ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2021-1000341
net: Only allow init netns to set default tcp cong to a restricted algo
net: Only allow init netns to set default tcp cong to a restricted algo This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 6c1ea8bee75df8fe2184a50fcd0f70bf82986f42, it was introduced in version v4.15 by commit 6670e152447732ba90626f36dfc015a13fbf150e. For more details please see the references link.
null
2021-12-19T22:24:05.949933Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6670e152447732ba90626f36dfc015a13fbf150e'}
Linux
GSD-2021-1001803
can: peak_pci: peak_pci_remove(): fix UAF
can: peak_pci: peak_pci_remove(): fix UAF This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.214 by commit adbda14730aacce41c0d3596415aa39ad63eafd9, it was introduced in version v3.4 by commit e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd. For more details please see the references link.
null
2021-12-19T23:02:48.092303Z
2021-10-28T13:49:44.913753Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd'}
Linux
GSD-2021-1000711
NFC: nci: fix memory leak in nci_allocate_device
NFC: nci: fix memory leak in nci_allocate_device This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.271 by commit 448a1cb12977f52142e6feb12022c59662d88dc1, it was introduced in version v4.0 by commit 11f54f228643d0248ec00ce8c9fb8d872f87e7b8. For more details please see the references link.
null
2021-12-20T01:31:17.748468Z
2021-06-04T20:07:51.958538Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/11f54f228643d0248ec00ce8c9fb8d872f87e7b8'}
Linux
GSD-2022-1000894
xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
xen/netfront: react properly to failing gnttab_end_foreign_access_ref() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.234 by commit c307029d811e03546d18d0e512fe295b3103b8e5. For more details please see the references link.
null
2022-03-18T02:55:57.394574Z
2022-03-18T00:29:05.159515Z
null
null
null
null
null
Linux
GSD-2022-1001786
media: imx-jpeg: Prevent decoding NV12M jpegs into single-planar buffers
media: imx-jpeg: Prevent decoding NV12M jpegs into single-planar buffers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit eff76b180751e5e55c872d17755680c3b83ba9ab. For more details please see the references link.
null
2022-04-25T04:25:53.575962Z
2022-04-24T21:42:17.947954Z
null
null
null
null
null
Linux
GSD-2022-1002000
PCI: endpoint: Fix misused goto label
PCI: endpoint: Fix misused goto label This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit 7c657c0694ff690e361a13ce41c36b9dfb433ec8. For more details please see the references link.
null
2022-04-25T06:45:54.814740Z
2022-04-24T22:02:04.389727Z
null
null
null
null
null
Linux
GSD-2021-1001550
drm/nouveau/debugfs: fix file release memory leak
drm/nouveau/debugfs: fix file release memory leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.211 by commit 1508b09945bde393326a9dab73b1fc35f672d771, it was introduced in version v4.5 by commit 6e9fc177399f08446293fec7607913fdbc95e191. For more details please see the references link.
null
2021-12-19T23:59:49.216074Z
2021-10-19T16:23:20.511943Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6e9fc177399f08446293fec7607913fdbc95e191'}
Linux
GSD-2022-1002450
mm/pages_alloc.c: don't create ZONE_MOVABLE beyond the end of a node
mm/pages_alloc.c: don't create ZONE_MOVABLE beyond the end of a node This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 4d6d259e5fa3647b5bc41a17276464ab8c2e1a44, it was introduced in version v2.6.23 by commit 2a1e274acf0b1c192face19a4be7c12d4503eaaf. For more details please see the references link.
null
2022-04-25T05:24:55.979694Z
2022-04-24T22:49:10.429940Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2a1e274acf0b1c192face19a4be7c12d4503eaaf'}
Linux
GSD-2021-1001100
nilfs2: fix memory leak in nilfs_sysfs_delete_device_group
nilfs2: fix memory leak in nilfs_sysfs_delete_device_group This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.274 by commit 46c38e258b6767e034c7142e8528d033da11107f, it was introduced in version v3.17 by commit da7141fb78db915680616e15677539fc8140cf53. For more details please see the references link.
null
2021-12-19T22:23:54.399999Z
2021-07-08T01:56:20.054141Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/da7141fb78db915680616e15677539fc8140cf53'}
Linux
GSD-2022-1000197
drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable
drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.96 by commit 79c0b5287ded74f4eacde4dfd8aa0a76cbd853b5, it was introduced in version v4.3 by commit 5c8290284402bf7d2c12269402b3177b899c78b7. For more details please see the references link.
null
2022-02-19T09:49:07.811807Z
2022-02-18T21:53:37.977286Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5c8290284402bf7d2c12269402b3177b899c78b7'}
Linux
GSD-2021-1001415
watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff()
watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.240 by commit 2aef07017fae21c3d8acea9656b10e3b9c0f1e04. For more details please see the references link.
null
2021-12-19T23:04:51.695552Z
2021-08-03T02:34:01.643437Z
null
null
null
null
null
Linux
GSD-2022-1000482
xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create
xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit 9921c866dc369577c3ebb9adf2383b01b58c18de. For more details please see the references link.
null
2022-03-07T01:48:26.001441Z
2022-02-27T03:13:02.023006Z
null
null
null
null
null
Linux
GSD-2022-1000178
tipc: improve size validations for received domain records
tipc: improve size validations for received domain records This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.179 by commit d692e3406e052dbf9f6d9da0cba36cb763272529, it was introduced in version v4.8 by commit 35c55c9877f8de0ab129fa1a309271d0ecc868b9. For more details please see the references link.
null
2022-02-19T15:45:17.515569Z
2022-02-18T21:51:30.529274Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/35c55c9877f8de0ab129fa1a309271d0ecc868b9'}
Linux
GSD-2022-1002145
tpm: fix reference counting for struct tpm_chip
tpm: fix reference counting for struct tpm_chip This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 290e05f346d1829e849662c97e42d5ad984f5258, it was introduced in version v4.12 by commit fdc915f7f71939ad5a3dda3389b8d2d7a7c5ee66. For more details please see the references link.
null
2022-04-25T04:59:04.293240Z
2022-04-24T22:15:59.058207Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fdc915f7f71939ad5a3dda3389b8d2d7a7c5ee66'}
Linux
GSD-2021-1001045
scsi: core: Fix error handling of scsi_host_alloc()
scsi: core: Fix error handling of scsi_host_alloc() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit 45d83db4728127944b237c0c8248987df9d478e7. For more details please see the references link.
null
2021-12-20T00:53:38.155811Z
2021-06-30T00:36:02.660788Z
null
null
null
null
null
Linux
GSD-2022-1000528
mm: vmscan: remove deadlock due to throttling failing to make progress
mm: vmscan: remove deadlock due to throttling failing to make progress This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 3980cff6349687f73d5109f156f23cb261c24164, it was introduced in version v5.16 by commit d818fca1cac31b1fc9301bda83e195a46fb4ebaa. For more details please see the references link.
null
2022-03-07T01:34:05.283468Z
2022-02-27T03:19:42.344890Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d818fca1cac31b1fc9301bda83e195a46fb4ebaa'}
Linux
GSD-2022-1002515
llc: only change llc->dev when bind() succeeds
llc: only change llc->dev when bind() succeeds This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.309 by commit e82b631e22920bffbd7e4a15c14a823d36d45233, it was introduced in version v4.9.309 by commit 0a7aad979bfb43c4a78d33a5f356caf4ceb28bca. For more details please see the references link.
null
2022-04-24T22:57:13.535117Z
2022-04-24T22:57:13.535117Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0a7aad979bfb43c4a78d33a5f356caf4ceb28bca'}
Linux
GSD-2021-1002239
tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc
tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.256 by commit 4c1623651a0936ee197859824cdae6ebbd04d3ed. For more details please see the references link.
null
2021-12-20T00:45:01.984551Z
2021-11-29T02:34:47.040376Z
null
null
null
null
null
Linux
GSD-2021-1000204
i40e: Fix use-after-free in i40e_client_subtask()
i40e: Fix use-after-free in i40e_client_subtask() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit 1fd5d262e7442192ac7611ff1597a36c5b044323, it was introduced in version v4.16 by commit 7b0b1a6d0ac983ce1928432285d0222d4fb7c38b. For more details please see the references link.
null
2021-12-19T23:43:44.274464Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7b0b1a6d0ac983ce1928432285d0222d4fb7c38b'}
Linux
GSD-2022-1001293
block: fix rq-qos breakage from skipping rq_qos_done_bio()
block: fix rq-qos breakage from skipping rq_qos_done_bio() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 09737db4c891eba25e6f6383a7c38afd4acc883f, it was introduced in version v5.15 by commit a647a524a46736786c95cdb553a070322ca096e3. For more details please see the references link.
null
2022-04-25T02:49:31.563384Z
2022-04-24T21:01:52.884713Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a647a524a46736786c95cdb553a070322ca096e3'}
Linux
GSD-2022-1001769
KVM: x86/mmu: do compare-and-exchange of gPTE via the user address
KVM: x86/mmu: do compare-and-exchange of gPTE via the user address This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 8771d9673e0bdb7148299f3c074667124bde6dff, it was introduced in version v5.2 by commit bd53cb35a3e9adb73a834a36586e9ad80e877767. For more details please see the references link.
null
2022-04-25T03:56:13.837640Z
2022-04-24T21:41:18.313283Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bd53cb35a3e9adb73a834a36586e9ad80e877767'}
Linux
GSD-2021-1001946
scsi: core: Put LLD module refcnt after SCSI device is released
scsi: core: Put LLD module refcnt after SCSI device is released This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.290 by commit 8e4814a461787e15a31d322d9efbe0d4f6822428. For more details please see the references link.
null
2021-12-20T01:17:41.490462Z
2021-11-14T15:12:55.993733Z
null
null
null
null
null
Linux
GSD-2021-1002669
net: netlink: af_netlink: Prevent empty skb by adding a check on len.
net: netlink: af_netlink: Prevent empty skb by adding a check on len. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.167 by commit c0315e93552e0d840e9edc6abd71c7db82ec8f51. For more details please see the references link.
null
2022-01-11T06:43:26.184284Z
2021-12-27T05:35:41.121082Z
null
null
null
null
null
Linux
GSD-2021-1000654
net: dsa: fix a crash if ->get_sset_count() fails
net: dsa: fix a crash if ->get_sset_count() fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.193 by commit 0f2cb08c57edefb0e7b5045e0e3e9980a3d3aa37, it was introduced in version v4.7 by commit badf3ada60ab8f76f9488dc8f5c0c57f70682f5a. For more details please see the references link.
null
2021-12-20T00:48:13.090470Z
2021-06-04T19:55:30.285863Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/badf3ada60ab8f76f9488dc8f5c0c57f70682f5a'}
Linux
GSD-2022-1001339
mm/sparsemem: fix 'mem_section' will never be NULL gcc 12 warning
mm/sparsemem: fix 'mem_section' will never be NULL gcc 12 warning This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 3d0089f08712392e5340ad5cffbdb60baefff72c, it was introduced in version v2.6.14 by commit 3e347261a80b57df792ab9464b5f0ed59add53a8. For more details please see the references link.
null
2022-04-25T06:16:23.601430Z
2022-04-24T21:05:53.662710Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3e347261a80b57df792ab9464b5f0ed59add53a8'}
Linux
GSD-2021-1002393
net: ethernet: dec: tulip: de4x5: fix possible array overflows in type3_infoblock()
net: ethernet: dec: tulip: de4x5: fix possible array overflows in type3_infoblock() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.257 by commit ae3c30ca1894ead38e39576289e5a8346621450f. For more details please see the references link.
null
2021-12-19T23:44:29.242162Z
2021-12-19T19:35:22.740687Z
null
null
null
null
null
Linux
GSD-2021-1001696
bpf: Fix integer overflow in prealloc_elems_and_freelist()
bpf: Fix integer overflow in prealloc_elems_and_freelist() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.12 by commit 3a1ac1e368bedae2777d9a7cfdc65df4859f7e71, it was introduced in version v4.6 by commit 557c0c6e7df8e14a46bd7560d193fa5bbc00a858. For more details please see the references link.
null
2021-12-20T01:06:09.815113Z
2021-10-19T16:32:19.413505Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/557c0c6e7df8e14a46bd7560d193fa5bbc00a858'}
Linux
GSD-2021-1000984
ethtool: strset: fix message length calculation
ethtool: strset: fix message length calculation This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit fb3a948143688e14e2cfd2a2812877923d0e5e92, it was introduced in version v5.6 by commit 71921690f9745fef60a2bad425f30adf8cdc9da0. For more details please see the references link.
null
2021-12-20T01:18:49.325746Z
2021-06-30T00:31:22.284748Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/71921690f9745fef60a2bad425f30adf8cdc9da0'}
Linux
GSD-2022-1000601
btrfs: fix too long loop when defragging a 1 byte file
btrfs: fix too long loop when defragging a 1 byte file This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit bac3babdabdc53f8f47b513cff805b3b98c467bb, it was introduced in version v5.16 by commit 7b508037d4cac3bcde7187b70170caf81cae3aad. For more details please see the references link.
null
2022-03-07T01:38:42.895698Z
2022-02-27T03:29:22.231406Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7b508037d4cac3bcde7187b70170caf81cae3aad'}
Linux
GSD-2022-1001913
cifs: fix NULL ptr dereference in smb2_ioctl_query_info()
cifs: fix NULL ptr dereference in smb2_ioctl_query_info() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 39a4bf7d1a23dd172526c2fb0db480c5d5c63bd6. For more details please see the references link.
null
2022-04-25T06:30:41.322146Z
2022-04-24T21:54:05.395108Z
null
null
null
null
null
Linux
GSD-2021-1002813
f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()
f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.89 by commit fffb6581a23add416239dfcf7e7f3980c6b913da. For more details please see the references link.
null
2022-01-11T05:48:44.299471Z
2021-12-30T02:44:33.868618Z
null
null
null
null
null
Linux
GSD-2022-1000251
USB: core: Fix hang in usb_kill_urb by adding memory barriers
USB: core: Fix hang in usb_kill_urb by adding memory barriers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.19 by commit 9340226388c66a7e090ebb00e91ed64a753b6c26. For more details please see the references link.
null
2022-02-19T04:28:16.969720Z
2022-02-18T22:01:26.571282Z
null
null
null
null
null
Linux
GSD-2021-1002540
net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk()
net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.6 by commit bb851d0fb02547d03cd40106b5f2391c4fed6ed1, it was introduced in version v4.18 by commit cb9d43f6775457cac75544bc4197f26ac2b6f294. For more details please see the references link.
null
2021-12-19T23:33:01.000650Z
2021-12-19T19:41:51.852246Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cb9d43f6775457cac75544bc4197f26ac2b6f294'}
Linux
GSD-2021-1000087
bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue
bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.3 by commit ed541cff35cbdb695f0c98ef506dd7218883fc07, it was introduced in version v5.11 by commit 8f70397876872789b2a5deba804eb6216fb5deb7. For more details please see the references link.
null
2021-12-19T22:17:09.651607Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8f70397876872789b2a5deba804eb6216fb5deb7'}
Linux
GSD-2022-1001010
iommu/omap: Fix regression in probe for NULL pointer dereference
iommu/omap: Fix regression in probe for NULL pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 1d89f2b9eadbcf3ce93c6d7238f68299a1f84968, it was introduced in version v5.8 by commit 6785eb9105e3363aa51408c700a55e8b5f88fcf6. For more details please see the references link.
null
2022-04-25T03:14:45.225948Z
2022-04-24T20:39:23.131120Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6785eb9105e3363aa51408c700a55e8b5f88fcf6'}
Linux
GSD-2021-1002110
mm, slub: fix mismatch between reconstructed freelist depth and cnt
mm, slub: fix mismatch between reconstructed freelist depth and cnt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit ec93d4a439c3a619b6682ba5778dc885d1460d3e, it was introduced in version v4.17 by commit c3895391df385c6628638f014c87e16f5e2efd45. For more details please see the references link.
null
2021-12-19T22:27:49.776745Z
2021-11-14T15:20:18.986936Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c3895391df385c6628638f014c87e16f5e2efd45'}
Linux
GSD-2022-1001440
ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock()
ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit e09fa5318d51f522e1af4fbaf8f74999355980c8, it was introduced in version v2.6.27 by commit 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d. For more details please see the references link.
null
2022-04-25T06:57:57.449770Z
2022-04-24T21:13:31.873554Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d'}
Linux
GSD-2022-1001155
ext4: fix ext4_mb_mark_bb() with flex_bg with fast_commit
ext4: fix ext4_mb_mark_bb() with flex_bg with fast_commit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 803fb0e8240cc16585a5c9df76add1dfaa781773. For more details please see the references link.
null
2022-04-25T04:13:37.538587Z
2022-04-24T20:49:17.983298Z
null
null
null
null
null
Linux
GSD-2021-1000438
crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init
crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.119 by commit 05ec8192ee4bfdf2a8894a68350dac9f1a155fa6, it was introduced in version v4.7 by commit 25c6ffb249f612c56a48ce48a3887adf57b8f4bd. For more details please see the references link.
null
2021-12-20T00:44:57.532394Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/25c6ffb249f612c56a48ce48a3887adf57b8f4bd'}
Linux
GSD-2021-1002405
iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove
iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.258 by commit 3899700ddacbf7aaafadf44464fff3ff0d4e3307, it was introduced in version v4.2 by commit a25691c1f9674090fb66586cf4c5d60d3efdf339. For more details please see the references link.
null
2021-12-19T23:44:51.777139Z
2021-12-19T19:35:52.153243Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a25691c1f9674090fb66586cf4c5d60d3efdf339'}
Linux
GSD-2021-1000592
i2c: i801: Don't generate an interrupt on bus reset
i2c: i801: Don't generate an interrupt on bus reset This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit b523feb7e8e44652f92f3babb953a976e7ccbbef, it was introduced in version v3.6 by commit 636752bcb5177a301d0266270661581de8624828. For more details please see the references link.
null
2021-12-19T23:47:13.737649Z
2021-06-04T19:43:48.325713Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/636752bcb5177a301d0266270661581de8624828'}
Linux
GSD-2022-1001505
kernel/resource: fix kfree() of bootmem memory again
kernel/resource: fix kfree() of bootmem memory again This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit d7faa04a44a0c37ac3d222fa8e0bdcbfcee9c0c8, it was introduced in version v3.10 by commit ebff7d8f270d045338d9f4796014f4db429a17f9. For more details please see the references link.
null
2022-04-25T06:13:46.371198Z
2022-04-24T21:18:15.831338Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ebff7d8f270d045338d9f4796014f4db429a17f9'}
Linux
GSD-2021-1000068
NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds
NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.3 by commit 3d0163821c035040a46d816a42c0780f0f0a30a8, it was introduced in version v5.6 by commit 9954bf92c0cddd50a2a470be302e1c1ffdf21d42. For more details please see the references link.
null
2021-12-20T01:03:28.619268Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9954bf92c0cddd50a2a470be302e1c1ffdf21d42'}
Linux
GSD-2021-1002055
net: mdiobus: Fix memory leak in __mdiobus_register
net: mdiobus: Fix memory leak in __mdiobus_register This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit 3a0dc2e35a5d6546b1db87fe985582dadc64fe7b. For more details please see the references link.
null
2021-12-19T23:29:34.065833Z
2021-11-14T15:17:47.092441Z
null
null
null
null
null
Linux
GSD-2022-1000744
gso: do not skip outer ip header in case of ipip and net_failover
gso: do not skip outer ip header in case of ipip and net_failover This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.12 by commit a739963f43269297c3f438b776194542e2a97499, it was introduced in version v3.13 by commit cb32f511a70be8967ac9025cf49c44324ced9a39. For more details please see the references link.
null
2022-03-18T02:57:31.063763Z
2022-03-18T00:14:54.245466Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cb32f511a70be8967ac9025cf49c44324ced9a39'}
Linux
GSD-2022-1001856
drm/amd/display: Add affected crtcs to atomic state for dsc mst unplug
drm/amd/display: Add affected crtcs to atomic state for dsc mst unplug This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 0f47edc22c2b7e4c1903d74c3992f09db9453d11, it was introduced in version v5.6 by commit 44be939ff7ac5858f0dbd8a2a4af1fe198e14db1. For more details please see the references link.
null
2022-04-25T06:37:50.468146Z
2022-04-24T21:48:42.370878Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/44be939ff7ac5858f0dbd8a2a4af1fe198e14db1'}
Linux
GSD-2022-1002283
llc: only change llc->dev when bind() succeeds
llc: only change llc->dev when bind() succeeds This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.188 by commit 993c23880bcecf5e74090c9288ea680b5eb29005, it was introduced in version v5.4.188 by commit 572f9a0d3f3feb8bd3422e88ad71882bc034b3ff. For more details please see the references link.
null
2022-04-24T22:30:04.824641Z
2022-04-24T22:30:04.824641Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/572f9a0d3f3feb8bd3422e88ad71882bc034b3ff'}
Linux
GSD-2021-1001229
ext4: fix memory leak in ext4_fill_super
ext4: fix memory leak in ext4_fill_super This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13 by commit afd09b617db3786b6ef3dc43e28fe728cfea84df, it was introduced in version v2.6.25 by commit ce40733ce93de402ed629762f0e912d9af187cef. For more details please see the references link.
null
2021-12-19T22:40:44.578049Z
2021-08-03T01:42:49.646372Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ce40733ce93de402ed629762f0e912d9af187cef'}
Linux
GSD-2021-1001383
scsi: iscsi: Fix conn use after free during resets
scsi: iscsi: Fix conn use after free during resets This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.198 by commit bf20d85a88384574fabb3d53ad62a8af57e7ab11. For more details please see the references link.
null
2021-12-19T23:32:38.351650Z
2021-08-03T02:25:32.389776Z
null
null
null
null
null
Linux
GSD-2022-1002329
ubifs: rename_whiteout: Fix double free for whiteout_ui->data
ubifs: rename_whiteout: Fix double free for whiteout_ui->data This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 2b3236ecf96db7af5836e1366ce39ace8ce832fa, it was introduced in version v4.9 by commit 9e0a1fff8db56eaaebb74b4a3ef65f86811c4798. For more details please see the references link.
null
2022-04-25T06:24:19.043336Z
2022-04-24T22:35:08.987917Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9e0a1fff8db56eaaebb74b4a3ef65f86811c4798'}
Linux
GSD-2022-1000314
usb: f_fs: Fix use-after-free for epfile
usb: f_fs: Fix use-after-free for epfile This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.230 by commit cfe5f6fd335d882bcc829a1c8a7d462a455c626e, it was introduced in version v4.9 by commit a9e6f83c2df199187a5248f824f31b6787ae23ae. For more details please see the references link.
null
2022-03-07T01:37:44.023413Z
2022-02-27T02:49:44.753075Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a9e6f83c2df199187a5248f824f31b6787ae23ae'}
Linux
GSD-2021-1001679
drm/amdgpu: fix gart.bo pin_count leak
drm/amdgpu: fix gart.bo pin_count leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.13 by commit 18d1c5ea3798ba42cfa0f8b2264d873463facb03. For more details please see the references link.
null
2021-12-20T01:25:59.797389Z
2021-10-19T16:31:29.041614Z
null
null
null
null
null
Linux
GSD-2021-1001157
bonding: fix null dereference in bond_ipsec_add_sa()
bonding: fix null dereference in bond_ipsec_add_sa() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.6 by commit 9863701fa0ecd2abfadb27b0e7a9b0fe1c9d02b6, it was introduced in version v5.9 by commit 18cb261afd7bf50134e5ccacc5ec91ea16efadd4. For more details please see the references link.
null
2021-12-19T22:11:37.938619Z
2021-08-03T01:31:16.406701Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/18cb261afd7bf50134e5ccacc5ec91ea16efadd4'}
Linux
GSD-2022-1002407
netlabel: fix out-of-bounds memory accesses
netlabel: fix out-of-bounds memory accesses This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.106 by commit fcfe700acdc1c72eab231300e82b962bac2b2b2c, it was introduced in version v2.6.19 by commit 446fda4f26822b2d42ab3396aafcedf38a9ff2b6. For more details please see the references link.
null
2022-04-25T05:48:43.638323Z
2022-04-24T22:44:12.218610Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/446fda4f26822b2d42ab3396aafcedf38a9ff2b6'}
Linux
GSD-2021-1001507
bpf: Fix integer overflow in prealloc_elems_and_freelist()
bpf: Fix integer overflow in prealloc_elems_and_freelist() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.287 by commit 4fd6663eb01bc3c73143cd27fefd7b8351bc6aa6, it was introduced in version v4.6 by commit 557c0c6e7df8e14a46bd7560d193fa5bbc00a858. For more details please see the references link.
null
2021-12-19T22:21:32.423730Z
2021-10-19T16:21:21.930736Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/557c0c6e7df8e14a46bd7560d193fa5bbc00a858'}
Linux
GSD-2022-1000590
ASoC: codecs: wcd938x: fix incorrect used of portid
ASoC: codecs: wcd938x: fix incorrect used of portid This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.22 by commit aa7152f9f117b3e66b3c0d4158ca4c6d46ab229f, it was introduced in version v5.14 by commit e8ba1e05bdc016700c85fad559a812c2e795442f. For more details please see the references link.
null
2022-03-07T01:49:38.539126Z
2022-02-27T03:28:07.671297Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e8ba1e05bdc016700c85fad559a812c2e795442f'}
Linux
GSD-2022-1002057
gcc-plugins/stackleak: Exactly match strings instead of prefixes
gcc-plugins/stackleak: Exactly match strings instead of prefixes This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 9d1d8e5e42941d3a51f7cde3bee93c2b47838aaa. For more details please see the references link.
null
2022-04-25T06:03:15.273150Z
2022-04-24T22:06:14.155530Z
null
null
null
null
null
Linux
GSD-2021-1001854
drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read
drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.75 by commit a7b45024f66f9ec769e8dbb1a51ae83cd05929c7, it was introduced in version v5.7 by commit e11f5bd8228fc3760c221f940b9f6365dbf3e7ed. For more details please see the references link.
null
2021-12-20T00:43:02.846654Z
2021-10-28T13:52:20.258305Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e11f5bd8228fc3760c221f940b9f6365dbf3e7ed'}
Linux
GSD-2021-1000746
netfilter: nft_ct: skip expectations for confirmed conntrack
netfilter: nft_ct: skip expectations for confirmed conntrack This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.125 by commit da8d31e80ff425f5a65dab7060d5c4aba749e562, it was introduced in version v5.3 by commit 857b46027d6f91150797295752581b7155b9d0e1. For more details please see the references link.
null
2021-12-20T01:33:59.838122Z
2021-06-25T00:02:05.936453Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/857b46027d6f91150797295752581b7155b9d0e1'}
Linux
GSD-2021-1002281
NFC: reorder the logic in nfc_{un,}register_device
NFC: reorder the logic in nfc_{un,}register_device This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.82 by commit 73a0d12114b4bc1a9def79a623264754b9df698e, it was introduced in version v3.10 by commit be055b2f89b5842f41363b5655a33dffb51a8294. For more details please see the references link.
null
2021-12-19T23:58:52.996947Z
2021-11-29T02:36:52.998851Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/be055b2f89b5842f41363b5655a33dffb51a8294'}
Linux
GSD-2021-1000316
f2fs: compress: fix race condition of overwrite vs truncate
f2fs: compress: fix race condition of overwrite vs truncate This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.38 by commit 5639b73fd3bc6fc8ca72e3a9ac15aacaabd7ebff, it was introduced in version v5.6 by commit 4c8ff7095bef64fc47e996a938f7d57f9e077da3. For more details please see the references link.
null
2021-12-19T22:59:11.869721Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4c8ff7095bef64fc47e996a938f7d57f9e077da3'}
Linux
GSD-2022-1001381
clk: mediatek: Fix memory leaks on probe
clk: mediatek: Fix memory leaks on probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit c6a0b413398588fc2d8b174a79ea715b66413fca. For more details please see the references link.
null
2022-04-25T05:35:38.914805Z
2022-04-24T21:09:21.198005Z
null
null
null
null
null
Linux
GSD-2022-1000969
drivers: net: slip: fix NPD bug in sl_tx_timeout()
drivers: net: slip: fix NPD bug in sl_tx_timeout() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.4 by commit b39fdc7a0d87f7f5d287dce1ae297a329775a1a3. For more details please see the references link.
null
2022-04-25T04:25:52.113605Z
2022-04-24T20:35:52.570045Z
null
null
null
null
null
Linux
GSD-2021-1001911
efi: Change down_interruptible() in virt_efi_reset_system() to down_trylock()
efi: Change down_interruptible() in virt_efi_reset_system() to down_trylock() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit 85c6f477b3574ba0efa05603247b39e00be0c1b5. For more details please see the references link.
null
2021-12-19T23:42:43.495962Z
2021-10-28T13:55:20.070210Z
null
null
null
null
null
Linux
GSD-2021-1000603
Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails
Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit 1b364f8ede200e79e25df0df588fcedc322518fb, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T23:51:42.158768Z
2021-06-04T19:45:51.603963Z
null
null
null
null
null
Linux
GSD-2022-1000986
cachefiles: unmark inode in use in error path
cachefiles: unmark inode in use in error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.4 by commit b2055abafd3d4ee0376fb3eed5cae866316995a1, it was introduced in version v5.17 by commit 1f08c925e7a38002bde509e66f6f891468848511. For more details please see the references link.
null
2022-04-25T04:38:53.143730Z
2022-04-24T20:37:21.694076Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1f08c925e7a38002bde509e66f6f891468848511'}
Linux
GSD-2022-1001694
NFS: Avoid writeback threads getting stuck in mempool_alloc()
NFS: Avoid writeback threads getting stuck in mempool_alloc() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit ea029e4ce760f786919d06ef52efa2e50ea92a5f. For more details please see the references link.
null
2022-04-25T06:04:44.162250Z
2022-04-24T21:35:52.697852Z
null
null
null
null
null
Linux
GSD-2021-1002794
Input: elantech - fix stack out of bound access in elantech_change_report_id()
Input: elantech - fix stack out of bound access in elantech_change_report_id() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.169 by commit a7f95328c6f0afffdc4555f16e3bbab8bbf0d9be, it was introduced in version v5.4.103 by commit 9e4815cf178561104881e5d687ef69396aca1c8d. For more details please see the references link.
null
2022-01-11T05:58:02.394167Z
2021-12-30T02:43:41.965391Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9e4815cf178561104881e5d687ef69396aca1c8d'}
Linux
GSD-2021-1000253
mt76: connac: fix kernel warning adding monitor interface
mt76: connac: fix kernel warning adding monitor interface This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 2554b9cb4b5e097c6071ec3ed5bc7c665c477ca7, it was introduced in version v5.12 by commit d0e274af2f2e44b9d496f5d2c0431fdd2ea76fb8. For more details please see the references link.
null
2021-12-19T22:57:40.489746Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0e274af2f2e44b9d496f5d2c0431fdd2ea76fb8'}
Linux
GSD-2021-1001012
bonding: init notify_work earlier to avoid uninitialized use
bonding: init notify_work earlier to avoid uninitialized use This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit cf3f90b7b5abc2154c3c611b6846b265932f47ce. For more details please see the references link.
null
2021-12-20T01:28:03.777953Z
2021-06-30T00:33:51.719982Z
null
null
null
null
null
Linux
GSD-2022-1000085
net: amd-xgbe: Fix skb data length underflow
net: amd-xgbe: Fix skb data length underflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.300 by commit 9924c80bd484340191e586110ca22bff23a49f2e, it was introduced in version v4.9.19 by commit fafc9555d87a19c78bcd43ed731c3a73bf0b37a9. For more details please see the references link.
null
2022-02-20T06:24:08.051618Z
2022-02-18T21:33:31.618202Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fafc9555d87a19c78bcd43ed731c3a73bf0b37a9'}
Linux
GSD-2022-1002112
ASoC: xilinx: xlnx_formatter_pcm: Handle sysclk setting
ASoC: xilinx: xlnx_formatter_pcm: Handle sysclk setting This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 2c357e027725b55f2300cb4744c9c5c67dfa5e01, it was introduced in version v5.1 by commit 6f6c3c36f0917be24587eeba818ab4fdfcb5465a. For more details please see the references link.
null
2022-04-25T03:59:30.043716Z
2022-04-24T22:12:49.940526Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6f6c3c36f0917be24587eeba818ab4fdfcb5465a'}
Linux
GSD-2021-1001442
seq_file: disallow extremely large seq buffer allocations
seq_file: disallow extremely large seq buffer allocations This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.276 by commit c5157b3e775dac31d51b11f993a06a84dc11fc8c, it was introduced in version v3.16 by commit 058504edd02667eef8fac9be27ab3ea74332e9b4. For more details please see the references link.
null
2021-12-20T00:25:56.944414Z
2021-08-03T02:42:35.542480Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/058504edd02667eef8fac9be27ab3ea74332e9b4'}
Linux
GSD-2021-1000480
ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook
ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.269 by commit 555a70f7fff03bd669123487905c47ae27dbdaac, it was introduced in version v4.7 by commit 1879445dfa7bbd6fe21b09c5cc72f4934798afed. For more details please see the references link.
null
2021-12-19T23:13:18.711492Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1879445dfa7bbd6fe21b09c5cc72f4934798afed'}
Linux
GSD-2022-1001417
drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj
drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit b6d1f7d97c81ebaf2cda9c4c943ee2e484fffdcf. For more details please see the references link.
null
2022-04-25T04:32:55.063384Z
2022-04-24T21:11:18.143737Z
null
null
null
null
null
Linux
GSD-2021-1002147
dm: fix mempool NULL pointer race when completing IO
dm: fix mempool NULL pointer race when completing IO This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit d208b89401e073de986dc891037c5a668f5d5d95. For more details please see the references link.
null
2021-12-19T23:41:09.077737Z
2021-11-14T15:21:58.758987Z
null
null
null
null
null
Linux
GSD-2022-1001047
powerpc/code-patching: Pre-map patch area
powerpc/code-patching: Pre-map patch area This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 38b268093c5abdb2fc7c88c52bba5a12dd7be984. For more details please see the references link.
null
2022-04-25T06:16:11.322448Z
2022-04-24T20:42:19.421972Z
null
null
null
null
null
Linux
GSD-2021-1002517
i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc
i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.85 by commit e5b7fb2198abc50058f1a29c395b004f76ab1c83, it was introduced in version v3.12 by commit 02e9c290814cc143ceccecb14eac3e7a05da745e. For more details please see the references link.
null
2021-12-19T22:56:02.821129Z
2021-12-19T19:40:49.321770Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/02e9c290814cc143ceccecb14eac3e7a05da745e'}
Linux
GSD-2021-1001291
coresight: tmc-etf: Fix global-out-of-bounds in tmc_update_etf_buffer()
coresight: tmc-etf: Fix global-out-of-bounds in tmc_update_etf_buffer() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.51 by commit 35c1c4bd2d59ad734129d4e232af9d1098023918, it was introduced in version v4.14 by commit 0c3fc4d5fa26092853278145aca9b21fa52a3e93. For more details please see the references link.
null
2021-12-20T00:20:41.241888Z
2021-08-03T01:58:30.776009Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0c3fc4d5fa26092853278145aca9b21fa52a3e93'}
Linux
GSD-2022-1000206
net: ipa: prevent concurrent replenish
net: ipa: prevent concurrent replenish This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.97 by commit 42fdbf8b7dab0328554899455a5b0a58526f8a63, it was introduced in version v5.7 by commit 84f9bd12d46dbe8ac7d4b650a8fbb4c49657a38b. For more details please see the references link.
null
2022-02-19T08:44:12.787271Z
2022-02-18T21:55:27.168840Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/84f9bd12d46dbe8ac7d4b650a8fbb4c49657a38b'}
Linux
GSD-2021-1000879
usb: fix various gadget panics on 10gbps cabling
usb: fix various gadget panics on 10gbps cabling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.195 by commit 45f9a2fe737dc0a5df270787f2231aee8985cd59. For more details please see the references link.
null
2021-12-19T23:16:12.134883Z
2021-06-30T00:03:13.963692Z
null
null
null
null
null
Linux
GSD-2021-1002844
hamradio: improve the incomplete fix to avoid NPD
hamradio: improve the incomplete fix to avoid NPD This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.12 by commit 03d00f7f1815ec00dab5035851b3de83afd054a8. For more details please see the references link.
null
2022-01-11T05:51:12.822436Z
2021-12-30T02:45:57.440625Z
null
null
null
null
null
Linux
GSD-2022-1000656
btrfs: fix use-after-free after failure to create a snapshot
btrfs: fix use-after-free after failure to create a snapshot This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.8 by commit 9372fa1d73da5f1673921e365d0cd2c27ec7adc2. For more details please see the references link.
null
2022-03-07T02:46:24.926796Z
2022-02-27T03:36:51.275078Z
null
null
null
null
null
Linux
GSD-2022-1001944
ax25: Fix UAF bugs in ax25 timers
ax25: Fix UAF bugs in ax25 timers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.112 by commit 5c62d3bf14100a88d30888b925fcb61a8c11c012. For more details please see the references link.
null
2022-04-25T04:21:15.463960Z
2022-04-24T21:56:57.456103Z
null
null
null
null
null
Linux
GSD-2022-1002391
net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link
net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 75e105d068cb98e43a6bb6b196fc006da52f9ee5, it was introduced in version v4.8 by commit fb3bbdb859891e6bc27fd1afb3a07319f82c2ee4. For more details please see the references link.
null
2022-04-25T06:46:16.645224Z
2022-04-24T22:42:18.660913Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb3bbdb859891e6bc27fd1afb3a07319f82c2ee4'}
Linux
GSD-2022-1000343
eeprom: ee1004: limit i2c reads to I2C_SMBUS_BLOCK_MAX
eeprom: ee1004: limit i2c reads to I2C_SMBUS_BLOCK_MAX This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.180 by commit 3937c35493ee2847aaefcfa5460e94b7443eef49, it was introduced in version v5.4.174 by commit aca56c298e2a6d20ab6308e203a8d37f2a7759d3. For more details please see the references link.
null
2022-03-07T01:49:58.585311Z
2022-02-27T02:53:42.835334Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/aca56c298e2a6d20ab6308e203a8d37f2a7759d3'}
Linux
GSD-2021-1001784
NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()
NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.288 by commit a67d47e32c91e2b10402cb8c081774cbf08edb2e, it was introduced in version v3.13 by commit 1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8. For more details please see the references link.
null
2021-12-19T23:52:49.795003Z
2021-10-28T13:48:42.961822Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8'}
Linux
GSD-2021-1000896
btrfs: promote debugging asserts to full-fledged checks in validate_super
btrfs: promote debugging asserts to full-fledged checks in validate_super This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.126 by commit 298499d73d2dd380adb1da4e0e94b36122eb1171. For more details please see the references link.
null
2021-12-19T22:33:32.636351Z
2021-06-30T00:05:06.531648Z
null
null
null
null
null
Linux
GSD-2022-1000713
iwlwifi: mvm: check debugfs_dir ptr before use
iwlwifi: mvm: check debugfs_dir ptr before use This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.13 by commit fe51975ff13831e794e1bcd0039b305dcad3d7ba, it was introduced in version v5.12 by commit 8c082a99edb997d7999eb7cdb648e47a2bf4a638. For more details please see the references link.
null
2022-03-18T02:55:11.735153Z
2022-03-18T00:11:45.461117Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c082a99edb997d7999eb7cdb648e47a2bf4a638'}
Linux
GSD-2022-1001801
fs: fix fd table size alignment properly
fs: fix fd table size alignment properly This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit c331c9d1d2b7a5ce875f8f1ac53e3987f73ecc75, it was introduced in version v5.15.33 by commit 136736abcd35f51a4be76e6cb1a1c3544a4580fa. For more details please see the references link.
null
2022-04-24T21:43:01.822402Z
2022-04-24T21:43:01.822402Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/136736abcd35f51a4be76e6cb1a1c3544a4580fa'}
Linux
GSD-2021-1002002
drm/msm: Fix null pointer dereference on pointer edp
drm/msm: Fix null pointer dereference on pointer edp This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.155 by commit f302be08e3de94db8863a0b2958b2bb3e8e998e6, it was introduced in version v4.0 by commit ab5b0107ccf3821a6837b0f2819270d6fa0b278f. For more details please see the references link.
null
2021-12-19T22:46:10.537904Z
2021-11-14T15:15:22.065407Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab5b0107ccf3821a6837b0f2819270d6fa0b278f'}
Linux
GSD-2022-1001552
ath9k_htc: fix uninit value bugs
ath9k_htc: fix uninit value bugs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 7da6169b6ebb75816b57be3beb829afa74f3b4b6, it was introduced in version v2.6.35 by commit fb9987d0f748c983bb795a86f47522313f701a08. For more details please see the references link.
null
2022-04-25T06:49:45.351020Z
2022-04-24T21:22:53.223314Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb9987d0f748c983bb795a86f47522313f701a08'}
Linux
GSD-2021-1002452
serial: core: fix transmit-buffer reset and memleak
serial: core: fix transmit-buffer reset and memleak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.164 by commit c5da8aa441053958594f94254592bb41264bdfbf, it was introduced in version v4.9 by commit 761ed4a94582ab291aa24dcbea4e01e8936488c8. For more details please see the references link.
null
2021-12-20T00:27:44.971665Z
2021-12-19T19:37:58.845400Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/761ed4a94582ab291aa24dcbea4e01e8936488c8'}
Linux
GSD-2021-1000195
nbd: Fix NULL pointer in flush_workqueue
nbd: Fix NULL pointer in flush_workqueue This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit 54b78ba7e96e5fe1edb8054e375d31a6c0dc60dc, it was introduced in version v5.4 by commit e9e006f5fcf2bab59149cb38a48a4817c1b538b4. For more details please see the references link.
null
2021-12-20T01:03:43.240522Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e9e006f5fcf2bab59149cb38a48a4817c1b538b4'}
Linux
GSD-2022-1001102
io_uring: bump poll refs to full 31-bits
io_uring: bump poll refs to full 31-bits This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit f3d218c450e5bbc96a107a9882b9450c9421f55a, it was introduced in version v5.17 by commit aa43477b040251f451db0d844073ac00a8ab66ee. For more details please see the references link.
null
2022-04-25T03:49:48.551467Z
2022-04-24T20:45:28.416660Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/aa43477b040251f451db0d844073ac00a8ab66ee'}
Linux
GSD-2022-1001175
pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe
pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 62580a40c9bef3d8a90629c64dda381344b35ffd, it was introduced in version v3.9 by commit 32e67eee670e1254ee5ab41e2f454680acb9c17c. For more details please see the references link.
null
2022-04-25T05:08:34.111422Z
2022-04-24T20:50:48.584169Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/32e67eee670e1254ee5ab41e2f454680acb9c17c'}
Linux
GSD-2021-1002425
nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done
nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.221 by commit 3b861a40325eac9c4c13b6c53874ad90617e944d, it was introduced in version v3.12 by commit ac22ac466a659f1b2e02a2e2ee23fc5c42da2c95. For more details please see the references link.
null
2021-12-20T00:49:52.754047Z
2021-12-19T19:36:46.879964Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac22ac466a659f1b2e02a2e2ee23fc5c42da2c95'}
Linux
GSD-2021-1000418
RDMA/siw: Fix a use after free in siw_alloc_mr
RDMA/siw: Fix a use after free in siw_alloc_mr This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.119 by commit 30b9e92d0b5e5d5dc1101ab856c17009537cbca4, it was introduced in version v5.3 by commit 2251334dcac9eb337575d8767e2a6a7e81848f7f. For more details please see the references link.
null
2021-12-20T00:25:27.987826Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2251334dcac9eb337575d8767e2a6a7e81848f7f'}
Linux
GSD-2022-1001525
MIPS: pgalloc: fix memory leak caused by pgd_free()
MIPS: pgalloc: fix memory leak caused by pgd_free() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 5a8501d34b261906e4c76ec9da679f2cb4d309ed, it was introduced in version v5.9 by commit f9cb654cb550b7b87e8608b14fc3eca432429ffe. For more details please see the references link.
null
2022-04-25T06:29:12.039841Z
2022-04-24T21:20:02.860453Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f9cb654cb550b7b87e8608b14fc3eca432429ffe'}
Linux
GSD-2021-1002075
comedi: ni_usb6501: fix NULL-deref in command paths
comedi: ni_usb6501: fix NULL-deref in command paths This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.79 by commit ef143dc0c3defe56730ecd3a9de7b3e1d7e557c1, it was introduced in version v3.18 by commit a03bb00e50ab4c07107da58a52a0bff7943f360c. For more details please see the references link.
null
2021-12-19T22:34:52.156367Z
2021-11-14T15:18:43.792004Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a03bb00e50ab4c07107da58a52a0bff7943f360c'}