ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2021-1000716
pid: take a reference when initializing `cad_pid`
pid: take a reference when initializing `cad_pid` This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.272 by commit 764c2e892d1fe895392aff62fb353fdce43bb529, it was introduced in version v2.6.19 by commit 9ec52099e4b8678a60e9f93e41ad87885d64f3e6. For more details please see the references link.
null
2021-12-20T00:12:01.728706Z
2021-06-24T23:58:51.745652Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9ec52099e4b8678a60e9f93e41ad87885d64f3e6'}
Linux
GSD-2022-1001294
ext4: make mb_optimize_scan performance mount option work with extents
ext4: make mb_optimize_scan performance mount option work with extents This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit b017c9a1abee723689204bea86b0cc36e480d187, it was introduced in version v5.13 by commit 196e402adf2e4cd66f101923409f1970ec5f1af3. For more details please see the references link.
null
2022-04-25T05:40:14.623261Z
2022-04-24T21:01:56.902385Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/196e402adf2e4cd66f101923409f1970ec5f1af3'}
Linux
GSD-2021-1000203
hfsplus: prevent corruption in shrinking truncate
hfsplus: prevent corruption in shrinking truncate This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit 97314e45aa1223a42d60256a62c5d9af54baf446, it was introduced in version v4.19 by commit 31651c607151f1034cfb57e5a78678bea54c362b. For more details please see the references link.
null
2021-12-19T22:53:56.778928Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/31651c607151f1034cfb57e5a78678bea54c362b'}
Linux
GSD-2021-1002394
perf hist: Fix memory leak of a perf_hpp_fmt
perf hist: Fix memory leak of a perf_hpp_fmt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.257 by commit c5c8a26c0dc69a400553245e92d741fe55f91095. For more details please see the references link.
null
2021-12-19T22:54:43.961333Z
2021-12-19T19:35:25.185038Z
null
null
null
null
null
Linux
GSD-2021-1001941
net: mdiobus: Fix memory leak in __mdiobus_register
net: mdiobus: Fix memory leak in __mdiobus_register This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.288 by commit bc5f2f3431ced08300e4cb3aff35f1da14c26433. For more details please see the references link.
null
2021-12-20T00:24:12.736411Z
2021-11-14T15:12:37.189107Z
null
null
null
null
null
Linux
GSD-2021-1000653
i2c: i801: Don't generate an interrupt on bus reset
i2c: i801: Don't generate an interrupt on bus reset This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.193 by commit c70e1ba2e7e65255a0ce004f531dd90dada97a8c, it was introduced in version v3.6 by commit 636752bcb5177a301d0266270661581de8624828. For more details please see the references link.
null
2021-12-20T00:22:50.180910Z
2021-06-04T19:55:19.015717Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/636752bcb5177a301d0266270661581de8624828'}
Linux
GSD-2022-1002142
pinctrl: samsung: drop pin banks references on error paths
pinctrl: samsung: drop pin banks references on error paths This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit be22ebe79e64c3a8eb76f68743d97771f244cb18, it was introduced in version v3.8 by commit ab663789d69760d2735402f66501f20b60312a3d. For more details please see the references link.
null
2022-04-25T03:12:15.404567Z
2022-04-24T22:15:43.903884Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab663789d69760d2735402f66501f20b60312a3d'}
Linux
GSD-2022-1000485
can: isotp: fix potential CAN frame reception race in isotp_rcv()
can: isotp: fix potential CAN frame reception race in isotp_rcv() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 5b068f33bc8acfcfd5ea7992a2dafb30d89bad30, it was introduced in version v5.10 by commit e057dd3fc20ffb3d7f150af46542a51b59b90127. For more details please see the references link.
null
2022-03-07T01:44:11.353780Z
2022-02-27T03:13:22.575741Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e057dd3fc20ffb3d7f150af46542a51b59b90127'}
Linux
GSD-2021-1001412
virtio_console: Assure used length from device is limited
virtio_console: Assure used length from device is limited This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.240 by commit 56cf748562d3cbfd33d1ba2eb4a7603a5e20da88. For more details please see the references link.
null
2021-12-19T23:50:15.240023Z
2021-08-03T02:33:12.568081Z
null
null
null
null
null
Linux
GSD-2022-1002512
jffs2: fix memory leak in jffs2_do_mount_fs
jffs2: fix memory leak in jffs2_do_mount_fs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit 2a9d8184458562e6bf2f40d0e677fc85e2dd3834, it was introduced in version v2.6.15 by commit e631ddba588783edd521c5a89f7b2902772fb691. For more details please see the references link.
null
2022-04-25T03:57:56.446865Z
2022-04-24T22:56:45.317482Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e631ddba588783edd521c5a89f7b2902772fb691'}
Linux
GSD-2021-1001042
IB/mlx5: Fix initializing CQ fragments buffer
IB/mlx5: Fix initializing CQ fragments buffer This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit 3e670c54eda238cb8a1ea93538a79ae89285c1c4, it was introduced in version v4.17 by commit 388ca8be00370db132464e27f745b8a0add19fcb. For more details please see the references link.
null
2021-12-20T00:32:04.235600Z
2021-06-30T00:35:51.539898Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/388ca8be00370db132464e27f745b8a0add19fcb'}
Linux
GSD-2021-1002802
phonet/pep: refuse to enable an unbound pipe
phonet/pep: refuse to enable an unbound pipe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.169 by commit 48c76fc53582e7f13c1e0b11c916e503256c4d0b. For more details please see the references link.
null
2022-01-11T05:53:23.313593Z
2021-12-30T02:44:07.231004Z
null
null
null
null
null
Linux
GSD-2022-1000240
Bluetooth: refactor malicious adv data check
Bluetooth: refactor malicious adv data check This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.19 by commit bcea886771c3f22a590c8c8b9139a107bd7f1e1c. For more details please see the references link.
null
2022-02-19T02:51:57.051583Z
2022-02-18T22:00:08.728079Z
null
null
null
null
null
Linux
GSD-2021-1000995
can: j1939: fix Use-after-Free, hold skb ref while in use
can: j1939: fix Use-after-Free, hold skb ref while in use This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit 509ab6bfdd0c76daebbad0f0af07da712116de22, it was introduced in version v5.4 by commit 9d71dd0c70099914fcd063135da3c580865e924c. For more details please see the references link.
null
2021-12-20T01:20:41.317761Z
2021-06-30T00:32:03.841152Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9d71dd0c70099914fcd063135da3c580865e924c'}
Linux
GSD-2021-1001687
drm/nouveau/debugfs: fix file release memory leak
drm/nouveau/debugfs: fix file release memory leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.12 by commit 88c3610045ca6e699331b6bb5c095c5565f30721, it was introduced in version v4.5 by commit 6e9fc177399f08446293fec7607913fdbc95e191. For more details please see the references link.
null
2021-12-20T00:58:39.310187Z
2021-10-19T16:31:52.208386Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6e9fc177399f08446293fec7607913fdbc95e191'}
Linux
GSD-2022-1001902
brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path
brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit a88337a06966f2d733ad9a97714b874469133f14, it was introduced in version v5.4 by commit 82f93cf46d6007ffa003b2d4a2834563b6b84d21. For more details please see the references link.
null
2022-04-25T04:38:57.529856Z
2022-04-24T21:53:25.282965Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/82f93cf46d6007ffa003b2d4a2834563b6b84d21'}
Linux
GSD-2022-1000610
KVM: LAPIC: Also cancel preemption timer during SET_LAPIC
KVM: LAPIC: Also cancel preemption timer during SET_LAPIC This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit ce55f63f6cea4cab8ae9212f73285648a5baa30d. For more details please see the references link.
null
2022-03-07T02:33:55.297593Z
2022-02-27T03:31:01.554809Z
null
null
null
null
null
Linux
GSD-2021-1002101
ocfs2: fix data corruption after conversion from inline format
ocfs2: fix data corruption after conversion from inline format This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit fa9b6b6c953e3f6441ed6cf83b4c771dac2dae08, it was introduced in version v5.10 by commit 6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b. For more details please see the references link.
null
2021-12-20T01:11:03.017468Z
2021-11-14T15:19:56.585007Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b'}
Linux
GSD-2022-1001451
scsi: qla2xxx: Implement ref count for SRB
scsi: qla2xxx: Implement ref count for SRB This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit e140723f78ff418c8df7d990e102e07b65c87d4a. For more details please see the references link.
null
2022-04-25T05:45:21.948891Z
2022-04-24T21:14:23.694350Z
null
null
null
null
null
Linux
GSD-2021-1002551
drm/amd/amdkfd: Fix kernel panic when reset failed and been triggered again
drm/amd/amdkfd: Fix kernel panic when reset failed and been triggered again This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.7 by commit 06c6f8f86ec243b89e52f0c3dc7062bcb9de74df. For more details please see the references link.
null
2021-12-19T22:43:01.462671Z
2021-12-19T19:42:19.511294Z
null
null
null
null
null
Linux
GSD-2021-1000096
tools/power turbostat: Fix offset overflow issue in index converting
tools/power turbostat: Fix offset overflow issue in index converting This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.20 by commit dbdf22fc825fdb1d97f23230064e0f9819471628, it was introduced in version v5.10 by commit 9972d5d84d76982606806b2ce887f70c2f8ba60a. For more details please see the references link.
null
2021-12-20T01:03:15.432258Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9972d5d84d76982606806b2ce887f70c2f8ba60a'}
Linux
GSD-2022-1001001
irqchip/gic-v3: Fix GICR_CTLR.RWP polling
irqchip/gic-v3: Fix GICR_CTLR.RWP polling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 6fef3e3179e6ed8fecdd004ede541674ffa7749d, it was introduced in version v3.17 by commit 021f653791ad17e03f98aaa7fb933816ae16f161. For more details please see the references link.
null
2022-04-25T04:52:06.017337Z
2022-04-24T20:38:43.006664Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/021f653791ad17e03f98aaa7fb933816ae16f161'}
Linux
GSD-2021-1000583
drm/amd/amdgpu: fix a potential deadlock in gpu reset
drm/amd/amdgpu: fix a potential deadlock in gpu reset This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit 4951dd498d483fa961c92541b55ffb32db7f2dbf, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T22:57:52.325160Z
2021-06-04T19:42:51.953377Z
null
null
null
null
null
Linux
GSD-2022-1001514
RDMA/rxe: Change variable and function argument to proper type
RDMA/rxe: Change variable and function argument to proper type This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 4bf26b79a1d8a73e271a31aeb8c6193d07f60b44. For more details please see the references link.
null
2022-04-25T04:41:24.468924Z
2022-04-24T21:19:07.820089Z
null
null
null
null
null
Linux
GSD-2021-1002044
userfaultfd: fix a race between writeprotect and exit_mmap()
userfaultfd: fix a race between writeprotect and exit_mmap() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit 3cda4bfffd4f755645577aaa9e96a606657b4525, it was introduced in version v5.7 by commit 63b2d4174c4ad1f40b48d7138e71bcb564c1fe03. For more details please see the references link.
null
2021-12-20T00:14:37.113957Z
2021-11-14T15:17:20.500151Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63b2d4174c4ad1f40b48d7138e71bcb564c1fe03'}
Linux
GSD-2021-1000079
mmc: uniphier-sd: Fix a resource leak in the remove function
mmc: uniphier-sd: Fix a resource leak in the remove function This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.3 by commit d6e7fda496978f2763413b5523557b38dc2bf6c2, it was introduced in version v4.20 by commit 3fd784f745dd1747863775a99ec749619ee6759c. For more details please see the references link.
null
2021-12-20T01:05:43.340516Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3fd784f745dd1747863775a99ec749619ee6759c'}
Linux
GSD-2022-1001144
media: staging: media: zoran: calculate the right buffer number for zoran_reap_stat_com
media: staging: media: zoran: calculate the right buffer number for zoran_reap_stat_com This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 20811bbe685ca3eddd34b0c750860427d7030910. For more details please see the references link.
null
2022-04-25T04:56:26.077266Z
2022-04-24T20:48:46.088720Z
null
null
null
null
null
Linux
GSD-2021-1002414
net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound
net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.220 by commit 2c1a6a9a011d622a7c61324a97a49801ba425eff. For more details please see the references link.
null
2021-12-20T01:06:56.534539Z
2021-12-19T19:36:21.137508Z
null
null
null
null
null
Linux
GSD-2021-1000429
media: aspeed: fix clock handling logic
media: aspeed: fix clock handling logic This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.119 by commit 1dc1d30ac101bb8335d9852de2107af60c2580e7, it was introduced in version v5.0 by commit d2b4387f3bdf016e266d23cf657465f557721488. For more details please see the references link.
null
2021-12-19T22:34:37.100072Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d2b4387f3bdf016e266d23cf657465f557721488'}
Linux
GSD-2021-1001392
wl1251: Fix possible buffer overflow in wl1251_cmd_scan
wl1251: Fix possible buffer overflow in wl1251_cmd_scan This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.198 by commit 115103f6e3f1c26c473766c16439c7c8b235529a. For more details please see the references link.
null
2021-12-19T23:09:51.464370Z
2021-08-03T02:26:55.070139Z
null
null
null
null
null
Linux
GSD-2022-1000305
vt_ioctl: fix array_index_nospec in vt_setactivate
vt_ioctl: fix array_index_nospec in vt_setactivate This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.267 by commit 2a45a6bd1e6d651770aafff57ab3e1d3bb0b42e0. For more details please see the references link.
null
2022-03-07T01:29:16.357139Z
2022-02-27T02:48:43.359443Z
null
null
null
null
null
Linux
GSD-2022-1002338
ext4: don't BUG if someone dirty pages without asking ext4 first
ext4: don't BUG if someone dirty pages without asking ext4 first This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 0d3a6926f7e8be3c897fa46216ce13b119a9f56a. For more details please see the references link.
null
2022-04-25T07:17:23.998706Z
2022-04-24T22:35:39.720049Z
null
null
null
null
null
Linux
GSD-2021-1001668
irqchip/gic-v3-its: Fix potential VPE leak on error
irqchip/gic-v3-its: Fix potential VPE leak on error This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.70 by commit 568662e37f927e3dc3e475f3ff7cf4ab7719c5e7, it was introduced in version v4.14 by commit 7d75bbb4bc1ad90386776459d37e4ddfe605671e. For more details please see the references link.
null
2021-12-19T23:49:00.228624Z
2021-10-19T16:30:54.458650Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7d75bbb4bc1ad90386776459d37e4ddfe605671e'}
Linux
GSD-2022-1001847
gpu: host1x: Fix a memory leak in 'host1x_remove()'
gpu: host1x: Fix a memory leak in 'host1x_remove()' This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit c06577a80485511b894cb688e881ef0bc2d1d296, it was introduced in version v4.13 by commit 8474b02531c4881a762c52ef869c52429e38633f. For more details please see the references link.
null
2022-04-25T05:09:27.005912Z
2022-04-24T21:47:39.309989Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8474b02531c4881a762c52ef869c52429e38633f'}
Linux
GSD-2022-1000755
mm/filemap: Fix handling of THPs in generic_file_buffered_read()
mm/filemap: Fix handling of THPs in generic_file_buffered_read() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.12 by commit ace802caf3de0f31792fcf654e7df4a294aab950, it was introduced in version v5.12 by commit cbd59c48ae2bcadc4a7599c29cf32fd3f9b78251. For more details please see the references link.
null
2022-03-18T02:45:10.939154Z
2022-03-18T00:15:37.372478Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cbd59c48ae2bcadc4a7599c29cf32fd3f9b78251'}
Linux
GSD-2022-1002292
ARM: davinci: da850-evm: Avoid NULL pointer dereference
ARM: davinci: da850-evm: Avoid NULL pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.239 by commit c64e2ed5cc376e137e572babfd2edc38b2cfb61b, it was introduced in version v2.6.33 by commit bae105879f2f2404155da6f50b3636193d228a62. For more details please see the references link.
null
2022-04-25T05:50:47.944035Z
2022-04-24T22:30:52.322696Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bae105879f2f2404155da6f50b3636193d228a62'}
Linux
GSD-2021-1001238
usb: max-3421: Prevent corruption of freed memory
usb: max-3421: Prevent corruption of freed memory This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.54 by commit 7af54a4e221e5619a87714567e2258445dc35435, it was introduced in version v3.16 by commit 2d53139f31626bad6f8983d8e519ddde2cbba921. For more details please see the references link.
null
2021-12-19T22:24:04.788103Z
2021-08-03T01:45:51.362547Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2d53139f31626bad6f8983d8e519ddde2cbba921'}
Linux
GSD-2021-1000700
btrfs: do not BUG_ON in link_to_fixup_dir
btrfs: do not BUG_ON in link_to_fixup_dir This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.271 by commit 76bfd8ac20bebeae599452a03dfc5724c0475dcf, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T01:31:22.260698Z
2021-06-04T20:05:26.350088Z
null
null
null
null
null
Linux
GSD-2021-1001812
efi: Change down_interruptible() in virt_efi_reset_system() to down_trylock()
efi: Change down_interruptible() in virt_efi_reset_system() to down_trylock() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.213 by commit 853985927c5629bbe43e3f1abb9a5c673b86bd61. For more details please see the references link.
null
2021-12-19T22:31:59.346682Z
2021-10-28T13:50:14.187748Z
null
null
null
null
null
Linux
GSD-2022-1001797
selinux: allow FIOCLEX and FIONCLEX with policy capability
selinux: allow FIOCLEX and FIONCLEX with policy capability This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 55d192691b4b7063166e7feafbe44db24dbe205c. For more details please see the references link.
null
2022-04-25T05:05:23.862891Z
2022-04-24T21:42:50.051322Z
null
null
null
null
null
Linux
GSD-2022-1000885
RDMA/ib_srp: Fix a deadlock
RDMA/ib_srp: Fix a deadlock This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.182 by commit 901206f71e6ad2b2e7accefc5199a438d173c25f, it was introduced in version v3.8 by commit ef6c49d87c3418c442a22e55e3ce2f91b163d69e. For more details please see the references link.
null
2022-03-18T02:50:23.497012Z
2022-03-18T00:27:56.066258Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef6c49d87c3418c442a22e55e3ce2f91b163d69e'}
Linux
GSD-2021-1002697
net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg
net: hns3: fix use-after-free bug in hclgevf_send_mbx_msg This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.88 by commit 12512bc8f25b8ba9795dfbae0e9ca57ff13fd542, it was introduced in version v5.8 by commit d8355240cf8fb8b9e002b5c8458578435cea85c2. For more details please see the references link.
null
2022-01-11T05:56:40.465230Z
2021-12-27T05:37:26.470982Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d8355240cf8fb8b9e002b5c8458578435cea85c2'}
Linux
GSD-2021-1000350
vsock/virtio: free queued packets when closing socket
vsock/virtio: free queued packets when closing socket This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit b605673b523fe33abeafb2136759bcbc9c1e6ebf, it was introduced in version v5.2 by commit ac03046ece2b158ebd204dfc4896fd9f39f0e6c8. For more details please see the references link.
null
2021-12-20T00:09:34.236068Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac03046ece2b158ebd204dfc4896fd9f39f0e6c8'}
Linux
GSD-2022-1002441
ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction
ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit b2b65c9013dc28836d82e25d0f0c94d794a14aba, it was introduced in version v3.16 by commit 00a7bb81c20f3e81711e28e0f6c08cee8fd18514. For more details please see the references link.
null
2022-04-25T04:26:03.336566Z
2022-04-24T22:47:57.638931Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/00a7bb81c20f3e81711e28e0f6c08cee8fd18514'}
Linux
GSD-2021-1001111
net: caif: fix memory leak in ldisc_open
net: caif: fix memory leak in ldisc_open This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.196 by commit 568ce04020f5fca707d67d36db2d551966212cfa. For more details please see the references link.
null
2021-12-20T01:23:51.694313Z
2021-07-08T01:57:03.234151Z
null
null
null
null
null
Linux
GSD-2022-1000186
ceph: properly put ceph_string reference after async create attempt
ceph: properly put ceph_string reference after async create attempt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.96 by commit e7be12ca7d3947765b0d7c1c7e0537e748da993a, it was introduced in version v5.7 by commit 9a8d03ca2e2c334d08ee91a3e07dcce31a02fdc6. For more details please see the references link.
null
2022-02-19T04:35:11.913624Z
2022-02-18T21:52:23.957456Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9a8d03ca2e2c334d08ee91a3e07dcce31a02fdc6'}
Linux
GSD-2022-1002011
PCI: endpoint: Fix alignment fault error in copy tests
PCI: endpoint: Fix alignment fault error in copy tests This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit b02a1a65023f46b970486be38f7d209761084a7c. For more details please see the references link.
null
2022-04-25T06:36:00.236408Z
2022-04-24T22:02:48.222835Z
null
null
null
null
null
Linux
GSD-2021-1001541
md: fix a lock order reversal in md_alloc
md: fix a lock order reversal in md_alloc This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.249 by commit 9252a5f39df073d364d72662cb8a45dc2f0da328, it was introduced in version v3.0 by commit b0140891a8cea36469f58d23859e599b1122bd37. For more details please see the references link.
null
2021-12-19T22:21:21.459608Z
2021-10-19T16:22:55.730145Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b0140891a8cea36469f58d23859e599b1122bd37'}
Linux
GSD-2021-1001054
mac80211: fix skb length check in ieee80211_scan_rx()
mac80211: fix skb length check in ieee80211_scan_rx() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit d1b949c70206178b12027f66edc088d40375b5cb, it was introduced in version v5.10 by commit cd418ba63f0c2f6157f35a41c9accc6ecb52590a. For more details please see the references link.
null
2021-12-20T01:00:40.579077Z
2021-06-30T00:36:35.977798Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cd418ba63f0c2f6157f35a41c9accc6ecb52590a'}
Linux
GSD-2022-1002504
ASoC: mxs: Fix error handling in mxs_sgtl5000_probe
ASoC: mxs: Fix error handling in mxs_sgtl5000_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit f16ad2c0e22687f80e5981c67374023f51c204b9, it was introduced in version v3.5 by commit e968194b45c4e8077dada75c5bae5660b37628fe. For more details please see the references link.
null
2022-04-25T06:03:24.954633Z
2022-04-24T22:55:34.199142Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e968194b45c4e8077dada75c5bae5660b37628fe'}
Linux
GSD-2022-1000539
scsi: pm8001: Fix use-after-free for aborted TMF sas_task
scsi: pm8001: Fix use-after-free for aborted TMF sas_task This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit 510b21442c3a2e3ecc071ba3e666b320e7acdd61. For more details please see the references link.
null
2022-03-07T02:24:36.362449Z
2022-02-27T03:20:57.343923Z
null
null
null
null
null
Linux
GSD-2021-1001404
net: fix uninit-value in caif_seqpkt_sendmsg
net: fix uninit-value in caif_seqpkt_sendmsg This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.241 by commit ffe31dd70b70a40cd6b21b78c1713a23e021843a, it was introduced in version v2.6.35 by commit bece7b2398d073d11b2e352405a3ecd3a1e39c60. For more details please see the references link.
null
2021-12-19T22:59:53.532048Z
2021-08-03T02:30:56.420258Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bece7b2398d073d11b2e352405a3ecd3a1e39c60'}
Linux
GSD-2022-1000493
scsi: qedf: Add stag_work to all the vports
scsi: qedf: Add stag_work to all the vports This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 0be556512cd0dfcf5ec1a140d9f42d88221a5d4e. For more details please see the references link.
null
2022-03-07T01:40:01.437913Z
2022-02-27T03:14:56.298871Z
null
null
null
null
null
Linux
GSD-2022-1002154
dm integrity: fix memory corruption when tag_size is less than digest size
dm integrity: fix memory corruption when tag_size is less than digest size This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.190 by commit 7f84c937222944c03f4615ca4742df6bed0e5adf. For more details please see the references link.
null
2022-04-25T04:52:32.624123Z
2022-04-24T22:16:36.943498Z
null
null
null
null
null
Linux
GSD-2022-1000169
ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx()
ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.178 by commit fd9a23319f16e7031f0d8c98eed6e093c2927229. For more details please see the references link.
null
2022-02-19T02:51:54.668450Z
2022-02-18T21:50:29.367729Z
null
null
null
null
null
Linux
GSD-2021-1000645
NFC: nci: fix memory leak in nci_allocate_device
NFC: nci: fix memory leak in nci_allocate_device This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.123 by commit af2a4426baf71163c0c354580ae98c7888a9aba7, it was introduced in version v4.0 by commit 11f54f228643d0248ec00ce8c9fb8d872f87e7b8. For more details please see the references link.
null
2021-12-20T00:13:09.658277Z
2021-06-04T19:53:48.911688Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/11f54f228643d0248ec00ce8c9fb8d872f87e7b8'}
Linux
GSD-2021-1002678
sit: do not call ipip6_dev_free() from sit_init_net()
sit: do not call ipip6_dev_free() from sit_init_net() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.168 by commit ad0ed314d6167b212939e3839428ba0c8bb16adb, it was introduced in version v4.12 by commit cf124db566e6b036b8bcbe8decbed740bdfac8c6. For more details please see the references link.
null
2022-01-11T05:47:34.591536Z
2021-12-27T05:36:23.035010Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cf124db566e6b036b8bcbe8decbed740bdfac8c6'}
Linux
GSD-2021-1001957
can: peak_pci: peak_pci_remove(): fix UAF
can: peak_pci: peak_pci_remove(): fix UAF This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.253 by commit 34914971bb3244db4ce2be44e9438a9b30c56250, it was introduced in version v3.4 by commit e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd. For more details please see the references link.
null
2021-12-19T22:47:34.878888Z
2021-11-14T15:13:24.013969Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd'}
Linux
GSD-2022-1001328
uaccess: fix integer overflow on access_ok()
uaccess: fix integer overflow on access_ok() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.1 by commit a1ad747fc1a0e06d1bf26b996ee8a56b5c8d02d8, it was introduced in version v4.20 by commit da551281947cb2c0ab6e0045529a706af5d79584. For more details please see the references link.
null
2022-04-25T03:30:25.584816Z
2022-04-24T21:04:59.151958Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/da551281947cb2c0ab6e0045529a706af5d79584'}
Linux
GSD-2021-1002382
ALSA: pcm: oss: Fix negative period/buffer sizes
ALSA: pcm: oss: Fix negative period/buffer sizes This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.293 by commit 502e1146873d870f87da3b8f93d6bf2de5f38d0c. For more details please see the references link.
null
2021-12-19T23:05:01.877248Z
2021-12-19T19:34:48.657996Z
null
null
null
null
null
Linux
GSD-2021-1000215
xprtrdma: Fix cwnd update ordering
xprtrdma: Fix cwnd update ordering This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit 19b5fa9489b5706bc878c3a522a7f771079e2fa0, it was introduced in version v5.5 by commit 2ae50ad68cd79224198b525f7bd645c9da98b6ff. For more details please see the references link.
null
2021-12-20T01:13:41.981210Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2ae50ad68cd79224198b525f7bd645c9da98b6ff'}
Linux
GSD-2021-1002228
ALSA: gus: fix null pointer dereference on pointer block
ALSA: gus: fix null pointer dereference on pointer block This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.291 by commit cb09c760c201f82df83babc92a5ffea0a01807fc. For more details please see the references link.
null
2021-12-19T22:36:41.423770Z
2021-11-29T02:34:20.227452Z
null
null
null
null
null
Linux
GSD-2022-1001282
drm/i915/gem: add missing boundary check in vm_access
drm/i915/gem: add missing boundary check in vm_access This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 8f0ebea8f6e8c474264ed97d7a64c9c09ed4f5aa, it was introduced in version v5.8 by commit 9f909e215fea0652023b9ed09d3d7bfe10386423. For more details please see the references link.
null
2022-04-25T06:29:43.469306Z
2022-04-24T21:01:05.989937Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9f909e215fea0652023b9ed09d3d7bfe10386423'}
Linux
GSD-2022-1001778
KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU
KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit af47248407c0c5ae52a752af1ab5ce5b0db91502, it was introduced in version v5.13 by commit b7cccd397f310739fb85383033e95580f99927e0. For more details please see the references link.
null
2022-04-25T03:00:22.652766Z
2022-04-24T21:41:52.034901Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b7cccd397f310739fb85383033e95580f99927e0'}
Linux
GSD-2022-1001056
scsi: pm8001: Fix task leak in pm8001_send_abort_all()
scsi: pm8001: Fix task leak in pm8001_send_abort_all() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 34c79d16ee69cb53288c202bb1ab0ba0130d9674. For more details please see the references link.
null
2022-04-25T05:02:41.380983Z
2022-04-24T20:42:45.327587Z
null
null
null
null
null
Linux
GSD-2021-1002506
nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done
nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.85 by commit 83ea620a1be840bf05089a5061fb8323ca42f38c, it was introduced in version v3.12 by commit ac22ac466a659f1b2e02a2e2ee23fc5c42da2c95. For more details please see the references link.
null
2021-12-19T23:31:31.659363Z
2021-12-19T19:40:23.381102Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac22ac466a659f1b2e02a2e2ee23fc5c42da2c95'}
Linux
GSD-2021-1000491
ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry
ipc/mqueue, msg, sem: avoid relying on a stack reference past its expiry This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.7 by commit 807fa14536b26803b858da878b643be72952a097, it was introduced in version v5.6 by commit c5b2cbdbdac563f46ecd5e187253ab1abbd6fc04. For more details please see the references link.
null
2021-12-20T00:03:47.937132Z
2021-05-31T23:45:20.564402Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c5b2cbdbdac563f46ecd5e187253ab1abbd6fc04'}
Linux
GSD-2022-1001406
drm/amdgpu: Fix recursive locking warning
drm/amdgpu: Fix recursive locking warning This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit c8c93088a51c9b27f311296a81769bd835d30f2e. For more details please see the references link.
null
2022-04-25T04:27:03.723757Z
2022-04-24T21:10:46.352601Z
null
null
null
null
null
Linux
GSD-2021-1002156
NFC: digital: fix possible memory leak in digital_in_send_sdd_req()
NFC: digital: fix possible memory leak in digital_in_send_sdd_req() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 291c932fc3692e4d211a445ba8aa35663831bac7, it was introduced in version v3.13 by commit 2c66daecc4092e6049673c281b2e6f0d5e59a94c. For more details please see the references link.
null
2021-12-19T22:46:56.670416Z
2021-11-14T15:22:29.018836Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c66daecc4092e6049673c281b2e6f0d5e59a94c'}
Linux
GSD-2022-1001955
scsi: target: tcmu: Fix possible page UAF
scsi: target: tcmu: Fix possible page UAF This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.112 by commit aec36b98a1bbaa84bfd8299a306e4c12314af626. For more details please see the references link.
null
2022-04-25T04:48:04.406963Z
2022-04-24T21:57:49.562730Z
null
null
null
null
null
Linux
GSD-2022-1000647
af_packet: fix data-race in packet_setsockopt / packet_setsockopt
af_packet: fix data-race in packet_setsockopt / packet_setsockopt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.6 by commit c074e2c8d67af5f0b1fb953d4ff960a8dc854eab, it was introduced in version v4.3 by commit 47dceb8ecdc1c3ad1818dfea3d659a05b74c3fc2. For more details please see the references link.
null
2022-03-07T01:39:57.749294Z
2022-02-27T03:35:49.813477Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/47dceb8ecdc1c3ad1818dfea3d659a05b74c3fc2'}
Linux
GSD-2022-1002380
llc: only change llc->dev when bind() succeeds
llc: only change llc->dev when bind() succeeds This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.237 by commit c106f9aa6cd8913af9188ad361899ae696b5de37, it was introduced in version v4.19.237 by commit d14193111c436fc5de33206c67c7afd45c730099. For more details please see the references link.
null
2022-04-24T22:41:00.313966Z
2022-04-24T22:41:00.313966Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d14193111c436fc5de33206c67c7afd45c730099'}
Linux
GSD-2021-1001280
misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge
misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.52 by commit 58f69684ba03e5b0e0a3ae844a845280c0f06309. For more details please see the references link.
null
2021-12-19T22:25:47.724087Z
2021-08-03T01:56:27.052110Z
null
null
null
null
null
Linux
GSD-2022-1000217
ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx()
ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.99 by commit 6877f87579ed830f9ff6d478539074f035d04bfb. For more details please see the references link.
null
2022-02-19T10:24:05.879807Z
2022-02-18T21:56:41.556776Z
null
null
null
null
null
Linux
GSD-2021-1000868
isdn: mISDN: netjet: Fix crash in nj_probe:
isdn: mISDN: netjet: Fix crash in nj_probe: This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.195 by commit bf78e25bd3f487208e042c67c8a31706c2dba265. For more details please see the references link.
null
2021-12-19T23:12:06.352997Z
2021-06-30T00:02:30.992096Z
null
null
null
null
null
Linux
GSD-2021-1000887
bonding: init notify_work earlier to avoid uninitialized use
bonding: init notify_work earlier to avoid uninitialized use This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.126 by commit e0172831c61a7684ff63160c22a627747e6c5268. For more details please see the references link.
null
2021-12-20T01:30:37.036994Z
2021-06-30T00:04:31.672502Z
null
null
null
null
null
Linux
GSD-2021-1001795
NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()
NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.252 by commit b7b023e6ff567e991c31cd425b0e1d16779c938b, it was introduced in version v3.13 by commit 1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8. For more details please see the references link.
null
2021-12-20T01:14:26.280219Z
2021-10-28T13:49:14.324549Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8'}
Linux
GSD-2022-1001810
kgdboc: fix return value of __setup handler
kgdboc: fix return value of __setup handler This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit a885e17cf5f2dd6606abe825a001fd09a5c29c2e, it was introduced in version v4.20 by commit 1bd54d851f50dea6af30c3e6ff4f3e9aab5558f9. For more details please see the references link.
null
2022-04-25T04:20:50.336899Z
2022-04-24T21:43:51.959682Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1bd54d851f50dea6af30c3e6ff4f3e9aab5558f9'}
Linux
GSD-2022-1000702
net: fix up skbs delta_truesize in UDP GRO frag_list
net: fix up skbs delta_truesize in UDP GRO frag_list This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.13 by commit 334b4736a22bfd482c71bfc13375248362b08768, it was introduced in version v5.11 by commit 53475c5dd856212e91538a9501162e821cc1f791. For more details please see the references link.
null
2022-03-18T02:55:05.746044Z
2022-03-18T00:11:00.432914Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/53475c5dd856212e91538a9501162e821cc1f791'}
Linux
GSD-2022-1000352
nvme: fix a possible use-after-free in controller reset during load
nvme: fix a possible use-after-free in controller reset during load This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.181 by commit 70356b756a58704e5c8818cb09da5854af87e765. For more details please see the references link.
null
2022-03-07T01:34:41.072282Z
2022-02-27T02:54:45.586460Z
null
null
null
null
null
Linux
GSD-2021-1002443
net: ethernet: dec: tulip: de4x5: fix possible array overflows in type3_infoblock()
net: ethernet: dec: tulip: de4x5: fix possible array overflows in type3_infoblock() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.164 by commit 57247f7035393c12a5819c589d52b6ee3edde8aa. For more details please see the references link.
null
2021-12-19T23:49:10.508691Z
2021-12-19T19:37:30.567229Z
null
null
null
null
null
Linux
GSD-2021-1000184
bpf: Fix masking negation logic upon negative dst register
bpf: Fix masking negation logic upon negative dst register This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.117 by commit 53e0db429b37a32b8fc706d0d90eb4583ad13848, it was introduced in version v5.0 by commit 979d63d50c0c0f7bc537bf821e056cc9fe5abd38. For more details please see the references link.
null
2021-12-19T23:11:02.585331Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/979d63d50c0c0f7bc537bf821e056cc9fe5abd38'}
Linux
GSD-2022-1001113
wireguard: socket: free skb in send6 when ipv6 is disabled
wireguard: socket: free skb in send6 when ipv6 is disabled This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 0b19bcb753dbfb74710d12bb2761ec5ed706c726, it was introduced in version v5.6 by commit e7096c131e5161fa3b8e52a650d7719d2857adfd. For more details please see the references link.
null
2022-04-25T03:10:15.741298Z
2022-04-24T20:46:25.490157Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e7096c131e5161fa3b8e52a650d7719d2857adfd'}
Linux
GSD-2021-1002013
isdn: mISDN: Fix sleeping function called from invalid context
isdn: mISDN: Fix sleeping function called from invalid context This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.156 by commit 4054b869dc263228d30a4755800b78f0f2ba0c89. For more details please see the references link.
null
2021-12-20T00:35:47.490570Z
2021-11-14T15:15:55.557315Z
null
null
null
null
null
Linux
GSD-2022-1001543
drm/bridge: anx7625: Fix overflow issue on reading EDID
drm/bridge: anx7625: Fix overflow issue on reading EDID This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit f0d5d938d51af4eb08d9d8684fd9903425a0a87d, it was introduced in version v5.11 by commit 8bdfc5dae4e3ba4d99dfb430ef43249e5f1b7730. For more details please see the references link.
null
2022-04-25T03:31:34.704459Z
2022-04-24T21:21:58.152955Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8bdfc5dae4e3ba4d99dfb430ef43249e5f1b7730'}
Linux
GSD-2021-1001516
cpufreq: schedutil: Destroy mutex before kobject_put() frees the memory
cpufreq: schedutil: Destroy mutex before kobject_put() frees the memory This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.285 by commit 1ba2e770481905b06f5684d6cbd0817a1432da2b, it was introduced in version v4.9.285 by commit cb4a53ba37532c861a5f3f22803391018a41849a. For more details please see the references link.
null
2021-10-19T16:21:46.097860Z
2021-10-19T16:21:46.097860Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cb4a53ba37532c861a5f3f22803391018a41849a'}
Linux
GSD-2022-1000581
RDMA/cma: Use correct address when leaving multicast group
RDMA/cma: Use correct address when leaving multicast group This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.22 by commit 7715682f357db296cbc70faa945994f75bd06357, it was introduced in version v5.10 by commit b5de0c60cc30c2a3513c7188c73f3f29acc29234. For more details please see the references link.
null
2022-03-07T01:54:16.550696Z
2022-02-27T03:27:06.973956Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b5de0c60cc30c2a3513c7188c73f3f29acc29234'}
Linux
GSD-2022-1002046
media: staging: media: zoran: calculate the right buffer number for zoran_reap_stat_com
media: staging: media: zoran: calculate the right buffer number for zoran_reap_stat_com This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit bafec1a6ba4b187a7fcdcfce0faebdc623d4ef8e. For more details please see the references link.
null
2022-04-25T04:59:34.503667Z
2022-04-24T22:05:42.389182Z
null
null
null
null
null
Linux
GSD-2021-1001146
i2c: robotfuzz-osif: fix control-request directions
i2c: robotfuzz-osif: fix control-request directions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13 by commit 4ca070ef0dd885616ef294d269a9bf8e3b258e1a, it was introduced in version v3.14 by commit 83e53a8f120f2f273cf0ad717f5372ab79ac24fe. For more details please see the references link.
null
2021-12-20T00:44:19.625989Z
2021-07-08T01:59:33.145005Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/83e53a8f120f2f273cf0ad717f5372ab79ac24fe'}
Linux
GSD-2022-1002416
ubifs: rename_whiteout: Fix double free for whiteout_ui->data
ubifs: rename_whiteout: Fix double free for whiteout_ui->data This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 8b3c7be16f3f4dfd6e15ac651484e59d3fa36274, it was introduced in version v4.9 by commit 9e0a1fff8db56eaaebb74b4a3ef65f86811c4798. For more details please see the references link.
null
2022-04-25T04:37:53.038359Z
2022-04-24T22:45:04.208002Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9e0a1fff8db56eaaebb74b4a3ef65f86811c4798'}
Linux
GSD-2021-1000307
soc/tegra: regulators: Fix locking up when voltage-spread is out of range
soc/tegra: regulators: Fix locking up when voltage-spread is out of range This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit ff39adf5d31c72025bba799aec69c5c86d81d549, it was introduced in version v5.5 by commit 783807436f363e5b1ad4d43ba7debbedfcadbb99. For more details please see the references link.
null
2021-12-20T00:17:03.617023Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/783807436f363e5b1ad4d43ba7debbedfcadbb99'}
Linux
GSD-2022-1001390
MIPS: fix fortify panic when copying asm exception handlers
MIPS: fix fortify panic when copying asm exception handlers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 3c6c4d4ac8b17adc7db797bf4b25ef22abc2dd1c. For more details please see the references link.
null
2022-04-25T06:58:54.831673Z
2022-04-24T21:10:00.024947Z
null
null
null
null
null
Linux
GSD-2022-1000978
macvlan: Fix leaking skb in source mode with nodst option
macvlan: Fix leaking skb in source mode with nodst option This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.4 by commit f382df5ff36bc9fa10e0f898f3051d0702085304, it was introduced in version v5.13 by commit 427f0c8c194b22edcafef1b0a42995ddc5c2227d. For more details please see the references link.
null
2022-04-25T03:51:23.115842Z
2022-04-24T20:36:32.738353Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/427f0c8c194b22edcafef1b0a42995ddc5c2227d'}
Linux
GSD-2021-1000757
mm, hugetlb: fix simple resv_huge_pages underflow on UFFDIO_COPY
mm, hugetlb: fix simple resv_huge_pages underflow on UFFDIO_COPY This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.125 by commit 14fd3da3e8d3de7f34d69dd4bfa5fd9e73d99911, it was introduced in version v4.11 by commit 8fb5debc5fcd450470cdd789c2d80ef95ebb8cf4. For more details please see the references link.
null
2021-12-20T00:59:41.789759Z
2021-06-25T00:02:48.831323Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8fb5debc5fcd450470cdd789c2d80ef95ebb8cf4'}
Linux
GSD-2021-1001845
can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv
can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit 864e77771a24c877aaf53aee019f78619cbcd668, it was introduced in version v5.4 by commit 9d71dd0c70099914fcd063135da3c580865e924c. For more details please see the references link.
null
2021-12-20T00:29:20.874221Z
2021-10-28T13:51:52.711503Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9d71dd0c70099914fcd063135da3c580865e924c'}
Linux
GSD-2021-1002290
ALSA: gus: fix null pointer dereference on pointer block
ALSA: gus: fix null pointer dereference on pointer block This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.82 by commit 1ac6cd87d8ddd36c43620f82c4d65b058f725f0f. For more details please see the references link.
null
2021-12-20T00:02:47.922837Z
2021-11-29T02:37:15.125595Z
null
null
null
null
null
Linux
GSD-2021-1002785
ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module
ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.223 by commit 925229d552724e1bba1abf01d3a0b1318539b012, it was introduced in version v4.15 by commit b2cfd8ab4add53c2070367bfee2f5b738f51698d. For more details please see the references link.
null
2022-01-11T05:52:41.922082Z
2021-12-30T02:43:20.156878Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b2cfd8ab4add53c2070367bfee2f5b738f51698d'}
Linux
GSD-2021-1000242
i2c: stm32f7: fix reference leak when pm_runtime_get_sync fails
i2c: stm32f7: fix reference leak when pm_runtime_get_sync fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit c7ea772c9fcf711ed566814b92eecaffc0e2bfd0, it was introduced in version v5.6 by commit ea6dd25deeb5b797a145be7f860e3085e7d104c3. For more details please see the references link.
null
2021-12-19T23:12:21.873166Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ea6dd25deeb5b797a145be7f860e3085e7d104c3'}
Linux
GSD-2021-1000612
NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()
NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit f9890652185b72b8de9ebeb4406037640b6e1b53, it was introduced in version v5.10.36 by commit 2fafe7d5047f98791afd9a1d90d2afb70debc590. For more details please see the references link.
null
2021-12-19T22:36:01.188542Z
2021-06-04T19:47:32.268144Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2fafe7d5047f98791afd9a1d90d2afb70debc590'}
Linux
GSD-2021-1001900
drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read
drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit 09f3946bb452918dbfb1982add56f9ffaae393dc, it was introduced in version v5.7 by commit e11f5bd8228fc3760c221f940b9f6365dbf3e7ed. For more details please see the references link.
null
2021-12-19T22:32:57.887574Z
2021-10-28T13:54:46.855807Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e11f5bd8228fc3760c221f940b9f6365dbf3e7ed'}