ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2021-1000865
NFS: Fix use-after-free in nfs4_init_client()
NFS: Fix use-after-free in nfs4_init_client() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.237 by commit c7eab9e2d7b4e983ce280276fb920af649955897, it was introduced in version v4.13 by commit 8dcbec6d20eb881ba368d0aebc3a8a678aebb1da. For more details please see the references link.
null
2021-12-19T23:16:35.030978Z
2021-06-30T00:02:20.023049Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8dcbec6d20eb881ba368d0aebc3a8a678aebb1da'}
Linux
GSD-2021-1001777
net: mdiobus: Fix memory leak in __mdiobus_register
net: mdiobus: Fix memory leak in __mdiobus_register This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.288 by commit bc5f2f3431ced08300e4cb3aff35f1da14c26433. For more details please see the references link.
null
2021-12-19T22:27:49.049272Z
2021-10-28T13:48:23.301560Z
null
null
null
null
null
Linux
GSD-2022-1002227
xen: fix is_xen_pmu()
xen: fix is_xen_pmu() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit ab2c789d1c0a3d0a682f7aa287754193471ff9f8, it was introduced in version v4.3 by commit bf6dfb154d935725c9a2005033ca33017b9df439. For more details please see the references link.
null
2022-04-25T06:07:40.661315Z
2022-04-24T22:23:20.991582Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf6dfb154d935725c9a2005033ca33017b9df439'}
Linux
GSD-2021-1001327
NFSv4: Initialise connection to the server in nfs4_alloc_client()
NFSv4: Initialise connection to the server in nfs4_alloc_client() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.134 by commit 81e03fe5bf8f5f66b8a62429fb4832b11ec6b272, it was introduced in version v4.8 by commit 5c6e5b60aae4347223f176966455010a5715b863. For more details please see the references link.
null
2021-12-19T23:23:54.675545Z
2021-08-03T02:10:06.466966Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5c6e5b60aae4347223f176966455010a5715b863'}
Linux
GSD-2022-1001958
cifs: potential buffer overflow in handling symlinks
cifs: potential buffer overflow in handling symlinks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.112 by commit 4e166a41180be2f1e66bbb6d46448e80a9a5ec05, it was introduced in version v2.6.37 by commit c69c1b6eaea1b3e1eecf7ad2fba0208ac4a11131. For more details please see the references link.
null
2022-04-25T06:53:39.124094Z
2022-04-24T21:58:14.785437Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c69c1b6eaea1b3e1eecf7ad2fba0208ac4a11131'}
Linux
GSD-2021-1000166
net: hso: fix NULL-deref on disconnect regression
net: hso: fix NULL-deref on disconnect regression This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.33 by commit 90642ee9eb581a13569b1c0bd57e85d962215273, it was introduced in version v5.10.30 by commit dc195928d7e4ec7b5cfc6cd10dc4c8d87a7c72ac. For more details please see the references link.
null
2021-12-20T00:23:49.113254Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/dc195928d7e4ec7b5cfc6cd10dc4c8d87a7c72ac'}
Linux
GSD-2021-1000536
net/smc: remove device from smcd_dev_list after failed device_add()
net/smc: remove device from smcd_dev_list after failed device_add() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit 40588782f1016c655ae1d302892f61d35af96842, it was introduced in version v4.19 by commit c6ba7c9ba43de1b57e9a53946e7ff988554c84ed. For more details please see the references link.
null
2021-12-20T01:01:30.035727Z
2021-06-04T19:35:03.007712Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6ba7c9ba43de1b57e9a53946e7ff988554c84ed'}
Linux
GSD-2021-1000023
dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback
dmaengine: idxd: Fix clobbering of SWERR overflow bit on writeback This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.16 by commit 02981a44a0e402089775416371bd2e0c935685f8, it was introduced in version v5.6 by commit bfe1d56091c1a404b3d4ce7e9809d745fc4453bb. For more details please see the references link.
null
2021-12-19T22:09:06.702185Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bfe1d56091c1a404b3d4ce7e9809d745fc4453bb'}
Linux
GSD-2021-1000473
Drivers: hv: vmbus: Increase wait time for VMbus unload
Drivers: hv: vmbus: Increase wait time for VMbus unload This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.233 by commit aac05d8ab50d9f0b18a3f03bb8f88b6c917b6d57, it was introduced in version v4.14.199 by commit f3440c029e471962719de3cbd771933e2165b338. For more details please see the references link.
null
2021-12-20T01:34:33.829344Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f3440c029e471962719de3cbd771933e2165b338'}
Linux
GSD-2022-1002362
media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED
media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit f04a520a422222fc921bf035dc67414c500a286a, it was introduced in version v3.7 by commit 8ac456495a33d9466076fea94594181ceefb76d9. For more details please see the references link.
null
2022-04-25T03:23:36.800260Z
2022-04-24T22:38:54.296201Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ac456495a33d9466076fea94594181ceefb76d9'}
Linux
GSD-2021-1000920
sch_cake: Fix out of bounds when parsing TCP options and header
sch_cake: Fix out of bounds when parsing TCP options and header This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.128 by commit 4cefa061fc63f4d2dff5ab4083f43857cd7a2335, it was introduced in version v4.19 by commit 8b7138814f29933898ecd31dfc83e35a30ee69f5. For more details please see the references link.
null
2021-12-19T23:56:35.219050Z
2021-06-30T00:24:34.652437Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8b7138814f29933898ecd31dfc83e35a30ee69f5'}
Linux
GSD-2021-1001632
usb: chipidea: ci_hdrc_imx: Also search for 'phys' phandle
usb: chipidea: ci_hdrc_imx: Also search for 'phys' phandle This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.73 by commit b3265b88e83b16c7be762fa5fb7e0632bce0002c, it was introduced in version v5.8 by commit 746f316b753a83e366bfc5f936cbf0d72d1c2d1d. For more details please see the references link.
null
2021-12-19T22:44:04.643728Z
2021-10-19T16:29:08.879861Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/746f316b753a83e366bfc5f936cbf0d72d1c2d1d'}
Linux
GSD-2021-1001798
efi: Change down_interruptible() in virt_efi_reset_system() to down_trylock()
efi: Change down_interruptible() in virt_efi_reset_system() to down_trylock() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.252 by commit 2d1792c078cd1b9f28ee3c7d3f1f8c2087ea39fd. For more details please see the references link.
null
2021-12-19T23:56:18.765775Z
2021-10-28T13:49:22.488205Z
null
null
null
null
null
Linux
GSD-2021-1001262
memory: fsl_ifc: fix leak of IO mapping on probe failure
memory: fsl_ifc: fix leak of IO mapping on probe failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.52 by commit 8d071d270afba468708faca5f7b6d9e656f75e27, it was introduced in version v3.3 by commit a20cbdeffce247a2b6fb83cd8d22433994068565. For more details please see the references link.
null
2021-12-19T22:58:59.162223Z
2021-08-03T01:51:54.729674Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a20cbdeffce247a2b6fb83cd8d22433994068565'}
Linux
GSD-2022-1001237
mt76: mt7915: fix possible memory leak in mt7915_mcu_add_sta
mt76: mt7915: fix possible memory leak in mt7915_mcu_add_sta This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit b334a245ff1d76b1e97af8cea648ea6798b9eb87, it was introduced in version v5.16 by commit 89bbd3730f382f15cfcc2c9264c65b5901ce02fa. For more details please see the references link.
null
2022-04-25T03:35:17.067875Z
2022-04-24T20:56:37.753612Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/89bbd3730f382f15cfcc2c9264c65b5901ce02fa'}
Linux
GSD-2021-1002767
io-wq: check for wq exit after adding new worker task_work
io-wq: check for wq exit after adding new worker task_work This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit 4b4e5bbf9386d4ec21d91c0cb0fd60b9bba778ec. For more details please see the references link.
null
2022-01-11T05:50:05.700954Z
2021-12-27T05:52:51.848892Z
null
null
null
null
null
Linux
GSD-2021-1001848
can: peak_pci: peak_pci_remove(): fix UAF
can: peak_pci: peak_pci_remove(): fix UAF This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit 28f28e4bc3a5e0051faa963f10b778ab38c1db69, it was introduced in version v3.4 by commit e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd. For more details please see the references link.
null
2021-12-20T00:25:06.470257Z
2021-10-28T13:52:01.004677Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd'}
Linux
GSD-2022-1001667
mm/sparsemem: fix 'mem_section' will never be NULL gcc 12 warning
mm/sparsemem: fix 'mem_section' will never be NULL gcc 12 warning This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 429f413ed83f6b9f81e8c4362bcc19e817a4d208, it was introduced in version v2.6.14 by commit 3e347261a80b57df792ab9464b5f0ed59add53a8. For more details please see the references link.
null
2022-04-25T06:17:22.754223Z
2022-04-24T21:33:29.358745Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3e347261a80b57df792ab9464b5f0ed59add53a8'}
Linux
GSD-2022-1000975
io_uring: abort file assignment prior to assigning creds
io_uring: abort file assignment prior to assigning creds This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.4 by commit 262960775e0d2cdf97a3e33993e95e13175df4bb, it was introduced in version v5.17.3 by commit 2c443b22756cf75dc594d4d32bf64505bf4ce84b. For more details please see the references link.
null
2022-04-25T05:52:13.157024Z
2022-04-24T20:36:14.155938Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c443b22756cf75dc594d4d32bf64505bf4ce84b'}
Linux
GSD-2021-1002337
tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc
tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit 5c34486f04700f1ba04907231dce0cc2705c2d7d. For more details please see the references link.
null
2021-12-20T01:04:52.673940Z
2021-11-29T02:39:25.697779Z
null
null
null
null
null
Linux
GSD-2022-1000426
KVM: eventfd: Fix false positive RCU usage warning
KVM: eventfd: Fix false positive RCU usage warning This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit d44af3ad2a2148582839b556d0ff5b5e3787dfc0. For more details please see the references link.
null
2022-03-07T01:34:58.067029Z
2022-02-27T03:05:11.574931Z
null
null
null
null
null
Linux
GSD-2022-1000099
USB: core: Fix hang in usb_kill_urb by adding memory barriers
USB: core: Fix hang in usb_kill_urb by adding memory barriers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.265 by commit 546ba238535d925254e0b3f12012a5c55801e2f3. For more details please see the references link.
null
2022-02-19T04:37:11.172725Z
2022-02-18T21:35:05.392196Z
null
null
null
null
null
Linux
GSD-2022-1000563
copy_process(): Move fd_install() out of sighand->siglock critical section
copy_process(): Move fd_install() out of sighand->siglock critical section This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit bc8167d53b7cbed96d5c2274bd7b92c4c9af1105, it was introduced in version v5.2 by commit 6fd2fe494b17bf2dec37b610d23a43a72b16923a. For more details please see the references link.
null
2022-03-07T01:50:15.207183Z
2022-02-27T03:24:21.736983Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6fd2fe494b17bf2dec37b610d23a43a72b16923a'}
Linux
GSD-2022-1000133
rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink()
rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.228 by commit a01e60a1ec6bef9be471fb7182a33c6d6f124e93, it was introduced in version v3.14 by commit ba7d49b1f0f8e5f24294a880ed576964059af5ef. For more details please see the references link.
null
2022-02-19T03:05:56.342498Z
2022-02-18T21:44:49.541575Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ba7d49b1f0f8e5f24294a880ed576964059af5ef'}
Linux
GSD-2021-1002622
igbvf: fix double free in `igbvf_probe`
igbvf: fix double free in `igbvf_probe` This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.294 by commit 79d9b092035dcdbe636b70433149df9cc6db1e49, it was introduced in version v2.6.30 by commit d4e0fe01a38a073568aee541a0247fe734095979. For more details please see the references link.
null
2022-01-11T05:48:00.463019Z
2021-12-27T05:27:40.766193Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d4e0fe01a38a073568aee541a0247fe734095979'}
Linux
GSD-2022-1001688
IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition
IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 92f1947c0d26060e978b3a9f21f32ce7c8c9cca3, it was introduced in version v5.1 by commit d757c60eca9b22f4d108929a24401e0fdecda0b1. For more details please see the references link.
null
2022-04-25T03:19:47.020195Z
2022-04-24T21:35:25.093107Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d757c60eca9b22f4d108929a24401e0fdecda0b1'}
Linux
GSD-2022-1001372
scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one()
scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit de6aee0978f164d3d0c771ce03e3066a26c371c5, it was introduced in version v2.6.23 by commit 45804fbb00eea27bdf4d62751681228a9e2844e9. For more details please see the references link.
null
2022-04-25T06:02:05.958414Z
2022-04-24T21:08:50.339144Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/45804fbb00eea27bdf4d62751681228a9e2844e9'}
Linux
GSD-2021-1002272
usb: typec: tipd: Remove WARN_ON in tps6598x_block_read
usb: typec: tipd: Remove WARN_ON in tps6598x_block_read This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.162 by commit 30dcfcda8992dc42f18e7d35b6a1fa72372d382d. For more details please see the references link.
null
2021-12-20T00:27:20.176536Z
2021-11-29T02:36:22.137143Z
null
null
null
null
null
Linux
GSD-2022-1001722
scsi: pm8001: Fix memory leak in pm8001_chip_fw_flash_update_req()
scsi: pm8001: Fix memory leak in pm8001_chip_fw_flash_update_req() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit e5ecdb01952f230921aa8163d8d7f4c97c925ed8. For more details please see the references link.
null
2022-04-25T06:25:01.288399Z
2022-04-24T21:37:42.452564Z
null
null
null
null
null
Linux
GSD-2022-1000830
netfilter: nf_queue: fix possible use-after-free
netfilter: nf_queue: fix possible use-after-free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.104 by commit 4d05239203fa38ea8a6f31e228460da4cb17a71a, it was introduced in version v2.6.29 by commit 271b72c7fa82c2c7a795bc16896149933110672d. For more details please see the references link.
null
2022-03-18T02:51:26.287167Z
2022-03-18T00:22:24.445439Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/271b72c7fa82c2c7a795bc16896149933110672d'}
Linux
GSD-2021-1002788
f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()
f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.223 by commit f9dfa44be0fb5e8426183a70f69a246cf5827f49. For more details please see the references link.
null
2022-01-11T06:43:38.664954Z
2021-12-30T02:43:27.169590Z
null
null
null
null
null
Linux
GSD-2021-1000561
USB: usbfs: Don't WARN about excessively large memory allocations
USB: usbfs: Don't WARN about excessively large memory allocations This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit 9f7cb3f01a10d9064cf13b3d26fb7e7a5827d098, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T23:20:18.936348Z
2021-06-04T19:39:08.343951Z
null
null
null
null
null
Linux
GSD-2021-1000131
dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails
dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.36 by commit 1cb02dc76f4c0a2749a02b26469512d6984252e9, it was introduced in version v4.6 by commit 1c357a1e86a4227a6b6059f2de118ae47659cebc. For more details please see the references link.
null
2021-12-20T00:59:46.156225Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c357a1e86a4227a6b6059f2de118ae47659cebc'}
Linux
GSD-2021-1000998
PCI: aardvark: Fix kernel panic during PIO transfer
PCI: aardvark: Fix kernel panic during PIO transfer This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit 1a1dbc4473974867fe8c5f195c17b341c8e82867. For more details please see the references link.
null
2021-12-19T22:54:25.929199Z
2021-06-30T00:32:14.625749Z
null
null
null
null
null
Linux
GSD-2021-1001370
net/sched: act_skbmod: Skip non-Ethernet packets
net/sched: act_skbmod: Skip non-Ethernet packets This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.199 by commit e4fdca366806f6bab374d1a95e626a10a3854b0c, it was introduced in version v4.9 by commit 86da71b57383d40993cb90baafb3735cffe5d800. For more details please see the references link.
null
2021-12-19T22:32:16.180891Z
2021-08-03T02:21:15.052469Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/86da71b57383d40993cb90baafb3735cffe5d800'}
Linux
GSD-2022-1002270
mm/kmemleak: reset tag when compare object pointer
mm/kmemleak: reset tag when compare object pointer This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 35b72d8e2c8e324d26a06149e45416a02aa7aec8. For more details please see the references link.
null
2022-04-25T06:21:28.328297Z
2022-04-24T22:28:37.678271Z
null
null
null
null
null
Linux
GSD-2021-1000832
usb: dwc3: ep0: fix NULL pointer exception
usb: dwc3: ep0: fix NULL pointer exception This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.273 by commit 96b74a99d360235c24052f1d060e64ac53f43528. For more details please see the references link.
null
2021-12-20T00:41:12.443080Z
2021-06-30T00:00:09.218259Z
null
null
null
null
null
Linux
GSD-2021-1001720
RDMA/hfi1: Fix kernel pointer leak
RDMA/hfi1: Fix kernel pointer leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit 714bfabe5f2901d96902e271d7217601fe4703e5, it was introduced in version v5.13 by commit 042a00f93aad5874937e00f36e68301f7e3a0af1. For more details please see the references link.
null
2021-12-20T01:19:41.549996Z
2021-10-19T16:33:27.033145Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/042a00f93aad5874937e00f36e68301f7e3a0af1'}
Linux
GSD-2021-1001235
atm: iphase: fix possible use-after-free in ia_module_exit()
atm: iphase: fix possible use-after-free in ia_module_exit() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.3 by commit d1fb12412874c94ad037e11d0ecdd1140a439297. For more details please see the references link.
null
2021-12-19T23:37:41.094424Z
2021-08-03T01:44:39.381714Z
null
null
null
null
null
Linux
GSD-2022-1000758
xen/xenbus: don't let xenbus_grant_ring() remove grants in error case
xen/xenbus: don't let xenbus_grant_ring() remove grants in error case This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.28 by commit 66cb2bbb522b0d5e4f6a11558ff7bfdf3f7d31f3. For more details please see the references link.
null
2022-03-18T03:03:08.607862Z
2022-03-18T00:15:44.390748Z
null
null
null
null
null
Linux
GSD-2021-1000977
net: ipv4: fix memory leak in netlbl_cipsov4_add_std
net: ipv4: fix memory leak in netlbl_cipsov4_add_std This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit deeeb65c6ee404f2d1fb80b38b2730645c0f4663, it was introduced in version v2.6.19 by commit 96cb8e3313c7a12e026c1ed510522ae6f6023875. For more details please see the references link.
null
2021-12-20T01:25:18.382912Z
2021-06-30T00:30:56.195321Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/96cb8e3313c7a12e026c1ed510522ae6f6023875'}
Linux
GSD-2021-1001665
xen/balloon: use a kernel thread instead a workqueue
xen/balloon: use a kernel thread instead a workqueue This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.70 by commit 372d3e6ea1e115942fdfb4b25f7003d822d071be. For more details please see the references link.
null
2021-12-20T01:16:13.514953Z
2021-10-19T16:30:42.882865Z
null
null
null
null
null
Linux
GSD-2022-1000308
parisc: Fix data TLB miss in sba_unmap_sg
parisc: Fix data TLB miss in sba_unmap_sg This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.268 by commit de75676ee99bf9f25b1124ff301b3f7b8ba597d4. For more details please see the references link.
null
2022-03-07T02:37:24.631885Z
2022-02-27T02:49:03.458919Z
null
null
null
null
null
Linux
GSD-2022-1002335
video: fbdev: cirrusfb: check pixclock to avoid divide by zero
video: fbdev: cirrusfb: check pixclock to avoid divide by zero This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 40b13e3d85744210db13457785646634e2d056bd. For more details please see the references link.
null
2022-04-25T04:25:07.545277Z
2022-04-24T22:35:31.210500Z
null
null
null
null
null
Linux
GSD-2021-1002419
net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources()
net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.220 by commit 676dc7d9b15bf8733233a2db1ec3f9091ab34275, it was introduced in version v4.7 by commit ec25bc04ed8e12947738468cbe2191f1529f9e39. For more details please see the references link.
null
2021-12-19T23:34:19.116088Z
2021-12-19T19:36:33.107993Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ec25bc04ed8e12947738468cbe2191f1529f9e39'}
Linux
GSD-2021-1000424
i2c: img-scb: fix reference leak when pm_runtime_get_sync fails
i2c: img-scb: fix reference leak when pm_runtime_get_sync fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.119 by commit 4734c4b1d9573c9d20bbc46cf37dde095ee011b8, it was introduced in version v4.15 by commit 93222bd9b966105f43418fd336654ad10045783a. For more details please see the references link.
null
2021-12-19T23:52:20.345813Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/93222bd9b966105f43418fd336654ad10045783a'}
Linux
GSD-2022-1001149
btrfs: do not clean up repair bio if submit fails
btrfs: do not clean up repair bio if submit fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit d1cb11fb45ebbb1e7dfe5e9038b32ea72c184b14. For more details please see the references link.
null
2022-04-25T06:51:25.224276Z
2022-04-24T20:49:00.618938Z
null
null
null
null
null
Linux
GSD-2021-1002049
mm, slub: fix potential memoryleak in kmem_cache_open()
mm, slub: fix potential memoryleak in kmem_cache_open() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit 568f906340b43120abd6fcc67c37396482f85930, it was introduced in version v4.8 by commit 210e7a43fa905bccafa9bb5966fba1d71f33eb8b. For more details please see the references link.
null
2021-12-19T22:23:46.509014Z
2021-11-14T15:17:32.496448Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/210e7a43fa905bccafa9bb5966fba1d71f33eb8b'}
Linux
GSD-2021-1000074
riscv/kprobe: fix kernel panic when invoking sys_read traced by kprobe
riscv/kprobe: fix kernel panic when invoking sys_read traced by kprobe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.3 by commit fd0f06590d35c99f98d12c7984897ec4201a6263, it was introduced in version v5.12 by commit c22b0bcb1dd024cb9caad9230e3a387d8b061df5. For more details please see the references link.
null
2021-12-19T23:29:20.962115Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c22b0bcb1dd024cb9caad9230e3a387d8b061df5'}
Linux
GSD-2022-1001519
bpf, sockmap: Fix double uncharge the mem of sk_msg
bpf, sockmap: Fix double uncharge the mem of sk_msg This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 223f3c51ab163852dd4819d357dcf33039929434, it was introduced in version v4.20 by commit 604326b41a6fb9b4a78b6179335decee0365cd8c. For more details please see the references link.
null
2022-04-25T04:05:38.594555Z
2022-04-24T21:19:35.679868Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/604326b41a6fb9b4a78b6179335decee0365cd8c'}
Linux
GSD-2022-1000021
net: fix use-after-free in tw_timer_handler
net: fix use-after-free in tw_timer_handler This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.224 by commit a8e1944b44f94f5c5f530e434c5eaee787254566, it was introduced in version v2.6.27 by commit 61a7e26028b94805fd686a6dc9dbd9941f8f19b0. For more details please see the references link.
null
2022-01-11T05:48:21.866151Z
2022-01-10T19:50:30.551170Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61a7e26028b94805fd686a6dc9dbd9941f8f19b0'}
Linux
GSD-2022-1000471
mtd: rawnand: gpmi: don't leak PM reference in error path
mtd: rawnand: gpmi: don't leak PM reference in error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit 4a7ec50298b1127c5024a750c969ea0794899545, it was introduced in version v5.15.17 by commit 0fe08bf9909f02eb487af2cc829f2853ea69bc96. For more details please see the references link.
null
2022-03-07T01:38:48.558909Z
2022-02-27T03:11:47.788588Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0fe08bf9909f02eb487af2cc829f2853ea69bc96'}
Linux
GSD-2021-1002360
net: ethernet: dec: tulip: de4x5: fix possible array overflows in type3_infoblock()
net: ethernet: dec: tulip: de4x5: fix possible array overflows in type3_infoblock() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.294 by commit 9a3af2f11bb7a50dcdcdfb98a687831dd75768e8. For more details please see the references link.
null
2021-12-20T01:21:40.686687Z
2021-12-19T19:33:54.461363Z
null
null
null
null
null
Linux
GSD-2022-1001630
tpm: fix reference counting for struct tpm_chip
tpm: fix reference counting for struct tpm_chip This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 2f928c0d5c02dbab49e8c19d98725c822f6fc409, it was introduced in version v4.12 by commit fdc915f7f71939ad5a3dda3389b8d2d7a7c5ee66. For more details please see the references link.
null
2022-04-25T03:12:32.391037Z
2022-04-24T21:30:09.880806Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fdc915f7f71939ad5a3dda3389b8d2d7a7c5ee66'}
Linux
GSD-2022-1000922
xfrm: fix MTU regression
xfrm: fix MTU regression This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.270 by commit d4d5190b942ac7a0f048db718c0a9f280b4fc2ce, it was introduced in version v4.14.16 by commit 8278804e05f6bcfe3fdfea4a404020752ead15a6. For more details please see the references link.
null
2022-03-18T02:55:01.909537Z
2022-03-18T00:32:30.781135Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8278804e05f6bcfe3fdfea4a404020752ead15a6'}
Linux
GSD-2021-1002730
bpf: Fix kernel address leakage in atomic cmpxchg's r0 aux reg
bpf: Fix kernel address leakage in atomic cmpxchg's r0 aux reg This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit f87a6c160ecc8c7b417d25f508d3f076fe346136, it was introduced in version v5.12 by commit 5ffa25502b5ab3d639829a2d1e316cff7f59a41e. For more details please see the references link.
null
2022-01-11T05:58:12.901258Z
2021-12-27T05:44:57.204715Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5ffa25502b5ab3d639829a2d1e316cff7f59a41e'}
Linux
GSD-2022-1000888
netfilter: nf_tables: fix memory leak during stateful obj update
netfilter: nf_tables: fix memory leak during stateful obj update This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.182 by commit 53026346a94c43f35c32b18804041bc483271d87, it was introduced in version v5.4 by commit d62d0ba97b5803183e70cfded7f7b9da76893bf5. For more details please see the references link.
null
2022-03-18T03:36:06.566794Z
2022-03-18T00:28:22.435684Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d62d0ba97b5803183e70cfded7f7b9da76893bf5'}
Linux
GSD-2022-1001260
ASoC: codecs: wc938x: fix accessing array out of bounds for enum type
ASoC: codecs: wc938x: fix accessing array out of bounds for enum type This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit d09aee1b1da196be11ed86dd4897f228f2487613, it was introduced in version v5.14 by commit e8ba1e05bdc016700c85fad559a812c2e795442f. For more details please see the references link.
null
2022-04-25T06:40:29.488583Z
2022-04-24T20:58:59.075442Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e8ba1e05bdc016700c85fad559a812c2e795442f'}
Linux
GSD-2022-1001775
ARM: mmp: Fix failure to remove sram device
ARM: mmp: Fix failure to remove sram device This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 4ab0293c961b75f914d05c9ed67fbb137315955a. For more details please see the references link.
null
2022-04-25T05:17:31.030773Z
2022-04-24T21:41:40.830905Z
null
null
null
null
null
Linux
GSD-2022-1000867
KVM: x86/mmu: make apf token non-zero to fix bug
KVM: x86/mmu: make apf token non-zero to fix bug This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.103 by commit 72fdfc75d4217b32363cc80def3de2cb3fef3f02. For more details please see the references link.
null
2022-03-18T03:01:02.404335Z
2022-03-18T00:25:58.768705Z
null
null
null
null
null
Linux
GSD-2021-1000218
f2fs: fix to avoid touching checkpointed data in get_victim()
f2fs: fix to avoid touching checkpointed data in get_victim() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit 211372b2571520e394b56b431a0705586013b3ff, it was introduced in version v4.20 by commit 4354994f097d068a894aa1a0860da54571df3582. For more details please see the references link.
null
2021-12-20T01:12:49.895415Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4354994f097d068a894aa1a0860da54571df3582'}
Linux
GSD-2021-1002225
cfg80211: call cfg80211_stop_ap when switch from P2P_GO type
cfg80211: call cfg80211_stop_ap when switch from P2P_GO type This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.291 by commit 0738cdb636c21ab552eaecf905efa4a6070e3ebc, it was introduced in version v3.6 by commit ac800140c20e7ae51117e71289065bedd4930fc2. For more details please see the references link.
null
2021-12-19T23:48:46.063378Z
2021-11-29T02:34:13.181185Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac800140c20e7ae51117e71289065bedd4930fc2'}
Linux
GSD-2022-1001325
locking/lockdep: Avoid potential access of invalid memory in lock_class
locking/lockdep: Avoid potential access of invalid memory in lock_class This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 0e3dd4fba4b1ccfaac60194950df6a760576c608, it was introduced in version v5.1 by commit 8b39adbee805c539a461dbf208b125b096152b1c. For more details please see the references link.
null
2022-04-25T04:21:32.852697Z
2022-04-24T21:04:42.199255Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8b39adbee805c539a461dbf208b125b096152b1c'}
Linux
GSD-2021-1000648
net: fec: fix the potential memory leak in fec_enet_init()
net: fec: fix the potential memory leak in fec_enet_init() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.193 by commit 15102886bc8f5f29daaadf2d925591d564c17e9f, it was introduced in version v3.18 by commit 59d0f746564495c7f54526674deabfcf101236a1. For more details please see the references link.
null
2021-12-19T23:01:20.940735Z
2021-06-04T19:54:33.767373Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/59d0f746564495c7f54526674deabfcf101236a1'}
Linux
GSD-2021-1002675
net: systemport: Add global locking for descriptor lifecycle
net: systemport: Add global locking for descriptor lifecycle This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.168 by commit c675256a7f131f5ba3f331efb715e8f31ea0e392, it was introduced in version v3.16 by commit 80105befdb4b8cea924711b40b2462b87df65b62. For more details please see the references link.
null
2022-01-11T05:48:00.384531Z
2021-12-27T05:36:16.087844Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80105befdb4b8cea924711b40b2462b87df65b62'}
Linux
GSD-2022-1002159
ARM: davinci: da850-evm: Avoid NULL pointer dereference
ARM: davinci: da850-evm: Avoid NULL pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.190 by commit 89931d4762572aaee6edbe5673d41f8082de110f, it was introduced in version v2.6.33 by commit bae105879f2f2404155da6f50b3636193d228a62. For more details please see the references link.
null
2022-04-25T07:03:32.239219Z
2022-04-24T22:17:05.631627Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bae105879f2f2404155da6f50b3636193d228a62'}
Linux
GSD-2022-1000164
net: sched: fix use-after-free in tc_new_tfilter()
net: sched: fix use-after-free in tc_new_tfilter() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.177 by commit b1d17e920dfcd4b56fa2edced5710c191f7e50b5, it was introduced in version v5.1 by commit 470502de5bdb1ed0def643a4458593a40b8f6b66. For more details please see the references link.
null
2022-02-19T09:48:02.826240Z
2022-02-18T21:49:10.387490Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/470502de5bdb1ed0def643a4458593a40b8f6b66'}
Linux
GSD-2021-1001409
net: qcom/emac: fix UAF in emac_remove
net: qcom/emac: fix UAF in emac_remove This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.241 by commit b1e091331920f8fbfc747dcbd16263fcd71abb2d, it was introduced in version v4.9 by commit 54e19bc74f3380d414681762ceed9f7245bc6a6e. For more details please see the references link.
null
2021-12-19T23:21:26.756581Z
2021-08-03T02:32:42.275514Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/54e19bc74f3380d414681762ceed9f7245bc6a6e'}
Linux
GSD-2022-1002509
video: fbdev: sm712fb: Fix crash in smtcfb_read()
video: fbdev: sm712fb: Fix crash in smtcfb_read() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit e6766bb02614ad69218dcd849668524e46916e11. For more details please see the references link.
null
2022-04-25T06:27:36.512308Z
2022-04-24T22:56:17.537225Z
null
null
null
null
null
Linux
GSD-2022-1000534
parisc: Fix data TLB miss in sba_unmap_sg
parisc: Fix data TLB miss in sba_unmap_sg This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit e40ae3133ed87d6d526f3c8fc6a5f9a2d72dcdbf. For more details please see the references link.
null
2022-03-07T01:40:03.971233Z
2022-02-27T03:20:23.516764Z
null
null
null
null
null
Linux
GSD-2021-1001059
net/mlx5e: Fix use-after-free of encap entry in neigh update handler
net/mlx5e: Fix use-after-free of encap entry in neigh update handler This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit b6447b72aca571632e71bb73a797118d5ce46a93, it was introduced in version v5.4 by commit 2a1f1768fa17805ca2e937e2e034a7c3433d3bdc. For more details please see the references link.
null
2021-12-20T00:49:26.567375Z
2021-06-30T00:36:54.704234Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2a1f1768fa17805ca2e937e2e034a7c3433d3bdc'}
Linux
GSD-2021-1001736
hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field
hwmon: (w83792d) Fix NULL pointer dereference by removing unnecessary structure field This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit 24af1fe376e22c42238a4a604d31e46c486876c3. For more details please see the references link.
null
2021-12-20T01:21:32.306715Z
2021-10-19T16:34:12.600498Z
null
null
null
null
null
Linux
GSD-2021-1000824
neighbour: allow NUD_NOARP entries to be forced GCed
neighbour: allow NUD_NOARP entries to be forced GCed This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.10 by commit ddf088d7aaaaacfc836104f2e632b29b1d383cfc, it was introduced in version v5.0 by commit 58956317c8de52009d1a38a721474c24aef74fe7. For more details please see the references link.
null
2021-12-19T23:47:56.946378Z
2021-06-25T00:09:41.298049Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/58956317c8de52009d1a38a721474c24aef74fe7'}
Linux
GSD-2021-1002819
netfilter: nf_tables: fix use-after-free in nft_set_catchall_destroy()
netfilter: nf_tables: fix use-after-free in nft_set_catchall_destroy() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.12 by commit 9d558e5f0d6fdd0a568f73dceb0b40c4f5012e5a, it was introduced in version v5.13 by commit aaa31047a6d25da0fa101da1ed544e1247949b40. For more details please see the references link.
null
2022-01-11T05:53:42.304842Z
2021-12-30T02:44:48.660684Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/aaa31047a6d25da0fa101da1ed544e1247949b40'}
Linux
GSD-2022-1002266
block: don't delete queue kobject before its children
block: don't delete queue kobject before its children This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 84fe3ca6e7910beb47ec13509d484f84fa2a41ad, it was introduced in version v4.16 by commit 2c2086afc2b8b974fac32cb028e73dc27bfae442. For more details please see the references link.
null
2022-04-25T04:34:59.480537Z
2022-04-24T22:28:23.450159Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c2086afc2b8b974fac32cb028e73dc27bfae442'}
Linux
GSD-2021-1001366
virtio-blk: Fix memory leak among suspend/resume procedure
virtio-blk: Fix memory leak among suspend/resume procedure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.198 by commit 600942d2fd49b90e44857d20c774b20d16f3130f. For more details please see the references link.
null
2021-12-19T22:43:26.161720Z
2021-08-03T02:20:14.530022Z
null
null
null
null
null
Linux
GSD-2022-1001919
riscv: Increase stack size under KASAN
riscv: Increase stack size under KASAN This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 305a5303d1dad349d854d1b51893a8e5e3b2fa27, it was introduced in version v5.6 by commit 8ad8b72721d0f07fa02dbe71f901743f9c71c8e6. For more details please see the references link.
null
2022-04-25T03:21:35.982846Z
2022-04-24T21:54:27.368117Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ad8b72721d0f07fa02dbe71f901743f9c71c8e6'}
Linux
GSD-2021-1000127
bpf: Fix masking negation logic upon negative dst register
bpf: Fix masking negation logic upon negative dst register This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.19 by commit 6eba92a4d4be8feb4dc33976abac544fa99d6ecc, it was introduced in version v5.0 by commit 979d63d50c0c0f7bc537bf821e056cc9fe5abd38. For more details please see the references link.
null
2021-12-20T00:12:58.189199Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/979d63d50c0c0f7bc537bf821e056cc9fe5abd38'}
Linux
GSD-2021-1000577
net: lantiq: fix memory corruption in RX ring
net: lantiq: fix memory corruption in RX ring This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit 5ac72351655f8b033a2935646f53b7465c903418, it was introduced in version v4.20 by commit fe1a56420cf2ec28c8eceef672b87de0bbe1a260. For more details please see the references link.
null
2021-12-19T22:37:20.614822Z
2021-06-04T19:41:37.293274Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fe1a56420cf2ec28c8eceef672b87de0bbe1a260'}
Linux
GSD-2021-1000598
tipc: wait and exit until all work queues are done
tipc: wait and exit until all work queues are done This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit 5195ec5e365a2a9331bfeb585b613a6e94f98dba, it was introduced in version v4.1 by commit d0f91938bede204a343473792529e0db7d599836. For more details please see the references link.
null
2021-12-20T00:01:37.740943Z
2021-06-04T19:44:55.411036Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0f91938bede204a343473792529e0db7d599836'}
Linux
GSD-2021-1000062
ext4: fix check to prevent false positive report of incorrect used inodes
ext4: fix check to prevent false positive report of incorrect used inodes This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.3 by commit e18d76a12b34791bc0318a0e0c0fa5863cd8dabf, it was introduced in version v4.18 by commit 5012284700775a4e6e3fbe7eac4c543c4874b559. For more details please see the references link.
null
2021-12-20T00:32:29.913633Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5012284700775a4e6e3fbe7eac4c543c4874b559'}
Linux
GSD-2021-1000432
spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware()
spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.119 by commit 4a01ad002d2e03c399af536562693752af7c81b1, it was introduced in version v5.2 by commit 944c01a889d97dc08e1b71f4ed868f4023fd6034. For more details please see the references link.
null
2021-12-20T00:00:02.239205Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/944c01a889d97dc08e1b71f4ed868f4023fd6034'}
Linux
GSD-2022-1002323
ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111
ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 25efc5d03455c3839249bc77fce5e29ecb54677e. For more details please see the references link.
null
2022-04-25T06:42:24.420226Z
2022-04-24T22:34:16.551054Z
null
null
null
null
null
Linux
GSD-2021-1001389
jfs: fix GPF in diFree
jfs: fix GPF in diFree This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.198 by commit aff8d95b69051d0cf4acc3d91f22299fdbb9dfb3. For more details please see the references link.
null
2021-12-20T00:22:23.723732Z
2021-08-03T02:26:36.660037Z
null
null
null
null
null
Linux
GSD-2021-1001673
comedi: Fix memory leak in compat_insnlist()
comedi: Fix memory leak in compat_insnlist() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.70 by commit 8d6a21e4cd6a319b0662cbe4ad6199e276ac776a, it was introduced in version v5.8 by commit b8d47d8813055ce38c0d2ad913d5462017e52692. For more details please see the references link.
null
2021-12-20T01:04:15.127797Z
2021-10-19T16:31:11.616015Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b8d47d8813055ce38c0d2ad913d5462017e52692'}
Linux
GSD-2021-1000961
gpio: wcd934x: Fix shift-out-of-bounds error
gpio: wcd934x: Fix shift-out-of-bounds error This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.44 by commit e0b518a2eb44d8a74c19e50f79a8ed393e96d634, it was introduced in version v5.6 by commit 59c324683400b41caa6d85b091e812ee3d5415c3. For more details please see the references link.
null
2021-12-19T23:49:38.492751Z
2021-06-30T00:29:26.749844Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/59c324683400b41caa6d85b091e812ee3d5415c3'}
Linux
GSD-2021-1001223
drm/amd/display: Avoid HDCP over-read and corruption
drm/amd/display: Avoid HDCP over-read and corruption This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.3 by commit 3b2b93a485fb7a970bc8b5daef16f4cf579d172f. For more details please see the references link.
null
2021-12-19T23:30:07.430215Z
2021-08-03T01:40:48.548438Z
null
null
null
null
null
Linux
GSD-2022-1002289
drivers: net: slip: fix NPD bug in sl_tx_timeout()
drivers: net: slip: fix NPD bug in sl_tx_timeout() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.239 by commit 753b9d220a7d36dac70e7c6d05492d10d6f9dd36. For more details please see the references link.
null
2022-04-25T05:24:34.209235Z
2022-04-24T22:30:35.119825Z
null
null
null
null
null
Linux
GSD-2022-1001276
block: don't delete queue kobject before its children
block: don't delete queue kobject before its children This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 3d7e32c8da45957326f56937e0471c686d1a7711, it was introduced in version v4.16 by commit 2c2086afc2b8b974fac32cb028e73dc27bfae442. For more details please see the references link.
null
2022-04-25T06:00:47.027340Z
2022-04-24T21:00:37.615877Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c2086afc2b8b974fac32cb028e73dc27bfae442'}
Linux
GSD-2021-1001809
net: encx24j600: check error in devm_regmap_init_encx24j600
net: encx24j600: check error in devm_regmap_init_encx24j600 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.213 by commit 5e5494e6fc8a29c927e0478bec4a078a40da8901, it was introduced in version v4.4 by commit 04fbfce7a222327b97ca165294ef19f0faa45960. For more details please see the references link.
null
2021-12-19T23:06:40.908228Z
2021-10-28T13:50:01.474327Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/04fbfce7a222327b97ca165294ef19f0faa45960'}
Linux
GSD-2021-1002726
drm/msm: Fix null ptr access msm_ioctl_gem_submit()
drm/msm: Fix null ptr access msm_ioctl_gem_submit() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.10 by commit f6db3d98f876870c35e96693cfd54752f6199e59. For more details please see the references link.
null
2022-01-11T05:51:12.236997Z
2021-12-27T05:39:15.933276Z
null
null
null
null
null
Linux
GSD-2022-1000934
sr9700: sanity check for packet length
sr9700: sanity check for packet length This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.269 by commit fbc3c962b6eb42b1483d00d8ea28b61b9f2fff26. For more details please see the references link.
null
2022-03-18T03:36:18.377788Z
2022-03-18T00:34:05.229382Z
null
null
null
null
null
Linux
GSD-2022-1001626
firmware: sysfb: fix platform-device leak in error path
firmware: sysfb: fix platform-device leak in error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit bb7fcbe80a013dc883181dc818c407d38558f76c, it was introduced in version v5.16.3 by commit 124986477234ba3610cb9202d3c208939031b1bc. For more details please see the references link.
null
2022-04-25T06:06:49.308537Z
2022-04-24T21:29:49.746851Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/124986477234ba3610cb9202d3c208939031b1bc'}
Linux
GSD-2021-1002376
sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl
sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.292 by commit 91ba94d3f7afca195b224f77a72044fbde1389ce, it was introduced in version v2.6.24 by commit faf0b2e5afe7dae072d2715763c7f992b612b628. For more details please see the references link.
null
2021-12-19T22:35:41.663893Z
2021-12-19T19:34:34.013290Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/faf0b2e5afe7dae072d2715763c7f992b612b628'}
Linux
GSD-2022-1000467
net_sched: add __rcu annotation to netdev->qdisc
net_sched: add __rcu annotation to netdev->qdisc This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit 9bb363ba014ff7d2823baf2a0cf7a91e39fb63f2, it was introduced in version v5.1 by commit 470502de5bdb1ed0def643a4458593a40b8f6b66. For more details please see the references link.
null
2022-03-07T01:43:24.754463Z
2022-02-27T03:11:20.231548Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/470502de5bdb1ed0def643a4458593a40b8f6b66'}
Linux
GSD-2022-1000037
Input: appletouch - initialize work before device registration
Input: appletouch - initialize work before device registration This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.90 by commit 9f329d0d6c91142cf0ad08d23c72dd195db2633c, it was introduced in version v2.6.23 by commit 5a6eb676d3bc4d7a6feab200a92437b62ad298da. For more details please see the references link.
null
2022-01-11T05:49:30.963728Z
2022-01-10T19:51:11.126792Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5a6eb676d3bc4d7a6feab200a92437b62ad298da'}
Linux
GSD-2022-1000522
eeprom: ee1004: limit i2c reads to I2C_SMBUS_BLOCK_MAX
eeprom: ee1004: limit i2c reads to I2C_SMBUS_BLOCK_MAX This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 9443ddeb3754e9e382a396b50adc1961301713ce, it was introduced in version v5.16.3 by commit 07d9beb6e3c2e852e884113d6803ea4b3643ae38. For more details please see the references link.
null
2022-03-07T01:38:20.499875Z
2022-02-27T03:19:01.717090Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/07d9beb6e3c2e852e884113d6803ea4b3643ae38'}
Linux
GSD-2022-1000488
NFSD: Fix the behavior of READ near OFFSET_MAX
NFSD: Fix the behavior of READ near OFFSET_MAX This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 44502aca8e02ab32d6b0eb52e006a5ec9402719b. For more details please see the references link.
null
2022-03-07T01:40:24.804645Z
2022-02-27T03:14:22.544525Z
null
null
null
null
null
Linux
GSD-2022-1000172
mm/kmemleak: avoid scanning potential huge holes
mm/kmemleak: avoid scanning potential huge holes This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.178 by commit d3533ee20e9a0e2e8f60384da7450d43d1c63d1a. For more details please see the references link.
null
2022-02-19T04:35:42.141697Z
2022-02-18T21:50:49.478276Z
null
null
null
null
null
Linux
GSD-2021-1002663
xen/console: harden hvc_xen against event channel storms
xen/console: harden hvc_xen against event channel storms This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.222 by commit 57e46acb3b48ea4e8efb1e1bea2e89e0c6cc43e2. For more details please see the references link.
null
2022-01-11T05:48:17.305869Z
2021-12-27T05:35:06.801947Z
null
null
null
null
null