ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2022-1002092
drm/msm/dp: populate connector of struct dp_panel
drm/msm/dp: populate connector of struct dp_panel This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 413c62697b61226a236c8b1f5cd64dcf42bcc12f, it was introduced in version v5.10.67 by commit f86bc4a1a401d3691bad41e67f9db0c2ea94da32. For more details please see the references link.
null
2022-04-25T04:19:37.044846Z
2022-04-24T22:10:11.868193Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f86bc4a1a401d3691bad41e67f9db0c2ea94da32'}
Linux
GSD-2021-1001038
ASoC: core: Fix Null-point-dereference in fmt_single_name()
ASoC: core: Fix Null-point-dereference in fmt_single_name() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit 047fd16015a79180771650aa6ce71f68b2c23368, it was introduced in version v5.10 by commit 45dd9943fce08f1b38352ff9453682253bdf19b7. For more details please see the references link.
null
2021-12-20T00:54:53.038013Z
2021-06-30T00:35:36.041380Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/45dd9943fce08f1b38352ff9453682253bdf19b7'}
Linux
GSD-2022-1000040
net: fix use-after-free in tw_timer_handler
net: fix use-after-free in tw_timer_handler This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.90 by commit 2386e81a1d277f540e1285565c9d41d531bb69d4, it was introduced in version v2.6.27 by commit 61a7e26028b94805fd686a6dc9dbd9941f8f19b0. For more details please see the references link.
null
2022-01-11T05:48:40.166658Z
2022-01-10T19:51:26.340639Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61a7e26028b94805fd686a6dc9dbd9941f8f19b0'}
Linux
GSD-2021-1001487
RDMA/cma: Fix rdma_resolve_route() memory leak
RDMA/cma: Fix rdma_resolve_route() memory leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.276 by commit 40b613db3a95bc27998e4097d74c2f7e5d083a0b. For more details please see the references link.
null
2021-12-19T23:28:43.981472Z
2021-08-03T02:56:16.126766Z
null
null
null
null
null
Linux
GSD-2022-1000410
can: isotp: fix potential CAN frame reception race in isotp_rcv()
can: isotp: fix potential CAN frame reception race in isotp_rcv() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit f90cc68f9f4b5d8585ad5d0a206a9d37ac299ef3, it was introduced in version v5.10 by commit e057dd3fc20ffb3d7f150af46542a51b59b90127. For more details please see the references link.
null
2022-03-07T01:37:43.840912Z
2022-02-27T03:02:43.774945Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e057dd3fc20ffb3d7f150af46542a51b59b90127'}
Linux
GSD-2021-1002301
scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()
scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.82 by commit c097bd5a59162156d9c2077a2f58732ffbaa9fca. For more details please see the references link.
null
2021-12-19T22:21:41.871082Z
2021-11-29T02:37:42.860520Z
null
null
null
null
null
Linux
GSD-2022-1000943
ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min
ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.305 by commit 69f42e41256d5a234d3ae0d35fa66dc6d8171846, it was introduced in version v4.9.300 by commit 40f598698129b5ceaf31012f9501b775c7b6e57d. For more details please see the references link.
null
2022-03-18T02:49:33.103812Z
2022-03-18T00:34:59.008162Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/40f598698129b5ceaf31012f9501b775c7b6e57d'}
Linux
GSD-2022-1001651
drivers: net: slip: fix NPD bug in sl_tx_timeout()
drivers: net: slip: fix NPD bug in sl_tx_timeout() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.35 by commit efb020924a71391fc12e6f204eaf25694cc116a1. For more details please see the references link.
null
2022-04-25T04:46:50.331798Z
2022-04-24T21:31:47.108492Z
null
null
null
null
null
Linux
GSD-2021-1002751
net/packet: rx_owner_map depends on pg_vec
net/packet: rx_owner_map depends on pg_vec This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit feb116a0ecc5625d6532c616d9a10ef4ef81514b, it was introduced in version v5.6 by commit 61fad6816fc10fb8793a925d5c1256d1c3db0cd2. For more details please see the references link.
null
2022-01-11T05:58:43.675573Z
2021-12-27T05:47:01.747975Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61fad6816fc10fb8793a925d5c1256d1c3db0cd2'}
Linux
GSD-2021-1000296
KVM: Stop looking for coalesced MMIO zones if the bus is destroyed
KVM: Stop looking for coalesced MMIO zones if the bus is destroyed This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 50cbad42bfea8c052b7ca590bd4126cdc898713c, it was introduced in version v5.9 by commit f65886606c2d3b562716de030706dfe1bea4ed5e. For more details please see the references link.
null
2021-12-20T00:48:50.472776Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f65886606c2d3b562716de030706dfe1bea4ed5e'}
Linux
GSD-2022-1001201
drm/amd/display: Fix double free during GPU reset on DC streams
drm/amd/display: Fix double free during GPU reset on DC streams This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit bbfcdd6289ba6f00f0cd7d496946dce9f6c600ac, it was introduced in version v5.17 by commit 6d63fcc2a334f7bd15e4e9b1db50a19335d2af4f. For more details please see the references link.
null
2022-04-25T04:17:58.873083Z
2022-04-24T20:53:14.377199Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6d63fcc2a334f7bd15e4e9b1db50a19335d2af4f'}
Linux
GSD-2021-1001254
scsi: libfc: Fix array index out of bound exception
scsi: libfc: Fix array index out of bound exception This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.53 by commit a4a54c54af2516caa9c145015844543cfc84316a. For more details please see the references link.
null
2021-12-19T22:03:14.867616Z
2021-08-03T01:49:23.268934Z
null
null
null
null
null
Linux
GSD-2022-1000739
net/smc: Use a mutex for locking "struct smc_pnettable"
net/smc: Use a mutex for locking "struct smc_pnettable" This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.12 by commit 8507fba18161ef1cab9e627f44b9bb22da29f7e8, it was introduced in version v5.1 by commit 64e28b52c7a6616217bee67ba2ad886f478f9737. For more details please see the references link.
null
2022-03-18T03:01:09.785705Z
2022-03-18T00:14:14.221508Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/64e28b52c7a6616217bee67ba2ad886f478f9737'}
Linux
GSD-2021-1001604
hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field
hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.151 by commit 6cb01fe630eaffc5a2c3f7364436caddba286623. For more details please see the references link.
null
2021-12-19T22:44:10.625593Z
2021-10-19T16:27:52.489528Z
null
null
null
null
null
Linux
GSD-2021-1000916
net: rds: fix memory leak in rds_recvmsg
net: rds: fix memory leak in rds_recvmsg This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.128 by commit 2038cd15eacdf7512755c27686822e0052eb9042, it was introduced in version v2.6.30 by commit bdbe6fbc6a2f2ccfb384b141b257677d2a8d36fb. For more details please see the references link.
null
2021-12-20T00:27:53.640651Z
2021-06-30T00:24:19.404945Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bdbe6fbc6a2f2ccfb384b141b257677d2a8d36fb'}
Linux
GSD-2022-1000693
iommu/amd: Fix I/O page table memory leak
iommu/amd: Fix I/O page table memory leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.13 by commit c78627f757e37c2cf386b59c700c4e1574988597, it was introduced in version v5.12 by commit e42ba0633064ef23eb1c8c21edf96bac1541bd4b. For more details please see the references link.
null
2022-03-18T02:59:47.736320Z
2022-03-18T00:09:58.619127Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e42ba0633064ef23eb1c8c21edf96bac1541bd4b'}
Linux
GSD-2022-1001981
net: ipv4: fix route with nexthop object delete warning
net: ipv4: fix route with nexthop object delete warning This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit 63ea57478aaa3e06a597081a0f537318fc04e49f, it was introduced in version v5.3 by commit 4c7e8084fd467ddb2b0e6c6011f9c1064afb7e56. For more details please see the references link.
null
2022-04-25T06:13:45.266416Z
2022-04-24T22:00:45.882073Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4c7e8084fd467ddb2b0e6c6011f9c1064afb7e56'}
Linux
GSD-2022-1000369
net: dsa: ar9331: register the mdiobus under devres
net: dsa: ar9331: register the mdiobus under devres This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.101 by commit 475ce5dcf2d88fd4f3c213a0ac944e3e40702970, it was introduced in version v5.9 by commit ac3a68d56651c3dad2c12c7afce065fe15267f44. For more details please see the references link.
null
2022-03-07T01:53:01.235723Z
2022-02-27T02:57:22.241251Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac3a68d56651c3dad2c12c7afce065fe15267f44'}
Linux
GSD-2022-1002354
ext2: correct max file size computing
ext2: correct max file size computing This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 6e073baf1934440c73bfe69e8c66caa84051acd1, it was introduced in version v4.19.31 by commit 62600af3a7cb11d20439f745451db96bde7ff08c. For more details please see the references link.
null
2022-04-25T03:35:07.617561Z
2022-04-24T22:37:40.568160Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/62600af3a7cb11d20439f745451db96bde7ff08c'}
Linux
GSD-2021-1002478
net: vlan: fix underflow for the real_dev refcnt
net: vlan: fix underflow for the real_dev refcnt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.83 by commit 6e800ee43218a56acc93676bbb3d93b74779e555, it was introduced in version v5.10.80 by commit e04a7a84bb77f9cdf4475340fe931389bc72331c. For more details please see the references link.
null
2021-12-19T23:35:05.605320Z
2021-12-19T19:39:08.731202Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e04a7a84bb77f9cdf4475340fe931389bc72331c'}
Linux
GSD-2021-1000445
hfsplus: prevent corruption in shrinking truncate
hfsplus: prevent corruption in shrinking truncate This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.191 by commit 52dde855663e5db824af51db39b5757d2ef3e28a, it was introduced in version v4.19 by commit 31651c607151f1034cfb57e5a78678bea54c362b. For more details please see the references link.
null
2021-12-19T23:16:59.102458Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/31651c607151f1034cfb57e5a78678bea54c362b'}
Linux
GSD-2022-1001128
scsi: qla2xxx: Fix crash during module load unload test
scsi: qla2xxx: Fix crash during module load unload test This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 67f744f73eba870ab96411d0310e831a4adc3713, it was introduced in version v5.9 by commit 62e9dd177732843ae6c5b9d2ed61e7c9538fa276. For more details please see the references link.
null
2022-04-25T06:46:14.844749Z
2022-04-24T20:47:47.136187Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/62e9dd177732843ae6c5b9d2ed61e7c9538fa276'}
Linux
GSD-2021-1002182
isdn: cpai: check ctr->cnr to avoid array index out of bound
isdn: cpai: check ctr->cnr to avoid array index out of bound This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 1f3e2e97c003f80c4b087092b225c8787ff91e4d. For more details please see the references link.
null
2021-12-20T01:00:01.670006Z
2021-11-14T15:23:33.614941Z
null
null
null
null
null
Linux
GSD-2021-1002028
drm/msm: Avoid potential overflow in timeout_to_jiffies()
drm/msm: Avoid potential overflow in timeout_to_jiffies() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.75 by commit e7e3ed5c92b6b7255f19605b56de2bf7a0f2f7db, it was introduced in version v5.6 by commit 6cedb8b377bba6520508399b74754b9a0ca06edf. For more details please see the references link.
null
2021-12-20T01:04:34.854602Z
2021-11-14T15:16:33.811163Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6cedb8b377bba6520508399b74754b9a0ca06edf'}
Linux
GSD-2021-1000015
netfilter: nftables: clone set element expression template
netfilter: nftables: clone set element expression template This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.16 by commit 47d8de3c226574a3ddb8b87d0c152028d1bafef4, it was introduced in version v5.7 by commit 4094445229760d0d31a4190dfe88fe815c9fc34e. For more details please see the references link.
null
2021-12-20T00:15:04.522231Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4094445229760d0d31a4190dfe88fe815c9fc34e'}
Linux
GSD-2022-1001082
Bluetooth: hci_sync: Fix queuing commands when HCI_UNREGISTER is set
Bluetooth: hci_sync: Fix queuing commands when HCI_UNREGISTER is set This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 1c69ef84a808676cceb69210addf5df45b741323. For more details please see the references link.
null
2022-04-25T05:38:46.272104Z
2022-04-24T20:44:00.356683Z
null
null
null
null
null
Linux
GSD-2022-1001578
f2fs: fix missing free nid in f2fs_handle_failed_inode
f2fs: fix missing free nid in f2fs_handle_failed_inode This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit aa80bf73e3b3fb7026d343c77b3ddc849e26a095, it was introduced in version v4.19 by commit 7735730d39d75e70476c1b01435b9b1f41637f0e. For more details please see the references link.
null
2022-04-25T05:07:56.297981Z
2022-04-24T21:25:41.211224Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7735730d39d75e70476c1b01435b9b1f41637f0e'}
Linux
GSD-2021-1000500
scsi: qedf: Add pointer checks in qedf_update_link_speed()
scsi: qedf: Add pointer checks in qedf_update_link_speed() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.7 by commit 11014efcec378bb0050a6cf08eaf375e3693400a, it was introduced in version v4.11 by commit 61d8658b4a435eac729966cc94cdda077a8df5cd. For more details please see the references link.
null
2021-12-20T00:17:39.848061Z
2021-05-31T23:46:49.371617Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61d8658b4a435eac729966cc94cdda077a8df5cd'}
Linux
GSD-2022-1001597
mmc: core: use sysfs_emit() instead of sprintf()
mmc: core: use sysfs_emit() instead of sprintf() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 659ca56b5415c7a1d05e185c36fad80ba165d063. For more details please see the references link.
null
2022-04-25T06:46:56.711676Z
2022-04-24T21:27:16.381506Z
null
null
null
null
null
Linux
GSD-2021-1002497
net/smc: fix wrong list_del in smc_lgr_cleanup_early
net/smc: fix wrong list_del in smc_lgr_cleanup_early This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.84 by commit 77731fede297a23d26f2d169b4269466b2c82529, it was introduced in version v5.5 by commit a0a62ee15a829ebf8aeec55a4f1688230439b3e0. For more details please see the references link.
null
2021-12-20T01:24:43.042221Z
2021-12-19T19:39:55.217567Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a0a62ee15a829ebf8aeec55a4f1688230439b3e0'}
Linux
GSD-2021-1000150
irqchip/gic-v3: Do not enable irqs when handling spurious interrups
irqchip/gic-v3: Do not enable irqs when handling spurious interrups This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.36 by commit 7be4db5c2b59fa77071c93ca4329876fb9777202, it was introduced in version v5.1 by commit 3f1f3234bc2db1c16b9818b9a15a5d58ad45251c. For more details please see the references link.
null
2021-12-19T22:56:32.709060Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f1f3234bc2db1c16b9818b9a15a5d58ad45251c'}
Linux
GSD-2021-1001311
net: sched: fix memory leak in tcindex_partial_destroy_work
net: sched: fix memory leak in tcindex_partial_destroy_work This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.136 by commit 8d7924ce85bae64e7a67c366c7c50840f49f3a62, it was introduced in version v3.18 by commit 8332904aa971ed4547514f57c8b3780ad4f0f949. For more details please see the references link.
null
2021-12-20T00:26:32.164722Z
2021-08-03T02:05:14.166765Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8332904aa971ed4547514f57c8b3780ad4f0f949'}
Linux
GSD-2022-1000386
iommu: Fix potential use-after-free during probe
iommu: Fix potential use-after-free during probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.101 by commit cb86e511e78e796de6947b8f3acca1b7c76fb2ff. For more details please see the references link.
null
2022-03-07T01:39:56.900282Z
2022-02-27T02:59:58.907621Z
null
null
null
null
null
Linux
GSD-2022-1002211
KVM: x86/mmu: do compare-and-exchange of gPTE via the user address
KVM: x86/mmu: do compare-and-exchange of gPTE via the user address This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 1553126eccf4fad17afaeaed08db9e5944aa2d55, it was introduced in version v5.2 by commit bd53cb35a3e9adb73a834a36586e9ad80e877767. For more details please see the references link.
null
2022-04-25T04:18:11.749444Z
2022-04-24T22:22:22.311730Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bd53cb35a3e9adb73a834a36586e9ad80e877767'}
Linux
GSD-2021-1001741
s390/qeth: Fix deadlock in remove_discipline
s390/qeth: Fix deadlock in remove_discipline This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit 0184084365c4d0a99ddd2ab1e1d8dbf9fd3c4714, it was introduced in version v5.11 by commit b41b554c1ee75070a14c02a88496b1f231c7eacc. For more details please see the references link.
null
2021-12-19T22:46:19.668973Z
2021-10-19T16:34:27.851255Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b41b554c1ee75070a14c02a88496b1f231c7eacc'}
Linux
GSD-2021-1000853
wq: handle VM suspension in stall detection
wq: handle VM suspension in stall detection This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.237 by commit ec32c8aee92a2750557c504eed3a04fe0500a725. For more details please see the references link.
null
2021-12-19T23:45:15.398194Z
2021-06-30T00:01:28.420401Z
null
null
null
null
null
Linux
GSD-2022-1002084
ath10k: Fix error handling in ath10k_setup_msa_resources
ath10k: Fix error handling in ath10k_setup_msa_resources This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 315772133a4b960859e4f5efe0e738e347188cdc, it was introduced in version v5.8 by commit 727fec790ead3d75e2735f66209949c2163523ea. For more details please see the references link.
null
2022-04-25T05:09:14.173056Z
2022-04-24T22:09:09.551828Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/727fec790ead3d75e2735f66209949c2163523ea'}
Linux
GSD-2022-1000543
nvme-rdma: fix possible use-after-free in transport error_recovery work
nvme-rdma: fix possible use-after-free in transport error_recovery work This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit ea86027ac467a055849c4945906f799e7f65ab99. For more details please see the references link.
null
2022-03-07T02:54:54.233043Z
2022-02-27T03:21:24.568998Z
null
null
null
null
null
Linux
GSD-2022-1000113
iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping()
iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.265 by commit a0c685ba99961b1dd894b2e470e692a539770f6d, it was introduced in version v4.14.190 by commit 03992c88d71ba79d956f2ed54e370e630b8750f4. For more details please see the references link.
null
2022-02-19T02:34:11.968647Z
2022-02-18T21:42:33.481868Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/03992c88d71ba79d956f2ed54e370e630b8750f4'}
Linux
GSD-2021-1001184
net: qcom/emac: fix UAF in emac_remove
net: qcom/emac: fix UAF in emac_remove This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.5 by commit 8a225a6e07a57a1538d53637cb3d82bd3e477839, it was introduced in version v4.9 by commit 54e19bc74f3380d414681762ceed9f7245bc6a6e. For more details please see the references link.
null
2021-12-20T00:50:02.641411Z
2021-08-03T01:33:06.955331Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/54e19bc74f3380d414681762ceed9f7245bc6a6e'}
Linux
GSD-2021-1002602
io_uring: ensure task_work gets run as part of cancelations
io_uring: ensure task_work gets run as part of cancelations This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.8 by commit 8e12976c0c19ebc14b60046b1348c516a74c25a2. For more details please see the references link.
null
2021-12-20T00:52:21.520517Z
2021-12-19T19:44:39.013545Z
null
null
null
null
null
Linux
GSD-2022-1001352
mm/mempolicy: fix mpol_new leak in shared_policy_replace
mm/mempolicy: fix mpol_new leak in shared_policy_replace This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 6e00309ac716fa8225f0cbde2cd9c24f0e74ee21, it was introduced in version v3.8 by commit 42288fe366c4f1ce7522bc9f27d0bc2a81c55264. For more details please see the references link.
null
2022-04-25T04:21:38.906052Z
2022-04-24T21:06:56.257947Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/42288fe366c4f1ce7522bc9f27d0bc2a81c55264'}
Linux
GSD-2021-1002252
scsi: advansys: Fix kernel pointer leak
scsi: advansys: Fix kernel pointer leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.218 by commit f5a0ba4a9b5e70e7b2f767636d26523f9d1ac59d. For more details please see the references link.
null
2021-12-19T22:58:52.490816Z
2021-11-29T02:35:27.709099Z
null
null
null
null
null
Linux
GSD-2022-1001702
drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire()
drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 5ba9d78a72948325ecdb4dca2a31a46bc9169574, it was introduced in version v4.13 by commit 71c37505e7eaa01fa259debad1a71a7ae061039d. For more details please see the references link.
null
2022-04-25T04:58:36.489246Z
2022-04-24T21:36:31.968719Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/71c37505e7eaa01fa259debad1a71a7ae061039d'}
Linux
GSD-2022-1000810
gso: do not skip outer ip header in case of ipip and net_failover
gso: do not skip outer ip header in case of ipip and net_failover This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.26 by commit 899e56a1ad435261812355550ae869d8be3df395, it was introduced in version v3.13 by commit cb32f511a70be8967ac9025cf49c44324ced9a39. For more details please see the references link.
null
2022-03-18T04:27:37.380968Z
2022-03-18T00:20:44.833038Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cb32f511a70be8967ac9025cf49c44324ced9a39'}
Linux
GSD-2021-1000795
perf probe: Fix NULL pointer dereference in convert_variable_location()
perf probe: Fix NULL pointer dereference in convert_variable_location() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.10 by commit eba7c76a5651392a9132c54aceddc5af8cfb0938, it was introduced in version v5.5 by commit 66f69b2197167cb99330c77a550da50f1f597abc. For more details please see the references link.
null
2021-12-19T22:23:31.068175Z
2021-06-25T00:06:08.558268Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/66f69b2197167cb99330c77a550da50f1f597abc'}
Linux
GSD-2021-1001887
can: peak_pci: peak_pci_remove(): fix UAF
can: peak_pci: peak_pci_remove(): fix UAF This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit 0e5afdc2315b0737edcf55bede4ee1640d2d464d, it was introduced in version v3.4 by commit e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd. For more details please see the references link.
null
2021-12-20T00:00:45.594580Z
2021-10-28T13:54:01.023105Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd'}
Linux
GSD-2022-1001217
xsk: Fix race at socket teardown
xsk: Fix race at socket teardown This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 8a2dea162b92c322f3e42eae0c4a74b8d20aa7a9, it was introduced in version v5.4 by commit 42fddcc7c64b723a867c7b2f5f7505e244212f13. For more details please see the references link.
null
2022-04-25T07:09:04.765002Z
2022-04-24T20:54:43.665411Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/42fddcc7c64b723a867c7b2f5f7505e244212f13'}
Linux
GSD-2021-1000280
spi: spi-zynqmp-gqspi: fix use-after-free in zynqmp_qspi_exec_op
spi: spi-zynqmp-gqspi: fix use-after-free in zynqmp_qspi_exec_op This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 23269ac9f123eca3aea7682d3345c02e71ed696c, it was introduced in version v5.10 by commit 1c26372e5aa9e53391a1f8fe0dc7cd93a7e5ba9e. For more details please see the references link.
null
2021-12-20T00:39:55.551466Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c26372e5aa9e53391a1f8fe0dc7cd93a7e5ba9e'}
Linux
GSD-2021-1002747
net: stmmac: fix tc flower deletion for VLAN priority Rx steering
net: stmmac: fix tc flower deletion for VLAN priority Rx steering This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit 97cb5c82aa1dd85a39b1bd021c8b5f18af623779, it was introduced in version v5.13 by commit 0e039f5cf86ce2fcb62077a163e7ff3d7b7b7cf3. For more details please see the references link.
null
2022-01-11T05:53:50.747902Z
2021-12-27T05:46:52.530505Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0e039f5cf86ce2fcb62077a163e7ff3d7b7b7cf3'}
Linux
GSD-2021-1001868
drm: mxsfb: Fix NULL pointer dereference crash on unload
drm: mxsfb: Fix NULL pointer dereference crash on unload This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit b0e6db0656ddfd8bb57303c2ef61ee1c1cc694a8, it was introduced in version v5.10 by commit ae1ed0093281939b80664a687689f12436c0e874. For more details please see the references link.
null
2021-12-20T00:55:08.745388Z
2021-10-28T13:53:06.951340Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ae1ed0093281939b80664a687689f12436c0e874'}
Linux
GSD-2022-1001647
gcc-plugins: latent_entropy: use /dev/urandom
gcc-plugins: latent_entropy: use /dev/urandom This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.35 by commit bd17422b9b675414d0f1a5e070d42fe85b785cd6, it was introduced in version v4.9 by commit 38addce8b600ca335dc86fa3d48c890f1c6fa1f4. For more details please see the references link.
null
2022-04-25T05:18:20.747507Z
2022-04-24T21:31:29.579702Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/38addce8b600ca335dc86fa3d48c890f1c6fa1f4'}
Linux
GSD-2021-1002317
scsi: ufs: core: Improve SCSI abort handling
scsi: ufs: core: Improve SCSI abort handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit c36baca06efa833adaefba61f45fefdc49b6d070, it was introduced in version v3.4 by commit 7a3e97b0dc4bbac2ba7803564ab0057722689921. For more details please see the references link.
null
2021-12-19T23:04:24.245781Z
2021-11-29T02:38:29.037969Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7a3e97b0dc4bbac2ba7803564ab0057722689921'}
Linux
GSD-2022-1000406
Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj
Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.102 by commit 91d8866ca55232d21995a3d54fac96de33c9e20c, it was introduced in version v4.15 by commit c2e5df616e1ae6c2a074cb241ebb65a318ebaf7c. For more details please see the references link.
null
2022-03-07T01:44:09.209992Z
2022-02-27T03:02:17.010892Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c2e5df616e1ae6c2a074cb241ebb65a318ebaf7c'}
Linux
GSD-2021-1001491
mISDN: fix possible use-after-free in HFC_cleanup()
mISDN: fix possible use-after-free in HFC_cleanup() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.276 by commit 49331c07ef0f8fdfa42b30ba6a83a657b29d7fbe. For more details please see the references link.
null
2021-12-19T22:37:30.735781Z
2021-08-03T02:57:31.819277Z
null
null
null
null
null
Linux
GSD-2022-1000056
binder: fix async_free_space accounting for empty parcels
binder: fix async_free_space accounting for empty parcels This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.13 by commit 17691bada6b2f1d5f1c0f6d28cd9d0727023b0ff, it was introduced in version v4.14 by commit 74310e06be4d74dcf67cd108366710dee5c576d5. For more details please see the references link.
null
2022-01-11T05:59:29.550574Z
2022-01-10T19:52:06.893892Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/74310e06be4d74dcf67cd108366710dee5c576d5'}
Linux
GSD-2022-1001094
Reinstate some of "swiotlb: rework "fix info leak with DMA_FROM_DEVICE""
Reinstate some of "swiotlb: rework "fix info leak with DMA_FROM_DEVICE"" This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit f2141881b530738777c28bb51c62175895c8178b. For more details please see the references link.
null
2022-04-25T03:31:03.446498Z
2022-04-24T20:44:46.503005Z
null
null
null
null
null
Linux
GSD-2021-1002194
mm, thp: bail out early in collapse_file for writeback page
mm, thp: bail out early in collapse_file for writeback page This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 74c42e1baacf206338b1dd6b6199ac964512b5bb, it was introduced in version v5.4 by commit 99cb0dbd47a15d395bf3faa78dc122bc5efe3fc0. For more details please see the references link.
null
2021-12-20T00:54:33.295655Z
2021-11-14T15:24:10.769511Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/99cb0dbd47a15d395bf3faa78dc122bc5efe3fc0'}
Linux
GSD-2021-1000453
powerpc/64s: Fix pte update for kernel memory on radix
powerpc/64s: Fix pte update for kernel memory on radix This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.191 by commit b3d5d0983388d6c4fb35f7d722556d5595f167a7, it was introduced in version v4.18 by commit f1cb8f9beba8699dd1b4518418191499e53f7b17. For more details please see the references link.
null
2021-12-19T23:38:12.481234Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f1cb8f9beba8699dd1b4518418191499e53f7b17'}
Linux
GSD-2022-1002342
lib/test: use after free in register_test_dev_kmod()
lib/test: use after free in register_test_dev_kmod() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 46012ed6a533431d004fe76162faf05a60fae975, it was introduced in version v4.13 by commit d9c6a72d6fa29d3a7999dda726577e5d1fccafa5. For more details please see the references link.
null
2022-04-25T05:54:37.070619Z
2022-04-24T22:35:55.748485Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9c6a72d6fa29d3a7999dda726577e5d1fccafa5'}
Linux
GSD-2022-1001997
powerpc/secvar: fix refcount leak in format_show()
powerpc/secvar: fix refcount leak in format_show() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit 02222bf4f0a27f6eba66d1f597cdb5daadd51829. For more details please see the references link.
null
2022-04-25T05:42:55.731542Z
2022-04-24T22:01:55.891602Z
null
null
null
null
null
Linux
GSD-2022-1000685
xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
xen/netfront: react properly to failing gnttab_end_foreign_access_ref() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.14 by commit 34630641e955f23ae06db178822d99d0a9d89b20. For more details please see the references link.
null
2022-03-18T02:48:06.703161Z
2022-03-18T00:09:36.736770Z
null
null
null
null
null
Linux
GSD-2021-1000900
usb: fix various gadget panics on 10gbps cabling
usb: fix various gadget panics on 10gbps cabling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.126 by commit 5ef23506695b01d5d56a13a092a97f2478069d75. For more details please see the references link.
null
2021-12-20T01:35:55.956072Z
2021-06-30T00:05:21.060043Z
null
null
null
null
null
Linux
GSD-2021-1001612
enetc: Fix illegal access when reading affinity_hint
enetc: Fix illegal access when reading affinity_hint This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.150 by commit 4c4c3052911b577920353a7646e4883d5da40c28, it was introduced in version v5.1 by commit d4fd0404c1c95b17880f254ebfee3485693fa8ba. For more details please see the references link.
null
2021-12-19T21:47:13.736042Z
2021-10-19T16:28:14.605062Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d4fd0404c1c95b17880f254ebfee3485693fa8ba'}
Linux
GSD-2021-1001242
net: sched: fix memory leak in tcindex_partial_destroy_work
net: sched: fix memory leak in tcindex_partial_destroy_work This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.54 by commit 8e9662fde6d63c78eb1350f6167f64c9d71a865b, it was introduced in version v3.18 by commit 8332904aa971ed4547514f57c8b3780ad4f0f949. For more details please see the references link.
null
2021-12-20T00:54:42.828026Z
2021-08-03T01:47:07.034949Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8332904aa971ed4547514f57c8b3780ad4f0f949'}
Linux
GSD-2021-1000845
usb: dwc3: ep0: fix NULL pointer exception
usb: dwc3: ep0: fix NULL pointer exception This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.273 by commit 60156089f07e724e4dc8483702d5e1ede4522749. For more details please see the references link.
null
2021-12-20T01:17:56.754711Z
2021-06-30T00:00:58.645227Z
null
null
null
null
null
Linux
GSD-2021-1001757
enetc: Fix illegal access when reading affinity_hint
enetc: Fix illegal access when reading affinity_hint This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.9 by commit 6f329d9da2a5ae032fcde800a99b118124ed5270, it was introduced in version v5.1 by commit d4fd0404c1c95b17880f254ebfee3485693fa8ba. For more details please see the references link.
null
2021-12-20T01:15:54.437907Z
2021-10-19T16:35:15.476210Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d4fd0404c1c95b17880f254ebfee3485693fa8ba'}
Linux
GSD-2022-1002207
scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair()
scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 8077a7162bc3cf658dd9ff112bc77716c08458c5. For more details please see the references link.
null
2022-04-25T04:25:52.972392Z
2022-04-24T22:21:48.682844Z
null
null
null
null
null
Linux
GSD-2022-1000390
scsi: pm8001: Fix use-after-free for aborted TMF sas_task
scsi: pm8001: Fix use-after-free for aborted TMF sas_task This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.102 by commit d872e7b5fe38f325f5206b6872746fa02c2b4819. For more details please see the references link.
null
2022-03-07T03:58:01.861956Z
2022-02-27T03:00:26.249177Z
null
null
null
null
null
Linux
GSD-2021-1001307
KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow
KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.136 by commit 2b9ffddd70b449cdc42b943788dc82a6d7b0d175, it was introduced in version v3.10 by commit 8e591cb7204739efa8e15967ea334eb367039dde. For more details please see the references link.
null
2021-12-20T00:53:33.398632Z
2021-08-03T02:04:01.854965Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8e591cb7204739efa8e15967ea334eb367039dde'}
Linux
GSD-2022-1001978
qede: confirm skb is allocated before using
qede: confirm skb is allocated before using This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit 8928239e5e2e460d95b8a0b89f61671625e7ece0, it was introduced in version v4.18 by commit 8a8633978b842c88fbcfe00d4e5dde96048f630e. For more details please see the references link.
null
2022-04-25T04:24:40.005789Z
2022-04-24T22:00:28.466838Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8a8633978b842c88fbcfe00d4e5dde96048f630e'}
Linux
GSD-2021-1000146
virtiofs: fix memory leak in virtio_fs_probe()
virtiofs: fix memory leak in virtio_fs_probe() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.36 by commit d19555ff225d0896a33246a49279e6d578095f15, it was introduced in version v5.4 by commit a62a8ef9d97da23762a588592c8b8eb50a8deb6a. For more details please see the references link.
null
2021-12-19T23:58:42.472730Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a62a8ef9d97da23762a588592c8b8eb50a8deb6a'}
Linux
GSD-2021-1002481
atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait
atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.84 by commit 2c514d25003ac89bb7716bb4402918ccb141f8f5. For more details please see the references link.
null
2021-12-19T23:45:02.825741Z
2021-12-19T19:39:15.905538Z
null
null
null
null
null
Linux
GSD-2022-1001581
crypto: ccree - Fix use after free in cc_cipher_exit()
crypto: ccree - Fix use after free in cc_cipher_exit() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 25c358efee5153dfd240d4e0d3169d5bebe9cacd, it was introduced in version v4.17 by commit 63ee04c8b491ee148489347e7da9fbfd982ca2bb. For more details please see the references link.
null
2022-04-25T05:47:11.604410Z
2022-04-24T21:26:00.109938Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63ee04c8b491ee148489347e7da9fbfd982ca2bb'}
Linux
GSD-2021-1000516
RDMA/rxe: Clear all QP fields if creation failed
RDMA/rxe: Clear all QP fields if creation failed This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.122 by commit a62225d951d77eb20208fed8fc199e0c9b1df08b, it was introduced in version v4.8 by commit 8700e3e7c4857d28ebaa824509934556da0b3e76. For more details please see the references link.
null
2021-12-19T22:33:17.951957Z
2021-05-31T23:49:14.641629Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8700e3e7c4857d28ebaa824509934556da0b3e76'}
Linux
GSD-2022-1001755
watch_queue: Free the page array when watch_queue is dismantled
watch_queue: Free the page array when watch_queue is dismantled This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 4913daecd04addb41bc96a9175a885e1c19862a8, it was introduced in version v5.8 by commit c73be61cede5882f9605a852414db559c0ebedfd. For more details please see the references link.
null
2022-04-25T06:45:02.427029Z
2022-04-24T21:39:55.210037Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c73be61cede5882f9605a852414db559c0ebedfd'}
Linux
GSD-2022-1000847
thermal: int340x: fix memory leak in int3400_notify()
thermal: int340x: fix memory leak in int3400_notify() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.103 by commit e098933866f9e1dd3ef4eebbe2e3d504f970f599, it was introduced in version v4.14 by commit 38e44da591303d08b0d965a033e11ade284999d0. For more details please see the references link.
null
2022-03-18T03:00:25.959332Z
2022-03-18T00:23:34.632142Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/38e44da591303d08b0d965a033e11ade284999d0'}
Linux
GSD-2021-1002205
regmap: Fix possible double-free in regcache_rbtree_exit()
regmap: Fix possible double-free in regcache_rbtree_exit() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 55e6d8037805b3400096d621091dfbf713f97e83, it was introduced in version v3.12 by commit 3f4ff561bc88b074d5e868dde4012d89cbb06c87. For more details please see the references link.
null
2021-12-20T00:55:12.976333Z
2021-11-14T15:24:37.801825Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f4ff561bc88b074d5e868dde4012d89cbb06c87'}
Linux
GSD-2021-1000238
net: marvell: prestera: fix port event handling on init
net: marvell: prestera: fix port event handling on init This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 9d1ba11fabdd8f25abb24272ef1621417981320b, it was introduced in version v5.10 by commit 501ef3066c89d7f9045315e1be58749cf9e6814d. For more details please see the references link.
null
2021-12-19T22:38:41.628056Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/501ef3066c89d7f9045315e1be58749cf9e6814d'}
Linux
GSD-2022-1001305
rtc: pl031: fix rtc features null pointer dereference
rtc: pl031: fix rtc features null pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 1b915703964f7e636961df04c540261dc55c6c70, it was introduced in version v5.12 by commit d9b0dd54a1943f47a381a474f8ea2c94466110c0. For more details please see the references link.
null
2022-04-25T04:28:26.954349Z
2022-04-24T21:02:35.976924Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9b0dd54a1943f47a381a474f8ea2c94466110c0'}
Linux
GSD-2021-1000392
crypto: sun8i-ss - fix result memory leak on error path
crypto: sun8i-ss - fix result memory leak on error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 1f12aaf07f61122cf5074d29714ee26f8d44b0e7, it was introduced in version v5.10 by commit d9b45418a91773b7672e4c60037a28074b495c6d. For more details please see the references link.
null
2021-12-19T22:10:18.176065Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9b45418a91773b7672e4c60037a28074b495c6d'}
Linux
GSD-2021-1002655
net/packet: rx_owner_map depends on pg_vec
net/packet: rx_owner_map depends on pg_vec This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.222 by commit 18c73170de6719491f79b04c727ea8314c246b03, it was introduced in version v4.19.114 by commit 6fb0e4385928900ccb8697748555b3f54bba5193. For more details please see the references link.
null
2022-01-11T05:47:16.233061Z
2021-12-27T05:33:25.114894Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6fb0e4385928900ccb8697748555b3f54bba5193'}
Linux
GSD-2021-1000668
NFC: nci: fix memory leak in nci_allocate_device
NFC: nci: fix memory leak in nci_allocate_device This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.193 by commit 0365701bc44e078682ee1224866a71897495c7ef, it was introduced in version v4.0 by commit 11f54f228643d0248ec00ce8c9fb8d872f87e7b8. For more details please see the references link.
null
2021-12-19T23:41:33.341930Z
2021-06-04T19:58:29.415529Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/11f54f228643d0248ec00ce8c9fb8d872f87e7b8'}
Linux
GSD-2022-1000144
tipc: improve size validations for received domain records
tipc: improve size validations for received domain records This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.229 by commit f1af11edd08dd8376f7a84487cbb0ea8203e3a1d, it was introduced in version v4.8 by commit 35c55c9877f8de0ab129fa1a309271d0ecc868b9. For more details please see the references link.
null
2022-02-20T02:04:45.088435Z
2022-02-18T21:46:52.945997Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/35c55c9877f8de0ab129fa1a309271d0ecc868b9'}
Linux
GSD-2022-1002179
drbd: Fix five use after free bugs in get_initial_state
drbd: Fix five use after free bugs in get_initial_state This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit b6a4055036eed1f5e239ce3d8b0db1ce38bba447, it was introduced in version v4.5 by commit a29728463b254ce81ecefdf20c1a02e01d9361da. For more details please see the references link.
null
2022-04-25T04:09:07.888709Z
2022-04-24T22:19:17.554644Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a29728463b254ce81ecefdf20c1a02e01d9361da'}
Linux
GSD-2021-1001429
wl1251: Fix possible buffer overflow in wl1251_cmd_scan
wl1251: Fix possible buffer overflow in wl1251_cmd_scan This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.240 by commit 0f6c0488368c9ac1aa685821916fadba32f5d1ef. For more details please see the references link.
null
2021-12-20T00:38:32.889227Z
2021-08-03T02:38:03.595805Z
null
null
null
null
null
Linux
GSD-2022-1002483
ACPI: CPPC: Avoid out of bounds access when parsing _CPC data
ACPI: CPPC: Avoid out of bounds access when parsing _CPC data This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit b3f15609ffa521de12244cd6af24002030dda3f5, it was introduced in version v4.4 by commit 337aadff8e4567e39669e07d9a88b789d78458b5. For more details please see the references link.
null
2022-04-25T05:16:54.007965Z
2022-04-24T22:53:11.062791Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/337aadff8e4567e39669e07d9a88b789d78458b5'}
Linux
GSD-2022-1000514
ibmvnic: don't release napi in __ibmvnic_open()
ibmvnic: don't release napi in __ibmvnic_open() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit e08cb9056fb2564d1f6bad789bdf79ab09bf2f81, it was introduced in version v4.12 by commit ed651a10875f13135a5f59c1bae4d51b377b3925. For more details please see the references link.
null
2022-03-07T01:44:07.305065Z
2022-02-27T03:17:18.356968Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ed651a10875f13135a5f59c1bae4d51b377b3925'}
Linux
GSD-2021-1001583
phy: mdio: fix memory leak
phy: mdio: fix memory leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.153 by commit 414bb4ead1362ef2c8592db723c017258f213988, it was introduced in version v2.6.28 by commit 46abc02175b3c246dd5141d878f565a8725060c9. For more details please see the references link.
null
2021-12-20T00:28:34.463497Z
2021-10-19T16:24:52.759169Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/46abc02175b3c246dd5141d878f565a8725060c9'}
Linux
GSD-2021-1001079
PCI: aardvark: Fix kernel panic during PIO transfer
PCI: aardvark: Fix kernel panic during PIO transfer This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit 3d213a4ddf49a860be6e795482c17f87e0c82b2a. For more details please see the references link.
null
2021-12-20T03:00:08.137877Z
2021-06-30T00:38:13.806319Z
null
null
null
null
null
Linux
GSD-2021-1001096
i2c: robotfuzz-osif: fix control-request directions
i2c: robotfuzz-osif: fix control-request directions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.274 by commit 9fd1b4e41a80e52d5f846b1f04966f2b7b84e6b3, it was introduced in version v3.14 by commit 83e53a8f120f2f273cf0ad717f5372ab79ac24fe. For more details please see the references link.
null
2021-12-20T00:28:13.477143Z
2021-07-08T01:56:04.343515Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/83e53a8f120f2f273cf0ad717f5372ab79ac24fe'}
Linux
GSD-2022-1002196
netlabel: fix out-of-bounds memory accesses
netlabel: fix out-of-bounds memory accesses This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.0 by commit 5578de4834fe0f2a34fedc7374be691443396d1f, it was introduced in version v2.6.19 by commit 446fda4f26822b2d42ab3396aafcedf38a9ff2b6. For more details please see the references link.
null
2022-04-25T03:31:37.933329Z
2022-04-24T22:20:55.941078Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/446fda4f26822b2d42ab3396aafcedf38a9ff2b6'}
Linux
GSD-2022-1000451
ax25: improve the incomplete fix to avoid UAF and NPD bugs
ax25: improve the incomplete fix to avoid UAF and NPD bugs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit 4c958f0c5714812461da7785393315b35145ac8c. For more details please see the references link.
null
2022-03-07T02:20:12.289455Z
2022-02-27T03:08:51.574758Z
null
null
null
null
null
Linux
GSD-2021-1002340
scsi: core: Fix scsi_mode_sense() buffer length handling
scsi: core: Fix scsi_mode_sense() buffer length handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit e15de347faf4a9f494cbd4e9a623d343dc1b5851. For more details please see the references link.
null
2021-12-20T01:05:23.879914Z
2021-11-29T02:39:33.974555Z
null
null
null
null
null
Linux
GSD-2022-1001610
cifs: prevent bad output lengths in smb2_ioctl_query_info()
cifs: prevent bad output lengths in smb2_ioctl_query_info() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit fadddfc1dc3c6f79b21cff4a7e9a6c40b84fbc53. For more details please see the references link.
null
2022-04-25T05:12:42.394752Z
2022-04-24T21:28:03.636241Z
null
null
null
null
null
Linux
GSD-2022-1000902
xen/netfront: destroy queues before real_num_tx_queues is zeroed
xen/netfront: destroy queues before real_num_tx_queues is zeroed This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.233 by commit 198cdc287769c717dafff5887c6125cb7a373bf3, it was introduced in version v4.19.226 by commit 35cad2003b6447932cfe91f795090586306738e8. For more details please see the references link.
null
2022-03-18T02:54:39.192900Z
2022-03-18T00:29:59.959308Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/35cad2003b6447932cfe91f795090586306738e8'}
Linux
GSD-2021-1000687
net: fujitsu: fix potential null-ptr-deref
net: fujitsu: fix potential null-ptr-deref This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.271 by commit 6dbf1101594f7c76990b63c35b5a40205a914b6b, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T23:15:51.355520Z
2021-06-04T20:02:27.445814Z
null
null
null
null
null
Linux
GSD-2021-1001995
comedi: vmk80xx: fix transfer-buffer overflows
comedi: vmk80xx: fix transfer-buffer overflows This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.217 by commit 7a2021b896de1ad559d33b5c5cdd20b982242088, it was introduced in version v2.6.31 by commit 985cafccbf9b7f862aa1c5ee566801e18b5161fb. For more details please see the references link.
null
2021-12-20T01:02:33.428094Z
2021-11-14T15:15:04.966037Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/985cafccbf9b7f862aa1c5ee566801e18b5161fb'}
Linux
GSD-2021-1002710
iocost: Fix divide-by-zero on donation from low hweight cgroup
iocost: Fix divide-by-zero on donation from low hweight cgroup This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.88 by commit a7c80674538f15f85d68138240aae440b8039519, it was introduced in version v5.10 by commit f1de2439ec43b74764f2a26e3a310b24407e3bde. For more details please see the references link.
null
2022-01-11T05:57:28.558099Z
2021-12-27T05:38:23.086939Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f1de2439ec43b74764f2a26e3a310b24407e3bde'}
Linux
GSD-2022-1001240
drm/amd/display: Call dc_stream_release for remove link enc assignment
drm/amd/display: Call dc_stream_release for remove link enc assignment This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit a28b7b6a0c827ce672edcdb5b2b5916b0beebe03, it was introduced in version v5.17 by commit 0bb24555858403671657f6dc025d2931e3e857bb. For more details please see the references link.
null
2022-04-25T06:09:35.361895Z
2022-04-24T20:56:51.685030Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0bb24555858403671657f6dc025d2931e3e857bb'}