ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2022-1001450
scsi: qla2xxx: Fix crash during module load unload test
scsi: qla2xxx: Fix crash during module load unload test This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 213e57b42537f1a2e5395caa9d7189854133ed12, it was introduced in version v5.9 by commit 62e9dd177732843ae6c5b9d2ed61e7c9538fa276. For more details please see the references link.
null
2022-04-25T06:56:03.522188Z
2022-04-24T21:14:20.793353Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/62e9dd177732843ae6c5b9d2ed61e7c9538fa276'}
Linux
GSD-2021-1002550
atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait
atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.7 by commit cec49b6dfdb0b9fefd0f17c32014223f73ee2605. For more details please see the references link.
null
2021-12-19T22:56:36.512936Z
2021-12-19T19:42:16.792675Z
null
null
null
null
null
Linux
GSD-2022-1001000
ata: sata_dwc_460ex: Fix crash due to OOB write
ata: sata_dwc_460ex: Fix crash due to OOB write This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 3a8751c0d4e24129e72dcec0139e99833b13904a, it was introduced in version v4.18 by commit 28361c403683c2b00d4f5e76045f3ccd299bf99d. For more details please see the references link.
null
2022-04-25T05:12:22.238847Z
2022-04-24T20:38:33.733218Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/28361c403683c2b00d4f5e76045f3ccd299bf99d'}
Linux
GSD-2021-1000097
media: staging/intel-ipu3: Fix set_fmt error handling
media: staging/intel-ipu3: Fix set_fmt error handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.20 by commit 34892ea938387d83ffcfb7775ec55f0f80767916, it was introduced in version v5.2 by commit 6d5f26f2e045f2377b524516194657c00efbbce8. For more details please see the references link.
null
2021-12-20T00:39:26.163037Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6d5f26f2e045f2377b524516194657c00efbbce8'}
Linux
GSD-2022-1001515
ibmvnic: fix race between xmit and reset
ibmvnic: fix race between xmit and reset This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 475f9cce98b63bc145b4efa66fa51175d4cb345f, it was introduced in version v5.4 by commit 7ed5b31f4a6695a21f617df07646e9b15c6c1d29. For more details please see the references link.
null
2022-04-25T06:45:05.019208Z
2022-04-24T21:19:13.313701Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ed5b31f4a6695a21f617df07646e9b15c6c1d29'}
Linux
GSD-2021-1000582
net: fec: fix the potential memory leak in fec_enet_init()
net: fec: fix the potential memory leak in fec_enet_init() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit 8ee7ef4a57a9e1228b6f345aaa70aa8951c7e9cd, it was introduced in version v3.18 by commit 59d0f746564495c7f54526674deabfcf101236a1. For more details please see the references link.
null
2021-12-20T00:18:03.504422Z
2021-06-04T19:42:40.894147Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/59d0f746564495c7f54526674deabfcf101236a1'}
Linux
GSD-2021-1000078
scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand()
scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.3 by commit a73208e3244127ef9f2cdf24e4adb947aaa32053, it was introduced in version v5.5 by commit af2a0c51b1205327f55a7e82e530403ae1d42cbb. For more details please see the references link.
null
2021-12-19T22:17:56.693014Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/af2a0c51b1205327f55a7e82e530403ae1d42cbb'}
Linux
GSD-2021-1002045
audit: fix possible null-pointer dereference in audit_filter_rules
audit: fix possible null-pointer dereference in audit_filter_rules This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit 16802fa4c33eb1a8efb23f1e93365190e4047d05, it was introduced in version v5.3 by commit bf361231c295d92a28ca283ea713f56e93e55796. For more details please see the references link.
null
2021-12-19T23:49:01.756286Z
2021-11-14T15:17:22.943127Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf361231c295d92a28ca283ea713f56e93e55796'}
Linux
GSD-2022-1001145
ntfs: add sanity check on allocation size
ntfs: add sanity check on allocation size This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit c641087d381a08363e5f14179bc6b0a23eca7c47. For more details please see the references link.
null
2022-04-25T06:40:20.888894Z
2022-04-24T20:48:48.995014Z
null
null
null
null
null
Linux
GSD-2021-1000428
nvmet-tcp: fix incorrect locking in state_change sk callback
nvmet-tcp: fix incorrect locking in state_change sk callback This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.119 by commit 999d606a820c36ae9b9e9611360c8b3d8d4bb777, it was introduced in version v5.0 by commit 872d26a391da92ed8f0c0f5cb5fef428067b7f30. For more details please see the references link.
null
2021-12-19T22:39:07.501954Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/872d26a391da92ed8f0c0f5cb5fef428067b7f30'}
Linux
GSD-2021-1002415
net: ethernet: dec: tulip: de4x5: fix possible array overflows in type3_infoblock()
net: ethernet: dec: tulip: de4x5: fix possible array overflows in type3_infoblock() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.220 by commit d959407177adfd9ff7fd2fd831beb6b85c4a4009. For more details please see the references link.
null
2021-12-19T22:51:02.006289Z
2021-12-19T19:36:23.527492Z
null
null
null
null
null
Linux
GSD-2022-1002339
PM: core: keep irq flags in device_pm_check_callbacks()
PM: core: keep irq flags in device_pm_check_callbacks() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit be8bc05f38d667eda1e820bc6f69234795be7809. For more details please see the references link.
null
2022-04-25T05:37:45.286545Z
2022-04-24T22:35:42.589667Z
null
null
null
null
null
Linux
GSD-2022-1000304
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.268 by commit 63f0cfb36c1f1964a59ce544156677601e2d8740, it was introduced in version v3.9 by commit e2ca90c276e1fc410d7cd3c1a4eee245ec902a20. For more details please see the references link.
null
2022-03-07T01:49:09.054913Z
2022-02-27T02:48:36.510413Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e2ca90c276e1fc410d7cd3c1a4eee245ec902a20'}
Linux
GSD-2021-1001393
RDMA/cma: Fix rdma_resolve_route() memory leak
RDMA/cma: Fix rdma_resolve_route() memory leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.198 by commit 4893c938f2a140a74be91779e45e4a7fa111198f. For more details please see the references link.
null
2021-12-20T01:27:57.083270Z
2021-08-03T02:26:58.961730Z
null
null
null
null
null
Linux
GSD-2021-1001669
net: macb: fix use after free on rmmod
net: macb: fix use after free on rmmod This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.70 by commit 7721221e87d25c9840d9ca6b986dbdc410d5ce2b. For more details please see the references link.
null
2021-12-20T02:24:19.955717Z
2021-10-19T16:30:57.328174Z
null
null
null
null
null
Linux
GSD-2022-1001846
xsk: Fix race at socket teardown
xsk: Fix race at socket teardown This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit ad7219cd8751bd258b9d1e69ae0654ec00f71875, it was introduced in version v5.4 by commit 42fddcc7c64b723a867c7b2f5f7505e244212f13. For more details please see the references link.
null
2022-04-25T05:59:53.729340Z
2022-04-24T21:47:31.773896Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/42fddcc7c64b723a867c7b2f5f7505e244212f13'}
Linux
GSD-2022-1000754
vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
vhost/vsock: don't check owner in vhost_vsock_stop() while releasing This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.12 by commit f9919d83aba4c1a57288a33284558de0a41df32f, it was introduced in version v4.8 by commit 433fc58e6bf2c8bd97e57153ed28e64fd78207b8. For more details please see the references link.
null
2022-03-18T03:01:56.975509Z
2022-03-18T00:15:33.610911Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/433fc58e6bf2c8bd97e57153ed28e64fd78207b8'}
Linux
GSD-2021-1001239
ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions
ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.54 by commit ce8fafb68051fba52546f8bbe8621f7641683680, it was introduced in version v5.3 by commit f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74. For more details please see the references link.
null
2021-12-20T00:00:16.998434Z
2021-08-03T01:46:06.419902Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74'}
Linux
GSD-2022-1002293
ipv6: fix panic when forwarding a pkt with no in6 dev
ipv6: fix panic when forwarding a pkt with no in6 dev This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.239 by commit 74b68f5249f16c5f7f675d0f604fa6ae20e3a151, it was introduced in version v4.19.199 by commit bff0854e2f804f68d3e93d19e4580dbd69777e1d. For more details please see the references link.
null
2022-04-25T04:19:52.330243Z
2022-04-24T22:30:55.990797Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bff0854e2f804f68d3e93d19e4580dbd69777e1d'}
Linux
GSD-2021-1001556
ipack: ipoctal: fix module reference leak
ipack: ipoctal: fix module reference leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.209 by commit 9c5b77a7ffc983b2429ce158b50497c5d3c86a69, it was introduced in version v3.18 by commit 82a82340bab6c251e0705339f60763718eaa2a22. For more details please see the references link.
null
2021-12-19T22:43:28.906484Z
2021-10-19T16:23:37.512397Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/82a82340bab6c251e0705339f60763718eaa2a22'}
Linux
GSD-2022-1002006
dm ioctl: prevent potential spectre v1 gadget
dm ioctl: prevent potential spectre v1 gadget This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit 71c8df33fd777c7628f6fbc09b14e84806c55914. For more details please see the references link.
null
2022-04-25T05:24:36.132514Z
2022-04-24T22:02:34.036742Z
null
null
null
null
null
Linux
GSD-2021-1001106
nilfs2: fix memory leak in nilfs_sysfs_delete_device_group
nilfs2: fix memory leak in nilfs_sysfs_delete_device_group This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.238 by commit 49e3def271f65f893ca37158d902ad168838bcaf, it was introduced in version v3.17 by commit da7141fb78db915680616e15677539fc8140cf53. For more details please see the references link.
null
2021-12-19T22:40:46.552301Z
2021-07-08T01:56:43.329751Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/da7141fb78db915680616e15677539fc8140cf53'}
Linux
GSD-2022-1000191
USB: core: Fix hang in usb_kill_urb by adding memory barriers
USB: core: Fix hang in usb_kill_urb by adding memory barriers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.96 by commit e3b131e30e612ff0e32de6c1cb4f69f89db29193. For more details please see the references link.
null
2022-02-19T09:58:01.550653Z
2022-02-18T21:52:57.227441Z
null
null
null
null
null
Linux
GSD-2022-1002456
tpm: fix reference counting for struct tpm_chip
tpm: fix reference counting for struct tpm_chip This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 473a66f99cb8173c14138c5a5c69bfad04e8f9ac, it was introduced in version v4.12 by commit fdc915f7f71939ad5a3dda3389b8d2d7a7c5ee66. For more details please see the references link.
null
2022-04-25T04:40:27.430646Z
2022-04-24T22:50:10.539810Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fdc915f7f71939ad5a3dda3389b8d2d7a7c5ee66'}
Linux
GSD-2021-1000347
mt76: mt7615: fix memleak when mt7615_unregister_device()
mt76: mt7615: fix memleak when mt7615_unregister_device() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 4fa28c807da54c1d720b3cc12e48eb9bea1e2c8f, it was introduced in version v5.10.21 by commit aec5719681405af21102c2407b01f83ed19e9833. For more details please see the references link.
null
2021-12-19T23:04:53.436298Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/aec5719681405af21102c2407b01f83ed19e9833'}
Linux
GSD-2022-1000938
xen/xenbus: don't let xenbus_grant_ring() remove grants in error case
xen/xenbus: don't let xenbus_grant_ring() remove grants in error case This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.306 by commit 8f80d12f6946a6fe7c64bfc204c062a57f83c7f8. For more details please see the references link.
null
2022-03-18T02:55:07.439338Z
2022-03-18T00:34:21.357973Z
null
null
null
null
null
Linux
GSD-2021-1002680
media: mxl111sf: change mutex_init() location
media: mxl111sf: change mutex_init() location This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.168 by commit 96f182c9f48b984447741f054ec301fdc8517035, it was introduced in version v3.7 by commit 8572211842afc53c8450fb470f2b8d02ba7592e0. For more details please see the references link.
null
2022-01-11T06:48:37.315160Z
2021-12-27T05:36:27.713967Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8572211842afc53c8450fb470f2b8d02ba7592e0'}
Linux
GSD-2021-1001805
ocfs2: mount fails with buffer overflow in strlen
ocfs2: mount fails with buffer overflow in strlen This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.214 by commit 7623b1035ca2d17bde0f6a086ad6844a34648df1. For more details please see the references link.
null
2021-12-19T22:36:32.070648Z
2021-10-28T13:49:50.137401Z
null
null
null
null
null
Linux
GSD-2021-1000717
ocfs2: fix data corruption by fallocate
ocfs2: fix data corruption by fallocate This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.272 by commit 624fa7baa3788dc9e57840ba5b94bc22b03cda57, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T22:21:56.834252Z
2021-06-24T23:58:55.245251Z
null
null
null
null
null
Linux
GSD-2022-1000892
sr9700: sanity check for packet length
sr9700: sanity check for packet length This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.182 by commit b95d71abeb7d31d4d51cd836d80f99fd783fd6d5. For more details please see the references link.
null
2022-03-18T02:50:11.746021Z
2022-03-18T00:28:53.983088Z
null
null
null
null
null
Linux
GSD-2022-1001780
media: imx-jpeg: fix a bug of accessing array out of bounds
media: imx-jpeg: fix a bug of accessing array out of bounds This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 02f9f97d54ffc85b50ad77f5b1f3c8f69cd17747. For more details please see the references link.
null
2022-04-25T06:43:29.847022Z
2022-04-24T21:42:00.473574Z
null
null
null
null
null
Linux
GSD-2021-1000202
userfaultfd: release page in error path to avoid BUG_ON
userfaultfd: release page in error path to avoid BUG_ON This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit 2d59a0ed8b26b8f3638d8afc31f839e27759f1f6, it was introduced in version v4.11 by commit cb658a453b9327ce96ce5222c24d162b5b65b564. For more details please see the references link.
null
2021-12-20T00:05:20.941971Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cb658a453b9327ce96ce5222c24d162b5b65b564'}
Linux
GSD-2022-1001295
mmc: core: use sysfs_emit() instead of sprintf()
mmc: core: use sysfs_emit() instead of sprintf() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit c4ab65738ab3e21fe519ee46b2051222bc8e32ef. For more details please see the references link.
null
2022-04-25T04:52:34.062188Z
2022-04-24T21:01:59.853177Z
null
null
null
null
null
Linux
GSD-2021-1002395
net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings()
net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.257 by commit 550658a2d61e4eaf522c8ebc7fad76dc376bfb45, it was introduced in version v3.9 by commit 7f9664525f9cb507de9198a395a111371413f230. For more details please see the references link.
null
2021-12-19T22:24:28.185658Z
2021-12-19T19:35:27.400070Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7f9664525f9cb507de9198a395a111371413f230'}
Linux
GSD-2021-1001940
isdn: mISDN: Fix sleeping function called from invalid context
isdn: mISDN: Fix sleeping function called from invalid context This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.288 by commit ef269a8808cb1759245a98a7fe16fceaebad894c. For more details please see the references link.
null
2021-12-19T22:26:42.710546Z
2021-11-14T15:12:34.857736Z
null
null
null
null
null
Linux
GSD-2021-1000652
btrfs: do not BUG_ON in link_to_fixup_dir
btrfs: do not BUG_ON in link_to_fixup_dir This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.193 by commit 6eccfb28f8dca70c9b1b3bb3194ca54cbe73a9fa, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T22:23:15.525855Z
2021-06-04T19:55:00.082285Z
null
null
null
null
null
Linux
GSD-2022-1002143
remoteproc: Fix count check in rproc_coredump_write()
remoteproc: Fix count check in rproc_coredump_write() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit b97b305656a7013690e7b6e310f0e827e0bbff90, it was introduced in version v5.9 by commit 3afdc59e4390487f04f2435b7e8a6289984e0a1e. For more details please see the references link.
null
2022-04-25T03:57:11.239136Z
2022-04-24T22:15:48.549476Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3afdc59e4390487f04f2435b7e8a6289984e0a1e'}
Linux
GSD-2021-1001413
seq_file: disallow extremely large seq buffer allocations
seq_file: disallow extremely large seq buffer allocations This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.240 by commit 3c07d1335d17ae0411101024de438dbc3734e992, it was introduced in version v3.16 by commit 058504edd02667eef8fac9be27ab3ea74332e9b4. For more details please see the references link.
null
2021-12-20T00:47:58.247244Z
2021-08-03T02:33:42.828810Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/058504edd02667eef8fac9be27ab3ea74332e9b4'}
Linux
GSD-2022-1000484
ima: fix reference leak in asymmetric_verify()
ima: fix reference leak in asymmetric_verify() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 89f586d3398f4cc0432ed870949dffb702940754, it was introduced in version v5.13 by commit 947d70597236dd5ae65c1f68c8eabfb962ee5a6b. For more details please see the references link.
null
2022-03-07T01:38:05.634215Z
2022-02-27T03:13:15.564399Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/947d70597236dd5ae65c1f68c8eabfb962ee5a6b'}
Linux
GSD-2022-1002513
jffs2: fix memory leak in jffs2_scan_medium
jffs2: fix memory leak in jffs2_scan_medium This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit 9b0c69182f09b70779817af4dcf89780955d5c4c, it was introduced in version v2.6.15 by commit e631ddba588783edd521c5a89f7b2902772fb691. For more details please see the references link.
null
2022-04-25T03:35:07.685282Z
2022-04-24T22:56:57.862182Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e631ddba588783edd521c5a89f7b2902772fb691'}
Linux
GSD-2021-1001043
NFS: Fix a potential NULL dereference in nfs_get_client()
NFS: Fix a potential NULL dereference in nfs_get_client() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit 58ddf61f10b8f9b7b1341644bfee2f1c6508d4e1, it was introduced in version v3.17 by commit 31434f496abb9f3410b10f541462fe58613dd3ad. For more details please see the references link.
null
2021-12-19T22:39:32.941149Z
2021-06-30T00:35:55.330359Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/31434f496abb9f3410b10f541462fe58613dd3ad'}
Linux
GSD-2021-1000081
ACPI: custom_method: fix potential use-after-free issue
ACPI: custom_method: fix potential use-after-free issue This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.3 by commit b7a5baaae212a686ceb812c32fceed79c03c0234, it was introduced in version v5.4 by commit 03d1571d9513369c17e6848476763ebbd10ec2cb. For more details please see the references link.
null
2021-12-19T22:02:56.380579Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/03d1571d9513369c17e6848476763ebbd10ec2cb'}
Linux
GSD-2022-1001016
IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition
IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 57800cc36e55db0547461c49acf5cd84c0f502b0, it was introduced in version v5.1 by commit d757c60eca9b22f4d108929a24401e0fdecda0b1. For more details please see the references link.
null
2022-04-25T06:14:37.303103Z
2022-04-24T20:40:05.382993Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d757c60eca9b22f4d108929a24401e0fdecda0b1'}
Linux
GSD-2021-1002546
vdpa_sim: avoid putting an uninitialized iova_domain
vdpa_sim: avoid putting an uninitialized iova_domain This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.6 by commit e4d58ac67e63727aa45a4a26185876f598e8b3dd, it was introduced in version v5.13 by commit 4080fc1067501707b9693b8003feae7d50d14e35. For more details please see the references link.
null
2021-12-20T01:02:24.224930Z
2021-12-19T19:42:06.743062Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4080fc1067501707b9693b8003feae7d50d14e35'}
Linux
GSD-2022-1001446
scsi: qla2xxx: Fix premature hw access after PCI error
scsi: qla2xxx: Fix premature hw access after PCI error This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit d7994dff9071555a959a168f9184dd9abae68a6b. For more details please see the references link.
null
2022-04-25T05:37:10.530503Z
2022-04-24T21:14:04.391679Z
null
null
null
null
null
Linux
GSD-2021-1002116
scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els()
scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit a7fbb56e6c941d9f59437b96412a348e66388d3e, it was introduced in version v3.11 by commit 8c0eb596baa51f2b43949c698c644727ef17805c. For more details please see the references link.
null
2021-12-20T00:33:35.904039Z
2021-11-14T15:20:33.641128Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c0eb596baa51f2b43949c698c644727ef17805c'}
Linux
GSD-2021-1001690
drm/amdgpu: handle the case of pci_channel_io_frozen only in amdgpu_pci_resume
drm/amdgpu: handle the case of pci_channel_io_frozen only in amdgpu_pci_resume This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.12 by commit 72e9a1bf9b722628c28092e0c2cd8717edd201dc, it was introduced in version v5.10 by commit c9a6b82f45e261d247b980a7949aaa6a9bfffe01. For more details please see the references link.
null
2021-12-20T01:20:52.969712Z
2021-10-19T16:32:01.118002Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c9a6b82f45e261d247b980a7949aaa6a9bfffe01'}
Linux
GSD-2021-1000982
mptcp: Fix out of bounds when parsing TCP options
mptcp: Fix out of bounds when parsing TCP options This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit 73eeba71dc9932970befa009e68272a3d5ec4a58, it was introduced in version v5.6 by commit cec37a6e41aae7bf3df9a3da783380a4d9325fd8. For more details please see the references link.
null
2021-12-20T01:02:22.030312Z
2021-06-30T00:31:14.739846Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cec37a6e41aae7bf3df9a3da783380a4d9325fd8'}
Linux
GSD-2022-1000607
ceph: properly put ceph_string reference after async create attempt
ceph: properly put ceph_string reference after async create attempt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit a0c22e970cd78b81c94691e6cb09713e8074d580, it was introduced in version v5.7 by commit 9a8d03ca2e2c334d08ee91a3e07dcce31a02fdc6. For more details please see the references link.
null
2022-03-07T02:21:58.433783Z
2022-02-27T03:30:02.848363Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9a8d03ca2e2c334d08ee91a3e07dcce31a02fdc6'}
Linux
GSD-2022-1001915
rtc: pl031: fix rtc features null pointer dereference
rtc: pl031: fix rtc features null pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit cd2722e411e8ab7e5ae41102f6925fa13dffdac5, it was introduced in version v5.12 by commit d9b0dd54a1943f47a381a474f8ea2c94466110c0. For more details please see the references link.
null
2022-04-25T06:00:25.875500Z
2022-04-24T21:54:12.540721Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9b0dd54a1943f47a381a474f8ea2c94466110c0'}
Linux
GSD-2022-1000257
ARM: 9170/1: fix panic when kasan and kprobe are enabled
ARM: 9170/1: fix panic when kasan and kprobe are enabled This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.19 by commit 1515e72aae803fc6b466adf918e71c4e4c9d5b3d, it was introduced in version v2.6.25 by commit 35aa1df4328340f38edc46f00837f08d33d49f63. For more details please see the references link.
null
2022-02-19T03:06:16.135453Z
2022-02-18T22:02:08.473232Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/35aa1df4328340f38edc46f00837f08d33d49f63'}
Linux
GSD-2021-1002815
hamradio: improve the incomplete fix to avoid NPD
hamradio: improve the incomplete fix to avoid NPD This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.89 by commit 7dd52af1eb5798f590d9d9e1c56ed8f5744ee0ca. For more details please see the references link.
null
2022-01-11T06:53:35.453475Z
2021-12-30T02:44:39.465532Z
null
null
null
null
null
Linux
GSD-2021-1000828
bonding: init notify_work earlier to avoid uninitialized use
bonding: init notify_work earlier to avoid uninitialized use This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.273 by commit 818298d54aa0d7b3baf5635c94ff3b39b48d037f. For more details please see the references link.
null
2021-12-19T23:12:01.306993Z
2021-06-29T23:59:54.546178Z
null
null
null
null
null
Linux
GSD-2022-1002285
tpm: fix reference counting for struct tpm_chip
tpm: fix reference counting for struct tpm_chip This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit a27ed2f3695baf15f9b34d2d7a1f9fc105539a81, it was introduced in version v4.12 by commit fdc915f7f71939ad5a3dda3389b8d2d7a7c5ee66. For more details please see the references link.
null
2022-04-25T06:04:15.954393Z
2022-04-24T22:30:15.227354Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fdc915f7f71939ad5a3dda3389b8d2d7a7c5ee66'}
Linux
GSD-2022-1000742
netfilter: nf_tables: unregister flowtable hooks on netns exit
netfilter: nf_tables: unregister flowtable hooks on netns exit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.12 by commit b4fcc081e527aa2ce12e956912fc47e251f6bd27, it was introduced in version v5.5 by commit ff4bf2f42a40e7dff28379f085b64df322c70b45. For more details please see the references link.
null
2022-03-18T02:56:15.338425Z
2022-03-18T00:14:31.508765Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ff4bf2f42a40e7dff28379f085b64df322c70b45'}
Linux
GSD-2022-1001850
ext2: correct max file size computing
ext2: correct max file size computing This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 3813591bc046f8c4739a6be0c92acf05a1a1d729, it was introduced in version v5.1 by commit 1c2d14212b15a60300a2d4f6364753e87394c521. For more details please see the references link.
null
2022-04-25T06:22:01.348236Z
2022-04-24T21:48:06.610879Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c2d14212b15a60300a2d4f6364753e87394c521'}
Linux
GSD-2021-1001385
NFSv4: Initialise connection to the server in nfs4_alloc_client()
NFSv4: Initialise connection to the server in nfs4_alloc_client() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.198 by commit 743f6b973c8ba8a0a5ed15ab11e1d07fa00d5368, it was introduced in version v4.8 by commit 5c6e5b60aae4347223f176966455010a5715b863. For more details please see the references link.
null
2021-12-19T22:42:42.778845Z
2021-08-03T02:26:02.642318Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5c6e5b60aae4347223f176966455010a5715b863'}
Linux
GSD-2022-1000312
drop_monitor: fix data-race in dropmon_net_event / trace_napi_poll_hit
drop_monitor: fix data-race in dropmon_net_event / trace_napi_poll_hit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.268 by commit cbc0e2a098872c3d510aa492c5e487f52aea0e7c, it was introduced in version v2.6.31 by commit 4ea7e38696c7e798c47ebbecadfd392f23f814f9. For more details please see the references link.
null
2022-03-07T01:34:51.892510Z
2022-02-27T02:49:31.288168Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4ea7e38696c7e798c47ebbecadfd392f23f814f9'}
Linux
GSD-2021-1002403
seg6: fix the iif in the IPv6 socket control block
seg6: fix the iif in the IPv6 socket control block This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.258 by commit b16d412e5f79734033df04e97d7ea2f50a8e9fe3, it was introduced in version v4.14.98 by commit c630ec8bdadae9d557b1ceb9d6c06e149108a0d4. For more details please see the references link.
null
2021-12-19T23:46:49.160134Z
2021-12-19T19:35:46.774237Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c630ec8bdadae9d557b1ceb9d6c06e149108a0d4'}
Linux
GSD-2022-1001153
parisc: Fix non-access data TLB cache flush faults
parisc: Fix non-access data TLB cache flush faults This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit ddca4b82027e2a66333dd40fab21a4beff435c7e. For more details please see the references link.
null
2022-04-25T04:15:23.037772Z
2022-04-24T20:49:12.190281Z
null
null
null
null
null
Linux
GSD-2021-1002053
scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els()
scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit 96f0aebf29be25254fa585af43924e34aa21fd9a, it was introduced in version v3.11 by commit 8c0eb596baa51f2b43949c698c644727ef17805c. For more details please see the references link.
null
2021-12-20T00:19:51.453107Z
2021-11-14T15:17:42.301777Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c0eb596baa51f2b43949c698c644727ef17805c'}
Linux
GSD-2021-1000594
net: dsa: fix a crash if ->get_sset_count() fails
net: dsa: fix a crash if ->get_sset_count() fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit caff86f85512b8e0d9830e8b8b0dfe13c68ce5b6, it was introduced in version v4.7 by commit badf3ada60ab8f76f9488dc8f5c0c57f70682f5a. For more details please see the references link.
null
2021-12-20T00:49:54.893693Z
2021-06-04T19:44:10.676106Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/badf3ada60ab8f76f9488dc8f5c0c57f70682f5a'}
Linux
GSD-2022-1001503
cpufreq: qcom-cpufreq-nvmem: fix reading of PVS Valid fuse
cpufreq: qcom-cpufreq-nvmem: fix reading of PVS Valid fuse This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 22b1ea0421d486b8a7e49cad4a2f3c18f6305300, it was introduced in version v5.7 by commit a8811ec764f95a04ba82f6f457e28c5e9e36e36b. For more details please see the references link.
null
2022-04-25T06:11:07.903202Z
2022-04-24T21:18:02.234009Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a8811ec764f95a04ba82f6f457e28c5e9e36e36b'}
Linux
GSD-2021-1002287
perf bench futex: Fix memory leak of perf_cpu_map__new()
perf bench futex: Fix memory leak of perf_cpu_map__new() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.82 by commit 2ada5c0877f4aa9b0749e7777557d9a5d2973082, it was introduced in version v5.4 by commit 9c3516d1b850ea938b074df33e4c86d721c77720. For more details please see the references link.
null
2021-12-20T01:20:14.365096Z
2021-11-29T02:37:08.146124Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9c3516d1b850ea938b074df33e4c86d721c77720'}
Linux
GSD-2021-1001852
drm/msm: Fix null pointer dereference on pointer edp
drm/msm: Fix null pointer dereference on pointer edp This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.75 by commit 91a340768b012f5b910a203a805b97a345b3db37, it was introduced in version v4.0 by commit ab5b0107ccf3821a6837b0f2819270d6fa0b278f. For more details please see the references link.
null
2021-12-19T22:47:44.444899Z
2021-10-28T13:52:14.319362Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab5b0107ccf3821a6837b0f2819270d6fa0b278f'}
Linux
GSD-2021-1000740
ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed
ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.194 by commit 569496aa3776eea1ff0d49d0174ac1b7e861e107, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T01:13:54.749321Z
2021-06-25T00:00:24.399787Z
null
null
null
null
null
Linux
GSD-2021-1000310
KVM: VMX: Disable preemption when probing user return MSRs
KVM: VMX: Disable preemption when probing user return MSRs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.38 by commit 31f29749ee970c251b3a7e5b914108425940d089, it was introduced in version v5.5 by commit 4be5341026246870818e28b53202b001426a5aec. For more details please see the references link.
null
2021-12-20T00:37:38.820196Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4be5341026246870818e28b53202b001426a5aec'}
Linux
GSD-2022-1001387
mt76: fix monitor mode crash with sdio driver
mt76: fix monitor mode crash with sdio driver This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit c37b4cab3d97ef64b206fca4d9daabd9aff7356e. For more details please see the references link.
null
2022-04-25T05:30:45.442635Z
2022-04-24T21:09:38.673724Z
null
null
null
null
null
Linux
GSD-2022-1002401
drm/imx: Fix memory leak in imx_pd_connector_get_modes
drm/imx: Fix memory leak in imx_pd_connector_get_modes This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 38bf605bd8c83d942c8dcffaef3633b7d8b37549, it was introduced in version v4.8 by commit 76ecd9c9fb24b014a6f33fbb1287ede3be12158b. For more details please see the references link.
null
2022-04-25T05:44:22.518830Z
2022-04-24T22:43:28.685657Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/76ecd9c9fb24b014a6f33fbb1287ede3be12158b'}
Linux
GSD-2021-1001151
net: fddi: fix UAF in fza_probe
net: fddi: fix UAF in fza_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.5 by commit bdfbb51f7a437ae8ea91317a5c133ec13adf3c47, it was introduced in version v4.20 by commit 61414f5ec9834df8aa4f55c90de16b71a3d6ca8d. For more details please see the references link.
null
2021-12-19T23:08:55.682663Z
2021-08-03T01:30:47.097675Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61414f5ec9834df8aa4f55c90de16b71a3d6ca8d'}
Linux
GSD-2022-1002051
ext4: fix ext4_mb_mark_bb() with flex_bg with fast_commit
ext4: fix ext4_mb_mark_bb() with flex_bg with fast_commit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit cd6d719534af993210306f8a13f9cb3e615f7c8d. For more details please see the references link.
null
2022-04-25T06:17:50.610721Z
2022-04-24T22:05:56.826044Z
null
null
null
null
null
Linux
GSD-2021-1001501
blktrace: Fix uaf in blk_trace access after removing by sysfs
blktrace: Fix uaf in blk_trace access after removing by sysfs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.286 by commit 488da313edf3abea7f7733efe011c96b23740ab5, it was introduced in version v2.6.30 by commit c71a896154119f4ca9e89d6078f5f63ad60ef199. For more details please see the references link.
null
2021-12-19T23:33:19.773365Z
2021-10-19T16:21:06.069099Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c71a896154119f4ca9e89d6078f5f63ad60ef199'}
Linux
GSD-2022-1000596
moxart: fix potential use-after-free on remove path
moxart: fix potential use-after-free on remove path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.23 by commit af0e6c49438b1596e4be8a267d218a0c88a42323. For more details please see the references link.
null
2022-03-07T02:30:16.818901Z
2022-02-27T03:28:47.746542Z
null
null
null
null
null
Linux
GSD-2021-1001014
net/qla3xxx: fix schedule while atomic in ql_sem_spinlock
net/qla3xxx: fix schedule while atomic in ql_sem_spinlock This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit 2ed296c47e5c545a26bb774ec7a87e5369e6ddf9. For more details please see the references link.
null
2021-12-20T00:45:57.276447Z
2021-06-30T00:33:59.213568Z
null
null
null
null
null
Linux
GSD-2022-1000083
net: fix information leakage in /proc/net/ptype
net: fix information leakage in /proc/net/ptype This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.300 by commit be1ca30331c7923c6f376610c1bd6059be9b1908, it was introduced in version v2.6.26 by commit 2feb27dbe00cbb4f7d31f90acf6bd0d751dd0a50. For more details please see the references link.
null
2022-02-19T04:09:41.570383Z
2022-02-18T21:33:18.040157Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2feb27dbe00cbb4f7d31f90acf6bd0d751dd0a50'}
Linux
GSD-2022-1000579
IB/hfi1: Fix AIP early init panic
IB/hfi1: Fix AIP early init panic This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.22 by commit a3dd4d2682f2a796121609e5f3bbeb1243198c53, it was introduced in version v5.8 by commit d99dc602e2a55a99940ba9506a7126dfa54d54ea. For more details please see the references link.
null
2022-03-07T01:34:07.107489Z
2022-02-27T03:26:53.201887Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d99dc602e2a55a99940ba9506a7126dfa54d54ea'}
Linux
GSD-2021-1001444
memory: fsl_ifc: fix leak of IO mapping on probe failure
memory: fsl_ifc: fix leak of IO mapping on probe failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.276 by commit d0d04b95e8ed0223844a1d58497c686fe2e4a955, it was introduced in version v3.3 by commit a20cbdeffce247a2b6fb83cd8d22433994068565. For more details please see the references link.
null
2021-12-20T01:03:51.879303Z
2021-08-03T02:43:36.180287Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a20cbdeffce247a2b6fb83cd8d22433994068565'}
Linux
GSD-2022-1002114
watch_queue: Actually free the watch
watch_queue: Actually free the watch This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 9d92be1a09fbb3dd65600dbfe7eedb40e7228e4b, it was introduced in version v5.8 by commit c73be61cede5882f9605a852414db559c0ebedfd. For more details please see the references link.
null
2022-04-25T06:02:52.619874Z
2022-04-24T22:12:59.992531Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c73be61cede5882f9605a852414db559c0ebedfd'}
Linux
GSD-2022-1000129
phylib: fix potential use-after-free
phylib: fix potential use-after-free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.228 by commit 67d271760b037ce0806d687ee6057edc8afd4205, it was introduced in version v4.16 by commit bafbdd527d569c8200521f2f7579f65a044271be. For more details please see the references link.
null
2022-02-19T02:33:33.056753Z
2022-02-18T21:44:21.776130Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bafbdd527d569c8200521f2f7579f65a044271be'}
Linux
GSD-2021-1001917
drm/msm: Fix null pointer dereference on pointer edp
drm/msm: Fix null pointer dereference on pointer edp This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.290 by commit f175b9a83e5c252d7c74acddc792840016caae0a, it was introduced in version v4.0 by commit ab5b0107ccf3821a6837b0f2819270d6fa0b278f. For more details please see the references link.
null
2021-12-20T00:11:01.611210Z
2021-11-14T15:11:37.427591Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab5b0107ccf3821a6837b0f2819270d6fa0b278f'}
Linux
GSD-2021-1000605
serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'
serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit 6a931ceb0b9401fe18d0c500e08164bf9cc7be4b, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T23:49:20.479742Z
2021-06-04T19:46:25.219411Z
null
null
null
null
null
Linux
GSD-2021-1002638
dm btree remove: fix use after free in rebalance_children()
dm btree remove: fix use after free in rebalance_children() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.259 by commit b03abd0aa09c05099f537cb05b8460c4298f0861. For more details please see the references link.
null
2022-01-11T05:53:40.832194Z
2021-12-27T05:28:25.055325Z
null
null
null
null
null
Linux
GSD-2022-1000980
net/smc: Fix NULL pointer dereference in smc_pnet_find_ib()
net/smc: Fix NULL pointer dereference in smc_pnet_find_ib() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.4 by commit 22025513ced3d599ee8b24169141c95cf2467a4a, it was introduced in version v5.1 by commit af5f60c7e3d593c2fa31b9a62c16eae75f074de3. For more details please see the references link.
null
2022-04-25T06:07:07.987939Z
2022-04-24T20:36:49.603226Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/af5f60c7e3d593c2fa31b9a62c16eae75f074de3'}
Linux
GSD-2022-1001692
net: sfc: add missing xdp queue reinitialization
net: sfc: add missing xdp queue reinitialization This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit ed7a824fda8732578d1014fad1f7fb0363705090, it was introduced in version v5.5 by commit 3990a8fffbdad5765f47ea593f9de66c91762059. For more details please see the references link.
null
2022-04-25T03:09:27.988825Z
2022-04-24T21:35:43.858696Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3990a8fffbdad5765f47ea593f9de66c91762059'}
Linux
GSD-2022-1001368
NFS: Avoid writeback threads getting stuck in mempool_alloc()
NFS: Avoid writeback threads getting stuck in mempool_alloc() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 1b3fa9a3c420c31e77b406ddc28f3a627100516c. For more details please see the references link.
null
2022-04-25T04:51:20.378995Z
2022-04-24T21:08:26.945770Z
null
null
null
null
null
Linux
GSD-2021-1000255
mt76: mt7921: fix memory leak in mt7921_coredump_work
mt76: mt7921: fix memory leak in mt7921_coredump_work This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 4811226374453607175ea057777faa7e7f752204, it was introduced in version v5.12 by commit 1c099ab44727c8e42fe4de4d91b53cec3ef02860. For more details please see the references link.
null
2021-12-19T21:47:23.636459Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c099ab44727c8e42fe4de4d91b53cec3ef02860'}
Linux
GSD-2021-1002268
usb: host: ohci-tmio: check return value after calling platform_get_resource()
usb: host: ohci-tmio: check return value after calling platform_get_resource() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.162 by commit f98986b7acb4219f95789095eced93ed69d81d35. For more details please see the references link.
null
2021-12-20T00:45:13.578002Z
2021-11-29T02:36:12.127333Z
null
null
null
null
null
Linux
GSD-2022-1001738
usb: cdnsp: fix cdnsp_decode_trb function to properly handle ret value
usb: cdnsp: fix cdnsp_decode_trb function to properly handle ret value This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 052fb1c9ddfbee13ec73e73532be66c08531c26b. For more details please see the references link.
null
2022-04-25T05:03:17.902653Z
2022-04-24T21:38:28.767333Z
null
null
null
null
null
Linux
GSD-2021-1002792
IB/qib: Fix memory leak in qib_user_sdma_queue_pkts()
IB/qib: Fix memory leak in qib_user_sdma_queue_pkts() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.169 by commit 79dcbd8176152b860028b62f81a635d987365752, it was introduced in version v5.4.157 by commit 0f8cdfff06829a0b0348b6debc29ff6a61967724. For more details please see the references link.
null
2022-01-11T05:57:40.032139Z
2021-12-30T02:43:36.773683Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0f8cdfff06829a0b0348b6debc29ff6a61967724'}
Linux
GSD-2021-1002842
f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()
f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.12 by commit a8a9d753edd7f71e6a2edaa580d8182530b68791. For more details please see the references link.
null
2022-01-11T07:52:59.943381Z
2021-12-30T02:45:52.550926Z
null
null
null
null
null
Linux
GSD-2021-1001297
drm/amd/display: Avoid HDCP over-read and corruption
drm/amd/display: Avoid HDCP over-read and corruption This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.51 by commit c5b518f4b98dbb2bc31b6a55e6aaa1e0e2948f2e. For more details please see the references link.
null
2021-12-19T22:23:36.203780Z
2021-08-03T02:00:45.754324Z
null
null
null
null
null
Linux
GSD-2022-1000200
powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending
powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.96 by commit 55402a4618721f350a9ab660bb42717d8aa18e7c, it was introduced in version v5.10.94 by commit ef798cd035f316a537fee8ed170c127f12407085. For more details please see the references link.
null
2022-02-19T04:35:34.248954Z
2022-02-18T21:54:46.751539Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef798cd035f316a537fee8ed170c127f12407085'}
Linux
GSD-2022-1002397
mm/mempolicy: fix mpol_new leak in shared_policy_replace
mm/mempolicy: fix mpol_new leak in shared_policy_replace This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 5e16dc5378abd749a836daa9ee4ab2c8d2668999, it was introduced in version v3.8 by commit 42288fe366c4f1ce7522bc9f27d0bc2a81c55264. For more details please see the references link.
null
2022-04-25T05:24:20.951232Z
2022-04-24T22:43:06.521915Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/42288fe366c4f1ce7522bc9f27d0bc2a81c55264'}
Linux
GSD-2022-1000650
ASoC: hdmi-codec: Fix OOB memory accesses
ASoC: hdmi-codec: Fix OOB memory accesses This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.8 by commit 1552e66be325a21d7eff49f46013fb402165a0ac. For more details please see the references link.
null
2022-03-07T03:38:42.804956Z
2022-02-27T03:36:10.958510Z
null
null
null
null
null
Linux
GSD-2022-1001942
netfilter: nf_tables: initialize registers in nft_do_chain()
netfilter: nf_tables: initialize registers in nft_do_chain() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.32 by commit fafb904156fbb8f1dd34970cd5223e00b47c33be, it was introduced in version v3.13 by commit 96518518cc417bb0a8c80b9fb736202e28acdf96. For more details please see the references link.
null
2022-04-25T06:07:21.263379Z
2022-04-24T21:56:50.417879Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/96518518cc417bb0a8c80b9fb736202e28acdf96'}
Linux
GSD-2021-1002141
comedi: vmk80xx: fix transfer-buffer overflows
comedi: vmk80xx: fix transfer-buffer overflows This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.18 by commit 278484ae93297b1bb1ce755f9d3b6d95a48c7d47, it was introduced in version v2.6.31 by commit 985cafccbf9b7f862aa1c5ee566801e18b5161fb. For more details please see the references link.
null
2021-12-19T22:36:48.670147Z
2021-11-14T15:21:44.011557Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/985cafccbf9b7f862aa1c5ee566801e18b5161fb'}
Linux
GSD-2021-1000486
net/nfc: fix use-after-free llcp_sock_bind/connect
net/nfc: fix use-after-free llcp_sock_bind/connect This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.269 by commit ccddad6dd28530e716448e594c9ca7c76ccd0570, it was introduced in version v4.9.267 by commit 18013007b596771bf5f5e7feee9586fb0386ad14. For more details please see the references link.
null
2021-12-19T22:48:12.495209Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/18013007b596771bf5f5e7feee9586fb0386ad14'}
Linux
GSD-2022-1001411
ath11k: pci: fix crash on suspend if board file is not found
ath11k: pci: fix crash on suspend if board file is not found This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit f3c5ef433da82d257337424b3647ce9dcb37d4b5. For more details please see the references link.
null
2022-04-25T06:00:55.177967Z
2022-04-24T21:11:00.826923Z
null
null
null
null
null
Linux
GSD-2021-1002511
ALSA: pcm: oss: Fix negative period/buffer sizes
ALSA: pcm: oss: Fix negative period/buffer sizes This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.85 by commit 02b2b691b77cd7b951fa7b6c9d44d4e472cdc823. For more details please see the references link.
null
2021-12-20T00:57:35.604579Z
2021-12-19T19:40:35.342223Z
null
null
null
null
null
Linux
GSD-2022-1001041
netfilter: conntrack: revisit gc autotuning
netfilter: conntrack: revisit gc autotuning This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 592e57591826f3d09c28d755a39ea8e9d13705ad. For more details please see the references link.
null
2022-04-25T04:00:52.860421Z
2022-04-24T20:41:49.564420Z
null
null
null
null
null