ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2022-1000701
netfilter: nf_queue: fix possible use-after-free
netfilter: nf_queue: fix possible use-after-free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.13 by commit dcc3cb920bf7ba66ac5e9272293a9ba5f80917ee, it was introduced in version v2.6.29 by commit 271b72c7fa82c2c7a795bc16896149933110672d. For more details please see the references link.
null
2022-03-18T04:53:03.714704Z
2022-03-18T00:10:56.573422Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/271b72c7fa82c2c7a795bc16896149933110672d'}
Linux
GSD-2022-1001813
clk: qcom: clk-rcg2: Update logic to calculate D value for RCG
clk: qcom: clk-rcg2: Update logic to calculate D value for RCG This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 34dca60982e93e69ae442aa2d36ce61c9a3bb563, it was introduced in version v3.16 by commit 99cbd064b059f222c8839ba433a68b2d6ee33066. For more details please see the references link.
null
2022-04-25T03:56:06.272165Z
2022-04-24T21:44:17.141649Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/99cbd064b059f222c8839ba433a68b2d6ee33066'}
Linux
GSD-2022-1000351
nvme-tcp: fix possible use-after-free in transport error_recovery work
nvme-tcp: fix possible use-after-free in transport error_recovery work This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.181 by commit 61a26ffd5ad3ece456d74c4c79f7b5e3f440a141. For more details please see the references link.
null
2022-03-07T03:18:49.736570Z
2022-02-27T02:54:38.880523Z
null
null
null
null
null
Linux
GSD-2022-1000644
net: amd-xgbe: Fix skb data length underflow
net: amd-xgbe: Fix skb data length underflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.6 by commit e8f73f620fee5f52653ed2da360121e4446575c5, it was introduced in version v4.11 by commit 622c36f143fc9566ba49d7cec994c2da1182d9e2. For more details please see the references link.
null
2022-03-07T02:22:17.607805Z
2022-02-27T03:35:29.390987Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/622c36f143fc9566ba49d7cec994c2da1182d9e2'}
Linux
GSD-2022-1001956
drm/amdkfd: Check for potential null return of kmalloc_array()
drm/amdkfd: Check for potential null return of kmalloc_array() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.112 by commit 1d7a5aae884ca727d41c7ed15d4c82fdb67c040c. For more details please see the references link.
null
2022-04-25T06:17:17.198185Z
2022-04-24T21:57:52.391750Z
null
null
null
null
null
Linux
GSD-2022-1002383
ALSA: pcm: Test for "silence" field in struct "pcm_format_data"
ALSA: pcm: Test for "silence" field in struct "pcm_format_data" This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit c3b2f23bfe5452b00eb1c842bc71098449e4ad9f. For more details please see the references link.
null
2022-04-25T03:52:17.512759Z
2022-04-24T22:41:20.427410Z
null
null
null
null
null
Linux
GSD-2021-1001329
watchdog: Fix possible use-after-free in wdt_startup()
watchdog: Fix possible use-after-free in wdt_startup() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.134 by commit 146cc288fb80c662c9c35e7bc58325d1ac0a7875. For more details please see the references link.
null
2021-12-19T23:41:35.100689Z
2021-08-03T02:10:36.012331Z
null
null
null
null
null
Linux
GSD-2021-1001283
f2fs: fix to avoid racing on fsync_entry_slab by multi filesystem instances
f2fs: fix to avoid racing on fsync_entry_slab by multi filesystem instances This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.51 by commit 86786603014e0a22d0d6af8e80ae4b8687927048. For more details please see the references link.
null
2021-12-19T23:46:08.713660Z
2021-08-03T01:57:12.460587Z
null
null
null
null
null
Linux
GSD-2022-1000214
selinux: fix double free of cond_list on error paths
selinux: fix double free of cond_list on error paths This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.99 by commit f446089a268c8fc6908488e991d28a9b936293db. For more details please see the references link.
null
2022-02-19T08:09:43.953525Z
2022-02-18T21:56:21.644904Z
null
null
null
null
null
Linux
GSD-2022-1002229
kgdboc: fix return value of __setup handler
kgdboc: fix return value of __setup handler This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 16fe77f86aa58418f20de13d614db88d608537bb, it was introduced in version v4.20 by commit 1bd54d851f50dea6af30c3e6ff4f3e9aab5558f9. For more details please see the references link.
null
2022-04-25T05:54:52.091171Z
2022-04-24T22:23:31.892477Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1bd54d851f50dea6af30c3e6ff4f3e9aab5558f9'}
Linux
GSD-2021-1001779
can: peak_pci: peak_pci_remove(): fix UAF
can: peak_pci: peak_pci_remove(): fix UAF This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.288 by commit 447d44cd2f67a20b596ede3ca3cd67086dfd9ca9, it was introduced in version v3.4 by commit e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd. For more details please see the references link.
null
2021-12-20T01:34:03.154606Z
2021-10-28T13:48:29.239301Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd'}
Linux
GSD-2022-1001055
scsi: pm8001: Fix memory leak in pm8001_chip_fw_flash_update_req()
scsi: pm8001: Fix memory leak in pm8001_chip_fw_flash_update_req() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit a25ed5f21f94f9ae4bcc8dd747e978668890c921. For more details please see the references link.
null
2022-04-25T03:55:36.028079Z
2022-04-24T20:42:42.460620Z
null
null
null
null
null
Linux
GSD-2021-1002505
HID: bigbenff: prevent null pointer dereference
HID: bigbenff: prevent null pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.85 by commit 6272b17001e6fdcf7b4a16206287010a1523fa6e. For more details please see the references link.
null
2021-12-20T01:22:03.124100Z
2021-12-19T19:40:21.044637Z
null
null
null
null
null
Linux
GSD-2021-1000538
drm/amd/amdgpu: fix refcount leak
drm/amd/amdgpu: fix refcount leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit 95a4ec905e51a30c64cf2d78b04a7acbeae5ca94, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T02:14:46.631223Z
2021-06-04T19:35:17.621386Z
null
null
null
null
null
Linux
GSD-2021-1000492
x86/sev-es: Don't return NULL from sev_es_get_ghcb()
x86/sev-es: Don't return NULL from sev_es_get_ghcb() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.7 by commit efbfc33b0b1c241311553d3c2229974ec1d684e2, it was introduced in version v5.10 by commit 0786138c78e79343c7b015d77507cbf9d5f15d00. For more details please see the references link.
null
2021-12-19T22:44:06.973826Z
2021-05-31T23:45:31.507294Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0786138c78e79343c7b015d77507cbf9d5f15d00'}
Linux
GSD-2022-1001405
iommu/arm-smmu-v3: fix event handling soft lockup
iommu/arm-smmu-v3: fix event handling soft lockup This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit f42258fddea631bad727b3f4489ceb76a292f4dc. For more details please see the references link.
null
2022-04-25T05:40:35.143130Z
2022-04-24T21:10:43.479297Z
null
null
null
null
null
Linux
GSD-2021-1002155
NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()
NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 58e7dcc9ca29c14e44267a4d0ea61e3229124907, it was introduced in version v3.13 by commit 1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8. For more details please see the references link.
null
2021-12-20T01:29:29.543349Z
2021-11-14T15:22:26.632697Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8'}
Linux
GSD-2021-1000168
tracing: Restructure trace_clock_global() to never block
tracing: Restructure trace_clock_global() to never block This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.118 by commit c64da3294a7d59a4bf6874c664c13be892f15f44, it was introduced in version v5.4.76 by commit aef59b5e5bdfc800f0e7aec7e74a33e98bf142c0. For more details please see the references link.
null
2021-12-19T22:48:26.572571Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/aef59b5e5bdfc800f0e7aec7e74a33e98bf142c0'}
Linux
GSD-2022-1002100
udmabuf: validate ubuf->pagecount
udmabuf: validate ubuf->pagecount This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit b267a8118c2b171bf7d67b90ed64154eeab9fae0, it was introduced in version v4.20 by commit fbb0de795078190a9834b3409e4b009cfb18a6d4. For more details please see the references link.
null
2022-04-25T06:44:23.567776Z
2022-04-24T22:11:10.744856Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fbb0de795078190a9834b3409e4b009cfb18a6d4'}
Linux
GSD-2021-1001450
nfs: fix acl memory leak of posix_acl_create()
nfs: fix acl memory leak of posix_acl_create() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.276 by commit cef9d9acb7c80ed6bace894b6334557fd493863b, it was introduced in version v3.14 by commit 013cdf1088d7235da9477a2375654921d9b9ba9f. For more details please see the references link.
null
2021-12-20T01:14:55.099735Z
2021-08-03T02:45:07.008775Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/013cdf1088d7235da9477a2375654921d9b9ba9f'}
Linux
GSD-2021-1001000
x86/ioremap: Map EFI-reserved memory as encrypted for SEV
x86/ioremap: Map EFI-reserved memory as encrypted for SEV This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit 208bb686e7fa7fff16e8fa78ff0db34aa9acdbd7, it was introduced in version v5.10 by commit 58c909022a5a56cd1d9e89c8c5461fd1f6a27bb5. For more details please see the references link.
null
2021-12-19T23:23:01.554020Z
2021-06-30T00:32:22.126890Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/58c909022a5a56cd1d9e89c8c5461fd1f6a27bb5'}
Linux
GSD-2022-1000097
udf: Fix NULL ptr deref when converting from inline format
udf: Fix NULL ptr deref when converting from inline format This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.265 by commit a312cbdb9045a52e5c1fec4ac7b86895f508dc76, it was introduced in version v4.2 by commit 52ebea749aaed195245701a8f90a23d672c7a933. For more details please see the references link.
null
2022-02-20T06:16:05.976344Z
2022-02-18T21:34:52.021830Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/52ebea749aaed195245701a8f90a23d672c7a933'}
Linux
GSD-2021-1002786
IB/qib: Fix memory leak in qib_user_sdma_queue_pkts()
IB/qib: Fix memory leak in qib_user_sdma_queue_pkts() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.223 by commit 0aaec9c5f60754b56f84460ea439b8c5e91f4caa, it was introduced in version v4.19.216 by commit 73d2892148aa4397a885b4f4afcfc5b27a325c42. For more details please see the references link.
null
2022-01-11T05:53:06.193520Z
2021-12-30T02:43:22.513512Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/73d2892148aa4397a885b4f4afcfc5b27a325c42'}
Linux
GSD-2021-1000241
i2c: xiic: fix reference leak when pm_runtime_get_sync fails
i2c: xiic: fix reference leak when pm_runtime_get_sync fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit a42ac16e6573f19c78f556ea292f5b534fcc4514, it was introduced in version v5.6 by commit 10b17004a74c384c6f410af355b0d6d7a168f613. For more details please see the references link.
null
2021-12-19T22:48:14.797587Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/10b17004a74c384c6f410af355b0d6d7a168f613'}
Linux
GSD-2021-1001903
mlxsw: thermal: Fix out-of-bounds memory accesses
mlxsw: thermal: Fix out-of-bounds memory accesses This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit df8e58716afb3bee2b59de66b1ba1033f2e26303, it was introduced in version v4.10 by commit a50c1e35650b929500bd89be61c89d95a267ce56. For more details please see the references link.
null
2021-12-19T23:49:57.829613Z
2021-10-28T13:54:54.822027Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a50c1e35650b929500bd89be61c89d95a267ce56'}
Linux
GSD-2021-1000611
net/sched: fq_pie: fix OOB access in the traffic path
net/sched: fq_pie: fix OOB access in the traffic path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit e6294c06e7c62ffdd5bf3df696d3a4fcbb753d3c, it was introduced in version v5.6 by commit ec97ecf1ebe485a17cd8395a5f35e6b80b57665a. For more details please see the references link.
null
2021-12-19T22:26:13.206356Z
2021-06-04T19:47:21.192854Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ec97ecf1ebe485a17cd8395a5f35e6b80b57665a'}
Linux
GSD-2022-1000994
io_uring: drop the old style inflight file tracking
io_uring: drop the old style inflight file tracking This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit a8344ace69ffa5adc75220e0a98380cea4df08a4, it was introduced in version v5.17.3 by commit 2c443b22756cf75dc594d4d32bf64505bf4ce84b. For more details please see the references link.
null
2022-04-24T20:37:58.868897Z
2022-04-24T20:37:58.868897Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c443b22756cf75dc594d4d32bf64505bf4ce84b'}
Linux
GSD-2022-1001686
dpaa2-ptp: Fix refcount leak in dpaa2_ptp_probe
dpaa2-ptp: Fix refcount leak in dpaa2_ptp_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 599874bbc4ed832ccb578d48ac0ae7344382ef43, it was introduced in version v5.3 by commit d346c9e86d8685d7cdceddf5b2e9c4376334620c. For more details please see the references link.
null
2022-04-25T06:05:28.263695Z
2022-04-24T21:35:10.956679Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d346c9e86d8685d7cdceddf5b2e9c4376334620c'}
Linux
GSD-2021-1000304
mt76: fix potential DMA mapping leak
mt76: fix potential DMA mapping leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 91b9548d413fda488ea853cd1b9f59b572db3a0c, it was introduced in version v5.10 by commit 27d5c528a7ca08dcd44877fdd9fc08b76630bf77. For more details please see the references link.
null
2021-12-19T23:03:20.094789Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/27d5c528a7ca08dcd44877fdd9fc08b76630bf77'}
Linux
GSD-2021-1002339
scsi: advansys: Fix kernel pointer leak
scsi: advansys: Fix kernel pointer leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit 27490ae6a85a70242d80615ca74d0362a820d6a7. For more details please see the references link.
null
2021-12-19T22:26:50.516145Z
2021-11-29T02:39:30.849534Z
null
null
null
null
null
Linux
GSD-2022-1001393
mips: ralink: fix a refcount leak in ill_acc_of_setup()
mips: ralink: fix a refcount leak in ill_acc_of_setup() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 8d7f7ef7980f287ace1c15f2ac03d6754e12f071. For more details please see the references link.
null
2022-04-25T04:56:18.734673Z
2022-04-24T21:10:08.670854Z
null
null
null
null
null
Linux
GSD-2022-1001669
gpio: Restrict usage of GPIO chip irq members before initialization
gpio: Restrict usage of GPIO chip irq members before initialization This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 0912cf021fb5749372b3782611d8b1de4986c13a. For more details please see the references link.
null
2022-04-25T06:51:31.151758Z
2022-04-24T21:33:35.114888Z
null
null
null
null
null
Linux
GSD-2021-1001846
ocfs2: mount fails with buffer overflow in strlen
ocfs2: mount fails with buffer overflow in strlen This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit 93be0eeea14cf39235e585c8f56df3b3859deaad. For more details please see the references link.
null
2021-12-19T23:10:56.967607Z
2021-10-28T13:51:55.681664Z
null
null
null
null
null
Linux
GSD-2021-1000754
nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect
nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.125 by commit 5d4c4b06ed9fb7a69d0b2e2a73fc73226d25ab70, it was introduced in version v3.3 by commit d646960f7986fefb460a2b062d5ccc8ccfeacc3a. For more details please see the references link.
null
2021-12-20T00:00:29.445570Z
2021-06-25T00:02:36.849416Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d646960f7986fefb460a2b062d5ccc8ccfeacc3a'}
Linux
GSD-2021-1002769
xen/console: harden hvc_xen against event channel storms
xen/console: harden hvc_xen against event channel storms This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit 153d1ea3272209fc970116f09051002d14422cde. For more details please see the references link.
null
2022-01-11T05:50:06.029952Z
2021-12-27T05:53:02.589902Z
null
null
null
null
null
Linux
GSD-2022-1001239
drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes()
drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 639b3b9def0a6a3f316a195d705d14113236e89c, it was introduced in version v4.15 by commit e7b07ceef2a650e5ed8ca37997689e086c680daf. For more details please see the references link.
null
2022-04-25T03:08:05.411966Z
2022-04-24T20:56:48.316754Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e7b07ceef2a650e5ed8ca37997689e086c680daf'}
Linux
GSD-2021-1002293
tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc
tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.82 by commit 77e9fed33056f2a88eba9dd4d2d5412f0c7d1f41. For more details please see the references link.
null
2021-12-19T23:25:17.229401Z
2021-11-29T02:37:22.487426Z
null
null
null
null
null
Linux
GSD-2021-1001515
cpufreq: schedutil: Use kobject release() method to free sugov_tunables
cpufreq: schedutil: Use kobject release() method to free sugov_tunables This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.285 by commit cb4a53ba37532c861a5f3f22803391018a41849a, it was introduced in version v4.7 by commit 9bdcb44e391da5c41b98573bf0305a0e0b1c9569. For more details please see the references link.
null
2021-12-19T22:46:58.325075Z
2021-10-19T16:21:43.436526Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9bdcb44e391da5c41b98573bf0305a0e0b1c9569'}
Linux
GSD-2022-1000582
RDMA/ucma: Protect mc during concurrent multicast leaves
RDMA/ucma: Protect mc during concurrent multicast leaves This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.22 by commit 2923948ffe0835f7114e948b35bcc42bc9b3baa1, it was introduced in version v5.10 by commit 95fe51096b7adf1d1e7315c49c75e2f75f162584. For more details please see the references link.
null
2022-03-07T01:44:59.913440Z
2022-02-27T03:27:13.693095Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/95fe51096b7adf1d1e7315c49c75e2f75f162584'}
Linux
GSD-2022-1002045
media: staging: media: zoran: move videodev alloc
media: staging: media: zoran: move videodev alloc This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit bd01629315ffd5b63da91d0bd529a77d30e55028. For more details please see the references link.
null
2022-04-25T03:53:04.819042Z
2022-04-24T22:05:39.502625Z
null
null
null
null
null
Linux
GSD-2022-1000078
Bluetooth: refactor malicious adv data check
Bluetooth: refactor malicious adv data check This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.300 by commit 7889b38a7f21ed19314f83194622b195d328465c. For more details please see the references link.
null
2022-02-19T02:35:55.554614Z
2022-02-18T21:32:43.807728Z
null
null
null
null
null
Linux
GSD-2021-1001145
s390/stack: fix possible register corruption with stack switch helper
s390/stack: fix possible register corruption with stack switch helper This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13 by commit 67147e96a332b56c7206238162771d82467f86c0, it was introduced in version v4.20 by commit ff340d2472ec7618443913928af9fb85a7009270. For more details please see the references link.
null
2021-12-20T00:24:37.584068Z
2021-07-08T01:59:29.254119Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ff340d2472ec7618443913928af9fb85a7009270'}
Linux
GSD-2022-1002415
can: mcba_usb: properly check endpoint type
can: mcba_usb: properly check endpoint type This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 5598442edc29e8f6f2380e4b471dc1a3fcd80508, it was introduced in version v4.12 by commit 51f3baad7de943780ce0c17bd7975df567dd6e14. For more details please see the references link.
null
2022-04-25T06:14:13.289053Z
2022-04-24T22:44:56.349251Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/51f3baad7de943780ce0c17bd7975df567dd6e14'}
Linux
GSD-2022-1000428
net: dsa: mv88e6xxx: don't use devres for mdiobus
net: dsa: mv88e6xxx: don't use devres for mdiobus This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit 8b626d45127d6f5ada7d815b83cfdc09e8cb1394, it was introduced in version v5.9 by commit ac3a68d56651c3dad2c12c7afce065fe15267f44. For more details please see the references link.
null
2022-03-07T01:51:40.487685Z
2022-02-27T03:06:12.193824Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac3a68d56651c3dad2c12c7afce065fe15267f44'}
Linux
GSD-2021-1001352
RDMA/cma: Fix rdma_resolve_route() memory leak
RDMA/cma: Fix rdma_resolve_route() memory leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.133 by commit 032c68b4f5be128a2167f35b558b7cec88fe4972. For more details please see the references link.
null
2021-12-20T01:21:39.284920Z
2021-08-03T02:15:42.250757Z
null
null
null
null
null
Linux
GSD-2022-1002252
power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init
power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 41ed61364285ff38bbbe9ca8a45c8372ba72921d, it was introduced in version v4.9 by commit 8c0984e5a75337df513047ec92a6c09d78e3e5cd. For more details please see the references link.
null
2022-04-25T07:57:02.350942Z
2022-04-24T22:26:25.198741Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c0984e5a75337df513047ec92a6c09d78e3e5cd'}
Linux
GSD-2021-1001702
io_uring: allow conditional reschedule for intensive iterators
io_uring: allow conditional reschedule for intensive iterators This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.11 by commit 648f59a06b0e1fec7a4158cdee9acd362e493ce1. For more details please see the references link.
null
2021-12-20T00:28:32.206939Z
2021-10-19T16:32:36.549100Z
null
null
null
null
null
Linux
GSD-2021-1000810
HID: magicmouse: fix NULL-deref on disconnect
HID: magicmouse: fix NULL-deref on disconnect This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.10 by commit 9cf27473f21913a3eaf4702dd2a25415afd5f33f, it was introduced in version v4.20 by commit 9d7b18668956c411a422d04c712994c5fdb23a4b. For more details please see the references link.
null
2021-12-19T23:51:57.864890Z
2021-06-25T00:08:49.410743Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9d7b18668956c411a422d04c712994c5fdb23a4b'}
Linux
GSD-2022-1000795
xhci: Prevent futile URB re-submissions due to incorrect return value.
xhci: Prevent futile URB re-submissions due to incorrect return value. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.26 by commit ce94606060d7f4306774d919fd219546c589c56a, it was introduced in version v3.11 by commit 203a86613fb3bf2767335659513fa98563a3eb71. For more details please see the references link.
null
2022-03-18T02:52:40.369653Z
2022-03-18T00:18:38.333904Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/203a86613fb3bf2767335659513fa98563a3eb71'}
Linux
GSD-2022-1001887
soc: qcom: rpmpd: Check for null return of devm_kcalloc
soc: qcom: rpmpd: Check for null return of devm_kcalloc This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 724376c30af5a57686b223dbcd6188e07d2a1de2, it was introduced in version v5.1 by commit bbe3a66c3f5a65fb3d702351bac2a6033944d389. For more details please see the references link.
null
2022-04-25T06:20:32.512679Z
2022-04-24T21:52:07.495660Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bbe3a66c3f5a65fb3d702351bac2a6033944d389'}
Linux
GSD-2021-1002084
nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells
nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit 0e822e5413da1af28cca350cb1cb42b6133bdcae, it was introduced in version v4.3 by commit 69aba7948cbe53f2f1827e84e9dd0ae470a5072e. For more details please see the references link.
null
2021-12-20T01:22:03.494449Z
2021-11-14T15:19:08.503522Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69aba7948cbe53f2f1827e84e9dd0ae470a5072e'}
Linux
GSD-2021-1000543
net: fujitsu: fix potential null-ptr-deref
net: fujitsu: fix potential null-ptr-deref This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit f14bf57a08779a5dee9936f63ada0149ea89c5e6, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T00:31:09.198213Z
2021-06-04T19:35:58.468929Z
null
null
null
null
null
Linux
GSD-2021-1000113
btrfs: fix race between transaction aborts and fsyncs leading to use-after-free
btrfs: fix race between transaction aborts and fsyncs leading to use-after-free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.20 by commit 633f7f216663587f17601eaa1cf2ac3d5654874c, it was introduced in version v5.7 by commit ef67963dac255b293e19815ea3d440567be4626f. For more details please see the references link.
null
2021-12-19T22:12:04.269072Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef67963dac255b293e19815ea3d440567be4626f'}
Linux
GSD-2022-1001184
cpufreq: qcom-cpufreq-nvmem: fix reading of PVS Valid fuse
cpufreq: qcom-cpufreq-nvmem: fix reading of PVS Valid fuse This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 50b65f410814a2891505ed9bdfff3486abdc8d0b, it was introduced in version v5.7 by commit a8811ec764f95a04ba82f6f457e28c5e9e36e36b. For more details please see the references link.
null
2022-04-25T03:33:52.754815Z
2022-04-24T20:51:49.574059Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a8811ec764f95a04ba82f6f457e28c5e9e36e36b'}
Linux
GSD-2021-1000406
kyber: fix out of bounds access when preempted
kyber: fix out of bounds access when preempted This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.120 by commit 0b6b4b90b74c27bea968c214d820ba4254b903a5, it was introduced in version v4.18 by commit a6088845c2bf754d6cb2572b484180680b037804. For more details please see the references link.
null
2021-12-20T00:56:38.427920Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a6088845c2bf754d6cb2572b484180680b037804'}
Linux
GSD-2022-1001491
net: hns3: add vlan list lock to protect vlan list
net: hns3: add vlan list lock to protect vlan list This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 09e383ca97e798f9954189b741af54b5c51e7a97, it was introduced in version v5.1 by commit c6075b193462d9a3930fb41f587f94720658752a. For more details please see the references link.
null
2022-04-25T06:46:10.015145Z
2022-04-24T21:16:36.274076Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6075b193462d9a3930fb41f587f94720658752a'}
Linux
GSD-2021-1000056
usb: dwc3: core: Do core softreset when switch mode
usb: dwc3: core: Do core softreset when switch mode This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.3 by commit 1c10fd60c8595ea7ff7e29d3cf1fa88069941da3, it was introduced in version v4.12 by commit 41ce1456e1dbbc7355d0fcc10cf7c337c13def24. For more details please see the references link.
null
2021-12-20T00:03:14.376067Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41ce1456e1dbbc7355d0fcc10cf7c337c13def24'}
Linux
GSD-2021-1002591
seg6: fix the iif in the IPv6 socket control block
seg6: fix the iif in the IPv6 socket control block This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.8 by commit 98adb2bbfa407c9290bda299d4c6f7a1c4ebd5e1, it was introduced in version v5.0 by commit ef489749aae508e6f17886775c075f12ff919fb1. For more details please see the references link.
null
2021-12-19T23:36:36.926808Z
2021-12-19T19:44:04.295469Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef489749aae508e6f17886775c075f12ff919fb1'}
Linux
GSD-2021-1001217
KVM: mmio: Fix use-after-free Read in kvm_vm_ioctl_unregister_coalesced_mmio
KVM: mmio: Fix use-after-free Read in kvm_vm_ioctl_unregister_coalesced_mmio This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.4 by commit 069d44a24c0ff8f85adf49233aae7a8ca16f5c7e, it was introduced in version v5.13 by commit 5d3c4c79384af06e3c8e25b7770b6247496b4417. For more details please see the references link.
null
2021-12-19T22:22:44.655606Z
2021-08-03T01:38:52.535228Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5d3c4c79384af06e3c8e25b7770b6247496b4417'}
Linux
GSD-2022-1000280
ASoC: hdmi-codec: Fix OOB memory accesses
ASoC: hdmi-codec: Fix OOB memory accesses This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.22 by commit 10007bd96b6c4c3cfaea9e76c311b06a07a5e260. For more details please see the references link.
null
2022-02-19T09:28:29.319947Z
2022-02-18T22:05:38.668004Z
null
null
null
null
null
Linux
GSD-2022-1001868
libbpf: Fix possible NULL pointer dereference when destroying skeleton
libbpf: Fix possible NULL pointer dereference when destroying skeleton This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit b385ebe91ae917677ae8cdd3240828155248ff0c, it was introduced in version v5.6 by commit d66562fba1ce66975bd61b0786fb8b1810f33caa. For more details please see the references link.
null
2022-04-25T03:30:51.649791Z
2022-04-24T21:49:57.022762Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d66562fba1ce66975bd61b0786fb8b1810f33caa'}
Linux
GSD-2021-1001647
sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb
sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.71 by commit 9c6591ae8e63f93c895ad5e2703c36c548aac997, it was introduced in version v4.8 by commit 3acb50c18d8d6650f10919464ade4dcdaf41d62f. For more details please see the references link.
null
2021-12-19T22:52:48.240637Z
2021-10-19T16:29:51.889555Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3acb50c18d8d6650f10919464ade4dcdaf41d62f'}
Linux
GSD-2021-1000955
usb: dwc3: ep0: fix NULL pointer exception
usb: dwc3: ep0: fix NULL pointer exception This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.44 by commit 470403639114895e2697c766fbe17be8d0e9b67a. For more details please see the references link.
null
2021-12-19T22:46:06.248094Z
2021-06-30T00:29:03.856947Z
null
null
null
null
null
Linux
GSD-2022-1002317
scsi: libfc: Fix use after free in fc_exch_abts_resp()
scsi: libfc: Fix use after free in fc_exch_abts_resp() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 6044ad64f41c87382cfeeca281573d1886d80cbe. For more details please see the references link.
null
2022-04-25T06:55:18.873186Z
2022-04-24T22:33:46.798036Z
null
null
null
null
null
Linux
GSD-2021-1002342
arm64: dts: qcom: msm8998: Fix CPU/L2 idle state latency and residency
arm64: dts: qcom: msm8998: Fix CPU/L2 idle state latency and residency This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit 118c826ef8b43efe0fda8faf419673707ee8c5e5. For more details please see the references link.
null
2021-12-19T23:30:23.744075Z
2021-11-29T02:39:38.299788Z
null
null
null
null
null
Linux
GSD-2021-1001997
xhci: Fix command ring pointer corruption while aborting a command
xhci: Fix command ring pointer corruption while aborting a command This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.155 by commit 01c2dcb67e71c351006dd17cbba86c26b7f61eaf. For more details please see the references link.
null
2021-12-19T22:21:56.787911Z
2021-11-14T15:15:09.866574Z
null
null
null
null
null
Linux
GSD-2021-1000685
drm/amdgpu: Fix a use-after-free
drm/amdgpu: Fix a use-after-free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.271 by commit 3293cf3513d69f00c14d43e2020826d45ea0e46a, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T00:06:47.835672Z
2021-06-04T20:02:15.129542Z
null
null
null
null
null
Linux
GSD-2022-1000900
netfilter: fix use-after-free in __nf_register_net_hook()
netfilter: fix use-after-free in __nf_register_net_hook() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.233 by commit bdd8fc1b826e6f23963f5bef3f7431c6188ec954, it was introduced in version v4.14 by commit 2420b79f8c18a75ee2417cace381f4604b9b4365. For more details please see the references link.
null
2022-03-18T03:36:03.942333Z
2022-03-18T00:29:49.632898Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2420b79f8c18a75ee2417cace381f4604b9b4365'}
Linux
GSD-2022-1001612
rtc: pl031: fix rtc features null pointer dereference
rtc: pl031: fix rtc features null pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit d274ce4a3dfd0b9a292667535578359b865765cb, it was introduced in version v5.12 by commit d9b0dd54a1943f47a381a474f8ea2c94466110c0. For more details please see the references link.
null
2022-04-25T05:29:23.498719Z
2022-04-24T21:28:11.410006Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9b0dd54a1943f47a381a474f8ea2c94466110c0'}
Linux
GSD-2021-1002712
scsi: scsi_debug: Don't call kcalloc() if size arg is zero
scsi: scsi_debug: Don't call kcalloc() if size arg is zero This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.88 by commit aa1f912712a109b6306746133de7e5343f016b26. For more details please see the references link.
null
2022-01-11T05:53:08.978835Z
2021-12-27T05:38:27.755166Z
null
null
null
null
null
Linux
GSD-2022-1001242
ath9k_htc: fix uninit value bugs
ath9k_htc: fix uninit value bugs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 5abf2b761b998063f5e2bae93fd4ab10e2a80f10, it was introduced in version v2.6.35 by commit fb9987d0f748c983bb795a86f47522313f701a08. For more details please see the references link.
null
2022-04-25T03:51:45.539128Z
2022-04-24T20:57:09.129075Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb9987d0f748c983bb795a86f47522313f701a08'}
Linux
GSD-2021-1001094
net: caif: fix memory leak in ldisc_open
net: caif: fix memory leak in ldisc_open This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.274 by commit dede006783102f26a49e9eb33fd673b2937ed692. For more details please see the references link.
null
2021-12-20T00:02:27.181367Z
2021-07-08T01:55:55.332309Z
null
null
null
null
null
Linux
GSD-2022-1002194
MIPS: fix fortify panic when copying asm exception handlers
MIPS: fix fortify panic when copying asm exception handlers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 0aeaadc52b05b976c587182d234e3f18e8fce389. For more details please see the references link.
null
2022-04-25T06:40:21.053995Z
2022-04-24T22:20:37.568778Z
null
null
null
null
null
Linux
GSD-2022-1000453
scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task
scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit d9d93f32534a0a80a1c26bdb0746d90a7b19c2c2. For more details please see the references link.
null
2022-03-07T02:24:42.271252Z
2022-02-27T03:09:05.416639Z
null
null
null
null
null
Linux
GSD-2022-1000146
drm/vmwgfx: Fix stale file descriptors on failed usercopy
drm/vmwgfx: Fix stale file descriptors on failed usercopy This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.175 by commit 84b1259fe36ae0915f3d6ddcea6377779de48b82, it was introduced in version v4.14 by commit c906965dee22d5e95d0651759ba107b420212a9f. For more details please see the references link.
null
2022-02-19T12:12:58.292115Z
2022-02-18T21:47:06.372503Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c906965dee22d5e95d0651759ba107b420212a9f'}
Linux
GSD-2022-1002481
ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111
ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit f4de974019a0adf34d0e7de6b86252f1bd266b06. For more details please see the references link.
null
2022-04-25T05:58:56.625573Z
2022-04-24T22:52:53.873487Z
null
null
null
null
null
Linux
GSD-2021-1001581
net_sched: fix NULL deref in fifo_set_limit()
net_sched: fix NULL deref in fifo_set_limit() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.153 by commit c951a3be5e8803e93bb49a0aca0d30457d3c1b67, it was introduced in version v2.6.27 by commit fb0305ce1b03f6ff17f84f2c63daccecb45f2805. For more details please see the references link.
null
2021-12-20T01:37:58.303563Z
2021-10-19T16:24:45.346402Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb0305ce1b03f6ff17f84f2c63daccecb45f2805'}
Linux
GSD-2022-1000516
net: do not keep the dst cache when uncloning an skb dst and its metadata
net: do not keep the dst cache when uncloning an skb dst and its metadata This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit ff6962c6c9570856f32306859eb92e8b3ea78cc1, it was introduced in version v4.6 by commit d71785ffc7e7cae3fbdc4ea8a9d05b7a1c59f7b8. For more details please see the references link.
null
2022-03-07T01:39:10.762785Z
2022-02-27T03:17:31.901920Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d71785ffc7e7cae3fbdc4ea8a9d05b7a1c59f7b8'}
Linux
GSD-2022-1000845
mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work
mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.104 by commit 13f0ea8d11934a017f5c353fa049a09de3c37ec0. For more details please see the references link.
null
2022-03-18T03:00:31.402218Z
2022-03-18T00:23:22.339713Z
null
null
null
null
null
Linux
GSD-2022-1001757
can: mcba_usb: properly check endpoint type
can: mcba_usb: properly check endpoint type This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit fa9c1f14002dc0d5293e16a2007bd89b6e79207b, it was introduced in version v4.12 by commit 51f3baad7de943780ce0c17bd7975df567dd6e14. For more details please see the references link.
null
2022-04-25T04:26:12.559650Z
2022-04-24T21:40:07.172168Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/51f3baad7de943780ce0c17bd7975df567dd6e14'}
Linux
GSD-2021-1002207
RDMA/mlx5: Initialize the ODP xarray when creating an ODP MR
RDMA/mlx5: Initialize the ODP xarray when creating an ODP MR This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 5508546631a0f555d7088203dec2614e41b5106e, it was introduced in version v5.13 by commit a639e66703ee45745dc4057c7c2013ed9e1963a7. For more details please see the references link.
null
2021-12-19T22:21:57.946338Z
2021-11-14T15:24:42.606665Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a639e66703ee45745dc4057c7c2013ed9e1963a7'}
Linux
GSD-2021-1000390
crypto: sun8i-ss - Fix memory leak of object d when dma_iv fails to map
crypto: sun8i-ss - Fix memory leak of object d when dma_iv fails to map This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 617ec35ed51f731a593ae7274228ef2cfc9cb781, it was introduced in version v5.10 by commit ac2614d721dea2ff273af19c6c5d508d58a2bb3e. For more details please see the references link.
null
2021-12-20T00:24:12.525001Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac2614d721dea2ff273af19c6c5d508d58a2bb3e'}
Linux
GSD-2022-1001307
mm: invalidate hwpoison page cache page in fault path
mm: invalidate hwpoison page cache page in fault path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 6ab5aba503c6d3b926453f5ca18491e8a075e5cf. For more details please see the references link.
null
2022-04-25T05:59:40.856861Z
2022-04-24T21:02:42.415174Z
null
null
null
null
null
Linux
GSD-2021-1001978
drm/msm: Fix null pointer dereference on pointer edp
drm/msm: Fix null pointer dereference on pointer edp This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.213 by commit 7f642b93710b6b1119bdff90be01e6b5a2a5d669, it was introduced in version v4.0 by commit ab5b0107ccf3821a6837b0f2819270d6fa0b278f. For more details please see the references link.
null
2021-12-19T22:29:47.993346Z
2021-11-14T15:14:21.606251Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab5b0107ccf3821a6837b0f2819270d6fa0b278f'}
Linux
GSD-2021-1002657
net: systemport: Add global locking for descriptor lifecycle
net: systemport: Add global locking for descriptor lifecycle This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.222 by commit 595a684fa6f23b21958379a18cfa83862c73c2e1, it was introduced in version v3.16 by commit 80105befdb4b8cea924711b40b2462b87df65b62. For more details please see the references link.
null
2022-01-11T05:58:13.086715Z
2021-12-27T05:33:29.972987Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80105befdb4b8cea924711b40b2462b87df65b62'}
Linux
GSD-2021-1002179
mm, slub: fix mismatch between reconstructed freelist depth and cnt
mm, slub: fix mismatch between reconstructed freelist depth and cnt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 899447f669da76cc3605665e1a95ee877bc464cc, it was introduced in version v4.17 by commit c3895391df385c6628638f014c87e16f5e2efd45. For more details please see the references link.
null
2021-12-19T22:36:05.391978Z
2021-11-14T15:23:26.410633Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c3895391df385c6628638f014c87e16f5e2efd45'}
Linux
GSD-2021-1000144
ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure
ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.36 by commit e0f2d86481eaa83df33b0793f75212919db7a19d, it was introduced in version v4.12 by commit ca9ae5ec4ef0ed13833b03297ab319676965492c. For more details please see the references link.
null
2021-12-20T01:02:24.098256Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca9ae5ec4ef0ed13833b03297ab319676965492c'}
Linux
GSD-2022-1001429
virtio: use virtio_device_ready() in virtio_device_restore()
virtio: use virtio_device_ready() in virtio_device_restore() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 94e9f5da39ee5f8ea31be1585de31c54f10dedce, it was introduced in version v5.16 by commit d50497eb4e554e1f0351e1836ee7241c059592e6. For more details please see the references link.
null
2022-04-25T04:44:40.059330Z
2022-04-24T21:12:18.650041Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d50497eb4e554e1f0351e1836ee7241c059592e6'}
Linux
GSD-2021-1002483
drm/amd/amdgpu: fix potential memleak
drm/amd/amdgpu: fix potential memleak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.84 by commit c746945fb6bcbe3863c9ea6369c7ef376e38e5eb. For more details please see the references link.
null
2021-12-20T01:15:02.689706Z
2021-12-19T19:39:20.755612Z
null
null
null
null
null
Linux
GSD-2021-1002529
powerpc/32: Fix hardlockup on vmap stack overflow
powerpc/32: Fix hardlockup on vmap stack overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.6 by commit c4e3ff8b8b1d54f0c755670174c453b06e17114b, it was introduced in version v5.10 by commit c118c7303ad528be8ff2aea8cd1ee15452c763f0. For more details please see the references link.
null
2021-12-20T00:02:07.386579Z
2021-12-19T19:41:18.248761Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c118c7303ad528be8ff2aea8cd1ee15452c763f0'}
Linux
GSD-2021-1000514
RDMA/core: Prevent divide-by-zero error triggered by the user
RDMA/core: Prevent divide-by-zero error triggered by the user This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.40 by commit 66ab7fcdac34b890017f04f391507ef5b2b89a13, it was introduced in version v5.10 by commit 9f85cbe50aa044a46f0a22fda323fa27b80c82da. For more details please see the references link.
null
2021-12-19T23:37:52.615492Z
2021-05-31T23:48:54.746616Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9f85cbe50aa044a46f0a22fda323fa27b80c82da'}
Linux
GSD-2022-1001583
block: don't delete queue kobject before its children
block: don't delete queue kobject before its children This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit cf0cb8686e55d9c022944bc6ba9e19e832889e83, it was introduced in version v4.16 by commit 2c2086afc2b8b974fac32cb028e73dc27bfae442. For more details please see the references link.
null
2022-04-25T05:49:54.502088Z
2022-04-24T21:26:12.028041Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c2086afc2b8b974fac32cb028e73dc27bfae442'}
Linux
GSD-2022-1001079
net/mlx5e: TC, Hold sample_attr on stack instead of pointer
net/mlx5e: TC, Hold sample_attr on stack instead of pointer This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit cdd08fa7be90e7340cff631326188d5fcc9b6594. For more details please see the references link.
null
2022-04-25T05:38:30.899968Z
2022-04-24T20:43:51.715570Z
null
null
null
null
null
Linux
GSD-2021-1001755
s390/qeth: fix NULL deref in qeth_clear_working_pool_list()
s390/qeth: fix NULL deref in qeth_clear_working_pool_list() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.9 by commit 9b00fb12cdc9d8d1c3ffe82a78e74738127803fc, it was introduced in version v5.9 by commit eff73e16ee116f6eafa2be48fab42659a27cb453. For more details please see the references link.
null
2021-12-20T00:54:47.031594Z
2021-10-19T16:35:09.741367Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/eff73e16ee116f6eafa2be48fab42659a27cb453'}
Linux
GSD-2021-1000847
perf: Fix data race between pin_count increment/decrement
perf: Fix data race between pin_count increment/decrement This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.273 by commit 0c78dc6cbd99cad6445e1981211efc9bbbd56596, it was introduced in version v2.6.39 by commit fe4b04fa31a6dcf4358aa84cf81e5a7fd079469b. For more details please see the references link.
null
2021-12-19T22:50:49.864836Z
2021-06-30T00:01:06.045659Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fe4b04fa31a6dcf4358aa84cf81e5a7fd079469b'}
Linux
GSD-2022-1000238
select: Fix indefinitely sleeping task in poll_schedule_timeout()
select: Fix indefinitely sleeping task in poll_schedule_timeout() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.18 by commit 145407e54fd15fd2a87ee7d6c66077e614036a9b. For more details please see the references link.
null
2022-02-19T09:41:02.384941Z
2022-02-18T21:59:54.784589Z
null
null
null
null
null
Linux
GSD-2022-1002205
ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl
ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit d727fd32cbd1abf3465f607021bc9c746f17b5a8, it was introduced in version v4.8 by commit 714fb87e8bc05ff78255afc0dca981e8c5242785. For more details please see the references link.
null
2022-04-25T06:05:07.783789Z
2022-04-24T22:21:38.396013Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/714fb87e8bc05ff78255afc0dca981e8c5242785'}
Linux
GSD-2021-1001305
media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf()
media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.136 by commit e617fa62f6cf859a7b042cdd6c73af905ff8fca3, it was introduced in version v2.6.34 by commit dae52d009fc950b5c209260d50fcc000f5becd3c. For more details please see the references link.
null
2021-12-20T00:24:51.202133Z
2021-08-03T02:03:13.139805Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/dae52d009fc950b5c209260d50fcc000f5becd3c'}
Linux
GSD-2022-1000392
nvme: fix a possible use-after-free in controller reset during load
nvme: fix a possible use-after-free in controller reset during load This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.102 by commit 0ead57ceb21bbf15963b4874c2ac67143455382f. For more details please see the references link.
null
2022-03-07T02:27:42.833894Z
2022-02-27T03:00:40.379607Z
null
null
null
null
null
Linux
GSD-2022-1000668
RDMA/siw: Fix refcounting leak in siw_create_qp()
RDMA/siw: Fix refcounting leak in siw_create_qp() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.8 by commit fa3b844a50845c817660146c27c0fc29b08d3116, it was introduced in version v5.15 by commit 514aee660df493cd673154a6ba6bab745ec47b8c. For more details please see the references link.
null
2022-03-07T01:43:56.176044Z
2022-02-27T03:38:52.050143Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/514aee660df493cd673154a6ba6bab745ec47b8c'}