ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2022-1001554
drm/selftests/test-drm_dp_mst_helper: Fix memory leak in sideband_msg_req_encode_decode
drm/selftests/test-drm_dp_mst_helper: Fix memory leak in sideband_msg_req_encode_decode This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 3ee7db7ea79bd318614a5ce5bcbbab4b7976ff98, it was introduced in version v5.11 by commit 09234b88ef5598252d1cee37e4d7b26a48b6557f. For more details please see the references link.
null
2022-04-25T06:27:57.037685Z
2022-04-24T21:23:04.840829Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/09234b88ef5598252d1cee37e4d7b26a48b6557f'}
Linux
GSD-2021-1002004
can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv
can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.156 by commit a0e47d2833b4f65e6c799f28c6b636d36b8b936d, it was introduced in version v5.4 by commit 9d71dd0c70099914fcd063135da3c580865e924c. For more details please see the references link.
null
2021-12-19T23:04:27.565736Z
2021-11-14T15:15:33.891986Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9d71dd0c70099914fcd063135da3c580865e924c'}
Linux
GSD-2021-1000039
ARM: footbridge: fix PCI interrupt mapping
ARM: footbridge: fix PCI interrupt mapping This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.114 by commit 871b569a3e67f570df9f5ba195444dc7c621293b, it was introduced in version v4.13 by commit 30fdfb929e82450bbf3d0e0aba56efbc29b52b52. For more details please see the references link.
null
2021-12-19T23:00:06.151448Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/30fdfb929e82450bbf3d0e0aba56efbc29b52b52'}
Linux
GSD-2021-1000193
KVM: nVMX: Always make an attempt to map eVMCS after migration
KVM: nVMX: Always make an attempt to map eVMCS after migration This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit bd0e8455b85b651a4c77de9616e307129b15aaa7, it was introduced in version v5.11 by commit f2c7ef3ba9556d62a7e2bb23b563c6510007d55c. For more details please see the references link.
null
2021-12-19T22:32:51.349094Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f2c7ef3ba9556d62a7e2bb23b563c6510007d55c'}
Linux
GSD-2022-1001104
block: Fix the maximum minor value is blk_alloc_ext_minor()
block: Fix the maximum minor value is blk_alloc_ext_minor() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit fbe2cc4525480ddd20c866bb5c0578071e01451a, it was introduced in version v5.11 by commit 22ae8ce8b89241c94ac00c237752c0ffa37ba5ae. For more details please see the references link.
null
2022-04-25T06:46:07.327306Z
2022-04-24T20:45:40.813942Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/22ae8ce8b89241c94ac00c237752c0ffa37ba5ae'}
Linux
GSD-2021-1002454
can: sja1000: fix use after free in ems_pcmcia_add_card()
can: sja1000: fix use after free in ems_pcmcia_add_card() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.165 by commit 1a295fea90e1acbe80c6d4940f5ff856edcd6bec, it was introduced in version v3.2 by commit fd734c6f25aea4b2b44b045e489aec67b388577e. For more details please see the references link.
null
2021-12-19T23:46:15.848686Z
2021-12-19T19:38:04.691956Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fd734c6f25aea4b2b44b045e489aec67b388577e'}
Linux
GSD-2021-1000469
net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send
net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.233 by commit dc1b438a35773d030be0ee80d9c635c3e558a322, it was introduced in version v4.9 by commit b9b17debc69d27cd55e21ee51a5ba7fc50a426cf. For more details please see the references link.
null
2021-12-20T00:08:58.770871Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b9b17debc69d27cd55e21ee51a5ba7fc50a426cf'}
Linux
GSD-2022-1000345
vt_ioctl: fix array_index_nospec in vt_setactivate
vt_ioctl: fix array_index_nospec in vt_setactivate This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.180 by commit ae3d57411562260ee3f4fd5e875f410002341104. For more details please see the references link.
null
2022-03-07T01:32:02.615465Z
2022-02-27T02:53:56.365094Z
null
null
null
null
null
Linux
GSD-2022-1002378
ALSA: oss: Fix PCM OSS buffer allocation overflow
ALSA: oss: Fix PCM OSS buffer allocation overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.237 by commit a63af1baf0a5e11827db60e3127f87e437cab6e5. For more details please see the references link.
null
2022-04-25T05:14:27.525214Z
2022-04-24T22:40:52.610455Z
null
null
null
null
null
Linux
GSD-2021-1001628
net_sched: fix NULL deref in fifo_set_limit()
net_sched: fix NULL deref in fifo_set_limit() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.73 by commit acff2d182c0768a713cee77442caeb07668bd68f, it was introduced in version v2.6.27 by commit fb0305ce1b03f6ff17f84f2c63daccecb45f2805. For more details please see the references link.
null
2021-12-20T02:17:23.360335Z
2021-10-19T16:28:57.616438Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb0305ce1b03f6ff17f84f2c63daccecb45f2805'}
Linux
GSD-2021-1001782
drm/msm: Fix null pointer dereference on pointer edp
drm/msm: Fix null pointer dereference on pointer edp This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.288 by commit bacac7d26849c8e903ceb7466d9ce8dc3c2797eb, it was introduced in version v4.0 by commit ab5b0107ccf3821a6837b0f2819270d6fa0b278f. For more details please see the references link.
null
2021-12-19T23:39:44.734091Z
2021-10-28T13:48:37.231276Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab5b0107ccf3821a6837b0f2819270d6fa0b278f'}
Linux
GSD-2021-1000890
dm verity: fix require_signatures module_param permissions
dm verity: fix require_signatures module_param permissions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.126 by commit ece8ad75e31856f429b90cba30c8c6ff6a82e0dd. For more details please see the references link.
null
2021-12-20T00:39:51.992185Z
2021-06-30T00:04:43.209835Z
null
null
null
null
null
Linux
GSD-2022-1000715
riscv: Fix config KASAN && SPARSEMEM && !SPARSE_VMEMMAP
riscv: Fix config KASAN && SPARSEMEM && !SPARSE_VMEMMAP This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.13 by commit d1c3ac0f8cedd75a2a8c35327e0ea15f9abeed3e, it was introduced in version v5.6 by commit 8ad8b72721d0f07fa02dbe71f901743f9c71c8e6. For more details please see the references link.
null
2022-03-18T02:55:39.507192Z
2022-03-18T00:11:55.797850Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ad8b72721d0f07fa02dbe71f901743f9c71c8e6'}
Linux
GSD-2022-1001807
net: hns3: add vlan list lock to protect vlan list
net: hns3: add vlan list lock to protect vlan list This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 30f0ff7176efe8ac6c55f85bce26ed58bb608758, it was introduced in version v5.1 by commit c6075b193462d9a3930fb41f587f94720658752a. For more details please see the references link.
null
2022-04-25T05:18:54.096007Z
2022-04-24T21:43:35.589627Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6075b193462d9a3930fb41f587f94720658752a'}
Linux
GSD-2021-1001278
usb: common: usb-conn-gpio: fix NULL pointer dereference of charger
usb: common: usb-conn-gpio: fix NULL pointer dereference of charger This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.52 by commit 8e8d910e9a3a7fba86140aff4924c30955ab228b. For more details please see the references link.
null
2021-12-19T22:25:34.343787Z
2021-08-03T01:55:56.731876Z
null
null
null
null
null
Linux
GSD-2021-1002843
phonet/pep: refuse to enable an unbound pipe
phonet/pep: refuse to enable an unbound pipe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.12 by commit 53ccdc73eedaf0e922c45b569b797d2796fbaafa. For more details please see the references link.
null
2022-01-11T05:47:57.484597Z
2021-12-30T02:45:55.061283Z
null
null
null
null
null
Linux
GSD-2022-1000201
drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc
drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.96 by commit 93a6e920d8ccb4df846c03b6e72f7e08843d294c, it was introduced in version v5.8 by commit 4259ff7ae509ed880b3a7bb685972c3a3bf4b74b. For more details please see the references link.
null
2022-02-19T05:06:15.734062Z
2022-02-18T21:54:53.581272Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4259ff7ae509ed880b3a7bb685972c3a3bf4b74b'}
Linux
GSD-2021-1001296
wl1251: Fix possible buffer overflow in wl1251_cmd_scan
wl1251: Fix possible buffer overflow in wl1251_cmd_scan This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.51 by commit c5e4a10d7bd5d4f419d8b9705dff60cf69b302a1. For more details please see the references link.
null
2021-12-19T22:18:37.119414Z
2021-08-03T02:00:24.684482Z
null
null
null
null
null
Linux
GSD-2022-1002396
mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0)
mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0) This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit eeaf28e2a0128147d687237e59d5407ee1b14693. For more details please see the references link.
null
2022-04-25T05:22:49.079584Z
2022-04-24T22:42:56.468281Z
null
null
null
null
null
Linux
GSD-2022-1000651
ASoC: ops: Reject out of bounds values in snd_soc_put_volsw()
ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.8 by commit bb72d2dda85564c66d909108ea6903937a41679d. For more details please see the references link.
null
2022-03-07T02:44:36.052418Z
2022-02-27T03:36:17.708167Z
null
null
null
null
null
Linux
GSD-2022-1001943
drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free()
drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.32 by commit b094fece3810c71ceee6f0921676cb65d4e68c5a, it was introduced in version v5.13 by commit 377f8331d0565e6f71ba081c894029a92d0c7e77. For more details please see the references link.
null
2022-04-25T06:11:26.014486Z
2022-04-24T21:56:54.558350Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/377f8331d0565e6f71ba081c894029a92d0c7e77'}
Linux
GSD-2021-1002140
comedi: dt9812: fix DMA buffers on stack
comedi: dt9812: fix DMA buffers on stack This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.18 by commit 3ac273d154d634e2034508a14db82a95d7ad12ed, it was introduced in version v2.6.29 by commit 63274cd7d38a3322d90b66a5bc976de1fb899051. For more details please see the references link.
null
2021-12-19T22:43:55.089575Z
2021-11-14T15:21:41.562908Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63274cd7d38a3322d90b66a5bc976de1fb899051'}
Linux
GSD-2022-1001410
ath11k: mhi: use mhi_sync_power_up()
ath11k: mhi: use mhi_sync_power_up() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 3fd7d50384c3808b7f7fa135aa9bb5feb1cb9849. For more details please see the references link.
null
2022-04-25T03:27:30.616552Z
2022-04-24T21:10:57.956871Z
null
null
null
null
null
Linux
GSD-2021-1000487
crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init
crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.269 by commit f4c4e07140687f42bfa40e091bb4a55d7960ce4d, it was introduced in version v4.7 by commit 25c6ffb249f612c56a48ce48a3887adf57b8f4bd. For more details please see the references link.
null
2021-12-20T00:46:49.287461Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/25c6ffb249f612c56a48ce48a3887adf57b8f4bd'}
Linux
GSD-2021-1002510
net/sched: fq_pie: prevent dismantle issue
net/sched: fq_pie: prevent dismantle issue This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.85 by commit 2a51edaf5cc563574878b93d7ef3d5955dda7030, it was introduced in version v5.6 by commit ec97ecf1ebe485a17cd8395a5f35e6b80b57665a. For more details please see the references link.
null
2021-12-20T00:59:03.596773Z
2021-12-19T19:40:33.114421Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ec97ecf1ebe485a17cd8395a5f35e6b80b57665a'}
Linux
GSD-2022-1001040
ceph: fix inode reference leakage in ceph_get_snapdir()
ceph: fix inode reference leakage in ceph_get_snapdir() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit b2d9bb3f06abddefdfa740b0a604575b6797e1bf. For more details please see the references link.
null
2022-04-25T05:05:26.588081Z
2022-04-24T20:41:46.671652Z
null
null
null
null
null
Linux
GSD-2022-1001555
bpf: Fix UAF due to race between btf_try_get_module and load_module
bpf: Fix UAF due to race between btf_try_get_module and load_module This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit d7fccf264b1a785525b366a5b7f8113c756187ad, it was introduced in version v5.12 by commit 541c3bad8dc51b253ba8686d0cd7628e6b9b5f4c. For more details please see the references link.
null
2022-04-25T07:41:23.580496Z
2022-04-24T21:23:09.044006Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/541c3bad8dc51b253ba8686d0cd7628e6b9b5f4c'}
Linux
GSD-2021-1000038
netfilter: nft_limit: avoid possible divide error in nft_limit_init
netfilter: nft_limit: avoid possible divide error in nft_limit_init This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.114 by commit 01fb1626b620cb37a65ad08e0f626489e8f042ef, it was introduced in version v4.13 by commit c26844eda9d4fdbd266660e3b3de2d0270e3a1ed. For more details please see the references link.
null
2021-12-19T23:23:06.827108Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c26844eda9d4fdbd266660e3b3de2d0270e3a1ed'}
Linux
GSD-2021-1002005
ocfs2: fix data corruption after conversion from inline format
ocfs2: fix data corruption after conversion from inline format This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.156 by commit b05caf023b14cbed9223bb5b48ecc7bffe38f632, it was introduced in version v5.4.75 by commit f8a6a2ed4b7d1c3c8631eeb6d00572bc853094a8. For more details please see the references link.
null
2021-12-19T22:30:11.180038Z
2021-11-14T15:15:36.196506Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f8a6a2ed4b7d1c3c8631eeb6d00572bc853094a8'}
Linux
GSD-2022-1001105
watch_queue: Free the page array when watch_queue is dismantled
watch_queue: Free the page array when watch_queue is dismantled This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 375cd2536494cfbcdda84ae8b3e35bf19d0250b9, it was introduced in version v5.8 by commit c73be61cede5882f9605a852414db559c0ebedfd. For more details please see the references link.
null
2022-04-25T06:26:09.506717Z
2022-04-24T20:45:45.662225Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c73be61cede5882f9605a852414db559c0ebedfd'}
Linux
GSD-2021-1000192
iio: core: fix ioctl handlers removal
iio: core: fix ioctl handlers removal This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit ab6c935ba3a04317632f3b8b68675bdbaf395303, it was introduced in version v5.11 by commit 8dedcc3eee3aceb37832176f0a1b03d5687acda3. For more details please see the references link.
null
2021-12-20T01:10:10.455488Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8dedcc3eee3aceb37832176f0a1b03d5687acda3'}
Linux
GSD-2021-1000468
ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook
ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.233 by commit ed1f67465327cec4457bb988775245b199da86e6, it was introduced in version v4.7 by commit 1879445dfa7bbd6fe21b09c5cc72f4934798afed. For more details please see the references link.
null
2021-12-20T01:19:32.547835Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1879445dfa7bbd6fe21b09c5cc72f4934798afed'}
Linux
GSD-2021-1002455
nfp: Fix memory leak in nfp_cpp_area_cache_add()
nfp: Fix memory leak in nfp_cpp_area_cache_add() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.165 by commit 2e0e072e62fdaf7816220af08e05c020f0fcb77a, it was introduced in version v4.11 by commit 4cb584e0ee7df70fd0376aee60cf701855ea8c81. For more details please see the references link.
null
2021-12-20T00:13:28.874054Z
2021-12-19T19:38:07.016584Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4cb584e0ee7df70fd0376aee60cf701855ea8c81'}
Linux
GSD-2022-1002379
mac80211: fix potential double free on mesh join
mac80211: fix potential double free on mesh join This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.237 by commit 273ebddc5fda2967492cb0b6cdd7d81cfb821b76, it was introduced in version v4.19.137 by commit 37bccfa89559a70c044b5ccde3c916a91388e14a. For more details please see the references link.
null
2022-04-25T06:46:45.755679Z
2022-04-24T22:40:57.277439Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/37bccfa89559a70c044b5ccde3c916a91388e14a'}
Linux
GSD-2022-1000344
perf: Fix list corruption in perf_cgroup_switch()
perf: Fix list corruption in perf_cgroup_switch() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.180 by commit a2ed7b29d0673ba361546e2d87dbbed149456c45, it was introduced in version v4.11 by commit 058fe1c0440e68a1ba3c2270ae43e9f0298b27d8. For more details please see the references link.
null
2022-03-07T01:43:49.127097Z
2022-02-27T02:53:49.629374Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/058fe1c0440e68a1ba3c2270ae43e9f0298b27d8'}
Linux
GSD-2021-1001629
phy: mdio: fix memory leak
phy: mdio: fix memory leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.73 by commit 0d2dd40a7be61b89a7c99dae8ee96389d27b413a, it was introduced in version v2.6.28 by commit 46abc02175b3c246dd5141d878f565a8725060c9. For more details please see the references link.
null
2021-12-20T01:17:34.398044Z
2021-10-19T16:29:00.075570Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/46abc02175b3c246dd5141d878f565a8725060c9'}
Linux
GSD-2022-1000714
riscv: Fix config KASAN && DEBUG_VIRTUAL
riscv: Fix config KASAN && DEBUG_VIRTUAL This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.13 by commit 97ae45ef88e9f6bd4d451ddd594d2606f3bc9a07, it was introduced in version v5.6 by commit 8ad8b72721d0f07fa02dbe71f901743f9c71c8e6. For more details please see the references link.
null
2022-03-18T04:02:27.002443Z
2022-03-18T00:11:50.637853Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ad8b72721d0f07fa02dbe71f901743f9c71c8e6'}
Linux
GSD-2022-1001806
net/x25: Fix null-ptr-deref caused by x25_disconnect
net/x25: Fix null-ptr-deref caused by x25_disconnect This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 409570a619c1cda2e0fde6018a256b9e3d3ba0ee, it was introduced in version v5.7 by commit 4becb7ee5b3d2829ed7b9261a245a77d5b7de902. For more details please see the references link.
null
2022-04-25T06:46:06.361877Z
2022-04-24T21:43:29.568440Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4becb7ee5b3d2829ed7b9261a245a77d5b7de902'}
Linux
GSD-2021-1001783
NFC: digital: fix possible memory leak in digital_in_send_sdd_req()
NFC: digital: fix possible memory leak in digital_in_send_sdd_req() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.288 by commit 88c890b0b9a1fb9fcd01c61ada515e8b636c34f9, it was introduced in version v3.13 by commit 2c66daecc4092e6049673c281b2e6f0d5e59a94c. For more details please see the references link.
null
2021-12-19T23:00:49.055290Z
2021-10-28T13:48:40.094210Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c66daecc4092e6049673c281b2e6f0d5e59a94c'}
Linux
GSD-2021-1000891
spi: bcm2835: Fix out-of-bounds access with more than 4 slaves
spi: bcm2835: Fix out-of-bounds access with more than 4 slaves This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.126 by commit b5502580cf958b094f3b69dfe4eece90eae01fbc, it was introduced in version v5.4 by commit 571e31fa60b3697d5db26140e16d5c45c51c9815. For more details please see the references link.
null
2021-12-20T00:26:20.039611Z
2021-06-30T00:04:47.615924Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/571e31fa60b3697d5db26140e16d5c45c51c9815'}
Linux
GSD-2021-1001279
ALSA: usx2y: Don't call free_pages_exact() with NULL address
ALSA: usx2y: Don't call free_pages_exact() with NULL address This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.52 by commit 7d7f30cf182e55023fa8fde4c084b2d37c6be69d. For more details please see the references link.
null
2021-12-19T22:32:52.821593Z
2021-08-03T01:56:11.985216Z
null
null
null
null
null
Linux
GSD-2021-1002286
iavf: free q_vectors before queues in iavf_disable_vf
iavf: free q_vectors before queues in iavf_disable_vf This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.82 by commit 78638b47132244e3934dc5dc79f6372d5ce8e98c, it was introduced in version v4.13 by commit 65c7006f234c9ede887d468f595f259a5c5cc552. For more details please see the references link.
null
2021-12-20T01:40:16.544001Z
2021-11-29T02:37:05.799437Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/65c7006f234c9ede887d468f595f259a5c5cc552'}
Linux
GSD-2021-1001853
mlxsw: thermal: Fix out-of-bounds memory accesses
mlxsw: thermal: Fix out-of-bounds memory accesses This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.75 by commit e59d839743b50cb1d3f42a786bea48cc5621d254, it was introduced in version v4.10 by commit a50c1e35650b929500bd89be61c89d95a267ce56. For more details please see the references link.
null
2021-12-19T22:29:35.552821Z
2021-10-28T13:52:17.390154Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a50c1e35650b929500bd89be61c89d95a267ce56'}
Linux
GSD-2021-1000741
pid: take a reference when initializing `cad_pid`
pid: take a reference when initializing `cad_pid` This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.194 by commit d106f05432e60f9f62d456ef017687f5c73cb414, it was introduced in version v2.6.19 by commit 9ec52099e4b8678a60e9f93e41ad87885d64f3e6. For more details please see the references link.
null
2021-12-19T22:27:53.640536Z
2021-06-25T00:00:28.213937Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9ec52099e4b8678a60e9f93e41ad87885d64f3e6'}
Linux
GSD-2022-1001386
powerpc/secvar: fix refcount leak in format_show()
powerpc/secvar: fix refcount leak in format_show() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit c105ffb6b9744158e37e9f81f0f38861951d1c1f. For more details please see the references link.
null
2022-04-25T06:13:37.605170Z
2022-04-24T21:09:35.745602Z
null
null
null
null
null
Linux
GSD-2021-1000311
drm/i915: Fix crash in auto_retire
drm/i915: Fix crash in auto_retire This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.38 by commit 805c990a9c54b9451d3daff640b850909c31ab9d, it was introduced in version v5.8 by commit 229007e02d697b0662f85378aae53531b0dfea05. For more details please see the references link.
null
2021-12-19T23:28:36.163395Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/229007e02d697b0662f85378aae53531b0dfea05'}
Linux
GSD-2022-1002400
virtio_console: eliminate anonymous module_init & module_exit
virtio_console: eliminate anonymous module_init & module_exit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 7deaddb704713608e0ae559e27185581b9af71a0. For more details please see the references link.
null
2022-04-25T05:51:50.645579Z
2022-04-24T22:43:20.647030Z
null
null
null
null
null
Linux
GSD-2021-1001150
cifs: prevent NULL deref in cifs_compose_mount_options()
cifs: prevent NULL deref in cifs_compose_mount_options() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.5 by commit ae3d181f4e912f51af7776ea165f199b16fc165d. For more details please see the references link.
null
2021-12-19T23:57:59.061356Z
2021-08-03T01:30:42.182114Z
null
null
null
null
null
Linux
GSD-2022-1002050
ext4: don't BUG if someone dirty pages without asking ext4 first
ext4: don't BUG if someone dirty pages without asking ext4 first This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 330d0e44fc5a47c27df958ecdd4693a3cb1d8b81. For more details please see the references link.
null
2022-04-25T06:53:19.308849Z
2022-04-24T22:05:53.930656Z
null
null
null
null
null
Linux
GSD-2022-1000597
tipc: improve size validations for received domain records
tipc: improve size validations for received domain records This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.23 by commit 1f1788616157b0222b0c2153828b475d95e374a7, it was introduced in version v4.8 by commit 35c55c9877f8de0ab129fa1a309271d0ecc868b9. For more details please see the references link.
null
2022-03-07T01:39:16.129395Z
2022-02-27T03:28:54.558272Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/35c55c9877f8de0ab129fa1a309271d0ecc868b9'}
Linux
GSD-2021-1001500
mac80211: fix use-after-free in CCMP/GCMP RX
mac80211: fix use-after-free in CCMP/GCMP RX This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.286 by commit 447d001b875d0e7f211c4ba004916028da994258, it was introduced in version v4.4.271 by commit 608b0a2ae928a74a2f89e02227339dd79cdb63cf. For more details please see the references link.
null
2021-12-19T22:09:16.790537Z
2021-10-19T16:21:02.986648Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/608b0a2ae928a74a2f89e02227339dd79cdb63cf'}
Linux
GSD-2022-1000082
scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put()
scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.300 by commit 262550f29c750f7876b6ed1244281e72b64ebffb, it was introduced in version v3.2 by commit 0cbf32e1681d870632a1772601cbaadd996dc978. For more details please see the references link.
null
2022-02-19T04:47:08.449675Z
2022-02-18T21:33:11.402834Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0cbf32e1681d870632a1772601cbaadd996dc978'}
Linux
GSD-2021-1001015
net:sfc: fix non-freed irq in legacy irq mode
net:sfc: fix non-freed irq in legacy irq mode This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit 81c4d1d83f88e15b26f4522a35cba6ffd8c5dfdd. For more details please see the references link.
null
2021-12-20T01:38:28.496722Z
2021-06-30T00:34:03.165662Z
null
null
null
null
null
Linux
GSD-2022-1000578
dma-buf: heaps: Fix potential spectre v1 gadget
dma-buf: heaps: Fix potential spectre v1 gadget This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.22 by commit 24f8e12d965b24f8aea762589e0e9fe2025c005e, it was introduced in version v5.5 by commit a69b0e855d3fd278ff6f09a23e1edf929538e304. For more details please see the references link.
null
2022-03-07T01:31:29.025615Z
2022-02-27T03:26:46.372563Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a69b0e855d3fd278ff6f09a23e1edf929538e304'}
Linux
GSD-2021-1001445
virtio_console: Assure used length from device is limited
virtio_console: Assure used length from device is limited This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.276 by commit 9e2b8368b2079437c6840f3303cb0b7bc9b896ee. For more details please see the references link.
null
2021-12-20T01:34:14.484010Z
2021-08-03T02:43:51.271377Z
null
null
null
null
null
Linux
GSD-2022-1000128
drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable
drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.228 by commit ca63eeb70fcb53c42e1fe54e1735a54d8e7759fd, it was introduced in version v4.3 by commit 5c8290284402bf7d2c12269402b3177b899c78b7. For more details please see the references link.
null
2022-02-19T04:58:48.457526Z
2022-02-18T21:44:15.071784Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5c8290284402bf7d2c12269402b3177b899c78b7'}
Linux
GSD-2022-1002115
f2fs: fix missing free nid in f2fs_handle_failed_inode
f2fs: fix missing free nid in f2fs_handle_failed_inode This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 1a11a873749c6375bb668953fa1a196d8538d26b, it was introduced in version v4.19 by commit 7735730d39d75e70476c1b01435b9b1f41637f0e. For more details please see the references link.
null
2022-04-25T04:25:40.401625Z
2022-04-24T22:13:06.404275Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7735730d39d75e70476c1b01435b9b1f41637f0e'}
Linux
GSD-2022-1000981
net/smc: use memcpy instead of snprintf to avoid out of bounds read
net/smc: use memcpy instead of snprintf to avoid out of bounds read This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11 by commit 8a4465368964b4fbaf084760c94c7aabf61059fb, it was introduced in version v5.11 by commit a3db10efcc4cc9c03a6375920179ade75ea2df7a. For more details please see the references link.
null
2022-04-25T07:41:48.527629Z
2022-04-24T20:36:55.105512Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a3db10efcc4cc9c03a6375920179ade75ea2df7a'}
Linux
GSD-2022-1001693
net/tls: fix slab-out-of-bounds bug in decrypt_internal
net/tls: fix slab-out-of-bounds bug in decrypt_internal This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 6e2f1b033b17dedda51d465861b69e58317d6343, it was introduced in version v5.2 by commit f295b3ae9f5927e084bd5decdff82390e3471801. For more details please see the references link.
null
2022-04-25T03:11:28.435411Z
2022-04-24T21:35:49.797043Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f295b3ae9f5927e084bd5decdff82390e3471801'}
Linux
GSD-2021-1001916
NFC: digital: fix possible memory leak in digital_in_send_sdd_req()
NFC: digital: fix possible memory leak in digital_in_send_sdd_req() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.290 by commit 74569c78aa84f8c958f1334b465bc530906ec99a, it was introduced in version v3.13 by commit 2c66daecc4092e6049673c281b2e6f0d5e59a94c. For more details please see the references link.
null
2021-12-19T23:40:51.347525Z
2021-11-14T15:11:34.988068Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c66daecc4092e6049673c281b2e6f0d5e59a94c'}
Linux
GSD-2021-1002639
xen/netback: don't queue unlimited number of packages
xen/netback: don't queue unlimited number of packages This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.259 by commit 9bebb2eedf679b3be4acaa20efda97f32c999d74, it was introduced in version v3.18 by commit f48da8b14d04ca87ffcffe68829afd45f926ec6a. For more details please see the references link.
null
2022-01-11T05:58:11.891811Z
2021-12-27T05:28:28.183614Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f48da8b14d04ca87ffcffe68829afd45f926ec6a'}
Linux
GSD-2021-1000604
NFS: fix an incorrect limit in filelayout_decode_layout()
NFS: fix an incorrect limit in filelayout_decode_layout() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit 9b367fe770b1b80d7bf64ed0d177544a44405f6e, it was introduced in version v2.6.37 by commit 16b374ca439fb406e46e071f75428f5b033056f8. For more details please see the references link.
null
2021-12-19T23:32:41.396833Z
2021-06-04T19:46:03.158177Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/16b374ca439fb406e46e071f75428f5b033056f8'}
Linux
GSD-2022-1001369
Drivers: hv: vmbus: Fix potential crash on module unload
Drivers: hv: vmbus: Fix potential crash on module unload This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 5ea98d0f5f035c1bcf1517ccec0e024ae35a48b2, it was introduced in version v5.7 by commit 74347a99e73ae00b8385f1209aaea193c670f901. For more details please see the references link.
null
2022-04-25T05:57:24.623109Z
2022-04-24T21:08:32.064535Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/74347a99e73ae00b8385f1209aaea193c670f901'}
Linux
GSD-2021-1002269
scsi: advansys: Fix kernel pointer leak
scsi: advansys: Fix kernel pointer leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.162 by commit cc248790bfdcf879e3094fa248c85bf92cdf9dae. For more details please see the references link.
null
2021-12-19T23:35:42.648988Z
2021-11-29T02:36:15.032021Z
null
null
null
null
null
Linux
GSD-2021-1000254
mt76: mt7915: fix tx skb dma unmap
mt76: mt7915: fix tx skb dma unmap This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit e2cdc9cb33c5963efe1a7c022753386f9463d1b7, it was introduced in version v5.10 by commit 27d5c528a7ca08dcd44877fdd9fc08b76630bf77. For more details please see the references link.
null
2021-12-20T00:52:05.056264Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/27d5c528a7ca08dcd44877fdd9fc08b76630bf77'}
Linux
GSD-2021-1002793
ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module
ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.169 by commit 992649b8b16843d27eb39ceea5f9cf85ffb50a18, it was introduced in version v4.15 by commit b2cfd8ab4add53c2070367bfee2f5b738f51698d. For more details please see the references link.
null
2022-01-11T05:53:14.710509Z
2021-12-30T02:43:39.621382Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b2cfd8ab4add53c2070367bfee2f5b738f51698d'}
Linux
GSD-2022-1001739
drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj
drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 3edd8646cb7c11b57c90e026bda6f21076223f5b. For more details please see the references link.
null
2022-04-25T04:22:36.032020Z
2022-04-24T21:38:31.694549Z
null
null
null
null
null
Linux
GSD-2022-1001017
arch/arm64: Fix topology initialization for core scheduling
arch/arm64: Fix topology initialization for core scheduling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit c78a1b2d0bff678570c8dc9f14035606f5e5257d, it was introduced in version v5.14 by commit 9edeaea1bc452372718837ed2ba775811baf1ba1. For more details please see the references link.
null
2022-04-25T03:59:43.028291Z
2022-04-24T20:40:09.295818Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9edeaea1bc452372718837ed2ba775811baf1ba1'}
Linux
GSD-2021-1000080
scsi: qla2xxx: Reserve extra IRQ vectors
scsi: qla2xxx: Reserve extra IRQ vectors This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.3 by commit 0f86d66b38501e3ac66cf2d9f9f8ad6838bad0e6, it was introduced in version v5.11 by commit a6dcfe08487e5e83b6b4214c959a9577a9ed2d9f. For more details please see the references link.
null
2021-12-20T00:17:20.369825Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a6dcfe08487e5e83b6b4214c959a9577a9ed2d9f'}
Linux
GSD-2021-1002547
sched/scs: Reset task stack state in bringup_cpu()
sched/scs: Reset task stack state in bringup_cpu() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.6 by commit 229c555260cb9c1ccdab861e16f0410f1718f302, it was introduced in version v5.14 by commit f1a0a376ca0c4ef1fc3d24e3e502acbb5b795674. For more details please see the references link.
null
2021-12-19T22:57:49.376083Z
2021-12-19T19:42:09.309438Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f1a0a376ca0c4ef1fc3d24e3e502acbb5b795674'}
Linux
GSD-2022-1001447
scsi: qla2xxx: Fix scheduling while atomic
scsi: qla2xxx: Fix scheduling while atomic This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 78225d6a2a4ffdb2250ce2b7691a9e68a3f86912. For more details please see the references link.
null
2022-04-25T06:14:41.496660Z
2022-04-24T21:14:07.323212Z
null
null
null
null
null
Linux
GSD-2021-1002117
isdn: mISDN: Fix sleeping function called from invalid context
isdn: mISDN: Fix sleeping function called from invalid context This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit f5966ba53013149bcf94e1536644a958dd00a026. For more details please see the references link.
null
2021-12-20T00:31:34.144762Z
2021-11-14T15:20:36.094714Z
null
null
null
null
null
Linux
GSD-2022-1000606
tracing/histogram: Fix a potential memory leak for kstrdup()
tracing/histogram: Fix a potential memory leak for kstrdup() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit df86e2fe808c3536a9dba353cc2bebdfea00d0cf, it was introduced in version v5.6 by commit d380dcde9a07ca5de4805dee11f58a98ec0ad6ff. For more details please see the references link.
null
2022-03-07T01:34:57.133603Z
2022-02-27T03:29:56.010751Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d380dcde9a07ca5de4805dee11f58a98ec0ad6ff'}
Linux
GSD-2022-1001914
cifs: prevent bad output lengths in smb2_ioctl_query_info()
cifs: prevent bad output lengths in smb2_ioctl_query_info() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit f143f8334fb9eb2f6c7c15b9da1472d9c965fd84. For more details please see the references link.
null
2022-04-25T05:10:59.256289Z
2022-04-24T21:54:08.332125Z
null
null
null
null
null
Linux
GSD-2021-1001691
drm/amdkfd: fix a potential ttm->sg memory leak
drm/amdkfd: fix a potential ttm->sg memory leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.12 by commit 7e5ce6029b627efb4a004746cfdc1eeff850e6eb, it was introduced in version v5.14 by commit 264fb4d332f5e76743818480e482464437837c52. For more details please see the references link.
null
2021-12-20T00:09:58.358667Z
2021-10-19T16:32:04.803943Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/264fb4d332f5e76743818480e482464437837c52'}
Linux
GSD-2021-1000983
sch_cake: Fix out of bounds when parsing TCP options and header
sch_cake: Fix out of bounds when parsing TCP options and header This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit 3b491dd593d582ceeb27aa617600712a6bd14246, it was introduced in version v4.19 by commit 8b7138814f29933898ecd31dfc83e35a30ee69f5. For more details please see the references link.
null
2021-12-20T00:26:42.820763Z
2021-06-30T00:31:18.457526Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8b7138814f29933898ecd31dfc83e35a30ee69f5'}
Linux
GSD-2022-1000256
scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put()
scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.19 by commit b11e34f7bab21df36f02a5e54fb69e858c09a65d, it was introduced in version v3.2 by commit 0cbf32e1681d870632a1772601cbaadd996dc978. For more details please see the references link.
null
2022-02-20T06:36:31.128004Z
2022-02-18T22:02:01.572146Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0cbf32e1681d870632a1772601cbaadd996dc978'}
Linux
GSD-2021-1000829
net/qla3xxx: fix schedule while atomic in ql_sem_spinlock
net/qla3xxx: fix schedule while atomic in ql_sem_spinlock This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.273 by commit 9cfaf83a961115f4d63a6fed029bf56aae6713cd. For more details please see the references link.
null
2021-12-19T23:42:10.748786Z
2021-06-29T23:59:58.218509Z
null
null
null
null
null
Linux
GSD-2021-1002814
hamradio: defer ax25 kfree after unregister_netdev
hamradio: defer ax25 kfree after unregister_netdev This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.89 by commit 450121075a6a6f1d50f97225d3396315309d61a1. For more details please see the references link.
null
2022-01-11T05:53:23.878572Z
2021-12-30T02:44:36.267577Z
null
null
null
null
null
Linux
GSD-2022-1002284
ALSA: oss: Fix PCM OSS buffer allocation overflow
ALSA: oss: Fix PCM OSS buffer allocation overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.188 by commit 0c4190b41a69990666b4000999e27f8f1b2a426b. For more details please see the references link.
null
2022-04-25T05:44:28.361075Z
2022-04-24T22:30:07.731920Z
null
null
null
null
null
Linux
GSD-2022-1000743
openvswitch: Fix setting ipv6 fields causing hw csum failure
openvswitch: Fix setting ipv6 fields causing hw csum failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.12 by commit a142b6991367efe9e883db581c96b6fc3473dab5, it was introduced in version v3.8 by commit 3fdbd1ce11e5c0d7cafbe44c942c5cad61113d7b. For more details please see the references link.
null
2022-03-18T02:52:17.982843Z
2022-03-18T00:14:43.180346Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3fdbd1ce11e5c0d7cafbe44c942c5cad61113d7b'}
Linux
GSD-2022-1001851
scsi: pm8001: Fix abort all task initialization
scsi: pm8001: Fix abort all task initialization This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit c8db786858d895ac58342f67767b4999ae6538fa, it was introduced in version v3.10 by commit c6b9ef5779c3e1edfa9de949d2a51252bc347663. For more details please see the references link.
null
2022-04-25T06:16:19.021672Z
2022-04-24T21:48:16.554037Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6b9ef5779c3e1edfa9de949d2a51252bc347663'}
Linux
GSD-2022-1000313
libsubcmd: Fix use-after-free for realloc(..., 0)
libsubcmd: Fix use-after-free for realloc(..., 0) This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.268 by commit e89bb266b710ce056f141f29f091fd468a4a8185, it was introduced in version v4.5 by commit 2f4ce5ec1d447beb42143a9653716a2ab025161e. For more details please see the references link.
null
2022-03-07T01:50:46.167813Z
2022-02-27T02:49:38.101222Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2f4ce5ec1d447beb42143a9653716a2ab025161e'}
Linux
GSD-2021-1001384
tty: serial: 8250: serial_cs: Fix a memory leak in error handling path
tty: serial: 8250: serial_cs: Fix a memory leak in error handling path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.198 by commit cddee5c287e26f6b2ba5c0ffdfc3a846f2f10461. For more details please see the references link.
null
2021-12-19T23:55:29.130424Z
2021-08-03T02:25:47.458619Z
null
null
null
null
null
Linux
GSD-2021-1002402
nfp: Fix memory leak in nfp_cpp_area_cache_add()
nfp: Fix memory leak in nfp_cpp_area_cache_add() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.258 by commit 3e93abcdcec0436fbf0b6a88ae806902426895a2, it was introduced in version v4.11 by commit 4cb584e0ee7df70fd0376aee60cf701855ea8c81. For more details please see the references link.
null
2021-12-20T01:32:41.876344Z
2021-12-19T19:35:44.395421Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4cb584e0ee7df70fd0376aee60cf701855ea8c81'}
Linux
GSD-2022-1001152
ext4: don't BUG if someone dirty pages without asking ext4 first
ext4: don't BUG if someone dirty pages without asking ext4 first This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 677c9d30e8487bee6c8e3b034070319d98f6e203. For more details please see the references link.
null
2022-04-25T06:49:57.726008Z
2022-04-24T20:49:09.310882Z
null
null
null
null
null
Linux
GSD-2021-1002052
isdn: mISDN: Fix sleeping function called from invalid context
isdn: mISDN: Fix sleeping function called from invalid context This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit 9f591cbdbed3d7822b2bdba89b34a6d7b434317d. For more details please see the references link.
null
2021-12-20T01:30:07.834462Z
2021-11-14T15:17:39.785748Z
null
null
null
null
null
Linux
GSD-2022-1001502
mxser: fix xmit_buf leak in activate when LSR == 0xff
mxser: fix xmit_buf leak in activate when LSR == 0xff This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 6c9041b2f90c0eace73106f22350e1d2c98f5edc, it was introduced in version v2.6.33 by commit 6769140d304731f0a3b177470a2adb4bacd9036b. For more details please see the references link.
null
2022-04-25T06:23:15.866159Z
2022-04-24T21:17:57.151702Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6769140d304731f0a3b177470a2adb4bacd9036b'}
Linux
GSD-2021-1000595
net: dsa: mt7530: fix VLAN traffic leaks
net: dsa: mt7530: fix VLAN traffic leaks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit b91117b66fe875723a4e79ec6263526fffdb44d2, it was introduced in version v4.16 by commit 83163f7dca5684816d01c8ccf4857aa74801e7b7. For more details please see the references link.
null
2021-12-19T23:58:09.488646Z
2021-06-04T19:44:21.887444Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/83163f7dca5684816d01c8ccf4857aa74801e7b7'}
Linux
GSD-2021-1001557
HID: usbhid: free raw_report buffers in usbhid_stop
HID: usbhid: free raw_report buffers in usbhid_stop This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.209 by commit 764ac04de056801dfe52a716da63f6e7018e7f3b. For more details please see the references link.
null
2021-12-20T01:07:09.165400Z
2021-10-19T16:23:40.173758Z
null
null
null
null
null
Linux
GSD-2022-1002007
scsi: pm8001: Fix tag leaks on error
scsi: pm8001: Fix tag leaks on error This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit a0bb65eadbf942024226241d9d99fed17168940b. For more details please see the references link.
null
2022-04-25T04:57:21.158292Z
2022-04-24T22:02:36.843985Z
null
null
null
null
null
Linux
GSD-2022-1000190
usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS
usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.96 by commit 3ca928c8242798c4d00cb3a30c20fa4a127ee6c7, it was introduced in version v5.10.44 by commit 4b289a0f3033f465b4fd51ba995251a7867a2aa2. For more details please see the references link.
null
2022-02-20T06:24:50.399722Z
2022-02-18T21:52:50.391176Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4b289a0f3033f465b4fd51ba995251a7867a2aa2'}
Linux
GSD-2021-1001107
net: qed: Fix memcpy() overflow of qed_dcbx_params()
net: qed: Fix memcpy() overflow of qed_dcbx_params() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.238 by commit be0cfcf7e6988dbff80edec0d0654878f4d6f955. For more details please see the references link.
null
2021-12-20T00:16:50.213103Z
2021-07-08T01:56:47.234553Z
null
null
null
null
null
Linux
GSD-2022-1002457
llc: only change llc->dev when bind() succeeds
llc: only change llc->dev when bind() succeeds This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.274 by commit f25366d9a27585d45dfd475aa1764b8886958aac, it was introduced in version v4.14.274 by commit 0f294bc04be87f1c9e1d1a908db9fcc84ce94210. For more details please see the references link.
null
2022-04-24T22:50:13.557659Z
2022-04-24T22:50:13.557659Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0f294bc04be87f1c9e1d1a908db9fcc84ce94210'}
Linux
GSD-2021-1000346
ath10k: Fix a use after free in ath10k_htc_send_bundle
ath10k: Fix a use after free in ath10k_htc_send_bundle This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 8bb054fb336f4250002fff4e0b075221c05c3c65, it was introduced in version v5.8 by commit c8334512f3dd1b94844baca629f9bedca4271593. For more details please see the references link.
null
2021-12-20T01:28:53.833557Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c8334512f3dd1b94844baca629f9bedca4271593'}
Linux
GSD-2021-1002681
xen/netback: don't queue unlimited number of packages
xen/netback: don't queue unlimited number of packages This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.168 by commit 0d99b3c6bd39a0a023e972d8f912fd47698bbbb8, it was introduced in version v3.18 by commit f48da8b14d04ca87ffcffe68829afd45f926ec6a. For more details please see the references link.
null
2022-01-11T05:58:00.334074Z
2021-12-27T05:36:30.558425Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f48da8b14d04ca87ffcffe68829afd45f926ec6a'}
Linux
GSD-2022-1000939
net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe()
net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.305 by commit 8e3bc7c5bbf87e86e9cd652ca2a9166942d86206, it was introduced in version v3.18 by commit 8c14f9c70327a6fb75534c4c61d7ea9c82ccf78f. For more details please see the references link.
null
2022-03-18T03:00:14.605197Z
2022-03-18T00:34:32.141388Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c14f9c70327a6fb75534c4c61d7ea9c82ccf78f'}
Linux
GSD-2022-1000893
vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
vhost/vsock: don't check owner in vhost_vsock_stop() while releasing This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.182 by commit 0b608b3392c4b3a1d6e9fdc09f99ec6a3402ad36, it was introduced in version v4.8 by commit 433fc58e6bf2c8bd97e57153ed28e64fd78207b8. For more details please see the references link.
null
2022-03-18T02:55:50.981046Z
2022-03-18T00:29:02.745635Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/433fc58e6bf2c8bd97e57153ed28e64fd78207b8'}
Linux
GSD-2022-1001781
media: atomisp: fix dummy_ptr check to avoid duplicate active_bo
media: atomisp: fix dummy_ptr check to avoid duplicate active_bo This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 3f887cb763a0443e4c1adb5fe5a6d6058f4b3d96. For more details please see the references link.
null
2022-04-25T05:57:23.223617Z
2022-04-24T21:42:03.383562Z
null
null
null
null
null
Linux
GSD-2021-1001804
dma-debug: fix sg checks in debug_dma_map_sg()
dma-debug: fix sg checks in debug_dma_map_sg() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.214 by commit db9aadf3bb8d7c1def4813f142cba9cf94be2999, it was introduced in version v2.6.31 by commit 884d05970bfbc3db368f23460dc4ce63257f240d. For more details please see the references link.
null
2021-12-19T22:39:01.392501Z
2021-10-28T13:49:47.475214Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/884d05970bfbc3db368f23460dc4ce63257f240d'}