ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2022-1000282
ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx()
ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.22 by commit e8e07c5e25a29e2a6f119fd947f55d7a55eb8a13. For more details please see the references link.
null
2022-02-19T11:01:54.289949Z
2022-02-18T22:05:52.266778Z
null
null
null
null
null
Linux
GSD-2021-1001215
dm btree remove: assign new_root only when removal succeeds
dm btree remove: assign new_root only when removal succeeds This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.3 by commit ad365e9351ac2b450e7e79932ff6abf59342d91a. For more details please see the references link.
null
2021-12-19T22:25:19.347552Z
2021-08-03T01:38:45.117085Z
null
null
null
null
null
Linux
GSD-2022-1000778
thermal: core: Fix TZ_GET_TRIP NULL pointer dereference
thermal: core: Fix TZ_GET_TRIP NULL pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.27 by commit 3dafbf915c05f83469e791949b5590da2aca2afb, it was introduced in version v5.9 by commit 1ce50e7d408ef2bdc8ca021363fd46d1b8bfad00. For more details please see the references link.
null
2022-03-18T02:56:31.247411Z
2022-03-18T00:17:31.319956Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1ce50e7d408ef2bdc8ca021363fd46d1b8bfad00'}
Linux
GSD-2021-1000957
usb: typec: tcpm: cancel vdm and state machine hrtimer when unregister tcpm port
usb: typec: tcpm: cancel vdm and state machine hrtimer when unregister tcpm port This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.44 by commit 18eaf0de50eadeeb395b83310b259b21ad8ed0a6, it was introduced in version v5.10 by commit 3ed8e1c2ac9914a2fcb08ec13476b85319536cea. For more details please see the references link.
null
2021-12-19T23:43:30.007749Z
2021-06-30T00:29:11.101443Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3ed8e1c2ac9914a2fcb08ec13476b85319536cea'}
Linux
GSD-2021-1001645
net: hns3: do not allow call hns3_nic_net_open repeatedly
net: hns3: do not allow call hns3_nic_net_open repeatedly This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.71 by commit f8ba689cb69523144d10606096ef686002dd7285, it was introduced in version v5.0 by commit e888402789b9db5de4fcda361331d66dbf0cd9fd. For more details please see the references link.
null
2021-12-19T23:55:05.974707Z
2021-10-19T16:29:45.948992Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e888402789b9db5de4fcda361331d66dbf0cd9fd'}
Linux
GSD-2022-1002315
xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu>=32
xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu>=32 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 0848767dee78c00c5646eef9b3201ee14ce68563. For more details please see the references link.
null
2022-04-25T05:48:54.659767Z
2022-04-24T22:33:41.087544Z
null
null
null
null
null
Linux
GSD-2022-1000328
nvme: fix a possible use-after-free in controller reset during load
nvme: fix a possible use-after-free in controller reset during load This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.231 by commit a25e460fbb0340488d119fb2e28fe3f829b7417e. For more details please see the references link.
null
2022-03-07T03:21:31.364032Z
2022-02-27T02:52:00.673931Z
null
null
null
null
null
Linux
GSD-2022-1001493
vsock/virtio: initialize vdev->priv before using VQs
vsock/virtio: initialize vdev->priv before using VQs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 27cb7d136224a81904ead19d9da2c82357bcc9a9, it was introduced in version v5.3 by commit 9c7a5582f5d720dc35cfcc42ccaded69f0642e4a. For more details please see the references link.
null
2022-04-25T05:23:22.451436Z
2022-04-24T21:16:50.544738Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9c7a5582f5d720dc35cfcc42ccaded69f0642e4a'}
Linux
GSD-2021-1000404
nbd: Fix NULL pointer in flush_workqueue
nbd: Fix NULL pointer in flush_workqueue This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.120 by commit 1c4962df938891af9ab4775f5224ef8601764107, it was introduced in version v5.4 by commit e9e006f5fcf2bab59149cb38a48a4817c1b538b4. For more details please see the references link.
null
2021-12-19T23:28:57.328562Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e9e006f5fcf2bab59149cb38a48a4817c1b538b4'}
Linux
GSD-2021-1002439
f2fs: set SBI_NEED_FSCK flag when inconsistent node block found
f2fs: set SBI_NEED_FSCK flag when inconsistent node block found This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.163 by commit 51be334da375058694043224a0941275a353eaac. For more details please see the references link.
null
2021-12-20T00:55:43.035208Z
2021-12-19T19:37:20.410287Z
null
null
null
null
null
Linux
GSD-2022-1001169
net/sched: act_ct: fix ref leak when switching zones
net/sched: act_ct: fix ref leak when switching zones This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit b24793a37d91aacad7cb9893b226a7924a89636a, it was introduced in version v5.17 by commit 2f131de361f6d0eaff17db26efdb844c178432f8. For more details please see the references link.
null
2022-04-25T02:54:56.498557Z
2022-04-24T20:50:07.820265Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2f131de361f6d0eaff17db26efdb844c178432f8'}
Linux
GSD-2021-1000054
tools/power turbostat: Fix offset overflow issue in index converting
tools/power turbostat: Fix offset overflow issue in index converting This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.3 by commit 337b1546cde87fb8588ddaedf0201b769baa572a, it was introduced in version v5.10 by commit 9972d5d84d76982606806b2ce887f70c2f8ba60a. For more details please see the references link.
null
2021-12-20T00:02:23.589707Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9972d5d84d76982606806b2ce887f70c2f8ba60a'}
Linux
GSD-2021-1002069
net: batman-adv: fix error handling
net: batman-adv: fix error handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.77 by commit b0a2cd38553c77928ef1646ed1518486b1e70ae8, it was introduced in version v2.6.38 by commit c6c8fea29769d998d94fcec9b9f14d4b52b349d3. For more details please see the references link.
null
2021-12-20T00:54:52.271607Z
2021-11-14T15:18:29.335848Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6c8fea29769d998d94fcec9b9f14d4b52b349d3'}
Linux
GSD-2021-1002593
net: dsa: felix: Fix memory leak in felix_setup_mmio_filtering
net: dsa: felix: Fix memory leak in felix_setup_mmio_filtering This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.8 by commit 973a0373e88cc19129bd6ef0ec193040535397d9, it was introduced in version v5.15 by commit 8d5f7954b7c8de54902a8beda141064a7e2e6ee0. For more details please see the references link.
null
2021-12-20T00:49:21.813845Z
2021-12-19T19:44:09.286133Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8d5f7954b7c8de54902a8beda141064a7e2e6ee0'}
Linux
GSD-2022-1001539
cxl/port: Hold port reference until decoder release
cxl/port: Hold port reference until decoder release This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit b0022ca445d5fc4d0c89d15dcd0f855977b22c1d, it was introduced in version v5.14 by commit 40ba17afdfabb01688c61565dbe02a916241bc05. For more details please see the references link.
null
2022-04-25T03:54:46.775367Z
2022-04-24T21:21:39.389150Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/40ba17afdfabb01688c61565dbe02a916241bc05'}
Linux
GSD-2021-1002086
NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()
NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit 564249219e5b5673a8416b5181875d828c3f1e8c, it was introduced in version v3.13 by commit 1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8. For more details please see the references link.
null
2021-12-20T00:52:18.212740Z
2021-11-14T15:19:13.207949Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8'}
Linux
GSD-2021-1000541
btrfs: return whole extents in fiemap
btrfs: return whole extents in fiemap This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit afd1fca36d26f3896c99a363fc3dbe9c05411e3a, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T23:28:20.684894Z
2021-06-04T19:35:47.075817Z
null
null
null
null
null
Linux
GSD-2022-1001186
drivers: ethernet: cpsw: fix panic when interrupt coaleceing is set via ethtool
drivers: ethernet: cpsw: fix panic when interrupt coaleceing is set via ethtool This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 30ad11bff021a94aff6dab1ec9236fdfd884fbff, it was introduced in version v5.15 by commit d43c65b05b848e0b2db1a6c78b02c189da3a95b5. For more details please see the references link.
null
2022-04-25T06:56:24.138174Z
2022-04-24T20:51:57.898038Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d43c65b05b848e0b2db1a6c78b02c189da3a95b5'}
Linux
GSD-2021-1000111
openvswitch: fix stack OOB read while fragmenting IPv4 packets
openvswitch: fix stack OOB read while fragmenting IPv4 packets This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.20 by commit d841d3cf5297fde4ce6a41ff35451d0e82917f3e, it was introduced in version v4.16 by commit d52e5a7e7ca49457dd31fc8b42fb7c0d58a31221. For more details please see the references link.
null
2021-12-19T22:35:48.935266Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d52e5a7e7ca49457dd31fc8b42fb7c0d58a31221'}
Linux
GSD-2021-1001350
coresight: tmc-etf: Fix global-out-of-bounds in tmc_update_etf_buffer()
coresight: tmc-etf: Fix global-out-of-bounds in tmc_update_etf_buffer() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.133 by commit ef0a06acc6b16388640ad367eedfa2a17f1945db, it was introduced in version v4.14 by commit 0c3fc4d5fa26092853278145aca9b21fa52a3e93. For more details please see the references link.
null
2021-12-19T23:55:23.138991Z
2021-08-03T02:14:56.696666Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0c3fc4d5fa26092853278145aca9b21fa52a3e93'}
Linux
GSD-2022-1002250
dax: make sure inodes are flushed before destroy cache
dax: make sure inodes are flushed before destroy cache This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 770d42fff12d8595adda9025a0b92091f543e775, it was introduced in version v4.12 by commit 7b6be8444e0f0dd675b54d059793423d3c9b4c03. For more details please see the references link.
null
2022-04-25T06:03:16.766124Z
2022-04-24T22:26:12.547163Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7b6be8444e0f0dd675b54d059793423d3c9b4c03'}
Linux
GSD-2022-1001885
ASoC: xilinx: xlnx_formatter_pcm: Handle sysclk setting
ASoC: xilinx: xlnx_formatter_pcm: Handle sysclk setting This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit bb0a0e23dd0070e6f407387f3822daef95e5815d, it was introduced in version v5.1 by commit 6f6c3c36f0917be24587eeba818ab4fdfcb5465a. For more details please see the references link.
null
2022-04-25T03:00:12.487536Z
2022-04-24T21:51:56.102031Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6f6c3c36f0917be24587eeba818ab4fdfcb5465a'}
Linux
GSD-2022-1000797
sc16is7xx: Fix for incorrect data being transmitted
sc16is7xx: Fix for incorrect data being transmitted This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.26 by commit 4e508c59357310a41b8fa69a576dfea4208f2518, it was introduced in version v5.8 by commit 6393ff1c4435acc343b1481f5b834b918cb42b12. For more details please see the references link.
null
2022-03-18T03:46:39.126543Z
2022-03-18T00:18:52.303519Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6393ff1c4435acc343b1481f5b834b918cb42b12'}
Linux
GSD-2021-1000812
pid: take a reference when initializing `cad_pid`
pid: take a reference when initializing `cad_pid` This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.10 by commit b8ff869f20152fbe66b6c2e2715d26a2f9897cca, it was introduced in version v2.6.19 by commit 9ec52099e4b8678a60e9f93e41ad87885d64f3e6. For more details please see the references link.
null
2021-12-20T00:20:42.933186Z
2021-06-25T00:08:57.046925Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9ec52099e4b8678a60e9f93e41ad87885d64f3e6'}
Linux
GSD-2021-1001700
block: don't call rq_qos_ops->done_bio if the bio isn't tracked
block: don't call rq_qos_ops->done_bio if the bio isn't tracked This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.11 by commit 004b8f8a691205a93d9e80d98b786b2b97424d6e. For more details please see the references link.
null
2021-12-20T00:08:23.847675Z
2021-10-19T16:32:30.817671Z
null
null
null
null
null
Linux
GSD-2022-1000580
KVM: arm64: Avoid consuming a stale esr value when SError occur
KVM: arm64: Avoid consuming a stale esr value when SError occur This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.22 by commit e1e852746997500f1873f60b954da5f02cc2dba3, it was introduced in version v5.11 by commit defe21f49bc98b095300752aa1e19bb608f3e97d. For more details please see the references link.
null
2022-03-07T01:33:29.258312Z
2022-02-27T03:27:00.124192Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/defe21f49bc98b095300752aa1e19bb608f3e97d'}
Linux
GSD-2021-1001517
blktrace: Fix uaf in blk_trace access after removing by sysfs
blktrace: Fix uaf in blk_trace access after removing by sysfs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.285 by commit dacfd5e4d1142bfb3809aab3634a375f6f373269, it was introduced in version v2.6.30 by commit c71a896154119f4ca9e89d6078f5f63ad60ef199. For more details please see the references link.
null
2021-12-19T23:44:50.403321Z
2021-10-19T16:21:48.784341Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c71a896154119f4ca9e89d6078f5f63ad60ef199'}
Linux
GSD-2022-1002047
media: ir_toy: free before error exiting
media: ir_toy: free before error exiting This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 99e3f83539cac6884a4df02cb204a57a184ea12b. For more details please see the references link.
null
2022-04-25T06:00:59.642380Z
2022-04-24T22:05:45.252305Z
null
null
null
null
null
Linux
GSD-2022-1002417
mmc: host: Return an error when ->enable_sdio_irq() ops is missing
mmc: host: Return an error when ->enable_sdio_irq() ops is missing This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 3fac2cb56ba5205547e296b193e52871f9dc3845. For more details please see the references link.
null
2022-04-25T05:46:27.251385Z
2022-04-24T22:45:07.068551Z
null
null
null
null
null
Linux
GSD-2022-1001391
PCI: endpoint: Fix misused goto label
PCI: endpoint: Fix misused goto label This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 70236a0d2d62b081d52076de22d8d017d6cbe99f. For more details please see the references link.
null
2022-04-25T05:08:49.392760Z
2022-04-24T21:10:02.897681Z
null
null
null
null
null
Linux
GSD-2021-1000306
selinux: add proper NULL termination to the secclass_map permissions
selinux: add proper NULL termination to the secclass_map permissions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 336dc1d637f3c889785a718fe791580e01bc2a93, it was introduced in version v4.15 by commit ec27c3568a34c7fe5fcf4ac0a354eda77687f7eb. For more details please see the references link.
null
2021-12-20T01:08:11.581130Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ec27c3568a34c7fe5fcf4ac0a354eda77687f7eb'}
Linux
GSD-2022-1000979
nfc: nci: add flush_workqueue to prevent uaf
nfc: nci: add flush_workqueue to prevent uaf This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.4 by commit edd4600120641e1714e30112e69a548cfb68e067, it was introduced in version v3.2 by commit 6a2968aaf50c7a22fced77a5e24aa636281efca8. For more details please see the references link.
null
2022-04-25T05:02:53.057993Z
2022-04-24T20:36:43.659623Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6a2968aaf50c7a22fced77a5e24aa636281efca8'}
Linux
GSD-2021-1000756
btrfs: fixup error handling in fixup_inode_link_counts
btrfs: fixup error handling in fixup_inode_link_counts This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.125 by commit 6d4da27bd9efdbdffbaf6aa12617a2b549a3b752, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T00:20:48.769052Z
2021-06-25T00:02:44.713794Z
null
null
null
null
null
Linux
GSD-2021-1001844
ocfs2: fix data corruption after conversion from inline format
ocfs2: fix data corruption after conversion from inline format This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit f1b98569e81c37d7e0deada7172f8f60860c1360, it was introduced in version v5.10 by commit 6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b. For more details please see the references link.
null
2021-12-20T00:20:52.576639Z
2021-10-28T13:51:50.049276Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b'}
Linux
GSD-2021-1002291
scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs()
scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.82 by commit 8440377e1a5644779b4c8d013aa2a917f5fc83c3. For more details please see the references link.
null
2021-12-20T00:27:33.753679Z
2021-11-29T02:37:18.089256Z
null
null
null
null
null
Linux
GSD-2021-1002784
phonet/pep: refuse to enable an unbound pipe
phonet/pep: refuse to enable an unbound pipe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.260 by commit 311601f114859d586d5ef8833d60d3aa23282161. For more details please see the references link.
null
2022-01-11T05:47:42.729453Z
2021-12-30T02:43:17.820010Z
null
null
null
null
null
Linux
GSD-2021-1000243
i2c: imx: fix reference leak when pm_runtime_get_sync fails
i2c: imx: fix reference leak when pm_runtime_get_sync fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit ff406f6cd09c273337ab4854292e4aca48f8affd, it was introduced in version v5.7 by commit 3a5ee18d2a32bda6b9a1260136f6805848e3839d. For more details please see the references link.
null
2021-12-19T23:37:17.016666Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3a5ee18d2a32bda6b9a1260136f6805848e3839d'}
Linux
GSD-2022-1001684
qede: confirm skb is allocated before using
qede: confirm skb is allocated before using This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit c9bdce2359b5f4986eb38d1e81865b3586cc20d2, it was introduced in version v4.18 by commit 8a8633978b842c88fbcfe00d4e5dde96048f630e. For more details please see the references link.
null
2022-04-25T04:38:44.353784Z
2022-04-24T21:34:56.476055Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8a8633978b842c88fbcfe00d4e5dde96048f630e'}
Linux
GSD-2022-1000996
SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()
SUNRPC: Ensure we flush any closed sockets before xs_xprt_free() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit d21287d8a4589dd8513038f887ece980fbc399cf, it was introduced in version v5.1 by commit a73881c96d73ee72b7dbbd38a6eeef66182a8ef7. For more details please see the references link.
null
2022-04-25T05:48:09.232419Z
2022-04-24T20:38:17.438916Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a73881c96d73ee72b7dbbd38a6eeef66182a8ef7'}
Linux
GSD-2021-1000613
iommu/vt-d: Fix sysfs leak in alloc_iommu()
iommu/vt-d: Fix sysfs leak in alloc_iommu() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit f01134321d04f47c718bb41b799bcdeda27873d2, it was introduced in version v4.11 by commit 39ab9555c24110671f8dc671311a26e5c985b592. For more details please see the references link.
null
2021-12-19T23:11:26.653976Z
2021-06-04T19:47:35.457558Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/39ab9555c24110671f8dc671311a26e5c985b592'}
Linux
GSD-2021-1001901
NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()
NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit 564249219e5b5673a8416b5181875d828c3f1e8c, it was introduced in version v3.13 by commit 1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8. For more details please see the references link.
null
2021-12-19T22:56:09.218171Z
2021-10-28T13:54:49.555681Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8'}
Linux
GSD-2022-1002102
ASoC: atmel: Fix error handling in sam9x5_wm8731_driver_probe
ASoC: atmel: Fix error handling in sam9x5_wm8731_driver_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 90ac679aa6a01841da90ec5a4aaa4b5e0badddf0, it was introduced in version v3.12 by commit fdbcb3cba54b29a37dfe42acdc0e72c543e0807d. For more details please see the references link.
null
2022-04-25T05:28:08.432254Z
2022-04-24T22:11:25.888125Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fdbcb3cba54b29a37dfe42acdc0e72c543e0807d'}
Linux
GSD-2021-1001452
misc/libmasm/module: Fix two use after free in ibmasm_init_one
misc/libmasm/module: Fix two use after free in ibmasm_init_one This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.276 by commit 29ba8e2ba89ee2862a26d91204dd5fe77ceee25a. For more details please see the references link.
null
2021-12-19T23:30:10.495828Z
2021-08-03T02:45:37.203506Z
null
null
null
null
null
Linux
GSD-2022-1000095
drm/vmwgfx: Fix stale file descriptors on failed usercopy
drm/vmwgfx: Fix stale file descriptors on failed usercopy This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.264 by commit e8d092a62449dcfc73517ca43963d2b8f44d0516, it was introduced in version v4.14 by commit c906965dee22d5e95d0651759ba107b420212a9f. For more details please see the references link.
null
2022-02-19T04:27:05.081053Z
2022-02-18T21:34:38.661782Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c906965dee22d5e95d0651759ba107b420212a9f'}
Linux
GSD-2021-1001002
x86/fpu: Invalidate FPU state after a failed XRSTOR from a user buffer
x86/fpu: Invalidate FPU state after a failed XRSTOR from a user buffer This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit a7748e021b9fb7739e3cb88449296539de0b6817, it was introduced in version v5.2 by commit 1d731e731c4cd7cbd3b1aa295f0932e7610da82f. For more details please see the references link.
null
2021-12-20T00:12:45.998181Z
2021-06-30T00:32:29.338555Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1d731e731c4cd7cbd3b1aa295f0932e7610da82f'}
Linux
GSD-2022-1001057
scsi: pm8001: Fix tag leaks on error
scsi: pm8001: Fix tag leaks on error This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 9cc72bcc1c096ed42c91646f130d4b4191580a4c. For more details please see the references link.
null
2022-04-25T04:25:47.034815Z
2022-04-24T20:42:48.193369Z
null
null
null
null
null
Linux
GSD-2021-1002507
nfp: Fix memory leak in nfp_cpp_area_cache_add()
nfp: Fix memory leak in nfp_cpp_area_cache_add() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.85 by commit 484069b5de9d223cc1c64c6f80389a99cfef51f1, it was introduced in version v4.11 by commit 4cb584e0ee7df70fd0376aee60cf701855ea8c81. For more details please see the references link.
null
2021-12-19T22:44:12.629378Z
2021-12-19T19:40:25.684109Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4cb584e0ee7df70fd0376aee60cf701855ea8c81'}
Linux
GSD-2022-1001407
mt76: dma: initialize skip_unmap in mt76_dma_rx_fill
mt76: dma: initialize skip_unmap in mt76_dma_rx_fill This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit db0e611405eb32f8d60531853a5c5210347b5d57. For more details please see the references link.
null
2022-04-25T05:42:55.157435Z
2022-04-24T21:10:49.296150Z
null
null
null
null
null
Linux
GSD-2021-1000490
net/nfc: fix use-after-free llcp_sock_bind/connect
net/nfc: fix use-after-free llcp_sock_bind/connect This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.269 by commit 26157c82ba756767b2bd66d28a71b1bc454447f6, it was introduced in version v4.4.267 by commit a1cdd18c49d23ec38097ac2c5b0d761146fc0109. For more details please see the references link.
null
2021-12-20T01:01:00.514252Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a1cdd18c49d23ec38097ac2c5b0d761146fc0109'}
Linux
GSD-2021-1002157
mlxsw: thermal: Fix out-of-bounds memory accesses
mlxsw: thermal: Fix out-of-bounds memory accesses This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 332fdf951df8b870e3da86b122ae304e2aabe88c, it was introduced in version v4.10 by commit a50c1e35650b929500bd89be61c89d95a267ce56. For more details please see the references link.
null
2021-12-19T23:45:51.920013Z
2021-11-14T15:22:31.487100Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a50c1e35650b929500bd89be61c89d95a267ce56'}
Linux
GSD-2022-1001954
net: usb: aqc111: Fix out-of-bounds accesses in RX fixup
net: usb: aqc111: Fix out-of-bounds accesses in RX fixup This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.112 by commit d90df6da50c56ad8b1a132e3cf86b6cdf8f507b7. For more details please see the references link.
null
2022-04-25T06:57:32.502181Z
2022-04-24T21:57:46.722949Z
null
null
null
null
null
Linux
GSD-2022-1000646
rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink()
rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.6 by commit 36a9a0aee881940476b254e0352581401b23f210, it was introduced in version v3.14 by commit ba7d49b1f0f8e5f24294a880ed576964059af5ef. For more details please see the references link.
null
2022-03-07T02:29:43.171177Z
2022-02-27T03:35:43.092642Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ba7d49b1f0f8e5f24294a880ed576964059af5ef'}
Linux
GSD-2022-1002381
tpm: fix reference counting for struct tpm_chip
tpm: fix reference counting for struct tpm_chip This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit cb64bd038beacb4331fe464a36c8b5481e8f51e2, it was introduced in version v4.12 by commit fdc915f7f71939ad5a3dda3389b8d2d7a7c5ee66. For more details please see the references link.
null
2022-04-25T03:10:36.200222Z
2022-04-24T22:41:07.844779Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fdc915f7f71939ad5a3dda3389b8d2d7a7c5ee66'}
Linux
GSD-2022-1000216
ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx()
ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.99 by commit 038f8b7caa74d29e020949a43ca368c93f6b29b9. For more details please see the references link.
null
2022-02-19T02:39:14.290880Z
2022-02-18T21:56:34.870748Z
null
null
null
null
null
Linux
GSD-2021-1001281
misc/libmasm/module: Fix two use after free in ibmasm_init_one
misc/libmasm/module: Fix two use after free in ibmasm_init_one This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.52 by commit b9c87ce3bc6331f82811a8cf8e930423c22523a3. For more details please see the references link.
null
2021-12-19T22:19:50.299917Z
2021-08-03T01:56:42.210387Z
null
null
null
null
null
Linux
GSD-2021-1000869
bonding: init notify_work earlier to avoid uninitialized use
bonding: init notify_work earlier to avoid uninitialized use This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.195 by commit f583748c2a4a1dc731812ae2c12cadca5c1a88b5. For more details please see the references link.
null
2021-12-19T23:14:51.841086Z
2021-06-30T00:02:34.690769Z
null
null
null
null
null
Linux
GSD-2022-1001811
NFS: remove unneeded check in decode_devicenotify_args()
NFS: remove unneeded check in decode_devicenotify_args() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 75ee75cc360a8ce0ba3a3e796658152f9b3c4694, it was introduced in version v4.0 by commit a4f743a6bb201662962fa888e3f978583d61691e. For more details please see the references link.
null
2022-04-25T05:07:57.830097Z
2022-04-24T21:44:00.898409Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a4f743a6bb201662962fa888e3f978583d61691e'}
Linux
GSD-2022-1000703
bpf, sockmap: Do not ignore orig_len parameter
bpf, sockmap: Do not ignore orig_len parameter This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.13 by commit 518f8a21ce73755254165729ce3272f8504a69b7, it was introduced in version v5.10 by commit ef5659280eb13e8ac31c296f58cfdfa1684ac06b. For more details please see the references link.
null
2022-03-18T03:47:51.899936Z
2022-03-18T00:11:04.575889Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef5659280eb13e8ac31c296f58cfdfa1684ac06b'}
Linux
GSD-2021-1000886
isdn: mISDN: netjet: Fix crash in nj_probe:
isdn: mISDN: netjet: Fix crash in nj_probe: This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.126 by commit 9d7d4649dc1c53acf76df260fd519db698ed20d7. For more details please see the references link.
null
2021-12-20T01:13:22.780257Z
2021-06-30T00:04:28.016639Z
null
null
null
null
null
Linux
GSD-2021-1001794
net: encx24j600: check error in devm_regmap_init_encx24j600
net: encx24j600: check error in devm_regmap_init_encx24j600 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.252 by commit fddc7f678d7fb93caa0d7bc512f968ff1e2bddbc, it was introduced in version v4.4 by commit 04fbfce7a222327b97ca165294ef19f0faa45960. For more details please see the references link.
null
2021-12-20T01:02:42.046767Z
2021-10-28T13:49:11.430009Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/04fbfce7a222327b97ca165294ef19f0faa45960'}
Linux
GSD-2022-1000353
drop_monitor: fix data-race in dropmon_net_event / trace_napi_poll_hit
drop_monitor: fix data-race in dropmon_net_event / trace_napi_poll_hit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.181 by commit aeb993412eb29bdb7e95845e1b16e0b8167e121e, it was introduced in version v2.6.31 by commit 4ea7e38696c7e798c47ebbecadfd392f23f814f9. For more details please see the references link.
null
2022-03-07T02:22:34.471861Z
2022-02-27T02:55:33.965016Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4ea7e38696c7e798c47ebbecadfd392f23f814f9'}
Linux
GSD-2021-1002442
net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound
net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.164 by commit 77ff166909458646e66450e42909e0adacc99049. For more details please see the references link.
null
2021-12-20T01:13:00.180707Z
2021-12-19T19:37:28.157238Z
null
null
null
null
null
Linux
GSD-2022-1001112
XArray: Fix xas_create_range() when multi-order entry present
XArray: Fix xas_create_range() when multi-order entry present This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 18f13edf3424b3b61814b69d5269b2e14584800c, it was introduced in version v5.17 by commit 6b24ca4a1a8d4ee3221d6d44ddbb99f542e4bda3. For more details please see the references link.
null
2022-04-25T05:19:51.153738Z
2022-04-24T20:46:20.144770Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6b24ca4a1a8d4ee3221d6d44ddbb99f542e4bda3'}
Linux
GSD-2021-1000185
bpf: Fix masking negation logic upon negative dst register
bpf: Fix masking negation logic upon negative dst register This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.190 by commit 0e2dfdc74a7f4036127356d42ea59388f153f42c, it was introduced in version v4.19.19 by commit f92a819b4cbef8c9527d9797110544b2055a4b96. For more details please see the references link.
null
2021-12-19T23:10:29.024239Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f92a819b4cbef8c9527d9797110544b2055a4b96'}
Linux
GSD-2021-1002012
isdn: cpai: check ctr->cnr to avoid array index out of bound
isdn: cpai: check ctr->cnr to avoid array index out of bound This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.156 by commit 285e9210b1fab96a11c0be3ed5cea9dd48b6ac54. For more details please see the references link.
null
2021-12-19T22:56:08.727924Z
2021-11-14T15:15:53.274506Z
null
null
null
null
null
Linux
GSD-2022-1001542
libbpf: Fix memleak in libbpf_netlink_recv()
libbpf: Fix memleak in libbpf_netlink_recv() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 7cedd22f1a8db371b0937bad0ec1c3020d8ebf51, it was introduced in version v5.16.19 by commit 723644ebfdb2ef7dccdaf4f1b05be9186fdba6b1. For more details please see the references link.
null
2022-04-24T21:21:53.673514Z
2022-04-24T21:21:53.673514Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/723644ebfdb2ef7dccdaf4f1b05be9186fdba6b1'}
Linux
GSD-2022-1001796
bfq: fix use-after-free in bfq_dispatch_request
bfq: fix use-after-free in bfq_dispatch_request This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 080665e2c3cbfc68359b9a348a3546ed9b908e7a. For more details please see the references link.
null
2022-04-25T06:26:40.119991Z
2022-04-24T21:42:47.131721Z
null
null
null
null
null
Linux
GSD-2022-1000884
iio: adc: men_z188_adc: Fix a resource leak in an error handling path
iio: adc: men_z188_adc: Fix a resource leak in an error handling path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.182 by commit ce1076b33e299dc8d270e4450a420a18bfb3e190, it was introduced in version v3.15 by commit 74aeac4da66fbfa246edbfc849002eac9b5af9ca. For more details please see the references link.
null
2022-03-18T03:45:09.305759Z
2022-03-18T00:27:44.371076Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/74aeac4da66fbfa246edbfc849002eac9b5af9ca'}
Linux
GSD-2021-1000701
drm/amdgpu: Fix a use-after-free
drm/amdgpu: Fix a use-after-free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.271 by commit 0707c3fea8102d211631ba515ef2159707561b0d, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T23:04:23.864352Z
2021-06-04T20:05:29.497871Z
null
null
null
null
null
Linux
GSD-2021-1001813
net: mdiobus: Fix memory leak in __mdiobus_register
net: mdiobus: Fix memory leak in __mdiobus_register This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.156 by commit b0feaa8376f52357bf2fd020d0c471713a859728. For more details please see the references link.
null
2021-12-20T00:26:52.216671Z
2021-10-28T13:50:17.170737Z
null
null
null
null
null
Linux
GSD-2021-1002696
tee: amdtee: fix an IS_ERR() vs NULL bug
tee: amdtee: fix an IS_ERR() vs NULL bug This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.88 by commit 640e28d618e82be78fb43b4bf5113bc90d6aa442, it was introduced in version v5.6 by commit 757cc3e9ff1d72d014096399d6e2bf03974d9da1. For more details please see the references link.
null
2022-01-11T05:46:17.637283Z
2021-12-27T05:37:24.274743Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/757cc3e9ff1d72d014096399d6e2bf03974d9da1'}
Linux
GSD-2021-1000351
i2c: stm32f7: fix reference leak when pm_runtime_get_sync fails
i2c: stm32f7: fix reference leak when pm_runtime_get_sync fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit c323b270a52a26aa8038a4d1fd9a850904a41166, it was introduced in version v5.6 by commit ea6dd25deeb5b797a145be7f860e3085e7d104c3. For more details please see the references link.
null
2021-12-20T00:04:38.039118Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ea6dd25deeb5b797a145be7f860e3085e7d104c3'}
Linux
GSD-2022-1002440
ath9k_htc: fix uninit value bugs
ath9k_htc: fix uninit value bugs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit e352acdd378e9263cc4c6018e588f2dac7161d07, it was introduced in version v2.6.35 by commit fb9987d0f748c983bb795a86f47522313f701a08. For more details please see the references link.
null
2022-04-25T05:04:35.830970Z
2022-04-24T22:47:48.332738Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb9987d0f748c983bb795a86f47522313f701a08'}
Linux
GSD-2022-1000187
psi: Fix uaf issue when psi trigger is destroyed while being polled
psi: Fix uaf issue when psi trigger is destroyed while being polled This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.97 by commit d4e4e61d4a5b87bfc9953c306a11d35d869417fd, it was introduced in version v5.2 by commit 0e94682b73bfa6c44c98af7a26771c9c08c055d5. For more details please see the references link.
null
2022-02-19T04:08:00.458078Z
2022-02-18T21:52:30.656200Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0e94682b73bfa6c44c98af7a26771c9c08c055d5'}
Linux
GSD-2021-1001110
cfg80211: call cfg80211_leave_ocb when switching away from OCB
cfg80211: call cfg80211_leave_ocb when switching away from OCB This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.196 by commit 24e2441b102db48bf8eec1f6b789db49b5e86adb. For more details please see the references link.
null
2021-12-20T00:11:51.812195Z
2021-07-08T01:56:59.232234Z
null
null
null
null
null
Linux
GSD-2022-1002010
tcp: Don't acquire inet_listen_hashbucket::lock with disabled BH.
tcp: Don't acquire inet_listen_hashbucket::lock with disabled BH. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit b1b27b0e8d489b40607127e26af70e5571bf9201. For more details please see the references link.
null
2022-04-25T05:36:29.913865Z
2022-04-24T22:02:45.400233Z
null
null
null
null
null
Linux
GSD-2021-1001540
blktrace: Fix uaf in blk_trace access after removing by sysfs
blktrace: Fix uaf in blk_trace access after removing by sysfs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.249 by commit d56171d9360c0170c5c5f8f7e2362a2e999eca40, it was introduced in version v2.6.30 by commit c71a896154119f4ca9e89d6078f5f63ad60ef199. For more details please see the references link.
null
2021-12-20T01:19:33.639951Z
2021-10-19T16:22:53.069378Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c71a896154119f4ca9e89d6078f5f63ad60ef199'}
Linux
GSD-2021-1001055
net: ipv4: fix memory leak in netlbl_cipsov4_add_std
net: ipv4: fix memory leak in netlbl_cipsov4_add_std This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit 0ffb460be3abac86f884a8c548bb02724ec370f4, it was introduced in version v2.6.19 by commit 96cb8e3313c7a12e026c1ed510522ae6f6023875. For more details please see the references link.
null
2021-12-19T23:15:55.416693Z
2021-06-30T00:36:39.628776Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/96cb8e3313c7a12e026c1ed510522ae6f6023875'}
Linux
GSD-2022-1000538
scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task
scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit f61f9fccb2cb4bb275674a79d638704db6bc2171. For more details please see the references link.
null
2022-03-07T02:31:36.875188Z
2022-02-27T03:20:50.594748Z
null
null
null
null
null
Linux
GSD-2022-1002505
ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe
ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit 81f266396237cea09a8c6322a6a78535f06ed345, it was introduced in version v3.8 by commit 531f67e41dcde1e358cf821d056241a66355cf03. For more details please see the references link.
null
2022-04-25T04:17:59.936873Z
2022-04-24T22:55:44.396853Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/531f67e41dcde1e358cf821d056241a66355cf03'}
Linux
GSD-2022-1000492
scsi: target: iscsi: Make sure the np under each tpg is unique
scsi: target: iscsi: Make sure the np under each tpg is unique This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit fe4de5330c774e2e0c1621e6a72d60391568b94d. For more details please see the references link.
null
2022-03-07T01:35:37.012310Z
2022-02-27T03:14:49.468409Z
null
null
null
null
null
Linux
GSD-2021-1001405
igb: Fix use-after-free error during reset
igb: Fix use-after-free error during reset This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.241 by commit d7367f781e5a9ca5df9082b15b272b55e76931f8, it was introduced in version v4.12 by commit 7cc6fd4c60f267e17b0baef1580d7a6258c0a6f0. For more details please see the references link.
null
2021-12-19T23:52:06.003242Z
2021-08-03T02:31:11.596571Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7cc6fd4c60f267e17b0baef1580d7a6258c0a6f0'}
Linux
GSD-2022-1000168
ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx()
ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.178 by commit c33402b056de61104b6146dedbe138ca8d7ec62b. For more details please see the references link.
null
2022-02-19T09:37:04.812348Z
2022-02-18T21:50:22.563380Z
null
null
null
null
null
Linux
GSD-2022-1002155
ALSA: pcm: Test for "silence" field in struct "pcm_format_data"
ALSA: pcm: Test for "silence" field in struct "pcm_format_data" This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.190 by commit 377a80ca6590f40ec8a85227b889a5d399fe26c3. For more details please see the references link.
null
2022-04-25T04:29:42.894589Z
2022-04-24T22:16:39.764819Z
null
null
null
null
null
Linux
GSD-2021-1002679
netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc
netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.168 by commit 699e794c12a3cd79045ff135bc87a53b97024e43, it was introduced in version v4.16 by commit 395cacb5f1a0a290f1ae9ca4692c400d2b57a705. For more details please see the references link.
null
2022-01-11T05:51:54.226387Z
2021-12-27T05:36:25.360775Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/395cacb5f1a0a290f1ae9ca4692c400d2b57a705'}
Linux
GSD-2021-1000644
NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()
NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.124 by commit aba3c7795f51717ae316f3566442dee7cc3eeccb, it was introduced in version v5.4.118 by commit 6be0e4b59314e4a836495f6ffdc5d2c5b079deeb. For more details please see the references link.
null
2021-12-19T22:23:51.604822Z
2021-06-04T19:53:37.766889Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6be0e4b59314e4a836495f6ffdc5d2c5b079deeb'}
Linux
GSD-2021-1001956
drm/msm: Fix null pointer dereference on pointer edp
drm/msm: Fix null pointer dereference on pointer edp This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.252 by commit 0cd063aa0a09822cc1620fc59a67fe2f9f6338ac, it was introduced in version v4.0 by commit ab5b0107ccf3821a6837b0f2819270d6fa0b278f. For more details please see the references link.
null
2021-12-19T23:32:18.938060Z
2021-11-14T15:13:21.727720Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab5b0107ccf3821a6837b0f2819270d6fa0b278f'}
Linux
GSD-2021-1002383
ALSA: pcm: oss: Limit the period size to 16MB
ALSA: pcm: oss: Limit the period size to 16MB This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.293 by commit b02a41eebcc36d4f07196780f2e165ca2c499257. For more details please see the references link.
null
2021-12-20T00:15:56.843804Z
2021-12-19T19:34:51.054458Z
null
null
null
null
null
Linux
GSD-2022-1001329
mac80211: fix potential double free on mesh join
mac80211: fix potential double free on mesh join This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.1 by commit 46bb87d40683337757a2f902fcd4244b32bb4e86, it was introduced in version v5.8 by commit 6a01afcf8468d3ca2bd8bbb27503f60dcf643b20. For more details please see the references link.
null
2022-04-25T04:43:12.514792Z
2022-04-24T21:05:03.797440Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6a01afcf8468d3ca2bd8bbb27503f60dcf643b20'}
Linux
GSD-2022-1001283
crypto: octeontx2 - remove CONFIG_DM_CRYPT check
crypto: octeontx2 - remove CONFIG_DM_CRYPT check This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit a1bf728f3388ac3a2c2dffa57e25622e90b9f6f2, it was introduced in version v5.12 by commit 6f03f0e8b6c8a82d8e740ff3a87ed407ad423243. For more details please see the references link.
null
2022-04-25T05:36:01.452776Z
2022-04-24T21:01:10.243044Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6f03f0e8b6c8a82d8e740ff3a87ed407ad423243'}
Linux
GSD-2021-1002229
tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc
tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.291 by commit b1ffc16ec05ae40d82b6e373322d62e9d6b54fbc. For more details please see the references link.
null
2021-12-20T00:16:57.908042Z
2021-11-29T02:34:22.432477Z
null
null
null
null
null
Linux
GSD-2021-1000214
sctp: do asoc update earlier in sctp_sf_do_dupcook_a
sctp: do asoc update earlier in sctp_sf_do_dupcook_a This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit 0bfd913c2121b3d553bfd52810fe6061d542d625, it was introduced in version v5.7 by commit 145cb2f7177d94bc54563ed26027e952ee0ae03c. For more details please see the references link.
null
2021-12-19T23:57:36.632171Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/145cb2f7177d94bc54563ed26027e952ee0ae03c'}
Linux
GSD-2022-1001779
powerpc/kasan: Fix early region not updated correctly
powerpc/kasan: Fix early region not updated correctly This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 5a3d8f3192a409893c57808cc935e16484df1068, it was introduced in version v5.4 by commit cbd18991e24fea2c31da3bb117c83e4a3538cd11. For more details please see the references link.
null
2022-04-25T03:11:02.141138Z
2022-04-24T21:41:57.571504Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cbd18991e24fea2c31da3bb117c83e4a3538cd11'}
Linux
GSD-2021-1002803
IB/qib: Fix memory leak in qib_user_sdma_queue_pkts()
IB/qib: Fix memory leak in qib_user_sdma_queue_pkts() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.89 by commit 7cf6466e00a77b0a914b7b2c28a1fc7947d55e59, it was introduced in version v5.10.77 by commit c3e17e58f571f34c51aeb17274ed02c2ed5cf780. For more details please see the references link.
null
2022-01-11T05:53:28.300221Z
2021-12-30T02:44:09.747027Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c3e17e58f571f34c51aeb17274ed02c2ed5cf780'}
Linux
GSD-2022-1000241
bpf: Guard against accessing NULL pt_regs in bpf_get_task_stack()
bpf: Guard against accessing NULL pt_regs in bpf_get_task_stack() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.19 by commit 0bcd484587b3b3092e448d27dc369e347e1810c3, it was introduced in version v5.9 by commit fa28dcb82a38f8e3993b0fae9106b1a80b59e4f0. For more details please see the references link.
null
2022-02-20T06:38:42.673827Z
2022-02-18T22:00:15.687845Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fa28dcb82a38f8e3993b0fae9106b1a80b59e4f0'}
Linux
GSD-2022-1001903
samples/landlock: Fix path_list memory leak
samples/landlock: Fix path_list memory leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 20fbf100f84b9aeb9c91421abe1927bc152bc32b. For more details please see the references link.
null
2022-04-25T06:29:58.818057Z
2022-04-24T21:53:28.210822Z
null
null
null
null
null
Linux
GSD-2022-1000611
KVM: x86: Free kvm_cpuid_entry2 array on post-KVM_RUN KVM_SET_CPUID{,2}
KVM: x86: Free kvm_cpuid_entry2 array on post-KVM_RUN KVM_SET_CPUID{,2} This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit b9ee734a14bb685b2088f2176d82b34cb4e30dbc, it was introduced in version v5.16.3 by commit 24e7590c60aa9487b8e43583dc9885f62f8216c1. For more details please see the references link.
null
2022-03-07T01:30:08.185591Z
2022-02-27T03:31:08.321160Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/24e7590c60aa9487b8e43583dc9885f62f8216c1'}
Linux
GSD-2021-1000994
regulator: rt4801: Fix NULL pointer dereference if priv->enable_gpios is NULL
regulator: rt4801: Fix NULL pointer dereference if priv->enable_gpios is NULL This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit ba8a26a7ce8617f9f3d6230de34b2302df086b41. For more details please see the references link.
null
2021-12-20T00:14:36.777101Z
2021-06-30T00:32:00.045174Z
null
null
null
null
null
Linux
GSD-2021-1001686
i40e: Fix freeing of uninitialized misc IRQ vector
i40e: Fix freeing of uninitialized misc IRQ vector This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.12 by commit 75099439209d3cda439a1d9b00d19a50f0066fef, it was introduced in version v4.15 by commit c17401a1dd210a5f22ab1ec7c7366037c158a14c. For more details please see the references link.
null
2021-12-19T23:35:04.407734Z
2021-10-19T16:31:49.647769Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c17401a1dd210a5f22ab1ec7c7366037c158a14c'}
Linux
GSD-2021-1002100
can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv
can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit 6e8811707e2df0c6ba920f0cad3a3bca7b42132f, it was introduced in version v5.4 by commit 9d71dd0c70099914fcd063135da3c580865e924c. For more details please see the references link.
null
2021-12-20T01:28:07.815119Z
2021-11-14T15:19:54.251307Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9d71dd0c70099914fcd063135da3c580865e924c'}