ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2022-1002225
LSM: general protection fault in legacy_parse_param
LSM: general protection fault in legacy_parse_param This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit ddcdda888e14ca451b3ee83d11b65b2a9c8e783b. For more details please see the references link.
null
2022-04-25T04:41:47.806266Z
2022-04-24T22:23:05.020572Z
null
null
null
null
null
Linux
GSD-2022-1000218
ALSA: hda: Fix UAF of leds class devs at unbinding
ALSA: hda: Fix UAF of leds class devs at unbinding This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.99 by commit a7de1002135cf94367748ffc695a29812d7633b5. For more details please see the references link.
null
2022-02-19T08:46:26.877496Z
2022-02-18T21:56:48.164036Z
null
null
null
null
null
Linux
GSD-2021-1001325
memory: fsl_ifc: fix leak of IO mapping on probe failure
memory: fsl_ifc: fix leak of IO mapping on probe failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.134 by commit d9213d4f372d30b5bc4d921795d6bed0c0e3eebf, it was introduced in version v3.3 by commit a20cbdeffce247a2b6fb83cd8d22433994068565. For more details please see the references link.
null
2021-12-19T22:30:23.606373Z
2021-08-03T02:09:35.415762Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a20cbdeffce247a2b6fb83cd8d22433994068565'}
Linux
GSD-2022-1000648
ovl: fix NULL pointer dereference in copy up warning
ovl: fix NULL pointer dereference in copy up warning This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.6 by commit 9c7f8a35c5a83740c0e3ea540b6ad145c50d79aa, it was introduced in version v5.16 by commit 5b0a414d06c3ed2097e32ef7944a4abb644b89bd. For more details please see the references link.
null
2022-03-07T01:33:36.999095Z
2022-02-27T03:35:56.752037Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5b0a414d06c3ed2097e32ef7944a4abb644b89bd'}
Linux
GSD-2022-1002462
ARM: davinci: da850-evm: Avoid NULL pointer dereference
ARM: davinci: da850-evm: Avoid NULL pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit c06f476e5b74bcabb8c4a2fba55864a37e62843b, it was introduced in version v2.6.33 by commit bae105879f2f2404155da6f50b3636193d228a62. For more details please see the references link.
null
2022-04-25T04:25:37.656890Z
2022-04-24T22:50:43.497086Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bae105879f2f2404155da6f50b3636193d228a62'}
Linux
GSD-2021-1001132
dmaengine: mediatek: free the proper desc in desc_free handler
dmaengine: mediatek: free the proper desc in desc_free handler This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.14 by commit c11dd2d04e827709211067043ff20dda5c6c28ee. For more details please see the references link.
null
2021-12-20T00:11:37.246413Z
2021-07-08T01:58:36.207803Z
null
null
null
null
null
Linux
GSD-2022-1002198
iommu/arm-smmu-v3: fix event handling soft lockup
iommu/arm-smmu-v3: fix event handling soft lockup This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit ea057ac8c9427bc01271ccbb86fed69a793d3d64. For more details please see the references link.
null
2022-04-25T06:43:08.463027Z
2022-04-24T22:21:01.617733Z
null
null
null
null
null
Linux
GSD-2022-1002032
ubifs: Fix deadlock in concurrent rename whiteout and inode writeback
ubifs: Fix deadlock in concurrent rename whiteout and inode writeback This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 83e42a78428fc354f5e2049935b84c8d8d29b787, it was introduced in version v4.9 by commit 9e0a1fff8db56eaaebb74b4a3ef65f86811c4798. For more details please see the references link.
null
2022-04-25T04:24:32.319970Z
2022-04-24T22:04:47.365816Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9e0a1fff8db56eaaebb74b4a3ef65f86811c4798'}
Linux
GSD-2021-1001098
cfg80211: call cfg80211_leave_ocb when switching away from OCB
cfg80211: call cfg80211_leave_ocb when switching away from OCB This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.274 by commit d3a0d82d3f4747866f80d3f0732156c4b85226d2. For more details please see the references link.
null
2021-12-19T22:38:40.619436Z
2021-07-08T01:56:12.230219Z
null
null
null
null
null
Linux
GSD-2021-1001562
hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs
hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.209 by commit 5c6e0bce647d9cb32a17d58ffa669b3421fcc6ca, it was introduced in version v4.19 by commit 65afb4c8e7e4e7e74b28efa1df62da503ca3e7a6. For more details please see the references link.
null
2021-12-20T00:43:44.539560Z
2021-10-19T16:23:52.871768Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/65afb4c8e7e4e7e74b28efa1df62da503ca3e7a6'}
Linux
GSD-2021-1001831
efi: Change down_interruptible() in virt_efi_reset_system() to down_trylock()
efi: Change down_interruptible() in virt_efi_reset_system() to down_trylock() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.155 by commit 278e483dc79311a56304f97585d3dc7db5876282. For more details please see the references link.
null
2021-12-19T22:36:47.593767Z
2021-10-28T13:51:14.002451Z
null
null
null
null
null
Linux
GSD-2021-1000723
ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed
ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.272 by commit 5b3a9a2be59478b013a430ac57b0f3d65471b071, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T01:28:30.864745Z
2021-06-24T23:59:18.628717Z
null
null
null
null
null
Linux
GSD-2021-1000689
i2c: i801: Don't generate an interrupt on bus reset
i2c: i801: Don't generate an interrupt on bus reset This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.271 by commit 09c9e79f4c10cfb6b9e0e1b4dd355232e4b5a3b3, it was introduced in version v3.6 by commit 636752bcb5177a301d0266270661581de8624828. For more details please see the references link.
null
2021-12-20T00:56:28.401598Z
2021-06-04T20:02:49.729883Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/636752bcb5177a301d0266270661581de8624828'}
Linux
GSD-2021-1000373
media: aspeed: fix clock handling logic
media: aspeed: fix clock handling logic This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit a59d01384c80a8a4392665802df57c3df20055f5, it was introduced in version v5.0 by commit d2b4387f3bdf016e266d23cf657465f557721488. For more details please see the references link.
null
2021-12-20T00:42:36.821061Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d2b4387f3bdf016e266d23cf657465f557721488'}
Linux
GSD-2021-1001974
xhci: Fix command ring pointer corruption while aborting a command
xhci: Fix command ring pointer corruption while aborting a command This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.213 by commit 62c182b5e763e5f4062e72678e72ce3e02dd4d1b. For more details please see the references link.
null
2021-12-19T23:15:45.614676Z
2021-11-14T15:14:11.861317Z
null
null
null
null
null
Linux
GSD-2021-1000666
bpf: No need to simulate speculative domain for immediates
bpf: No need to simulate speculative domain for immediates This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.193 by commit a9d5ac78e7ca194d8fc570d26640395ffd6e9367, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T23:04:44.755109Z
2021-06-04T19:58:07.081350Z
null
null
null
null
null
Linux
GSD-2021-1000236
mt76: mt7615: fix memleak when mt7615_unregister_device()
mt76: mt7615: fix memleak when mt7615_unregister_device() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 6c5b2b0c6e5a6ce2d8f9f85b8b72bfad60eaa506, it was introduced in version v5.12 by commit a6275e934605646ef81b02d8d1164f21343149c9. For more details please see the references link.
null
2021-12-19T22:55:33.057903Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a6275e934605646ef81b02d8d1164f21343149c9'}
Linux
GSD-2022-1000849
xhci: Prevent futile URB re-submissions due to incorrect return value.
xhci: Prevent futile URB re-submissions due to incorrect return value. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.103 by commit 214824764308ae9b3dc0a99e369ef9a68af05923, it was introduced in version v3.11 by commit 203a86613fb3bf2767335659513fa98563a3eb71. For more details please see the references link.
null
2022-03-18T02:56:18.573850Z
2022-03-18T00:23:50.238079Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/203a86613fb3bf2767335659513fa98563a3eb71'}
Linux
GSD-2021-1001077
can: mcba_usb: fix memory leak in mcba_usb
can: mcba_usb: fix memory leak in mcba_usb This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit d0760a4ef85697bc756d06eae17ae27f3f055401, it was introduced in version v4.12 by commit 51f3baad7de943780ce0c17bd7975df567dd6e14. For more details please see the references link.
null
2021-12-19T23:33:08.054503Z
2021-06-30T00:38:06.420641Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/51f3baad7de943780ce0c17bd7975df567dd6e14'}
Linux
GSD-2021-1001427
seq_buf: Fix overflow in seq_buf_putmem_hex()
seq_buf: Fix overflow in seq_buf_putmem_hex() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.240 by commit 50b51460f59acbd403475510ad423bb5ea7a4c97, it was introduced in version v2.6.27 by commit 5e3ca0ec76fce92daa4eed0d02de9c79b1fe3920. For more details please see the references link.
null
2021-12-20T01:08:19.528515Z
2021-08-03T02:37:32.802694Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5e3ca0ec76fce92daa4eed0d02de9c79b1fe3920'}
Linux
GSD-2022-1002177
mm/mempolicy: fix mpol_new leak in shared_policy_replace
mm/mempolicy: fix mpol_new leak in shared_policy_replace This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 25f506273b6ae806fd46bfcb6fdaa5b9ec81a05b, it was introduced in version v3.8 by commit 42288fe366c4f1ce7522bc9f27d0bc2a81c55264. For more details please see the references link.
null
2022-04-25T03:37:17.585088Z
2022-04-24T22:19:02.460421Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/42288fe366c4f1ce7522bc9f27d0bc2a81c55264'}
Linux
GSD-2022-1001188
tipc: fix the timer expires after interval 100ms
tipc: fix the timer expires after interval 100ms This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 8d8cb4166a4705b9067087d459bf8369869782fa, it was introduced in version v4.20 by commit 6787927475e52f6933e3affce365dabb2aa2fadf. For more details please see the references link.
null
2022-04-25T06:25:13.055530Z
2022-04-24T20:52:08.052218Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6787927475e52f6933e3affce365dabb2aa2fadf'}
Linux
GSD-2021-1002122
cfg80211: fix management registrations locking
cfg80211: fix management registrations locking This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.16 by commit 3c897f39b71fe68f90599f6a45b5f7bf5618420e, it was introduced in version v5.8 by commit 6cd536fe62ef58d7c4eac2da07ab0ed7fd19010d. For more details please see the references link.
null
2021-12-19T23:13:51.638955Z
2021-11-14T15:20:50.069984Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6cd536fe62ef58d7c4eac2da07ab0ed7fd19010d'}
Linux
GSD-2022-1001472
f2fs: fix to do sanity check on curseg->alloc_type
f2fs: fix to do sanity check on curseg->alloc_type This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 0748a0f7dcb9d9dddc80302d73ebcecef6782ef0. For more details please see the references link.
null
2022-04-25T05:04:33.066475Z
2022-04-24T21:15:30.130991Z
null
null
null
null
null
Linux
GSD-2021-1002572
drm/msm/devfreq: Fix OPP refcnt leak
drm/msm/devfreq: Fix OPP refcnt leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.7 by commit a4eb55901df1dce8c6944438bbdf57caf08911e2, it was introduced in version v5.15 by commit 9bc95570175a7fbca29d86d22c54bbf399f4ad5a. For more details please see the references link.
null
2021-12-20T01:31:07.119130Z
2021-12-19T19:43:19.326563Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9bc95570175a7fbca29d86d22c54bbf399f4ad5a'}
Linux
GSD-2021-1002088
mlxsw: thermal: Fix out-of-bounds memory accesses
mlxsw: thermal: Fix out-of-bounds memory accesses This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit df8e58716afb3bee2b59de66b1ba1033f2e26303, it was introduced in version v4.10 by commit a50c1e35650b929500bd89be61c89d95a267ce56. For more details please see the references link.
null
2021-12-20T00:00:46.759051Z
2021-11-14T15:19:18.049452Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a50c1e35650b929500bd89be61c89d95a267ce56'}
Linux
GSD-2022-1001022
scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one()
scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit a845c678e094894f38cc9526d212b21933ce44c7, it was introduced in version v2.6.23 by commit 45804fbb00eea27bdf4d62751681228a9e2844e9. For more details please see the references link.
null
2022-04-25T04:18:20.158188Z
2022-04-24T20:40:45.221232Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/45804fbb00eea27bdf4d62751681228a9e2844e9'}
Linux
GSD-2022-1000799
iio: adc: tsc2046: fix memory corruption by preventing array overflow
iio: adc: tsc2046: fix memory corruption by preventing array overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.26 by commit 0cb9b2f73c182d242a640e512f4785c7c504512f, it was introduced in version v5.14 by commit 9374e8f5a38defe90bc65b2decf317c1c62d91dd. For more details please see the references link.
null
2022-03-18T02:55:12.565688Z
2022-03-18T00:19:04.171958Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9374e8f5a38defe90bc65b2decf317c1c62d91dd'}
Linux
GSD-2021-1002821
IB/qib: Fix memory leak in qib_user_sdma_queue_pkts()
IB/qib: Fix memory leak in qib_user_sdma_queue_pkts() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.12 by commit aefcc25f3a0cd28a87d11d41d30419a12cd26a34, it was introduced in version v5.15 by commit d39bf40e55e666b5905fdbd46a0dced030ce87be. For more details please see the references link.
null
2022-01-11T05:58:34.677545Z
2021-12-30T02:44:53.859720Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d39bf40e55e666b5905fdbd46a0dced030ce87be'}
Linux
GSD-2022-1000263
powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending
powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.19 by commit 28aaed966e76807a71de79dd40a8eee9042374dd, it was introduced in version v5.15.17 by commit fadcafa3959281ce2d96feedece8c75c3f95f8a5. For more details please see the references link.
null
2022-02-19T08:53:02.625326Z
2022-02-18T22:03:39.576456Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fadcafa3959281ce2d96feedece8c75c3f95f8a5'}
Linux
GSD-2022-1000633
yam: fix a memory leak in yam_siocdevprivate()
yam: fix a memory leak in yam_siocdevprivate() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit deb0f02d08276d87212c1f19d9d919b13dc4c033, it was introduced in version v4.19 by commit 0781168e23a2fc8dceb989f11fc5b39b3ccacc35. For more details please see the references link.
null
2022-03-07T01:38:38.163233Z
2022-02-27T03:33:36.707544Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0781168e23a2fc8dceb989f11fc5b39b3ccacc35'}
Linux
GSD-2022-1001921
mm/pages_alloc.c: don't create ZONE_MOVABLE beyond the end of a node
mm/pages_alloc.c: don't create ZONE_MOVABLE beyond the end of a node This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit a74bb0eeabcdbf61e9b5eef36c0cba70ac8f1926, it was introduced in version v2.6.23 by commit 2a1e274acf0b1c192face19a4be7c12d4503eaaf. For more details please see the references link.
null
2022-04-25T06:26:11.865895Z
2022-04-24T21:54:52.217970Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2a1e274acf0b1c192face19a4be7c12d4503eaaf'}
Linux
GSD-2022-1000326
iwlwifi: fix use-after-free
iwlwifi: fix use-after-free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.231 by commit 7d6475179b85a83186ccce59cdc359d4f07d0bcb, it was introduced in version v4.19.226 by commit 1d7cc54137a4f28506dc7beac235b240b08f4e59. For more details please see the references link.
null
2022-03-07T01:53:25.706305Z
2022-02-27T02:51:47.313642Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1d7cc54137a4f28506dc7beac235b240b08f4e59'}
Linux
GSD-2021-1000959
RDMA/ipoib: Fix warning caused by destroying non-initial netns
RDMA/ipoib: Fix warning caused by destroying non-initial netns This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.44 by commit 67cf4e447b5e5e9e94996cb6812ae2828e0e0e27, it was introduced in version v5.10 by commit 5ce2dced8e95e76ff7439863a118a053a7fc6f91. For more details please see the references link.
null
2021-12-19T23:04:03.926333Z
2021-06-30T00:29:19.363844Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5ce2dced8e95e76ff7439863a118a053a7fc6f91'}
Linux
GSD-2022-1000776
mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls
mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.27 by commit 261eff11ade981b23dbbfc73c0ecae3966352974, it was introduced in version v5.15 by commit 7661809d493b426e979f39ab512e3adf41fbcc69. For more details please see the references link.
null
2022-03-18T02:49:36.368089Z
2022-03-18T00:17:22.989684Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7661809d493b426e979f39ab512e3adf41fbcc69'}
Linux
GSD-2022-1001864
Bluetooth: hci_serdev: call init_rwsem() before p->open()
Bluetooth: hci_serdev: call init_rwsem() before p->open() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 041e5b8a62e63d1611bdd8936962e687ddfaf885, it was introduced in version v4.16 by commit d73e172816652772114827abaa2dbc053eecbbd7. For more details please see the references link.
null
2022-04-25T04:57:37.583913Z
2022-04-24T21:49:36.593572Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d73e172816652772114827abaa2dbc053eecbbd7'}
Linux
GSD-2022-1001537
drm/tegra: Fix reference leak in tegra_dsi_ganged_probe
drm/tegra: Fix reference leak in tegra_dsi_ganged_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit cd78b74031cbc94133965f1017deb822657fc1a6, it was introduced in version v3.19 by commit e94236cde4d519cdecd45e2435defba33abdc99f. For more details please see the references link.
null
2022-04-25T04:59:20.824356Z
2022-04-24T21:21:29.529008Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e94236cde4d519cdecd45e2435defba33abdc99f'}
Linux
GSD-2021-1002067
nvme-tcp: fix possible req->offset corruption
nvme-tcp: fix possible req->offset corruption This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.77 by commit c63d7f2ca99a2e2a9b62d42bffa0ccec407b91b0, it was introduced in version v5.8 by commit db5ad6b7f8cdd6d78efef62a1557461d0cbaee54. For more details please see the references link.
null
2021-12-20T01:08:15.427944Z
2021-11-14T15:18:24.413672Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/db5ad6b7f8cdd6d78efef62a1557461d0cbaee54'}
Linux
GSD-2022-1001167
xen: fix is_xen_pmu()
xen: fix is_xen_pmu() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 26911a822148bef5dcfc55e7df49cb05a18737e3, it was introduced in version v4.3 by commit bf6dfb154d935725c9a2005033ca33017b9df439. For more details please see the references link.
null
2022-04-25T06:40:25.679691Z
2022-04-24T20:49:58.636601Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf6dfb154d935725c9a2005033ca33017b9df439'}
Linux
GSD-2021-1002437
net: nexthop: fix null pointer dereference when IPv6 is not enabled
net: nexthop: fix null pointer dereference when IPv6 is not enabled This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.163 by commit 7b6f44856da5ba0b1aa61403eb9fddd272156503, it was introduced in version v5.3 by commit 53010f991a9f5e4ed2db705ddde6ff32709192a2. For more details please see the references link.
null
2021-12-19T23:18:35.037548Z
2021-12-19T19:37:15.803307Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/53010f991a9f5e4ed2db705ddde6ff32709192a2'}
Linux
GSD-2021-1002319
net/mlx5: Update error handler for UCTX and UMEM
net/mlx5: Update error handler for UCTX and UMEM This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit a51a6da375d82aed5c8f83abd13e7d060421bd48, it was introduced in version v5.2 by commit 6a6fabbfa3e8c656ff906ae999fb6856410fa4cd. For more details please see the references link.
null
2021-12-19T23:02:03.230872Z
2021-11-29T02:38:34.153074Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6a6fabbfa3e8c656ff906ae999fb6856410fa4cd'}
Linux
GSD-2021-1000324
netfilter: nftables: avoid overflows in nft_hash_buckets()
netfilter: nftables: avoid overflows in nft_hash_buckets() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.38 by commit 72b49dd116ca00a46a11d5a4d8d7987f05ed9cd7, it was introduced in version v4.9 by commit 0ed6389c483dc77cdbdd48de0ca7ce41723dd667. For more details please see the references link.
null
2021-12-19T22:05:16.587750Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0ed6389c483dc77cdbdd48de0ca7ce41723dd667'}
Linux
GSD-2022-1001649
spi: cadence-quadspi: fix protocol setup for non-1-1-X operations
spi: cadence-quadspi: fix protocol setup for non-1-1-X operations This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.35 by commit d8860f1f9e41e7072ed4fae5316dd43ed83beb64. For more details please see the references link.
null
2022-04-25T04:22:52.813503Z
2022-04-24T21:31:39.546300Z
null
null
null
null
null
Linux
GSD-2021-1001866
s390/pci: fix zpci_zdev_put() on reserve
s390/pci: fix zpci_zdev_put() on reserve This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit 4e5d794a2743f5a1e13ee1066ce37711f2696044, it was introduced in version v5.14 by commit 2a671f77ee49f3e78997b77fdee139467ff6a598. For more details please see the references link.
null
2021-12-19T22:38:01.240301Z
2021-10-28T13:53:00.602925Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2a671f77ee49f3e78997b77fdee139467ff6a598'}
Linux
GSD-2021-1002749
mptcp: fix deadlock in __mptcp_push_pending()
mptcp: fix deadlock in __mptcp_push_pending() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit 23311b92755ffa9087332d1bb8c71c0f6a10cc08, it was introduced in version v5.13 by commit 1b3e7ede1365a24db1b4fd837e58a595f52fa4ad. For more details please see the references link.
null
2022-01-11T05:53:54.943137Z
2021-12-27T05:46:57.042173Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1b3e7ede1365a24db1b4fd837e58a595f52fa4ad'}
Linux
GSD-2021-1000774
net: caif: fix memory leak in cfusbl_device_notify
net: caif: fix memory leak in cfusbl_device_notify This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.43 by commit 46403c1f80b0d3f937ff9c4f5edc63bb64bc5051, it was introduced in version v3.3 by commit 7ad65bf68d705b445ef10b77ab50dab22be185ee. For more details please see the references link.
null
2021-12-19T22:53:24.852391Z
2021-06-25T00:04:45.631975Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ad65bf68d705b445ef10b77ab50dab22be185ee'}
Linux
GSD-2022-1001219
ext2: correct max file size computing
ext2: correct max file size computing This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 3f5ec4d20a251f1d4053aab57c239bade473c92f, it was introduced in version v5.1 by commit 1c2d14212b15a60300a2d4f6364753e87394c521. For more details please see the references link.
null
2022-04-25T05:35:54.378702Z
2022-04-24T20:55:01.750261Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c2d14212b15a60300a2d4f6364753e87394c521'}
Linux
GSD-2021-1001535
mac80211: fix use-after-free in CCMP/GCMP RX
mac80211: fix use-after-free in CCMP/GCMP RX This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.249 by commit f556e1d6fb9f2923a9a36f3df638c7d79ba09dbb, it was introduced in version v4.14.235 by commit a9b57952fed41556c950a92123086724eaf11919. For more details please see the references link.
null
2021-12-19T23:05:58.454145Z
2021-10-19T16:22:39.959719Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a9b57952fed41556c950a92123086724eaf11919'}
Linux
GSD-2022-1000058
mm/damon/dbgfs: fix 'struct pid' leaks in 'dbgfs_target_ids_write()'
mm/damon/dbgfs: fix 'struct pid' leaks in 'dbgfs_target_ids_write()' This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.13 by commit ffe4a1ba1a82c416a6b3a09d46594f6a885ae141, it was introduced in version v5.15 by commit 4bc05954d0076655cfaf6f0135585bdc20cd6b11. For more details please see the references link.
null
2022-01-11T05:46:28.363170Z
2022-01-10T19:52:11.656469Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4bc05954d0076655cfaf6f0135585bdc20cd6b11'}
Linux
GSD-2022-1002065
pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe
pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 669b05ff43bd7ed684379c6e2006a6dad5127b71, it was introduced in version v3.9 by commit 32e67eee670e1254ee5ab41e2f454680acb9c17c. For more details please see the references link.
null
2022-04-25T05:27:03.069879Z
2022-04-24T22:07:06.663118Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/32e67eee670e1254ee5ab41e2f454680acb9c17c'}
Linux
GSD-2021-1001165
netrom: Decrease sock refcount when sock timers expire
netrom: Decrease sock refcount when sock timers expire This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.6 by commit bc1660206c3723c37ed4d622ad81781f1e987250, it was introduced in version v5.0 by commit 63346650c1a94a92be61a57416ac88c0a47c4327. For more details please see the references link.
null
2021-12-19T23:41:35.884411Z
2021-08-03T01:31:47.051374Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63346650c1a94a92be61a57416ac88c0a47c4327'}
Linux
GSD-2022-1000408
xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create
xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.102 by commit 1e7433fb95ccc01629a5edaa4ced0cd8c98d0ae0. For more details please see the references link.
null
2022-03-07T01:30:25.609165Z
2022-02-27T03:02:30.380048Z
null
null
null
null
null
Linux
GSD-2022-1002435
power: supply: wm8350-power: Add missing free in free_charger_irq
power: supply: wm8350-power: Add missing free in free_charger_irq This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit ae64b838bececea902b819a69731cb80cca8f31a, it was introduced in version v2.6.29 by commit 14431aa0c5a443d13d24e6f865a8838f97dab973. For more details please see the references link.
null
2022-04-25T05:39:18.402375Z
2022-04-24T22:47:04.034342Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/14431aa0c5a443d13d24e6f865a8838f97dab973'}
Linux
GSD-2022-1002120
block: don't delete queue kobject before its children
block: don't delete queue kobject before its children This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 0b5924a14d64487ebd51127b0358d06066ef5384, it was introduced in version v4.16 by commit 2c2086afc2b8b974fac32cb028e73dc27bfae442. For more details please see the references link.
null
2022-04-25T04:03:36.411069Z
2022-04-24T22:13:35.960643Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c2086afc2b8b974fac32cb028e73dc27bfae442'}
Linux
GSD-2021-1001470
net: validate lwtstate->data before returning from skb_tunnel_info()
net: validate lwtstate->data before returning from skb_tunnel_info() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.277 by commit e7f3c9df40515a6c6b46f36c4c94cf48a043f887, it was introduced in version v4.3 by commit 61adedf3e3f1d3f032c5a6a299978d91eff6d555. For more details please see the references link.
null
2021-12-19T23:50:59.237325Z
2021-08-03T02:50:43.138496Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61adedf3e3f1d3f032c5a6a299978d91eff6d555'}
Linux
GSD-2021-1001020
KVM: X86: MMU: Use the correct inherited permissions to get shadow page
KVM: X86: MMU: Use the correct inherited permissions to get shadow page This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit 7707f7244d813f8279143d5dfdee7a318801231b, it was introduced in version v2.6.20 by commit cea0f0e7ea54753c3265dc77f605a6dad1912cfc. For more details please see the references link.
null
2021-12-19T23:31:22.446585Z
2021-06-30T00:34:21.394291Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cea0f0e7ea54753c3265dc77f605a6dad1912cfc'}
Linux
GSD-2021-1001889
powerpc/smp: do not decrement idle task preempt count in CPU offline
powerpc/smp: do not decrement idle task preempt count in CPU offline This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit 3ea0b497a7a2fff6a4b7090310c9f52c91975934, it was introduced in version v5.14 by commit 2c669ef6979c370f98d4b876e54f19613c81e075. For more details please see the references link.
null
2021-12-19T23:36:27.747411Z
2021-10-28T13:54:15.848468Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c669ef6979c370f98d4b876e54f19613c81e075'}
Linux
GSD-2021-1000261
ASoC: q6afe-clocks: fix reprobing of the driver
ASoC: q6afe-clocks: fix reprobing of the driver This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 62413972f5266568848a36fd15160397b211fa74, it was introduced in version v5.10 by commit 520a1c396d1966b64884d8e0176a580150d5a09e. For more details please see the references link.
null
2021-12-19T22:03:20.137140Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/520a1c396d1966b64884d8e0176a580150d5a09e'}
Linux
GSD-2021-1001923
usbnet: sanity check for maxpacket
usbnet: sanity check for maxpacket This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.291 by commit b9eba0a4a527e04d712f0e0401e5391ef124b33e. For more details please see the references link.
null
2021-12-20T00:43:48.088601Z
2021-11-14T15:11:53.294085Z
null
null
null
null
null
Linux
GSD-2021-1000631
tipc: skb_linearize the head skb when reassembling msgs
tipc: skb_linearize the head skb when reassembling msgs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.124 by commit 64d17ec9f1ded042c4b188d15734f33486ed9966, it was introduced in version v4.3 by commit 45c8b7b175ceb2d542e0fe15247377bf3bce29ec. For more details please see the references link.
null
2021-12-19T22:09:26.225421Z
2021-06-04T19:50:54.163813Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/45c8b7b175ceb2d542e0fe15247377bf3bce29ec'}
Linux
GSD-2022-1000664
IB/hfi1: Fix AIP early init panic
IB/hfi1: Fix AIP early init panic This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.8 by commit 1899c3cad265c4583658aed5293d02e8af84276b, it was introduced in version v5.8 by commit d99dc602e2a55a99940ba9506a7126dfa54d54ea. For more details please see the references link.
null
2022-03-07T01:34:39.601441Z
2022-02-27T03:37:45.022368Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d99dc602e2a55a99940ba9506a7126dfa54d54ea'}
Linux
GSD-2022-1001976
net: openvswitch: fix leak of nested actions
net: openvswitch: fix leak of nested actions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit 5ae05b5eb58773cfec307ff88aff4cfd843c4cff, it was introduced in version v4.3 by commit 34ae932a40369be6bd6ea97d66b6686361b4370d. For more details please see the references link.
null
2022-04-25T06:48:00.483748Z
2022-04-24T22:00:15.117238Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/34ae932a40369be6bd6ea97d66b6686361b4370d'}
Linux
GSD-2021-1001309
net/sched: act_skbmod: Skip non-Ethernet packets
net/sched: act_skbmod: Skip non-Ethernet packets This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.136 by commit a88414fb1117f2fe65fb88e45ba694e1d09d5024, it was introduced in version v4.9 by commit 86da71b57383d40993cb90baafb3735cffe5d800. For more details please see the references link.
null
2021-12-19T23:27:05.579621Z
2021-08-03T02:04:28.979559Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/86da71b57383d40993cb90baafb3735cffe5d800'}
Linux
GSD-2022-1002209
ubifs: Fix deadlock in concurrent rename whiteout and inode writeback
ubifs: Fix deadlock in concurrent rename whiteout and inode writeback This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 37bdf1ad592555ecda1d55b89f6e393e4c0589d1, it was introduced in version v4.9 by commit 9e0a1fff8db56eaaebb74b4a3ef65f86811c4798. For more details please see the references link.
null
2022-04-25T04:04:57.952582Z
2022-04-24T22:22:08.652648Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9e0a1fff8db56eaaebb74b4a3ef65f86811c4798'}
Linux
GSD-2022-1000234
perf/x86/intel/pt: Fix crash with stop filters in single-range mode
perf/x86/intel/pt: Fix crash with stop filters in single-range mode This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.99 by commit 456f041e035913fcedb275aff6f8a71dfebcd394, it was introduced in version v5.5 by commit 670638477aede0d7a355ced04b569214aa3feacd. For more details please see the references link.
null
2022-02-20T06:31:32.428623Z
2022-02-18T21:59:27.044729Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/670638477aede0d7a355ced04b569214aa3feacd'}
Linux
GSD-2021-1001759
afs: Fix corruption in reads at fpos 2G-4G from an OpenAFS server
afs: Fix corruption in reads at fpos 2G-4G from an OpenAFS server This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.9 by commit e66fc460d6dcf85cf12288e133a081205aebcd97, it was introduced in version v2.6.22 by commit b9b1f8d5930a813879278d0cbfc8c658d6a038dc. For more details please see the references link.
null
2021-12-19T23:06:47.318428Z
2021-10-19T16:35:22.027987Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b9b1f8d5930a813879278d0cbfc8c658d6a038dc'}
Linux
GSD-2022-1001075
ath11k: fix kernel panic during unload/load ath11k modules
ath11k: fix kernel panic during unload/load ath11k modules This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 38e488db194dc16d2eb23c77c6a8c04ff583c40d. For more details please see the references link.
null
2022-04-25T06:13:47.133849Z
2022-04-24T20:43:40.159222Z
null
null
null
null
null
Linux
GSD-2021-1000518
RDMA/rxe: Clear all QP fields if creation failed
RDMA/rxe: Clear all QP fields if creation failed This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.192 by commit f3783c415bf6d2ead3d7aa2c38802bbe10723646, it was introduced in version v4.8 by commit 8700e3e7c4857d28ebaa824509934556da0b3e76. For more details please see the references link.
null
2021-12-19T22:34:11.735337Z
2021-05-31T23:49:37.017614Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8700e3e7c4857d28ebaa824509934556da0b3e76'}
Linux
GSD-2021-1002525
staging: r8188eu: fix a memory leak in rtw_wx_read32()
staging: r8188eu: fix a memory leak in rtw_wx_read32() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.6 by commit c8d3775745adacf9784a7a80a82d047051752573, it was introduced in version v5.15 by commit 2b42bd58b32155a1be4dd78991845dec05aaef9e. For more details please see the references link.
null
2021-12-20T00:12:23.691949Z
2021-12-19T19:41:08.580288Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2b42bd58b32155a1be4dd78991845dec05aaef9e'}
Linux
GSD-2022-1001425
nbd: fix possible overflow on 'first_minor' in nbd_dev_add()
nbd: fix possible overflow on 'first_minor' in nbd_dev_add() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit d42740aab3ea29578d11a042bb50ded12ad3aa8a, it was introduced in version v4.11 by commit b0d9111a2d53785847763c64c40af2d4c4c5a8b7. For more details please see the references link.
null
2022-04-25T04:20:36.565120Z
2022-04-24T21:11:56.945634Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b0d9111a2d53785847763c64c40af2d4c4c5a8b7'}
Linux
GSD-2021-1000148
cifs: Return correct error code from smb2_get_enc_key
cifs: Return correct error code from smb2_get_enc_key This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.36 by commit aaa0faa5c28a91c362352d6b35dc3ed10df56fb0, it was introduced in version v4.11 by commit 61cfac6f267dabcf2740a7ec8a0295833b28b5f5. For more details please see the references link.
null
2021-12-19T22:49:31.608009Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61cfac6f267dabcf2740a7ec8a0295833b28b5f5'}
Linux
GSD-2021-1002175
blk-cgroup: blk_cgroup_bio_start() should use irq-safe operations on blkg->iostat_cpu
blk-cgroup: blk_cgroup_bio_start() should use irq-safe operations on blkg->iostat_cpu This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 5370b0f49078203acf3c064b634a09707167a864, it was introduced in version v5.13 by commit 2d146aa3aa842d7f5065802556b4f9a2c6e8ef12. For more details please see the references link.
null
2021-12-19T23:59:04.546482Z
2021-11-14T15:23:16.856536Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2d146aa3aa842d7f5065802556b4f9a2c6e8ef12'}
Linux
GSD-2021-1002460
ALSA: pcm: oss: Limit the period size to 16MB
ALSA: pcm: oss: Limit the period size to 16MB This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.165 by commit 76f19e4cbb548e28547f8c328aa0bfb3a10222d3. For more details please see the references link.
null
2021-12-20T02:13:53.191030Z
2021-12-19T19:38:19.062176Z
null
null
null
null
null
Linux
GSD-2022-1001130
mmc: host: Return an error when ->enable_sdio_irq() ops is missing
mmc: host: Return an error when ->enable_sdio_irq() ops is missing This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit e07547a45e507be37f6ab0e53c850f7720f6875f. For more details please see the references link.
null
2022-04-25T06:25:36.159365Z
2022-04-24T20:47:52.965722Z
null
null
null
null
null
Linux
GSD-2021-1002030
xhci: Fix command ring pointer corruption while aborting a command
xhci: Fix command ring pointer corruption while aborting a command This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.75 by commit dec944bb7079b37968cf69c8a438f91f15c4cc61. For more details please see the references link.
null
2021-12-19T23:49:32.823009Z
2021-11-14T15:16:38.580482Z
null
null
null
null
null
Linux
GSD-2022-1001560
ASoC: mxs: Fix error handling in mxs_sgtl5000_probe
ASoC: mxs: Fix error handling in mxs_sgtl5000_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit d2923b48d99fe663cb93d8b481c93299fcd68656, it was introduced in version v3.5 by commit e968194b45c4e8077dada75c5bae5660b37628fe. For more details please see the references link.
null
2022-04-25T04:39:06.550656Z
2022-04-24T21:23:39.769838Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e968194b45c4e8077dada75c5bae5660b37628fe'}
Linux
GSD-2022-1000721
mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work
mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.13 by commit f3b4b52732bd62341f547fbc0e9c39a68cfbb25c. For more details please see the references link.
null
2022-03-18T02:58:08.651009Z
2022-03-18T00:12:10.406755Z
null
null
null
null
null
Linux
GSD-2022-1001833
bpf, sockmap: Fix double uncharge the mem of sk_msg
bpf, sockmap: Fix double uncharge the mem of sk_msg This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit cb6f141ae705af0101e819065a79e6d029f6e393, it was introduced in version v4.20 by commit 604326b41a6fb9b4a78b6179335decee0365cd8c. For more details please see the references link.
null
2022-04-25T03:12:09.721862Z
2022-04-24T21:46:22.624452Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/604326b41a6fb9b4a78b6179335decee0365cd8c'}
Linux
GSD-2022-1001999
MIPS: fix fortify panic when copying asm exception handlers
MIPS: fix fortify panic when copying asm exception handlers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit fd416c3f5a4c0e85abb443bd31b49e03d52ef07b. For more details please see the references link.
null
2022-04-25T04:46:43.305759Z
2022-04-24T22:02:01.553617Z
null
null
null
null
null
Linux
GSD-2022-1000371
net: dsa: lantiq_gswip: don't use devres for mdiobus
net: dsa: lantiq_gswip: don't use devres for mdiobus This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.101 by commit e177d2e85ebcd3008c4b2abc293f4118e04eedef, it was introduced in version v5.9 by commit ac3a68d56651c3dad2c12c7afce065fe15267f44. For more details please see the references link.
null
2022-03-07T01:37:51.166924Z
2022-02-27T02:57:35.693948Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac3a68d56651c3dad2c12c7afce065fe15267f44'}
Linux
GSD-2021-1001489
udf: Fix NULL pointer dereference in udf_symlink function
udf: Fix NULL pointer dereference in udf_symlink function This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.276 by commit 2f3d9ddd32a28803baa547e6274983b67d5e287c. For more details please see the references link.
null
2021-12-19T23:24:38.034215Z
2021-08-03T02:56:47.171777Z
null
null
null
null
null
Linux
GSD-2022-1002423
ext4: don't BUG if someone dirty pages without asking ext4 first
ext4: don't BUG if someone dirty pages without asking ext4 first This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit d666dfaa571465a19f014534a214c255ea33f301. For more details please see the references link.
null
2022-04-25T05:24:38.101163Z
2022-04-24T22:45:24.185071Z
null
null
null
null
null
Linux
GSD-2021-1001173
media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf()
media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.6 by commit b9a178f189bb6d75293573e181928735f5e3e070, it was introduced in version v2.6.34 by commit dae52d009fc950b5c209260d50fcc000f5becd3c. For more details please see the references link.
null
2021-12-20T00:53:39.055764Z
2021-08-03T01:32:18.356914Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/dae52d009fc950b5c209260d50fcc000f5becd3c'}
Linux
GSD-2022-1002073
ax25: Fix refcount leaks caused by ax25_cb_del()
ax25: Fix refcount leaks caused by ax25_cb_del() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.112 by commit b20a5ab0f5fb175750c6bafd4cf12daccf00c738, it was introduced in version v5.10.112 by commit 5ea00fc60676c0eebfa8560ec461209d638bca9d. For more details please see the references link.
null
2022-04-24T22:07:56.471171Z
2022-04-24T22:07:56.471171Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5ea00fc60676c0eebfa8560ec461209d638bca9d'}
Linux
GSD-2021-1001523
drm/nouveau/debugfs: fix file release memory leak
drm/nouveau/debugfs: fix file release memory leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.251 by commit 9f9d4c88b2edc7924e19c44909cfc3fa4e4d3d43, it was introduced in version v4.5 by commit 6e9fc177399f08446293fec7607913fdbc95e191. For more details please see the references link.
null
2021-12-19T23:51:56.587846Z
2021-10-19T16:22:07.854856Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6e9fc177399f08446293fec7607913fdbc95e191'}
Linux
GSD-2021-1000298
KVM: SVM: Use online_vcpus, not created_vcpus, to iterate over vCPUs
KVM: SVM: Use online_vcpus, not created_vcpus, to iterate over vCPUs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit ba7bf5d6336aa9c0d977b161bfa420c56d46ee40, it was introduced in version v5.11 by commit ad73109ae7ec30d5bfb76be108e304f9f0af4829. For more details please see the references link.
null
2021-12-20T01:26:03.971707Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ad73109ae7ec30d5bfb76be108e304f9f0af4829'}
Linux
GSD-2021-1000762
efi/fdt: fix panic when no valid fdt found
efi/fdt: fix panic when no valid fdt found This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.43 by commit 5148066edbdc89c6fe5bc419c31a5c22e5f83bdb, it was introduced in version v5.10 by commit b91540d52a08b65eb6a2b09132e1bd54fa82754c. For more details please see the references link.
null
2021-12-20T01:35:58.520869Z
2021-06-25T00:03:09.582389Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b91540d52a08b65eb6a2b09132e1bd54fa82754c'}
Linux
GSD-2021-1001870
spi: Fix deadlock when adding SPI controllers on SPI buses
spi: Fix deadlock when adding SPI controllers on SPI buses This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit 722ef19a161ce3fffb3d1b01ce2301c306639bdd. For more details please see the references link.
null
2021-12-20T00:51:53.041549Z
2021-10-28T13:53:12.686834Z
null
null
null
null
null
Linux
GSD-2021-1000332
xprtrdma: Fix cwnd update ordering
xprtrdma: Fix cwnd update ordering This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.38 by commit eddae8be7944096419c2ae29477a45f767d0fcd4, it was introduced in version v5.5 by commit 2ae50ad68cd79224198b525f7bd645c9da98b6ff. For more details please see the references link.
null
2021-12-20T00:21:09.490641Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2ae50ad68cd79224198b525f7bd645c9da98b6ff'}
Linux
GSD-2021-1000627
i2c: i801: Don't generate an interrupt on bus reset
i2c: i801: Don't generate an interrupt on bus reset This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.124 by commit 04cc05e3716ae31b17ecdab7bc55c8170def1b8b, it was introduced in version v3.6 by commit 636752bcb5177a301d0266270661581de8624828. For more details please see the references link.
null
2021-12-19T23:54:48.119575Z
2021-06-04T19:49:57.795763Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/636752bcb5177a301d0266270661581de8624828'}
Linux
GSD-2021-1001935
drm/msm: Fix null pointer dereference on pointer edp
drm/msm: Fix null pointer dereference on pointer edp This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.288 by commit bacac7d26849c8e903ceb7466d9ce8dc3c2797eb, it was introduced in version v4.0 by commit ab5b0107ccf3821a6837b0f2819270d6fa0b278f. For more details please see the references link.
null
2021-12-20T01:20:01.958499Z
2021-11-14T15:12:22.827026Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab5b0107ccf3821a6837b0f2819270d6fa0b278f'}
Linux
GSD-2021-1000277
Drivers: hv: vmbus: Increase wait time for VMbus unload
Drivers: hv: vmbus: Increase wait time for VMbus unload This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 682f486d18c616169e9cecaf193c45f9fbb0d42d, it was introduced in version v5.9 by commit 911e1987efc8f3e6445955fbae7f54b428b92bd3. For more details please see the references link.
null
2021-12-19T23:54:48.344206Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/911e1987efc8f3e6445955fbae7f54b428b92bd3'}
Linux
GSD-2022-1000808
netfilter: nf_tables: unregister flowtable hooks on netns exit
netfilter: nf_tables: unregister flowtable hooks on netns exit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.26 by commit 8ffb8ac3448845f65634889b051bd65e4dee484b, it was introduced in version v5.5 by commit ff4bf2f42a40e7dff28379f085b64df322c70b45. For more details please see the references link.
null
2022-03-18T02:55:26.779899Z
2022-03-18T00:20:22.114634Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ff4bf2f42a40e7dff28379f085b64df322c70b45'}
Linux
GSD-2021-1001036
RDMA/ipoib: Fix warning caused by destroying non-initial netns
RDMA/ipoib: Fix warning caused by destroying non-initial netns This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit 0a672f7d89db2da17ae02733ccc08458be72a6f8, it was introduced in version v5.10 by commit 5ce2dced8e95e76ff7439863a118a053a7fc6f91. For more details please see the references link.
null
2021-12-19T23:47:20.421804Z
2021-06-30T00:35:28.941542Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5ce2dced8e95e76ff7439863a118a053a7fc6f91'}
Linux
GSD-2021-1001466
usb: max-3421: Prevent corruption of freed memory
usb: max-3421: Prevent corruption of freed memory This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.277 by commit fc2a7c2280fa2be8ff9b5af702368fcd49a0acdb, it was introduced in version v3.16 by commit 2d53139f31626bad6f8983d8e519ddde2cbba921. For more details please see the references link.
null
2021-12-20T01:12:21.979690Z
2021-08-03T02:49:27.427232Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2d53139f31626bad6f8983d8e519ddde2cbba921'}
Linux
GSD-2022-1002136
jffs2: fix memory leak in jffs2_scan_medium
jffs2: fix memory leak in jffs2_scan_medium This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 51dbb5e36d59f62e34d462b801c1068248149cfe, it was introduced in version v2.6.15 by commit e631ddba588783edd521c5a89f7b2902772fb691. For more details please see the references link.
null
2022-04-25T04:27:08.838872Z
2022-04-24T22:15:02.829539Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e631ddba588783edd521c5a89f7b2902772fb691'}
Linux
GSD-2021-1002163
net: mscc: ocelot: avoid overflowing the PTP timestamp FIFO
net: mscc: ocelot: avoid overflowing the PTP timestamp FIFO This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 52849bcf0029ccc553be304e4f804938a39112e2, it was introduced in version v5.4 by commit 4e3b0468e6d7f3c38ce52320803769b49ba87930. For more details please see the references link.
null
2021-12-20T00:09:33.464053Z
2021-11-14T15:22:46.489009Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4e3b0468e6d7f3c38ce52320803769b49ba87930'}
Linux
GSD-2022-1001433
gfs2: Fix gfs2_file_buffered_write endless loop workaround
gfs2: Fix gfs2_file_buffered_write endless loop workaround This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 6a5e6d01a6e9e2c9ce86ce540ee5ea22fa5c8304, it was introduced in version v5.16 by commit 554c577cee95bdc1d03d9f457e57dc96eb791845. For more details please see the references link.
null
2022-04-25T02:59:30.884818Z
2022-04-24T21:12:42.178015Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/554c577cee95bdc1d03d9f457e57dc96eb791845'}
Linux
GSD-2021-1002499
x86/xen: Add xenpv_restore_regs_and_return_to_usermode()
x86/xen: Add xenpv_restore_regs_and_return_to_usermode() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.84 by commit 2015ffa3a4c2b058627558ef39b3cce6fe422bf4, it was introduced in version v4.15 by commit 7f2590a110b837af5679d08fc25c6227c5a8c497. For more details please see the references link.
null
2021-12-19T23:35:28.939942Z
2021-12-19T19:39:59.842751Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7f2590a110b837af5679d08fc25c6227c5a8c497'}
Linux
GSD-2021-1002533
scsi: mpt3sas: Fix kernel panic during drive powercycle test
scsi: mpt3sas: Fix kernel panic during drive powercycle test This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.6 by commit 8485649a7655e791a6e4e9f15b4d30fdae937184, it was introduced in version v3.8 by commit f92363d12359498f9a9960511de1a550f0ec41c2. For more details please see the references link.
null
2021-12-20T00:51:09.680218Z
2021-12-19T19:41:27.747073Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f92363d12359498f9a9960511de1a550f0ec41c2'}