ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2021-1001723
mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap
mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit 997ee230e4f5285cd98445c102d9033c7ec4814b, it was introduced in version v4.7 by commit 646e76bb5daf4ca38438c69ffb72cccb605f3466. For more details please see the references link.
null
2021-12-19T22:48:36.162488Z
2021-10-19T16:33:34.305798Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/646e76bb5daf4ca38438c69ffb72cccb605f3466'}
Linux
GSD-2021-1000831
kvm: avoid speculation-based attacks from out-of-range memslot accesses
kvm: avoid speculation-based attacks from out-of-range memslot accesses This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.273 by commit 3098b86390a6b9ea52657689f08410baf130ceff. For more details please see the references link.
null
2021-12-20T00:20:12.669662Z
2021-06-30T00:00:05.614947Z
null
null
null
null
null
Linux
GSD-2021-1000098
usb: dwc3: core: Do core softreset when switch mode
usb: dwc3: core: Do core softreset when switch mode This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.20 by commit 800f58217626c8b147aa40660e572ed8a0d56e3b, it was introduced in version v4.12 by commit 41ce1456e1dbbc7355d0fcc10cf7c337c13def24. For more details please see the references link.
null
2021-12-20T00:46:09.637876Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41ce1456e1dbbc7355d0fcc10cf7c337c13def24'}
Linux
GSD-2021-1000562
serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'
serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit 9b07b6973f7359e2dd6a9fe6db0c142634c823b7, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T01:02:31.436591Z
2021-06-04T19:39:11.795903Z
null
null
null
null
null
Linux
GSD-2021-1000132
tools/power turbostat: Fix offset overflow issue in index converting
tools/power turbostat: Fix offset overflow issue in index converting This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.36 by commit ea6803ff2cd1a2d7d880256bf562172b708a76ff, it was introduced in version v5.10 by commit 9972d5d84d76982606806b2ce887f70c2f8ba60a. For more details please see the references link.
null
2021-12-19T23:58:50.071572Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9972d5d84d76982606806b2ce887f70c2f8ba60a'}
Linux
GSD-2022-1000167
ASoC: ops: Reject out of bounds values in snd_soc_put_volsw()
ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.178 by commit 68fd718724284788fc5f379e0b7cac541429ece7. For more details please see the references link.
null
2022-02-19T12:53:52.895972Z
2022-02-18T21:49:30.228291Z
null
null
null
null
null
Linux
GSD-2022-1000537
KVM: x86: nSVM: fix potential NULL derefernce on nested migration
KVM: x86: nSVM: fix potential NULL derefernce on nested migration This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit 352193edda48e08e8824a7ece09aec830a603cfe, it was introduced in version v5.13 by commit 232f75d3b4b5456de6f0b671aa86345d62de1473. For more details please see the references link.
null
2022-03-07T01:31:12.181563Z
2022-02-27T03:20:43.895061Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/232f75d3b4b5456de6f0b671aa86345d62de1473'}
Linux
GSD-2022-1000864
bpf: Add schedule points in batch ops
bpf: Add schedule points in batch ops This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.103 by commit 7ef94bfb08fb9e73defafbd5ddef6b5a0e2ee12b, it was introduced in version v5.6 by commit aa2e93b8e58e18442edfb2427446732415bc215e. For more details please see the references link.
null
2022-03-18T03:02:36.253609Z
2022-03-18T00:25:49.479866Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/aa2e93b8e58e18442edfb2427446732415bc215e'}
Linux
GSD-2022-1001776
video: fbdev: sm712fb: Fix crash in smtcfb_write()
video: fbdev: sm712fb: Fix crash in smtcfb_write() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit eae90015d10f0c9a47fc4adccba4cd79dce664e4. For more details please see the references link.
null
2022-04-25T06:39:54.677205Z
2022-04-24T21:41:43.752081Z
null
null
null
null
null
Linux
GSD-2021-1002226
btrfs: fix memory ordering between normal and ordered work functions
btrfs: fix memory ordering between normal and ordered work functions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.291 by commit 637d652d351fd4f263ef302dc52f3971d314e500, it was introduced in version v3.15 by commit 08a9ff3264181986d1d692a4e6fce3669700c9f8. For more details please see the references link.
null
2021-12-19T23:20:02.741644Z
2021-11-29T02:34:15.386417Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/08a9ff3264181986d1d692a4e6fce3669700c9f8'}
Linux
GSD-2022-1001326
tpm: fix reference counting for struct tpm_chip
tpm: fix reference counting for struct tpm_chip This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.1 by commit 6e7baf84149fb43950631415de231b3a41915aa3, it was introduced in version v4.12 by commit fdc915f7f71939ad5a3dda3389b8d2d7a7c5ee66. For more details please see the references link.
null
2022-04-25T06:23:49.699994Z
2022-04-24T21:04:49.918548Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fdc915f7f71939ad5a3dda3389b8d2d7a7c5ee66'}
Linux
GSD-2021-1001959
ocfs2: mount fails with buffer overflow in strlen
ocfs2: mount fails with buffer overflow in strlen This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.253 by commit 232ed9752510de4436468b653d145565669c8498. For more details please see the references link.
null
2021-12-20T01:10:36.255960Z
2021-11-14T15:13:28.938720Z
null
null
null
null
null
Linux
GSD-2021-1002676
net/packet: rx_owner_map depends on pg_vec
net/packet: rx_owner_map depends on pg_vec This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.168 by commit 027a13973dadb64ef4f19db56c9b619ee82c3375, it was introduced in version v5.4.29 by commit 86137342fd4cf52882842aa8d1318b2661f08e8a. For more details please see the references link.
null
2022-01-11T05:52:27.284957Z
2021-12-27T05:36:18.347898Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/86137342fd4cf52882842aa8d1318b2661f08e8a'}
Linux
GSD-2021-1002363
can: pch_can: pch_can_rx_normal: fix use after free
can: pch_can: pch_can_rx_normal: fix use after free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.295 by commit bafe343a885c70dddf358379cf0b2a1c07355d8d, it was introduced in version v2.6.37 by commit b21d18b51b31a24d17f883b678432fbdee3d5675. For more details please see the references link.
null
2021-12-20T01:25:35.664686Z
2021-12-19T19:34:01.458755Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b21d18b51b31a24d17f883b678432fbdee3d5675'}
Linux
GSD-2022-1000921
netfilter: fix use-after-free in __nf_register_net_hook()
netfilter: fix use-after-free in __nf_register_net_hook() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.270 by commit 05f7927b25d2635e87267ff6c79db79fb46cf313, it was introduced in version v4.14 by commit 2420b79f8c18a75ee2417cace381f4604b9b4365. For more details please see the references link.
null
2022-03-18T02:59:45.204894Z
2022-03-18T00:32:23.241824Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2420b79f8c18a75ee2417cace381f4604b9b4365'}
Linux
GSD-2022-1001633
mac80211: fix potential double free on mesh join
mac80211: fix potential double free on mesh join This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.18 by commit 582d8c60c0c053684f7138875e8150d5749ffc17, it was introduced in version v5.8 by commit 6a01afcf8468d3ca2bd8bbb27503f60dcf643b20. For more details please see the references link.
null
2022-04-25T04:34:58.626460Z
2022-04-24T21:30:20.656414Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6a01afcf8468d3ca2bd8bbb27503f60dcf643b20'}
Linux
GSD-2021-1002699
dm btree remove: fix use after free in rebalance_children()
dm btree remove: fix use after free in rebalance_children() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.88 by commit 0e21e6cd5eebfc929ac5fa3b97ca2d4ace3cb6a3. For more details please see the references link.
null
2022-01-11T07:15:29.217824Z
2021-12-27T05:37:34.093740Z
null
null
null
null
null
Linux
GSD-2021-1002733
vduse: check that offset is within bounds in get_config()
vduse: check that offset is within bounds in get_config() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit ebbbc5fea3f648175df1aa3f127c78eb0252cc2a, it was introduced in version v5.15 by commit c8a6153b6c59d95c0e091f053f6f180952ade91e. For more details please see the references link.
null
2022-01-11T05:58:08.340939Z
2021-12-27T05:45:21.517252Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c8a6153b6c59d95c0e091f053f6f180952ade91e'}
Linux
GSD-2022-1001799
gcc-plugins/stackleak: Exactly match strings instead of prefixes
gcc-plugins/stackleak: Exactly match strings instead of prefixes This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 999ee266531bb38497a1ddef03f482961f3ae0e4. For more details please see the references link.
null
2022-04-25T06:42:32.596044Z
2022-04-24T21:42:55.828838Z
null
null
null
null
null
Linux
GSD-2022-1001263
ASoC: codecs: va-macro: fix accessing array out of bounds for enum type
ASoC: codecs: va-macro: fix accessing array out of bounds for enum type This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit c0099bbf8bc85d30c4cf38220fca3c8d4253fa7f, it was introduced in version v5.11 by commit 908e6b1df26efc9d2df70c9a7bf4f5eae5c5702f. For more details please see the references link.
null
2022-04-25T04:08:49.945291Z
2022-04-24T20:59:13.227763Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/908e6b1df26efc9d2df70c9a7bf4f5eae5c5702f'}
Linux
GSD-2022-1000022
NFC: st21nfca: Fix memory leak in device probe and remove
NFC: st21nfca: Fix memory leak in device probe and remove This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.224 by commit a1e0080a35a16ce3808f7040fe0c3a8fdb052349, it was introduced in version v3.16 by commit 68957303f44a501af5cf37913208a2acaa6bcdf1. For more details please see the references link.
null
2022-01-11T05:53:58.679991Z
2022-01-10T19:50:33.081639Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/68957303f44a501af5cf37913208a2acaa6bcdf1'}
Linux
GSD-2022-1000188
KVM: x86: Forcibly leave nested virt when SMM state is toggled
KVM: x86: Forcibly leave nested virt when SMM state is toggled This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.97 by commit 080dbe7e9b86a0392d8dffc00d9971792afc121f. For more details please see the references link.
null
2022-02-19T03:18:01.085716Z
2022-02-18T21:52:37.119190Z
null
null
null
null
null
Linux
GSD-2022-1000472
mtd: parsers: qcom: Fix kernel panic on skipped partition
mtd: parsers: qcom: Fix kernel panic on skipped partition This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit eb03cb6e03ffd9173e18e5fe87e4e3ce83820453, it was introduced in version v5.12 by commit 803eb124e1a64e42888542c3444bfe6dac412c7f. For more details please see the references link.
null
2022-03-07T01:38:10.273818Z
2022-02-27T03:11:54.514557Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/803eb124e1a64e42888542c3444bfe6dac412c7f'}
Linux
GSD-2022-1002320
netlabel: fix out-of-bounds memory accesses
netlabel: fix out-of-bounds memory accesses This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.28 by commit e3713abc4248aa6bcc11173d754c418b02a62cbb, it was introduced in version v2.6.19 by commit 446fda4f26822b2d42ab3396aafcedf38a9ff2b6. For more details please see the references link.
null
2022-04-25T04:48:41.095970Z
2022-04-24T22:34:08.014377Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/446fda4f26822b2d42ab3396aafcedf38a9ff2b6'}
Linux
GSD-2021-1000962
perf: Fix data race between pin_count increment/decrement
perf: Fix data race between pin_count increment/decrement This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.44 by commit c64a3be39fa9fe473dd85cf1e6a4a7b27c0d935f, it was introduced in version v2.6.39 by commit fe4b04fa31a6dcf4358aa84cf81e5a7fd079469b. For more details please see the references link.
null
2021-12-19T23:31:59.116020Z
2021-06-30T00:29:30.828209Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fe4b04fa31a6dcf4358aa84cf81e5a7fd079469b'}
Linux
GSD-2021-1001670
s390/qeth: fix NULL deref in qeth_clear_working_pool_list()
s390/qeth: fix NULL deref in qeth_clear_working_pool_list() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.70 by commit db94f89e1dadf693c15c2d60de0c34777cea5779, it was introduced in version v5.9 by commit eff73e16ee116f6eafa2be48fab42659a27cb453. For more details please see the references link.
null
2021-12-20T00:33:25.519877Z
2021-10-19T16:31:00.088067Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/eff73e16ee116f6eafa2be48fab42659a27cb453'}
Linux
GSD-2021-1001220
coresight: tmc-etf: Fix global-out-of-bounds in tmc_update_etf_buffer()
coresight: tmc-etf: Fix global-out-of-bounds in tmc_update_etf_buffer() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.3 by commit 0115687be7b13993066aef602253a53d55f5b11f, it was introduced in version v4.14 by commit 0c3fc4d5fa26092853278145aca9b21fa52a3e93. For more details please see the references link.
null
2021-12-19T22:37:29.846154Z
2021-08-03T01:39:48.024474Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0c3fc4d5fa26092853278145aca9b21fa52a3e93'}
Linux
GSD-2021-1000061
media: dvbdev: Fix memory leak in dvb_media_device_free()
media: dvbdev: Fix memory leak in dvb_media_device_free() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.3 by commit cede24d13be6c2a62be6d7ceea63c2719b0cfa82, it was introduced in version v4.5 by commit 0230d60e4661d9ced6fb0b9a30f182ebdafbba7a. For more details please see the references link.
null
2021-12-19T23:14:33.813390Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0230d60e4661d9ced6fb0b9a30f182ebdafbba7a'}
Linux
GSD-2021-1000431
spi: Fix use-after-free with devm_spi_alloc_*
spi: Fix use-after-free with devm_spi_alloc_* This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.119 by commit 001c8e83646ad3b847b18f6ac55a54367d917d74, it was introduced in version v5.4.80 by commit 3e04a4976addbedcad326f47b0dd4efc570a1fac. For more details please see the references link.
null
2021-12-19T22:54:08.583747Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3e04a4976addbedcad326f47b0dd4efc570a1fac'}
Linux
GSD-2021-1000124
perf/core: Fix unconditional security_locked_down() call
perf/core: Fix unconditional security_locked_down() call This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.19 by commit f5809ca4c311b71bfaba6d13f4e39eab0557895e, it was introduced in version v5.4 by commit b0c8fdc7fdb77586c3d1937050925b960743306e. For more details please see the references link.
null
2021-12-20T01:14:14.186153Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b0c8fdc7fdb77586c3d1937050925b960743306e'}
Linux
GSD-2021-1002119
net: mdiobus: Fix memory leak in __mdiobus_register
net: mdiobus: Fix memory leak in __mdiobus_register This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit 0c4e87ba11eb331dca2315d484d08441b8c13193. For more details please see the references link.
null
2021-12-19T22:46:35.634209Z
2021-11-14T15:20:41.258575Z
null
null
null
null
null
Linux
GSD-2022-1001449
scsi: qla2xxx: Fix warning message due to adisc being flushed
scsi: qla2xxx: Fix warning message due to adisc being flushed This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit b13baf97ddbc1a7e7536168383bc0d84c2204b03. For more details please see the references link.
null
2022-04-25T06:11:30.200760Z
2022-04-24T21:14:16.062992Z
null
null
null
null
null
Linux
GSD-2021-1000574
NFC: nci: fix memory leak in nci_allocate_device
NFC: nci: fix memory leak in nci_allocate_device This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.8 by commit 65234f50a90b64b335cbb9164b8a98c2a0d031dd, it was introduced in version v4.0 by commit 11f54f228643d0248ec00ce8c9fb8d872f87e7b8. For more details please see the references link.
null
2021-12-19T23:14:49.650056Z
2021-06-04T19:41:11.675829Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/11f54f228643d0248ec00ce8c9fb8d872f87e7b8'}
Linux
GSD-2021-1002549
blk-mq: cancel blk-mq dispatch work in both blk_cleanup_queue and disk_release()
blk-mq: cancel blk-mq dispatch work in both blk_cleanup_queue and disk_release() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.6 by commit e03513f58919d9e2bc6df765ca2c9da863d03d90. For more details please see the references link.
null
2021-12-19T22:35:51.758015Z
2021-12-19T19:42:14.430581Z
null
null
null
null
null
Linux
GSD-2022-1001019
net: ipv4: fix route with nexthop object delete warning
net: ipv4: fix route with nexthop object delete warning This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit f8db5743d09523c0bb35f16e13691e3b7eb5dba0, it was introduced in version v5.3 by commit 4c7e8084fd467ddb2b0e6c6011f9c1064afb7e56. For more details please see the references link.
null
2022-04-25T06:57:31.909956Z
2022-04-24T20:40:23.199702Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4c7e8084fd467ddb2b0e6c6011f9c1064afb7e56'}
Linux
GSD-2021-1000827
isdn: mISDN: netjet: Fix crash in nj_probe:
isdn: mISDN: netjet: Fix crash in nj_probe: This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.273 by commit 958cb1078ca60d214826fd90a0961a447fade59a. For more details please see the references link.
null
2021-12-20T01:07:06.634815Z
2021-06-29T23:59:50.898485Z
null
null
null
null
null
Linux
GSD-2021-1001735
hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field
hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit 16887ae4e3defd2c4e7913b6c539f33eaf4eac5c. For more details please see the references link.
null
2021-12-19T22:03:50.843577Z
2021-10-19T16:34:09.733020Z
null
null
null
null
null
Linux
GSD-2022-1002265
video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe()
video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit da8b269cc0a2526ebeaccbe2484c999eb0f822cf, it was introduced in version v3.2 by commit 3c8a63e22a0802fd56380f6ab305b419f18eb6f5. For more details please see the references link.
null
2022-04-25T04:37:00.979Z
2022-04-24T22:28:16.446480Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c8a63e22a0802fd56380f6ab305b419f18eb6f5'}
Linux
GSD-2022-1000258
net: fix information leakage in /proc/net/ptype
net: fix information leakage in /proc/net/ptype This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.19 by commit e43669c77cb3a742b7d84ecdc7c68c4167a7709b, it was introduced in version v2.6.26 by commit 2feb27dbe00cbb4f7d31f90acf6bd0d751dd0a50. For more details please see the references link.
null
2022-02-19T03:08:02.788260Z
2022-02-18T22:03:05.072614Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2feb27dbe00cbb4f7d31f90acf6bd0d751dd0a50'}
Linux
GSD-2021-1001365
virtio_console: Assure used length from device is limited
virtio_console: Assure used length from device is limited This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.198 by commit b5fba782ccd3d12a14f884cd20f255fc9c0eec0c. For more details please see the references link.
null
2021-12-20T00:10:17.313451Z
2021-08-03T02:19:59.464156Z
null
null
null
null
null
Linux
GSD-2022-1000608
psi: Fix uaf issue when psi trigger is destroyed while being polled
psi: Fix uaf issue when psi trigger is destroyed while being polled This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit 991ced6a3a926e58df1f446819b9f2790e1c0daa, it was introduced in version v5.2 by commit 0e94682b73bfa6c44c98af7a26771c9c08c055d5. For more details please see the references link.
null
2022-03-07T01:49:58.597034Z
2022-02-27T03:30:47.768943Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0e94682b73bfa6c44c98af7a26771c9c08c055d5'}
Linux
GSD-2021-1002660
ovl: fix warning in ovl_create_real()
ovl: fix warning in ovl_create_real() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.222 by commit 445d2dc63e5871d218f21b8f62ab29ac72f2e6b8. For more details please see the references link.
null
2022-01-11T05:54:52.387235Z
2021-12-27T05:34:44.326706Z
null
null
null
null
null
Linux
GSD-2022-1001330
jbd2: fix use-after-free of transaction_t race
jbd2: fix use-after-free of transaction_t race This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.1 by commit bff94c57bd130e3062afa94414c2294871314096, it was introduced in version v5.17 by commit 4f98186848707f530669238d90e0562d92a78aab. For more details please see the references link.
null
2022-04-25T05:32:20.127477Z
2022-04-24T21:05:06.971057Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4f98186848707f530669238d90e0562d92a78aab'}
Linux
GSD-2021-1002230
usb: host: ohci-tmio: check return value after calling platform_get_resource()
usb: host: ohci-tmio: check return value after calling platform_get_resource() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.291 by commit 2f18f97a1a787154a372c0738f1576f14b693d91. For more details please see the references link.
null
2021-12-19T23:03:08.313876Z
2021-11-29T02:34:24.832667Z
null
null
null
null
null
Linux
GSD-2022-1001760
ubifs: Fix to add refcount once page is set private
ubifs: Fix to add refcount once page is set private This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 4f75bab98565afd4f905059c56ec4caba88a7eec, it was introduced in version v2.6.27 by commit 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d. For more details please see the references link.
null
2022-04-25T04:12:47.412997Z
2022-04-24T21:40:29.864200Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d'}
Linux
GSD-2022-1000872
ibmvnic: free reset-work-item when flushing
ibmvnic: free reset-work-item when flushing This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.183 by commit 58b07100c20e95c78b8cb4d6d28ca53eb9ef81f2, it was introduced in version v4.18 by commit 2770a7984db588913e11a6dfcfe3461dbba9b7b2. For more details please see the references link.
null
2022-03-18T02:55:27.153795Z
2022-03-18T00:26:21.534566Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2770a7984db588913e11a6dfcfe3461dbba9b7b2'}
Linux
GSD-2022-1000521
ice: Fix KASAN error in LAG NETDEV_UNREGISTER handler
ice: Fix KASAN error in LAG NETDEV_UNREGISTER handler This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit faa9bcf700ca1a0d09f92502a6b65d3ce313fb46, it was introduced in version v5.15 by commit 6a8b357278f5f8b9817147277ab8f12879dce8a8. For more details please see the references link.
null
2022-03-07T01:37:56.239425Z
2022-02-27T03:18:54.913946Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6a8b357278f5f8b9817147277ab8f12879dce8a8'}
Linux
GSD-2022-1000171
drm/nouveau: fix off by one in BIOS boundary checking
drm/nouveau: fix off by one in BIOS boundary checking This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.178 by commit acc887ba88333f5fec49631f12d8cc7ebd95781c, it was introduced in version v4.8 by commit 4d4e9907ff572bb1d1c0f6913ad6e3d6d4525077. For more details please see the references link.
null
2022-02-19T04:24:26.305329Z
2022-02-18T21:50:42.826092Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4d4e9907ff572bb1d1c0f6913ad6e3d6d4525077'}
Linux
GSD-2022-1000464
net: dsa: lantiq_gswip: fix use after free in gswip_remove()
net: dsa: lantiq_gswip: fix use after free in gswip_remove() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit df2495f329b08ac0d0d3e6334a01955ae839005e, it was introduced in version v5.15.24 by commit b5652bc50dde7b84e93dfb25479b64b817e377c1. For more details please see the references link.
null
2022-03-07T01:32:16.201814Z
2022-02-27T03:10:59.967207Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b5652bc50dde7b84e93dfb25479b64b817e377c1'}
Linux
GSD-2022-1002459
ALSA: pcm: Test for "silence" field in struct "pcm_format_data"
ALSA: pcm: Test for "silence" field in struct "pcm_format_data" This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit 77af45df08768401602472f3e3879dce14f55497. For more details please see the references link.
null
2022-04-25T04:20:35.121625Z
2022-04-24T22:50:26.217803Z
null
null
null
null
null
Linux
GSD-2021-1001109
mac80211: remove warning in ieee80211_get_sband()
mac80211: remove warning in ieee80211_get_sband() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.196 by commit 25487a5ff100398cb214ae854358609e4bbd4e7d. For more details please see the references link.
null
2021-12-20T01:07:28.418898Z
2021-07-08T01:56:55.269086Z
null
null
null
null
null
Linux
GSD-2022-1000034
i2c: validate user data in compat ioctl
i2c: validate user data in compat ioctl This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.170 by commit 9e4a3f47eff476097e0c7faac04d1831fc70237d, it was introduced in version v4.15 by commit 7d5cb45655f2e9e37ef75d18f50c0072ef14a38b. For more details please see the references link.
null
2022-01-11T05:46:56.604390Z
2022-01-10T19:51:03.415718Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7d5cb45655f2e9e37ef75d18f50c0072ef14a38b'}
Linux
GSD-2022-1002009
iommu/arm-smmu-v3: fix event handling soft lockup
iommu/arm-smmu-v3: fix event handling soft lockup This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit 0b9cf0b599258dfbc8f3b4f21a0ef1faec8c455e. For more details please see the references link.
null
2022-04-25T06:29:11.441081Z
2022-04-24T22:02:42.534509Z
null
null
null
null
null
Linux
GSD-2021-1001559
HID: betop: fix slab-out-of-bounds Write in betop_probe
HID: betop: fix slab-out-of-bounds Write in betop_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.209 by commit bb8b72374db69afa25a5b65cf1c092860c6fe914. For more details please see the references link.
null
2021-12-19T23:36:43.973721Z
2021-10-19T16:23:45.089906Z
null
null
null
null
null
Linux
GSD-2022-1001275
crypto: ccree - Fix use after free in cc_cipher_exit()
crypto: ccree - Fix use after free in cc_cipher_exit() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit cffb5382bd8d3cf21b874ab5b84bf7618932286b, it was introduced in version v4.17 by commit 63ee04c8b491ee148489347e7da9fbfd982ca2bb. For more details please see the references link.
null
2022-04-25T03:37:47.195742Z
2022-04-24T21:00:30.565749Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63ee04c8b491ee148489347e7da9fbfd982ca2bb'}
Linux
GSD-2021-1002725
mac80211: validate extended element ID is present
mac80211: validate extended element ID is present This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit c62b16f98688ae7bc0ab23a6490481f4ce9b3a49, it was introduced in version v4.19 by commit 41cbb0f5a29592874355e4159489eb08337cd50e. For more details please see the references link.
null
2022-01-11T05:48:48.129926Z
2021-12-27T05:39:13.447540Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41cbb0f5a29592874355e4159489eb08337cd50e'}
Linux
GSD-2021-1000718
nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect
nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.272 by commit eb6875d48590d8e564092e831ff07fa384d7e477, it was introduced in version v3.3 by commit d646960f7986fefb460a2b062d5ccc8ccfeacc3a. For more details please see the references link.
null
2021-12-19T23:39:22.039169Z
2021-06-24T23:58:58.738441Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d646960f7986fefb460a2b062d5ccc8ccfeacc3a'}
Linux
GSD-2022-1001625
cifs: fix handlecache and multiuser
cifs: fix handlecache and multiuser This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit ffa631c4bff59dde59b598011f570e27dfba3515. For more details please see the references link.
null
2022-04-25T05:18:59.093491Z
2022-04-24T21:29:46.450982Z
null
null
null
null
null
Linux
GSD-2022-1000937
xen/gnttab: fix gnttab_end_foreign_access() without page specified
xen/gnttab: fix gnttab_end_foreign_access() without page specified This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.306 by commit ae6f8a67b98144827e78874c8dba41cccb02be5b. For more details please see the references link.
null
2022-03-18T02:59:55.823701Z
2022-03-18T00:34:19.015388Z
null
null
null
null
null
Linux
GSD-2021-1002375
net: ethernet: dec: tulip: de4x5: fix possible array overflows in type3_infoblock()
net: ethernet: dec: tulip: de4x5: fix possible array overflows in type3_infoblock() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.292 by commit 890fefa2d24d4c653b1b425127488a7f8c14ff5c. For more details please see the references link.
null
2021-12-20T00:24:54.458214Z
2021-12-19T19:34:30.486527Z
null
null
null
null
null
Linux
GSD-2021-1000348
powerpc/64: Fix the definition of the fixmap area
powerpc/64: Fix the definition of the fixmap area This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 4b9fb2c9039a206d37f215936a4d5bee7b1bf9cd, it was introduced in version v5.5 by commit 265c3491c4bc8d40587996d6ee2f447a7ccfb4f3. For more details please see the references link.
null
2021-12-20T00:54:16.931237Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/265c3491c4bc8d40587996d6ee2f447a7ccfb4f3'}
Linux
GSD-2021-1000466
powerpc/64s: Fix crashes when toggling entry flush barrier
powerpc/64s: Fix crashes when toggling entry flush barrier This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.233 by commit ee4b7aab93c2631c3bb0753023c5dda592bb666b, it was introduced in version v4.14.208 by commit db01cad9efe3c3838a6b3a3f68affd295c4b92d6. For more details please see the references link.
null
2021-12-19T23:15:21.399295Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/db01cad9efe3c3838a6b3a3f68affd295c4b92d6'}
Linux
GSD-2021-1000036
ch_ktls: Fix kernel panic
ch_ktls: Fix kernel panic This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.32 by commit 8d5a9dbd2116a852f8f0f91f6fbc42a0afe1091f, it was introduced in version v5.7 by commit 5a4b9fe7fece62ecab6fb28fe92362f83b41c33e. For more details please see the references link.
null
2021-12-19T22:57:34.989796Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5a4b9fe7fece62ecab6fb28fe92362f83b41c33e'}
Linux
GSD-2021-1001277
tty: serial: 8250: serial_cs: Fix a memory leak in error handling path
tty: serial: 8250: serial_cs: Fix a memory leak in error handling path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.52 by commit 7a80f71601af015856a0aeb1e3c294037ac3dd32. For more details please see the references link.
null
2021-12-20T01:25:55.572536Z
2021-08-03T01:55:41.622457Z
null
null
null
null
null
Linux
GSD-2022-1001808
vsock/virtio: initialize vdev->priv before using VQs
vsock/virtio: initialize vdev->priv before using VQs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 10c6cb867ffa827a8364d0c481ec1438cd594652, it was introduced in version v5.3 by commit 9c7a5582f5d720dc35cfcc42ccaded69f0642e4a. For more details please see the references link.
null
2022-04-25T04:18:42.809852Z
2022-04-24T21:43:41.340486Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9c7a5582f5d720dc35cfcc42ccaded69f0642e4a'}
Linux
GSD-2021-1000935
net: bridge: fix vlan tunnel dst refcnt when egressing
net: bridge: fix vlan tunnel dst refcnt when egressing This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.128 by commit 79855be6445b6592bddb7bd7167083ec8cdbd73f, it was introduced in version v4.11 by commit 11538d039ac6efcf4f1a6c536e1b87cd3668a9fd. For more details please see the references link.
null
2021-12-19T23:12:44.517399Z
2021-06-30T00:25:32.530042Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/11538d039ac6efcf4f1a6c536e1b87cd3668a9fd'}
Linux
GSD-2021-1001627
net/sched: sch_taprio: properly cancel timer from taprio_destroy()
net/sched: sch_taprio: properly cancel timer from taprio_destroy() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.73 by commit 3ec73ffeef54596c32aff0e73fe60971b9c8b866, it was introduced in version v5.10.5 by commit a969a632cbe7165d448a5528806ad120c2599397. For more details please see the references link.
null
2021-12-20T01:01:09.844963Z
2021-10-19T16:28:55.157179Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a969a632cbe7165d448a5528806ad120c2599397'}
Linux
GSD-2022-1002377
pinctrl: samsung: drop pin banks references on error paths
pinctrl: samsung: drop pin banks references on error paths This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 2ec7782cf5ce45d09bfc988125a2526ed41c41b7, it was introduced in version v3.8 by commit ab663789d69760d2735402f66501f20b60312a3d. For more details please see the references link.
null
2022-04-25T06:44:29.334598Z
2022-04-24T22:40:49.720469Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab663789d69760d2735402f66501f20b60312a3d'}
Linux
GSD-2021-1001332
virtio-blk: Fix memory leak among suspend/resume procedure
virtio-blk: Fix memory leak among suspend/resume procedure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.134 by commit 04c6e60b884cb5e94ff32af46867fb41d5848358. For more details please see the references link.
null
2021-12-19T22:35:55.002345Z
2021-08-03T02:11:10.225514Z
null
null
null
null
null
Linux
GSD-2022-1002398
drbd: Fix five use after free bugs in get_initial_state
drbd: Fix five use after free bugs in get_initial_state This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit dcf6be17b5c53b741898d2223b23e66d682de300, it was introduced in version v4.5 by commit a29728463b254ce81ecefdf20c1a02e01d9361da. For more details please see the references link.
null
2022-04-25T04:15:28.763261Z
2022-04-24T22:43:14.915042Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a29728463b254ce81ecefdf20c1a02e01d9361da'}
Linux
GSD-2022-1002232
clk: qcom: clk-rcg2: Update logic to calculate D value for RCG
clk: qcom: clk-rcg2: Update logic to calculate D value for RCG This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 52592f9afbfe01bce8f8953e4f19cbe3bcbdbd3a, it was introduced in version v3.16 by commit 99cbd064b059f222c8839ba433a68b2d6ee33066. For more details please see the references link.
null
2022-04-25T06:31:21.360639Z
2022-04-24T22:24:00.257564Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/99cbd064b059f222c8839ba433a68b2d6ee33066'}
Linux
GSD-2021-1001298
ext4: fix memory leak in ext4_fill_super
ext4: fix memory leak in ext4_fill_super This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.43 by commit 01d349a481f0591230300a9171330136f9159bcd, it was introduced in version v2.6.25 by commit ce40733ce93de402ed629762f0e912d9af187cef. For more details please see the references link.
null
2021-12-20T00:19:29.064779Z
2021-08-03T02:00:56.775122Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ce40733ce93de402ed629762f0e912d9af187cef'}
Linux
GSD-2021-1000870
wq: handle VM suspension in stall detection
wq: handle VM suspension in stall detection This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.195 by commit 50316635e644a0b9e62d3263fb4e8be2104605b6. For more details please see the references link.
null
2021-12-19T22:18:59.251884Z
2021-06-30T00:02:38.905271Z
null
null
null
null
null
Linux
GSD-2021-1001762
nexthop: Fix division by zero while replacing a resilient group
nexthop: Fix division by zero while replacing a resilient group This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.9 by commit e9d32ec26e7f01d1af13bdc687f586362546aa25, it was introduced in version v5.13 by commit 283a72a5599e80750699d2021830a294ed9ab3f3. For more details please see the references link.
null
2021-12-20T01:14:13.863546Z
2021-10-19T16:35:29.402699Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/283a72a5599e80750699d2021830a294ed9ab3f3'}
Linux
GSD-2021-1000523
Bluetooth: SMP: Fail if remote and local public keys are identical
Bluetooth: SMP: Fail if remote and local public keys are identical This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.122 by commit f97257cde764ad6979a7dbeb460b9fb69276342e, it was introduced in version v3.17 by commit bfe01a5ba2490f299e1d2d5508cbbbadd897bbe9. For more details please see the references link.
null
2021-12-19T23:33:20.275181Z
2021-05-31T23:50:44.006203Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bfe01a5ba2490f299e1d2d5508cbbbadd897bbe9'}
Linux
GSD-2021-1000489
powerpc/64s: Fix crashes when toggling entry flush barrier
powerpc/64s: Fix crashes when toggling entry flush barrier This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.269 by commit 8382b15864e5014261b4f36c2aa89723612ee058, it was introduced in version v4.4.245 by commit 4a1e90af718d1489ffcecc8f52486c4f5dc0f7a6. For more details please see the references link.
null
2021-12-20T00:53:37.575216Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4a1e90af718d1489ffcecc8f52486c4f5dc0f7a6'}
Linux
GSD-2021-1000173
md/raid1: properly indicate failure when ending a failed write request
md/raid1: properly indicate failure when ending a failed write request This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.118 by commit 6920cef604fa57f9409e3960413e9cc11f5c5a40, it was introduced in version v5.4 by commit eeba6809d8d58908b5ed1b5ceb5fcb09a98a7cad. For more details please see the references link.
null
2021-12-20T01:32:14.468986Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/eeba6809d8d58908b5ed1b5ceb5fcb09a98a7cad'}
Linux
GSD-2022-1000126
scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put()
scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.228 by commit de6336b17a1376db1c0f7a528cce8783db0881c0, it was introduced in version v3.2 by commit 0cbf32e1681d870632a1772601cbaadd996dc978. For more details please see the references link.
null
2022-02-19T12:50:33.468436Z
2022-02-18T21:44:01.724690Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0cbf32e1681d870632a1772601cbaadd996dc978'}
Linux
GSD-2022-1000576
drm/amd/display: watermark latencies is not enough on DCN31
drm/amd/display: watermark latencies is not enough on DCN31 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.22 by commit 7ff0ed88e4eb6bd7ccd7cf422ab855032ed0528c. For more details please see the references link.
null
2022-03-07T01:36:48.777667Z
2022-02-27T03:25:49.973799Z
null
null
null
null
null
Linux
GSD-2022-1001737
drm/bridge: Add missing pm_runtime_put_sync
drm/bridge: Add missing pm_runtime_put_sync This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit ff13c90d7f7ab606b37be6d15140d19013d6736c. For more details please see the references link.
null
2022-04-25T06:39:52.755626Z
2022-04-24T21:38:25.862951Z
null
null
null
null
null
Linux
GSD-2022-1000825
arm64: entry.S: Add ventry overflow sanity checks
arm64: entry.S: Add ventry overflow sanity checks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.105 by commit dc5b630c0d532140e194997d350f587dbcc78bfb. For more details please see the references link.
null
2022-03-18T04:26:12.125841Z
2022-03-18T00:21:37.075994Z
null
null
null
null
null
Linux
GSD-2021-1002267
tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc
tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.162 by commit d491c84df5c469dd9621863b6a770b3428137063. For more details please see the references link.
null
2021-12-20T00:35:52.644675Z
2021-11-29T02:36:09.599871Z
null
null
null
null
null
Linux
GSD-2022-1001367
jfs: prevent NULL deref in diFree
jfs: prevent NULL deref in diFree This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit ffe1d40aec3f6f8cc620369ba07eb5e9bd449d85. For more details please see the references link.
null
2022-04-25T04:56:18.344770Z
2022-04-24T21:08:24.049453Z
null
null
null
null
null
Linux
GSD-2021-1002637
net: systemport: Add global locking for descriptor lifecycle
net: systemport: Add global locking for descriptor lifecycle This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.259 by commit f3fde37d3f0d429f0fcce214cb52588a9e21260e, it was introduced in version v3.16 by commit 80105befdb4b8cea924711b40b2462b87df65b62. For more details please see the references link.
null
2022-01-11T05:58:15.314999Z
2021-12-27T05:28:22.782630Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80105befdb4b8cea924711b40b2462b87df65b62'}
Linux
GSD-2021-1001918
can: peak_pci: peak_pci_remove(): fix UAF
can: peak_pci: peak_pci_remove(): fix UAF This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.290 by commit 1c616528ba4aeb1125a06b407572ab7b56acae38, it was introduced in version v3.4 by commit e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd. For more details please see the references link.
null
2021-12-20T00:16:42.560242Z
2021-11-14T15:11:39.892775Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd'}
Linux
GSD-2022-1001388
scsi: libfc: Fix use after free in fc_exch_abts_resp()
scsi: libfc: Fix use after free in fc_exch_abts_resp() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 87909291762d08fdb60d19069d7a89b5b308d0ef. For more details please see the references link.
null
2022-04-25T06:31:15.209943Z
2022-04-24T21:09:41.536699Z
null
null
null
null
null
Linux
GSD-2021-1002322
RDMA/core: Set send and receive CQ before forwarding to the driver
RDMA/core: Set send and receive CQ before forwarding to the driver This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit b70e072feffa0ba5c41a99b9524b9878dee7748e, it was introduced in version v5.15 by commit 514aee660df493cd673154a6ba6bab745ec47b8c. For more details please see the references link.
null
2021-12-19T22:33:58.896076Z
2021-11-29T02:38:41.864866Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/514aee660df493cd673154a6ba6bab745ec47b8c'}
Linux
GSD-2022-1001672
fbdev: Fix unregistering of framebuffers without device
fbdev: Fix unregistering of framebuffers without device This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 2388f826cdc9af2651991adc0feb79de9bdf2232, it was introduced in version v5.15.33 by commit c894ac44786cfed383a6c6b20c1bfb12eb96018a. For more details please see the references link.
null
2022-04-25T03:36:38.601857Z
2022-04-24T21:33:48.499099Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c894ac44786cfed383a6c6b20c1bfb12eb96018a'}
Linux
GSD-2022-1000960
ARM: davinci: da850-evm: Avoid NULL pointer dereference
ARM: davinci: da850-evm: Avoid NULL pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.4 by commit c5628533a3ece64235d04fe11ec44d2be99e423d, it was introduced in version v2.6.33 by commit bae105879f2f2404155da6f50b3636193d228a62. For more details please see the references link.
null
2022-04-25T04:35:26.780394Z
2022-04-24T20:35:18.391283Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bae105879f2f2404155da6f50b3636193d228a62'}
Linux
GSD-2021-1002772
IB/qib: Fix memory leak in qib_user_sdma_queue_pkts()
IB/qib: Fix memory leak in qib_user_sdma_queue_pkts() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.297 by commit 1ced0a3015a95c6a6db45e37250912c4c86697ab, it was introduced in version v4.4.292 by commit bda41654b6e0c125a624ca35d6d20beb8015b5d0. For more details please see the references link.
null
2022-01-11T05:52:47.019856Z
2021-12-30T02:42:48.640254Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bda41654b6e0c125a624ca35d6d20beb8015b5d0'}
Linux
GSD-2021-1002288
perf bpf: Avoid memory leak from perf_env__insert_btf()
perf bpf: Avoid memory leak from perf_env__insert_btf() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.82 by commit 11589d3144bc4e272e0aae46ce8156162e99babc, it was introduced in version v5.1 by commit 3792cb2ff43b1b193136a03ce1336462a827d792. For more details please see the references link.
null
2021-12-20T01:35:06.473026Z
2021-11-29T02:37:10.629888Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3792cb2ff43b1b193136a03ce1336462a827d792'}
Linux
GSD-2022-1001222
drm/dp: Fix OOB read when handling Post Cursor2 register
drm/dp: Fix OOB read when handling Post Cursor2 register This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit aeaed9a9fe694f8b1462fb81e2d33298c929180b, it was introduced in version v5.5 by commit 79465e0ffeb9e4866939ea562bc55367be91e595. For more details please see the references link.
null
2022-04-25T03:11:05.292803Z
2022-04-24T20:55:26.440547Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/79465e0ffeb9e4866939ea562bc55367be91e595'}
Linux
GSD-2022-1000599
drm/vmwgfx: Fix stale file descriptors on failed usercopy
drm/vmwgfx: Fix stale file descriptors on failed usercopy This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.4 by commit 1d833b27fb708d6fdf5de9f6b3a8be4bd4321565, it was introduced in version v4.14 by commit c906965dee22d5e95d0651759ba107b420212a9f. For more details please see the references link.
null
2022-03-07T01:49:58.627372Z
2022-02-27T03:29:07.972503Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c906965dee22d5e95d0651759ba107b420212a9f'}
Linux
GSD-2022-1000063
ALSA: hda: intel-sdw-acpi: harden detection of controller
ALSA: hda: intel-sdw-acpi: harden detection of controller This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.13 by commit cce476954401e3421afafb25bbaa926050688b1d. For more details please see the references link.
null
2022-01-11T06:56:14.816646Z
2022-01-10T19:52:28.579312Z
null
null
null
null
null
Linux
GSD-2022-1000433
net: fix a memleak when uncloning an skb dst and its metadata
net: fix a memleak when uncloning an skb dst and its metadata This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit fdcb263fa5cda15b8cb24a641fa2718c47605314, it was introduced in version v4.3 by commit fc4099f17240767554ff3a73977acb78ef615404. For more details please see the references link.
null
2022-03-07T01:39:11.054656Z
2022-02-27T03:06:46.807976Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fc4099f17240767554ff3a73977acb78ef615404'}
Linux
GSD-2021-1002000
NFC: digital: fix possible memory leak in digital_in_send_sdd_req()
NFC: digital: fix possible memory leak in digital_in_send_sdd_req() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.155 by commit 2bde4aca56db9fe25405d39ddb062531493a65db, it was introduced in version v3.13 by commit 2c66daecc4092e6049673c281b2e6f0d5e59a94c. For more details please see the references link.
null
2021-12-19T22:10:47.702972Z
2021-11-14T15:15:17.163219Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c66daecc4092e6049673c281b2e6f0d5e59a94c'}
Linux
GSD-2022-1001550
mt76: mt7915: fix possible memory leak in mt7915_mcu_add_sta
mt76: mt7915: fix possible memory leak in mt7915_mcu_add_sta This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit daf02c7e3c3dc82ffa925999597bd455cf799551, it was introduced in version v5.16 by commit 89bbd3730f382f15cfcc2c9264c65b5901ce02fa. For more details please see the references link.
null
2022-04-25T06:31:36.018509Z
2022-04-24T21:22:34.281308Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/89bbd3730f382f15cfcc2c9264c65b5901ce02fa'}
Linux
GSD-2021-1002450
rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer()
rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.164 by commit 3e70e3a72d80b16094faccbe438cd53761c3503a, it was introduced in version v5.4 by commit 9ebeddef58c41bd700419cdcece24cf64ce32276. For more details please see the references link.
null
2021-12-20T00:32:07.265678Z
2021-12-19T19:37:54.132483Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9ebeddef58c41bd700419cdcece24cf64ce32276'}
Linux
GSD-2022-1001100
ACPI: CPPC: Avoid out of bounds access when parsing _CPC data
ACPI: CPPC: Avoid out of bounds access when parsing _CPC data This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit d7339f2a3938fb56b5f28d53f5345900b5fa0e74, it was introduced in version v4.4 by commit 337aadff8e4567e39669e07d9a88b789d78458b5. For more details please see the references link.
null
2022-04-25T03:55:49.935650Z
2022-04-24T20:45:21.795619Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/337aadff8e4567e39669e07d9a88b789d78458b5'}
Linux
GSD-2021-1000197
f2fs: compress: fix race condition of overwrite vs truncate
f2fs: compress: fix race condition of overwrite vs truncate This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit 936158b15e2648253afb824d252c910c496d34b5, it was introduced in version v5.6 by commit 4c8ff7095bef64fc47e996a938f7d57f9e077da3. For more details please see the references link.
null
2021-12-19T22:26:51.226381Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4c8ff7095bef64fc47e996a938f7d57f9e077da3'}