ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2021-1000946
drm: Fix use-after-free read in drm_getunique()
drm: Fix use-after-free read in drm_getunique() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.44 by commit 491d52e0078860b33b6c14f0a7ac74ca1b603bd6. For more details please see the references link.
null
2021-12-20T00:49:34.823452Z
2021-06-30T00:28:29.252345Z
null
null
null
null
null
Linux
GSD-2022-1000339
net: do not keep the dst cache when uncloning an skb dst and its metadata
net: do not keep the dst cache when uncloning an skb dst and its metadata This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.180 by commit 0b6087c6358656dd39dc714233d5183abc9c47a1, it was introduced in version v4.6 by commit d71785ffc7e7cae3fbdc4ea8a9d05b7a1c59f7b8. For more details please see the references link.
null
2022-03-07T01:39:38.329954Z
2022-02-27T02:53:15.365759Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d71785ffc7e7cae3fbdc4ea8a9d05b7a1c59f7b8'}
Linux
GSD-2022-1002304
ata: sata_dwc_460ex: Fix crash due to OOB write
ata: sata_dwc_460ex: Fix crash due to OOB write This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 596c7efd69aae94f4b0e91172b075eb197958b99, it was introduced in version v4.18 by commit 28361c403683c2b00d4f5e76045f3ccd299bf99d. For more details please see the references link.
null
2022-04-25T07:10:41.833516Z
2022-04-24T22:32:27.812957Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/28361c403683c2b00d4f5e76045f3ccd299bf99d'}
Linux
GSD-2022-1000293
vsock: remove vsock from connected table when connect is interrupted by a signal
vsock: remove vsock from connected table when connect is interrupted by a signal This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.303 by commit 0bb88f3f7e8d506f3efe46d694964117e20efbfc, it was introduced in version v3.9 by commit d021c344051af91f42c5ba9fdedc176740cbd238. For more details please see the references link.
null
2022-03-07T01:34:40.655452Z
2022-02-27T02:47:21.571281Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d021c344051af91f42c5ba9fdedc176740cbd238'}
Linux
GSD-2021-1001204
ALSA: usx2y: Don't call free_pages_exact() with NULL address
ALSA: usx2y: Don't call free_pages_exact() with NULL address This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.4 by commit 82e5ee742fdd8874fe996181b87fafe1eb5f1196. For more details please see the references link.
null
2021-12-20T01:00:12.608106Z
2021-08-03T01:36:44.067049Z
null
null
null
null
null
Linux
GSD-2022-1000769
net: ipv6: ensure we call ipv6_mc_down() at most once
net: ipv6: ensure we call ipv6_mc_down() at most once This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.27 by commit b11781515208dd31fbcd0b664078dce5dc44523f, it was introduced in version v3.18 by commit 3ce62a84d53cd3d3cc5377bbf339e9b08ddf9c36. For more details please see the references link.
null
2022-03-18T03:01:20.671128Z
2022-03-18T00:16:40.330909Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3ce62a84d53cd3d3cc5377bbf339e9b08ddf9c36'}
Linux
GSD-2021-1002078
dm: fix mempool NULL pointer race when completing IO
dm: fix mempool NULL pointer race when completing IO This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit 6e506f07c5b561d673dd0b0d8f7f420cc48024fb. For more details please see the references link.
null
2021-12-20T00:08:23.391275Z
2021-11-14T15:18:50.945333Z
null
null
null
null
null
Linux
GSD-2021-1000045
KEYS: trusted: Fix TPM reservation for seal/unseal
KEYS: trusted: Fix TPM reservation for seal/unseal This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.33 by commit bf84ef2dd2ccdcd8f2658476d34b51455f970ce4, it was introduced in version v5.10.20 by commit 67118bb78d72aab5b831f054a74ae856339a1974. For more details please see the references link.
null
2021-12-19T23:46:32.817385Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/67118bb78d72aab5b831f054a74ae856339a1974'}
Linux
GSD-2021-1002582
serial: liteuart: fix minor-number leak on probe errors
serial: liteuart: fix minor-number leak on probe errors This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.7 by commit 888fc81107cacd2a4f681bac7bb785cef868214f, it was introduced in version v5.11 by commit 1da81e5562fac8286567422cc56a7fbd0dc646d4. For more details please see the references link.
null
2021-12-19T22:28:24.743144Z
2021-12-19T19:43:42.449099Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1da81e5562fac8286567422cc56a7fbd0dc646d4'}
Linux
GSD-2022-1001528
powerpc: 8xx: fix a return value error in mpc8xx_pic_init
powerpc: 8xx: fix a return value error in mpc8xx_pic_init This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 48f4f19937f46b5f141dd1e22253d0158c22d6c6, it was introduced in version v5.2 by commit cc76404feaed597bb4f5234d34d3f49e2d1139bf. For more details please see the references link.
null
2022-04-25T06:19:47.225252Z
2022-04-24T21:20:21.051722Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cc76404feaed597bb4f5234d34d3f49e2d1139bf'}
Linux
GSD-2022-1001482
block, bfq: don't move oom_bfqq
block, bfq: don't move oom_bfqq This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 87fdfe8589d43e471dffb4c60f75eeb6f37afc4c. For more details please see the references link.
null
2022-04-25T05:17:39.243050Z
2022-04-24T21:15:59.309273Z
null
null
null
null
null
Linux
GSD-2021-1002428
ALSA: pcm: oss: Fix negative period/buffer sizes
ALSA: pcm: oss: Fix negative period/buffer sizes This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.221 by commit f96c0959c1ee92adc911c10d6ec209af50105049. For more details please see the references link.
null
2021-12-19T23:30:15.081199Z
2021-12-19T19:36:53.881842Z
null
null
null
null
null
Linux
GSD-2021-1000415
ceph: fix inode leak on getattr error in __fh_to_dentry
ceph: fix inode leak on getattr error in __fh_to_dentry This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.120 by commit 2ad8af2b70e986284050213230428b823b950a38, it was introduced in version v5.4.49 by commit 807460787179dee5f74906965eeb5f3ca2353992. For more details please see the references link.
null
2021-12-20T01:20:03.867224Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/807460787179dee5f74906965eeb5f3ca2353992'}
Linux
GSD-2022-1001178
kgdboc: fix return value of __setup handler
kgdboc: fix return value of __setup handler This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit d65c2d76062012e542f765911ca8eecec36df5bb, it was introduced in version v4.20 by commit 1bd54d851f50dea6af30c3e6ff4f3e9aab5558f9. For more details please see the references link.
null
2022-04-25T04:32:20.030398Z
2022-04-24T20:51:02.368316Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1bd54d851f50dea6af30c3e6ff4f3e9aab5558f9'}
Linux
GSD-2022-1001197
RDMA/nldev: Prevent underflow in nldev_stat_set_counter_dynamic_doit()
RDMA/nldev: Prevent underflow in nldev_stat_set_counter_dynamic_doit() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 2a495ef04d5f42e6f00eb2bec1ee9075e3d5a771, it was introduced in version v5.16 by commit 3c3c1f1416392382faa0238e76a70d7810aab2ef. For more details please see the references link.
null
2022-04-25T06:34:53.667390Z
2022-04-24T20:52:55.953022Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c3c1f1416392382faa0238e76a70d7810aab2ef'}
Linux
GSD-2021-1000100
media: dvbdev: Fix memory leak in dvb_media_device_free()
media: dvbdev: Fix memory leak in dvb_media_device_free() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.20 by commit 9ad15e214fcd73694ea51967d86055f47b802066, it was introduced in version v4.5 by commit 0230d60e4661d9ced6fb0b9a30f182ebdafbba7a. For more details please see the references link.
null
2021-12-20T00:00:47.311255Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0230d60e4661d9ced6fb0b9a30f182ebdafbba7a'}
Linux
GSD-2021-1002097
ice: Avoid crash from unnecessary IDA free
ice: Avoid crash from unnecessary IDA free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit 777682e59840e24e6c5672197e6ffbcf4bff823b, it was introduced in version v5.14 by commit d25a0fc41c1f927bb914e72a03c1898052557406. For more details please see the references link.
null
2021-12-20T01:38:59.553710Z
2021-11-14T15:19:47.065085Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d25a0fc41c1f927bb914e72a03c1898052557406'}
Linux
GSD-2021-1000550
net: dsa: fix a crash if ->get_sset_count() fails
net: dsa: fix a crash if ->get_sset_count() fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit 7b22466648a4f8e3e94f57ca428d1531866d1373, it was introduced in version v4.7 by commit badf3ada60ab8f76f9488dc8f5c0c57f70682f5a. For more details please see the references link.
null
2021-12-19T22:21:48.209387Z
2021-06-04T19:37:05.334059Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/badf3ada60ab8f76f9488dc8f5c0c57f70682f5a'}
Linux
GSD-2022-1002241
bpf, sockmap: Fix memleak in tcp_bpf_sendmsg while sk msg is full
bpf, sockmap: Fix memleak in tcp_bpf_sendmsg while sk msg is full This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 6d03722c34d9603df325f67c6d30dc1b7b3c6067, it was introduced in version v4.20 by commit 604326b41a6fb9b4a78b6179335decee0365cd8c. For more details please see the references link.
null
2022-04-25T05:10:00.973884Z
2022-04-24T22:25:01.327051Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/604326b41a6fb9b4a78b6179335decee0365cd8c'}
Linux
GSD-2022-1000786
cifs: fix double free race when mount fails in cifs_get_root()
cifs: fix double free race when mount fails in cifs_get_root() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.27 by commit 546d60859ecf13380fcabcbeace53a5971493a2b. For more details please see the references link.
null
2022-03-18T02:53:08.359668Z
2022-03-18T00:17:58.336907Z
null
null
null
null
null
Linux
GSD-2022-1001894
crypto: ccp - Ensure psp_ret is always init'd in __sev_platform_init_locked()
crypto: ccp - Ensure psp_ret is always init'd in __sev_platform_init_locked() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 0e67b3e1f93a6d368ab0cebce5b3ef5e6af785a1, it was introduced in version v5.15.17 by commit c0713b3017a8057819173830dc273c8fec4b0b77. For more details please see the references link.
null
2022-04-25T03:04:01.219250Z
2022-04-24T21:52:48.043479Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c0713b3017a8057819173830dc273c8fec4b0b77'}
Linux
GSD-2021-1001711
ext4: fix reserved space counter leakage
ext4: fix reserved space counter leakage This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit 9bef6f6e2172f34e988b4a381b16bf2e30f3fbfa, it was introduced in version v3.8 by commit 51865fda28e585bdcc164474ff6438a9ccdbfada. For more details please see the references link.
null
2021-12-20T01:13:29.769901Z
2021-10-19T16:33:02.761168Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/51865fda28e585bdcc164474ff6438a9ccdbfada'}
Linux
GSD-2021-1000803
amdgpu: fix GEM obj leak in amdgpu_display_user_framebuffer_create
amdgpu: fix GEM obj leak in amdgpu_display_user_framebuffer_create This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.10 by commit 5a5357cd2cd9a38944594eb5cd74377932e176bf, it was introduced in version v4.12 by commit 1769152ac64b0b07583f696b621624df2ca4c840. For more details please see the references link.
null
2021-12-19T23:36:12.807964Z
2021-06-25T00:08:23.166847Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1769152ac64b0b07583f696b621624df2ca4c840'}
Linux
GSD-2021-1001341
misc/libmasm/module: Fix two use after free in ibmasm_init_one
misc/libmasm/module: Fix two use after free in ibmasm_init_one This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.134 by commit 38660031e80eaa6cc9370b031c180612f414b00d. For more details please see the references link.
null
2021-12-20T00:52:39.541719Z
2021-08-03T02:13:07.423609Z
null
null
null
null
null
Linux
GSD-2022-1001314
pinctrl: samsung: drop pin banks references on error paths
pinctrl: samsung: drop pin banks references on error paths This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 22762140419aa06c178979aa26be59be2fee7231, it was introduced in version v3.8 by commit ab663789d69760d2735402f66501f20b60312a3d. For more details please see the references link.
null
2022-04-25T05:44:48.731865Z
2022-04-24T21:03:57.585660Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab663789d69760d2735402f66501f20b60312a3d'}
Linux
GSD-2021-1000383
crypto: sun8i-ss - Fix memory leak of pad
crypto: sun8i-ss - Fix memory leak of pad This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 2c67a9333da9d0a3b87310e0d116b7c9070c7b00, it was introduced in version v5.10 by commit d9b45418a91773b7672e4c60037a28074b495c6d. For more details please see the references link.
null
2021-12-19T23:34:15.964095Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9b45418a91773b7672e4c60037a28074b495c6d'}
Linux
GSD-2021-1000679
serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'
serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.235 by commit 1cc57cb32c84e059bd158494f746b665fc14d1b1, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T22:47:46.178075Z
2021-06-04T20:00:34.561310Z
null
null
null
null
null
Linux
GSD-2021-1002644
mac80211: validate extended element ID is present
mac80211: validate extended element ID is present This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.222 by commit 03029bb044ccee60adbc93e70713f3ae58abc3a1, it was introduced in version v4.19 by commit 41cbb0f5a29592874355e4159489eb08337cd50e. For more details please see the references link.
null
2022-01-11T05:56:56.321316Z
2021-12-27T05:29:16.562228Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41cbb0f5a29592874355e4159489eb08337cd50e'}
Linux
GSD-2022-1000856
spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op()
spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.103 by commit 2efece1368aeee2d2552c7ec36aeb676c4d4c95f, it was introduced in version v5.2 by commit 67dca5e580f1e93a66177389981541cac208c817. For more details please see the references link.
null
2022-03-18T03:33:49.325243Z
2022-03-18T00:24:56.035346Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/67dca5e580f1e93a66177389981541cac208c817'}
Linux
GSD-2022-1001744
coredump: Use the vma snapshot in fill_files_note
coredump: Use the vma snapshot in fill_files_note This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 39fd0cc079c98dafcf355997ada7b5e67f0bb10a, it was introduced in version v5.10 by commit a07279c9a8cd7dbd321640ff7210591599ee00a4. For more details please see the references link.
null
2022-04-25T05:43:50.481786Z
2022-04-24T21:38:53.682744Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a07279c9a8cd7dbd321640ff7210591599ee00a4'}
Linux
GSD-2021-1000229
net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send
net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit e407495ba6788a67d1bd41714158c079e340879b, it was introduced in version v4.9 by commit b9b17debc69d27cd55e21ee51a5ba7fc50a426cf. For more details please see the references link.
null
2021-12-20T01:03:02.057731Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b9b17debc69d27cd55e21ee51a5ba7fc50a426cf'}
Linux
GSD-2021-1002214
comedi: vmk80xx: fix transfer-buffer overflows
comedi: vmk80xx: fix transfer-buffer overflows This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.2 by commit 06ac746d57e6d32b062e220415c607b7e2e0fa50, it was introduced in version v2.6.31 by commit 985cafccbf9b7f862aa1c5ee566801e18b5161fb. For more details please see the references link.
null
2021-12-19T22:46:05.332999Z
2021-11-14T15:25:06.784110Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/985cafccbf9b7f862aa1c5ee566801e18b5161fb'}
Linux
GSD-2022-1000505
KVM: eventfd: Fix false positive RCU usage warning
KVM: eventfd: Fix false positive RCU usage warning This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit d851051d25c26f204b1b93c3722471d8efb53227. For more details please see the references link.
null
2022-03-07T03:20:57.767018Z
2022-02-27T03:16:16.874259Z
null
null
null
null
null
Linux
GSD-2021-1001592
net: hns3: do not allow call hns3_nic_net_open repeatedly
net: hns3: do not allow call hns3_nic_net_open repeatedly This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.151 by commit 5a31d4e73ada8022427b69b10fd1f01a6a8d4b3d, it was introduced in version v5.0 by commit e888402789b9db5de4fcda361331d66dbf0cd9fd. For more details please see the references link.
null
2021-12-20T01:12:24.810517Z
2021-10-19T16:25:21.140983Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e888402789b9db5de4fcda361331d66dbf0cd9fd'}
Linux
GSD-2021-1001068
net: usb: fix possible use-after-free in smsc75xx_bind
net: usb: fix possible use-after-free in smsc75xx_bind This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit 14616c372a7be01a2fb8c56c9d8debd232b9e43d, it was introduced in version v5.12.9 by commit 70c886ac93f87ae7214a0c69151a28a8075dd95b. For more details please see the references link.
null
2021-12-20T00:36:32.052018Z
2021-06-30T00:37:32.278230Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/70c886ac93f87ae7214a0c69151a28a8075dd95b'}
Linux
GSD-2022-1002168
gpiolib: acpi: use correct format characters
gpiolib: acpi: use correct format characters This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.190 by commit 8cefae8c40df9edbc103b13a43e49b41d2090a05, it was introduced in version v4.14 by commit e40a3ae1f794a35c4af3746291ed6fedc1fa0f6f. For more details please see the references link.
null
2022-04-25T03:37:33.606028Z
2022-04-24T22:18:00.408332Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e40a3ae1f794a35c4af3746291ed6fedc1fa0f6f'}
Linux
GSD-2022-1000155
scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put()
scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.176 by commit bf2bd892a0cb14dd2d21f2c658f4b747813be311, it was introduced in version v3.2 by commit 0cbf32e1681d870632a1772601cbaadd996dc978. For more details please see the references link.
null
2022-02-19T04:57:36.740609Z
2022-02-18T21:48:08.435452Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0cbf32e1681d870632a1772601cbaadd996dc978'}
Linux
GSD-2021-1001438
net: fix uninit-value in caif_seqpkt_sendmsg
net: fix uninit-value in caif_seqpkt_sendmsg This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.277 by commit 5c6d8e2f7187b8e45a18c27acb7a3885f03ee3db, it was introduced in version v2.6.35 by commit bece7b2398d073d11b2e352405a3ecd3a1e39c60. For more details please see the references link.
null
2021-12-20T00:58:55.755315Z
2021-08-03T02:41:05.113192Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bece7b2398d073d11b2e352405a3ecd3a1e39c60'}
Linux
GSD-2022-1002492
net/x25: Fix null-ptr-deref caused by x25_disconnect
net/x25: Fix null-ptr-deref caused by x25_disconnect This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit dffc859d1d9560da594e4282091781b8d2715f00, it was introduced in version v4.9.233 by commit 08560e93a2c1c93eefe166015f2351196fbbc8e1. For more details please see the references link.
null
2022-04-25T03:54:51.863141Z
2022-04-24T22:53:38.333365Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/08560e93a2c1c93eefe166015f2351196fbbc8e1'}
Linux
GSD-2022-1002187
net/tls: fix slab-out-of-bounds bug in decrypt_internal
net/tls: fix slab-out-of-bounds bug in decrypt_internal This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 2b7d14c105dd8f6412eda5a91e1e6154653731e3, it was introduced in version v5.2 by commit f295b3ae9f5927e084bd5decdff82390e3471801. For more details please see the references link.
null
2022-04-25T04:12:37.884061Z
2022-04-24T22:20:01.315560Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f295b3ae9f5927e084bd5decdff82390e3471801'}
Linux
GSD-2022-1000440
phy: ti: Fix missing sentinel for clk_div_table
phy: ti: Fix missing sentinel for clk_div_table This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit 7a360e546ad9e7c3fd53d6bb60348c660cd28f54, it was introduced in version v5.6 by commit 091876cc355d6739e393efa4b3d07f451a6a035c. For more details please see the references link.
null
2022-03-07T01:48:11.640234Z
2022-02-27T03:07:34.022945Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/091876cc355d6739e393efa4b3d07f451a6a035c'}
Linux
GSD-2022-1000010
Input: appletouch - initialize work before device registration
Input: appletouch - initialize work before device registration This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.298 by commit d2cb2bf39a6d17ef4bdc0e59c1a35cf5751ad8f4, it was introduced in version v2.6.23 by commit 5a6eb676d3bc4d7a6feab200a92437b62ad298da. For more details please see the references link.
null
2022-01-11T05:47:48.667565Z
2022-01-10T19:50:01.333917Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5a6eb676d3bc4d7a6feab200a92437b62ad298da'}
Linux
GSD-2021-1001087
net: ll_temac: Fix TX BD buffer overwrite
net: ll_temac: Fix TX BD buffer overwrite This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit b6982493ed2dee412ccae062ccf7cf50fbe5a6a8, it was introduced in version v5.6 by commit 84823ff80f7403752b59e00bb198724100dc611c. For more details please see the references link.
null
2021-12-20T00:39:46.224672Z
2021-06-30T00:38:45.383648Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/84823ff80f7403752b59e00bb198724100dc611c'}
Linux
GSD-2021-1002701
mptcp: clear 'kern' flag from fallback sockets
mptcp: clear 'kern' flag from fallback sockets This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.88 by commit 451f1eded7f56e93aaf52eb547ba97742d9c0e97, it was introduced in version v5.6 by commit cf7da0d66cc1a2a19fc5930bb746ffbb2d4cd1be. For more details please see the references link.
null
2022-01-11T05:47:27.280929Z
2021-12-27T05:37:49.667036Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cf7da0d66cc1a2a19fc5930bb746ffbb2d4cd1be'}
Linux
GSD-2022-1001251
ASoC: mediatek: mt8195: Fix error handling in mt8195_mt6359_rt1019_rt5682_dev_probe
ASoC: mediatek: mt8195: Fix error handling in mt8195_mt6359_rt1019_rt5682_dev_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit c652f8f0875b569f8afa80b8cf9762828fd6187b, it was introduced in version v5.17 by commit 082482a5022780d42180a394fe6843e71fe963d8. For more details please see the references link.
null
2022-04-25T03:36:14.096591Z
2022-04-24T20:57:51.865746Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/082482a5022780d42180a394fe6843e71fe963d8'}
Linux
GSD-2021-1002351
thermal: Fix NULL pointer dereferences in of_thermal_ functions
thermal: Fix NULL pointer dereferences in of_thermal_ functions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.4 by commit ef2590a5305e0b8e9342f84c2214aa478ee7f28e. For more details please see the references link.
null
2021-12-19T23:58:45.681354Z
2021-11-29T02:40:01.773239Z
null
null
null
null
null
Linux
GSD-2022-1000913
sr9700: sanity check for packet length
sr9700: sanity check for packet length This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.232 by commit dde5ddf02a47487dd6efcc7077307f1d4e1ba337. For more details please see the references link.
null
2022-03-18T02:55:08.773137Z
2022-03-18T00:31:22.878439Z
null
null
null
null
null
Linux
GSD-2022-1001601
ext4: make mb_optimize_scan performance mount option work with extents
ext4: make mb_optimize_scan performance mount option work with extents This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 8eeebd24705f99a46aa15d94a2b07d30b3b9f3ee, it was introduced in version v5.13 by commit 196e402adf2e4cd66f101923409f1970ec5f1af3. For more details please see the references link.
null
2022-04-25T06:16:30.562820Z
2022-04-24T21:27:31.284487Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/196e402adf2e4cd66f101923409f1970ec5f1af3'}
Linux
GSD-2021-1001984
isdn: mISDN: Fix sleeping function called from invalid context
isdn: mISDN: Fix sleeping function called from invalid context This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.214 by commit a5b34409d3fc52114c828be4adbc30744fa3258b. For more details please see the references link.
null
2021-12-20T01:23:21.591518Z
2021-11-14T15:14:36.873634Z
null
null
null
null
null
Linux
GSD-2021-1000696
misc/uss720: fix memory leak in uss720_probe
misc/uss720: fix memory leak in uss720_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.271 by commit 7889c70e6173ef358f3cd7578db127a489035a42, it was introduced in version v2.6.14 by commit 0f36163d3abefbda1b21a330b3fdf3c2dc076d94. For more details please see the references link.
null
2021-12-19T23:21:38.267718Z
2021-06-04T20:04:29.813808Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0f36163d3abefbda1b21a330b3fdf3c2dc076d94'}
Linux
GSD-2022-1000298
net: ieee802154: at86rf230: Stop leaking skb's
net: ieee802154: at86rf230: Stop leaking skb's This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.303 by commit d2a1eaf51b7d4412319adb6acef114ba472d1692. For more details please see the references link.
null
2022-03-07T01:50:57.458535Z
2022-02-27T02:47:55.986187Z
null
null
null
null
null
Linux
GSD-2022-1000762
btrfs: fix relocation crash due to premature return from btrfs_commit_transaction()
btrfs: fix relocation crash due to premature return from btrfs_commit_transaction() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.27 by commit 725a6ac389b182261af174176e561a36b0f39ffc, it was introduced in version v5.12 by commit d0c2f4fa555e70324ec2a129b822ab58f172cc62. For more details please see the references link.
null
2022-03-18T02:55:04.808924Z
2022-03-18T00:15:55.198346Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0c2f4fa555e70324ec2a129b822ab58f172cc62'}
Linux
GSD-2022-1001870
ASoC: atmel: Fix error handling in sam9x5_wm8731_driver_probe
ASoC: atmel: Fix error handling in sam9x5_wm8731_driver_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit f589063b585ac6dd2081bde6c145411cf48d8d92, it was introduced in version v3.12 by commit fdbcb3cba54b29a37dfe42acdc0e72c543e0807d. For more details please see the references link.
null
2022-04-25T05:55:06.136678Z
2022-04-24T21:50:12.110819Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fdbcb3cba54b29a37dfe42acdc0e72c543e0807d'}
Linux
GSD-2022-1000332
Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj
Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.231 by commit 417947891bd5ae327f15efed1a0da2b12ef24962, it was introduced in version v4.15 by commit c2e5df616e1ae6c2a074cb241ebb65a318ebaf7c. For more details please see the references link.
null
2022-03-07T01:43:44.603661Z
2022-02-27T02:52:27.884175Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c2e5df616e1ae6c2a074cb241ebb65a318ebaf7c'}
Linux
GSD-2022-1001489
net: sparx5: switchdev: fix possible NULL pointer dereference
net: sparx5: switchdev: fix possible NULL pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit c346791877e6ce923bb21e34b30c6f99326aa5a8, it was introduced in version v5.15 by commit 10615907e9b51c9ae92f3a6ecabd01c482f20f32. For more details please see the references link.
null
2022-04-25T04:25:05.637040Z
2022-04-24T21:16:25.256357Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/10615907e9b51c9ae92f3a6ecabd01c482f20f32'}
Linux
GSD-2021-1002423
can: sja1000: fix use after free in ems_pcmcia_add_card()
can: sja1000: fix use after free in ems_pcmcia_add_card() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.221 by commit ccf070183e4655824936c0f96c4a2bcca93419aa, it was introduced in version v3.2 by commit fd734c6f25aea4b2b44b045e489aec67b388577e. For more details please see the references link.
null
2021-12-19T22:36:36.124805Z
2021-12-19T19:36:42.210981Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fd734c6f25aea4b2b44b045e489aec67b388577e'}
Linux
GSD-2022-1001173
vsock/virtio: initialize vdev->priv before using VQs
vsock/virtio: initialize vdev->priv before using VQs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 83c80024c20d192168970a6029097f1c0b8bba40, it was introduced in version v5.3 by commit 9c7a5582f5d720dc35cfcc42ccaded69f0642e4a. For more details please see the references link.
null
2022-04-25T06:40:04.427007Z
2022-04-24T20:50:29.511244Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9c7a5582f5d720dc35cfcc42ccaded69f0642e4a'}
Linux
GSD-2021-1002073
isofs: Fix out of bound access for corrupted isofs image
isofs: Fix out of bound access for corrupted isofs image This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.79 by commit 86d4aedcbc69c0f84551fb70f953c24e396de2d7. For more details please see the references link.
null
2021-12-19T22:29:13.017011Z
2021-11-14T15:18:38.591684Z
null
null
null
null
null
Linux
GSD-2021-1002589
ethtool: do not perform operations on net devices being unregistered
ethtool: do not perform operations on net devices being unregistered This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.8 by commit cfd719f04267108f5f5bf802b9d7de69e99a99f9, it was introduced in version v5.6 by commit 041b1c5d4a53e97fc9e029ae32469552ca12cb9b. For more details please see the references link.
null
2021-12-20T01:18:51.993678Z
2021-12-19T19:43:59.255563Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/041b1c5d4a53e97fc9e029ae32469552ca12cb9b'}
Linux
GSD-2022-1001523
bpf, sockmap: Fix memleak in sk_psock_queue_msg
bpf, sockmap: Fix memleak in sk_psock_queue_msg This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 4dd2e947d3be13a4de3b3028859b9a6497266bcf, it was introduced in version v5.14 by commit 9635720b7c88592214562cb72605bdab6708006c. For more details please see the references link.
null
2022-04-25T05:57:09.917296Z
2022-04-24T21:19:54.425220Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9635720b7c88592214562cb72605bdab6708006c'}
Linux
GSD-2022-1001036
staging: wfx: fix an error handling in wfx_init_common()
staging: wfx: fix an error handling in wfx_init_common() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 9727912e906762a63c1a667c84731d3427653f88. For more details please see the references link.
null
2022-04-25T06:28:52.706199Z
2022-04-24T20:41:35.124232Z
null
null
null
null
null
Linux
GSD-2021-1002566
rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer()
rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.7 by commit 9469273e616ca8f1b6e3773c5019f21b4c8d828c, it was introduced in version v5.4 by commit 9ebeddef58c41bd700419cdcece24cf64ce32276. For more details please see the references link.
null
2021-12-20T01:03:10.890108Z
2021-12-19T19:43:04.943095Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9ebeddef58c41bd700419cdcece24cf64ce32276'}
Linux
GSD-2022-1001466
media: staging: media: zoran: move videodev alloc
media: staging: media: zoran: move videodev alloc This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit c1ba65100a359fe28cfe37e09e10c99f247cbf1e. For more details please see the references link.
null
2022-04-25T03:48:50.520903Z
2022-04-24T21:15:12.643507Z
null
null
null
null
null
Linux
GSD-2021-1002136
regmap: Fix possible double-free in regcache_rbtree_exit()
regmap: Fix possible double-free in regcache_rbtree_exit() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.16 by commit 50cc1462a668dc62949a1127388bc3af785ce047, it was introduced in version v3.12 by commit 3f4ff561bc88b074d5e868dde4012d89cbb06c87. For more details please see the references link.
null
2021-12-20T01:37:01.486477Z
2021-11-14T15:21:31.846879Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f4ff561bc88b074d5e868dde4012d89cbb06c87'}
Linux
GSD-2022-1000627
phylib: fix potential use-after-free
phylib: fix potential use-after-free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit cb2fab10fc5e7a3aa1bb0a68a3abdcf3e37852af, it was introduced in version v4.16 by commit bafbdd527d569c8200521f2f7579f65a044271be. For more details please see the references link.
null
2022-03-07T01:39:22.704058Z
2022-02-27T03:32:56.157971Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bafbdd527d569c8200521f2f7579f65a044271be'}
Linux
GSD-2022-1001935
coresight: syscfg: Fix memleak on registration failure in cscfg_create_device
coresight: syscfg: Fix memleak on registration failure in cscfg_create_device This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit c61e2fc87f24cae4701f352fe9ecd4c5c143106c, it was introduced in version v5.15 by commit 85e2414c518a03a21dddd4bc88fec2723c5e1197. For more details please see the references link.
null
2022-04-25T03:50:35.262261Z
2022-04-24T21:56:13.125733Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/85e2414c518a03a21dddd4bc88fec2723c5e1197'}
Linux
GSD-2022-1000277
af_packet: fix data-race in packet_setsockopt / packet_setsockopt
af_packet: fix data-race in packet_setsockopt / packet_setsockopt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.20 by commit 34321180b94dbcd12abc130eb48c4ce67a3408aa, it was introduced in version v4.3 by commit 47dceb8ecdc1c3ad1818dfea3d659a05b74c3fc2. For more details please see the references link.
null
2022-02-20T06:34:11.633760Z
2022-02-18T22:05:17.677939Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/47dceb8ecdc1c3ad1818dfea3d659a05b74c3fc2'}
Linux
GSD-2021-1000808
net: caif: fix memory leak in caif_device_notify
net: caif: fix memory leak in caif_device_notify This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.10 by commit 6a0e317f61094d377335547e015dd2ff12caf893, it was introduced in version v3.3 by commit 7c18d2205ea76eef9674e59e1ecae4f332a53e9e. For more details please see the references link.
null
2021-12-20T00:12:41.589521Z
2021-06-25T00:08:42.167994Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7c18d2205ea76eef9674e59e1ecae4f332a53e9e'}
Linux
GSD-2021-1002835
KVM: VMX: Always clear vmx->fail on emulation_required
KVM: VMX: Always clear vmx->fail on emulation_required This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.12 by commit e4e4e7cb229821cd215031abc47efdab5486a67c, it was introduced in version v5.15 by commit c8607e4a086fae05efe5bffb47c5199c65e7216e. For more details please see the references link.
null
2022-01-11T05:52:45.427889Z
2021-12-30T02:45:35.686475Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c8607e4a086fae05efe5bffb47c5199c65e7216e'}
Linux
GSD-2021-1000222
f2fs: fix panic during f2fs_resize_fs()
f2fs: fix panic during f2fs_resize_fs() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit 822054e5026c43b1dd60cf387dd999e95ee2ecc2, it was introduced in version v5.8 by commit b4b10061ef98c583bcf82a4200703fbaa98c18dc. For more details please see the references link.
null
2021-12-19T22:48:36.715986Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b4b10061ef98c583bcf82a4200703fbaa98c18dc'}
Linux
GSD-2021-1000388
mtd: require write permissions for locking and badblock ioctls
mtd: require write permissions for locking and badblock ioctls This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 7b6552719c0ccbbea29dde4be141da54fdb5877e, it was introduced in version v5.9 by commit f7e6b19bc76471ba03725fe58e0c218a3d6266c3. For more details please see the references link.
null
2021-12-19T23:38:03.905475Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f7e6b19bc76471ba03725fe58e0c218a3d6266c3'}
Linux
GSD-2021-1001960
isdn: cpai: check ctr->cnr to avoid array index out of bound
isdn: cpai: check ctr->cnr to avoid array index out of bound This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.253 by commit 9b6b2db77bc3121fe435f1d4b56e34de443bec75. For more details please see the references link.
null
2021-12-20T00:28:30.717802Z
2021-11-14T15:13:31.263580Z
null
null
null
null
null
Linux
GSD-2021-1000672
net: fujitsu: fix potential null-ptr-deref
net: fujitsu: fix potential null-ptr-deref This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.235 by commit c4f1c23edbe921ab2ecd6140d700e756cd44c5f7, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T23:58:42.320027Z
2021-06-04T19:59:03.361620Z
null
null
null
null
null
Linux
GSD-2022-1002163
drm/amdkfd: Check for potential null return of kmalloc_array()
drm/amdkfd: Check for potential null return of kmalloc_array() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.190 by commit c7a268b33882d5feaafd29c1734456f41ba41396. For more details please see the references link.
null
2022-04-25T07:06:19.350760Z
2022-04-24T22:17:16.912581Z
null
null
null
null
null
Linux
GSD-2021-1001433
atm: iphase: fix possible use-after-free in ia_module_exit()
atm: iphase: fix possible use-after-free in ia_module_exit() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.240 by commit bcdd2be48edd8c6867fb44112cb8d18086beae29. For more details please see the references link.
null
2021-12-20T00:18:22.516417Z
2021-08-03T02:39:18.757928Z
null
null
null
null
null
Linux
GSD-2022-1002499
ext2: correct max file size computing
ext2: correct max file size computing This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit df95b0e4f1e2eb7ebbef6618b14a802ea55ce32f, it was introduced in version v4.9.165 by commit 4b5f060b09f6ebdf86fc2acb483bdfcc5d723000. For more details please see the references link.
null
2022-04-25T02:48:34.650217Z
2022-04-24T22:54:45.328525Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4b5f060b09f6ebdf86fc2acb483bdfcc5d723000'}
Linux
GSD-2021-1001599
hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field
hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.151 by commit 44d3c480e4e2a75bf6296a18b4356157991ccd80. For more details please see the references link.
null
2021-12-19T22:53:44.892325Z
2021-10-19T16:27:39.812806Z
null
null
null
null
null
Linux
GSD-2021-1001063
sch_cake: Fix out of bounds when parsing TCP options and header
sch_cake: Fix out of bounds when parsing TCP options and header This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit 3371392c60e2685af30bd4547badd880f5df2b3f, it was introduced in version v4.19 by commit 8b7138814f29933898ecd31dfc83e35a30ee69f5. For more details please see the references link.
null
2021-12-19T22:02:07.399767Z
2021-06-30T00:37:09.130462Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8b7138814f29933898ecd31dfc83e35a30ee69f5'}
Linux
GSD-2021-1001576
drm/amdgpu: fix gart.bo pin_count leak
drm/amdgpu: fix gart.bo pin_count leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.154 by commit 83d857d6b0967b6709cd38750c3ce2ed8ced1a95. For more details please see the references link.
null
2021-12-19T22:52:47.865159Z
2021-10-19T16:24:31.580042Z
null
null
null
null
null
Linux
GSD-2022-1002026
watch_queue: Free the page array when watch_queue is dismantled
watch_queue: Free the page array when watch_queue is dismantled This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 7169f60110915c8b53bffd43741fa020a75eb87a, it was introduced in version v5.8 by commit c73be61cede5882f9605a852414db559c0ebedfd. For more details please see the references link.
null
2022-04-25T06:10:30.673292Z
2022-04-24T22:04:01.237654Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c73be61cede5882f9605a852414db559c0ebedfd'}
Linux
GSD-2021-1001126
nilfs2: fix memory leak in nilfs_sysfs_delete_device_group
nilfs2: fix memory leak in nilfs_sysfs_delete_device_group This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.47 by commit ab5bef9780386be0e54f98a40eeedb8295cd450b, it was introduced in version v3.17 by commit da7141fb78db915680616e15677539fc8140cf53. For more details please see the references link.
null
2021-12-19T23:26:32.505992Z
2021-07-08T01:58:11.782620Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/da7141fb78db915680616e15677539fc8140cf53'}
Linux
GSD-2022-1002476
scsi: libfc: Fix use after free in fc_exch_abts_resp()
scsi: libfc: Fix use after free in fc_exch_abts_resp() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit 4a131d4ea8b581ac9b01d3a72754db4848be3232. For more details please see the references link.
null
2022-04-25T05:50:59.017209Z
2022-04-24T22:52:26.930401Z
null
null
null
null
null
Linux
GSD-2021-1000367
drm: xlnx: zynqmp: fix a memset in zynqmp_dp_train()
drm: xlnx: zynqmp: fix a memset in zynqmp_dp_train() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit a6596d71a63544a6171cd0b9abaed8745ada7c65, it was introduced in version v5.9 by commit d76271d22694e874ed70791702db9252ffe96a4c. For more details please see the references link.
null
2021-12-20T01:37:47.961270Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d76271d22694e874ed70791702db9252ffe96a4c'}
Linux
GSD-2022-1000918
xen/xenbus: don't let xenbus_grant_ring() remove grants in error case
xen/xenbus: don't let xenbus_grant_ring() remove grants in error case This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.271 by commit 67d21d5bddef88c1977378e4aca2b9c6a4af9edc. For more details please see the references link.
null
2022-03-18T03:39:14.145597Z
2022-03-18T00:31:50.446626Z
null
null
null
null
null
Linux
GSD-2021-1001825
drm/msm: Fix null pointer dereference on pointer edp
drm/msm: Fix null pointer dereference on pointer edp This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.155 by commit f302be08e3de94db8863a0b2958b2bb3e8e998e6, it was introduced in version v4.0 by commit ab5b0107ccf3821a6837b0f2819270d6fa0b278f. For more details please see the references link.
null
2021-12-20T00:03:58.532363Z
2021-10-28T13:50:50.604356Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab5b0107ccf3821a6837b0f2819270d6fa0b278f'}
Linux
GSD-2021-1000737
net: caif: add proper error handling
net: caif: add proper error handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.194 by commit 758f725c392ec073f9f1cfbe34323ca1372afbf8, it was introduced in version v3.3 by commit 7c18d2205ea76eef9674e59e1ecae4f332a53e9e. For more details please see the references link.
null
2021-12-20T00:10:19.758726Z
2021-06-25T00:00:12.801227Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7c18d2205ea76eef9674e59e1ecae4f332a53e9e'}
Linux
GSD-2022-1001574
media: ti-vpe: cal: Fix a NULL pointer dereference in cal_ctx_v4l2_init_formats()
media: ti-vpe: cal: Fix a NULL pointer dereference in cal_ctx_v4l2_init_formats() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 91e2805579ab0783eed53acc2bf9fb553e939004, it was introduced in version v5.12 by commit 7168155002cf7aadbfaa14a28f037c880a214764. For more details please see the references link.
null
2022-04-25T05:45:08.237617Z
2022-04-24T21:25:17.316046Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7168155002cf7aadbfaa14a28f037c880a214764'}
Linux
GSD-2021-1000019
ARM: 9063/1: mm: reduce maximum number of CPUs if DEBUG_KMAP_LOCAL is enabled
ARM: 9063/1: mm: reduce maximum number of CPUs if DEBUG_KMAP_LOCAL is enabled This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.16 by commit 5965ac11b1d5fcb38464728931649cd9df79c7c9, it was introduced in version v5.11 by commit 2a15ba82fa6ca3f35502b3060f22118a938d2889. For more details please see the references link.
null
2021-12-19T22:18:22.847477Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2a15ba82fa6ca3f35502b3060f22118a938d2889'}
Linux
GSD-2021-1002024
comedi: dt9812: fix DMA buffers on stack
comedi: dt9812: fix DMA buffers on stack This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.159 by commit 3efb7af8ac437085b6c776e5b54830b149d86efe, it was introduced in version v2.6.29 by commit 63274cd7d38a3322d90b66a5bc976de1fb899051. For more details please see the references link.
null
2021-12-20T00:46:59.906306Z
2021-11-14T15:16:23.569458Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63274cd7d38a3322d90b66a5bc976de1fb899051'}
Linux
GSD-2022-1001124
scsi: qla2xxx: Fix premature hw access after PCI error
scsi: qla2xxx: Fix premature hw access after PCI error This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 6c125fd5ad035777f7b471553f7ddda76e8e7136. For more details please see the references link.
null
2022-04-25T06:13:55.679597Z
2022-04-24T20:47:33.645663Z
null
null
null
null
null
Linux
GSD-2021-1000449
ethernet:enic: Fix a use after free bug in enic_hard_start_xmit
ethernet:enic: Fix a use after free bug in enic_hard_start_xmit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.191 by commit 25a87b1f566b5eb2af2857a928f0e2310d900976, it was introduced in version v4.16 by commit fb7516d42478ebc8e2f00efb76ef96f7b68fd8d3. For more details please see the references link.
null
2021-12-20T01:21:21.363826Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb7516d42478ebc8e2f00efb76ef96f7b68fd8d3'}
Linux
GSD-2021-1002474
ice: avoid bpf_prog refcount underflow
ice: avoid bpf_prog refcount underflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.83 by commit e65a8707b4cd756d26d246bb2b9fab06eebafac1, it was introduced in version v5.5 by commit efc2214b6047b6f5b4ca53151eba62521b9452d6. For more details please see the references link.
null
2021-12-19T22:36:40.218492Z
2021-12-19T19:38:59.121344Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/efc2214b6047b6f5b4ca53151eba62521b9452d6'}
Linux
GSD-2022-1002358
drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes()
drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 2c729dec8c1e3e2892fde5ce8181553860914e74, it was introduced in version v4.15 by commit e7b07ceef2a650e5ed8ca37997689e086c680daf. For more details please see the references link.
null
2022-04-25T06:51:25.968686Z
2022-04-24T22:38:12.703156Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e7b07ceef2a650e5ed8ca37997689e086c680daf'}
Linux
GSD-2022-1000365
scsi: qedf: Fix refcount issue when LOGO is received during TMF
scsi: qedf: Fix refcount issue when LOGO is received during TMF This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.101 by commit 87f187e5265bc8e3b38faef8b9db864cdd61dde7. For more details please see the references link.
null
2022-03-07T02:22:24.669064Z
2022-02-27T02:56:55.417781Z
null
null
null
null
null
Linux
GSD-2021-1001608
xen/balloon: use a kernel thread instead a workqueue
xen/balloon: use a kernel thread instead a workqueue This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.150 by commit 29917bbb07c30be295dece245c7c21872e1a6fbb. For more details please see the references link.
null
2021-12-19T23:47:36.364563Z
2021-10-19T16:28:02.729027Z
null
null
null
null
null
Linux
GSD-2022-1000735
configfs: fix a race in configfs_{,un}register_subsystem()
configfs: fix a race in configfs_{,un}register_subsystem() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.12 by commit 3aadfd46858b1f64d4d6a0654b863e21aabff975, it was introduced in version v2.6.16 by commit 7063fbf2261194f72ee75afca67b3b38b554b5fa. For more details please see the references link.
null
2022-03-18T03:03:33.953422Z
2022-03-18T00:13:48.593670Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7063fbf2261194f72ee75afca67b3b38b554b5fa'}
Linux
GSD-2022-1001827
af_netlink: Fix shift out of bounds in group mask calculation
af_netlink: Fix shift out of bounds in group mask calculation This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 7409ff6393a67ff9838d0ae1bd102fb5f020d07a, it was introduced in version v2.6.14 by commit f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198. For more details please see the references link.
null
2022-04-25T04:50:17.677298Z
2022-04-24T21:45:46.848340Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198'}
Linux
GSD-2021-1001258
net: validate lwtstate->data before returning from skb_tunnel_info()
net: validate lwtstate->data before returning from skb_tunnel_info() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.53 by commit 2179d96ec702cc33ead02a9ce40ece599b8538c5, it was introduced in version v4.3 by commit 61adedf3e3f1d3f032c5a6a299978d91eff6d555. For more details please see the references link.
null
2021-12-20T00:20:35.763896Z
2021-08-03T01:50:23.575845Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61adedf3e3f1d3f032c5a6a299978d91eff6d555'}
Linux
GSD-2022-1000220
drm/nouveau: fix off by one in BIOS boundary checking
drm/nouveau: fix off by one in BIOS boundary checking This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.99 by commit f071d9fa857582d7bd77f4906691f73d3edeab73, it was introduced in version v4.8 by commit 4d4e9907ff572bb1d1c0f6913ad6e3d6d4525077. For more details please see the references link.
null
2022-02-19T15:37:13.957027Z
2022-02-18T21:57:02.213643Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4d4e9907ff572bb1d1c0f6913ad6e3d6d4525077'}
Linux
GSD-2022-1000670
spi: uniphier: fix reference count leak in uniphier_spi_probe()
spi: uniphier: fix reference count leak in uniphier_spi_probe() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.8 by commit 447c3d4046d7b54052d07d8b27e15e6edea5662c, it was introduced in version v5.6 by commit 28d1dddc59f6b7fc085093e7c1e978b33f0caf4c. For more details please see the references link.
null
2022-03-07T01:38:35.862125Z
2022-02-27T03:39:05.779818Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/28d1dddc59f6b7fc085093e7c1e978b33f0caf4c'}