ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2021-1001312
KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak
KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.136 by commit f38527f1890543cdfca8dfd06f75f9887cce6151, it was introduced in version v4.18 by commit b3cebfe8c1cadf1817939dcc3688a2504a69c662. For more details please see the references link.
null
2021-12-19T22:21:49.990349Z
2021-08-03T02:05:29.011865Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b3cebfe8c1cadf1817939dcc3688a2504a69c662'}
Linux
GSD-2022-1000385
mm: don't try to NUMA-migrate COW pages that have other uses
mm: don't try to NUMA-migrate COW pages that have other uses This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.102 by commit 254090925e16abd914c87b4ad1b489440d89c4c3, it was introduced in version v5.9 by commit 09854ba94c6aad7886996bfbee2530b3d8a7f4f4. For more details please see the references link.
null
2022-03-07T01:51:18.150158Z
2022-02-27T02:59:52.288023Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/09854ba94c6aad7886996bfbee2530b3d8a7f4f4'}
Linux
GSD-2022-1002212
mmc: host: Return an error when ->enable_sdio_irq() ops is missing
mmc: host: Return an error when ->enable_sdio_irq() ops is missing This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 95d65bca6eb9967aa5f6ed7a32e041b4f11ffbc2. For more details please see the references link.
null
2022-04-25T06:56:54.320471Z
2022-04-24T22:22:25.195220Z
null
null
null
null
null
Linux
GSD-2021-1000850
net/nfc/rawsock.c: fix a permission check bug
net/nfc/rawsock.c: fix a permission check bug This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.237 by commit 38cb2e23188af29c43966acee9dbb18b62e26cfe. For more details please see the references link.
null
2021-12-19T23:35:32.804778Z
2021-06-30T00:01:17.185580Z
null
null
null
null
null
Linux
GSD-2021-1001742
ASoC: SOF: Fix DSP oops stack dump output contents
ASoC: SOF: Fix DSP oops stack dump output contents This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit a6bb576ead074ca6fa3b53cb1c5d4037a23de81b, it was introduced in version v5.2 by commit e657c18a01c85d2c4ec0e96d52be8ba42b956593. For more details please see the references link.
null
2021-12-20T01:13:39.838915Z
2021-10-19T16:34:30.443951Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e657c18a01c85d2c4ec0e96d52be8ba42b956593'}
Linux
GSD-2021-1000503
platform/x86: ideapad-laptop: fix a NULL pointer dereference
platform/x86: ideapad-laptop: fix a NULL pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.7 by commit beab753fe3b4e087411a850a64c6cd748544d8a1, it was introduced in version v5.12 by commit ff36b0d953dc4cbc40a72945920ff8e805f1b0da. For more details please see the references link.
null
2021-12-19T23:22:57.739370Z
2021-05-31T23:47:14.556Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ff36b0d953dc4cbc40a72945920ff8e805f1b0da'}
Linux
GSD-2022-1001594
video: fbdev: sm712fb: Fix crash in smtcfb_read()
video: fbdev: sm712fb: Fix crash in smtcfb_read() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 34d986f6ee5f5ac48cd2b9e2d061196fd3c29d39. For more details please see the references link.
null
2022-04-25T05:36:55.893948Z
2022-04-24T21:27:03.809736Z
null
null
null
null
null
Linux
GSD-2021-1002494
mt76: mt7915: fix NULL pointer dereference in mt7915_get_phy_mode
mt76: mt7915: fix NULL pointer dereference in mt7915_get_phy_mode This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.84 by commit 932b338f4e5c4cb0c2ed640da3bced1e63620198, it was introduced in version v5.8 by commit 37f4ca907c462d7c8a1ac9e7e3473681b5f893dd. For more details please see the references link.
null
2021-12-19T22:37:06.590162Z
2021-12-19T19:39:48.115057Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/37f4ca907c462d7c8a1ac9e7e3473681b5f893dd'}
Linux
GSD-2021-1000153
vhost-vdpa: fix vm_flags for virtqueue doorbell mapping
vhost-vdpa: fix vm_flags for virtqueue doorbell mapping This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.36 by commit 3b8b6399666a29daa30b0bb3f5c9e3fc81c5a6a6, it was introduced in version v5.8 by commit ddd89d0a059d8e9740c75a97e0efe9bf07ee51f9. For more details please see the references link.
null
2021-12-19T22:16:19.535052Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ddd89d0a059d8e9740c75a97e0efe9bf07ee51f9'}
Linux
GSD-2021-1000446
i40e: Fix use-after-free in i40e_client_subtask()
i40e: Fix use-after-free in i40e_client_subtask() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.191 by commit c1322eaeb8af0d8985b5cc5fa759140fa0e57b84, it was introduced in version v4.16 by commit 7b0b1a6d0ac983ce1928432285d0222d4fb7c38b. For more details please see the references link.
null
2021-12-19T22:54:59.673420Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7b0b1a6d0ac983ce1928432285d0222d4fb7c38b'}
Linux
GSD-2021-1002181
mm, slub: fix potential use-after-free in slab_debugfs_fops
mm, slub: fix potential use-after-free in slab_debugfs_fops This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 67823a544414def2a36c212abadb55b23bcda00c, it was introduced in version v5.14 by commit 64dd68497be76ab4e237cca06f5324e220d0f050. For more details please see the references link.
null
2021-12-19T22:55:19.619661Z
2021-11-14T15:23:31.094759Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/64dd68497be76ab4e237cca06f5324e220d0f050'}
Linux
GSD-2021-1000016
libbpf: Fix potential NULL pointer dereference
libbpf: Fix potential NULL pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.16 by commit b33f7e0d5e86e1c758d76838ef7e831d99b176bf, it was introduced in version v5.11.14 by commit 00b6712eae9f046cb6f820a9ff9fd6b966f01f9c. For more details please see the references link.
null
2021-12-19T22:37:01.967103Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/00b6712eae9f046cb6f820a9ff9fd6b966f01f9c'}
Linux
GSD-2022-1001081
drm/amd/display: Fix memory leak
drm/amd/display: Fix memory leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 9d0bef3cc22cf250278ed45b829f062a00af9e27. For more details please see the references link.
null
2022-04-25T05:37:08.246146Z
2022-04-24T20:43:57.445834Z
null
null
null
null
null
Linux
GSD-2021-1001257
net: fddi: fix UAF in fza_probe
net: fddi: fix UAF in fza_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.53 by commit f33605908a9b6063525e9f68e62d739948c5fccf, it was introduced in version v4.20 by commit 61414f5ec9834df8aa4f55c90de16b71a3d6ca8d. For more details please see the references link.
null
2021-12-19T23:17:39.014573Z
2021-08-03T01:49:53.420746Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61414f5ec9834df8aa4f55c90de16b71a3d6ca8d'}
Linux
GSD-2022-1001828
powerpc/pseries: Fix use after free in remove_phb_dynamic()
powerpc/pseries: Fix use after free in remove_phb_dynamic() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 33d39efb61a84e055ca2386157d39ebbdf6b7d31, it was introduced in version v4.8 by commit 2dd9c11b9d4dfbd6c070eab7b81197f65e82f1a0. For more details please see the references link.
null
2022-04-25T04:17:08.449641Z
2022-04-24T21:45:54.866139Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2dd9c11b9d4dfbd6c070eab7b81197f65e82f1a0'}
Linux
GSD-2021-1000915
net: ipv4: fix memory leak in netlbl_cipsov4_add_std
net: ipv4: fix memory leak in netlbl_cipsov4_add_std This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.128 by commit 398a24447eb60f060c8994221cb5ae6caf355fa1, it was introduced in version v2.6.19 by commit 96cb8e3313c7a12e026c1ed510522ae6f6023875. For more details please see the references link.
null
2021-12-19T23:26:41.769901Z
2021-06-30T00:06:17.160815Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/96cb8e3313c7a12e026c1ed510522ae6f6023875'}
Linux
GSD-2021-1001607
bpf: Add oversize check before call kvcalloc()
bpf: Add oversize check before call kvcalloc() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.150 by commit 93937596e0652d50973f9dc944fea1694ac8cdfd. For more details please see the references link.
null
2021-12-19T22:19:13.734560Z
2021-10-19T16:27:59.963544Z
null
null
null
null
null
Linux
GSD-2022-1001982
drm/imx: Fix memory leak in imx_pd_connector_get_modes
drm/imx: Fix memory leak in imx_pd_connector_get_modes This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit f8b0ef0a5889890b50482b6593bd8de544736351, it was introduced in version v4.8 by commit 76ecd9c9fb24b014a6f33fbb1287ede3be12158b. For more details please see the references link.
null
2022-04-25T05:10:56.270124Z
2022-04-24T22:00:53.966059Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/76ecd9c9fb24b014a6f33fbb1287ede3be12158b'}
Linux
GSD-2022-1000690
btrfs: fallback to blocking mode when doing async dio over multiple extents
btrfs: fallback to blocking mode when doing async dio over multiple extents This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.13 by commit 91a5000bba81690cf92528f17577675a9c7cd185. For more details please see the references link.
null
2022-03-18T02:57:40.307105Z
2022-03-18T00:09:48.642322Z
null
null
null
null
null
Linux
GSD-2022-1002357
Bluetooth: hci_serdev: call init_rwsem() before p->open()
Bluetooth: hci_serdev: call init_rwsem() before p->open() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 7af24ae489f7932f8f6a9786f755578555c110aa, it was introduced in version v4.16 by commit d73e172816652772114827abaa2dbc053eecbbd7. For more details please see the references link.
null
2022-04-25T02:54:39.971990Z
2022-04-24T22:38:05.473905Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d73e172816652772114827abaa2dbc053eecbbd7'}
Linux
GSD-2022-1000405
lockdep: Correct lock_classes index mapping
lockdep: Correct lock_classes index mapping This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.102 by commit 6062d1267ff3e5570165c974bb0dc2120c9d363c, it was introduced in version v5.10 by commit f611e8cf98ec908b9c2c0da6064a660fc6022487. For more details please see the references link.
null
2022-03-07T01:35:09.760874Z
2022-02-27T03:02:10.252186Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f611e8cf98ec908b9c2c0da6064a660fc6022487'}
Linux
GSD-2022-1002438
scsi: pm8001: Fix abort all task initialization
scsi: pm8001: Fix abort all task initialization This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit d6ec4471550cc53e96485a7124c5891e6a38d1c3, it was introduced in version v3.10 by commit c6b9ef5779c3e1edfa9de949d2a51252bc347663. For more details please see the references link.
null
2022-04-25T06:33:41.516635Z
2022-04-24T22:47:28.895730Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6b9ef5779c3e1edfa9de949d2a51252bc347663'}
Linux
GSD-2021-1001492
atm: iphase: fix possible use-after-free in ia_module_exit()
atm: iphase: fix possible use-after-free in ia_module_exit() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.276 by commit 9e161687855175334ca93c6c3ccb221731194479. For more details please see the references link.
null
2021-12-19T22:25:55.728944Z
2021-08-03T02:57:46.955158Z
null
null
null
null
null
Linux
GSD-2021-1001168
ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions
ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.6 by commit 115784bcccf135c3a3548098153413d76f16aae0, it was introduced in version v5.3 by commit f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74. For more details please see the references link.
null
2021-12-20T00:04:19.079914Z
2021-08-03T01:31:58.368163Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74'}
Linux
GSD-2022-1000055
usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.
usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.13 by commit ebef2aa29f370b5096c16020c104e393192ef684, it was introduced in version v4.0 by commit 5e33f6fdf735cda1d4580fe6f1878da05718fe73. For more details please see the references link.
null
2022-01-11T05:55:14.678073Z
2022-01-10T19:52:04.384424Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5e33f6fdf735cda1d4580fe6f1878da05718fe73'}
Linux
GSD-2022-1002068
clk: qcom: ipq8074: fix PCI-E clock oops
clk: qcom: ipq8074: fix PCI-E clock oops This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 8b89c9e68a01a19a1dd689a42aa65d545e931899, it was introduced in version v5.9 by commit f0cfcf1ade201dcfd3365f231efc90e846fa46df. For more details please see the references link.
null
2022-04-25T05:19:01.491554Z
2022-04-24T22:07:27.535556Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f0cfcf1ade201dcfd3365f231efc90e846fa46df'}
Linux
GSD-2021-1001538
crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()
crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.249 by commit 3707e37b3fcef4d5e9a81b9c2c48ba7248051c2a, it was introduced in version v4.12 by commit 36cf515b9bbe298e1ce7384620f0d4ec45ad3328. For more details please see the references link.
null
2021-12-19T23:31:04.027890Z
2021-10-19T16:22:47.521090Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/36cf515b9bbe298e1ce7384620f0d4ec45ad3328'}
Linux
GSD-2022-1001214
powerpc/64s: Don't use DSISR for SLB faults
powerpc/64s: Don't use DSISR for SLB faults This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 093449bb182db885dae816d62874cccab7a4c42a, it was introduced in version v5.5 by commit 46ddcb3950a28c0df4815e8dbb8d4b91d5d9f22d. For more details please see the references link.
null
2022-04-25T05:03:34.830584Z
2022-04-24T20:54:22.764596Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/46ddcb3950a28c0df4815e8dbb8d4b91d5d9f22d'}
Linux
GSD-2021-1000283
spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware()
spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 6a2b5cee0d31ab6cc51030c441135b0e31217282, it was introduced in version v5.2 by commit 944c01a889d97dc08e1b71f4ed868f4023fd6034. For more details please see the references link.
null
2021-12-20T01:18:31.128859Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/944c01a889d97dc08e1b71f4ed868f4023fd6034'}
Linux
GSD-2021-1002744
drm/amd/pm: fix a potential gpu_metrics_table memory leak
drm/amd/pm: fix a potential gpu_metrics_table memory leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit 257b3bb16634fd936129fe2f57a91594a75b8751, it was introduced in version v5.10 by commit 95868b85764aff2dcbf78d3054076df75446ad15. For more details please see the references link.
null
2022-01-11T05:58:27.109739Z
2021-12-27T05:46:10.558507Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/95868b85764aff2dcbf78d3054076df75446ad15'}
Linux
GSD-2021-1000779
ext4: fix memory leak in ext4_mb_init_backend on error path.
ext4: fix memory leak in ext4_mb_init_backend on error path. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.43 by commit 2050c6e5b161e5e25ce3c420fef58b24fa388a49, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T23:49:57.375760Z
2021-06-25T00:05:04.089557Z
null
null
null
null
null
Linux
GSD-2022-1000956
ax25: Fix UAF bugs in ax25 timers
ax25: Fix UAF bugs in ax25 timers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.4 by commit 76ff66bb3b22f202c226ddbb0a811f8fb8aab2fa. For more details please see the references link.
null
2022-04-25T06:09:42.301752Z
2022-04-24T20:34:55.603807Z
null
null
null
null
null
Linux
GSD-2022-1001644
ARM: davinci: da850-evm: Avoid NULL pointer dereference
ARM: davinci: da850-evm: Avoid NULL pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.35 by commit 0940795c6834fbe7705acc5c3d4b2f7a5f67527a, it was introduced in version v2.6.33 by commit bae105879f2f2404155da6f50b3636193d228a62. For more details please see the references link.
null
2022-04-25T04:33:15.866882Z
2022-04-24T21:31:15.886699Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bae105879f2f2404155da6f50b3636193d228a62'}
Linux
GSD-2021-1002314
i40e: Fix NULL ptr dereference on VSI filter sync
i40e: Fix NULL ptr dereference on VSI filter sync This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit e91e8427a1e1633a0261e3bb0201c836ac5b3890, it was introduced in version v3.12 by commit 41c445ff0f482bb6e6b72dcee9e598e20575f743. For more details please see the references link.
null
2021-12-20T00:28:24.326993Z
2021-11-29T02:38:21.758216Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41c445ff0f482bb6e6b72dcee9e598e20575f743'}
Linux
GSD-2021-1000329
libbpf: Fix signed overflow in ringbuf_process_ring
libbpf: Fix signed overflow in ringbuf_process_ring This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.38 by commit 4aae6eb6af7d1ac2ee5762077892185884d8f169, it was introduced in version v5.8 by commit bf99c936f9478a05d51e9f101f90de70bee9a89c. For more details please see the references link.
null
2021-12-20T00:04:29.982476Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf99c936f9478a05d51e9f101f90de70bee9a89c'}
Linux
GSD-2021-1002601
aio: fix use-after-free due to missing POLLFREE handling
aio: fix use-after-free due to missing POLLFREE handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.8 by commit 60d311f9e6381d779d7d53371f87285698ecee24, it was introduced in version v4.18 by commit 2c14fa838cbefc23cf1c73ca167ed85b274b2913. For more details please see the references link.
null
2021-12-19T22:45:33.623156Z
2021-12-19T19:44:36.656571Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c14fa838cbefc23cf1c73ca167ed85b274b2913'}
Linux
GSD-2022-1001351
highmem: fix checks in __kmap_local_sched_{in,out}
highmem: fix checks in __kmap_local_sched_{in,out} This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 85550b0f5fa5dd3c30469ea702c44444ef242c83, it was introduced in version v5.11 by commit 5fbda3ecd14a5343644979c98d6eb65b7e7de9d8. For more details please see the references link.
null
2022-04-25T07:58:43.409566Z
2022-04-24T21:06:46.140884Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5fbda3ecd14a5343644979c98d6eb65b7e7de9d8'}
Linux
GSD-2021-1002251
usb: host: ohci-tmio: check return value after calling platform_get_resource()
usb: host: ohci-tmio: check return value after calling platform_get_resource() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.218 by commit 951b8239fd24678b56c995c5c0456ab12e059d19. For more details please see the references link.
null
2021-12-19T23:50:28.392322Z
2021-11-29T02:35:25.364620Z
null
null
null
null
null
Linux
GSD-2022-1000813
bpf: Fix crash due to incorrect copy_map_value
bpf: Fix crash due to incorrect copy_map_value This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.26 by commit 719d1c2524c89ada78c4c9202641c1d9e942a322, it was introduced in version v5.15 by commit 68134668c17f31f51930478f75495b552a411550. For more details please see the references link.
null
2022-03-18T03:04:47.787664Z
2022-03-18T00:20:58.103748Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/68134668c17f31f51930478f75495b552a411550'}
Linux
GSD-2022-1001701
xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu>=32
xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu>=32 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 5c0750cad73350e1c504eb91a94093a79f6f6296. For more details please see the references link.
null
2022-04-25T06:27:05.189559Z
2022-04-24T21:36:24.454824Z
null
null
null
null
null
Linux
GSD-2021-1001884
can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv
can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit 6e8811707e2df0c6ba920f0cad3a3bca7b42132f, it was introduced in version v5.4 by commit 9d71dd0c70099914fcd063135da3c580865e924c. For more details please see the references link.
null
2021-12-19T22:01:34.341505Z
2021-10-28T13:53:51.715964Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9d71dd0c70099914fcd063135da3c580865e924c'}
Linux
GSD-2021-1000796
net/tls: Fix use-after-free after the TLS device goes down and up
net/tls: Fix use-after-free after the TLS device goes down and up This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.10 by commit 0f1e6fe66977a864fe850522316f713d7b926fd9, it was introduced in version v4.18 by commit e8f69799810c32dd40c6724d829eccc70baad07f. For more details please see the references link.
null
2021-12-19T22:31:14.632598Z
2021-06-25T00:07:56.472471Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e8f69799810c32dd40c6724d829eccc70baad07f'}
Linux
GSD-2022-1002087
power: supply: wm8350-power: Add missing free in free_charger_irq
power: supply: wm8350-power: Add missing free in free_charger_irq This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 48d23ef90116c8c702bfa4cad93744e4e5588d7d, it was introduced in version v2.6.29 by commit 14431aa0c5a443d13d24e6f865a8838f97dab973. For more details please see the references link.
null
2022-04-25T04:00:23.543609Z
2022-04-24T22:09:35.416608Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/14431aa0c5a443d13d24e6f865a8838f97dab973'}
Linux
GSD-2022-1000540
nvme: fix a possible use-after-free in controller reset during load
nvme: fix a possible use-after-free in controller reset during load This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit 9e956a2596ae276124ef0d96829c013dd0faf861. For more details please see the references link.
null
2022-03-07T01:37:04.910304Z
2022-02-27T03:21:04.170275Z
null
null
null
null
null
Linux
GSD-2022-1000110
ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx()
ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.265 by commit 4977491e4b3aad8567f57e2a9992d251410c1db3. For more details please see the references link.
null
2022-02-19T04:00:47.269889Z
2022-02-18T21:42:12.539542Z
null
null
null
null
null
Linux
GSD-2021-1001187
arch_topology: Avoid use-after-free for scale_freq_data
arch_topology: Avoid use-after-free for scale_freq_data This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.4 by commit ccdf7e073170886bc370c613e269de610a794c4a, it was introduced in version v5.13 by commit 01e055c120a46e78650b5f903088badbbdaae9ad. For more details please see the references link.
null
2021-12-20T00:01:53.979741Z
2021-08-03T01:33:24.769357Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/01e055c120a46e78650b5f903088badbbdaae9ad'}
Linux
GSD-2021-1000145
openvswitch: fix stack OOB read while fragmenting IPv4 packets
openvswitch: fix stack OOB read while fragmenting IPv4 packets This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.36 by commit a1478374b0bda89b4277a8afd39208271faad4be, it was introduced in version v4.16 by commit d52e5a7e7ca49457dd31fc8b42fb7c0d58a31221. For more details please see the references link.
null
2021-12-20T00:17:52.331911Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d52e5a7e7ca49457dd31fc8b42fb7c0d58a31221'}
Linux
GSD-2021-1002178
powerpc/idle: Don't corrupt back chain when going idle
powerpc/idle: Don't corrupt back chain when going idle This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 496c5fe25c377ddb7815c4ce8ecfb676f051e9b6, it was introduced in version v5.15 by commit 9b4416c5095c20e110c82ae602c254099b83b72f. For more details please see the references link.
null
2021-11-14T15:23:24.032950Z
2021-11-14T15:23:24.032950Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9b4416c5095c20e110c82ae602c254099b83b72f'}
Linux
GSD-2021-1002482
drm/amd/amdkfd: Fix kernel panic when reset failed and been triggered again
drm/amd/amdkfd: Fix kernel panic when reset failed and been triggered again This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.84 by commit 74aafe99efb68f15e50be9f7032c2168512f98a8. For more details please see the references link.
null
2021-12-19T23:53:33.407270Z
2021-12-19T19:39:18.359530Z
null
null
null
null
null
Linux
GSD-2022-1001428
block: Fix the maximum minor value is blk_alloc_ext_minor()
block: Fix the maximum minor value is blk_alloc_ext_minor() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 0f8cf8f5ccbad25ed6828875b222dbab29d5c272, it was introduced in version v5.11 by commit 22ae8ce8b89241c94ac00c237752c0ffa37ba5ae. For more details please see the references link.
null
2022-04-25T03:11:30.787902Z
2022-04-24T21:12:15.200764Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/22ae8ce8b89241c94ac00c237752c0ffa37ba5ae'}
Linux
GSD-2022-1001582
watch_queue: Actually free the watch
watch_queue: Actually free the watch This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 7e8c9b0df07a77f0d072603b8ced2677e30e1893, it was introduced in version v5.8 by commit c73be61cede5882f9605a852414db559c0ebedfd. For more details please see the references link.
null
2022-04-25T03:37:26.283333Z
2022-04-24T21:26:04.981511Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c73be61cede5882f9605a852414db559c0ebedfd'}
Linux
GSD-2021-1000515
platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios
platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.122 by commit 6fa78a6b9a3beb676a010dc489c1257f7e432525, it was introduced in version v4.15 by commit 1a258e670434f404a4500b65ba1afea2c2b29bba. For more details please see the references link.
null
2021-12-19T23:30:09.039693Z
2021-05-31T23:49:03.572924Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1a258e670434f404a4500b65ba1afea2c2b29bba'}
Linux
GSD-2021-1002528
ksmbd: fix memleak in get_file_stream_info()
ksmbd: fix memleak in get_file_stream_info() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.6 by commit 11e659827c3a2facb3a04e08cc97ff14d5091f51, it was introduced in version v5.15 by commit 34061d6b76a41b1e43c19e1e50d98e5d77f77d4e. For more details please see the references link.
null
2021-12-19T23:23:48.204719Z
2021-12-19T19:41:15.925980Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/34061d6b76a41b1e43c19e1e50d98e5d77f77d4e'}
Linux
GSD-2022-1001078
mlxsw: spectrum: Guard against invalid local ports
mlxsw: spectrum: Guard against invalid local ports This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 4cad27ba2e5a5843a7fab5aa30de2b8e8c3db3a8. For more details please see the references link.
null
2022-04-25T05:51:12.732009Z
2022-04-24T20:43:48.841383Z
null
null
null
null
null
Linux
GSD-2021-1001754
mptcp: ensure tx skbs always have the MPTCP ext
mptcp: ensure tx skbs always have the MPTCP ext This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.9 by commit f8ff625a8082db8c2b58dcb5229b27928943b94b, it was introduced in version v5.14.7 by commit e35820fb56415be6924bf552ec223ed5f347b4be. For more details please see the references link.
null
2021-12-19T23:51:49.736136Z
2021-10-19T16:35:06.874694Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e35820fb56415be6924bf552ec223ed5f347b4be'}
Linux
GSD-2021-1000846
usb: fix various gadget panics on 10gbps cabling
usb: fix various gadget panics on 10gbps cabling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.273 by commit fd24be23abf3e94260be0f00bb42c7e91d495f87. For more details please see the references link.
null
2021-12-19T22:50:28.230173Z
2021-06-30T00:01:02.306823Z
null
null
null
null
null
Linux
GSD-2022-1002204
ACPI: CPPC: Avoid out of bounds access when parsing _CPC data
ACPI: CPPC: Avoid out of bounds access when parsing _CPC data This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit cb249f8c00f40dba83b7da8207ac14ca46e9ec9e, it was introduced in version v4.4 by commit 337aadff8e4567e39669e07d9a88b789d78458b5. For more details please see the references link.
null
2022-04-25T06:46:48.920218Z
2022-04-24T22:21:30.443071Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/337aadff8e4567e39669e07d9a88b789d78458b5'}
Linux
GSD-2022-1000239
drm/vmwgfx: Fix stale file descriptors on failed usercopy
drm/vmwgfx: Fix stale file descriptors on failed usercopy This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.18 by commit 6066977961fc6f437bc064f628cf9b0e4571c56c, it was introduced in version v4.14 by commit c906965dee22d5e95d0651759ba107b420212a9f. For more details please see the references link.
null
2022-02-20T02:05:15.755440Z
2022-02-18T22:00:01.585027Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c906965dee22d5e95d0651759ba107b420212a9f'}
Linux
GSD-2022-1000393
iwlwifi: fix use-after-free
iwlwifi: fix use-after-free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.102 by commit 008508c16af0087cda0394e1ac6f0493b01b6063, it was introduced in version v5.10.94 by commit febab6b60d61d13cd9f30a2991deea56df39567d. For more details please see the references link.
null
2022-03-07T01:32:01.847105Z
2022-02-27T03:00:47.118552Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/febab6b60d61d13cd9f30a2991deea56df39567d'}
Linux
GSD-2021-1001304
atm: iphase: fix possible use-after-free in ia_module_exit()
atm: iphase: fix possible use-after-free in ia_module_exit() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.51 by commit e759ff76ebbbfcdcf83b6634c54dc47828573d8b. For more details please see the references link.
null
2021-12-20T01:05:40.422587Z
2021-08-03T02:02:42.933654Z
null
null
null
null
null
Linux
GSD-2022-1000669
iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping()
iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.8 by commit b62eceb5f8f08815fe3f945fc55bbf997c344ecd, it was introduced in version v5.8 by commit e3beca48a45b5e0e6e6a4e0124276b8248dcc9bb. For more details please see the references link.
null
2022-03-07T01:34:59.566944Z
2022-02-27T03:38:58.945630Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e3beca48a45b5e0e6e6a4e0124276b8248dcc9bb'}
Linux
GSD-2022-1002341
bfq: fix use-after-free in bfq_dispatch_request
bfq: fix use-after-free in bfq_dispatch_request This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 74e610b5ee0d95e751280567100509eb11517efa. For more details please see the references link.
null
2022-04-25T04:57:32.624550Z
2022-04-24T22:35:48.315249Z
null
null
null
null
null
Linux
GSD-2022-1000686
xen/gnttab: fix gnttab_end_foreign_access() without page specified
xen/gnttab: fix gnttab_end_foreign_access() without page specified This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.14 by commit 6d168929b4c497a8c1945dd71e467b2db12bbad2. For more details please see the references link.
null
2022-03-18T02:57:27.047633Z
2022-03-18T00:09:39.154865Z
null
null
null
null
null
Linux
GSD-2022-1001994
staging: vchiq_core: handle NULL result of find_service_by_handle
staging: vchiq_core: handle NULL result of find_service_by_handle This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit aa0b7296785312a4bfa8fac0ba8ad78698fd9fcf. For more details please see the references link.
null
2022-04-25T05:38:57.106137Z
2022-04-24T22:01:47.341081Z
null
null
null
null
null
Linux
GSD-2021-1001611
irqchip/gic-v3-its: Fix potential VPE leak on error
irqchip/gic-v3-its: Fix potential VPE leak on error This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.150 by commit 42d3711c23781045e7a5cd28536c774b9a66d20b, it was introduced in version v4.14 by commit 7d75bbb4bc1ad90386776459d37e4ddfe605671e. For more details please see the references link.
null
2021-12-20T01:21:21.559136Z
2021-10-19T16:28:10.921367Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7d75bbb4bc1ad90386776459d37e4ddfe605671e'}
Linux
GSD-2021-1000903
KVM: x86: Ensure liveliness of nested VM-Enter fail tracepoint message
KVM: x86: Ensure liveliness of nested VM-Enter fail tracepoint message This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.126 by commit 796d3bd4ac9316e70c181189318cd2bd98af34bc, it was introduced in version v5.4 by commit 380e0055bc7e4a5c687436ba3ccebb4667836b95. For more details please see the references link.
null
2021-12-20T00:29:35.410934Z
2021-06-30T00:05:32.015905Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/380e0055bc7e4a5c687436ba3ccebb4667836b95'}
Linux
GSD-2021-1001241
netrom: Decrease sock refcount when sock timers expire
netrom: Decrease sock refcount when sock timers expire This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.54 by commit 6811744bd0efb9e472cb15d066cdb460beb8cb8a, it was introduced in version v5.0 by commit 63346650c1a94a92be61a57416ac88c0a47c4327. For more details please see the references link.
null
2021-12-20T00:08:31.923817Z
2021-08-03T01:46:36.656675Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63346650c1a94a92be61a57416ac88c0a47c4327'}
Linux
GSD-2022-1001097
ax25: fix UAF bug in ax25_send_control()
ax25: fix UAF bug in ax25_send_control() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 01619aa347d35ac8b79751757784ec6f507a3215, it was introduced in version v5.17.2 by commit 534156dd4ed768e30a43de0036f45dca7c54818f. For more details please see the references link.
null
2022-04-24T20:45:00.473488Z
2022-04-24T20:45:00.473488Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/534156dd4ed768e30a43de0036f45dca7c54818f'}
Linux
GSD-2021-1002197
drm/ttm: fix memleak in ttm_transfered_destroy
drm/ttm: fix memleak in ttm_transfered_destroy This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 0db55f9a1bafbe3dac750ea669de9134922389b5. For more details please see the references link.
null
2021-12-19T22:46:42.425683Z
2021-11-14T15:24:18.174439Z
null
null
null
null
null
Linux
GSD-2021-1000450
ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook
ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.191 by commit a9938d6d78a238d6ab8de57a4d3dcf77adceb9bb, it was introduced in version v4.7 by commit 1879445dfa7bbd6fe21b09c5cc72f4934798afed. For more details please see the references link.
null
2021-12-19T23:51:01.965081Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1879445dfa7bbd6fe21b09c5cc72f4934798afed'}
Linux
GSD-2021-1002343
staging: rtl8723bs: remove a third possible deadlock
staging: rtl8723bs: remove a third possible deadlock This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit d330f1d4f797b05c85eaa76ad1db114f7214bd61. For more details please see the references link.
null
2021-12-20T01:00:58.103108Z
2021-11-29T02:39:40.859409Z
null
null
null
null
null
Linux
GSD-2022-1000901
xfrm: fix MTU regression
xfrm: fix MTU regression This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.233 by commit 20fe64c54412ca42efb9ba07f856ed8cac6e007e, it was introduced in version v4.15 by commit 749439bfac6e1a2932c582e2699f91d329658196. For more details please see the references link.
null
2022-03-18T02:54:51.427370Z
2022-03-18T00:29:57.286897Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/749439bfac6e1a2932c582e2699f91d329658196'}
Linux
GSD-2022-1001613
mm: invalidate hwpoison page cache page in fault path
mm: invalidate hwpoison page cache page in fault path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit d66a7ce91383e1910fd6bcae038a27771d5630f0. For more details please see the references link.
null
2022-04-25T06:02:49.275370Z
2022-04-24T21:28:14.319891Z
null
null
null
null
null
Linux
GSD-2021-1001996
comedi: vmk80xx: fix bulk-buffer overflow
comedi: vmk80xx: fix bulk-buffer overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.217 by commit 063f576c43d589a4c153554b681d32b3f8317c7b, it was introduced in version v2.6.31 by commit 985cafccbf9b7f862aa1c5ee566801e18b5161fb. For more details please see the references link.
null
2021-12-20T00:35:11.240381Z
2021-11-14T15:15:07.384631Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/985cafccbf9b7f862aa1c5ee566801e18b5161fb'}
Linux
GSD-2021-1000684
NFC: nci: fix memory leak in nci_allocate_device
NFC: nci: fix memory leak in nci_allocate_device This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.235 by commit 2c2fb2df46ea866b49fea5ec7112ec3cd4896c74, it was introduced in version v4.0 by commit 11f54f228643d0248ec00ce8c9fb8d872f87e7b8. For more details please see the references link.
null
2021-12-19T23:19:27.502555Z
2021-06-04T20:01:52.524678Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/11f54f228643d0248ec00ce8c9fb8d872f87e7b8'}
Linux
GSD-2021-1002713
ovl: fix warning in ovl_create_real()
ovl: fix warning in ovl_create_real() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.88 by commit 6859985a2fbda5d1586bf44538853e1be69e85f7. For more details please see the references link.
null
2022-01-11T06:48:25.921745Z
2021-12-27T05:38:30.146294Z
null
null
null
null
null
Linux
GSD-2022-1001243
Bluetooth: hci_serdev: call init_rwsem() before p->open()
Bluetooth: hci_serdev: call init_rwsem() before p->open() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit c6049161291737242d5a008bd8ebe0409b175a43, it was introduced in version v4.16 by commit d73e172816652772114827abaa2dbc053eecbbd7. For more details please see the references link.
null
2022-04-25T06:31:15.352160Z
2022-04-24T20:57:16.273863Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d73e172816652772114827abaa2dbc053eecbbd7'}
Linux
GSD-2021-1001095
nilfs2: fix memory leak in nilfs_sysfs_delete_device_group
nilfs2: fix memory leak in nilfs_sysfs_delete_device_group This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.274 by commit 7bbb84c72484db9f95c63d523425c2189fb06b29, it was introduced in version v3.17 by commit da7141fb78db915680616e15677539fc8140cf53. For more details please see the references link.
null
2021-12-20T00:33:34.273048Z
2021-07-08T01:55:59.524474Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/da7141fb78db915680616e15677539fc8140cf53'}
Linux
GSD-2022-1002195
mips: ralink: fix a refcount leak in ill_acc_of_setup()
mips: ralink: fix a refcount leak in ill_acc_of_setup() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 060a485df4ec1183d543317511cb4caa43468b5d. For more details please see the references link.
null
2022-04-25T06:07:41.951474Z
2022-04-24T22:20:40.427887Z
null
null
null
null
null
Linux
GSD-2022-1000452
scsi: pm8001: Fix use-after-free for aborted TMF sas_task
scsi: pm8001: Fix use-after-free for aborted TMF sas_task This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit 3c334cdfd94945b8edb94022a0371a8665b17366. For more details please see the references link.
null
2022-03-07T01:40:22.292278Z
2022-02-27T03:08:58.543247Z
null
null
null
null
null
Linux
GSD-2022-1000147
Bluetooth: refactor malicious adv data check
Bluetooth: refactor malicious adv data check This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.176 by commit 835d3706852537bf92eb23eb8635b8dee0c0aa67. For more details please see the references link.
null
2022-02-19T03:07:06.543115Z
2022-02-18T21:47:13.066301Z
null
null
null
null
null
Linux
GSD-2022-1002480
iommu/arm-smmu-v3: fix event handling soft lockup
iommu/arm-smmu-v3: fix event handling soft lockup This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit ffa0495a506d5edbd1b4ad45a2759bc080856695. For more details please see the references link.
null
2022-04-25T05:23:45.590222Z
2022-04-24T22:52:51.017086Z
null
null
null
null
null
Linux
GSD-2022-1000517
net: fix a memleak when uncloning an skb dst and its metadata
net: fix a memleak when uncloning an skb dst and its metadata This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 8b1087b998e273f07be13dcb5f3ca4c309c7f108, it was introduced in version v4.3 by commit fc4099f17240767554ff3a73977acb78ef615404. For more details please see the references link.
null
2022-03-07T01:39:35.881362Z
2022-02-27T03:17:38.560149Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fc4099f17240767554ff3a73977acb78ef615404'}
Linux
GSD-2021-1001580
drm/nouveau/debugfs: fix file release memory leak
drm/nouveau/debugfs: fix file release memory leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.153 by commit 11cd944bb87d9e575b94c07c952105eda745b459, it was introduced in version v4.5 by commit 6e9fc177399f08446293fec7607913fdbc95e191. For more details please see the references link.
null
2021-12-19T22:11:55.446329Z
2021-10-19T16:24:42.842290Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6e9fc177399f08446293fec7607913fdbc95e191'}
Linux
GSD-2022-1000844
riscv: Fix config KASAN && SPARSEMEM && !SPARSE_VMEMMAP
riscv: Fix config KASAN && SPARSEMEM && !SPARSE_VMEMMAP This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.104 by commit 7211aab2881b0a8b6a002ec2eb341b2d3cb9f003, it was introduced in version v5.6 by commit 8ad8b72721d0f07fa02dbe71f901743f9c71c8e6. For more details please see the references link.
null
2022-03-18T02:54:40.094388Z
2022-03-18T00:23:19.962957Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ad8b72721d0f07fa02dbe71f901743f9c71c8e6'}
Linux
GSD-2022-1001756
rxrpc: fix some null-ptr-deref bugs in server_key.c
rxrpc: fix some null-ptr-deref bugs in server_key.c This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 432297011caf71dbc95c3365a65adf365e79aff3, it was introduced in version v5.11 by commit 12da59fcab5a05d01773e7cb413b8b8f3bb4e334. For more details please see the references link.
null
2022-04-25T08:35:16.739394Z
2022-04-24T21:39:59.572286Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/12da59fcab5a05d01773e7cb413b8b8f3bb4e334'}
Linux
GSD-2021-1002206
net: batman-adv: fix error handling
net: batman-adv: fix error handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 6f68cd634856f8ca93bafd623ba5357e0f648c68, it was introduced in version v2.6.38 by commit c6c8fea29769d998d94fcec9b9f14d4b52b349d3. For more details please see the references link.
null
2021-12-19T23:06:54.160240Z
2021-11-14T15:24:40.205176Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6c8fea29769d998d94fcec9b9f14d4b52b349d3'}
Linux
GSD-2022-1001306
ocfs2: fix crash when mount with quota enabled
ocfs2: fix crash when mount with quota enabled This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit eda31f77317647b9fbf889779ee1fb6907651865, it was introduced in version v5.15 by commit 6c85c2c728193d19d6a908ae9fb312d0325e65ca. For more details please see the references link.
null
2022-04-25T04:34:48.694861Z
2022-04-24T21:02:39.538326Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6c85c2c728193d19d6a908ae9fb312d0325e65ca'}
Linux
GSD-2021-1000391
spi: stm32: Fix use-after-free on unbind
spi: stm32: Fix use-after-free on unbind This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 05b3f9b0ac32fb3714efa13270700868b3000019, it was introduced in version v5.10.37 by commit 0390f6f1d0bcd36d0ab22367498cc2c4619c05d8. For more details please see the references link.
null
2021-06-24T22:55:39.227901Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0390f6f1d0bcd36d0ab22367498cc2c4619c05d8'}
Linux
GSD-2021-1001979
can: peak_pci: peak_pci_remove(): fix UAF
can: peak_pci: peak_pci_remove(): fix UAF This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.214 by commit adbda14730aacce41c0d3596415aa39ad63eafd9, it was introduced in version v3.4 by commit e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd. For more details please see the references link.
null
2021-12-19T22:25:04.614240Z
2021-11-14T15:14:24.150021Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd'}
Linux
GSD-2021-1002656
sit: do not call ipip6_dev_free() from sit_init_net()
sit: do not call ipip6_dev_free() from sit_init_net() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.222 by commit e56b65c1e74d7f706d74b51baba15187be2fb4b5, it was introduced in version v4.12 by commit cf124db566e6b036b8bcbe8decbed740bdfac8c6. For more details please see the references link.
null
2022-01-11T05:51:59.520872Z
2021-12-27T05:33:27.494291Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cf124db566e6b036b8bcbe8decbed740bdfac8c6'}
Linux
GSD-2021-1001353
wl1251: Fix possible buffer overflow in wl1251_cmd_scan
wl1251: Fix possible buffer overflow in wl1251_cmd_scan This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.133 by commit d71dddeb5380613f9ef199f3e7368fd78fb1a46e. For more details please see the references link.
null
2021-12-19T22:40:08.531532Z
2021-08-03T02:15:57.250961Z
null
null
null
null
null
Linux
GSD-2022-1002253
ath9k_htc: fix uninit value bugs
ath9k_htc: fix uninit value bugs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 4d244b731188e0b63fc40a9d2dec72e9181fb37c, it was introduced in version v2.6.35 by commit fb9987d0f748c983bb795a86f47522313f701a08. For more details please see the references link.
null
2022-04-25T06:21:36.447507Z
2022-04-24T22:26:36.714353Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb9987d0f748c983bb795a86f47522313f701a08'}
Linux
GSD-2022-1000794
RDMA/cma: Do not change route.addr.src_addr outside state checks
RDMA/cma: Do not change route.addr.src_addr outside state checks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.26 by commit 00265efbd3e5705038c9492a434fda8cf960c8a2, it was introduced in version v5.10 by commit 732d41c545bb359cbb8c94698bdc1f8bcf82279c. For more details please see the references link.
null
2022-03-18T03:00:09.649455Z
2022-03-18T00:18:27.047415Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/732d41c545bb359cbb8c94698bdc1f8bcf82279c'}
Linux
GSD-2022-1001886
f2fs: fix compressed file start atomic write may cause data corruption
f2fs: fix compressed file start atomic write may cause data corruption This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 0f42a02e4773efc4f1edf202fc73d0cd14e8fb09, it was introduced in version v5.6 by commit 4c8ff7095bef64fc47e996a938f7d57f9e077da3. For more details please see the references link.
null
2022-04-25T04:38:45.736092Z
2022-04-24T21:52:01.343091Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4c8ff7095bef64fc47e996a938f7d57f9e077da3'}
Linux
GSD-2021-1001703
swiotlb-xen: ensure to issue well-formed XENMEM_exchange requests
swiotlb-xen: ensure to issue well-formed XENMEM_exchange requests This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.11 by commit 2e4a7695c8df896ad325610a87a776f185c62ee1. For more details please see the references link.
null
2021-12-20T01:08:58.416868Z
2021-10-19T16:32:41.117945Z
null
null
null
null
null
Linux
GSD-2021-1000811
ext4: fix memory leak in ext4_fill_super
ext4: fix memory leak in ext4_fill_super This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.10 by commit 1385b23396d511d5233b8b921ac3058b3f86a5e1, it was introduced in version v2.6.25 by commit ce40733ce93de402ed629762f0e912d9af187cef. For more details please see the references link.
null
2021-12-20T01:04:50.757391Z
2021-06-25T00:08:53.223555Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ce40733ce93de402ed629762f0e912d9af187cef'}
Linux
GSD-2021-1002085
net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path
net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit ed8aafea4fec9c654e63445236e0b505e27ed3a7, it was introduced in version v3.11 by commit e126ba97dba9edeb6fafa3665b5f8497fc9cdf8c. For more details please see the references link.
null
2021-12-20T00:48:56.877177Z
2021-11-14T15:19:10.843043Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e126ba97dba9edeb6fafa3665b5f8497fc9cdf8c'}
Linux
GSD-2021-1000542
ptp: ocp: Fix a resource leak in an error handling path
ptp: ocp: Fix a resource leak in an error handling path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit 0e38e702f1152479e6afac34f151dbfd99417f99, it was introduced in version v5.11 by commit a7e1abad13f3f0366ee625831fecda2b603cdc17. For more details please see the references link.
null
2021-12-20T00:55:31.003525Z
2021-06-04T19:35:50.406812Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a7e1abad13f3f0366ee625831fecda2b603cdc17'}
Linux
GSD-2022-1001185
clk: qcom: ipq8074: fix PCI-E clock oops
clk: qcom: ipq8074: fix PCI-E clock oops This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 5a5576ad405c3c89fc9afb245c4dcc3e412b0aa9, it was introduced in version v5.9 by commit f0cfcf1ade201dcfd3365f231efc90e846fa46df. For more details please see the references link.
null
2022-04-25T03:15:41.316661Z
2022-04-24T20:51:54.252129Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f0cfcf1ade201dcfd3365f231efc90e846fa46df'}