ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2021-1000608
iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers
iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit f70122825076117787b91e7f219e21c09f11a5b9, it was introduced in version v5.5 by commit d7857e4ee1ba69732b16c73b2f2dde83ecd78ee4. For more details please see the references link.
null
2021-12-20T01:16:36.541503Z
2021-06-04T19:46:47.525350Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d7857e4ee1ba69732b16c73b2f2dde83ecd78ee4'}
Linux
GSD-2021-1002635
sit: do not call ipip6_dev_free() from sit_init_net()
sit: do not call ipip6_dev_free() from sit_init_net() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.259 by commit 4e1797914d8f223726ff6ae5ece4f97d73f21bab, it was introduced in version v4.12 by commit cf124db566e6b036b8bcbe8decbed740bdfac8c6. For more details please see the references link.
null
2022-01-11T05:57:41.676414Z
2021-12-27T05:28:18.186978Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cf124db566e6b036b8bcbe8decbed740bdfac8c6'}
Linux
GSD-2022-1002119
video: fbdev: sm712fb: Fix crash in smtcfb_read()
video: fbdev: sm712fb: Fix crash in smtcfb_read() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 72af8810922eb143ed4f116db246789ead2d8543. For more details please see the references link.
null
2022-04-25T06:22:42.772004Z
2022-04-24T22:13:28.961664Z
null
null
null
null
null
Linux
GSD-2022-1000124
i40e: Fix queues reservation for XDP
i40e: Fix queues reservation for XDP This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.228 by commit d46fa4ea9756ef6cbcf9752d0832cc66e2d7121b, it was introduced in version v3.12 by commit 41c445ff0f482bb6e6b72dcee9e598e20575f743. For more details please see the references link.
null
2022-02-19T10:55:54.013849Z
2022-02-18T21:43:48.615565Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41c445ff0f482bb6e6b72dcee9e598e20575f743'}
Linux
GSD-2021-1001449
watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff()
watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.276 by commit b4565a8a2d6bffb05bfbec11399d261ec16fe373. For more details please see the references link.
null
2021-12-20T00:09:16.945303Z
2021-08-03T02:44:51.810479Z
null
null
null
null
null
Linux
GSD-2022-1000574
btrfs: fix use-after-free after failure to create a snapshot
btrfs: fix use-after-free after failure to create a snapshot This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.22 by commit a7b717fa15165d3d9245614680bebc48a52ac05d. For more details please see the references link.
null
2022-03-07T02:39:22.543491Z
2022-02-27T03:25:36.398517Z
null
null
null
null
null
Linux
GSD-2021-1001019
drm: Fix use-after-free read in drm_getunique()
drm: Fix use-after-free read in drm_getunique() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit f773f8cccac13c7e7bbd9182e7996c727742488e. For more details please see the references link.
null
2021-12-20T00:47:05.652590Z
2021-06-30T00:34:17.872934Z
null
null
null
null
null
Linux
GSD-2021-1000521
Bluetooth: SMP: Fail if remote and local public keys are identical
Bluetooth: SMP: Fail if remote and local public keys are identical This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.7 by commit 58cca5ec43be72a1af95f11966381e9953b0c9f5, it was introduced in version v3.17 by commit bfe01a5ba2490f299e1d2d5508cbbbadd897bbe9. For more details please see the references link.
null
2021-12-19T22:36:45.367337Z
2021-05-31T23:50:21.706053Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bfe01a5ba2490f299e1d2d5508cbbbadd897bbe9'}
Linux
GSD-2021-1000171
ext4: fix check to prevent false positive report of incorrect used inodes
ext4: fix check to prevent false positive report of incorrect used inodes This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.118 by commit 9c61387630a54e35b96a90608aafd369ffb86f39, it was introduced in version v4.18 by commit 5012284700775a4e6e3fbe7eac4c543c4874b559. For more details please see the references link.
null
2021-12-20T00:45:30.242836Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5012284700775a4e6e3fbe7eac4c543c4874b559'}
Linux
GSD-2021-1001330
watchdog: Fix possible use-after-free by calling del_timer_sync()
watchdog: Fix possible use-after-free by calling del_timer_sync() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.134 by commit db222f1477ad5692cd454709b714949807e5d111. For more details please see the references link.
null
2021-12-19T22:27:27.373680Z
2021-08-03T02:10:51.248920Z
null
null
null
null
null
Linux
GSD-2022-1002230
NFS: remove unneeded check in decode_devicenotify_args()
NFS: remove unneeded check in decode_devicenotify_args() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit efc605469e4773690bfd09aee946ebd62bde7609, it was introduced in version v4.0 by commit a4f743a6bb201662962fa888e3f978583d61691e. For more details please see the references link.
null
2022-04-25T04:25:39.178941Z
2022-04-24T22:23:40.864077Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a4f743a6bb201662962fa888e3f978583d61691e'}
Linux
GSD-2021-1001760
afs: Fix page leak
afs: Fix page leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.9 by commit d130b5fdd42254d92948d06347940276140c927e, it was introduced in version v5.13 by commit e87b03f5830ecd8ca21836d3ee48c74f8d58fa31. For more details please see the references link.
null
2021-12-20T00:09:41.249935Z
2021-10-19T16:35:24.465648Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e87b03f5830ecd8ca21836d3ee48c74f8d58fa31'}
Linux
GSD-2021-1000872
drm: Fix use-after-free read in drm_getunique()
drm: Fix use-after-free read in drm_getunique() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.195 by commit 7d233ba700ceb593905ea82b42dadb4ec8ef85e9. For more details please see the references link.
null
2021-12-20T00:54:06.732860Z
2021-06-30T00:02:46.319031Z
null
null
null
null
null
Linux
GSD-2021-1001275
scsi: megaraid_sas: Fix resource leak in case of probe failure
scsi: megaraid_sas: Fix resource leak in case of probe failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.52 by commit 0680db6f41920b2c91c7df3cc9cd5968701a6f74. For more details please see the references link.
null
2021-12-19T22:22:46.050384Z
2021-08-03T01:55:26.717802Z
null
null
null
null
null
Linux
GSD-2022-1000718
tipc: fix a bit overflow in tipc_crypto_key_rcv()
tipc: fix a bit overflow in tipc_crypto_key_rcv() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.13 by commit 35f4fa41a7eafd5bfbc1c440c38e87cf83857762. For more details please see the references link.
null
2022-03-18T02:57:39.272332Z
2022-03-18T00:12:02.885763Z
null
null
null
null
null
Linux
GSD-2021-1001625
drm/nouveau/kms/nv50-: fix file release memory leak
drm/nouveau/kms/nv50-: fix file release memory leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.73 by commit 65fff0a8efcdca8d84ffe3e23057c3b32403482d, it was introduced in version v5.9 by commit 12885ecbfe62df4358d452080d3b8feef54ec8cb. For more details please see the references link.
null
2021-12-19T23:45:02.326446Z
2021-10-19T16:28:50.038993Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/12885ecbfe62df4358d452080d3b8feef54ec8cb'}
Linux
GSD-2021-1000937
net/nfc/rawsock.c: fix a permission check bug
net/nfc/rawsock.c: fix a permission check bug This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.44 by commit 1e5cab50208c8fb7351b798cb1d569debfeb994a. For more details please see the references link.
null
2021-12-20T01:26:37.629304Z
2021-06-30T00:25:40.059887Z
null
null
null
null
null
Linux
GSD-2022-1000348
iwlwifi: fix use-after-free
iwlwifi: fix use-after-free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.181 by commit 494de920d98f125b099f27a2d274850750aff957, it was introduced in version v5.4.174 by commit 0446cafa843e6db4982731c167e11c80d42be7e2. For more details please see the references link.
null
2022-03-07T01:34:24.341319Z
2022-02-27T02:54:16.861282Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0446cafa843e6db4982731c167e11c80d42be7e2'}
Linux
GSD-2022-1002375
NFSD: prevent underflow in nfssvc_decode_writeargs()
NFSD: prevent underflow in nfssvc_decode_writeargs() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 9f0f048c1bfa7867d565a95fd8c28f4484ba1043. For more details please see the references link.
null
2022-04-25T05:28:15.767085Z
2022-04-24T22:40:36.714610Z
null
null
null
null
null
Linux
GSD-2021-1002459
ALSA: pcm: oss: Fix negative period/buffer sizes
ALSA: pcm: oss: Fix negative period/buffer sizes This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.165 by commit f12c8a7515f641885677960af450082569a87243. For more details please see the references link.
null
2021-12-20T02:18:51.599785Z
2021-12-19T19:38:16.578890Z
null
null
null
null
null
Linux
GSD-2021-1000464
ACPI: scan: Fix a memory leak in an error handling path
ACPI: scan: Fix a memory leak in an error handling path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.233 by commit 5ab9857dde7c3ea3faef6b128d718cf8ba98721b, it was introduced in version v4.14.228 by commit 717d9d88fbd956ab03fad97266f6ce63a036e7f8. For more details please see the references link.
null
2021-12-19T23:01:31.762930Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/717d9d88fbd956ab03fad97266f6ce63a036e7f8'}
Linux
GSD-2022-1001109
rtc: gamecube: Fix refcount leak in gamecube_rtc_read_offset_from_sram
rtc: gamecube: Fix refcount leak in gamecube_rtc_read_offset_from_sram This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit de66e4f28dfd11f954966c447b4430529ed040a2, it was introduced in version v5.17 by commit 86559400b3ef9de93ba50523cffe767c35cd531a. For more details please see the references link.
null
2022-04-25T03:35:15.185208Z
2022-04-24T20:46:03.897267Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/86559400b3ef9de93ba50523cffe767c35cd531a'}
Linux
GSD-2021-1002009
powerpc/idle: Don't corrupt back chain when going idle
powerpc/idle: Don't corrupt back chain when going idle This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.156 by commit 8e25a62e8dab7bb09da337354ed1be5df61f83a0, it was introduced in version v5.4.156 by commit 80bbb0bc3a0288442f7fe6fc514f4ee1cb06ccb7. For more details please see the references link.
null
2021-11-14T15:15:46.054537Z
2021-11-14T15:15:46.054537Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80bbb0bc3a0288442f7fe6fc514f4ee1cb06ccb7'}
Linux
GSD-2021-1000034
libbpf: Fix potential NULL pointer dereference
libbpf: Fix potential NULL pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.32 by commit 7f8e59c4c5e5142e3f0d78f8f01b523027bbf151, it was introduced in version v5.10.30 by commit 4cc9177b099e251bd1f7713a0517d622b1b442b1. For more details please see the references link.
null
2021-12-20T00:48:15.396566Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4cc9177b099e251bd1f7713a0517d622b1b442b1'}
Linux
GSD-2022-1001559
ASoC: mediatek: mt8192-mt6359: Fix error handling in mt8192_mt6359_dev_probe
ASoC: mediatek: mt8192-mt6359: Fix error handling in mt8192_mt6359_dev_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit d5a38629f1aaf397fd471b27e49d55289ddc0656, it was introduced in version v5.16.3 by commit d1be8577f0b2f679095d237aaf281dca344f06c4. For more details please see the references link.
null
2022-04-25T03:11:21.026674Z
2022-04-24T21:23:29.305671Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d1be8577f0b2f679095d237aaf281dca344f06c4'}
Linux
GSD-2022-1001277
clocksource/drivers/exynos_mct: Handle DTS with higher number of interrupts
clocksource/drivers/exynos_mct: Handle DTS with higher number of interrupts This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit f154834fc36aa70d65801e49e2b09fb303aae296, it was introduced in version v3.10 by commit 36ba5d527e9567ed303bad6e86a5f3c2723470f6. For more details please see the references link.
null
2022-04-25T05:28:09.599038Z
2022-04-24T21:00:47.738655Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/36ba5d527e9567ed303bad6e86a5f3c2723470f6'}
Linux
GSD-2021-1001808
NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()
NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.213 by commit 9881b0c860649f27ef2565deef011e516390f416, it was introduced in version v3.13 by commit 1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8. For more details please see the references link.
null
2021-12-20T01:37:25.256018Z
2021-10-28T13:49:58.598763Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8'}
Linux
GSD-2021-1002727
firmware: arm_scpi: Fix string overflow in SCPI genpd driver
firmware: arm_scpi: Fix string overflow in SCPI genpd driver This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit 976389cbb16cee46847e5d06250a3a0b5506781e, it was introduced in version v4.8 by commit 8bec4337ad4023b26de35d3b0c3a3b2735ffc5c7. For more details please see the references link.
null
2022-01-11T06:00:14.340890Z
2021-12-27T05:39:27.531180Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8bec4337ad4023b26de35d3b0c3a3b2735ffc5c7'}
Linux
GSD-2022-1000935
vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
vhost/vsock: don't check owner in vhost_vsock_stop() while releasing This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.269 by commit 6ac6ca7907d7e6057a0aa4e9af48cbd2a8b2afaa, it was introduced in version v4.8 by commit 433fc58e6bf2c8bd97e57153ed28e64fd78207b8. For more details please see the references link.
null
2022-03-18T03:43:50.473146Z
2022-03-18T00:34:14.221423Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/433fc58e6bf2c8bd97e57153ed28e64fd78207b8'}
Linux
GSD-2022-1001627
tpm: use try_get_ops() in tpm-space.c
tpm: use try_get_ops() in tpm-space.c This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.18 by commit eda1662cce964c8a65bb86321f8d9cfa6e9ceaab. For more details please see the references link.
null
2022-04-25T05:01:48.252523Z
2022-04-24T21:29:52.649133Z
null
null
null
null
null
Linux
GSD-2021-1002377
net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings()
net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.292 by commit b4f217d6fcc00c3fdc0921a7691f30be7490b073, it was introduced in version v3.9 by commit 7f9664525f9cb507de9198a395a111371413f230. For more details please see the references link.
null
2021-12-19T22:30:32.802492Z
2021-12-19T19:34:36.396283Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7f9664525f9cb507de9198a395a111371413f230'}
Linux
GSD-2022-1000466
drop_monitor: fix data-race in dropmon_net_event / trace_napi_poll_hit
drop_monitor: fix data-race in dropmon_net_event / trace_napi_poll_hit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit 3077976a752aa45392d0683f428ead099bc74661, it was introduced in version v2.6.31 by commit 4ea7e38696c7e798c47ebbecadfd392f23f814f9. For more details please see the references link.
null
2022-03-07T01:38:21.696172Z
2022-02-27T03:11:13.438007Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4ea7e38696c7e798c47ebbecadfd392f23f814f9'}
Linux
GSD-2022-1000036
tomoyo: Check exceeded quota early in tomoyo_domain_quota_is_ok().
tomoyo: Check exceeded quota early in tomoyo_domain_quota_is_ok(). This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.170 by commit 930d4986a432e89447ebf38be5244732c58ec9a3. For more details please see the references link.
null
2022-01-11T05:47:11.498002Z
2022-01-10T19:51:08.671646Z
null
null
null
null
null
Linux
GSD-2022-1000523
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 9681823f96a811268265f35307072ad80713c274, it was introduced in version v3.9 by commit e2ca90c276e1fc410d7cd3c1a4eee245ec902a20. For more details please see the references link.
null
2022-03-07T01:41:04.555494Z
2022-02-27T03:19:08.593882Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e2ca90c276e1fc410d7cd3c1a4eee245ec902a20'}
Linux
GSD-2022-1000489
net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change
net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 5f6024c05a2c0fdd180b29395aaf686d25af3a0f. For more details please see the references link.
null
2022-03-07T02:53:58.628364Z
2022-02-27T03:14:29.262765Z
null
null
null
null
null
Linux
GSD-2022-1000173
iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping()
iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.178 by commit 5c43d46daa0d2928234dd2792ebebc35d29ee2d1, it was introduced in version v5.4.54 by commit 36f7355545725c5e9400520ae33e6ee16cf78c0e. For more details please see the references link.
null
2022-02-19T02:59:01.653993Z
2022-02-18T21:50:56.283656Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/36f7355545725c5e9400520ae33e6ee16cf78c0e'}
Linux
GSD-2021-1002662
xen/blkfront: harden blkfront against event channel storms
xen/blkfront: harden blkfront against event channel storms This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.222 by commit 269d7124bcfad2558d2329d0fe603ca20b20d3f4. For more details please see the references link.
null
2022-01-11T06:43:24.283447Z
2021-12-27T05:34:50.359111Z
null
null
null
null
null
Linux
GSD-2022-1001332
ALSA: oss: Fix PCM OSS buffer allocation overflow
ALSA: oss: Fix PCM OSS buffer allocation overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.1 by commit e74a069c6a7bb505f3ade141dddf85f4b0b5145a. For more details please see the references link.
null
2022-04-25T05:38:58.239814Z
2022-04-24T21:05:12.805812Z
null
null
null
null
null
Linux
GSD-2021-1002398
serial: core: fix transmit-buffer reset and memleak
serial: core: fix transmit-buffer reset and memleak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.257 by commit e74d9663fd57640fc3394abb5c76fa95b9cc2f2e, it was introduced in version v4.9 by commit 761ed4a94582ab291aa24dcbea4e01e8936488c8. For more details please see the references link.
null
2021-12-20T00:45:01.321968Z
2021-12-19T19:35:34.364601Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/761ed4a94582ab291aa24dcbea4e01e8936488c8'}
Linux
GSD-2021-1002232
usb: musb: tusb6010: check return value after calling platform_get_resource()
usb: musb: tusb6010: check return value after calling platform_get_resource() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.291 by commit b3f43659eb0b9af2e6ef18a8d829374610b19e7a. For more details please see the references link.
null
2021-12-19T22:34:05.411774Z
2021-11-29T02:34:29.982744Z
null
null
null
null
null
Linux
GSD-2022-1001298
mm/kmemleak: reset tag when compare object pointer
mm/kmemleak: reset tag when compare object pointer This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit cf67c97a3064f8da06f499efc661b9303cef7720. For more details please see the references link.
null
2022-04-25T04:27:07.623512Z
2022-04-24T21:02:11.634480Z
null
null
null
null
null
Linux
GSD-2022-1000870
xen/gnttab: fix gnttab_end_foreign_access() without page specified
xen/gnttab: fix gnttab_end_foreign_access() without page specified This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.184 by commit 782e5ebcc888003731e6256048c758fc1ab84d3f. For more details please see the references link.
null
2022-03-18T02:50:48.490789Z
2022-03-18T00:26:12.150583Z
null
null
null
null
null
Linux
GSD-2022-1001762
ubifs: Fix 'ui->dirty' race between do_tmpfile() and writeback work
ubifs: Fix 'ui->dirty' race between do_tmpfile() and writeback work This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit a9662bec5a4dfc87b1503e26aec1aadfdf521658, it was introduced in version v4.9 by commit 474b93704f32163af4bfa728fddc570eba357353. For more details please see the references link.
null
2022-04-25T06:12:56.089344Z
2022-04-24T21:40:49.953334Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/474b93704f32163af4bfa728fddc570eba357353'}
Linux
GSD-2021-1001737
hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field
hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit 746011193f44f97f8784edcf8327c587946745fc. For more details please see the references link.
null
2021-12-20T00:17:01.597560Z
2021-10-19T16:34:16.389853Z
null
null
null
null
null
Linux
GSD-2021-1002818
NFSD: Fix READDIR buffer overflow
NFSD: Fix READDIR buffer overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.12 by commit eabc0aab98e5218ceecd82069b0d6fdfff5ee885, it was introduced in version v5.13 by commit f5dcccd647da513a89f3b6ca392b0c1eb050b9fc. For more details please see the references link.
null
2022-01-11T05:57:58.439641Z
2021-12-30T02:44:46.461866Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f5dcccd647da513a89f3b6ca392b0c1eb050b9fc'}
Linux
GSD-2021-1000825
x86/kvm: Disable all PV features on crash
x86/kvm: Disable all PV features on crash This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.10 by commit 9b77839fd4b636c78ae75b2fc4fe8321ea0c9da3, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T00:40:37.008412Z
2021-06-25T00:09:44.922896Z
null
null
null
null
null
Linux
GSD-2022-1002267
video: fbdev: sm712fb: Fix crash in smtcfb_read()
video: fbdev: sm712fb: Fix crash in smtcfb_read() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 478154be3a8c21ff106310bb1037b1fc9d81dc62. For more details please see the references link.
null
2022-04-25T03:26:46.269782Z
2022-04-24T22:28:26.315555Z
null
null
null
null
null
Linux
GSD-2021-1001367
netrom: Decrease sock refcount when sock timers expire
netrom: Decrease sock refcount when sock timers expire This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.199 by commit 9619cc7d97c3aa8ed3cfd2b8678b74fb6d6c7950, it was introduced in version v4.19.20 by commit 2c6b572458a9127e8070df13fa7f115c29ab1d92. For more details please see the references link.
null
2021-12-19T22:40:36.009664Z
2021-08-03T02:20:18.294018Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c6b572458a9127e8070df13fa7f115c29ab1d92'}
Linux
GSD-2022-1001918
mm: invalidate hwpoison page cache page in fault path
mm: invalidate hwpoison page cache page in fault path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 3bae72c2db693ec421647fbf7e7a097842e73276. For more details please see the references link.
null
2022-04-25T06:46:53.941013Z
2022-04-24T21:54:22.130091Z
null
null
null
null
null
Linux
GSD-2021-1000126
ovl: fix leaked dentry
ovl: fix leaked dentry This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.19 by commit cf3e3330bc5719fa9d658e3e2f596bde89344a94, it was introduced in version v5.8 by commit 6815f479ca90ee7fd2e28b2a420f796b974155fe. For more details please see the references link.
null
2021-12-20T01:05:36.136626Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6815f479ca90ee7fd2e28b2a420f796b974155fe'}
Linux
GSD-2021-1000576
cxgb4: avoid accessing registers when clearing filters
cxgb4: avoid accessing registers when clearing filters This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit 02f03883fdb10ad7e66717c70ea163a8d27ae6e7, it was introduced in version v5.2 by commit b1a79360ee862f8ada4798ad2346fa45bb41b527. For more details please see the references link.
null
2021-12-20T01:19:47.344501Z
2021-06-04T19:41:33.887433Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b1a79360ee862f8ada4798ad2346fa45bb41b527'}
Linux
GSD-2021-1000599
net/mlx5e: Fix null deref accessing lag dev
net/mlx5e: Fix null deref accessing lag dev This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit 2e4b0b95a489259f9d35a3db17023061f8f3d587, it was introduced in version v5.8 by commit 7e51891a237f9ea319f53f9beb83afb0077d88e6. For more details please see the references link.
null
2021-12-19T22:11:28.280147Z
2021-06-04T19:45:06.988214Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7e51891a237f9ea319f53f9beb83afb0077d88e6'}
Linux
GSD-2021-1000063
sfc: farch: fix TX queue lookup in TX event handling
sfc: farch: fix TX queue lookup in TX event handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.3 by commit e531db1ea6f98c9612cb2de093a107c7eadfb96c, it was introduced in version v5.10 by commit 12804793b17c0e19115a90d98f2f3df0cb79e233. For more details please see the references link.
null
2021-12-19T23:40:21.787747Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/12804793b17c0e19115a90d98f2f3df0cb79e233'}
Linux
GSD-2021-1000433
m68k: mvme147,mvme16x: Don't wipe PCC timer config bits
m68k: mvme147,mvme16x: Don't wipe PCC timer config bits This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.119 by commit f6a90818a32058fca62cda3a2027a6a2364e1878, it was introduced in version v5.2 by commit 7529b90d051e4629884771ba2b1d3a87d2c6a9d7. For more details please see the references link.
null
2021-12-20T00:52:22.889689Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7529b90d051e4629884771ba2b1d3a87d2c6a9d7'}
Linux
GSD-2021-1001388
dm btree remove: assign new_root only when removal succeeds
dm btree remove: assign new_root only when removal succeeds This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.198 by commit 8fbae4a1bdb5b889490cdee929e68540151536e5. For more details please see the references link.
null
2021-12-20T00:05:22.441782Z
2021-08-03T02:26:32.925620Z
null
null
null
null
null
Linux
GSD-2022-1002322
drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj
drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 72d77ddb2224ebc00648f4f78f8a9a259dccbdf7. For more details please see the references link.
null
2022-04-25T06:26:01.328240Z
2022-04-24T22:34:13.725415Z
null
null
null
null
null
Linux
GSD-2021-1001672
enetc: Fix illegal access when reading affinity_hint
enetc: Fix illegal access when reading affinity_hint This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.70 by commit 6c3f1b741c6c2914ea120e3a5790d3e900152f7b, it was introduced in version v5.1 by commit d4fd0404c1c95b17880f254ebfee3485693fa8ba. For more details please see the references link.
null
2021-12-19T21:43:54.239523Z
2021-10-19T16:31:06.438433Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d4fd0404c1c95b17880f254ebfee3485693fa8ba'}
Linux
GSD-2021-1000960
ASoC: core: Fix Null-point-dereference in fmt_single_name()
ASoC: core: Fix Null-point-dereference in fmt_single_name() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.44 by commit 0e2c9aeb00289f279b8181fbd4c20765127d8943, it was introduced in version v5.10 by commit 45dd9943fce08f1b38352ff9453682253bdf19b7. For more details please see the references link.
null
2021-12-20T00:34:12.232736Z
2021-06-30T00:29:23.068345Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/45dd9943fce08f1b38352ff9453682253bdf19b7'}
Linux
GSD-2022-1002288
ALSA: pcm: Test for "silence" field in struct "pcm_format_data"
ALSA: pcm: Test for "silence" field in struct "pcm_format_data" This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.239 by commit eb04e3112a3516e483d60a9af9762961702a6c1b. For more details please see the references link.
null
2022-04-25T05:42:56.691495Z
2022-04-24T22:30:32.334132Z
null
null
null
null
null
Linux
GSD-2021-1001222
seq_buf: Fix overflow in seq_buf_putmem_hex()
seq_buf: Fix overflow in seq_buf_putmem_hex() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.3 by commit d57fcab190b60f43046d5836c3c56114b4f50080, it was introduced in version v2.6.27 by commit 5e3ca0ec76fce92daa4eed0d02de9c79b1fe3920. For more details please see the references link.
null
2021-12-20T00:24:40.049148Z
2021-08-03T01:40:33.349246Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5e3ca0ec76fce92daa4eed0d02de9c79b1fe3920'}
Linux
GSD-2022-1000020
Input: appletouch - initialize work before device registration
Input: appletouch - initialize work before device registration This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.261 by commit 292d2ac61fb0d9276a0f7b7ce4f50426f2a1c99f, it was introduced in version v2.6.23 by commit 5a6eb676d3bc4d7a6feab200a92437b62ad298da. For more details please see the references link.
null
2022-01-11T05:48:24.806849Z
2022-01-10T19:50:28.240530Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5a6eb676d3bc4d7a6feab200a92437b62ad298da'}
Linux
GSD-2022-1000470
perf bpf: Defer freeing string after possible strlen() on it
perf bpf: Defer freeing string after possible strlen() on it This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit bf4161eb7e3bc63986eab516b147196d2240d743, it was introduced in version v5.8 by commit 04f9bf2bac72480ca1d289b751b956dd1707a5d5. For more details please see the references link.
null
2022-03-07T01:44:28.164191Z
2022-02-27T03:11:40.761814Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/04f9bf2bac72480ca1d289b751b956dd1707a5d5'}
Linux
GSD-2021-1002361
net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings()
net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.294 by commit 3a061d54e260b701b538873b43e399d9b8b83e03, it was introduced in version v3.9 by commit 7f9664525f9cb507de9198a395a111371413f230. For more details please see the references link.
null
2021-12-19T23:50:46.957127Z
2021-12-19T19:33:56.668393Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7f9664525f9cb507de9198a395a111371413f230'}
Linux
GSD-2022-1001631
llc: only change llc->dev when bind() succeeds
llc: only change llc->dev when bind() succeeds This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.18 by commit 313ab7d716675b12cfde3d78981f21785b139279, it was introduced in version v5.16.18 by commit 6f5bf395c60ed2643de51f2b1041cb0882e9d97f. For more details please see the references link.
null
2022-04-24T21:30:13.029205Z
2022-04-24T21:30:13.029205Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6f5bf395c60ed2643de51f2b1041cb0882e9d97f'}
Linux
GSD-2022-1000923
usb: gadget: clear related members when goto fail
usb: gadget: clear related members when goto fail This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.270 by commit 70959fa1a003cb7c6ed2fd0e0f887125d08b8bf6. For more details please see the references link.
null
2022-03-18T02:56:27.747689Z
2022-03-18T00:32:33.115958Z
null
null
null
null
null
Linux
GSD-2022-1000889
nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac()
nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.182 by commit 5ad5886f85b6bd893e3ed19013765fb0c243c069, it was introduced in version v5.1 by commit 20cce88650981ec504d328dbbdd004d991eb8535. For more details please see the references link.
null
2022-03-18T02:58:18.049881Z
2022-03-18T00:28:28.761604Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/20cce88650981ec504d328dbbdd004d991eb8535'}
Linux
GSD-2021-1002731
net: netlink: af_netlink: Prevent empty skb by adding a check on len.
net: netlink: af_netlink: Prevent empty skb by adding a check on len. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.10 by commit 4c986072a8c9249b9398c7a18f216dc26a9f0e35. For more details please see the references link.
null
2022-01-11T05:51:04.423714Z
2021-12-27T05:45:16.820516Z
null
null
null
null
null
Linux
GSD-2022-1001261
ASoC: soc-compress: prevent the potentially use of null pointer
ASoC: soc-compress: prevent the potentially use of null pointer This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit f69a75cb8a98c6c487d620442c68595726a69f60, it was introduced in version v5.4 by commit 467fece8fbc6774a3a3bd0981e1a342fb5022706. For more details please see the references link.
null
2022-04-25T05:30:22.610924Z
2022-04-24T20:59:04.743101Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/467fece8fbc6774a3a3bd0981e1a342fb5022706'}
Linux
GSD-2022-1001774
mmc: host: Return an error when ->enable_sdio_irq() ops is missing
mmc: host: Return an error when ->enable_sdio_irq() ops is missing This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 251a11699fe5007363cb1ae9700256a3c777a551. For more details please see the references link.
null
2022-04-25T06:57:55.759175Z
2022-04-24T21:41:37.888384Z
null
null
null
null
null
Linux
GSD-2022-1000866
sr9700: sanity check for packet length
sr9700: sanity check for packet length This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.103 by commit 4f5f5411f0c14ac0b61d5e6a77d996dd3d5b5fd3. For more details please see the references link.
null
2022-03-18T03:00:50.690161Z
2022-03-18T00:25:56.408440Z
null
null
null
null
null
Linux
GSD-2021-1002224
scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()
scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.293 by commit ad4776b5eb2e58af1226847fcd3b4f6d051674dd. For more details please see the references link.
null
2021-12-20T00:55:21.340334Z
2021-11-29T02:34:10.470086Z
null
null
null
null
null
Linux
GSD-2021-1000219
dmaengine: idxd: Fix potential null dereference on pointer status
dmaengine: idxd: Fix potential null dereference on pointer status This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit 7bc402f843e7817a4a808e7b9ab0bcd7ffd55bfa, it was introduced in version v5.11 by commit 89e3becd8f821e507052e012d2559dcda59f538e. For more details please see the references link.
null
2021-12-20T00:19:41.295653Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/89e3becd8f821e507052e012d2559dcda59f538e'}
Linux
GSD-2022-1001324
llc: only change llc->dev when bind() succeeds
llc: only change llc->dev when bind() succeeds This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.1 by commit d5ac598705e1eb40e952cf7c8fe8b48c8dea897e, it was introduced in version v5.17.1 by commit ef1a6fe3563cf47ce4fd555727ca80085cf18884. For more details please see the references link.
null
2022-04-24T21:04:36.292813Z
2022-04-24T21:04:36.292813Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef1a6fe3563cf47ce4fd555727ca80085cf18884'}
Linux
GSD-2021-1002674
rds: memory leak in __rds_conn_create()
rds: memory leak in __rds_conn_create() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.168 by commit 166f0adf7e7525c87595ceadb21a91e2a9519a1e, it was introduced in version v5.4.126 by commit a3842219a69d23d3b7cc72274af1beb51434449a. For more details please see the references link.
null
2022-01-11T05:47:32.565452Z
2021-12-27T05:36:13.820667Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a3842219a69d23d3b7cc72274af1beb51434449a'}
Linux
GSD-2021-1000649
drm/amd/amdgpu: fix refcount leak
drm/amd/amdgpu: fix refcount leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.193 by commit 599e5d61ace952b0bb9bd942b198bbd0cfded1d7, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T01:02:31.695613Z
2021-06-04T19:54:45.368657Z
null
null
null
null
null
Linux
GSD-2022-1000165
rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink()
rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.177 by commit bd43771ee9759dd9dfae946bff190e2c5a120de5, it was introduced in version v3.14 by commit ba7d49b1f0f8e5f24294a880ed576964059af5ef. For more details please see the references link.
null
2022-02-19T02:53:38.269713Z
2022-02-18T21:49:16.919767Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ba7d49b1f0f8e5f24294a880ed576964059af5ef'}
Linux
GSD-2022-1002158
gcc-plugins: latent_entropy: use /dev/urandom
gcc-plugins: latent_entropy: use /dev/urandom This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.190 by commit 7a9e1327ccb27fc87c51a943270992c3250454e4, it was introduced in version v4.9 by commit 38addce8b600ca335dc86fa3d48c890f1c6fa1f4. For more details please see the references link.
null
2022-04-25T05:09:22.709172Z
2022-04-24T22:16:54.090710Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/38addce8b600ca335dc86fa3d48c890f1c6fa1f4'}
Linux
GSD-2021-1001408
net: ti: fix UAF in tlan_remove_one
net: ti: fix UAF in tlan_remove_one This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.241 by commit 0538b0ab7d2c396e385694228c7cdcd2d2c514e9, it was introduced in version v3.10 by commit 1e0a8b13d35510e711fdf72e9a3e30bcb2bd49fa. For more details please see the references link.
null
2021-12-20T00:18:20.505527Z
2021-08-03T02:32:27.105872Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e0a8b13d35510e711fdf72e9a3e30bcb2bd49fa'}
Linux
GSD-2022-1000535
net: ieee802154: at86rf230: Stop leaking skb's
net: ieee802154: at86rf230: Stop leaking skb's This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit 1c72f04d52b7200bb83426a9bed378668271ea4a. For more details please see the references link.
null
2022-03-07T02:59:40.857954Z
2022-02-27T03:20:30.312670Z
null
null
null
null
null
Linux
GSD-2022-1002508
video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe()
video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit d1b6a1f0c23b7164250479bf92e2893291dca539, it was introduced in version v3.2 by commit 3c8a63e22a0802fd56380f6ab305b419f18eb6f5. For more details please see the references link.
null
2022-04-25T05:14:09.462084Z
2022-04-24T22:56:14.650836Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c8a63e22a0802fd56380f6ab305b419f18eb6f5'}
Linux
GSD-2021-1001058
udp: fix race between close() and udp_abort()
udp: fix race between close() and udp_abort() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit 65310b0aff86980a011c7c7bfa487a333d4ca241, it was introduced in version v4.9 by commit 5d77dca82839ef016a93ad7acd7058b14d967752. For more details please see the references link.
null
2021-12-20T00:52:58.494720Z
2021-06-30T00:36:51.115979Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5d77dca82839ef016a93ad7acd7058b14d967752'}
Linux
GSD-2021-1000560
NFS: fix an incorrect limit in filelayout_decode_layout()
NFS: fix an incorrect limit in filelayout_decode_layout() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit d34fb628f6ef522f996205a9e578216bbee09e84, it was introduced in version v2.6.37 by commit 16b374ca439fb406e46e071f75428f5b033056f8. For more details please see the references link.
null
2021-12-19T23:08:20.327958Z
2021-06-04T19:38:57.087884Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/16b374ca439fb406e46e071f75428f5b033056f8'}
Linux
GSD-2021-1000130
thermal/drivers/cpufreq_cooling: Fix slab OOB issue
thermal/drivers/cpufreq_cooling: Fix slab OOB issue This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.36 by commit c24a20912eef00587416628149c438e885eb1304, it was introduced in version v5.8 by commit 371a3bc79c11b707d7a1b7a2c938dc3cc042fffb. For more details please see the references link.
null
2021-12-20T00:08:09.204578Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/371a3bc79c11b707d7a1b7a2c938dc3cc042fffb'}
Linux
GSD-2021-1000999
KVM: X86: Fix x86_emulator slab cache leak
KVM: X86: Fix x86_emulator slab cache leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit 3a9934d6b8dd8a91d61ed2d0d538fa27cb9192a3, it was introduced in version v5.7 by commit c9b8b07cded58c55ad2bf67e68b9bfae96092293. For more details please see the references link.
null
2021-12-19T22:42:40.722675Z
2021-06-30T00:32:18.498348Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c9b8b07cded58c55ad2bf67e68b9bfae96092293'}
Linux
GSD-2021-1001371
net: validate lwtstate->data before returning from skb_tunnel_info()
net: validate lwtstate->data before returning from skb_tunnel_info() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.199 by commit 8bb1589c89e61e3b182dd546f1021928ebb5c2a6, it was introduced in version v4.3 by commit 61adedf3e3f1d3f032c5a6a299978d91eff6d555. For more details please see the references link.
null
2021-12-19T23:14:52.284204Z
2021-08-03T02:21:30.235238Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61adedf3e3f1d3f032c5a6a299978d91eff6d555'}
Linux
GSD-2022-1002271
ASoC: SOF: Intel: Fix NULL ptr dereference when ENOMEM
ASoC: SOF: Intel: Fix NULL ptr dereference when ENOMEM This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 01df5f7627f1624d6bb0b8c0870a569b32adfbf8, it was introduced in version v5.2 by commit d16046ffa6de040bf580a64d5f4d0aa18258a854. For more details please see the references link.
null
2022-04-25T07:27:49.805038Z
2022-04-24T22:28:43.549100Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d16046ffa6de040bf580a64d5f4d0aa18258a854'}
Linux
GSD-2021-1000833
perf: Fix data race between pin_count increment/decrement
perf: Fix data race between pin_count increment/decrement This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.273 by commit 668bd53c549e1d6de8873c9037de98f042240b1e, it was introduced in version v2.6.39 by commit fe4b04fa31a6dcf4358aa84cf81e5a7fd079469b. For more details please see the references link.
null
2021-12-19T23:04:49.515615Z
2021-06-30T00:00:12.856709Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fe4b04fa31a6dcf4358aa84cf81e5a7fd079469b'}
Linux
GSD-2021-1001721
sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb
sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit 8180611c238e11676612eb2a9828b1c7a3a4d77b, it was introduced in version v4.8 by commit 3acb50c18d8d6650f10919464ade4dcdaf41d62f. For more details please see the references link.
null
2021-12-19T23:37:39.388957Z
2021-10-19T16:33:29.389459Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3acb50c18d8d6650f10919464ade4dcdaf41d62f'}
Linux
GSD-2021-1001234
bus: mhi: core: Validate channel ID when processing command completions
bus: mhi: core: Validate channel ID when processing command completions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.54 by commit 3efec3b4b16fc7af25676a94230a8ab2a3bb867c, it was introduced in version v5.7 by commit 1d3173a3bae7039b765a0956e3e4bf846dbaacb8. For more details please see the references link.
null
2021-12-20T00:06:49.760083Z
2021-08-03T01:44:35.700198Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1d3173a3bae7039b765a0956e3e4bf846dbaacb8'}
Linux
GSD-2022-1000759
arm64: entry.S: Add ventry overflow sanity checks
arm64: entry.S: Add ventry overflow sanity checks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.28 by commit b7beeab84f02091124b176ba34c71a601762d1de. For more details please see the references link.
null
2022-03-18T02:53:08.047133Z
2022-03-18T00:15:46.700767Z
null
null
null
null
null
Linux
GSD-2021-1000976
mac80211: fix skb length check in ieee80211_scan_rx()
mac80211: fix skb length check in ieee80211_scan_rx() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit 5a1cd67a801cf5ef989c4783e07b86a25b143126, it was introduced in version v5.10 by commit cd418ba63f0c2f6157f35a41c9accc6ecb52590a. For more details please see the references link.
null
2021-12-19T22:21:24.874120Z
2021-06-30T00:30:52.573789Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cd418ba63f0c2f6157f35a41c9accc6ecb52590a'}
Linux
GSD-2021-1001664
blktrace: Fix uaf in blk_trace access after removing by sysfs
blktrace: Fix uaf in blk_trace access after removing by sysfs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.70 by commit 3815fe7371d2411ce164281cef40d9fc7b323dee, it was introduced in version v2.6.30 by commit c71a896154119f4ca9e89d6078f5f63ad60ef199. For more details please see the references link.
null
2021-12-20T01:11:58.177256Z
2021-10-19T16:30:40.016524Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c71a896154119f4ca9e89d6078f5f63ad60ef199'}
Linux
GSD-2022-1002334
ARM: mmp: Fix failure to remove sram device
ARM: mmp: Fix failure to remove sram device This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 609d47b36516f8dd894cf5997e755553b471baef. For more details please see the references link.
null
2022-04-25T03:24:56.480310Z
2022-04-24T22:35:28.368239Z
null
null
null
null
null
Linux
GSD-2022-1000309
net: ieee802154: at86rf230: Stop leaking skb's
net: ieee802154: at86rf230: Stop leaking skb's This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.268 by commit af649e5c95f56df64363bc46f6746b87819f9c0d. For more details please see the references link.
null
2022-03-07T01:49:40.355150Z
2022-02-27T02:49:11.135751Z
null
null
null
null
null
Linux
GSD-2021-1000425
powerpc/64s: Fix pte update for kernel memory on radix
powerpc/64s: Fix pte update for kernel memory on radix This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.119 by commit 73f9dccb29e4f82574bec2765c0090cdb0404301, it was introduced in version v4.18 by commit f1cb8f9beba8699dd1b4518418191499e53f7b17. For more details please see the references link.
null
2021-12-20T01:30:29.711073Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f1cb8f9beba8699dd1b4518418191499e53f7b17'}
Linux
GSD-2021-1002418
net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings()
net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.220 by commit 57af54a56024435d83e44c78449513b414eb6edf, it was introduced in version v3.9 by commit 7f9664525f9cb507de9198a395a111371413f230. For more details please see the references link.
null
2021-12-19T23:12:40.117570Z
2021-12-19T19:36:30.783520Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7f9664525f9cb507de9198a395a111371413f230'}
Linux
GSD-2022-1001148
btrfs: do not double complete bio on errors during compressed reads
btrfs: do not double complete bio on errors during compressed reads This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 987b5df1d10355d377315a26e7fb6c72ded83c9f. For more details please see the references link.
null
2022-04-25T04:53:38.882131Z
2022-04-24T20:48:57.705748Z
null
null
null
null
null
Linux
GSD-2021-1000075
cifs: fix regression when mounting shares with prefix paths
cifs: fix regression when mounting shares with prefix paths This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.3 by commit ee3b051cd948f3cc3e049f3b5049c3b0b7fc4b88, it was introduced in version v5.12.3 by commit 0049109550011245df45d4a2abf60960f3eac6af. For more details please see the references link.
null
2021-06-24T22:55:39.077047Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0049109550011245df45d4a2abf60960f3eac6af'}
Linux
GSD-2021-1002048
mm, slub: fix mismatch between reconstructed freelist depth and cnt
mm, slub: fix mismatch between reconstructed freelist depth and cnt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit 48843dd23c7bfcb0f0c3a02926d660f939dc2b9f, it was introduced in version v4.17 by commit c3895391df385c6628638f014c87e16f5e2efd45. For more details please see the references link.
null
2021-12-19T23:49:10.338339Z
2021-11-14T15:17:30.068643Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c3895391df385c6628638f014c87e16f5e2efd45'}
Linux
GSD-2022-1001518
bpf, sockmap: Fix memleak in tcp_bpf_sendmsg while sk msg is full
bpf, sockmap: Fix memleak in tcp_bpf_sendmsg while sk msg is full This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit f677328f05f52d535cbdc15cb04476db49477eb4, it was introduced in version v4.20 by commit 604326b41a6fb9b4a78b6179335decee0365cd8c. For more details please see the references link.
null
2022-04-25T06:52:42.767838Z
2022-04-24T21:19:29.367002Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/604326b41a6fb9b4a78b6179335decee0365cd8c'}