ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2022-1002340
Revert "Revert "block, bfq: honor already-setup queue merges""
Revert "Revert "block, bfq: honor already-setup queue merges"" This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit f990f0985eda59d4f29fc83fcf300c92b1225d39. For more details please see the references link.
null
2022-04-25T06:42:30.486377Z
2022-04-24T22:35:45.452982Z
null
null
null
null
null
Linux
GSD-2021-1001610
blktrace: Fix uaf in blk_trace access after removing by sysfs
blktrace: Fix uaf in blk_trace access after removing by sysfs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.150 by commit ebb8d26d93c3ec3c7576c52a8373a2309423c069, it was introduced in version v2.6.30 by commit c71a896154119f4ca9e89d6078f5f63ad60ef199. For more details please see the references link.
null
2021-12-19T23:13:01.920052Z
2021-10-19T16:28:08.258834Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c71a896154119f4ca9e89d6078f5f63ad60ef199'}
Linux
GSD-2021-1000902
perf: Fix data race between pin_count increment/decrement
perf: Fix data race between pin_count increment/decrement This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.126 by commit 26ab08df86565cde5cdfcdc3c81660ef2dca0ad4, it was introduced in version v2.6.39 by commit fe4b04fa31a6dcf4358aa84cf81e5a7fd079469b. For more details please see the references link.
null
2021-12-19T22:19:59.183788Z
2021-06-30T00:05:28.343633Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fe4b04fa31a6dcf4358aa84cf81e5a7fd079469b'}
Linux
GSD-2022-1000687
xen/xenbus: don't let xenbus_grant_ring() remove grants in error case
xen/xenbus: don't let xenbus_grant_ring() remove grants in error case This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.14 by commit 69e581afd2eafd51df6d4a24ab488cb8863c2dcd. For more details please see the references link.
null
2022-03-18T03:02:18.309701Z
2022-03-18T00:09:41.514076Z
null
null
null
null
null
Linux
GSD-2022-1001995
ceph: fix memory leak in ceph_readdir when note_last_dentry returns error
ceph: fix memory leak in ceph_readdir when note_last_dentry returns error This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit f4429786129648a8f4bb1e5faa143c4478cc5c4a. For more details please see the references link.
null
2022-04-25T06:55:48.332325Z
2022-04-24T22:01:50.162515Z
null
null
null
null
null
Linux
GSD-2021-1001240
net/sched: act_skbmod: Skip non-Ethernet packets
net/sched: act_skbmod: Skip non-Ethernet packets This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.54 by commit 071729150be9e1d1b851b70efb6d91ee9269d57b, it was introduced in version v4.9 by commit 86da71b57383d40993cb90baafb3735cffe5d800. For more details please see the references link.
null
2021-12-19T23:58:53.625353Z
2021-08-03T01:46:21.467812Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/86da71b57383d40993cb90baafb3735cffe5d800'}
Linux
GSD-2022-1001096
mips: Enable KCSAN - take 2
mips: Enable KCSAN - take 2 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 89e346c881522f3551de65d2a1d3f1b2c8648904, it was introduced in version v5.17.2 by commit 958b5990153934ba68436305f53f48ed87a1ae9a. For more details please see the references link.
null
2022-04-24T20:44:57.363642Z
2022-04-24T20:44:57.363642Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/958b5990153934ba68436305f53f48ed87a1ae9a'}
Linux
GSD-2021-1002196
drm/amdgpu: Fix even more out of bound writes from debugfs
drm/amdgpu: Fix even more out of bound writes from debugfs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 3f4e54bd312d3dafb59daf2b97ffa08abebe60f5, it was introduced in version v5.10 by commit 918698d5c2b50433714d2042f55b55b090faa167. For more details please see the references link.
null
2021-12-20T00:41:56.131295Z
2021-11-14T15:24:15.703790Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/918698d5c2b50433714d2042f55b55b090faa167'}
Linux
GSD-2021-1000451
net: Only allow init netns to set default tcp cong to a restricted algo
net: Only allow init netns to set default tcp cong to a restricted algo This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.191 by commit 992de06308d9a9584d59b96d294ac676f924e437, it was introduced in version v4.15 by commit 6670e152447732ba90626f36dfc015a13fbf150e. For more details please see the references link.
null
2021-12-20T00:33:40.892057Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6670e152447732ba90626f36dfc015a13fbf150e'}
Linux
GSD-2021-1001493
net_sched: fix NULL deref in fifo_set_limit()
net_sched: fix NULL deref in fifo_set_limit() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.289 by commit 0dd7ddc462b9c2d31eb5a9926a2cc63eaa3e9f52, it was introduced in version v2.6.27 by commit fb0305ce1b03f6ff17f84f2c63daccecb45f2805. For more details please see the references link.
null
2021-12-19T22:40:06.029422Z
2021-10-19T16:20:44.022842Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb0305ce1b03f6ff17f84f2c63daccecb45f2805'}
Linux
GSD-2022-1002439
power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init
power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 19aa3c98ed7b2616e105946cec804f897837ab84, it was introduced in version v4.9 by commit 8c0984e5a75337df513047ec92a6c09d78e3e5cd. For more details please see the references link.
null
2022-04-25T03:18:40.767264Z
2022-04-24T22:47:36.897230Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c0984e5a75337df513047ec92a6c09d78e3e5cd'}
Linux
GSD-2022-1000404
copy_process(): Move fd_install() out of sighand->siglock critical section
copy_process(): Move fd_install() out of sighand->siglock critical section This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.102 by commit 9fee985f9afa2fd5ee2c024d1a35b86e56bd1b63, it was introduced in version v5.2 by commit 6fd2fe494b17bf2dec37b610d23a43a72b16923a. For more details please see the references link.
null
2022-03-07T01:31:05.923630Z
2022-02-27T03:02:03.609995Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6fd2fe494b17bf2dec37b610d23a43a72b16923a'}
Linux
GSD-2021-1001169
scsi: target: Fix NULL dereference on XCOPY completion
scsi: target: Fix NULL dereference on XCOPY completion This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.6 by commit e7732c5a19a15a62b0b23fd683a639b0483e1f40, it was introduced in version v5.13 by commit 39ae3edda325e9cf9e978c9788affe88231f3b34. For more details please see the references link.
null
2021-12-19T23:10:41.930479Z
2021-08-03T01:32:02.200197Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/39ae3edda325e9cf9e978c9788affe88231f3b34'}
Linux
GSD-2022-1002069
cpufreq: qcom-cpufreq-nvmem: fix reading of PVS Valid fuse
cpufreq: qcom-cpufreq-nvmem: fix reading of PVS Valid fuse This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 091704a9a7f4611dae2f2332319bcf1e862d64a1, it was introduced in version v5.7 by commit a8811ec764f95a04ba82f6f457e28c5e9e36e36b. For more details please see the references link.
null
2022-04-25T04:21:05.318050Z
2022-04-24T22:07:32.614720Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a8811ec764f95a04ba82f6f457e28c5e9e36e36b'}
Linux
GSD-2022-1000054
sctp: use call_rcu to free endpoint
sctp: use call_rcu to free endpoint This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.13 by commit 75799e71df1da11394740b43ae5686646179561d, it was introduced in version v4.14 by commit d25adbeb0cdb860fb39e09cdd025e9cfc954c5ab. For more details please see the references link.
null
2022-01-11T07:00:03.246588Z
2022-01-10T19:52:01.078500Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d25adbeb0cdb860fb39e09cdd025e9cfc954c5ab'}
Linux
GSD-2021-1001539
tty: Fix out-of-bound vmalloc access in imageblit
tty: Fix out-of-bound vmalloc access in imageblit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.249 by commit 067c694d06040db6f0c65281bb358452ca6d85b9. For more details please see the references link.
null
2021-12-19T22:40:37.595690Z
2021-10-19T16:22:50.407164Z
null
null
null
null
null
Linux
GSD-2021-1000282
Drivers: hv: vmbus: Use after free in __vmbus_open()
Drivers: hv: vmbus: Use after free in __vmbus_open() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 2728f289b3270b0e273292b46c534421a33bbfd5, it was introduced in version v4.14 by commit 6f3d791f300618caf82a2be0c27456edd76d5164. For more details please see the references link.
null
2021-12-19T23:27:56.166852Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6f3d791f300618caf82a2be0c27456edd76d5164'}
Linux
GSD-2022-1001215
PCI: Reduce warnings on possible RW1C corruption
PCI: Reduce warnings on possible RW1C corruption This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 54054e4ea188d99cfcdaafc255477f51b296c655, it was introduced in version v4.10 by commit fb26592301200dbbe4a9943fe188b57a46716900. For more details please see the references link.
null
2022-04-25T06:57:05.766512Z
2022-04-24T20:54:30.584652Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb26592301200dbbe4a9943fe188b57a46716900'}
Linux
GSD-2021-1000778
ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed
ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.43 by commit d3b668b96ad3192c0581a248ae2f596cd054792a, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T00:33:33.005062Z
2021-06-25T00:05:00.232824Z
null
null
null
null
null
Linux
GSD-2021-1002745
mptcp: never allow the PM to close a listener subflow
mptcp: never allow the PM to close a listener subflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit 1456a0004cc54c58adb2501cb0c95dc8b3c83e9e, it was introduced in version v5.13 by commit 740d798e8767d8a449902b1a1bbc70facfce19b5. For more details please see the references link.
null
2022-01-11T05:46:29.735438Z
2021-12-27T05:46:13.237864Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/740d798e8767d8a449902b1a1bbc70facfce19b5'}
Linux
GSD-2022-1000957
dm integrity: fix memory corruption when tag_size is less than digest size
dm integrity: fix memory corruption when tag_size is less than digest size This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.4 by commit 4d485cf9b609709e45d5113e6e2b1b01254b2fe9. For more details please see the references link.
null
2022-04-25T05:17:03.759584Z
2022-04-24T20:34:58.468030Z
null
null
null
null
null
Linux
GSD-2022-1001645
perf/imx_ddr: Fix undefined behavior due to shift overflowing the constant
perf/imx_ddr: Fix undefined behavior due to shift overflowing the constant This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.35 by commit 4cdf0e7a5be8fb50fb7d46a9ff1f8bdf2aa0f0f0. For more details please see the references link.
null
2022-04-25T03:54:08.500447Z
2022-04-24T21:31:18.758714Z
null
null
null
null
null
Linux
GSD-2021-1000328
arm64: entry: always set GIC_PRIO_PSR_I_SET during entry
arm64: entry: always set GIC_PRIO_PSR_I_SET during entry This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.38 by commit 51524fa8b5f7b879ba569227738375d283b79382, it was introduced in version v5.10 by commit 23529049c68423820487304f244144e0d576e85a. For more details please see the references link.
null
2021-12-20T00:14:23.828243Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/23529049c68423820487304f244144e0d576e85a'}
Linux
GSD-2021-1002315
net: dpaa2-eth: fix use-after-free in dpaa2_eth_remove
net: dpaa2-eth: fix use-after-free in dpaa2_eth_remove This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit 32d4686224744819ddcae58b666c21d2a4ef4c88, it was introduced in version v4.17 by commit 7472dd9f649958be6a8880ed439233c8414a7b34. For more details please see the references link.
null
2021-12-20T01:23:28.343379Z
2021-11-29T02:38:24.056937Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7472dd9f649958be6a8880ed439233c8414a7b34'}
Linux
GSD-2021-1002600
nfsd: fix use-after-free due to delegation race
nfsd: fix use-after-free due to delegation race This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.8 by commit 148c816f10fd11df27ca6a9b3238cdd42fa72cd3. For more details please see the references link.
null
2021-12-20T00:21:43.022205Z
2021-12-19T19:44:34.289667Z
null
null
null
null
null
Linux
GSD-2022-1001350
lz4: fix LZ4_decompress_safe_partial read out of bound
lz4: fix LZ4_decompress_safe_partial read out of bound This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit e64dbe97c05c769525cbca099ddbd22485630235. For more details please see the references link.
null
2022-04-25T04:47:56.956429Z
2022-04-24T21:06:41.808234Z
null
null
null
null
null
Linux
GSD-2021-1002250
tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc
tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.218 by commit 4f300f47dbcf9c3d4b2ea76c8554c8f360400725. For more details please see the references link.
null
2021-12-19T23:21:37.519735Z
2021-11-29T02:35:23.150514Z
null
null
null
null
null
Linux
GSD-2021-1001885
ocfs2: mount fails with buffer overflow in strlen
ocfs2: mount fails with buffer overflow in strlen This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit 0e677ea5b7396f715a76b6b0ef441430e4c4b57f. For more details please see the references link.
null
2021-12-19T23:23:20.404110Z
2021-10-28T13:53:54.877511Z
null
null
null
null
null
Linux
GSD-2021-1000797
nvmet: fix freeing unallocated p2pmem
nvmet: fix freeing unallocated p2pmem This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.10 by commit 8a452d62e7cea3c8a2676a3b89a9118755a1a271, it was introduced in version v5.8 by commit c6e3f13398123a008cd2ee28f93510b113a32791. For more details please see the references link.
null
2021-12-20T00:02:05.511502Z
2021-06-25T00:08:00.016976Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6e3f13398123a008cd2ee28f93510b113a32791'}
Linux
GSD-2022-1000812
bpf: Add schedule points in batch ops
bpf: Add schedule points in batch ops This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.26 by commit 8628f489b749a4f9767991631921dbe3fbcdc784, it was introduced in version v5.6 by commit aa2e93b8e58e18442edfb2427446732415bc215e. For more details please see the references link.
null
2022-03-18T03:01:08.829892Z
2022-03-18T00:20:54.940892Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/aa2e93b8e58e18442edfb2427446732415bc215e'}
Linux
GSD-2022-1001700
x86: Annotate call_on_stack()
x86: Annotate call_on_stack() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit e3c961c56ad522eaf2716afa42c59346675ee4b1. For more details please see the references link.
null
2022-04-25T06:42:01.737335Z
2022-04-24T21:36:21.550405Z
null
null
null
null
null
Linux
GSD-2022-1002086
powerpc: 8xx: fix a return value error in mpc8xx_pic_init
powerpc: 8xx: fix a return value error in mpc8xx_pic_init This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 3c2a39784974fb7dc88cc27b71569d13e45fc4b2, it was introduced in version v5.2 by commit cc76404feaed597bb4f5234d34d3f49e2d1139bf. For more details please see the references link.
null
2022-04-25T03:59:03.392918Z
2022-04-24T22:09:23.434207Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cc76404feaed597bb4f5234d34d3f49e2d1139bf'}
Linux
GSD-2022-1000541
nvme-tcp: fix possible use-after-free in transport error_recovery work
nvme-tcp: fix possible use-after-free in transport error_recovery work This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit bb0d8fb35c4ff00a503c2c4dca4cce8d102a21c4. For more details please see the references link.
null
2022-03-07T01:56:59.244224Z
2022-02-27T03:21:11.173021Z
null
null
null
null
null
Linux
GSD-2021-1001186
virtio-blk: Fix memory leak among suspend/resume procedure
virtio-blk: Fix memory leak among suspend/resume procedure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.4 by commit 29a2f4a3214aa14d61cc9737c9f886dae9dbb710. For more details please see the references link.
null
2021-12-19T23:30:53.198360Z
2021-08-03T01:33:21.218297Z
null
null
null
null
null
Linux
GSD-2022-1000111
ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx()
ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.265 by commit 54abca038e287d3746dd40016514670a7f654c5c. For more details please see the references link.
null
2022-02-20T02:16:47.221164Z
2022-02-18T21:42:19.865549Z
null
null
null
null
null
Linux
GSD-2022-1000384
vt_ioctl: fix array_index_nospec in vt_setactivate
vt_ioctl: fix array_index_nospec in vt_setactivate This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.101 by commit 778302ca09498b448620edd372dc908bebf80bdf. For more details please see the references link.
null
2022-03-07T02:18:16.225308Z
2022-02-27T02:59:45.346268Z
null
null
null
null
null
Linux
GSD-2021-1001313
net: fix uninit-value in caif_seqpkt_sendmsg
net: fix uninit-value in caif_seqpkt_sendmsg This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.136 by commit 9413c0abb57f70a953b1116318d6aa478013c35d, it was introduced in version v2.6.35 by commit bece7b2398d073d11b2e352405a3ecd3a1e39c60. For more details please see the references link.
null
2021-12-20T00:28:47.204096Z
2021-08-03T02:05:59.413470Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bece7b2398d073d11b2e352405a3ecd3a1e39c60'}
Linux
GSD-2022-1002213
ARM: mmp: Fix failure to remove sram device
ARM: mmp: Fix failure to remove sram device This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 11186875ba8fcfeec7ece310871f5ffbde20a556. For more details please see the references link.
null
2022-04-25T05:17:18.744359Z
2022-04-24T22:22:28.063040Z
null
null
null
null
null
Linux
GSD-2021-1000851
isdn: mISDN: netjet: Fix crash in nj_probe:
isdn: mISDN: netjet: Fix crash in nj_probe: This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.237 by commit a0a37e4454ca1c0b424edc2c9c2487c2c46a1be6. For more details please see the references link.
null
2021-12-19T23:50:16.755102Z
2021-06-30T00:01:20.804832Z
null
null
null
null
null
Linux
GSD-2021-1001743
HID: amd_sfh: Fix potential NULL pointer dereference
HID: amd_sfh: Fix potential NULL pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit 283e4bee701dfcd409dd293f19a268bb2bc8ff38. For more details please see the references link.
null
2021-12-20T01:14:56.151028Z
2021-10-19T16:34:33.695455Z
null
null
null
null
null
Linux
GSD-2022-1001595
samples/landlock: Fix path_list memory leak
samples/landlock: Fix path_list memory leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 49b0d8bf05809df5f87e5c03e26d74bdfdab4571. For more details please see the references link.
null
2022-04-25T05:24:56.072093Z
2022-04-24T21:27:06.706340Z
null
null
null
null
null
Linux
GSD-2021-1000502
RDMA/core: Prevent divide-by-zero error triggered by the user
RDMA/core: Prevent divide-by-zero error triggered by the user This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.7 by commit e6871b4270c05f8b212e7d98aee82b357972c80a, it was introduced in version v5.10 by commit 9f85cbe50aa044a46f0a22fda323fa27b80c82da. For more details please see the references link.
null
2021-12-19T22:24:41.751272Z
2021-05-31T23:47:11.750443Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9f85cbe50aa044a46f0a22fda323fa27b80c82da'}
Linux
GSD-2021-1002495
rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle()
rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.84 by commit 35b40f724c4ef0f683d94dab3af9ab38261d782b, it was introduced in version v5.10 by commit 245500d853e9f20036cec7df4f6984ece4c6bf26. For more details please see the references link.
null
2021-12-19T23:36:35.269150Z
2021-12-19T19:39:50.440650Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/245500d853e9f20036cec7df4f6984ece4c6bf26'}
Linux
GSD-2021-1000152
mtd: physmap: physmap-bt1-rom: Fix unintentional stack access
mtd: physmap: physmap-bt1-rom: Fix unintentional stack access This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.36 by commit 34ec706bf0b7c4ca249a729c1bcb91f706c7a7be, it was introduced in version v5.10 by commit b3e79e7682e075326df8041b826b03453acacd0a. For more details please see the references link.
null
2021-12-19T22:19:14.159403Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b3e79e7682e075326df8041b826b03453acacd0a'}
Linux
GSD-2021-1000447
netfilter: nftables: avoid overflows in nft_hash_buckets()
netfilter: nftables: avoid overflows in nft_hash_buckets() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.191 by commit efcd730ddd6f25578bd31bfe703e593e2421d708, it was introduced in version v4.9 by commit 0ed6389c483dc77cdbdd48de0ca7ce41723dd667. For more details please see the references link.
null
2021-12-20T01:05:15.265255Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0ed6389c483dc77cdbdd48de0ca7ce41723dd667'}
Linux
GSD-2021-1002180
mm, slub: fix potential memoryleak in kmem_cache_open()
mm, slub: fix potential memoryleak in kmem_cache_open() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 9037c57681d25e4dcc442d940d6dbe24dd31f461, it was introduced in version v4.8 by commit 210e7a43fa905bccafa9bb5966fba1d71f33eb8b. For more details please see the references link.
null
2021-12-20T00:43:15.948353Z
2021-11-14T15:23:28.748514Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/210e7a43fa905bccafa9bb5966fba1d71f33eb8b'}
Linux
GSD-2022-1001080
drm/amdkfd: Ensure mm remain valid in svm deferred_list work
drm/amdkfd: Ensure mm remain valid in svm deferred_list work This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 699d03880a8c52912d0899b4d0c8936db7cb5038. For more details please see the references link.
null
2022-04-25T04:19:14.835625Z
2022-04-24T20:43:54.587107Z
null
null
null
null
null
Linux
GSD-2021-1000017
net: Make tcp_allowed_congestion_control readonly in non-init netns
net: Make tcp_allowed_congestion_control readonly in non-init netns This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.16 by commit 1ccdf1bed140820240e383ba0accc474ffc7f006, it was introduced in version v5.7 by commit 9cb8e048e5d93825ec5e8dfb5b8df4987ea25745. For more details please see the references link.
null
2021-12-20T00:55:24.460822Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9cb8e048e5d93825ec5e8dfb5b8df4987ea25745'}
Linux
GSD-2021-1001256
dma-buf/sync_file: Don't leak fences on merge failure
dma-buf/sync_file: Don't leak fences on merge failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.53 by commit 0d514185ae792d3a1903c8e1a83899aa996705ce, it was introduced in version v4.9 by commit a02b9dc90d844cc7df7b63264e7920cc425052d9. For more details please see the references link.
null
2021-12-20T01:09:21.170996Z
2021-08-03T01:49:38.295977Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a02b9dc90d844cc7df7b63264e7920cc425052d9'}
Linux
GSD-2022-1001829
Bluetooth: hci_uart: add missing NULL check in h5_enqueue
Bluetooth: hci_uart: add missing NULL check in h5_enqueue This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 7235485433d290367d60ae22fcdfc565e61d42ab, it was introduced in version v5.15 by commit d9dd833cf6d29695682ec7e7924c0d0992b906bc. For more details please see the references link.
null
2022-04-25T04:28:37.821493Z
2022-04-24T21:45:58.525993Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9dd833cf6d29695682ec7e7924c0d0992b906bc'}
Linux
GSD-2022-1001983
NFS: Avoid writeback threads getting stuck in mempool_alloc()
NFS: Avoid writeback threads getting stuck in mempool_alloc() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit c74e2f6ecc51bd08bb5b0335477dba954a50592e. For more details please see the references link.
null
2022-04-25T04:51:59.362460Z
2022-04-24T22:00:56.811232Z
null
null
null
null
null
Linux
GSD-2022-1000691
btrfs: do not WARN_ON() if we have PageError set
btrfs: do not WARN_ON() if we have PageError set This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.13 by commit 9efcc83b33b576302147634eca9bece8e3737e34. For more details please see the references link.
null
2022-03-18T02:52:07.075140Z
2022-03-18T00:09:51.001331Z
null
null
null
null
null
Linux
GSD-2021-1000914
batman-adv: Avoid WARN_ON timing related checks
batman-adv: Avoid WARN_ON timing related checks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.128 by commit e7fbd8184fa9e85f0d648c499841cb7ff6dec9f4, it was introduced in version v3.14 by commit ef0a937f7a1450d3a133ccd83c9c7d07587e7a00. For more details please see the references link.
null
2021-12-19T23:15:19.345751Z
2021-06-30T00:06:13.074362Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef0a937f7a1450d3a133ccd83c9c7d07587e7a00'}
Linux
GSD-2021-1001606
blk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd
blk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.150 by commit d12ddd843f1877de1f7dd2aeea4907cf9ff3ac08. For more details please see the references link.
null
2021-12-19T22:58:34.235432Z
2021-10-19T16:27:57.404286Z
null
null
null
null
null
Linux
GSD-2022-1002356
power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init
power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit db3a61ef8e6aef3b888baa6a85926c2230c2cc56, it was introduced in version v4.9 by commit 8c0984e5a75337df513047ec92a6c09d78e3e5cd. For more details please see the references link.
null
2022-04-25T03:18:59.571494Z
2022-04-24T22:37:58.408159Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c0984e5a75337df513047ec92a6c09d78e3e5cd'}
Linux
GSD-2021-1002303
selinux: fix NULL-pointer dereference when hashtab allocation fails
selinux: fix NULL-pointer dereference when hashtab allocation fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit 83c8ab8503adf56bf68dafc7a382f4946c87da79, it was introduced in version v5.8 by commit 03414a49ad5f3c56988c36d2070e402ffa17feaf. For more details please see the references link.
null
2021-12-20T00:08:45.761161Z
2021-11-29T02:37:48.264823Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/03414a49ad5f3c56988c36d2070e402ffa17feaf'}
Linux
GSD-2022-1001653
scsi: target: tcmu: Fix possible page UAF
scsi: target: tcmu: Fix possible page UAF This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.35 by commit b7f3b5d70c834f49f7d87a2f2ed1c6284d9a0322. For more details please see the references link.
null
2022-04-25T05:40:49.495379Z
2022-04-24T21:31:52.851048Z
null
null
null
null
null
Linux
GSD-2022-1000941
xfrm: fix MTU regression
xfrm: fix MTU regression This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.305 by commit 80080bbcb25d386add6482aea9969e89834a8678, it was introduced in version v4.9.79 by commit fb50d8c9169ee0e90cd7a733d65cb86876d795c7. For more details please see the references link.
null
2022-03-18T02:54:44.667924Z
2022-03-18T00:34:54.044077Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb50d8c9169ee0e90cd7a733d65cb86876d795c7'}
Linux
GSD-2021-1002753
sit: do not call ipip6_dev_free() from sit_init_net()
sit: do not call ipip6_dev_free() from sit_init_net() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit 44a6c846bc3a7efe7d394bab8b2ae3b7f580e190, it was introduced in version v4.12 by commit cf124db566e6b036b8bcbe8decbed740bdfac8c6. For more details please see the references link.
null
2022-01-11T05:49:06.281853Z
2021-12-27T05:48:20.929483Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cf124db566e6b036b8bcbe8decbed740bdfac8c6'}
Linux
GSD-2022-1001203
Revert "RDMA/core: Fix ib_qp_usecnt_dec() called when error"
Revert "RDMA/core: Fix ib_qp_usecnt_dec() called when error" This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 7826a1f517e17fe47b33cd7fb2efeff2f1913d6b, it was introduced in version v5.17.2 by commit a75a91a3ac514cc2c849a4bb8141e6cbf2573da5. For more details please see the references link.
null
2022-04-24T20:53:23.800904Z
2022-04-24T20:53:23.800904Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a75a91a3ac514cc2c849a4bb8141e6cbf2573da5'}
Linux
GSD-2021-1000294
spi: stm32: Fix use-after-free on unbind
spi: stm32: Fix use-after-free on unbind This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 7bd798abad613855f80f7a205a60ccad17ad9487, it was introduced in version v5.12.4 by commit 1251ef565c1e31541019248a95eea5ffd5baa616. For more details please see the references link.
null
2021-06-24T22:55:39.184950Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1251ef565c1e31541019248a95eea5ffd5baa616'}
Linux
GSD-2022-1000042
i2c: validate user data in compat ioctl
i2c: validate user data in compat ioctl This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.90 by commit 8d31cbab4c295d7010ebb729e9d02d0e9cece18f, it was introduced in version v4.15 by commit 7d5cb45655f2e9e37ef75d18f50c0072ef14a38b. For more details please see the references link.
null
2022-01-11T05:47:35.463114Z
2022-01-10T19:51:31.207700Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7d5cb45655f2e9e37ef75d18f50c0072ef14a38b'}
Linux
GSD-2022-1000412
NFSD: Fix ia_size underflow
NFSD: Fix ia_size underflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit 8e0ecaf7a7e57b30284d6b3289cc436100fadc48. For more details please see the references link.
null
2022-03-07T02:55:12.024661Z
2022-02-27T03:02:57.076848Z
null
null
null
null
null
Linux
GSD-2021-1001485
media: zr364xx: fix memory leak in zr364xx_start_readpipe
media: zr364xx: fix memory leak in zr364xx_start_readpipe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.276 by commit c57b2bd3247925e253729dce283d6bf6abc9339d, it was introduced in version v2.6.32 by commit ccbf035ae5de4c535160fc99f73feb44cc55b534. For more details please see the references link.
null
2021-12-19T23:31:59.162014Z
2021-08-03T02:55:30.711781Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ccbf035ae5de4c535160fc99f73feb44cc55b534'}
Linux
GSD-2022-1000107
rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink()
rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.265 by commit 7d9211678c0f0624f74cdff36117ab8316697bb8, it was introduced in version v3.14 by commit ba7d49b1f0f8e5f24294a880ed576964059af5ef. For more details please see the references link.
null
2022-02-20T02:01:59.932226Z
2022-02-18T21:35:59.447624Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ba7d49b1f0f8e5f24294a880ed576964059af5ef'}
Linux
GSD-2021-1001190
watchdog: Fix possible use-after-free by calling del_timer_sync()
watchdog: Fix possible use-after-free by calling del_timer_sync() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.4 by commit 1a053c4d716898a53c2e31c574a70ea0c37044a3. For more details please see the references link.
null
2021-12-19T23:21:43.294707Z
2021-08-03T01:33:42.412493Z
null
null
null
null
null
Linux
GSD-2022-1000557
net: mscc: ocelot: fix use-after-free in ocelot_vlan_del()
net: mscc: ocelot: fix use-after-free in ocelot_vlan_del() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit c98bed60cdd7f22237ae256cc9c1c3087206b8a2, it was introduced in version v5.16 by commit d4004422f6f9fa8e55c04482008c1c9f9edd2d19. For more details please see the references link.
null
2022-03-07T01:43:09.863965Z
2022-02-27T03:23:40.762363Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d4004422f6f9fa8e55c04482008c1c9f9edd2d19'}
Linux
GSD-2022-1002090
ext2: correct max file size computing
ext2: correct max file size computing This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 9ffa07c699a72fc351620ee3cf6797d1a8abe37f, it was introduced in version v5.1 by commit 1c2d14212b15a60300a2d4f6364753e87394c521. For more details please see the references link.
null
2022-04-25T03:10:41.431482Z
2022-04-24T22:09:58.232613Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c2d14212b15a60300a2d4f6364753e87394c521'}
Linux
GSD-2022-1001716
MIPS: fix fortify panic when copying asm exception handlers
MIPS: fix fortify panic when copying asm exception handlers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 9b85e31309c2fe0f21c181ef7eaf2368c61565fb. For more details please see the references link.
null
2022-04-25T06:31:00.111214Z
2022-04-24T21:37:24.994538Z
null
null
null
null
null
Linux
GSD-2022-1000804
spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op()
spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.26 by commit 3c32405d6474a21f7d742828e73c13e326dcae82, it was introduced in version v5.2 by commit 67dca5e580f1e93a66177389981541cac208c817. For more details please see the references link.
null
2022-03-18T03:00:13.232035Z
2022-03-18T00:19:58.184492Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/67dca5e580f1e93a66177389981541cac208c817'}
Linux
GSD-2021-1000781
ocfs2: fix data corruption by fallocate
ocfs2: fix data corruption by fallocate This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.43 by commit c8d5faee46242c3f33b8a71a4d7d52214785bfcc, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T23:11:05.212177Z
2021-06-25T00:05:13.840213Z
null
null
null
null
null
Linux
GSD-2021-1001893
netfilter: xt_IDLETIMER: fix panic that occurs when timer_type has garbage value
netfilter: xt_IDLETIMER: fix panic that occurs when timer_type has garbage value This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit cae7cab804c943d723d52724a3aeb07a3f4a2650, it was introduced in version v5.7 by commit 68983a354a655c35d3fb204489d383a2a051fda7. For more details please see the references link.
null
2021-12-19T22:09:29.528986Z
2021-10-28T13:54:27.029129Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/68983a354a655c35d3fb204489d383a2a051fda7'}
Linux
GSD-2021-1002246
x86/hyperv: Fix NULL deref in set_hv_tscchange_cb() if Hyper-V setup fails
x86/hyperv: Fix NULL deref in set_hv_tscchange_cb() if Hyper-V setup fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.218 by commit b20ec58f8a6f4fef32cc71480ddf824584e24743, it was introduced in version v4.16 by commit 93286261de1b46339aa27cd4c639b21778f6cade. For more details please see the references link.
null
2021-12-19T22:42:04.461675Z
2021-11-29T02:35:13.003409Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/93286261de1b46339aa27cd4c639b21778f6cade'}
Linux
GSD-2022-1001346
btrfs: fix qgroup reserve overflow the qgroup limit
btrfs: fix qgroup reserve overflow the qgroup limit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 6bfff81286d4491f02dad7814bae5c77c9ad2320. For more details please see the references link.
null
2022-04-25T05:57:08.148504Z
2022-04-24T21:06:28.298402Z
null
null
null
null
null
Linux
GSD-2021-1002616
xen/blkfront: harden blkfront against event channel storms
xen/blkfront: harden blkfront against event channel storms This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.296 by commit 3e04b9e6aa7d77287e70a400be83060d2b7b2cfe. For more details please see the references link.
null
2022-01-11T06:49:39.019760Z
2021-12-27T05:27:22.019308Z
null
null
null
null
null
Linux
GSD-2021-1001939
isdn: cpai: check ctr->cnr to avoid array index out of bound
isdn: cpai: check ctr->cnr to avoid array index out of bound This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.288 by commit 24219a977bfe3d658687e45615c70998acdbac5a. For more details please see the references link.
null
2021-12-20T00:24:16.979834Z
2021-11-14T15:12:32.406287Z
null
null
null
null
null
Linux
GSD-2022-1001192
ax25: Fix refcount leaks caused by ax25_cb_del()
ax25: Fix refcount leaks caused by ax25_cb_del() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 534156dd4ed768e30a43de0036f45dca7c54818f, it was introduced in version v5.17 by commit d01ffb9eee4af165d83b08dd73ebdf9fe94a519b. For more details please see the references link.
null
2022-04-25T06:13:52.436341Z
2022-04-24T20:52:25.331777Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d01ffb9eee4af165d83b08dd73ebdf9fe94a519b'}
Linux
GSD-2021-1000105
tpm: efi: Use local variable for calculating final log size
tpm: efi: Use local variable for calculating final log size This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.20 by commit 3818b753277f5ca0c170bf5b98e0a5a225542fcb, it was introduced in version v5.3 by commit 166a2809d65b282272c474835ec22c882a39ca1b. For more details please see the references link.
null
2021-12-19T22:21:32.227728Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/166a2809d65b282272c474835ec22c882a39ca1b'}
Linux
GSD-2021-1002138
RDMA/mlx5: Initialize the ODP xarray when creating an ODP MR
RDMA/mlx5: Initialize the ODP xarray when creating an ODP MR This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.16 by commit 5f6995295f65d1ee6f36d466d26afd98eb797afe, it was introduced in version v5.13 by commit a639e66703ee45745dc4057c7c2013ed9e1963a7. For more details please see the references link.
null
2021-12-20T01:21:31.864088Z
2021-11-14T15:21:36.790847Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a639e66703ee45745dc4057c7c2013ed9e1963a7'}
Linux
GSD-2022-1001468
ntfs: add sanity check on allocation size
ntfs: add sanity check on allocation size This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 115fae2c1566eacc5ad2055f72521354612e72c3. For more details please see the references link.
null
2022-04-25T05:21:49.163356Z
2022-04-24T21:15:18.471958Z
null
null
null
null
null
Linux
GSD-2021-1000555
tipc: wait and exit until all work queues are done
tipc: wait and exit until all work queues are done This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit b9f5b7ad4ac3af006443f535b1ce7bff1d130d7d, it was introduced in version v4.1 by commit d0f91938bede204a343473792529e0db7d599836. For more details please see the references link.
null
2021-12-19T23:08:25.980229Z
2021-06-04T19:38:04.904951Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0f91938bede204a343473792529e0db7d599836'}
Linux
GSD-2021-1002568
net/smc: fix wrong list_del in smc_lgr_cleanup_early
net/smc: fix wrong list_del in smc_lgr_cleanup_early This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.7 by commit 95518fe354d712dca6f431cf2a11b8f63bc9a66c, it was introduced in version v5.5 by commit a0a62ee15a829ebf8aeec55a4f1688230439b3e0. For more details please see the references link.
null
2021-12-20T00:59:32.479716Z
2021-12-19T19:43:09.670536Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a0a62ee15a829ebf8aeec55a4f1688230439b3e0'}
Linux
GSD-2021-1002092
mptcp: fix possible stall on recvmsg()
mptcp: fix possible stall on recvmsg() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit 1a4554e94f0deff9fc1dc5addf93fa579cc29711, it was introduced in version v5.6 by commit 7a6a6cbc3e592e339ad23e4e8ede9a3f6160bda8. For more details please see the references link.
null
2021-12-20T01:14:13.795718Z
2021-11-14T15:19:27.800646Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7a6a6cbc3e592e339ad23e4e8ede9a3f6160bda8'}
Linux
GSD-2022-1001038
ceph: fix memory leak in ceph_readdir when note_last_dentry returns error
ceph: fix memory leak in ceph_readdir when note_last_dentry returns error This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 7f740ede35132d3d5d19747cad56a511d21bb156. For more details please see the references link.
null
2022-04-25T06:38:07.182696Z
2022-04-24T20:41:40.888270Z
null
null
null
null
null
Linux
GSD-2022-1001891
crypto: ccree - Fix use after free in cc_cipher_exit()
crypto: ccree - Fix use after free in cc_cipher_exit() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 335bf1fc74f775a8255257aa3e33763f2257b676, it was introduced in version v4.17 by commit 63ee04c8b491ee148489347e7da9fbfd982ca2bb. For more details please see the references link.
null
2022-04-25T04:55:55.495170Z
2022-04-24T21:52:30.657798Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63ee04c8b491ee148489347e7da9fbfd982ca2bb'}
Linux
GSD-2022-1000783
riscv: Fix config KASAN && DEBUG_VIRTUAL
riscv: Fix config KASAN && DEBUG_VIRTUAL This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.27 by commit 728fb555882baf12399764c6a19b33c6a286410f, it was introduced in version v5.6 by commit 8ad8b72721d0f07fa02dbe71f901743f9c71c8e6. For more details please see the references link.
null
2022-03-18T02:56:43.679584Z
2022-03-18T00:17:48.501965Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ad8b72721d0f07fa02dbe71f901743f9c71c8e6'}
Linux
GSD-2021-1000806
wireguard: allowedips: free empty intermediate nodes when removing single node
wireguard: allowedips: free empty intermediate nodes when removing single node This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.10 by commit 5ceb59f40c094e6de1265c1d0e4bd560f692e272, it was introduced in version v5.6 by commit e7096c131e5161fa3b8e52a650d7719d2857adfd. For more details please see the references link.
null
2021-12-20T00:43:18.768642Z
2021-06-25T00:08:34.499105Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e7096c131e5161fa3b8e52a650d7719d2857adfd'}
Linux
GSD-2021-1001714
HID: betop: fix slab-out-of-bounds Write in betop_probe
HID: betop: fix slab-out-of-bounds Write in betop_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit 708107b80aa616976d1c5fa60ac0c1390749db5e. For more details please see the references link.
null
2021-12-20T00:07:09.051489Z
2021-10-19T16:33:11.364312Z
null
null
null
null
null
Linux
GSD-2022-1002244
powerpc: 8xx: fix a return value error in mpc8xx_pic_init
powerpc: 8xx: fix a return value error in mpc8xx_pic_init This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 6f259b1a4ab04261d9a471c9cc9ab8cd8d53007f, it was introduced in version v5.2 by commit cc76404feaed597bb4f5234d34d3f49e2d1139bf. For more details please see the references link.
null
2022-04-25T04:51:13.741527Z
2022-04-24T22:25:20.413860Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cc76404feaed597bb4f5234d34d3f49e2d1139bf'}
Linux
GSD-2022-1000279
selinux: fix double free of cond_list on error paths
selinux: fix double free of cond_list on error paths This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.22 by commit 70caa32e6d81f45f0702070c0e4dfe945e92fbd7. For more details please see the references link.
null
2022-02-20T02:07:40.793099Z
2022-02-18T22:05:31.454351Z
null
null
null
null
null
Linux
GSD-2021-1001344
cgroup: verify that source is a string
cgroup: verify that source is a string This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.134 by commit c17363ccd620c1a57ede00d5c777f0b8624debe6, it was introduced in version v5.1 by commit 8d2451f4994fa60a57617282bab91b98266a00b1. For more details please see the references link.
null
2021-12-19T22:49:34.050089Z
2021-08-03T02:13:41.184321Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8d2451f4994fa60a57617282bab91b98266a00b1'}
Linux
GSD-2022-1000629
powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending
powerpc/perf: Fix power_pmu_disable to call clear_pmi_irq_pending only if PMI is pending This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit fa4ad064a6bd49208221df5e62adf27b426d1720, it was introduced in version v5.16.3 by commit 215a90ce3754fe509efbce6b73a4bb643c7e7528. For more details please see the references link.
null
2022-03-07T01:43:50.393384Z
2022-02-27T03:33:09.852482Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/215a90ce3754fe509efbce6b73a4bb643c7e7528'}
Linux
GSD-2022-1002301
btrfs: fix qgroup reserve overflow the qgroup limit
btrfs: fix qgroup reserve overflow the qgroup limit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit f3d97b22a708bf9e3f3ac2ba232bcefd0b0c136b. For more details please see the references link.
null
2022-04-25T03:44:10.547802Z
2022-04-24T22:32:09.082302Z
null
null
null
null
null
Linux
GSD-2021-1000943
dm verity: fix require_signatures module_param permissions
dm verity: fix require_signatures module_param permissions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.44 by commit 90547d5db50bcb2705709e420e0af51535109113. For more details please see the references link.
null
2021-12-19T23:16:22.426704Z
2021-06-30T00:26:04.217050Z
null
null
null
null
null
Linux
GSD-2021-1001651
RDMA/cma: Fix listener leak in rdma_cma_listen_on_all() failure
RDMA/cma: Fix listener leak in rdma_cma_listen_on_all() failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.71 by commit 3f4e68902d2e545033c80d7ad62fd9a439e573f4, it was introduced in version v5.10.4 by commit 70ba8b1697e35c04ea5f22edb6e401aeb1208d96. For more details please see the references link.
null
2021-12-19T23:31:41.701926Z
2021-10-19T16:30:02.776155Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/70ba8b1697e35c04ea5f22edb6e401aeb1208d96'}
Linux
GSD-2022-1000296
libsubcmd: Fix use-after-free for realloc(..., 0)
libsubcmd: Fix use-after-free for realloc(..., 0) This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.303 by commit 3c5ba8d82f5c4df4fbe30e6c5fff49853dad19d1, it was introduced in version v4.5 by commit 2f4ce5ec1d447beb42143a9653716a2ab025161e. For more details please see the references link.
null
2022-03-07T01:43:07.924322Z
2022-02-27T02:47:42.240535Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2f4ce5ec1d447beb42143a9653716a2ab025161e'}
Linux
GSD-2021-1001201
scsi: megaraid_sas: Fix resource leak in case of probe failure
scsi: megaraid_sas: Fix resource leak in case of probe failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.4 by commit e623f79691c5104317669ab36ec316a90c05062f. For more details please see the references link.
null
2021-12-19T23:45:13.591350Z
2021-08-03T01:35:58.594542Z
null
null
null
null
null
Linux
GSD-2021-1002587
can: m_can: m_can_read_fifo: fix memory leak in error branch
can: m_can: m_can_read_fifo: fix memory leak in error branch This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.8 by commit 75a422165477dd12d2d20aa7c9ee7c9a281c9908, it was introduced in version v5.15 by commit e39381770ec9ca3c51d8b9bd9cc6e01d78ea974a. For more details please see the references link.
null
2021-12-19T22:20:47.820719Z
2021-12-19T19:43:54.185229Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e39381770ec9ca3c51d8b9bd9cc6e01d78ea974a'}
Linux
GSD-2022-1001487
net/sched: act_ct: fix ref leak when switching zones
net/sched: act_ct: fix ref leak when switching zones This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 4bb42d73def9411e5cad885b9811987d72431df1, it was introduced in version v5.16.12 by commit e9408de00e5ecd0dbe91cf061c7da23711c4febb. For more details please see the references link.
null
2022-04-25T06:16:52.176046Z
2022-04-24T21:16:14.220781Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e9408de00e5ecd0dbe91cf061c7da23711c4febb'}
Linux
GSD-2021-1000410
i40e: Fix use-after-free in i40e_client_subtask()
i40e: Fix use-after-free in i40e_client_subtask() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.120 by commit d718c15a2bf9ae082d5ae4d177fb19ef23cb4132, it was introduced in version v4.16 by commit 7b0b1a6d0ac983ce1928432285d0222d4fb7c38b. For more details please see the references link.
null
2021-12-19T23:12:39.604527Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7b0b1a6d0ac983ce1928432285d0222d4fb7c38b'}