ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2022-1001236
ptp: unregister virtual clocks when unregistering physical clock.
ptp: unregister virtual clocks when unregistering physical clock. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit c49eafe6249f844c26f9866886cc6719d81762df, it was introduced in version v5.14 by commit 73f37068d540eba5f93ba3a0019bf479d35ebd76. For more details please see the references link.
null
2022-04-25T03:20:41.703677Z
2022-04-24T20:56:34.275284Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/73f37068d540eba5f93ba3a0019bf479d35ebd76'}
Linux
GSD-2021-1002766
scsi: scsi_debug: Don't call kcalloc() if size arg is zero
scsi: scsi_debug: Don't call kcalloc() if size arg is zero This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit 47d11d35203b0aa13533634e270fe2c3610e531b. For more details please see the references link.
null
2022-01-11T05:51:26.813098Z
2021-12-27T05:52:49.632255Z
null
null
null
null
null
Linux
GSD-2021-1001849
powerpc/smp: do not decrement idle task preempt count in CPU offline
powerpc/smp: do not decrement idle task preempt count in CPU offline This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit 53770a411559cf7bc0906d1df319cc533d2f4f58, it was introduced in version v5.10.50 by commit bdf4d33e8342b90386156204e1da0cdfdb4bf146. For more details please see the references link.
null
2021-12-20T00:36:06.139498Z
2021-10-28T13:52:04.691288Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bdf4d33e8342b90386156204e1da0cdfdb4bf146'}
Linux
GSD-2022-1001666
btrfs: release correct delalloc amount in direct IO write path
btrfs: release correct delalloc amount in direct IO write path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.35 by commit 07cacfd9d9dc134557ac8866c73d570a59b3d1f3, it was introduced in version v5.15.27 by commit 5afd80c393f4e87451f14eefb7f2f24daf434e06. For more details please see the references link.
null
2022-04-25T03:18:27.768247Z
2022-04-24T21:33:16.771073Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5afd80c393f4e87451f14eefb7f2f24daf434e06'}
Linux
GSD-2022-1000974
drm/amdkfd: Check for potential null return of kmalloc_array()
drm/amdkfd: Check for potential null return of kmalloc_array() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.4 by commit 0a692c625e373fef692ffbc7fc41f8a025f01cb7. For more details please see the references link.
null
2022-04-25T05:07:02.890146Z
2022-04-24T20:36:11.163169Z
null
null
null
null
null
Linux
GSD-2021-1002336
scsi: scsi_debug: Fix out-of-bound read in resp_readcap16()
scsi: scsi_debug: Fix out-of-bound read in resp_readcap16() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit 5b8bed6464ad6653586e30df046185fd816ad999. For more details please see the references link.
null
2021-12-19T22:23:45.437016Z
2021-11-29T02:39:23.221292Z
null
null
null
null
null
Linux
GSD-2022-1000427
net: dsa: ar9331: register the mdiobus under devres
net: dsa: ar9331: register the mdiobus under devres This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit aae1c6a1d3d696fc33b609fb12fe744a556d1dc5, it was introduced in version v5.9 by commit ac3a68d56651c3dad2c12c7afce065fe15267f44. For more details please see the references link.
null
2022-03-07T01:43:05.849679Z
2022-02-27T03:05:18.468677Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac3a68d56651c3dad2c12c7afce065fe15267f44'}
Linux
GSD-2022-1000098
usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS
usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.265 by commit 973e0d9e5fcd975bd95ddf544b279f764940b835, it was introduced in version v4.14.237 by commit 8cd5f45c1b769e3e9e0f4325dd08b6c3749dc7ee. For more details please see the references link.
null
2022-02-20T06:19:06.197213Z
2022-02-18T21:34:58.682206Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8cd5f45c1b769e3e9e0f4325dd08b6c3749dc7ee'}
Linux
GSD-2022-1000562
Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj
Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit 92e25b637cd4e010f776c86e4810300e773eac5c, it was introduced in version v4.15 by commit c2e5df616e1ae6c2a074cb241ebb65a318ebaf7c. For more details please see the references link.
null
2022-03-07T01:39:08.211251Z
2022-02-27T03:24:14.944816Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c2e5df616e1ae6c2a074cb241ebb65a318ebaf7c'}
Linux
GSD-2022-1000132
net: amd-xgbe: Fix skb data length underflow
net: amd-xgbe: Fix skb data length underflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.228 by commit 34aeb4da20f93ac80a6291a2dbe7b9c6460e9b26, it was introduced in version v4.11 by commit 622c36f143fc9566ba49d7cec994c2da1182d9e2. For more details please see the references link.
null
2022-02-19T09:24:58.352535Z
2022-02-18T21:44:42.403325Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/622c36f143fc9566ba49d7cec994c2da1182d9e2'}
Linux
GSD-2022-1001689
arch/arm64: Fix topology initialization for core scheduling
arch/arm64: Fix topology initialization for core scheduling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 87f5d66daa5f457449bb95d6b8d18bb7596aa627, it was introduced in version v5.14 by commit 9edeaea1bc452372718837ed2ba775811baf1ba1. For more details please see the references link.
null
2022-04-25T03:00:07.262292Z
2022-04-24T21:35:28.974809Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9edeaea1bc452372718837ed2ba775811baf1ba1'}
Linux
GSD-2021-1002623
net: systemport: Add global locking for descriptor lifecycle
net: systemport: Add global locking for descriptor lifecycle This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.294 by commit de57f62f76450b934de8203711bdc4f7953c3421, it was introduced in version v3.16 by commit 80105befdb4b8cea924711b40b2462b87df65b62. For more details please see the references link.
null
2022-01-11T05:53:14.055474Z
2021-12-27T05:27:42.979692Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80105befdb4b8cea924711b40b2462b87df65b62'}
Linux
GSD-2022-1001373
virtio_console: eliminate anonymous module_init & module_exit
virtio_console: eliminate anonymous module_init & module_exit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 3fd5dee7404ce40c79cba468bb2510115639d975. For more details please see the references link.
null
2022-04-25T04:49:14.051122Z
2022-04-24T21:08:53.217516Z
null
null
null
null
null
Linux
GSD-2021-1002273
usb: musb: tusb6010: check return value after calling platform_get_resource()
usb: musb: tusb6010: check return value after calling platform_get_resource() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.162 by commit 3ee15f1af17407be381bcf06a78fa60b471242dd. For more details please see the references link.
null
2021-12-19T23:23:32.391949Z
2021-11-29T02:36:25.227472Z
null
null
null
null
null
Linux
GSD-2021-1002789
hamradio: defer ax25 kfree after unregister_netdev
hamradio: defer ax25 kfree after unregister_netdev This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.223 by commit 896193a02a2981e60c40d4614fd095ce92135ccd. For more details please see the references link.
null
2022-01-11T05:47:26.667364Z
2021-12-30T02:43:29.419902Z
null
null
null
null
null
Linux
GSD-2022-1001723
scsi: pm8001: Fix tag leaks on error
scsi: pm8001: Fix tag leaks on error This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 43c617eefab7077d69f5989ad3e2a273da1d728b. For more details please see the references link.
null
2022-04-25T04:40:38.694241Z
2022-04-24T21:37:45.324569Z
null
null
null
null
null
Linux
GSD-2022-1000831
net: fix up skbs delta_truesize in UDP GRO frag_list
net: fix up skbs delta_truesize in UDP GRO frag_list This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.104 by commit 4e178ed14bda47942c1ccad3f60b774870b45db9, it was introduced in version v5.10.10 by commit 24cd3317418955fd9489e4e7e9c2b643691b270b. For more details please see the references link.
null
2022-03-18T02:55:09.221742Z
2022-03-18T00:22:28.255292Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/24cd3317418955fd9489e4e7e9c2b643691b270b'}
Linux
GSD-2021-1000864
NFS: Fix a potential NULL dereference in nfs_get_client()
NFS: Fix a potential NULL dereference in nfs_get_client() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.237 by commit 634f17ff1d59905eb3b4bbbc00805961d08beaee, it was introduced in version v3.17 by commit 31434f496abb9f3410b10f541462fe58613dd3ad. For more details please see the references link.
null
2021-12-19T22:54:40.868295Z
2021-06-30T00:02:16.450320Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/31434f496abb9f3410b10f541462fe58613dd3ad'}
Linux
GSD-2021-1001776
can: peak_pci: peak_pci_remove(): fix UAF
can: peak_pci: peak_pci_remove(): fix UAF This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.290 by commit 1c616528ba4aeb1125a06b407572ab7b56acae38, it was introduced in version v3.4 by commit e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd. For more details please see the references link.
null
2021-12-19T22:30:13.981658Z
2021-10-28T13:48:20.639240Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd'}
Linux
GSD-2022-1002226
lib/test: use after free in register_test_dev_kmod()
lib/test: use after free in register_test_dev_kmod() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 1f316b42a8e30ccb6524d2f3812b122f46a6e40d, it was introduced in version v4.13 by commit d9c6a72d6fa29d3a7999dda726577e5d1fccafa5. For more details please see the references link.
null
2022-04-25T06:19:33.532331Z
2022-04-24T22:23:12.393973Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9c6a72d6fa29d3a7999dda726577e5d1fccafa5'}
Linux
GSD-2021-1001326
nfs: fix acl memory leak of posix_acl_create()
nfs: fix acl memory leak of posix_acl_create() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.134 by commit d0b32dc1409f7e65e4fcc34e236462268e69a357, it was introduced in version v3.14 by commit 013cdf1088d7235da9477a2375654921d9b9ba9f. For more details please see the references link.
null
2021-12-19T23:50:20.874436Z
2021-08-03T02:09:52.320662Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/013cdf1088d7235da9477a2375654921d9b9ba9f'}
Linux
GSD-2022-1001959
net/smc: Fix NULL pointer dereference in smc_pnet_find_ib()
net/smc: Fix NULL pointer dereference in smc_pnet_find_ib() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.112 by commit 35b91e49bc80ca944a8679c3b139ddaf2f8eea0f, it was introduced in version v5.1 by commit af5f60c7e3d593c2fa31b9a62c16eae75f074de3. For more details please see the references link.
null
2022-04-25T04:13:06.793438Z
2022-04-24T21:58:20.723756Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/af5f60c7e3d593c2fa31b9a62c16eae75f074de3'}
Linux
GSD-2021-1000167
dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails
dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.118 by commit a992a283c0b77d0a7c2c348add0e6a21fb1dab67, it was introduced in version v4.6 by commit 1c357a1e86a4227a6b6059f2de118ae47659cebc. For more details please see the references link.
null
2021-12-19T23:24:56.147722Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c357a1e86a4227a6b6059f2de118ae47659cebc'}
Linux
GSD-2021-1000537
btrfs: do not BUG_ON in link_to_fixup_dir
btrfs: do not BUG_ON in link_to_fixup_dir This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit b545442133580dcb2f2496133bf850824d41255c, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T00:10:17.828004Z
2021-06-04T19:35:13.916465Z
null
null
null
null
null
Linux
GSD-2021-1000022
KVM: VMX: Don't use vcpu->run->internal.ndata as an array index
KVM: VMX: Don't use vcpu->run->internal.ndata as an array index This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.32 by commit 7f64753835a78c7d2cc2932a5808ef3b7fd4c050, it was introduced in version v5.9 by commit 1aa561b1a4c0ae2a9a9b9c21a84b5ca66b4775d8. For more details please see the references link.
null
2021-12-20T00:18:11.648016Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1aa561b1a4c0ae2a9a9b9c21a84b5ca66b4775d8'}
Linux
GSD-2021-1000472
spi: Fix use-after-free with devm_spi_alloc_*
spi: Fix use-after-free with devm_spi_alloc_* This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.233 by commit 8e029707f50a82c53172359c686b2536ab54e58c, it was introduced in version v4.14.212 by commit 8c45a1c6c951bbe7f95db78fcab46f7337364468. For more details please see the references link.
null
2021-12-19T22:31:41.970918Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c45a1c6c951bbe7f95db78fcab46f7337364468'}
Linux
GSD-2022-1002363
ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe
ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit b0c56a0071116a37c24df998166c22a7e4684626, it was introduced in version v3.8 by commit 531f67e41dcde1e358cf821d056241a66355cf03. For more details please see the references link.
null
2022-04-25T05:29:07.009353Z
2022-04-24T22:39:04.440747Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/531f67e41dcde1e358cf821d056241a66355cf03'}
Linux
GSD-2021-1000921
net: qrtr: fix OOB Read in qrtr_endpoint_post
net: qrtr: fix OOB Read in qrtr_endpoint_post This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.128 by commit 26b8d10703a9be45d6097946b2b4011f7dd2c56f, it was introduced in version v4.15 by commit 194ccc88297ae78d0803adad83c6dcc369787c9e. For more details please see the references link.
null
2021-12-19T22:49:25.299451Z
2021-06-30T00:24:38.613212Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/194ccc88297ae78d0803adad83c6dcc369787c9e'}
Linux
GSD-2021-1001633
usb: dwc2: check return value after calling platform_get_resource()
usb: dwc2: check return value after calling platform_get_resource() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.72 by commit 2754fa3b73df7d0ae042f3ed6cfd9df9042f6262. For more details please see the references link.
null
2021-12-20T00:03:46.462241Z
2021-10-19T16:29:11.747558Z
null
null
null
null
null
Linux
GSD-2021-1001799
mm, slub: fix mismatch between reconstructed freelist depth and cnt
mm, slub: fix mismatch between reconstructed freelist depth and cnt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.214 by commit 21e23e4c02fc9aa1f4b037f30e47d215d1a27f21, it was introduced in version v4.17 by commit c3895391df385c6628638f014c87e16f5e2efd45. For more details please see the references link.
null
2021-12-20T00:22:55.218666Z
2021-10-28T13:49:31.970478Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c3895391df385c6628638f014c87e16f5e2efd45'}
Linux
GSD-2021-1001263
memory: fsl_ifc: fix leak of private memory on probe failure
memory: fsl_ifc: fix leak of private memory on probe failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.52 by commit b5789e23773f4a852fbfe244b63f675e265d3a7f, it was introduced in version v3.3 by commit a20cbdeffce247a2b6fb83cd8d22433994068565. For more details please see the references link.
null
2021-12-19T23:40:52.638382Z
2021-08-03T01:52:24.978508Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a20cbdeffce247a2b6fb83cd8d22433994068565'}
Linux
GSD-2021-1001074
phy: phy-mtk-tphy: Fix some resource leaks in mtk_phy_init()
phy: phy-mtk-tphy: Fix some resource leaks in mtk_phy_init() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit 6472955af5e88b5489b6d78316082ad56ea3e489. For more details please see the references link.
null
2021-12-20T00:19:10.647351Z
2021-06-30T00:37:55.229713Z
null
null
null
null
null
Linux
GSD-2022-1000519
net: dsa: fix panic when DSA master device unbinds on shutdown
net: dsa: fix panic when DSA master device unbinds on shutdown This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 89b60402d43cdab4387dbbf24afebda5cf092ae7, it was introduced in version v5.15 by commit 0650bf52b31ff35dc6430fc2e37969c36baba724. For more details please see the references link.
null
2022-03-07T01:38:11.169133Z
2022-02-27T03:18:41.220424Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0650bf52b31ff35dc6430fc2e37969c36baba724'}
Linux
GSD-2021-1001424
scsi: core: Fix bad pointer dereference when ehandler kthread is invalid
scsi: core: Fix bad pointer dereference when ehandler kthread is invalid This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.240 by commit f3d0a109240c9bed5c60d819014786be3a2fe515, it was introduced in version v4.14.237 by commit db08ce595dd64ea9859f7d088b51cbfc8e685c66. For more details please see the references link.
null
2021-12-20T00:24:10.530483Z
2021-08-03T02:36:21.989542Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/db08ce595dd64ea9859f7d088b51cbfc8e685c66'}
Linux
GSD-2022-1000149
tracing/histogram: Fix a potential memory leak for kstrdup()
tracing/histogram: Fix a potential memory leak for kstrdup() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.176 by commit 8a8878ebb596281f50fc0b9a6e1f23f0d7f154e8, it was introduced in version v5.4.19 by commit 38b67e60b6b582e81f9db1b2e7176cbbfbd3e574. For more details please see the references link.
null
2022-02-19T09:49:42.714778Z
2022-02-18T21:47:26.761207Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/38b67e60b6b582e81f9db1b2e7176cbbfbd3e574'}
Linux
GSD-2022-1002174
mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0)
mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0) This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit c19d8de4e682ec4b0ea2b04a832cd8cc0be3bb31. For more details please see the references link.
null
2022-04-25T03:19:21.262346Z
2022-04-24T22:18:36.515886Z
null
null
null
null
null
Linux
GSD-2021-1002658
media: mxl111sf: change mutex_init() location
media: mxl111sf: change mutex_init() location This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.222 by commit 4b2d9600b31f9ba7adbc9f3c54a068615d27b390, it was introduced in version v3.7 by commit 8572211842afc53c8450fb470f2b8d02ba7592e0. For more details please see the references link.
null
2022-01-11T05:47:43.126731Z
2021-12-27T05:33:32.147393Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8572211842afc53c8450fb470f2b8d02ba7592e0'}
Linux
GSD-2021-1000665
iommu/vt-d: Fix sysfs leak in alloc_iommu()
iommu/vt-d: Fix sysfs leak in alloc_iommu() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.193 by commit 2ec5e9bb6b0560c90d315559c28a99723c80b996, it was introduced in version v4.11 by commit 39ab9555c24110671f8dc671311a26e5c985b592. For more details please see the references link.
null
2021-12-19T23:12:22.498967Z
2021-06-04T19:57:55.753508Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/39ab9555c24110671f8dc671311a26e5c985b592'}
Linux
GSD-2021-1001977
NFC: digital: fix possible memory leak in digital_in_send_sdd_req()
NFC: digital: fix possible memory leak in digital_in_send_sdd_req() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.213 by commit 071bdef36391958c89af5fa2172f691b31baa212, it was introduced in version v3.13 by commit 2c66daecc4092e6049673c281b2e6f0d5e59a94c. For more details please see the references link.
null
2021-12-19T22:43:33.867434Z
2021-11-14T15:14:19.084374Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c66daecc4092e6049673c281b2e6f0d5e59a94c'}
Linux
GSD-2022-1001308
riscv: Increase stack size under KASAN
riscv: Increase stack size under KASAN This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit b91e1db8a8fa56ce57410368b230527e1547439e, it was introduced in version v5.6 by commit 8ad8b72721d0f07fa02dbe71f901743f9c71c8e6. For more details please see the references link.
null
2022-04-25T06:28:21.097698Z
2022-04-24T21:02:47.661564Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ad8b72721d0f07fa02dbe71f901743f9c71c8e6'}
Linux
GSD-2021-1002208
scsi: core: Put LLD module refcnt after SCSI device is released
scsi: core: Put LLD module refcnt after SCSI device is released This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit f2b85040acec9a928b4eb1b57a989324e8e38d3f. For more details please see the references link.
null
2021-12-19T22:18:34.655600Z
2021-11-14T15:24:45.063941Z
null
null
null
null
null
Linux
GSD-2021-1000235
mt76: mt7921: fix possible invalid register access
mt76: mt7921: fix possible invalid register access This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit b13cbc536990ff609afa878b6211cd6f6265ba60, it was introduced in version v5.12 by commit ffa1bf97425bd511b105ce769976e20a845a71e9. For more details please see the references link.
null
2021-12-19T22:10:07.164734Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ffa1bf97425bd511b105ce769976e20a845a71e9'}
Linux
GSD-2022-1001758
wireguard: socket: free skb in send6 when ipv6 is disabled
wireguard: socket: free skb in send6 when ipv6 is disabled This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 402991a9771587acc2947cf6c4d689c5397f2258, it was introduced in version v5.6 by commit e7096c131e5161fa3b8e52a650d7719d2857adfd. For more details please see the references link.
null
2022-04-25T05:43:06.547663Z
2022-04-24T21:40:12.516988Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e7096c131e5161fa3b8e52a650d7719d2857adfd'}
Linux
GSD-2021-1000720
net: caif: add proper error handling
net: caif: add proper error handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.272 by commit 4f6da6c526a0bf470536b59fdb219d11336e390e, it was introduced in version v3.3 by commit 7c18d2205ea76eef9674e59e1ecae4f332a53e9e. For more details please see the references link.
null
2021-12-19T22:57:55.117090Z
2021-06-24T23:59:07.014641Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7c18d2205ea76eef9674e59e1ecae4f332a53e9e'}
Linux
GSD-2021-1001832
xhci: Fix command ring pointer corruption while aborting a command
xhci: Fix command ring pointer corruption while aborting a command This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.155 by commit 01c2dcb67e71c351006dd17cbba86c26b7f61eaf. For more details please see the references link.
null
2021-12-19T23:13:53.518417Z
2021-10-28T13:51:16.765395Z
null
null
null
null
null
Linux
GSD-2021-1001998
nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells
nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.155 by commit 0594f1d048d8dc338eb9a240021b1d00ae1eb082, it was introduced in version v4.3 by commit 69aba7948cbe53f2f1827e84e9dd0ae470a5072e. For more details please see the references link.
null
2021-12-19T23:29:13.941229Z
2021-11-14T15:15:12.388515Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69aba7948cbe53f2f1827e84e9dd0ae470a5072e'}
Linux
GSD-2021-1000370
media: atomisp: Fix use after free in atomisp_alloc_css_stat_bufs()
media: atomisp: Fix use after free in atomisp_alloc_css_stat_bufs() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit d218c7a0284f6b92a7b82d2e19706e18663b4193, it was introduced in version v5.8 by commit ad85094b293e40e7a2f831b0311a389d952ebd5e. For more details please see the references link.
null
2021-12-19T22:59:11.740412Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ad85094b293e40e7a2f831b0311a389d952ebd5e'}
Linux
GSD-2022-1002461
drm/amdkfd: Check for potential null return of kmalloc_array()
drm/amdkfd: Check for potential null return of kmalloc_array() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit 32cf90a521dcc0f136db7ee5ba32bfe5f79e460e. For more details please see the references link.
null
2022-04-25T05:06:02.397858Z
2022-04-24T22:50:31.951502Z
null
null
null
null
null
Linux
GSD-2021-1001131
cfg80211: call cfg80211_leave_ocb when switching away from OCB
cfg80211: call cfg80211_leave_ocb when switching away from OCB This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.14 by commit c84ccd00b25521f349ceca3f0b36b2410635c225. For more details please see the references link.
null
2021-12-19T23:55:07.853353Z
2021-07-08T01:58:32.319123Z
null
null
null
null
null
Linux
GSD-2022-1002031
ubifs: rename_whiteout: Fix double free for whiteout_ui->data
ubifs: rename_whiteout: Fix double free for whiteout_ui->data This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit a90e2dbe66d2647ff95a0442ad2e86482d977fd8, it was introduced in version v4.9 by commit 9e0a1fff8db56eaaebb74b4a3ef65f86811c4798. For more details please see the references link.
null
2022-04-25T04:31:16.483184Z
2022-04-24T22:04:39.390837Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9e0a1fff8db56eaaebb74b4a3ef65f86811c4798'}
Linux
GSD-2021-1001561
mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap
mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.209 by commit 76538c7b4df314bb937e44c5cb1782f37d47443c, it was introduced in version v4.7 by commit 646e76bb5daf4ca38438c69ffb72cccb605f3466. For more details please see the references link.
null
2021-12-20T01:09:23.645821Z
2021-10-19T16:23:50.413677Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/646e76bb5daf4ca38438c69ffb72cccb605f3466'}
Linux
GSD-2022-1001534
xsk: Fix race at socket teardown
xsk: Fix race at socket teardown This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit d1579253ffce39986e7a6ab757ac93b2680a665f, it was introduced in version v5.4 by commit 42fddcc7c64b723a867c7b2f5f7505e244212f13. For more details please see the references link.
null
2022-04-25T05:12:17.851160Z
2022-04-24T21:21:04.204568Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/42fddcc7c64b723a867c7b2f5f7505e244212f13'}
Linux
GSD-2021-1000059
media: staging/intel-ipu3: Fix memory leak in imu_fmt
media: staging/intel-ipu3: Fix memory leak in imu_fmt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.3 by commit 74ba0adb5e983503b18a96121d965cad34ac7ce3, it was introduced in version v5.2 by commit 6d5f26f2e045f2377b524516194657c00efbbce8. For more details please see the references link.
null
2021-12-20T01:12:00.087572Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6d5f26f2e045f2377b524516194657c00efbbce8'}
Linux
GSD-2021-1002064
cgroup: Fix memory leak caused by missing cgroup_bpf_offline
cgroup: Fix memory leak caused by missing cgroup_bpf_offline This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.77 by commit 01599bf7cc2b49c3d2be886cb438647dc25446ed, it was introduced in version v5.10 by commit 2b0d3d3e4fcfb19d10f9a82910b8f0f05c56ee3e. For more details please see the references link.
null
2021-12-19T22:50:08.562574Z
2021-11-14T15:18:16.781243Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2b0d3d3e4fcfb19d10f9a82910b8f0f05c56ee3e'}
Linux
GSD-2022-1001164
gcc-plugins/stackleak: Exactly match strings instead of prefixes
gcc-plugins/stackleak: Exactly match strings instead of prefixes This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 0a639f01f90dea71462320d2e477d716a2479a61. For more details please see the references link.
null
2022-04-25T05:44:18.442779Z
2022-04-24T20:49:44.110591Z
null
null
null
null
null
Linux
GSD-2021-1000409
powerpc/64s: Fix crashes when toggling entry flush barrier
powerpc/64s: Fix crashes when toggling entry flush barrier This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.120 by commit 0b4eb172cc12dc102cd0ad013e53ee4463db9508, it was introduced in version v5.4.79 by commit b65458b6be8032c5179d4f562038575d7b3a6be3. For more details please see the references link.
null
2021-12-19T23:39:47.896593Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b65458b6be8032c5179d4f562038575d7b3a6be3'}
Linux
GSD-2021-1002434
ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE
ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.163 by commit dc9eb93d5a0ab4c096d9aa45113be5d0a9aa6201, it was introduced in version v3.8 by commit 9c4566a117a6fe404a0e49b27ac71b631945a70f. For more details please see the references link.
null
2021-12-20T01:07:18.081197Z
2021-12-19T19:37:08.119618Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9c4566a117a6fe404a0e49b27ac71b631945a70f'}
Linux
GSD-2022-1002318
MIPS: fix fortify panic when copying asm exception handlers
MIPS: fix fortify panic when copying asm exception handlers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 5176c671afb67130298cf5653949309decf4ae66. For more details please see the references link.
null
2022-04-25T03:35:05.819542Z
2022-04-24T22:33:49.676038Z
null
null
null
null
null
Linux
GSD-2022-1000325
net: ieee802154: at86rf230: Stop leaking skb's
net: ieee802154: at86rf230: Stop leaking skb's This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.231 by commit 6312f6a53fd3ea38125dcaca5e3c9aa7d8a60cf7. For more details please see the references link.
null
2022-03-07T01:35:27.101603Z
2022-02-27T02:51:40.656212Z
null
null
null
null
null
Linux
GSD-2021-1001648
mac80211-hwsim: fix late beacon hrtimer handling
mac80211-hwsim: fix late beacon hrtimer handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.71 by commit 2c204cf594df3b9468368dc9d0b24d482d93cda7, it was introduced in version v3.9 by commit 01e59e467ecf976c782eecd4dc99644802cc60e2. For more details please see the references link.
null
2021-12-19T22:54:00.845044Z
2021-10-19T16:29:54.758881Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/01e59e467ecf976c782eecd4dc99644802cc60e2'}
Linux
GSD-2022-1001867
udmabuf: validate ubuf->pagecount
udmabuf: validate ubuf->pagecount This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 811b667cefbea9cb7511a874b169d6a92907137e, it was introduced in version v4.20 by commit fbb0de795078190a9834b3409e4b009cfb18a6d4. For more details please see the references link.
null
2022-04-25T04:26:17.419869Z
2022-04-24T21:49:51.702162Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fbb0de795078190a9834b3409e4b009cfb18a6d4'}
Linux
GSD-2022-1000775
iommu/amd: Recover from event log overflow
iommu/amd: Recover from event log overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.27 by commit a8a86631f4ce1ee4c70217b7a72cd8157cc0d070. For more details please see the references link.
null
2022-03-18T02:57:18.793121Z
2022-03-18T00:17:19.960692Z
null
null
null
null
null
Linux
GSD-2021-1001218
media: zr364xx: fix memory leak in zr364xx_start_readpipe
media: zr364xx: fix memory leak in zr364xx_start_readpipe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.3 by commit d69b39d89f362cfeeb54a68690768d0d257b2c8f, it was introduced in version v2.6.32 by commit ccbf035ae5de4c535160fc99f73feb44cc55b534. For more details please see the references link.
null
2021-12-20T00:00:30.624506Z
2021-08-03T01:39:18.098395Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ccbf035ae5de4c535160fc99f73feb44cc55b534'}
Linux
GSD-2022-1001888
f2fs: fix missing free nid in f2fs_handle_failed_inode
f2fs: fix missing free nid in f2fs_handle_failed_inode This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit d1eaaf6cadedf638e17017b0a04d56308405ac10, it was introduced in version v4.19 by commit 7735730d39d75e70476c1b01435b9b1f41637f0e. For more details please see the references link.
null
2022-04-25T03:36:24.790335Z
2022-04-24T21:52:14.043684Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7735730d39d75e70476c1b01435b9b1f41637f0e'}
Linux
GSD-2021-1002822
inet: fully convert sk->sk_rx_dst to RCU rules
inet: fully convert sk->sk_rx_dst to RCU rules This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.12 by commit 0249a4b8a554f2eb6a27b62516fa50168584faa4, it was introduced in version v3.6 by commit 41063e9dd11956f2d285e12e4342e1d232ba0ea2. For more details please see the references link.
null
2022-01-11T05:51:38.591434Z
2021-12-30T02:44:57.049829Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41063e9dd11956f2d285e12e4342e1d232ba0ea2'}
Linux
GSD-2022-1000260
KVM: arm64: pkvm: Use the mm_ops indirection for cache maintenance
KVM: arm64: pkvm: Use the mm_ops indirection for cache maintenance This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.19 by commit 19d4d09c2f163d90ed6bfea778f9bc4f70a3c534, it was introduced in version v5.14 by commit 25aa28691bb960a76f0cffd8862144a29487f6ff. For more details please see the references link.
null
2022-02-19T08:56:08.582480Z
2022-02-18T22:03:19.031036Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/25aa28691bb960a76f0cffd8862144a29487f6ff'}
Linux
GSD-2022-1001922
jffs2: fix memory leak in jffs2_do_mount_fs
jffs2: fix memory leak in jffs2_do_mount_fs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 4392e8aeebc5a4f8073620bccba7de1b1f6d7c88, it was introduced in version v2.6.15 by commit e631ddba588783edd521c5a89f7b2902772fb691. For more details please see the references link.
null
2022-04-25T04:37:44.541433Z
2022-04-24T21:55:04.892268Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e631ddba588783edd521c5a89f7b2902772fb691'}
Linux
GSD-2022-1000630
net/smc: Transitional solution for clcsock race issue
net/smc: Transitional solution for clcsock race issue This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit 4284225cd8001e134f5cf533a7cd244bbb654d0f, it was introduced in version v5.1 by commit fd57770dd198f5b2ddd5b9e6bf282cf98d63adb9. For more details please see the references link.
null
2022-03-07T01:35:55.434948Z
2022-02-27T03:33:16.554898Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fd57770dd198f5b2ddd5b9e6bf282cf98d63adb9'}
Linux
GSD-2021-1002121
usbnet: sanity check for maxpacket
usbnet: sanity check for maxpacket This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.16 by commit 7e8b6a4f18edee070213cb6a77118e8a412253c5. For more details please see the references link.
null
2021-12-19T23:18:34.908524Z
2021-11-14T15:20:47.361011Z
null
null
null
null
null
Linux
GSD-2022-1001471
btrfs: do not double complete bio on errors during compressed reads
btrfs: do not double complete bio on errors during compressed reads This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 4a4ceb2b990771c374d85d496a1a45255dde48e3. For more details please see the references link.
null
2022-04-25T03:53:49.568966Z
2022-04-24T21:15:27.239818Z
null
null
null
null
null
Linux
GSD-2021-1002571
drm/vc4: kms: Clear the HVS FIFO commit pointer once done
drm/vc4: kms: Clear the HVS FIFO commit pointer once done This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.7 by commit 2931db9a5ed219546cf2ae0546698faf78281b89, it was introduced in version v5.12 by commit 9ec03d7f1ed394897891319a4dda75f52c5d292d. For more details please see the references link.
null
2021-12-20T00:50:40.880152Z
2021-12-19T19:43:16.924419Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9ec03d7f1ed394897891319a4dda75f52c5d292d'}
Linux
GSD-2022-1001021
net/tls: fix slab-out-of-bounds bug in decrypt_internal
net/tls: fix slab-out-of-bounds bug in decrypt_internal This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 2304660ab6c425df64d95301b601424c6a50f28b, it was introduced in version v5.2 by commit f295b3ae9f5927e084bd5decdff82390e3471801. For more details please see the references link.
null
2022-04-25T06:49:46.422604Z
2022-04-24T20:40:32.785734Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f295b3ae9f5927e084bd5decdff82390e3471801'}
Linux
GSD-2021-1000798
netfilter: nft_ct: skip expectations for confirmed conntrack
netfilter: nft_ct: skip expectations for confirmed conntrack This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.10 by commit 2c0e6b35b88a961127066a1028bce9c727cbc3e5, it was introduced in version v5.3 by commit 857b46027d6f91150797295752581b7155b9d0e1. For more details please see the references link.
null
2021-12-19T23:33:25.614240Z
2021-06-25T00:08:03.912291Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/857b46027d6f91150797295752581b7155b9d0e1'}
Linux
GSD-2021-1000262
powerpc: Fix HAVE_HARDLOCKUP_DETECTOR_ARCH build configuration
powerpc: Fix HAVE_HARDLOCKUP_DETECTOR_ARCH build configuration This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 5a54afcc73bccd4c31a2c94b00fbb1ad733430ea, it was introduced in version v4.13 by commit 2104180a53698df5aec35aed5f840a26ade0551d. For more details please see the references link.
null
2021-12-20T00:00:58.448571Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2104180a53698df5aec35aed5f840a26ade0551d'}
Linux
GSD-2021-1000632
tipc: wait and exit until all work queues are done
tipc: wait and exit until all work queues are done This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.124 by commit d1f76dfadaf8f47ed1753f97dbcbd41c16215ffa, it was introduced in version v4.1 by commit d0f91938bede204a343473792529e0db7d599836. For more details please see the references link.
null
2021-12-20T01:25:40.268838Z
2021-06-04T19:51:05.376292Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0f91938bede204a343473792529e0db7d599836'}
Linux
GSD-2021-1001920
isdn: cpai: check ctr->cnr to avoid array index out of bound
isdn: cpai: check ctr->cnr to avoid array index out of bound This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.290 by commit e8b8de17e164c9f1b7777f1c6f99d05539000036. For more details please see the references link.
null
2021-12-20T00:42:07.926944Z
2021-11-14T15:11:45.882540Z
null
null
null
null
null
Linux
GSD-2022-1002123
ext4: fix fs corruption when tring to remove a non-empty directory with IO error
ext4: fix fs corruption when tring to remove a non-empty directory with IO error This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit b35eb48471822a60f3dda67c57d49fd515c9a121. For more details please see the references link.
null
2022-04-25T05:59:45.083782Z
2022-04-24T22:13:49.285982Z
null
null
null
null
null
Linux
GSD-2021-1001189
powerpc/bpf: Fix detecting BPF atomic instructions
powerpc/bpf: Fix detecting BPF atomic instructions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.4 by commit 0d435b6d94b05dcfd836d758a63145aa566618e2, it was introduced in version v5.12 by commit 91c960b0056672e74627776655c926388350fa30. For more details please see the references link.
null
2021-12-19T22:16:46.331801Z
2021-08-03T01:33:31.965138Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/91c960b0056672e74627776655c926388350fa30'}
Linux
GSD-2021-1001473
memory: fsl_ifc: fix leak of private memory on probe failure
memory: fsl_ifc: fix leak of private memory on probe failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.276 by commit 8018476756066e97ecb886c3dc024aeb7d5792ad, it was introduced in version v3.3 by commit a20cbdeffce247a2b6fb83cd8d22433994068565. For more details please see the references link.
null
2021-12-19T22:41:04.976043Z
2021-08-03T02:51:58.901005Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a20cbdeffce247a2b6fb83cd8d22433994068565'}
Linux
GSD-2021-1001023
bus: mhi: pci_generic: Fix possible use-after-free in mhi_pci_remove()
bus: mhi: pci_generic: Fix possible use-after-free in mhi_pci_remove() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit c597d5c59c7a6417dba06590f59b922e01188e8d, it was introduced in version v5.12 by commit 8562d4fe34a3ef52da077f77985994bb9ad1f83e. For more details please see the references link.
null
2021-12-19T23:10:13.894862Z
2021-06-30T00:34:32.724767Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8562d4fe34a3ef52da077f77985994bb9ad1f83e'}
Linux
GSD-2022-1002089
drm/tegra: Fix reference leak in tegra_dsi_ganged_probe
drm/tegra: Fix reference leak in tegra_dsi_ganged_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 1e06710c43a090f14bb67714265a01cd1d7a37c5, it was introduced in version v3.19 by commit e94236cde4d519cdecd45e2435defba33abdc99f. For more details please see the references link.
null
2022-04-25T06:46:18.839422Z
2022-04-24T22:09:52.076598Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e94236cde4d519cdecd45e2435defba33abdc99f'}
Linux
GSD-2021-1001536
cpufreq: schedutil: Use kobject release() method to free sugov_tunables
cpufreq: schedutil: Use kobject release() method to free sugov_tunables This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.249 by commit 463c46705f321201090b69c4ad5da0cd2ce614c9, it was introduced in version v4.7 by commit 9bdcb44e391da5c41b98573bf0305a0e0b1c9569. For more details please see the references link.
null
2021-12-19T22:21:36.244631Z
2021-10-19T16:22:42.403957Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9bdcb44e391da5c41b98573bf0305a0e0b1c9569'}
Linux
GSD-2022-1002066
remoteproc: qcom_q6v5_mss: Fix some leaks in q6v5_alloc_memory_region
remoteproc: qcom_q6v5_mss: Fix some leaks in q6v5_alloc_memory_region This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit f7210ca29a783c94478da02368731e4c9cf7cdb7, it was introduced in version v4.17 by commit 278d744c46fd4f1925aec77752d18a0e4a9cbec3. For more details please see the references link.
null
2022-04-25T04:51:32.500837Z
2022-04-24T22:07:13.396171Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/278d744c46fd4f1925aec77752d18a0e4a9cbec3'}
Linux
GSD-2021-1001166
net/sched: act_skbmod: Skip non-Ethernet packets
net/sched: act_skbmod: Skip non-Ethernet packets This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.6 by commit 34f1e1f657fae2891b485a3b2b95fe4d2aef9f0d, it was introduced in version v4.9 by commit 86da71b57383d40993cb90baafb3735cffe5d800. For more details please see the references link.
null
2021-12-19T23:36:42.706723Z
2021-08-03T01:31:50.650068Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/86da71b57383d40993cb90baafb3735cffe5d800'}
Linux
GSD-2022-1002436
ext2: correct max file size computing
ext2: correct max file size computing This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 94fe9ee8d6d48235b44e14820c07271be3c25cff, it was introduced in version v4.14.108 by commit 7412f34ff819f530461bfe57773f83e1d4419421. For more details please see the references link.
null
2022-04-25T03:05:32.397420Z
2022-04-24T22:47:09.912445Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7412f34ff819f530461bfe57773f83e1d4419421'}
Linux
GSD-2021-1000327
netfilter: nftables: Fix a memleak from userdata error path in new objects
netfilter: nftables: Fix a memleak from userdata error path in new objects This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.38 by commit 2c784a500f5edd337258b0fdb2f31bc9abde1a23, it was introduced in version v5.10 by commit b131c96496b369c7b14125e7c50e89ac7cec8051. For more details please see the references link.
null
2021-12-19T23:43:41.545360Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b131c96496b369c7b14125e7c50e89ac7cec8051'}
Linux
GSD-2022-1000958
ALSA: pcm: Test for "silence" field in struct "pcm_format_data"
ALSA: pcm: Test for "silence" field in struct "pcm_format_data" This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.4 by commit 97345c90235b1bb7661e7a428d9dcb96b1d7f5d4. For more details please see the references link.
null
2022-04-25T05:47:37.711256Z
2022-04-24T20:35:01.467909Z
null
null
null
null
null
Linux
GSD-2021-1000777
pid: take a reference when initializing `cad_pid`
pid: take a reference when initializing `cad_pid` This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.43 by commit 7178be006d495ffb741c329012da289b62dddfe6, it was introduced in version v2.6.19 by commit 9ec52099e4b8678a60e9f93e41ad87885d64f3e6. For more details please see the references link.
null
2021-12-20T00:31:45.149116Z
2021-06-25T00:04:56.734210Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9ec52099e4b8678a60e9f93e41ad87885d64f3e6'}
Linux
GSD-2021-1001865
scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els()
scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit a7fbb56e6c941d9f59437b96412a348e66388d3e, it was introduced in version v3.11 by commit 8c0eb596baa51f2b43949c698c644727ef17805c. For more details please see the references link.
null
2021-12-20T00:37:25.017344Z
2021-10-28T13:52:57.786281Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c0eb596baa51f2b43949c698c644727ef17805c'}
Linux
GSD-2022-1001830
Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt
Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 770a97d3f34b801de1b04737b43e02c55118c41a, it was introduced in version v5.2 by commit 9aebfd4a2200ab8075e44379c758bccefdc589bb. For more details please see the references link.
null
2022-04-25T05:30:01.671958Z
2022-04-24T21:46:04.390736Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9aebfd4a2200ab8075e44379c758bccefdc589bb'}
Linux
GSD-2022-1000722
riscv: fix oops caused by irqsoff latency tracer
riscv: fix oops caused by irqsoff latency tracer This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.12 by commit b5e180490db4af8c0f80c4b65ee482d333d0e8ee, it was introduced in version v5.9 by commit 3c46979829824da5af8766d89fa877976bdae884. For more details please see the references link.
null
2022-03-18T02:59:49.790419Z
2022-03-18T00:12:14.863975Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c46979829824da5af8766d89fa877976bdae884'}
Linux
GSD-2022-1000688
arm64: entry.S: Add ventry overflow sanity checks
arm64: entry.S: Add ventry overflow sanity checks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.14 by commit d1e3d6d26d9eab22548c3b7373ec12bbfecc765f. For more details please see the references link.
null
2022-03-18T03:02:06.271590Z
2022-03-18T00:09:43.846456Z
null
null
null
null
null
Linux
GSD-2022-1000372
net: dsa: felix: don't use devres for mdiobus
net: dsa: felix: don't use devres for mdiobus This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.101 by commit 95e5402f9430b3c7d885dd3ec4c8c02c17936923, it was introduced in version v5.9 by commit ac3a68d56651c3dad2c12c7afce065fe15267f44. For more details please see the references link.
null
2022-03-07T01:38:08.486129Z
2022-02-27T02:57:42.765568Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac3a68d56651c3dad2c12c7afce065fe15267f44'}
Linux
GSD-2021-1002463
mtd: rawnand: fsmc: Fix timing computation
mtd: rawnand: fsmc: Fix timing computation This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.165 by commit b78a27fa58cc7090ec4c4137e6afd0d477452844, it was introduced in version v4.13 by commit d9fb0795718333e36f7e472d7d81b7b8efe347c8. For more details please see the references link.
null
2021-12-19T23:11:33.852645Z
2021-12-19T19:38:26.065409Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9fb0795718333e36f7e472d7d81b7b8efe347c8'}
Linux
GSD-2021-1002199
riscv, bpf: Fix potential NULL dereference
riscv, bpf: Fix potential NULL dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 27de809a3d83a6199664479ebb19712533d6fd9b, it was introduced in version v5.7 by commit ca6cb5447ceca6a87d6b62c9e5d41042c34f7ffa. For more details please see the references link.
null
2021-12-19T22:16:08.092021Z
2021-11-14T15:24:23.120751Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca6cb5447ceca6a87d6b62c9e5d41042c34f7ffa'}
Linux
GSD-2022-1001133
media: imx-jpeg: fix a bug of accessing array out of bounds
media: imx-jpeg: fix a bug of accessing array out of bounds This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit e209e6db2e527db6a93b14c2deedf969caca78fc. For more details please see the references link.
null
2022-04-25T05:58:18.757666Z
2022-04-24T20:48:01.706047Z
null
null
null
null
null
Linux
GSD-2022-1001099
io_uring: fix memory leak of uid in files registration
io_uring: fix memory leak of uid in files registration This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 7fa8b228c3f30060b9f4b24bb9aaaf41b0ae83fe, it was introduced in version v5.5 by commit 08a451739a9b5783f67de51e84cb6d9559bb9dc4. For more details please see the references link.
null
2022-04-25T06:03:11.876779Z
2022-04-24T20:45:13.234354Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/08a451739a9b5783f67de51e84cb6d9559bb9dc4'}
Linux
GSD-2021-1002033
net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path
net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.75 by commit 4f7bddf8c5c01cac74373443b13a68e1c6723a94, it was introduced in version v3.11 by commit e126ba97dba9edeb6fafa3665b5f8497fc9cdf8c. For more details please see the references link.
null
2021-12-19T22:20:02.930563Z
2021-11-14T15:16:45.787278Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e126ba97dba9edeb6fafa3665b5f8497fc9cdf8c'}
Linux
GSD-2022-1001563
ASoC: atmel: Fix error handling in snd_proto_probe
ASoC: atmel: Fix error handling in snd_proto_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 0f517480d5888cd54487c5662ce4da95b30ad798, it was introduced in version v4.20 by commit a45f8853a5f95e3760dfbd7ba09d3d597d247040. For more details please see the references link.
null
2022-04-25T04:26:23.688746Z
2022-04-24T21:23:59.511831Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a45f8853a5f95e3760dfbd7ba09d3d597d247040'}
Linux
GSD-2022-1001076
ath11k: pci: fix crash on suspend if board file is not found
ath11k: pci: fix crash on suspend if board file is not found This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit aeed776c00e804a0f7896db39c7c661cea34ee1f. For more details please see the references link.
null
2022-04-25T08:52:22.492875Z
2022-04-24T20:43:43.045685Z
null
null
null
null
null