ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2022-1000341
veth: fix races around rq->rx_notify_masked
veth: fix races around rq->rx_notify_masked This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.180 by commit c99e66350ca01d2e7836d80f6f451c0e648bcbe0, it was introduced in version v4.19 by commit 948d4f214fde43743c57aae0c708bff44f6345f2. For more details please see the references link.
null
2022-03-07T01:33:55.580435Z
2022-02-27T02:53:28.875168Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/948d4f214fde43743c57aae0c708bff44f6345f2'}
Linux
GSD-2022-1001803
net/sched: act_ct: fix ref leak when switching zones
net/sched: act_ct: fix ref leak when switching zones This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit bcbf4e5c3b5b373cd61528392dd1ec8e9c0fd33d, it was introduced in version v5.15.26 by commit a95ea90deb3071c1ded77a05e91cfebc5238d908. For more details please see the references link.
null
2022-04-25T03:59:27.791017Z
2022-04-24T21:43:12.400516Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a95ea90deb3071c1ded77a05e91cfebc5238d908'}
Linux
GSD-2022-1000711
iommu/vt-d: Fix double list_add when enabling VMD in scalable mode
iommu/vt-d: Fix double list_add when enabling VMD in scalable mode This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.13 by commit d5ad4214d9c6c6e465c192789020a091282dfee7, it was introduced in version v5.14 by commit 474dd1c6506411752a9b2f2233eec11f1733a099. For more details please see the references link.
null
2022-03-18T02:49:31.144404Z
2022-03-18T00:11:39.224153Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/474dd1c6506411752a9b2f2233eec11f1733a099'}
Linux
GSD-2021-1000894
kvm: avoid speculation-based attacks from out-of-range memslot accesses
kvm: avoid speculation-based attacks from out-of-range memslot accesses This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.126 by commit bff1fbf0cf0712686f1df59a83fba6e31d2746a0. For more details please see the references link.
null
2021-12-20T01:17:57.053257Z
2021-06-30T00:04:59.056926Z
null
null
null
null
null
Linux
GSD-2021-1001786
efi: Change down_interruptible() in virt_efi_reset_system() to down_trylock()
efi: Change down_interruptible() in virt_efi_reset_system() to down_trylock() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.288 by commit 1882965c67475bbc4448b1d03051e3f9f6746042. For more details please see the references link.
null
2021-12-20T00:46:49.274918Z
2021-10-28T13:48:48.062076Z
null
null
null
null
null
Linux
GSD-2022-1000204
PCI: pciehp: Fix infinite loop in IRQ handler upon power fault
PCI: pciehp: Fix infinite loop in IRQ handler upon power fault This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.97 by commit 3b4c966fb156ff3e70b2526d964952ff7c1574d9, it was introduced in version v5.7 by commit 8edf5332c39340b9583cf9cba659eb7ec71f75b5. For more details please see the references link.
null
2022-02-19T08:11:12.809743Z
2022-02-18T21:55:14.015235Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8edf5332c39340b9583cf9cba659eb7ec71f75b5'}
Linux
GSD-2022-1002239
bpf, sockmap: Fix double uncharge the mem of sk_msg
bpf, sockmap: Fix double uncharge the mem of sk_msg This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 94c6ac22abcdede72bfaa0f4c22fb370891f4002, it was introduced in version v4.20 by commit 604326b41a6fb9b4a78b6179335decee0365cd8c. For more details please see the references link.
null
2022-04-25T03:36:44.631174Z
2022-04-24T22:24:48.777517Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/604326b41a6fb9b4a78b6179335decee0365cd8c'}
Linux
GSD-2021-1001293
RDMA/cma: Fix rdma_resolve_route() memory leak
RDMA/cma: Fix rdma_resolve_route() memory leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.51 by commit 3d08b5917984f737f32d5bee9737b9075c3895c6. For more details please see the references link.
null
2021-12-20T00:45:56.512569Z
2021-08-03T01:59:16.746045Z
null
null
null
null
null
Linux
GSD-2021-1002846
pinctrl: mediatek: fix global-out-of-bounds issue
pinctrl: mediatek: fix global-out-of-bounds issue This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.12 by commit fb563baa3eb8e7a15f2cff3c2695e2cca0493e69. For more details please see the references link.
null
2022-01-11T08:26:32.536622Z
2021-12-30T02:46:02.571169Z
null
null
null
null
null
Linux
GSD-2021-1001769
net: mdiobus: Fix memory leak in __mdiobus_register
net: mdiobus: Fix memory leak in __mdiobus_register This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.290 by commit fd2400dd4f1b8bd7a309b1b424d9e0d188151b01. For more details please see the references link.
null
2021-12-19T23:38:03.516987Z
2021-10-28T13:47:59.985888Z
null
null
null
null
null
Linux
GSD-2022-1001946
ALSA: pcm: Test for "silence" field in struct "pcm_format_data"
ALSA: pcm: Test for "silence" field in struct "pcm_format_data" This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.112 by commit 912797e54c99a98f0722f21313e13a3938bb6dba. For more details please see the references link.
null
2022-04-25T06:28:37.033541Z
2022-04-24T21:57:03.183510Z
null
null
null
null
null
Linux
GSD-2022-1000654
ALSA: hda: Fix UAF of leds class devs at unbinding
ALSA: hda: Fix UAF of leds class devs at unbinding This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.8 by commit 813e9f3e06d22e29872d4fd51b54992d89cf66c8. For more details please see the references link.
null
2022-03-07T01:40:11.433006Z
2022-02-27T03:36:37.819041Z
null
null
null
null
null
Linux
GSD-2021-1001339
misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge
misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.134 by commit d2639ffdcad463b358b6bef8645ff81715daffcb. For more details please see the references link.
null
2021-12-20T00:53:26.008474Z
2021-08-03T02:12:37.111485Z
null
null
null
null
null
Linux
GSD-2022-1002393
veth: Ensure eth header is in skb's linear part
veth: Ensure eth header is in skb's linear part This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit d417a859221f127e8edf09c14b76ab50f825e171, it was introduced in version v2.6.24 by commit e314dbdc1c0dc6a548ecf0afce28ecfd538ff568. For more details please see the references link.
null
2022-04-25T05:35:40.914153Z
2022-04-24T22:42:38.260150Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e314dbdc1c0dc6a548ecf0afce28ecfd538ff568'}
Linux
GSD-2022-1001415
drm/amd/display: Fix memory leak
drm/amd/display: Fix memory leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 3ce1497add6d17b48cc9df65095bd20202d93994. For more details please see the references link.
null
2022-04-25T04:51:07.644086Z
2022-04-24T21:11:12.407463Z
null
null
null
null
null
Linux
GSD-2021-1000482
liquidio: Fix unintented sign extension of a left shift of a u16
liquidio: Fix unintented sign extension of a left shift of a u16 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.269 by commit 7c8e283fff5059a2b4ed2ef22292bfde10c975c0, it was introduced in version v4.9 by commit 5bc67f587ba7eaa8dd3976bfeff8f2b60718c871. For more details please see the references link.
null
2021-12-19T23:04:15.004727Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5bc67f587ba7eaa8dd3976bfeff8f2b60718c871'}
Linux
GSD-2021-1002145
isofs: Fix out of bound access for corrupted isofs image
isofs: Fix out of bound access for corrupted isofs image This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.18 by commit b2fa1f52d22c5455217b294629346ad23a744945. For more details please see the references link.
null
2021-12-19T23:07:07.505Z
2021-11-14T15:21:53.736023Z
null
null
null
null
null
Linux
GSD-2021-1000178
cifs: Return correct error code from smb2_get_enc_key
cifs: Return correct error code from smb2_get_enc_key This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.118 by commit 93f3339b22ba17e66f0808737467b70ba087eaec, it was introduced in version v4.11 by commit 61cfac6f267dabcf2740a7ec8a0295833b28b5f5. For more details please see the references link.
null
2021-12-20T00:57:24.537251Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61cfac6f267dabcf2740a7ec8a0295833b28b5f5'}
Linux
GSD-2022-1001045
scsi: libfc: Fix use after free in fc_exch_abts_resp()
scsi: libfc: Fix use after free in fc_exch_abts_resp() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 412dd8299b02e4410fe77b8396953c1a8dde183a. For more details please see the references link.
null
2022-04-25T05:50:30.537641Z
2022-04-24T20:42:01.101946Z
null
null
null
null
null
Linux
GSD-2021-1002515
ASoC: codecs: wcd934x: handle channel mappping list correctly
ASoC: codecs: wcd934x: handle channel mappping list correctly This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.85 by commit 1089dac26c6b4b833323ae6c0ceab29fb30ede72, it was introduced in version v5.6 by commit a70d9245759a48e57bb1dc9f63213dcf3017db32. For more details please see the references link.
null
2021-12-19T22:45:09.582614Z
2021-12-19T19:40:44.504511Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a70d9245759a48e57bb1dc9f63213dcf3017db32'}
Linux
GSD-2021-1000528
net: zero-initialize tc skb extension on allocation
net: zero-initialize tc skb extension on allocation This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit 86ab133b695ed7ba1f8786b12f4ca43137ad8c18, it was introduced in version v5.9 by commit 038ebb1a713d114d54dbf14868a73181c0c92758. For more details please see the references link.
null
2021-12-20T00:01:43.768188Z
2021-06-04T19:33:55.383601Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/038ebb1a713d114d54dbf14868a73181c0c92758'}
Linux
GSD-2022-1000087
af_packet: fix data-race in packet_setsockopt / packet_setsockopt
af_packet: fix data-race in packet_setsockopt / packet_setsockopt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.300 by commit bfce19548a2ba1e007c84fe725d70a9c3caf46a1, it was introduced in version v4.3 by commit 47dceb8ecdc1c3ad1818dfea3d659a05b74c3fc2. For more details please see the references link.
null
2022-02-19T04:33:36.274999Z
2022-02-18T21:33:44.984424Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/47dceb8ecdc1c3ad1818dfea3d659a05b74c3fc2'}
Linux
GSD-2021-1001010
net/nfc/rawsock.c: fix a permission check bug
net/nfc/rawsock.c: fix a permission check bug This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit 90d0a3c76965d7a10fc87c07be3e9714e2130d5c. For more details please see the references link.
null
2021-12-20T00:39:46.005231Z
2021-06-30T00:33:42.772778Z
null
null
null
null
null
Linux
GSD-2022-1002110
video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe()
video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 64ec3e678d76419f207b9cdd338dda438ca10b1c, it was introduced in version v3.2 by commit 3c8a63e22a0802fd56380f6ab305b419f18eb6f5. For more details please see the references link.
null
2022-04-25T06:29:53.372727Z
2022-04-24T22:12:38.990010Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c8a63e22a0802fd56380f6ab305b419f18eb6f5'}
Linux
GSD-2021-1001440
net: ti: fix UAF in tlan_remove_one
net: ti: fix UAF in tlan_remove_one This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.277 by commit c263ae8c7e4c482387de5e6c89e213f8173fe8b6, it was introduced in version v3.10 by commit 1e0a8b13d35510e711fdf72e9a3e30bcb2bd49fa. For more details please see the references link.
null
2021-12-19T22:34:47.200621Z
2021-08-03T02:41:50.285614Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e0a8b13d35510e711fdf72e9a3e30bcb2bd49fa'}
Linux
GSD-2022-1001696
scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one()
scsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit aefd755a96051aa56b198cb7ecd168b22ba384f6, it was introduced in version v2.6.23 by commit 45804fbb00eea27bdf4d62751681228a9e2844e9. For more details please see the references link.
null
2022-04-25T05:44:33.124338Z
2022-04-24T21:36:07.977311Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/45804fbb00eea27bdf4d62751681228a9e2844e9'}
Linux
GSD-2022-1000984
ice: arfs: fix use-after-free when freeing @rx_cpu_rmap
ice: arfs: fix use-after-free when freeing @rx_cpu_rmap This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.4 by commit d08d2fb6d99d82da1c63aba5c0d1c6f237e150f3, it was introduced in version v5.8 by commit 28bf26724fdb0e02267d19e280d6717ee810a10d. For more details please see the references link.
null
2022-04-25T05:16:40.339396Z
2022-04-24T20:37:11.091256Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/28bf26724fdb0e02267d19e280d6717ee810a10d'}
Linux
GSD-2021-1000601
NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()
NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit 7087db95c0a06ab201b8ebfac6a7ec1e34257997, it was introduced in version v4.0 by commit a7d42ddb3099727f58366fa006f850a219cce6c8. For more details please see the references link.
null
2021-12-20T01:37:33.444301Z
2021-06-04T19:45:29.306930Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a7d42ddb3099727f58366fa006f850a219cce6c8'}
Linux
GSD-2021-1001913
btrfs: fix abort logic in btrfs_replace_file_extents
btrfs: fix abort logic in btrfs_replace_file_extents This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit 0e309e1152fc34ef75991d9d69b165dbf75bf26c. For more details please see the references link.
null
2021-12-20T00:13:03.059112Z
2021-10-28T13:55:25.807671Z
null
null
null
null
null
Linux
GSD-2021-1002796
ipmi: fix initialization when workqueue allocation fails
ipmi: fix initialization when workqueue allocation fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.169 by commit 8467c8cb94a406cc0c54d9306b61d0db86c94048, it was introduced in version v5.4.164 by commit 648813c26d64e005fba943cf3ed19dff19db1cc4. For more details please see the references link.
null
2022-01-11T05:52:33.445419Z
2021-12-30T02:43:46.486907Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/648813c26d64e005fba943cf3ed19dff19db1cc4'}
Linux
GSD-2021-1000251
mt76: mt7915: fix txrate reporting
mt76: mt7915: fix txrate reporting This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 4bd926e5ca88eac4d95eacb806b229f8729bc62e, it was introduced in version v5.8 by commit e57b7901469fc0b021930b83a8094baaf3d81b09. For more details please see the references link.
null
2021-12-20T00:41:19.997954Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e57b7901469fc0b021930b83a8094baaf3d81b09'}
Linux
GSD-2021-1000744
btrfs: fixup error handling in fixup_inode_link_counts
btrfs: fixup error handling in fixup_inode_link_counts This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.194 by commit c5cfa81562174e585ecc40bf8766835abd058572, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T00:00:37.642964Z
2021-06-25T00:01:57.970082Z
null
null
null
null
null
Linux
GSD-2021-1002779
phonet/pep: refuse to enable an unbound pipe
phonet/pep: refuse to enable an unbound pipe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.295 by commit b10c7d745615a092a50c2e03ce70446d2bec2aca. For more details please see the references link.
null
2022-01-11T06:48:37.864866Z
2021-12-30T02:43:05.612936Z
null
null
null
null
null
Linux
GSD-2021-1001856
NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()
NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.75 by commit 3f2960b39f22e26cf8addae93c3f5884d1c183c9, it was introduced in version v3.13 by commit 1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8. For more details please see the references link.
null
2021-12-20T01:31:50.914801Z
2021-10-28T13:52:25.991525Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8'}
Linux
GSD-2021-1002283
net: dpaa2-eth: fix use-after-free in dpaa2_eth_remove
net: dpaa2-eth: fix use-after-free in dpaa2_eth_remove This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.82 by commit 1c4099dc0d6a01e76e4f7dd98e4b3e0d55d80ad9, it was introduced in version v4.17 by commit 7472dd9f649958be6a8880ed439233c8414a7b34. For more details please see the references link.
null
2021-12-19T23:03:19.765895Z
2021-11-29T02:36:57.666096Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7472dd9f649958be6a8880ed439233c8414a7b34'}
Linux
GSD-2022-1001229
drm/amd/display: Add affected crtcs to atomic state for dsc mst unplug
drm/amd/display: Add affected crtcs to atomic state for dsc mst unplug This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit e96a17a3c909f788fb1064bc9d9542c8b2d09093, it was introduced in version v5.6 by commit 44be939ff7ac5858f0dbd8a2a4af1fe198e14db1. For more details please see the references link.
null
2022-04-25T04:47:14.909147Z
2022-04-24T20:56:00.487051Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/44be939ff7ac5858f0dbd8a2a4af1fe198e14db1'}
Linux
GSD-2022-1001383
ceph: fix inode reference leakage in ceph_get_snapdir()
ceph: fix inode reference leakage in ceph_get_snapdir() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 9cd21981dedfb4fe9f344529e4be35727cb10940. For more details please see the references link.
null
2022-04-25T04:27:55.224095Z
2022-04-24T21:09:27.044672Z
null
null
null
null
null
Linux
GSD-2021-1000314
nbd: Fix NULL pointer in flush_workqueue
nbd: Fix NULL pointer in flush_workqueue This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.38 by commit cde4b55cfb24522dcbba80bbdb0c082303e76c43, it was introduced in version v5.4 by commit e9e006f5fcf2bab59149cb38a48a4817c1b538b4. For more details please see the references link.
null
2021-12-20T00:02:02.375884Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e9e006f5fcf2bab59149cb38a48a4817c1b538b4'}
Linux
GSD-2021-1002329
sched/fair: Prevent dead task groups from regaining cfs_rq's
sched/fair: Prevent dead task groups from regaining cfs_rq's This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit 512e21c150c1c3ee298852660f3a796e267e62ec, it was introduced in version v5.13 by commit a7b359fc6a37faaf472125867c8dc5a068c90982. For more details please see the references link.
null
2021-12-20T01:19:08.069289Z
2021-11-29T02:38:58.483084Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a7b359fc6a37faaf472125867c8dc5a068c90982'}
Linux
GSD-2022-1001679
highmem: fix checks in __kmap_local_sched_{in,out}
highmem: fix checks in __kmap_local_sched_{in,out} This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit c21d040de6225414547d9bd31cd200f290991c85, it was introduced in version v5.11 by commit 5fbda3ecd14a5343644979c98d6eb65b7e7de9d8. For more details please see the references link.
null
2022-04-25T06:46:33.603082Z
2022-04-24T21:34:25.120303Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5fbda3ecd14a5343644979c98d6eb65b7e7de9d8'}
Linux
GSD-2021-1001155
igc: Fix use-after-free error during reset
igc: Fix use-after-free error during reset This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.6 by commit ea5e36b7367ea0a36ef73a163768f16d2977bd83, it was introduced in version v4.20 by commit 13b5b7fd6a4a96dffe604f25e7b64cfbd9520924. For more details please see the references link.
null
2021-12-20T01:19:10.253799Z
2021-08-03T01:31:08.537069Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/13b5b7fd6a4a96dffe604f25e7b64cfbd9520924'}
Linux
GSD-2022-1002405
scsi: libfc: Fix use after free in fc_exch_abts_resp()
scsi: libfc: Fix use after free in fc_exch_abts_resp() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 499d198494e77b6533251b9b909baf5c101129cb. For more details please see the references link.
null
2022-04-25T06:35:34.840605Z
2022-04-24T22:43:53.972927Z
null
null
null
null
null
Linux
GSD-2022-1000438
eeprom: ee1004: limit i2c reads to I2C_SMBUS_BLOCK_MAX
eeprom: ee1004: limit i2c reads to I2C_SMBUS_BLOCK_MAX This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit 9a5f471ae380f9fcb9756d453c12ca1f8595a93c, it was introduced in version v5.15.17 by commit be9313f755a7bfa02230b15731d07074d5255ecb. For more details please see the references link.
null
2022-03-07T01:49:46.987693Z
2022-02-27T03:07:20.473106Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/be9313f755a7bfa02230b15731d07074d5255ecb'}
Linux
GSD-2022-1000592
gve: fix the wrong AdminQ buffer queue index check
gve: fix the wrong AdminQ buffer queue index check This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.22 by commit 62ab929a8f6bc7717fc26361c967d92924f4e297, it was introduced in version v5.10 by commit 5cdad90de62c27c6af53edb1b4b91712622b892b. For more details please see the references link.
null
2022-03-07T01:43:02.220768Z
2022-02-27T03:28:21.220046Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5cdad90de62c27c6af53edb1b4b91712622b892b'}
Linux
GSD-2021-1001505
net_sched: fix NULL deref in fifo_set_limit()
net_sched: fix NULL deref in fifo_set_limit() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.287 by commit 08d7056e8e250fd2e67dbea5be5fdecdd75bf6b4, it was introduced in version v2.6.27 by commit fb0305ce1b03f6ff17f84f2c63daccecb45f2805. For more details please see the references link.
null
2021-12-20T00:34:19.947392Z
2021-10-19T16:21:16.606561Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb0305ce1b03f6ff17f84f2c63daccecb45f2805'}
Linux
GSD-2022-1002055
block, bfq: don't move oom_bfqq
block, bfq: don't move oom_bfqq This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 7507ead1e9d42957c2340f2c4a0e9d00034e3366. For more details please see the references link.
null
2022-04-25T05:27:01.788636Z
2022-04-24T22:06:08.417347Z
null
null
null
null
null
Linux
GSD-2022-1001854
dax: make sure inodes are flushed before destroy cache
dax: make sure inodes are flushed before destroy cache This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit e2951eaa9398415ac054b7bd80b8163b6838ead4, it was introduced in version v4.12 by commit 7b6be8444e0f0dd675b54d059793423d3c9b4c03. For more details please see the references link.
null
2022-04-25T02:57:27.655827Z
2022-04-24T21:48:34.038765Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7b6be8444e0f0dd675b54d059793423d3c9b4c03'}
Linux
GSD-2022-1000746
CDC-NCM: avoid overflow in sanity checking
CDC-NCM: avoid overflow in sanity checking This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.12 by commit 7b737e47b87589031f0d4657f6d7b0b770474925. For more details please see the references link.
null
2022-03-18T02:52:37.131253Z
2022-03-18T00:15:01.597545Z
null
null
null
null
null
Linux
GSD-2022-1002281
f2fs: quota: fix loop condition at f2fs_quota_sync()
f2fs: quota: fix loop condition at f2fs_quota_sync() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit f1d5946d47c0827bae39e1537959ce8d6f0224c5, it was introduced in version v5.4.148 by commit a02982545e61020c23f411b073ba5171381138e4. For more details please see the references link.
null
2022-04-25T03:10:16.420966Z
2022-04-24T22:29:58.871350Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a02982545e61020c23f411b073ba5171381138e4'}
Linux
GSD-2022-1000316
ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path
ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.230 by commit 12b6703e9546902c56b4b9048b893ad49d62bdd4, it was introduced in version v4.0 by commit f243e5a7859a24d10975afb9a1708cac624ba6f1. For more details please see the references link.
null
2022-03-07T01:43:03.590144Z
2022-02-27T02:49:58.153377Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f243e5a7859a24d10975afb9a1708cac624ba6f1'}
Linux
GSD-2021-1001381
dma-buf/sync_file: Don't leak fences on merge failure
dma-buf/sync_file: Don't leak fences on merge failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.199 by commit e0355a0ad31a1d677b2a4514206de4902bd550e8, it was introduced in version v4.9 by commit a02b9dc90d844cc7df7b63264e7920cc425052d9. For more details please see the references link.
null
2021-12-19T21:44:37.890834Z
2021-08-03T02:24:50.672184Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a02b9dc90d844cc7df7b63264e7920cc425052d9'}
Linux
GSD-2021-1000969
HID: usbhid: fix info leak in hid_submit_ctrl
HID: usbhid: fix info leak in hid_submit_ctrl This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.45 by commit b1e3596416d74ce95cc0b7b38472329a3818f8a9. For more details please see the references link.
null
2021-12-20T00:33:33.765180Z
2021-06-30T00:29:57.603507Z
null
null
null
null
null
Linux
GSD-2022-1001157
Revert "Revert "block, bfq: honor already-setup queue merges""
Revert "Revert "block, bfq: honor already-setup queue merges"" This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 4083925bd6dc89216d156474a8076feec904e607. For more details please see the references link.
null
2022-04-25T04:14:01.176104Z
2022-04-24T20:49:23.829502Z
null
null
null
null
null
Linux
GSD-2021-1002407
ALSA: pcm: oss: Limit the period size to 16MB
ALSA: pcm: oss: Limit the period size to 16MB This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.258 by commit be55f306396cd62c6889286a7194fd8b53363aeb. For more details please see the references link.
null
2021-12-20T01:16:10.537028Z
2021-12-19T19:35:56.957360Z
null
null
null
null
null
Linux
GSD-2022-1001507
tipc: fix the timer expires after interval 100ms
tipc: fix the timer expires after interval 100ms This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit b58fa5cf636f66cd3d955b351f15c0e5d9445250, it was introduced in version v4.20 by commit 6787927475e52f6933e3affce365dabb2aa2fadf. For more details please see the references link.
null
2022-04-25T03:45:39.419666Z
2022-04-24T21:18:26.073820Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6787927475e52f6933e3affce365dabb2aa2fadf'}
Linux
GSD-2021-1000590
btrfs: return whole extents in fiemap
btrfs: return whole extents in fiemap This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit c7e0c6047c4f2a9664e48e3671af80c513220a44, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T23:38:31.969193Z
2021-06-04T19:43:29.550064Z
null
null
null
null
null
Linux
GSD-2021-1002057
net/tls: Fix flipped sign in tls_err_abort() calls
net/tls: Fix flipped sign in tls_err_abort() calls This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.77 by commit f3dec7e7ace38224f82cf83f0049159d067c2e19, it was introduced in version v4.17 by commit c46234ebb4d1eee5e09819f49169e51cfc6eb909. For more details please see the references link.
null
2021-12-19T23:42:40.567103Z
2021-11-14T15:17:52.264814Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c46234ebb4d1eee5e09819f49169e51cfc6eb909'}
Linux
GSD-2021-1002542
net/sched: sch_ets: don't peek at classes beyond 'nbands'
net/sched: sch_ets: don't peek at classes beyond 'nbands' This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.6 by commit e25bdbc7e951ae5728fee1f4c09485df113d013c, it was introduced in version v5.6 by commit dcc68b4d8084e1ac9af0d4022d6b1aff6a139a33. For more details please see the references link.
null
2021-12-20T01:28:28.358633Z
2021-12-19T19:41:56.712585Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/dcc68b4d8084e1ac9af0d4022d6b1aff6a139a33'}
Linux
GSD-2022-1001012
drbd: Fix five use after free bugs in get_initial_state
drbd: Fix five use after free bugs in get_initial_state This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 226e993c39405292781bfcf4b039a8db56aab362, it was introduced in version v4.5 by commit a29728463b254ce81ecefdf20c1a02e01d9361da. For more details please see the references link.
null
2022-04-25T06:42:44.307055Z
2022-04-24T20:39:38.189981Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a29728463b254ce81ecefdf20c1a02e01d9361da'}
Linux
GSD-2021-1000085
bus: mhi: core: Fix invalid error returning in mhi_queue
bus: mhi: core: Fix invalid error returning in mhi_queue This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.3 by commit a99b661c3187365f81026d89b1133a76cd2652b3, it was introduced in version v5.12 by commit a8f75cb348fd52e7a5cf25991cdf9c89fb0cfd41. For more details please see the references link.
null
2021-12-20T01:31:19.310152Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a8f75cb348fd52e7a5cf25991cdf9c89fb0cfd41'}
Linux
GSD-2021-1002112
mm, slub: fix potential use-after-free in slab_debugfs_fops
mm, slub: fix potential use-after-free in slab_debugfs_fops This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit 159d8cfbd0428d487c53be4722f33cdab0d25d83, it was introduced in version v5.14 by commit 64dd68497be76ab4e237cca06f5324e220d0f050. For more details please see the references link.
null
2021-12-20T01:22:37.436151Z
2021-11-14T15:20:23.875767Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/64dd68497be76ab4e237cca06f5324e220d0f050'}
Linux
GSD-2022-1001442
ubifs: Fix deadlock in concurrent rename whiteout and inode writeback
ubifs: Fix deadlock in concurrent rename whiteout and inode writeback This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 70e9090acc32348cedc5def0cd6d5c126efc97b9, it was introduced in version v4.9 by commit 9e0a1fff8db56eaaebb74b4a3ef65f86811c4798. For more details please see the references link.
null
2022-04-25T05:26:49.604515Z
2022-04-24T21:13:47.674639Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9e0a1fff8db56eaaebb74b4a3ef65f86811c4798'}
Linux
GSD-2022-1001911
dm: fix use-after-free in dm_cleanup_zoned_dev()
dm: fix use-after-free in dm_cleanup_zoned_dev() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 0987f00a76a17aa7213da492c00ed9e5a6210c73, it was introduced in version v5.14 by commit bb37d77239af25cde59693dbe3fac04dd17d7b29. For more details please see the references link.
null
2022-04-25T06:57:05.624044Z
2022-04-24T21:53:59.442555Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bb37d77239af25cde59693dbe3fac04dd17d7b29'}
Linux
GSD-2022-1000603
bpf: Guard against accessing NULL pt_regs in bpf_get_task_stack()
bpf: Guard against accessing NULL pt_regs in bpf_get_task_stack() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit b82ef4985a6d05e80f604624332430351df7b79a, it was introduced in version v5.9 by commit fa28dcb82a38f8e3993b0fae9106b1a80b59e4f0. For more details please see the references link.
null
2022-03-07T01:34:13.350030Z
2022-02-27T03:29:35.388673Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fa28dcb82a38f8e3993b0fae9106b1a80b59e4f0'}
Linux
GSD-2021-1000986
bpf: Fix leakage under speculation on mispredicted branches
bpf: Fix leakage under speculation on mispredicted branches This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit 5fc6ed1831ca5a30fb0ceefd5e33c7c689e7627b, it was introduced in version v4.15 by commit b2157399cc9898260d6031c5bfe45fe137c1fbe7. For more details please see the references link.
null
2021-12-19T23:48:06.355792Z
2021-06-30T00:31:29.766256Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b2157399cc9898260d6031c5bfe45fe137c1fbe7'}
Linux
GSD-2021-1001694
libbpf: Fix memory leak in strset
libbpf: Fix memory leak in strset This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.12 by commit 9e8e7504e09831c469b67d6dc11d9a72654bdb8c, it was introduced in version v5.13 by commit 90d76d3ececc74bf43b2a97f178dadfa1e52be54. For more details please see the references link.
null
2021-12-19T22:02:57.228343Z
2021-10-19T16:32:13.407081Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/90d76d3ececc74bf43b2a97f178dadfa1e52be54'}
Linux
GSD-2021-1002811
tee: optee: Fix incorrect page free bug
tee: optee: Fix incorrect page free bug This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.89 by commit ad338d825e3f7b96ee542bf313728af2d19fe9ad, it was introduced in version v5.10.58 by commit 1340dc3fb75ea69221f4f5dcb0cbace55ad0331c. For more details please see the references link.
null
2022-01-11T05:56:59.308896Z
2021-12-30T02:44:28.918963Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1340dc3fb75ea69221f4f5dcb0cbace55ad0331c'}
Linux
GSD-2022-1000253
powerpc/32s: Fix kasan_init_region() for KASAN
powerpc/32s: Fix kasan_init_region() for KASAN This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.19 by commit db37befafa536d1eed293fa5765ad781c3152071, it was introduced in version v5.8 by commit 7974c4732642f710b5111165ae1f7f7fed822282. For more details please see the references link.
null
2022-02-19T11:21:59.708482Z
2022-02-18T22:01:40.087424Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7974c4732642f710b5111165ae1f7f7fed822282'}
Linux
GSD-2022-1001291
media: venus: vdec: fixed possible memory leak issue
media: venus: vdec: fixed possible memory leak issue This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 5f89d05ba93df9c2cdfe493843f93288e55e99eb, it was introduced in version v5.16 by commit 40d87aafee29fb01ce1e1868502fb2059a6a7f34. For more details please see the references link.
null
2022-04-25T03:36:45.555826Z
2022-04-24T21:01:45.020438Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/40d87aafee29fb01ce1e1868502fb2059a6a7f34'}
Linux
GSD-2021-1000206
sched: Fix out-of-bound access in uclamp
sched: Fix out-of-bound access in uclamp This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit 42ee47c7e3569d9a0e2cb5053c496d97d380472f, it was introduced in version v5.3 by commit 69842cba9ace84849bb9b8edcdf2cefccd97901c. For more details please see the references link.
null
2021-12-19T22:36:55.596400Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69842cba9ace84849bb9b8edcdf2cefccd97901c'}
Linux
GSD-2022-1000879
cifs: fix double free race when mount fails in cifs_get_root()
cifs: fix double free race when mount fails in cifs_get_root() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.183 by commit e208668ef7ba23efcbf76a8200cab8deee501c4d. For more details please see the references link.
null
2022-03-18T02:44:37.361258Z
2022-03-18T00:27:08.282936Z
null
null
null
null
null
Linux
GSD-2021-1000656
drm/meson: fix shutdown crash when component not probed
drm/meson: fix shutdown crash when component not probed This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.193 by commit e256a0eb43e17209e347409a80805b1659398d68, it was introduced in version v4.19.181 by commit 8fbbf2b3849419e31731902d7478b0c934732632. For more details please see the references link.
null
2021-12-20T00:30:30.543252Z
2021-06-04T19:56:04.022812Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8fbbf2b3849419e31731902d7478b0c934732632'}
Linux
GSD-2021-1001944
regmap: Fix possible double-free in regcache_rbtree_exit()
regmap: Fix possible double-free in regcache_rbtree_exit() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.289 by commit fc081477b47dfc3a6cb50a96087fc29674013fc2, it was introduced in version v3.12 by commit 3f4ff561bc88b074d5e868dde4012d89cbb06c87. For more details please see the references link.
null
2021-12-20T00:24:43.403604Z
2021-11-14T15:12:51.224022Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f4ff561bc88b074d5e868dde4012d89cbb06c87'}
Linux
GSD-2021-1002391
sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl
sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.257 by commit 325ea49fc43cbc03a5e1e37de8f0ca6357ced4b1, it was introduced in version v2.6.24 by commit faf0b2e5afe7dae072d2715763c7f992b612b628. For more details please see the references link.
null
2021-12-20T01:24:07.704879Z
2021-12-19T19:35:18.016037Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/faf0b2e5afe7dae072d2715763c7f992b612b628'}
Linux
GSD-2022-1000480
staging: vc04_services: Fix RCU dereference check
staging: vc04_services: Fix RCU dereference check This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit 993db6da4aec1a58b35e604d3fa779b1d07ec467. For more details please see the references link.
null
2022-03-07T02:20:44.754360Z
2022-02-27T03:12:48.749997Z
null
null
null
null
null
Linux
GSD-2021-1001417
memory: fsl_ifc: fix leak of private memory on probe failure
memory: fsl_ifc: fix leak of private memory on probe failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.240 by commit 7626ffbea708e5aba6912295c012d2b409a1769f, it was introduced in version v3.3 by commit a20cbdeffce247a2b6fb83cd8d22433994068565. For more details please see the references link.
null
2021-12-20T00:03:42.387770Z
2021-08-03T02:34:43.341514Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a20cbdeffce247a2b6fb83cd8d22433994068565'}
Linux
GSD-2022-1002147
locking/lockdep: Avoid potential access of invalid memory in lock_class
locking/lockdep: Avoid potential access of invalid memory in lock_class This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 68c80088f52bfae7fc16ce0ed25ce969ddfb2ded, it was introduced in version v5.1 by commit 8b39adbee805c539a461dbf208b125b096152b1c. For more details please see the references link.
null
2022-04-25T05:45:34.555246Z
2022-04-24T22:16:07.859075Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8b39adbee805c539a461dbf208b125b096152b1c'}
Linux
GSD-2021-1001047
mm/memory-failure: make sure wait for page writeback in memory_failure
mm/memory-failure: make sure wait for page writeback in memory_failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit 28788dc5c70597395b6b451dae4549bbaa8e2c56, it was introduced in version v3.16 by commit 0bc1f8b0682caa39f45ce1e0228ebf43acb46111. For more details please see the references link.
null
2021-12-19T23:00:00.180844Z
2021-06-30T00:36:10.018727Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0bc1f8b0682caa39f45ce1e0228ebf43acb46111'}
Linux
GSD-2022-1002517
netfilter: nf_tables: initialize registers in nft_do_chain()
netfilter: nf_tables: initialize registers in nft_do_chain() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.309 by commit 4d28522acd1c4415c85f6b33463713a268f68965, it was introduced in version v3.13 by commit 96518518cc417bb0a8c80b9fb736202e28acdf96. For more details please see the references link.
null
2022-04-25T05:40:59.566605Z
2022-04-24T22:57:27.877643Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/96518518cc417bb0a8c80b9fb736202e28acdf96'}
Linux
GSD-2022-1002002
Bluetooth: use memset avoid memory leaks
Bluetooth: use memset avoid memory leaks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit 9567d54e70ff58c2695c2cc2e53c86c67551d3e6. For more details please see the references link.
null
2022-04-25T06:42:41.331314Z
2022-04-24T22:02:22.688526Z
null
null
null
null
null
Linux
GSD-2021-1001552
phy: mdio: fix memory leak
phy: mdio: fix memory leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.211 by commit 2397b9e118721292429fea8807a698e71b94795f, it was introduced in version v2.6.28 by commit 46abc02175b3c246dd5141d878f565a8725060c9. For more details please see the references link.
null
2021-12-20T01:12:39.535184Z
2021-10-19T16:23:25.834672Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/46abc02175b3c246dd5141d878f565a8725060c9'}
Linux
GSD-2022-1002452
jffs2: fix memory leak in jffs2_do_mount_fs
jffs2: fix memory leak in jffs2_do_mount_fs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 9a0f6610c7daedd2eace430beeb08a8b7ac80699, it was introduced in version v2.6.15 by commit e631ddba588783edd521c5a89f7b2902772fb691. For more details please see the references link.
null
2022-04-25T07:02:16.859295Z
2022-04-24T22:49:35.616727Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e631ddba588783edd521c5a89f7b2902772fb691'}
Linux
GSD-2022-1000195
scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put()
scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.96 by commit 00849de10f798a9538242824a51b1756e7110754, it was introduced in version v3.2 by commit 0cbf32e1681d870632a1772601cbaadd996dc978. For more details please see the references link.
null
2022-02-19T10:23:02.587147Z
2022-02-18T21:53:24.649075Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0cbf32e1681d870632a1772601cbaadd996dc978'}
Linux
GSD-2021-1001102
i2c: robotfuzz-osif: fix control-request directions
i2c: robotfuzz-osif: fix control-request directions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.274 by commit f6b3e679c7e753b7dfad6de043799ebc5705ed1d, it was introduced in version v3.14 by commit 83e53a8f120f2f273cf0ad717f5372ab79ac24fe. For more details please see the references link.
null
2021-12-20T00:37:44.439197Z
2021-07-08T01:56:27.796891Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/83e53a8f120f2f273cf0ad717f5372ab79ac24fe'}
Linux
GSD-2021-1002684
xen/blkfront: harden blkfront against event channel storms
xen/blkfront: harden blkfront against event channel storms This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.168 by commit 4ed9f5c511ce95cb8db05ff82026ea901f45fd76. For more details please see the references link.
null
2022-01-11T06:46:38.950389Z
2021-12-27T05:36:43.822938Z
null
null
null
null
null
Linux
GSD-2021-1000343
net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send
net:emac/emac-mac: Fix a use after free in emac_mac_tx_buf_send This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 9dc373f74097edd0e35f3393d6248eda8d1ba99d, it was introduced in version v4.9 by commit b9b17debc69d27cd55e21ee51a5ba7fc50a426cf. For more details please see the references link.
null
2021-12-19T22:50:32.188918Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b9b17debc69d27cd55e21ee51a5ba7fc50a426cf'}
Linux
GSD-2022-1001784
media: ir_toy: free before error exiting
media: ir_toy: free before error exiting This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 2011363c196846c083649c91ed30aeef64358d52. For more details please see the references link.
null
2022-04-25T04:56:18.361025Z
2022-04-24T21:42:12.089005Z
null
null
null
null
null
Linux
GSD-2022-1000896
xen/xenbus: don't let xenbus_grant_ring() remove grants in error case
xen/xenbus: don't let xenbus_grant_ring() remove grants in error case This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.234 by commit 8d521d960aef22781ff499e16899c30af899de8d. For more details please see the references link.
null
2022-03-18T04:16:42.772259Z
2022-03-18T00:29:09.965101Z
null
null
null
null
null
Linux
GSD-2021-1000713
net: caif: fix memory leak in caif_device_notify
net: caif: fix memory leak in caif_device_notify This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.272 by commit b042e2b2039565eb8f0eb51c14fbe1ef463c8cd8, it was introduced in version v3.3 by commit 7c18d2205ea76eef9674e59e1ecae4f332a53e9e. For more details please see the references link.
null
2021-12-19T23:41:53.431041Z
2021-06-24T23:58:41.201060Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7c18d2205ea76eef9674e59e1ecae4f332a53e9e'}
Linux
GSD-2021-1001801
isdn: mISDN: Fix sleeping function called from invalid context
isdn: mISDN: Fix sleeping function called from invalid context This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.214 by commit a5b34409d3fc52114c828be4adbc30744fa3258b. For more details please see the references link.
null
2021-12-20T01:06:43.788714Z
2021-10-28T13:49:39.487244Z
null
null
null
null
null
Linux
GSD-2021-1002041
can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv
can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit 864e77771a24c877aaf53aee019f78619cbcd668, it was introduced in version v5.4 by commit 9d71dd0c70099914fcd063135da3c580865e924c. For more details please see the references link.
null
2021-12-20T00:08:37.134511Z
2021-11-14T15:17:11.987280Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9d71dd0c70099914fcd063135da3c580865e924c'}
Linux
GSD-2021-1000586
drm/amdgpu: Fix a use-after-free
drm/amdgpu: Fix a use-after-free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.42 by commit f98cdf084405333ee2f5be548a91b2d168e49276, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T01:12:11.936926Z
2021-06-04T19:43:07.379567Z
null
null
null
null
null
Linux
GSD-2022-1001511
af_netlink: Fix shift out of bounds in group mask calculation
af_netlink: Fix shift out of bounds in group mask calculation This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit e8aaf3134bc5e943048eefe9f2ddaabf41d92b1a, it was introduced in version v2.6.14 by commit f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198. For more details please see the references link.
null
2022-04-25T04:03:42.044694Z
2022-04-24T21:18:57.849913Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198'}
Linux
GSD-2021-1002411
scsi: mpt3sas: Fix kernel panic during drive powercycle test
scsi: mpt3sas: Fix kernel panic during drive powercycle test This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.219 by commit 0d4b29eaadc1f59cec0c7e85eae77d08fcca9824, it was introduced in version v3.8 by commit f92363d12359498f9a9960511de1a550f0ec41c2. For more details please see the references link.
null
2021-12-19T23:48:55.523869Z
2021-12-19T19:36:06.670783Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f92363d12359498f9a9960511de1a550f0ec41c2'}
Linux
GSD-2022-1001141
media: imx-jpeg: Prevent decoding NV12M jpegs into single-planar buffers
media: imx-jpeg: Prevent decoding NV12M jpegs into single-planar buffers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 4eb591c47c82a6a6ad293ed108c3cb77115fbc25. For more details please see the references link.
null
2022-04-25T05:19:12.810474Z
2022-04-24T20:48:37.330840Z
null
null
null
null
null
Linux
GSD-2021-1001397
atm: nicstar: Fix possible use-after-free in nicstar_cleanup()
atm: nicstar: Fix possible use-after-free in nicstar_cleanup() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.198 by commit a7a7b2848312cc4c3a42b6e42a8ab2e441857aba. For more details please see the references link.
null
2021-12-20T00:55:33.305764Z
2021-08-03T02:28:24.985372Z
null
null
null
null
null
Linux
GSD-2022-1000300
scsi: target: iscsi: Make sure the np under each tpg is unique
scsi: target: iscsi: Make sure the np under each tpg is unique This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.267 by commit aeaf67314e4e57df8aff636979a57b5a828a6451. For more details please see the references link.
null
2022-03-07T01:55:05.316936Z
2022-02-27T02:48:09.483387Z
null
null
null
null
null
Linux
GSD-2022-1002297
net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link
net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.239 by commit e2423aa174e6c3e9805e96db778245ba73cdd88c, it was introduced in version v4.8 by commit fb3bbdb859891e6bc27fd1afb3a07319f82c2ee4. For more details please see the references link.
null
2022-04-25T06:50:42.791326Z
2022-04-24T22:31:34.087720Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb3bbdb859891e6bc27fd1afb3a07319f82c2ee4'}
Linux
GSD-2022-1000750
hwmon: Handle failure to register sensor with thermal zone correctly
hwmon: Handle failure to register sensor with thermal zone correctly This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.12 by commit 8a1969e14ad93663f9a3ed02ccc2138da9956a0e, it was introduced in version v5.8 by commit 1597b374af22266266e1e20612208c4b11359ad4. For more details please see the references link.
null
2022-03-18T02:56:22.123396Z
2022-03-18T00:15:17.702797Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1597b374af22266266e1e20612208c4b11359ad4'}
Linux
GSD-2022-1001842
PCI: Reduce warnings on possible RW1C corruption
PCI: Reduce warnings on possible RW1C corruption This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit e37d269734ee9866bef3f965d4f545b86352f326, it was introduced in version v4.10 by commit fb26592301200dbbe4a9943fe188b57a46716900. For more details please see the references link.
null
2022-04-25T03:35:09.302885Z
2022-04-24T21:47:09.956551Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb26592301200dbbe4a9943fe188b57a46716900'}