ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2022-1001941
ALSA: oss: Fix PCM OSS buffer allocation overflow
ALSA: oss: Fix PCM OSS buffer allocation overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.32 by commit 7a40cbf3579a8e14849ba7ce46309c1992658d2b. For more details please see the references link.
null
2022-04-25T03:54:03.060736Z
2022-04-24T21:56:40.632014Z
null
null
null
null
null
Linux
GSD-2022-1000653
ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx()
ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.8 by commit e09cf398e8c6db69c620b6d8073abc4377a07af5. For more details please see the references link.
null
2022-03-07T01:50:07.616944Z
2022-02-27T03:36:31.266871Z
null
null
null
null
null
Linux
GSD-2022-1001936
tpm: fix reference counting for struct tpm_chip
tpm: fix reference counting for struct tpm_chip This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 662893b4f6bd466ff9e1cd454c44c26d32d554fe, it was introduced in version v4.12 by commit fdc915f7f71939ad5a3dda3389b8d2d7a7c5ee66. For more details please see the references link.
null
2022-04-25T04:59:18.657884Z
2022-04-24T21:56:20.834960Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fdc915f7f71939ad5a3dda3389b8d2d7a7c5ee66'}
Linux
GSD-2022-1000624
drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable
drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit 2b7e7df1eacd280e561ede3e977853606871c951, it was introduced in version v4.3 by commit 5c8290284402bf7d2c12269402b3177b899c78b7. For more details please see the references link.
null
2022-03-07T01:37:45.792286Z
2022-02-27T03:32:35.884406Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5c8290284402bf7d2c12269402b3177b899c78b7'}
Linux
GSD-2021-1001349
media: zr364xx: fix memory leak in zr364xx_start_readpipe
media: zr364xx: fix memory leak in zr364xx_start_readpipe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.133 by commit 0edd6759167295ea9969e89283b81017b4c688aa, it was introduced in version v2.6.32 by commit ccbf035ae5de4c535160fc99f73feb44cc55b534. For more details please see the references link.
null
2021-12-19T22:38:44.888926Z
2021-08-03T02:14:41.578450Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ccbf035ae5de4c535160fc99f73feb44cc55b534'}
Linux
GSD-2022-1002249
scsi: pm8001: Fix abort all task initialization
scsi: pm8001: Fix abort all task initialization This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 765674e3b30121782a2b792684554baa48c61f5e, it was introduced in version v3.10 by commit c6b9ef5779c3e1edfa9de949d2a51252bc347663. For more details please see the references link.
null
2022-04-25T03:35:34.149994Z
2022-04-24T22:26:04.993776Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6b9ef5779c3e1edfa9de949d2a51252bc347663'}
Linux
GSD-2022-1000274
net: amd-xgbe: Fix skb data length underflow
net: amd-xgbe: Fix skb data length underflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.20 by commit db6fd92316a254be2097556f01bccecf560e53ce, it was introduced in version v4.11 by commit 622c36f143fc9566ba49d7cec994c2da1182d9e2. For more details please see the references link.
null
2022-02-20T02:11:04.042500Z
2022-02-18T22:04:56.701495Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/622c36f143fc9566ba49d7cec994c2da1182d9e2'}
Linux
GSD-2021-1002836
mac80211: fix locking in ieee80211_start_ap error path
mac80211: fix locking in ieee80211_start_ap error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.12 by commit c1d1ec4db5f7264cfc21993e59e8f2dcecf4b44f, it was introduced in version v5.10 by commit 295b02c4be74bebf988593b8322369513fcecf68. For more details please see the references link.
null
2022-01-11T05:47:23.098528Z
2021-12-30T02:45:38.104091Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/295b02c4be74bebf988593b8322369513fcecf68'}
Linux
GSD-2021-1001719
ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup
ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit 2744341dd52e935344ca1b4bf189ba0d182a3e8e, it was introduced in version v5.0 by commit 4a9b32f30f805ca596d76605903a48eab58e0b88. For more details please see the references link.
null
2021-12-19T23:54:03.729859Z
2021-10-19T16:33:24.575405Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4a9b32f30f805ca596d76605903a48eab58e0b88'}
Linux
GSD-2022-1001035
staging: vchiq_core: handle NULL result of find_service_by_handle
staging: vchiq_core: handle NULL result of find_service_by_handle This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 3b424f6586a870b8d657c5e5419465bbe0e7b61f. For more details please see the references link.
null
2022-04-25T04:43:02.341456Z
2022-04-24T20:41:32.268490Z
null
null
null
null
null
Linux
GSD-2021-1000558
Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails
Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit 3178e0a38f204a61ed4fe5739d6a4732879b34d1, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T01:22:21.869325Z
2021-06-04T19:38:34.635708Z
null
null
null
null
null
Linux
GSD-2021-1002565
rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle()
rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.7 by commit bc97458620e38961af9505cc060ad4cf5c9e4af7, it was introduced in version v5.10 by commit 245500d853e9f20036cec7df4f6984ece4c6bf26. For more details please see the references link.
null
2021-12-19T23:55:32.962386Z
2021-12-19T19:43:00.266378Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/245500d853e9f20036cec7df4f6984ece4c6bf26'}
Linux
GSD-2022-1001465
media: staging: media: zoran: calculate the right buffer number for zoran_reap_stat_com
media: staging: media: zoran: calculate the right buffer number for zoran_reap_stat_com This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 20db2ed1e2f9fcd417fa67853e5154f0c2537d6c. For more details please see the references link.
null
2022-04-25T05:59:11.039693Z
2022-04-24T21:15:09.655719Z
null
null
null
null
null
Linux
GSD-2021-1000108
ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure
ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.20 by commit 42e69521ee1fa5abf21f478d147d06bbfe6bf6a8, it was introduced in version v4.12 by commit ca9ae5ec4ef0ed13833b03297ab319676965492c. For more details please see the references link.
null
2021-12-19T22:52:15.657036Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca9ae5ec4ef0ed13833b03297ab319676965492c'}
Linux
GSD-2021-1002135
ice: check whether PTP is initialized in ice_ptp_release()
ice: check whether PTP is initialized in ice_ptp_release() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.16 by commit 63a97a9f95f26fb64c72087bfbdce767f69929e6, it was introduced in version v5.14.4 by commit 46720ac66c21bf85e08823664b7b314b85e43f26. For more details please see the references link.
null
2021-12-20T00:05:37.795275Z
2021-11-14T15:21:29.423042Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/46720ac66c21bf85e08823664b7b314b85e43f26'}
Linux
GSD-2021-1002420
rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer()
rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.220 by commit 913c24af2d13a3fd304462916ee98e298d56bdce, it was introduced in version v4.19.82 by commit e8e51ce79c157188e209e5ea0afaf6b42dd76104. For more details please see the references link.
null
2021-12-20T00:48:54.358300Z
2021-12-19T19:36:35.382867Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e8e51ce79c157188e209e5ea0afaf6b42dd76104'}
Linux
GSD-2022-1001170
lib/test: use after free in register_test_dev_kmod()
lib/test: use after free in register_test_dev_kmod() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 05f90fe2c7e8f27d7691ae57cb604e4c156b70e6, it was introduced in version v4.13 by commit d9c6a72d6fa29d3a7999dda726577e5d1fccafa5. For more details please see the references link.
null
2022-04-25T06:47:43.702074Z
2022-04-24T20:50:15.216618Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9c6a72d6fa29d3a7999dda726577e5d1fccafa5'}
Linux
GSD-2021-1002070
scsi: core: Put LLD module refcnt after SCSI device is released
scsi: core: Put LLD module refcnt after SCSI device is released This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.78 by commit 7b57c38d12aed1b5d92f74748bed25e0d041729f. For more details please see the references link.
null
2021-12-19T23:44:41.978993Z
2021-11-14T15:18:31.733113Z
null
null
null
null
null
Linux
GSD-2022-1001520
bpf, sockmap: Fix more uncharged while msg has more_data
bpf, sockmap: Fix more uncharged while msg has more_data This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 87d532d41ef937e16f61b3d2094f3a2ac49be365, it was introduced in version v4.20 by commit 604326b41a6fb9b4a78b6179335decee0365cd8c. For more details please see the references link.
null
2022-04-25T05:49:02.165010Z
2022-04-24T21:19:42.018702Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/604326b41a6fb9b4a78b6179335decee0365cd8c'}
Linux
GSD-2022-1001873
ASoC: mxs: Fix error handling in mxs_sgtl5000_probe
ASoC: mxs: Fix error handling in mxs_sgtl5000_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 44acdaf7acb60054d872bed18ce0e7db8ce900ce, it was introduced in version v3.5 by commit e968194b45c4e8077dada75c5bae5660b37628fe. For more details please see the references link.
null
2022-04-25T07:09:34.618509Z
2022-04-24T21:50:32.340037Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e968194b45c4e8077dada75c5bae5660b37628fe'}
Linux
GSD-2022-1000761
btrfs: do not WARN_ON() if we have PageError set
btrfs: do not WARN_ON() if we have PageError set This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.27 by commit e00077aa439f0e8f416699fa4e9600db6583db70. For more details please see the references link.
null
2022-03-18T02:50:27.796184Z
2022-03-18T00:15:51.394478Z
null
null
null
null
null
Linux
GSD-2022-1000331
libsubcmd: Fix use-after-free for realloc(..., 0)
libsubcmd: Fix use-after-free for realloc(..., 0) This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.231 by commit 1029268dc50d3eb54ab0e8d7075d33b190cad9d2, it was introduced in version v4.5 by commit 2f4ce5ec1d447beb42143a9653716a2ab025161e. For more details please see the references link.
null
2022-03-07T01:50:48.113405Z
2022-02-27T02:52:20.852579Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2f4ce5ec1d447beb42143a9653716a2ab025161e'}
Linux
GSD-2021-1002359
sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl
sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.294 by commit cdcd80292106df5cda325426e96495503e41f947, it was introduced in version v2.6.24 by commit faf0b2e5afe7dae072d2715763c7f992b612b628. For more details please see the references link.
null
2021-12-19T23:11:24.939832Z
2021-12-19T19:33:52.062275Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/faf0b2e5afe7dae072d2715763c7f992b612b628'}
Linux
GSD-2021-1000364
liquidio: Fix unintented sign extension of a left shift of a u16
liquidio: Fix unintented sign extension of a left shift of a u16 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit f9e9df72dc08873fccfc688fe19b85e93655f052, it was introduced in version v4.9 by commit 5bc67f587ba7eaa8dd3976bfeff8f2b60718c871. For more details please see the references link.
null
2021-12-20T00:14:10.943749Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5bc67f587ba7eaa8dd3976bfeff8f2b60718c871'}
Linux
GSD-2022-1001609
mm,hwpoison: unmap poisoned page before invalidation
mm,hwpoison: unmap poisoned page before invalidation This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 46f3292a16b09bbd1b4541a9b9e7888945f89c04, it was introduced in version v5.16.19 by commit d66a7ce91383e1910fd6bcae038a27771d5630f0. For more details please see the references link.
null
2022-04-24T21:28:00.663409Z
2022-04-24T21:28:00.663409Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d66a7ce91383e1910fd6bcae038a27771d5630f0'}
Linux
GSD-2021-1002709
media: mxl111sf: change mutex_init() location
media: mxl111sf: change mutex_init() location This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.88 by commit b99bdf127af91d53919e96292c05f737c45ea59a, it was introduced in version v3.7 by commit 8572211842afc53c8450fb470f2b8d02ba7592e0. For more details please see the references link.
null
2022-01-11T07:49:44.988601Z
2021-12-27T05:38:20.739285Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8572211842afc53c8450fb470f2b8d02ba7592e0'}
Linux
GSD-2021-1000734
nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect
nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.236 by commit ffff05b9ee5c74c04bba2801c1f99b31975d74d9, it was introduced in version v3.3 by commit d646960f7986fefb460a2b062d5ccc8ccfeacc3a. For more details please see the references link.
null
2021-12-19T22:47:32.295002Z
2021-06-24T23:59:58.252154Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d646960f7986fefb460a2b062d5ccc8ccfeacc3a'}
Linux
GSD-2021-1001826
mlxsw: thermal: Fix out-of-bounds memory accesses
mlxsw: thermal: Fix out-of-bounds memory accesses This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.155 by commit ae0993739e14a102d506aa09e11b0065f3144f10, it was introduced in version v4.10 by commit a50c1e35650b929500bd89be61c89d95a267ce56. For more details please see the references link.
null
2021-12-19T22:50:42.823966Z
2021-10-28T13:50:53.216632Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a50c1e35650b929500bd89be61c89d95a267ce56'}
Linux
GSD-2022-1001259
ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction
ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 39d2c4a33dc1b4402cec68a3c8f82c6588b6edce, it was introduced in version v3.16 by commit 00a7bb81c20f3e81711e28e0f6c08cee8fd18514. For more details please see the references link.
null
2022-04-25T05:34:18.753087Z
2022-04-24T20:58:55.301380Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/00a7bb81c20f3e81711e28e0f6c08cee8fd18514'}
Linux
GSD-2021-1001575
staging: greybus: uart: fix tty use after free
staging: greybus: uart: fix tty use after free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.209 by commit a5cfd51f6348e8fd7531461366946039c29c7e69, it was introduced in version v4.9 by commit a18e15175708d39abbe9746ddc3479466b7800c3. For more details please see the references link.
null
2021-12-20T00:28:10.081734Z
2021-10-19T16:24:29.017821Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a18e15175708d39abbe9746ddc3479466b7800c3'}
Linux
GSD-2022-1000018
sctp: use call_rcu to free endpoint
sctp: use call_rcu to free endpoint This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.261 by commit 8873140f95d4977bf37e4cf0d5c5e3f6e34cdd3e, it was introduced in version v4.14 by commit d25adbeb0cdb860fb39e09cdd025e9cfc954c5ab. For more details please see the references link.
null
2022-01-11T05:52:37.242866Z
2022-01-10T19:50:23.320957Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d25adbeb0cdb860fb39e09cdd025e9cfc954c5ab'}
Linux
GSD-2022-1002025
rxrpc: Fix call timer start racing with call destruction
rxrpc: Fix call timer start racing with call destruction This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 051360e51341cd17738d82c15a8226010c7cb7f6, it was introduced in version v4.15 by commit a158bdd3247b9656df36ba133235fff702e9fdc3. For more details please see the references link.
null
2022-04-25T06:01:55.501577Z
2022-04-24T22:03:56.385303Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a158bdd3247b9656df36ba133235fff702e9fdc3'}
Linux
GSD-2021-1001125
net: caif: fix memory leak in ldisc_open
net: caif: fix memory leak in ldisc_open This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.47 by commit 18ed1789bbce54f34367877344e35d9bb877f8f4. For more details please see the references link.
null
2021-12-20T03:55:14.812547Z
2021-07-08T01:58:07.846901Z
null
null
null
null
null
Linux
GSD-2022-1000448
iommu: Fix potential use-after-free during probe
iommu: Fix potential use-after-free during probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit 65ab30f6a6952fa9ee13009862736cf8d110e6e5. For more details please see the references link.
null
2022-03-07T01:35:24.270760Z
2022-02-27T03:08:28.610880Z
null
null
null
null
null
Linux
GSD-2022-1002475
Bluetooth: Fix use after free in hci_send_acl
Bluetooth: Fix use after free in hci_send_acl This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit c41de54b0a963e59e4dd04c029a4a6d73f45ef9c. For more details please see the references link.
null
2022-04-25T05:19:15.925473Z
2022-04-24T22:52:24.033635Z
null
null
null
null
null
Linux
GSD-2022-1002160
drivers: net: slip: fix NPD bug in sl_tx_timeout()
drivers: net: slip: fix NPD bug in sl_tx_timeout() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.190 by commit d05cd68ed8460cb158cc62c41ffe39fe0ca16169. For more details please see the references link.
null
2022-04-25T06:29:56.617713Z
2022-04-24T22:17:08.477154Z
null
null
null
null
null
Linux
GSD-2021-1001430
udf: Fix NULL pointer dereference in udf_symlink function
udf: Fix NULL pointer dereference in udf_symlink function This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.240 by commit baea588a42d675e35daeaddd10fbc9700550bc4d. For more details please see the references link.
null
2021-12-19T23:49:10.815778Z
2021-08-03T02:38:18.260565Z
null
null
null
null
null
Linux
GSD-2021-1001060
net/mlx5e: Fix page reclaim for dead peer hairpin
net/mlx5e: Fix page reclaim for dead peer hairpin This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit b374c1304f6d3d4752ad1412427b7bf02bb1fd61, it was introduced in version v4.19 by commit 4d8fcf216c90bc25e34ae2200aa8985ee3158898. For more details please see the references link.
null
2021-12-19T23:29:35.895729Z
2021-06-30T00:36:58.308971Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4d8fcf216c90bc25e34ae2200aa8985ee3158898'}
Linux
GSD-2021-1000221
ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook
ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit dabe299425b1a53a69461fed7ac8922ea6733a25, it was introduced in version v4.7 by commit 1879445dfa7bbd6fe21b09c5cc72f4934798afed. For more details please see the references link.
null
2021-12-19T22:52:13.949635Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1879445dfa7bbd6fe21b09c5cc72f4934798afed'}
Linux
GSD-2021-1000671
drm/amdgpu: Fix a use-after-free
drm/amdgpu: Fix a use-after-free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.235 by commit 952ab3f9f48eb0e8050596d41951cf516be6b122, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T22:36:04.653695Z
2021-06-04T19:58:55.038888Z
null
null
null
null
null
Linux
GSD-2021-1001963
usbnet: sanity check for maxpacket
usbnet: sanity check for maxpacket This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.254 by commit 74b3b27cf9fecce00cd8918b7882fd81191d0aa4. For more details please see the references link.
null
2021-12-19T23:27:42.152617Z
2021-11-14T15:13:38.292216Z
null
null
null
null
null
Linux
GSD-2021-1002162
ice: fix locking for Tx timestamp tracking flush
ice: fix locking for Tx timestamp tracking flush This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 4d4a223a86afe658cd878800f09458e8bb54415d, it was introduced in version v5.15 by commit 4dd0d5c33c3ebf24a07cae6141648aeb7ba56072. For more details please see the references link.
null
2021-12-19T22:23:24.130064Z
2021-11-14T15:22:44.023764Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4dd0d5c33c3ebf24a07cae6141648aeb7ba56072'}
Linux
GSD-2021-1002498
drm/msm/a6xx: Allocate enough space for GMU registers
drm/msm/a6xx: Allocate enough space for GMU registers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.84 by commit d646856a600e8635ba498f20b194219b158626e8, it was introduced in version v5.9 by commit 142639a52a01e90c512a9a8d2156997e02a65b53. For more details please see the references link.
null
2021-12-19T22:22:27.659009Z
2021-12-19T19:39:57.537362Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/142639a52a01e90c512a9a8d2156997e02a65b53'}
Linux
GSD-2022-1001432
rxrpc: Fix call timer start racing with call destruction
rxrpc: Fix call timer start racing with call destruction This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 54df5a37f1d951ed27fd47bf9b15a42279582110, it was introduced in version v4.15 by commit a158bdd3247b9656df36ba133235fff702e9fdc3. For more details please see the references link.
null
2022-04-25T06:22:31.571917Z
2022-04-24T21:12:38.752266Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a158bdd3247b9656df36ba133235fff702e9fdc3'}
Linux
GSD-2022-1001598
ext4: fix fs corruption when tring to remove a non-empty directory with IO error
ext4: fix fs corruption when tring to remove a non-empty directory with IO error This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit ba8d348eae3261d80007067a74645e786891ce17. For more details please see the references link.
null
2022-04-25T05:38:30.240587Z
2022-04-24T21:27:19.329070Z
null
null
null
null
null
Linux
GSD-2021-1002532
ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE
ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.6 by commit 20a09c8b25a21506cf8b60bdef78f31a6549ebfc, it was introduced in version v3.8 by commit 9c4566a117a6fe404a0e49b27ac71b631945a70f. For more details please see the references link.
null
2021-12-20T00:46:58.956771Z
2021-12-19T19:41:25.447020Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9c4566a117a6fe404a0e49b27ac71b631945a70f'}
Linux
GSD-2022-1001062
rtw89: fix RCU usage in rtw89_core_txq_push()
rtw89: fix RCU usage in rtw89_core_txq_push() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 30713cffc9a3e36799049019a2209ce5ea9f458a. For more details please see the references link.
null
2022-04-25T06:47:18.392777Z
2022-04-24T20:43:02.613675Z
null
null
null
null
null
Linux
GSD-2022-1000223
IB/hfi1: Fix AIP early init panic
IB/hfi1: Fix AIP early init panic This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.99 by commit 4a9bd1e6780fc59f81466ec3489d5ad535a37190, it was introduced in version v5.8 by commit d99dc602e2a55a99940ba9506a7126dfa54d54ea. For more details please see the references link.
null
2022-02-19T04:36:37.636549Z
2022-02-18T21:57:22.652308Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d99dc602e2a55a99940ba9506a7126dfa54d54ea'}
Linux
GSD-2022-1000389
ax25: improve the incomplete fix to avoid UAF and NPD bugs
ax25: improve the incomplete fix to avoid UAF and NPD bugs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.102 by commit b9a229fd48bfa45edb954c75a57e3931a3da6c5f. For more details please see the references link.
null
2022-03-07T01:38:45.615385Z
2022-02-27T03:00:19.582612Z
null
null
null
null
null
Linux
GSD-2022-1001961
gpiolib: acpi: use correct format characters
gpiolib: acpi: use correct format characters This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.112 by commit 9709c8b5cdc88b1adb77acdbfd6e8a3f942d9af5, it was introduced in version v4.14 by commit e40a3ae1f794a35c4af3746291ed6fedc1fa0f6f. For more details please see the references link.
null
2022-04-25T05:06:03.299347Z
2022-04-24T21:58:36.103447Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e40a3ae1f794a35c4af3746291ed6fedc1fa0f6f'}
Linux
GSD-2022-1000673
net: macsec: Fix offload support for NETDEV_UNREGISTER event
net: macsec: Fix offload support for NETDEV_UNREGISTER event This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.8 by commit 8299be160aad8548071d080518712dec0df92bd5, it was introduced in version v5.6 by commit 3cf3227a21d1fb020fe26128e60321bd2151e922. For more details please see the references link.
null
2022-03-07T01:34:16.442761Z
2022-02-27T03:39:26.196715Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3cf3227a21d1fb020fe26128e60321bd2151e922'}
Linux
GSD-2022-1000366
scsi: myrs: Fix crash in error case
scsi: myrs: Fix crash in error case This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.101 by commit 0e42c4a3d732517edc3766dd45a14e60d29dd929. For more details please see the references link.
null
2022-03-07T01:39:06.384884Z
2022-02-27T02:57:02.179835Z
null
null
null
null
null
Linux
GSD-2021-1000919
netfilter: synproxy: Fix out of bounds when parsing TCP options
netfilter: synproxy: Fix out of bounds when parsing TCP options This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.128 by commit 6defc77d48eff74075b80ad5925061b2fc010d98, it was introduced in version v3.12 by commit 48b1de4c110a7afa4b85862f6c75af817db26fad. For more details please see the references link.
null
2021-12-19T23:49:56.399450Z
2021-06-30T00:24:30.910765Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/48b1de4c110a7afa4b85862f6c75af817db26fad'}
Linux
GSD-2022-1001824
net: dsa: fix panic on shutdown if multi-chip tree failed to probe
net: dsa: fix panic on shutdown if multi-chip tree failed to probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 95df5cd5a446df6738d2d45872e08594819080e4, it was introduced in version v5.15 by commit 0650bf52b31ff35dc6430fc2e37969c36baba724. For more details please see the references link.
null
2022-04-25T07:55:01.404893Z
2022-04-24T21:45:28.203590Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0650bf52b31ff35dc6430fc2e37969c36baba724'}
Linux
GSD-2022-1000736
net-timestamp: convert sk->sk_tskey to atomic_t
net-timestamp: convert sk->sk_tskey to atomic_t This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.12 by commit caf122caad0374f79dcf821b5cb46ad320d49848, it was introduced in version v3.17 by commit 09c2d251b70723650ba47e83571ff49281320f7c. For more details please see the references link.
null
2022-03-18T02:57:03.698256Z
2022-03-18T00:13:59.023209Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/09c2d251b70723650ba47e83571ff49281320f7c'}
Linux
GSD-2022-1001577
ASoC: xilinx: xlnx_formatter_pcm: Handle sysclk setting
ASoC: xilinx: xlnx_formatter_pcm: Handle sysclk setting This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 915f0bf118248e527f721f0c39e17eb6845a7820, it was introduced in version v5.1 by commit 6f6c3c36f0917be24587eeba818ab4fdfcb5465a. For more details please see the references link.
null
2022-04-25T05:34:42.944052Z
2022-04-24T21:25:34.705Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6f6c3c36f0917be24587eeba818ab4fdfcb5465a'}
Linux
GSD-2021-1002027
comedi: vmk80xx: fix bulk-buffer overflow
comedi: vmk80xx: fix bulk-buffer overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.159 by commit 1ae4715121a57bc6fa29fd992127b01907f2f993, it was introduced in version v2.6.31 by commit 985cafccbf9b7f862aa1c5ee566801e18b5161fb. For more details please see the references link.
null
2021-12-19T22:16:19.919527Z
2021-11-14T15:16:31.364459Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/985cafccbf9b7f862aa1c5ee566801e18b5161fb'}
Linux
GSD-2022-1001127
drm/i915: Treat SAGV block time 0 as SAGV disabled
drm/i915: Treat SAGV block time 0 as SAGV disabled This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit df06213334740f4001b10c69ed447b8f6a6f4262. For more details please see the references link.
null
2022-04-25T04:08:18.179713Z
2022-04-24T20:47:42.397743Z
null
null
null
null
null
Linux
GSD-2021-1002477
net/sched: sch_ets: don't peek at classes beyond 'nbands'
net/sched: sch_ets: don't peek at classes beyond 'nbands' This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.83 by commit ae2659d2c670252759ee9c823c4e039c0e05a6f2, it was introduced in version v5.6 by commit dcc68b4d8084e1ac9af0d4022d6b1aff6a139a33. For more details please see the references link.
null
2021-12-19T22:33:36.651697Z
2021-12-19T19:39:06.380661Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/dcc68b4d8084e1ac9af0d4022d6b1aff6a139a33'}
Linux
GSD-2022-1002422
ntfs: add sanity check on allocation size
ntfs: add sanity check on allocation size This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 21d490232f323ed4053eb9924615e6fea291f154. For more details please see the references link.
null
2022-04-25T04:38:24.257735Z
2022-04-24T22:45:21.354559Z
null
null
null
null
null
Linux
GSD-2021-1001488
wl1251: Fix possible buffer overflow in wl1251_cmd_scan
wl1251: Fix possible buffer overflow in wl1251_cmd_scan This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.276 by commit 57ad99ae3c6738ba87bad259bb57c641ca68ebf6. For more details please see the references link.
null
2021-12-20T00:57:27.312702Z
2021-08-03T02:56:31.918771Z
null
null
null
null
null
Linux
GSD-2021-1001172
ACPI: fix NULL pointer dereference
ACPI: fix NULL pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.6 by commit ccf23a0888077a25a0793a746c3941db2a7562e4. For more details please see the references link.
null
2021-12-20T00:07:38.469895Z
2021-08-03T01:32:14.627420Z
null
null
null
null
null
Linux
GSD-2022-1002072
ax25: Fix NULL pointer dereferences in ax25 timers
ax25: Fix NULL pointer dereferences in ax25 timers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.112 by commit f934fa478dd17411bc6884153dc824ff9e7505d8, it was introduced in version v5.10.112 by commit 145ea8d213e8f46667cd904ae79d17f298750f00. For more details please see the references link.
null
2022-04-24T22:07:53.531960Z
2022-04-24T22:07:53.531960Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/145ea8d213e8f46667cd904ae79d17f298750f00'}
Linux
GSD-2021-1001522
i2c: acpi: fix resource leak in reconfiguration device addition
i2c: acpi: fix resource leak in reconfiguration device addition This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.251 by commit b8090a84d7758b929d348bafbd86bb7a10c5fb63, it was introduced in version v4.8 by commit 525e6fabeae286848592363bda13bc34b59bb5ac. For more details please see the references link.
null
2021-12-19T23:56:01.508491Z
2021-10-19T16:22:01.873628Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/525e6fabeae286848592363bda13bc34b59bb5ac'}
Linux
GSD-2021-1000299
KVM: Destroy I/O bus devices on unregister failure _after_ sync'ing SRCU
KVM: Destroy I/O bus devices on unregister failure _after_ sync'ing SRCU This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 30f46c6993731efb2a690c9197c0fd9ed425da2d, it was introduced in version v5.9 by commit f65886606c2d3b562716de030706dfe1bea4ed5e. For more details please see the references link.
null
2021-12-19T22:34:18.132247Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f65886606c2d3b562716de030706dfe1bea4ed5e'}
Linux
GSD-2021-1000763
efi/libstub: prevent read overflow in find_file_option()
efi/libstub: prevent read overflow in find_file_option() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.43 by commit 951f8ef71d691f754483cc9d871cb493379fdb35, it was introduced in version v5.8 by commit 7a88a6227dc7f2e723bba11ece05e57bd8dce8e4. For more details please see the references link.
null
2021-12-19T23:18:58.287944Z
2021-06-25T00:03:13.428683Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7a88a6227dc7f2e723bba11ece05e57bd8dce8e4'}
Linux
GSD-2021-1001871
isdn: mISDN: Fix sleeping function called from invalid context
isdn: mISDN: Fix sleeping function called from invalid context This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit f5966ba53013149bcf94e1536644a958dd00a026. For more details please see the references link.
null
2021-12-20T00:13:32.186494Z
2021-10-28T13:53:15.348727Z
null
null
null
null
null
Linux
GSD-2021-1000333
ceph: fix inode leak on getattr error in __fh_to_dentry
ceph: fix inode leak on getattr error in __fh_to_dentry This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.38 by commit bf45c9fe99aa8003d2703f1bd353f956dea47e40, it was introduced in version v5.8 by commit 878dabb64117406abd40977b87544d05bb3031fc. For more details please see the references link.
null
2021-12-19T22:33:07.150530Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/878dabb64117406abd40977b87544d05bb3031fc'}
Linux
GSD-2021-1000626
net: fujitsu: fix potential null-ptr-deref
net: fujitsu: fix potential null-ptr-deref This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.124 by commit 22049c3d40f08facd1867548716a484dad6b3251, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T23:27:37.732290Z
2021-06-04T19:49:35.564223Z
null
null
null
null
null
Linux
GSD-2021-1001934
NFC: digital: fix possible memory leak in digital_in_send_sdd_req()
NFC: digital: fix possible memory leak in digital_in_send_sdd_req() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.288 by commit 88c890b0b9a1fb9fcd01c61ada515e8b636c34f9, it was introduced in version v3.13 by commit 2c66daecc4092e6049673c281b2e6f0d5e59a94c. For more details please see the references link.
null
2021-12-19T23:33:22.633136Z
2021-11-14T15:12:20.428313Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c66daecc4092e6049673c281b2e6f0d5e59a94c'}
Linux
GSD-2021-1000276
scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb()
scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 9bdcfbed2a9fe24d2c7eaa1bad7c705e18de8cc7, it was introduced in version v5.11 by commit 4430f7fd09ecb037570119e0aacbf0c17b8f98b2. For more details please see the references link.
null
2021-12-19T23:33:58.776586Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4430f7fd09ecb037570119e0aacbf0c17b8f98b2'}
Linux
GSD-2022-1000809
openvswitch: Fix setting ipv6 fields causing hw csum failure
openvswitch: Fix setting ipv6 fields causing hw csum failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.26 by commit f941104aa116aaa7d80e3b72d776494136f1c466, it was introduced in version v3.8 by commit 3fdbd1ce11e5c0d7cafbe44c942c5cad61113d7b. For more details please see the references link.
null
2022-03-18T02:52:26.473480Z
2022-03-18T00:20:33.791948Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3fdbd1ce11e5c0d7cafbe44c942c5cad61113d7b'}
Linux
GSD-2021-1001037
RDMA: Verify port when creating flow rule
RDMA: Verify port when creating flow rule This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit 8dc1b0e0ca204596c50bcd159ee069ae0f998176, it was introduced in version v3.12 by commit 436f2ad05a0b65b1467ddf51bc68171c381bf844. For more details please see the references link.
null
2021-12-19T22:49:24.420867Z
2021-06-30T00:35:32.485455Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/436f2ad05a0b65b1467ddf51bc68171c381bf844'}
Linux
GSD-2021-1001467
KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow
KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.277 by commit 1e90a673f6ee09c668fe01aa1b94924f972c9811, it was introduced in version v3.10 by commit 8e591cb7204739efa8e15967ea334eb367039dde. For more details please see the references link.
null
2021-12-20T00:56:11.376364Z
2021-08-03T02:49:42.646886Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8e591cb7204739efa8e15967ea334eb367039dde'}
Linux
GSD-2022-1002137
can: m_can: m_can_tx_handler(): fix use after free of skb
can: m_can: m_can_tx_handler(): fix use after free of skb This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 869016a2938ac44f7b2fb7fc22c89edad99eb9b3, it was introduced in version v3.18 by commit 80646733f11c2e9de3b6339f7e635047e6087280. For more details please see the references link.
null
2022-04-25T04:12:09.387527Z
2022-04-24T22:15:11.863568Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80646733f11c2e9de3b6339f7e635047e6087280'}
Linux
GSD-2022-1000665
KVM: arm64: Avoid consuming a stale esr value when SError occur
KVM: arm64: Avoid consuming a stale esr value when SError occur This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.8 by commit 57e2986c3b25092691a6e3d6ee9168caf8978932, it was introduced in version v5.11 by commit defe21f49bc98b095300752aa1e19bb608f3e97d. For more details please see the references link.
null
2022-03-07T01:44:35.488612Z
2022-02-27T03:37:51.696714Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/defe21f49bc98b095300752aa1e19bb608f3e97d'}
Linux
GSD-2022-1001977
rxrpc: fix a race in rxrpc_exit_net()
rxrpc: fix a race in rxrpc_exit_net() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit 08ff0e74fab517dbc44e11b8bc683dd4ecc65950, it was introduced in version v4.17 by commit ace45bec6d77bc061c3c3d8ad99e298ea9800c2b. For more details please see the references link.
null
2022-04-25T04:07:44.257910Z
2022-04-24T22:00:21.852091Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ace45bec6d77bc061c3c3d8ad99e298ea9800c2b'}
Linux
GSD-2021-1001308
ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions
ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.136 by commit 830251361425c5be044db4d826aaf304ea3d14c6, it was introduced in version v5.3 by commit f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74. For more details please see the references link.
null
2021-12-20T00:30:49.784964Z
2021-08-03T02:04:13.868698Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74'}
Linux
GSD-2022-1000235
ext4: fix error handling in ext4_fc_record_modified_inode()
ext4: fix error handling in ext4_fc_record_modified_inode() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.99 by commit 62e46e0ffc02daa8fcfc02f7a932cc8a19601b19. For more details please see the references link.
null
2022-02-20T01:57:49.180574Z
2022-02-18T21:59:33.734560Z
null
null
null
null
null
Linux
GSD-2022-1002208
ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock()
ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit b80ccbec0e4804436c382d7dd60e943c386ed83a, it was introduced in version v2.6.27 by commit 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d. For more details please see the references link.
null
2022-04-25T06:13:08.196562Z
2022-04-24T22:22:00.771567Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d'}
Linux
GSD-2021-1001758
virtio-net: fix pages leaking when building skb in big mode
virtio-net: fix pages leaking when building skb in big mode This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.9 by commit f020bb63b5d2e5576acadd10e158fe3b04af67ba, it was introduced in version v5.13 by commit fb32856b16ad9d5bcd75b76a274e2c515ac7b9d7. For more details please see the references link.
null
2021-12-20T00:20:17.233072Z
2021-10-19T16:35:18.239990Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb32856b16ad9d5bcd75b76a274e2c515ac7b9d7'}
Linux
GSD-2022-1001074
ath11k: mhi: use mhi_sync_power_up()
ath11k: mhi: use mhi_sync_power_up() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 646d533af2911be1184eaee8c900b7eb8ecc4396. For more details please see the references link.
null
2022-04-25T06:15:15.511407Z
2022-04-24T20:43:37.237834Z
null
null
null
null
null
Linux
GSD-2021-1002524
staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect()
staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.6 by commit e27ee2f607fe6a9b923ef1fc65461c0613c97594, it was introduced in version v3.2 by commit 66898177e7e5486dc77a4ba742efa4e2e9e900a4. For more details please see the references link.
null
2021-12-19T22:22:27.470743Z
2021-12-19T19:41:06.252575Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/66898177e7e5486dc77a4ba742efa4e2e9e900a4'}
Linux
GSD-2021-1000519
RDMA/rxe: Clear all QP fields if creation failed
RDMA/rxe: Clear all QP fields if creation failed This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.234 by commit 6a8086a42dfbf548a42bf2ae4faa291645c72c66, it was introduced in version v4.8 by commit 8700e3e7c4857d28ebaa824509934556da0b3e76. For more details please see the references link.
null
2021-12-19T22:39:35.082392Z
2021-05-31T23:49:59.352670Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8700e3e7c4857d28ebaa824509934556da0b3e76'}
Linux
GSD-2022-1001424
Reinstate some of "swiotlb: rework "fix info leak with DMA_FROM_DEVICE""
Reinstate some of "swiotlb: rework "fix info leak with DMA_FROM_DEVICE"" This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit dcead36b19d999d687cd9c99b7f37520d9102b57. For more details please see the references link.
null
2022-04-25T04:42:38.843474Z
2022-04-24T21:11:49.216727Z
null
null
null
null
null
Linux
GSD-2021-1002174
mm/secretmem: fix NULL page->mapping dereference in page_is_secretmem()
mm/secretmem: fix NULL page->mapping dereference in page_is_secretmem() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 79f9bc5843142b649575f887dccdf1c07ad75c20, it was introduced in version v5.14 by commit 1507f51255c9ff07d75909a84e7c0d7f3c4b2f49. For more details please see the references link.
null
2021-12-20T00:01:05.020134Z
2021-11-14T15:23:14.219108Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1507f51255c9ff07d75909a84e7c0d7f3c4b2f49'}
Linux
GSD-2021-1000149
mmc: uniphier-sd: Fix a resource leak in the remove function
mmc: uniphier-sd: Fix a resource leak in the remove function This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.36 by commit 25ac6ce65f1ab458982d15ec1caf441acd37106a, it was introduced in version v4.20 by commit 3fd784f745dd1747863775a99ec749619ee6759c. For more details please see the references link.
null
2021-12-20T01:06:57.013536Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3fd784f745dd1747863775a99ec749619ee6759c'}
Linux
GSD-2021-1002461
nfsd: Fix nsfd startup race (again)
nfsd: Fix nsfd startup race (again) This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.165 by commit f5734b1714ca355703e9ea8fb61d04beff1790b9, it was introduced in version v5.4.102 by commit 8677e99150b0830d29cc1318b4cc559e176940bb. For more details please see the references link.
null
2021-12-19T22:51:13.115580Z
2021-12-19T19:38:21.337762Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8677e99150b0830d29cc1318b4cc559e176940bb'}
Linux
GSD-2022-1001131
video: fbdev: sm712fb: Fix crash in smtcfb_write()
video: fbdev: sm712fb: Fix crash in smtcfb_write() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 809b8cde86320698661eec677222bc5c5df76176. For more details please see the references link.
null
2022-04-25T04:34:40.654323Z
2022-04-24T20:47:55.851195Z
null
null
null
null
null
Linux
GSD-2021-1002031
misc: fastrpc: Add missing lock before accessing find_vma()
misc: fastrpc: Add missing lock before accessing find_vma() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.75 by commit 86e3ad8b759d1152d69442a4bb36cfa65448c9e7, it was introduced in version v5.2 by commit 80f3afd72bd4149c57daf852905476b43bb47647. For more details please see the references link.
null
2021-12-19T23:01:31.621096Z
2021-11-14T15:16:40.967083Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80f3afd72bd4149c57daf852905476b43bb47647'}
Linux
GSD-2022-1001561
ASoC: atmel: Fix error handling in sam9x5_wm8731_driver_probe
ASoC: atmel: Fix error handling in sam9x5_wm8731_driver_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 14228225091a0854b1de23e5b4fe8bdeeca9683b, it was introduced in version v3.12 by commit fdbcb3cba54b29a37dfe42acdc0e72c543e0807d. For more details please see the references link.
null
2022-04-25T06:33:55.811374Z
2022-04-24T21:23:49.597785Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fdbcb3cba54b29a37dfe42acdc0e72c543e0807d'}
Linux
GSD-2022-1000720
sched/fair: Fix fault in reweight_entity
sched/fair: Fix fault in reweight_entity This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.13 by commit 589a954daab5e18399860b6c8ffaeaf79844eb20, it was introduced in version v5.16 by commit 4ef0c5c6b5ba1f38f0ea1cedad0cad722f00c14a. For more details please see the references link.
null
2022-03-18T02:49:32.018616Z
2022-03-18T00:12:08.060435Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4ef0c5c6b5ba1f38f0ea1cedad0cad722f00c14a'}
Linux
GSD-2022-1001832
bpf, sockmap: Fix more uncharged while msg has more_data
bpf, sockmap: Fix more uncharged while msg has more_data This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 168ff181f5b6e7fce684c98a30d35da1dbf8f82a, it was introduced in version v4.20 by commit 604326b41a6fb9b4a78b6179335decee0365cd8c. For more details please see the references link.
null
2022-04-25T05:58:41.246809Z
2022-04-24T21:46:16.218946Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/604326b41a6fb9b4a78b6179335decee0365cd8c'}
Linux
GSD-2022-1001998
scsi: libfc: Fix use after free in fc_exch_abts_resp()
scsi: libfc: Fix use after free in fc_exch_abts_resp() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit 1d7effe5fff9d28e45e18ac3a564067c7ddfe898. For more details please see the references link.
null
2022-04-25T05:07:24.758882Z
2022-04-24T22:01:58.716748Z
null
null
null
null
null
Linux
GSD-2022-1000370
net: dsa: bcm_sf2: don't use devres for mdiobus
net: dsa: bcm_sf2: don't use devres for mdiobus This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.101 by commit 2770b795294ed312375c11ef1d0b810499c66b83, it was introduced in version v5.9 by commit ac3a68d56651c3dad2c12c7afce065fe15267f44. For more details please see the references link.
null
2022-03-07T01:37:24.583573Z
2022-02-27T02:57:29.046993Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac3a68d56651c3dad2c12c7afce065fe15267f44'}
Linux
GSD-2021-1000325
can: mcp251x: fix resume from sleep before interface was brought up
can: mcp251x: fix resume from sleep before interface was brought up This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.38 by commit eecb4df8ec9f896b19ee05bfa632ac6c1dcd8f21, it was introduced in version v5.5 by commit 8ce8c0abcba314e1fe954a1840f6568bf5aef2ef. For more details please see the references link.
null
2021-12-19T22:24:10.567796Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ce8c0abcba314e1fe954a1840f6568bf5aef2ef'}
Linux
GSD-2021-1002318
net/mlx5e: CT, Fix multiple allocations and memleak of mod acts
net/mlx5e: CT, Fix multiple allocations and memleak of mod acts This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit 486e8de6e233ff2999493533c6259d1cb538653b, it was introduced in version v5.7 by commit 1ef3018f5af3da6376fae546e4dfc3f05f063815. For more details please see the references link.
null
2021-12-20T01:30:36.600192Z
2021-11-29T02:38:31.497338Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1ef3018f5af3da6376fae546e4dfc3f05f063815'}
Linux
GSD-2022-1001648
mm: fix unexpected zeroed page mapping with zram swap
mm: fix unexpected zeroed page mapping with zram swap This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.35 by commit 12ba1d38115a101c45d8e0ca3aa1181fd148e57f, it was introduced in version v4.15 by commit 0bcac06f27d7528591c27ac2b093ccd71c5d0168. For more details please see the references link.
null
2022-04-25T04:14:07.320242Z
2022-04-24T21:31:36.687218Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0bcac06f27d7528591c27ac2b093ccd71c5d0168'}
Linux
GSD-2021-1001867
net: mdiobus: Fix memory leak in __mdiobus_register
net: mdiobus: Fix memory leak in __mdiobus_register This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit 0c4e87ba11eb331dca2315d484d08441b8c13193. For more details please see the references link.
null
2021-12-19T23:28:29.313051Z
2021-10-28T13:53:03.879834Z
null
null
null
null
null
Linux
GSD-2021-1000775
HID: magicmouse: fix NULL-deref on disconnect
HID: magicmouse: fix NULL-deref on disconnect This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.43 by commit b5d013c4c76b276890135b5d32803c4c63924b77, it was introduced in version v4.20 by commit 9d7b18668956c411a422d04c712994c5fdb23a4b. For more details please see the references link.
null
2021-12-19T22:02:25.864847Z
2021-06-25T00:04:49.455546Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9d7b18668956c411a422d04c712994c5fdb23a4b'}