ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2022-1000170
btrfs: fix deadlock between quota disable and qgroup rescan worker
btrfs: fix deadlock between quota disable and qgroup rescan worker This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.178 by commit 26b3901d20bf9da2c6a00cb1fb48932166f80a45. For more details please see the references link.
null
2022-02-19T05:09:51.601438Z
2022-02-18T21:50:36.208032Z
null
null
null
null
null
Linux
GSD-2022-1002458
netfilter: nf_tables: initialize registers in nft_do_chain()
netfilter: nf_tables: initialize registers in nft_do_chain() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.274 by commit a3cc32863b175168283cb0a5fde08de6a1e27df9, it was introduced in version v3.13 by commit 96518518cc417bb0a8c80b9fb736202e28acdf96. For more details please see the references link.
null
2022-04-25T05:53:43.383307Z
2022-04-24T22:50:23.385373Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/96518518cc417bb0a8c80b9fb736202e28acdf96'}
Linux
GSD-2022-1000465
cfg80211: fix race in netlink owner interface destruction
cfg80211: fix race in netlink owner interface destruction This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit 241e633cb379c4f332fc1baf2abec95ec840cbeb, it was introduced in version v5.13 by commit ea6b2098dd02789f68770fd3d5a373732207be2f. For more details please see the references link.
null
2022-03-07T01:30:58.309999Z
2022-02-27T03:11:06.770330Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ea6b2098dd02789f68770fd3d5a373732207be2f'}
Linux
GSD-2021-1001108
i2c: robotfuzz-osif: fix control-request directions
i2c: robotfuzz-osif: fix control-request directions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.238 by commit 8ab0e49cc8eeabae4f31805e979173bb00ee472e, it was introduced in version v3.14 by commit 83e53a8f120f2f273cf0ad717f5372ab79ac24fe. For more details please see the references link.
null
2021-12-19T23:26:10.941121Z
2021-07-08T01:56:51.246044Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/83e53a8f120f2f273cf0ad717f5372ab79ac24fe'}
Linux
GSD-2022-1002008
scsi: pm8001: Fix task leak in pm8001_send_abort_all()
scsi: pm8001: Fix task leak in pm8001_send_abort_all() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit 2051044d7901f1a9d7be95d0d32e53b88e9548f7. For more details please see the references link.
null
2022-04-25T05:47:13.716767Z
2022-04-24T22:02:39.686787Z
null
null
null
null
null
Linux
GSD-2022-1000035
usb: mtu3: fix list_head check warning
usb: mtu3: fix list_head check warning This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.170 by commit 585e2b244dda7ea733274e4b8fa27853d625d3bf, it was introduced in version v5.2 by commit 83374e035b6286731c5aa617844c7b724294c2a7. For more details please see the references link.
null
2022-01-11T05:46:45.127415Z
2022-01-10T19:51:06.126767Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/83374e035b6286731c5aa617844c7b724294c2a7'}
Linux
GSD-2021-1001558
netfilter: ipset: Fix oversized kvmalloc() calls
netfilter: ipset: Fix oversized kvmalloc() calls This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.209 by commit c4bc456cb5b028e6a2a63e5d54b9f08e827c0504. For more details please see the references link.
null
2021-12-19T22:14:40.020279Z
2021-10-19T16:23:42.631078Z
null
null
null
null
null
Linux
GSD-2022-1001274
arm64: prevent instrumentation of bp hardening callbacks
arm64: prevent instrumentation of bp hardening callbacks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 9778d9f04f3db8900cf87ea41d36130722a65206, it was introduced in version v4.16 by commit ec82b567a74fbdffdf418d4bb381d55f6a9096af. For more details please see the references link.
null
2022-04-25T07:08:29.479678Z
2022-04-24T21:00:23.673062Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ec82b567a74fbdffdf418d4bb381d55f6a9096af'}
Linux
GSD-2021-1000719
btrfs: fixup error handling in fixup_inode_link_counts
btrfs: fixup error handling in fixup_inode_link_counts This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.272 by commit 9d20683fb38d7e990a03d7c4423f1bae72139520, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T01:38:48.154856Z
2021-06-24T23:59:02.296797Z
null
null
null
null
null
Linux
GSD-2021-1002724
nfc: fix segfault in nfc_genl_dump_devices_done
nfc: fix segfault in nfc_genl_dump_devices_done This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.10 by commit d89e4211b51752daf063d638af50abed2fd5f96d. For more details please see the references link.
null
2022-01-11T06:52:22.580479Z
2021-12-27T05:39:11.165052Z
null
null
null
null
null
Linux
GSD-2022-1001624
NFSD: prevent underflow in nfssvc_decode_writeargs()
NFSD: prevent underflow in nfssvc_decode_writeargs() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 2764af8ce0bf03cc43ee4a11897cab96bde6caae. For more details please see the references link.
null
2022-04-25T03:32:42.832024Z
2022-04-24T21:29:43.552468Z
null
null
null
null
null
Linux
GSD-2022-1000936
xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
xen/netfront: react properly to failing gnttab_end_foreign_access_ref() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.306 by commit c4497b057b14274e159434f0ed70439a21f3d2a9. For more details please see the references link.
null
2022-03-18T03:00:38.961157Z
2022-03-18T00:34:16.581878Z
null
null
null
null
null
Linux
GSD-2021-1000349
net: marvell: prestera: fix port event handling on init
net: marvell: prestera: fix port event handling on init This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 0ce6052802be2cb61a57b753e41301339c88c839, it was introduced in version v5.10 by commit 501ef3066c89d7f9045315e1be58749cf9e6814d. For more details please see the references link.
null
2021-12-19T23:04:20.981327Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/501ef3066c89d7f9045315e1be58749cf9e6814d'}
Linux
GSD-2021-1002374
net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound
net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.292 by commit 142ead3dc70411bd5977e8c47a6d8bf22287b3f8. For more details please see the references link.
null
2021-12-20T00:08:40.045414Z
2021-12-19T19:34:28.249971Z
null
null
null
null
null
Linux
GSD-2022-1002321
iommu/arm-smmu-v3: fix event handling soft lockup
iommu/arm-smmu-v3: fix event handling soft lockup This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit b58e90be71733a11e0c3d0237d48934a8c7f3ad2. For more details please see the references link.
null
2022-04-25T03:34:42.244407Z
2022-04-24T22:34:10.857933Z
null
null
null
null
null
Linux
GSD-2021-1000963
KVM: x86: Ensure liveliness of nested VM-Enter fail tracepoint message
KVM: x86: Ensure liveliness of nested VM-Enter fail tracepoint message This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.44 by commit d046f724bbd725a24007b7e52b2d675249870888, it was introduced in version v5.4 by commit 380e0055bc7e4a5c687436ba3ccebb4667836b95. For more details please see the references link.
null
2021-12-19T23:10:37.800538Z
2021-06-30T00:29:34.533474Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/380e0055bc7e4a5c687436ba3ccebb4667836b95'}
Linux
GSD-2021-1001671
net/smc: fix 'workqueue leaked lock' in smc_conn_abort_work
net/smc: fix 'workqueue leaked lock' in smc_conn_abort_work This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.70 by commit b4561bd29e62b24b245a53391e64b6880f0792cc, it was introduced in version v5.8 by commit b286a0651e4404ab96cdfdcdad8a839a26b3751e. For more details please see the references link.
null
2021-12-20T00:05:37.846292Z
2021-10-19T16:31:03.362939Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b286a0651e4404ab96cdfdcdad8a839a26b3751e'}
Linux
GSD-2021-1001221
wl1251: Fix possible buffer overflow in wl1251_cmd_scan
wl1251: Fix possible buffer overflow in wl1251_cmd_scan This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.3 by commit 40af3960a15339e8bbd3be50c3bc7b35e1a0b6ea. For more details please see the references link.
null
2021-12-19T23:43:36.114644Z
2021-08-03T01:40:04.123469Z
null
null
null
null
null
Linux
GSD-2021-1000060
ext4: always panic when errors=panic is specified
ext4: always panic when errors=panic is specified This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.3 by commit 1e9ea8f4637026b8e965128953f2da061ccae9c4, it was introduced in version v5.11 by commit 014c9caa29d3a44e0de695c99ef18bec3e887d52. For more details please see the references link.
null
2021-12-20T01:35:31.736633Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/014c9caa29d3a44e0de695c99ef18bec3e887d52'}
Linux
GSD-2021-1000430
Drivers: hv: vmbus: Increase wait time for VMbus unload
Drivers: hv: vmbus: Increase wait time for VMbus unload This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.119 by commit e83dcf255a136a4c8c454e2271d046f69dd58037, it was introduced in version v5.4.67 by commit e03e0498b45309a1abd3fa33b1651d22594e9011. For more details please see the references link.
null
2021-12-19T23:51:16.475598Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e03e0498b45309a1abd3fa33b1651d22594e9011'}
Linux
GSD-2021-1002118
s390/pci: fix zpci_zdev_put() on reserve
s390/pci: fix zpci_zdev_put() on reserve This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit 4e5d794a2743f5a1e13ee1066ce37711f2696044, it was introduced in version v5.14 by commit 2a671f77ee49f3e78997b77fdee139467ff6a598. For more details please see the references link.
null
2021-12-20T00:52:28.318073Z
2021-11-14T15:20:38.510362Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2a671f77ee49f3e78997b77fdee139467ff6a598'}
Linux
GSD-2021-1000125
net: qrtr: Avoid potential use after free in MHI send
net: qrtr: Avoid potential use after free in MHI send This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.19 by commit ea474054c2cc6e1284604b21361f475c7cc8c0a0, it was introduced in version v5.8 by commit 6e728f321393b1fce9e1c2c3e55f9f7c15991321. For more details please see the references link.
null
2021-12-19T23:49:25.655868Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6e728f321393b1fce9e1c2c3e55f9f7c15991321'}
Linux
GSD-2022-1001448
KVM: x86/mmu: do compare-and-exchange of gPTE via the user address
KVM: x86/mmu: do compare-and-exchange of gPTE via the user address This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 9a611c57530050dc359a83177c2f97678b1f961e, it was introduced in version v5.2 by commit bd53cb35a3e9adb73a834a36586e9ad80e877767. For more details please see the references link.
null
2022-04-25T05:56:19.364966Z
2022-04-24T21:14:13.182448Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bd53cb35a3e9adb73a834a36586e9ad80e877767'}
Linux
GSD-2021-1002548
f2fs: set SBI_NEED_FSCK flag when inconsistent node block found
f2fs: set SBI_NEED_FSCK flag when inconsistent node block found This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.6 by commit 8984bba3b4c0b36be6cbcd7ac4a8779a045bd670. For more details please see the references link.
null
2021-12-20T00:33:24.887717Z
2021-12-19T19:42:11.946143Z
null
null
null
null
null
Linux
GSD-2021-1000575
net: zero-initialize tc skb extension on allocation
net: zero-initialize tc skb extension on allocation This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit ac493452e937b8939eaf2d24cac51a4804b6c20e, it was introduced in version v5.9 by commit 038ebb1a713d114d54dbf14868a73181c0c92758. For more details please see the references link.
null
2021-12-19T23:13:55.313559Z
2021-06-04T19:41:22.768693Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/038ebb1a713d114d54dbf14868a73181c0c92758'}
Linux
GSD-2022-1001018
drm/imx: Fix memory leak in imx_pd_connector_get_modes
drm/imx: Fix memory leak in imx_pd_connector_get_modes This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 7526102d908ec5ae777aa77723d52fce12916093, it was introduced in version v4.8 by commit 76ecd9c9fb24b014a6f33fbb1287ede3be12158b. For more details please see the references link.
null
2022-04-25T07:19:30.100021Z
2022-04-24T20:40:17.387742Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/76ecd9c9fb24b014a6f33fbb1287ede3be12158b'}
Linux
GSD-2021-1000826
net/nfc/rawsock.c: fix a permission check bug
net/nfc/rawsock.c: fix a permission check bug This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.273 by commit c08e0be44759d0b5affc5888be4aa5e536873335. For more details please see the references link.
null
2021-12-20T01:34:37.232224Z
2021-06-29T23:59:47.141865Z
null
null
null
null
null
Linux
GSD-2021-1001734
cpufreq: schedutil: Use kobject release() method to free sugov_tunables
cpufreq: schedutil: Use kobject release() method to free sugov_tunables This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit 8d62aec52a8c5b1d25a2364b243fcc5098a2ede9, it was introduced in version v4.7 by commit 9bdcb44e391da5c41b98573bf0305a0e0b1c9569. For more details please see the references link.
null
2021-12-19T23:01:31.339202Z
2021-10-19T16:34:06.868498Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9bdcb44e391da5c41b98573bf0305a0e0b1c9569'}
Linux
GSD-2022-1000259
drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable
drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.19 by commit 56480fb10b976581a363fd168dc2e4fbee87a1a7, it was introduced in version v4.3 by commit 5c8290284402bf7d2c12269402b3177b899c78b7. For more details please see the references link.
null
2022-02-19T12:52:49.238169Z
2022-02-18T22:03:12.158647Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5c8290284402bf7d2c12269402b3177b899c78b7'}
Linux
GSD-2022-1002264
soc: qcom: rpmpd: Check for null return of devm_kcalloc
soc: qcom: rpmpd: Check for null return of devm_kcalloc This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 755dbc3d73789ac9f0017c729abf5e4b153bf799, it was introduced in version v5.1 by commit bbe3a66c3f5a65fb3d702351bac2a6033944d389. For more details please see the references link.
null
2022-04-25T06:51:55.821109Z
2022-04-24T22:28:05.499691Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bbe3a66c3f5a65fb3d702351bac2a6033944d389'}
Linux
GSD-2021-1001364
KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow
KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.199 by commit 0493b10c06021796ba80cbe53c961defd5aca6e5, it was introduced in version v3.10 by commit 8e591cb7204739efa8e15967ea334eb367039dde. For more details please see the references link.
null
2021-12-19T23:37:20.949067Z
2021-08-03T02:19:44.287769Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8e591cb7204739efa8e15967ea334eb367039dde'}
Linux
GSD-2022-1000609
drm/amd/display: Wrap dcn301_calculate_wm_and_dlg for FPU.
drm/amd/display: Wrap dcn301_calculate_wm_and_dlg for FPU. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit 456ba2433844a6483cc4c933aa8f43d24575e341. For more details please see the references link.
null
2022-03-07T01:34:58.723709Z
2022-02-27T03:30:54.514987Z
null
null
null
null
null
Linux
GSD-2022-1000166
af_packet: fix data-race in packet_setsockopt / packet_setsockopt
af_packet: fix data-race in packet_setsockopt / packet_setsockopt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.177 by commit 4fc41403f0b6e4ac454f2ec27c05564fdbdf036b, it was introduced in version v4.3 by commit 47dceb8ecdc1c3ad1818dfea3d659a05b74c3fc2. For more details please see the references link.
null
2022-02-19T15:32:45.789149Z
2022-02-18T21:49:23.634118Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/47dceb8ecdc1c3ad1818dfea3d659a05b74c3fc2'}
Linux
GSD-2022-1000536
ax25: improve the incomplete fix to avoid UAF and NPD bugs
ax25: improve the incomplete fix to avoid UAF and NPD bugs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit 1e1f02d36d3e73f4a24e8c95c50a796bc3662d09. For more details please see the references link.
null
2022-03-07T01:35:35.921620Z
2022-02-27T03:20:37.202960Z
null
null
null
null
null
Linux
GSD-2022-1000865
hwmon: Handle failure to register sensor with thermal zone correctly
hwmon: Handle failure to register sensor with thermal zone correctly This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.103 by commit 962b2a3188bfa5388756ffbc47dfa5ff59cb8011, it was introduced in version v5.8 by commit 1597b374af22266266e1e20612208c4b11359ad4. For more details please see the references link.
null
2022-03-18T04:10:17.755751Z
2022-03-18T00:25:54.090155Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1597b374af22266266e1e20612208c4b11359ad4'}
Linux
GSD-2022-1001777
drm/dp: Fix off-by-one in register cache size
drm/dp: Fix off-by-one in register cache size This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit e912d697400c5f4bc8c1c8090416dad6c59cb28c, it was introduced in version v5.12 by commit e2e16da398d9149ede0162a55f44537582aed2e7. For more details please see the references link.
null
2022-04-25T04:21:20.526487Z
2022-04-24T21:41:48.039787Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e2e16da398d9149ede0162a55f44537582aed2e7'}
Linux
GSD-2021-1002227
NFC: reorder the logic in nfc_{un,}register_device
NFC: reorder the logic in nfc_{un,}register_device This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.291 by commit ff169909eac9e00bf1aa0af739ba6ddfb1b1d135, it was introduced in version v3.10 by commit be055b2f89b5842f41363b5655a33dffb51a8294. For more details please see the references link.
null
2021-12-19T22:34:45.235675Z
2021-11-29T02:34:17.639233Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/be055b2f89b5842f41363b5655a33dffb51a8294'}
Linux
GSD-2022-1001327
ALSA: pcm: Fix races among concurrent prealloc proc writes
ALSA: pcm: Fix races among concurrent prealloc proc writes This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.1 by commit 5ed8f8e3c4e59d0396b9ccf2e639711e24295bb6. For more details please see the references link.
null
2022-04-25T04:29:54.896542Z
2022-04-24T21:04:52.824937Z
null
null
null
null
null
Linux
GSD-2021-1001958
ocfs2: fix data corruption after conversion from inline format
ocfs2: fix data corruption after conversion from inline format This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.253 by commit 8e6bfb4f70168ddfd32fb6dc028ad52faaf1f32e, it was introduced in version v4.14.204 by commit 7ed80e77c908cbaa686529a49f8ae0060c5caee7. For more details please see the references link.
null
2021-12-20T01:00:05.031957Z
2021-11-14T15:13:26.412181Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ed80e77c908cbaa686529a49f8ae0060c5caee7'}
Linux
GSD-2021-1002677
igbvf: fix double free in `igbvf_probe`
igbvf: fix double free in `igbvf_probe` This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.168 by commit 8addba6cab94ce01686ea2e80ed1530f9dc33a9a, it was introduced in version v2.6.30 by commit d4e0fe01a38a073568aee541a0247fe734095979. For more details please see the references link.
null
2022-01-11T05:53:30.862937Z
2021-12-27T05:36:20.582679Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d4e0fe01a38a073568aee541a0247fe734095979'}
Linux
GSD-2021-1002362
can: sja1000: fix use after free in ems_pcmcia_add_card()
can: sja1000: fix use after free in ems_pcmcia_add_card() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.295 by commit cbd86110546f7f730a1f5d7de56c944a336c15c4, it was introduced in version v3.2 by commit fd734c6f25aea4b2b44b045e489aec67b388577e. For more details please see the references link.
null
2021-12-19T23:59:24.105366Z
2021-12-19T19:33:59.003403Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fd734c6f25aea4b2b44b045e489aec67b388577e'}
Linux
GSD-2021-1002698
net/sched: sch_ets: don't remove idle classes from the round-robin list
net/sched: sch_ets: don't remove idle classes from the round-robin list This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.88 by commit 81fbdd45652d8605a029e78ef14a6aaa529c4e72, it was introduced in version v5.10.83 by commit ae2659d2c670252759ee9c823c4e039c0e05a6f2. For more details please see the references link.
null
2022-01-11T05:57:39.976695Z
2021-12-27T05:37:28.813033Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ae2659d2c670252759ee9c823c4e039c0e05a6f2'}
Linux
GSD-2022-1000920
netfilter: nf_queue: fix possible use-after-free
netfilter: nf_queue: fix possible use-after-free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.270 by commit ef97921ccdc243170fcef857ba2a17cf697aece5, it was introduced in version v2.6.29 by commit 271b72c7fa82c2c7a795bc16896149933110672d. For more details please see the references link.
null
2022-03-18T03:00:36.591581Z
2022-03-18T00:32:15.216344Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/271b72c7fa82c2c7a795bc16896149933110672d'}
Linux
GSD-2022-1001632
ALSA: pcm: Fix races among concurrent prealloc proc writes
ALSA: pcm: Fix races among concurrent prealloc proc writes This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.18 by commit a21d2f323b5a978dedf9ff1d50f101f85e39b3f2. For more details please see the references link.
null
2022-04-25T05:46:56.419570Z
2022-04-24T21:30:15.967591Z
null
null
null
null
null
Linux
GSD-2022-1001798
block, bfq: don't move oom_bfqq
block, bfq: don't move oom_bfqq This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 8f34dea99cd7761156a146a5258a67d045d862f7. For more details please see the references link.
null
2022-04-25T05:20:11.749349Z
2022-04-24T21:42:52.972055Z
null
null
null
null
null
Linux
GSD-2021-1002732
vduse: fix memory corruption in vduse_dev_ioctl()
vduse: fix memory corruption in vduse_dev_ioctl() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit e6c67560b4341914bec32ec536e931c22062af65, it was introduced in version v5.15 by commit c8a6153b6c59d95c0e091f053f6f180952ade91e. For more details please see the references link.
null
2022-01-11T05:53:25.696653Z
2021-12-27T05:45:19.186033Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c8a6153b6c59d95c0e091f053f6f180952ade91e'}
Linux
GSD-2022-1001262
ASoC: codecs: rx-macro: fix accessing compander for aux
ASoC: codecs: rx-macro: fix accessing compander for aux This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 6aa8ef9535dbd561293406608ebe791627b10196, it was introduced in version v5.12 by commit 4f692926f562ff48abfcca6b16f36ff8d57473b6. For more details please see the references link.
null
2022-04-25T03:36:19.333089Z
2022-04-24T20:59:08.872220Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4f692926f562ff48abfcca6b16f36ff8d57473b6'}
Linux
GSD-2022-1000023
usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.
usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.224 by commit 33f6a0cbb7772146e1c11f38028fffbfed14728b, it was introduced in version v4.0 by commit 5e33f6fdf735cda1d4580fe6f1878da05718fe73. For more details please see the references link.
null
2022-01-11T05:53:37.208572Z
2022-01-10T19:50:35.676992Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5e33f6fdf735cda1d4580fe6f1878da05718fe73'}
Linux
GSD-2022-1000189
usb: xhci-plat: fix crash when suspend if remote wake enable
usb: xhci-plat: fix crash when suspend if remote wake enable This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.96 by commit 20c51a4c52208f98e27308c456a1951778f41fa5. For more details please see the references link.
null
2022-02-20T06:40:48.190421Z
2022-02-18T21:52:43.711520Z
null
null
null
null
null
Linux
GSD-2022-1000473
mtd: parsers: qcom: Fix missing free for pparts in cleanup
mtd: parsers: qcom: Fix missing free for pparts in cleanup This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit 3eb5185896a68373714dc7d0009111744adc3345, it was introduced in version v5.14 by commit 10f3b4d79958d6f9f71588c6fa862159c83fa80f. For more details please see the references link.
null
2022-03-07T01:42:58.824357Z
2022-02-27T03:12:01.502020Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/10f3b4d79958d6f9f71588c6fa862159c83fa80f'}
Linux
GSD-2021-1000426
liquidio: Fix unintented sign extension of a left shift of a u16
liquidio: Fix unintented sign extension of a left shift of a u16 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.119 by commit 440fead0fc81192d2f893e238378574f6d9fb3c3, it was introduced in version v4.9 by commit 5bc67f587ba7eaa8dd3976bfeff8f2b60718c871. For more details please see the references link.
null
2021-12-19T23:16:04.378910Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5bc67f587ba7eaa8dd3976bfeff8f2b60718c871'}
Linux
GSD-2021-1000076
cifs: Return correct error code from smb2_get_enc_key
cifs: Return correct error code from smb2_get_enc_key This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.3 by commit b399c1a3ea0b9d10047ff266d65533df7f15532f, it was introduced in version v4.11 by commit 61cfac6f267dabcf2740a7ec8a0295833b28b5f5. For more details please see the references link.
null
2021-12-19T23:56:17.317067Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61cfac6f267dabcf2740a7ec8a0295833b28b5f5'}
Linux
GSD-2021-1001237
KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow
KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.54 by commit c1fbdf0f3c26004a2803282fdc1c35086908a99e, it was introduced in version v3.10 by commit 8e591cb7204739efa8e15967ea334eb367039dde. For more details please see the references link.
null
2021-12-20T01:23:18.164264Z
2021-08-03T01:45:36.134894Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8e591cb7204739efa8e15967ea334eb367039dde'}
Linux
GSD-2022-1001848
power: supply: wm8350-power: Add missing free in free_charger_irq
power: supply: wm8350-power: Add missing free in free_charger_irq This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 4124966fbd95eeecca26d52433f393e2b9649a33, it was introduced in version v2.6.29 by commit 14431aa0c5a443d13d24e6f865a8838f97dab973. For more details please see the references link.
null
2022-04-25T03:56:14.780279Z
2022-04-24T21:47:51.282674Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/14431aa0c5a443d13d24e6f865a8838f97dab973'}
Linux
GSD-2021-1001667
bpf: Add oversize check before call kvcalloc()
bpf: Add oversize check before call kvcalloc() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.70 by commit 6345a0bee80139ea00a341c4202ebfd1534b5eb0. For more details please see the references link.
null
2021-12-20T00:38:37.385846Z
2021-10-19T16:30:50.650090Z
null
null
null
null
null
Linux
GSD-2021-1000975
batman-adv: Avoid WARN_ON timing related checks
batman-adv: Avoid WARN_ON timing related checks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit 282baa8104af44e04c4af3e7f933b44267c7f86f, it was introduced in version v3.14 by commit ef0a937f7a1450d3a133ccd83c9c7d07587e7a00. For more details please see the references link.
null
2021-12-20T00:01:14.338713Z
2021-06-30T00:30:20.207689Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef0a937f7a1450d3a133ccd83c9c7d07587e7a00'}
Linux
GSD-2022-1002337
ntfs: add sanity check on allocation size
ntfs: add sanity check on allocation size This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 07793d2e55563124108762f4e5f811db92ffe02f. For more details please see the references link.
null
2022-04-25T04:39:42.788794Z
2022-04-24T22:35:36.908998Z
null
null
null
null
null
Linux
GSD-2021-1001688
drm/nouveau/kms/nv50-: fix file release memory leak
drm/nouveau/kms/nv50-: fix file release memory leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.12 by commit 0b4e9fc14973a94ac0520f19b3633493ae13c912, it was introduced in version v5.9 by commit 12885ecbfe62df4358d452080d3b8feef54ec8cb. For more details please see the references link.
null
2021-12-20T01:03:39.147043Z
2021-10-19T16:31:55.178060Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/12885ecbfe62df4358d452080d3b8feef54ec8cb'}
Linux
GSD-2021-1001372
watchdog: Fix possible use-after-free by calling del_timer_sync()
watchdog: Fix possible use-after-free by calling del_timer_sync() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.198 by commit ecd620e0fb1ff7f78fdb593379b2e6938c99707a. For more details please see the references link.
null
2021-12-20T01:31:34.434801Z
2021-08-03T02:21:45.392176Z
null
null
null
null
null
Linux
GSD-2022-1002272
mm: invalidate hwpoison page cache page in fault path
mm: invalidate hwpoison page cache page in fault path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit d1313f5e8fe50ce84ec3eac162873ee028a30631. For more details please see the references link.
null
2022-04-25T03:12:14.300627Z
2022-04-24T22:28:46.426556Z
null
null
null
null
null
Linux
GSD-2021-1001722
mac80211-hwsim: fix late beacon hrtimer handling
mac80211-hwsim: fix late beacon hrtimer handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit ed2adf69e29848d1eb9df99633dde655421c92ed, it was introduced in version v3.9 by commit 01e59e467ecf976c782eecd4dc99644802cc60e2. For more details please see the references link.
null
2021-12-20T00:14:23.862065Z
2021-10-19T16:33:31.844023Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/01e59e467ecf976c782eecd4dc99644802cc60e2'}
Linux
GSD-2021-1000830
ftrace: Do not blindly read the ip address in ftrace_bug()
ftrace: Do not blindly read the ip address in ftrace_bug() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.273 by commit 0bc62e398bbd9e600959e610def5109957437b28, it was introduced in version v2.6.28 by commit 05736a427f7e16be948ccbf39782bd3a6ae16b14. For more details please see the references link.
null
2021-12-20T00:00:58.474448Z
2021-06-30T00:00:01.950763Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/05736a427f7e16be948ccbf39782bd3a6ae16b14'}
Linux
GSD-2021-1000099
media: staging/intel-ipu3: Fix memory leak in imu_fmt
media: staging/intel-ipu3: Fix memory leak in imu_fmt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.20 by commit 14d0e99c3ef6b0648535a31bf2eaabb4eff97b9e, it was introduced in version v5.2 by commit 6d5f26f2e045f2377b524516194657c00efbbce8. For more details please see the references link.
null
2021-12-20T00:20:02.910853Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6d5f26f2e045f2377b524516194657c00efbbce8'}
Linux
GSD-2021-1000563
net: usb: fix memory leak in smsc75xx_bind
net: usb: fix memory leak in smsc75xx_bind This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit 70c886ac93f87ae7214a0c69151a28a8075dd95b, it was introduced in version v2.6.34 by commit d0cad871703b898a442e4049c532ec39168e5b57. For more details please see the references link.
null
2021-12-19T23:18:57.205684Z
2021-06-04T19:39:30.573056Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0cad871703b898a442e4049c532ec39168e5b57'}
Linux
GSD-2021-1000133
tracing: Restructure trace_clock_global() to never block
tracing: Restructure trace_clock_global() to never block This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.36 by commit a33614d52e97fc8077eb0b292189ca7d964cc534, it was introduced in version v5.10 by commit b02414c8f045ab3b9afc816c3735bc98c5c3d262. For more details please see the references link.
null
2021-12-19T22:39:59.358904Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b02414c8f045ab3b9afc816c3735bc98c5c3d262'}
Linux
GSD-2022-1000998
drm/panel: ili9341: fix optional regulator handling
drm/panel: ili9341: fix optional regulator handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 4ea189854b1e625ed5ec80d30147870f984db44c, it was introduced in version v5.15 by commit 5a04227326b04c15b015181772f5c853172fdb68. For more details please see the references link.
null
2022-04-25T03:54:21.992121Z
2022-04-24T20:38:24.161095Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5a04227326b04c15b015181772f5c853172fdb68'}
Linux
GSD-2021-1002620
nfc: fix segfault in nfc_genl_dump_devices_done
nfc: fix segfault in nfc_genl_dump_devices_done This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.294 by commit 214af18abbe39db05beb305b2d11e87d09a6529c. For more details please see the references link.
null
2022-01-11T05:53:46.050775Z
2021-12-27T05:27:32.026523Z
null
null
null
null
null
Linux
GSD-2022-1001370
x86: Annotate call_on_stack()
x86: Annotate call_on_stack() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit d3af356af6909c0f0156c5b6093752d0570feb24. For more details please see the references link.
null
2022-04-25T06:42:01.885836Z
2022-04-24T21:08:34.968330Z
null
null
null
null
null
Linux
GSD-2021-1002270
ASoC: SOF: Intel: hda-dai: fix potential locking issue
ASoC: SOF: Intel: hda-dai: fix potential locking issue This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.162 by commit e5f8c43c854656897def0161ea09fc29bde33a79. For more details please see the references link.
null
2021-12-20T01:01:28.167675Z
2021-11-29T02:36:17.247874Z
null
null
null
null
null
Linux
GSD-2022-1000832
bpf, sockmap: Do not ignore orig_len parameter
bpf, sockmap: Do not ignore orig_len parameter This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.104 by commit 24efaae03b0d093a40e91dce2b820bab03664bca, it was introduced in version v5.10 by commit ef5659280eb13e8ac31c296f58cfdfa1684ac06b. For more details please see the references link.
null
2022-03-18T03:00:07.733772Z
2022-03-18T00:22:32.501989Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef5659280eb13e8ac31c296f58cfdfa1684ac06b'}
Linux
GSD-2022-1001720
scsi: hisi_sas: Free irq vectors in order for v3 HW
scsi: hisi_sas: Free irq vectors in order for v3 HW This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit f05a0d8de2ea49af36821a20b0b501e20ced937e. For more details please see the references link.
null
2022-04-25T06:14:18.932581Z
2022-04-24T21:37:36.620891Z
null
null
null
null
null
Linux
GSD-2022-1000561
mtd: parsers: qcom: Fix missing free for pparts in cleanup
mtd: parsers: qcom: Fix missing free for pparts in cleanup This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit 1b37889f9a151d26a3fb0d3870f6e1046dee2e24, it was introduced in version v5.14 by commit 10f3b4d79958d6f9f71588c6fa862159c83fa80f. For more details please see the references link.
null
2022-03-07T01:43:39.969285Z
2022-02-27T03:24:08.183281Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/10f3b4d79958d6f9f71588c6fa862159c83fa80f'}
Linux
GSD-2022-1000131
ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback
ipheth: fix EOVERFLOW in ipheth_rcvbulk_callback This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.228 by commit 0ea863e2c9459ce62608a9ff28f8fec1380cfb6e, it was introduced in version v4.19.162 by commit 39553ecdea4743da7b6ce9096ae0a831fe881f75. For more details please see the references link.
null
2022-02-19T09:27:42.630321Z
2022-02-18T21:44:35.607103Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/39553ecdea4743da7b6ce9096ae0a831fe881f75'}
Linux
GSD-2022-1000424
misc: fastrpc: avoid double fput() on failed usercopy
misc: fastrpc: avoid double fput() on failed usercopy This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit e4382d0a39f9a1e260d62fdc079ddae5293c037d, it was introduced in version v5.1 by commit 6cffd79504ce040f460831030d3069fa1c99bb71. For more details please see the references link.
null
2022-03-07T01:35:57.914881Z
2022-02-27T03:04:58.036079Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6cffd79504ce040f460831030d3069fa1c99bb71'}
Linux
GSD-2022-1002419
ARM: mmp: Fix failure to remove sram device
ARM: mmp: Fix failure to remove sram device This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 82d919fbdea37f2281457c97fde5a56ed6265e61. For more details please see the references link.
null
2022-04-25T05:29:10.983017Z
2022-04-24T22:45:12.765038Z
null
null
null
null
null
Linux
GSD-2021-1001149
scsi: libfc: Fix array index out of bound exception
scsi: libfc: Fix array index out of bound exception This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.5 by commit 8511293e643a18b248510ae5734e4f360754348c. For more details please see the references link.
null
2021-12-19T23:35:02.398885Z
2021-08-03T01:30:38.212092Z
null
null
null
null
null
Linux
GSD-2022-1002049
f2fs: fix to do sanity check on curseg->alloc_type
f2fs: fix to do sanity check on curseg->alloc_type This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 498b7088db71f9707359448cd6800bbb1882f4c3. For more details please see the references link.
null
2022-04-25T05:55:04.420077Z
2022-04-24T22:05:51.056226Z
null
null
null
null
null
Linux
GSD-2021-1001519
staging: greybus: uart: fix tty use after free
staging: greybus: uart: fix tty use after free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.285 by commit 92b67aaafb7c449db9f0c3dcabc0ff967cb3a42d, it was introduced in version v4.9 by commit a18e15175708d39abbe9746ddc3479466b7800c3. For more details please see the references link.
null
2021-12-20T00:33:54.230354Z
2021-10-19T16:21:53.573036Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a18e15175708d39abbe9746ddc3479466b7800c3'}
Linux
GSD-2022-1001235
bpf: Fix a btf decl_tag bug when tagging a function
bpf: Fix a btf decl_tag bug when tagging a function This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 796d5666f6422ddadc938fb888044fcc16f2dbe3, it was introduced in version v5.16 by commit b5ea834dde6b6e7f75e51d5f66dac8cd7c97b5ef. For more details please see the references link.
null
2022-04-25T03:50:40.810422Z
2022-04-24T20:56:30.511187Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b5ea834dde6b6e7f75e51d5f66dac8cd7c97b5ef'}
Linux
GSD-2021-1002765
ovl: fix warning in ovl_create_real()
ovl: fix warning in ovl_create_real() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit d2ccdd4e4efab06178608a34d7bfb20a54104c02. For more details please see the references link.
null
2022-01-11T05:50:56.554065Z
2021-12-27T05:49:36.930862Z
null
null
null
null
null
Linux
GSD-2021-1000758
x86/kvm: Teardown PV features on boot CPU as well
x86/kvm: Teardown PV features on boot CPU as well This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.125 by commit 7620a669111b52f224d006dea9e1e688e2d62c54, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T22:54:02.417577Z
2021-06-25T00:02:52.965737Z
null
null
null
null
null
Linux
GSD-2022-1000977
cifs: potential buffer overflow in handling symlinks
cifs: potential buffer overflow in handling symlinks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.4 by commit 515e7ba11ef043d6febe69389949c8ef5f25e9d0, it was introduced in version v2.6.37 by commit c69c1b6eaea1b3e1eecf7ad2fba0208ac4a11131. For more details please see the references link.
null
2022-04-25T05:12:48.061984Z
2022-04-24T20:36:28.848773Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c69c1b6eaea1b3e1eecf7ad2fba0208ac4a11131'}
Linux
GSD-2022-1001665
SUNRPC: Fix the svc_deferred_event trace class
SUNRPC: Fix the svc_deferred_event trace class This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.35 by commit 726ae7300fcc25fefa46d188cc07eb16dc908f9e, it was introduced in version v4.17 by commit ece200ddd54b9ce840cfee554fb812560c545c7d. For more details please see the references link.
null
2022-04-25T04:26:30.852593Z
2022-04-24T21:33:13.662975Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ece200ddd54b9ce840cfee554fb812560c545c7d'}
Linux
GSD-2021-1002335
scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs()
scsi: scsi_debug: Fix out-of-bound read in resp_report_tgtpgs() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit 66523553fa62c7878fc5441dc4e82be71934eb77. For more details please see the references link.
null
2021-12-20T00:15:59.623315Z
2021-11-29T02:39:14.171196Z
null
null
null
null
null
Linux
GSD-2021-1000308
iio: sx9310: Fix access to variable DT array
iio: sx9310: Fix access to variable DT array This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 99f8854ad3dadda15fd46deca57fc9205f888980, it was introduced in version v5.11 by commit 5b19ca2c78a0838976064c0347e46a2c859b541d. For more details please see the references link.
null
2021-12-20T01:09:47.273659Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5b19ca2c78a0838976064c0347e46a2c859b541d'}
Linux
GSD-2022-1002360
ASoC: mxs: Fix error handling in mxs_sgtl5000_probe
ASoC: mxs: Fix error handling in mxs_sgtl5000_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit f8d38056bcd220ea6f0802a5586d1a12ebcce849, it was introduced in version v3.5 by commit e968194b45c4e8077dada75c5bae5660b37628fe. For more details please see the references link.
null
2022-04-25T03:34:36.654843Z
2022-04-24T22:38:34.580360Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e968194b45c4e8077dada75c5bae5660b37628fe'}
Linux
GSD-2021-1001630
bpf: Fix integer overflow in prealloc_elems_and_freelist()
bpf: Fix integer overflow in prealloc_elems_and_freelist() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.73 by commit 064faa8e8a9b50f5010c5aa5740e06d477677a89, it was introduced in version v4.6 by commit 557c0c6e7df8e14a46bd7560d193fa5bbc00a858. For more details please see the references link.
null
2021-12-20T00:03:51.005136Z
2021-10-19T16:29:02.941826Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/557c0c6e7df8e14a46bd7560d193fa5bbc00a858'}
Linux
GSD-2021-1000922
net: usb: fix possible use-after-free in smsc75xx_bind
net: usb: fix possible use-after-free in smsc75xx_bind This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.128 by commit 4252bf6c2b245f47011098113d405ffad6ad5d5b, it was introduced in version v5.4.124 by commit b95fb96e6339e34694dd578fb6bde3575b01af17. For more details please see the references link.
null
2021-12-19T23:34:35.520284Z
2021-06-30T00:24:42.355002Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b95fb96e6339e34694dd578fb6bde3575b01af17'}
Linux
GSD-2021-1000888
wq: handle VM suspension in stall detection
wq: handle VM suspension in stall detection This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.126 by commit f9e7a38d148eb660dbcfad40bfb60dcc16997b15. For more details please see the references link.
null
2021-12-19T22:55:20.282346Z
2021-06-30T00:04:35.318340Z
null
null
null
null
null
Linux
GSD-2021-1001260
net: qcom/emac: fix UAF in emac_remove
net: qcom/emac: fix UAF in emac_remove This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.53 by commit b560521eca03d0a2db6093a5a632cbdd0a0cf833, it was introduced in version v4.9 by commit 54e19bc74f3380d414681762ceed9f7245bc6a6e. For more details please see the references link.
null
2021-12-19T23:19:50.538496Z
2021-08-03T01:50:53.917185Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/54e19bc74f3380d414681762ceed9f7245bc6a6e'}
Linux
GSD-2021-1000021
bpf: Use correct permission flag for mixed signed bounds arithmetic
bpf: Use correct permission flag for mixed signed bounds arithmetic This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.32 by commit 4f3ff11204eac0ee23acf64deecb3bad7b0db0c6, it was introduced in version v5.8 by commit 2c78ee898d8f10ae6fb2fa23a3fbaec96b1b7366. For more details please see the references link.
null
2021-12-20T01:20:41.627881Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c78ee898d8f10ae6fb2fa23a3fbaec96b1b7366'}
Linux
GSD-2021-1000471
powerpc: Fix HAVE_HARDLOCKUP_DETECTOR_ARCH build configuration
powerpc: Fix HAVE_HARDLOCKUP_DETECTOR_ARCH build configuration This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.233 by commit a09398b7e39daec6d10fc3c658459ae09a60599f, it was introduced in version v4.13 by commit 2104180a53698df5aec35aed5f840a26ade0551d. For more details please see the references link.
null
2021-12-20T00:07:59.874841Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2104180a53698df5aec35aed5f840a26ade0551d'}
Linux
GSD-2021-1000164
netfilter: conntrack: Make global sysctls readonly in non-init netns
netfilter: conntrack: Make global sysctls readonly in non-init netns This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.35 by commit d3598eb3915cc0c0d8cab42f4a6258ff44c4033e, it was introduced in version v5.7 by commit d0febd81ae77a0e13717f1412ff9589e43fc4f8b. For more details please see the references link.
null
2021-12-20T00:52:40.659038Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0febd81ae77a0e13717f1412ff9589e43fc4f8b'}
Linux
GSD-2021-1002159
drm/msm: Fix null pointer dereference on pointer edp
drm/msm: Fix null pointer dereference on pointer edp This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 2133c4fc8e1348dcb752f267a143fe2254613b34, it was introduced in version v4.0 by commit ab5b0107ccf3821a6837b0f2819270d6fa0b278f. For more details please see the references link.
null
2021-12-20T01:37:32.199130Z
2021-11-14T15:22:36.542077Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab5b0107ccf3821a6837b0f2819270d6fa0b278f'}
Linux
GSD-2022-1001409
drm/bridge: Add missing pm_runtime_put_sync
drm/bridge: Add missing pm_runtime_put_sync This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 792533e54cd6e89191798ccd1abd590c62b9077e. For more details please see the references link.
null
2022-04-25T06:20:46.501527Z
2022-04-24T21:10:55.103111Z
null
null
null
null
null
Linux
GSD-2021-1000534
drm/amdgpu: Fix a use-after-free
drm/amdgpu: Fix a use-after-free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit d4ea141fd4b40636a8326df5a377d9c5cf9b3faa, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T00:51:28.671242Z
2021-06-04T19:34:51.155631Z
null
null
null
null
null
Linux
GSD-2021-1002509
devlink: fix netns refcount leak in devlink_nl_cmd_reload()
devlink: fix netns refcount leak in devlink_nl_cmd_reload() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.85 by commit 4b7e90672af8e0c78205db006f1b0a20ebd07f5f, it was introduced in version v5.10 by commit ccdf07219da6bd1f43c6ddcde4c0e36993c7365a. For more details please see the references link.
null
2021-12-19T22:26:18.657356Z
2021-12-19T19:40:30.771796Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ccdf07219da6bd1f43c6ddcde4c0e36993c7365a'}
Linux
GSD-2022-1001059
ath11k: Fix frames flush failure caused by deadlock
ath11k: Fix frames flush failure caused by deadlock This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 33e723dc054edfc94da90eecca3b72cb424ce4a3. For more details please see the references link.
null
2022-04-25T05:04:00.327058Z
2022-04-24T20:42:53.928563Z
null
null
null
null
null
Linux
GSD-2021-1001775
NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()
NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.290 by commit 429054ec51e648d241a7e0b465cf44f6633334c5, it was introduced in version v3.13 by commit 1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8. For more details please see the references link.
null
2021-12-19T22:24:24.844543Z
2021-10-28T13:48:17.874610Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8'}
Linux
GSD-2021-1000867
net/nfc/rawsock.c: fix a permission check bug
net/nfc/rawsock.c: fix a permission check bug This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.195 by commit ec72482564ff99c6832d33610d9f8ab7ecc81b6d. For more details please see the references link.
null
2021-12-20T01:13:16.747724Z
2021-06-30T00:02:27.310482Z
null
null
null
null
null