ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2022-1001266
media: ti-vpe: cal: Fix a NULL pointer dereference in cal_ctx_v4l2_init_formats()
media: ti-vpe: cal: Fix a NULL pointer dereference in cal_ctx_v4l2_init_formats() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 1381f1a629a090c251965edb56f849ad648414a4, it was introduced in version v5.12 by commit 7168155002cf7aadbfaa14a28f037c880a214764. For more details please see the references link.
null
2022-04-25T05:59:02.330287Z
2022-04-24T20:59:31.739690Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7168155002cf7aadbfaa14a28f037c880a214764'}
Linux
GSD-2021-1002736
tee: amdtee: fix an IS_ERR() vs NULL bug
tee: amdtee: fix an IS_ERR() vs NULL bug This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit 832f3655c6138c23576ed268e31cc76e0f05f2b1, it was introduced in version v5.6 by commit 757cc3e9ff1d72d014096399d6e2bf03974d9da1. For more details please see the references link.
null
2022-01-11T05:58:35.281505Z
2021-12-27T05:45:37.895598Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/757cc3e9ff1d72d014096399d6e2bf03974d9da1'}
Linux
GSD-2021-1001819
powerpc/idle: Don't corrupt back chain when going idle
powerpc/idle: Don't corrupt back chain when going idle This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.156 by commit 8e25a62e8dab7bb09da337354ed1be5df61f83a0, it was introduced in version v5.4.156 by commit 80bbb0bc3a0288442f7fe6fc514f4ee1cb06ccb7. For more details please see the references link.
null
2021-10-28T13:50:34.905869Z
2021-10-28T13:50:34.905869Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80bbb0bc3a0288442f7fe6fc514f4ee1cb06ccb7'}
Linux
GSD-2022-1000027
sctp: use call_rcu to free endpoint
sctp: use call_rcu to free endpoint This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.224 by commit af6e6e58f7ebf86b4e7201694b1e4f3a62cbc3ec, it was introduced in version v4.14 by commit d25adbeb0cdb860fb39e09cdd025e9cfc954c5ab. For more details please see the references link.
null
2022-01-11T05:56:45.862683Z
2022-01-10T19:50:45.281441Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d25adbeb0cdb860fb39e09cdd025e9cfc954c5ab'}
Linux
GSD-2022-1000477
HID: elo: fix memory leak in elo_probe
HID: elo: fix memory leak in elo_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit de0d102d0c8c681fc9a3263d842fb35f7cf662f4, it was introduced in version v5.15 by commit fbf42729d0e91332e8ce75a1ecce08b8a2dab9c1. For more details please see the references link.
null
2022-03-07T01:49:04.466729Z
2022-02-27T03:12:28.608448Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fbf42729d0e91332e8ce75a1ecce08b8a2dab9c1'}
Linux
GSD-2022-1000498
riscv: eliminate unreliable __builtin_frame_address(1)
riscv: eliminate unreliable __builtin_frame_address(1) This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 7324a299fa544bdce6bced422a0923dbed513266, it was introduced in version v5.13 by commit eac2f3059e02382d91f8c887462083841d6ea2a3. For more details please see the references link.
null
2022-03-07T01:31:04.702903Z
2022-02-27T03:15:29.989478Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/eac2f3059e02382d91f8c887462083841d6ea2a3'}
Linux
GSD-2022-1000162
ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback
ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.177 by commit f2a186a44e7e066d3418f80b2627f02677853b13, it was introduced in version v5.4.82 by commit beead010654d0e0432166fccec290e10273b8c46. For more details please see the references link.
null
2022-02-20T06:43:54.329585Z
2022-02-18T21:48:56.885239Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/beead010654d0e0432166fccec290e10273b8c46'}
Linux
GSD-2022-1000532
mm: don't try to NUMA-migrate COW pages that have other uses
mm: don't try to NUMA-migrate COW pages that have other uses This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit d187eeb02d18446e5e54ed6bcbf8b47e6551daea, it was introduced in version v5.9 by commit 09854ba94c6aad7886996bfbee2530b3d8a7f4f4. For more details please see the references link.
null
2022-03-07T01:33:51.815841Z
2022-02-27T03:20:09.804637Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/09854ba94c6aad7886996bfbee2530b3d8a7f4f4'}
Linux
GSD-2021-1002223
usb: musb: tusb6010: check return value after calling platform_get_resource()
usb: musb: tusb6010: check return value after calling platform_get_resource() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.293 by commit 1ba7605856e05fa991d4654ac69e5ace66c767b9. For more details please see the references link.
null
2021-12-20T00:35:11.516175Z
2021-11-29T02:34:08.260314Z
null
null
null
null
null
Linux
GSD-2022-1001289
ext4: fix fs corruption when tring to remove a non-empty directory with IO error
ext4: fix fs corruption when tring to remove a non-empty directory with IO error This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 988fbad2ee18c01c23cec5f66200387303246030. For more details please see the references link.
null
2022-04-25T04:17:03.085829Z
2022-04-24T21:01:34.894803Z
null
null
null
null
null
Linux
GSD-2022-1001773
drm/i915: Treat SAGV block time 0 as SAGV disabled
drm/i915: Treat SAGV block time 0 as SAGV disabled This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 102cba6d5ae2378a8467504c71ac1008658f36c6. For more details please see the references link.
null
2022-04-25T03:45:17.222423Z
2022-04-24T21:41:34.949043Z
null
null
null
null
null
Linux
GSD-2022-1000861
gso: do not skip outer ip header in case of ipip and net_failover
gso: do not skip outer ip header in case of ipip and net_failover This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.103 by commit dac2490d9ee0b89dffc72f1172b8bbeb60eaec39, it was introduced in version v3.13 by commit cb32f511a70be8967ac9025cf49c44324ced9a39. For more details please see the references link.
null
2022-03-18T02:56:12.831477Z
2022-03-18T00:25:37.009996Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cb32f511a70be8967ac9025cf49c44324ced9a39'}
Linux
GSD-2021-1002673
dm btree remove: fix use after free in rebalance_children()
dm btree remove: fix use after free in rebalance_children() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.168 by commit 501ecd90efdc9b2edc6c28852ecd098a4adf8f00. For more details please see the references link.
null
2022-01-11T05:48:40.204890Z
2021-12-27T05:36:07.988552Z
null
null
null
null
null
Linux
GSD-2022-1001323
tpm: use try_get_ops() in tpm-space.c
tpm: use try_get_ops() in tpm-space.c This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.1 by commit ba84f9a48366dcc3cdef978599433efe101dd5bd. For more details please see the references link.
null
2022-04-25T05:13:48.377289Z
2022-04-24T21:04:33.184956Z
null
null
null
null
null
Linux
GSD-2021-1002389
scsi: mpt3sas: Fix kernel panic during drive powercycle test
scsi: mpt3sas: Fix kernel panic during drive powercycle test This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.257 by commit dd035ca0e7a142870a970d46b1d19276cfe2bc8c, it was introduced in version v3.8 by commit f92363d12359498f9a9960511de1a550f0ec41c2. For more details please see the references link.
null
2021-12-20T01:38:43.543339Z
2021-12-19T19:35:12.365841Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f92363d12359498f9a9960511de1a550f0ec41c2'}
Linux
GSD-2021-1000121
ACPI: custom_method: fix potential use-after-free issue
ACPI: custom_method: fix potential use-after-free issue This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.20 by commit f16737caf41fc06cfe6e49048becb09657074d4b, it was introduced in version v5.4 by commit 03d1571d9513369c17e6848476763ebbd10ec2cb. For more details please see the references link.
null
2021-12-19T22:53:20.577401Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/03d1571d9513369c17e6848476763ebbd10ec2cb'}
Linux
GSD-2021-1000571
can: isotp: prevent race between isotp_bind() and isotp_setsockopt()
can: isotp: prevent race between isotp_bind() and isotp_setsockopt() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit b190618d8337b9466d985854e417dc0e8b012e3c, it was introduced in version v5.11 by commit 921ca574cd382142add8b12d0a7117f495510de5. For more details please see the references link.
null
2021-12-20T00:22:32.681608Z
2021-06-04T19:40:49.506891Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/921ca574cd382142add8b12d0a7117f495510de5'}
Linux
GSD-2022-1002260
ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction
ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 7025f40690a235a118c87674cfb93072694aa66d, it was introduced in version v3.16 by commit 00a7bb81c20f3e81711e28e0f6c08cee8fd18514. For more details please see the references link.
null
2022-04-25T04:55:39.764161Z
2022-04-24T22:27:37.436981Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/00a7bb81c20f3e81711e28e0f6c08cee8fd18514'}
Linux
GSD-2021-1001730
KVM: x86: Fix stack-out-of-bounds memory access from ioapic_write_indirect()
KVM: x86: Fix stack-out-of-bounds memory access from ioapic_write_indirect() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit 99a9e9b80f19fc63be005a33d76211dd23114792, it was introduced in version v5.5 by commit 7ee30bc132c683d06a6d9e360e39e483e3990708. For more details please see the references link.
null
2021-12-20T00:35:47.274608Z
2021-10-19T16:33:52.221616Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ee30bc132c683d06a6d9e360e39e483e3990708'}
Linux
GSD-2021-1000822
xen-netback: take a reference to the RX task thread
xen-netback: take a reference to the RX task thread This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.10 by commit caec9bcaeb1a5f03f2d406305355c853af10c13e, it was introduced in version v5.5 by commit 2ac061ce97f413bfbbdd768f7d2e0fda2e8170df. For more details please see the references link.
null
2021-12-20T01:05:31.468302Z
2021-06-25T00:09:34.066515Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2ac061ce97f413bfbbdd768f7d2e0fda2e8170df'}
Linux
GSD-2021-1000988
net: ipv4: fix memory leak in ip_mc_add1_src
net: ipv4: fix memory leak in ip_mc_add1_src This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit ac31cc837cafb57a271babad8ccffbf733caa076, it was introduced in version v4.9 by commit 24803f38a5c0b6c57ed800b47e695f9ce474bc3a. For more details please see the references link.
null
2021-12-19T23:55:13.509900Z
2021-06-30T00:31:37.302387Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/24803f38a5c0b6c57ed800b47e695f9ce474bc3a'}
Linux
GSD-2021-1001360
powerpc/mm: Fix lockup on kernel exec fault
powerpc/mm: Fix lockup on kernel exec fault This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.133 by commit a82471a14aad90f79d1608d2bcbb019f0ffb53f0, it was introduced in version v4.14 by commit d3ca587404b36943b02df87406054ce73cc49500. For more details please see the references link.
null
2021-12-19T22:59:39.105700Z
2021-08-03T02:18:13.478580Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d3ca587404b36943b02df87406054ce73cc49500'}
Linux
GSD-2021-1001675
mcb: fix error handling in mcb_alloc_bus()
mcb: fix error handling in mcb_alloc_bus() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.70 by commit 91e4ad05bf18322b5921d1a6c9b603f6eb1694f0, it was introduced in version v4.7 by commit 5d9e2ab9fea4cdf0a2522f5cbed2e7fbb220d757. For more details please see the references link.
null
2021-12-19T22:51:56.398696Z
2021-10-19T16:31:17.084943Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5d9e2ab9fea4cdf0a2522f5cbed2e7fbb220d757'}
Linux
GSD-2021-1000967
scsi: core: Fix error handling of scsi_host_alloc()
scsi: core: Fix error handling of scsi_host_alloc() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.44 by commit 7a696ce1d5d16a33a6cd6400bbcc0339b2460e11. For more details please see the references link.
null
2021-12-19T22:33:31.937511Z
2021-06-30T00:29:50.123524Z
null
null
null
null
null
Linux
GSD-2022-1000318
net: fix a memleak when uncloning an skb dst and its metadata
net: fix a memleak when uncloning an skb dst and its metadata This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.230 by commit 0be943916d781df2b652793bb2d3ae4f9624c10a, it was introduced in version v4.3 by commit fc4099f17240767554ff3a73977acb78ef615404. For more details please see the references link.
null
2022-03-07T01:37:48.299698Z
2022-02-27T02:50:11.620841Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fc4099f17240767554ff3a73977acb78ef615404'}
Linux
GSD-2022-1002325
ACPI: CPPC: Avoid out of bounds access when parsing _CPC data
ACPI: CPPC: Avoid out of bounds access when parsing _CPC data This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 28d5387c1994f5e1e0d41b30a1f3dd6e1f609252, it was introduced in version v4.4 by commit 337aadff8e4567e39669e07d9a88b789d78458b5. For more details please see the references link.
null
2022-04-25T03:04:28.744185Z
2022-04-24T22:34:33.643740Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/337aadff8e4567e39669e07d9a88b789d78458b5'}
Linux
GSD-2021-1001225
powerpc/mm: Fix lockup on kernel exec fault
powerpc/mm: Fix lockup on kernel exec fault This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.3 by commit 8a96ec5ebf96ad8e2ba7b1b34103a0be5140fc70, it was introduced in version v4.14 by commit d3ca587404b36943b02df87406054ce73cc49500. For more details please see the references link.
null
2021-12-20T01:32:25.776364Z
2021-08-03T01:41:18.759716Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d3ca587404b36943b02df87406054ce73cc49500'}
Linux
GSD-2022-1000748
bpf: Fix crash due to incorrect copy_map_value
bpf: Fix crash due to incorrect copy_map_value This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.12 by commit eca9bd215d2233de79d930fa97aefbce03247a98, it was introduced in version v5.15 by commit 68134668c17f31f51930478f75495b552a411550. For more details please see the references link.
null
2022-03-18T03:33:11.121624Z
2022-03-18T00:15:09.964474Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/68134668c17f31f51930478f75495b552a411550'}
Linux
GSD-2021-1002059
cfg80211: fix management registrations locking
cfg80211: fix management registrations locking This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.77 by commit 4c22227e39c7a0b4dab55617ee8d34d171fab8d4, it was introduced in version v5.8 by commit 6cd536fe62ef58d7c4eac2da07ab0ed7fd19010d. For more details please see the references link.
null
2021-12-19T23:46:06.266604Z
2021-11-14T15:17:56.984696Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6cd536fe62ef58d7c4eac2da07ab0ed7fd19010d'}
Linux
GSD-2021-1000064
sfc: adjust efx->xdp_tx_queue_count with the real number of initialized queues
sfc: adjust efx->xdp_tx_queue_count with the real number of initialized queues This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.3 by commit ebeac958b690123a0b40aa61f688f2f170035fad, it was introduced in version v5.12 by commit e26ca4b535820b1445dcef3c0f82b3fb5b45108b. For more details please see the references link.
null
2021-12-19T22:49:22.986895Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e26ca4b535820b1445dcef3c0f82b3fb5b45108b'}
Linux
GSD-2022-1001509
net: dsa: fix panic on shutdown if multi-chip tree failed to probe
net: dsa: fix panic on shutdown if multi-chip tree failed to probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit b6e668ff43ebd87ccc8a19e5481345c428672295, it was introduced in version v5.15 by commit 0650bf52b31ff35dc6430fc2e37969c36baba724. For more details please see the references link.
null
2022-04-25T03:00:22.070545Z
2022-04-24T21:18:37.121698Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0650bf52b31ff35dc6430fc2e37969c36baba724'}
Linux
GSD-2021-1002409
proc/vmcore: fix clearing user buffer by properly using clear_user()
proc/vmcore: fix clearing user buffer by properly using clear_user() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.219 by commit 9ef384ed300d1bcfb23d0ab0b487d544444d4b52, it was introduced in version v3.0 by commit 997c136f518c5debd63847e78e2a8694f56dcf90. For more details please see the references link.
null
2021-12-20T00:37:34.026804Z
2021-12-19T19:36:01.845863Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/997c136f518c5debd63847e78e2a8694f56dcf90'}
Linux
GSD-2021-1000434
soundwire: stream: fix memory leak in stream config error path
soundwire: stream: fix memory leak in stream config error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.119 by commit 870533403ffa28ff63e173045fc5369365642002, it was introduced in version v4.18 by commit 89e590535f32d4bc548bcf266f3b046e50942f6d. For more details please see the references link.
null
2021-12-20T00:02:55.888866Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/89e590535f32d4bc548bcf266f3b046e50942f6d'}
Linux
GSD-2022-1001159
hwrng: cavium - fix NULL but dereferenced coccicheck error
hwrng: cavium - fix NULL but dereferenced coccicheck error This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit e47b12f9415169eceda6770fcf45802e0c8d2a66. For more details please see the references link.
null
2022-04-25T05:27:24.122852Z
2022-04-24T20:49:29.667098Z
null
null
null
null
null
Linux
GSD-2022-1000461
ipv6: fix data-race in fib6_info_hw_flags_set / fib6_purge_rt
ipv6: fix data-race in fib6_info_hw_flags_set / fib6_purge_rt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit 9ed25183e6d47a71f5385dbc52419c473646c768, it was introduced in version v5.12 by commit 0c5fcf9e249ee1d94cf872c99baf9cba7ff9ce27. For more details please see the references link.
null
2022-03-07T01:52:18.815218Z
2022-02-27T03:10:39.646353Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0c5fcf9e249ee1d94cf872c99baf9cba7ff9ce27'}
Linux
GSD-2022-1000031
sctp: use call_rcu to free endpoint
sctp: use call_rcu to free endpoint This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.170 by commit 831de271452b87657fcf8d715ee20519b79caef5, it was introduced in version v4.14 by commit d25adbeb0cdb860fb39e09cdd025e9cfc954c5ab. For more details please see the references link.
null
2022-01-11T05:53:33.342984Z
2022-01-10T19:50:55.523105Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d25adbeb0cdb860fb39e09cdd025e9cfc954c5ab'}
Linux
GSD-2022-1000898
net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe()
net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.233 by commit b838add93e1dd98210482dc433768daaf752bdef, it was introduced in version v3.18 by commit 8c14f9c70327a6fb75534c4c61d7ea9c82ccf78f. For more details please see the references link.
null
2022-03-18T02:55:08.642869Z
2022-03-18T00:29:27.597920Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c14f9c70327a6fb75534c4c61d7ea9c82ccf78f'}
Linux
GSD-2021-1002720
RDMA/mlx5: Fix releasing unallocated memory in dereg MR flow
RDMA/mlx5: Fix releasing unallocated memory in dereg MR flow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.10 by commit e3bc4d4b50cae7db08e50dbe43f771c906e97701, it was introduced in version v5.13 by commit f18ec422311767738ef4033b61e91cae07163b22. For more details please see the references link.
null
2022-01-11T05:58:22.282814Z
2021-12-27T05:38:55.476686Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f18ec422311767738ef4033b61e91cae07163b22'}
Linux
GSD-2022-1001270
ASoC: xilinx: xlnx_formatter_pcm: Handle sysclk setting
ASoC: xilinx: xlnx_formatter_pcm: Handle sysclk setting This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 2091de10a1ffc3b76a527e90d5399d15fca0a8ce, it was introduced in version v5.1 by commit 6f6c3c36f0917be24587eeba818ab4fdfcb5465a. For more details please see the references link.
null
2022-04-25T03:36:55.121080Z
2022-04-24T21:00:01.565943Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6f6c3c36f0917be24587eeba818ab4fdfcb5465a'}
Linux
GSD-2021-1002370
proc/vmcore: fix clearing user buffer by properly using clear_user()
proc/vmcore: fix clearing user buffer by properly using clear_user() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.292 by commit 33a7d698f30fa0b99d50569e9909d3baa65d8f6a, it was introduced in version v3.0 by commit 997c136f518c5debd63847e78e2a8694f56dcf90. For more details please see the references link.
null
2021-12-20T01:20:53.141456Z
2021-12-19T19:34:19.147791Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/997c136f518c5debd63847e78e2a8694f56dcf90'}
Linux
GSD-2022-1000932
openvswitch: Fix setting ipv6 fields causing hw csum failure
openvswitch: Fix setting ipv6 fields causing hw csum failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.269 by commit 2158b384c60f13bc1cf38d703f835c4e33896714, it was introduced in version v3.8 by commit 3fdbd1ce11e5c0d7cafbe44c942c5cad61113d7b. For more details please see the references link.
null
2022-03-18T03:35:37.078432Z
2022-03-18T00:33:51.516491Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3fdbd1ce11e5c0d7cafbe44c942c5cad61113d7b'}
Linux
GSD-2022-1001620
remoteproc: Fix count check in rproc_coredump_write()
remoteproc: Fix count check in rproc_coredump_write() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit a8c3e53517985d69040a1b36a269e85f99cf0cea, it was introduced in version v5.9 by commit 3afdc59e4390487f04f2435b7e8a6289984e0a1e. For more details please see the references link.
null
2022-04-25T03:36:29.023113Z
2022-04-24T21:29:23.750132Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3afdc59e4390487f04f2435b7e8a6289984e0a1e'}
Linux
GSD-2022-1001335
powerpc: Fix virt_addr_valid() for 64-bit Book3E & 32-bit
powerpc: Fix virt_addr_valid() for 64-bit Book3E & 32-bit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit a3727c25eacd7e437c4f560957fa3a376fe93e6b. For more details please see the references link.
null
2022-04-25T07:37:44.726883Z
2022-04-24T21:05:29.663664Z
null
null
null
null
null
Linux
GSD-2021-1000658
Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails
Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.193 by commit f8be26b9950710fe50fb45358df5bd01ad18efb7, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T00:23:44.121510Z
2021-06-04T19:56:26.271333Z
null
null
null
null
null
Linux
GSD-2021-1002665
firmware: arm_scpi: Fix string overflow in SCPI genpd driver
firmware: arm_scpi: Fix string overflow in SCPI genpd driver This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.168 by commit 802a1a8501563714a5fe8824f4ed27fec04a0719, it was introduced in version v4.8 by commit 8bec4337ad4023b26de35d3b0c3a3b2735ffc5c7. For more details please see the references link.
null
2022-01-11T05:46:52.987220Z
2021-12-27T05:35:11.521540Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8bec4337ad4023b26de35d3b0c3a3b2735ffc5c7'}
Linux
GSD-2022-1000877
xen/netfront: destroy queues before real_num_tx_queues is zeroed
xen/netfront: destroy queues before real_num_tx_queues is zeroed This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.183 by commit b40c912624775a21da32d1105e158db5f6d0554a, it was introduced in version v5.4.174 by commit a5d8e6189b134f5db61be5cd59cf5a74bb01edc7. For more details please see the references link.
null
2022-03-18T02:56:10.071474Z
2022-03-18T00:27:03.612766Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a5d8e6189b134f5db61be5cd59cf5a74bb01edc7'}
Linux
GSD-2022-1001765
KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast()
KVM: x86: Avoid theoretical NULL pointer dereference in kvm_irq_delivery_to_apic_fast() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 0e5dbc0540baa89faf4c04ccc7e9c4fe6b1d7bf4. For more details please see the references link.
null
2022-04-25T06:35:56.219901Z
2022-04-24T21:41:03.709557Z
null
null
null
null
null
Linux
GSD-2021-1000208
can: mcp251x: fix resume from sleep before interface was brought up
can: mcp251x: fix resume from sleep before interface was brought up This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit e1e10a390fd9479209c4d834d916ca5e6d5d396b, it was introduced in version v5.5 by commit 8ce8c0abcba314e1fe954a1840f6568bf5aef2ef. For more details please see the references link.
null
2021-12-20T00:21:47.484894Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ce8c0abcba314e1fe954a1840f6568bf5aef2ef'}
Linux
GSD-2021-1002235
btrfs: fix memory ordering between normal and ordered work functions
btrfs: fix memory ordering between normal and ordered work functions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.256 by commit 804a9d239ae9cbe88e861a7cd62319cc6ec7b136, it was introduced in version v3.15 by commit 08a9ff3264181986d1d692a4e6fce3669700c9f8. For more details please see the references link.
null
2021-12-19T22:22:50.526366Z
2021-11-29T02:34:36.666602Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/08a9ff3264181986d1d692a4e6fce3669700c9f8'}
Linux
GSD-2022-1000524
vt_ioctl: fix array_index_nospec in vt_setactivate
vt_ioctl: fix array_index_nospec in vt_setactivate This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 6550bdf52846f85a2a3726a5aa0c7c4399f2fc02. For more details please see the references link.
null
2022-03-07T02:18:30.745386Z
2022-02-27T03:19:15.333877Z
null
null
null
null
null
Linux
GSD-2021-1001049
drm/tegra: sor: Do not leak runtime PM reference
drm/tegra: sor: Do not leak runtime PM reference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.12 by commit 6fc59edf0471eacba5769a83683f3f13834d1166. For more details please see the references link.
null
2021-12-19T22:51:13.130627Z
2021-06-30T00:36:17.303035Z
null
null
null
null
null
Linux
GSD-2022-1002149
mac80211: fix potential double free on mesh join
mac80211: fix potential double free on mesh join This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.109 by commit 5d3ff9542a40ce034416bca03864709540a36016, it was introduced in version v5.8 by commit 6a01afcf8468d3ca2bd8bbb27503f60dcf643b20. For more details please see the references link.
null
2022-04-25T05:41:14.307645Z
2022-04-24T22:16:15.551773Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6a01afcf8468d3ca2bd8bbb27503f60dcf643b20'}
Linux
GSD-2022-1000174
net: ieee802154: ca8210: Stop leaking skb's
net: ieee802154: ca8210: Stop leaking skb's This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.178 by commit 6f38d3a6ec11c2733b1c641a46a2a2ecec57be08, it was introduced in version v4.12 by commit ded845a781a578dfb0b5b2c138e5a067aa3b1242. For more details please see the references link.
null
2022-02-19T03:04:45.807291Z
2022-02-18T21:51:03.907528Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ded845a781a578dfb0b5b2c138e5a067aa3b1242'}
Linux
GSD-2021-1001419
nfs: fix acl memory leak of posix_acl_create()
nfs: fix acl memory leak of posix_acl_create() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.240 by commit 8a2b308a54c5ec224fedc753617f99b29ffcd883, it was introduced in version v3.14 by commit 013cdf1088d7235da9477a2375654921d9b9ba9f. For more details please see the references link.
null
2021-12-20T01:03:43.083581Z
2021-08-03T02:35:28.883500Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/013cdf1088d7235da9477a2375654921d9b9ba9f'}
Linux
GSD-2021-1001337
iommu/arm-smmu: Fix arm_smmu_device refcount leak in address translation
iommu/arm-smmu: Fix arm_smmu_device refcount leak in address translation This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.134 by commit b11220803ad14a2a880cc06d8e01fe2548cc85b0. For more details please see the references link.
null
2021-12-20T00:59:48.018965Z
2021-08-03T02:12:10.704324Z
null
null
null
null
null
Linux
GSD-2022-1001948
ipv6: fix panic when forwarding a pkt with no in6 dev
ipv6: fix panic when forwarding a pkt with no in6 dev This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.112 by commit a263712ba8c9ded25dd9d2d5ced11bcea5b33a3e, it was introduced in version v5.10.54 by commit 79ec7b5b2f4fe38e5c7459ed0bdff4ef3386ab63. For more details please see the references link.
null
2022-04-25T06:44:04.212255Z
2022-04-24T21:57:18.307849Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/79ec7b5b2f4fe38e5c7459ed0bdff4ef3386ab63'}
Linux
GSD-2021-1001767
staging: greybus: uart: fix tty use after free
staging: greybus: uart: fix tty use after free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.9 by commit 9872ff6fdce8b229f01993b611b5d1719cb70ff1, it was introduced in version v4.9 by commit a18e15175708d39abbe9746ddc3479466b7800c3. For more details please see the references link.
null
2021-12-19T23:57:36.492343Z
2021-10-19T16:35:44.659582Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a18e15175708d39abbe9746ddc3479466b7800c3'}
Linux
GSD-2021-1000875
ftrace: Do not blindly read the ip address in ftrace_bug()
ftrace: Do not blindly read the ip address in ftrace_bug() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.195 by commit 862dcc14f2803c556bdd73b43c27b023fafce2fb, it was introduced in version v2.6.28 by commit 05736a427f7e16be948ccbf39782bd3a6ae16b14. For more details please see the references link.
null
2021-12-20T00:50:56.605Z
2021-06-30T00:02:58.804843Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/05736a427f7e16be948ccbf39782bd3a6ae16b14'}
Linux
GSD-2022-1002237
Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt
Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 874eca93966a786eace87fa6dfb206c2dd9519b1, it was introduced in version v5.2 by commit 9aebfd4a2200ab8075e44379c758bccefdc589bb. For more details please see the references link.
null
2022-04-25T04:31:42.828266Z
2022-04-24T22:24:29.925389Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9aebfd4a2200ab8075e44379c758bccefdc589bb'}
Linux
GSD-2021-1000526
Bluetooth: SMP: Fail if remote and local public keys are identical
Bluetooth: SMP: Fail if remote and local public keys are identical This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.270 by commit 6555a006b21ab49090b9a7b36e92d0421db19328, it was introduced in version v3.17 by commit bfe01a5ba2490f299e1d2d5508cbbbadd897bbe9. For more details please see the references link.
null
2021-12-19T22:15:54.019670Z
2021-05-31T23:51:28.441301Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bfe01a5ba2490f299e1d2d5508cbbbadd897bbe9'}
Linux
GSD-2021-1000176
virtiofs: fix memory leak in virtio_fs_probe()
virtiofs: fix memory leak in virtio_fs_probe() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.118 by commit 310efc95c72c13faf855c692d19cd4d054d827c8, it was introduced in version v5.4 by commit a62a8ef9d97da23762a588592c8b8eb50a8deb6a. For more details please see the references link.
null
2021-12-20T00:13:15.890136Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a62a8ef9d97da23762a588592c8b8eb50a8deb6a'}
Linux
GSD-2021-1000199
usb: dwc3: gadget: Free gadget structure only after freeing endpoints
usb: dwc3: gadget: Free gadget structure only after freeing endpoints This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit b4b8e9601d7ee8806d2687f081a42485d27674a1, it was introduced in version v5.10 by commit e81a7018d93a7de31a3f121c9a7eecd0a5ec58b0. For more details please see the references link.
null
2021-12-20T01:02:36.697598Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e81a7018d93a7de31a3f121c9a7eecd0a5ec58b0'}
Linux
GSD-2021-1000463
regmap: set debugfs_name to NULL after it is freed
regmap: set debugfs_name to NULL after it is freed This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.191 by commit 2dc1554d5f0fdaf47cc5bea442b84b9226fea867, it was introduced in version v4.19.168 by commit 5b654b03007917f3f1015b2a5c288c1ea6ae8f65. For more details please see the references link.
null
2021-12-19T23:49:07.424599Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5b654b03007917f3f1015b2a5c288c1ea6ae8f65'}
Linux
GSD-2021-1000033
netfilter: nft_limit: avoid possible divide error in nft_limit_init
netfilter: nft_limit: avoid possible divide error in nft_limit_init This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.32 by commit dc1732baa9da5b68621586bf8636ebbc27dc62d2, it was introduced in version v4.13 by commit c26844eda9d4fdbd266660e3b3de2d0270e3a1ed. For more details please see the references link.
null
2021-12-20T01:06:15.688098Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c26844eda9d4fdbd266660e3b3de2d0270e3a1ed'}
Linux
GSD-2021-1001788
isdn: mISDN: Fix sleeping function called from invalid context
isdn: mISDN: Fix sleeping function called from invalid context This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.253 by commit 37e4f57b22cc5ebb3f80cf0f74fdeb487f082367. For more details please see the references link.
null
2021-12-20T00:01:04.988899Z
2021-10-28T13:48:53.815844Z
null
null
null
null
null
Linux
GSD-2021-1001272
x86/signal: Detect and prevent an alternate signal stack overflow
x86/signal: Detect and prevent an alternate signal stack overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.52 by commit 74569cb9ed7bc60e395927f55d3dc3be143a0164, it was introduced in version v3.15 by commit c2bc11f10a39527cd1bb252097b5525664560956. For more details please see the references link.
null
2021-12-20T00:15:58.068473Z
2021-08-03T01:54:41.100515Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c2bc11f10a39527cd1bb252097b5525664560956'}
Linux
GSD-2022-1002372
jffs2: fix memory leak in jffs2_scan_medium
jffs2: fix memory leak in jffs2_scan_medium This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit e711913463af916d777a4873068f415f1fe2ad33, it was introduced in version v2.6.15 by commit e631ddba588783edd521c5a89f7b2902772fb691. For more details please see the references link.
null
2022-04-25T05:56:01.300432Z
2022-04-24T22:40:08.780054Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e631ddba588783edd521c5a89f7b2902772fb691'}
Linux
GSD-2021-1001622
i2c: acpi: fix resource leak in reconfiguration device addition
i2c: acpi: fix resource leak in reconfiguration device addition This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.73 by commit f86de018fd7a24ee07372d55ffa7824f0c674a95, it was introduced in version v4.8 by commit 525e6fabeae286848592363bda13bc34b59bb5ac. For more details please see the references link.
null
2021-12-19T23:41:50.689776Z
2021-10-19T16:28:42.869123Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/525e6fabeae286848592363bda13bc34b59bb5ac'}
Linux
GSD-2021-1000930
PCI: aardvark: Fix kernel panic during PIO transfer
PCI: aardvark: Fix kernel panic during PIO transfer This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.128 by commit 4c90f90a91d75c3c73dd633827c90e8746d9f54d. For more details please see the references link.
null
2021-12-19T23:43:16.802971Z
2021-06-30T00:25:13.689149Z
null
null
null
null
null
Linux
GSD-2022-1000965
mm/secretmem: fix panic when growing a memfd_secret
mm/secretmem: fix panic when growing a memfd_secret This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.4 by commit 9d3b877daf805fed29be8f61aa3d0ea37df82c7b. For more details please see the references link.
null
2022-04-25T07:54:20.629644Z
2022-04-24T20:35:39.258406Z
null
null
null
null
null
Linux
GSD-2022-1001677
lz4: fix LZ4_decompress_safe_partial read out of bound
lz4: fix LZ4_decompress_safe_partial read out of bound This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 9fb8bc6cfc58773ce95414e11c9ccc8fc6ac4927. For more details please see the references link.
null
2022-04-25T04:30:29.898473Z
2022-04-24T21:34:10.665766Z
null
null
null
null
null
Linux
GSD-2021-1002327
perf bench futex: Fix memory leak of perf_cpu_map__new()
perf bench futex: Fix memory leak of perf_cpu_map__new() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit 99643bdc6ff1c75ccd2871368fbcd20e8231d77e, it was introduced in version v5.4 by commit 9c3516d1b850ea938b074df33e4c86d721c77720. For more details please see the references link.
null
2021-12-19T22:57:57.228455Z
2021-11-29T02:38:53.860390Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9c3516d1b850ea938b074df33e4c86d721c77720'}
Linux
GSD-2022-1001227
libbpf: Fix memleak in libbpf_netlink_recv()
libbpf: Fix memleak in libbpf_netlink_recv() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit c3d665699e872061bdcd014fb462188d66b94b57, it was introduced in version v5.17.2 by commit dc69beab5b7baa106d8a195d2c690f7970a81eb5. For more details please see the references link.
null
2022-04-24T20:55:51.425415Z
2022-04-24T20:55:51.425415Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/dc69beab5b7baa106d8a195d2c690f7970a81eb5'}
Linux
GSD-2021-1001858
net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path
net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.75 by commit 4f7bddf8c5c01cac74373443b13a68e1c6723a94, it was introduced in version v3.11 by commit e126ba97dba9edeb6fafa3665b5f8497fc9cdf8c. For more details please see the references link.
null
2021-12-19T22:11:11.575522Z
2021-10-28T13:52:31.317085Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e126ba97dba9edeb6fafa3665b5f8497fc9cdf8c'}
Linux
GSD-2021-1002777
hamradio: defer ax25 kfree after unregister_netdev
hamradio: defer ax25 kfree after unregister_netdev This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.295 by commit 8a1a314965a17c62084a056b4f2cb7a770854c90. For more details please see the references link.
null
2022-01-11T05:54:28.529143Z
2021-12-30T02:43:00.657866Z
null
null
null
null
null
Linux
GSD-2022-1000436
ice: Fix KASAN error in LAG NETDEV_UNREGISTER handler
ice: Fix KASAN error in LAG NETDEV_UNREGISTER handler This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit f9daedc3ab8f673e3a9374b91a89fbf1174df469, it was introduced in version v5.15 by commit 6a8b357278f5f8b9817147277ab8f12879dce8a8. For more details please see the references link.
null
2022-03-07T01:40:56.463016Z
2022-02-27T03:07:07.036643Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6a8b357278f5f8b9817147277ab8f12879dce8a8'}
Linux
GSD-2022-1000123
USB: core: Fix hang in usb_kill_urb by adding memory barriers
USB: core: Fix hang in usb_kill_urb by adding memory barriers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.228 by commit 5904dfd3ddaff3bf4a41c3baf0a8e8f31ed4599b. For more details please see the references link.
null
2022-02-19T12:04:44.492673Z
2022-02-18T21:43:41.411554Z
null
null
null
null
null
Linux
GSD-2022-1000089
ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx()
ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.300 by commit 9e5c40b5706d8aae2cf70bd7e01f0b4575a642d0. For more details please see the references link.
null
2022-02-19T05:00:40.673571Z
2022-02-18T21:33:58.163710Z
null
null
null
null
null
Linux
GSD-2022-1000573
btrfs: fix deadlock between quota disable and qgroup rescan worker
btrfs: fix deadlock between quota disable and qgroup rescan worker This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.22 by commit 89d4cca583fc9594ee7d1a0bc986886d6fb587e6. For more details please see the references link.
null
2022-03-07T02:34:17.876261Z
2022-02-27T03:25:29.662019Z
null
null
null
null
null
Linux
GSD-2021-1002262
scsi: core: sysfs: Fix hang when device state is set via sysfs
scsi: core: sysfs: Fix hang when device state is set via sysfs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.162 by commit edd783162bf2385b43de6764f2d4c6e9f4f6be27, it was introduced in version v5.4.143 by commit 69aa1a1a569f5c6d554b59352130ef363342ed4c. For more details please see the references link.
null
2021-12-19T23:20:34.696614Z
2021-11-29T02:35:55.836733Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69aa1a1a569f5c6d554b59352130ef363342ed4c'}
Linux
GSD-2021-1002798
hamradio: defer ax25 kfree after unregister_netdev
hamradio: defer ax25 kfree after unregister_netdev This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.169 by commit ef5f7bfa19e3fc366f4c6d1a841ceaddf7a9f5d4. For more details please see the references link.
null
2022-01-11T05:54:48.459587Z
2021-12-30T02:43:51.460894Z
null
null
null
null
null
Linux
GSD-2022-1000820
vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
vhost/vsock: don't check owner in vhost_vsock_stop() while releasing This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.26 by commit 960d474e451bcb5366859335f4f0de1a8f224c51, it was introduced in version v4.8 by commit 433fc58e6bf2c8bd97e57153ed28e64fd78207b8. For more details please see the references link.
null
2022-03-18T03:01:20.011178Z
2022-03-18T00:21:23.971340Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/433fc58e6bf2c8bd97e57153ed28e64fd78207b8'}
Linux
GSD-2022-1001732
mt76: dma: initialize skip_unmap in mt76_dma_rx_fill
mt76: dma: initialize skip_unmap in mt76_dma_rx_fill This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 55c93a89e31dcf2f99482be8dd28d99a3431dd9a. For more details please see the references link.
null
2022-04-25T06:04:24.789817Z
2022-04-24T21:38:11.493310Z
null
null
null
null
null
Linux
GSD-2022-1001698
x86/Kconfig: Do not allow CONFIG_X86_X32_ABI=y with llvm-objcopy
x86/Kconfig: Do not allow CONFIG_X86_X32_ABI=y with llvm-objcopy This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit c393a9f4cb3bce27ed98d6bc4ffb0bef72ccd698. For more details please see the references link.
null
2022-04-25T06:13:36.333496Z
2022-04-24T21:36:15.833823Z
null
null
null
null
null
Linux
GSD-2021-1002632
audit: improve robustness of the audit queue handling
audit: improve robustness of the audit queue handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.259 by commit 75fdb751f84727d614deea0571a1490c3225d83a, it was introduced in version v4.11 by commit 5b52330bbfe63b3305765354d6046c9f7f89c011. For more details please see the references link.
null
2022-01-11T05:53:18.432461Z
2021-12-27T05:28:07.523945Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5b52330bbfe63b3305765354d6046c9f7f89c011'}
Linux
GSD-2022-1001362
arch/arm64: Fix topology initialization for core scheduling
arch/arm64: Fix topology initialization for core scheduling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 790c1567582bda8f1153015436e3330a7c6eb278, it was introduced in version v5.14 by commit 9edeaea1bc452372718837ed2ba775811baf1ba1. For more details please see the references link.
null
2022-04-25T05:15:21.948865Z
2022-04-24T21:08:00.344037Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9edeaea1bc452372718837ed2ba775811baf1ba1'}
Linux
GSD-2022-1000964
perf/imx_ddr: Fix undefined behavior due to shift overflowing the constant
perf/imx_ddr: Fix undefined behavior due to shift overflowing the constant This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.4 by commit 98d05f6a811bfbc28a0b6c132eb6059a00e53ef4. For more details please see the references link.
null
2022-04-25T05:27:31.639455Z
2022-04-24T20:35:36.334951Z
null
null
null
null
null
Linux
GSD-2022-1001676
mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0)
mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0) This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit a04cb99c5d4668fe3f5c0e5b6da1cecd34c3f219. For more details please see the references link.
null
2022-04-25T06:48:21.511397Z
2022-04-24T21:34:07.812610Z
null
null
null
null
null
Linux
GSD-2021-1002326
net/ipa: ipa_resource: Fix wrong for loop range
net/ipa: ipa_resource: Fix wrong for loop range This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit f4d1328e6e304c81db81419d92b9d90b7b3cf9ab, it was introduced in version v5.13 by commit 4fd704b3608a4c89260ea33895a694bc5385e00f. For more details please see the references link.
null
2021-12-19T22:56:50.992965Z
2021-11-29T02:38:51.544533Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4fd704b3608a4c89260ea33895a694bc5385e00f'}
Linux
GSD-2022-1001226
drm/bridge: anx7625: Fix overflow issue on reading EDID
drm/bridge: anx7625: Fix overflow issue on reading EDID This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit db1c47d299298a7c52ccb201905d6be979fd7507, it was introduced in version v5.11 by commit 8bdfc5dae4e3ba4d99dfb430ef43249e5f1b7730. For more details please see the references link.
null
2022-04-25T07:37:10.445753Z
2022-04-24T20:55:48.342387Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8bdfc5dae4e3ba4d99dfb430ef43249e5f1b7730'}
Linux
GSD-2021-1001859
net: dsa: microchip: Added the condition for scheduling ksz_mib_read_work
net: dsa: microchip: Added the condition for scheduling ksz_mib_read_work This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.75 by commit f2e1de075018cf71bcd7d628e9f759cb8540b0c3, it was introduced in version v5.7 by commit 469b390e1ba330e888175e55d78573db2e9a8cb4. For more details please see the references link.
null
2021-12-20T00:01:43.795778Z
2021-10-28T13:52:41.250074Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/469b390e1ba330e888175e55d78573db2e9a8cb4'}
Linux
GSD-2021-1002776
IB/qib: Fix memory leak in qib_user_sdma_queue_pkts()
IB/qib: Fix memory leak in qib_user_sdma_queue_pkts() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.295 by commit 76b648063eb36c72dfc0a6896de8a0a7d2c7841c, it was introduced in version v4.9.290 by commit 3f57c3f67fd93b4da86aeffea1ca32c484d054ad. For more details please see the references link.
null
2022-01-11T05:57:40.109626Z
2021-12-30T02:42:58.189328Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f57c3f67fd93b4da86aeffea1ca32c484d054ad'}
Linux
GSD-2022-1000437
net: dsa: mv88e6xxx: fix use-after-free in mv88e6xxx_mdios_unregister
net: dsa: mv88e6xxx: fix use-after-free in mv88e6xxx_mdios_unregister This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit f916181692cb5da7050ec0efbf96c915d8ebbbbc, it was introduced in version v5.15.24 by commit 8b626d45127d6f5ada7d815b83cfdc09e8cb1394. For more details please see the references link.
null
2022-02-27T03:07:13.750534Z
2022-02-27T03:07:13.750534Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8b626d45127d6f5ada7d815b83cfdc09e8cb1394'}
Linux
GSD-2022-1000122
usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS
usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.228 by commit 2ad9bf965b1c85248ec4eefdf79df3e0f3a3c9a7, it was introduced in version v4.19.195 by commit 10770d2ac0094b053c8897d96d7b2737cd72f7c5. For more details please see the references link.
null
2022-02-19T10:28:12.696774Z
2022-02-18T21:43:34.780707Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/10770d2ac0094b053c8897d96d7b2737cd72f7c5'}
Linux
GSD-2022-1000088
ASoC: ops: Reject out of bounds values in snd_soc_put_volsw()
ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.300 by commit 40f598698129b5ceaf31012f9501b775c7b6e57d. For more details please see the references link.
null
2022-02-19T03:10:48.991955Z
2022-02-18T21:33:51.648160Z
null
null
null
null
null
Linux
GSD-2022-1000572
ALSA: hda: Fix UAF of leds class devs at unbinding
ALSA: hda: Fix UAF of leds class devs at unbinding This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.22 by commit 0e629052f013eeb61494d4df2f1f647c2a9aef47. For more details please see the references link.
null
2022-03-07T02:18:33.524775Z
2022-02-27T03:25:22.929022Z
null
null
null
null
null
Linux
GSD-2021-1002263
iavf: free q_vectors before queues in iavf_disable_vf
iavf: free q_vectors before queues in iavf_disable_vf This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.162 by commit 926e8c83d4c1c2dac0026637eb0d492df876489e, it was introduced in version v4.13 by commit 65c7006f234c9ede887d468f595f259a5c5cc552. For more details please see the references link.
null
2021-12-19T23:51:38.325237Z
2021-11-29T02:35:58.145105Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/65c7006f234c9ede887d468f595f259a5c5cc552'}
Linux
GSD-2022-1000821
mm/filemap: Fix handling of THPs in generic_file_buffered_read()
mm/filemap: Fix handling of THPs in generic_file_buffered_read() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.26 by commit f89903ae99bd02379e8b84d487ce302f122c4ef1, it was introduced in version v5.12 by commit cbd59c48ae2bcadc4a7599c29cf32fd3f9b78251. For more details please see the references link.
null
2022-03-18T02:55:13.781834Z
2022-03-18T00:21:27.697209Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cbd59c48ae2bcadc4a7599c29cf32fd3f9b78251'}
Linux
GSD-2022-1001733
mt76: mt7921: fix crash when startup fails.
mt76: mt7921: fix crash when startup fails. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 38fbe806645090c07aa97171f20fc62c3d7d3a98. For more details please see the references link.
null
2022-04-25T06:29:37.404156Z
2022-04-24T21:38:14.351868Z
null
null
null
null
null
Linux
GSD-2021-1002799
pinctrl: mediatek: fix global-out-of-bounds issue
pinctrl: mediatek: fix global-out-of-bounds issue This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.169 by commit f373298e1bf0c6ea097c0bcc558dc43ad53e421f. For more details please see the references link.
null
2022-01-11T06:43:32.266554Z
2021-12-30T02:43:53.743573Z
null
null
null
null
null