239aa9953a, it was introduced in version v4.9 by commit 24803f38a5c0b6c57ed800b47e695f9ce474bc3a. For more details please see the references link.
null
2021-12-19T22:04:30.644319Z
2021-06-30T00:37:35.915238Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/24803f38a5c0b6c57ed800b47e695f9ce474bc3a'}
Linux
GSD-2022-1000154
rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev
rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.176 by commit da27b834c1e0222e149e06caddf7718478086d1b, it was introduced in version v4.11 by commit c0cdc19f84a4712cf74888f83af286e3c2e14efd. For more details please see the references link.
null
2022-02-19T07:59:35.065929Z
2022-02-18T21:48:00.596248Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c0cdc19f84a4712cf74888f83af286e3c2e14efd'}
Linux
GSD-2022-1002169
veth: Ensure eth header is in skb's linear part
veth: Ensure eth header is in skb's linear part This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.190 by commit 2fd90b86dff413fbf8128780c04ea9c6849c16e2, it was introduced in version v2.6.24 by commit e314dbdc1c0dc6a548ecf0afce28ecfd538ff568. For more details please see the references link.
null
2022-04-25T06:51:21.532274Z
2022-04-24T22:18:12.620087Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e314dbdc1c0dc6a548ecf0afce28ecfd538ff568'}
Linux
GSD-2022-1002493
pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe
pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit 59250d547542f1c7765a78dc97ddfe5e6b0d2ab0, it was introduced in version v3.9 by commit 32e67eee670e1254ee5ab41e2f454680acb9c17c. For more details please see the references link.
null
2022-04-25T06:16:19.924128Z
2022-04-24T22:53:48.412699Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/32e67eee670e1254ee5ab41e2f454680acb9c17c'}
Linux
GSD-2021-1001439
net: validate lwtstate->data before returning from skb_tunnel_info()
net: validate lwtstate->data before returning from skb_tunnel_info() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.277 by commit b61d327cd3cc5ea591f3bf751dd11e034f388bb5, it was introduced in version v4.3 by commit 61adedf3e3f1d3f032c5a6a299978d91eff6d555. For more details please see the references link.
null
2021-12-20T00:55:12.860094Z
2021-08-03T02:41:35.101984Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61adedf3e3f1d3f032c5a6a299978d91eff6d555'}
Linux
GSD-2022-1002186
jfs: prevent NULL deref in diFree
jfs: prevent NULL deref in diFree This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit e19c3149a80e4fc8df298d6546640e01601f3758. For more details please see the references link.
null
2022-04-25T04:32:17.895034Z
2022-04-24T22:19:55.387682Z
null
null
null
null
null
Linux
GSD-2022-1000441
fs/proc: task_mmu.c: don't read mapcount for migration entry
fs/proc: task_mmu.c: don't read mapcount for migration entry This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit a8dd0cfa37792863b6c4bf9542975212a6715d49, it was introduced in version v4.5 by commit e9b61f19858a5d6c42ce2298cf138279375d0d9b. For more details please see the references link.
null
2022-03-07T01:35:34.632230Z
2022-02-27T03:07:41.171919Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e9b61f19858a5d6c42ce2298cf138279375d0d9b'}
Linux
GSD-2021-1001086
mac80211: Fix NULL ptr deref for injected rate info
mac80211: Fix NULL ptr deref for injected rate info This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit 7b1b88232e40396ee1d8b19d42a050cda0a5aebb, it was introduced in version v5.9 by commit cb17ed29a7a5fea8c9bf70e8a05757d71650e025. For more details please see the references link.
null
2021-12-20T00:39:29.487265Z
2021-06-30T00:38:41.446212Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cb17ed29a7a5fea8c9bf70e8a05757d71650e025'}
Linux
GSD-2022-1000011
usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.
usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.298 by commit f976dd7011150244a7ba820f2c331e9fb253befa, it was introduced in version v4.0 by commit 5e33f6fdf735cda1d4580fe6f1878da05718fe73. For more details please see the references link.
null
2022-01-11T05:53:31.866770Z
2022-01-10T19:50:04.887105Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5e33f6fdf735cda1d4580fe6f1878da05718fe73'}
Linux
GSD-2021-1002700
drm/amd/pm: fix a potential gpu_metrics_table memory leak
drm/amd/pm: fix a potential gpu_metrics_table memory leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.88 by commit 222cebd995cdf11fe0d502749560f65e64990e55, it was introduced in version v5.10 by commit 95868b85764aff2dcbf78d3054076df75446ad15. For more details please see the references link.
null
2022-01-11T05:47:50.561274Z
2021-12-27T05:37:43.189153Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/95868b85764aff2dcbf78d3054076df75446ad15'}
Linux
GSD-2022-1001250
ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data
ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit f8e89d84ea83c51ba3ba97ff154f7aa679326760, it was introduced in version v5.6 by commit a61f3b4f476eceb25274161e5a53a8d18e42610b. For more details please see the references link.
null
2022-04-25T03:52:14.613501Z
2022-04-24T20:57:48.595975Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a61f3b4f476eceb25274161e5a53a8d18e42610b'}
Linux
GSD-2021-1002350
clk: sunxi-ng: Unregister clocks/resets when unbinding
clk: sunxi-ng: Unregister clocks/resets when unbinding This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit b5dd513daa70ee8f6d281a20bd28485ee9bb7db2. For more details please see the references link.
null
2021-12-19T23:15:37.588081Z
2021-11-29T02:39:59.168414Z
null
null
null
null
null
Linux
GSD-2021-1001985
net: mdiobus: Fix memory leak in __mdiobus_register
net: mdiobus: Fix memory leak in __mdiobus_register This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.214 by commit a9831afa2dc8a18205403907c41aa4e0950ac611. For more details please see the references link.
null
2021-12-20T01:06:13.295182Z
2021-11-14T15:14:39.354787Z
null
null
null
null
null
Linux
GSD-2021-1000697
NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()
NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.271 by commit 4e1ba532dbc1a0e19fc2458d74ab8d98680c4e42, it was introduced in version v4.9.269 by commit 80e34f4957ec3010c85f9bb0b568a8d46acdf535. For more details please see the references link.
null
2021-12-20T01:18:32.886422Z
2021-06-04T20:04:41.049973Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80e34f4957ec3010c85f9bb0b568a8d46acdf535'}
Linux
GSD-2022-1000912
openvswitch: Fix setting ipv6 fields causing hw csum failure
openvswitch: Fix setting ipv6 fields causing hw csum failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.232 by commit 99e6d88878090929953f68cf3e15ee72a9a37941, it was introduced in version v3.8 by commit 3fdbd1ce11e5c0d7cafbe44c942c5cad61113d7b. For more details please see the references link.
null
2022-03-18T02:50:31.434548Z
2022-03-18T00:31:20.477379Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3fdbd1ce11e5c0d7cafbe44c942c5cad61113d7b'}
Linux
GSD-2022-1001600
block: fix rq-qos breakage from skipping rq_qos_done_bio()
block: fix rq-qos breakage from skipping rq_qos_done_bio() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit dbd20bb904ad5731aaca8d009367a930d6ada111, it was introduced in version v5.15 by commit a647a524a46736786c95cdb553a070322ca096e3. For more details please see the references link.
null
2022-04-25T03:18:18.311716Z
2022-04-24T21:27:27.253533Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a647a524a46736786c95cdb553a070322ca096e3'}
Linux
GSD-2021-1001655
hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field
hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.71 by commit 516d9055039017a20a698103be2b556b4c976bb8. For more details please see the references link.
null
2021-12-19T23:21:59.497866Z
2021-10-19T16:30:16.258539Z
null
null
null
null
null
Linux
GSD-2021-1000947
KVM: X86: MMU: Use the correct inherited permissions to get shadow page
KVM: X86: MMU: Use the correct inherited permissions to get shadow page This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.44 by commit 6b6ff4d1f349cb35a7c7d2057819af1b14f80437, it was introduced in version v2.6.20 by commit cea0f0e7ea54753c3265dc77f605a6dad1912cfc. For more details please see the references link.
null
2021-12-19T23:53:55.212761Z
2021-06-30T00:28:32.735422Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cea0f0e7ea54753c3265dc77f605a6dad1912cfc'}
Linux
GSD-2022-1002305
mm/mempolicy: fix mpol_new leak in shared_policy_replace
mm/mempolicy: fix mpol_new leak in shared_policy_replace This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 39a32f3c06f6d68a530bf9612afa19f50f12e93d, it was introduced in version v3.8 by commit 42288fe366c4f1ce7522bc9f27d0bc2a81c55264. For more details please see the references link.
null
2022-04-25T05:15:09.151849Z
2022-04-24T22:32:38.084010Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/42288fe366c4f1ce7522bc9f27d0bc2a81c55264'}
Linux
GSD-2022-1000338
ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path
ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.180 by commit 16dcfde98a25340ff0f7879a16bea141d824a196, it was introduced in version v4.0 by commit f243e5a7859a24d10975afb9a1708cac624ba6f1. For more details please see the references link.
null
2022-03-07T01:55:28.858532Z
2022-02-27T02:53:08.438392Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f243e5a7859a24d10975afb9a1708cac624ba6f1'}
Linux
GSD-2021-1001205
misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge
misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.4 by commit 09d154990ca82d14aed2b72796f6c8845e2e605d. For more details please see the references link.
null
2021-12-19T23:31:12.422426Z
2021-08-03T01:36:59.230219Z
null
null
null
null
null
Linux
GSD-2022-1000768
net/smc: fix connection leak
net/smc: fix connection leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.27 by commit 80895b6f9154fb22d36fab311ccbb75503a2c87b, it was introduced in version v5.3 by commit 39f41f367b08650e9aa314e3a13fb6dda1e9eec7. For more details please see the references link.
null
2022-03-18T03:00:45.108702Z
2022-03-18T00:16:29.937431Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/39f41f367b08650e9aa314e3a13fb6dda1e9eec7'}
Linux
GSD-2021-1000044
locking/qrwlock: Fix ordering in queued_write_lock_slowpath()
locking/qrwlock: Fix ordering in queued_write_lock_slowpath() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.33 by commit 82fa9ced35d88581cffa4a1c856fc41fca96d80a, it was introduced in version v4.15 by commit b519b56e378ee82caf9b079b04f5db87dedc3251. For more details please see the references link.
null
2021-12-20T00:11:31.078119Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b519b56e378ee82caf9b079b04f5db87dedc3251'}
Linux
GSD-2021-1002079
dm rq: don't queue request to blk-mq during DM suspend
dm rq: don't queue request to blk-mq during DM suspend This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit 8ca9745efe3528feb06ca4e117188038eea2d351. For more details please see the references link.
null
2021-12-20T00:44:09.336523Z
2021-11-14T15:18:54.675205Z
null
null
null
null
null
Linux
GSD-2022-1001529
ath10k: Fix error handling in ath10k_setup_msa_resources
ath10k: Fix error handling in ath10k_setup_msa_resources This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 74b1d41e1b6410eed5c76d00eedb262036e9eff5, it was introduced in version v5.8 by commit 727fec790ead3d75e2735f66209949c2163523ea. For more details please see the references link.
null
2022-04-25T04:43:02.998556Z
2022-04-24T21:20:25.926904Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/727fec790ead3d75e2735f66209949c2163523ea'}
Linux
GSD-2021-1002583
IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr
IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.8 by commit 834d0fb978643eaf09da425de197cc16a7c2761b, it was introduced in version v4.5 by commit 46b010d3eeb8eb29c740c4ef09c666485f5c07e6. For more details please see the references link.
null
2021-12-20T00:21:06.840977Z
2021-12-19T19:43:44.747796Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/46b010d3eeb8eb29c740c4ef09c666485f5c07e6'}
Linux
GSD-2021-1000414
ethernet:enic: Fix a use after free bug in enic_hard_start_xmit
ethernet:enic: Fix a use after free bug in enic_hard_start_xmit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.120 by commit f7f6f07774091a6ddd98500b85386c3c6afb30d3, it was introduced in version v4.16 by commit fb7516d42478ebc8e2f00efb76ef96f7b68fd8d3. For more details please see the references link.
null
2021-12-20T00:01:20.621969Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb7516d42478ebc8e2f00efb76ef96f7b68fd8d3'}
Linux
GSD-2021-1002429
ALSA: pcm: oss: Limit the period size to 16MB
ALSA: pcm: oss: Limit the period size to 16MB This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.221 by commit 2e54cf6794bf82a54aaefc78da13819aea9cd28a. For more details please see the references link.
null
2021-12-19T22:47:46.257704Z
2021-12-19T19:36:56.187722Z
null
null
null
null
null
Linux
GSD-2022-1001483
memstick/mspro_block: fix handling of read-only devices
memstick/mspro_block: fix handling of read-only devices This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 057b53c4f87690d626203acef8b63d52a9bf2f43. For more details please see the references link.
null
2022-04-25T04:24:47.084597Z
2022-04-24T21:16:02.266506Z
null
null
null
null
null
Linux
GSD-2022-1001179
clk: Fix clk_hw_get_clk() when dev is NULL
clk: Fix clk_hw_get_clk() when dev is NULL This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 23f89fe005b105f0dcc55034c13eb89f9b570fac, it was introduced in version v5.11 by commit 30d6f8c15d2cd877c1f3d47d8a1064649ebe58e2. For more details please see the references link.
null
2022-04-25T03:18:50.601585Z
2022-04-24T20:51:06.728805Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/30d6f8c15d2cd877c1f3d47d8a1064649ebe58e2'}
Linux
GSD-2021-1000101
ext4: always panic when errors=panic is specified
ext4: always panic when errors=panic is specified This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.20 by commit 64e1eebe2131183174f4fbb6b1491355f96c6cde, it was introduced in version v5.11 by commit 014c9caa29d3a44e0de695c99ef18bec3e887d52. For more details please see the references link.
null
2021-12-19T23:46:24.407450Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/014c9caa29d3a44e0de695c99ef18bec3e887d52'}
Linux
GSD-2022-1001196
mptcp: Fix crash due to tcp_tsorted_anchor was initialized before release skb
mptcp: Fix crash due to tcp_tsorted_anchor was initialized before release skb This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 4d54181eba4b077fb74033a7186898ad4000a7a5, it was introduced in version v5.16 by commit f70cad1085d1e01d3ec73c1078405f906237feee. For more details please see the references link.
null
2022-04-25T06:11:32.943924Z
2022-04-24T20:52:52.478637Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f70cad1085d1e01d3ec73c1078405f906237feee'}
Linux
GSD-2021-1002096
netfilter: xt_IDLETIMER: fix panic that occurs when timer_type has garbage value
netfilter: xt_IDLETIMER: fix panic that occurs when timer_type has garbage value This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit cae7cab804c943d723d52724a3aeb07a3f4a2650, it was introduced in version v5.7 by commit 68983a354a655c35d3fb204489d383a2a051fda7. For more details please see the references link.
null
2021-12-20T01:03:09.310020Z
2021-11-14T15:19:44.690371Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/68983a354a655c35d3fb204489d383a2a051fda7'}
Linux
GSD-2021-1000551
net: dsa: mt7530: fix VLAN traffic leaks
net: dsa: mt7530: fix VLAN traffic leaks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit 82ae35b6c14feae5f216913d5b433e143c756d4e, it was introduced in version v4.16 by commit 83163f7dca5684816d01c8ccf4857aa74801e7b7. For more details please see the references link.
null
2021-12-19T22:21:14.433574Z
2021-06-04T19:37:16.503378Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/83163f7dca5684816d01c8ccf4857aa74801e7b7'}
Linux
GSD-2022-1002240
bpf, sockmap: Fix more uncharged while msg has more_data
bpf, sockmap: Fix more uncharged while msg has more_data This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 244ce90c8d0bd10ebf957da02c6f3fcd5d920bdf, it was introduced in version v4.20 by commit 604326b41a6fb9b4a78b6179335decee0365cd8c. For more details please see the references link.
null
2022-04-25T05:17:41.219307Z
2022-04-24T22:24:55.017252Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/604326b41a6fb9b4a78b6179335decee0365cd8c'}
Linux
GSD-2021-1001710
ext4: add error checking to ext4_ext_replay_set_iblocks()
ext4: add error checking to ext4_ext_replay_set_iblocks() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit 27e10c5d31ff1d222c7f797f1ee96d422859ba67, it was introduced in version v5.10 by commit 8016e29f4362e285f0f7e38fadc61a5b7bdfdfa2. For more details please see the references link.
null
2021-12-19T23:42:28.221141Z
2021-10-19T16:32:59.690234Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8016e29f4362e285f0f7e38fadc61a5b7bdfdfa2'}
Linux
GSD-2021-1000802
sch_htb: fix refcount leak in htb_parent_to_leaf_offload
sch_htb: fix refcount leak in htb_parent_to_leaf_offload This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.10 by commit 2411c02d03892a5057499f8102d0cc1e0f852416, it was introduced in version v5.12 by commit ae81feb7338c89cee4e6aa0424bdab2ce2b52da2. For more details please see the references link.
null
2021-12-19T22:40:05.181951Z
2021-06-25T00:08:19.302091Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ae81feb7338c89cee4e6aa0424bdab2ce2b52da2'}
Linux
GSD-2022-1000787
tipc: fix a bit overflow in tipc_crypto_key_rcv()
tipc: fix a bit overflow in tipc_crypto_key_rcv() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.27 by commit 5340a0924ea9c07c5d9a7c5476317731131eead2. For more details please see the references link.
null
2022-03-18T05:00:34.821475Z
2022-03-18T00:18:00.711959Z
null
null
null
null
null
Linux
GSD-2022-1001895
clocksource/drivers/exynos_mct: Handle DTS with higher number of interrupts
clocksource/drivers/exynos_mct: Handle DTS with higher number of interrupts This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit a81de4315ecf5a401212154dad0168a0cb9ed857, it was introduced in version v3.10 by commit 36ba5d527e9567ed303bad6e86a5f3c2723470f6. For more details please see the references link.
null
2022-04-25T04:12:01.338710Z
2022-04-24T21:52:58.048068Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/36ba5d527e9567ed303bad6e86a5f3c2723470f6'}
Linux
GSD-2021-1001340
x86/signal: Detect and prevent an alternate signal stack overflow
x86/signal: Detect and prevent an alternate signal stack overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.134 by commit 00fcd8f33e9b9f57115c3b1cfc4cb96450c18796, it was introduced in version v3.15 by commit c2bc11f10a39527cd1bb252097b5525664560956. For more details please see the references link.
null
2021-12-19T22:19:03.840782Z
2021-08-03T02:12:52.198628Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c2bc11f10a39527cd1bb252097b5525664560956'}
Linux
GSD-2021-1001194
watchdog: Fix possible use-after-free in wdt_startup()
watchdog: Fix possible use-after-free in wdt_startup() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.4 by commit 8adbbe6c86bb13e14f8a19e036ae5f4f5661fd90. For more details please see the references link.
null
2021-12-20T00:17:58.689167Z
2021-08-03T01:34:12.599421Z
null
null
null
null
null
Linux
GSD-2022-1000103
drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable
drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.265 by commit 6d9f8ba28f3747ca0f910a363e46f1114856dbbe, it was introduced in version v4.3 by commit 5c8290284402bf7d2c12269402b3177b899c78b7. For more details please see the references link.
null
2022-02-19T05:01:17.250791Z
2022-02-18T21:35:31.776110Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5c8290284402bf7d2c12269402b3177b899c78b7'}
Linux
GSD-2022-1002094
drm/amd/display: Add affected crtcs to atomic state for dsc mst unplug
drm/amd/display: Add affected crtcs to atomic state for dsc mst unplug This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 9c384e1afa552c94b5684036d5a26fa6dc11c37e, it was introduced in version v5.6 by commit 44be939ff7ac5858f0dbd8a2a4af1fe198e14db1. For more details please see the references link.
null
2022-04-25T06:55:23.542411Z
2022-04-24T22:10:24.880071Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/44be939ff7ac5858f0dbd8a2a4af1fe198e14db1'}
Linux
GSD-2022-1000553
net_sched: add __rcu annotation to netdev->qdisc
net_sched: add __rcu annotation to netdev->qdisc This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit 18b57afacdc8dc1fa0d1a3c3a15a1d5a599159fa, it was introduced in version v5.1 by commit 470502de5bdb1ed0def643a4458593a40b8f6b66. For more details please see the references link.
null
2022-03-07T01:45:53.934408Z
2022-02-27T03:23:12.067081Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/470502de5bdb1ed0def643a4458593a40b8f6b66'}
Linux
GSD-2021-1002242
usb: musb: tusb6010: check return value after calling platform_get_resource()
usb: musb: tusb6010: check return value after calling platform_get_resource() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.256 by commit 28be095eb612a489705d38c210afaf1103c5f4f8. For more details please see the references link.
null
2021-12-19T22:27:07.557894Z
2021-11-29T02:34:55.491156Z
null
null
null
null
null
Linux
GSD-2021-1001897
drm/msm/a3xx: fix error handling in a3xx_gpu_init()
drm/msm/a3xx: fix error handling in a3xx_gpu_init() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit d59e44e7821a8f2bb6f2e846b9167397a5f01608, it was introduced in version v5.11 by commit 5785dd7a8ef0de8049f40a1a109de6a1bf17b479. For more details please see the references link.
null
2021-12-20T00:16:15.474641Z
2021-10-28T13:54:38.087946Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5785dd7a8ef0de8049f40a1a109de6a1bf17b479'}
Linux
GSD-2021-1000785
x86/kvm: Teardown PV features on boot CPU as well
x86/kvm: Teardown PV features on boot CPU as well This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.43 by commit 38b858da1c58ad46519a257764e059e663b59ff2, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T23:15:00.963258Z
2021-06-25T00:05:30.485785Z
null
null
null
null
null
Linux
GSD-2022-1000800
iio: adc: men_z188_adc: Fix a resource leak in an error handling path
iio: adc: men_z188_adc: Fix a resource leak in an error handling path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.26 by commit fe73477802981bd0d0d70f2b22f109bcca801bdb, it was introduced in version v3.15 by commit 74aeac4da66fbfa246edbfc849002eac9b5af9ca. For more details please see the references link.
null
2022-03-18T03:02:07.731482Z
2022-03-18T00:19:15.028972Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/74aeac4da66fbfa246edbfc849002eac9b5af9ca'}
Linux
GSD-2022-1001712
mt76: fix monitor mode crash with sdio driver
mt76: fix monitor mode crash with sdio driver This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 13946d5a68efd11dd6af2f6ef4c908f6b00158a5. For more details please see the references link.
null
2022-04-25T03:28:19.584505Z
2022-04-24T21:37:00.938761Z
null
null
null
null
null
Linux
GSD-2021-1002612
igbvf: fix double free in `igbvf_probe`
igbvf: fix double free in `igbvf_probe` This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.296 by commit ffe1695b678729edec04037e691007900a2b2beb, it was introduced in version v2.6.30 by commit d4e0fe01a38a073568aee541a0247fe734095979. For more details please see the references link.
null
2022-01-11T05:58:15.488098Z
2021-12-27T05:27:12.191351Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d4e0fe01a38a073568aee541a0247fe734095979'}
Linux
GSD-2022-1001342
gpio: Restrict usage of GPIO chip irq members before initialization
gpio: Restrict usage of GPIO chip irq members before initialization This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 2c1fa3614795e2b24da1ba95de0b27b8f6ea4537. For more details please see the references link.
null
2022-04-25T04:53:45.735870Z
2022-04-24T21:06:06.120793Z
null
null
null
null
null
Linux
GSD-2022-1000945
mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work
mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.305 by commit f2e57587aaf971aa80fd801152ccc33e8343aef3. For more details please see the references link.
null
2022-03-18T02:55:14.738788Z
2022-03-18T00:35:03.848880Z
null
null
null
null
null
Linux
GSD-2022-1001657
macvlan: Fix leaking skb in source mode with nodst option
macvlan: Fix leaking skb in source mode with nodst option This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.35 by commit 8f79ce226ad2e9b2ec598de2b9560863b7549d1b, it was introduced in version v5.13 by commit 427f0c8c194b22edcafef1b0a42995ddc5c2227d. For more details please see the references link.
null
2022-04-25T06:53:04.139013Z
2022-04-24T21:32:08.525153Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/427f0c8c194b22edcafef1b0a42995ddc5c2227d'}
Linux
GSD-2021-1002307
btrfs: fix memory ordering between normal and ordered work functions
btrfs: fix memory ordering between normal and ordered work functions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit 47e6f9f69153247109042010f3a77579e9dc61ff, it was introduced in version v3.15 by commit 08a9ff3264181986d1d692a4e6fce3669700c9f8. For more details please see the references link.
null
2021-12-20T01:33:45.895280Z
2021-11-29T02:38:05.690414Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/08a9ff3264181986d1d692a4e6fce3669700c9f8'}
Linux
GSD-2021-1000290
mtd: require write permissions for locking and badblock ioctls
mtd: require write permissions for locking and badblock ioctls This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit a08799d3e8c8088640956237c183f83463c39668, it was introduced in version v5.9 by commit f7e6b19bc76471ba03725fe58e0c218a3d6266c3. For more details please see the references link.
null
2021-12-19T22:30:18.341093Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f7e6b19bc76471ba03725fe58e0c218a3d6266c3'}
Linux
GSD-2022-1001207
RDMA/irdma: Prevent some integer underflows
RDMA/irdma: Prevent some integer underflows This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 7340c3675d7ac946f4019b84cd7c64ed542dfe4c, it was introduced in version v5.14 by commit 3f49d684256963d3f27dfb9d9ff228e2255be78d. For more details please see the references link.
null
2022-04-25T04:42:58.855578Z
2022-04-24T20:53:43.363530Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f49d684256963d3f27dfb9d9ff228e2255be78d'}
Linux
GSD-2021-1001878
audit: fix possible null-pointer dereference in audit_filter_rules
audit: fix possible null-pointer dereference in audit_filter_rules This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit 4e9e46a700201b4c85081fd478c99c692a9aaa0d, it was introduced in version v5.3 by commit bf361231c295d92a28ca283ea713f56e93e55796. For more details please see the references link.
null
2021-12-19T23:59:12.607645Z
2021-10-28T13:53:35.216869Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf361231c295d92a28ca283ea713f56e93e55796'}
Linux
GSD-2021-1002757
btrfs: fix memory leak in __add_inode_ref()
btrfs: fix memory leak in __add_inode_ref() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit 493ff661d434d6bdf02e3a21adae04d7a0b4265d, it was introduced in version v5.5 by commit d3316c8233bb05e0dd855d30aac347bb8ad76ee4. For more details please see the references link.
null
2022-01-11T05:54:13.275353Z
2021-12-27T05:49:05.675587Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d3316c8233bb05e0dd855d30aac347bb8ad76ee4'}
Linux
GSD-2022-1000046
usb: mtu3: fix list_head check warning
usb: mtu3: fix list_head check warning This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.90 by commit 3b6efe0b7ba03cc2acf0694b46d6ff33c5b4c295, it was introduced in version v5.2 by commit 83374e035b6286731c5aa617844c7b724294c2a7. For more details please see the references link.
null
2022-01-11T05:47:48.028238Z
2022-01-10T19:51:41.426096Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/83374e035b6286731c5aa617844c7b724294c2a7'}
Linux
GSD-2021-1001481
tty: serial: 8250: serial_cs: Fix a memory leak in error handling path
tty: serial: 8250: serial_cs: Fix a memory leak in error handling path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.276 by commit b5a2799cd62ed30c81b22c23028d9ee374e2138c. For more details please see the references link.
null
2021-12-19T22:21:26.261231Z
2021-08-03T02:54:14.972141Z
null
null
null
null
null
Linux
GSD-2022-1000416
powerpc/fixmap: Fix VM debug warning on unmap
powerpc/fixmap: Fix VM debug warning on unmap This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit 43ae0ccc4d2722b833fb59b905af129428e06d03. For more details please see the references link.
null
2022-03-07T01:41:37.167422Z
2022-02-27T03:04:04.738007Z
null
null
null
null
null
Linux
GSD-2021-1002184
kunit: fix reference count leak in kfree_at_end
kunit: fix reference count leak in kfree_at_end This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit f62314b1ced25c58b86e044fc951cd6a1ea234cf. For more details please see the references link.
null
2021-12-20T02:51:59.304025Z
2021-11-14T15:23:45.488700Z
null
null
null
null
null
Linux
GSD-2021-1000443
userfaultfd: release page in error path to avoid BUG_ON
userfaultfd: release page in error path to avoid BUG_ON This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.191 by commit 07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f, it was introduced in version v4.11 by commit cb658a453b9327ce96ce5222c24d162b5b65b564. For more details please see the references link.
null
2021-12-20T00:59:14.562407Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cb658a453b9327ce96ce5222c24d162b5b65b564'}
Linux
GSD-2021-1000013
kasan: remove redundant config option
kasan: remove redundant config option This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.16 by commit 86463b30e4ef70c4551a94cb68b5a667c2e00846, it was introduced in version v5.11.7 by commit 8f105cac6c48f62147a7a15db51ebbe7b4c27377. For more details please see the references link.
null
2021-12-20T01:00:02.469025Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8f105cac6c48f62147a7a15db51ebbe7b4c27377'}
Linux
GSD-2022-1001084
drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj
drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit bc2d5c0775c839e2b072884f4ee6a93ba410f107. For more details please see the references link.
null
2022-04-25T06:35:43.342087Z
2022-04-24T20:44:06.092819Z
null
null
null
null
null
Linux
GSD-2021-1001252
cifs: prevent NULL deref in cifs_compose_mount_options()
cifs: prevent NULL deref in cifs_compose_mount_options() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.53 by commit e58c162789becede894d3e94c0ce6695a2ef5796. For more details please see the references link.
null
2021-12-20T00:03:34.717847Z
2021-08-03T01:49:08.056673Z
null
null
null
null
null
Linux
GSD-2022-1002352
drm/tegra: Fix reference leak in tegra_dsi_ganged_probe
drm/tegra: Fix reference leak in tegra_dsi_ganged_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 2d6ae8b747fe55f54de4a4441d636974aa53f56a, it was introduced in version v3.19 by commit e94236cde4d519cdecd45e2435defba33abdc99f. For more details please see the references link.
null
2022-04-25T05:29:59.129873Z
2022-04-24T22:37:22.819619Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e94236cde4d519cdecd45e2435defba33abdc99f'}