ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2021-1002633
net: netlink: af_netlink: Prevent empty skb by adding a check on len.
net: netlink: af_netlink: Prevent empty skb by adding a check on len. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.259 by commit 54e785f7d5c197bc06dbb8053700df7e2a093ced. For more details please see the references link.
null
2022-01-11T05:54:35.873697Z
2021-12-27T05:28:09.846515Z
null
null
null
null
null
Linux
GSD-2022-1001699
virtio_console: eliminate anonymous module_init & module_exit
virtio_console: eliminate anonymous module_init & module_exit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 44c2d5fbe7b2bd1f8cb114d608a591a73a5d4ae6. For more details please see the references link.
null
2022-04-25T04:54:22.476189Z
2022-04-24T21:36:18.660227Z
null
null
null
null
null
Linux
GSD-2022-1001363
skbuff: fix coalescing for page_pool fragment recycling
skbuff: fix coalescing for page_pool fragment recycling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit c4fa19615806a9a7e518c295b39175aa47a685ac, it was introduced in version v5.15 by commit 53e0961da1c7bbdabd1abebb20de403ec237ec09. For more details please see the references link.
null
2022-04-25T03:07:32.401718Z
2022-04-24T21:08:03.983658Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/53e0961da1c7bbdabd1abebb20de403ec237ec09'}
Linux
GSD-2021-1001336
tty: serial: 8250: serial_cs: Fix a memory leak in error handling path
tty: serial: 8250: serial_cs: Fix a memory leak in error handling path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.134 by commit ee16bed959862a6de2913f71a04cb563d7237b67. For more details please see the references link.
null
2021-12-20T02:12:34.815778Z
2021-08-03T02:12:06.876521Z
null
null
null
null
null
Linux
GSD-2022-1001949
perf/imx_ddr: Fix undefined behavior due to shift overflowing the constant
perf/imx_ddr: Fix undefined behavior due to shift overflowing the constant This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.112 by commit 000b3921b4d52399865ea398e5f6c999246437f4. For more details please see the references link.
null
2022-04-25T05:25:50.886578Z
2022-04-24T21:57:21.179970Z
null
null
null
null
null
Linux
GSD-2021-1001766
binder: make sure fd closes complete
binder: make sure fd closes complete This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.9 by commit b95483d8d94b41fa31a84c1d86710b7907a37621, it was introduced in version v5.0 by commit 80cd795630d6526ba729a089a435bf74a57af927. For more details please see the references link.
null
2021-12-19T22:53:37.747485Z
2021-10-19T16:35:42.098429Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80cd795630d6526ba729a089a435bf74a57af927'}
Linux
GSD-2021-1000874
kvm: avoid speculation-based attacks from out-of-range memslot accesses
kvm: avoid speculation-based attacks from out-of-range memslot accesses This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.195 by commit 22b87fb17a28d37331bb9c1110737627b17f6781. For more details please see the references link.
null
2021-12-20T01:34:33.310872Z
2021-06-30T00:02:54.948064Z
null
null
null
null
null
Linux
GSD-2022-1002236
ax25: Fix refcount leaks caused by ax25_cb_del()
ax25: Fix refcount leaks caused by ax25_cb_del() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.190 by commit 9e1e088a57c23251f1cfe9601bbd90ade2ea73b9, it was introduced in version v5.4.190 by commit 418993bbaafb0cd48f904ba68eeda052d624c821. For more details please see the references link.
null
2022-04-24T22:24:24.032088Z
2022-04-24T22:24:24.032088Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/418993bbaafb0cd48f904ba68eeda052d624c821'}
Linux
GSD-2021-1000527
Bluetooth: SMP: Fail if remote and local public keys are identical
Bluetooth: SMP: Fail if remote and local public keys are identical This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.270 by commit 75523bbfb0eaead670c97fbcf096ca2ab556f0c0, it was introduced in version v3.17 by commit bfe01a5ba2490f299e1d2d5508cbbbadd897bbe9. For more details please see the references link.
null
2021-12-19T22:10:58.839101Z
2021-05-31T23:51:50.600851Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bfe01a5ba2490f299e1d2d5508cbbbadd897bbe9'}
Linux
GSD-2021-1000177
openvswitch: fix stack OOB read while fragmenting IPv4 packets
openvswitch: fix stack OOB read while fragmenting IPv4 packets This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.118 by commit 490ad0a2390442d0a7b8c00972a83dbb09cab142, it was introduced in version v4.16 by commit d52e5a7e7ca49457dd31fc8b42fb7c0d58a31221. For more details please see the references link.
null
2021-12-19T22:00:09.559267Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d52e5a7e7ca49457dd31fc8b42fb7c0d58a31221'}
Linux
GSD-2021-1000198
kyber: fix out of bounds access when preempted
kyber: fix out of bounds access when preempted This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit 2ef3c76540c49167a0bc3d5f80d00fd1fc4586df, it was introduced in version v4.18 by commit a6088845c2bf754d6cb2572b484180680b037804. For more details please see the references link.
null
2021-12-19T23:52:22.281035Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a6088845c2bf754d6cb2572b484180680b037804'}
Linux
GSD-2021-1000462
net/nfc: fix use-after-free llcp_sock_bind/connect
net/nfc: fix use-after-free llcp_sock_bind/connect This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.191 by commit 48fba458fe54cc2a980a05c13e6c19b8b2cfb610, it was introduced in version v4.19.187 by commit adbb1d218c5f56dbae052765da83c0f57fce2a31. For more details please see the references link.
null
2021-12-19T23:29:41.452752Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/adbb1d218c5f56dbae052765da83c0f57fce2a31'}
Linux
GSD-2021-1000032
ixgbe: fix unbalanced device enable/disable in suspend/resume
ixgbe: fix unbalanced device enable/disable in suspend/resume This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.32 by commit be07581aacae7cd0a073afae8e8862032f794309, it was introduced in version v5.9 by commit 6f82b25587354ce7c9c42e0b53d8b0770b900847. For more details please see the references link.
null
2021-12-19T22:04:17.873888Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6f82b25587354ce7c9c42e0b53d8b0770b900847'}
Linux
GSD-2021-1001789
ocfs2: fix data corruption after conversion from inline format
ocfs2: fix data corruption after conversion from inline format This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.253 by commit 8e6bfb4f70168ddfd32fb6dc028ad52faaf1f32e, it was introduced in version v4.14.204 by commit 7ed80e77c908cbaa686529a49f8ae0060c5caee7. For more details please see the references link.
null
2021-12-19T23:28:08.367284Z
2021-10-28T13:48:56.651623Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ed80e77c908cbaa686529a49f8ae0060c5caee7'}
Linux
GSD-2021-1001273
iommu/arm-smmu: Fix arm_smmu_device refcount leak in address translation
iommu/arm-smmu: Fix arm_smmu_device refcount leak in address translation This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.52 by commit 43d1aaa1965f9b58035196dac49b1e1e6c9c25eb. For more details please see the references link.
null
2021-12-19T23:06:52.438510Z
2021-08-03T01:54:56.321206Z
null
null
null
null
null
Linux
GSD-2022-1002373
jffs2: fix memory leak in jffs2_do_mount_fs
jffs2: fix memory leak in jffs2_do_mount_fs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit dbe0d0521eaa6a3d235517319266c539bb5c5112, it was introduced in version v2.6.15 by commit e631ddba588783edd521c5a89f7b2902772fb691. For more details please see the references link.
null
2022-04-25T04:10:04.254067Z
2022-04-24T22:40:21.359260Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e631ddba588783edd521c5a89f7b2902772fb691'}
Linux
GSD-2021-1001623
i40e: Fix freeing of uninitialized misc IRQ vector
i40e: Fix freeing of uninitialized misc IRQ vector This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.73 by commit 97aeed72af4f83ae51534f0a2473ff52f8d66236, it was introduced in version v4.15 by commit c17401a1dd210a5f22ab1ec7c7366037c158a14c. For more details please see the references link.
null
2021-12-20T00:43:33.314350Z
2021-10-19T16:28:45.325761Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c17401a1dd210a5f22ab1ec7c7366037c158a14c'}
Linux
GSD-2021-1000931
KVM: x86: Immediately reset the MMU context when the SMM flag is cleared
KVM: x86: Immediately reset the MMU context when the SMM flag is cleared This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.128 by commit cbb425f62df9df7abee4b3f068f7ed6ffc3561e2, it was introduced in version v5.1 by commit 9ec19493fb86d6d5fbf9286b94ff21e56ef66376. For more details please see the references link.
null
2021-12-19T23:32:38.704061Z
2021-06-30T00:25:17.353455Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9ec19493fb86d6d5fbf9286b94ff21e56ef66376'}
Linux
GSD-2022-1000460
ipv4: fix data races in fib_alias_hw_flags_set
ipv4: fix data races in fib_alias_hw_flags_set This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit db333693b052cf769d8d6dde034ad679ce2e9ab9, it was introduced in version v5.6 by commit 90b93f1b31f86dcde2fa3c57f1ae33d28d87a1f8. For more details please see the references link.
null
2022-03-07T01:33:25.055942Z
2022-02-27T03:10:32.892730Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/90b93f1b31f86dcde2fa3c57f1ae33d28d87a1f8'}
Linux
GSD-2022-1000030
net: fix use-after-free in tw_timer_handler
net: fix use-after-free in tw_timer_handler This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.170 by commit fe5838c22b986c1190f1dce9aa09bf6a491c1a69, it was introduced in version v2.6.27 by commit 61a7e26028b94805fd686a6dc9dbd9941f8f19b0. For more details please see the references link.
null
2022-01-11T05:48:33.240028Z
2022-01-10T19:50:53.006294Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61a7e26028b94805fd686a6dc9dbd9941f8f19b0'}
Linux
GSD-2021-1002721
netfs: Fix lockdep warning from taking sb_writers whilst holding mmap_lock
netfs: Fix lockdep warning from taking sb_writers whilst holding mmap_lock This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.10 by commit 1ac287b7b61520d00255b4ec8c8e2dd5f0277169, it was introduced in version v5.13 by commit 726218fdc22c9b52f16e1228499a804bbf262a20. For more details please see the references link.
null
2022-01-11T05:58:15.224549Z
2021-12-27T05:38:59.678089Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/726218fdc22c9b52f16e1228499a804bbf262a20'}
Linux
GSD-2022-1000899
netfilter: nf_queue: fix possible use-after-free
netfilter: nf_queue: fix possible use-after-free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.233 by commit 34dc4a6a7f261736ef7183868a5bddad31c7f9e3, it was introduced in version v2.6.29 by commit 271b72c7fa82c2c7a795bc16896149933110672d. For more details please see the references link.
null
2022-03-18T03:00:23.238745Z
2022-03-18T00:29:41.688861Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/271b72c7fa82c2c7a795bc16896149933110672d'}
Linux
GSD-2022-1001271
f2fs: fix compressed file start atomic write may cause data corruption
f2fs: fix compressed file start atomic write may cause data corruption This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 9fa8e3e691b344348651d8b1f52666be70138724, it was introduced in version v5.6 by commit 4c8ff7095bef64fc47e996a938f7d57f9e077da3. For more details please see the references link.
null
2022-04-25T03:41:34.886587Z
2022-04-24T21:00:06.810033Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4c8ff7095bef64fc47e996a938f7d57f9e077da3'}
Linux
GSD-2021-1002371
ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE
ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.292 by commit 7afc6600ba3e2190a798c28898f132025d303d5a, it was introduced in version v3.8 by commit 9c4566a117a6fe404a0e49b27ac71b631945a70f. For more details please see the references link.
null
2021-12-19T22:16:45.625606Z
2021-12-19T19:34:21.395972Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9c4566a117a6fe404a0e49b27ac71b631945a70f'}
Linux
GSD-2022-1000933
gso: do not skip outer ip header in case of ipip and net_failover
gso: do not skip outer ip header in case of ipip and net_failover This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.269 by commit 7840e559799a08a8588ee6de27516a991cb2e5e7, it was introduced in version v3.13 by commit cb32f511a70be8967ac9025cf49c44324ced9a39. For more details please see the references link.
null
2022-03-18T02:55:45.875527Z
2022-03-18T00:34:02.798567Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cb32f511a70be8967ac9025cf49c44324ced9a39'}
Linux
GSD-2022-1001621
pinctrl: samsung: drop pin banks references on error paths
pinctrl: samsung: drop pin banks references on error paths This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 04ea05612ef74896ee3371d4ebe2c3747384d5f0, it was introduced in version v3.8 by commit ab663789d69760d2735402f66501f20b60312a3d. For more details please see the references link.
null
2022-04-25T05:12:39.961742Z
2022-04-24T21:29:33.960520Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab663789d69760d2735402f66501f20b60312a3d'}
Linux
GSD-2022-1001334
drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free()
drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.1 by commit abc9ad36df16e27ac1c665085157f1a082d39bac, it was introduced in version v5.13 by commit 377f8331d0565e6f71ba081c894029a92d0c7e77. For more details please see the references link.
null
2022-04-25T05:32:45.051943Z
2022-04-24T21:05:26.782837Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/377f8331d0565e6f71ba081c894029a92d0c7e77'}
Linux
GSD-2021-1002664
xen/netfront: harden netfront against event channel storms
xen/netfront: harden netfront against event channel storms This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.222 by commit 3559ca594f15fcd23ed10c0056d40d71e5dab8e5. For more details please see the references link.
null
2022-01-11T05:53:44.234206Z
2021-12-27T05:35:09.247173Z
null
null
null
null
null
Linux
GSD-2021-1000659
NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()
NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.193 by commit 40f139a6d50c232c0d1fd1c5e65a845c62db0ede, it was introduced in version v4.0 by commit a7d42ddb3099727f58366fa006f850a219cce6c8. For more details please see the references link.
null
2021-12-20T00:02:51.260766Z
2021-06-04T19:56:29.739310Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a7d42ddb3099727f58366fa006f850a219cce6c8'}
Linux
GSD-2022-1000876
xfrm: fix MTU regression
xfrm: fix MTU regression This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.183 by commit ac858e4462bdc5c589b0c062420c09dab3e579cd, it was introduced in version v4.15 by commit 749439bfac6e1a2932c582e2699f91d329658196. For more details please see the references link.
null
2022-03-18T03:35:32.759683Z
2022-03-18T00:27:01.047688Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/749439bfac6e1a2932c582e2699f91d329658196'}
Linux
GSD-2022-1001764
KVM: SVM: fix panic on out-of-bounds guest IRQ
KVM: SVM: fix panic on out-of-bounds guest IRQ This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 3fa2d747960521a646fc1aad7aea82e95e139a68. For more details please see the references link.
null
2022-04-25T04:50:40.025810Z
2022-04-24T21:41:00.816613Z
null
null
null
null
null
Linux
GSD-2021-1002234
cfg80211: call cfg80211_stop_ap when switch from P2P_GO type
cfg80211: call cfg80211_stop_ap when switch from P2P_GO type This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.256 by commit 4e458abbb4a523f1413bfe15c079cf4e24c15b21, it was introduced in version v3.6 by commit ac800140c20e7ae51117e71289065bedd4930fc2. For more details please see the references link.
null
2021-12-19T22:26:20.809683Z
2021-11-29T02:34:34.520898Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac800140c20e7ae51117e71289065bedd4930fc2'}
Linux
GSD-2021-1000209
netfilter: nftables: Fix a memleak from userdata error path in new objects
netfilter: nftables: Fix a memleak from userdata error path in new objects This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit dd3bebf515f336214a91994348a2b86b9a1d3d7f, it was introduced in version v5.10 by commit b131c96496b369c7b14125e7c50e89ac7cec8051. For more details please see the references link.
null
2021-12-19T23:33:03.660602Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b131c96496b369c7b14125e7c50e89ac7cec8051'}
Linux
GSD-2022-1000525
phy: ti: Fix missing sentinel for clk_div_table
phy: ti: Fix missing sentinel for clk_div_table This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 5b0c9569135a37348c1267c81e8b0274b21a86ed, it was introduced in version v5.6 by commit 091876cc355d6739e393efa4b3d07f451a6a035c. For more details please see the references link.
null
2022-03-07T01:47:04.080249Z
2022-02-27T03:19:22.191132Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/091876cc355d6739e393efa4b3d07f451a6a035c'}
Linux
GSD-2021-1001048
HID: usbhid: fix info leak in hid_submit_ctrl
HID: usbhid: fix info leak in hid_submit_ctrl This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.12 by commit 21883bff0fd854e07429a773ff18f1e9658f50e8. For more details please see the references link.
null
2021-12-20T00:46:47.187048Z
2021-06-30T00:36:13.688684Z
null
null
null
null
null
Linux
GSD-2022-1000175
ASoC: max9759: fix underflow in speaker_gain_control_put()
ASoC: max9759: fix underflow in speaker_gain_control_put() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.178 by commit 71e60c170105d153e34d01766c1e4db26a4b24cc, it was introduced in version v4.17 by commit fa8d915172b8c10ec0734c4021e99e9705023b07. For more details please see the references link.
null
2022-02-20T02:17:14.045672Z
2022-02-18T21:51:10.604853Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fa8d915172b8c10ec0734c4021e99e9705023b07'}
Linux
GSD-2022-1002148
llc: only change llc->dev when bind() succeeds
llc: only change llc->dev when bind() succeeds This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.109 by commit 163960a7de1333514c9352deb7c80c6b9fd9abf2, it was introduced in version v5.10.109 by commit 571df3393f523b59cba87e2f3e80a3a624030f9c. For more details please see the references link.
null
2022-04-24T22:16:10.912337Z
2022-04-24T22:16:10.912337Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/571df3393f523b59cba87e2f3e80a3a624030f9c'}
Linux
GSD-2021-1001418
memory: fsl_ifc: fix leak of IO mapping on probe failure
memory: fsl_ifc: fix leak of IO mapping on probe failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.240 by commit 6b3b002de90738e3c85853a682ce7e0fa078d42b, it was introduced in version v3.3 by commit a20cbdeffce247a2b6fb83cd8d22433994068565. For more details please see the references link.
null
2021-12-20T01:31:05.571004Z
2021-08-03T02:35:13.790710Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a20cbdeffce247a2b6fb83cd8d22433994068565'}
Linux
GSD-2021-1000120
vhost-vdpa: fix vm_flags for virtqueue doorbell mapping
vhost-vdpa: fix vm_flags for virtqueue doorbell mapping This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.20 by commit 940230a5c31e2714722aee04c521a21f484b4df7, it was introduced in version v5.8 by commit ddd89d0a059d8e9740c75a97e0efe9bf07ee51f9. For more details please see the references link.
null
2021-12-19T22:41:29.499327Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ddd89d0a059d8e9740c75a97e0efe9bf07ee51f9'}
Linux
GSD-2021-1000570
iommu/vt-d: Fix sysfs leak in alloc_iommu()
iommu/vt-d: Fix sysfs leak in alloc_iommu() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit ca466561eef36d1ec657673e3944eb6340bddb5b, it was introduced in version v4.11 by commit 39ab9555c24110671f8dc671311a26e5c985b592. For more details please see the references link.
null
2021-12-19T23:30:26.606399Z
2021-06-04T19:40:41.667654Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/39ab9555c24110671f8dc671311a26e5c985b592'}
Linux
GSD-2022-1002261
ASoC: soc-compress: prevent the potentially use of null pointer
ASoC: soc-compress: prevent the potentially use of null pointer This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 68a69ad8df959e5211ed4a8e120783b2d352ea74, it was introduced in version v5.4 by commit 467fece8fbc6774a3a3bd0981e1a342fb5022706. For more details please see the references link.
null
2022-04-25T03:30:48.443486Z
2022-04-24T22:27:43.032167Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/467fece8fbc6774a3a3bd0981e1a342fb5022706'}
Linux
GSD-2021-1001731
KVM: SVM: fix missing sev_decommission in sev_receive_start
KVM: SVM: fix missing sev_decommission in sev_receive_start This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit efd7866e114dcb44f86d151e843f8276b7efbc67, it was introduced in version v5.13 by commit af43cbbf954b50ca97d5e7bb56c2edc6ffd209ef. For more details please see the references link.
null
2021-12-19T22:52:41.334273Z
2021-10-19T16:33:54.784609Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/af43cbbf954b50ca97d5e7bb56c2edc6ffd209ef'}
Linux
GSD-2021-1000823
x86/kvm: Disable kvmclock on all CPUs on shutdown
x86/kvm: Disable kvmclock on all CPUs on shutdown This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.10 by commit 1df2dc09926f61319116c80ee85701df33577d70, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T22:34:03.347156Z
2021-06-25T00:09:37.581210Z
null
null
null
null
null
Linux
GSD-2021-1000989
net: hamradio: fix memory leak in mkiss_close
net: hamradio: fix memory leak in mkiss_close This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit 290b0b6432e2599021db0b8d6046f756d931c29f, it was introduced in version v2.6.14 by commit 815f62bf742718458ba822a7e1f51f285eb997f2. For more details please see the references link.
null
2021-12-19T23:25:53.050150Z
2021-06-30T00:31:40.878430Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/815f62bf742718458ba822a7e1f51f285eb997f2'}
Linux
GSD-2021-1001361
media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf()
media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.199 by commit ec731c6ef564ee6fc101fc5d73e3a3a953d09a00, it was introduced in version v2.6.34 by commit dae52d009fc950b5c209260d50fcc000f5becd3c. For more details please see the references link.
null
2021-12-20T00:17:16.638473Z
2021-08-03T02:18:43.918008Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/dae52d009fc950b5c209260d50fcc000f5becd3c'}
Linux
GSD-2021-1001674
staging: greybus: uart: fix tty use after free
staging: greybus: uart: fix tty use after free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.70 by commit b9e697e60ce9890e9258a73eb061288e7d68e5e6, it was introduced in version v4.9 by commit a18e15175708d39abbe9746ddc3479466b7800c3. For more details please see the references link.
null
2021-12-20T00:22:19.912407Z
2021-10-19T16:31:14.218182Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a18e15175708d39abbe9746ddc3479466b7800c3'}
Linux
GSD-2021-1000966
NFS: Fix use-after-free in nfs4_init_client()
NFS: Fix use-after-free in nfs4_init_client() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.44 by commit c3b6cf64dfe4ef96e7341508d50d6998da7062c7, it was introduced in version v4.13 by commit 8dcbec6d20eb881ba368d0aebc3a8a678aebb1da. For more details please see the references link.
null
2021-12-19T22:23:59.336288Z
2021-06-30T00:29:46.043129Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8dcbec6d20eb881ba368d0aebc3a8a678aebb1da'}
Linux
GSD-2022-1002324
KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs
KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 7f32e8f5fd68216a271d8d5ebb57d0eca88e1bb7, it was introduced in version v4.2 by commit ca724305a2b02abcbecbf22577536fc8e965ab4f. For more details please see the references link.
null
2022-04-25T04:47:39.033336Z
2022-04-24T22:34:25.166363Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca724305a2b02abcbecbf22577536fc8e965ab4f'}
Linux
GSD-2022-1000319
veth: fix races around rq->rx_notify_masked
veth: fix races around rq->rx_notify_masked This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.230 by commit 8f0ea3777590c16222d4251a49e31dd376ff5ac1, it was introduced in version v4.19 by commit 948d4f214fde43743c57aae0c708bff44f6345f2. For more details please see the references link.
null
2022-03-07T01:33:44.177270Z
2022-02-27T02:50:18.294959Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/948d4f214fde43743c57aae0c708bff44f6345f2'}
Linux
GSD-2021-1001224
mwifiex: bring down link before deleting interface
mwifiex: bring down link before deleting interface This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.3 by commit 35af69c7c0490fdccfc159c6a87e4d1dc070838a, it was introduced in version v5.12 by commit a05829a7222e9d10c416dd2dbbf3929fe6646b89. For more details please see the references link.
null
2021-12-19T23:23:21.626546Z
2021-08-03T01:41:04.092376Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a05829a7222e9d10c416dd2dbbf3929fe6646b89'}
Linux
GSD-2022-1000749
ice: fix concurrent reset and removal of VFs
ice: fix concurrent reset and removal of VFs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.12 by commit 2a3e61de89bab6696aa28b70030eb119968c5586, it was introduced in version v5.14 by commit c503e63200c679e362afca7aca9d3dc63a0f45ed. For more details please see the references link.
null
2022-03-18T03:44:09.890031Z
2022-03-18T00:15:13.042114Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c503e63200c679e362afca7aca9d3dc63a0f45ed'}
Linux
GSD-2021-1000065
sfc: farch: fix TX queue lookup in TX flush done handling
sfc: farch: fix TX queue lookup in TX flush done handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.3 by commit 98d91180748986bfb6dfb3e72765f3225719a647, it was introduced in version v5.10 by commit 12804793b17c0e19115a90d98f2f3df0cb79e233. For more details please see the references link.
null
2021-12-19T22:30:06.760928Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/12804793b17c0e19115a90d98f2f3df0cb79e233'}
Linux
GSD-2021-1002058
ocfs2: fix race between searching chunks and release journal_head from buffer_head
ocfs2: fix race between searching chunks and release journal_head from buffer_head This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.77 by commit 5043fbd294f5909a080ade0f04b70a4da9e122b7. For more details please see the references link.
null
2021-12-20T00:07:55.416552Z
2021-11-14T15:17:54.589274Z
null
null
null
null
null
Linux
GSD-2022-1001508
net: bcmgenet: Use stronger register read/writes to assure ordering
net: bcmgenet: Use stronger register read/writes to assure ordering This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 1d717816189fd68f9e089cf89ed1f7327d2c2e71, it was introduced in version v4.14 by commit 69d2ea9c798983c4a7157278ec84ff969d1cd8e8. For more details please see the references link.
null
2022-04-25T04:47:12.075295Z
2022-04-24T21:18:33.557193Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69d2ea9c798983c4a7157278ec84ff969d1cd8e8'}
Linux
GSD-2021-1000435
bus: qcom: Put child node before return
bus: qcom: Put child node before return This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.119 by commit 3a76ec28824c01b57aa1f0927841d75e4f167cb8, it was introduced in version v4.9 by commit 335a127548081322bd2b294d715418648912f20c. For more details please see the references link.
null
2021-12-19T22:55:15.728930Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/335a127548081322bd2b294d715418648912f20c'}
Linux
GSD-2021-1002408
staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect()
staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.219 by commit bca19bb2dc2d89ce60c4a4a6e59609d4cf2e13ef, it was introduced in version v3.2 by commit 66898177e7e5486dc77a4ba742efa4e2e9e900a4. For more details please see the references link.
null
2021-12-19T23:58:50.717775Z
2021-12-19T19:35:59.394862Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/66898177e7e5486dc77a4ba742efa4e2e9e900a4'}
Linux
GSD-2022-1001158
bfq: fix use-after-free in bfq_dispatch_request
bfq: fix use-after-free in bfq_dispatch_request This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 40b4ba0030e0b02cbacd424ebb9f4c8b0976c786. For more details please see the references link.
null
2022-04-25T05:03:28.429591Z
2022-04-24T20:49:26.748775Z
null
null
null
null
null
Linux
GSD-2022-1001637
drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free()
drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.18 by commit ac92b474eeeed75b8660374ba1d129a121c09da8, it was introduced in version v5.13 by commit 377f8331d0565e6f71ba081c894029a92d0c7e77. For more details please see the references link.
null
2022-04-25T06:04:04.712853Z
2022-04-24T21:30:36.932846Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/377f8331d0565e6f71ba081c894029a92d0c7e77'}
Linux
GSD-2022-1000925
cifs: fix double free race when mount fails in cifs_get_root()
cifs: fix double free race when mount fails in cifs_get_root() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.270 by commit 147a0e71ccf96df9fc8c2ac500829d8e423ef02c. For more details please see the references link.
null
2022-03-18T02:55:09.938742Z
2022-03-18T00:32:38.107703Z
null
null
null
null
null
Linux
GSD-2021-1002367
iio: mma8452: Fix trigger reference couting
iio: mma8452: Fix trigger reference couting This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.295 by commit 094d513b78b1714113bc016684b8142382e071ba, it was introduced in version v4.2 by commit ae6d9ce05691bf79694074db7c7da980080548af. For more details please see the references link.
null
2021-12-20T01:09:28.449108Z
2021-12-19T19:34:11.375369Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ae6d9ce05691bf79694074db7c7da980080548af'}
Linux
GSD-2022-1001267
soc: qcom: rpmpd: Check for null return of devm_kcalloc
soc: qcom: rpmpd: Check for null return of devm_kcalloc This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 31b5124d742969ea8bf7a1360596f548ca23e770, it was introduced in version v5.1 by commit bbe3a66c3f5a65fb3d702351bac2a6033944d389. For more details please see the references link.
null
2022-04-25T03:52:40.355357Z
2022-04-24T20:59:37.907669Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bbe3a66c3f5a65fb3d702351bac2a6033944d389'}
Linux
GSD-2021-1002737
dm btree remove: fix use after free in rebalance_children()
dm btree remove: fix use after free in rebalance_children() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit 607beb420b3fe23b948a9bf447d993521a02fbbb. For more details please see the references link.
null
2022-01-11T05:51:18.506873Z
2021-12-27T05:45:40.661178Z
null
null
null
null
null
Linux
GSD-2021-1001818
audit: fix possible null-pointer dereference in audit_filter_rules
audit: fix possible null-pointer dereference in audit_filter_rules This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.156 by commit d6f451f1f60c58d73038c7c3177066f8f084e2a2, it was introduced in version v5.3 by commit bf361231c295d92a28ca283ea713f56e93e55796. For more details please see the references link.
null
2021-12-20T01:28:16.590732Z
2021-10-28T13:50:32.123040Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf361231c295d92a28ca283ea713f56e93e55796'}
Linux
GSD-2022-1000026
i2c: validate user data in compat ioctl
i2c: validate user data in compat ioctl This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.224 by commit 407c8708fb1bf2d4afc5337ef50635cf540c364b, it was introduced in version v4.15 by commit 7d5cb45655f2e9e37ef75d18f50c0072ef14a38b. For more details please see the references link.
null
2022-01-11T05:47:07.186556Z
2022-01-10T19:50:42.959386Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7d5cb45655f2e9e37ef75d18f50c0072ef14a38b'}
Linux
GSD-2022-1000476
lockdep: Correct lock_classes index mapping
lockdep: Correct lock_classes index mapping This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit 5dcc365697340599b7ef63a9352fcea890f0e78b, it was introduced in version v5.10 by commit f611e8cf98ec908b9c2c0da6064a660fc6022487. For more details please see the references link.
null
2022-03-07T01:52:35.689873Z
2022-02-27T03:12:21.936195Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f611e8cf98ec908b9c2c0da6064a660fc6022487'}
Linux
GSD-2022-1000499
arm64: errata: Add detection for TRBE trace data corruption
arm64: errata: Add detection for TRBE trace data corruption This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit aff260ffbaa3c45df62e56ec7e543698039ae237. For more details please see the references link.
null
2022-03-07T01:36:37.224925Z
2022-02-27T03:15:36.585048Z
null
null
null
null
null
Linux
GSD-2022-1000163
net: amd-xgbe: Fix skb data length underflow
net: amd-xgbe: Fix skb data length underflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.177 by commit 9892742f035f7aa7dcd2bb0750effa486db89576, it was introduced in version v4.11 by commit 622c36f143fc9566ba49d7cec994c2da1182d9e2. For more details please see the references link.
null
2022-02-19T03:17:26.823951Z
2022-02-18T21:49:03.802153Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/622c36f143fc9566ba49d7cec994c2da1182d9e2'}
Linux
GSD-2022-1000533
iommu: Fix potential use-after-free during probe
iommu: Fix potential use-after-free during probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit f74fc4b5bd533ea3d30ce47cccb8ef8d21fda85a. For more details please see the references link.
null
2022-03-07T01:35:55.263858Z
2022-02-27T03:20:16.643911Z
null
null
null
null
null
Linux
GSD-2022-1001288
samples/landlock: Fix path_list memory leak
samples/landlock: Fix path_list memory leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 017196730299ccd6eed24bbfabed8af4ffd81530. For more details please see the references link.
null
2022-04-25T04:42:52.177602Z
2022-04-24T21:01:31.995005Z
null
null
null
null
null
Linux
GSD-2021-1002222
scsi: advansys: Fix kernel pointer leak
scsi: advansys: Fix kernel pointer leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.293 by commit 06d7d12efb5c62db9dea15141ae2b322c2719515. For more details please see the references link.
null
2021-12-20T01:16:26.153703Z
2021-11-29T02:34:06.086560Z
null
null
null
null
null
Linux
GSD-2022-1001772
scsi: qla2xxx: Fix warning message due to adisc being flushed
scsi: qla2xxx: Fix warning message due to adisc being flushed This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 7a3457777c4f700c64836e78dc71e6ce459f62b8. For more details please see the references link.
null
2022-04-25T04:50:27.577638Z
2022-04-24T21:41:32.048598Z
null
null
null
null
null
Linux
GSD-2022-1000860
openvswitch: Fix setting ipv6 fields causing hw csum failure
openvswitch: Fix setting ipv6 fields causing hw csum failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.103 by commit 1df9d552fe84bb7d7a6a361b5bb8a9273f9f799d, it was introduced in version v3.8 by commit 3fdbd1ce11e5c0d7cafbe44c942c5cad61113d7b. For more details please see the references link.
null
2022-03-18T02:50:23.481262Z
2022-03-18T00:25:25.876619Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3fdbd1ce11e5c0d7cafbe44c942c5cad61113d7b'}
Linux
GSD-2021-1002672
sch_cake: do not call cake_destroy() from cake_init()
sch_cake: do not call cake_destroy() from cake_init() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.168 by commit 0d80462fbdcafd536dcad7569e65d3d14a7e9f2f, it was introduced in version v4.19 by commit 046f6fd5daefac7f5abdafb436b30f63bc7c602b. For more details please see the references link.
null
2022-01-11T05:57:58.073080Z
2021-12-27T05:36:05.285742Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/046f6fd5daefac7f5abdafb436b30f63bc7c602b'}
Linux
GSD-2021-1002388
ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE
ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.257 by commit 25bd60b9f6e820e317c0c4fb6a2451a748d6ef58, it was introduced in version v3.8 by commit 9c4566a117a6fe404a0e49b27ac71b631945a70f. For more details please see the references link.
null
2021-12-19T22:36:28.591037Z
2021-12-19T19:35:09.954428Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9c4566a117a6fe404a0e49b27ac71b631945a70f'}
Linux
GSD-2022-1001322
iio: accel: mma8452: use the correct logic to get mma8452_data
iio: accel: mma8452: use the correct logic to get mma8452_data This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit d2d9ebdbff79d87d27652578e6d1638ad3b5f3bf, it was introduced in version v4.4 by commit c3cdd6e48e35b7a02f28e301ef30a87ff3cd6527. For more details please see the references link.
null
2022-04-25T06:40:42.154986Z
2022-04-24T21:04:30.272937Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c3cdd6e48e35b7a02f28e301ef30a87ff3cd6527'}
Linux
GSD-2021-1001377
net: qcom/emac: fix UAF in emac_remove
net: qcom/emac: fix UAF in emac_remove This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.199 by commit 11e9d163d631198bb3eb41a677a61b499516c0f7, it was introduced in version v4.9 by commit 54e19bc74f3380d414681762ceed9f7245bc6a6e. For more details please see the references link.
null
2021-12-19T23:53:14.957770Z
2021-08-03T02:23:46.473229Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/54e19bc74f3380d414681762ceed9f7245bc6a6e'}
Linux
GSD-2022-1001908
mm/kmemleak: reset tag when compare object pointer
mm/kmemleak: reset tag when compare object pointer This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 7d3bd683e0849f0ec52fefa8070734dedc3b33a1. For more details please see the references link.
null
2022-04-25T05:31:49.429991Z
2022-04-24T21:53:45.211150Z
null
null
null
null
null
Linux
GSD-2021-1002808
platform/x86: intel_pmc_core: fix memleak on registration failure
platform/x86: intel_pmc_core: fix memleak on registration failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.89 by commit 7a37f2e370699e2feca3dca6c8178c71ceee7e8a, it was introduced in version v5.9 by commit 938835aa903ae19ad62805134f79bbcf20fc3bea. For more details please see the references link.
null
2022-01-11T05:52:54.331704Z
2021-12-30T02:44:21.371312Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/938835aa903ae19ad62805134f79bbcf20fc3bea'}
Linux
GSD-2021-1000835
net/nfc/rawsock.c: fix a permission check bug
net/nfc/rawsock.c: fix a permission check bug This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.273 by commit d6a21a3fb03300fbaa9fc3ed99f8b0962ce28362. For more details please see the references link.
null
2021-12-19T22:23:31.702844Z
2021-06-30T00:00:20.832825Z
null
null
null
null
null
Linux
GSD-2021-1001727
RDMA/cma: Fix listener leak in rdma_cma_listen_on_all() failure
RDMA/cma: Fix listener leak in rdma_cma_listen_on_all() failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit e56a5146ef8cb51cd7c9e748267dce7564448a35, it was introduced in version v5.11 by commit c80a0c52d85c49a910d0dc0e342e8d8898677dc0. For more details please see the references link.
null
2021-12-20T01:33:15.214820Z
2021-10-19T16:33:44.543635Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c80a0c52d85c49a910d0dc0e342e8d8898677dc0'}
Linux
GSD-2022-1002277
NFSD: prevent underflow in nfssvc_decode_writeargs()
NFSD: prevent underflow in nfssvc_decode_writeargs() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 85259340fc9bd54e3d567b41b881ecb4d0055da1. For more details please see the references link.
null
2022-04-25T06:30:54.846272Z
2022-04-24T22:29:29.732502Z
null
null
null
null
null
Linux
GSD-2021-1000566
misc/uss720: fix memory leak in uss720_probe
misc/uss720: fix memory leak in uss720_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit a3c3face38cb49932c62adcc1289914f1c742096, it was introduced in version v2.6.14 by commit 0f36163d3abefbda1b21a330b3fdf3c2dc076d94. For more details please see the references link.
null
2021-12-19T23:43:54.256594Z
2021-06-04T19:40:08.343292Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0f36163d3abefbda1b21a330b3fdf3c2dc076d94'}
Linux
GSD-2021-1000136
media: staging/intel-ipu3: Fix memory leak in imu_fmt
media: staging/intel-ipu3: Fix memory leak in imu_fmt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.36 by commit 517f6f570566a863c2422b843c8b7d099474f6a9, it was introduced in version v5.2 by commit 6d5f26f2e045f2377b524516194657c00efbbce8. For more details please see the references link.
null
2021-12-19T23:15:16.266996Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6d5f26f2e045f2377b524516194657c00efbbce8'}
Linux
GSD-2021-1000423
RDMA/qedr: Fix error return code in qedr_iw_connect()
RDMA/qedr: Fix error return code in qedr_iw_connect() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.119 by commit 53656a2a01834e3d90fb2813ae5c82febcb96218, it was introduced in version v5.4.45 by commit 8a69220b659c31ccd481538193220d732814b324. For more details please see the references link.
null
2021-12-19T23:46:50.373861Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8a69220b659c31ccd481538193220d732814b324'}
Linux
GSD-2021-1000589
net: fujitsu: fix potential null-ptr-deref
net: fujitsu: fix potential null-ptr-deref This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit 71723a796ab7881f491d663c6cd94b29be5fba50, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T23:01:15.001820Z
2021-06-04T19:43:26.108045Z
null
null
null
null
null
Linux
GSD-2021-1000073
btrfs: fix race between transaction aborts and fsyncs leading to use-after-free
btrfs: fix race between transaction aborts and fsyncs leading to use-after-free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.3 by commit e2da98788369bfba1138bada72765c47989a4338, it was introduced in version v5.7 by commit ef67963dac255b293e19815ea3d440567be4626f. For more details please see the references link.
null
2021-12-19T23:11:28.792380Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef67963dac255b293e19815ea3d440567be4626f'}
Linux
GSD-2021-1001232
atm: nicstar: Fix possible use-after-free in nicstar_cleanup()
atm: nicstar: Fix possible use-after-free in nicstar_cleanup() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.3 by commit 5b991df8881088448cb223e769e37cab8dd40706. For more details please see the references link.
null
2021-12-20T00:16:16.974656Z
2021-08-03T01:43:50.117777Z
null
null
null
null
null
Linux
GSD-2022-1002298
gpiolib: acpi: use correct format characters
gpiolib: acpi: use correct format characters This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.239 by commit 38b0bd0f251010073efb3fc37a708ae9079bb332, it was introduced in version v4.14 by commit e40a3ae1f794a35c4af3746291ed6fedc1fa0f6f. For more details please see the references link.
null
2022-04-25T06:40:52.714631Z
2022-04-24T22:31:41.312898Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e40a3ae1f794a35c4af3746291ed6fedc1fa0f6f'}
Linux
GSD-2022-1002332
video: fbdev: sm712fb: Fix crash in smtcfb_write()
video: fbdev: sm712fb: Fix crash in smtcfb_write() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 1aea36a62f0a0ad67eccc945bac0bd6422ef720f. For more details please see the references link.
null
2022-04-25T03:34:38.600344Z
2022-04-24T22:35:22.621724Z
null
null
null
null
null
Linux
GSD-2021-1001398
mISDN: fix possible use-after-free in HFC_cleanup()
mISDN: fix possible use-after-free in HFC_cleanup() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.198 by commit 5f2818185da0fe82a932f0856633038b66faf124. For more details please see the references link.
null
2021-12-19T22:31:15.011223Z
2021-08-03T02:28:40.172023Z
null
null
null
null
null
Linux
GSD-2021-1000970
drm/tegra: sor: Do not leak runtime PM reference
drm/tegra: sor: Do not leak runtime PM reference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.45 by commit 570b3e4020f2aa7ab6908042e7f3a41ab24ce261. For more details please see the references link.
null
2021-12-19T22:04:22.302759Z
2021-06-30T00:30:01.228183Z
null
null
null
null
null
Linux
GSD-2021-1001662
blk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd
blk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.70 by commit f58d305887ad7b24986d58e881f6806bb81b2bdf. For more details please see the references link.
null
2021-12-19T22:43:05.378699Z
2021-10-19T16:30:34.897226Z
null
null
null
null
null
Linux
GSD-2022-1000421
riscv: eliminate unreliable __builtin_frame_address(1)
riscv: eliminate unreliable __builtin_frame_address(1) This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit 71f46f3d1bf29ee5b0a53dc21462125f754491dd, it was introduced in version v5.13 by commit eac2f3059e02382d91f8c887462083841d6ea2a3. For more details please see the references link.
null
2022-03-07T01:43:34.326295Z
2022-02-27T03:04:38.144230Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/eac2f3059e02382d91f8c887462083841d6ea2a3'}
Linux
GSD-2021-1002760
media: mxl111sf: change mutex_init() location
media: mxl111sf: change mutex_init() location This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit 8c6fdf62bfe1bc72bfceeaf832ef7499c7ed09ba, it was introduced in version v3.7 by commit 8572211842afc53c8450fb470f2b8d02ba7592e0. For more details please see the references link.
null
2022-01-11T06:47:17.813521Z
2021-12-27T05:49:19.993169Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8572211842afc53c8450fb470f2b8d02ba7592e0'}
Linux
GSD-2022-1001230
rtw88: fix use after free in rtw_hw_scan_update_probe_req()
rtw88: fix use after free in rtw_hw_scan_update_probe_req() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit d9fb80ad781e28b332df8c10b0511e9ca856e55d, it was introduced in version v5.17.2 by commit ec5da191bfcd5fd22b95459b623694f66c1cc10b. For more details please see the references link.
null
2022-04-24T20:56:03.572304Z
2022-04-24T20:56:03.572304Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ec5da191bfcd5fd22b95459b623694f66c1cc10b'}
Linux
GSD-2021-1002330
f2fs: fix incorrect return value in f2fs_sanity_check_ckpt()
f2fs: fix incorrect return value in f2fs_sanity_check_ckpt() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit 680a0c6332c48df1b900b3c535e920e7cc453b7e, it was introduced in version v5.15 by commit 65ddf6564843890a58ee3b18bb46ce67d96333fb. For more details please see the references link.
null
2021-12-19T23:43:18.528133Z
2021-11-29T02:39:00.870181Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/65ddf6564843890a58ee3b18bb46ce67d96333fb'}
Linux
GSD-2022-1001660
net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link
net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.35 by commit 62a48383ebe2e159fd68425dd3e16d4c6bd6599a, it was introduced in version v4.8 by commit fb3bbdb859891e6bc27fd1afb3a07319f82c2ee4. For more details please see the references link.
null
2022-04-25T04:31:18.962834Z
2022-04-24T21:32:39.080736Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb3bbdb859891e6bc27fd1afb3a07319f82c2ee4'}
Linux
GSD-2022-1000972
scsi: lpfc: Fix unload hang after back to back PCI EEH faults
scsi: lpfc: Fix unload hang after back to back PCI EEH faults This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.4 by commit d0b040c2297c13bd2b00a84556dd6104771dc171. For more details please see the references link.
null
2022-04-25T06:50:05.465045Z
2022-04-24T20:36:05.426710Z
null
null
null
null
null
Linux
GSD-2022-1001375
drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire()
drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 946c33fefcb9dd0c2c820ef9c3fe91a45401d321, it was introduced in version v4.13 by commit 71c37505e7eaa01fa259debad1a71a7ae061039d. For more details please see the references link.
null
2022-04-25T06:56:15.768955Z
2022-04-24T21:09:03.783957Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/71c37505e7eaa01fa259debad1a71a7ae061039d'}
Linux
GSD-2021-1000618
gve: Add NULL pointer checks when freeing irqs.
gve: Add NULL pointer checks when freeing irqs. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.124 by commit 821149ee88c206fa37e79c1868cc270518484876, it was introduced in version v5.3 by commit 893ce44df56580fb878ca5af9c4a5fd87567da50. For more details please see the references link.
null
2021-12-20T00:02:44.754576Z
2021-06-04T19:48:28.208456Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/893ce44df56580fb878ca5af9c4a5fd87567da50'}