ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2021-1002800
f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()
f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.169 by commit b0406b5ef4e2c4fb21d9e7d5c36a0453b4279e9b. For more details please see the references link.
null
2022-01-11T05:53:03.687271Z
2021-12-30T02:43:55.916296Z
null
null
null
null
null
Linux
GSD-2022-1000242
udf: Fix NULL ptr deref when converting from inline format
udf: Fix NULL ptr deref when converting from inline format This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.19 by commit cbf96c58e28b1fece9630102781a93ff32c347f7, it was introduced in version v4.2 by commit 52ebea749aaed195245701a8f90a23d672c7a933. For more details please see the references link.
null
2022-02-19T03:05:12.396007Z
2022-02-18T22:00:22.513941Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/52ebea749aaed195245701a8f90a23d672c7a933'}
Linux
GSD-2022-1000612
KVM: x86: Forcibly leave nested virt when SMM state is toggled
KVM: x86: Forcibly leave nested virt when SMM state is toggled This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit b4c0d89c92e957ecccce12e66b63875d0cc7af7e. For more details please see the references link.
null
2022-03-07T02:23:58.785874Z
2022-02-27T03:31:15.121227Z
null
null
null
null
null
Linux
GSD-2022-1001900
video: fbdev: sm712fb: Fix crash in smtcfb_read()
video: fbdev: sm712fb: Fix crash in smtcfb_read() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 46cdbff26c88fd75dccbf28df1d07cbe18007eac. For more details please see the references link.
null
2022-04-25T06:08:48.318349Z
2022-04-24T21:53:16.860295Z
null
null
null
null
null
Linux
GSD-2021-1001685
i2c: acpi: fix resource leak in reconfiguration device addition
i2c: acpi: fix resource leak in reconfiguration device addition This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.12 by commit 90f1077c9184ec2ae9989e4642f211263f301694, it was introduced in version v4.8 by commit 525e6fabeae286848592363bda13bc34b59bb5ac. For more details please see the references link.
null
2021-12-19T22:52:15.434734Z
2021-10-19T16:31:46.577054Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/525e6fabeae286848592363bda13bc34b59bb5ac'}
Linux
GSD-2021-1000997
KVM: x86: Immediately reset the MMU context when the SMM flag is cleared
KVM: x86: Immediately reset the MMU context when the SMM flag is cleared This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit 669a8866e468fd020d34eb00e08cb41d3774b71b, it was introduced in version v5.1 by commit 9ec19493fb86d6d5fbf9286b94ff21e56ef66376. For more details please see the references link.
null
2021-12-19T23:02:51.423045Z
2021-06-30T00:32:11.037291Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9ec19493fb86d6d5fbf9286b94ff21e56ef66376'}
Linux
GSD-2022-1002140
NFSD: prevent integer overflow on 32 bit systems
NFSD: prevent integer overflow on 32 bit systems This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 7af164fa2f1abc577d357d22d83a2f3490875d7e. For more details please see the references link.
null
2022-04-25T06:45:24.840558Z
2022-04-24T22:15:30.155275Z
null
null
null
null
null
Linux
GSD-2021-1001410
virtio-blk: Fix memory leak among suspend/resume procedure
virtio-blk: Fix memory leak among suspend/resume procedure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.240 by commit 863da837964c80c72e368a4f748c30d25daa1815. For more details please see the references link.
null
2021-12-19T23:02:03.433302Z
2021-08-03T02:32:57.424616Z
null
null
null
null
null
Linux
GSD-2022-1000487
NFSD: Fix ia_size underflow
NFSD: Fix ia_size underflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit da22ca1ad548429d7822011c54cfe210718e0aa7. For more details please see the references link.
null
2022-03-07T02:20:38.372753Z
2022-02-27T03:13:36.118487Z
null
null
null
null
null
Linux
GSD-2022-1002510
NFSD: prevent underflow in nfssvc_decode_writeargs()
NFSD: prevent underflow in nfssvc_decode_writeargs() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit 1a33e0de60feda402d05ac8a6cf409c19ea3e0b3. For more details please see the references link.
null
2022-04-25T05:04:01.164146Z
2022-04-24T22:56:20.413838Z
null
null
null
null
null
Linux
GSD-2021-1001040
perf: Fix data race between pin_count increment/decrement
perf: Fix data race between pin_count increment/decrement This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit df4c7e3b10957369b2180a49c25fdff73bee139b, it was introduced in version v2.6.39 by commit fe4b04fa31a6dcf4358aa84cf81e5a7fd079469b. For more details please see the references link.
null
2021-12-19T23:06:23.364923Z
2021-06-30T00:35:43.362212Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fe4b04fa31a6dcf4358aa84cf81e5a7fd079469b'}
Linux
GSD-2021-1000201
btrfs: fix deadlock when cloning inline extents and using qgroups
btrfs: fix deadlock when cloning inline extents and using qgroups This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit 96157707c0420e3d3edfe046f1cc797fee117ade, it was introduced in version v5.9 by commit c53e9653605dbf708f5be02902de51831be4b009. For more details please see the references link.
null
2021-12-19T23:23:51.150936Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c53e9653605dbf708f5be02902de51831be4b009'}
Linux
GSD-2022-1001296
drbd: fix potential silent data corruption
drbd: fix potential silent data corruption This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 3b99e91ce7cf484aab5b655063f928ba17087c01. For more details please see the references link.
null
2022-04-25T04:23:36.207654Z
2022-04-24T21:02:02.811155Z
null
null
null
null
null
Linux
GSD-2021-1002396
net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources()
net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.257 by commit be12572c5ddc8ad7453bada4eec8fa46967dc757, it was introduced in version v4.7 by commit ec25bc04ed8e12947738468cbe2191f1529f9e39. For more details please see the references link.
null
2021-12-20T01:15:06.736566Z
2021-12-19T19:35:29.707288Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ec25bc04ed8e12947738468cbe2191f1529f9e39'}
Linux
GSD-2021-1000651
net: fujitsu: fix potential null-ptr-deref
net: fujitsu: fix potential null-ptr-deref This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.193 by commit 7883d3895d0fbb0ba9bff0f8665f99974b45210f, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T01:04:08.174522Z
2021-06-04T19:54:56.476826Z
null
null
null
null
null
Linux
GSD-2021-1001943
IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields
IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.290 by commit 3f57c3f67fd93b4da86aeffea1ca32c484d054ad, it was introduced in version v2.6.35 by commit f931551bafe1f10ded7f5282e2aa162c267a2e5d. For more details please see the references link.
null
2021-12-20T00:57:43.292020Z
2021-11-14T15:12:41.859464Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f931551bafe1f10ded7f5282e2aa162c267a2e5d'}
Linux
GSD-2021-1000344
wlcore: Fix buffer overrun by snprintf due to incorrect buffer size
wlcore: Fix buffer overrun by snprintf due to incorrect buffer size This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit b6b894e7a27e52a9032a7eaace538538830d4b9e, it was introduced in version v5.10.37 by commit d204db4fe6acfea7b62fa397c587281399fbd8af. For more details please see the references link.
null
2021-06-24T22:55:39.206605Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d204db4fe6acfea7b62fa397c587281399fbd8af'}
Linux
GSD-2021-1002379
can: sja1000: fix use after free in ems_pcmcia_add_card()
can: sja1000: fix use after free in ems_pcmcia_add_card() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.293 by commit 1dd5b819f7e406dc15bbc7670596ff25261aaa2a, it was introduced in version v3.2 by commit fd734c6f25aea4b2b44b045e489aec67b388577e. For more details please see the references link.
null
2021-12-20T00:06:24.120884Z
2021-12-19T19:34:41.093464Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fd734c6f25aea4b2b44b045e489aec67b388577e'}
Linux
GSD-2022-1001629
locking/lockdep: Avoid potential access of invalid memory in lock_class
locking/lockdep: Avoid potential access of invalid memory in lock_class This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 535e25486dec22a971e11f48190d5288c30b0ea4, it was introduced in version v5.1 by commit 8b39adbee805c539a461dbf208b125b096152b1c. For more details please see the references link.
null
2022-04-25T05:40:53.498653Z
2022-04-24T21:30:02.190499Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8b39adbee805c539a461dbf208b125b096152b1c'}
Linux
GSD-2021-1002683
scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select()
scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.168 by commit b847ecff850719c46c95acd25a0d555dfd16e10d. For more details please see the references link.
null
2022-01-11T06:49:12.752259Z
2021-12-27T05:36:41.367121Z
null
null
null
null
null
Linux
GSD-2021-1000714
net: caif: fix memory leak in cfusbl_device_notify
net: caif: fix memory leak in cfusbl_device_notify This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.272 by commit cc302e30a504e6b60a9ac8df7988646f46cd0294, it was introduced in version v3.3 by commit 7ad65bf68d705b445ef10b77ab50dab22be185ee. For more details please see the references link.
null
2021-12-19T23:08:05.494514Z
2021-06-24T23:58:44.752366Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ad65bf68d705b445ef10b77ab50dab22be185ee'}
Linux
GSD-2021-1002729
bpf: Fix kernel address leakage in atomic fetch
bpf: Fix kernel address leakage in atomic fetch This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit 423628125a484538111c2c6d9bb1588eb086053b, it was introduced in version v5.12 by commit 37086bfdc737ea6f66bf68dcf16757004d68e1e1. For more details please see the references link.
null
2022-01-11T05:48:12.485571Z
2021-12-27T05:39:32.942338Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/37086bfdc737ea6f66bf68dcf16757004d68e1e1'}
Linux
GSD-2021-1001806
drm/msm: Fix null pointer dereference on pointer edp
drm/msm: Fix null pointer dereference on pointer edp This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.213 by commit 7f642b93710b6b1119bdff90be01e6b5a2a5d669, it was introduced in version v4.0 by commit ab5b0107ccf3821a6837b0f2819270d6fa0b278f. For more details please see the references link.
null
2021-12-19T23:01:26.505876Z
2021-10-28T13:49:52.715984Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab5b0107ccf3821a6837b0f2819270d6fa0b278f'}
Linux
GSD-2022-1001783
video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow
video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 9ff2f7294ab0f011cd4d1b7dcd9a07d8fdf72834. For more details please see the references link.
null
2022-04-25T05:38:39.174737Z
2022-04-24T21:42:09.191757Z
null
null
null
null
null
Linux
GSD-2022-1000891
gso: do not skip outer ip header in case of ipip and net_failover
gso: do not skip outer ip header in case of ipip and net_failover This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.182 by commit 2b3cdd70ea5f5a694f95ea1788393fb3b83071ea, it was introduced in version v3.13 by commit cb32f511a70be8967ac9025cf49c44324ced9a39. For more details please see the references link.
null
2022-03-18T02:49:49.404084Z
2022-03-18T00:28:51.636757Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cb32f511a70be8967ac9025cf49c44324ced9a39'}
Linux
GSD-2022-1001279
btrfs: verify the tranisd of the to-be-written dirty extent buffer
btrfs: verify the tranisd of the to-be-written dirty extent buffer This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 64e75c4e0794830c9fca3ab22d1aef1498da5fda. For more details please see the references link.
null
2022-04-25T04:47:34.232486Z
2022-04-24T21:00:54.462264Z
null
null
null
null
null
Linux
GSD-2021-1001555
ipack: ipoctal: fix stack information leak
ipack: ipoctal: fix stack information leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.209 by commit 829f13d6079cf7a2465522f39acb43033e9b320d, it was introduced in version v3.5 by commit ba4dc61fe8c545a5d6a68b63616776556b771f51. For more details please see the references link.
null
2021-12-20T00:25:08.301762Z
2021-10-19T16:23:35.053431Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ba4dc61fe8c545a5d6a68b63616776556b771f51'}
Linux
GSD-2022-1002005
scsi: pm8001: Fix memory leak in pm8001_chip_fw_flash_update_req()
scsi: pm8001: Fix memory leak in pm8001_chip_fw_flash_update_req() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit d83574666bac4b1462e90df393fbed6c5f57d1a3. For more details please see the references link.
null
2022-04-25T04:59:49.818304Z
2022-04-24T22:02:31.174432Z
null
null
null
null
null
Linux
GSD-2022-1000038
binder: fix async_free_space accounting for empty parcels
binder: fix async_free_space accounting for empty parcels This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.90 by commit 1cb8444f3114f0bb2f6e3bcadcf09aa4a28425d4, it was introduced in version v4.14 by commit 74310e06be4d74dcf67cd108366710dee5c576d5. For more details please see the references link.
null
2022-01-11T05:53:24.173677Z
2022-01-10T19:51:13.566205Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/74310e06be4d74dcf67cd108366710dee5c576d5'}
Linux
GSD-2021-1001105
net: caif: fix memory leak in ldisc_open
net: caif: fix memory leak in ldisc_open This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.238 by commit 8afbbbbca1f02f925f128f7d7801dbfc84eaaf14. For more details please see the references link.
null
2021-12-19T23:56:27.967989Z
2021-07-08T01:56:39.545876Z
null
null
null
null
null
Linux
GSD-2022-1000192
powerpc/32s: Fix kasan_init_region() for KASAN
powerpc/32s: Fix kasan_init_region() for KASAN This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.96 by commit 50f5d0a8bd0ed41ac9477cfbcebe8d15e9efd35c, it was introduced in version v5.8 by commit 7974c4732642f710b5111165ae1f7f7fed822282. For more details please see the references link.
null
2022-02-19T12:05:26.809315Z
2022-02-18T21:53:03.972471Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7974c4732642f710b5111165ae1f7f7fed822282'}
Linux
GSD-2022-1002455
mac80211: fix potential double free on mesh join
mac80211: fix potential double free on mesh join This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.274 by commit c1d9c3628ef0a0ca197595d0f9e01cd3b5dda186, it was introduced in version v4.14.192 by commit 86e7d4cd2ed5f4b0188afce8199faffcf1ae7c7e. For more details please see the references link.
null
2022-04-25T02:54:11.889307Z
2022-04-24T22:50:02.890383Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/86e7d4cd2ed5f4b0188afce8199faffcf1ae7c7e'}
Linux
GSD-2022-1000468
libsubcmd: Fix use-after-free for realloc(..., 0)
libsubcmd: Fix use-after-free for realloc(..., 0) This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit f8ba235c4927b5f970c868ac101ec42ca16c183a, it was introduced in version v4.5 by commit 2f4ce5ec1d447beb42143a9653716a2ab025161e. For more details please see the references link.
null
2022-03-07T02:43:32.632924Z
2022-02-27T03:11:27.337862Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2f4ce5ec1d447beb42143a9653716a2ab025161e'}
Linux
GSD-2021-1002400
xhci: Fix commad ring abort, write all 64 bits to CRCR register.
xhci: Fix commad ring abort, write all 64 bits to CRCR register. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.257 by commit e31a18f3c1f57974b919ae5ed36ed616467f93b3, it was introduced in version v4.14.252 by commit 22bcb65ea41072ab5d03c0c6290e04e0df6d09a0. For more details please see the references link.
null
2021-12-20T00:10:38.730231Z
2021-12-19T19:35:39.719299Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/22bcb65ea41072ab5d03c0c6290e04e0df6d09a0'}
Linux
GSD-2022-1001150
f2fs: use spin_lock to avoid hang
f2fs: use spin_lock to avoid hang This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit ec4187d45cc1c2d69fffeee5fa6aa4cb62477cfb. For more details please see the references link.
null
2022-04-25T06:22:55.902248Z
2022-04-24T20:49:03.529972Z
null
null
null
null
null
Linux
GSD-2021-1002050
isdn: cpai: check ctr->cnr to avoid array index out of bound
isdn: cpai: check ctr->cnr to avoid array index out of bound This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit 7f221ccbee4ec662e2292d490a43ce6c314c4594. For more details please see the references link.
null
2021-12-20T01:34:52.661822Z
2021-11-14T15:17:34.827703Z
null
null
null
null
null
Linux
GSD-2021-1000597
tipc: skb_linearize the head skb when reassembling msgs
tipc: skb_linearize the head skb when reassembling msgs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit 6da24cfc83ba4f97ea44fc7ae9999a006101755c, it was introduced in version v4.3 by commit 45c8b7b175ceb2d542e0fe15247377bf3bce29ec. For more details please see the references link.
null
2021-12-20T01:35:11.734768Z
2021-06-04T19:44:44.245995Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/45c8b7b175ceb2d542e0fe15247377bf3bce29ec'}
Linux
GSD-2022-1001500
clk: qcom: clk-rcg2: Update logic to calculate D value for RCG
clk: qcom: clk-rcg2: Update logic to calculate D value for RCG This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 96888f0dcf351e758b9df57e015a48427ca709c1, it was introduced in version v3.16 by commit 99cbd064b059f222c8839ba433a68b2d6ee33066. For more details please see the references link.
null
2022-04-25T04:15:31.846183Z
2022-04-24T21:17:40.818197Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/99cbd064b059f222c8839ba433a68b2d6ee33066'}
Linux
GSD-2022-1002286
mac80211: fix potential double free on mesh join
mac80211: fix potential double free on mesh join This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.188 by commit 3bbd0000d012f92aec423b224784fbf0f7bf40f8, it was introduced in version v5.4.56 by commit 3f15e3e62c80e180282f0cbc5559264e11c328b7. For more details please see the references link.
null
2022-04-25T06:03:53.256832Z
2022-04-24T22:30:19.870199Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f15e3e62c80e180282f0cbc5559264e11c328b7'}
Linux
GSD-2022-1001853
vfio/pci: fix memory leak during D3hot to D0 transition
vfio/pci: fix memory leak during D3hot to D0 transition This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 4319f17fb8264ba39352b611dfa913a4d8c1d1a0, it was introduced in version v5.1 by commit 51ef3a004b1eb6241e56b3aa8495769a092a4dc2. For more details please see the references link.
null
2022-04-25T05:31:09.339938Z
2022-04-24T21:48:26.247527Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/51ef3a004b1eb6241e56b3aa8495769a092a4dc2'}
Linux
GSD-2022-1000741
nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac()
nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.12 by commit 4086d2433576baf85f0e538511df97c8101e0a10, it was introduced in version v5.1 by commit 20cce88650981ec504d328dbbdd004d991eb8535. For more details please see the references link.
null
2022-03-18T02:55:37.465156Z
2022-03-18T00:14:26.107633Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/20cce88650981ec504d328dbbdd004d991eb8535'}
Linux
GSD-2021-1001386
scsi: core: Fix bad pointer dereference when ehandler kthread is invalid
scsi: core: Fix bad pointer dereference when ehandler kthread is invalid This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.198 by commit e1bd3fac2baa3d5c04375980c1d5263a3335af92, it was introduced in version v4.19.195 by commit 2dc85045ae65b9302a1d2e2ddd7ce4c030153a6a. For more details please see the references link.
null
2021-12-20T00:46:59.948775Z
2021-08-03T02:26:17.758209Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2dc85045ae65b9302a1d2e2ddd7ce4c030153a6a'}
Linux
GSD-2022-1000311
ax25: improve the incomplete fix to avoid UAF and NPD bugs
ax25: improve the incomplete fix to avoid UAF and NPD bugs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.268 by commit a509dbde35fa51d140512cbcf50068a84fdb7aad. For more details please see the references link.
null
2022-03-07T02:37:36.905068Z
2022-02-27T02:49:24.654596Z
null
null
null
null
null
Linux
GSD-2021-1000981
netfilter: synproxy: Fix out of bounds when parsing TCP options
netfilter: synproxy: Fix out of bounds when parsing TCP options This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit 9cdf299ba4e153b5e56187648420de22c6216f02, it was introduced in version v3.12 by commit 48b1de4c110a7afa4b85862f6c75af817db26fad. For more details please see the references link.
null
2021-12-20T01:11:31.260784Z
2021-06-30T00:31:11.192383Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/48b1de4c110a7afa4b85862f6c75af817db26fad'}
Linux
GSD-2021-1001693
net_sched: fix NULL deref in fifo_set_limit()
net_sched: fix NULL deref in fifo_set_limit() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.12 by commit fb58cd7991747b5e0b110c98c922d7b0e47a1f14, it was introduced in version v2.6.27 by commit fb0305ce1b03f6ff17f84f2c63daccecb45f2805. For more details please see the references link.
null
2021-12-19T22:54:21.597323Z
2021-10-19T16:32:10.744248Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb0305ce1b03f6ff17f84f2c63daccecb45f2805'}
Linux
GSD-2022-1001916
ocfs2: fix crash when mount with quota enabled
ocfs2: fix crash when mount with quota enabled This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 7c5312fdb1dcfdc1951b018669af88d5d6420b31, it was introduced in version v5.15 by commit 6c85c2c728193d19d6a908ae9fb312d0325e65ca. For more details please see the references link.
null
2022-04-25T08:22:56.367600Z
2022-04-24T21:54:16.124696Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6c85c2c728193d19d6a908ae9fb312d0325e65ca'}
Linux
GSD-2022-1000604
udf: Fix NULL ptr deref when converting from inline format
udf: Fix NULL ptr deref when converting from inline format This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit 620e8243cf5389e706c1c8f66ffacb3c84308a9e, it was introduced in version v4.2 by commit 52ebea749aaed195245701a8f90a23d672c7a933. For more details please see the references link.
null
2022-03-07T01:39:46.839992Z
2022-02-27T03:29:42.024437Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/52ebea749aaed195245701a8f90a23d672c7a933'}
Linux
GSD-2021-1001369
igb: Fix use-after-free error during reset
igb: Fix use-after-free error during reset This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.199 by commit d3ccb18ed5ac3283c7b31ecc685b499e580d5492, it was introduced in version v4.12 by commit 7cc6fd4c60f267e17b0baef1580d7a6258c0a6f0. For more details please see the references link.
null
2021-12-19T22:57:07.184824Z
2021-08-03T02:20:44.896033Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7cc6fd4c60f267e17b0baef1580d7a6258c0a6f0'}
Linux
GSD-2022-1000254
i40e: Fix queues reservation for XDP
i40e: Fix queues reservation for XDP This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.19 by commit 00eddb0e4ea115154581d1049507a996acfc2d3e, it was introduced in version v3.12 by commit 41c445ff0f482bb6e6b72dcee9e598e20575f743. For more details please see the references link.
null
2022-02-20T06:24:26.964938Z
2022-02-18T22:01:46.957834Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41c445ff0f482bb6e6b72dcee9e598e20575f743'}
Linux
GSD-2022-1002269
drbd: fix potential silent data corruption
drbd: fix potential silent data corruption This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit ded62776302663332a1e7a561649cfb39632cb72. For more details please see the references link.
null
2022-04-25T08:47:55.686569Z
2022-04-24T22:28:34.777251Z
null
null
null
null
null
Linux
GSD-2021-1002816
phonet/pep: refuse to enable an unbound pipe
phonet/pep: refuse to enable an unbound pipe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.89 by commit 52ad5da8e316fa11e3a50b3f089aa63e4089bf52. For more details please see the references link.
null
2022-01-11T05:48:22.300137Z
2021-12-30T02:44:41.842091Z
null
null
null
null
null
Linux
GSD-2021-1001739
tty: Fix out-of-bound vmalloc access in imageblit
tty: Fix out-of-bound vmalloc access in imageblit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit 699d926585daa6ec44be556cdc1ab89e5d54557b. For more details please see the references link.
null
2021-12-19T22:24:16.775321Z
2021-10-19T16:34:22.226974Z
null
null
null
null
null
Linux
GSD-2021-1000082
mtd: physmap: physmap-bt1-rom: Fix unintentional stack access
mtd: physmap: physmap-bt1-rom: Fix unintentional stack access This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.3 by commit 4d786870e3262ec098a3b4ed10b895176bc66ecb, it was introduced in version v5.10 by commit b3e79e7682e075326df8041b826b03453acacd0a. For more details please see the references link.
null
2021-12-20T00:37:32.037178Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b3e79e7682e075326df8041b826b03453acacd0a'}
Linux
GSD-2022-1001015
dpaa2-ptp: Fix refcount leak in dpaa2_ptp_probe
dpaa2-ptp: Fix refcount leak in dpaa2_ptp_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 45fdd98b70142521739615ad1bfb760401863b73, it was introduced in version v5.3 by commit d346c9e86d8685d7cdceddf5b2e9c4376334620c. For more details please see the references link.
null
2022-04-25T03:11:44.548817Z
2022-04-24T20:39:59.263474Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d346c9e86d8685d7cdceddf5b2e9c4376334620c'}
Linux
GSD-2021-1002545
net: vlan: fix underflow for the real_dev refcnt
net: vlan: fix underflow for the real_dev refcnt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.6 by commit f7fc72a508cf115c273a7a29350069def1041890, it was introduced in version v5.15.3 by commit 21032425c36ff85f16e72ca92193a8c401e4acd5. For more details please see the references link.
null
2021-12-20T00:28:07.250468Z
2021-12-19T19:42:04.355738Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/21032425c36ff85f16e72ca92193a8c401e4acd5'}
Linux
GSD-2021-1000578
net: hns3: put off calling register_netdev() until client initialize complete
net: hns3: put off calling register_netdev() until client initialize complete This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit a663c1e418a3b5b8e8edfad4bc8e7278c312d6fc, it was introduced in version v5.6 by commit 08a100689d4baf296d6898c687ea8d005da8d234. For more details please see the references link.
null
2021-12-20T00:19:27.838366Z
2021-06-04T19:41:45.060674Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/08a100689d4baf296d6898c687ea8d005da8d234'}
Linux
GSD-2022-1001445
scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair()
scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 1ab81d82fb1db7ec4be4b0d04563513e6d4bcdd5. For more details please see the references link.
null
2022-04-25T05:16:25.692837Z
2022-04-24T21:14:01.421593Z
null
null
null
null
null
Linux
GSD-2021-1002115
kunit: fix reference count leak in kfree_at_end
kunit: fix reference count leak in kfree_at_end This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit bbdd158b40b66a9403391a517f24ef6613573446. For more details please see the references link.
null
2021-12-19T23:32:51.987765Z
2021-11-14T15:20:31.158072Z
null
null
null
null
null
Linux
GSD-2021-1000128
net: hso: fix NULL-deref on disconnect regression
net: hso: fix NULL-deref on disconnect regression This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.17 by commit 0f000005da31f6947f843ce6b3e3a960540c6e00, it was introduced in version v5.11.14 by commit 388d05f70f1ee0cac4a2068fd295072f1a44152a. For more details please see the references link.
null
2021-12-19T22:20:11.428599Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/388d05f70f1ee0cac4a2068fd295072f1a44152a'}
Linux
GSD-2021-1000606
net: usb: fix memory leak in smsc75xx_bind
net: usb: fix memory leak in smsc75xx_bind This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit 635ac38b36255d3cfb8312cf7c471334f4d537e0, it was introduced in version v2.6.34 by commit d0cad871703b898a442e4049c532ec39168e5b57. For more details please see the references link.
null
2021-12-19T23:36:01.940746Z
2021-06-04T19:46:28.748450Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0cad871703b898a442e4049c532ec39168e5b57'}
Linux
GSD-2021-1001914
nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells
nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.290 by commit abcb8d33e4d2215ccde5ab5ccf9f730a59d79d97, it was introduced in version v4.3 by commit 69aba7948cbe53f2f1827e84e9dd0ae470a5072e. For more details please see the references link.
null
2021-12-20T01:36:17.783436Z
2021-11-14T15:11:30.059139Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69aba7948cbe53f2f1827e84e9dd0ae470a5072e'}
Linux
GSD-2022-1001691
skbuff: fix coalescing for page_pool fragment recycling
skbuff: fix coalescing for page_pool fragment recycling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit ba965e8605aee5387cecaa28fcf7ee9f61779a49, it was introduced in version v5.15 by commit 53e0961da1c7bbdabd1abebb20de403ec237ec09. For more details please see the references link.
null
2022-04-25T06:45:11.484173Z
2022-04-24T21:35:38.443666Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/53e0961da1c7bbdabd1abebb20de403ec237ec09'}
Linux
GSD-2022-1000983
cachefiles: Fix KASAN slab-out-of-bounds in cachefiles_set_volume_xattr
cachefiles: Fix KASAN slab-out-of-bounds in cachefiles_set_volume_xattr This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.4 by commit 09a5df1b88c8f126c8ff9938edf160edd4e92f42, it was introduced in version v5.17 by commit 413a4a6b0b5553f2423d210f65e98c211b99c3f8. For more details please see the references link.
null
2022-04-25T06:20:01.376172Z
2022-04-24T20:37:06.198036Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/413a4a6b0b5553f2423d210f65e98c211b99c3f8'}
Linux
GSD-2021-1000256
mt76: mt7615: fix tx skb dma unmap
mt76: mt7615: fix tx skb dma unmap This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 821ae236ccea989a1fcc6abfc4d5b74ad4ba39d2, it was introduced in version v5.10 by commit 27d5c528a7ca08dcd44877fdd9fc08b76630bf77. For more details please see the references link.
null
2021-12-19T22:54:09.339688Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/27d5c528a7ca08dcd44877fdd9fc08b76630bf77'}
Linux
GSD-2022-1000829
net: ipv6: ensure we call ipv6_mc_down() at most once
net: ipv6: ensure we call ipv6_mc_down() at most once This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.104 by commit f4c63b24dea9cc2043ff845dcca9aaf8109ea38a, it was introduced in version v3.18 by commit 3ce62a84d53cd3d3cc5377bbf339e9b08ddf9c36. For more details please see the references link.
null
2022-03-18T02:55:55.557612Z
2022-03-18T00:22:10.487273Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3ce62a84d53cd3d3cc5377bbf339e9b08ddf9c36'}
Linux
GSD-2021-1002791
phonet/pep: refuse to enable an unbound pipe
phonet/pep: refuse to enable an unbound pipe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.223 by commit 982b6ba1ce626ef87e5c29f26f2401897554f235. For more details please see the references link.
null
2022-01-11T05:47:53.524409Z
2021-12-30T02:43:34.482412Z
null
null
null
null
null
Linux
GSD-2021-1001017
spi: bcm2835: Fix out-of-bounds access with more than 4 slaves
spi: bcm2835: Fix out-of-bounds access with more than 4 slaves This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit 01415ff85a24308059e06ca3e97fd7bf75648690, it was introduced in version v5.4 by commit 571e31fa60b3697d5db26140e16d5c45c51c9815. For more details please see the references link.
null
2021-12-20T00:52:40.262722Z
2021-06-30T00:34:10.521112Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/571e31fa60b3697d5db26140e16d5c45c51c9815'}
Linux
GSD-2022-1000080
usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS
usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.300 by commit 41579b9e73773dc9157df13494c9916c30fe5e09, it was introduced in version v4.9.273 by commit beb1e67a5ca8d69703c776db9000527f44c0c93c. For more details please see the references link.
null
2022-02-19T08:08:16.798520Z
2022-02-18T21:32:57.822588Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/beb1e67a5ca8d69703c776db9000527f44c0c93c'}
Linux
GSD-2021-1001447
watchdog: Fix possible use-after-free by calling del_timer_sync()
watchdog: Fix possible use-after-free by calling del_timer_sync() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.276 by commit ca96b8ea5e74956071154bdb456778cc3027e79f. For more details please see the references link.
null
2021-12-19T23:59:49.384666Z
2021-08-03T02:44:21.562698Z
null
null
null
null
null
Linux
GSD-2022-1002117
clocksource/drivers/exynos_mct: Handle DTS with higher number of interrupts
clocksource/drivers/exynos_mct: Handle DTS with higher number of interrupts This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit db9d00461bdf9a0567a899f2980cf47f4217476d, it was introduced in version v3.10 by commit 36ba5d527e9567ed303bad6e86a5f3c2723470f6. For more details please see the references link.
null
2022-04-25T03:19:45.878224Z
2022-04-24T22:13:23.222412Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/36ba5d527e9567ed303bad6e86a5f3c2723470f6'}
Linux
GSD-2022-1002402
scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one()
scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 1e0c01319dedf1e63ec5df37ead048e17afd92ba, it was introduced in version v2.6.23 by commit 45804fbb00eea27bdf4d62751681228a9e2844e9. For more details please see the references link.
null
2022-04-25T06:57:21.514147Z
2022-04-24T22:43:40.938938Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/45804fbb00eea27bdf4d62751681228a9e2844e9'}
Linux
GSD-2021-1001152
dma-buf/sync_file: Don't leak fences on merge failure
dma-buf/sync_file: Don't leak fences on merge failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.5 by commit 19edcd97727aae9362444a859a24d99a8730cb27, it was introduced in version v4.9 by commit a02b9dc90d844cc7df7b63264e7920cc425052d9. For more details please see the references link.
null
2021-12-19T22:18:04.798114Z
2021-08-03T01:30:52.266106Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a02b9dc90d844cc7df7b63264e7920cc425052d9'}
Linux
GSD-2022-1002052
Revert "Revert "block, bfq: honor already-setup queue merges""
Revert "Revert "block, bfq: honor already-setup queue merges"" This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit cc051f497eac9d8a0d816cd4bffa3415f2724871. For more details please see the references link.
null
2022-04-25T05:27:18.364345Z
2022-04-24T22:05:59.740980Z
null
null
null
null
null
Linux
GSD-2021-1001502
xen/x86: fix PV trap handling on secondary processors
xen/x86: fix PV trap handling on secondary processors This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.286 by commit fda79676ed9a4ca142e60f91234a5e349b3206e5, it was introduced in version v2.6.23 by commit f87e4cac4f4e940b328d3deb5b53e642e3881f43. For more details please see the references link.
null
2021-12-20T00:14:26.515477Z
2021-10-19T16:21:09.029006Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f87e4cac4f4e940b328d3deb5b53e642e3881f43'}
Linux
GSD-2022-1000595
ext4: fix error handling in ext4_fc_record_modified_inode()
ext4: fix error handling in ext4_fc_record_modified_inode() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.22 by commit 1b6762ecdf3cf12113772427c904aa3c420a1802. For more details please see the references link.
null
2022-03-07T01:40:55.579952Z
2022-02-27T03:28:41.095702Z
null
null
null
null
null
Linux
GSD-2021-1002284
scsi: core: sysfs: Fix hang when device state is set via sysfs
scsi: core: sysfs: Fix hang when device state is set via sysfs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.82 by commit a792e0128d232251edb5fdf42fb0f9fbb0b44a73, it was introduced in version v5.10.61 by commit 711459514e297d748f15ba1f5292a3276c3d1dd0. For more details please see the references link.
null
2021-12-19T23:30:44.667340Z
2021-11-29T02:37:00.429589Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/711459514e297d748f15ba1f5292a3276c3d1dd0'}
Linux
GSD-2021-1000743
ocfs2: fix data corruption by fallocate
ocfs2: fix data corruption by fallocate This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.194 by commit cec4e857ffaa8c447f51cd8ab4e72350077b6770, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T00:20:01.355228Z
2021-06-25T00:01:54.462504Z
null
null
null
null
null
Linux
GSD-2021-1001851
netfilter: xt_IDLETIMER: fix panic that occurs when timer_type has garbage value
netfilter: xt_IDLETIMER: fix panic that occurs when timer_type has garbage value This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit 2a670c323055282c9b72794a491d53cef86bbeaf, it was introduced in version v5.7 by commit 68983a354a655c35d3fb204489d383a2a051fda7. For more details please see the references link.
null
2021-12-19T22:49:44.981549Z
2021-10-28T13:52:10.835207Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/68983a354a655c35d3fb204489d383a2a051fda7'}
Linux
GSD-2021-1000313
KVM: nVMX: Always make an attempt to map eVMCS after migration
KVM: nVMX: Always make an attempt to map eVMCS after migration This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.38 by commit c8bf64e3fb77cc19bad146fbe26651985b117194, it was introduced in version v5.10.13 by commit 0faceb7d6dda6f370ff1fa0464d7180f7e5cb417. For more details please see the references link.
null
2021-12-19T22:56:14.985774Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0faceb7d6dda6f370ff1fa0464d7180f7e5cb417'}
Linux
GSD-2022-1001384
Bluetooth: Fix use after free in hci_send_acl
Bluetooth: Fix use after free in hci_send_acl This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 4da302b90b96c309987eb9b37c8547f939f042d2. For more details please see the references link.
null
2022-04-25T04:26:45.447909Z
2022-04-24T21:09:29.928519Z
null
null
null
null
null
Linux
GSD-2022-1000346
parisc: Fix data TLB miss in sba_unmap_sg
parisc: Fix data TLB miss in sba_unmap_sg This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.181 by commit efccc9b0c7e28d0eb7918a236e59f60dc23db4c3. For more details please see the references link.
null
2022-03-07T01:38:38.943293Z
2022-02-27T02:54:03.312836Z
null
null
null
null
null
Linux
GSD-2021-1000939
bonding: init notify_work earlier to avoid uninitialized use
bonding: init notify_work earlier to avoid uninitialized use This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.44 by commit 42e49001380989f757f17045cf352dff9ae124b3. For more details please see the references link.
null
2021-12-19T23:35:56.680270Z
2021-06-30T00:25:48.863014Z
null
null
null
null
null
Linux
GSD-2021-1000893
drm: Lock pointer access in drm_master_release()
drm: Lock pointer access in drm_master_release() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.126 by commit 977d11df793280fe592a68896a8e00b9f813e75c. For more details please see the references link.
null
2021-12-20T00:10:45.050618Z
2021-06-30T00:04:55.331538Z
null
null
null
null
null
Linux
GSD-2021-1001781
ocfs2: mount fails with buffer overflow in strlen
ocfs2: mount fails with buffer overflow in strlen This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.288 by commit 4b74ddcc22ee6455946e80a9c4808801f8f8561e. For more details please see the references link.
null
2021-12-20T00:38:31.566252Z
2021-10-28T13:48:34.367876Z
null
null
null
null
null
Linux
GSD-2022-1001804
net: sparx5: switchdev: fix possible NULL pointer dereference
net: sparx5: switchdev: fix possible NULL pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit b375ea083fa649092cd016ac1f89a2d1fd8f8e8b, it was introduced in version v5.15 by commit 10615907e9b51c9ae92f3a6ecabd01c482f20f32. For more details please see the references link.
null
2022-04-25T02:47:58.132920Z
2022-04-24T21:43:16.027608Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/10615907e9b51c9ae92f3a6ecabd01c482f20f32'}
Linux
GSD-2022-1000716
usb: gadget: clear related members when goto fail
usb: gadget: clear related members when goto fail This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.13 by commit 030b335a1dd1f306da6cee0514f22e602576389e. For more details please see the references link.
null
2022-03-18T02:51:44.442858Z
2022-03-18T00:11:58.154855Z
null
null
null
null
null
Linux
GSD-2022-1001557
libbpf: Fix possible NULL pointer dereference when destroying skeleton
libbpf: Fix possible NULL pointer dereference when destroying skeleton This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 650f1a4e01f1edbb168b557bcdb9218d48e58b03, it was introduced in version v5.6 by commit d66562fba1ce66975bd61b0786fb8b1810f33caa. For more details please see the references link.
null
2022-04-25T07:53:00.745183Z
2022-04-24T21:23:20.771976Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d66562fba1ce66975bd61b0786fb8b1810f33caa'}
Linux
GSD-2021-1002007
audit: fix possible null-pointer dereference in audit_filter_rules
audit: fix possible null-pointer dereference in audit_filter_rules This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.156 by commit d6f451f1f60c58d73038c7c3177066f8f084e2a2, it was introduced in version v5.3 by commit bf361231c295d92a28ca283ea713f56e93e55796. For more details please see the references link.
null
2021-12-19T23:01:45.944532Z
2021-11-14T15:15:41.018826Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf361231c295d92a28ca283ea713f56e93e55796'}
Linux
GSD-2021-1000190
KVM: VMX: Disable preemption when probing user return MSRs
KVM: VMX: Disable preemption when probing user return MSRs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit e3ea1895df719c4ef87862501bb10d95f4177bed, it was introduced in version v5.5 by commit 4be5341026246870818e28b53202b001426a5aec. For more details please see the references link.
null
2021-12-19T22:39:48.687409Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4be5341026246870818e28b53202b001426a5aec'}
Linux
GSD-2022-1001107
rxrpc: Fix call timer start racing with call destruction
rxrpc: Fix call timer start racing with call destruction This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 5e3c11144e557a9dbf9a2f6abe444689ef9d8aae, it was introduced in version v4.15 by commit a158bdd3247b9656df36ba133235fff702e9fdc3. For more details please see the references link.
null
2022-04-25T04:56:45.655554Z
2022-04-24T20:45:57.207895Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a158bdd3247b9656df36ba133235fff702e9fdc3'}
Linux
GSD-2021-1002457
seg6: fix the iif in the IPv6 socket control block
seg6: fix the iif in the IPv6 socket control block This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.165 by commit ef8804e47c0a44ae106ead1740408af5ea6c6ee9, it was introduced in version v5.0 by commit ef489749aae508e6f17886775c075f12ff919fb1. For more details please see the references link.
null
2021-12-20T00:19:47.103988Z
2021-12-19T19:38:11.813087Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef489749aae508e6f17886775c075f12ff919fb1'}
Linux
GSD-2021-1002142
comedi: ni_usb6501: fix NULL-deref in command paths
comedi: ni_usb6501: fix NULL-deref in command paths This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.18 by commit 4a9d43cb5d5f39fa39fc1da438517004cc95f7ea, it was introduced in version v3.18 by commit a03bb00e50ab4c07107da58a52a0bff7943f360c. For more details please see the references link.
null
2021-12-19T23:25:27.582551Z
2021-11-14T15:21:46.528449Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a03bb00e50ab4c07107da58a52a0bff7943f360c'}
Linux
GSD-2021-1000485
bus: qcom: Put child node before return
bus: qcom: Put child node before return This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.269 by commit a6191e91c10e50bd51db65a00e03d02b6b0cf8c4, it was introduced in version v4.9 by commit 335a127548081322bd2b294d715418648912f20c. For more details please see the references link.
null
2021-12-20T00:21:30.141438Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/335a127548081322bd2b294d715418648912f20c'}
Linux
GSD-2022-1001412
ath11k: fix kernel panic during unload/load ath11k modules
ath11k: fix kernel panic during unload/load ath11k modules This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 699e8c87e5c406af0f0606f40eeebd248c51b702. For more details please see the references link.
null
2022-04-25T03:38:10.273872Z
2022-04-24T21:11:03.710027Z
null
null
null
null
null
Linux
GSD-2021-1002512
nfsd: Fix nsfd startup race (again)
nfsd: Fix nsfd startup race (again) This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.85 by commit c520943a00ad5015704969ad3304c956bcd49d25, it was introduced in version v5.10.20 by commit 7c7cb07d4affcf41749234fe9dc4d90cd3959e32. For more details please see the references link.
null
2021-12-19T22:01:14.313999Z
2021-12-19T19:40:37.477863Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7c7cb07d4affcf41749234fe9dc4d90cd3959e32'}
Linux
GSD-2022-1001042
Bluetooth: Fix use after free in hci_send_acl
Bluetooth: Fix use after free in hci_send_acl This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit b3c2ea1fd444b3bb7b82bfd2c3a45418f85c2502. For more details please see the references link.
null
2022-04-25T06:15:48.333686Z
2022-04-24T20:41:52.429518Z
null
null
null
null
null
Linux
GSD-2021-1002841
tee: optee: Fix incorrect page free bug
tee: optee: Fix incorrect page free bug This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.12 by commit 91e94e42f6fc49635f1a16d8ae3f79552bcfda29, it was introduced in version v5.14 by commit ec185dd3ab257dc2a60953fdf1b6622f524cc5b7. For more details please see the references link.
null
2022-01-11T05:53:03.723593Z
2021-12-30T02:45:50.104741Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ec185dd3ab257dc2a60953fdf1b6622f524cc5b7'}
Linux
GSD-2021-1001294
ubifs: Fix races between xattr_{set|get} and listxattr operations
ubifs: Fix races between xattr_{set|get} and listxattr operations This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.51 by commit 38dde03eb239605f428f3f1e4baa73d4933a4cc6, it was introduced in version v2.6.27 by commit 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d. For more details please see the references link.
null
2021-12-19T22:14:54.477079Z
2021-08-03T01:59:46.422729Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d'}
Linux
GSD-2022-1000203
net: bridge: vlan: fix memory leak in __allowed_ingress
net: bridge: vlan: fix memory leak in __allowed_ingress This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.96 by commit 446ff1fc37c74093e81db40811a07b5a19f1d797, it was introduced in version v5.6 by commit a580c76d534c7360ba68042b19cb255e8420e987. For more details please see the references link.
null
2022-02-20T02:06:42.950240Z
2022-02-18T21:55:07.224925Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a580c76d534c7360ba68042b19cb255e8420e987'}
Linux
GSD-2022-1002394
mm/sparsemem: fix 'mem_section' will never be NULL gcc 12 warning
mm/sparsemem: fix 'mem_section' will never be NULL gcc 12 warning This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 45ac758ee0eec41bed41434dc800d698ac912fbf, it was introduced in version v2.6.14 by commit 3e347261a80b57df792ab9464b5f0ed59add53a8. For more details please see the references link.
null
2022-04-25T06:50:24.125910Z
2022-04-24T22:42:50.784921Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3e347261a80b57df792ab9464b5f0ed59add53a8'}