ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2021-1000596
spi: spi-fsl-dspi: Fix a resource leak in an error handling path
spi: spi-fsl-dspi: Fix a resource leak in an error handling path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit fe6921e3b8451a537e01c031b8212366bb386e3e, it was introduced in version v4.10 by commit 90ba37033cb94207e97c4ced9be575770438213b. For more details please see the references link.
null
2021-12-19T23:05:07.626237Z
2021-06-04T19:44:33.067892Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/90ba37033cb94207e97c4ced9be575770438213b'}
Linux
GSD-2022-1002287
netfilter: nf_tables: initialize registers in nft_do_chain()
netfilter: nf_tables: initialize registers in nft_do_chain() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.188 by commit 06f0ff82c70241a766a811ae1acf07d6e2734dcb, it was introduced in version v3.13 by commit 96518518cc417bb0a8c80b9fb736202e28acdf96. For more details please see the references link.
null
2022-04-25T04:44:07.465929Z
2022-04-24T22:30:29.505189Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/96518518cc417bb0a8c80b9fb736202e28acdf96'}
Linux
GSD-2022-1001852
drm/msm/dp: populate connector of struct dp_panel
drm/msm/dp: populate connector of struct dp_panel This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 9525b8bcae8b99188990b56484799cf4b1b43786, it was introduced in version v5.15 by commit 7948fe12d47a946fb8025a0534c900e3dd4b5839. For more details please see the references link.
null
2022-04-25T05:45:10.080008Z
2022-04-24T21:48:20.203025Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7948fe12d47a946fb8025a0534c900e3dd4b5839'}
Linux
GSD-2022-1000740
netfilter: nf_tables: fix memory leak during stateful obj update
netfilter: nf_tables: fix memory leak during stateful obj update This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.12 by commit 34bb90e407e3288f610558beaae54ecaa32b11c4, it was introduced in version v5.4 by commit d62d0ba97b5803183e70cfded7f7b9da76893bf5. For more details please see the references link.
null
2022-03-18T03:44:50.640576Z
2022-03-18T00:14:19.782376Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d62d0ba97b5803183e70cfded7f7b9da76893bf5'}
Linux
GSD-2022-1000310
vsock: remove vsock from connected table when connect is interrupted by a signal
vsock: remove vsock from connected table when connect is interrupted by a signal This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.268 by commit e3b3939fd137aab6d00d54bee0ee9244b286a608, it was introduced in version v3.9 by commit d021c344051af91f42c5ba9fdedc176740cbd238. For more details please see the references link.
null
2022-03-07T01:44:19.395726Z
2022-02-27T02:49:18.008016Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d021c344051af91f42c5ba9fdedc176740cbd238'}
Linux
GSD-2021-1001387
misc/libmasm/module: Fix two use after free in ibmasm_init_one
misc/libmasm/module: Fix two use after free in ibmasm_init_one This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.198 by commit 481a76d4749ee3a27f902ba213fdcbb4bb39720e. For more details please see the references link.
null
2021-12-19T23:59:36.187301Z
2021-08-03T02:26:21.655150Z
null
null
null
null
null
Linux
GSD-2022-1001917
ALSA: pcm: Fix potential AB/BA lock with buffer_mutex and mmap_lock
ALSA: pcm: Fix potential AB/BA lock with buffer_mutex and mmap_lock This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 7777744e92a0b30e3e0cce2758d911837011ebd9, it was introduced in version v5.15.32 by commit 47711ff10c7e126702cfa725f6d86ef529d15a5f. For more details please see the references link.
null
2022-04-25T02:54:22.459513Z
2022-04-24T21:54:19.168666Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/47711ff10c7e126702cfa725f6d86ef529d15a5f'}
Linux
GSD-2022-1000605
efi: runtime: avoid EFIv2 runtime services on Apple x86 machines
efi: runtime: avoid EFIv2 runtime services on Apple x86 machines This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit a4085859411c825c321c9b55b8a9dc5a128a6684. For more details please see the references link.
null
2022-03-07T01:54:40.671759Z
2022-02-27T03:29:48.763335Z
null
null
null
null
null
Linux
GSD-2021-1000980
net/mlx5e: Fix page reclaim for dead peer hairpin
net/mlx5e: Fix page reclaim for dead peer hairpin This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit be7f3f401d224e1efe8112b2fa8b837eeb8c5e52, it was introduced in version v4.19 by commit 4d8fcf216c90bc25e34ae2200aa8985ee3158898. For more details please see the references link.
null
2021-12-19T23:24:11.767167Z
2021-06-30T00:31:07.389357Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4d8fcf216c90bc25e34ae2200aa8985ee3158898'}
Linux
GSD-2021-1001692
net/sched: sch_taprio: properly cancel timer from taprio_destroy()
net/sched: sch_taprio: properly cancel timer from taprio_destroy() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.12 by commit 7a1c1af341041221b3acb9d7036cc2b43e0efa75, it was introduced in version v5.11 by commit 44d4775ca51805b376a8db5b34f650434a08e556. For more details please see the references link.
null
2021-12-20T01:01:55.823572Z
2021-10-19T16:32:07.673561Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/44d4775ca51805b376a8db5b34f650434a08e556'}
Linux
GSD-2021-1001368
KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak
KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.199 by commit 9bafc34dc4ad0cef18727c557f21ed3c3304df50, it was introduced in version v4.18 by commit b3cebfe8c1cadf1817939dcc3688a2504a69c662. For more details please see the references link.
null
2021-12-20T00:47:42.854406Z
2021-08-03T02:20:29.738757Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b3cebfe8c1cadf1817939dcc3688a2504a69c662'}
Linux
GSD-2022-1002268
brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path
brcmfmac: pcie: Release firmwares in the brcmf_pcie_setup error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit d0ab87f8dcdfe72dc1d763be3392c1fc51a1ace2, it was introduced in version v5.4 by commit 82f93cf46d6007ffa003b2d4a2834563b6b84d21. For more details please see the references link.
null
2022-04-25T03:33:45.200617Z
2022-04-24T22:28:31.888588Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/82f93cf46d6007ffa003b2d4a2834563b6b84d21'}
Linux
GSD-2022-1000255
rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev
rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.19 by commit 85aba11a8ea92a8eef2de95ebbe063086fd62d9c, it was introduced in version v4.11 by commit c0cdc19f84a4712cf74888f83af286e3c2e14efd. For more details please see the references link.
null
2022-02-19T03:19:21.634018Z
2022-02-18T22:01:53.879594Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c0cdc19f84a4712cf74888f83af286e3c2e14efd'}
Linux
GSD-2021-1002817
drm/mediatek: hdmi: Perform NULL pointer check for mtk_hdmi_conf
drm/mediatek: hdmi: Perform NULL pointer check for mtk_hdmi_conf This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.12 by commit 71d07ebc5000b9c1d140e99e7493b0bafa954776, it was introduced in version v5.14 by commit 41ca9caaae0bfc959b22dbcd59d88a7107707e17. For more details please see the references link.
null
2022-01-11T05:47:52.914339Z
2021-12-30T02:44:44.084729Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41ca9caaae0bfc959b22dbcd59d88a7107707e17'}
Linux
GSD-2021-1001738
crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()
crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit e450c422aa233e9f80515f2ee9164e33f158a472, it was introduced in version v4.12 by commit 36cf515b9bbe298e1ce7384620f0d4ec45ad3328. For more details please see the references link.
null
2021-12-20T00:28:47.993131Z
2021-10-19T16:34:19.052279Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/36cf515b9bbe298e1ce7384620f0d4ec45ad3328'}
Linux
GSD-2022-1001014
rxrpc: fix a race in rxrpc_exit_net()
rxrpc: fix a race in rxrpc_exit_net() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit cd8aef1f30d1215648e4e6686cfb422004851429, it was introduced in version v4.17 by commit ace45bec6d77bc061c3c3d8ad99e298ea9800c2b. For more details please see the references link.
null
2022-04-25T03:00:59.151406Z
2022-04-24T20:39:53.519469Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ace45bec6d77bc061c3c3d8ad99e298ea9800c2b'}
Linux
GSD-2021-1000083
s390/zcrypt: fix zcard and zqueue hot-unplug memleak
s390/zcrypt: fix zcard and zqueue hot-unplug memleak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.3 by commit 971dc8706cee47393d393905d294ea47e39503d3, it was introduced in version v5.10 by commit 29c2680fd2bf3862ff5cf2957f198512493156f9. For more details please see the references link.
null
2021-12-20T01:29:52.573546Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/29c2680fd2bf3862ff5cf2957f198512493156f9'}
Linux
GSD-2021-1000579
gve: Add NULL pointer checks when freeing irqs.
gve: Add NULL pointer checks when freeing irqs. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit da21a35c00ff1a1794d4f166d3b3fa8db4d0f6fb, it was introduced in version v5.3 by commit 893ce44df56580fb878ca5af9c4a5fd87567da50. For more details please see the references link.
null
2021-12-20T01:33:34.989959Z
2021-06-04T19:41:56.139326Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/893ce44df56580fb878ca5af9c4a5fd87567da50'}
Linux
GSD-2021-1002544
iommu/vt-d: Fix unmap_pages support
iommu/vt-d: Fix unmap_pages support This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.6 by commit 724ee060d0aba28f072fc7357a20366b0a519593, it was introduced in version v5.15 by commit 3f34f125977685e591def32984c77e23a86075b0. For more details please see the references link.
null
2021-12-20T00:18:21.595656Z
2021-12-19T19:42:01.692249Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f34f125977685e591def32984c77e23a86075b0'}
Linux
GSD-2022-1001444
ubifs: rename_whiteout: Fix double free for whiteout_ui->data
ubifs: rename_whiteout: Fix double free for whiteout_ui->data This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit b9a937f096e608b3368c1abc920d4d640ba2c94f, it was introduced in version v4.9 by commit 9e0a1fff8db56eaaebb74b4a3ef65f86811c4798. For more details please see the references link.
null
2022-04-25T08:24:16.409764Z
2022-04-24T21:13:58.504111Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9e0a1fff8db56eaaebb74b4a3ef65f86811c4798'}
Linux
GSD-2021-1000129
netfilter: conntrack: Make global sysctls readonly in non-init netns
netfilter: conntrack: Make global sysctls readonly in non-init netns This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.19 by commit fbf85a34ce17c4cf0a37ee253f4c582bbfb8231b, it was introduced in version v5.7 by commit d0febd81ae77a0e13717f1412ff9589e43fc4f8b. For more details please see the references link.
null
2021-12-20T01:11:01.680303Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0febd81ae77a0e13717f1412ff9589e43fc4f8b'}
Linux
GSD-2021-1002114
drm: mxsfb: Fix NULL pointer dereference crash on unload
drm: mxsfb: Fix NULL pointer dereference crash on unload This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit b0e6db0656ddfd8bb57303c2ef61ee1c1cc694a8, it was introduced in version v5.10 by commit ae1ed0093281939b80664a687689f12436c0e874. For more details please see the references link.
null
2021-12-20T00:11:38.327751Z
2021-11-14T15:20:28.684491Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ae1ed0093281939b80664a687689f12436c0e874'}
Linux
GSD-2022-1002141
f2fs: quota: fix loop condition at f2fs_quota_sync()
f2fs: quota: fix loop condition at f2fs_quota_sync() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit e58ee6bd939b773675240f5d0f5b88a367c037c4, it was introduced in version v5.10.67 by commit 2d586a3f5b7ec2f5a939db4abc9aa053c237545c. For more details please see the references link.
null
2022-04-25T02:59:25.299639Z
2022-04-24T22:15:33.686971Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2d586a3f5b7ec2f5a939db4abc9aa053c237545c'}
Linux
GSD-2022-1000486
NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes
NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit aa9051ddb4b378bd22e72a67bc77b9fc1482c5f0. For more details please see the references link.
null
2022-03-07T01:51:10.862323Z
2022-02-27T03:13:29.317259Z
null
null
null
null
null
Linux
GSD-2021-1001411
scsi: libfc: Fix array index out of bound exception
scsi: libfc: Fix array index out of bound exception This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.241 by commit 44651522941c623e20882b3b443f23f77de1ea8b. For more details please see the references link.
null
2021-12-19T22:50:39.213429Z
2021-08-03T02:33:01.113194Z
null
null
null
null
null
Linux
GSD-2022-1002511
mm/pages_alloc.c: don't create ZONE_MOVABLE beyond the end of a node
mm/pages_alloc.c: don't create ZONE_MOVABLE beyond the end of a node This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit 43397f238aa344b21f101b59e626bb2ddb943f6c, it was introduced in version v2.6.23 by commit 2a1e274acf0b1c192face19a4be7c12d4503eaaf. For more details please see the references link.
null
2022-04-25T05:06:15.238789Z
2022-04-24T22:56:32.660033Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2a1e274acf0b1c192face19a4be7c12d4503eaaf'}
Linux
GSD-2021-1001041
KVM: x86: Ensure liveliness of nested VM-Enter fail tracepoint message
KVM: x86: Ensure liveliness of nested VM-Enter fail tracepoint message This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit 9fb088ce13bc3c59a51260207b487db3e556f275, it was introduced in version v5.4 by commit 380e0055bc7e4a5c687436ba3ccebb4667836b95. For more details please see the references link.
null
2021-12-19T23:00:17.687426Z
2021-06-30T00:35:47.741439Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/380e0055bc7e4a5c687436ba3ccebb4667836b95'}
Linux
GSD-2022-1001297
ASoC: SOF: Intel: Fix NULL ptr dereference when ENOMEM
ASoC: SOF: Intel: Fix NULL ptr dereference when ENOMEM This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 67f7bd9ff9079c1ee2de58e024fb582905c74c16, it was introduced in version v5.2 by commit d16046ffa6de040bf580a64d5f4d0aa18258a854. For more details please see the references link.
null
2022-04-25T06:11:21.942947Z
2022-04-24T21:02:08.753260Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d16046ffa6de040bf580a64d5f4d0aa18258a854'}
Linux
GSD-2021-1000200
ACPI: scan: Fix a memory leak in an error handling path
ACPI: scan: Fix a memory leak in an error handling path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit a7e17a8d421ae23c920240625b4413c7b94d94a4, it was introduced in version v5.12 by commit eb50aaf960e3bedfef79063411ffd670da94b84b. For more details please see the references link.
null
2021-12-19T22:24:09.568568Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/eb50aaf960e3bedfef79063411ffd670da94b84b'}
Linux
GSD-2021-1002397
can: sja1000: fix use after free in ems_pcmcia_add_card()
can: sja1000: fix use after free in ems_pcmcia_add_card() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.258 by commit c8718026ba287168ff9ad0ccc4f9a413062cba36, it was introduced in version v3.2 by commit fd734c6f25aea4b2b44b045e489aec67b388577e. For more details please see the references link.
null
2021-12-19T23:02:03.078238Z
2021-12-19T19:35:32.069461Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fd734c6f25aea4b2b44b045e489aec67b388577e'}
Linux
GSD-2021-1000650
drm/amdgpu: Fix a use-after-free
drm/amdgpu: Fix a use-after-free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.193 by commit a849e218556f932576c0fb1c5a88714b61709a17, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T00:35:01.135946Z
2021-06-04T19:54:49.242824Z
null
null
null
null
null
Linux
GSD-2021-1001942
usbnet: sanity check for maxpacket
usbnet: sanity check for maxpacket This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.289 by commit 524f333e98138d909a0a0c574a9ff6737dce2767. For more details please see the references link.
null
2021-12-20T00:55:51.708908Z
2021-11-14T15:12:39.547392Z
null
null
null
null
null
Linux
GSD-2021-1002378
serial: core: fix transmit-buffer reset and memleak
serial: core: fix transmit-buffer reset and memleak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.292 by commit 011f6c92b5bf6e1fbfdedc8b5232f64c1c493206, it was introduced in version v4.9 by commit 761ed4a94582ab291aa24dcbea4e01e8936488c8. For more details please see the references link.
null
2021-12-20T01:12:57.022779Z
2021-12-19T19:34:38.840670Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/761ed4a94582ab291aa24dcbea4e01e8936488c8'}
Linux
GSD-2021-1000345
bnxt_en: Fix RX consumer index logic in the error path.
bnxt_en: Fix RX consumer index logic in the error path. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 4fcaad2b7dac3f16704f8118c7e481024ddbd3ed, it was introduced in version v5.1 by commit a1b0e4e684e9c300b9e759b46cb7a0147e61ddff. For more details please see the references link.
null
2021-12-20T00:19:24.170486Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a1b0e4e684e9c300b9e759b46cb7a0147e61ddff'}
Linux
GSD-2021-1002682
ovl: fix warning in ovl_create_real()
ovl: fix warning in ovl_create_real() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.168 by commit f9f300a92297be8250547347fd52216ef0177ae0. For more details please see the references link.
null
2022-01-11T06:43:35.887292Z
2021-12-27T05:36:39.065112Z
null
null
null
null
null
Linux
GSD-2022-1001628
coresight: syscfg: Fix memleak on registration failure in cscfg_create_device
coresight: syscfg: Fix memleak on registration failure in cscfg_create_device This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit a529af1f5a5c096f3e18f0d5a32cfcc3d82df1ec, it was introduced in version v5.15 by commit 85e2414c518a03a21dddd4bc88fec2723c5e1197. For more details please see the references link.
null
2022-04-25T05:10:27.267565Z
2022-04-24T21:29:56.254434Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/85e2414c518a03a21dddd4bc88fec2723c5e1197'}
Linux
GSD-2022-1001782
video: fbdev: cirrusfb: check pixclock to avoid divide by zero
video: fbdev: cirrusfb: check pixclock to avoid divide by zero This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 6fe23ff94e7840097202e85c148688940b37c9b1. For more details please see the references link.
null
2022-04-25T04:28:25.891932Z
2022-04-24T21:42:06.312906Z
null
null
null
null
null
Linux
GSD-2022-1000890
openvswitch: Fix setting ipv6 fields causing hw csum failure
openvswitch: Fix setting ipv6 fields causing hw csum failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.182 by commit d0251c38dff849404ac6bdedba6c1e2f89089b79, it was introduced in version v3.8 by commit 3fdbd1ce11e5c0d7cafbe44c942c5cad61113d7b. For more details please see the references link.
null
2022-03-18T03:00:48.085845Z
2022-03-18T00:28:40.566480Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3fdbd1ce11e5c0d7cafbe44c942c5cad61113d7b'}
Linux
GSD-2021-1002728
bpf: Fix signed bounds propagation after mov32
bpf: Fix signed bounds propagation after mov32 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit f77d7a35d4913e4ab27abb36016fbfc1e882a654, it was introduced in version v5.7 by commit 3f50f132d8400e129fc9eb68b5020167ef80a244. For more details please see the references link.
null
2022-01-11T05:48:47.800004Z
2021-12-27T05:39:29.828307Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f50f132d8400e129fc9eb68b5020167ef80a244'}
Linux
GSD-2021-1000715
ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed
ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.272 by commit e33bafad30d34cfa5e9787cb099cab05e2677fcb, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T23:49:44.884056Z
2021-06-24T23:58:48.255208Z
null
null
null
null
null
Linux
GSD-2021-1001807
NFC: digital: fix possible memory leak in digital_in_send_sdd_req()
NFC: digital: fix possible memory leak in digital_in_send_sdd_req() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.213 by commit 071bdef36391958c89af5fa2172f691b31baa212, it was introduced in version v3.13 by commit 2c66daecc4092e6049673c281b2e6f0d5e59a94c. For more details please see the references link.
null
2021-12-20T01:28:25.487521Z
2021-10-28T13:49:56.185339Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c66daecc4092e6049673c281b2e6f0d5e59a94c'}
Linux
GSD-2022-1001278
crypto: hisilicon/sec - fix the aead software fallback for engine
crypto: hisilicon/sec - fix the aead software fallback for engine This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 5c1149e2abe0b7489300736b8277b45b113de67f, it was introduced in version v5.14 by commit 6c46a3297beae4ae2d22b26da5e091f058381c7c. For more details please see the references link.
null
2022-04-25T06:07:06.676463Z
2022-04-24T21:00:51.564462Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6c46a3297beae4ae2d22b26da5e091f058381c7c'}
Linux
GSD-2021-1001554
usb: dwc2: check return value after calling platform_get_resource()
usb: dwc2: check return value after calling platform_get_resource() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.210 by commit a7182993dd8e09f96839ddc3ac54f9b37370d282. For more details please see the references link.
null
2021-12-19T23:13:51.042988Z
2021-10-19T16:23:32.594153Z
null
null
null
null
null
Linux
GSD-2022-1000039
sctp: use call_rcu to free endpoint
sctp: use call_rcu to free endpoint This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.90 by commit 769d14abd35e0e153b5149c3e1e989a9d719e3ff, it was introduced in version v4.14 by commit d25adbeb0cdb860fb39e09cdd025e9cfc954c5ab. For more details please see the references link.
null
2022-01-11T05:47:29.864933Z
2022-01-10T19:51:24.029471Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d25adbeb0cdb860fb39e09cdd025e9cfc954c5ab'}
Linux
GSD-2022-1002004
mips: ralink: fix a refcount leak in ill_acc_of_setup()
mips: ralink: fix a refcount leak in ill_acc_of_setup() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit 142ae7d4f21524acfe073e5a3da5667aa85eb970. For more details please see the references link.
null
2022-04-25T06:04:40.765938Z
2022-04-24T22:02:28.348054Z
null
null
null
null
null
Linux
GSD-2022-1000193
i40e: Fix queues reservation for XDP
i40e: Fix queues reservation for XDP This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.96 by commit 768eb705e6381f0c70ca29d4e66f19790d5d19a1, it was introduced in version v3.12 by commit 41c445ff0f482bb6e6b72dcee9e598e20575f743. For more details please see the references link.
null
2022-02-19T08:02:51.382326Z
2022-02-18T21:53:11.160427Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41c445ff0f482bb6e6b72dcee9e598e20575f743'}
Linux
GSD-2021-1001104
cfg80211: call cfg80211_leave_ocb when switching away from OCB
cfg80211: call cfg80211_leave_ocb when switching away from OCB This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.238 by commit cb44de1ae03374b9d5c5b87247cef35f0eefdc04. For more details please see the references link.
null
2021-12-20T00:03:33.416863Z
2021-07-08T01:56:35.473997Z
null
null
null
null
null
Linux
GSD-2022-1000469
net/smc: Avoid overwriting the copies of clcsock callback functions
net/smc: Avoid overwriting the copies of clcsock callback functions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit 7de7ba7a8bd4fde0141de8674c13514d0072f0e6, it was introduced in version v5.15.22 by commit 0ef6049f664941bc0f75828b3a61877635048b27. For more details please see the references link.
null
2022-03-07T01:43:17.779308Z
2022-02-27T03:11:34.091259Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0ef6049f664941bc0f75828b3a61877635048b27'}
Linux
GSD-2022-1002454
pinctrl: samsung: drop pin banks references on error paths
pinctrl: samsung: drop pin banks references on error paths This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit e4bc03a96374556962a3ba560ca5c9f8c99a72c9, it was introduced in version v3.8 by commit ab663789d69760d2735402f66501f20b60312a3d. For more details please see the references link.
null
2022-04-25T03:33:29.540569Z
2022-04-24T22:49:58.254471Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab663789d69760d2735402f66501f20b60312a3d'}
Linux
GSD-2021-1001391
udf: Fix NULL pointer dereference in udf_symlink function
udf: Fix NULL pointer dereference in udf_symlink function This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.198 by commit 3638705ecd5ad2785e996f820121c0ad15ce64b5. For more details please see the references link.
null
2021-12-20T00:08:49.826177Z
2021-08-03T02:26:51.402692Z
null
null
null
null
null
Linux
GSD-2022-1000306
perf: Fix list corruption in perf_cgroup_switch()
perf: Fix list corruption in perf_cgroup_switch() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.267 by commit 5d76ed4223403f90421782adb2f20a9ecbc93186, it was introduced in version v4.11 by commit 058fe1c0440e68a1ba3c2270ae43e9f0298b27d8. For more details please see the references link.
null
2022-03-07T01:30:13.701182Z
2022-02-27T02:48:49.919668Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/058fe1c0440e68a1ba3c2270ae43e9f0298b27d8'}
Linux
GSD-2021-1000979
udp: fix race between close() and udp_abort()
udp: fix race between close() and udp_abort() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit 8729ec8a2238152a4afc212a331a6cd2c61aeeac, it was introduced in version v4.9 by commit 5d77dca82839ef016a93ad7acd7058b14d967752. For more details please see the references link.
null
2021-12-20T01:37:05.136782Z
2021-06-30T00:31:03.711286Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5d77dca82839ef016a93ad7acd7058b14d967752'}
Linux
GSD-2022-1000756
xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
xen/netfront: react properly to failing gnttab_end_foreign_access_ref() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.28 by commit dea18aef2021022a568f4d385a1386f51a9df6ff. For more details please see the references link.
null
2022-03-18T02:52:50.683253Z
2022-03-18T00:15:39.759821Z
null
null
null
null
null
Linux
GSD-2022-1001844
ath10k: Fix error handling in ath10k_setup_msa_resources
ath10k: Fix error handling in ath10k_setup_msa_resources This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 32939187f254171a5666badc058bc3787fe454af, it was introduced in version v5.8 by commit 727fec790ead3d75e2735f66209949c2163523ea. For more details please see the references link.
null
2022-04-25T06:25:51.760316Z
2022-04-24T21:47:20.787961Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/727fec790ead3d75e2735f66209949c2163523ea'}
Linux
GSD-2022-1002291
scsi: target: tcmu: Fix possible page UAF
scsi: target: tcmu: Fix possible page UAF This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.239 by commit e3e0e067d5b34e4a68e3cc55f8eebc413f56f8ed. For more details please see the references link.
null
2022-04-25T06:30:22.786006Z
2022-04-24T22:30:40.664091Z
null
null
null
null
null
Linux
GSD-2021-1000580
net/smc: remove device from smcd_dev_list after failed device_add()
net/smc: remove device from smcd_dev_list after failed device_add() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit 8b2cdc004d21a7255f219706dca64411108f7897, it was introduced in version v4.19 by commit c6ba7c9ba43de1b57e9a53946e7ff988554c84ed. For more details please see the references link.
null
2021-12-19T22:31:13.665751Z
2021-06-04T19:42:07.528382Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6ba7c9ba43de1b57e9a53946e7ff988554c84ed'}
Linux
GSD-2022-1001517
Bluetooth: hci_uart: add missing NULL check in h5_enqueue
Bluetooth: hci_uart: add missing NULL check in h5_enqueue This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit e6b6c904c0f88588b6a3ace20e4c0d61eab124f8, it was introduced in version v5.15 by commit d9dd833cf6d29695682ec7e7924c0d0992b906bc. For more details please see the references link.
null
2022-04-25T06:18:00.518101Z
2022-04-24T21:19:22.961450Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9dd833cf6d29695682ec7e7924c0d0992b906bc'}
Linux
GSD-2021-1002047
powerpc/idle: Don't corrupt back chain when going idle
powerpc/idle: Don't corrupt back chain when going idle This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit c5c2a80368e97ac179d6a101c99f1e1f36146ec2, it was introduced in version v5.10.76 by commit fbd724c49bead048ae9fc1a5b7bff2fb3e54f855. For more details please see the references link.
null
2021-11-14T15:17:27.680168Z
2021-11-14T15:17:27.680168Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fbd724c49bead048ae9fc1a5b7bff2fb3e54f855'}
Linux
GSD-2022-1001147
btrfs: make search_csum_tree return 0 if we get -EFBIG
btrfs: make search_csum_tree return 0 if we get -EFBIG This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 93db0c727d2401da13101a075d09bbb75488af09. For more details please see the references link.
null
2022-04-25T04:49:44.790557Z
2022-04-24T20:48:54.785074Z
null
null
null
null
null
Linux
GSD-2021-1002417
sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl
sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.220 by commit 0769449b0a5eabc3545337217ae690e46673e73a, it was introduced in version v2.6.24 by commit faf0b2e5afe7dae072d2715763c7f992b612b628. For more details please see the references link.
null
2021-12-19T23:20:21.856102Z
2021-12-19T19:36:28.252617Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/faf0b2e5afe7dae072d2715763c7f992b612b628'}
Linux
GSD-2021-1002102
userfaultfd: fix a race between writeprotect and exit_mmap()
userfaultfd: fix a race between writeprotect and exit_mmap() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit 149958ecd0627a9f1e9c678c25c665400054cd6a, it was introduced in version v5.7 by commit 63b2d4174c4ad1f40b48d7138e71bcb564c1fe03. For more details please see the references link.
null
2021-12-20T01:20:36.289499Z
2021-11-14T15:19:58.967643Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63b2d4174c4ad1f40b48d7138e71bcb564c1fe03'}
Linux
GSD-2022-1001452
drm/i915: Treat SAGV block time 0 as SAGV disabled
drm/i915: Treat SAGV block time 0 as SAGV disabled This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 1714c5d649ec267b1f98426fe98fa43478b557ff. For more details please see the references link.
null
2022-04-25T06:32:19.571253Z
2022-04-24T21:14:26.675620Z
null
null
null
null
null
Linux
GSD-2021-1002552
drm/amd/amdgpu: fix potential memleak
drm/amd/amdgpu: fix potential memleak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.7 by commit 75752ada77e0726327adf68018b9f50ae091baeb. For more details please see the references link.
null
2021-12-19T22:23:16.507914Z
2021-12-19T19:42:21.925069Z
null
null
null
null
null
Linux
GSD-2021-1000095
tracing: Restructure trace_clock_global() to never block
tracing: Restructure trace_clock_global() to never block This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.20 by commit 6e2418576228eeb12e7ba82edb8f9500623942ff, it was introduced in version v5.10 by commit b02414c8f045ab3b9afc816c3735bc98c5c3d262. For more details please see the references link.
null
2021-12-19T22:46:59.821926Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b02414c8f045ab3b9afc816c3735bc98c5c3d262'}
Linux
GSD-2022-1001002
btrfs: fix qgroup reserve overflow the qgroup limit
btrfs: fix qgroup reserve overflow the qgroup limit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 7941b74ed49b6db25efbef2256ebef843c11a010. For more details please see the references link.
null
2022-04-25T06:09:31.695546Z
2022-04-24T20:38:45.841090Z
null
null
null
null
null
Linux
GSD-2021-1002801
hamradio: improve the incomplete fix to avoid NPD
hamradio: improve the incomplete fix to avoid NPD This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.169 by commit a5c6a13e9056d87805ba3042c208fbd4164ad22b. For more details please see the references link.
null
2022-01-11T05:53:33.897376Z
2021-12-30T02:43:58.222220Z
null
null
null
null
null
Linux
GSD-2022-1000243
efi: runtime: avoid EFIv2 runtime services on Apple x86 machines
efi: runtime: avoid EFIv2 runtime services on Apple x86 machines This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.19 by commit 3df52448978802ae15dcebf66beba1029df957b4. For more details please see the references link.
null
2022-02-19T12:54:24.015992Z
2022-02-18T22:00:29.343790Z
null
null
null
null
null
Linux
GSD-2021-1001684
bpf, s390: Fix potential memory leak about jit_data
bpf, s390: Fix potential memory leak about jit_data This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.12 by commit d590a410e472417a22336c7c37685bfb38e801f2, it was introduced in version v5.4 by commit 1c8f9b91c456f5b47a377a0c8c5d4130fc39433a. For more details please see the references link.
null
2021-12-19T23:18:01.993530Z
2021-10-19T16:31:43.913028Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c8f9b91c456f5b47a377a0c8c5d4130fc39433a'}
Linux
GSD-2021-1000996
can: mcba_usb: fix memory leak in mcba_usb
can: mcba_usb: fix memory leak in mcba_usb This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit 6bd3d80d1f019cefa7011056c54b323f1d8b8e83, it was introduced in version v4.12 by commit 51f3baad7de943780ce0c17bd7975df567dd6e14. For more details please see the references link.
null
2021-12-19T22:42:21.135223Z
2021-06-30T00:32:07.476756Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/51f3baad7de943780ce0c17bd7975df567dd6e14'}
Linux
GSD-2022-1000613
arm64: extable: fix load_unaligned_zeropad() reg indices
arm64: extable: fix load_unaligned_zeropad() reg indices This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit 47fe7a1c5e3e011eeb4ab79f2d54a794fdd1c3eb, it was introduced in version v5.16 by commit 753b32368705c396000f95f33c3b7018474e33ad. For more details please see the references link.
null
2022-03-07T01:44:15.588453Z
2022-02-27T03:31:21.790788Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/753b32368705c396000f95f33c3b7018474e33ad'}
Linux
GSD-2022-1001901
exec: Force single empty string when argv is empty
exec: Force single empty string when argv is empty This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 1290eb4412aa0f0e9f3434b406dc8e255da85f9e. For more details please see the references link.
null
2022-04-25T04:36:58.641704Z
2022-04-24T21:53:19.765136Z
null
null
null
null
null
Linux
GSD-2021-1001954
NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()
NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.252 by commit b7b023e6ff567e991c31cd425b0e1d16779c938b, it was introduced in version v3.13 by commit 1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8. For more details please see the references link.
null
2021-12-19T23:18:27.963123Z
2021-11-14T15:13:16.933616Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8'}
Linux
GSD-2021-1000646
bpf: No need to simulate speculative domain for immediates
bpf: No need to simulate speculative domain for immediates This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.123 by commit 3173c7c807854a580c85f04193a6a25aeff3dd96, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T22:09:48.452420Z
2021-06-04T19:54:00.387396Z
null
null
null
null
null
Linux
GSD-2021-1002381
nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done
nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.293 by commit 69bb79a8f5bb9f436b6f1434ca9742591b7bbe18, it was introduced in version v3.12 by commit ac22ac466a659f1b2e02a2e2ee23fc5c42da2c95. For more details please see the references link.
null
2021-12-19T22:44:56.189540Z
2021-12-19T19:34:45.829561Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac22ac466a659f1b2e02a2e2ee23fc5c42da2c95'}
Linux
GSD-2021-1000216
ceph: fix inode leak on getattr error in __fh_to_dentry
ceph: fix inode leak on getattr error in __fh_to_dentry This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit 0a219432127d396120fc88cabd82785e0ff72a2f, it was introduced in version v5.8 by commit 878dabb64117406abd40977b87544d05bb3031fc. For more details please see the references link.
null
2021-12-19T23:25:11.716015Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/878dabb64117406abd40977b87544d05bb3031fc'}
Linux
GSD-2022-1001281
selftests/sgx: Fix NULL-pointer-dereference upon early test failure
selftests/sgx: Fix NULL-pointer-dereference upon early test failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit bc72277b7541756d91c07afee6d768ec97777651, it was introduced in version v5.17 by commit 3200505d4de6436af799d7be743d9dc87450ee5a. For more details please see the references link.
null
2022-04-25T04:56:59.453647Z
2022-04-24T21:01:01.113229Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3200505d4de6436af799d7be743d9dc87450ee5a'}
Linux
GSD-2022-1000869
xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
xen/netfront: react properly to failing gnttab_end_foreign_access_ref() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.184 by commit 0e35f3ab69bcb01fdbf5aadc78f1731778963b1c. For more details please see the references link.
null
2022-03-18T02:55:55.413205Z
2022-03-18T00:26:09.863221Z
null
null
null
null
null
Linux
GSD-2021-1001057
netfilter: nf_tables: initialize set before expression setup
netfilter: nf_tables: initialize set before expression setup This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit a1f6740fa3938baa2a45c3dfc53402b78122a8a8, it was introduced in version v5.7 by commit 65038428b2c6c5be79d3f78a6b79c0cdc3a58a41. For more details please see the references link.
null
2021-12-20T00:28:55.006495Z
2021-06-30T00:36:47.533371Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/65038428b2c6c5be79d3f78a6b79c0cdc3a58a41'}
Linux
GSD-2022-1002507
media: usb: go7007: s2250-board: fix leak in probe()
media: usb: go7007: s2250-board: fix leak in probe() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit bbdd0e15738336e6b1208304ae98525117877bbd, it was introduced in version v3.10 by commit d3b2ccd9e307eae80b4b4eeb0ede46cb02212df2. For more details please see the references link.
null
2022-04-25T04:22:55.760200Z
2022-04-24T22:56:03.662954Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d3b2ccd9e307eae80b4b4eeb0ede46cb02212df2'}
Linux
GSD-2021-1001407
net: validate lwtstate->data before returning from skb_tunnel_info()
net: validate lwtstate->data before returning from skb_tunnel_info() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.241 by commit 83bdcfbd968bcc91a0632b7b625e4a9b0cba5e0d, it was introduced in version v4.3 by commit 61adedf3e3f1d3f032c5a6a299978d91eff6d555. For more details please see the references link.
null
2021-12-19T22:11:14.095306Z
2021-08-03T02:31:56.815397Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61adedf3e3f1d3f032c5a6a299978d91eff6d555'}
Linux
GSD-2022-1000490
drm/vc4: Fix deadlock on DSI device attach error
drm/vc4: Fix deadlock on DSI device attach error This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit dddd832f35096fbc5004e3a7e58fb4d2cefb8deb. For more details please see the references link.
null
2022-03-07T01:37:42.564001Z
2022-02-27T03:14:35.959053Z
null
null
null
null
null
Linux
GSD-2022-1002157
ipv6: fix panic when forwarding a pkt with no in6 dev
ipv6: fix panic when forwarding a pkt with no in6 dev This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.190 by commit ab2f5afb7af5c68389e8c7dd29e0a98fbeaaa435, it was introduced in version v5.4.136 by commit 7f4848229e91d508102b30396b8a1b710ac23637. For more details please see the references link.
null
2022-04-25T05:34:26.699881Z
2022-04-24T22:16:46.270099Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7f4848229e91d508102b30396b8a1b710ac23637'}
Linux
GSD-2022-1002442
ASoC: mxs: Fix error handling in mxs_sgtl5000_probe
ASoC: mxs: Fix error handling in mxs_sgtl5000_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 790d2628e3fcc819d8f5572eb5615113fb2e727a, it was introduced in version v3.5 by commit e968194b45c4e8077dada75c5bae5660b37628fe. For more details please see the references link.
null
2022-04-25T03:00:10.538597Z
2022-04-24T22:48:08.125781Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e968194b45c4e8077dada75c5bae5660b37628fe'}
Linux
GSD-2021-1001112
net: qed: Fix memcpy() overflow of qed_dcbx_params()
net: qed: Fix memcpy() overflow of qed_dcbx_params() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.196 by commit 144ca5c30c7a97d0c37c404c157db1b1358e2fcf. For more details please see the references link.
null
2021-12-19T22:15:44.459300Z
2021-07-08T01:57:07.333282Z
null
null
null
null
null
Linux
GSD-2022-1000185
tracing/histogram: Fix a potential memory leak for kstrdup()
tracing/histogram: Fix a potential memory leak for kstrdup() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.96 by commit d71b06aa995007eafd247626d0669b9364c42ad7, it was introduced in version v5.6 by commit d380dcde9a07ca5de4805dee11f58a98ec0ad6ff. For more details please see the references link.
null
2022-02-20T06:17:24.856693Z
2022-02-18T21:52:17.390894Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d380dcde9a07ca5de4805dee11f58a98ec0ad6ff'}
Linux
GSD-2022-1002012
drm/amdgpu: Fix recursive locking warning
drm/amdgpu: Fix recursive locking warning This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit 6694b8643bde4b940f6b410507960793b922a77d. For more details please see the references link.
null
2022-04-25T06:27:27.232599Z
2022-04-24T22:02:51.122203Z
null
null
null
null
null
Linux
GSD-2021-1001542
irqchip/gic-v3-its: Fix potential VPE leak on error
irqchip/gic-v3-its: Fix potential VPE leak on error This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.249 by commit 7d39992d45acd6f2d6b2f62389c55b61fb3d486b, it was introduced in version v4.14 by commit 7d75bbb4bc1ad90386776459d37e4ddfe605671e. For more details please see the references link.
null
2021-12-20T00:39:37.391197Z
2021-10-19T16:22:58.392827Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7d75bbb4bc1ad90386776459d37e4ddfe605671e'}
Linux
GSD-2021-1001811
xhci: Fix command ring pointer corruption while aborting a command
xhci: Fix command ring pointer corruption while aborting a command This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.213 by commit 62c182b5e763e5f4062e72678e72ce3e02dd4d1b. For more details please see the references link.
null
2021-12-19T23:22:16.473810Z
2021-10-28T13:50:10.002727Z
null
null
null
null
null
Linux
GSD-2021-1000703
i2c: i801: Don't generate an interrupt on bus reset
i2c: i801: Don't generate an interrupt on bus reset This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.271 by commit f9469082126cebb7337db3992d143f5e4edfe629, it was introduced in version v3.6 by commit 636752bcb5177a301d0266270661581de8624828. For more details please see the references link.
null
2021-12-19T22:29:26.769688Z
2021-06-04T20:05:48.713079Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/636752bcb5177a301d0266270661581de8624828'}
Linux
GSD-2022-1000886
configfs: fix a race in configfs_{,un}register_subsystem()
configfs: fix a race in configfs_{,un}register_subsystem() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.182 by commit b7e2b91fcb5c78c414e33dc8d50642e307ca0c5a, it was introduced in version v2.6.16 by commit 7063fbf2261194f72ee75afca67b3b38b554b5fa. For more details please see the references link.
null
2022-03-18T02:51:31.488139Z
2022-03-18T00:28:10.786343Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7063fbf2261194f72ee75afca67b3b38b554b5fa'}
Linux
GSD-2022-1001794
Revert "Revert "block, bfq: honor already-setup queue merges""
Revert "Revert "block, bfq: honor already-setup queue merges"" This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 65d8a737452e88f251fe5d925371de6d606df613. For more details please see the references link.
null
2022-04-25T04:34:48.541431Z
2022-04-24T21:42:41.292975Z
null
null
null
null
null
Linux
GSD-2021-1002694
net: netlink: af_netlink: Prevent empty skb by adding a check on len.
net: netlink: af_netlink: Prevent empty skb by adding a check on len. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.87 by commit dadce61247c6230489527cc5e343b6002d1114c5. For more details please see the references link.
null
2022-01-11T05:49:00.242393Z
2021-12-27T05:37:09.613896Z
null
null
null
null
null
Linux
GSD-2021-1000353
i2c: sprd: fix reference leak when pm_runtime_get_sync fails
i2c: sprd: fix reference leak when pm_runtime_get_sync fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit e547640cee7981fd751d2c9cde3a61bdb678b755, it was introduced in version v4.14 by commit 8b9ec0719834fe66146d138d62ed66cef025c864. For more details please see the references link.
null
2021-12-19T23:36:42.124585Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8b9ec0719834fe66146d138d62ed66cef025c864'}
Linux
GSD-2021-1002440
atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait
atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.164 by commit 89d15a2e40d7edaaa16da2763b349dd7b056cc09. For more details please see the references link.
null
2021-12-20T00:38:26.071249Z
2021-12-19T19:37:22.727224Z
null
null
null
null
null
Linux
GSD-2021-1000187
net: hso: fix NULL-deref on disconnect regression
net: hso: fix NULL-deref on disconnect regression This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.189 by commit 5c17cfe155d21954b4c7e2a78fa771cebcd86725, it was introduced in version v4.19.187 by commit 92028d7a31e55d53e41cff679156b9432cffcb36. For more details please see the references link.
null
2021-12-19T23:27:07.730689Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/92028d7a31e55d53e41cff679156b9432cffcb36'}
Linux
GSD-2022-1001110
wireguard: socket: ignore v6 endpoints when ipv6 is disabled
wireguard: socket: ignore v6 endpoints when ipv6 is disabled This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit d277108f9ca223ed649d56024cb6728c1cde65fa, it was introduced in version v5.6 by commit e7096c131e5161fa3b8e52a650d7719d2857adfd. For more details please see the references link.
null
2022-04-25T06:52:30.284538Z
2022-04-24T20:46:09.242220Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e7096c131e5161fa3b8e52a650d7719d2857adfd'}
Linux
GSD-2021-1002010
mm, slub: fix mismatch between reconstructed freelist depth and cnt
mm, slub: fix mismatch between reconstructed freelist depth and cnt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.156 by commit a1ec195a1943c39fffa96e47ab6532d74a9f4c78, it was introduced in version v4.17 by commit c3895391df385c6628638f014c87e16f5e2efd45. For more details please see the references link.
null
2021-12-19T22:34:48.497451Z
2021-11-14T15:15:48.420784Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c3895391df385c6628638f014c87e16f5e2efd45'}
Linux
GSD-2022-1001540
drm/msm/dp: populate connector of struct dp_panel
drm/msm/dp: populate connector of struct dp_panel This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit fbba600f432a360b42452fee79d1fb35d3aa8aeb, it was introduced in version v5.15 by commit 7948fe12d47a946fb8025a0534c900e3dd4b5839. For more details please see the references link.
null
2022-04-25T06:01:41.061330Z
2022-04-24T21:21:42.994620Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7948fe12d47a946fb8025a0534c900e3dd4b5839'}
Linux
GSD-2021-1001796
usb: musb: dsps: Fix the probe error path
usb: musb: dsps: Fix the probe error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.252 by commit 5ed60a430fb5f3d93e7fef66264daef466b4d10c, it was introduced in version v4.14.247 by commit 5269937d1483d3159d5b51907346e4f4b13ef079. For more details please see the references link.
null
2021-12-20T00:58:44.004283Z
2021-10-28T13:49:17.369106Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5269937d1483d3159d5b51907346e4f4b13ef079'}
Linux
GSD-2021-1000884
scsi: core: Fix error handling of scsi_host_alloc()
scsi: core: Fix error handling of scsi_host_alloc() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.195 by commit 2dc85045ae65b9302a1d2e2ddd7ce4c030153a6a. For more details please see the references link.
null
2021-12-20T00:22:30.938513Z
2021-06-30T00:03:33.059465Z
null
null
null
null
null