ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2021-1000112
cifs: fix regression when mounting shares with prefix paths
cifs: fix regression when mounting shares with prefix paths This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.20 by commit e69ceb7d193d8af1d312880f33a52d7df3a413bf, it was introduced in version v5.11.20 by commit a69d17010f9c18b24ef6266a154b9a20d195d815. For more details please see the references link.
null
2021-06-24T22:55:39.097434Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a69d17010f9c18b24ef6266a154b9a20d195d815'}
Linux
GSD-2022-1001490
net/x25: Fix null-ptr-deref caused by x25_disconnect
net/x25: Fix null-ptr-deref caused by x25_disconnect This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 4a279d7ee1c65411b4055ecd428b8aa2b1711c1f, it was introduced in version v5.7 by commit 4becb7ee5b3d2829ed7b9261a245a77d5b7de902. For more details please see the references link.
null
2022-04-25T06:32:13.104915Z
2022-04-24T21:16:30.264667Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4becb7ee5b3d2829ed7b9261a245a77d5b7de902'}
Linux
GSD-2021-1000407
userfaultfd: release page in error path to avoid BUG_ON
userfaultfd: release page in error path to avoid BUG_ON This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.120 by commit b3f1731c6d7fbc1ebe3ed8eff6d6bec56d76ff43, it was introduced in version v4.11 by commit cb658a453b9327ce96ce5222c24d162b5b65b564. For more details please see the references link.
null
2021-12-19T22:03:16.072158Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cb658a453b9327ce96ce5222c24d162b5b65b564'}
Linux
GSD-2021-1000057
io_uring: fix shared sqpoll cancellation hangs
io_uring: fix shared sqpoll cancellation hangs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.3 by commit cb5e0b3d0f993a6268c1a2c7ede2f9aa0c17ef68, it was introduced in version v5.12 by commit 37d1e2e3642e2380750d7f35279180826f29660e. For more details please see the references link.
null
2021-12-19T23:38:22.305428Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/37d1e2e3642e2380750d7f35279180826f29660e'}
Linux
GSD-2021-1002590
nfp: Fix memory leak in nfp_cpp_area_cache_add()
nfp: Fix memory leak in nfp_cpp_area_cache_add() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.8 by commit f707820c09239d6f67699d9b2ff57863cc7905b0, it was introduced in version v4.11 by commit 4cb584e0ee7df70fd0376aee60cf701855ea8c81. For more details please see the references link.
null
2021-12-19T22:49:13.397969Z
2021-12-19T19:44:01.792616Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4cb584e0ee7df70fd0376aee60cf701855ea8c81'}
Linux
GSD-2022-1000281
ASoC: ops: Reject out of bounds values in snd_soc_put_volsw()
ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.22 by commit 9e8895f1b3d4433f6d78aa6578e9db61ca6e6830. For more details please see the references link.
null
2022-02-19T09:24:51.496694Z
2022-02-18T22:05:45.546540Z
null
null
null
null
null
Linux
GSD-2021-1001216
ext4: fix possible UAF when remounting r/o a mmp-protected file system
ext4: fix possible UAF when remounting r/o a mmp-protected file system This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.3 by commit 7ed572cdf11081f8f9e07abd4bea56a3f2c4edbd. For more details please see the references link.
null
2021-12-19T23:21:54.980377Z
2021-08-03T01:38:48.739252Z
null
null
null
null
null
Linux
GSD-2022-1001869
ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data
ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 2f44eca78cc6d4e1779eb95765ec79e433accab4, it was introduced in version v5.6 by commit a61f3b4f476eceb25274161e5a53a8d18e42610b. For more details please see the references link.
null
2022-04-25T05:04:38.739390Z
2022-04-24T21:50:02.321987Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a61f3b4f476eceb25274161e5a53a8d18e42610b'}
Linux
GSD-2021-1001646
ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup
ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.71 by commit 20f6c4a31a525edd9ea6243712b868ba0e4e331e, it was introduced in version v5.0 by commit 4a9b32f30f805ca596d76605903a48eab58e0b88. For more details please see the references link.
null
2021-12-20T01:14:45.925754Z
2021-10-19T16:29:48.347640Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4a9b32f30f805ca596d76605903a48eab58e0b88'}
Linux
GSD-2021-1000954
usb: dwc3: gadget: Bail from dwc3_gadget_exit() if dwc->gadget is NULL
usb: dwc3: gadget: Bail from dwc3_gadget_exit() if dwc->gadget is NULL This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.44 by commit 851dee5a5da56564a70290713aee665403bb0b24, it was introduced in version v5.10 by commit e81a7018d93a7de31a3f121c9a7eecd0a5ec58b0. For more details please see the references link.
null
2021-12-19T23:49:46.067639Z
2021-06-30T00:29:00.152055Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e81a7018d93a7de31a3f121c9a7eecd0a5ec58b0'}
Linux
GSD-2022-1002316
Bluetooth: Fix use after free in hci_send_acl
Bluetooth: Fix use after free in hci_send_acl This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 684e505406abaeabe0058e9776f9210bf2747953. For more details please see the references link.
null
2022-04-25T06:23:27.311135Z
2022-04-24T22:33:43.926984Z
null
null
null
null
null
Linux
GSD-2022-1002101
ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data
ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 1f24716e38220fc9e52e208d20591d2bc9b7f020, it was introduced in version v5.6 by commit a61f3b4f476eceb25274161e5a53a8d18e42610b. For more details please see the references link.
null
2022-04-25T06:18:25.527916Z
2022-04-24T22:11:15.939678Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a61f3b4f476eceb25274161e5a53a8d18e42610b'}
Linux
GSD-2021-1001451
tty: serial: 8250: serial_cs: Fix a memory leak in error handling path
tty: serial: 8250: serial_cs: Fix a memory leak in error handling path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.276 by commit 331f5923fce4f45b8170ccf06c529e8eb28f37bc. For more details please see the references link.
null
2021-12-19T23:36:47.236150Z
2021-08-03T02:45:22.028175Z
null
null
null
null
null
Linux
GSD-2022-1000096
Bluetooth: refactor malicious adv data check
Bluetooth: refactor malicious adv data check This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.265 by commit 5a539c08d743d9910631448da78af5e961664c0e. For more details please see the references link.
null
2022-02-19T04:59:14.437997Z
2022-02-18T21:34:45.236127Z
null
null
null
null
null
Linux
GSD-2021-1001001
x86/fpu: Prevent state corruption in __fpu__restore_sig()
x86/fpu: Prevent state corruption in __fpu__restore_sig() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit 076f732b16a5bf842686e1b43ab6021a2d98233e, it was introduced in version v5.8 by commit b860eb8dce5906b14e3a7f3c771e0b3d6ef61b94. For more details please see the references link.
null
2021-12-20T00:40:56.468391Z
2021-06-30T00:32:25.743174Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b860eb8dce5906b14e3a7f3c771e0b3d6ef61b94'}
Linux
GSD-2021-1002787
ipmi: fix initialization when workqueue allocation fails
ipmi: fix initialization when workqueue allocation fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.223 by commit eb84855d3e8799b67cdbadc7a5c53997cbfc3580, it was introduced in version v4.19.220 by commit 36fbc46a792969650a44702ddd2143fe722e4d00. For more details please see the references link.
null
2022-01-11T05:57:50.383745Z
2021-12-30T02:43:24.803352Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/36fbc46a792969650a44702ddd2143fe722e4d00'}
Linux
GSD-2021-1000240
vsock/virtio: free queued packets when closing socket
vsock/virtio: free queued packets when closing socket This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 37c38674ef2f8d7e8629e5d433c37d6c1273d16b, it was introduced in version v5.2 by commit ac03046ece2b158ebd204dfc4896fd9f39f0e6c8. For more details please see the references link.
null
2021-12-20T00:42:41.120720Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac03046ece2b158ebd204dfc4896fd9f39f0e6c8'}
Linux
GSD-2022-1000995
mm/sparsemem: fix 'mem_section' will never be NULL gcc 12 warning
mm/sparsemem: fix 'mem_section' will never be NULL gcc 12 warning This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 84e2a3bbedf78c5d8fe4fa8dccf34d2b70e7ddd0, it was introduced in version v2.6.14 by commit 3e347261a80b57df792ab9464b5f0ed59add53a8. For more details please see the references link.
null
2022-04-25T05:28:11.194683Z
2022-04-24T20:38:11.451797Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3e347261a80b57df792ab9464b5f0ed59add53a8'}
Linux
GSD-2022-1001687
drm/imx: Fix memory leak in imx_pd_connector_get_modes
drm/imx: Fix memory leak in imx_pd_connector_get_modes This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 31e449302ed00c38d4068443cf0243279701ab28, it was introduced in version v4.8 by commit 76ecd9c9fb24b014a6f33fbb1287ede3be12158b. For more details please see the references link.
null
2022-04-25T06:17:41.662036Z
2022-04-24T21:35:19.070445Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/76ecd9c9fb24b014a6f33fbb1287ede3be12158b'}
Linux
GSD-2021-1001902
NFC: digital: fix possible memory leak in digital_in_send_sdd_req()
NFC: digital: fix possible memory leak in digital_in_send_sdd_req() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit 6432d7f1d1c3aa74cfe8f5e3afdf81b786c32e86, it was introduced in version v3.13 by commit 2c66daecc4092e6049673c281b2e6f0d5e59a94c. For more details please see the references link.
null
2021-12-20T01:22:53.235727Z
2021-10-28T13:54:52.286878Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c66daecc4092e6049673c281b2e6f0d5e59a94c'}
Linux
GSD-2021-1000610
netfilter: nft_set_pipapo_avx2: Add irq_fpu_usable() check, fallback to non-AVX2 version
netfilter: nft_set_pipapo_avx2: Add irq_fpu_usable() check, fallback to non-AVX2 version This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit b1f45a26bd322525c14edd9504f6d46dfad679a4, it was introduced in version v5.7 by commit 7400b063969bdca4a06cd97f1294d765c8eecbe1. For more details please see the references link.
null
2021-12-20T00:37:25.900280Z
2021-06-04T19:47:09.917879Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7400b063969bdca4a06cd97f1294d765c8eecbe1'}
Linux
GSD-2022-1001392
Bluetooth: use memset avoid memory leaks
Bluetooth: use memset avoid memory leaks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit e9e55acee9b7a737ec7f5161b94a78932a5514c8. For more details please see the references link.
null
2022-04-25T06:54:40.109233Z
2022-04-24T21:10:05.778351Z
null
null
null
null
null
Linux
GSD-2021-1002338
usb: host: ohci-tmio: check return value after calling platform_get_resource()
usb: host: ohci-tmio: check return value after calling platform_get_resource() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit 065334f6640d074a1caec2f8b0091467a22f9483. For more details please see the references link.
null
2021-12-20T01:20:48.481302Z
2021-11-29T02:39:28.766995Z
null
null
null
null
null
Linux
GSD-2021-1000305
async_xor: increase src_offs when dropping destination page
async_xor: increase src_offs when dropping destination page This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 53f8208e11abd6dde9480dfcb97fecdb1bc2ac18, it was introduced in version v5.10 by commit 29bcff787a2593b2126cfaff612c0b4e560022e9. For more details please see the references link.
null
2021-12-19T23:29:39.915045Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/29bcff787a2593b2126cfaff612c0b4e560022e9'}
Linux
GSD-2022-1001668
KVM: avoid NULL pointer dereference in kvm_dirty_ring_push
KVM: avoid NULL pointer dereference in kvm_dirty_ring_push This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 226b4327ef5c88572fc12187193f1b5073c10837. For more details please see the references link.
null
2022-04-25T04:57:23.207187Z
2022-04-24T21:33:32.238421Z
null
null
null
null
null
Linux
GSD-2021-1001847
can: isotp: isotp_sendmsg(): add result check for wait_event_interruptible()
can: isotp: isotp_sendmsg(): add result check for wait_event_interruptible() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit 053bc12df0d6097c1126d0e14fa778a0a8faeb64, it was introduced in version v5.10 by commit e057dd3fc20ffb3d7f150af46542a51b59b90127. For more details please see the references link.
null
2021-12-19T23:58:16.077862Z
2021-10-28T13:51:58.343736Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e057dd3fc20ffb3d7f150af46542a51b59b90127'}
Linux
GSD-2021-1002768
scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select()
scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit dfc3fff63793c571147930b13c0f8c689c4281ac. For more details please see the references link.
null
2022-01-11T05:51:03.441187Z
2021-12-27T05:52:59.772545Z
null
null
null
null
null
Linux
GSD-2021-1000755
ocfs2: fix data corruption by fallocate
ocfs2: fix data corruption by fallocate This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.125 by commit cc2edb99ea606a45182b5ea38cc8f4e583aa0774, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T01:27:48.109686Z
2021-06-25T00:02:40.625293Z
null
null
null
null
null
Linux
GSD-2021-1002292
scsi: scsi_debug: Fix out-of-bound read in resp_readcap16()
scsi: scsi_debug: Fix out-of-bound read in resp_readcap16() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.82 by commit 3e20cb072679bdb47747ccc8bee3233a4cf0765a. For more details please see the references link.
null
2021-12-20T00:55:04.884106Z
2021-11-29T02:37:20.323577Z
null
null
null
null
null
Linux
GSD-2022-1001238
rtw88: fix memory overrun and memory leak during hw_scan
rtw88: fix memory overrun and memory leak during hw_scan This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit ec5da191bfcd5fd22b95459b623694f66c1cc10b, it was introduced in version v5.17 by commit 10d162b2ed395e69720926b4f8d87f1f25ca920f. For more details please see the references link.
null
2022-04-25T04:11:48.806445Z
2022-04-24T20:56:40.978121Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/10d162b2ed395e69720926b4f8d87f1f25ca920f'}
Linux
GSD-2022-1000583
RDMA/siw: Fix refcounting leak in siw_create_qp()
RDMA/siw: Fix refcounting leak in siw_create_qp() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.22 by commit 2989ba9532babac66e79997ccff73c015b69700c, it was introduced in version v5.15 by commit 514aee660df493cd673154a6ba6bab745ec47b8c. For more details please see the references link.
null
2022-03-07T01:34:07.047880Z
2022-02-27T03:27:20.533066Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/514aee660df493cd673154a6ba6bab745ec47b8c'}
Linux
GSD-2021-1001514
mac80211: fix use-after-free in CCMP/GCMP RX
mac80211: fix use-after-free in CCMP/GCMP RX This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.285 by commit 31de381aef0ab1b342f62485118dc8a19363dc78, it was introduced in version v4.9.271 by commit d0f613fe6de344dc17ba04a88921a2094c13d3fa. For more details please see the references link.
null
2021-12-19T23:37:06.960995Z
2021-10-19T16:21:40.775296Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0f613fe6de344dc17ba04a88921a2094c13d3fa'}
Linux
GSD-2022-1000079
udf: Fix NULL ptr deref when converting from inline format
udf: Fix NULL ptr deref when converting from inline format This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.300 by commit f24454e42b5a58267928b0de53b0dd9b43e4dd46, it was introduced in version v4.2 by commit 52ebea749aaed195245701a8f90a23d672c7a933. For more details please see the references link.
null
2022-02-19T15:42:01.223810Z
2022-02-18T21:32:51.034319Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/52ebea749aaed195245701a8f90a23d672c7a933'}
Linux
GSD-2022-1002044
video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow
video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 08dff482012758935c185532b1ad7d584785a86e. For more details please see the references link.
null
2022-04-25T05:49:31.608982Z
2022-04-24T22:05:36.620761Z
null
null
null
null
null
Linux
GSD-2021-1001144
net: qed: Fix memcpy() overflow of qed_dcbx_params()
net: qed: Fix memcpy() overflow of qed_dcbx_params() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13 by commit 1c200f832e14420fa770193f9871f4ce2df00d07. For more details please see the references link.
null
2021-12-20T00:59:42.951824Z
2021-07-08T01:59:25.363632Z
null
null
null
null
null
Linux
GSD-2022-1000429
net: dsa: bcm_sf2: don't use devres for mdiobus
net: dsa: bcm_sf2: don't use devres for mdiobus This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit caabb5f64f5c32fceed93356bb688ef1ec6c5783, it was introduced in version v5.9 by commit ac3a68d56651c3dad2c12c7afce065fe15267f44. For more details please see the references link.
null
2022-03-07T01:50:39.712415Z
2022-02-27T03:06:18.991941Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac3a68d56651c3dad2c12c7afce065fe15267f44'}
Linux
GSD-2022-1002414
scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair()
scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 43195a0c620761fbb88db04e2475313855b948a4. For more details please see the references link.
null
2022-04-25T05:50:57.093122Z
2022-04-24T22:44:48.805266Z
null
null
null
null
null
Linux
GSD-2021-1002441
ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()
ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.164 by commit 99bb25cb6753beaf2c2bc37927c2ecc0ceff3f6d. For more details please see the references link.
null
2021-12-19T23:24:27.434430Z
2021-12-19T19:37:25.103854Z
null
null
null
null
null
Linux
GSD-2022-1001111
can: mcba_usb: properly check endpoint type
can: mcba_usb: properly check endpoint type This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit f2ec3cd0f34f8c3f94bc21fbba14868301c9c49d, it was introduced in version v4.12 by commit 51f3baad7de943780ce0c17bd7975df567dd6e14. For more details please see the references link.
null
2022-04-25T04:54:45.765570Z
2022-04-24T20:46:16.848704Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/51f3baad7de943780ce0c17bd7975df567dd6e14'}
Linux
GSD-2021-1000186
net: hso: fix NULL-deref on disconnect regression
net: hso: fix NULL-deref on disconnect regression This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.115 by commit d7fad2ce15bdbbd0fec3ebe999fd7cab2267f53e, it was introduced in version v5.4.112 by commit 4a2933c88399c0ebc738db39bbce3ae89786d723. For more details please see the references link.
null
2021-12-20T00:10:34.773153Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4a2933c88399c0ebc738db39bbce3ae89786d723'}
Linux
GSD-2021-1002011
mm, slub: fix potential memoryleak in kmem_cache_open()
mm, slub: fix potential memoryleak in kmem_cache_open() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.156 by commit 4f5d1c29cfab5cb0ab885059818751bdef32e2bb, it was introduced in version v4.8 by commit 210e7a43fa905bccafa9bb5966fba1d71f33eb8b. For more details please see the references link.
null
2021-12-19T22:44:17.528163Z
2021-11-14T15:15:50.880542Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/210e7a43fa905bccafa9bb5966fba1d71f33eb8b'}
Linux
GSD-2022-1001541
dax: make sure inodes are flushed before destroy cache
dax: make sure inodes are flushed before destroy cache This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit f2a1e0eb70c2d954176c07d75d28742bde30e9f3, it was introduced in version v4.12 by commit 7b6be8444e0f0dd675b54d059793423d3c9b4c03. For more details please see the references link.
null
2022-04-25T06:22:09.550375Z
2022-04-24T21:21:50.550397Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7b6be8444e0f0dd675b54d059793423d3c9b4c03'}
Linux
GSD-2022-1000700
net: ipv6: ensure we call ipv6_mc_down() at most once
net: ipv6: ensure we call ipv6_mc_down() at most once This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.13 by commit 72124e65a70b84e6303a5cd21b0ac1f27d7d61a4, it was introduced in version v3.18 by commit 3ce62a84d53cd3d3cc5377bbf339e9b08ddf9c36. For more details please see the references link.
null
2022-03-18T04:27:18.782746Z
2022-03-18T00:10:42.676096Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3ce62a84d53cd3d3cc5377bbf339e9b08ddf9c36'}
Linux
GSD-2022-1001812
remoteproc: qcom_q6v5_mss: Fix some leaks in q6v5_alloc_memory_region
remoteproc: qcom_q6v5_mss: Fix some leaks in q6v5_alloc_memory_region This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit bd4771ba2cf9e18473a42b5b70175e50d67a64bb, it was introduced in version v4.17 by commit 278d744c46fd4f1925aec77752d18a0e4a9cbec3. For more details please see the references link.
null
2022-04-25T05:17:09.824563Z
2022-04-24T21:44:07.741538Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/278d744c46fd4f1925aec77752d18a0e4a9cbec3'}
Linux
GSD-2021-1001797
xhci: Fix command ring pointer corruption while aborting a command
xhci: Fix command ring pointer corruption while aborting a command This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.252 by commit 22bcb65ea41072ab5d03c0c6290e04e0df6d09a0. For more details please see the references link.
null
2021-12-19T23:13:15.087728Z
2021-10-28T13:49:20.031259Z
null
null
null
null
null
Linux
GSD-2021-1000885
net/nfc/rawsock.c: fix a permission check bug
net/nfc/rawsock.c: fix a permission check bug This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.126 by commit f3ed12af6bbbaf79eddb0ae14656b8ecacea74f0. For more details please see the references link.
null
2021-12-20T01:14:55.746667Z
2021-06-30T00:03:36.841013Z
null
null
null
null
null
Linux
GSD-2022-1000350
ax25: improve the incomplete fix to avoid UAF and NPD bugs
ax25: improve the incomplete fix to avoid UAF and NPD bugs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.181 by commit cfc8b37ef0418529e3719c2d128e59e74a3114b0. For more details please see the references link.
null
2022-03-07T02:27:01.257414Z
2022-02-27T02:54:31.100550Z
null
null
null
null
null
Linux
GSD-2022-1000645
net: sched: fix use-after-free in tc_new_tfilter()
net: sched: fix use-after-free in tc_new_tfilter() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.6 by commit 95e34f61b58a152656cbe8d6e19843cc343fb089, it was introduced in version v5.1 by commit 470502de5bdb1ed0def643a4458593a40b8f6b66. For more details please see the references link.
null
2022-03-07T01:44:33.970615Z
2022-02-27T03:35:36.175615Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/470502de5bdb1ed0def643a4458593a40b8f6b66'}
Linux
GSD-2022-1001957
nfc: nci: add flush_workqueue to prevent uaf
nfc: nci: add flush_workqueue to prevent uaf This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.112 by commit 67677050cecbe0edfdd81cd508415e9636ba7c65, it was introduced in version v3.2 by commit 6a2968aaf50c7a22fced77a5e24aa636281efca8. For more details please see the references link.
null
2022-04-25T04:32:24.263974Z
2022-04-24T21:58:03.435326Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6a2968aaf50c7a22fced77a5e24aa636281efca8'}
Linux
GSD-2021-1001328
watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff()
watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.134 by commit 7c56c5508dc20a6b133bc669fc34327a6711c24c. For more details please see the references link.
null
2021-12-20T00:56:51.596938Z
2021-08-03T02:10:20.945446Z
null
null
null
null
null
Linux
GSD-2022-1002382
netfilter: nf_tables: initialize registers in nft_do_chain()
netfilter: nf_tables: initialize registers in nft_do_chain() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.237 by commit 88791b79a1eb2ba94e95d039243e28433583a67b, it was introduced in version v3.13 by commit 96518518cc417bb0a8c80b9fb736202e28acdf96. For more details please see the references link.
null
2022-04-25T03:24:19.660320Z
2022-04-24T22:41:17.582969Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/96518518cc417bb0a8c80b9fb736202e28acdf96'}
Linux
GSD-2022-1002228
net/x25: Fix null-ptr-deref caused by x25_disconnect
net/x25: Fix null-ptr-deref caused by x25_disconnect This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 9acf05b4e7b55fdb712ef7b331dbce5bcd391d0f, it was introduced in version v5.4.56 by commit 69cd304cfa5cfb0f130488af579c143382432766. For more details please see the references link.
null
2022-04-25T03:55:30.829944Z
2022-04-24T22:23:25.576824Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69cd304cfa5cfb0f130488af579c143382432766'}
Linux
GSD-2022-1000215
ASoC: ops: Reject out of bounds values in snd_soc_put_volsw()
ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.99 by commit a9394f21fba027147bf275b083c77955864c366a. For more details please see the references link.
null
2022-02-19T15:35:04.834590Z
2022-02-18T21:56:28.298481Z
null
null
null
null
null
Linux
GSD-2021-1001282
fbmem: Do not delete the mode that is still in use
fbmem: Do not delete the mode that is still in use This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.52 by commit 087bff9acd2ec6db3f61aceb3224bde90fe0f7f8, it was introduced in version v5.3 by commit 13ff178ccd6d3b8074c542a911300b79c4eec255. For more details please see the references link.
null
2021-12-19T22:54:44.176460Z
2021-08-03T01:56:57.343715Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/13ff178ccd6d3b8074c542a911300b79c4eec255'}
Linux
GSD-2021-1001778
isdn: mISDN: Fix sleeping function called from invalid context
isdn: mISDN: Fix sleeping function called from invalid context This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.288 by commit ef269a8808cb1759245a98a7fe16fceaebad894c. For more details please see the references link.
null
2021-12-20T01:33:02.664922Z
2021-10-28T13:48:26.373144Z
null
null
null
null
null
Linux
GSD-2022-1001054
scsi: hisi_sas: Free irq vectors in order for v3 HW
scsi: hisi_sas: Free irq vectors in order for v3 HW This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit b4cc04fa8f1fc3816c8494d77abab3f72b9d2292. For more details please see the references link.
null
2022-04-25T03:47:43.989422Z
2022-04-24T20:42:39.600175Z
null
null
null
null
null
Linux
GSD-2021-1000539
btrfs: release path before starting transaction when cloning inline extent
btrfs: release path before starting transaction when cloning inline extent This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit 8bf7fa718152fcccac0376b443c0a6a2613a997e, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T00:12:07.356796Z
2021-06-04T19:35:35.998537Z
null
null
null
null
null
Linux
GSD-2021-1002504
can: pch_can: pch_can_rx_normal: fix use after free
can: pch_can: pch_can_rx_normal: fix use after free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.85 by commit 703dde112021c93d6e89443c070e7dbd4dea612e, it was introduced in version v2.6.37 by commit b21d18b51b31a24d17f883b678432fbdee3d5675. For more details please see the references link.
null
2021-12-19T23:00:56.068643Z
2021-12-19T19:40:18.714372Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b21d18b51b31a24d17f883b678432fbdee3d5675'}
Linux
GSD-2022-1001404
PCI: endpoint: Fix alignment fault error in copy tests
PCI: endpoint: Fix alignment fault error in copy tests This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 399549fd0b1606691a0dce6cc44a41c308d1bfbe. For more details please see the references link.
null
2022-04-25T04:30:07.618913Z
2022-04-24T21:10:40.625017Z
null
null
null
null
null
Linux
GSD-2021-1000493
uio_hv_generic: Fix another memory leak in error handling paths
uio_hv_generic: Fix another memory leak in error handling paths This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.7 by commit 5f59240cf25b2f7a0fdffc2701482a70310fec07, it was introduced in version v4.20 by commit cdfa835c6e5e87d145f9f632b58843de97509f2b. For more details please see the references link.
null
2021-12-20T00:08:52.881542Z
2021-05-31T23:45:42.598179Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cdfa835c6e5e87d145f9f632b58843de97509f2b'}
Linux
GSD-2021-1000169
media: staging/intel-ipu3: Fix memory leak in imu_fmt
media: staging/intel-ipu3: Fix memory leak in imu_fmt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.118 by commit ff792ae52005c85a2d829c153e08d99a356e007d, it was introduced in version v5.2 by commit 6d5f26f2e045f2377b524516194657c00efbbce8. For more details please see the references link.
null
2021-12-19T22:30:08.221016Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6d5f26f2e045f2377b524516194657c00efbbce8'}
Linux
GSD-2021-1002154
nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells
nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 5d388fa01fa6eb310ac023a363a6cb216d9d8fe9, it was introduced in version v4.3 by commit 69aba7948cbe53f2f1827e84e9dd0ae470a5072e. For more details please see the references link.
null
2021-12-20T01:11:44.276524Z
2021-11-14T15:22:24.379383Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69aba7948cbe53f2f1827e84e9dd0ae470a5072e'}
Linux
GSD-2021-1001955
NFC: digital: fix possible memory leak in digital_in_send_sdd_req()
NFC: digital: fix possible memory leak in digital_in_send_sdd_req() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.252 by commit fcce6e5255474ca33c27dda0cdf9bf5087278873, it was introduced in version v3.13 by commit 2c66daecc4092e6049673c281b2e6f0d5e59a94c. For more details please see the references link.
null
2021-12-20T01:13:04.982979Z
2021-11-14T15:13:19.376193Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c66daecc4092e6049673c281b2e6f0d5e59a94c'}
Linux
GSD-2021-1000647
mld: fix panic in mld_newpack()
mld: fix panic in mld_newpack() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.193 by commit 4b77ad9097067b31237eeeee0bf70f80849680a0, it was introduced in version v2.6.35 by commit 72e09ad107e78d69ff4d3b97a69f0aad2b77280f. For more details please see the references link.
null
2021-12-20T00:29:41.803674Z
2021-06-04T19:54:22.666194Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/72e09ad107e78d69ff4d3b97a69f0aad2b77280f'}
Linux
GSD-2021-1002380
can: pch_can: pch_can_rx_normal: fix use after free
can: pch_can: pch_can_rx_normal: fix use after free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.293 by commit 3a3c46e2eff0577454860a203be1a8295f4acb76, it was introduced in version v2.6.37 by commit b21d18b51b31a24d17f883b678432fbdee3d5675. For more details please see the references link.
null
2021-12-19T22:34:15.201414Z
2021-12-19T19:34:43.423844Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b21d18b51b31a24d17f883b678432fbdee3d5675'}
Linux
GSD-2022-1001280
crypto: ccp - Ensure psp_ret is always init'd in __sev_platform_init_locked()
crypto: ccp - Ensure psp_ret is always init'd in __sev_platform_init_locked() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 590c08b061214268a1fe3b2def65969deac075f2, it was introduced in version v5.17 by commit e423b9d75e779d921e6adf5ac3d0b59400d6ba7e. For more details please see the references link.
null
2022-04-25T04:56:16.841171Z
2022-04-24T21:00:57.731584Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e423b9d75e779d921e6adf5ac3d0b59400d6ba7e'}
Linux
GSD-2021-1000217
SUNRPC: Fix null pointer dereference in svc_rqst_free()
SUNRPC: Fix null pointer dereference in svc_rqst_free() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit c664aaec9aee544538a78ba4893a44bc73a6d742, it was introduced in version v5.11 by commit 5191955d6fc65e6d4efe8f4f10a6028298f57281. For more details please see the references link.
null
2021-12-19T21:43:56.995309Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5191955d6fc65e6d4efe8f4f10a6028298f57281'}
Linux
GSD-2022-1000868
vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
vhost/vsock: don't check owner in vhost_vsock_stop() while releasing This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.103 by commit 698dc7d13c4e972214458996455447651a657264, it was introduced in version v4.8 by commit 433fc58e6bf2c8bd97e57153ed28e64fd78207b8. For more details please see the references link.
null
2022-03-18T02:55:49.403325Z
2022-03-18T00:26:07.570102Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/433fc58e6bf2c8bd97e57153ed28e64fd78207b8'}
Linux
GSD-2021-1001056
net: rds: fix memory leak in rds_recvmsg
net: rds: fix memory leak in rds_recvmsg This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit b25b60d076164edb3025e85aabd2cf50a5215b91, it was introduced in version v2.6.30 by commit bdbe6fbc6a2f2ccfb384b141b257677d2a8d36fb. For more details please see the references link.
null
2021-12-19T23:28:08.905642Z
2021-06-30T00:36:43.344172Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bdbe6fbc6a2f2ccfb384b141b257677d2a8d36fb'}
Linux
GSD-2022-1002506
ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction
ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit 99582e4b19f367fa95bdd150b3034d7ce8113342, it was introduced in version v3.16 by commit 00a7bb81c20f3e81711e28e0f6c08cee8fd18514. For more details please see the references link.
null
2022-04-25T05:19:48.754676Z
2022-04-24T22:55:53.662502Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/00a7bb81c20f3e81711e28e0f6c08cee8fd18514'}
Linux
GSD-2022-1000491
powerpc/fixmap: Fix VM debug warning on unmap
powerpc/fixmap: Fix VM debug warning on unmap This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 033fd42c18d9b2121595b6f1e8419a115f9ac5b7. For more details please see the references link.
null
2022-03-07T03:12:51.754844Z
2022-02-27T03:14:42.747827Z
null
null
null
null
null
Linux
GSD-2021-1001406
dma-buf/sync_file: Don't leak fences on merge failure
dma-buf/sync_file: Don't leak fences on merge failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.241 by commit 19f51c2529339280d2c8c6427cd3e21ddf1ac3f8, it was introduced in version v4.9 by commit a02b9dc90d844cc7df7b63264e7920cc425052d9. For more details please see the references link.
null
2021-12-19T23:56:12.224787Z
2021-08-03T02:31:41.716617Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a02b9dc90d844cc7df7b63264e7920cc425052d9'}
Linux
GSD-2022-1002156
perf/imx_ddr: Fix undefined behavior due to shift overflowing the constant
perf/imx_ddr: Fix undefined behavior due to shift overflowing the constant This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.190 by commit e07a70ca831e8ee05d25f887b161c8f6aa6f5d8d. For more details please see the references link.
null
2022-04-25T04:54:51.278275Z
2022-04-24T22:16:42.654808Z
null
null
null
null
null
Linux
GSD-2022-1002443
ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe
ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit f8b7b9a0594715ecfbe6f18db2328d992242654a, it was introduced in version v3.8 by commit 531f67e41dcde1e358cf821d056241a66355cf03. For more details please see the references link.
null
2022-04-25T04:25:22.559410Z
2022-04-24T22:48:18.267002Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/531f67e41dcde1e358cf821d056241a66355cf03'}
Linux
GSD-2022-1000184
efi: runtime: avoid EFIv2 runtime services on Apple x86 machines
efi: runtime: avoid EFIv2 runtime services on Apple x86 machines This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.96 by commit b0f1cc093bc2493ac259c53766fd2b800e085807. For more details please see the references link.
null
2022-02-19T02:38:10.229445Z
2022-02-18T21:52:10.714134Z
null
null
null
null
null
Linux
GSD-2021-1001113
nilfs2: fix memory leak in nilfs_sysfs_delete_device_group
nilfs2: fix memory leak in nilfs_sysfs_delete_device_group This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.196 by commit 9436cdffaf5bc83f41e72dfbd4d9ec885ff7b4f2, it was introduced in version v3.17 by commit da7141fb78db915680616e15677539fc8140cf53. For more details please see the references link.
null
2021-12-20T01:30:19.732938Z
2021-07-08T01:57:11.318708Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/da7141fb78db915680616e15677539fc8140cf53'}
Linux
GSD-2022-1002013
mt76: dma: initialize skip_unmap in mt76_dma_rx_fill
mt76: dma: initialize skip_unmap in mt76_dma_rx_fill This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit 9a56e2b271bc65116d1e44454b244b18d289a26b. For more details please see the references link.
null
2022-04-25T04:15:46.072625Z
2022-04-24T22:02:53.991538Z
null
null
null
null
null
Linux
GSD-2021-1001543
xen/balloon: use a kernel thread instead a workqueue
xen/balloon: use a kernel thread instead a workqueue This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.249 by commit c5d5a43dd2b649a0a290bfed00fb76d1aff89be6. For more details please see the references link.
null
2021-12-20T01:37:56.123065Z
2021-10-19T16:23:00.747257Z
null
null
null
null
null
Linux
GSD-2022-1000887
spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op()
spi: spi-zynq-qspi: Fix a NULL pointer dereference in zynq_qspi_exec_mem_op() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.182 by commit df14d2bed8e2455878e046e67123d9ecb2e79056, it was introduced in version v5.2 by commit 67dca5e580f1e93a66177389981541cac208c817. For more details please see the references link.
null
2022-03-18T03:43:46.749196Z
2022-03-18T00:28:16.861656Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/67dca5e580f1e93a66177389981541cac208c817'}
Linux
GSD-2022-1001795
PM: core: keep irq flags in device_pm_check_callbacks()
PM: core: keep irq flags in device_pm_check_callbacks() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit c29642ba72f87c0a3d7449f7db5d6d76a7ed53c3. For more details please see the references link.
null
2022-04-25T04:09:50.642604Z
2022-04-24T21:42:44.200591Z
null
null
null
null
null
Linux
GSD-2021-1001810
usb: musb: dsps: Fix the probe error path
usb: musb: dsps: Fix the probe error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.213 by commit e923bce31ffefe4f60edfc6b84f62d4a858f3676, it was introduced in version v4.19.207 by commit ffc825049ed2e8c849d318e987fd5073e0be462f. For more details please see the references link.
null
2021-12-19T23:32:14.668588Z
2021-10-28T13:50:07.137310Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ffc825049ed2e8c849d318e987fd5073e0be462f'}
Linux
GSD-2021-1000702
net: fujitsu: fix potential null-ptr-deref
net: fujitsu: fix potential null-ptr-deref This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.271 by commit b92170e209f7746ed72eaac98f2c2f4b9af734e6, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T22:18:24.647447Z
2021-06-04T20:05:37.517455Z
null
null
null
null
null
Linux
GSD-2021-1002695
inet_diag: fix kernel-infoleak for UDP sockets
inet_diag: fix kernel-infoleak for UDP sockets This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.88 by commit 3a4f6dba1eb98101abc012ef968a8b10dac1ce50, it was introduced in version v3.3 by commit 3c4d05c8056724aff3abc20650807dd828fded54. For more details please see the references link.
null
2022-01-11T05:49:13.440462Z
2021-12-27T05:37:12.373860Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c4d05c8056724aff3abc20650807dd828fded54'}
Linux
GSD-2021-1000352
i2c: xiic: fix reference leak when pm_runtime_get_sync fails
i2c: xiic: fix reference leak when pm_runtime_get_sync fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit c977426db644ba476938125597947979e8aba725, it was introduced in version v5.6 by commit 10b17004a74c384c6f410af355b0d6d7a168f613. For more details please see the references link.
null
2021-12-19T22:48:28.965357Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/10b17004a74c384c6f410af355b0d6d7a168f613'}
Linux
GSD-2022-1000307
iwlwifi: fix use-after-free
iwlwifi: fix use-after-free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.268 by commit d3b98fe36f8a06ce654049540773256ab59cb53d, it was introduced in version v4.14.263 by commit 8e10749fa1a454c1e7214f36cec83241f5a36ef1. For more details please see the references link.
null
2022-03-07T01:43:11.472572Z
2022-02-27T02:48:56.550574Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8e10749fa1a454c1e7214f36cec83241f5a36ef1'}
Linux
GSD-2021-1001390
smackfs: restrict bytes count in smk_set_cipso()
smackfs: restrict bytes count in smk_set_cipso() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.198 by commit cbd87ba6a13891acf6180783f8234a8b7a3e3d4d. For more details please see the references link.
null
2021-12-20T01:26:36.388904Z
2021-08-03T02:26:40.648678Z
null
null
null
null
null
Linux
GSD-2021-1000978
net: rds: fix memory leak in rds_recvmsg
net: rds: fix memory leak in rds_recvmsg This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit 5946fbf48355f5a8caeff72580c7658da5966b86, it was introduced in version v2.6.30 by commit bdbe6fbc6a2f2ccfb384b141b257677d2a8d36fb. For more details please see the references link.
null
2021-12-20T02:13:39.963245Z
2021-06-30T00:30:59.955464Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bdbe6fbc6a2f2ccfb384b141b257677d2a8d36fb'}
Linux
GSD-2022-1000757
xen/gnttab: fix gnttab_end_foreign_access() without page specified
xen/gnttab: fix gnttab_end_foreign_access() without page specified This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.28 by commit 27dc69aa55687ea288d0be6ce8f036330d1dddb5. For more details please see the references link.
null
2022-03-18T04:17:22.506919Z
2022-03-18T00:15:42.049441Z
null
null
null
null
null
Linux
GSD-2022-1001845
powerpc/64s: Don't use DSISR for SLB faults
powerpc/64s: Don't use DSISR for SLB faults This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 4a852ff9b7bea9c640540e2c1bc70bd3ba455d61, it was introduced in version v5.5 by commit 46ddcb3950a28c0df4815e8dbb8d4b91d5d9f22d. For more details please see the references link.
null
2022-04-25T04:48:18.928637Z
2022-04-24T21:47:26.192866Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/46ddcb3950a28c0df4815e8dbb8d4b91d5d9f22d'}
Linux
GSD-2022-1002290
drm/amdkfd: Check for potential null return of kmalloc_array()
drm/amdkfd: Check for potential null return of kmalloc_array() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.239 by commit 94869bb0de69a812f70231b0eb480bb2f7ae73a6. For more details please see the references link.
null
2022-04-25T05:33:05.783502Z
2022-04-24T22:30:37.883401Z
null
null
null
null
null
Linux
GSD-2022-1001516
Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt
Bluetooth: btmtksdio: Fix kernel oops in btmtksdio_interrupt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 4d3d1f2c35a19988d3c5f0ee86038b525e830840, it was introduced in version v5.2 by commit 9aebfd4a2200ab8075e44379c758bccefdc589bb. For more details please see the references link.
null
2022-04-25T04:44:31.216201Z
2022-04-24T21:19:19.301828Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9aebfd4a2200ab8075e44379c758bccefdc589bb'}
Linux
GSD-2021-1000581
mld: fix panic in mld_newpack()
mld: fix panic in mld_newpack() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit beb39adb150f8f3b516ddf7c39835a9788704d23, it was introduced in version v2.6.35 by commit 72e09ad107e78d69ff4d3b97a69f0aad2b77280f. For more details please see the references link.
null
2021-12-19T22:23:31.369926Z
2021-06-04T19:42:29.697011Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/72e09ad107e78d69ff4d3b97a69f0aad2b77280f'}
Linux
GSD-2021-1002046
KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest()
KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit fbd724c49bead048ae9fc1a5b7bff2fb3e54f855, it was introduced in version v5.2 by commit 10d91611f426d4bafd2a83d966c36da811b2f7ad. For more details please see the references link.
null
2021-12-20T00:38:02.871796Z
2021-11-14T15:17:25.300623Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/10d91611f426d4bafd2a83d966c36da811b2f7ad'}
Linux
GSD-2022-1001146
btrfs: handle csum lookup errors properly on reads
btrfs: handle csum lookup errors properly on reads This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 50658068dce91207a93300325d4831c3dd8f77b4. For more details please see the references link.
null
2022-04-25T04:46:34.739111Z
2022-04-24T20:48:51.902852Z
null
null
null
null
null
Linux
GSD-2021-1002416
perf hist: Fix memory leak of a perf_hpp_fmt
perf hist: Fix memory leak of a perf_hpp_fmt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.220 by commit 24a139c105fa0f7f99888cf328bf6a02fc841675. For more details please see the references link.
null
2021-12-20T00:56:48.791734Z
2021-12-19T19:36:25.853751Z
null
null
null
null
null
Linux
GSD-2021-1002103
ocfs2: mount fails with buffer overflow in strlen
ocfs2: mount fails with buffer overflow in strlen This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit 0e677ea5b7396f715a76b6b0ef441430e4c4b57f. For more details please see the references link.
null
2021-12-19T23:12:34.519280Z
2021-11-14T15:20:01.504620Z
null
null
null
null
null
Linux
GSD-2022-1001453
mmc: host: Return an error when ->enable_sdio_irq() ops is missing
mmc: host: Return an error when ->enable_sdio_irq() ops is missing This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit b6283cc505cfc7f23c9d6e062a948e0455e35270. For more details please see the references link.
null
2022-04-25T04:42:46.473234Z
2022-04-24T21:14:29.584016Z
null
null
null
null
null
Linux
GSD-2021-1002553
sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl
sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.7 by commit adf098e2a8a1e1fc075d6a5ba2edd13cf7189082, it was introduced in version v2.6.24 by commit faf0b2e5afe7dae072d2715763c7f992b612b628. For more details please see the references link.
null
2021-12-20T00:23:26.923147Z
2021-12-19T19:42:24.263292Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/faf0b2e5afe7dae072d2715763c7f992b612b628'}
Linux
GSD-2022-1001003
RDMA/hfi1: Fix use-after-free bug for mm struct
RDMA/hfi1: Fix use-after-free bug for mm struct This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 5a9a1b24ddb510715f8f621263938186579a965c, it was introduced in version v5.10 by commit 3d2a9d642512c21a12d19b9250e7a835dcb41a79. For more details please see the references link.
null
2022-04-25T06:09:10.025713Z
2022-04-24T20:38:50.174033Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3d2a9d642512c21a12d19b9250e7a835dcb41a79'}
Linux
GSD-2021-1000094
dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails
dm rq: fix double free of blk_mq_tag_set in dev remove after table load fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.20 by commit 6086f957416a6e87236c06079fcaba7a3998aeca, it was introduced in version v4.6 by commit 1c357a1e86a4227a6b6059f2de118ae47659cebc. For more details please see the references link.
null
2021-12-19T23:19:43.775876Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c357a1e86a4227a6b6059f2de118ae47659cebc'}