ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2021-1002748
mptcp: remove tcp ulp setsockopt support
mptcp: remove tcp ulp setsockopt support This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit 3de0c86d42f841d1d64f316cd949e65c566f0734, it was introduced in version v5.13 by commit d9e4c129181004ec94b315b0c9db5eeb09da75e6. For more details please see the references link.
null
2022-01-11T05:47:38.253547Z
2021-12-27T05:46:54.886940Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9e4c129181004ec94b315b0c9db5eeb09da75e6'}
Linux
GSD-2022-1001218
power: supply: wm8350-power: Add missing free in free_charger_irq
power: supply: wm8350-power: Add missing free in free_charger_irq This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 011ce263361608bb2a1a5cbcc0e3c53b1d7a41d7, it was introduced in version v2.6.29 by commit 14431aa0c5a443d13d24e6f865a8838f97dab973. For more details please see the references link.
null
2022-04-25T05:13:15.865892Z
2022-04-24T20:54:55.673565Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/14431aa0c5a443d13d24e6f865a8838f97dab973'}
Linux
GSD-2021-1001534
sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb
sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.249 by commit 77bc7dcf0fcc1519341a91788d7a2914fcfddf6d, it was introduced in version v4.8 by commit 3acb50c18d8d6650f10919464ade4dcdaf41d62f. For more details please see the references link.
null
2021-12-19T23:51:54.281261Z
2021-10-19T16:22:37.408257Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3acb50c18d8d6650f10919464ade4dcdaf41d62f'}
Linux
GSD-2022-1002064
NFS: remove unneeded check in decode_devicenotify_args()
NFS: remove unneeded check in decode_devicenotify_args() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 942f68bf2950b4057804eff1c636bc3f6c7625d4, it was introduced in version v4.0 by commit a4f743a6bb201662962fa888e3f978583d61691e. For more details please see the references link.
null
2022-04-25T04:24:44.739339Z
2022-04-24T22:06:56.552689Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a4f743a6bb201662962fa888e3f978583d61691e'}
Linux
GSD-2022-1000059
nitro_enclaves: Use get_user_pages_unlocked() call to handle mmap assert
nitro_enclaves: Use get_user_pages_unlocked() call to handle mmap assert This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.13 by commit 90d2beed5e753805c5eab656b8d48257638fe543, it was introduced in version v5.15 by commit 5b78ed24e8ec48602c1d6f5a188e58d000c81e2b. For more details please see the references link.
null
2022-01-11T05:47:32.830927Z
2022-01-10T19:52:14.387581Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5b78ed24e8ec48602c1d6f5a188e58d000c81e2b'}
Linux
GSD-2021-1001164
net: sched: fix memory leak in tcindex_partial_destroy_work
net: sched: fix memory leak in tcindex_partial_destroy_work This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.6 by commit cac71d27745f92ee13f0ecc668ffe151a4a9c9b1, it was introduced in version v3.18 by commit 8332904aa971ed4547514f57c8b3780ad4f0f949. For more details please see the references link.
null
2021-12-19T23:07:37.162432Z
2021-08-03T01:31:43.247382Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8332904aa971ed4547514f57c8b3780ad4f0f949'}
Linux
GSD-2022-1002434
PCI: Reduce warnings on possible RW1C corruption
PCI: Reduce warnings on possible RW1C corruption This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 1c63f5ab2d5bd5ac606d4f5576f732d9fa704747, it was introduced in version v4.10 by commit fb26592301200dbbe4a9943fe188b57a46716900. For more details please see the references link.
null
2022-04-25T05:23:43.361842Z
2022-04-24T22:46:52.038929Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb26592301200dbbe4a9943fe188b57a46716900'}
Linux
GSD-2022-1000409
ima: fix reference leak in asymmetric_verify()
ima: fix reference leak in asymmetric_verify() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit 0838d6d68182f0b28a5434bc6d50727c4757e35b, it was introduced in version v5.13 by commit 947d70597236dd5ae65c1f68c8eabfb962ee5a6b. For more details please see the references link.
null
2022-03-07T01:34:09.733610Z
2022-02-27T03:02:37.057108Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/947d70597236dd5ae65c1f68c8eabfb962ee5a6b'}
Linux
GSD-2022-1002121
drm/i915/gem: add missing boundary check in vm_access
drm/i915/gem: add missing boundary check in vm_access This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 89ddcc81914ab58cc203acc844f27d55ada8ec0e, it was introduced in version v5.8 by commit 9f909e215fea0652023b9ed09d3d7bfe10386423. For more details please see the references link.
null
2022-04-25T05:37:38.769372Z
2022-04-24T22:13:40.898738Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9f909e215fea0652023b9ed09d3d7bfe10386423'}
Linux
GSD-2021-1001471
net: ti: fix UAF in tlan_remove_one
net: ti: fix UAF in tlan_remove_one This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.277 by commit a18a8d9cfbb112ad72e625372849adc3986fd6bf, it was introduced in version v3.10 by commit 1e0a8b13d35510e711fdf72e9a3e30bcb2bd49fa. For more details please see the references link.
null
2021-12-19T22:25:09.079750Z
2021-08-03T02:51:13.362305Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e0a8b13d35510e711fdf72e9a3e30bcb2bd49fa'}
Linux
GSD-2021-1001021
drm: Lock pointer access in drm_master_release()
drm: Lock pointer access in drm_master_release() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit dfedcac75b81e617b3a554c76e817d7961637a33. For more details please see the references link.
null
2021-12-19T23:57:30.456293Z
2021-06-30T00:34:25.077083Z
null
null
null
null
null
Linux
GSD-2021-1001888
ptp: Fix possible memory leak in ptp_clock_register()
ptp: Fix possible memory leak in ptp_clock_register() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit 95c0a0c5ec8839f8f21672be786e87a100319ca8, it was introduced in version v5.5 by commit a33121e5487b424339636b25c35d3a180eaa5f5e. For more details please see the references link.
null
2021-12-20T01:13:45.559956Z
2021-10-28T13:54:06.140106Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a33121e5487b424339636b25c35d3a180eaa5f5e'}
Linux
GSD-2021-1000260
iommu/vt-d: Remove WO permissions on second-level paging entries
iommu/vt-d: Remove WO permissions on second-level paging entries This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 66c24699f266ff310381a9552d3576eea8ad6e20, it was introduced in version v5.6 by commit b802d070a52a1565b47daaa808872cfbd4a17b01. For more details please see the references link.
null
2021-12-20T01:32:50.175189Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b802d070a52a1565b47daaa808872cfbd4a17b01'}
Linux
GSD-2021-1001922
net: mdiobus: Fix memory leak in __mdiobus_register
net: mdiobus: Fix memory leak in __mdiobus_register This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.290 by commit fd2400dd4f1b8bd7a309b1b424d9e0d188151b01. For more details please see the references link.
null
2021-12-20T01:34:43.813827Z
2021-11-14T15:11:50.972412Z
null
null
null
null
null
Linux
GSD-2021-1000630
spi: spi-fsl-dspi: Fix a resource leak in an error handling path
spi: spi-fsl-dspi: Fix a resource leak in an error handling path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.124 by commit 15d1cc4b4b585f9a2ce72c52cca004d5d735bdf1, it was introduced in version v4.10 by commit 90ba37033cb94207e97c4ced9be575770438213b. For more details please see the references link.
null
2021-12-19T23:09:08.929670Z
2021-06-04T19:50:31.704736Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/90ba37033cb94207e97c4ced9be575770438213b'}
Linux
GSD-2021-1002123
ocfs2: fix race between searching chunks and release journal_head from buffer_head
ocfs2: fix race between searching chunks and release journal_head from buffer_head This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.16 by commit 2e382600e8856ea654677b5134ee66e03ea72bc2. For more details please see the references link.
null
2021-12-20T00:03:45.175732Z
2021-11-14T15:20:52.697377Z
null
null
null
null
null
Linux
GSD-2022-1001189
net: bcmgenet: Use stronger register read/writes to assure ordering
net: bcmgenet: Use stronger register read/writes to assure ordering This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit f49769b462f282477ca801cf648f875b1c5b59db, it was introduced in version v4.14 by commit 69d2ea9c798983c4a7157278ec84ff969d1cd8e8. For more details please see the references link.
null
2022-04-25T06:52:36.367425Z
2022-04-24T20:52:15.341305Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69d2ea9c798983c4a7157278ec84ff969d1cd8e8'}
Linux
GSD-2022-1001473
btrfs: make search_csum_tree return 0 if we get -EFBIG
btrfs: make search_csum_tree return 0 if we get -EFBIG This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 3c40052e3fde325cbe9dac4f52a229d74a5f3b8a. For more details please see the references link.
null
2022-04-25T06:48:11.405535Z
2022-04-24T21:15:33.003148Z
null
null
null
null
null
Linux
GSD-2021-1002573
drm/msm: Fix mmap to include VM_IO and VM_DONTDUMP
drm/msm: Fix mmap to include VM_IO and VM_DONTDUMP This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.7 by commit 8e2b7fe5e8a4be5e571561d9afcfbd92097288ba, it was introduced in version v5.15 by commit 510410bfc034c57cc3caf1572aa47c1017bab2f9. For more details please see the references link.
null
2021-12-20T00:07:59.107953Z
2021-12-19T19:43:21.654422Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/510410bfc034c57cc3caf1572aa47c1017bab2f9'}
Linux
GSD-2022-1001023
net: sfc: add missing xdp queue reinitialization
net: sfc: add missing xdp queue reinitialization This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit dcc85e1593686e42c6749ef3d356db34759d59e8, it was introduced in version v5.5 by commit 3990a8fffbdad5765f47ea593f9de66c91762059. For more details please see the references link.
null
2022-04-25T06:12:53.622122Z
2022-04-24T20:40:50.652641Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3990a8fffbdad5765f47ea593f9de66c91762059'}
Linux
GSD-2021-1002089
drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read
drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit 09f3946bb452918dbfb1982add56f9ffaae393dc, it was introduced in version v5.7 by commit e11f5bd8228fc3760c221f940b9f6365dbf3e7ed. For more details please see the references link.
null
2021-12-20T00:27:51.322024Z
2021-11-14T15:19:20.410342Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e11f5bd8228fc3760c221f940b9f6365dbf3e7ed'}
Linux
GSD-2021-1002820
ice: xsk: return xsk buffers back to pool when cleaning the ring
ice: xsk: return xsk buffers back to pool when cleaning the ring This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.12 by commit ad6d20da2cfbe14b7b1200d15f39e65988b0b9e8, it was introduced in version v5.5 by commit 2d4238f5569722197612656163d824098208519c. For more details please see the references link.
null
2022-01-11T05:48:37.265134Z
2021-12-30T02:44:51.171319Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2d4238f5569722197612656163d824098208519c'}
Linux
GSD-2022-1000798
iio: imu: st_lsm6dsx: wait for settling time in st_lsm6dsx_read_oneshot
iio: imu: st_lsm6dsx: wait for settling time in st_lsm6dsx_read_oneshot This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.26 by commit 1f05c75684455f1fd0c43637f5c86981a3f80a81, it was introduced in version v4.11 by commit 290a6ce11d938be52634b3ce1bbc6b78be4d23c1. For more details please see the references link.
null
2022-03-18T02:50:59.892250Z
2022-03-18T00:19:00.786022Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/290a6ce11d938be52634b3ce1bbc6b78be4d23c1'}
Linux
GSD-2022-1000262
phylib: fix potential use-after-free
phylib: fix potential use-after-free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.19 by commit aefaccd19379d6c4620269a162bfb88ff687f289, it was introduced in version v4.16 by commit bafbdd527d569c8200521f2f7579f65a044271be. For more details please see the references link.
null
2022-02-20T06:35:12.950057Z
2022-02-18T22:03:32.714087Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bafbdd527d569c8200521f2f7579f65a044271be'}
Linux
GSD-2022-1000632
drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc
drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit 1ebc18836d5df09061657f8c548e594cbb519476, it was introduced in version v5.8 by commit 4259ff7ae509ed880b3a7bb685972c3a3bf4b74b. For more details please see the references link.
null
2022-03-07T01:38:04.299925Z
2022-02-27T03:33:29.977187Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4259ff7ae509ed880b3a7bb685972c3a3bf4b74b'}
Linux
GSD-2022-1001920
jffs2: fix use-after-free in jffs2_clear_xattr_subsystem
jffs2: fix use-after-free in jffs2_clear_xattr_subsystem This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 7a75740206af5f17e9f3efa384211cba70213da1, it was introduced in version v2.6.18 by commit aa98d7cf59b5b0764d3502662053489585faf2fe. For more details please see the references link.
null
2022-04-25T03:38:07.699162Z
2022-04-24T21:54:39.818150Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/aa98d7cf59b5b0764d3502662053489585faf2fe'}
Linux
GSD-2022-1000327
ax25: improve the incomplete fix to avoid UAF and NPD bugs
ax25: improve the incomplete fix to avoid UAF and NPD bugs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.231 by commit 3072e72814de56f3c674650a8af98233ddf78b19. For more details please see the references link.
null
2022-03-07T01:39:04.694846Z
2022-02-27T02:51:54.010055Z
null
null
null
null
null
Linux
GSD-2021-1000958
usb: fix various gadget panics on 10gbps cabling
usb: fix various gadget panics on 10gbps cabling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.44 by commit b972eff874637402ddc4a7dd11fb22538a0b6d28. For more details please see the references link.
null
2021-12-20T00:54:38.890634Z
2021-06-30T00:29:15.279057Z
null
null
null
null
null
Linux
GSD-2022-1000777
blktrace: fix use after free for struct blk_trace
blktrace: fix use after free for struct blk_trace This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.27 by commit 78acc7dbd84a8c173a08584750845c31611160f2, it was introduced in version v5.12 by commit c0ea57608b691d6cde8aff23e11f9858a86b5918. For more details please see the references link.
null
2022-03-18T03:00:46.827566Z
2022-03-18T00:17:26.786512Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c0ea57608b691d6cde8aff23e11f9858a86b5918'}
Linux
GSD-2022-1001865
drm/selftests/test-drm_dp_mst_helper: Fix memory leak in sideband_msg_req_encode_decode
drm/selftests/test-drm_dp_mst_helper: Fix memory leak in sideband_msg_req_encode_decode This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 0728ccb66468b7a59959f9f4fb518ff9c655485f, it was introduced in version v5.11 by commit 09234b88ef5598252d1cee37e4d7b26a48b6557f. For more details please see the references link.
null
2022-04-25T05:52:34.922933Z
2022-04-24T21:49:40.969463Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/09234b88ef5598252d1cee37e4d7b26a48b6557f'}
Linux
GSD-2022-1001536
ext2: correct max file size computing
ext2: correct max file size computing This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 9b30cc5d313b64b56ce6da7cfe30366c291a0d82, it was introduced in version v5.1 by commit 1c2d14212b15a60300a2d4f6364753e87394c521. For more details please see the references link.
null
2022-04-25T06:12:12.543124Z
2022-04-24T21:21:20.427459Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c2d14212b15a60300a2d4f6364753e87394c521'}
Linux
GSD-2021-1002066
IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields
IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.77 by commit c3e17e58f571f34c51aeb17274ed02c2ed5cf780, it was introduced in version v2.6.35 by commit f931551bafe1f10ded7f5282e2aa162c267a2e5d. For more details please see the references link.
null
2021-12-20T00:48:08.759309Z
2021-11-14T15:18:21.960118Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f931551bafe1f10ded7f5282e2aa162c267a2e5d'}
Linux
GSD-2022-1001166
fs: fix fd table size alignment properly
fs: fix fd table size alignment properly This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 28dfe0fc1115d884061fa54a25f434158625500a, it was introduced in version v5.17.2 by commit 11f03ba4bcaba6d3a26e109ab7bd5a2b2a53bd93. For more details please see the references link.
null
2022-04-24T20:49:50.062471Z
2022-04-24T20:49:50.062471Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/11f03ba4bcaba6d3a26e109ab7bd5a2b2a53bd93'}
Linux
GSD-2021-1002436
scsi: mpt3sas: Fix kernel panic during drive powercycle test
scsi: mpt3sas: Fix kernel panic during drive powercycle test This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.163 by commit 7e324f734a914957b8cc3ff4b4c9f0409558adb5, it was introduced in version v3.8 by commit f92363d12359498f9a9960511de1a550f0ec41c2. For more details please see the references link.
null
2021-12-19T22:44:49.698014Z
2021-12-19T19:37:13.404206Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f92363d12359498f9a9960511de1a550f0ec41c2'}
Linux
GSD-2022-1002463
gcc-plugins: latent_entropy: use /dev/urandom
gcc-plugins: latent_entropy: use /dev/urandom This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit 942352131b4ed824fefddf87810faf2711a5e967, it was introduced in version v4.9 by commit 38addce8b600ca335dc86fa3d48c890f1c6fa1f4. For more details please see the references link.
null
2022-04-25T06:00:25.564471Z
2022-04-24T22:50:51.332229Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/38addce8b600ca335dc86fa3d48c890f1c6fa1f4'}
Linux
GSD-2022-1002199
drm/amdgpu: Fix recursive locking warning
drm/amdgpu: Fix recursive locking warning This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit c0e9d868a1e03b120562da0abb5bfa2c47f3f9fa. For more details please see the references link.
null
2022-04-25T03:53:06.032888Z
2022-04-24T22:21:04.471317Z
null
null
null
null
null
Linux
GSD-2021-1001133
net: caif: fix memory leak in ldisc_open
net: caif: fix memory leak in ldisc_open This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.14 by commit e056cc440ae71fda770814a7aa865279fc8d6462. For more details please see the references link.
null
2021-12-20T02:17:57.441908Z
2021-07-08T01:58:40.305Z
null
null
null
null
null
Linux
GSD-2021-1001099
net: caif: fix memory leak in ldisc_open
net: caif: fix memory leak in ldisc_open This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.274 by commit 45a99589a9a3445dce114060f3b52f2df13bc79b. For more details please see the references link.
null
2021-12-19T23:16:12.824618Z
2021-07-08T01:56:16.120780Z
null
null
null
null
null
Linux
GSD-2022-1002033
ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock()
ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 07a209fadee7b53b46858538e1177597273862e4, it was introduced in version v2.6.27 by commit 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d. For more details please see the references link.
null
2022-04-25T05:23:00.777569Z
2022-04-24T22:04:59.384203Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d'}
Linux
GSD-2021-1001563
mac80211: fix use-after-free in CCMP/GCMP RX
mac80211: fix use-after-free in CCMP/GCMP RX This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.209 by commit 3d5d629c99c468458022e9b381789de3595bf4dd, it was introduced in version v4.19.193 by commit 0f716b48ed25503e6961f4b5b40ece36f7e4ed26. For more details please see the references link.
null
2021-12-19T22:41:08.733536Z
2021-10-19T16:23:55.533814Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0f716b48ed25503e6961f4b5b40ece36f7e4ed26'}
Linux
GSD-2021-1001830
usb: musb: dsps: Fix the probe error path
usb: musb: dsps: Fix the probe error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.155 by commit 9ab5d539bc975b8dcde86eca1b58d836b657732e, it was introduced in version v5.4.148 by commit 9a4a6805294fa7d2653e82972bdaf9e3e1f3d3c9. For more details please see the references link.
null
2021-12-19T23:35:12.331819Z
2021-10-28T13:51:11.238180Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9a4a6805294fa7d2653e82972bdaf9e3e1f3d3c9'}
Linux
GSD-2021-1000722
net: caif: fix memory leak in cfusbl_device_notify
net: caif: fix memory leak in cfusbl_device_notify This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.272 by commit 81afc61cb6e2b553f2c5f992fa79e0ae73857141, it was introduced in version v3.3 by commit 7ad65bf68d705b445ef10b77ab50dab22be185ee. For more details please see the references link.
null
2021-12-19T23:52:59.730065Z
2021-06-24T23:59:14.855809Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ad65bf68d705b445ef10b77ab50dab22be185ee'}
Linux
GSD-2021-1000688
btrfs: do not BUG_ON in link_to_fixup_dir
btrfs: do not BUG_ON in link_to_fixup_dir This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.271 by commit e934c4ee17b33bafb0444f2f9766cda7166d3c40, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T23:19:25.437069Z
2021-06-04T20:02:30.783707Z
null
null
null
null
null
Linux
GSD-2021-1000372
media: [next] staging: media: atomisp: fix memory leak of object flash
media: [next] staging: media: atomisp: fix memory leak of object flash This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit cc4cc2fb5aaf9adb83c02211eb13b16cfcb7ba64, it was introduced in version v5.10 by commit 9289cdf399922a1bd801a8cd946a79581c00a380. For more details please see the references link.
null
2021-12-20T01:34:21.786775Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9289cdf399922a1bd801a8cd946a79581c00a380'}
Linux
GSD-2021-1001975
nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells
nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.213 by commit eb0fc8e7170e61eaf65d28dee4a8baf4e86b19ca, it was introduced in version v4.3 by commit 69aba7948cbe53f2f1827e84e9dd0ae470a5072e. For more details please see the references link.
null
2021-12-20T00:38:21.193764Z
2021-11-14T15:14:14.174374Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69aba7948cbe53f2f1827e84e9dd0ae470a5072e'}
Linux
GSD-2021-1000667
NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()
NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.193 by commit 39785761feadf261bc5101372b0b0bbaf6a94494, it was introduced in version v4.19.191 by commit 9ffa7967f9379a0a1b924e9ffeda709d72237da7. For more details please see the references link.
null
2021-12-20T00:21:01.297641Z
2021-06-04T19:58:10.444012Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9ffa7967f9379a0a1b924e9ffeda709d72237da7'}
Linux
GSD-2021-1000237
mt76: mt7915: fix memleak when mt7915_unregister_device()
mt76: mt7915: fix memleak when mt7915_unregister_device() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit d754c80ae82a662e692a82faad71b8c218cb7f52, it was introduced in version v5.12 by commit f285dfb98562e8380101095d168910df1d07d8be. For more details please see the references link.
null
2021-12-20T00:13:34.321059Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f285dfb98562e8380101095d168910df1d07d8be'}
Linux
GSD-2022-1000848
RDMA/cma: Do not change route.addr.src_addr outside state checks
RDMA/cma: Do not change route.addr.src_addr outside state checks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.103 by commit 5b1cef5798b4fd6e4fd5522e7b8a26248beeacaa, it was introduced in version v5.10 by commit 732d41c545bb359cbb8c94698bdc1f8bcf82279c. For more details please see the references link.
null
2022-03-18T02:49:10.695394Z
2022-03-18T00:23:38.945434Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/732d41c545bb359cbb8c94698bdc1f8bcf82279c'}
Linux
GSD-2021-1001076
can: j1939: fix Use-after-Free, hold skb ref while in use
can: j1939: fix Use-after-Free, hold skb ref while in use This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit 1071065eeb33d32b7d98c2ce7591881ae7381705, it was introduced in version v5.4 by commit 9d71dd0c70099914fcd063135da3c580865e924c. For more details please see the references link.
null
2021-12-20T01:16:19.093793Z
2021-06-30T00:38:02.738346Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9d71dd0c70099914fcd063135da3c580865e924c'}
Linux
GSD-2021-1001426
media: zr364xx: fix memory leak in zr364xx_start_readpipe
media: zr364xx: fix memory leak in zr364xx_start_readpipe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.240 by commit b0633051a6cb24186ff04ce1af99c7de18c1987e, it was introduced in version v2.6.32 by commit ccbf035ae5de4c535160fc99f73feb44cc55b534. For more details please see the references link.
null
2021-12-19T23:45:41.019403Z
2021-08-03T02:37:02.853869Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ccbf035ae5de4c535160fc99f73feb44cc55b534'}
Linux
GSD-2022-1002176
ata: sata_dwc_460ex: Fix crash due to OOB write
ata: sata_dwc_460ex: Fix crash due to OOB write This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 55e1465ba79562a191708a40eeae3f8082a209e3, it was introduced in version v4.18 by commit 28361c403683c2b00d4f5e76045f3ccd299bf99d. For more details please see the references link.
null
2022-04-25T03:36:44.466523Z
2022-04-24T22:18:52.373126Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/28361c403683c2b00d4f5e76045f3ccd299bf99d'}
Linux
GSD-2022-1002361
ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction
ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 60e5d391805d70458a01998de00d0c28cba40bf3, it was introduced in version v3.16 by commit 00a7bb81c20f3e81711e28e0f6c08cee8fd18514. For more details please see the references link.
null
2022-04-25T07:26:41.700969Z
2022-04-24T22:38:44.013085Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/00a7bb81c20f3e81711e28e0f6c08cee8fd18514'}
Linux
GSD-2021-1001631
riscv: Flush current cpu icache before other cpus
riscv: Flush current cpu icache before other cpus This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.73 by commit 427faa29e06f0709476ea1bd59758f997ec8b64e, it was introduced in version v4.15 by commit fab957c11efe2f405e08b9f0d080524bc2631428. For more details please see the references link.
null
2021-12-19T23:39:18.386692Z
2021-10-19T16:29:06.004369Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fab957c11efe2f405e08b9f0d080524bc2631428'}
Linux
GSD-2021-1000923
net: ipv4: fix memory leak in ip_mc_add1_src
net: ipv4: fix memory leak in ip_mc_add1_src This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.128 by commit 3dd2aeac2e9624cff9fa634710837e4f2e352758, it was introduced in version v4.9 by commit 24803f38a5c0b6c57ed800b47e695f9ce474bc3a. For more details please see the references link.
null
2021-12-20T01:06:26.822092Z
2021-06-30T00:24:47.302681Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/24803f38a5c0b6c57ed800b47e695f9ce474bc3a'}
Linux
GSD-2021-1000889
net/qla3xxx: fix schedule while atomic in ql_sem_spinlock
net/qla3xxx: fix schedule while atomic in ql_sem_spinlock This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.126 by commit 3e324774411dc94282e166a301af822d75741263. For more details please see the references link.
null
2021-12-19T23:07:39.061159Z
2021-06-30T00:04:39.425291Z
null
null
null
null
null
Linux
GSD-2021-1001261
seq_file: disallow extremely large seq buffer allocations
seq_file: disallow extremely large seq buffer allocations This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.52 by commit 174c34d9cda1b5818419b8f5a332ced10755e52f, it was introduced in version v3.16 by commit 058504edd02667eef8fac9be27ab3ea74332e9b4. For more details please see the references link.
null
2021-12-19T23:16:40.008218Z
2021-08-03T01:51:24.314564Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/058504edd02667eef8fac9be27ab3ea74332e9b4'}
Linux
GSD-2021-1000020
ARM: footbridge: fix PCI interrupt mapping
ARM: footbridge: fix PCI interrupt mapping This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.16 by commit c3efce8cc9807339633ee30e39882f4c8626ee1d, it was introduced in version v4.13 by commit 30fdfb929e82450bbf3d0e0aba56efbc29b52b52. For more details please see the references link.
null
2021-12-19T22:24:19.801604Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/30fdfb929e82450bbf3d0e0aba56efbc29b52b52'}
Linux
GSD-2021-1000470
liquidio: Fix unintented sign extension of a left shift of a u16
liquidio: Fix unintented sign extension of a left shift of a u16 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.233 by commit 114826c4bca1f02cccd6b4b8a36e1d14cc00f161, it was introduced in version v4.9 by commit 5bc67f587ba7eaa8dd3976bfeff8f2b60718c871. For more details please see the references link.
null
2021-12-19T23:14:11.962031Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5bc67f587ba7eaa8dd3976bfeff8f2b60718c871'}
Linux
GSD-2021-1002158
drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read
drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 97794170b696856483f74b47bfb6049780d2d3a0, it was introduced in version v5.7 by commit e11f5bd8228fc3760c221f940b9f6365dbf3e7ed. For more details please see the references link.
null
2021-12-20T01:15:55.063091Z
2021-11-14T15:22:34.144288Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e11f5bd8228fc3760c221f940b9f6365dbf3e7ed'}
Linux
GSD-2021-1000165
bpf: Fix masking negation logic upon negative dst register
bpf: Fix masking negation logic upon negative dst register This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.35 by commit 2cfa537674cd1051a3b8111536d77d0558f33d5d, it was introduced in version v5.0 by commit 979d63d50c0c0f7bc537bf821e056cc9fe5abd38. For more details please see the references link.
null
2021-12-19T22:44:03.850377Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/979d63d50c0c0f7bc537bf821e056cc9fe5abd38'}
Linux
GSD-2022-1001408
mt76: mt7921: fix crash when startup fails.
mt76: mt7921: fix crash when startup fails. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit c1a5e6002ec441a3b9fb4d048b4b49ae93409a46. For more details please see the references link.
null
2022-04-25T05:20:42.347115Z
2022-04-24T21:10:52.197286Z
null
null
null
null
null
Linux
GSD-2021-1002508
seg6: fix the iif in the IPv6 socket control block
seg6: fix the iif in the IPv6 socket control block This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.85 by commit 666521b3852d2b2f52d570f9122b1e4b50d96831, it was introduced in version v5.0 by commit ef489749aae508e6f17886775c075f12ff919fb1. For more details please see the references link.
null
2021-12-20T00:52:25.317245Z
2021-12-19T19:40:28.367420Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef489749aae508e6f17886775c075f12ff919fb1'}
Linux
GSD-2021-1000535
drm/amd/amdgpu: fix a potential deadlock in gpu reset
drm/amd/amdgpu: fix a potential deadlock in gpu reset This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit 42cdbad4f1e6845afabffce7aa631f6136b58fb6, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T23:19:40.227572Z
2021-06-04T19:34:54.282937Z
null
null
null
null
null
Linux
GSD-2022-1001058
dm ioctl: prevent potential spectre v1 gadget
dm ioctl: prevent potential spectre v1 gadget This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit dd86064417de828ff2102ddc6049c829bf7585b4. For more details please see the references link.
null
2022-04-25T05:03:44.297346Z
2022-04-24T20:42:51.068983Z
null
null
null
null
null
Linux
GSD-2021-1001774
NFC: digital: fix possible memory leak in digital_in_send_sdd_req()
NFC: digital: fix possible memory leak in digital_in_send_sdd_req() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.290 by commit 74569c78aa84f8c958f1334b465bc530906ec99a, it was introduced in version v3.13 by commit 2c66daecc4092e6049673c281b2e6f0d5e59a94c. For more details please see the references link.
null
2021-12-20T01:04:55.884552Z
2021-10-28T13:48:15.031830Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c66daecc4092e6049673c281b2e6f0d5e59a94c'}
Linux
GSD-2021-1000866
scsi: core: Fix error handling of scsi_host_alloc()
scsi: core: Fix error handling of scsi_host_alloc() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.237 by commit db08ce595dd64ea9859f7d088b51cbfc8e685c66. For more details please see the references link.
null
2021-12-19T22:49:15.741735Z
2021-06-30T00:02:23.559363Z
null
null
null
null
null
Linux
GSD-2022-1000219
btrfs: fix deadlock between quota disable and qgroup rescan worker
btrfs: fix deadlock between quota disable and qgroup rescan worker This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.99 by commit 32747e01436aac8ef93fe85b5b523b4f3b52f040. For more details please see the references link.
null
2022-02-19T13:00:46.254887Z
2022-02-18T21:56:55.429806Z
null
null
null
null
null
Linux
GSD-2022-1002224
gcc-plugins/stackleak: Exactly match strings instead of prefixes
gcc-plugins/stackleak: Exactly match strings instead of prefixes This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit f36dd10d1b9533129c86bc9b4f707fda1abfee06. For more details please see the references link.
null
2022-04-25T06:42:21.415768Z
2022-04-24T22:23:02.126526Z
null
null
null
null
null
Linux
GSD-2021-1001324
memory: fsl_ifc: fix leak of private memory on probe failure
memory: fsl_ifc: fix leak of private memory on probe failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.134 by commit 443f6ca6fd186b4fa4e6f377b6e19a91feb1a0d5, it was introduced in version v3.3 by commit a20cbdeffce247a2b6fb83cd8d22433994068565. For more details please see the references link.
null
2021-12-20T01:13:48.873625Z
2021-08-03T02:09:05.266596Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a20cbdeffce247a2b6fb83cd8d22433994068565'}
Linux
GSD-2022-1000649
selinux: fix double free of cond_list on error paths
selinux: fix double free of cond_list on error paths This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.8 by commit 7ed9cbf7ac0d4ed86b356e1b944304ae9ee450d4. For more details please see the references link.
null
2022-03-07T01:50:58.414126Z
2022-02-27T03:36:03.659955Z
null
null
null
null
null
Linux
GSD-2021-1002621
net: netlink: af_netlink: Prevent empty skb by adding a check on len.
net: netlink: af_netlink: Prevent empty skb by adding a check on len. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.294 by commit 40cf2e058832d9cfaae98dfd77334926275598b6. For more details please see the references link.
null
2022-01-11T05:47:12.959517Z
2021-12-27T05:27:38.517351Z
null
null
null
null
null
Linux
GSD-2022-1000999
gpio: Restrict usage of GPIO chip irq members before initialization
gpio: Restrict usage of GPIO chip irq members before initialization This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit f8dea54f74cae8c2e4d7b2952e8fed7743a85c87. For more details please see the references link.
null
2022-04-25T06:36:30.026621Z
2022-04-24T20:38:27.074408Z
null
null
null
null
null
Linux
GSD-2022-1001371
x86/Kconfig: Do not allow CONFIG_X86_X32_ABI=y with llvm-objcopy
x86/Kconfig: Do not allow CONFIG_X86_X32_ABI=y with llvm-objcopy This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 2141b80328b45f7bfe9691de7804988b4b4b1262. For more details please see the references link.
null
2022-04-25T06:40:51.349509Z
2022-04-24T21:08:37.905279Z
null
null
null
null
null
Linux
GSD-2021-1002271
arm64: dts: qcom: msm8998: Fix CPU/L2 idle state latency and residency
arm64: dts: qcom: msm8998: Fix CPU/L2 idle state latency and residency This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.162 by commit a14d7038ea201c5526375becfc43b9ba281b1e82. For more details please see the references link.
null
2021-12-20T00:31:46.680662Z
2021-11-29T02:36:19.832405Z
null
null
null
null
null
Linux
GSD-2022-1000833
netfilter: fix use-after-free in __nf_register_net_hook()
netfilter: fix use-after-free in __nf_register_net_hook() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.104 by commit 8b0142c4143c1ca297dcf2c0cdd045d65dae2344, it was introduced in version v4.14 by commit 2420b79f8c18a75ee2417cace381f4604b9b4365. For more details please see the references link.
null
2022-03-18T02:50:14.466781Z
2022-03-18T00:22:40.436556Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2420b79f8c18a75ee2417cace381f4604b9b4365'}
Linux
GSD-2022-1001721
mt76: mt7915: fix injected MPDU transmission to not use HW A-MSDU
mt76: mt7915: fix injected MPDU transmission to not use HW A-MSDU This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit df467929a0408efccd9495ccc5b650d9a3782313. For more details please see the references link.
null
2022-04-25T03:36:33.341281Z
2022-04-24T21:37:39.532810Z
null
null
null
null
null
Linux
GSD-2022-1000560
mtd: parsers: qcom: Fix kernel panic on skipped partition
mtd: parsers: qcom: Fix kernel panic on skipped partition This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit a2995fe23095ceda2dc382fbe057f5e164595548, it was introduced in version v5.12 by commit 803eb124e1a64e42888542c3444bfe6dac412c7f. For more details please see the references link.
null
2022-03-07T01:38:47.328541Z
2022-02-27T03:24:01.390339Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/803eb124e1a64e42888542c3444bfe6dac412c7f'}
Linux
GSD-2022-1000130
yam: fix a memory leak in yam_siocdevprivate()
yam: fix a memory leak in yam_siocdevprivate() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.228 by commit 4bd197ce18329e3725fe3af5bd27daa4256d3ac7, it was introduced in version v4.19 by commit 0781168e23a2fc8dceb989f11fc5b39b3ccacc35. For more details please see the references link.
null
2022-02-20T06:39:44.299253Z
2022-02-18T21:44:28.327070Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0781168e23a2fc8dceb989f11fc5b39b3ccacc35'}
Linux
GSD-2022-1002418
video: fbdev: sm712fb: Fix crash in smtcfb_write()
video: fbdev: sm712fb: Fix crash in smtcfb_write() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 0ec746674296c94137f074309c26d17e644c0498. For more details please see the references link.
null
2022-04-25T04:51:26.657681Z
2022-04-24T22:45:09.935615Z
null
null
null
null
null
Linux
GSD-2022-1000425
arm64: dts: meson-sm1-odroid: use correct enable-gpio pin for tf-io regulator
arm64: dts: meson-sm1-odroid: use correct enable-gpio pin for tf-io regulator This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit 162f8057192c247096c1ba4d39c8450f14b86e40, it was introduced in version v5.14 by commit 1f80a5cf74a60997b92d2cde772edec093bec4d9. For more details please see the references link.
null
2022-03-07T01:51:06.982115Z
2022-02-27T03:05:04.882297Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1f80a5cf74a60997b92d2cde772edec093bec4d9'}
Linux
GSD-2021-1001148
net: validate lwtstate->data before returning from skb_tunnel_info()
net: validate lwtstate->data before returning from skb_tunnel_info() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.5 by commit a915379594f1e045421635c6316d8f3ffa018c58, it was introduced in version v4.3 by commit 61adedf3e3f1d3f032c5a6a299978d91eff6d555. For more details please see the references link.
null
2021-12-19T22:55:38.472887Z
2021-08-03T01:30:34.377698Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61adedf3e3f1d3f032c5a6a299978d91eff6d555'}
Linux
GSD-2022-1002048
ntfs: add sanity check on allocation size
ntfs: add sanity check on allocation size This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit b230f2d9441a34c7f483d39ab78519bcf73cc2e0. For more details please see the references link.
null
2022-04-25T05:48:52.727791Z
2022-04-24T22:05:48.110634Z
null
null
null
null
null
Linux
GSD-2021-1001518
tty: Fix out-of-bound vmalloc access in imageblit
tty: Fix out-of-bound vmalloc access in imageblit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.285 by commit 70aed03b1d5a5df974f456cdc8eedb213c94bb8b. For more details please see the references link.
null
2021-12-20T00:47:26.708537Z
2021-10-19T16:21:51.084861Z
null
null
null
null
null
Linux
GSD-2022-1001234
igc: avoid kernel warning when changing RX ring parameters
igc: avoid kernel warning when changing RX ring parameters This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 65aebcf1e05bd97d2e7ffcdff36efea1757c9450, it was introduced in version v5.13 by commit 73f1071c1d2952b8c93cd6cd99744768c59ec840. For more details please see the references link.
null
2022-04-25T06:03:58.304470Z
2022-04-24T20:56:26.961929Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/73f1071c1d2952b8c93cd6cd99744768c59ec840'}
Linux
GSD-2021-1000759
x86/kvm: Disable kvmclock on all CPUs on shutdown
x86/kvm: Disable kvmclock on all CPUs on shutdown This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.125 by commit 9084fe1b3572664ad276f427dce575f580c9799a, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T00:42:32.548575Z
2021-06-25T00:02:56.940176Z
null
null
null
null
null
Linux
GSD-2021-1002764
scsi: scsi_debug: Fix type in min_t to avoid stack OOB
scsi: scsi_debug: Fix type in min_t to avoid stack OOB This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit 3085147645938eb41f0bc0e25ef9791e71f5ee4b. For more details please see the references link.
null
2022-01-11T05:51:05.269398Z
2021-12-27T05:49:34.722673Z
null
null
null
null
null
Linux
GSD-2022-1000976
block: null_blk: end timed out poll request
block: null_blk: end timed out poll request This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.4 by commit 407d09a22f3f685fd634aa5d05840c64b23bfebc, it was introduced in version v5.16 by commit 0a593fbbc245a85940ed34caa3aa1e4cb060c54b. For more details please see the references link.
null
2022-04-25T05:17:24.568642Z
2022-04-24T20:36:17.568175Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0a593fbbc245a85940ed34caa3aa1e4cb060c54b'}
Linux
GSD-2022-1001664
veth: Ensure eth header is in skb's linear part
veth: Ensure eth header is in skb's linear part This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.35 by commit 93940fc4cb81840dc0fa202de48cccb949a0261d, it was introduced in version v2.6.24 by commit e314dbdc1c0dc6a548ecf0afce28ecfd538ff568. For more details please see the references link.
null
2022-04-25T06:19:41.285239Z
2022-04-24T21:33:06.972530Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e314dbdc1c0dc6a548ecf0afce28ecfd538ff568'}
Linux
GSD-2021-1000309
net/nfc: fix use-after-free llcp_sock_bind/connect
net/nfc: fix use-after-free llcp_sock_bind/connect This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 18175fe17ae043a0b81e5d511f8817825784c299, it was introduced in version v5.12 by commit c33b1cc62ac05c1dbb1cdafe2eb66da01c76ca8d. For more details please see the references link.
null
2021-12-19T22:22:37.670306Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c33b1cc62ac05c1dbb1cdafe2eb66da01c76ca8d'}
Linux
GSD-2021-1002334
scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine
scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit dbebf865b3239595c1d4dba063b122862583b52a. For more details please see the references link.
null
2021-12-19T23:35:40.092858Z
2021-11-29T02:39:11.958972Z
null
null
null
null
null
Linux
GSD-2021-1000427
powerpc: Fix HAVE_HARDLOCKUP_DETECTOR_ARCH build configuration
powerpc: Fix HAVE_HARDLOCKUP_DETECTOR_ARCH build configuration This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.119 by commit 3733a64d5828e72b46fd670b98435c11d291139e, it was introduced in version v4.13 by commit 2104180a53698df5aec35aed5f840a26ade0551d. For more details please see the references link.
null
2021-12-19T23:27:01.725831Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2104180a53698df5aec35aed5f840a26ade0551d'}
Linux
GSD-2021-1000077
irqchip/gic-v3: Do not enable irqs when handling spurious interrups
irqchip/gic-v3: Do not enable irqs when handling spurious interrups This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.3 by commit 3f72d3709f53af72835af7dc8b15ba61611a0e36, it was introduced in version v5.1 by commit 3f1f3234bc2db1c16b9818b9a15a5d58ad45251c. For more details please see the references link.
null
2021-12-19T23:30:49.707584Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f1f3234bc2db1c16b9818b9a15a5d58ad45251c'}
Linux
GSD-2021-1001236
media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf()
media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.54 by commit e991457afdcb5f4dbc5bc9d79eaf775be33e7092, it was introduced in version v2.6.34 by commit dae52d009fc950b5c209260d50fcc000f5becd3c. For more details please see the references link.
null
2021-12-20T00:00:42.389778Z
2021-08-03T01:45:07.480478Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/dae52d009fc950b5c209260d50fcc000f5becd3c'}
Linux
GSD-2022-1001849
drm/tegra: Fix reference leak in tegra_dsi_ganged_probe
drm/tegra: Fix reference leak in tegra_dsi_ganged_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 852c1f5f3119a38ee68e319bab10277fc1ab06b7, it was introduced in version v3.19 by commit e94236cde4d519cdecd45e2435defba33abdc99f. For more details please see the references link.
null
2022-04-25T06:26:38.872160Z
2022-04-24T21:48:00.519741Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e94236cde4d519cdecd45e2435defba33abdc99f'}
Linux
GSD-2021-1001666
md: fix a lock order reversal in md_alloc
md: fix a lock order reversal in md_alloc This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.70 by commit b18ba3f477a2fdd12d2ca2e01d2bd874968714e2, it was introduced in version v3.0 by commit b0140891a8cea36469f58d23859e599b1122bd37. For more details please see the references link.
null
2021-12-20T01:27:24.514522Z
2021-10-19T16:30:46.775279Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b0140891a8cea36469f58d23859e599b1122bd37'}
Linux
GSD-2021-1000974
drm/amd/display: Fix potential memory leak in DMUB hw_init
drm/amd/display: Fix potential memory leak in DMUB hw_init This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.45 by commit 9e8c2af010463197315fa54a6c17e74988b5259c. For more details please see the references link.
null
2021-12-20T00:24:05.113378Z
2021-06-30T00:30:16.384711Z
null
null
null
null
null
Linux
GSD-2022-1002336
video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow
video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 72dd5c46a152136712a55bf026a9aa8c1b12b60d. For more details please see the references link.
null
2022-04-25T06:26:16.399177Z
2022-04-24T22:35:34.093068Z
null
null
null
null
null
Linux
GSD-2021-1001689
drm/nouveau: avoid a use-after-free when BO init fails
drm/nouveau: avoid a use-after-free when BO init fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.12 by commit 548f2ff8ea5e0ce767ae3418d1ec5308990be87d, it was introduced in version v5.4 by commit 019cbd4a4feb3aa3a917d78e7110e3011bbff6d5. For more details please see the references link.
null
2021-12-20T01:38:54.031140Z
2021-10-19T16:31:58.045596Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/019cbd4a4feb3aa3a917d78e7110e3011bbff6d5'}
Linux
GSD-2021-1001373
memory: fsl_ifc: fix leak of IO mapping on probe failure
memory: fsl_ifc: fix leak of IO mapping on probe failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.198 by commit 94bc2fe46102d1e060fc749c0c19511e76c9995f, it was introduced in version v3.3 by commit a20cbdeffce247a2b6fb83cd8d22433994068565. For more details please see the references link.
null
2021-12-20T00:29:02.434900Z
2021-08-03T02:22:15.666816Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a20cbdeffce247a2b6fb83cd8d22433994068565'}
Linux
GSD-2022-1002273
mm,hwpoison: unmap poisoned page before invalidation
mm,hwpoison: unmap poisoned page before invalidation This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit d102fcacfcf35d137d07127e223bed8cf0de17a2, it was introduced in version v5.4.189 by commit d1313f5e8fe50ce84ec3eac162873ee028a30631. For more details please see the references link.
null
2022-04-24T22:28:49.416676Z
2022-04-24T22:28:49.416676Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d1313f5e8fe50ce84ec3eac162873ee028a30631'}