ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2022-1002406
MIPS: fix fortify panic when copying asm exception handlers
MIPS: fix fortify panic when copying asm exception handlers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit e7036df78359213bbf104b342a28ba67aba8c9b8. For more details please see the references link.
null
2022-04-25T05:16:13.608739Z
2022-04-24T22:43:56.811171Z
null
null
null
null
null
Linux
GSD-2022-1000591
scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe
scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.22 by commit 2f5a1ac68bdf2899ce822ab845081922ea8c588e, it was introduced in version v3.16 by commit d576a5e80cd07ea7049f8fd7b303c14df7b5d7d2. For more details please see the references link.
null
2022-03-07T01:39:40.094812Z
2022-02-27T03:28:14.402307Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d576a5e80cd07ea7049f8fd7b303c14df7b5d7d2'}
Linux
GSD-2021-1001506
phy: mdio: fix memory leak
phy: mdio: fix memory leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.287 by commit 2250392d930bd0d989f24d355d6355b0150256e7, it was introduced in version v2.6.28 by commit 46abc02175b3c246dd5141d878f565a8725060c9. For more details please see the references link.
null
2021-12-20T00:47:30.514286Z
2021-10-19T16:21:19.063426Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/46abc02175b3c246dd5141d878f565a8725060c9'}
Linux
GSD-2022-1002056
selinux: allow FIOCLEX and FIONCLEX with policy capability
selinux: allow FIOCLEX and FIONCLEX with policy capability This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 448857f58009fd950f4d732e8f1e4fcf859cb4b1. For more details please see the references link.
null
2022-04-25T06:01:29.842229Z
2022-04-24T22:06:11.282115Z
null
null
null
null
null
Linux
GSD-2021-1001855
NFC: digital: fix possible memory leak in digital_in_send_sdd_req()
NFC: digital: fix possible memory leak in digital_in_send_sdd_req() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.75 by commit 50cb95487c265187289810addec5093d4fed8329, it was introduced in version v3.13 by commit 2c66daecc4092e6049673c281b2e6f0d5e59a94c. For more details please see the references link.
null
2021-12-19T23:05:16.740784Z
2021-10-28T13:52:23.124431Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c66daecc4092e6049673c281b2e6f0d5e59a94c'}
Linux
GSD-2021-1000747
ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions
ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.125 by commit 7ba7fa78a92dc410b6f93ed73075ab669c3a0b59, it was introduced in version v5.3 by commit f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74. For more details please see the references link.
null
2021-12-20T00:29:18.864222Z
2021-06-25T00:02:09.537385Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74'}
Linux
GSD-2021-1002280
NFC: add NCI_UNREG flag to eliminate the race
NFC: add NCI_UNREG flag to eliminate the race This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.82 by commit 34e54703fb0fdbfc0a3cfc065d71e9a8353d3ac9, it was introduced in version v3.2 by commit 6a2968aaf50c7a22fced77a5e24aa636281efca8. For more details please see the references link.
null
2021-12-19T23:04:27.760078Z
2021-11-29T02:36:50.322472Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6a2968aaf50c7a22fced77a5e24aa636281efca8'}
Linux
GSD-2022-1001380
staging: vchiq_arm: Avoid NULL ptr deref in vchiq_dump_platform_instances
staging: vchiq_arm: Avoid NULL ptr deref in vchiq_dump_platform_instances This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 4627250cabaa80278d3ab01ad107893cea83799f. For more details please see the references link.
null
2022-04-25T06:34:38.656601Z
2022-04-24T21:09:18.309860Z
null
null
null
null
null
Linux
GSD-2021-1000317
kyber: fix out of bounds access when preempted
kyber: fix out of bounds access when preempted This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.38 by commit 54dbe2d2c1fcabf650c7a8b747601da355cd7f9f, it was introduced in version v4.18 by commit a6088845c2bf754d6cb2572b484180680b037804. For more details please see the references link.
null
2021-12-19T23:59:20.446900Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a6088845c2bf754d6cb2572b484180680b037804'}
Linux
GSD-2022-1000968
spi: cadence-quadspi: fix protocol setup for non-1-1-X operations
spi: cadence-quadspi: fix protocol setup for non-1-1-X operations This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.4 by commit f3d8b6f4bc6160ab279573c4567ef7e9dd513c10. For more details please see the references link.
null
2022-04-25T04:28:42.425171Z
2022-04-24T20:35:49.738143Z
null
null
null
null
null
Linux
GSD-2022-1000987
SUNRPC: Fix the svc_deferred_event trace class
SUNRPC: Fix the svc_deferred_event trace class This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.4 by commit c2456f470eea3bd06574d988bf6089e7c3f4c5cc, it was introduced in version v4.17 by commit ece200ddd54b9ce840cfee554fb812560c545c7d. For more details please see the references link.
null
2022-04-25T04:39:02.243419Z
2022-04-24T20:37:28.373772Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ece200ddd54b9ce840cfee554fb812560c545c7d'}
Linux
GSD-2022-1001695
jfs: prevent NULL deref in diFree
jfs: prevent NULL deref in diFree This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit d925b7e78b62805fcc5440d1521181c82b6f03cb. For more details please see the references link.
null
2022-04-25T04:27:47.358415Z
2022-04-24T21:35:55.594978Z
null
null
null
null
null
Linux
GSD-2021-1001910
dm: fix mempool NULL pointer race when completing IO
dm: fix mempool NULL pointer race when completing IO This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit 6e506f07c5b561d673dd0b0d8f7f420cc48024fb. For more details please see the references link.
null
2021-12-20T01:19:23.032347Z
2021-10-28T13:55:17.410430Z
null
null
null
null
null
Linux
GSD-2021-1000602
NFS: Fix an Oopsable condition in __nfs_pageio_add_request()
NFS: Fix an Oopsable condition in __nfs_pageio_add_request() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit ee21cd3aa8548e0cbc8c67a80b62113aedd2d101, it was introduced in version v4.0 by commit a7d42ddb3099727f58366fa006f850a219cce6c8. For more details please see the references link.
null
2021-12-19T22:13:51.040858Z
2021-06-04T19:45:40.437405Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a7d42ddb3099727f58366fa006f850a219cce6c8'}
Linux
GSD-2021-1002795
ipmi: ssif: initialize ssif_info->client early
ipmi: ssif: initialize ssif_info->client early This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.169 by commit 8efd6a3391f7b0b19fb0c38e50add06ca30c94af, it was introduced in version v5.4 by commit c4436c9149c5d2bc0c49ab57ec85c75ea1c4d61c. For more details please see the references link.
null
2022-01-11T05:57:35.961010Z
2021-12-30T02:43:44.221316Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c4436c9149c5d2bc0c49ab57ec85c75ea1c4d61c'}
Linux
GSD-2021-1000252
mt76: mt7615: fix memory leak in mt7615_coredump_work
mt76: mt7615: fix memory leak in mt7615_coredump_work This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 54b989653c5531bc4416ced33f146b9cb633d978, it was introduced in version v5.12 by commit d2bf7959d9c0f631ef860edaf834d55773fdedff. For more details please see the references link.
null
2021-12-20T01:15:47.144502Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d2bf7959d9c0f631ef860edaf834d55773fdedff'}
Linux
GSD-2022-1000084
ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback
ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.300 by commit 45b96488ec4cf10818c2457ada05fa8d660161cc, it was introduced in version v4.9.248 by commit 9f7e83674411bb1475e7ecd67df62c525fd7eec4. For more details please see the references link.
null
2022-02-19T09:28:03.381003Z
2022-02-18T21:33:24.567386Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9f7e83674411bb1475e7ecd67df62c525fd7eec4'}
Linux
GSD-2021-1001013
wq: handle VM suspension in stall detection
wq: handle VM suspension in stall detection This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit 8b30908df8d53db5ccb7f1bcd1c97d3aa75bbd62. For more details please see the references link.
null
2021-12-20T01:29:00.921650Z
2021-06-30T00:33:55.367101Z
null
null
null
null
null
Linux
GSD-2022-1002113
f2fs: fix compressed file start atomic write may cause data corruption
f2fs: fix compressed file start atomic write may cause data corruption This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit d2c53e77b0431a0954f0655cc517abb6309f6a79, it was introduced in version v5.6 by commit 4c8ff7095bef64fc47e996a938f7d57f9e077da3. For more details please see the references link.
null
2022-04-25T05:06:12.845471Z
2022-04-24T22:12:55.117390Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4c8ff7095bef64fc47e996a938f7d57f9e077da3'}
Linux
GSD-2021-1001443
memory: fsl_ifc: fix leak of private memory on probe failure
memory: fsl_ifc: fix leak of private memory on probe failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.276 by commit 3b45b8a7d549bd92ec94b5357c2c2c1a7ed107e4, it was introduced in version v3.3 by commit a20cbdeffce247a2b6fb83cd8d22433994068565. For more details please see the references link.
null
2021-12-20T01:37:58.930887Z
2021-08-03T02:43:06.728458Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a20cbdeffce247a2b6fb83cd8d22433994068565'}
Linux
GSD-2022-1000600
Bluetooth: refactor malicious adv data check
Bluetooth: refactor malicious adv data check This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit 5c968affa804ba98c3c603f37ffea6fba618025e. For more details please see the references link.
null
2022-03-07T02:24:14.168035Z
2022-02-27T03:29:14.575633Z
null
null
null
null
null
Linux
GSD-2022-1001912
mm,hwpoison: unmap poisoned page before invalidation
mm,hwpoison: unmap poisoned page before invalidation This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 7d04d6d5c1143f8812881dc5d2c4300c42f41414, it was introduced in version v5.15.33 by commit 3bae72c2db693ec421647fbf7e7a097842e73276. For more details please see the references link.
null
2022-04-24T21:54:02.528Z
2022-04-24T21:54:02.528Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3bae72c2db693ec421647fbf7e7a097842e73276'}
Linux
GSD-2021-1001697
iwlwifi: mvm: Fix possible NULL dereference
iwlwifi: mvm: Fix possible NULL dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.12 by commit 432d8185e9ffce97e3866ca71c39b0807a456920, it was introduced in version v5.14 by commit 7b3954a1d69a992a781e71036950f9254f8147f6. For more details please see the references link.
null
2021-12-20T01:06:44.842186Z
2021-10-19T16:32:22.313626Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7b3954a1d69a992a781e71036950f9254f8147f6'}
Linux
GSD-2021-1000985
net: qrtr: fix OOB Read in qrtr_endpoint_post
net: qrtr: fix OOB Read in qrtr_endpoint_post This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit 960b08dd36de1e341e3eb43d1c547513e338f4f8, it was introduced in version v4.15 by commit 194ccc88297ae78d0803adad83c6dcc369787c9e. For more details please see the references link.
null
2021-12-20T00:37:58.464669Z
2021-06-30T00:31:26.078961Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/194ccc88297ae78d0803adad83c6dcc369787c9e'}
Linux
GSD-2021-1002812
pinctrl: mediatek: fix global-out-of-bounds issue
pinctrl: mediatek: fix global-out-of-bounds issue This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.89 by commit 441d3873664d170982922c5d2fc01fa89d9439ed. For more details please see the references link.
null
2022-01-11T06:43:54.394129Z
2021-12-30T02:44:31.382795Z
null
null
null
null
null
Linux
GSD-2022-1000250
usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS
usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.19 by commit 27980463256060aaef8db0ddfcf40fd2342b96e8, it was introduced in version v5.13 by commit 90c4d05780d47e14a50e11a7f17373104cd47d25. For more details please see the references link.
null
2022-02-19T03:08:51.552635Z
2022-02-18T22:01:18.827387Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/90c4d05780d47e14a50e11a7f17373104cd47d25'}
Linux
GSD-2021-1002541
net: stmmac: Disable Tx queues when reconfiguring the interface
net: stmmac: Disable Tx queues when reconfiguring the interface This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.6 by commit a92f0eebb8dc008b9e8c51c6f7b8c93b27a29a43, it was introduced in version v5.13 by commit 5fabb01207a2d3439a6abe1d08640de9c942945f. For more details please see the references link.
null
2021-12-20T00:55:49.171477Z
2021-12-19T19:41:54.286413Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5fabb01207a2d3439a6abe1d08640de9c942945f'}
Linux
GSD-2022-1001011
qede: confirm skb is allocated before using
qede: confirm skb is allocated before using This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit e1fd0c42acfa22bb34d2ab6a111484f466ab8093, it was introduced in version v4.18 by commit 8a8633978b842c88fbcfe00d4e5dde96048f630e. For more details please see the references link.
null
2022-04-25T06:07:54.736141Z
2022-04-24T20:39:29.725393Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8a8633978b842c88fbcfe00d4e5dde96048f630e'}
Linux
GSD-2021-1000086
perf/core: Fix unconditional security_locked_down() call
perf/core: Fix unconditional security_locked_down() call This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.2 by commit c7b0208ee370b89d20486fae71cd9abb759819c1, it was introduced in version v5.4 by commit b0c8fdc7fdb77586c3d1937050925b960743306e. For more details please see the references link.
null
2021-12-20T01:29:30.965085Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b0c8fdc7fdb77586c3d1937050925b960743306e'}
Linux
GSD-2021-1002111
mm, slub: fix potential memoryleak in kmem_cache_open()
mm, slub: fix potential memoryleak in kmem_cache_open() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit 42b81946e3ac9ea0372ba16e05160dc11e02694f, it was introduced in version v4.8 by commit 210e7a43fa905bccafa9bb5966fba1d71f33eb8b. For more details please see the references link.
null
2021-12-20T01:04:30.535743Z
2021-11-14T15:20:21.446573Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/210e7a43fa905bccafa9bb5966fba1d71f33eb8b'}
Linux
GSD-2022-1001441
ubifs: Fix 'ui->dirty' race between do_tmpfile() and writeback work
ubifs: Fix 'ui->dirty' race between do_tmpfile() and writeback work This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit f3bdd3b7415fe4e3337bc34a2842cf1adba5c378, it was introduced in version v4.9 by commit 474b93704f32163af4bfa728fddc570eba357353. For more details please see the references link.
null
2022-04-25T04:27:51.060218Z
2022-04-24T21:13:39.792172Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/474b93704f32163af4bfa728fddc570eba357353'}
Linux
GSD-2022-1001154
spi: fsi: Implement a timeout for polling status
spi: fsi: Implement a timeout for polling status This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit dac1438f347d3b8cf892105c94e254f29c5764de. For more details please see the references link.
null
2022-04-25T05:35:17.429113Z
2022-04-24T20:49:15.094555Z
null
null
null
null
null
Linux
GSD-2021-1002404
iio: mma8452: Fix trigger reference couting
iio: mma8452: Fix trigger reference couting This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.258 by commit 794c0898f6bf39a458655d5fb4af70ec43a5cfcb, it was introduced in version v4.2 by commit ae6d9ce05691bf79694074db7c7da980080548af. For more details please see the references link.
null
2021-12-20T01:24:14.535383Z
2021-12-19T19:35:49.041130Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ae6d9ce05691bf79694074db7c7da980080548af'}
Linux
GSD-2021-1000439
KVM: Stop looking for coalesced MMIO zones if the bus is destroyed
KVM: Stop looking for coalesced MMIO zones if the bus is destroyed This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.119 by commit 7d1bc32d6477ff96a32695ea4be8144e4513ab2d, it was introduced in version v5.4.66 by commit 41b2ea7a6a11e2b1a7f2c29e1675a709a6b2b98d. For more details please see the references link.
null
2021-12-19T23:28:47.996888Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41b2ea7a6a11e2b1a7f2c29e1675a709a6b2b98d'}
Linux
GSD-2022-1001504
drivers: ethernet: cpsw: fix panic when interrupt coaleceing is set via ethtool
drivers: ethernet: cpsw: fix panic when interrupt coaleceing is set via ethtool This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 459080fab12b23c0526026e5cedbf3fabb5457cc, it was introduced in version v5.15 by commit d43c65b05b848e0b2db1a6c78b02c189da3a95b5. For more details please see the references link.
null
2022-04-25T06:23:10.684037Z
2022-04-24T21:18:05.865023Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d43c65b05b848e0b2db1a6c78b02c189da3a95b5'}
Linux
GSD-2021-1000593
net: dsa: sja1105: add error handling in sja1105_setup()
net: dsa: sja1105: add error handling in sja1105_setup() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit dd8609f203448ca6d58ae71461208b3f6b0329b0, it was introduced in version v5.10 by commit 0a7bdbc23d8a1d5e6f6f74abf00ba572f7369dd6. For more details please see the references link.
null
2021-12-20T01:37:35.020625Z
2021-06-04T19:43:59.468840Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0a7bdbc23d8a1d5e6f6f74abf00ba572f7369dd6'}
Linux
GSD-2021-1002054
s390/pci: fix zpci_zdev_put() on reserve
s390/pci: fix zpci_zdev_put() on reserve This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit 188907c252188ac7a5ec3efcfa31dae1f47b8a20, it was introduced in version v5.10.61 by commit a69326e134d4ffa0d2d77bf1a4a62271c51c3051. For more details please see the references link.
null
2021-12-20T00:39:33.680739Z
2021-11-14T15:17:44.659535Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a69326e134d4ffa0d2d77bf1a4a62271c51c3051'}
Linux
GSD-2021-1000069
ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure
ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.3 by commit 596e079c362ac17ed02aa1b99fdc444d62072a01, it was introduced in version v4.12 by commit ca9ae5ec4ef0ed13833b03297ab319676965492c. For more details please see the references link.
null
2021-12-20T00:42:51.475266Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca9ae5ec4ef0ed13833b03297ab319676965492c'}
Linux
GSD-2022-1000745
io_uring: add a schedule point in io_add_buffers()
io_uring: add a schedule point in io_add_buffers() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.12 by commit 8f3cc3c5bc43d03b5748ac4fb8d180084952c36a, it was introduced in version v5.7 by commit ddf0322db79c5984dc1a1db890f946dd19b7d6d9. For more details please see the references link.
null
2022-03-18T02:59:49.243599Z
2022-03-18T00:14:59.228562Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ddf0322db79c5984dc1a1db890f946dd19b7d6d9'}
Linux
GSD-2022-1001857
drm/bridge: anx7625: Fix overflow issue on reading EDID
drm/bridge: anx7625: Fix overflow issue on reading EDID This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 64c06df2428bb7bb3d8cf5691416001af42d94dd, it was introduced in version v5.11 by commit 8bdfc5dae4e3ba4d99dfb430ef43249e5f1b7730. For more details please see the references link.
null
2022-04-25T04:44:49.377280Z
2022-04-24T21:48:46.846481Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8bdfc5dae4e3ba4d99dfb430ef43249e5f1b7730'}
Linux
GSD-2021-1001228
net: xilinx_emaclite: Do not print real IOMEM pointer
net: xilinx_emaclite: Do not print real IOMEM pointer This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.3 by commit 8722275b41d5127048e1422a8a1b6370b4878533. For more details please see the references link.
null
2021-12-19T22:15:17.061481Z
2021-08-03T01:42:19.448480Z
null
null
null
null
null
Linux
GSD-2022-1002282
tpm: use try_get_ops() in tpm-space.c
tpm: use try_get_ops() in tpm-space.c This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.188 by commit 5b1d2561a03e534064b51c50c774657833d3d2cf. For more details please see the references link.
null
2022-04-25T05:39:11.375908Z
2022-04-24T22:30:01.767936Z
null
null
null
null
null
Linux
GSD-2022-1000315
scsi: target: iscsi: Make sure the np under each tpg is unique
scsi: target: iscsi: Make sure the np under each tpg is unique This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.230 by commit ded80123b84253ecc6c6cfd1fbbbd99f51c984ec. For more details please see the references link.
null
2022-03-07T01:37:41.361590Z
2022-02-27T02:49:51.378079Z
null
null
null
null
null
Linux
GSD-2022-1002328
ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock()
ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 5343575aa11c5d7044107d59d43f84aec01312b0, it was introduced in version v2.6.27 by commit 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d. For more details please see the references link.
null
2022-04-25T05:19:15.493001Z
2022-04-24T22:35:01.140186Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d'}
Linux
GSD-2021-1001382
nfs: fix acl memory leak of posix_acl_create()
nfs: fix acl memory leak of posix_acl_create() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.198 by commit 0704f617040c397ae73c1f88f3956787ec5d6529, it was introduced in version v3.14 by commit 013cdf1088d7235da9477a2375654921d9b9ba9f. For more details please see the references link.
null
2021-12-19T22:29:26.648464Z
2021-08-03T02:25:17.238039Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/013cdf1088d7235da9477a2375654921d9b9ba9f'}
Linux
GSD-2021-1001678
binder: make sure fd closes complete
binder: make sure fd closes complete This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.70 by commit d5b0473707fa53b03a5db0256ce62b2874bddbc7, it was introduced in version v5.0 by commit 80cd795630d6526ba729a089a435bf74a57af927. For more details please see the references link.
null
2021-12-19T22:35:12.216153Z
2021-10-19T16:31:25.891525Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80cd795630d6526ba729a089a435bf74a57af927'}
Linux
GSD-2021-1002687
nfc: fix segfault in nfc_genl_dump_devices_done
nfc: fix segfault in nfc_genl_dump_devices_done This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.87 by commit c602863ad28ec86794cb4ab4edea5324f555f181. For more details please see the references link.
null
2022-01-11T05:54:59.664361Z
2021-12-27T05:36:50.701120Z
null
null
null
null
null
Linux
GSD-2021-1000340
mm: memcontrol: slab: fix obtain a reference to a freeing memcg
mm: memcontrol: slab: fix obtain a reference to a freeing memcg This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 31df8bc4d3feca9f9c6b2cd06fd64a111ae1a0e6, it was introduced in version v5.10.11 by commit 26f54dac15640c65ec69867e182de7be708ea389. For more details please see the references link.
null
2021-12-19T21:47:36.998491Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/26f54dac15640c65ec69867e182de7be708ea389'}
Linux
GSD-2022-1000895
xen/gnttab: fix gnttab_end_foreign_access() without page specified
xen/gnttab: fix gnttab_end_foreign_access() without page specified This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.234 by commit 92dc0e4a219602242407dedd987dc9c8263c959b. For more details please see the references link.
null
2022-03-18T03:00:31.415480Z
2022-03-18T00:29:07.557224Z
null
null
null
null
null
Linux
GSD-2022-1001787
media: staging: media: zoran: move videodev alloc
media: staging: media: zoran: move videodev alloc This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit ff3357bffd9fb78f59762d8955afc7382a279079. For more details please see the references link.
null
2022-04-25T04:19:48.538358Z
2022-04-24T21:42:20.839657Z
null
null
null
null
null
Linux
GSD-2021-1001802
ocfs2: fix data corruption after conversion from inline format
ocfs2: fix data corruption after conversion from inline format This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.214 by commit a3a089c241cd49b33a8cdd7fcb37cc87a086912a, it was introduced in version v4.19.155 by commit 7ce2b16bad2cbfa3fa7bbc42c4448914f639ca47. For more details please see the references link.
null
2021-12-19T22:11:30.244467Z
2021-10-28T13:49:41.944791Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ce2b16bad2cbfa3fa7bbc42c4448914f639ca47'}
Linux
GSD-2021-1000710
misc/uss720: fix memory leak in uss720_probe
misc/uss720: fix memory leak in uss720_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.271 by commit 5f46b2410db2c8f26b8bb91b40deebf4ec184391, it was introduced in version v2.6.14 by commit 0f36163d3abefbda1b21a330b3fdf3c2dc076d94. For more details please see the references link.
null
2021-12-20T01:34:07.090135Z
2021-06-04T20:07:40.580400Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0f36163d3abefbda1b21a330b3fdf3c2dc076d94'}
Linux
GSD-2022-1002001
netlabel: fix out-of-bounds memory accesses
netlabel: fix out-of-bounds memory accesses This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.0 by commit 5578de4834fe0f2a34fedc7374be691443396d1f, it was introduced in version v2.6.19 by commit 446fda4f26822b2d42ab3396aafcedf38a9ff2b6. For more details please see the references link.
null
2022-04-25T05:17:09.055784Z
2022-04-24T22:02:19.806011Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/446fda4f26822b2d42ab3396aafcedf38a9ff2b6'}
Linux
GSD-2021-1001551
net_sched: fix NULL deref in fifo_set_limit()
net_sched: fix NULL deref in fifo_set_limit() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.211 by commit d07098f45be868a9cdce6c616563c36c64dbbd87, it was introduced in version v2.6.27 by commit fb0305ce1b03f6ff17f84f2c63daccecb45f2805. For more details please see the references link.
null
2021-12-20T00:38:43.482424Z
2021-10-19T16:23:23.175633Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb0305ce1b03f6ff17f84f2c63daccecb45f2805'}
Linux
GSD-2022-1002451
jffs2: fix memory leak in jffs2_scan_medium
jffs2: fix memory leak in jffs2_scan_medium This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit b36bccb04e14cc0c1e2d0e92d477fe220314fad6, it was introduced in version v2.6.15 by commit e631ddba588783edd521c5a89f7b2902772fb691. For more details please see the references link.
null
2022-04-25T05:27:15.958815Z
2022-04-24T22:49:23.035395Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e631ddba588783edd521c5a89f7b2902772fb691'}
Linux
GSD-2022-1000196
net: fix information leakage in /proc/net/ptype
net: fix information leakage in /proc/net/ptype This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.96 by commit db044d97460ea792110eb8b971e82569ded536c6, it was introduced in version v2.6.26 by commit 2feb27dbe00cbb4f7d31f90acf6bd0d751dd0a50. For more details please see the references link.
null
2022-02-19T02:54:41.538437Z
2022-02-18T21:53:31.369149Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2feb27dbe00cbb4f7d31f90acf6bd0d751dd0a50'}
Linux
GSD-2021-1001101
net: qed: Fix memcpy() overflow of qed_dcbx_params()
net: qed: Fix memcpy() overflow of qed_dcbx_params() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.274 by commit b84996d966f61bf8c2e99fab43f43f939ff29063. For more details please see the references link.
null
2021-12-19T23:39:02.235969Z
2021-07-08T01:56:24.012766Z
null
null
null
null
null
Linux
GSD-2022-1000483
audit: don't deref the syscall args when checking the openat2 open_how::flags
audit: don't deref the syscall args when checking the openat2 open_how::flags This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 310c9ddfdf1f8d3c9834f02175eae79c8b254b6c, it was introduced in version v5.16 by commit 1c30e3af8a79260cdba833a719209b01e6b92300. For more details please see the references link.
null
2022-03-07T01:39:10.068258Z
2022-02-27T03:13:08.782101Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c30e3af8a79260cdba833a719209b01e6b92300'}
Linux
GSD-2021-1001414
watchdog: Fix possible use-after-free by calling del_timer_sync()
watchdog: Fix possible use-after-free by calling del_timer_sync() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.240 by commit 8bec568d7518b1504a602ed5376bb322e4dbb270. For more details please see the references link.
null
2021-12-19T22:53:29.677574Z
2021-08-03T02:33:58.153943Z
null
null
null
null
null
Linux
GSD-2022-1002144
tpm: use try_get_ops() in tpm-space.c
tpm: use try_get_ops() in tpm-space.c This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.109 by commit 95193d12f10a8a088843b25e0f5fe1d83ec6b079. For more details please see the references link.
null
2022-04-25T06:34:24.377505Z
2022-04-24T22:15:51.460989Z
null
null
null
null
null
Linux
GSD-2022-1000179
select: Fix indefinitely sleeping task in poll_schedule_timeout()
select: Fix indefinitely sleeping task in poll_schedule_timeout() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.95 by commit 11ba2c6dfb902de05b73000a98534e376173b6ca. For more details please see the references link.
null
2022-02-19T09:26:23.353855Z
2022-02-18T21:51:37.133840Z
null
null
null
null
null
Linux
GSD-2021-1001044
NFS: Fix use-after-free in nfs4_init_client()
NFS: Fix use-after-free in nfs4_init_client() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit 72651c6579a25317a90536181d311c663d0329ab, it was introduced in version v4.13 by commit 8dcbec6d20eb881ba368d0aebc3a8a678aebb1da. For more details please see the references link.
null
2021-12-19T23:47:05.965498Z
2021-06-30T00:35:58.999509Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8dcbec6d20eb881ba368d0aebc3a8a678aebb1da'}
Linux
GSD-2022-1002514
jffs2: fix use-after-free in jffs2_clear_xattr_subsystem
jffs2: fix use-after-free in jffs2_clear_xattr_subsystem This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit 9150cb625b46f68d524f4cfd491f1aafc23e10a9, it was introduced in version v2.6.18 by commit aa98d7cf59b5b0764d3502662053489585faf2fe. For more details please see the references link.
null
2022-04-25T04:26:31.875832Z
2022-04-24T22:57:10.408826Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/aa98d7cf59b5b0764d3502662053489585faf2fe'}
Linux
GSD-2022-1000529
perf: Fix list corruption in perf_cgroup_switch()
perf: Fix list corruption in perf_cgroup_switch() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 2142bc1469a316fddd10012d76428f7265258f81, it was introduced in version v4.11 by commit 058fe1c0440e68a1ba3c2270ae43e9f0298b27d8. For more details please see the references link.
null
2022-03-07T01:34:27.021435Z
2022-02-27T03:19:49.170372Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/058fe1c0440e68a1ba3c2270ae43e9f0298b27d8'}
Linux
GSD-2022-1001292
PM: domains: Fix sleep-in-atomic bug caused by genpd_debug_remove()
PM: domains: Fix sleep-in-atomic bug caused by genpd_debug_remove() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit fee777ea77769cc5392a34805d9d73099a223fae, it was introduced in version v5.11 by commit 718072ceb211833f3c71724f49d733d636067191. For more details please see the references link.
null
2022-04-25T02:59:46.394345Z
2022-04-24T21:01:49.352796Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/718072ceb211833f3c71724f49d733d636067191'}
Linux
GSD-2021-1000205
powerpc/64s: Fix crashes when toggling entry flush barrier
powerpc/64s: Fix crashes when toggling entry flush barrier This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit 5bc00fdda1e934c557351a9c751a205293e68cbf, it was introduced in version v5.10 by commit f79643787e0a0762d2409b7b8334e83f22d85695. For more details please see the references link.
null
2021-12-19T23:49:52.407762Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f79643787e0a0762d2409b7b8334e83f22d85695'}
Linux
GSD-2021-1002238
ALSA: gus: fix null pointer dereference on pointer block
ALSA: gus: fix null pointer dereference on pointer block This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.256 by commit 542fa721594a02d2aee0370a764d306ef48d030c. For more details please see the references link.
null
2021-12-19T23:23:47.613764Z
2021-11-29T02:34:44.714411Z
null
null
null
null
null
Linux
GSD-2022-1001768
scsi: qla2xxx: Fix scheduling while atomic
scsi: qla2xxx: Fix scheduling while atomic This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 826a9d4a00d1424afa961504aec6298ee92d5053. For more details please see the references link.
null
2022-04-25T03:34:54.352077Z
2022-04-24T21:41:12.485284Z
null
null
null
null
null
Linux
GSD-2021-1001947
isofs: Fix out of bound access for corrupted isofs image
isofs: Fix out of bound access for corrupted isofs image This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.290 by commit 9ec33a9b8790c212cc926a88c5e2105f97f3f57e. For more details please see the references link.
null
2021-12-20T00:01:49.453813Z
2021-11-14T15:12:58.443325Z
null
null
null
null
null
Linux
GSD-2021-1000655
net: dsa: mt7530: fix VLAN traffic leaks
net: dsa: mt7530: fix VLAN traffic leaks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.193 by commit ae389812733b1b1e8e07fcc238e41db166b5c78d, it was introduced in version v4.16 by commit 83163f7dca5684816d01c8ccf4857aa74801e7b7. For more details please see the references link.
null
2021-12-20T01:26:42.362127Z
2021-06-04T19:55:41.449726Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/83163f7dca5684816d01c8ccf4857aa74801e7b7'}
Linux
GSD-2021-1002668
nfc: fix segfault in nfc_genl_dump_devices_done
nfc: fix segfault in nfc_genl_dump_devices_done This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.167 by commit d731ecc6f2eaec68f4ad1542283bbc7d07bd0112. For more details please see the references link.
null
2022-01-11T05:54:01.036373Z
2021-12-27T05:35:20.436793Z
null
null
null
null
null
Linux
GSD-2021-1002392
net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound
net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.257 by commit d3dedaa5a601107cfedda087209772c76e364d58. For more details please see the references link.
null
2021-12-20T00:07:06.884550Z
2021-12-19T19:35:20.519096Z
null
null
null
null
null
Linux
GSD-2022-1001338
net/smc: use memcpy instead of snprintf to avoid out of bounds read
net/smc: use memcpy instead of snprintf to avoid out of bounds read This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11 by commit 8a4465368964b4fbaf084760c94c7aabf61059fb, it was introduced in version v5.11 by commit a3db10efcc4cc9c03a6375920179ade75ea2df7a. For more details please see the references link.
null
2022-04-25T06:49:05.350953Z
2022-04-24T21:05:40.926184Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a3db10efcc4cc9c03a6375920179ade75ea2df7a'}
Linux
GSD-2022-1001457
ARM: mmp: Fix failure to remove sram device
ARM: mmp: Fix failure to remove sram device This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 56f25cad7d3e3a55612d9596551ad436f8647317. For more details please see the references link.
null
2022-04-25T06:31:24.980471Z
2022-04-24T21:14:42.736315Z
null
null
null
null
null
Linux
GSD-2021-1002107
audit: fix possible null-pointer dereference in audit_filter_rules
audit: fix possible null-pointer dereference in audit_filter_rules This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit 4e9e46a700201b4c85081fd478c99c692a9aaa0d, it was introduced in version v5.3 by commit bf361231c295d92a28ca283ea713f56e93e55796. For more details please see the references link.
null
2021-12-20T01:31:44.219828Z
2021-11-14T15:20:11.698420Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf361231c295d92a28ca283ea713f56e93e55796'}
Linux
GSD-2021-1000090
net: qrtr: Avoid potential use after free in MHI send
net: qrtr: Avoid potential use after free in MHI send This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.2 by commit 03c649dee8b1eb5600212a249542a70f47a5ab40, it was introduced in version v5.8 by commit 6e728f321393b1fce9e1c2c3e55f9f7c15991321. For more details please see the references link.
null
2021-12-20T00:04:45.128425Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6e728f321393b1fce9e1c2c3e55f9f7c15991321'}
Linux
GSD-2022-1001007
mm/mempolicy: fix mpol_new leak in shared_policy_replace
mm/mempolicy: fix mpol_new leak in shared_policy_replace This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit fe39ac59dbbf893b73b24e3184161d0bd06d6651, it was introduced in version v3.8 by commit 42288fe366c4f1ce7522bc9f27d0bc2a81c55264. For more details please see the references link.
null
2022-04-25T05:52:45.003102Z
2022-04-24T20:39:09.532290Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/42288fe366c4f1ce7522bc9f27d0bc2a81c55264'}
Linux
GSD-2021-1002557
net: ethernet: dec: tulip: de4x5: fix possible array overflows in type3_infoblock()
net: ethernet: dec: tulip: de4x5: fix possible array overflows in type3_infoblock() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.7 by commit 40e35c77448e25de86a0a908a715142919307263. For more details please see the references link.
null
2021-12-20T01:27:39.610482Z
2021-12-19T19:42:33.706366Z
null
null
null
null
null
Linux
GSD-2022-1000246
psi: Fix uaf issue when psi trigger is destroyed while being polled
psi: Fix uaf issue when psi trigger is destroyed while being polled This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.19 by commit d3e4c61e143e69671803ef3f52140cf7a7258ee7, it was introduced in version v5.2 by commit 0e94682b73bfa6c44c98af7a26771c9c08c055d5. For more details please see the references link.
null
2022-02-19T09:46:31.030878Z
2022-02-18T22:00:51.146058Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0e94682b73bfa6c44c98af7a26771c9c08c055d5'}
Linux
GSD-2021-1000839
tracing: Correct the length check which causes memory corruption
tracing: Correct the length check which causes memory corruption This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.273 by commit edcce01e0e50840a9aa6a70baed21477bdd2c9f9, it was introduced in version v4.9.258 by commit 2e584b1a02eeb860e286d39bc408b25ebc5ec844. For more details please see the references link.
null
2021-12-20T01:15:51.896350Z
2021-06-30T00:00:35.256970Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2e584b1a02eeb860e286d39bc408b25ebc5ec844'}
Linux
GSD-2021-1002804
ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module
ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.89 by commit 6809da5185141e61401da5b01896b79a4deed1ad, it was introduced in version v4.15 by commit b2cfd8ab4add53c2070367bfee2f5b738f51698d. For more details please see the references link.
null
2022-01-11T05:56:39.151606Z
2021-12-30T02:44:12.193505Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b2cfd8ab4add53c2070367bfee2f5b738f51698d'}
Linux
GSD-2021-1000993
can: bcm: fix infoleak in struct bcm_msg_head
can: bcm: fix infoleak in struct bcm_msg_head This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit acb755be1f7adb204dcedc4d3b204ef098628623, it was introduced in version v2.6.25 by commit ffd980f976e7fd666c2e61bf8ab35107efd11828. For more details please see the references link.
null
2021-12-19T22:03:38.103293Z
2021-06-30T00:31:56.444187Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ffd980f976e7fd666c2e61bf8ab35107efd11828'}
Linux
GSD-2021-1001681
powerpc/64s: Fix unrecoverable MCE calling async handler from NMI
powerpc/64s: Fix unrecoverable MCE calling async handler from NMI This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.12 by commit d7a8e38999fbd6910516e44cb43f9f4317e54f73, it was introduced in version v5.14 by commit 2b43dd7653cca47d297756980846ebbfe8887fa1. For more details please see the references link.
null
2021-12-19T23:04:37.914117Z
2021-10-19T16:31:35.725014Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2b43dd7653cca47d297756980846ebbfe8887fa1'}
Linux
GSD-2022-1001904
PM: domains: Fix sleep-in-atomic bug caused by genpd_debug_remove()
PM: domains: Fix sleep-in-atomic bug caused by genpd_debug_remove() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 2039163c30f886cf5638afd6993705ae9bb34a06, it was introduced in version v5.11 by commit 718072ceb211833f3c71724f49d733d636067191. For more details please see the references link.
null
2022-04-25T03:11:26.090136Z
2022-04-24T21:53:32.528345Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/718072ceb211833f3c71724f49d733d636067191'}
Linux
GSD-2022-1000616
USB: core: Fix hang in usb_kill_urb by adding memory barriers
USB: core: Fix hang in usb_kill_urb by adding memory barriers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit c9a18f7c5b071dce5e6939568829d40994866ab0. For more details please see the references link.
null
2022-03-07T01:36:06.048800Z
2022-02-27T03:31:42.024048Z
null
null
null
null
null
Linux
GSD-2021-1001394
seq_buf: Fix overflow in seq_buf_putmem_hex()
seq_buf: Fix overflow in seq_buf_putmem_hex() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.198 by commit 1f4c6061fccee64b2072b28dfa3e93cf859c4c0a, it was introduced in version v2.6.27 by commit 5e3ca0ec76fce92daa4eed0d02de9c79b1fe3920. For more details please see the references link.
null
2021-12-20T01:01:31.880560Z
2021-08-03T02:27:24.536042Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5e3ca0ec76fce92daa4eed0d02de9c79b1fe3920'}
Linux
GSD-2022-1000303
net: fix a memleak when uncloning an skb dst and its metadata
net: fix a memleak when uncloning an skb dst and its metadata This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.267 by commit c1ff27d100e2670b03cbfddb9117e5f9fc672540, it was introduced in version v4.3 by commit fc4099f17240767554ff3a73977acb78ef615404. For more details please see the references link.
null
2022-03-07T01:37:32.468595Z
2022-02-27T02:48:29.858587Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fc4099f17240767554ff3a73977acb78ef615404'}
Linux
GSD-2022-1002294
gcc-plugins: latent_entropy: use /dev/urandom
gcc-plugins: latent_entropy: use /dev/urandom This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.239 by commit 8b1010a6ae05fd52f6e989c05083dc134e4a3671, it was introduced in version v4.9 by commit 38addce8b600ca335dc86fa3d48c890f1c6fa1f4. For more details please see the references link.
null
2022-04-25T05:08:56.176596Z
2022-04-24T22:31:03.873017Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/38addce8b600ca335dc86fa3d48c890f1c6fa1f4'}
Linux
GSD-2022-1001841
MIPS: pgalloc: fix memory leak caused by pgd_free()
MIPS: pgalloc: fix memory leak caused by pgd_free() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit d29cda15cab086d82d692de016f7249545d4b6b4, it was introduced in version v5.9 by commit f9cb654cb550b7b87e8608b14fc3eca432429ffe. For more details please see the references link.
null
2022-04-25T03:36:30.829198Z
2022-04-24T21:47:02.130652Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f9cb654cb550b7b87e8608b14fc3eca432429ffe'}
Linux
GSD-2022-1000753
io_uring: disallow modification of rsrc_data during quiesce
io_uring: disallow modification of rsrc_data during quiesce This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.12 by commit cb87bfcab8f046c167245dd85161a95d8c923e0d. For more details please see the references link.
null
2022-03-18T02:57:21.454162Z
2022-03-18T00:15:24.814124Z
null
null
null
null
null
Linux
GSD-2021-1002042
ocfs2: fix data corruption after conversion from inline format
ocfs2: fix data corruption after conversion from inline format This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit f1b98569e81c37d7e0deada7172f8f60860c1360, it was introduced in version v5.10 by commit 6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b. For more details please see the references link.
null
2021-12-20T01:26:36.158916Z
2021-11-14T15:17:15.763574Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b'}
Linux
GSD-2021-1000585
drm/amd/amdgpu: fix refcount leak
drm/amd/amdgpu: fix refcount leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit 9fdb8ed37a3a44f9c49372b69f87fd5f61cb3240, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T00:34:15.799210Z
2021-06-04T19:43:03.583179Z
null
null
null
null
null
Linux
GSD-2022-1001512
RDMA/nldev: Prevent underflow in nldev_stat_set_counter_dynamic_doit()
RDMA/nldev: Prevent underflow in nldev_stat_set_counter_dynamic_doit() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit f6dd8669b8299a3a536cd92a7069152a7704da1d, it was introduced in version v5.16 by commit 3c3c1f1416392382faa0238e76a70d7810aab2ef. For more details please see the references link.
null
2022-04-25T06:49:06.251823Z
2022-04-24T21:19:01.383766Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c3c1f1416392382faa0238e76a70d7810aab2ef'}
Linux
GSD-2021-1002412
atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait
atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.220 by commit 0275fcd9b54f0364f66f2f3f6a0f3748648f3d35. For more details please see the references link.
null
2021-12-20T01:05:44.066510Z
2021-12-19T19:36:08.915885Z
null
null
null
null
null
Linux
GSD-2022-1001142
media: ir_toy: free before error exiting
media: ir_toy: free before error exiting This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 93ef3fdf3b6633c58f049e5a6be755777dde4340. For more details please see the references link.
null
2022-04-25T04:12:12.141408Z
2022-04-24T20:48:40.262357Z
null
null
null
null
null
Linux
GSD-2021-1001117
dmaengine: mediatek: free the proper desc in desc_free handler
dmaengine: mediatek: free the proper desc in desc_free handler This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.129 by commit 3d995587c3ea335ad828b24592c89fdee013815f. For more details please see the references link.
null
2021-12-20T00:48:58.470631Z
2021-07-08T01:57:27.496601Z
null
null
null
null
null
Linux
GSD-2022-1000180
drm/vmwgfx: Fix stale file descriptors on failed usercopy
drm/vmwgfx: Fix stale file descriptors on failed usercopy This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.95 by commit ae2b20f27732fe92055d9e7b350abc5cdf3e2414, it was introduced in version v4.14 by commit c906965dee22d5e95d0651759ba107b420212a9f. For more details please see the references link.
null
2022-02-19T10:59:12.664136Z
2022-02-18T21:51:43.738379Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c906965dee22d5e95d0651759ba107b420212a9f'}
Linux
GSD-2022-1002447
video: fbdev: sm712fb: Fix crash in smtcfb_read()
video: fbdev: sm712fb: Fix crash in smtcfb_read() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 2a616cc4513217c850865482cbc0bc6e7188580c. For more details please see the references link.
null
2022-04-25T06:05:49.323024Z
2022-04-24T22:48:52.328593Z
null
null
null
null
null
Linux
GSD-2021-1001547
xen/x86: fix PV trap handling on secondary processors
xen/x86: fix PV trap handling on secondary processors This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.249 by commit e316892ec618b0476111bf720415fd62e084762b, it was introduced in version v2.6.23 by commit f87e4cac4f4e940b328d3deb5b53e642e3881f43. For more details please see the references link.
null
2021-12-20T00:44:08.619747Z
2021-10-19T16:23:12.319470Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f87e4cac4f4e940b328d3deb5b53e642e3881f43'}
Linux
GSD-2022-1002017
ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111
ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit 9d7d83d0399e23d66fd431b553842a84ac10398f. For more details please see the references link.
null
2022-04-25T05:02:25.626226Z
2022-04-24T22:03:05.458474Z
null
null
null
null
null