ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2022-1001962
SUNRPC: Fix the svc_deferred_event trace class
SUNRPC: Fix the svc_deferred_event trace class This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.112 by commit 85ee17ca21cf92989e8c923e3ea4514c291e9d38, it was introduced in version v4.17 by commit ece200ddd54b9ce840cfee554fb812560c545c7d. For more details please see the references link.
null
2022-04-25T05:21:29.895364Z
2022-04-24T21:58:42.851810Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ece200ddd54b9ce840cfee554fb812560c545c7d'}
Linux
GSD-2021-1002161
mptcp: fix possible stall on recvmsg()
mptcp: fix possible stall on recvmsg() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 612f71d7328c14369924384ad2170aae2a6abd92, it was introduced in version v5.6 by commit 7a6a6cbc3e592e339ad23e4e8ede9a3f6160bda8. For more details please see the references link.
null
2021-12-20T01:05:19.028427Z
2021-11-14T15:22:41.684336Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7a6a6cbc3e592e339ad23e4e8ede9a3f6160bda8'}
Linux
GSD-2022-1001431
watch_queue: Free the page array when watch_queue is dismantled
watch_queue: Free the page array when watch_queue is dismantled This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 3963a5d1ff75585bddf0c3a918566a6be09d7520, it was introduced in version v5.8 by commit c73be61cede5882f9605a852414db559c0ebedfd. For more details please see the references link.
null
2022-04-25T06:40:29.432774Z
2022-04-24T21:12:31.649247Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c73be61cede5882f9605a852414db559c0ebedfd'}
Linux
GSD-2021-1002531
media: v4l2-core: fix VIDIOC_DQEVENT handling on non-x86
media: v4l2-core: fix VIDIOC_DQEVENT handling on non-x86 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.6 by commit 75fa2dadb7c26010eef19185eaff40c960a185fd, it was introduced in version v5.14 by commit c344f07aa1b4ba38ca8fabe407a2afe2f436323c. For more details please see the references link.
null
2021-12-20T01:14:35.325850Z
2021-12-19T19:41:23.182131Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c344f07aa1b4ba38ca8fabe407a2afe2f436323c'}
Linux
GSD-2022-1001061
ipv6: annotate some data-races around sk->sk_prot
ipv6: annotate some data-races around sk->sk_prot This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 7f11e5c2fc12eafc874e42158078b968e47e4ac0. For more details please see the references link.
null
2022-04-25T06:17:10.467355Z
2022-04-24T20:42:59.718359Z
null
null
null
null
null
Linux
GSD-2021-1001034
usb: typec: tcpm: cancel vdm and state machine hrtimer when unregister tcpm port
usb: typec: tcpm: cancel vdm and state machine hrtimer when unregister tcpm port This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit d0a06696a8a4d99f649240b6f9b8a2e55452ecf5, it was introduced in version v5.10 by commit 3ed8e1c2ac9914a2fcb08ec13476b85319536cea. For more details please see the references link.
null
2021-12-20T01:30:54.628012Z
2021-06-30T00:35:15.760269Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3ed8e1c2ac9914a2fcb08ec13476b85319536cea'}
Linux
GSD-2022-1000559
perf bpf: Defer freeing string after possible strlen() on it
perf bpf: Defer freeing string after possible strlen() on it This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit 40c1ff40decabe8236e7c610c068bc041927cbbe, it was introduced in version v5.8 by commit 04f9bf2bac72480ca1d289b751b956dd1707a5d5. For more details please see the references link.
null
2022-03-07T01:43:57.306603Z
2022-02-27T03:23:54.386450Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/04f9bf2bac72480ca1d289b751b956dd1707a5d5'}
Linux
GSD-2021-1001464
seq_buf: Fix overflow in seq_buf_putmem_hex()
seq_buf: Fix overflow in seq_buf_putmem_hex() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.276 by commit f2b9f758e1dfb593872fd0fcd7644875bcb8757a, it was introduced in version v2.6.27 by commit 5e3ca0ec76fce92daa4eed0d02de9c79b1fe3920. For more details please see the references link.
null
2021-12-20T02:18:37.978428Z
2021-08-03T02:48:26.883589Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5e3ca0ec76fce92daa4eed0d02de9c79b1fe3920'}
Linux
GSD-2022-1000109
ASoC: ops: Reject out of bounds values in snd_soc_put_volsw()
ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.265 by commit 586ef863c94354a7e00e5ae5ef01443d1dc99bc7. For more details please see the references link.
null
2022-02-20T02:12:13.738552Z
2022-02-18T21:42:05.893604Z
null
null
null
null
null
Linux
GSD-2022-1002134
mm/pages_alloc.c: don't create ZONE_MOVABLE beyond the end of a node
mm/pages_alloc.c: don't create ZONE_MOVABLE beyond the end of a node This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 7188e7c96f39ae40b8f8d6a807d3f338fb1927ac, it was introduced in version v2.6.23 by commit 2a1e274acf0b1c192face19a4be7c12d4503eaaf. For more details please see the references link.
null
2022-04-25T04:20:48.831053Z
2022-04-24T22:14:37.521972Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2a1e274acf0b1c192face19a4be7c12d4503eaaf'}
Linux
GSD-2021-1001937
ocfs2: fix data corruption after conversion from inline format
ocfs2: fix data corruption after conversion from inline format This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.288 by commit 560edd14de2bf9dbc0129681eeb4d5ef87cc105f, it was introduced in version v4.9.242 by commit acef5107e2eacb08a16ad5db60320d65bd26a6c0. For more details please see the references link.
null
2021-12-19T23:43:47.633360Z
2021-11-14T15:12:27.625028Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/acef5107e2eacb08a16ad5db60320d65bd26a6c0'}
Linux
GSD-2021-1002618
xen/console: harden hvc_xen against event channel storms
xen/console: harden hvc_xen against event channel storms This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.296 by commit c7eaa5082bccfc00dfdb500ac6cc86d6f24ca027. For more details please see the references link.
null
2022-01-11T05:58:14.862684Z
2021-12-27T05:27:27.566755Z
null
null
null
null
null
Linux
GSD-2021-1000625
btrfs: do not BUG_ON in link_to_fixup_dir
btrfs: do not BUG_ON in link_to_fixup_dir This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.124 by commit 0ed102453aa1cd12fefde8f6b60b9519b0b1f003, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T01:27:51.625153Z
2021-06-04T19:49:27.793122Z
null
null
null
null
null
Linux
GSD-2022-1001348
btrfs: zoned: traverse devices under chunk_mutex in btrfs_can_activate_zone
btrfs: zoned: traverse devices under chunk_mutex in btrfs_can_activate_zone This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 09e65ae515af2b24d6dc23af21719a3b41de83e5, it was introduced in version v5.16 by commit a85f05e59bc15a83ad910dbcb71df5ad8fa77295. For more details please see the references link.
null
2022-04-25T03:49:41.851399Z
2022-04-24T21:06:36.011232Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a85f05e59bc15a83ad910dbcb71df5ad8fa77295'}
Linux
GSD-2021-1002248
i40e: Fix NULL ptr dereference on VSI filter sync
i40e: Fix NULL ptr dereference on VSI filter sync This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.218 by commit 87c421ab4a43433cb009fea44bbbc77f46913e1d, it was introduced in version v3.12 by commit 41c445ff0f482bb6e6b72dcee9e598e20575f743. For more details please see the references link.
null
2021-12-19T23:18:51.806547Z
2021-11-29T02:35:18.367128Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41c445ff0f482bb6e6b72dcee9e598e20575f743'}
Linux
GSD-2021-1000275
drm/amd/display: Fix off by one in hdmi_14_process_transaction()
drm/amd/display: Fix off by one in hdmi_14_process_transaction() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 080bd41d6478a64edf96704fddcda52b1fd5fed7, it was introduced in version v5.5 by commit 4c283fdac08abf3211533f70623c90a34f41d08d. For more details please see the references link.
null
2021-12-19T23:02:58.745792Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4c283fdac08abf3211533f70623c90a34f41d08d'}
Linux
GSD-2022-1001718
Bluetooth: use memset avoid memory leaks
Bluetooth: use memset avoid memory leaks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 42b6a39f439b6f37cc2024d91ce547d83290ff78. For more details please see the references link.
null
2022-04-25T05:28:04.251388Z
2022-04-24T21:37:30.871263Z
null
null
null
null
null
Linux
GSD-2021-1001872
kunit: fix reference count leak in kfree_at_end
kunit: fix reference count leak in kfree_at_end This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit bbdd158b40b66a9403391a517f24ef6613573446. For more details please see the references link.
null
2021-12-19T23:18:29.891946Z
2021-10-28T13:53:18.011232Z
null
null
null
null
null
Linux
GSD-2021-1000760
x86/kvm: Disable all PV features on crash
x86/kvm: Disable all PV features on crash This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.125 by commit 97e814e6b5cdc8101127a5140925941b6088aabb, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T23:21:29.948991Z
2021-06-25T00:03:00.856824Z
null
null
null
null
null
Linux
GSD-2021-1000330
ethernet:enic: Fix a use after free bug in enic_hard_start_xmit
ethernet:enic: Fix a use after free bug in enic_hard_start_xmit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.38 by commit 7afdd6aba95c8a526038e7abe283eeac3e4320f1, it was introduced in version v4.16 by commit fb7516d42478ebc8e2f00efb76ef96f7b68fd8d3. For more details please see the references link.
null
2021-12-20T00:27:35.234553Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb7516d42478ebc8e2f00efb76ef96f7b68fd8d3'}
Linux
GSD-2022-1002421
video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow
video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 580e5d3815474b8349250c25c16416585a72c7fe. For more details please see the references link.
null
2022-04-25T04:35:09.847507Z
2022-04-24T22:45:18.456327Z
null
null
null
null
null
Linux
GSD-2021-1001171
usb: max-3421: Prevent corruption of freed memory
usb: max-3421: Prevent corruption of freed memory This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.6 by commit d4179cdb769a651f2ae89c325612a69bf6fbdf70, it was introduced in version v3.16 by commit 2d53139f31626bad6f8983d8e519ddde2cbba921. For more details please see the references link.
null
2021-12-20T00:12:28.970174Z
2021-08-03T01:32:10.823130Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2d53139f31626bad6f8983d8e519ddde2cbba921'}
Linux
GSD-2022-1002071
tipc: fix the timer expires after interval 100ms
tipc: fix the timer expires after interval 100ms This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 084be6309f4f7d71cf7cbc4da6a6be513992b69f, it was introduced in version v4.20 by commit 6787927475e52f6933e3affce365dabb2aa2fadf. For more details please see the references link.
null
2022-04-25T03:10:32.434587Z
2022-04-24T22:07:50.539609Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6787927475e52f6933e3affce365dabb2aa2fadf'}
Linux
GSD-2021-1001521
mcb: fix error handling in mcb_alloc_bus()
mcb: fix error handling in mcb_alloc_bus() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.285 by commit 8a558261fa57a6deefb0925ab1829f698b194aea, it was introduced in version v4.7 by commit 5d9e2ab9fea4cdf0a2522f5cbed2e7fbb220d757. For more details please see the references link.
null
2021-12-19T22:30:17.500090Z
2021-10-19T16:21:59.002103Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5d9e2ab9fea4cdf0a2522f5cbed2e7fbb220d757'}
Linux
GSD-2022-1001831
ibmvnic: fix race between xmit and reset
ibmvnic: fix race between xmit and reset This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 1bd58abf595b6cf1ba6dd47ec887c4c009155fc9, it was introduced in version v5.4 by commit 7ed5b31f4a6695a21f617df07646e9b15c6c1d29. For more details please see the references link.
null
2022-04-25T03:33:55.309682Z
2022-04-24T21:46:09.900281Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ed5b31f4a6695a21f617df07646e9b15c6c1d29'}
Linux
GSD-2022-1000723
btrfs: defrag: allow defrag_one_cluster() to skip large extent which is not a target
btrfs: defrag: allow defrag_one_cluster() to skip large extent which is not a target This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.12 by commit 833df0a3d38c4d5bd3cd84b8dd38855792aa6573. For more details please see the references link.
null
2022-03-18T02:52:33.012784Z
2022-03-18T00:12:17.207485Z
null
null
null
null
null
Linux
GSD-2022-1000689
btrfs: do not start relocation until in progress drops are done
btrfs: do not start relocation until in progress drops are done This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.13 by commit 5e70bc827b563caf22e1203428cc3719643de5aa. For more details please see the references link.
null
2022-03-18T03:03:12.953323Z
2022-03-18T00:09:46.222981Z
null
null
null
null
null
Linux
GSD-2022-1000373
ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path
ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.101 by commit 09ac0fcb0a82d647f2c61d3d488d367b7ee5bd51, it was introduced in version v4.0 by commit f243e5a7859a24d10975afb9a1708cac624ba6f1. For more details please see the references link.
null
2022-03-07T01:39:25.576464Z
2022-02-27T02:57:49.509871Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f243e5a7859a24d10975afb9a1708cac624ba6f1'}
Linux
GSD-2021-1002462
aio: fix use-after-free due to missing POLLFREE handling
aio: fix use-after-free due to missing POLLFREE handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.165 by commit 4105e6a128e8a98455dfc9e6dbb2ab0c33c4497f, it was introduced in version v4.18 by commit 2c14fa838cbefc23cf1c73ca167ed85b274b2913. For more details please see the references link.
null
2021-12-20T01:36:16.619922Z
2021-12-19T19:38:23.616900Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c14fa838cbefc23cf1c73ca167ed85b274b2913'}
Linux
GSD-2022-1001132
media: atomisp: fix dummy_ptr check to avoid duplicate active_bo
media: atomisp: fix dummy_ptr check to avoid duplicate active_bo This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 2a4be3f39f1c436f2f59902247a90d705fe76e2d. For more details please see the references link.
null
2022-04-25T06:51:37.652328Z
2022-04-24T20:47:58.760803Z
null
null
null
null
null
Linux
GSD-2021-1002198
cgroup: Fix memory leak caused by missing cgroup_bpf_offline
cgroup: Fix memory leak caused by missing cgroup_bpf_offline This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 04f8ef5643bcd8bcde25dfdebef998aea480b2ba, it was introduced in version v5.10 by commit 2b0d3d3e4fcfb19d10f9a82910b8f0f05c56ee3e. For more details please see the references link.
null
2021-12-19T23:37:53.791675Z
2021-11-14T15:24:20.790071Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2b0d3d3e4fcfb19d10f9a82910b8f0f05c56ee3e'}
Linux
GSD-2021-1002032
nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells
nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.75 by commit 57e48886401b14cd351423fabfec2cfd18df4f66, it was introduced in version v4.3 by commit 69aba7948cbe53f2f1827e84e9dd0ae470a5072e. For more details please see the references link.
null
2021-12-19T23:35:48.972357Z
2021-11-14T15:16:43.389898Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69aba7948cbe53f2f1827e84e9dd0ae470a5072e'}
Linux
GSD-2022-1001098
x86/sev: Unroll string mmio with CC_ATTR_GUEST_UNROLL_STRING_IO
x86/sev: Unroll string mmio with CC_ATTR_GUEST_UNROLL_STRING_IO This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit b06bacfacdcdd8df7800b48814b96554b532b77f, it was introduced in version v4.15 by commit d8aa7eea78a1401cce39b3bb61ead0150044a3df. For more details please see the references link.
null
2022-04-25T05:40:20.807421Z
2022-04-24T20:45:07.803960Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d8aa7eea78a1401cce39b3bb61ead0150044a3df'}
Linux
GSD-2022-1001562
ASoC: rockchip: Fix PM usage reference of rockchip_i2s_tdm_resume
ASoC: rockchip: Fix PM usage reference of rockchip_i2s_tdm_resume This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 4e5510219111607b1f1875ab3c3f0485ba3c381c, it was introduced in version v5.16 by commit 081068fd641403994f0505e6b91e021d3925f348. For more details please see the references link.
null
2022-04-25T06:51:44.324642Z
2022-04-24T21:23:53.107560Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/081068fd641403994f0505e6b91e021d3925f348'}
Linux
GSD-2022-1001077
drm/amdkfd: svm range restore work deadlock when process exit
drm/amdkfd: svm range restore work deadlock when process exit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 858822905f4bf44100d63c5e22e263109976f7cb. For more details please see the references link.
null
2022-04-25T05:13:40.923269Z
2022-04-24T20:43:45.972305Z
null
null
null
null
null
Linux
GSD-2021-1002527
io_uring: fail cancellation for EXITING tasks
io_uring: fail cancellation for EXITING tasks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.6 by commit 3d2a1e68fd9904fdc1b02f2e7d40ca47df7ba39f, it was introduced in version v5.15 by commit 89b263f6d56e683ddcf7643140271ef6e36c72b9. For more details please see the references link.
null
2021-12-19T22:42:17.611366Z
2021-12-19T19:41:13.338246Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/89b263f6d56e683ddcf7643140271ef6e36c72b9'}
Linux
GSD-2022-1001427
io_uring: fix memory leak of uid in files registration
io_uring: fix memory leak of uid in files registration This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit d6d7a517e81accf6ed22d55684baea763d2dbe43, it was introduced in version v5.5 by commit 08a451739a9b5783f67de51e84cb6d9559bb9dc4. For more details please see the references link.
null
2022-04-25T04:25:23.749198Z
2022-04-24T21:12:10.924630Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/08a451739a9b5783f67de51e84cb6d9559bb9dc4'}
Linux
GSD-2021-1002177
KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest()
KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 9b4416c5095c20e110c82ae602c254099b83b72f, it was introduced in version v5.2 by commit 10d91611f426d4bafd2a83d966c36da811b2f7ad. For more details please see the references link.
null
2021-12-20T00:47:01.273558Z
2021-11-14T15:23:21.568036Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/10d91611f426d4bafd2a83d966c36da811b2f7ad'}
Linux
GSD-2022-1001974
drbd: Fix five use after free bugs in get_initial_state
drbd: Fix five use after free bugs in get_initial_state This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit 594205b4936771a250f9d141e7e0fff21c3dd2d9, it was introduced in version v4.5 by commit a29728463b254ce81ecefdf20c1a02e01d9361da. For more details please see the references link.
null
2022-04-25T06:14:28.657535Z
2022-04-24T22:00:01.359868Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a29728463b254ce81ecefdf20c1a02e01d9361da'}
Linux
GSD-2022-1000666
RDMA/cma: Use correct address when leaving multicast group
RDMA/cma: Use correct address when leaving multicast group This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.8 by commit 3365f9daa2a7060309979d55105f0a1c12354683, it was introduced in version v5.10 by commit b5de0c60cc30c2a3513c7188c73f3f29acc29234. For more details please see the references link.
null
2022-03-07T01:52:47.921583Z
2022-02-27T03:37:58.437327Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b5de0c60cc30c2a3513c7188c73f3f29acc29234'}
Linux
GSD-2022-1000236
moxart: fix potential use-after-free on remove path
moxart: fix potential use-after-free on remove path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.100 by commit be93028d306dac9f5b59ebebd9ec7abcfc69c156. For more details please see the references link.
null
2022-02-19T10:23:11.609612Z
2022-02-18T21:59:41.082520Z
null
null
null
null
null
Linux
GSD-2021-1000849
scsi: core: Fix error handling of scsi_host_alloc()
scsi: core: Fix error handling of scsi_host_alloc() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.273 by commit 8958181c1663e24a13434448e7d6b96b5d04900a. For more details please see the references link.
null
2021-12-20T03:08:58.041027Z
2021-06-30T00:01:13.511008Z
null
null
null
null
null
Linux
GSD-2021-1000799
bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks
bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.10 by commit acc43fc6cf0d50612193813c5906a1ab9d433e1e, it was introduced in version v5.6 by commit 59438b46471ae6cdfb761afc8c9beaf1e428a331. For more details please see the references link.
null
2021-12-19T23:04:34.623358Z
2021-06-25T00:08:08.380930Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/59438b46471ae6cdfb761afc8c9beaf1e428a331'}
Linux
GSD-2021-1000263
ataflop: potential out of bounds in do_format()
ataflop: potential out of bounds in do_format() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 2a3a8bbca28b899806844c00d49ed1b7ccb50957, it was introduced in version v5.11 by commit bf9c0538e485b591a2ee02d9adb8a99db4be5a2a. For more details please see the references link.
null
2021-12-19T23:33:16.483472Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf9c0538e485b591a2ee02d9adb8a99db4be5a2a'}
Linux
GSD-2021-1000633
drm/meson: fix shutdown crash when component not probed
drm/meson: fix shutdown crash when component not probed This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.124 by commit 4ce2bf20b4a6e307e114847d60b2bf40a6a1fac0, it was introduced in version v5.4.106 by commit d2100ef32a8cfd024bad94f4fbc5e53d40d2b3da. For more details please see the references link.
null
2021-12-20T01:03:15.701493Z
2021-06-04T19:51:16.650822Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d2100ef32a8cfd024bad94f4fbc5e53d40d2b3da'}
Linux
GSD-2021-1001921
isdn: mISDN: Fix sleeping function called from invalid context
isdn: mISDN: Fix sleeping function called from invalid context This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.290 by commit 6f95c97e0f9d6eb39c3f2cb45e8fa4268d1b372b. For more details please see the references link.
null
2021-12-20T00:19:04.789303Z
2021-11-14T15:11:48.428866Z
null
null
null
null
null
Linux
GSD-2021-1001188
virtio_console: Assure used length from device is limited
virtio_console: Assure used length from device is limited This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.4 by commit 21a06a244d2576f93cbc9ce9bf95814c2810c36a. For more details please see the references link.
null
2021-12-20T00:11:13.898616Z
2021-08-03T01:33:28.391366Z
null
null
null
null
null
Linux
GSD-2022-1002122
brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path
brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit f3820ddaf4f3ac80c7401ccc6a42e663c9317f31, it was introduced in version v5.4 by commit 82f93cf46d6007ffa003b2d4a2834563b6b84d21. For more details please see the references link.
null
2022-04-25T03:11:24.794919Z
2022-04-24T22:13:46.385773Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/82f93cf46d6007ffa003b2d4a2834563b6b84d21'}
Linux
GSD-2021-1001472
seq_file: disallow extremely large seq buffer allocations
seq_file: disallow extremely large seq buffer allocations This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.276 by commit 3533e50cbee8ff086bfa04176ac42a01ee3db37d, it was introduced in version v3.16 by commit 058504edd02667eef8fac9be27ab3ea74332e9b4. For more details please see the references link.
null
2021-12-20T00:38:25.566788Z
2021-08-03T02:51:28.552916Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/058504edd02667eef8fac9be27ab3ea74332e9b4'}
Linux
GSD-2022-1002088
gpu: host1x: Fix a memory leak in 'host1x_remove()'
gpu: host1x: Fix a memory leak in 'host1x_remove()' This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 6bb107332db28a0e9256c2d36a0902b85307612c, it was introduced in version v4.13 by commit 8474b02531c4881a762c52ef869c52429e38633f. For more details please see the references link.
null
2022-04-25T05:05:07.270479Z
2022-04-24T22:09:42.884285Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8474b02531c4881a762c52ef869c52429e38633f'}
Linux
GSD-2021-1001022
usb: misc: brcmstb-usb-pinmap: check return value after calling platform_get_resource()
usb: misc: brcmstb-usb-pinmap: check return value after calling platform_get_resource() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit 2147684be1ebdaf845783139b9bc4eba3fecd9e4, it was introduced in version v5.11 by commit 517c4c44b32372d2fdf4421822e21083c45e89f9. For more details please see the references link.
null
2021-12-19T23:34:39.888334Z
2021-06-30T00:34:28.893543Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/517c4c44b32372d2fdf4421822e21083c45e89f9'}
Linux
GSD-2021-1001537
cpufreq: schedutil: Destroy mutex before kobject_put() frees the memory
cpufreq: schedutil: Destroy mutex before kobject_put() frees the memory This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.249 by commit 514643eadfeab8ee11e55981289c720308eb0afd, it was introduced in version v4.14.249 by commit 463c46705f321201090b69c4ad5da0cd2ce614c9. For more details please see the references link.
null
2021-10-19T16:22:45.082782Z
2021-10-19T16:22:45.082782Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/463c46705f321201090b69c4ad5da0cd2ce614c9'}
Linux
GSD-2022-1002067
clk: qcom: clk-rcg2: Update logic to calculate D value for RCG
clk: qcom: clk-rcg2: Update logic to calculate D value for RCG This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 334720f418f57b1d969dad2117b21f9388cb9395, it was introduced in version v3.16 by commit 99cbd064b059f222c8839ba433a68b2d6ee33066. For more details please see the references link.
null
2022-04-25T04:51:26.646529Z
2022-04-24T22:07:22.792923Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/99cbd064b059f222c8839ba433a68b2d6ee33066'}
Linux
GSD-2021-1001167
io_uring: fix memleak in io_init_wq_offload()
io_uring: fix memleak in io_init_wq_offload() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.6 by commit 502731a03f27cba1513fbbff77e508185ffce5bb, it was introduced in version v5.12 by commit e941894eae31b52f0fd9bdb3ce20620afa152f45. For more details please see the references link.
null
2021-12-19T23:18:23.332946Z
2021-08-03T01:31:54.637164Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e941894eae31b52f0fd9bdb3ce20620afa152f45'}
Linux
GSD-2022-1002437
drm/tegra: Fix reference leak in tegra_dsi_ganged_probe
drm/tegra: Fix reference leak in tegra_dsi_ganged_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 5e8fdb6392d945d33fef959eab73f8c34bc0a63b, it was introduced in version v3.19 by commit e94236cde4d519cdecd45e2435defba33abdc99f. For more details please see the references link.
null
2022-04-25T05:55:35.809481Z
2022-04-24T22:47:18.983939Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e94236cde4d519cdecd45e2435defba33abdc99f'}
Linux
GSD-2021-1000326
sched: Fix out-of-bound access in uclamp
sched: Fix out-of-bound access in uclamp This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.38 by commit f7347c85490b92dd144fa1fba9e1eca501656ab3, it was introduced in version v5.3 by commit 69842cba9ace84849bb9b8edcdf2cefccd97901c. For more details please see the references link.
null
2021-12-19T23:14:06.306445Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69842cba9ace84849bb9b8edcdf2cefccd97901c'}
Linux
GSD-2022-1000959
i2c: dev: check return value when calling dev_set_name()
i2c: dev: check return value when calling dev_set_name() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.4 by commit c74d77a2d07744147d734138acd6ce9dba715e5d, it was introduced in version v5.7 by commit 1413ef638abae4ab5621901cf4d8ef08a4a48ba6. For more details please see the references link.
null
2022-04-25T06:26:17.536268Z
2022-04-24T20:35:06.579858Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1413ef638abae4ab5621901cf4d8ef08a4a48ba6'}
Linux
GSD-2021-1000776
ext4: fix memory leak in ext4_fill_super
ext4: fix memory leak in ext4_fill_super This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.43 by commit 01d349a481f0591230300a9171330136f9159bcd, it was introduced in version v2.6.25 by commit ce40733ce93de402ed629762f0e912d9af187cef. For more details please see the references link.
null
2021-12-19T22:52:18.063659Z
2021-06-25T00:04:52.990237Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ce40733ce93de402ed629762f0e912d9af187cef'}
Linux
GSD-2021-1001864
efi: Change down_interruptible() in virt_efi_reset_system() to down_trylock()
efi: Change down_interruptible() in virt_efi_reset_system() to down_trylock() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.75 by commit 3b42751401424a1c0f39297b7f4317598aa33474. For more details please see the references link.
null
2021-12-20T00:57:25.055592Z
2021-10-28T13:52:54.868441Z
null
null
null
null
null
Linux
GSD-2022-1001535
scsi: pm8001: Fix abort all task initialization
scsi: pm8001: Fix abort all task initialization This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 326d894adf89f3c707b7784becbe241830daaab6, it was introduced in version v3.10 by commit c6b9ef5779c3e1edfa9de949d2a51252bc347663. For more details please see the references link.
null
2022-04-25T06:51:39.885911Z
2022-04-24T21:21:14.266549Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6b9ef5779c3e1edfa9de949d2a51252bc347663'}
Linux
GSD-2021-1002065
riscv, bpf: Fix potential NULL dereference
riscv, bpf: Fix potential NULL dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.77 by commit cac6b043cea3e120f4fccec16f7381747cbfdc0d, it was introduced in version v5.7 by commit ca6cb5447ceca6a87d6b62c9e5d41042c34f7ffa. For more details please see the references link.
null
2021-12-20T01:09:54.508279Z
2021-11-14T15:18:19.566383Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca6cb5447ceca6a87d6b62c9e5d41042c34f7ffa'}
Linux
GSD-2021-1000058
media: staging/intel-ipu3: Fix set_fmt error handling
media: staging/intel-ipu3: Fix set_fmt error handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.3 by commit 6fb617e37a39db0a3eca4489431359d0bdf3b9bc, it was introduced in version v5.2 by commit 6d5f26f2e045f2377b524516194657c00efbbce8. For more details please see the references link.
null
2021-12-19T23:33:00.134312Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6d5f26f2e045f2377b524516194657c00efbbce8'}
Linux
GSD-2022-1001165
LSM: general protection fault in legacy_parse_param
LSM: general protection fault in legacy_parse_param This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit cadae7c5e477aaafcba819b8e4a3d1c1a1503b62. For more details please see the references link.
null
2022-04-25T06:23:08.908548Z
2022-04-24T20:49:46.966137Z
null
null
null
null
null
Linux
GSD-2021-1002435
proc/vmcore: fix clearing user buffer by properly using clear_user()
proc/vmcore: fix clearing user buffer by properly using clear_user() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.163 by commit fd7974c547abfb03072a4ee706d3a6f182266f89, it was introduced in version v3.0 by commit 997c136f518c5debd63847e78e2a8694f56dcf90. For more details please see the references link.
null
2021-12-19T22:09:54.542282Z
2021-12-19T19:37:10.501558Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/997c136f518c5debd63847e78e2a8694f56dcf90'}
Linux
GSD-2021-1000408
hfsplus: prevent corruption in shrinking truncate
hfsplus: prevent corruption in shrinking truncate This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.120 by commit c451a6bafb5f422197d31536f82116aed132b72c, it was introduced in version v4.19 by commit 31651c607151f1034cfb57e5a78678bea54c362b. For more details please see the references link.
null
2021-12-19T22:55:19.274558Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/31651c607151f1034cfb57e5a78678bea54c362b'}
Linux
GSD-2022-1000324
vsock: remove vsock from connected table when connect is interrupted by a signal
vsock: remove vsock from connected table when connect is interrupted by a signal This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.231 by commit 2910bcb9f67551a45397735e47b6d456eb8cd549, it was introduced in version v3.9 by commit d021c344051af91f42c5ba9fdedc176740cbd238. For more details please see the references link.
null
2022-03-07T01:38:08.536544Z
2022-02-27T02:51:33.956871Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d021c344051af91f42c5ba9fdedc176740cbd238'}
Linux
GSD-2022-1002319
dm ioctl: prevent potential spectre v1 gadget
dm ioctl: prevent potential spectre v1 gadget This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 7ae2c5b89da3cfaf856df880af27d3bb32a74b3d. For more details please see the references link.
null
2022-04-25T05:41:38.487154Z
2022-04-24T22:33:52.558788Z
null
null
null
null
null
Linux
GSD-2021-1001649
mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap
mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.71 by commit 1282bb00835ff79d2d9c023055d514df5b4de260, it was introduced in version v4.7 by commit 646e76bb5daf4ca38438c69ffb72cccb605f3466. For more details please see the references link.
null
2021-12-20T00:37:38.047407Z
2021-10-19T16:29:57.214152Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/646e76bb5daf4ca38438c69ffb72cccb605f3466'}
Linux
GSD-2022-1001866
bpf: Fix UAF due to race between btf_try_get_module and load_module
bpf: Fix UAF due to race between btf_try_get_module and load_module This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 51b82141fffa454abf937a8ff0b8af89e4fd0c8f, it was introduced in version v5.12 by commit 541c3bad8dc51b253ba8686d0cd7628e6b9b5f4c. For more details please see the references link.
null
2022-04-25T03:10:44.070208Z
2022-04-24T21:49:45.242691Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/541c3bad8dc51b253ba8686d0cd7628e6b9b5f4c'}
Linux
GSD-2022-1000774
xfrm: fix MTU regression
xfrm: fix MTU regression This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.27 by commit 75cbedd333431381ef309c5b0968582c7ba4c8ee, it was introduced in version v4.15 by commit 749439bfac6e1a2932c582e2699f91d329658196. For more details please see the references link.
null
2022-03-18T04:47:33.259033Z
2022-03-18T00:17:17.621062Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/749439bfac6e1a2932c582e2699f91d329658196'}
Linux
GSD-2021-1001219
RDMA/cma: Fix rdma_resolve_route() memory leak
RDMA/cma: Fix rdma_resolve_route() memory leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.3 by commit 07583ba2e2d8947c3d365d97608cb436510885ac. For more details please see the references link.
null
2021-12-20T00:14:40.057528Z
2021-08-03T01:39:33.098394Z
null
null
null
null
null
Linux
GSD-2021-1002823
net: marvell: prestera: fix incorrect structure access
net: marvell: prestera: fix incorrect structure access This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.12 by commit 5c553a0cd1263e4da5f220d80fa713fc3959c1d0, it was introduced in version v5.14 by commit 3d5048cc54bd250cfbb358c37fcc011135977887. For more details please see the references link.
null
2022-01-11T05:48:11.066628Z
2021-12-30T02:44:59.336675Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3d5048cc54bd250cfbb358c37fcc011135977887'}
Linux
GSD-2022-1001889
watch_queue: Fix NULL dereference in error cleanup
watch_queue: Fix NULL dereference in error cleanup This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 695c47cea02b9101e2fc2e7d36d552128592b347, it was introduced in version v5.8 by commit c73be61cede5882f9605a852414db559c0ebedfd. For more details please see the references link.
null
2022-04-25T03:36:28.729306Z
2022-04-24T21:52:18.881607Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c73be61cede5882f9605a852414db559c0ebedfd'}
Linux
GSD-2022-1000261
powerpc64/bpf: Limit 'ldbrx' to processors compliant with ISA v2.06
powerpc64/bpf: Limit 'ldbrx' to processors compliant with ISA v2.06 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.19 by commit 3bfbc00587dc883eaed383558ae512a351c2cd09, it was introduced in version v4.8 by commit 156d0e290e969caba25f1851c52417c14d141b24. For more details please see the references link.
null
2022-02-19T03:13:39.185386Z
2022-02-18T22:03:25.904794Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/156d0e290e969caba25f1851c52417c14d141b24'}
Linux
GSD-2022-1001923
jffs2: fix memory leak in jffs2_scan_medium
jffs2: fix memory leak in jffs2_scan_medium This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 52ba0ab4f0a606f02a6163493378989faa1ec10a, it was introduced in version v2.6.15 by commit e631ddba588783edd521c5a89f7b2902772fb691. For more details please see the references link.
null
2022-04-25T06:30:41.274134Z
2022-04-24T21:55:17.649441Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e631ddba588783edd521c5a89f7b2902772fb691'}
Linux
GSD-2022-1000631
hwmon: (nct6775) Fix crash in clear_caseopen
hwmon: (nct6775) Fix crash in clear_caseopen This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit cfb7d12f2e4a4d694f49e9b4ebb352f7b67cdfbb, it was introduced in version v5.16 by commit 2e7b9886968b89f0b4cbc59b8e6ed47fd4edd0dd. For more details please see the references link.
null
2022-03-07T01:50:38.549903Z
2022-02-27T03:33:23.241580Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2e7b9886968b89f0b4cbc59b8e6ed47fd4edd0dd'}
Linux
GSD-2021-1002120
net/tls: Fix flipped sign in tls_err_abort() calls
net/tls: Fix flipped sign in tls_err_abort() calls This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.16 by commit e41473543f75f7dbc5d605007e6f883f1bd13b9a, it was introduced in version v4.17 by commit c46234ebb4d1eee5e09819f49169e51cfc6eb909. For more details please see the references link.
null
2021-12-20T00:43:49.393819Z
2021-11-14T15:20:45.047458Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c46234ebb4d1eee5e09819f49169e51cfc6eb909'}
Linux
GSD-2022-1001470
btrfs: handle csum lookup errors properly on reads
btrfs: handle csum lookup errors properly on reads This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit f181b2e060929da91c01e2068179774ab8fa18fc. For more details please see the references link.
null
2022-04-25T03:38:42.623232Z
2022-04-24T21:15:24.307856Z
null
null
null
null
null
Linux
GSD-2021-1002570
drm/vc4: kms: Add missing drm_crtc_commit_put
drm/vc4: kms: Add missing drm_crtc_commit_put This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.7 by commit 53f9601e908d42481addd67cdb01a9288c611124, it was introduced in version v5.12 by commit 9ec03d7f1ed394897891319a4dda75f52c5d292d. For more details please see the references link.
null
2021-12-19T23:26:28.026844Z
2021-12-19T19:43:14.649305Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9ec03d7f1ed394897891319a4dda75f52c5d292d'}
Linux
GSD-2022-1001020
skbuff: fix coalescing for page_pool fragment recycling
skbuff: fix coalescing for page_pool fragment recycling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 72bb856d16e883437023ff2ff77d0c498018728a, it was introduced in version v5.15 by commit 53e0961da1c7bbdabd1abebb20de403ec237ec09. For more details please see the references link.
null
2022-04-25T06:40:30.075405Z
2022-04-24T20:40:26.787402Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/53e0961da1c7bbdabd1abebb20de403ec237ec09'}
Linux
GSD-2021-1001075
regulator: rt4801: Fix NULL pointer dereference if priv->enable_gpios is NULL
regulator: rt4801: Fix NULL pointer dereference if priv->enable_gpios is NULL This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit dc68f0c9e4a001e02376fe87f4bdcacadb27e8a1. For more details please see the references link.
null
2021-12-20T01:36:22.878168Z
2021-06-30T00:37:59.117299Z
null
null
null
null
null
Linux
GSD-2022-1000518
veth: fix races around rq->rx_notify_masked
veth: fix races around rq->rx_notify_masked This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit fd45628d2fec2bf7085d856ef448959d6e7effe9, it was introduced in version v4.19 by commit 948d4f214fde43743c57aae0c708bff44f6345f2. For more details please see the references link.
null
2022-03-07T01:48:10.132338Z
2022-02-27T03:18:34.332718Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/948d4f214fde43743c57aae0c708bff44f6345f2'}
Linux
GSD-2021-1001425
dm btree remove: assign new_root only when removal succeeds
dm btree remove: assign new_root only when removal succeeds This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.240 by commit 73f27adaa73e3057a9ec464e33c4f54d34ea5de3. For more details please see the references link.
null
2021-12-19T23:39:54.182427Z
2021-08-03T02:36:32.349570Z
null
null
null
null
null
Linux
GSD-2022-1002175
irqchip/gic-v3: Fix GICR_CTLR.RWP polling
irqchip/gic-v3: Fix GICR_CTLR.RWP polling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 3c07cc242baf83f0bddbbd9d7945d0bee56d8b57, it was introduced in version v3.17 by commit 021f653791ad17e03f98aaa7fb933816ae16f161. For more details please see the references link.
null
2022-04-25T04:53:17.064364Z
2022-04-24T22:18:45.795491Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/021f653791ad17e03f98aaa7fb933816ae16f161'}
Linux
GSD-2022-1000148
udf: Fix NULL ptr deref when converting from inline format
udf: Fix NULL ptr deref when converting from inline format This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.176 by commit 31136e5467f381cf18e2cfd467207dda7678c7a2, it was introduced in version v4.2 by commit 52ebea749aaed195245701a8f90a23d672c7a933. For more details please see the references link.
null
2022-02-19T08:09:41.079239Z
2022-02-18T21:47:19.841660Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/52ebea749aaed195245701a8f90a23d672c7a933'}
Linux
GSD-2021-1000664
misc/uss720: fix memory leak in uss720_probe
misc/uss720: fix memory leak in uss720_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.193 by commit 386918878ce4cd676e4607233866e03c9399a46a, it was introduced in version v2.6.14 by commit 0f36163d3abefbda1b21a330b3fdf3c2dc076d94. For more details please see the references link.
null
2021-12-19T22:34:39.945900Z
2021-06-04T19:57:44.662256Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0f36163d3abefbda1b21a330b3fdf3c2dc076d94'}
Linux
GSD-2021-1002659
xen/netback: don't queue unlimited number of packages
xen/netback: don't queue unlimited number of packages This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.222 by commit c9f17e92917fd5786be872626a3928979ecc4c39, it was introduced in version v3.18 by commit f48da8b14d04ca87ffcffe68829afd45f926ec6a. For more details please see the references link.
null
2022-01-11T05:57:59.095548Z
2021-12-27T05:33:34.496007Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f48da8b14d04ca87ffcffe68829afd45f926ec6a'}
Linux
GSD-2021-1001976
NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()
NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.213 by commit 9881b0c860649f27ef2565deef011e516390f416, it was introduced in version v3.13 by commit 1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8. For more details please see the references link.
null
2021-12-19T22:14:05.329178Z
2021-11-14T15:14:16.626456Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8'}
Linux
GSD-2022-1001309
can: m_can: m_can_tx_handler(): fix use after free of skb
can: m_can: m_can_tx_handler(): fix use after free of skb This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 31417073493f302d26ab66b3abc098d43227b835, it was introduced in version v3.18 by commit 80646733f11c2e9de3b6339f7e635047e6087280. For more details please see the references link.
null
2022-04-25T04:20:30.308598Z
2022-04-24T21:02:56.872532Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80646733f11c2e9de3b6339f7e635047e6087280'}
Linux
GSD-2021-1000234
mt76: mt7615: Fix a dereference of pointer sta before it is null checked
mt76: mt7615: Fix a dereference of pointer sta before it is null checked This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 28d7cb12d403f7f49e0914fd39b869ce5521f726, it was introduced in version v5.12.4 by commit fb2e48febf56c8993c5355dd2084c3d36b70c110. For more details please see the references link.
null
2021-06-24T22:55:39.150843Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb2e48febf56c8993c5355dd2084c3d36b70c110'}
Linux
GSD-2021-1002209
staging: rtl8712: fix use-after-free in rtl8712_dl_fw
staging: rtl8712: fix use-after-free in rtl8712_dl_fw This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.2 by commit a65c9afe9f2f55b7a7fb4a25ab654cd4139683a4, it was introduced in version v3.3 by commit 8c213fa59199f9673d66970d6940fa093186642f. For more details please see the references link.
null
2021-12-20T03:52:27.909143Z
2021-11-14T15:24:47.541914Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c213fa59199f9673d66970d6940fa093186642f'}
Linux
GSD-2022-1001759
wireguard: socket: ignore v6 endpoints when ipv6 is disabled
wireguard: socket: ignore v6 endpoints when ipv6 is disabled This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 9af42a4f6d81b96b123f3ec22a4dcb906c6d00e7, it was introduced in version v5.6 by commit e7096c131e5161fa3b8e52a650d7719d2857adfd. For more details please see the references link.
null
2022-04-25T05:35:51.615050Z
2022-04-24T21:40:17.827677Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e7096c131e5161fa3b8e52a650d7719d2857adfd'}
Linux
GSD-2021-1000721
net: caif: fix memory leak in caif_device_notify
net: caif: fix memory leak in caif_device_notify This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.272 by commit 9348c1f10932f13b299cbc8b1bd5f780751fae49, it was introduced in version v3.3 by commit 7c18d2205ea76eef9674e59e1ecae4f332a53e9e. For more details please see the references link.
null
2021-12-20T01:37:45.007577Z
2021-06-24T23:59:11.036428Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7c18d2205ea76eef9674e59e1ecae4f332a53e9e'}
Linux
GSD-2021-1001833
s390/pci: fix zpci_zdev_put() on reserve
s390/pci: fix zpci_zdev_put() on reserve This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit 188907c252188ac7a5ec3efcfa31dae1f47b8a20, it was introduced in version v5.10.61 by commit a69326e134d4ffa0d2d77bf1a4a62271c51c3051. For more details please see the references link.
null
2021-12-20T00:21:05.530192Z
2021-10-28T13:51:19.841325Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a69326e134d4ffa0d2d77bf1a4a62271c51c3051'}
Linux
GSD-2021-1001999
NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()
NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.155 by commit 7ab488d7228a9dceb2456867f1f0919decf6efed, it was introduced in version v3.13 by commit 1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8. For more details please see the references link.
null
2021-12-20T00:36:34.963988Z
2021-11-14T15:15:14.811618Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8'}
Linux
GSD-2021-1000371
media: venus: core: Fix some resource leaks in the error path of 'venus_probe()'
media: venus: core: Fix some resource leaks in the error path of 'venus_probe()' This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 00b68a7478343afdf83f30c43e64db5296057030, it was introduced in version v5.5 by commit 32f0a6ddc8c98a1aade2bf3d07c79d5d2c6ceb9a. For more details please see the references link.
null
2021-12-19T22:56:47.965308Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/32f0a6ddc8c98a1aade2bf3d07c79d5d2c6ceb9a'}
Linux
GSD-2022-1002460
drivers: net: slip: fix NPD bug in sl_tx_timeout()
drivers: net: slip: fix NPD bug in sl_tx_timeout() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit 113284fe48770841e157e338bf3a2e9f197a8b50. For more details please see the references link.
null
2022-04-25T05:29:37.729474Z
2022-04-24T22:50:29.091025Z
null
null
null
null
null
Linux
GSD-2021-1001130
mac80211: remove warning in ieee80211_get_sband()
mac80211: remove warning in ieee80211_get_sband() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.14 by commit 93e9f3fbafe3ebe8d060c11a425a08fad1885f23. For more details please see the references link.
null
2021-12-19T22:13:39.146941Z
2021-07-08T01:58:28.424269Z
null
null
null
null
null
Linux
GSD-2022-1002030
ubifs: Fix to add refcount once page is set private
ubifs: Fix to add refcount once page is set private This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit c34ae24a2590fee96a3a7735ba2fa6cc52306221, it was introduced in version v2.6.27 by commit 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d. For more details please see the references link.
null
2022-04-25T04:49:47.547920Z
2022-04-24T22:04:31.523642Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d'}
Linux
GSD-2021-1001560
sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb
sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.209 by commit 8c630a7b4f9dec63f08bd881ab77984a724a5124, it was introduced in version v4.8 by commit 3acb50c18d8d6650f10919464ade4dcdaf41d62f. For more details please see the references link.
null
2021-12-20T01:34:06.934654Z
2021-10-19T16:23:47.850869Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3acb50c18d8d6650f10919464ade4dcdaf41d62f'}