ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2021-1002625
xen/netback: don't queue unlimited number of packages
xen/netback: don't queue unlimited number of packages This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.294 by commit b4226b387436315e7f57465c15335f4f4b5b075d, it was introduced in version v3.18 by commit f48da8b14d04ca87ffcffe68829afd45f926ec6a. For more details please see the references link.
null
2022-01-11T05:47:02.719185Z
2021-12-27T05:27:47.741637Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f48da8b14d04ca87ffcffe68829afd45f926ec6a'}
Linux
GSD-2022-1001725
dm ioctl: prevent potential spectre v1 gadget
dm ioctl: prevent potential spectre v1 gadget This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 02cc46f397eb3691c56affbd5073e54f7a82ac32. For more details please see the references link.
null
2022-04-25T06:34:39.589158Z
2022-04-24T21:37:51.193946Z
null
null
null
null
null
Linux
GSD-2022-1000837
thermal: core: Fix TZ_GET_TRIP NULL pointer dereference
thermal: core: Fix TZ_GET_TRIP NULL pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.104 by commit 1c0b51e62a50e9291764d022ed44549e65d6ab9c, it was introduced in version v5.9 by commit 1ce50e7d408ef2bdc8ca021363fd46d1b8bfad00. For more details please see the references link.
null
2022-03-18T03:35:48.128061Z
2022-03-18T00:22:57.510974Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1ce50e7d408ef2bdc8ca021363fd46d1b8bfad00'}
Linux
GSD-2021-1000248
RDMA/rtrs-clt: destroy sysfs after removing session from active list
RDMA/rtrs-clt: destroy sysfs after removing session from active list This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit d3cca8067d43dfee4a3535c645b55f618708dccb, it was introduced in version v5.8 by commit 6a98d71daea186247005099758af549e6afdd244. For more details please see the references link.
null
2021-12-20T00:27:12.431024Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6a98d71daea186247005099758af549e6afdd244'}
Linux
GSD-2021-1002275
selinux: fix NULL-pointer dereference when hashtab allocation fails
selinux: fix NULL-pointer dereference when hashtab allocation fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.82 by commit b17dd53cac769dd13031b0ca34f90cc65e523fab, it was introduced in version v5.8 by commit 03414a49ad5f3c56988c36d2070e402ffa17feaf. For more details please see the references link.
null
2021-12-20T01:09:07.051579Z
2021-11-29T02:36:30.286185Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/03414a49ad5f3c56988c36d2070e402ffa17feaf'}
Linux
GSD-2022-1000564
dmaengine: ptdma: Fix the error handling path in pt_core_init()
dmaengine: ptdma: Fix the error handling path in pt_core_init() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit d7de1e4820c5a42441ff7276174c8c0e63575c1b, it was introduced in version v5.15 by commit fa5d823b16a9442d609617abeec31da8b6afa224. For more details please see the references link.
null
2022-03-07T01:54:14.369192Z
2022-02-27T03:24:28.334676Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fa5d823b16a9442d609617abeec31da8b6afa224'}
Linux
GSD-2021-1001009
usb: dwc3: core: fix kernel panic when do reboot
usb: dwc3: core: fix kernel panic when do reboot This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit 174c27583b3807ac96228c442735b02622d8d1c3, it was introduced in version v5.10.46 by commit e52d43c82f2f6556f0b7a790c19c072c1e99a95f. For more details please see the references link.
null
2021-06-30T00:33:39.066467Z
2021-06-30T00:33:39.066467Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e52d43c82f2f6556f0b7a790c19c072c1e99a95f'}
Linux
GSD-2022-1002109
soc: qcom: rpmpd: Check for null return of devm_kcalloc
soc: qcom: rpmpd: Check for null return of devm_kcalloc This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit b5d6eba71997b6d661935d2b15094ac7f9f6132d, it was introduced in version v5.1 by commit bbe3a66c3f5a65fb3d702351bac2a6033944d389. For more details please see the references link.
null
2022-04-25T05:28:21.944646Z
2022-04-24T22:12:27.987062Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bbe3a66c3f5a65fb3d702351bac2a6033944d389'}
Linux
GSD-2022-1000134
af_packet: fix data-race in packet_setsockopt / packet_setsockopt
af_packet: fix data-race in packet_setsockopt / packet_setsockopt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.228 by commit 1f0c712832907baef27d13721b3ca2e515d39ecf, it was introduced in version v4.3 by commit 47dceb8ecdc1c3ad1818dfea3d659a05b74c3fc2. For more details please see the references link.
null
2022-02-19T12:50:19.388992Z
2022-02-18T21:44:56.090598Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/47dceb8ecdc1c3ad1818dfea3d659a05b74c3fc2'}
Linux
GSD-2021-1001459
wl1251: Fix possible buffer overflow in wl1251_cmd_scan
wl1251: Fix possible buffer overflow in wl1251_cmd_scan This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.276 by commit d3d8b9c9c7843dce31e284927d4c9904fd5a510a. For more details please see the references link.
null
2021-12-19T23:49:22.519852Z
2021-08-03T02:47:11.987687Z
null
null
null
null
null
Linux
GSD-2021-1000161
ovl: fix leaked dentry
ovl: fix leaked dentry This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.35 by commit 71d58457a8afc650da5d3292a7f7029317654d95, it was introduced in version v5.8 by commit 6815f479ca90ee7fd2e28b2a420f796b974155fe. For more details please see the references link.
null
2021-12-19T23:45:40.188434Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6815f479ca90ee7fd2e28b2a420f796b974155fe'}
Linux
GSD-2021-1000531
iommu/amd: Clear DMA ops when switching domain
iommu/amd: Clear DMA ops when switching domain This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit f3f2cf46291a693eab21adb94171b0128c2a9ec1, it was introduced in version v5.11 by commit 08a27c1c3ecf5e1da193ce5f8fc97c3be16e75f0. For more details please see the references link.
null
2021-12-19T23:27:25.420369Z
2021-06-04T19:34:28.847786Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/08a27c1c3ecf5e1da193ce5f8fc97c3be16e75f0'}
Linux
GSD-2022-1002220
PM: core: keep irq flags in device_pm_check_callbacks()
PM: core: keep irq flags in device_pm_check_callbacks() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 0cccf9d4fb45f1acbc0bbf6d7e4d8d0fb7a10416. For more details please see the references link.
null
2022-04-25T04:08:40.269320Z
2022-04-24T22:22:50.692298Z
null
null
null
null
null
Linux
GSD-2021-1000862
usb: fix various gadget panics on 10gbps cabling
usb: fix various gadget panics on 10gbps cabling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.237 by commit 70cd19cb5bd94bbb5bacfc9c1e4ee0071699a604. For more details please see the references link.
null
2021-12-20T00:48:14.011174Z
2021-06-30T00:02:08.891582Z
null
null
null
null
null
Linux
GSD-2021-1001770
ocfs2: mount fails with buffer overflow in strlen
ocfs2: mount fails with buffer overflow in strlen This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.290 by commit ac011cb3ff7a76b3e0e6e77158ee4ba2f929e1fb. For more details please see the references link.
null
2021-12-19T23:44:58.293223Z
2021-10-28T13:48:03.231028Z
null
null
null
null
null
Linux
GSD-2021-1001320
net: validate lwtstate->data before returning from skb_tunnel_info()
net: validate lwtstate->data before returning from skb_tunnel_info() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.135 by commit 8aa13a86964cdec4fd969ef677c6614ff068641a, it was introduced in version v4.3 by commit 61adedf3e3f1d3f032c5a6a299978d91eff6d555. For more details please see the references link.
null
2021-12-20T00:46:14.086817Z
2021-08-03T02:07:33.606261Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61adedf3e3f1d3f032c5a6a299978d91eff6d555'}
Linux
GSD-2021-1000927
can: bcm: fix infoleak in struct bcm_msg_head
can: bcm: fix infoleak in struct bcm_msg_head This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.128 by commit c297559a2a2a6b6f0de61ed333a978a118b0e660, it was introduced in version v2.6.25 by commit ffd980f976e7fd666c2e61bf8ab35107efd11828. For more details please see the references link.
null
2021-12-19T23:09:29.230113Z
2021-06-30T00:25:02.486402Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ffd980f976e7fd666c2e61bf8ab35107efd11828'}
Linux
GSD-2021-1001635
KVM: x86: Handle SRCU initialization failure during page track init
KVM: x86: Handle SRCU initialization failure during page track init This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.71 by commit deb2949417677649e2413266d7ce8c2ff73952b4. For more details please see the references link.
null
2021-12-19T22:11:34.235493Z
2021-10-19T16:29:16.867737Z
null
null
null
null
null
Linux
GSD-2022-1000358
Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj
Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.181 by commit fe595759c2a4a5bb41c438474f15947d8ae32f5c, it was introduced in version v4.15 by commit c2e5df616e1ae6c2a074cb241ebb65a318ebaf7c. For more details please see the references link.
null
2022-03-07T01:42:52.976953Z
2022-02-27T02:56:08.403817Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c2e5df616e1ae6c2a074cb241ebb65a318ebaf7c'}
Linux
GSD-2022-1002365
video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe()
video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit dd3a6cc7385b89ec2303f39dfc3bafa4e24cec4b, it was introduced in version v3.2 by commit 3c8a63e22a0802fd56380f6ab305b419f18eb6f5. For more details please see the references link.
null
2022-04-25T03:19:49.344499Z
2022-04-24T22:39:25.436162Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c8a63e22a0802fd56380f6ab305b419f18eb6f5'}
Linux
GSD-2021-1001265
nfs: fix acl memory leak of posix_acl_create()
nfs: fix acl memory leak of posix_acl_create() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.52 by commit 4b515308ab875c7e8ada8e606fe0c64762da5ed4, it was introduced in version v3.14 by commit 013cdf1088d7235da9477a2375654921d9b9ba9f. For more details please see the references link.
null
2021-12-19T23:41:44.941321Z
2021-08-03T01:53:10.378036Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/013cdf1088d7235da9477a2375654921d9b9ba9f'}
Linux
GSD-2022-1000708
blktrace: fix use after free for struct blk_trace
blktrace: fix use after free for struct blk_trace This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.13 by commit 6418634238ade86f2b08192928787f39d8afb58c, it was introduced in version v5.12 by commit c0ea57608b691d6cde8aff23e11f9858a86b5918. For more details please see the references link.
null
2022-03-18T04:14:29.705744Z
2022-03-18T00:11:28.992815Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c0ea57608b691d6cde8aff23e11f9858a86b5918'}
Linux
GSD-2021-1002019
regmap: Fix possible double-free in regcache_rbtree_exit()
regmap: Fix possible double-free in regcache_rbtree_exit() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.157 by commit 1cead23c1c0bc766dacb900a3b0269f651ad596f, it was introduced in version v3.12 by commit 3f4ff561bc88b074d5e868dde4012d89cbb06c87. For more details please see the references link.
null
2021-12-19T22:43:19.649304Z
2021-11-14T15:16:11.624220Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f4ff561bc88b074d5e868dde4012d89cbb06c87'}
Linux
GSD-2021-1000024
dmaengine: idxd: fix wq size store permission state
dmaengine: idxd: fix wq size store permission state This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.16 by commit 05b7791c4c4aa8304368fdc55ae911f6b34e7281, it was introduced in version v5.6 by commit c52ca478233c172b2d322b5241d6279a8661cbba. For more details please see the references link.
null
2021-12-19T23:30:19.527804Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c52ca478233c172b2d322b5241d6279a8661cbba'}
Linux
GSD-2022-1001549
ptp: unregister virtual clocks when unregistering physical clock.
ptp: unregister virtual clocks when unregistering physical clock. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 9c796a57cbb5daf124a665689f0b2bc9262e0ced, it was introduced in version v5.14 by commit 73f37068d540eba5f93ba3a0019bf479d35ebd76. For more details please see the references link.
null
2022-04-25T06:32:40.514431Z
2022-04-24T21:22:30.806408Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/73f37068d540eba5f93ba3a0019bf479d35ebd76'}
Linux
GSD-2021-1002449
net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources()
net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.164 by commit e461a9816a1ac5b4aeb61621b817225b61e46a68, it was introduced in version v4.7 by commit ec25bc04ed8e12947738468cbe2191f1529f9e39. For more details please see the references link.
null
2021-12-19T22:00:12.288288Z
2021-12-19T19:37:51.717737Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ec25bc04ed8e12947738468cbe2191f1529f9e39'}
Linux
GSD-2021-1000474
bus: qcom: Put child node before return
bus: qcom: Put child node before return This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.233 by commit 94810fc52925eb122a922df7f9966cf3f4ba7391, it was introduced in version v4.9 by commit 335a127548081322bd2b294d715418648912f20c. For more details please see the references link.
null
2021-12-20T01:22:41.711491Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/335a127548081322bd2b294d715418648912f20c'}
Linux
GSD-2022-1001119
ubifs: Fix deadlock in concurrent rename whiteout and inode writeback
ubifs: Fix deadlock in concurrent rename whiteout and inode writeback This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 8b278c8dcfb565cb65eceb62a38cbf7a7c326db5, it was introduced in version v4.9 by commit 9e0a1fff8db56eaaebb74b4a3ef65f86811c4798. For more details please see the references link.
null
2022-04-25T04:39:34.645611Z
2022-04-24T20:47:11.290925Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9e0a1fff8db56eaaebb74b4a3ef65f86811c4798'}
Linux
GSD-2021-1000399
rtw88: Fix array overrun in rtw_get_tx_power_params()
rtw88: Fix array overrun in rtw_get_tx_power_params() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 95fb153c6027924cda3422120169d1890737f3a0, it was introduced in version v5.3 by commit fa6dfe6bff246ddd5be3cfe81637f137acd6c294. For more details please see the references link.
null
2021-12-19T23:09:50.135075Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fa6dfe6bff246ddd5be3cfe81637f137acd6c294'}
Linux
GSD-2021-1000663
net: usb: fix memory leak in smsc75xx_bind
net: usb: fix memory leak in smsc75xx_bind This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.193 by commit 9e6a3eccb28779710cbbafc4f4258d92509c6d07, it was introduced in version v2.6.34 by commit d0cad871703b898a442e4049c532ec39168e5b57. For more details please see the references link.
null
2021-12-19T23:57:41.867016Z
2021-06-04T19:57:22.375326Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0cad871703b898a442e4049c532ec39168e5b57'}
Linux
GSD-2021-1001971
comedi: ni_usb6501: fix NULL-deref in command paths
comedi: ni_usb6501: fix NULL-deref in command paths This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.255 by commit df7b1238f3b599a0b9284249772cdfd1ea83a632, it was introduced in version v3.18 by commit a03bb00e50ab4c07107da58a52a0bff7943f360c. For more details please see the references link.
null
2021-12-19T22:41:30.911780Z
2021-11-14T15:13:57.496442Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a03bb00e50ab4c07107da58a52a0bff7943f360c'}
Linux
GSD-2021-1000233
powerpc/64: Fix the definition of the fixmap area
powerpc/64: Fix the definition of the fixmap area This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit a84df7c80bdac598d6ac9268ae578da6928883e8, it was introduced in version v5.5 by commit 265c3491c4bc8d40587996d6ee2f447a7ccfb4f3. For more details please see the references link.
null
2021-12-20T01:02:00.331091Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/265c3491c4bc8d40587996d6ee2f447a7ccfb4f3'}
Linux
GSD-2021-1001588
HID: betop: fix slab-out-of-bounds Write in betop_probe
HID: betop: fix slab-out-of-bounds Write in betop_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.151 by commit fe9bb925e7096509711660d39c0493a1546e9550. For more details please see the references link.
null
2021-12-20T00:58:56.494095Z
2021-10-19T16:25:09.261793Z
null
null
null
null
null
Linux
GSD-2021-1001072
net: ethernet: fix potential use-after-free in ec_bhf_remove
net: ethernet: fix potential use-after-free in ec_bhf_remove This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit d11d79e52ba080ee567cb7d7eb42a5ade60a8130, it was introduced in version v3.15 by commit 6af55ff52b02d492d45db88df3e461fa51a6f753. For more details please see the references link.
null
2021-12-20T00:18:43.383926Z
2021-06-30T00:37:47.702360Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6af55ff52b02d492d45db88df3e461fa51a6f753'}
Linux
GSD-2022-1002172
mm/sparsemem: fix 'mem_section' will never be NULL gcc 12 warning
mm/sparsemem: fix 'mem_section' will never be NULL gcc 12 warning This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit fdfb9ae26161606952f4cc3c4e0c0984d5c81cb6, it was introduced in version v2.6.14 by commit 3e347261a80b57df792ab9464b5f0ed59add53a8. For more details please see the references link.
null
2022-04-25T06:43:30.250023Z
2022-04-24T22:18:30.811484Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3e347261a80b57df792ab9464b5f0ed59add53a8'}
Linux
GSD-2021-1001422
jfs: fix GPF in diFree
jfs: fix GPF in diFree This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.240 by commit 49def1b0644892e3b113673c13d650c3060b43bc. For more details please see the references link.
null
2021-12-20T00:35:09.988177Z
2021-08-03T02:36:14.184337Z
null
null
null
null
null
Linux
GSD-2022-1002488
video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow
video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit 47e5533adf118afaf06d25a3e2aaaab89371b1c5. For more details please see the references link.
null
2022-04-25T06:24:54.535439Z
2022-04-24T22:53:25.291140Z
null
null
null
null
null
Linux
GSD-2021-1001137
i2c: robotfuzz-osif: fix control-request directions
i2c: robotfuzz-osif: fix control-request directions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.14 by commit cdc9ae6b3bd46e71cd07a8a97f21ebd0207d36c2, it was introduced in version v3.14 by commit 83e53a8f120f2f273cf0ad717f5372ab79ac24fe. For more details please see the references link.
null
2021-12-19T23:25:02.906600Z
2021-07-08T01:58:56.030674Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/83e53a8f120f2f273cf0ad717f5372ab79ac24fe'}
Linux
GSD-2022-1002467
veth: Ensure eth header is in skb's linear part
veth: Ensure eth header is in skb's linear part This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit 3de2a02b60a4ef0ab76263216f08c7d095fc7c42, it was introduced in version v2.6.24 by commit e314dbdc1c0dc6a548ecf0afce28ecfd538ff568. For more details please see the references link.
null
2022-04-25T07:55:19.049653Z
2022-04-24T22:51:34.016107Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e314dbdc1c0dc6a548ecf0afce28ecfd538ff568'}
Linux
GSD-2021-1001567
tty: Fix out-of-bound vmalloc access in imageblit
tty: Fix out-of-bound vmalloc access in imageblit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.209 by commit 8a6a240f52e14356386030d8958ae8b1761d2325. For more details please see the references link.
null
2021-12-20T00:53:56.346020Z
2021-10-19T16:24:07.414411Z
null
null
null
null
null
Linux
GSD-2022-1002037
KVM: x86/mmu: do compare-and-exchange of gPTE via the user address
KVM: x86/mmu: do compare-and-exchange of gPTE via the user address This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit e90518d10c7dd59d5ebbe25b0f0083a7dbffa42f, it was introduced in version v5.2 by commit bd53cb35a3e9adb73a834a36586e9ad80e877767. For more details please see the references link.
null
2022-04-25T06:45:43.889299Z
2022-04-24T22:05:13.832191Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bd53cb35a3e9adb73a834a36586e9ad80e877767'}
Linux
GSD-2021-1000726
nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect
nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.272 by commit 39c15bd2e5d11bcf7f4c3dba2aad9e1e110a5d94, it was introduced in version v3.3 by commit d646960f7986fefb460a2b062d5ccc8ccfeacc3a. For more details please see the references link.
null
2021-12-20T01:08:32.933848Z
2021-06-24T23:59:29.257871Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d646960f7986fefb460a2b062d5ccc8ccfeacc3a'}
Linux
GSD-2021-1001834
scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els()
scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit 96f0aebf29be25254fa585af43924e34aa21fd9a, it was introduced in version v3.11 by commit 8c0eb596baa51f2b43949c698c644727ef17805c. For more details please see the references link.
null
2021-12-20T00:15:20.167434Z
2021-10-28T13:51:22.912857Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c0eb596baa51f2b43949c698c644727ef17805c'}
Linux
GSD-2021-1000376
drm/amd/display: Fix off by one in hdmi_14_process_transaction()
drm/amd/display: Fix off by one in hdmi_14_process_transaction() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 403c4528e5887af3deb9838cb77a557631d1e138, it was introduced in version v5.5 by commit 4c283fdac08abf3211533f70623c90a34f41d08d. For more details please see the references link.
null
2021-12-20T01:11:36.528960Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4c283fdac08abf3211533f70623c90a34f41d08d'}
Linux
GSD-2022-1000909
iio: adc: men_z188_adc: Fix a resource leak in an error handling path
iio: adc: men_z188_adc: Fix a resource leak in an error handling path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.232 by commit 53d43a9c8dd224e66559fe86af1e473802c7130e, it was introduced in version v3.15 by commit 74aeac4da66fbfa246edbfc849002eac9b5af9ca. For more details please see the references link.
null
2022-03-18T02:55:11.933297Z
2022-03-18T00:30:41.810972Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/74aeac4da66fbfa246edbfc849002eac9b5af9ca'}
Linux
GSD-2022-1000323
parisc: Fix data TLB miss in sba_unmap_sg
parisc: Fix data TLB miss in sba_unmap_sg This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.231 by commit 867e50231c7605547d9334904d70a181f39f2d9e. For more details please see the references link.
null
2022-03-07T01:47:49.898295Z
2022-02-27T02:51:27.231499Z
null
null
null
null
null
Linux
GSD-2022-1000289
net: fix a memleak when uncloning an skb dst and its metadata
net: fix a memleak when uncloning an skb dst and its metadata This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.302 by commit 4ac84498fbe84a00e7aef185e2bb3e40ce71eca4, it was introduced in version v4.3 by commit fc4099f17240767554ff3a73977acb78ef615404. For more details please see the references link.
null
2022-03-07T01:43:13.418214Z
2022-02-27T02:38:47.014694Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fc4099f17240767554ff3a73977acb78ef615404'}
Linux
GSD-2022-1001861
ptp: unregister virtual clocks when unregistering physical clock.
ptp: unregister virtual clocks when unregistering physical clock. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit b2dea2a696d09163da4cd33cb598ce1f73e86597, it was introduced in version v5.14 by commit 73f37068d540eba5f93ba3a0019bf479d35ebd76. For more details please see the references link.
null
2022-04-25T03:11:10.943332Z
2022-04-24T21:49:10.594608Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/73f37068d540eba5f93ba3a0019bf479d35ebd76'}
Linux
GSD-2022-1000773
netfilter: fix use-after-free in __nf_register_net_hook()
netfilter: fix use-after-free in __nf_register_net_hook() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.27 by commit bd61f192a339b1095dfd6d56073a5265934c2979, it was introduced in version v4.14 by commit 2420b79f8c18a75ee2417cace381f4604b9b4365. For more details please see the references link.
null
2022-03-18T02:55:57.272475Z
2022-03-18T00:17:10.106186Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2420b79f8c18a75ee2417cace381f4604b9b4365'}
Linux
GSD-2021-1002062
drm/ttm: fix memleak in ttm_transfered_destroy
drm/ttm: fix memleak in ttm_transfered_destroy This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.77 by commit c21b4002214c1c7e7b627b9b53375612f7aab6db. For more details please see the references link.
null
2021-12-19T22:25:45.339978Z
2021-11-14T15:18:04.820244Z
null
null
null
null
null
Linux
GSD-2021-1002598
btrfs: free exchange changeset on failures
btrfs: free exchange changeset on failures This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.8 by commit ca06c5cb1b6dbfe67655b33c02fc394d65824519. For more details please see the references link.
null
2021-12-20T01:03:05.767799Z
2021-12-19T19:44:29.530039Z
null
null
null
null
null
Linux
GSD-2022-1001532
power: supply: wm8350-power: Add missing free in free_charger_irq
power: supply: wm8350-power: Add missing free in free_charger_irq This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit ae07ec8110ba83295c88bff7e85835cc2f6cc4ea, it was introduced in version v2.6.29 by commit 14431aa0c5a443d13d24e6f865a8838f97dab973. For more details please see the references link.
null
2022-04-25T05:06:05.479005Z
2022-04-24T21:20:51.138004Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/14431aa0c5a443d13d24e6f865a8838f97dab973'}
Linux
GSD-2022-1001498
NFS: remove unneeded check in decode_devicenotify_args()
NFS: remove unneeded check in decode_devicenotify_args() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit e53f2f987435aa8ff208f3ef7a6e90862c8cb71b, it was introduced in version v4.0 by commit a4f743a6bb201662962fa888e3f978583d61691e. For more details please see the references link.
null
2022-04-25T04:27:07.311851Z
2022-04-24T21:17:24.747604Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a4f743a6bb201662962fa888e3f978583d61691e'}
Linux
GSD-2021-1002432
iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove
iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.221 by commit a3730f74159ad00a28960c0efe2a931fe6fe6b45, it was introduced in version v4.2 by commit a25691c1f9674090fb66586cf4c5d60d3efdf339. For more details please see the references link.
null
2021-12-19T23:59:06.805383Z
2021-12-19T19:37:03.421760Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a25691c1f9674090fb66586cf4c5d60d3efdf339'}
Linux
GSD-2022-1001162
selinux: allow FIOCLEX and FIONCLEX with policy capability
selinux: allow FIOCLEX and FIONCLEX with policy capability This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit b531d4ead7990638c4d0402de1f6b3c6f4aa81be. For more details please see the references link.
null
2022-04-25T04:55:44.258139Z
2022-04-24T20:49:38.356468Z
null
null
null
null
null
Linux
GSD-2022-1001477
PM: core: keep irq flags in device_pm_check_callbacks()
PM: core: keep irq flags in device_pm_check_callbacks() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 2add538e57a2825c61d639260386f385c75e4166. For more details please see the references link.
null
2022-04-25T04:45:13.119067Z
2022-04-24T21:15:44.752588Z
null
null
null
null
null
Linux
GSD-2021-1002127
drm/ttm: fix memleak in ttm_transfered_destroy
drm/ttm: fix memleak in ttm_transfered_destroy This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.16 by commit 132a3d998d6753047f22152731fba2b0d6b463dd. For more details please see the references link.
null
2021-12-20T01:02:56.399969Z
2021-11-14T15:21:09.969285Z
null
null
null
null
null
Linux
GSD-2022-1001027
drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire()
drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit fe7929ff9ee0bf3514c69c3c298b3819f91e7d99, it was introduced in version v4.13 by commit 71c37505e7eaa01fa259debad1a71a7ae061039d. For more details please see the references link.
null
2022-04-25T03:46:19.040551Z
2022-04-24T20:41:08.867853Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/71c37505e7eaa01fa259debad1a71a7ae061039d'}
Linux
GSD-2021-1002577
xhci: Fix commad ring abort, write all 64 bits to CRCR register.
xhci: Fix commad ring abort, write all 64 bits to CRCR register. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.7 by commit fa75f593c867cde772e2d87ca36ab735c4aa4a09, it was introduced in version v5.15 by commit ff0e50d3564f33b7f4b35cadeabd951d66cfc570. For more details please see the references link.
null
2021-12-19T23:08:54.122234Z
2021-12-19T19:43:30.731465Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ff0e50d3564f33b7f4b35cadeabd951d66cfc570'}
Linux
GSD-2022-1000266
yam: fix a memory leak in yam_siocdevprivate()
yam: fix a memory leak in yam_siocdevprivate() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.19 by commit 0690c3943ed0fa76654e600eca38cde6a13c87ac, it was introduced in version v4.19 by commit 0781168e23a2fc8dceb989f11fc5b39b3ccacc35. For more details please see the references link.
null
2022-02-20T06:32:18.288077Z
2022-02-18T22:04:01.426771Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0781168e23a2fc8dceb989f11fc5b39b3ccacc35'}
Linux
GSD-2021-1002824
asix: fix uninit-value in asix_mdio_read()
asix: fix uninit-value in asix_mdio_read() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.12 by commit d259f621c85949f30cc578cac813b82bb5169f56, it was introduced in version v4.9 by commit d9fe64e511144c1ee7d7555b4111f09dde9692ef. For more details please see the references link.
null
2022-01-11T05:55:53.189916Z
2021-12-30T02:45:02.133172Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9fe64e511144c1ee7d7555b4111f09dde9692ef'}
Linux
GSD-2021-1000819
btrfs: fixup error handling in fixup_inode_link_counts
btrfs: fixup error handling in fixup_inode_link_counts This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.10 by commit 4cd303735bdfacd115ee20a6f3235b0084924174, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T00:15:15.638997Z
2021-06-25T00:09:22.655379Z
null
null
null
null
null
Linux
GSD-2022-1001924
can: m_can: m_can_tx_handler(): fix use after free of skb
can: m_can: m_can_tx_handler(): fix use after free of skb This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit f43e64076ff1b1dcb893fb77ad1204105f710a29, it was introduced in version v3.18 by commit 80646733f11c2e9de3b6339f7e635047e6087280. For more details please see the references link.
null
2022-04-25T06:16:22.681959Z
2022-04-24T21:55:26.793276Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80646733f11c2e9de3b6339f7e635047e6087280'}
Linux
GSD-2022-1000636
PCI: pciehp: Fix infinite loop in IRQ handler upon power fault
PCI: pciehp: Fix infinite loop in IRQ handler upon power fault This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.6 by commit 6d6f1f0dac3e3441ecdb1103d4efb11b9ed24dd5, it was introduced in version v5.7 by commit 8edf5332c39340b9583cf9cba659eb7ec71f75b5. For more details please see the references link.
null
2022-03-07T01:38:59.708194Z
2022-02-27T03:33:56.732795Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8edf5332c39340b9583cf9cba659eb7ec71f75b5'}
Linux
GSD-2021-1001475
nfs: fix acl memory leak of posix_acl_create()
nfs: fix acl memory leak of posix_acl_create() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.276 by commit 2e3960f276b4574a9bb0dfa31a7497302f6363b2, it was introduced in version v3.14 by commit 013cdf1088d7235da9477a2375654921d9b9ba9f. For more details please see the references link.
null
2021-12-20T00:45:18.423270Z
2021-08-03T02:52:44.185578Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/013cdf1088d7235da9477a2375654921d9b9ba9f'}
Linux
GSD-2022-1002125
mm/kmemleak: reset tag when compare object pointer
mm/kmemleak: reset tag when compare object pointer This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit d5d5804acc16fce9726fbbd006660d8642e2c459. For more details please see the references link.
null
2022-04-25T06:07:46.255131Z
2022-04-24T22:13:55.081453Z
null
null
null
null
null
Linux
GSD-2022-1000118
select: Fix indefinitely sleeping task in poll_schedule_timeout()
select: Fix indefinitely sleeping task in poll_schedule_timeout() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.227 by commit 6717900f775a6129a7b4d03ba4922218d8bf1caa. For more details please see the references link.
null
2022-02-19T15:35:18.690314Z
2022-02-18T21:43:07.301997Z
null
null
null
null
null
Linux
GSD-2021-1001025
ftrace: Do not blindly read the ip address in ftrace_bug()
ftrace: Do not blindly read the ip address in ftrace_bug() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit 3e4ddeb68751fb4fb657199aed9cfd5d02796875, it was introduced in version v2.6.28 by commit 05736a427f7e16be948ccbf39782bd3a6ae16b14. For more details please see the references link.
null
2021-12-19T22:35:18.124244Z
2021-06-30T00:34:40.155348Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/05736a427f7e16be948ccbf39782bd3a6ae16b14'}
Linux
GSD-2022-1000548
ipv6: mcast: use rcu-safe version of ipv6_get_lladdr()
ipv6: mcast: use rcu-safe version of ipv6_get_lladdr() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit 27f567c84f446048670376827e356f9c92033bf9, it was introduced in version v5.13 by commit 88e2ca3080947fe22eb520c1f8231e79a105d011. For more details please see the references link.
null
2022-03-07T01:44:10.660438Z
2022-02-27T03:22:37.716052Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/88e2ca3080947fe22eb520c1f8231e79a105d011'}
Linux
GSD-2021-1000264
Bluetooth: avoid deadlock between hci_dev->lock and socket lock
Bluetooth: avoid deadlock between hci_dev->lock and socket lock This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 332e69eb3bd90370f2d9f2c2ca7974ff523dea17, it was introduced in version v5.7 by commit eab2404ba798a8efda2a970f44071c3406d94e57. For more details please see the references link.
null
2021-12-19T23:26:21.354548Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/eab2404ba798a8efda2a970f44071c3406d94e57'}
Linux
GSD-2021-1002259
NFC: reorder the logic in nfc_{un,}register_device
NFC: reorder the logic in nfc_{un,}register_device This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.162 by commit 307d2e6cebfca9d92f86c8e2c8e3dd4a8be46ba6, it was introduced in version v3.10 by commit be055b2f89b5842f41363b5655a33dffb51a8294. For more details please see the references link.
null
2021-12-19T22:15:10.245997Z
2021-11-29T02:35:46.854341Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/be055b2f89b5842f41363b5655a33dffb51a8294'}
Linux
GSD-2022-1001709
ceph: fix memory leak in ceph_readdir when note_last_dentry returns error
ceph: fix memory leak in ceph_readdir when note_last_dentry returns error This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 2fe82d3254029ef9ec4e7be890125d5ef4f537de. For more details please see the references link.
null
2022-04-25T06:53:52.815955Z
2022-04-24T21:36:52.245644Z
null
null
null
null
null
Linux
GSD-2021-1000634
NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()
NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.124 by commit 785917316b25685c9b3a2a88f933139f2de75e33, it was introduced in version v4.0 by commit a7d42ddb3099727f58366fa006f850a219cce6c8. For more details please see the references link.
null
2021-12-19T22:00:29.524836Z
2021-06-04T19:51:28.108004Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a7d42ddb3099727f58366fa006f850a219cce6c8'}
Linux
GSD-2021-1002609
iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove
iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.8 by commit 14508fe13b1c578b3d2ba574f1d48b351975860c, it was introduced in version v4.2 by commit a25691c1f9674090fb66586cf4c5d60d3efdf339. For more details please see the references link.
null
2021-12-19T22:19:36.920930Z
2021-12-19T19:44:56.210659Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a25691c1f9674090fb66586cf4c5d60d3efdf339'}
Linux
GSD-2021-1001926
scsi: core: Put LLD module refcnt after SCSI device is released
scsi: core: Put LLD module refcnt after SCSI device is released This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.292 by commit 1105573d964f7b78734348466b01f5f6ba8a1813. For more details please see the references link.
null
2021-12-19T23:35:58.893545Z
2021-11-14T15:12:00.373278Z
null
null
null
null
null
Linux
GSD-2022-1001359
net: openvswitch: fix leak of nested actions
net: openvswitch: fix leak of nested actions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 3554c214b83ec9a839ed574263a34218f372990c, it was introduced in version v4.3 by commit 34ae932a40369be6bd6ea97d66b6686361b4370d. For more details please see the references link.
null
2022-04-25T05:08:18.567197Z
2022-04-24T21:07:42.163258Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/34ae932a40369be6bd6ea97d66b6686361b4370d'}
Linux
GSD-2021-1000321
userfaultfd: release page in error path to avoid BUG_ON
userfaultfd: release page in error path to avoid BUG_ON This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.38 by commit 140cfd9980124aecb6c03ef2e69c72d0548744de, it was introduced in version v4.11 by commit cb658a453b9327ce96ce5222c24d162b5b65b564. For more details please see the references link.
null
2021-12-20T00:36:33.937448Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cb658a453b9327ce96ce5222c24d162b5b65b564'}
Linux
GSD-2021-1000771
wireguard: allowedips: free empty intermediate nodes when removing single node
wireguard: allowedips: free empty intermediate nodes when removing single node This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.43 by commit df3b45f6d1ce605120750b983fc4448e3769619a, it was introduced in version v5.6 by commit e7096c131e5161fa3b8e52a650d7719d2857adfd. For more details please see the references link.
null
2021-12-20T00:55:56.442188Z
2021-06-25T00:04:34.100116Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e7096c131e5161fa3b8e52a650d7719d2857adfd'}
Linux
GSD-2021-1001863
xhci: Fix command ring pointer corruption while aborting a command
xhci: Fix command ring pointer corruption while aborting a command This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.75 by commit dec944bb7079b37968cf69c8a438f91f15c4cc61. For more details please see the references link.
null
2021-12-19T22:55:37.332132Z
2021-10-28T13:52:52.210984Z
null
null
null
null
null
Linux
GSD-2022-1002060
lib/test: use after free in register_test_dev_kmod()
lib/test: use after free in register_test_dev_kmod() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 327f07e3704c821ce33e54ef5046bdf69975cb86, it was introduced in version v4.13 by commit d9c6a72d6fa29d3a7999dda726577e5d1fccafa5. For more details please see the references link.
null
2022-04-25T06:02:55.921513Z
2022-04-24T22:06:27.623777Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9c6a72d6fa29d3a7999dda726577e5d1fccafa5'}
Linux
GSD-2021-1001530
ipack: ipoctal: fix module reference leak
ipack: ipoctal: fix module reference leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.249 by commit dde4c1429b97383689f755ce92b4ed1e84a9c92b, it was introduced in version v3.18 by commit 82a82340bab6c251e0705339f60763718eaa2a22. For more details please see the references link.
null
2021-12-20T00:10:47.703277Z
2021-10-19T16:22:27.265213Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/82a82340bab6c251e0705339f60763718eaa2a22'}
Linux
GSD-2022-1002430
NFS: remove unneeded check in decode_devicenotify_args()
NFS: remove unneeded check in decode_devicenotify_args() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit a5ddd85bad671bee4a98e1dee3c23e8aff78288f, it was introduced in version v4.0 by commit a4f743a6bb201662962fa888e3f978583d61691e. For more details please see the references link.
null
2022-04-25T05:51:38.348915Z
2022-04-24T22:46:12.609462Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a4f743a6bb201662962fa888e3f978583d61691e'}
Linux
GSD-2021-1001160
bpf, sockmap: Fix potential memory leak on unlikely error case
bpf, sockmap: Fix potential memory leak on unlikely error case This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.6 by commit 6c508a1c6c62793dc6e6872cad4b200097bab7c9, it was introduced in version v5.10 by commit 4363023d2668e621b0743db351a9555d6e6ea57e. For more details please see the references link.
null
2021-12-19T23:34:35.487780Z
2021-08-03T01:31:27.433300Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4363023d2668e621b0743db351a9555d6e6ea57e'}
Linux
GSD-2022-1001135
drm/dp: Fix off-by-one in register cache size
drm/dp: Fix off-by-one in register cache size This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit ab096ec04c902d351ea1fce3acb8ef9f4a25fc51, it was introduced in version v5.12 by commit e2e16da398d9149ede0162a55f44537582aed2e7. For more details please see the references link.
null
2022-04-25T03:10:44.805234Z
2022-04-24T20:48:08.875384Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e2e16da398d9149ede0162a55f44537582aed2e7'}
Linux
GSD-2021-1002465
iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove
iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.165 by commit 8c163a14277115ca962103910ab4cce55e862ffb, it was introduced in version v4.2 by commit a25691c1f9674090fb66586cf4c5d60d3efdf339. For more details please see the references link.
null
2021-12-20T01:12:15.887105Z
2021-12-19T19:38:30.577654Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a25691c1f9674090fb66586cf4c5d60d3efdf339'}
Linux
GSD-2021-1000458
soundwire: stream: fix memory leak in stream config error path
soundwire: stream: fix memory leak in stream config error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.191 by commit 342260fe821047c3d515e3d28085d73fbdce3e80, it was introduced in version v4.18 by commit 89e590535f32d4bc548bcf266f3b046e50942f6d. For more details please see the references link.
null
2021-12-19T23:55:51.980626Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/89e590535f32d4bc548bcf266f3b046e50942f6d'}
Linux
GSD-2022-1001565
media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED
media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 2874122ca4ca74adec72d6d6bf8828228ec20f15, it was introduced in version v3.7 by commit 8ac456495a33d9466076fea94594181ceefb76d9. For more details please see the references link.
null
2022-04-25T04:24:14.330428Z
2022-04-24T21:24:20.154121Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ac456495a33d9466076fea94594181ceefb76d9'}
Linux
GSD-2021-1002035
NFC: digital: fix possible memory leak in digital_in_send_sdd_req()
NFC: digital: fix possible memory leak in digital_in_send_sdd_req() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.75 by commit 50cb95487c265187289810addec5093d4fed8329, it was introduced in version v3.13 by commit 2c66daecc4092e6049673c281b2e6f0d5e59a94c. For more details please see the references link.
null
2021-12-20T01:41:42.146758Z
2021-11-14T15:16:57.292142Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c66daecc4092e6049673c281b2e6f0d5e59a94c'}
Linux
GSD-2022-1001836
Revert "RDMA/core: Fix ib_qp_usecnt_dec() called when error"
Revert "RDMA/core: Fix ib_qp_usecnt_dec() called when error" This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit b089f7fc89f9a106c24bfc9d8f0bbf67df84fc3f, it was introduced in version v5.15.33 by commit 4c3c666ecc6a287f367c2e0b53fa2e48e548820d. For more details please see the references link.
null
2022-04-24T21:46:35.712726Z
2022-04-24T21:46:35.712726Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4c3c666ecc6a287f367c2e0b53fa2e48e548820d'}
Linux
GSD-2022-1000724
btrfs: prevent copying too big compressed lzo segment
btrfs: prevent copying too big compressed lzo segment This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.12 by commit e326bd06cdde46df952361456232022298281d16. For more details please see the references link.
null
2022-03-18T02:52:08.374369Z
2022-03-18T00:12:19.575891Z
null
null
null
null
null
Linux
GSD-2021-1001249
bpf: Fix tail_call_reachable rejection for interpreter when jit failed
bpf: Fix tail_call_reachable rejection for interpreter when jit failed This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.54 by commit 39f1735c8107ef43a53c4daf82f330d880488d8f, it was introduced in version v5.10 by commit ebf7d1f508a73871acf3b2bfbfa1323a477acdb3. For more details please see the references link.
null
2021-12-20T01:37:50.295115Z
2021-08-03T01:48:26.199616Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ebf7d1f508a73871acf3b2bfbfa1323a477acdb3'}
Linux
GSD-2022-1000374
net: do not keep the dst cache when uncloning an skb dst and its metadata
net: do not keep the dst cache when uncloning an skb dst and its metadata This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.101 by commit 2e9fd2d0f69e4cc82a9a497bb14c1d70e75cc430, it was introduced in version v4.6 by commit d71785ffc7e7cae3fbdc4ea8a9d05b7a1c59f7b8. For more details please see the references link.
null
2022-03-07T01:44:25.707297Z
2022-02-27T02:57:56.182587Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d71785ffc7e7cae3fbdc4ea8a9d05b7a1c59f7b8'}
Linux
GSD-2022-1002349
af_netlink: Fix shift out of bounds in group mask calculation
af_netlink: Fix shift out of bounds in group mask calculation This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit f75f4abeec4c04b600a15b50c89a481f1e7435ee, it was introduced in version v2.6.14 by commit f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198. For more details please see the references link.
null
2022-04-25T05:38:15.084731Z
2022-04-24T22:36:58.387601Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198'}
Linux
GSD-2021-1001619
powerpc/64s: fix program check interrupt emergency stack path
powerpc/64s: fix program check interrupt emergency stack path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.73 by commit 411b38fe68ba20a8bbe724b0939762c3f16e16ca, it was introduced in version v5.3 by commit 0a882e28468f48ab3d9a36dde0a5723ea29ed1ed. For more details please see the references link.
null
2021-12-20T01:36:07.453578Z
2021-10-19T16:28:35.087968Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0a882e28468f48ab3d9a36dde0a5723ea29ed1ed'}
Linux
GSD-2022-1001973
lz4: fix LZ4_decompress_safe_partial read out of bound
lz4: fix LZ4_decompress_safe_partial read out of bound This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit 6adc01a7aa37445dafe8846faa0610a86029b253. For more details please see the references link.
null
2022-04-25T08:47:48.203662Z
2022-04-24T21:59:52.749930Z
null
null
null
null
null
Linux
GSD-2022-1000661
dma-buf: heaps: Fix potential spectre v1 gadget
dma-buf: heaps: Fix potential spectre v1 gadget This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.8 by commit cc8f7940d9c2d45f67b3d1a2f2b7a829ca561bed, it was introduced in version v5.5 by commit a69b0e855d3fd278ff6f09a23e1edf929538e304. For more details please see the references link.
null
2022-03-07T01:49:07.977313Z
2022-02-27T03:37:25.147637Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a69b0e855d3fd278ff6f09a23e1edf929538e304'}
Linux
GSD-2022-1000231
scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe
scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.99 by commit ec4334152dae175dbd8fd5bde1d2139bbe7b42d0, it was introduced in version v3.16 by commit d576a5e80cd07ea7049f8fd7b303c14df7b5d7d2. For more details please see the references link.
null
2022-02-19T09:27:53.154418Z
2022-02-18T21:59:06.573627Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d576a5e80cd07ea7049f8fd7b303c14df7b5d7d2'}
Linux
GSD-2021-1002520
nfsd: fix use-after-free due to delegation race
nfsd: fix use-after-free due to delegation race This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.85 by commit eeb0711801f5e19ef654371b627682aed3b11373. For more details please see the references link.
null
2021-12-20T00:12:12.602732Z
2021-12-19T19:40:56.497174Z
null
null
null
null
null
Linux
GSD-2022-1001070
ref_tracker: implement use-after-free detection
ref_tracker: implement use-after-free detection This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 3743c9de303fa36c2e2ca2522ab280c52bcafbd2. For more details please see the references link.
null
2022-04-25T06:17:42.464295Z
2022-04-24T20:43:25.744025Z
null
null
null
null
null
Linux
GSD-2021-1002170
ocfs2: fix data corruption after conversion from inline format
ocfs2: fix data corruption after conversion from inline format This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 5314454ea3ff6fc746eaf71b9a7ceebed52888fa, it was introduced in version v5.10 by commit 6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b. For more details please see the references link.
null
2021-12-19T23:10:34.499549Z
2021-11-14T15:23:04.549931Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b'}