ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2022-1001599
PM: domains: Fix sleep-in-atomic bug caused by genpd_debug_remove()
PM: domains: Fix sleep-in-atomic bug caused by genpd_debug_remove() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit d1b6840d8fb9b35193d45d8fe6b4d830bfd20c3c, it was introduced in version v5.11 by commit 718072ceb211833f3c71724f49d733d636067191. For more details please see the references link.
null
2022-04-25T03:23:22.465531Z
2022-04-24T21:27:23.626087Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/718072ceb211833f3c71724f49d733d636067191'}
Linux
GSD-2022-1001063
powerpc/set_memory: Avoid spinlock recursion in change_page_attr()
powerpc/set_memory: Avoid spinlock recursion in change_page_attr() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 6ebe5ca2cbe438a688f2ae238ef5a0b0b5f3468a. For more details please see the references link.
null
2022-04-25T05:09:45.763356Z
2022-04-24T20:43:05.465403Z
null
null
null
null
null
Linux
GSD-2022-1000222
dma-buf: heaps: Fix potential spectre v1 gadget
dma-buf: heaps: Fix potential spectre v1 gadget This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.99 by commit 5d40f1bdad3dd1a177f21a90ad4353c1ed40ba3a, it was introduced in version v5.5 by commit a69b0e855d3fd278ff6f09a23e1edf929538e304. For more details please see the references link.
null
2022-02-20T01:57:47.432813Z
2022-02-18T21:57:15.558172Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a69b0e855d3fd278ff6f09a23e1edf929538e304'}
Linux
GSD-2022-1000388
net: ieee802154: at86rf230: Stop leaking skb's
net: ieee802154: at86rf230: Stop leaking skb's This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.102 by commit 0fd484644c68897c490a3307bfcc8bf767df5a43. For more details please see the references link.
null
2022-03-07T01:34:14.690205Z
2022-02-27T03:00:12.789528Z
null
null
null
null
null
Linux
GSD-2022-1001960
net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link
net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.112 by commit 08d5e3e954537931c8da7428034808d202e98299, it was introduced in version v4.8 by commit fb3bbdb859891e6bc27fd1afb3a07319f82c2ee4. For more details please see the references link.
null
2022-04-25T03:10:55.065822Z
2022-04-24T21:58:28.767750Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb3bbdb859891e6bc27fd1afb3a07319f82c2ee4'}
Linux
GSD-2022-1000672
net/smc: Forward wakeup to smc socket waitqueue after fallback
net/smc: Forward wakeup to smc socket waitqueue after fallback This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.8 by commit 504078fbe9dd570d685361b57784a6050bc40aaa, it was introduced in version v5.16 by commit 2153bd1e3d3dbf6a3403572084ef6ed31c53c5f0. For more details please see the references link.
null
2022-03-07T01:51:32.418120Z
2022-02-27T03:39:19.260435Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2153bd1e3d3dbf6a3403572084ef6ed31c53c5f0'}
Linux
GSD-2022-1000367
KVM: eventfd: Fix false positive RCU usage warning
KVM: eventfd: Fix false positive RCU usage warning This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.101 by commit dc129275a7f7076f2773d57061bca45af14396dd. For more details please see the references link.
null
2022-03-07T01:39:53.709685Z
2022-02-27T02:57:08.840242Z
null
null
null
null
null
Linux
GSD-2021-1000918
net/mlx5e: Fix page reclaim for dead peer hairpin
net/mlx5e: Fix page reclaim for dead peer hairpin This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.128 by commit 4b16118665e94c90a3e84a5190486fd0e4eedd74, it was introduced in version v4.19 by commit 4d8fcf216c90bc25e34ae2200aa8985ee3158898. For more details please see the references link.
null
2021-12-19T23:34:03.772212Z
2021-06-30T00:24:27.239968Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4d8fcf216c90bc25e34ae2200aa8985ee3158898'}
Linux
GSD-2022-1001825
ax25: Fix refcount leaks caused by ax25_cb_del()
ax25: Fix refcount leaks caused by ax25_cb_del() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.35 by commit 452ae92b99062d2f6a34324eaf705a3b7eac9f8b, it was introduced in version v5.15.35 by commit 9af0fd5c4453a44c692be0cbb3724859b75d739b. For more details please see the references link.
null
2022-04-24T21:45:31.199204Z
2022-04-24T21:45:31.199204Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9af0fd5c4453a44c692be0cbb3724859b75d739b'}
Linux
GSD-2022-1000737
spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op()
spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.12 by commit b9dd08cbebe0c593c49bf86d2012a431494e54cb, it was introduced in version v5.2 by commit 67dca5e580f1e93a66177389981541cac208c817. For more details please see the references link.
null
2022-03-18T03:00:49.321723Z
2022-03-18T00:14:05.164973Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/67dca5e580f1e93a66177389981541cac208c817'}
Linux
GSD-2022-1001576
soc: qcom: rpmpd: Check for null return of devm_kcalloc
soc: qcom: rpmpd: Check for null return of devm_kcalloc This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 84b89fa877ad576e9ee8130f412cfd592f274508, it was introduced in version v5.1 by commit bbe3a66c3f5a65fb3d702351bac2a6033944d389. For more details please see the references link.
null
2022-04-25T06:09:10.305607Z
2022-04-24T21:25:28.590216Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bbe3a66c3f5a65fb3d702351bac2a6033944d389'}
Linux
GSD-2021-1002026
comedi: vmk80xx: fix transfer-buffer overflows
comedi: vmk80xx: fix transfer-buffer overflows This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.159 by commit 199acd8c110e3ae62833c24f632b0bb1c9f012a9, it was introduced in version v2.6.31 by commit 985cafccbf9b7f862aa1c5ee566801e18b5161fb. For more details please see the references link.
null
2021-12-20T01:25:48.874045Z
2021-11-14T15:16:28.930292Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/985cafccbf9b7f862aa1c5ee566801e18b5161fb'}
Linux
GSD-2022-1001126
scsi: qla2xxx: Implement ref count for SRB
scsi: qla2xxx: Implement ref count for SRB This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit ceda7f794f3dfe272491e93e3e93049f8be5f07b. For more details please see the references link.
null
2022-04-25T06:56:40.266031Z
2022-04-24T20:47:39.494741Z
null
null
null
null
null
Linux
GSD-2021-1002476
net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk()
net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.83 by commit c94cbd262b6aa3b54d73a1ed1f9c0d19df57f4ff, it was introduced in version v4.18 by commit cb9d43f6775457cac75544bc4197f26ac2b6f294. For more details please see the references link.
null
2021-12-20T01:04:30.522195Z
2021-12-19T19:39:03.870401Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cb9d43f6775457cac75544bc4197f26ac2b6f294'}
Linux
GSD-2021-1000365
powerpc: Fix HAVE_HARDLOCKUP_DETECTOR_ARCH build configuration
powerpc: Fix HAVE_HARDLOCKUP_DETECTOR_ARCH build configuration This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 19c990c9fad3eaafbf3d7dbc9c8f62679ab63726, it was introduced in version v4.13 by commit 2104180a53698df5aec35aed5f840a26ade0551d. For more details please see the references link.
null
2021-12-19T23:36:04.878943Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2104180a53698df5aec35aed5f840a26ade0551d'}
Linux
GSD-2021-1002358
net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound
net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.294 by commit ec5bd0aef1cec96830d0c7e06d3597d9e786cc98. For more details please see the references link.
null
2021-12-19T23:49:29.322108Z
2021-12-19T19:33:49.779528Z
null
null
null
null
null
Linux
GSD-2022-1001608
ALSA: pcm: Fix potential AB/BA lock with buffer_mutex and mmap_lock
ALSA: pcm: Fix potential AB/BA lock with buffer_mutex and mmap_lock This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit abedf0d08c79d76da0d6fa0d5dbbc98871dcbc2e, it was introduced in version v5.16.18 by commit 4d1b0ace2d56dc27cc4921eda7fae57f77f03eb5. For more details please see the references link.
null
2022-04-25T06:32:58.258215Z
2022-04-24T21:27:57.564834Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4d1b0ace2d56dc27cc4921eda7fae57f77f03eb5'}
Linux
GSD-2021-1000735
btrfs: fixup error handling in fixup_inode_link_counts
btrfs: fixup error handling in fixup_inode_link_counts This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.236 by commit 0c7086ee625e0a12474fc63824a4a8dfab663838, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T01:07:50.937648Z
2021-06-25T00:00:01.764009Z
null
null
null
null
null
Linux
GSD-2021-1002708
btrfs: fix memory leak in __add_inode_ref()
btrfs: fix memory leak in __add_inode_ref() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.88 by commit 005d9292b5b2e71a009f911bd85d755009b37242, it was introduced in version v5.5 by commit d3316c8233bb05e0dd855d30aac347bb8ad76ee4. For more details please see the references link.
null
2022-01-11T05:47:15.504358Z
2021-12-27T05:38:18.437987Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d3316c8233bb05e0dd855d30aac347bb8ad76ee4'}
Linux
GSD-2021-1001827
net: encx24j600: check error in devm_regmap_init_encx24j600
net: encx24j600: check error in devm_regmap_init_encx24j600 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.155 by commit 4c2eb80fc90b05559ce6ed1b8dfb2348420b5644, it was introduced in version v4.4 by commit 04fbfce7a222327b97ca165294ef19f0faa45960. For more details please see the references link.
null
2021-12-20T00:55:44.799116Z
2021-10-28T13:50:55.877747Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/04fbfce7a222327b97ca165294ef19f0faa45960'}
Linux
GSD-2022-1001258
media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED
media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit f66e6fd1488d26229f11d86616de1b658c70fa8a, it was introduced in version v3.7 by commit 8ac456495a33d9466076fea94594181ceefb76d9. For more details please see the references link.
null
2022-04-25T04:18:27.231148Z
2022-04-24T20:58:45.882911Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ac456495a33d9466076fea94594181ceefb76d9'}
Linux
GSD-2021-1001574
mcb: fix error handling in mcb_alloc_bus()
mcb: fix error handling in mcb_alloc_bus() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.209 by commit 66f74ba9be9daf9c47fface6af3677f602774f6b, it was introduced in version v4.7 by commit 5d9e2ab9fea4cdf0a2522f5cbed2e7fbb220d757. For more details please see the references link.
null
2021-12-19T22:19:42.642561Z
2021-10-19T16:24:26.447252Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5d9e2ab9fea4cdf0a2522f5cbed2e7fbb220d757'}
Linux
GSD-2022-1002024
ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl
ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 432b057f8e847ae5a2306515606f8d2defaca178, it was introduced in version v4.8 by commit 714fb87e8bc05ff78255afc0dca981e8c5242785. For more details please see the references link.
null
2022-04-25T03:49:51.441773Z
2022-04-24T22:03:49.262311Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/714fb87e8bc05ff78255afc0dca981e8c5242785'}
Linux
GSD-2022-1000019
usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.
usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.261 by commit 52500239e3f2d6fc77b6f58632a9fb98fe74ac09, it was introduced in version v4.0 by commit 5e33f6fdf735cda1d4580fe6f1878da05718fe73. For more details please see the references link.
null
2022-01-11T05:53:22.544286Z
2022-01-10T19:50:25.757831Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5e33f6fdf735cda1d4580fe6f1878da05718fe73'}
Linux
GSD-2021-1001124
dmaengine: mediatek: free the proper desc in desc_free handler
dmaengine: mediatek: free the proper desc in desc_free handler This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.47 by commit 63fa5b2d4b55ebf4d12e7b4d536ae3e63117cd1a. For more details please see the references link.
null
2021-12-19T23:21:04.255866Z
2021-07-08T01:58:03.848796Z
null
null
null
null
null
Linux
GSD-2022-1002474
scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one()
scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit ce430cfad6a5385d5b7f7c1dc3fa50f10abfd41b, it was introduced in version v2.6.23 by commit 45804fbb00eea27bdf4d62751681228a9e2844e9. For more details please see the references link.
null
2022-04-25T06:10:20.545213Z
2022-04-24T22:52:21.181006Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/45804fbb00eea27bdf4d62751681228a9e2844e9'}
Linux
GSD-2022-1000449
parisc: Fix data TLB miss in sba_unmap_sg
parisc: Fix data TLB miss in sba_unmap_sg This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit 8c8e949ae81e7f5ab58f9f9f8e9b573b93173dd2. For more details please see the references link.
null
2022-03-07T01:41:05.140050Z
2022-02-27T03:08:35.405911Z
null
null
null
null
null
Linux
GSD-2022-1002161
net: usb: aqc111: Fix out-of-bounds accesses in RX fixup
net: usb: aqc111: Fix out-of-bounds accesses in RX fixup This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.190 by commit 404998a137bcb8a926f7c949030afbe285472593. For more details please see the references link.
null
2022-04-25T04:26:01.222975Z
2022-04-24T22:17:11.306067Z
null
null
null
null
null
Linux
GSD-2021-1001431
atm: nicstar: Fix possible use-after-free in nicstar_cleanup()
atm: nicstar: Fix possible use-after-free in nicstar_cleanup() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.240 by commit c471569632654e57c83512e0fc1ba0dbb4544ad6. For more details please see the references link.
null
2021-12-19T23:17:12.533074Z
2021-08-03T02:38:33.329835Z
null
null
null
null
null
Linux
GSD-2021-1001061
netfilter: synproxy: Fix out of bounds when parsing TCP options
netfilter: synproxy: Fix out of bounds when parsing TCP options This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit f648089337cb8ed40b2bb96e244f72b9d97dc96b, it was introduced in version v3.12 by commit 48b1de4c110a7afa4b85862f6c75af817db26fad. For more details please see the references link.
null
2021-12-19T23:02:43.502549Z
2021-06-30T00:37:01.905605Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/48b1de4c110a7afa4b85862f6c75af817db26fad'}
Linux
GSD-2021-1000220
PCI: endpoint: Fix NULL pointer dereference for ->get_features()
PCI: endpoint: Fix NULL pointer dereference for ->get_features() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit 0169d4f0bee44fdfef908c13ed21fcb326c38695, it was introduced in version v5.1 by commit 2c04c5b8eef797dca99699cfb55ff42dd3c12c23. For more details please see the references link.
null
2021-12-20T00:19:57.317102Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c04c5b8eef797dca99699cfb55ff42dd3c12c23'}
Linux
GSD-2021-1000670
btrfs: do not BUG_ON in link_to_fixup_dir
btrfs: do not BUG_ON in link_to_fixup_dir This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.235 by commit 0eaf383c6a4a83c09f60fd07a1bea9f1a9181611, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T22:14:54.301336Z
2021-06-04T19:58:51.788660Z
null
null
null
null
null
Linux
GSD-2021-1001962
net: mdiobus: Fix memory leak in __mdiobus_register
net: mdiobus: Fix memory leak in __mdiobus_register This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.253 by commit 4ec0f9abc512cc02fb04daa89ccf6697e80ab417. For more details please see the references link.
null
2021-12-19T23:11:18.555079Z
2021-11-14T15:13:35.963497Z
null
null
null
null
null
Linux
GSD-2022-1001937
mac80211: fix potential double free on mesh join
mac80211: fix potential double free on mesh join This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.32 by commit 12e407a8ef17623823fd0c066fbd7f103953d28d, it was introduced in version v5.8 by commit 6a01afcf8468d3ca2bd8bbb27503f60dcf643b20. For more details please see the references link.
null
2022-04-25T04:59:22.006406Z
2022-04-24T21:56:25.545896Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6a01afcf8468d3ca2bd8bbb27503f60dcf643b20'}
Linux
GSD-2022-1000625
KVM: arm64: pkvm: Use the mm_ops indirection for cache maintenance
KVM: arm64: pkvm: Use the mm_ops indirection for cache maintenance This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit 14c9086ea246b84e0d35e8a0b7f706202bd72f0a, it was introduced in version v5.14 by commit 25aa28691bb960a76f0cffd8862144a29487f6ff. For more details please see the references link.
null
2022-03-07T01:35:24.592070Z
2022-02-27T03:32:42.562268Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/25aa28691bb960a76f0cffd8862144a29487f6ff'}
Linux
GSD-2021-1001348
dm btree remove: assign new_root only when removal succeeds
dm btree remove: assign new_root only when removal succeeds This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.133 by commit 964d57d1962d7e68f0f578f05d9ae4a104d74851. For more details please see the references link.
null
2021-12-20T00:48:27.226588Z
2021-08-03T02:14:11.382937Z
null
null
null
null
null
Linux
GSD-2022-1000275
net: sched: fix use-after-free in tc_new_tfilter()
net: sched: fix use-after-free in tc_new_tfilter() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.20 by commit f36cacd6c933183c1a8827d5987cf2cfc0a44c76, it was introduced in version v5.1 by commit 470502de5bdb1ed0def643a4458593a40b8f6b66. For more details please see the references link.
null
2022-02-19T04:03:30.325096Z
2022-02-18T22:05:03.723568Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/470502de5bdb1ed0def643a4458593a40b8f6b66'}
Linux
GSD-2022-1002248
ext2: correct max file size computing
ext2: correct max file size computing This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit cc16d0bc1c695645a5c1426e81d33931cc32f558, it was introduced in version v5.1 by commit 1c2d14212b15a60300a2d4f6364753e87394c521. For more details please see the references link.
null
2022-04-25T06:48:53.724202Z
2022-04-24T22:25:55.092610Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c2d14212b15a60300a2d4f6364753e87394c521'}
Linux
GSD-2021-1002837
mm/hwpoison: clear MF_COUNT_INCREASED before retrying get_any_page()
mm/hwpoison: clear MF_COUNT_INCREASED before retrying get_any_page() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.12 by commit c691e7575eff76e563b0199c23ec46bd454f43e3, it was introduced in version v5.10 by commit b94e02822debdf0cc473556aad7dcc859f216653. For more details please see the references link.
null
2022-01-11T05:58:08.802090Z
2021-12-30T02:45:41.001489Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b94e02822debdf0cc473556aad7dcc859f216653'}
Linux
GSD-2021-1001718
net: hns3: do not allow call hns3_nic_net_open repeatedly
net: hns3: do not allow call hns3_nic_net_open repeatedly This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit 3dac38bdce7932901b9f0b71c62331852c809e61, it was introduced in version v5.0 by commit e888402789b9db5de4fcda361331d66dbf0cd9fd. For more details please see the references link.
null
2021-12-19T22:43:40.170976Z
2021-10-19T16:33:21.811045Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e888402789b9db5de4fcda361331d66dbf0cd9fd'}
Linux
GSD-2022-1001034
NFSv4.2: fix reference count leaks in _nfs42_proc_copy_notify()
NFSv4.2: fix reference count leaks in _nfs42_proc_copy_notify() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit f46f632f9cfae4b2e3635fa58840a8ec584c42e3. For more details please see the references link.
null
2022-04-25T03:15:38.155817Z
2022-04-24T20:41:29.379858Z
null
null
null
null
null
Linux
GSD-2021-1002564
mt76: mt7915: fix NULL pointer dereference in mt7915_get_phy_mode
mt76: mt7915: fix NULL pointer dereference in mt7915_get_phy_mode This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.7 by commit 14b03b8cebdf18ff13c39d58501b625411314de2, it was introduced in version v5.8 by commit 37f4ca907c462d7c8a1ac9e7e3473681b5f893dd. For more details please see the references link.
null
2021-12-20T01:18:09.919082Z
2021-12-19T19:42:57.794546Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/37f4ca907c462d7c8a1ac9e7e3473681b5f893dd'}
Linux
GSD-2021-1000559
NFS: Fix an Oopsable condition in __nfs_pageio_add_request()
NFS: Fix an Oopsable condition in __nfs_pageio_add_request() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit 15ac6f14787649e8ebd75c142e2c5d2a243c8490, it was introduced in version v4.0 by commit a7d42ddb3099727f58366fa006f850a219cce6c8. For more details please see the references link.
null
2021-12-20T01:39:44.846773Z
2021-06-04T19:38:46.016765Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a7d42ddb3099727f58366fa006f850a219cce6c8'}
Linux
GSD-2022-1001464
media: imx-jpeg: Prevent decoding NV12M jpegs into single-planar buffers
media: imx-jpeg: Prevent decoding NV12M jpegs into single-planar buffers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 8d075ede7d24f19dc817c5bd517a53f0524f9031. For more details please see the references link.
null
2022-04-25T06:11:51.107656Z
2022-04-24T21:15:06.698890Z
null
null
null
null
null
Linux
GSD-2021-1002134
octeontx2-af: Fix possible null pointer dereference.
octeontx2-af: Fix possible null pointer dereference. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.16 by commit f1e3cd1cc80204fd02b9e9843450925a2af90dc0, it was introduced in version v5.5 by commit 8756828a81485f7b28b588adbf0bac9bf6fc6651. For more details please see the references link.
null
2021-12-19T23:11:19.372238Z
2021-11-14T15:21:26.967642Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8756828a81485f7b28b588adbf0bac9bf6fc6651'}
Linux
GSD-2021-1000109
net/sched: sch_frag: fix stack OOB read while fragmenting IPv4 packets
net/sched: sch_frag: fix stack OOB read while fragmenting IPv4 packets This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.20 by commit 018bb8da5b5888e19585f9b802f036afe643fcef, it was introduced in version v5.11 by commit c129412f74e99b609f0a8e95fc3915af1fd40f34. For more details please see the references link.
null
2021-12-20T00:43:55.546713Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c129412f74e99b609f0a8e95fc3915af1fd40f34'}
Linux
GSD-2021-1002421
xhci: Fix commad ring abort, write all 64 bits to CRCR register.
xhci: Fix commad ring abort, write all 64 bits to CRCR register. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.220 by commit abba418a9c73dcffecbe19ef93c7ae5d2e8e38d3, it was introduced in version v4.19.213 by commit 62c182b5e763e5f4062e72678e72ce3e02dd4d1b. For more details please see the references link.
null
2021-12-19T23:10:32.198278Z
2021-12-19T19:36:37.623573Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/62c182b5e763e5f4062e72678e72ce3e02dd4d1b'}
Linux
GSD-2022-1001171
net/x25: Fix null-ptr-deref caused by x25_disconnect
net/x25: Fix null-ptr-deref caused by x25_disconnect This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 671529db75e6be777bb1c76aa07c2bdd2992be6d, it was introduced in version v5.7 by commit 4becb7ee5b3d2829ed7b9261a245a77d5b7de902. For more details please see the references link.
null
2022-04-25T04:21:24.905682Z
2022-04-24T20:50:20.175873Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4becb7ee5b3d2829ed7b9261a245a77d5b7de902'}
Linux
GSD-2021-1002071
media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()
media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.78 by commit d7fc85f6104259541ec136199d3bf7c8a736613d. For more details please see the references link.
null
2021-12-19T22:57:31.699778Z
2021-11-14T15:18:34.093552Z
null
null
null
null
null
Linux
GSD-2022-1001521
RDMA/mlx5: Fix memory leak in error flow for subscribe event routine
RDMA/mlx5: Fix memory leak in error flow for subscribe event routine This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit d66498507801fd9a20307a15a0814a0a016c3cde, it was introduced in version v5.3 by commit 7597385371425febdaa8c6a1da3625d4ffff16f5. For more details please see the references link.
null
2022-04-25T04:03:58.101432Z
2022-04-24T21:19:47.740473Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7597385371425febdaa8c6a1da3625d4ffff16f5'}
Linux
GSD-2022-1001872
ASoC: mediatek: mt8192-mt6359: Fix error handling in mt8192_mt6359_dev_probe
ASoC: mediatek: mt8192-mt6359: Fix error handling in mt8192_mt6359_dev_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 87e04a89c31e792eef62bcba6ebb77fd323d28a1, it was introduced in version v5.15.17 by commit 286c6f7b28fab19d649c2e1f3bc18fdecdbadfe5. For more details please see the references link.
null
2022-04-25T05:55:42.681753Z
2022-04-24T21:50:21.836885Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/286c6f7b28fab19d649c2e1f3bc18fdecdbadfe5'}
Linux
GSD-2022-1000760
btrfs: do not start relocation until in progress drops are done
btrfs: do not start relocation until in progress drops are done This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.27 by commit 6599d5e8bd758d897fd2ef4dc388ae50278b1f7e. For more details please see the references link.
null
2022-03-18T02:57:40.833725Z
2022-03-18T00:15:49.093064Z
null
null
null
null
null
Linux
GSD-2022-1000330
nvme-rdma: fix possible use-after-free in transport error_recovery work
nvme-rdma: fix possible use-after-free in transport error_recovery work This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.231 by commit 5593f72d1922403c11749532e3a0aa4cf61414e9. For more details please see the references link.
null
2022-03-07T02:33:56.278138Z
2022-02-27T02:52:14.158182Z
null
null
null
null
null
Linux
GSD-2022-1000347
vsock: remove vsock from connected table when connect is interrupted by a signal
vsock: remove vsock from connected table when connect is interrupted by a signal This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.181 by commit 5f326fe2aef411a6575628f92bd861463ea91df7, it was introduced in version v3.9 by commit d021c344051af91f42c5ba9fdedc176740cbd238. For more details please see the references link.
null
2022-03-07T01:35:07.722698Z
2022-02-27T02:54:10.009821Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d021c344051af91f42c5ba9fdedc176740cbd238'}
Linux
GSD-2021-1000938
isdn: mISDN: netjet: Fix crash in nj_probe:
isdn: mISDN: netjet: Fix crash in nj_probe: This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.44 by commit 143fc7220961220eecc04669e5909af8847bf8c8. For more details please see the references link.
null
2021-12-20T00:53:02.138059Z
2021-06-30T00:25:44.280046Z
null
null
null
null
null
Linux
GSD-2022-1001805
xen: fix is_xen_pmu()
xen: fix is_xen_pmu() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit af884b276b08e2b7e74c2b9208df35f36fa6a54c, it was introduced in version v4.3 by commit bf6dfb154d935725c9a2005033ca33017b9df439. For more details please see the references link.
null
2022-04-25T05:10:58.534552Z
2022-04-24T21:43:24.579280Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf6dfb154d935725c9a2005033ca33017b9df439'}
Linux
GSD-2022-1000717
cifs: fix double free race when mount fails in cifs_get_root()
cifs: fix double free race when mount fails in cifs_get_root() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.13 by commit 563431c1f3c8f2230e4a9c445fa23758742bc4f0. For more details please see the references link.
null
2022-03-18T02:57:22.483005Z
2022-03-18T00:12:00.512181Z
null
null
null
null
null
Linux
GSD-2021-1000892
drm: Fix use-after-free read in drm_getunique()
drm: Fix use-after-free read in drm_getunique() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.126 by commit b246b4c70c1250e7814f409b243000f9c0bf79a3. For more details please see the references link.
null
2021-12-19T22:13:14.420018Z
2021-06-30T00:04:51.535074Z
null
null
null
null
null
Linux
GSD-2021-1001780
ocfs2: fix data corruption after conversion from inline format
ocfs2: fix data corruption after conversion from inline format This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.288 by commit 560edd14de2bf9dbc0129681eeb4d5ef87cc105f, it was introduced in version v4.9.242 by commit acef5107e2eacb08a16ad5db60320d65bd26a6c0. For more details please see the references link.
null
2021-12-19T23:23:14.209861Z
2021-10-28T13:48:31.903459Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/acef5107e2eacb08a16ad5db60320d65bd26a6c0'}
Linux
GSD-2022-1001556
udmabuf: validate ubuf->pagecount
udmabuf: validate ubuf->pagecount This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit a3728d32fc61eb0fe283cb8ff60b2c8f751e2202, it was introduced in version v4.20 by commit fbb0de795078190a9834b3409e4b009cfb18a6d4. For more details please see the references link.
null
2022-04-25T05:23:56.489596Z
2022-04-24T21:23:15.451946Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fbb0de795078190a9834b3409e4b009cfb18a6d4'}
Linux
GSD-2021-1002006
ocfs2: mount fails with buffer overflow in strlen
ocfs2: mount fails with buffer overflow in strlen This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.156 by commit d3a83576378b4c904f711598dde2c5e881c4295c. For more details please see the references link.
null
2021-12-20T00:56:07.980446Z
2021-11-14T15:15:38.645356Z
null
null
null
null
null
Linux
GSD-2022-1001106
rxrpc: fix some null-ptr-deref bugs in server_key.c
rxrpc: fix some null-ptr-deref bugs in server_key.c This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 4e1f670e1b440dc783dbeb881d575bca31474f73, it was introduced in version v5.11 by commit 12da59fcab5a05d01773e7cb413b8b8f3bb4e334. For more details please see the references link.
null
2022-04-25T06:25:00.999838Z
2022-04-24T20:45:50.005642Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/12da59fcab5a05d01773e7cb413b8b8f3bb4e334'}
Linux
GSD-2021-1000191
drm/i915: Fix crash in auto_retire
drm/i915: Fix crash in auto_retire This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit f7520970d5353cb1fa4d9089a1b23669c5da97fe, it was introduced in version v5.8 by commit 229007e02d697b0662f85378aae53531b0dfea05. For more details please see the references link.
null
2021-12-20T00:44:36.897377Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/229007e02d697b0662f85378aae53531b0dfea05'}
Linux
GSD-2021-1002456
nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done
nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.165 by commit 48fcd08fdbe05e35b650a252ec2a2d96057a1c7a, it was introduced in version v3.12 by commit ac22ac466a659f1b2e02a2e2ee23fc5c42da2c95. For more details please see the references link.
null
2021-12-20T00:20:28.366499Z
2021-12-19T19:38:09.397415Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac22ac466a659f1b2e02a2e2ee23fc5c42da2c95'}
Linux
GSD-2021-1002143
comedi: vmk80xx: fix bulk-buffer overflow
comedi: vmk80xx: fix bulk-buffer overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.18 by commit 7b0e356189327287d0eb98ec081bd6dd97068cd3, it was introduced in version v2.6.31 by commit 985cafccbf9b7f862aa1c5ee566801e18b5161fb. For more details please see the references link.
null
2021-12-20T00:13:58.671182Z
2021-11-14T15:21:48.922526Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/985cafccbf9b7f862aa1c5ee566801e18b5161fb'}
Linux
GSD-2022-1001413
drm/amdkfd: svm range restore work deadlock when process exit
drm/amdkfd: svm range restore work deadlock when process exit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit a6be83086e91891081e0589e4b4645bf4643e897. For more details please see the references link.
null
2022-04-25T06:00:25.890381Z
2022-04-24T21:11:06.603212Z
null
null
null
null
null
Linux
GSD-2021-1000484
mtd: require write permissions for locking and badblock ioctls
mtd: require write permissions for locking and badblock ioctls This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.269 by commit 9625b00cac6630479c0ff4b9fafa88bee636e1f0, it was introduced in version v4.9.233 by commit 583d42400532fbd6228b0254d7c732b771e4750d. For more details please see the references link.
null
2021-12-20T00:36:52.737258Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/583d42400532fbd6228b0254d7c732b771e4750d'}
Linux
GSD-2021-1002513
ALSA: pcm: oss: Limit the period size to 16MB
ALSA: pcm: oss: Limit the period size to 16MB This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.85 by commit ad45babf7886e7a212ee1d5eda9ef49f696db43c. For more details please see the references link.
null
2021-12-19T23:17:05.201226Z
2021-12-19T19:40:39.758222Z
null
null
null
null
null
Linux
GSD-2022-1001043
mt76: fix monitor mode crash with sdio driver
mt76: fix monitor mode crash with sdio driver This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 95e2af01669c7a3cb7a933cefa06361f9db15059. For more details please see the references link.
null
2022-04-25T06:55:14.248169Z
2022-04-24T20:41:55.311004Z
null
null
null
null
null
Linux
GSD-2021-1002840
mm, hwpoison: fix condition in free hugetlb page path
mm, hwpoison: fix condition in free hugetlb page path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.12 by commit 7a77e22fde6349d276f862a521d190ad932e711d. For more details please see the references link.
null
2022-01-11T06:02:03.009758Z
2021-12-30T02:45:47.888657Z
null
null
null
null
null
Linux
GSD-2022-1000202
yam: fix a memory leak in yam_siocdevprivate()
yam: fix a memory leak in yam_siocdevprivate() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.96 by commit 729e54636b3ebefb77796702a5b1f1ed5586895e, it was introduced in version v4.19 by commit 0781168e23a2fc8dceb989f11fc5b39b3ccacc35. For more details please see the references link.
null
2022-02-20T02:11:47.452769Z
2022-02-18T21:55:00.252490Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0781168e23a2fc8dceb989f11fc5b39b3ccacc35'}
Linux
GSD-2021-1001295
powerpc/mm: Fix lockup on kernel exec fault
powerpc/mm: Fix lockup on kernel exec fault This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.51 by commit d2e52d4664097a6c1f591d869ec594bd7a0d4925, it was introduced in version v4.14 by commit d3ca587404b36943b02df87406054ce73cc49500. For more details please see the references link.
null
2021-12-20T01:14:39.569805Z
2021-08-03T02:00:01.542746Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d3ca587404b36943b02df87406054ce73cc49500'}
Linux
GSD-2022-1002395
btrfs: fix qgroup reserve overflow the qgroup limit
btrfs: fix qgroup reserve overflow the qgroup limit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 0355387ea5b02d353c9415613fab908fac5c52a6. For more details please see the references link.
null
2022-04-25T06:02:33.385434Z
2022-04-24T22:42:53.615605Z
null
null
null
null
null
Linux
GSD-2022-1001940
uaccess: fix integer overflow on access_ok()
uaccess: fix integer overflow on access_ok() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.32 by commit e65d28d4e9bf90a35ba79c06661a572a38391dec, it was introduced in version v4.20 by commit da551281947cb2c0ab6e0045529a706af5d79584. For more details please see the references link.
null
2022-04-25T06:32:38.250679Z
2022-04-24T21:56:37.682700Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/da551281947cb2c0ab6e0045529a706af5d79584'}
Linux
GSD-2022-1000652
ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx()
ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.8 by commit ef6cd9eeb38062a145802b7b56be7ae1090e165e. For more details please see the references link.
null
2022-03-07T03:20:32.041909Z
2022-02-27T03:36:24.484653Z
null
null
null
null
null
Linux
GSD-2022-1001690
net: ipv4: fix route with nexthop object delete warning
net: ipv4: fix route with nexthop object delete warning This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 907c97986d6fa77318d17659dd76c94b65dd27c5, it was introduced in version v5.3 by commit 4c7e8084fd467ddb2b0e6c6011f9c1064afb7e56. For more details please see the references link.
null
2022-04-25T06:42:13.250480Z
2022-04-24T21:35:34.744441Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4c7e8084fd467ddb2b0e6c6011f9c1064afb7e56'}
Linux
GSD-2022-1000982
net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link
net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.4 by commit 6c020f05253df04c3480b586fe188a3582740049, it was introduced in version v4.8 by commit fb3bbdb859891e6bc27fd1afb3a07319f82c2ee4. For more details please see the references link.
null
2022-04-25T06:07:47.260311Z
2022-04-24T20:37:03.089248Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb3bbdb859891e6bc27fd1afb3a07319f82c2ee4'}
Linux
GSD-2021-1000607
USB: usbfs: Don't WARN about excessively large memory allocations
USB: usbfs: Don't WARN about excessively large memory allocations This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit 8d83f109e920d2776991fa142bb904d985dca2ed, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T01:11:25.837858Z
2021-06-04T19:46:36.385195Z
null
null
null
null
null
Linux
GSD-2021-1001915
NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()
NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.290 by commit 429054ec51e648d241a7e0b465cf44f6633334c5, it was introduced in version v3.13 by commit 1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8. For more details please see the references link.
null
2021-12-20T01:09:52.802638Z
2021-11-14T15:11:32.583364Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8'}
Linux
GSD-2021-1000257
powerpc/64s: Fix pte update for kernel memory on radix
powerpc/64s: Fix pte update for kernel memory on radix This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit e40c52ee67b155ad59f59e73ea136d02685f0e0d, it was introduced in version v4.18 by commit f1cb8f9beba8699dd1b4518418191499e53f7b17. For more details please see the references link.
null
2021-12-19T23:07:42.430466Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f1cb8f9beba8699dd1b4518418191499e53f7b17'}
Linux
GSD-2021-1002790
hamradio: improve the incomplete fix to avoid NPD
hamradio: improve the incomplete fix to avoid NPD This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.223 by commit b68f41c6320b2b7fbb54a95f07a69f3dc7e56c59. For more details please see the references link.
null
2022-01-11T05:53:54.114067Z
2021-12-30T02:43:31.857780Z
null
null
null
null
null
Linux
GSD-2022-1000828
net/smc: fix connection leak
net/smc: fix connection leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.104 by commit 2e8d465b83db307f04ad265848f8ab3f78f6918f, it was introduced in version v5.3 by commit 39f41f367b08650e9aa314e3a13fb6dda1e9eec7. For more details please see the references link.
null
2022-03-18T02:54:38.876970Z
2022-03-18T00:22:00.140659Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/39f41f367b08650e9aa314e3a13fb6dda1e9eec7'}
Linux
GSD-2022-1000081
USB: core: Fix hang in usb_kill_urb by adding memory barriers
USB: core: Fix hang in usb_kill_urb by adding memory barriers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.300 by commit b50f5ca60475710bbc9a3af32fbfc17b1e69c2f0. For more details please see the references link.
null
2022-02-19T10:26:13.320151Z
2022-02-18T21:33:04.453755Z
null
null
null
null
null
Linux
GSD-2021-1001016
dm verity: fix require_signatures module_param permissions
dm verity: fix require_signatures module_param permissions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit fb429fad145a987056ac315b2c859197c3daa890. For more details please see the references link.
null
2021-12-20T00:29:02.324281Z
2021-06-30T00:34:06.811315Z
null
null
null
null
null
Linux
GSD-2021-1001446
virtio-blk: Fix memory leak among suspend/resume procedure
virtio-blk: Fix memory leak among suspend/resume procedure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.276 by commit 102d6bc6475ab09bab579c18704e6cf8d898e93c. For more details please see the references link.
null
2021-12-19T22:33:50.439266Z
2021-08-03T02:44:07.087036Z
null
null
null
null
null
Linux
GSD-2022-1002116
crypto: ccree - Fix use after free in cc_cipher_exit()
crypto: ccree - Fix use after free in cc_cipher_exit() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit c93017c8d5ebf55a4e453ac7c84cc84cf92ab570, it was introduced in version v4.17 by commit 63ee04c8b491ee148489347e7da9fbfd982ca2bb. For more details please see the references link.
null
2022-04-25T06:26:55.536795Z
2022-04-24T22:13:13.255842Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63ee04c8b491ee148489347e7da9fbfd982ca2bb'}
Linux
GSD-2022-1002403
drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire()
drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit dd3a74d9e1b7ce143f0aec04da8691a764392f67, it was introduced in version v4.13 by commit 71c37505e7eaa01fa259debad1a71a7ae061039d. For more details please see the references link.
null
2022-04-25T05:48:25.787102Z
2022-04-24T22:43:48.301281Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/71c37505e7eaa01fa259debad1a71a7ae061039d'}
Linux
GSD-2021-1001153
tcp: fix tcp_init_transfer() to not reset icsk_ca_initialized
tcp: fix tcp_init_transfer() to not reset icsk_ca_initialized This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.5 by commit fe77b85828ca9ddc42977b79de9e40d18545b4fe, it was introduced in version v5.10 by commit 8919a9b31eb4fb4c0a93e5fb350a626924302aa6. For more details please see the references link.
null
2021-12-19T22:40:43.210710Z
2021-08-03T01:30:57.038982Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8919a9b31eb4fb4c0a93e5fb350a626924302aa6'}
Linux
GSD-2022-1002053
PM: core: keep irq flags in device_pm_check_callbacks()
PM: core: keep irq flags in device_pm_check_callbacks() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit ede1ef1a7de973321699736ef96d01a4b9a6fe9e. For more details please see the references link.
null
2022-04-25T05:59:38.779858Z
2022-04-24T22:06:02.670795Z
null
null
null
null
null
Linux
GSD-2022-1000594
perf/x86/intel/pt: Fix crash with stop filters in single-range mode
perf/x86/intel/pt: Fix crash with stop filters in single-range mode This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.22 by commit e83d941fd3445f660d2f43647c580a320cc384f6, it was introduced in version v5.5 by commit 670638477aede0d7a355ced04b569214aa3feacd. For more details please see the references link.
null
2022-03-07T01:44:06.227484Z
2022-02-27T03:28:34.480687Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/670638477aede0d7a355ced04b569214aa3feacd'}
Linux
GSD-2021-1001503
tty: Fix out-of-bound vmalloc access in imageblit
tty: Fix out-of-bound vmalloc access in imageblit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.286 by commit 7e71fcedfda6f7de18f850a6b36e78d78b04476f. For more details please see the references link.
null
2021-12-20T01:34:35.946250Z
2021-10-19T16:21:11.587083Z
null
null
null
null
null
Linux
GSD-2021-1002285
net/mlx5e: nullify cq->dbg pointer in mlx5_debug_cq_remove()
net/mlx5e: nullify cq->dbg pointer in mlx5_debug_cq_remove() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.82 by commit 471c492890557bd58f73314bb4ad85d5a8fd5026, it was introduced in version v5.10.75 by commit 4f7bddf8c5c01cac74373443b13a68e1c6723a94. For more details please see the references link.
null
2021-12-19T22:36:09.497630Z
2021-11-29T02:37:03.092192Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4f7bddf8c5c01cac74373443b13a68e1c6723a94'}
Linux
GSD-2021-1000742
nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect
nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.194 by commit 93e4ac2a9979a9a4ecc158409ed9c3044dc0ae1f, it was introduced in version v3.3 by commit d646960f7986fefb460a2b062d5ccc8ccfeacc3a. For more details please see the references link.
null
2021-12-19T23:13:08.857137Z
2021-06-25T00:01:50.972170Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d646960f7986fefb460a2b062d5ccc8ccfeacc3a'}
Linux
GSD-2021-1001850
dma-debug: fix sg checks in debug_dma_map_sg()
dma-debug: fix sg checks in debug_dma_map_sg() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit 39afed394cc62365d54b02e091668bd68c3a5299, it was introduced in version v2.6.31 by commit 884d05970bfbc3db368f23460dc4ce63257f240d. For more details please see the references link.
null
2021-12-19T22:43:49.771888Z
2021-10-28T13:52:07.967464Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/884d05970bfbc3db368f23460dc4ce63257f240d'}
Linux
GSD-2022-1001385
netfilter: conntrack: revisit gc autotuning
netfilter: conntrack: revisit gc autotuning This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 7cd361d5e6d986c0d4cafb9ceaa803359048ae15. For more details please see the references link.
null
2022-04-25T05:23:52.226142Z
2022-04-24T21:09:32.815579Z
null
null
null
null
null
Linux
GSD-2021-1000312
usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4
usb: typec: ucsi: Retrieve all the PDOs instead of just the first 4 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.38 by commit e5366bea0277425e1868ba20eeb27c879d5a6e2d, it was introduced in version v5.8 by commit 992a60ed0d5e312ce9a485c9e12097ac82ae4b3e. For more details please see the references link.
null
2021-12-19T23:01:52.684242Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/992a60ed0d5e312ce9a485c9e12097ac82ae4b3e'}
Linux
GSD-2021-1002401
nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done
nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.258 by commit 811a7576747760bcaf60502f096d1e6e91d566fa, it was introduced in version v3.12 by commit ac22ac466a659f1b2e02a2e2ee23fc5c42da2c95. For more details please see the references link.
null
2021-12-19T23:39:44.769847Z
2021-12-19T19:35:42.083270Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac22ac466a659f1b2e02a2e2ee23fc5c42da2c95'}
Linux
GSD-2022-1001151
f2fs: fix to do sanity check on curseg->alloc_type
f2fs: fix to do sanity check on curseg->alloc_type This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit c12765e3f129b144421c80d3383df885f85ee290. For more details please see the references link.
null
2022-04-25T06:51:34.995647Z
2022-04-24T20:49:06.407781Z
null
null
null
null
null
Linux
GSD-2021-1002051
drm: mxsfb: Fix NULL pointer dereference crash on unload
drm: mxsfb: Fix NULL pointer dereference crash on unload This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit f40c2281d2c0674d32ba732fee45222d76495472, it was introduced in version v5.10 by commit ae1ed0093281939b80664a687689f12436c0e874. For more details please see the references link.
null
2021-12-19T23:02:08.956831Z
2021-11-14T15:17:37.259006Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ae1ed0093281939b80664a687689f12436c0e874'}
Linux
GSD-2022-1001501
clk: qcom: ipq8074: fix PCI-E clock oops
clk: qcom: ipq8074: fix PCI-E clock oops This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit d02b3d4a8c525068bc5cfb4341e0023d8eb82ace, it was introduced in version v5.9 by commit f0cfcf1ade201dcfd3365f231efc90e846fa46df. For more details please see the references link.
null
2022-04-25T03:11:26.093488Z
2022-04-24T21:17:45.550569Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f0cfcf1ade201dcfd3365f231efc90e846fa46df'}