ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2021-1000547
mptcp: fix data stream corruption
mptcp: fix data stream corruption This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit 18e7f0580da15cac1e79d73683ada5a9e70980f8, it was introduced in version v5.7 by commit 18b683bff89d46ace55f12d00c0440d44d6160c4. For more details please see the references link.
null
2021-12-20T00:12:36.610433Z
2021-06-04T19:36:31.790792Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/18b683bff89d46ace55f12d00c0440d44d6160c4'}
Linux
GSD-2021-1002080
drm/msm: Avoid potential overflow in timeout_to_jiffies()
drm/msm: Avoid potential overflow in timeout_to_jiffies() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit 697ee8c3d3fadfeb3ac270a3a3d2ce42b2c07557, it was introduced in version v5.6 by commit 6cedb8b377bba6520508399b74754b9a0ca06edf. For more details please see the references link.
null
2021-12-19T23:58:52.137208Z
2021-11-14T15:18:57.065390Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6cedb8b377bba6520508399b74754b9a0ca06edf'}
Linux
GSD-2022-1001180
remoteproc: qcom_q6v5_mss: Fix some leaks in q6v5_alloc_memory_region
remoteproc: qcom_q6v5_mss: Fix some leaks in q6v5_alloc_memory_region This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit b9df3007b3cda4936cc50f5a7d2d30505a652828, it was introduced in version v4.17 by commit 278d744c46fd4f1925aec77752d18a0e4a9cbec3. For more details please see the references link.
null
2022-04-25T06:56:04.901863Z
2022-04-24T20:51:13.457800Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/278d744c46fd4f1925aec77752d18a0e4a9cbec3'}
Linux
GSD-2021-1000117
scsi: qla2xxx: Reserve extra IRQ vectors
scsi: qla2xxx: Reserve extra IRQ vectors This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.20 by commit 4ecd42dec858b6632c5f024fe13e9ad6c30f2734, it was introduced in version v5.11 by commit a6dcfe08487e5e83b6b4214c959a9577a9ed2d9f. For more details please see the references link.
null
2021-12-19T22:54:42.618891Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a6dcfe08487e5e83b6b4214c959a9577a9ed2d9f'}
Linux
GSD-2022-1001397
scsi: pm8001: Fix tag leaks on error
scsi: pm8001: Fix tag leaks on error This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit bdc74815f1c39905054b7d47399e0260b201b14d. For more details please see the references link.
null
2022-04-25T06:02:05.200415Z
2022-04-24T21:10:20.284987Z
null
null
null
null
null
Linux
GSD-2021-1000300
KVM: x86/mmu: Alloc page for PDPTEs when shadowing 32-bit NPT with 64-bit
KVM: x86/mmu: Alloc page for PDPTEs when shadowing 32-bit NPT with 64-bit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit a974aed548b20bf6483b6098d830cdd22fd5bcb8, it was introduced in version v4.19 by commit ee6268ba3a6861b2806e569bff7fe91fbdf846dd. For more details please see the references link.
null
2021-12-20T00:45:22.995989Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ee6268ba3a6861b2806e569bff7fe91fbdf846dd'}
Linux
GSD-2021-1002297
arm64: dts: qcom: msm8998: Fix CPU/L2 idle state latency and residency
arm64: dts: qcom: msm8998: Fix CPU/L2 idle state latency and residency This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.82 by commit e52fecdd0c142b95c720683885b06ee3f0e065c8. For more details please see the references link.
null
2021-12-20T01:40:28.776493Z
2021-11-29T02:37:32.174164Z
null
null
null
null
null
Linux
GSD-2021-1000750
net: caif: fix memory leak in cfusbl_device_notify
net: caif: fix memory leak in cfusbl_device_notify This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.125 by commit 4d94f530cd24c85aede6e72b8923f371b45d6886, it was introduced in version v3.3 by commit 7ad65bf68d705b445ef10b77ab50dab22be185ee. For more details please see the references link.
null
2021-12-20T00:38:22.800833Z
2021-06-25T00:02:21.215866Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ad65bf68d705b445ef10b77ab50dab22be185ee'}
Linux
GSD-2021-1001842
audit: fix possible null-pointer dereference in audit_filter_rules
audit: fix possible null-pointer dereference in audit_filter_rules This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit 16802fa4c33eb1a8efb23f1e93365190e4047d05, it was introduced in version v5.3 by commit bf361231c295d92a28ca283ea713f56e93e55796. For more details please see the references link.
null
2021-12-19T22:46:52.094913Z
2021-10-28T13:51:44.825122Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf361231c295d92a28ca283ea713f56e93e55796'}
Linux
GSD-2022-1002041
media: atomisp: fix dummy_ptr check to avoid duplicate active_bo
media: atomisp: fix dummy_ptr check to avoid duplicate active_bo This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 41082d6432e5d8cfaaa49a3864c88a16535f8e95. For more details please see the references link.
null
2022-04-25T04:41:28.645485Z
2022-04-24T22:05:25.411410Z
null
null
null
null
null
Linux
GSD-2022-1000586
net: ieee802154: ca8210: Stop leaking skb's
net: ieee802154: ca8210: Stop leaking skb's This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.22 by commit 94cd597e20ed4acedb8f15f029d92998b011cb1a, it was introduced in version v4.12 by commit ded845a781a578dfb0b5b2c138e5a067aa3b1242. For more details please see the references link.
null
2022-03-07T01:45:29.094319Z
2022-02-27T03:27:40.495352Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ded845a781a578dfb0b5b2c138e5a067aa3b1242'}
Linux
GSD-2021-1001511
ipack: ipoctal: fix stack information leak
ipack: ipoctal: fix stack information leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.285 by commit 741ea2670e021350e54f491106bdaa22dc50e6a0, it was introduced in version v3.5 by commit ba4dc61fe8c545a5d6a68b63616776556b771f51. For more details please see the references link.
null
2021-12-19T23:59:57.321449Z
2021-10-19T16:21:32.658802Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ba4dc61fe8c545a5d6a68b63616776556b771f51'}
Linux
GSD-2022-1002411
KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs
KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit f15c05f476437c6d55055c29463c2228e9e4251e, it was introduced in version v4.2 by commit ca724305a2b02abcbecbf22577536fc8e965ab4f. For more details please see the references link.
null
2022-04-25T05:54:50.123467Z
2022-04-24T22:44:29.428723Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca724305a2b02abcbecbf22577536fc8e965ab4f'}
Linux
GSD-2021-1001141
dmaengine: mediatek: free the proper desc in desc_free handler
dmaengine: mediatek: free the proper desc in desc_free handler This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13 by commit 0a2ff58f9f8f95526ecb0ccd7517fefceb96f661. For more details please see the references link.
null
2021-12-20T00:24:39.027056Z
2021-07-08T01:59:13.496044Z
null
null
null
null
null
Linux
GSD-2021-1001454
jfs: fix GPF in diFree
jfs: fix GPF in diFree This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.276 by commit 745c9a59422c63f661f4374ed5181740db4130a1. For more details please see the references link.
null
2021-12-19T22:42:01.454046Z
2021-08-03T02:46:08.064602Z
null
null
null
null
null
Linux
GSD-2022-1002104
ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe
ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 662ee5ac6b451aa5a27b8eebd397f2f5c7f42cec, it was introduced in version v3.8 by commit 531f67e41dcde1e358cf821d056241a66355cf03. For more details please see the references link.
null
2022-04-25T04:48:12.023906Z
2022-04-24T22:11:46.514872Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/531f67e41dcde1e358cf821d056241a66355cf03'}
Linux
GSD-2022-1000139
iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping()
iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.228 by commit a31cb1f0fb6caf46ffe88c41252b6b7a4ee062d9, it was introduced in version v4.19.135 by commit c0c489e5430530a7021f4c889cd5931597e4b200. For more details please see the references link.
null
2022-02-19T04:38:54.571471Z
2022-02-18T21:46:19.133952Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c0c489e5430530a7021f4c889cd5931597e4b200'}
Linux
GSD-2022-1000093
moxart: fix potential use-after-free on remove path
moxart: fix potential use-after-free on remove path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.301 by commit f5dc193167591e88797262ec78515a0cbe79ff5f. For more details please see the references link.
null
2022-02-19T09:40:32.282823Z
2022-02-18T21:34:25.124495Z
null
null
null
null
null
Linux
GSD-2021-1001004
net: ll_temac: Fix TX BD buffer overwrite
net: ll_temac: Fix TX BD buffer overwrite This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit cfe403f209b11fad123a882100f0822a52a7630f, it was introduced in version v5.6 by commit 84823ff80f7403752b59e00bb198724100dc611c. For more details please see the references link.
null
2021-12-20T00:06:41.178506Z
2021-06-30T00:32:36.665853Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/84823ff80f7403752b59e00bb198724100dc611c'}
Linux
GSD-2022-1000569
staging: vc04_services: Fix RCU dereference check
staging: vc04_services: Fix RCU dereference check This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit 3f09310ec5b33540bd1d6d4663d112a8eb1ed8f4. For more details please see the references link.
null
2022-03-07T01:40:24.141322Z
2022-02-27T03:25:02.424856Z
null
null
null
null
null
Linux
GSD-2021-1000245
i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails
i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit b100650d80cd2292f6c152f5f2943b5944b3e8ce, it was introduced in version v4.16 by commit 13d6eb20fc79a1e606307256dad4098375539a09. For more details please see the references link.
null
2021-12-19T23:28:42.956667Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/13d6eb20fc79a1e606307256dad4098375539a09'}
Linux
GSD-2021-1002278
x86/hyperv: Fix NULL deref in set_hv_tscchange_cb() if Hyper-V setup fails
x86/hyperv: Fix NULL deref in set_hv_tscchange_cb() if Hyper-V setup fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.82 by commit 9c177eee116cf888276d3748cb176e72562cfd5c, it was introduced in version v4.16 by commit 93286261de1b46339aa27cd4c639b21778f6cade. For more details please see the references link.
null
2021-12-19T22:31:19.001342Z
2021-11-29T02:36:44.818116Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/93286261de1b46339aa27cd4c639b21778f6cade'}
Linux
GSD-2021-1002782
hamradio: defer ax25 kfree after unregister_netdev
hamradio: defer ax25 kfree after unregister_netdev This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.260 by commit eaa816a86e629cbcc0a94f38391fee09231628c7. For more details please see the references link.
null
2022-01-11T05:54:36.634584Z
2021-12-30T02:43:13.332696Z
null
null
null
null
null
Linux
GSD-2022-1001728
PCI: endpoint: Fix alignment fault error in copy tests
PCI: endpoint: Fix alignment fault error in copy tests This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit bd21b9607bd76529b3cb8bc722f0beaa4aa508ae. For more details please see the references link.
null
2022-04-25T04:15:54.563122Z
2022-04-24T21:38:00.043991Z
null
null
null
null
null
Linux
GSD-2022-1001682
iommu/omap: Fix regression in probe for NULL pointer dereference
iommu/omap: Fix regression in probe for NULL pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 47e239117bd97c8556f9187af7a9a7938db4e021, it was introduced in version v5.8 by commit 6785eb9105e3363aa51408c700a55e8b5f88fcf6. For more details please see the references link.
null
2022-04-25T06:32:31.580169Z
2022-04-24T21:34:43.067605Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6785eb9105e3363aa51408c700a55e8b5f88fcf6'}
Linux
GSD-2022-1000990
btrfs: release correct delalloc amount in direct IO write path
btrfs: release correct delalloc amount in direct IO write path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.4 by commit a04d37ddfe4be431b9e52e8504490376ab0a39a4, it was introduced in version v5.17 by commit f0bfa76a11e93d0fe2c896fcb566568c5e8b5d3f. For more details please see the references link.
null
2022-04-25T06:45:57.519531Z
2022-04-24T20:37:46.653250Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f0bfa76a11e93d0fe2c896fcb566568c5e8b5d3f'}
Linux
GSD-2021-1000615
bpf: No need to simulate speculative domain for immediates
bpf: No need to simulate speculative domain for immediates This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.41 by commit 27acfd11ba179b746f55077edf9750f8f7cb1cb6, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T22:23:08.731359Z
2021-06-04T19:47:54.737809Z
null
null
null
null
null
Linux
GSD-2021-1002628
xen/netfront: harden netfront against event channel storms
xen/netfront: harden netfront against event channel storms This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.294 by commit 99120c8230fdd5e8b72a6e4162db9e1c0a61954a. For more details please see the references link.
null
2022-01-11T05:53:43.822524Z
2021-12-27T05:27:55.529135Z
null
null
null
null
null
Linux
GSD-2021-1001907
nvme-pci: Fix abort command id
nvme-pci: Fix abort command id This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit 5ccd69157a9a043f1fbcf7d6a09bcb7829b845aa, it was introduced in version v5.14.6 by commit 5c08d027f13644aa32588cc6b242833fa0989a95. For more details please see the references link.
null
2021-12-20T00:17:41.891516Z
2021-10-28T13:55:07.374075Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5c08d027f13644aa32588cc6b242833fa0989a95'}
Linux
GSD-2022-1001378
staging: vchiq_core: handle NULL result of find_service_by_handle
staging: vchiq_core: handle NULL result of find_service_by_handle This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 04202f54dd8899e10f56a89c4c1ede0043fa22af. For more details please see the references link.
null
2022-04-25T04:19:34.786744Z
2022-04-24T21:09:12.552972Z
null
null
null
null
null
Linux
GSD-2022-1002387
gcc-plugins: latent_entropy: use /dev/urandom
gcc-plugins: latent_entropy: use /dev/urandom This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 846737e63cfe7ee81788c4ca9babe0d3bf687677, it was introduced in version v4.9 by commit 38addce8b600ca335dc86fa3d48c890f1c6fa1f4. For more details please see the references link.
null
2022-04-25T03:15:26.412450Z
2022-04-24T22:41:36.801900Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/38addce8b600ca335dc86fa3d48c890f1c6fa1f4'}
Linux
GSD-2022-1001952
drivers: net: slip: fix NPD bug in sl_tx_timeout()
drivers: net: slip: fix NPD bug in sl_tx_timeout() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.112 by commit ca24c5e8f0ac3d43ec0cff29e1c861be73aff165. For more details please see the references link.
null
2022-04-25T04:31:13.221063Z
2022-04-24T21:57:36.632398Z
null
null
null
null
null
Linux
GSD-2022-1000640
net/mlx5e: Avoid field-overflowing memcpy()
net/mlx5e: Avoid field-overflowing memcpy() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.6 by commit 8fbdf8c8b8ab82beab882175157650452c46493e, it was introduced in version v4.9 by commit b5503b994ed5ed8dbfe821317e7b5b38acb065c5. For more details please see the references link.
null
2022-03-07T01:31:13.213335Z
2022-02-27T03:35:02.178998Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b5503b994ed5ed8dbfe821317e7b5b38acb065c5'}
Linux
GSD-2022-1000210
net: amd-xgbe: Fix skb data length underflow
net: amd-xgbe: Fix skb data length underflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.97 by commit 4d3fcfe8464838b3920bc2b939d888e0b792934e, it was introduced in version v4.11 by commit 622c36f143fc9566ba49d7cec994c2da1182d9e2. For more details please see the references link.
null
2022-02-19T12:49:49.556720Z
2022-02-18T21:55:54.144602Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/622c36f143fc9566ba49d7cec994c2da1182d9e2'}
Linux
GSD-2021-1001287
dm btree remove: assign new_root only when removal succeeds
dm btree remove: assign new_root only when removal succeeds This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.51 by commit ba47e65a5de3e0e8270301a409fc63d3129fdb9e. For more details please see the references link.
null
2021-12-20T02:26:59.248139Z
2021-08-03T01:57:42.795692Z
null
null
null
null
null
Linux
GSD-2021-1002501
serial: core: fix transmit-buffer reset and memleak
serial: core: fix transmit-buffer reset and memleak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.84 by commit e1722acf4f0d4d67b60f57e08ce16f8b66cd4b8f, it was introduced in version v4.9 by commit 761ed4a94582ab291aa24dcbea4e01e8936488c8. For more details please see the references link.
null
2021-12-20T00:41:48.226175Z
2021-12-19T19:40:04.814231Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/761ed4a94582ab291aa24dcbea4e01e8936488c8'}
Linux
GSD-2022-1001051
iavf: stop leaking iavf_status as "errno" values
iavf: stop leaking iavf_status as "errno" values This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 9dd165c40d8297c37112623fd884d8f8016fc0ee. For more details please see the references link.
null
2022-04-25T06:32:12.655939Z
2022-04-24T20:42:30.960164Z
null
null
null
null
null
Linux
GSD-2021-1002151
net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path
net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 94b960b9deffc02fc0747afc01f72cc62ab099e3, it was introduced in version v3.11 by commit e126ba97dba9edeb6fafa3665b5f8497fc9cdf8c. For more details please see the references link.
null
2021-12-19T23:45:30.823517Z
2021-11-14T15:22:09.691491Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e126ba97dba9edeb6fafa3665b5f8497fc9cdf8c'}
Linux
GSD-2022-1001401
powerpc/set_memory: Avoid spinlock recursion in change_page_attr()
powerpc/set_memory: Avoid spinlock recursion in change_page_attr() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 96917107e67846f1d959ed03be281048efad14c5. For more details please see the references link.
null
2022-04-25T05:52:17.356509Z
2022-04-24T21:10:31.921258Z
null
null
null
null
null
Linux
GSD-2021-1000496
platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios
platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.7 by commit 8d746ea7c687bab060a2c05a35c449302406cd52, it was introduced in version v4.15 by commit 1a258e670434f404a4500b65ba1afea2c2b29bba. For more details please see the references link.
null
2021-12-20T01:22:14.421162Z
2021-05-31T23:46:04.918828Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1a258e670434f404a4500b65ba1afea2c2b29bba'}
Linux
GSD-2022-1001114
ubifs: Fix to add refcount once page is set private
ubifs: Fix to add refcount once page is set private This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit fbeb2139eed65e929ce806c6468e6601ade01b1b, it was introduced in version v2.6.27 by commit 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d. For more details please see the references link.
null
2022-04-25T05:37:22.635386Z
2022-04-24T20:46:37.551024Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d'}
Linux
GSD-2021-1000183
ACPI: custom_method: fix potential use-after-free issue
ACPI: custom_method: fix potential use-after-free issue This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.118 by commit 72814a94c38a33239793f7622cec6ace1e540c4b, it was introduced in version v5.4 by commit 03d1571d9513369c17e6848476763ebbd10ec2cb. For more details please see the references link.
null
2021-12-20T01:39:32.173668Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/03d1571d9513369c17e6848476763ebbd10ec2cb'}
Linux
GSD-2021-1002444
perf hist: Fix memory leak of a perf_hpp_fmt
perf hist: Fix memory leak of a perf_hpp_fmt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.164 by commit b380d09e44e8479e71e3ae8446b515a5b3166244. For more details please see the references link.
null
2021-12-20T00:01:51.184635Z
2021-12-19T19:37:39.984768Z
null
null
null
null
null
Linux
GSD-2021-1000479
powerpc/64s: Fix crashes when toggling entry flush barrier
powerpc/64s: Fix crashes when toggling entry flush barrier This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.269 by commit 0c25a7bb697f2e6ee65b6d63782f675bf129511a, it was introduced in version v4.9.245 by commit fa4bf9f38184ed7ca4916eb64f8c767d1e279c1f. For more details please see the references link.
null
2021-12-20T00:54:13.768672Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fa4bf9f38184ed7ca4916eb64f8c767d1e279c1f'}
Linux
GSD-2022-1001544
drm/amd/display: Add affected crtcs to atomic state for dsc mst unplug
drm/amd/display: Add affected crtcs to atomic state for dsc mst unplug This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit e9bbd9504bfaf70d8a299fc243931b93ae9fc933, it was introduced in version v5.6 by commit 44be939ff7ac5858f0dbd8a2a4af1fe198e14db1. For more details please see the references link.
null
2022-04-25T03:19:44.505449Z
2022-04-24T21:22:03.423423Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/44be939ff7ac5858f0dbd8a2a4af1fe198e14db1'}
Linux
GSD-2021-1002014
net: mdiobus: Fix memory leak in __mdiobus_register
net: mdiobus: Fix memory leak in __mdiobus_register This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.156 by commit b0feaa8376f52357bf2fd020d0c471713a859728. For more details please see the references link.
null
2021-12-19T23:25:34.305411Z
2021-11-14T15:15:58.185110Z
null
null
null
null
null
Linux
GSD-2021-1000029
dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback
dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.32 by commit a5ad12d5d69c63af289a37f05187a0c6fe93553d, it was introduced in version v5.6 by commit bfe1d56091c1a404b3d4ce7e9809d745fc4453bb. For more details please see the references link.
null
2021-12-20T01:37:53.824336Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bfe1d56091c1a404b3d4ce7e9809d745fc4453bb'}
Linux
GSD-2022-1001817
clk: qcom: ipq8074: fix PCI-E clock oops
clk: qcom: ipq8074: fix PCI-E clock oops This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 41e360fa73a4c2f5b78f5ded78a5375b08c206a5, it was introduced in version v5.9 by commit f0cfcf1ade201dcfd3365f231efc90e846fa46df. For more details please see the references link.
null
2022-04-25T06:46:29.539076Z
2022-04-24T21:44:41.572360Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f0cfcf1ade201dcfd3365f231efc90e846fa46df'}
Linux
GSD-2022-1000705
xfrm: fix MTU regression
xfrm: fix MTU regression This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.13 by commit 53b06e55c38b8f23f2552b83a3a07056a986fbda, it was introduced in version v4.15 by commit 749439bfac6e1a2932c582e2699f91d329658196. For more details please see the references link.
null
2022-03-18T04:18:40.707936Z
2022-03-18T00:11:19.915973Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/749439bfac6e1a2932c582e2699f91d329658196'}
Linux
GSD-2021-1000880
perf: Fix data race between pin_count increment/decrement
perf: Fix data race between pin_count increment/decrement This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.195 by commit db72bdb5c7981e7f1f7ffb46282e784292e7f112, it was introduced in version v2.6.39 by commit fe4b04fa31a6dcf4358aa84cf81e5a7fd079469b. For more details please see the references link.
null
2021-12-20T00:53:21.181182Z
2021-06-30T00:03:18.023311Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fe4b04fa31a6dcf4358aa84cf81e5a7fd079469b'}
Linux
GSD-2021-1001792
drm/msm: Fix null pointer dereference on pointer edp
drm/msm: Fix null pointer dereference on pointer edp This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.252 by commit 0cd063aa0a09822cc1620fc59a67fe2f9f6338ac, it was introduced in version v4.0 by commit ab5b0107ccf3821a6837b0f2819270d6fa0b278f. For more details please see the references link.
null
2021-12-20T01:22:31.398475Z
2021-10-28T13:49:05.544421Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab5b0107ccf3821a6837b0f2819270d6fa0b278f'}
Linux
GSD-2021-1001268
watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff()
watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.52 by commit a173e3b62cf6dd3c4a0a10c8a82eedfcae81a566. For more details please see the references link.
null
2021-12-20T00:01:48.236441Z
2021-08-03T01:53:40.975001Z
null
null
null
null
null
Linux
GSD-2022-1000355
nvme-rdma: fix possible use-after-free in transport error_recovery work
nvme-rdma: fix possible use-after-free in transport error_recovery work This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.181 by commit d411b2a5da68b8a130c23097014434ac140a2ace. For more details please see the references link.
null
2022-03-07T01:38:20.010361Z
2022-02-27T02:55:47.868226Z
null
null
null
null
null
Linux
GSD-2022-1002368
block: don't delete queue kobject before its children
block: don't delete queue kobject before its children This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit b2001eb10f59363da930cdd6e086a2861986fa18, it was introduced in version v4.16 by commit 2c2086afc2b8b974fac32cb028e73dc27bfae442. For more details please see the references link.
null
2022-04-25T05:40:00.855520Z
2022-04-24T22:39:38.148716Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c2086afc2b8b974fac32cb028e73dc27bfae442'}
Linux
GSD-2021-1001638
ext4: add error checking to ext4_ext_replay_set_iblocks()
ext4: add error checking to ext4_ext_replay_set_iblocks() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.71 by commit a63474dbf692dd09b50fed592bc41f6de5f102fc, it was introduced in version v5.10 by commit 8016e29f4362e285f0f7e38fadc61a5b7bdfdfa2. For more details please see the references link.
null
2021-12-19T22:13:38.764481Z
2021-10-19T16:29:24.853219Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8016e29f4362e285f0f7e38fadc61a5b7bdfdfa2'}
Linux
GSD-2022-1000181
Bluetooth: refactor malicious adv data check
Bluetooth: refactor malicious adv data check This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.96 by commit 83d5196b65d1b29e27d7dd16a3b9b439fb1d2dba. For more details please see the references link.
null
2022-02-20T06:40:40.311396Z
2022-02-18T21:51:50.454372Z
null
null
null
null
null
Linux
GSD-2021-1001116
cfg80211: call cfg80211_leave_ocb when switching away from OCB
cfg80211: call cfg80211_leave_ocb when switching away from OCB This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.129 by commit f2c027a7750f2d7a35cd95858163cce9aae4c1aa. For more details please see the references link.
null
2021-12-20T00:37:43.325210Z
2021-07-08T01:57:23.273500Z
null
null
null
null
null
Linux
GSD-2022-1002446
video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe()
video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 0fd28daec73525382e5c992db8743bf76e42cd5c, it was introduced in version v3.2 by commit 3c8a63e22a0802fd56380f6ab305b419f18eb6f5. For more details please see the references link.
null
2022-04-25T06:30:20.542213Z
2022-04-24T22:48:49.445591Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c8a63e22a0802fd56380f6ab305b419f18eb6f5'}
Linux
GSD-2021-1001546
staging: greybus: uart: fix tty use after free
staging: greybus: uart: fix tty use after free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.249 by commit 64062fcaca8872f063ec9da011e7bf30470be33f, it was introduced in version v4.9 by commit a18e15175708d39abbe9746ddc3479466b7800c3. For more details please see the references link.
null
2021-12-19T23:53:32.001310Z
2021-10-19T16:23:09.451217Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a18e15175708d39abbe9746ddc3479466b7800c3'}
Linux
GSD-2022-1002016
drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj
drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit 927beb05aaa429c883cc0ec6adc48964b187e291. For more details please see the references link.
null
2022-04-25T06:02:24.547242Z
2022-04-24T22:03:02.606500Z
null
null
null
null
null
Linux
GSD-2022-1001790
btrfs: make search_csum_tree return 0 if we get -EFBIG
btrfs: make search_csum_tree return 0 if we get -EFBIG This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit c78bada18aa11ee70a8e26e1972595539617425a. For more details please see the references link.
null
2022-04-25T06:44:10.884265Z
2022-04-24T21:42:29.637182Z
null
null
null
null
null
Linux
GSD-2022-1000882
xhci: Prevent futile URB re-submissions due to incorrect return value.
xhci: Prevent futile URB re-submissions due to incorrect return value. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.182 by commit 1879db4f25212f5f946fd88207e56ac107632a58, it was introduced in version v3.11 by commit 203a86613fb3bf2767335659513fa98563a3eb71. For more details please see the references link.
null
2022-03-18T02:55:16.265994Z
2022-03-18T00:27:24.317168Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/203a86613fb3bf2767335659513fa98563a3eb71'}
Linux
GSD-2021-1000707
Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails
Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.271 by commit 61a811e8f5229264b822361f8b23d7638fd8c914, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T00:10:58.385081Z
2021-06-04T20:06:55.454261Z
null
null
null
null
null
Linux
GSD-2021-1001815
mm, slub: fix potential memoryleak in kmem_cache_open()
mm, slub: fix potential memoryleak in kmem_cache_open() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.156 by commit 4f5d1c29cfab5cb0ab885059818751bdef32e2bb, it was introduced in version v4.8 by commit 210e7a43fa905bccafa9bb5966fba1d71f33eb8b. For more details please see the references link.
null
2021-12-19T22:38:06.376163Z
2021-10-28T13:50:24.341040Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/210e7a43fa905bccafa9bb5966fba1d71f33eb8b'}
Linux
GSD-2021-1000357
i2c: cadence: fix reference leak when pm_runtime_get_sync fails
i2c: cadence: fix reference leak when pm_runtime_get_sync fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 30410519328c94367e561fd878e5f0d3a0303585, it was introduced in version v4.5 by commit 7fa32329ca03148fb2c07b4ef3247b8fc0488d6a. For more details please see the references link.
null
2021-12-20T01:24:03.156371Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7fa32329ca03148fb2c07b4ef3247b8fc0488d6a'}
Linux
GSD-2021-1002690
bpf: Fix signed bounds propagation after mov32
bpf: Fix signed bounds propagation after mov32 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.88 by commit e2aad0b5f2cbf71a31d00ce7bb4dee948adff5a9, it was introduced in version v5.7 by commit 3f50f132d8400e129fc9eb68b5020167ef80a244. For more details please see the references link.
null
2022-01-11T05:58:07.947712Z
2021-12-27T05:36:57.704273Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f50f132d8400e129fc9eb68b5020167ef80a244'}
Linux
GSD-2022-1000928
usb: gadget: rndis: add spinlock for rndis response list
usb: gadget: rndis: add spinlock for rndis response list This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.269 by commit 669c2b178956718407af5631ccbc61c24413f038, it was introduced in version v4.6 by commit f6281af9d62e128aa6efad29cf7265062af114f2. For more details please see the references link.
null
2022-03-18T03:00:24.950810Z
2022-03-18T00:33:01.545751Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f6281af9d62e128aa6efad29cf7265062af114f2'}
Linux
GSD-2021-1002385
iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove
iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.293 by commit 60a55b9d91ba99eb8cf015bc46dc2de05e168a15, it was introduced in version v4.2 by commit a25691c1f9674090fb66586cf4c5d60d3efdf339. For more details please see the references link.
null
2021-12-20T00:01:21.702510Z
2021-12-19T19:35:02.742586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a25691c1f9674090fb66586cf4c5d60d3efdf339'}
Linux
GSD-2021-1000642
misc/uss720: fix memory leak in uss720_probe
misc/uss720: fix memory leak in uss720_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.124 by commit 36b5ff1db1a4ef4fdbc2bae364344279f033ad88, it was introduced in version v2.6.14 by commit 0f36163d3abefbda1b21a330b3fdf3c2dc076d94. For more details please see the references link.
null
2021-12-20T00:17:59.511380Z
2021-06-04T19:53:15.418540Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0f36163d3abefbda1b21a330b3fdf3c2dc076d94'}
Linux
GSD-2021-1001950
comedi: vmk80xx: fix transfer-buffer overflows
comedi: vmk80xx: fix transfer-buffer overflows This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.290 by commit ec85bcff4ed09260243d8f39faba99e1041718ba, it was introduced in version v2.6.31 by commit 985cafccbf9b7f862aa1c5ee566801e18b5161fb. For more details please see the references link.
null
2021-12-19T23:41:38.175468Z
2021-11-14T15:13:06.461391Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/985cafccbf9b7f862aa1c5ee566801e18b5161fb'}
Linux
GSD-2022-1001285
media: davinci: vpif: fix use-after-free on driver unbind
media: davinci: vpif: fix use-after-free on driver unbind This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 9ffc602e14d7b9f7e7cb2f67e18dfef9ef8af676, it was introduced in version v4.13 by commit 479f7a1181058689435baddc16a6a42e1a8ff0e8. For more details please see the references link.
null
2022-04-25T06:39:20.499125Z
2022-04-24T21:01:23.212667Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/479f7a1181058689435baddc16a6a42e1a8ff0e8'}
Linux
GSD-2021-1000212
libbpf: Fix signed overflow in ringbuf_process_ring
libbpf: Fix signed overflow in ringbuf_process_ring This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit 117151b0d560c286be000a212d30a9e813e55ed7, it was introduced in version v5.8 by commit bf99c936f9478a05d51e9f101f90de70bee9a89c. For more details please see the references link.
null
2021-12-19T23:16:57.022346Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf99c936f9478a05d51e9f101f90de70bee9a89c'}
Linux
GSD-2022-1002503
ath9k_htc: fix uninit value bugs
ath9k_htc: fix uninit value bugs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit 5c2a6a8daa17a3f65b38b9a5574bb362c13fa1d9, it was introduced in version v2.6.35 by commit fb9987d0f748c983bb795a86f47522313f701a08. For more details please see the references link.
null
2022-04-25T04:48:36.421562Z
2022-04-24T22:55:23.716934Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb9987d0f748c983bb795a86f47522313f701a08'}
Linux
GSD-2021-1001053
batman-adv: Avoid WARN_ON timing related checks
batman-adv: Avoid WARN_ON timing related checks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit 2eb4e0b3631832a4291c8bf4c9db873f60b128c8, it was introduced in version v3.14 by commit ef0a937f7a1450d3a133ccd83c9c7d07587e7a00. For more details please see the references link.
null
2021-12-20T00:35:19.952536Z
2021-06-30T00:36:32.278330Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef0a937f7a1450d3a133ccd83c9c7d07587e7a00'}
Linux
GSD-2022-1002153
ax25: Fix UAF bugs in ax25 timers
ax25: Fix UAF bugs in ax25 timers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.190 by commit a83a18c4c9033fb6604c587f52a2d78857cf0ac2. For more details please see the references link.
null
2022-04-25T04:54:35.865689Z
2022-04-24T22:16:34.108018Z
null
null
null
null
null
Linux
GSD-2022-1000494
arm64: errata: Add detection for TRBE invalid prohibited states
arm64: errata: Add detection for TRBE invalid prohibited states This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 12c7ff193e5716296898a5a63d4aaeed5ab3bd0e. For more details please see the references link.
null
2022-03-07T01:36:11.322430Z
2022-02-27T03:15:03.257556Z
null
null
null
null
null
Linux
GSD-2021-1001403
KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow
KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.241 by commit b67a821813c7b8160b54d83928281fec84a42d88, it was introduced in version v3.10 by commit 8e591cb7204739efa8e15967ea334eb367039dde. For more details please see the references link.
null
2021-12-20T00:31:09.090865Z
2021-08-03T02:30:29.810453Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8e591cb7204739efa8e15967ea334eb367039dde'}
Linux
GSD-2022-1001456
media: imx-jpeg: fix a bug of accessing array out of bounds
media: imx-jpeg: fix a bug of accessing array out of bounds This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 20c8b90430c5d6c4a3936eaa7c35aac670581487. For more details please see the references link.
null
2022-04-25T07:05:05.639423Z
2022-04-24T21:14:39.759978Z
null
null
null
null
null
Linux
GSD-2021-1002106
blk-cgroup: blk_cgroup_bio_start() should use irq-safe operations on blkg->iostat_cpu
blk-cgroup: blk_cgroup_bio_start() should use irq-safe operations on blkg->iostat_cpu This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit b1a34f86b41fd89441fa0e245b6b23627b0d73d3, it was introduced in version v5.13 by commit 2d146aa3aa842d7f5065802556b4f9a2c6e8ef12. For more details please see the references link.
null
2021-12-20T01:10:10.829257Z
2021-11-14T15:20:09.187670Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2d146aa3aa842d7f5065802556b4f9a2c6e8ef12'}
Linux
GSD-2022-1001006
btrfs: zoned: traverse devices under chunk_mutex in btrfs_can_activate_zone
btrfs: zoned: traverse devices under chunk_mutex in btrfs_can_activate_zone This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 142f822bd945a7be442a2916ec6167cc102c4183, it was introduced in version v5.16 by commit a85f05e59bc15a83ad910dbcb71df5ad8fa77295. For more details please see the references link.
null
2022-04-25T06:38:55.250971Z
2022-04-24T20:38:59.367443Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a85f05e59bc15a83ad910dbcb71df5ad8fa77295'}
Linux
GSD-2021-1000091
netfilter: conntrack: Make global sysctls readonly in non-init netns
netfilter: conntrack: Make global sysctls readonly in non-init netns This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.2 by commit 671c54ea8c7ff47bd88444f3fffb65bf9799ce43, it was introduced in version v5.7 by commit d0febd81ae77a0e13717f1412ff9589e43fc4f8b. For more details please see the references link.
null
2021-12-20T00:03:10.806676Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0febd81ae77a0e13717f1412ff9589e43fc4f8b'}
Linux
GSD-2021-1002556
ipv6: fix memory leak in fib6_rule_suppress
ipv6: fix memory leak in fib6_rule_suppress This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.7 by commit 8ef8a76a340ebdb2c2eea3f6fb0ebbed09a16383, it was introduced in version v5.4 by commit ca7a03c4175366a92cee0ccc4fec0038c3266e26. For more details please see the references link.
null
2021-12-20T01:30:46.097977Z
2021-12-19T19:42:31.452390Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca7a03c4175366a92cee0ccc4fec0038c3266e26'}
Linux
GSD-2022-1000247
KVM: LAPIC: Also cancel preemption timer during SET_LAPIC
KVM: LAPIC: Also cancel preemption timer during SET_LAPIC This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.19 by commit 54b3439c8e70e0bcfea59aeef9dd98908cbbf655. For more details please see the references link.
null
2022-02-19T08:47:50.305939Z
2022-02-18T22:00:57.955922Z
null
null
null
null
null
Linux
GSD-2021-1002805
ipmi: fix initialization when workqueue allocation fails
ipmi: fix initialization when workqueue allocation fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.89 by commit 8b745616ba8f2db389a59e5678fdbe28ad5883bf, it was introduced in version v5.10.84 by commit f717f29e84688b0327ae6e51fabaf397fbcd18d3. For more details please see the references link.
null
2022-01-11T05:52:20.083333Z
2021-12-30T02:44:14.522946Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f717f29e84688b0327ae6e51fabaf397fbcd18d3'}
Linux
GSD-2021-1000838
bonding: init notify_work earlier to avoid uninitialized use
bonding: init notify_work earlier to avoid uninitialized use This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.273 by commit e7e1ef6a9b7699c5315c0687fe695a2b8ed4c142. For more details please see the references link.
null
2021-12-19T22:48:54.570218Z
2021-06-30T00:00:31.692251Z
null
null
null
null
null
Linux
GSD-2022-1001905
ext4: fix fs corruption when tring to remove a non-empty directory with IO error
ext4: fix fs corruption when tring to remove a non-empty directory with IO error This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 597393cde8411ebd2098c819a29c2de23f66af65. For more details please see the references link.
null
2022-04-25T05:15:36.561932Z
2022-04-24T21:53:35.469135Z
null
null
null
null
null
Linux
GSD-2022-1000617
mm, kasan: use compare-exchange operation to set KASAN page tag
mm, kasan: use compare-exchange operation to set KASAN page tag This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit dd22253c13d2795c566f52c30f1dba48d51c482d, it was introduced in version v5.0 by commit 2813b9c0296259fb11e75c839bab2d958ba4f96c. For more details please see the references link.
null
2022-03-07T01:37:54.346944Z
2022-02-27T03:31:48.956242Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2813b9c0296259fb11e75c839bab2d958ba4f96c'}
Linux
GSD-2021-1000992
phy: phy-mtk-tphy: Fix some resource leaks in mtk_phy_init()
phy: phy-mtk-tphy: Fix some resource leaks in mtk_phy_init() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit 9a17907946232d01aa2ec109da5f93b8d31dd425. For more details please see the references link.
null
2021-12-20T00:32:02.977130Z
2021-06-30T00:31:52.669277Z
null
null
null
null
null
Linux
GSD-2021-1001680
x86/entry: Clear X86_FEATURE_SMAP when CONFIG_X86_SMAP=n
x86/entry: Clear X86_FEATURE_SMAP when CONFIG_X86_SMAP=n This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.12 by commit 4e9ec1c65da98c293f75d83755dfa5e03075a6d0, it was introduced in version v5.8 by commit 3c73b81a9164d0c1b6379d6672d2772a9e95168e. For more details please see the references link.
null
2021-12-19T22:19:47.758585Z
2021-10-19T16:31:31.832470Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c73b81a9164d0c1b6379d6672d2772a9e95168e'}
Linux
GSD-2022-1000302
net: do not keep the dst cache when uncloning an skb dst and its metadata
net: do not keep the dst cache when uncloning an skb dst and its metadata This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.267 by commit 39a269fbb80a9e905818d332aebe6651fd7a1ee9, it was introduced in version v4.6 by commit d71785ffc7e7cae3fbdc4ea8a9d05b7a1c59f7b8. For more details please see the references link.
null
2022-03-07T01:53:27.622552Z
2022-02-27T02:48:22.775202Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d71785ffc7e7cae3fbdc4ea8a9d05b7a1c59f7b8'}
Linux
GSD-2021-1001395
coresight: tmc-etf: Fix global-out-of-bounds in tmc_update_etf_buffer()
coresight: tmc-etf: Fix global-out-of-bounds in tmc_update_etf_buffer() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.198 by commit 04bd77ef4f4d9fc6102023b85f4590fc2130aac5, it was introduced in version v4.14 by commit 0c3fc4d5fa26092853278145aca9b21fa52a3e93. For more details please see the references link.
null
2021-12-20T00:22:40.511529Z
2021-08-03T02:27:39.717595Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0c3fc4d5fa26092853278145aca9b21fa52a3e93'}
Linux
GSD-2022-1002295
cifs: potential buffer overflow in handling symlinks
cifs: potential buffer overflow in handling symlinks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.239 by commit eb5f51756944735ac70cd8bb38637cc202e29c91, it was introduced in version v2.6.37 by commit c69c1b6eaea1b3e1eecf7ad2fba0208ac4a11131. For more details please see the references link.
null
2022-04-25T06:43:44.589912Z
2022-04-24T22:31:15.180953Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c69c1b6eaea1b3e1eecf7ad2fba0208ac4a11131'}
Linux
GSD-2022-1001840
mips: cdmm: Fix refcount leak in mips_cdmm_phys_base
mips: cdmm: Fix refcount leak in mips_cdmm_phys_base This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 69155dc2e04777aa94207a73a8b10f12b8428a68, it was introduced in version v5.9 by commit 2121aa3e2312ccc1d6299154dc4f07a6ab8beee2. For more details please see the references link.
null
2022-04-25T04:41:20.006073Z
2022-04-24T21:46:57.451218Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2121aa3e2312ccc1d6299154dc4f07a6ab8beee2'}
Linux
GSD-2022-1000752
KVM: x86/mmu: make apf token non-zero to fix bug
KVM: x86/mmu: make apf token non-zero to fix bug This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.12 by commit 62040f5cd7d937de547836e747b6aa8212fec573. For more details please see the references link.
null
2022-03-18T02:57:16.321323Z
2022-03-18T00:15:22.521254Z
null
null
null
null
null
Linux
GSD-2021-1002043
ocfs2: mount fails with buffer overflow in strlen
ocfs2: mount fails with buffer overflow in strlen This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit 93be0eeea14cf39235e585c8f56df3b3859deaad. For more details please see the references link.
null
2021-12-19T23:41:11.265327Z
2021-11-14T15:17:18.150913Z
null
null
null
null
null
Linux
GSD-2022-1001513
mptcp: Fix crash due to tcp_tsorted_anchor was initialized before release skb
mptcp: Fix crash due to tcp_tsorted_anchor was initialized before release skb This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 752add6f5ce5305e55d8bda4ac8d69be3a09f14d, it was introduced in version v5.16 by commit f70cad1085d1e01d3ec73c1078405f906237feee. For more details please see the references link.
null
2022-04-25T05:33:14.978700Z
2022-04-24T21:19:04.905296Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f70cad1085d1e01d3ec73c1078405f906237feee'}
Linux
GSD-2021-1000584
interconnect: qcom: bcm-voter: add a missing of_node_put()
interconnect: qcom: bcm-voter: add a missing of_node_put() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit 4e3cea8035b6f1b9055e69cc6ebf9fa4e50763ae, it was introduced in version v5.7 by commit 976daac4a1c581e5d5fd64047519fd6fcde39738. For more details please see the references link.
null
2021-12-20T01:33:54.432152Z
2021-06-04T19:42:55.477198Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/976daac4a1c581e5d5fd64047519fd6fcde39738'}
Linux
GSD-2021-1002413
ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()
ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.220 by commit dd07f8971b81ad98cc754b179b331b57f35aa1ff. For more details please see the references link.
null
2021-12-19T23:27:14.877328Z
2021-12-19T19:36:11.203123Z
null
null
null
null
null
Linux
GSD-2022-1001143
media: staging: media: zoran: move videodev alloc
media: staging: media: zoran: move videodev alloc This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 1e501ec38796f43e995731d1bcd4173cb1ccfce0. For more details please see the references link.
null
2022-04-25T06:34:00.054782Z
2022-04-24T20:48:43.181900Z
null
null
null
null
null
Linux
GSD-2021-1002686
xen/console: harden hvc_xen against event channel storms
xen/console: harden hvc_xen against event channel storms This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.168 by commit 560e64413b4a6d9bd6630e350d5f2e6a05f6ffe3. For more details please see the references link.
null
2022-01-11T05:53:42.470920Z
2021-12-27T05:36:48.424560Z
null
null
null
null
null