ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2021-1000706
NFS: fix an incorrect limit in filelayout_decode_layout()
NFS: fix an incorrect limit in filelayout_decode_layout() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.271 by commit 9d280ab53df1d4a1043bd7a9e7c6a2f9cfbfe040, it was introduced in version v2.6.37 by commit 16b374ca439fb406e46e071f75428f5b033056f8. For more details please see the references link.
null
2021-12-19T23:49:01.262802Z
2021-06-04T20:06:44.348854Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/16b374ca439fb406e46e071f75428f5b033056f8'}
Linux
GSD-2021-1001814
isdn: mISDN: Fix sleeping function called from invalid context
isdn: mISDN: Fix sleeping function called from invalid context This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.156 by commit 4054b869dc263228d30a4755800b78f0f2ba0c89. For more details please see the references link.
null
2021-12-19T22:11:08.078542Z
2021-10-28T13:50:20.858315Z
null
null
null
null
null
Linux
GSD-2022-1001791
f2fs: fix to do sanity check on curseg->alloc_type
f2fs: fix to do sanity check on curseg->alloc_type This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit f68caedf264a95c0b02dfd0d9f92ac2637d5848a. For more details please see the references link.
null
2022-04-25T05:22:05.818923Z
2022-04-24T21:42:32.563620Z
null
null
null
null
null
Linux
GSD-2022-1000883
usb: gadget: rndis: add spinlock for rndis response list
usb: gadget: rndis: add spinlock for rndis response list This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.182 by commit 9ab652d41deab49848673c3dadb57ad338485376, it was introduced in version v4.6 by commit f6281af9d62e128aa6efad29cf7265062af114f2. For more details please see the references link.
null
2022-03-18T02:50:30.625486Z
2022-03-18T00:27:33.555350Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f6281af9d62e128aa6efad29cf7265062af114f2'}
Linux
GSD-2021-1000356
i2c: img-scb: fix reference leak when pm_runtime_get_sync fails
i2c: img-scb: fix reference leak when pm_runtime_get_sync fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit e80ae8bde41266d3b8bf012460b6593851766006, it was introduced in version v4.15 by commit 93222bd9b966105f43418fd336654ad10045783a. For more details please see the references link.
null
2021-12-20T01:29:02.049661Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/93222bd9b966105f43418fd336654ad10045783a'}
Linux
GSD-2022-1000929
iio: adc: men_z188_adc: Fix a resource leak in an error handling path
iio: adc: men_z188_adc: Fix a resource leak in an error handling path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.269 by commit c5723b422f564af15f2e3bc0592fd6376a0a6c45, it was introduced in version v3.15 by commit 74aeac4da66fbfa246edbfc849002eac9b5af9ca. For more details please see the references link.
null
2022-03-18T02:48:42.961987Z
2022-03-18T00:33:12.492072Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/74aeac4da66fbfa246edbfc849002eac9b5af9ca'}
Linux
GSD-2021-1002691
audit: improve robustness of the audit queue handling
audit: improve robustness of the audit queue handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.88 by commit 4cc6badff97f74d0fce65f9784b5df3b64e4250b, it was introduced in version v4.11 by commit 5b52330bbfe63b3305765354d6046c9f7f89c011. For more details please see the references link.
null
2022-01-11T05:47:37.273795Z
2021-12-27T05:37:00.010249Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5b52330bbfe63b3305765354d6046c9f7f89c011'}
Linux
GSD-2021-1002384
iio: mma8452: Fix trigger reference couting
iio: mma8452: Fix trigger reference couting This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.293 by commit fb75cc4740d81264cd5bcb0e17d961d018a8be96, it was introduced in version v4.2 by commit ae6d9ce05691bf79694074db7c7da980080548af. For more details please see the references link.
null
2021-12-19T22:21:18.649470Z
2021-12-19T19:35:00.231204Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ae6d9ce05691bf79694074db7c7da980080548af'}
Linux
GSD-2021-1000643
iommu/vt-d: Fix sysfs leak in alloc_iommu()
iommu/vt-d: Fix sysfs leak in alloc_iommu() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.124 by commit 044bbe8b92ab4e542de7f6c93c88ea65cccd8e29, it was introduced in version v4.11 by commit 39ab9555c24110671f8dc671311a26e5c985b592. For more details please see the references link.
null
2021-12-20T01:36:33.151820Z
2021-06-04T19:53:26.596393Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/39ab9555c24110671f8dc671311a26e5c985b592'}
Linux
GSD-2021-1001951
comedi: vmk80xx: fix bulk-buffer overflow
comedi: vmk80xx: fix bulk-buffer overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.290 by commit 7cfb35db607760698d299fd1cf7402dfa8f09973, it was introduced in version v2.6.31 by commit 985cafccbf9b7f862aa1c5ee566801e18b5161fb. For more details please see the references link.
null
2021-12-20T00:37:02.073964Z
2021-11-14T15:13:08.890315Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/985cafccbf9b7f862aa1c5ee566801e18b5161fb'}
Linux
GSD-2021-1000213
ethernet:enic: Fix a use after free bug in enic_hard_start_xmit
ethernet:enic: Fix a use after free bug in enic_hard_start_xmit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit d90529392aaf498dafa95d212295d64b2cea4e24, it was introduced in version v4.16 by commit fb7516d42478ebc8e2f00efb76ef96f7b68fd8d3. For more details please see the references link.
null
2021-12-20T01:29:30.222656Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb7516d42478ebc8e2f00efb76ef96f7b68fd8d3'}
Linux
GSD-2022-1001284
brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path
brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 0347bdfdb1529994ac3a4cb425087c477a74eb2c, it was introduced in version v5.4 by commit 82f93cf46d6007ffa003b2d4a2834563b6b84d21. For more details please see the references link.
null
2022-04-25T03:36:17.038453Z
2022-04-24T21:01:15.827121Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/82f93cf46d6007ffa003b2d4a2834563b6b84d21'}
Linux
GSD-2022-1002502
power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init
power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit 31cdf7897dba1f096b74f69d840f0575b8cdb9ae, it was introduced in version v4.9 by commit 8c0984e5a75337df513047ec92a6c09d78e3e5cd. For more details please see the references link.
null
2022-04-25T06:54:28.515633Z
2022-04-24T22:55:12.190925Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c0984e5a75337df513047ec92a6c09d78e3e5cd'}
Linux
GSD-2021-1001052
drm/amd/display: Fix potential memory leak in DMUB hw_init
drm/amd/display: Fix potential memory leak in DMUB hw_init This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.12 by commit aa000f828e60ac15d6340f606ec4a673966f5b0b. For more details please see the references link.
null
2021-12-20T00:12:01.643224Z
2021-06-30T00:36:28.247179Z
null
null
null
null
null
Linux
GSD-2022-1002152
ALSA: oss: Fix PCM OSS buffer allocation overflow
ALSA: oss: Fix PCM OSS buffer allocation overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.109 by commit 5ce74ff7059341d8b2f4d01c3383491df63d1898. For more details please see the references link.
null
2022-04-25T05:33:54.373163Z
2022-04-24T22:16:31.288533Z
null
null
null
null
null
Linux
GSD-2021-1001402
netrom: Decrease sock refcount when sock timers expire
netrom: Decrease sock refcount when sock timers expire This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.241 by commit 48866fd5c361ea417ed24b43fc2a7dc2f5b060ef, it was introduced in version v4.14.98 by commit 0adf571fa34b27bd0b97b408cc0f0dc54b72f0eb. For more details please see the references link.
null
2021-12-19T23:38:05.593259Z
2021-08-03T02:30:26.135309Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0adf571fa34b27bd0b97b408cc0f0dc54b72f0eb'}
Linux
GSD-2022-1000495
scsi: myrs: Fix crash in error case
scsi: myrs: Fix crash in error case This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 1d6cd26605b4d662063a83c15c776b5299a1cb23. For more details please see the references link.
null
2022-03-07T01:41:27.372714Z
2022-02-27T03:15:10.008422Z
null
null
null
null
null
Linux
GSD-2022-1002386
drm/amdkfd: Check for potential null return of kmalloc_array()
drm/amdkfd: Check for potential null return of kmalloc_array() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 40bf32dbfef866c83a3e74800b81d79e52b6d20b. For more details please see the references link.
null
2022-04-25T05:55:53.599454Z
2022-04-24T22:41:29.013737Z
null
null
null
null
null
Linux
GSD-2022-1001953
mm: fix unexpected zeroed page mapping with zram swap
mm: fix unexpected zeroed page mapping with zram swap This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.112 by commit 20ed94f8181a25212e7404e44958e234f407624b, it was introduced in version v4.15 by commit 0bcac06f27d7528591c27ac2b093ccd71c5d0168. For more details please see the references link.
null
2022-04-25T04:54:03.400997Z
2022-04-24T21:57:43.804249Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0bcac06f27d7528591c27ac2b093ccd71c5d0168'}
Linux
GSD-2022-1000641
net/mlx5e: Fix wrong calculation of header index in HW_GRO
net/mlx5e: Fix wrong calculation of header index in HW_GRO This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.6 by commit 66c6dbfc8493fc1b0192f74c12d417d911ee632b, it was introduced in version v5.16 by commit f97d5c2a453e26071e3b0ec12161de57c4a237c4. For more details please see the references link.
null
2022-03-07T01:35:23.224376Z
2022-02-27T03:35:08.960601Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f97d5c2a453e26071e3b0ec12161de57c4a237c4'}
Linux
GSD-2021-1001286
scsi: core: Fix bad pointer dereference when ehandler kthread is invalid
scsi: core: Fix bad pointer dereference when ehandler kthread is invalid This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.52 by commit ea518b70ed5e4598c8d706f37fc16f7b06e440bd, it was introduced in version v5.10.44 by commit 7a696ce1d5d16a33a6cd6400bbcc0339b2460e11. For more details please see the references link.
null
2021-12-20T00:59:25.337378Z
2021-08-03T01:57:31.242871Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7a696ce1d5d16a33a6cd6400bbcc0339b2460e11'}
Linux
GSD-2022-1000211
net: sched: fix use-after-free in tc_new_tfilter()
net: sched: fix use-after-free in tc_new_tfilter() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.97 by commit e7be56926397cf9d992be8913f74a76152f8f08d, it was introduced in version v5.1 by commit 470502de5bdb1ed0def643a4458593a40b8f6b66. For more details please see the references link.
null
2022-02-19T03:01:18.222354Z
2022-02-18T21:56:01.472613Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/470502de5bdb1ed0def643a4458593a40b8f6b66'}
Linux
GSD-2021-1002500
xhci: Fix commad ring abort, write all 64 bits to CRCR register.
xhci: Fix commad ring abort, write all 64 bits to CRCR register. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.84 by commit 90c915051c3df2d6d98d506323ab805bc1da7ae3, it was introduced in version v5.10.75 by commit dec944bb7079b37968cf69c8a438f91f15c4cc61. For more details please see the references link.
null
2021-12-19T22:50:35.363958Z
2021-12-19T19:40:02.332410Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/dec944bb7079b37968cf69c8a438f91f15c4cc61'}
Linux
GSD-2022-1001050
Bluetooth: use memset avoid memory leaks
Bluetooth: use memset avoid memory leaks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit d588c183a971b85c775ad66da563ee6e8bc8158f. For more details please see the references link.
null
2022-04-25T05:01:27.638119Z
2022-04-24T20:42:28.099984Z
null
null
null
null
null
Linux
GSD-2021-1002150
misc: fastrpc: Add missing lock before accessing find_vma()
misc: fastrpc: Add missing lock before accessing find_vma() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit f9a470db2736b01538ad193c316eb3f26be37d58, it was introduced in version v5.2 by commit 80f3afd72bd4149c57daf852905476b43bb47647. For more details please see the references link.
null
2021-12-19T23:43:22.738129Z
2021-11-14T15:22:07.221206Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80f3afd72bd4149c57daf852905476b43bb47647'}
Linux
GSD-2021-1000497
nvme-loop: fix memory leak in nvme_loop_create_ctrl()
nvme-loop: fix memory leak in nvme_loop_create_ctrl() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.7 by commit 551ba08d4b7eb26f75758cdb9f15105b276517ad, it was introduced in version v4.8 by commit 3a85a5de29ea779634ddfd768059e06196687aba. For more details please see the references link.
null
2021-12-20T00:30:23.373460Z
2021-05-31T23:46:16.025712Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3a85a5de29ea779634ddfd768059e06196687aba'}
Linux
GSD-2022-1001400
dm ioctl: prevent potential spectre v1 gadget
dm ioctl: prevent potential spectre v1 gadget This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 44e6cb3ab177faae840bb2c1ebda9a2539876184. For more details please see the references link.
null
2022-04-25T04:27:26.809727Z
2022-04-24T21:10:29.023998Z
null
null
null
null
null
Linux
GSD-2021-1000182
perf/core: Fix unconditional security_locked_down() call
perf/core: Fix unconditional security_locked_down() call This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.117 by commit b246759284d6a2bc5b6f1009caeeb3abce2ec9ff, it was introduced in version v5.4 by commit b0c8fdc7fdb77586c3d1937050925b960743306e. For more details please see the references link.
null
2021-12-19T21:47:20.285501Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b0c8fdc7fdb77586c3d1937050925b960743306e'}
Linux
GSD-2022-1001115
KVM: SVM: fix panic on out-of-bounds guest IRQ
KVM: SVM: fix panic on out-of-bounds guest IRQ This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit a6ffdebfb6a9c2ffeed902b544b96fe67498210e. For more details please see the references link.
null
2022-04-25T04:45:48.272302Z
2022-04-24T20:46:40.454281Z
null
null
null
null
null
Linux
GSD-2021-1000478
net/nfc: fix use-after-free llcp_sock_bind/connect
net/nfc: fix use-after-free llcp_sock_bind/connect This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.233 by commit 18ae4a192a4496e48a5490b52812645d2413307c, it was introduced in version v4.14.231 by commit 538a6ff11516d38a61e237d2d2dc04c30c845fbe. For more details please see the references link.
null
2021-12-20T01:28:38.425821Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/538a6ff11516d38a61e237d2d2dc04c30c845fbe'}
Linux
GSD-2021-1002445
sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl
sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.164 by commit 77393806c76b6b44f1c44bd957788c8bd9152c45, it was introduced in version v2.6.24 by commit faf0b2e5afe7dae072d2715763c7f992b612b628. For more details please see the references link.
null
2021-12-19T22:42:05.925204Z
2021-12-19T19:37:42.283368Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/faf0b2e5afe7dae072d2715763c7f992b612b628'}
Linux
GSD-2022-1001545
power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init
power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 261041097ab3470f1120b7733cbf472712304d1e, it was introduced in version v4.9 by commit 8c0984e5a75337df513047ec92a6c09d78e3e5cd. For more details please see the references link.
null
2022-04-25T06:42:09.015358Z
2022-04-24T21:22:11.439944Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c0984e5a75337df513047ec92a6c09d78e3e5cd'}
Linux
GSD-2021-1000028
netfilter: nft_limit: avoid possible divide error in nft_limit_init
netfilter: nft_limit: avoid possible divide error in nft_limit_init This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.16 by commit 1bb3ee4259936cc3b2d80a4a480bbb4868575071, it was introduced in version v4.13 by commit c26844eda9d4fdbd266660e3b3de2d0270e3a1ed. For more details please see the references link.
null
2021-12-20T00:08:54.416674Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c26844eda9d4fdbd266660e3b3de2d0270e3a1ed'}
Linux
GSD-2021-1002015
usbnet: sanity check for maxpacket
usbnet: sanity check for maxpacket This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.157 by commit 492140e45d2bf27c1014243f8616a9b612144e20. For more details please see the references link.
null
2021-12-20T02:14:36.576734Z
2021-11-14T15:16:00.590557Z
null
null
null
null
null
Linux
GSD-2021-1000881
IB/mlx5: Fix initializing CQ fragments buffer
IB/mlx5: Fix initializing CQ fragments buffer This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.195 by commit 1ec2dcd680c71d0d36fa25638b327a468babd5c9, it was introduced in version v4.17 by commit 388ca8be00370db132464e27f745b8a0add19fcb. For more details please see the references link.
null
2021-12-19T23:29:46.752488Z
2021-06-30T00:03:21.772929Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/388ca8be00370db132464e27f745b8a0add19fcb'}
Linux
GSD-2021-1001793
NFC: digital: fix possible memory leak in digital_in_send_sdd_req()
NFC: digital: fix possible memory leak in digital_in_send_sdd_req() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.252 by commit fcce6e5255474ca33c27dda0cdf9bf5087278873, it was introduced in version v3.13 by commit 2c66daecc4092e6049673c281b2e6f0d5e59a94c. For more details please see the references link.
null
2021-12-19T22:22:16.949924Z
2021-10-28T13:49:08.388341Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c66daecc4092e6049673c281b2e6f0d5e59a94c'}
Linux
GSD-2022-1001816
cpufreq: qcom-cpufreq-nvmem: fix reading of PVS Valid fuse
cpufreq: qcom-cpufreq-nvmem: fix reading of PVS Valid fuse This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 251aabcb0b0925cc63f595a1d6d6485feb3119dd, it was introduced in version v5.7 by commit a8811ec764f95a04ba82f6f457e28c5e9e36e36b. For more details please see the references link.
null
2022-04-25T06:32:34.439596Z
2022-04-24T21:44:36.784453Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a8811ec764f95a04ba82f6f457e28c5e9e36e36b'}
Linux
GSD-2022-1000704
netfilter: fix use-after-free in __nf_register_net_hook()
netfilter: fix use-after-free in __nf_register_net_hook() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.13 by commit 5a8076e98dde17224dd47283b894a8b1dbe1bc72, it was introduced in version v4.14 by commit 2420b79f8c18a75ee2417cace381f4604b9b4365. For more details please see the references link.
null
2022-03-18T02:56:04.163080Z
2022-03-18T00:11:12.462156Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2420b79f8c18a75ee2417cace381f4604b9b4365'}
Linux
GSD-2021-1001269
watchdog: Fix possible use-after-free by calling del_timer_sync()
watchdog: Fix possible use-after-free by calling del_timer_sync() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.52 by commit 66ba9cf929b1c4fabf545bd4c18f6f64e23e46e4. For more details please see the references link.
null
2021-12-19T23:46:45.245987Z
2021-08-03T01:53:44.552820Z
null
null
null
null
null
Linux
GSD-2022-1002369
mm: invalidate hwpoison page cache page in fault path
mm: invalidate hwpoison page cache page in fault path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit e83d4184908c4ebd6adfd3e1252439af91d6b0e9. For more details please see the references link.
null
2022-04-25T06:15:16.350849Z
2022-04-24T22:39:40.983134Z
null
null
null
null
null
Linux
GSD-2022-1000354
libsubcmd: Fix use-after-free for realloc(..., 0)
libsubcmd: Fix use-after-free for realloc(..., 0) This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.181 by commit aca7e5b6a5008dcf551516490b0ba4510e073d08, it was introduced in version v4.5 by commit 2f4ce5ec1d447beb42143a9653716a2ab025161e. For more details please see the references link.
null
2022-03-07T01:33:05.122683Z
2022-02-27T02:55:41.193778Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2f4ce5ec1d447beb42143a9653716a2ab025161e'}
Linux
GSD-2021-1001639
netfilter: ipset: Fix oversized kvmalloc() calls
netfilter: ipset: Fix oversized kvmalloc() calls This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.71 by commit da5b8b9319f044c2ca24f6602c54033931e0c1cc. For more details please see the references link.
null
2021-12-20T00:37:33.762721Z
2021-10-19T16:29:27.720845Z
null
null
null
null
null
Linux
GSD-2021-1000301
drm/amdgpu: Init GFX10_ADDR_CONFIG for VCN v3 in DPG mode.
drm/amdgpu: Init GFX10_ADDR_CONFIG for VCN v3 in DPG mode. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit c9864a6b0ab3860e9f462b5f23b653762c1657a9, it was introduced in version v5.9 by commit 99541f392b4d0584594a2492582b3f262a8f2643. For more details please see the references link.
null
2021-12-19T23:33:22.122364Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/99541f392b4d0584594a2492582b3f262a8f2643'}
Linux
GSD-2022-1001396
scsi: pm8001: Fix memory leak in pm8001_chip_fw_flash_update_req()
scsi: pm8001: Fix memory leak in pm8001_chip_fw_flash_update_req() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit fe5b8ea5583b5c3f6f68e06acba50387edf3b5d5. For more details please see the references link.
null
2022-04-25T05:01:36.106086Z
2022-04-24T21:10:17.398887Z
null
null
null
null
null
Linux
GSD-2021-1002296
ASoC: SOF: Intel: hda-dai: fix potential locking issue
ASoC: SOF: Intel: hda-dai: fix potential locking issue This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.82 by commit 0c6daf4799613b16dd4ad86fbc34f719ceb69911. For more details please see the references link.
null
2021-12-19T22:26:04.462382Z
2021-11-29T02:37:29.957472Z
null
null
null
null
null
Linux
GSD-2021-1000751
HID: magicmouse: fix NULL-deref on disconnect
HID: magicmouse: fix NULL-deref on disconnect This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.125 by commit 368c5d45a87e1bcc7f1e98e0c255c37b7b12c5d6, it was introduced in version v4.20 by commit 9d7b18668956c411a422d04c712994c5fdb23a4b. For more details please see the references link.
null
2021-12-20T01:16:02.155663Z
2021-06-25T00:02:24.911359Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9d7b18668956c411a422d04c712994c5fdb23a4b'}
Linux
GSD-2021-1001843
userfaultfd: fix a race between writeprotect and exit_mmap()
userfaultfd: fix a race between writeprotect and exit_mmap() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit 3cda4bfffd4f755645577aaa9e96a606657b4525, it was introduced in version v5.7 by commit 63b2d4174c4ad1f40b48d7138e71bcb564c1fe03. For more details please see the references link.
null
2021-12-20T01:37:49.703125Z
2021-10-28T13:51:47.486961Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63b2d4174c4ad1f40b48d7138e71bcb564c1fe03'}
Linux
GSD-2022-1002040
video: fbdev: sm712fb: Fix crash in smtcfb_write()
video: fbdev: sm712fb: Fix crash in smtcfb_write() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit b1c28577529cdfad40c8242673285f1e1e4c314e. For more details please see the references link.
null
2022-04-25T04:27:27.836177Z
2022-04-24T22:05:22.556975Z
null
null
null
null
null
Linux
GSD-2021-1001510
netfilter: ipset: Fix oversized kvmalloc() calls
netfilter: ipset: Fix oversized kvmalloc() calls This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.285 by commit c3a2856d3ddd0bbf05390e411f692b7e07239cb8. For more details please see the references link.
null
2021-12-20T01:08:58.350323Z
2021-10-19T16:21:29.714319Z
null
null
null
null
null
Linux
GSD-2022-1000587
net/smc: Forward wakeup to smc socket waitqueue after fallback
net/smc: Forward wakeup to smc socket waitqueue after fallback This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.22 by commit 0ef6049f664941bc0f75828b3a61877635048b27, it was introduced in version v5.15.7 by commit fb92e025baa73e99250b79ab64f4e088d2888993. For more details please see the references link.
null
2022-03-07T01:37:28.642192Z
2022-02-27T03:27:47.236482Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb92e025baa73e99250b79ab64f4e088d2888993'}
Linux
GSD-2022-1002410
ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111
ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit ed3dfdaa8b5f0579eabfc1c5818eed30cfe1fe84. For more details please see the references link.
null
2022-04-25T05:42:45.027786Z
2022-04-24T22:44:20.785664Z
null
null
null
null
null
Linux
GSD-2021-1001140
cfg80211: call cfg80211_leave_ocb when switching away from OCB
cfg80211: call cfg80211_leave_ocb when switching away from OCB This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13 by commit a64b6a25dd9f984ed05fade603a00e2eae787d2f. For more details please see the references link.
null
2021-12-19T23:54:56.430832Z
2021-07-08T01:59:09.595291Z
null
null
null
null
null
Linux
GSD-2021-1001455
dm btree remove: assign new_root only when removal succeeds
dm btree remove: assign new_root only when removal succeeds This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.276 by commit c154775619186781aaf8a99333ac07437a1768d5. For more details please see the references link.
null
2021-12-20T00:43:39.168904Z
2021-08-03T02:46:22.548248Z
null
null
null
null
null
Linux
GSD-2022-1000138
drm/nouveau: fix off by one in BIOS boundary checking
drm/nouveau: fix off by one in BIOS boundary checking This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.228 by commit b2a21669ee98aafc41c6d42ef15af4dab9e6e882, it was introduced in version v4.8 by commit 4d4e9907ff572bb1d1c0f6913ad6e3d6d4525077. For more details please see the references link.
null
2022-02-20T06:41:21.800486Z
2022-02-18T21:46:12.290319Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4d4e9907ff572bb1d1c0f6913ad6e3d6d4525077'}
Linux
GSD-2022-1002105
media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED
media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 4d68603cc4382174bc1e7d532e10675c48c6b257, it was introduced in version v3.7 by commit 8ac456495a33d9466076fea94594181ceefb76d9. For more details please see the references link.
null
2022-04-25T05:11:41.302008Z
2022-04-24T22:11:56.809318Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ac456495a33d9466076fea94594181ceefb76d9'}
Linux
GSD-2021-1001005
net: ll_temac: Make sure to free skb when it is completely used
net: ll_temac: Make sure to free skb when it is completely used This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit 019ab7d044d0ebf97e1236bb8935b7809be92358. For more details please see the references link.
null
2021-12-19T22:58:59.109196Z
2021-06-30T00:32:40.267121Z
null
null
null
null
null
Linux
GSD-2022-1000092
scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe
scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.300 by commit 3a345198a7c2d1db2526dc60b77052f75de019d3, it was introduced in version v3.16 by commit d576a5e80cd07ea7049f8fd7b303c14df7b5d7d2. For more details please see the references link.
null
2022-02-19T10:25:38.735238Z
2022-02-18T21:34:18.446807Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d576a5e80cd07ea7049f8fd7b303c14df7b5d7d2'}
Linux
GSD-2022-1000568
pidfd: fix test failure due to stack overflow on some arches
pidfd: fix test failure due to stack overflow on some arches This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit 3cfc79b41381780ef745d696520260238c1cf9fc. For more details please see the references link.
null
2022-03-07T01:36:05.653647Z
2022-02-27T03:24:55.492195Z
null
null
null
null
null
Linux
GSD-2021-1002279
tipc: check for null after calling kmemdup
tipc: check for null after calling kmemdup This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.82 by commit a7d91625863d4ffed63b993b5e6dc1298b6430c9. For more details please see the references link.
null
2021-12-20T00:49:31.912874Z
2021-11-29T02:36:47.465843Z
null
null
null
null
null
Linux
GSD-2021-1000244
i2c: sprd: fix reference leak when pm_runtime_get_sync fails
i2c: sprd: fix reference leak when pm_runtime_get_sync fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit d3406ab52097328a3bc4cbe124bfd8f6d51fb86f, it was introduced in version v4.14 by commit 8b9ec0719834fe66146d138d62ed66cef025c864. For more details please see the references link.
null
2021-12-20T01:25:36.383240Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8b9ec0719834fe66146d138d62ed66cef025c864'}
Linux
GSD-2022-1001729
drm/amdgpu: Fix recursive locking warning
drm/amdgpu: Fix recursive locking warning This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 0a922366d6d9b2532344b3763a54090ab9b50f59. For more details please see the references link.
null
2022-04-25T06:50:03.125753Z
2022-04-24T21:38:02.930458Z
null
null
null
null
null
Linux
GSD-2021-1002783
hamradio: improve the incomplete fix to avoid NPD
hamradio: improve the incomplete fix to avoid NPD This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.260 by commit a7b0ae2cc486fcb601f9f9d87d98138cc7b7f7f9. For more details please see the references link.
null
2022-01-11T06:43:09.654645Z
2021-12-30T02:43:15.530250Z
null
null
null
null
null
Linux
GSD-2021-1002629
xen/console: harden hvc_xen against event channel storms
xen/console: harden hvc_xen against event channel storms This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.294 by commit 728389c21176b2095fa58e858d5ef1d2f2aac429. For more details please see the references link.
null
2022-01-11T05:52:57.713228Z
2021-12-27T05:27:57.795066Z
null
null
null
null
null
Linux
GSD-2021-1000614
NFC: nci: fix memory leak in nci_allocate_device
NFC: nci: fix memory leak in nci_allocate_device This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.41 by commit b34cb7ac32cc8e5471dc773180ea9ae676b1a745, it was introduced in version v4.0 by commit 11f54f228643d0248ec00ce8c9fb8d872f87e7b8. For more details please see the references link.
null
2021-12-19T22:09:52.435106Z
2021-06-04T19:47:43.444591Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/11f54f228643d0248ec00ce8c9fb8d872f87e7b8'}
Linux
GSD-2021-1001906
net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path
net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit ed8aafea4fec9c654e63445236e0b505e27ed3a7, it was introduced in version v3.11 by commit e126ba97dba9edeb6fafa3665b5f8497fc9cdf8c. For more details please see the references link.
null
2021-12-19T23:02:16.391456Z
2021-10-28T13:55:03.278218Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e126ba97dba9edeb6fafa3665b5f8497fc9cdf8c'}
Linux
GSD-2022-1001683
rxrpc: fix a race in rxrpc_exit_net()
rxrpc: fix a race in rxrpc_exit_net() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 571d8e1d154ca18f08dcb72b69318d36e10010a0, it was introduced in version v4.17 by commit ace45bec6d77bc061c3c3d8ad99e298ea9800c2b. For more details please see the references link.
null
2022-04-25T03:19:02.014972Z
2022-04-24T21:34:49.854631Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ace45bec6d77bc061c3c3d8ad99e298ea9800c2b'}
Linux
GSD-2022-1000991
net: dsa: realtek: rtl8365mb: serialize indirect PHY register access
net: dsa: realtek: rtl8365mb: serialize indirect PHY register access This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.4 by commit ac3e87eebf428819c343175ec446c86c46f5a30d, it was introduced in version v5.16 by commit 4af2950c50c8634ed2865cf81e607034f78b84aa. For more details please see the references link.
null
2022-04-25T03:29:13.112255Z
2022-04-24T20:37:50.075477Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4af2950c50c8634ed2865cf81e607034f78b84aa'}
Linux
GSD-2022-1001379
staging: wfx: fix an error handling in wfx_init_common()
staging: wfx: fix an error handling in wfx_init_common() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit ab0fed1fa744173433cfd1dbaf9239f200ded650. For more details please see the references link.
null
2022-04-25T04:29:35.894271Z
2022-04-24T21:09:15.422227Z
null
null
null
null
null
Linux
GSD-2021-1000403
net/nfc: fix use-after-free llcp_sock_bind/connect
net/nfc: fix use-after-free llcp_sock_bind/connect This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 6b7021ed36dabf29e56842e3408781cd3b82ef6e, it was introduced in version v5.10.30 by commit 6fb003e5ae18d8cda4c8a1175d9dd8db12bec049. For more details please see the references link.
null
2021-12-20T01:16:13.192846Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6fb003e5ae18d8cda4c8a1175d9dd8db12bec049'}
Linux
GSD-2022-1001494
kgdboc: fix return value of __setup handler
kgdboc: fix return value of __setup handler This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 9010154beae2a685c7d1045f08da69f48fce9f47, it was introduced in version v4.20 by commit 1bd54d851f50dea6af30c3e6ff4f3e9aab5558f9. For more details please see the references link.
null
2022-04-25T03:20:03.709897Z
2022-04-24T21:16:56.953618Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1bd54d851f50dea6af30c3e6ff4f3e9aab5558f9'}
Linux
GSD-2021-1002594
net/sched: fq_pie: prevent dismantle issue
net/sched: fq_pie: prevent dismantle issue This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.8 by commit d86216dfda7c98375f809e26a30bfdaaba21d46e, it was introduced in version v5.6 by commit ec97ecf1ebe485a17cd8395a5f35e6b80b57665a. For more details please see the references link.
null
2021-12-19T23:17:48.790588Z
2021-12-19T19:44:19.811035Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ec97ecf1ebe485a17cd8395a5f35e6b80b57665a'}
Linux
GSD-2021-1000053
dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails
dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.3 by commit d757bf4c69cda3c3ab7f775dfabbf5a80e2f6f9d, it was introduced in version v4.6 by commit 1c357a1e86a4227a6b6059f2de118ae47659cebc. For more details please see the references link.
null
2021-12-19T23:32:09.205672Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c357a1e86a4227a6b6059f2de118ae47659cebc'}
Linux
GSD-2021-1001212
media: v4l2-core: explicitly clear ioctl input data
media: v4l2-core: explicitly clear ioctl input data This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.3 by commit bfb48b54db25c3b4ef4bef5e0691464ebc4aa335. For more details please see the references link.
null
2021-12-19T23:32:59.490068Z
2021-08-03T01:38:14.807926Z
null
null
null
null
null
Linux
GSD-2022-1002312
scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one()
scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit db863ab2baf058ed05c7b723612e3c40c9dd6885, it was introduced in version v2.6.23 by commit 45804fbb00eea27bdf4d62751681228a9e2844e9. For more details please see the references link.
null
2022-04-25T05:41:25.033261Z
2022-04-24T22:33:25.716568Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/45804fbb00eea27bdf4d62751681228a9e2844e9'}
Linux
GSD-2021-1000950
ftrace: Do not blindly read the ip address in ftrace_bug()
ftrace: Do not blindly read the ip address in ftrace_bug() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.44 by commit 97524384762c1fb9b3ded931498dd2047bd0de81, it was introduced in version v2.6.28 by commit 05736a427f7e16be948ccbf39782bd3a6ae16b14. For more details please see the references link.
null
2021-12-20T00:35:43.751222Z
2021-06-30T00:28:43.735036Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/05736a427f7e16be948ccbf39782bd3a6ae16b14'}
Linux
GSD-2021-1001642
ipack: ipoctal: fix module reference leak
ipack: ipoctal: fix module reference leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.71 by commit 7cea848678470daadbfdaa6a112b823c290f900c, it was introduced in version v3.18 by commit 82a82340bab6c251e0705339f60763718eaa2a22. For more details please see the references link.
null
2021-12-20T01:34:19.384027Z
2021-10-19T16:29:35.709336Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/82a82340bab6c251e0705339f60763718eaa2a22'}
Linux
GSD-2021-1001357
atm: nicstar: Fix possible use-after-free in nicstar_cleanup()
atm: nicstar: Fix possible use-after-free in nicstar_cleanup() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.133 by commit bdf5334250c69fabf555b7322c75249ea7d5f148. For more details please see the references link.
null
2021-12-19T22:17:28.552458Z
2021-08-03T02:17:12.978136Z
null
null
null
null
null
Linux
GSD-2022-1001928
NFSD: prevent integer overflow on 32 bit systems
NFSD: prevent integer overflow on 32 bit systems This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 303cd6173dce0a28d26526c77814eb90a41bd898. For more details please see the references link.
null
2022-04-25T05:38:11.114145Z
2022-04-24T21:55:47.632700Z
null
null
null
null
null
Linux
GSD-2021-1000815
nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect
nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.10 by commit 0c4559736d9a4ec1ca58ba98ca34e7c4da4c422b, it was introduced in version v3.3 by commit d646960f7986fefb460a2b062d5ccc8ccfeacc3a. For more details please see the references link.
null
2021-12-20T01:39:52.753269Z
2021-06-25T00:09:08.215135Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d646960f7986fefb460a2b062d5ccc8ccfeacc3a'}
Linux
GSD-2021-1002828
net: stmmac: ptp: fix potentially overflowing expression
net: stmmac: ptp: fix potentially overflowing expression This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.12 by commit be2473e5f377fb7fe471a5096f37a2d73a8367e6, it was introduced in version v5.14 by commit e9e3720002f61cd637a49ecafae77cac230eefae. For more details please see the references link.
null
2022-01-11T05:56:53.285012Z
2021-12-30T02:45:12.122273Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e9e3720002f61cd637a49ecafae77cac230eefae'}
Linux
GSD-2021-1001707
netfilter: conntrack: serialize hash resizes and cleanups
netfilter: conntrack: serialize hash resizes and cleanups This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit 7ea6f5848281182ce0cff6cafdcf3fbdeb8ca7e1. For more details please see the references link.
null
2021-12-19T23:37:07.291258Z
2021-10-19T16:32:51.403473Z
null
null
null
null
null
Linux
GSD-2022-1001882
media: ti-vpe: cal: Fix a NULL pointer dereference in cal_ctx_v4l2_init_formats()
media: ti-vpe: cal: Fix a NULL pointer dereference in cal_ctx_v4l2_init_formats() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit aa613ac270292e102503e9767882e39200efe608, it was introduced in version v5.12 by commit 7168155002cf7aadbfaa14a28f037c880a214764. For more details please see the references link.
null
2022-04-25T03:04:53.791029Z
2022-04-24T21:51:28.760858Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7168155002cf7aadbfaa14a28f037c880a214764'}
Linux
GSD-2022-1000790
mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work
mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.27 by commit e03ad1915ccccc5c908645c78c9dd4de25ecd1b6. For more details please see the references link.
null
2022-03-18T02:52:44.881401Z
2022-03-18T00:18:08.163292Z
null
null
null
null
null
Linux
GSD-2022-1002257
ASoC: mxs: Fix error handling in mxs_sgtl5000_probe
ASoC: mxs: Fix error handling in mxs_sgtl5000_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 67e12f1cb2f97468c12b59e21975eaa0f332e7d2, it was introduced in version v3.5 by commit e968194b45c4e8077dada75c5bae5660b37628fe. For more details please see the references link.
null
2022-04-25T08:21:05.020449Z
2022-04-24T22:27:07.746756Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e968194b45c4e8077dada75c5bae5660b37628fe'}
Linux
GSD-2021-1000546
net: fec: fix the potential memory leak in fec_enet_init()
net: fec: fix the potential memory leak in fec_enet_init() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit 32a1777fd113335c3f70dc445dffee0ad1c6870f, it was introduced in version v3.18 by commit 59d0f746564495c7f54526674deabfcf101236a1. For more details please see the references link.
null
2021-12-19T22:19:30.777698Z
2021-06-04T19:36:24.266780Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/59d0f746564495c7f54526674deabfcf101236a1'}
Linux
GSD-2021-1002081
btrfs: fix abort logic in btrfs_replace_file_extents
btrfs: fix abort logic in btrfs_replace_file_extents This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit 0e309e1152fc34ef75991d9d69b165dbf75bf26c. For more details please see the references link.
null
2021-12-19T22:49:03.019992Z
2021-11-14T15:18:59.496257Z
null
null
null
null
null
Linux
GSD-2021-1000116
mmc: uniphier-sd: Fix a resource leak in the remove function
mmc: uniphier-sd: Fix a resource leak in the remove function This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.20 by commit ebe0f12cf4c044f812c6d17011531582f9ac8bb3, it was introduced in version v4.20 by commit 3fd784f745dd1747863775a99ec749619ee6759c. For more details please see the references link.
null
2021-12-19T23:56:53.208554Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3fd784f745dd1747863775a99ec749619ee6759c'}
Linux
GSD-2022-1001181
clk: qcom: clk-rcg2: Update logic to calculate D value for RCG
clk: qcom: clk-rcg2: Update logic to calculate D value for RCG This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit a4e2e31971354790b0d1fa3e783452a9d135fcff, it was introduced in version v3.16 by commit 99cbd064b059f222c8839ba433a68b2d6ee33066. For more details please see the references link.
null
2022-04-25T05:58:45.510087Z
2022-04-24T20:51:22.960211Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/99cbd064b059f222c8839ba433a68b2d6ee33066'}
Linux
GSD-2022-1002484
video: fbdev: sm712fb: Fix crash in smtcfb_write()
video: fbdev: sm712fb: Fix crash in smtcfb_write() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit fb791514acf9070225eed46e1ccbb0aa7aae5da5. For more details please see the references link.
null
2022-04-25T04:26:10.338555Z
2022-04-24T22:53:13.904281Z
null
null
null
null
null
Linux
GSD-2022-1000143
moxart: fix potential use-after-free on remove path
moxart: fix potential use-after-free on remove path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.229 by commit 9c25d5ff1856b91bd4365e813f566cb59aaa9552. For more details please see the references link.
null
2022-02-19T10:59:24.781732Z
2022-02-18T21:46:46.262247Z
null
null
null
null
null
Linux
GSD-2021-1001584
bpf: Fix integer overflow in prealloc_elems_and_freelist()
bpf: Fix integer overflow in prealloc_elems_and_freelist() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.153 by commit b14f28126c51533bb329379f65de5b0dd689b13a, it was introduced in version v4.6 by commit 557c0c6e7df8e14a46bd7560d193fa5bbc00a858. For more details please see the references link.
null
2021-12-20T00:23:43.659158Z
2021-10-19T16:24:55.540625Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/557c0c6e7df8e14a46bd7560d193fa5bbc00a858'}
Linux
GSD-2022-1000513
net: dsa: lantiq_gswip: don't use devres for mdiobus
net: dsa: lantiq_gswip: don't use devres for mdiobus This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 2443ba2fe396bdde187a2fdfa6a57375643ae93c, it was introduced in version v5.9 by commit ac3a68d56651c3dad2c12c7afce065fe15267f44. For more details please see the references link.
null
2022-03-07T01:44:12.720202Z
2022-02-27T03:17:11.675876Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac3a68d56651c3dad2c12c7afce065fe15267f44'}
Linux
GSD-2021-1002202
nvme-tcp: fix possible req->offset corruption
nvme-tcp: fix possible req->offset corruption This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit ce7723e9cdae4eb3030da082876580f4b2dc0861, it was introduced in version v5.8 by commit db5ad6b7f8cdd6d78efef62a1557461d0cbaee54. For more details please see the references link.
null
2021-12-19T23:45:08.791505Z
2021-11-14T15:24:30.448326Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/db5ad6b7f8cdd6d78efef62a1557461d0cbaee54'}
Linux
GSD-2022-1001752
rxrpc: Fix call timer start racing with call destruction
rxrpc: Fix call timer start racing with call destruction This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 8cbf4ae7a2833767d63114573e5f9a45740cc975, it was introduced in version v4.15 by commit a158bdd3247b9656df36ba133235fff702e9fdc3. For more details please see the references link.
null
2022-04-25T06:23:40.490945Z
2022-04-24T21:39:37.860268Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a158bdd3247b9656df36ba133235fff702e9fdc3'}
Linux
GSD-2022-1000840
usb: gadget: clear related members when goto fail
usb: gadget: clear related members when goto fail This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.104 by commit fdd64084e405544c5c11841ca9261785c988e2a1. For more details please see the references link.
null
2022-03-18T02:56:26.124213Z
2022-03-18T00:23:04.962011Z
null
null
null
null
null
Linux
GSD-2021-1002652
rds: memory leak in __rds_conn_create()
rds: memory leak in __rds_conn_create() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.222 by commit 1ed173726c1a0082e9d77c7d5a85411e85bdd983, it was introduced in version v4.19.195 by commit 0a3158ac5999fe0b9974604e630078cd1eff8be6. For more details please see the references link.
null
2022-01-11T05:57:44.679161Z
2021-12-27T05:33:17.616415Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0a3158ac5999fe0b9974604e630078cd1eff8be6'}
Linux
GSD-2021-1000395
KVM: Destroy I/O bus devices on unregister failure _after_ sync'ing SRCU
KVM: Destroy I/O bus devices on unregister failure _after_ sync'ing SRCU This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 03c6cccedd3913006744faa252a4da5145299343, it was introduced in version v5.9 by commit f65886606c2d3b562716de030706dfe1bea4ed5e. For more details please see the references link.
null
2021-12-19T22:12:37.539944Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f65886606c2d3b562716de030706dfe1bea4ed5e'}
Linux
GSD-2022-1001302
cifs: prevent bad output lengths in smb2_ioctl_query_info()
cifs: prevent bad output lengths in smb2_ioctl_query_info() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 7529fbee10d82493c5cb109e51788bf74816d1c0. For more details please see the references link.
null
2022-04-25T06:34:24.600494Z
2022-04-24T21:02:25.847940Z
null
null
null
null
null
Linux
GSD-2021-1000680
net: usb: fix memory leak in smsc75xx_bind
net: usb: fix memory leak in smsc75xx_bind This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.235 by commit 9e6b8c1ff9d997e1fa16cbd2d60739adf6dc1bbc, it was introduced in version v2.6.34 by commit d0cad871703b898a442e4049c532ec39168e5b57. For more details please see the references link.
null
2021-12-19T22:22:49.482454Z
2021-06-04T20:00:56.832345Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0cad871703b898a442e4049c532ec39168e5b57'}
Linux
GSD-2021-1001992
isofs: Fix out of bound access for corrupted isofs image
isofs: Fix out of bound access for corrupted isofs image This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.217 by commit b0ddff8d68f2e43857a84dce54c3deab181c8ae1. For more details please see the references link.
null
2021-12-20T00:54:10.629514Z
2021-11-14T15:14:56.910653Z
null
null
null
null
null