ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2022-1001617
jffs2: fix memory leak in jffs2_do_mount_fs
jffs2: fix memory leak in jffs2_do_mount_fs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 5f34310d1376ca5b2ed798258def2c2ab3cc6699, it was introduced in version v2.6.15 by commit e631ddba588783edd521c5a89f7b2902772fb691. For more details please see the references link.
null
2022-04-25T04:36:08.010417Z
2022-04-24T21:28:53.766146Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e631ddba588783edd521c5a89f7b2902772fb691'}
Linux
GSD-2022-1000905
ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min
ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.233 by commit 0b2ecc9163472128e7f30b517bee92dcd27ffc34, it was introduced in version v4.19.228 by commit 65a61b1f56f5386486757930069fbdce94af08bf. For more details please see the references link.
null
2022-03-18T02:49:31.149465Z
2022-03-18T00:30:07.373593Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/65a61b1f56f5386486757930069fbdce94af08bf'}
Linux
GSD-2021-1002347
usb: musb: tusb6010: check return value after calling platform_get_resource()
usb: musb: tusb6010: check return value after calling platform_get_resource() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit 06cfb4cb2241e704d72e3045cf4d7dfb567fbce0. For more details please see the references link.
null
2021-12-20T00:02:04.850744Z
2021-11-29T02:39:50.365367Z
null
null
null
null
null
Linux
GSD-2022-1001247
udmabuf: validate ubuf->pagecount
udmabuf: validate ubuf->pagecount This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 9e9b4a269f84d3230f2af84ff42322db676440d9, it was introduced in version v4.20 by commit fbb0de795078190a9834b3409e4b009cfb18a6d4. For more details please see the references link.
null
2022-04-25T08:04:18.076839Z
2022-04-24T20:57:34.593318Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fbb0de795078190a9834b3409e4b009cfb18a6d4'}
Linux
GSD-2021-1002717
xen/netfront: harden netfront against event channel storms
xen/netfront: harden netfront against event channel storms This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.88 by commit d31b3379179d64724d3bbfa87bd4ada94e3237de. For more details please see the references link.
null
2022-01-11T06:34:12.049624Z
2021-12-27T05:38:47.532343Z
null
null
null
null
null
Linux
GSD-2021-1001838
mm, slub: fix potential memoryleak in kmem_cache_open()
mm, slub: fix potential memoryleak in kmem_cache_open() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit 568f906340b43120abd6fcc67c37396482f85930, it was introduced in version v4.8 by commit 210e7a43fa905bccafa9bb5966fba1d71f33eb8b. For more details please see the references link.
null
2021-12-20T00:29:02.956458Z
2021-10-28T13:51:34.381612Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/210e7a43fa905bccafa9bb5966fba1d71f33eb8b'}
Linux
GSD-2021-1001091
mm/slub: actually fix freelist pointer vs redzoning
mm/slub: actually fix freelist pointer vs redzoning This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit ce6e8bee7a3883e8008b30f5887dbb426aac6a35. For more details please see the references link.
null
2021-12-20T00:13:16.938196Z
2021-06-30T00:39:00.841579Z
null
null
null
null
null
Linux
GSD-2022-1000456
iwlwifi: fix use-after-free
iwlwifi: fix use-after-free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit ddd46059f7d99119b62d44c519df7a79f2e6a515, it was introduced in version v5.15.17 by commit e23f075d77987de4215c8e0696f28bcc707506f7. For more details please see the references link.
null
2022-03-07T01:46:53.527224Z
2022-02-27T03:09:26.516049Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e23f075d77987de4215c8e0696f28bcc707506f7'}
Linux
GSD-2022-1002191
xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu>=32
xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu>=32 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 8a7462b5211cd5b74b8815034d038e28cbd96d52. For more details please see the references link.
null
2022-04-25T03:37:23.086019Z
2022-04-24T22:20:28.978621Z
null
null
null
null
null
Linux
GSD-2021-1000907
scsi: core: Fix error handling of scsi_host_alloc()
scsi: core: Fix error handling of scsi_host_alloc() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.126 by commit 79296e292d67fa7b5fb8d8c27343683e823872c8. For more details please see the references link.
null
2021-12-20T00:02:11.329103Z
2021-06-30T00:05:47.105229Z
null
null
null
null
null
Linux
GSD-2021-1001615
mcb: fix error handling in mcb_alloc_bus()
mcb: fix error handling in mcb_alloc_bus() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.150 by commit 7751f609eadf36b1f53712bae430019c53a16eb0, it was introduced in version v4.7 by commit 5d9e2ab9fea4cdf0a2522f5cbed2e7fbb220d757. For more details please see the references link.
null
2021-12-19T23:18:21.951782Z
2021-10-19T16:28:24.438286Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5d9e2ab9fea4cdf0a2522f5cbed2e7fbb220d757'}
Linux
GSD-2022-1001990
x86/Kconfig: Do not allow CONFIG_X86_X32_ABI=y with llvm-objcopy
x86/Kconfig: Do not allow CONFIG_X86_X32_ABI=y with llvm-objcopy This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit 9cb90f9ad5975ddfc90d0906b40e9c71c2eca44e. For more details please see the references link.
null
2022-04-25T05:36:10.137189Z
2022-04-24T22:01:35.959378Z
null
null
null
null
null
Linux
GSD-2022-1000682
ext4: fix error handling in ext4_fc_record_modified_inode()
ext4: fix error handling in ext4_fc_record_modified_inode() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.8 by commit 14aa3f49c7fc6424763f4323bfbc3a807b0727dc. For more details please see the references link.
null
2022-03-07T02:53:39.642727Z
2022-02-27T03:40:26.697725Z
null
null
null
null
null
Linux
GSD-2022-1002345
kgdboc: fix return value of __setup handler
kgdboc: fix return value of __setup handler This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 1c3bb588b78e07f97e5a55fb523d103d124050a1, it was introduced in version v4.19.2 by commit df7ada33d6dc57926e25e4cf1a22e80b4f385884. For more details please see the references link.
null
2022-04-25T04:11:26.022629Z
2022-04-24T22:36:15.144581Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/df7ada33d6dc57926e25e4cf1a22e80b4f385884'}
Linux
GSD-2022-1000378
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.101 by commit 758290defe93a865a2880d10c5d5abd288b64b5d, it was introduced in version v3.9 by commit e2ca90c276e1fc410d7cd3c1a4eee245ec902a20. For more details please see the references link.
null
2022-03-07T01:35:12.030656Z
2022-02-27T02:58:23.308185Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e2ca90c276e1fc410d7cd3c1a4eee245ec902a20'}
Linux
GSD-2021-1001245
net: fix uninit-value in caif_seqpkt_sendmsg
net: fix uninit-value in caif_seqpkt_sendmsg This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.54 by commit 1582a02fecffcee306663035a295e28e1c4aaaff, it was introduced in version v2.6.35 by commit bece7b2398d073d11b2e352405a3ecd3a1e39c60. For more details please see the references link.
null
2021-12-19T22:38:08.038788Z
2021-08-03T01:47:52.283971Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bece7b2398d073d11b2e352405a3ecd3a1e39c60'}
Linux
GSD-2022-1000728
usb: gadget: rndis: add spinlock for rndis response list
usb: gadget: rndis: add spinlock for rndis response list This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.12 by commit 33222d1571d7ce8c1c75f6b488f38968fa93d2d9, it was introduced in version v4.6 by commit f6281af9d62e128aa6efad29cf7265062af114f2. For more details please see the references link.
null
2022-03-18T02:56:59.902720Z
2022-03-18T00:12:52.290465Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f6281af9d62e128aa6efad29cf7265062af114f2'}
Linux
GSD-2021-1002039
netfilter: xt_IDLETIMER: fix panic that occurs when timer_type has garbage value
netfilter: xt_IDLETIMER: fix panic that occurs when timer_type has garbage value This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit 2a670c323055282c9b72794a491d53cef86bbeaf, it was introduced in version v5.7 by commit 68983a354a655c35d3fb204489d383a2a051fda7. For more details please see the references link.
null
2021-12-19T23:51:14.162230Z
2021-11-14T15:17:07.107707Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/68983a354a655c35d3fb204489d383a2a051fda7'}
Linux
GSD-2022-1001093
docs: sysctl/kernel: add missing bit to panic_print
docs: sysctl/kernel: add missing bit to panic_print This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit c459241243ab28e9af1bdbd785ed69230704e1b5, it was introduced in version v5.2 by commit de6da1e8bcf0dd2058b950b127491821207679dc. For more details please see the references link.
null
2022-04-25T03:31:28.631287Z
2022-04-24T20:44:43.602603Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/de6da1e8bcf0dd2058b950b127491821207679dc'}
Linux
GSD-2022-1001569
ASoC: codecs: wc938x: fix accessing array out of bounds for enum type
ASoC: codecs: wc938x: fix accessing array out of bounds for enum type This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit f03c0c94186d5876857132d97e28f20cdc100bdc, it was introduced in version v5.14 by commit e8ba1e05bdc016700c85fad559a812c2e795442f. For more details please see the references link.
null
2022-04-25T05:02:48.184421Z
2022-04-24T21:24:43.520313Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e8ba1e05bdc016700c85fad559a812c2e795442f'}
Linux
GSD-2021-1000454
liquidio: Fix unintented sign extension of a left shift of a u16
liquidio: Fix unintented sign extension of a left shift of a u16 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.191 by commit 85ab024c69fa865a044c586aeb50e6459cd59c37, it was introduced in version v4.9 by commit 5bc67f587ba7eaa8dd3976bfeff8f2b60718c871. For more details please see the references link.
null
2021-12-20T00:35:23.619107Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5bc67f587ba7eaa8dd3976bfeff8f2b60718c871'}
Linux
GSD-2021-1002469
proc/vmcore: fix clearing user buffer by properly using clear_user()
proc/vmcore: fix clearing user buffer by properly using clear_user() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.83 by commit a8a917058faf4abaec9fb614bb6d5f8fe3529ec6, it was introduced in version v3.0 by commit 997c136f518c5debd63847e78e2a8694f56dcf90. For more details please see the references link.
null
2021-12-19T22:03:19.828164Z
2021-12-19T19:38:39.995905Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/997c136f518c5debd63847e78e2a8694f56dcf90'}
Linux
GSD-2022-1001139
video: fbdev: cirrusfb: check pixclock to avoid divide by zero
video: fbdev: cirrusfb: check pixclock to avoid divide by zero This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit e498b504f8c81b07efab9febf8503448de4dc9cf. For more details please see the references link.
null
2022-04-25T05:16:03.971917Z
2022-04-24T20:48:31.484905Z
null
null
null
null
null
Linux
GSD-2021-1002193
mm: filemap: check if THP has hwpoisoned subpage for PMD page fault
mm: filemap: check if THP has hwpoisoned subpage for PMD page fault This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit eac96c3efdb593df1a57bb5b95dbe037bfa9a522, it was introduced in version v4.8 by commit 800d8c63b2e989c2e349632d1648119bf5862f01. For more details please see the references link.
null
2021-12-20T01:16:56.257616Z
2021-11-14T15:24:08.266580Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/800d8c63b2e989c2e349632d1648119bf5862f01'}
Linux
GSD-2021-1002486
sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl
sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.84 by commit 4a46b2f5dce02539e88a300800812bd24a45e097, it was introduced in version v2.6.24 by commit faf0b2e5afe7dae072d2715763c7f992b612b628. For more details please see the references link.
null
2021-12-20T00:24:38.371976Z
2021-12-19T19:39:28.212900Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/faf0b2e5afe7dae072d2715763c7f992b612b628'}
Linux
GSD-2021-1000141
md/raid1: properly indicate failure when ending a failed write request
md/raid1: properly indicate failure when ending a failed write request This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.36 by commit 661061a45e32d8b2cc0e306da9f169ad44011382, it was introduced in version v5.4 by commit eeba6809d8d58908b5ed1b5ceb5fcb09a98a7cad. For more details please see the references link.
null
2021-12-19T23:50:47.058657Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/eeba6809d8d58908b5ed1b5ceb5fcb09a98a7cad'}
Linux
GSD-2021-1000511
scsi: qedf: Add pointer checks in qedf_update_link_speed()
scsi: qedf: Add pointer checks in qedf_update_link_speed() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.40 by commit a6362a737572f66051deb7637f3f77ddf7a4402f, it was introduced in version v4.11 by commit 61d8658b4a435eac729966cc94cdda077a8df5cd. For more details please see the references link.
null
2021-12-20T01:00:15.385359Z
2021-05-31T23:48:29.693093Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61d8658b4a435eac729966cc94cdda077a8df5cd'}
Linux
GSD-2022-1001586
btrfs: verify the tranisd of the to-be-written dirty extent buffer
btrfs: verify the tranisd of the to-be-written dirty extent buffer This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 17a2437d44f4bfa1f199343075e6458303a2dceb. For more details please see the references link.
null
2022-04-25T04:30:05.778058Z
2022-04-24T21:26:28.922092Z
null
null
null
null
null
Linux
GSD-2022-1002200
drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj
drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 4009f104b02b223d1a11d74b36b1cc083bc37028. For more details please see the references link.
null
2022-04-25T08:31:30.234583Z
2022-04-24T22:21:07.322179Z
null
null
null
null
null
Linux
GSD-2021-1000842
drm: Lock pointer access in drm_master_release()
drm: Lock pointer access in drm_master_release() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.273 by commit 8e250a134c8fe2a945d10b421d0ccb54e85d8683. For more details please see the references link.
null
2021-12-19T23:03:18.106043Z
2021-06-30T00:00:46.475562Z
null
null
null
null
null
Linux
GSD-2021-1001750
dma-debug: prevent an error message from causing runtime problems
dma-debug: prevent an error message from causing runtime problems This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.9 by commit de4afec2d2946c92c62a15ab341c70b287289e6a. For more details please see the references link.
null
2021-12-19T22:52:40.693441Z
2021-10-19T16:34:54.175041Z
null
null
null
null
null
Linux
GSD-2021-1001300
udf: Fix NULL pointer dereference in udf_symlink function
udf: Fix NULL pointer dereference in udf_symlink function This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.51 by commit 21bf1414580c36ffc8d8de043beb3508cf812238. For more details please see the references link.
null
2021-12-19T22:39:02.800485Z
2021-08-03T02:01:42.190967Z
null
null
null
null
null
Linux
GSD-2022-1000397
gcc-plugins/stackleak: Use noinstr in favor of notrace
gcc-plugins/stackleak: Use noinstr in favor of notrace This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.102 by commit 143aaf79bafa9839cabebd49aa10b36f8aaef3ce. For more details please see the references link.
null
2022-03-07T02:27:11.536493Z
2022-02-27T03:01:15.418747Z
null
null
null
null
null
Linux
GSD-2022-1001355
drbd: Fix five use after free bugs in get_initial_state
drbd: Fix five use after free bugs in get_initial_state This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit de63e74da2333b4068bb79983e632db730fea97e, it was introduced in version v4.5 by commit a29728463b254ce81ecefdf20c1a02e01d9361da. For more details please see the references link.
null
2022-04-25T04:22:07.106157Z
2022-04-24T21:07:14.071270Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a29728463b254ce81ecefdf20c1a02e01d9361da'}
Linux
GSD-2021-1002605
mtd: rawnand: fsmc: Fix timing computation
mtd: rawnand: fsmc: Fix timing computation This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.8 by commit a4953e7b6f6ab5e1faf3267b5728e40eac1b6f8d, it was introduced in version v4.13 by commit d9fb0795718333e36f7e472d7d81b7b8efe347c8. For more details please see the references link.
null
2021-12-19T23:19:38.165575Z
2021-12-19T19:44:45.861136Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9fb0795718333e36f7e472d7d81b7b8efe347c8'}
Linux
GSD-2021-1000638
serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'
serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.124 by commit 915452f40e2f495e187276c4407a4f567ec2307e, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T22:27:11.195840Z
2021-06-04T19:52:43.512672Z
null
null
null
null
null
Linux
GSD-2021-1000792
efi/libstub: prevent read overflow in find_file_option()
efi/libstub: prevent read overflow in find_file_option() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.10 by commit e786eacbf323b632bd4e77fc0f5474b5a422e025, it was introduced in version v5.8 by commit 7a88a6227dc7f2e723bba11ece05e57bd8dce8e4. For more details please see the references link.
null
2021-12-19T22:51:15.528523Z
2021-06-25T00:05:56.557149Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7a88a6227dc7f2e723bba11ece05e57bd8dce8e4'}
Linux
GSD-2021-1001880
mm/secretmem: fix NULL page->mapping dereference in page_is_secretmem()
mm/secretmem: fix NULL page->mapping dereference in page_is_secretmem() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit b77ba1e02345bafd703f0d407bdbd88c3be1f767, it was introduced in version v5.14 by commit 1507f51255c9ff07d75909a84e7c0d7f3c4b2f49. For more details please see the references link.
null
2021-12-19T23:49:40.348077Z
2021-10-28T13:53:40.540005Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1507f51255c9ff07d75909a84e7c0d7f3c4b2f49'}
Linux
GSD-2022-1001705
staging: vchiq_core: handle NULL result of find_service_by_handle
staging: vchiq_core: handle NULL result of find_service_by_handle This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 42f2142a337ee372455574809fc924580a7e51b2. For more details please see the references link.
null
2022-04-25T06:45:18.206306Z
2022-04-24T21:36:40.671464Z
null
null
null
null
null
Linux
GSD-2022-1000817
sr9700: sanity check for packet length
sr9700: sanity check for packet length This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.26 by commit 9f2d614779906f3d8ad4fb882c5b3e5ad6150bbe. For more details please see the references link.
null
2022-03-18T03:02:07.878645Z
2022-03-18T00:21:10.535472Z
null
null
null
null
null
Linux
GSD-2021-1002255
scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()
scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.218 by commit b291d147d0268e93ad866f8bc820ea14497abc9b. For more details please see the references link.
null
2021-12-20T00:37:03.570640Z
2021-11-29T02:35:35.536638Z
null
null
null
null
null
Linux
GSD-2021-1000268
nvmet-tcp: fix incorrect locking in state_change sk callback
nvmet-tcp: fix incorrect locking in state_change sk callback This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 906c538340dde6d891df89fe7dac8eaa724e40da, it was introduced in version v5.0 by commit 872d26a391da92ed8f0c0f5cb5fef428067b7f30. For more details please see the references link.
null
2021-12-19T23:44:45.053296Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/872d26a391da92ed8f0c0f5cb5fef428067b7f30'}
Linux
GSD-2022-1000544
iwlwifi: fix use-after-free
iwlwifi: fix use-after-free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit 9958b9cbb22145295ee1ffaea0904c383da2c05d, it was introduced in version v5.16.3 by commit 6b5ad4bd0d78fef6bbe0ecdf96e09237c9c52cc1. For more details please see the references link.
null
2022-03-07T01:37:49.434743Z
2022-02-27T03:21:31.352593Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6b5ad4bd0d78fef6bbe0ecdf96e09237c9c52cc1'}
Linux
GSD-2022-1002083
mips: cdmm: Fix refcount leak in mips_cdmm_phys_base
mips: cdmm: Fix refcount leak in mips_cdmm_phys_base This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit ef1728e3cb9e43f38ed10cde705a7ba2b4ad2d35, it was introduced in version v5.9 by commit 2121aa3e2312ccc1d6299154dc4f07a6ab8beee2. For more details please see the references link.
null
2022-04-25T03:10:06.182454Z
2022-04-24T22:09:04.600150Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2121aa3e2312ccc1d6299154dc4f07a6ab8beee2'}
Linux
GSD-2021-1001029
usb: dwc3-meson-g12a: fix usb2 PHY glue init when phy0 is disabled
usb: dwc3-meson-g12a: fix usb2 PHY glue init when phy0 is disabled This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit d8dd3754e707104a34f8ec595034d503ea8871a2, it was introduced in version v5.8 by commit 013af227f58a97ffc61b99301f8f4448dc7e7f55. For more details please see the references link.
null
2021-12-19T23:07:21.328123Z
2021-06-30T00:34:56.848978Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/013af227f58a97ffc61b99301f8f4448dc7e7f55'}
Linux
GSD-2021-1001183
netfilter: nf_tables: Fix dereference of null pointer flow
netfilter: nf_tables: Fix dereference of null pointer flow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.5 by commit 70a5a1950cca02c5cd161bb3846b4d983eed97d3, it was introduced in version v5.13.2 by commit 09b1f676e2e0bbff67c568672c565c6f31470157. For more details please see the references link.
null
2021-12-20T01:02:37.135933Z
2021-08-03T01:33:02.573543Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/09b1f676e2e0bbff67c568672c565c6f31470157'}
Linux
GSD-2022-1000114
net: ieee802154: ca8210: Stop leaking skb's
net: ieee802154: ca8210: Stop leaking skb's This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.265 by commit a1c277b0ed2a13e7de923b5f03bc23586eceb851, it was introduced in version v4.12 by commit ded845a781a578dfb0b5b2c138e5a067aa3b1242. For more details please see the references link.
null
2022-02-19T09:58:19.250667Z
2022-02-18T21:42:40.239559Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ded845a781a578dfb0b5b2c138e5a067aa3b1242'}
Linux
GSD-2022-1002129
mm,hwpoison: unmap poisoned page before invalidation
mm,hwpoison: unmap poisoned page before invalidation This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit bc2f58b8e47cc01cb75e13e29930e4e547d6bc5c, it was introduced in version v5.10.110 by commit fa37c1714367e530f592d451607433ab58d56643. For more details please see the references link.
null
2022-04-24T22:14:11.289754Z
2022-04-24T22:14:11.289754Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fa37c1714367e530f592d451607433ab58d56643'}
Linux
GSD-2021-1001479
watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff()
watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.276 by commit 0015581a79bbf8e521f85dddb7d3e4a66b9f51d4. For more details please see the references link.
null
2021-12-19T22:13:39.018346Z
2021-08-03T02:53:44.693283Z
null
null
null
null
null
Linux
GSD-2021-1001496
HID: usbhid: free raw_report buffers in usbhid_stop
HID: usbhid: free raw_report buffers in usbhid_stop This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.286 by commit 7ce4e49146612261265671b1d30d117139021030. For more details please see the references link.
null
2021-12-19T22:26:01.948416Z
2021-10-19T16:20:51.827025Z
null
null
null
null
null
Linux
GSD-2022-1000401
libsubcmd: Fix use-after-free for realloc(..., 0)
libsubcmd: Fix use-after-free for realloc(..., 0) This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.102 by commit 50f3b00d4c7ba9aef6e0be4db192ee81f4f8a125, it was introduced in version v4.5 by commit 2f4ce5ec1d447beb42143a9653716a2ab025161e. For more details please see the references link.
null
2022-03-07T01:38:22.939956Z
2022-02-27T03:01:42.679538Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2f4ce5ec1d447beb42143a9653716a2ab025161e'}
Linux
GSD-2022-1000051
i2c: validate user data in compat ioctl
i2c: validate user data in compat ioctl This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.13 by commit f68599581067e8a5a8901ba9eb270b4519690e26, it was introduced in version v4.15 by commit 7d5cb45655f2e9e37ef75d18f50c0072ef14a38b. For more details please see the references link.
null
2022-01-11T05:49:00.740962Z
2022-01-10T19:51:53.981647Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7d5cb45655f2e9e37ef75d18f50c0072ef14a38b'}
Linux
GSD-2021-1002740
inet_diag: fix kernel-infoleak for UDP sockets
inet_diag: fix kernel-infoleak for UDP sockets This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit e5d28205bf1de7082d904ed277ceb2db2879e302, it was introduced in version v3.3 by commit 3c4d05c8056724aff3abc20650807dd828fded54. For more details please see the references link.
null
2022-01-11T05:56:59.644790Z
2021-12-27T05:45:59.927603Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c4d05c8056724aff3abc20650807dd828fded54'}
Linux
GSD-2021-1000287
m68k: mvme147,mvme16x: Don't wipe PCC timer config bits
m68k: mvme147,mvme16x: Don't wipe PCC timer config bits This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 5d34225169346cab5145978d153b9ce90e9ace21, it was introduced in version v5.2 by commit 7529b90d051e4629884771ba2b1d3a87d2c6a9d7. For more details please see the references link.
null
2021-12-20T00:39:09.758098Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7529b90d051e4629884771ba2b1d3a87d2c6a9d7'}
Linux
GSD-2022-1001210
mips: cdmm: Fix refcount leak in mips_cdmm_phys_base
mips: cdmm: Fix refcount leak in mips_cdmm_phys_base This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 721ab4be20d4448dd04c2cc8ed99cd4f3e45f765, it was introduced in version v5.9 by commit 2121aa3e2312ccc1d6299154dc4f07a6ab8beee2. For more details please see the references link.
null
2022-04-25T06:46:44.806563Z
2022-04-24T20:53:58.936800Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2121aa3e2312ccc1d6299154dc4f07a6ab8beee2'}
Linux
GSD-2021-1002310
hugetlb, userfaultfd: fix reservation restore on userfaultfd error
hugetlb, userfaultfd: fix reservation restore on userfaultfd error This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit b5069d44e2fbc4a9093d005b3ef0949add3dd27e, it was introduced in version v5.14 by commit c7b1850dfb41d0b4154aca8dbc04777fbd75616f. For more details please see the references link.
null
2021-12-19T23:47:18.315265Z
2021-11-29T02:38:12.559139Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c7b1850dfb41d0b4154aca8dbc04777fbd75616f'}
Linux
GSD-2022-1001640
dm integrity: fix memory corruption when tag_size is less than digest size
dm integrity: fix memory corruption when tag_size is less than digest size This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.35 by commit 6b4bf97587ef6c1927a78934b700204920655123. For more details please see the references link.
null
2022-04-25T03:54:28.400427Z
2022-04-24T21:30:52.576273Z
null
null
null
null
null
Linux
GSD-2022-1000952
gso: do not skip outer ip header in case of ipip and net_failover
gso: do not skip outer ip header in case of ipip and net_failover This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.304 by commit 45d006c2c7ed7baf1fa258fa7b5bc9923d3a983e, it was introduced in version v3.13 by commit cb32f511a70be8967ac9025cf49c44324ced9a39. For more details please see the references link.
null
2022-03-18T03:44:58.539309Z
2022-03-18T00:36:26.101271Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cb32f511a70be8967ac9025cf49c44324ced9a39'}
Linux
GSD-2021-1002185
isdn: mISDN: Fix sleeping function called from invalid context
isdn: mISDN: Fix sleeping function called from invalid context This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 6510e80a0b81b5d814e3aea6297ba42f5e76f73c. For more details please see the references link.
null
2021-12-20T00:28:30.173934Z
2021-11-14T15:23:47.897663Z
null
null
null
null
null
Linux
GSD-2021-1000442
ACPI: scan: Fix a memory leak in an error handling path
ACPI: scan: Fix a memory leak in an error handling path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.191 by commit 69cc821e89ce572884548ac54c4f80eec7a837a5, it was introduced in version v4.19.184 by commit 7385e438e1f31af5b86f72fd19b0dcd2738502c9. For more details please see the references link.
null
2021-12-19T23:04:49.277354Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7385e438e1f31af5b86f72fd19b0dcd2738502c9'}
Linux
GSD-2022-1001085
Bluetooth: hci_event: Ignore multiple conn complete events
Bluetooth: hci_event: Ignore multiple conn complete events This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit aa1ca580e3ffe62a2c5ea1c095b609b2943c5269. For more details please see the references link.
null
2022-04-25T04:23:16.673309Z
2022-04-24T20:44:08.956228Z
null
null
null
null
null
Linux
GSD-2021-1000012
KVM: VMX: Don't use vcpu->run->internal.ndata as an array index
KVM: VMX: Don't use vcpu->run->internal.ndata as an array index This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.16 by commit ce541d7b59566a0d94c7c99bfb5d34b050e6af70, it was introduced in version v5.9 by commit 1aa561b1a4c0ae2a9a9b9c21a84b5ca66b4775d8. For more details please see the references link.
null
2021-12-20T01:08:06.873919Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1aa561b1a4c0ae2a9a9b9c21a84b5ca66b4775d8'}
Linux
GSD-2021-1001253
bpf: Track subprog poke descriptors correctly and fix use-after-free
bpf: Track subprog poke descriptors correctly and fix use-after-free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.53 by commit a9f36bf3613c65cb587c70fac655c775d911409b, it was introduced in version v5.10 by commit a748c6975dea325da540610c2ba9b5f332c603e6. For more details please see the references link.
null
2021-12-19T23:04:18.599831Z
2021-08-03T01:49:11.858893Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a748c6975dea325da540610c2ba9b5f332c603e6'}
Linux
GSD-2022-1002353
power: supply: wm8350-power: Add missing free in free_charger_irq
power: supply: wm8350-power: Add missing free in free_charger_irq This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 60dd1082322966f192f42fe2a6605dfa08eef41f, it was introduced in version v2.6.29 by commit 14431aa0c5a443d13d24e6f865a8838f97dab973. For more details please see the references link.
null
2022-04-25T02:50:23.914521Z
2022-04-24T22:37:34.679891Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/14431aa0c5a443d13d24e6f865a8838f97dab973'}
Linux
GSD-2022-1000694
ibmvnic: free reset-work-item when flushing
ibmvnic: free reset-work-item when flushing This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.13 by commit 4c26745e4576cec224092e6cc12e37829333b183, it was introduced in version v4.18 by commit 2770a7984db588913e11a6dfcfe3461dbba9b7b2. For more details please see the references link.
null
2022-03-18T03:00:39.456547Z
2022-03-18T00:10:05.832369Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2770a7984db588913e11a6dfcfe3461dbba9b7b2'}
Linux
GSD-2022-1001986
scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one()
scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit c5f77b595379b5191316edd365a542f8b1526066, it was introduced in version v2.6.23 by commit 45804fbb00eea27bdf4d62751681228a9e2844e9. For more details please see the references link.
null
2022-04-25T05:38:09.837812Z
2022-04-24T22:01:19.918938Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/45804fbb00eea27bdf4d62751681228a9e2844e9'}
Linux
GSD-2021-1001603
crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()
crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.151 by commit 24f3d2609114f1e1f6b487b511ce5fa36f21e0ae, it was introduced in version v4.12 by commit 36cf515b9bbe298e1ce7384620f0d4ec45ad3328. For more details please see the references link.
null
2021-12-19T23:35:28.299595Z
2021-10-19T16:27:50.033767Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/36cf515b9bbe298e1ce7384620f0d4ec45ad3328'}
Linux
GSD-2021-1000911
gfs2: Fix use-after-free in gfs2_glock_shrink_scan
gfs2: Fix use-after-free in gfs2_glock_shrink_scan This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.127 by commit 86fd5b27db743a0ce0cc245e3a34813b2aa6ec1d. For more details please see the references link.
null
2021-12-20T00:52:33.314963Z
2021-06-30T00:06:01.924010Z
null
null
null
null
null
Linux
GSD-2022-1000381
fs/proc: task_mmu.c: don't read mapcount for migration entry
fs/proc: task_mmu.c: don't read mapcount for migration entry This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.102 by commit db3f3636e4aed2cba3e4e7897a053323f7a62249, it was introduced in version v4.5 by commit e9b61f19858a5d6c42ce2298cf138279375d0d9b. For more details please see the references link.
null
2022-03-07T01:39:05.458691Z
2022-02-27T02:58:43.516281Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e9b61f19858a5d6c42ce2298cf138279375d0d9b'}
Linux
GSD-2021-1001316
igc: Fix use-after-free error during reset
igc: Fix use-after-free error during reset This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.136 by commit a9508e0edfe369ac95d0825bcdca976436ce780f, it was introduced in version v4.20 by commit 13b5b7fd6a4a96dffe604f25e7b64cfbd9520924. For more details please see the references link.
null
2021-12-20T00:44:43.555412Z
2021-08-03T02:06:33.344096Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/13b5b7fd6a4a96dffe604f25e7b64cfbd9520924'}
Linux
GSD-2022-1001969
irqchip/gic-v3: Fix GICR_CTLR.RWP polling
irqchip/gic-v3: Fix GICR_CTLR.RWP polling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit ff24114bb08d8b90edf2aff0a4fd0689523e6c17, it was introduced in version v3.17 by commit 021f653791ad17e03f98aaa7fb933816ae16f161. For more details please see the references link.
null
2022-04-25T04:52:19.776689Z
2022-04-24T21:59:32.414728Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/021f653791ad17e03f98aaa7fb933816ae16f161'}
Linux
GSD-2021-1001746
xen/balloon: use a kernel thread instead a workqueue
xen/balloon: use a kernel thread instead a workqueue This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.9 by commit 922fd5b6bb13ad31ff36e86e2eba2f26d8135272. For more details please see the references link.
null
2021-12-19T23:01:49.480123Z
2021-10-19T16:34:41.886446Z
null
null
null
null
null
Linux
GSD-2021-1000854
net/qla3xxx: fix schedule while atomic in ql_sem_spinlock
net/qla3xxx: fix schedule while atomic in ql_sem_spinlock This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.237 by commit b0b447bcdeda85fa66782ee8ea1758d55eeec224. For more details please see the references link.
null
2021-12-19T23:08:00.498418Z
2021-06-30T00:01:32.121547Z
null
null
null
null
null
Linux
GSD-2022-1002216
video: fbdev: cirrusfb: check pixclock to avoid divide by zero
video: fbdev: cirrusfb: check pixclock to avoid divide by zero This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 53a2088a396cfa1da92690a1da289634cd73bf0d. For more details please see the references link.
null
2022-04-25T05:55:56.849121Z
2022-04-24T22:22:36.626800Z
null
null
null
null
null
Linux
GSD-2022-1001590
brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path
brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 4e0b507597e1a86e9b4c056ab274c427223cf8ea, it was introduced in version v5.4 by commit 82f93cf46d6007ffa003b2d4a2834563b6b84d21. For more details please see the references link.
null
2022-04-25T05:26:33.458517Z
2022-04-24T21:26:46.902836Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/82f93cf46d6007ffa003b2d4a2834563b6b84d21'}
Linux
GSD-2021-1000507
uio_hv_generic: Fix a memory leak in error handling paths
uio_hv_generic: Fix a memory leak in error handling paths This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.40 by commit d84b5e912212b05f6b5bde9f682046accfbe0354, it was introduced in version v4.20 by commit cdfa835c6e5e87d145f9f632b58843de97509f2b. For more details please see the references link.
null
2021-12-20T01:26:26.310222Z
2021-05-31T23:47:45.168017Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cdfa835c6e5e87d145f9f632b58843de97509f2b'}
Linux
GSD-2021-1000157
ovl: fix leaked dentry
ovl: fix leaked dentry This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.35 by commit 71d58457a8afc650da5d3292a7f7029317654d95, it was introduced in version v5.8 by commit 6815f479ca90ee7fd2e28b2a420f796b974155fe. For more details please see the references link.
null
2021-12-20T01:15:24.822179Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6815f479ca90ee7fd2e28b2a420f796b974155fe'}
Linux
GSD-2021-1002490
tcp: fix page frag corruption on page fault
tcp: fix page frag corruption on page fault This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.84 by commit c6f340a331fb72e5ac23a083de9c780e132ca3ae, it was introduced in version v3.7 by commit 5640f7685831e088fe6c2e1f863a6805962f8e81. For more details please see the references link.
null
2021-12-20T00:36:45.467051Z
2021-12-19T19:39:38.501619Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5640f7685831e088fe6c2e1f863a6805962f8e81'}
Linux
GSD-2022-1000102
net: fix information leakage in /proc/net/ptype
net: fix information leakage in /proc/net/ptype This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.265 by commit c38023032a598ec6263e008d62c7f02def72d5c7, it was introduced in version v2.6.26 by commit 2feb27dbe00cbb4f7d31f90acf6bd0d751dd0a50. For more details please see the references link.
null
2022-02-20T01:59:38.996357Z
2022-02-18T21:35:25.165532Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2feb27dbe00cbb4f7d31f90acf6bd0d751dd0a50'}
Linux
GSD-2021-1001195
watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff()
watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.4 by commit f0feab82f6a0323f54d85e8b512a2be64f83648a. For more details please see the references link.
null
2021-12-20T00:23:13.205554Z
2021-08-03T01:34:16.271668Z
null
null
null
null
null
Linux
GSD-2022-1002095
power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init
power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 879356a6a05559582b0a7895d86d2d4359745c08, it was introduced in version v4.9 by commit 8c0984e5a75337df513047ec92a6c09d78e3e5cd. For more details please see the references link.
null
2022-04-25T03:12:09.423079Z
2022-04-24T22:10:32.888746Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c0984e5a75337df513047ec92a6c09d78e3e5cd'}
Linux
GSD-2022-1000552
drop_monitor: fix data-race in dropmon_net_event / trace_napi_poll_hit
drop_monitor: fix data-race in dropmon_net_event / trace_napi_poll_hit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit 234ffe4e4854858e3a2a3a457b622bb043bc10c2, it was introduced in version v2.6.31 by commit 4ea7e38696c7e798c47ebbecadfd392f23f814f9. For more details please see the references link.
null
2022-03-07T01:37:16.982703Z
2022-02-27T03:23:05.267412Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4ea7e38696c7e798c47ebbecadfd392f23f814f9'}
Linux
GSD-2021-1002243
scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()
scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.256 by commit f05a0191b90156e539cccc189b9d87ca2a4d9305. For more details please see the references link.
null
2021-12-20T00:17:20.488226Z
2021-11-29T02:34:57.802519Z
null
null
null
null
null
Linux
GSD-2022-1000801
RDMA/ib_srp: Fix a deadlock
RDMA/ib_srp: Fix a deadlock This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.26 by commit c8b56e51aa91b8e7df3a98388dce3fdabd15c1d4, it was introduced in version v3.8 by commit ef6c49d87c3418c442a22e55e3ce2f91b163d69e. For more details please see the references link.
null
2022-03-18T04:20:04.285924Z
2022-03-18T00:19:26.705367Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef6c49d87c3418c442a22e55e3ce2f91b163d69e'}
Linux
GSD-2022-1001713
scsi: libfc: Fix use after free in fc_exch_abts_resp()
scsi: libfc: Fix use after free in fc_exch_abts_resp() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit f581df412bc45c95176e3c808ee2839c05b2ab0c. For more details please see the references link.
null
2022-04-25T04:23:09.487173Z
2022-04-24T21:37:03.804426Z
null
null
null
null
null
Linux
GSD-2021-1001896
mptcp: fix possible stall on recvmsg()
mptcp: fix possible stall on recvmsg() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit 1a4554e94f0deff9fc1dc5addf93fa579cc29711, it was introduced in version v5.6 by commit 7a6a6cbc3e592e339ad23e4e8ede9a3f6160bda8. For more details please see the references link.
null
2021-12-20T01:31:09.256052Z
2021-10-28T13:54:35.220932Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7a6a6cbc3e592e339ad23e4e8ede9a3f6160bda8'}
Linux
GSD-2021-1000784
btrfs: abort in rename_exchange if we fail to insert the second ref
btrfs: abort in rename_exchange if we fail to insert the second ref This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.43 by commit 0df50d47d17401f9f140dfbe752a65e5d72f9932, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T22:12:29.909332Z
2021-06-25T00:05:25.777513Z
null
null
null
null
null
Linux
GSD-2021-1002613
dm btree remove: fix use after free in rebalance_children()
dm btree remove: fix use after free in rebalance_children() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.296 by commit a48f6a2bf33734ec5669ee03067dfb6c5b4818d6. For more details please see the references link.
null
2022-01-11T05:52:39.599722Z
2021-12-27T05:27:14.742611Z
null
null
null
null
null
Linux
GSD-2022-1001343
irqchip/gic-v3: Fix GICR_CTLR.RWP polling
irqchip/gic-v3: Fix GICR_CTLR.RWP polling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 60e1eb4811f53f5f60c788297d978515e7a2637a, it was introduced in version v3.17 by commit 021f653791ad17e03f98aaa7fb933816ae16f161. For more details please see the references link.
null
2022-04-25T04:28:12.255714Z
2022-04-24T21:06:15.582443Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/021f653791ad17e03f98aaa7fb933816ae16f161'}
Linux
GSD-2022-1000944
cifs: fix double free race when mount fails in cifs_get_root()
cifs: fix double free race when mount fails in cifs_get_root() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.305 by commit da834d6c1147c7519a9e55b510a03b7055104749. For more details please see the references link.
null
2022-03-18T03:00:13.636216Z
2022-03-18T00:35:01.414884Z
null
null
null
null
null
Linux
GSD-2022-1001656
net/smc: Fix NULL pointer dereference in smc_pnet_find_ib()
net/smc: Fix NULL pointer dereference in smc_pnet_find_ib() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.35 by commit 3a523807f01455fe9a0c1a433f27cd4411ee400f, it was introduced in version v5.1 by commit af5f60c7e3d593c2fa31b9a62c16eae75f074de3. For more details please see the references link.
null
2022-04-25T04:56:04.690811Z
2022-04-24T21:32:04.602783Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/af5f60c7e3d593c2fa31b9a62c16eae75f074de3'}
Linux
GSD-2021-1002306
cfg80211: call cfg80211_stop_ap when switch from P2P_GO type
cfg80211: call cfg80211_stop_ap when switch from P2P_GO type This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit 5a9b671c8d74a3e1b999e7a0c7f366079bcc93dd, it was introduced in version v3.6 by commit ac800140c20e7ae51117e71289065bedd4930fc2. For more details please see the references link.
null
2021-12-19T22:21:01.476516Z
2021-11-29T02:38:03.332775Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac800140c20e7ae51117e71289065bedd4930fc2'}
Linux
GSD-2022-1001206
bpf, sockmap: Fix memleak in sk_psock_queue_msg
bpf, sockmap: Fix memleak in sk_psock_queue_msg This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 03948ed6553960db62f1c33bec29e64d7c191a3f, it was introduced in version v5.14 by commit 9635720b7c88592214562cb72605bdab6708006c. For more details please see the references link.
null
2022-04-25T06:45:53.507766Z
2022-04-24T20:53:39.529495Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9635720b7c88592214562cb72605bdab6708006c'}
Linux
GSD-2021-1000291
Drivers: hv: vmbus: Drop error message when 'No request id available'
Drivers: hv: vmbus: Drop error message when 'No request id available' This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 9dbd136aff69d3e197e733af56e57b1aa8e917ab, it was introduced in version v5.11 by commit e8b7db38449ac5b950a3f00519171c4be3e226ff. For more details please see the references link.
null
2021-12-20T01:08:55.081012Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e8b7db38449ac5b950a3f00519171c4be3e226ff'}
Linux
GSD-2021-1001879
blk-cgroup: blk_cgroup_bio_start() should use irq-safe operations on blkg->iostat_cpu
blk-cgroup: blk_cgroup_bio_start() should use irq-safe operations on blkg->iostat_cpu This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit b1a34f86b41fd89441fa0e245b6b23627b0d73d3, it was introduced in version v5.13 by commit 2d146aa3aa842d7f5065802556b4f9a2c6e8ef12. For more details please see the references link.
null
2021-12-19T23:16:38.317407Z
2021-10-28T13:53:37.977143Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2d146aa3aa842d7f5065802556b4f9a2c6e8ef12'}
Linux
GSD-2021-1002756
selinux: fix sleeping function called from invalid context
selinux: fix sleeping function called from invalid context This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit d1bac0d97bc9b18b7c077a66375cc4282d01c367, it was introduced in version v5.13 by commit 69c4a42d72eb9b41e1c6e4bc9ab7f3650bf35f62. For more details please see the references link.
null
2022-01-11T05:58:29.793130Z
2021-12-27T05:48:31.023188Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69c4a42d72eb9b41e1c6e4bc9ab7f3650bf35f62'}
Linux
GSD-2022-1000047
parisc: Clear stale IIR value on instruction access rights trap
parisc: Clear stale IIR value on instruction access rights trap This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.90 by commit d01e9ce1af6116f812491d3d3873d204f10ae0b8. For more details please see the references link.
null
2022-01-11T05:53:23.604346Z
2022-01-10T19:51:44.004435Z
null
null
null
null
null
Linux
GSD-2022-1000417
scsi: target: iscsi: Make sure the np under each tpg is unique
scsi: target: iscsi: Make sure the np under each tpg is unique This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit 4f786e8f18c3e80a168aac3e4f9da99310b8fcdd. For more details please see the references link.
null
2022-03-07T01:39:59.961839Z
2022-02-27T03:04:11.348563Z
null
null
null
null
null
Linux
GSD-2021-1001480
watchdog: Fix possible use-after-free in wdt_startup()
watchdog: Fix possible use-after-free in wdt_startup() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.276 by commit 63a3dc24bd053792f84cb4eef0168b1266202a02. For more details please see the references link.
null
2021-12-19T23:14:41.470118Z
2021-08-03T02:53:59.836201Z
null
null
null
null
null
Linux
GSD-2021-1001654
mac80211: fix use-after-free in CCMP/GCMP RX
mac80211: fix use-after-free in CCMP/GCMP RX This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.71 by commit 57de2dcb18742dc2860861c9f496da7d42b67da0, it was introduced in version v5.10.42 by commit e64ea0597050157f926ac2ba9b478a44ee5be945. For more details please see the references link.
null
2021-12-19T22:57:50.738070Z
2021-10-19T16:30:13.802770Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e64ea0597050157f926ac2ba9b478a44ee5be945'}