ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2022-1002278
NFSD: prevent integer overflow on 32 bit systems
NFSD: prevent integer overflow on 32 bit systems This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit ce1aa09cc14ed625104acc2d487bd92b9a88efe2. For more details please see the references link.
null
2022-04-25T06:18:43.167689Z
2022-04-24T22:29:32.608023Z
null
null
null
null
null
Linux
GSD-2022-1000245
ceph: properly put ceph_string reference after async create attempt
ceph: properly put ceph_string reference after async create attempt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.19 by commit 36d433ae3242aa714176378850e6d1a5a3e78f18, it was introduced in version v5.7 by commit 9a8d03ca2e2c334d08ee91a3e07dcce31a02fdc6. For more details please see the references link.
null
2022-02-19T08:44:49.117672Z
2022-02-18T22:00:43.602206Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9a8d03ca2e2c334d08ee91a3e07dcce31a02fdc6'}
Linux
GSD-2021-1001728
RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests
RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit 03d884671572af8bcfbc9e63944c1021efce7589, it was introduced in version v2.6.18 by commit e51060f08a61965c4dd91516d82fe90617152590. For more details please see the references link.
null
2021-12-20T00:55:26.615508Z
2021-10-19T16:33:47.100956Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e51060f08a61965c4dd91516d82fe90617152590'}
Linux
GSD-2021-1002807
Input: elantech - fix stack out of bound access in elantech_change_report_id()
Input: elantech - fix stack out of bound access in elantech_change_report_id() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.89 by commit 676c572439e58b7ee6b7ca3f1e5595382921045c, it was introduced in version v5.10.21 by commit dde807b4a44273fa5f62c0cb308295e6d6642550. For more details please see the references link.
null
2022-01-11T05:47:44.150729Z
2021-12-30T02:44:19.060603Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/dde807b4a44273fa5f62c0cb308295e6d6642550'}
Linux
GSD-2021-1001682
powerpc/64s: fix program check interrupt emergency stack path
powerpc/64s: fix program check interrupt emergency stack path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.12 by commit c835b3d1d6362b4a4ebb192da7e7fd27a0a45d01, it was introduced in version v5.3 by commit 0a882e28468f48ab3d9a36dde0a5723ea29ed1ed. For more details please see the references link.
null
2021-12-19T22:21:52.825088Z
2021-10-19T16:31:38.795696Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0a882e28468f48ab3d9a36dde0a5723ea29ed1ed'}
Linux
GSD-2021-1000990
net: cdc_eem: fix tx fixup skb leak
net: cdc_eem: fix tx fixup skb leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit 05b2b9f7d24b5663d9b47427fe1555bdafd3ea02, it was introduced in version v2.6.30 by commit 9f722c0978b04acba209f8ca1896ad05814bc3a3. For more details please see the references link.
null
2021-12-19T22:26:42.233711Z
2021-06-30T00:31:44.638606Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9f722c0978b04acba209f8ca1896ad05814bc3a3'}
Linux
GSD-2022-1000615
usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS
usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit 103938dd5798e150689362290274b87af54e3a52, it was introduced in version v5.13 by commit 90c4d05780d47e14a50e11a7f17373104cd47d25. For more details please see the references link.
null
2022-03-07T01:42:52.592775Z
2022-02-27T03:31:35.315606Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/90c4d05780d47e14a50e11a7f17373104cd47d25'}
Linux
GSD-2022-1001907
drbd: fix potential silent data corruption
drbd: fix potential silent data corruption This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 024c2a0db53a0f6f0f227ce6b88288e5b9e3f099. For more details please see the references link.
null
2022-04-25T05:19:28.744209Z
2022-04-24T21:53:42.316986Z
null
null
null
null
null
Linux
GSD-2021-1001378
seq_file: disallow extremely large seq buffer allocations
seq_file: disallow extremely large seq buffer allocations This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.198 by commit 6de9f0bf7cacc772a618699f9ed5c9f6fca58a1d, it was introduced in version v3.16 by commit 058504edd02667eef8fac9be27ab3ea74332e9b4. For more details please see the references link.
null
2021-12-20T00:10:09.118592Z
2021-08-03T02:24:01.840162Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/058504edd02667eef8fac9be27ab3ea74332e9b4'}
Linux
GSD-2022-1001454
video: fbdev: sm712fb: Fix crash in smtcfb_write()
video: fbdev: sm712fb: Fix crash in smtcfb_write() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit aeb635b49530b7d19e140949753409f759ba99be. For more details please see the references link.
null
2022-04-25T05:23:04.050248Z
2022-04-24T21:14:32.488941Z
null
null
null
null
null
Linux
GSD-2021-1000139
sfc: farch: fix TX queue lookup in TX flush done handling
sfc: farch: fix TX queue lookup in TX flush done handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.36 by commit fb791572d6747ef385f628450f8d57cd132e6e5a, it was introduced in version v5.10 by commit 12804793b17c0e19115a90d98f2f3df0cb79e233. For more details please see the references link.
null
2021-12-20T00:08:22.203126Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/12804793b17c0e19115a90d98f2f3df0cb79e233'}
Linux
GSD-2021-1002104
mm/mempolicy: do not allow illegal MPOL_F_NUMA_BALANCING | MPOL_LOCAL in mbind()
mm/mempolicy: do not allow illegal MPOL_F_NUMA_BALANCING | MPOL_LOCAL in mbind() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit 9ee4e9ae98f1f262d6fae0d266cfdf3ba2c321d9, it was introduced in version v5.12 by commit bda420b985054a3badafef23807c4b4fa38a3dff. For more details please see the references link.
null
2021-12-19T23:08:52.539378Z
2021-11-14T15:20:04.322739Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bda420b985054a3badafef23807c4b4fa38a3dff'}
Linux
GSD-2021-1000093
net: hso: fix NULL-deref on disconnect regression
net: hso: fix NULL-deref on disconnect regression This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.1 by commit 41c44e1f3112d7265dae522c026399b2a42d19ef, it was introduced in version v5.12 by commit 8a12f8836145ffe37e9c8733dce18c22fb668b66. For more details please see the references link.
null
2021-12-19T22:00:22.637173Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8a12f8836145ffe37e9c8733dce18c22fb668b66'}
Linux
GSD-2022-1001004
mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0)
mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0) This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 04bc13dae4a27b8d030843c85ae452bb2f1d9c1f. For more details please see the references link.
null
2022-04-25T05:31:53.260359Z
2022-04-24T20:38:53.035683Z
null
null
null
null
null
Linux
GSD-2021-1000569
scsi: target: core: Avoid smp_processor_id() in preemptible code
scsi: target: core: Avoid smp_processor_id() in preemptible code This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit a20b6eaf4f35046a429cde57bee7eb5f13d6857f, it was introduced in version v5.11 by commit 1526d9f10c6184031e42afad0adbdde1213e8ad1. For more details please see the references link.
null
2021-12-20T00:17:13.873814Z
2021-06-04T19:40:38.328732Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1526d9f10c6184031e42afad0adbdde1213e8ad1'}
Linux
GSD-2021-1002554
ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()
ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.7 by commit fc7ffa7f10b9454a86369405d9814bf141b30627. For more details please see the references link.
null
2021-12-19T22:56:35.435365Z
2021-12-19T19:42:26.607311Z
null
null
null
null
null
Linux
GSD-2022-1002501
scsi: pm8001: Fix abort all task initialization
scsi: pm8001: Fix abort all task initialization This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit 9914461db82caee6c519acfbe10a86fe11bcdeca, it was introduced in version v3.10 by commit c6b9ef5779c3e1edfa9de949d2a51252bc347663. For more details please see the references link.
null
2022-04-25T06:49:44.463294Z
2022-04-24T22:55:04.237632Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6b9ef5779c3e1edfa9de949d2a51252bc347663'}
Linux
GSD-2021-1001051
gfs2: Fix use-after-free in gfs2_glock_shrink_scan
gfs2: Fix use-after-free in gfs2_glock_shrink_scan This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.12 by commit e87ef30fe73e7e10d2c85bdcc778dcec24dca553. For more details please see the references link.
null
2021-12-20T00:56:01.952620Z
2021-06-30T00:36:24.493297Z
null
null
null
null
null
Linux
GSD-2022-1002151
ALSA: pcm: Fix races among concurrent hw_params and hw_free calls
ALSA: pcm: Fix races among concurrent hw_params and hw_free calls This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.109 by commit 0f6947f5f5208f6ebd4d76a82a4757e2839a23f8. For more details please see the references link.
null
2022-04-25T04:54:47.275119Z
2022-04-24T22:16:28.376767Z
null
null
null
null
null
Linux
GSD-2021-1001401
usb: max-3421: Prevent corruption of freed memory
usb: max-3421: Prevent corruption of freed memory This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.241 by commit edddc79c4391f8001095320d3ca423214b9aa4bf, it was introduced in version v3.16 by commit 2d53139f31626bad6f8983d8e519ddde2cbba921. For more details please see the references link.
null
2021-12-20T00:35:37.917454Z
2021-08-03T02:29:55.877654Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2d53139f31626bad6f8983d8e519ddde2cbba921'}
Linux
GSD-2022-1000496
scsi: qedf: Fix refcount issue when LOGO is received during TMF
scsi: qedf: Fix refcount issue when LOGO is received during TMF This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 7fcbed38503bb34c6e6538b6a9482d1c6bead1e8. For more details please see the references link.
null
2022-03-07T03:27:22.610499Z
2022-02-27T03:15:16.883489Z
null
null
null
null
null
Linux
GSD-2021-1002387
proc/vmcore: fix clearing user buffer by properly using clear_user()
proc/vmcore: fix clearing user buffer by properly using clear_user() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.257 by commit 99d348b82bcb36171f24411d3f1a15706a2a937a, it was introduced in version v3.0 by commit 997c136f518c5debd63847e78e2a8694f56dcf90. For more details please see the references link.
null
2021-12-19T22:37:05.334141Z
2021-12-19T19:35:07.533575Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/997c136f518c5debd63847e78e2a8694f56dcf90'}
Linux
GSD-2021-1001952
xhci: Fix command ring pointer corruption while aborting a command
xhci: Fix command ring pointer corruption while aborting a command This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.252 by commit 22bcb65ea41072ab5d03c0c6290e04e0df6d09a0. For more details please see the references link.
null
2021-12-19T23:02:41.330041Z
2021-11-14T15:13:11.314746Z
null
null
null
null
null
Linux
GSD-2021-1000640
iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers
iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.124 by commit f49149964d2423fb618fb6b755bb1eaa431cca2c, it was introduced in version v5.4.14 by commit 5408cbc6337300d6f1a87c797273c535ed96305a. For more details please see the references link.
null
2021-12-19T22:53:34.570141Z
2021-06-04T19:52:52.810641Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5408cbc6337300d6f1a87c797273c535ed96305a'}
Linux
GSD-2021-1000210
can: mcp251xfd: mcp251xfd_probe(): fix an error pointer dereference in probe
can: mcp251xfd: mcp251xfd_probe(): fix an error pointer dereference in probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.5 by commit 15f8f96ec7fc35024d4e03296e4d838fcea33d83, it was introduced in version v5.12 by commit cf8ee6de2543a0fa6d9471ddbb7216464a9681a1. For more details please see the references link.
null
2021-12-19T22:28:20.792510Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cf8ee6de2543a0fa6d9471ddbb7216464a9681a1'}
Linux
GSD-2022-1001287
exec: Force single empty string when argv is empty
exec: Force single empty string when argv is empty This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit cfbfff8ce5e3d674947581f1eb9af0a1b1807950. For more details please see the references link.
null
2022-04-25T06:09:44.280223Z
2022-04-24T21:01:29.056050Z
null
null
null
null
null
Linux
GSD-2021-1001817
KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest()
KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.156 by commit 80bbb0bc3a0288442f7fe6fc514f4ee1cb06ccb7, it was introduced in version v5.2 by commit 10d91611f426d4bafd2a83d966c36da811b2f7ad. For more details please see the references link.
null
2021-12-19T23:10:48.215879Z
2021-10-28T13:50:29.513251Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/10d91611f426d4bafd2a83d966c36da811b2f7ad'}
Linux
GSD-2021-1002738
btrfs: use latest_dev in btrfs_show_devname
btrfs: use latest_dev in btrfs_show_devname This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit e342c2558016ead462f376b6c6c2ac5efc17f3b1. For more details please see the references link.
null
2022-01-11T05:51:08.036325Z
2021-12-27T05:45:50.984912Z
null
null
null
null
null
Linux
GSD-2021-1000705
NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()
NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.271 by commit e8b8418ce14ae66ee55179901edd12191ab06a9e, it was introduced in version v4.0 by commit a7d42ddb3099727f58366fa006f850a219cce6c8. For more details please see the references link.
null
2021-12-19T23:31:03.893780Z
2021-06-04T20:06:21.997832Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a7d42ddb3099727f58366fa006f850a219cce6c8'}
Linux
GSD-2022-1000880
ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min
ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.183 by commit f3537f1b2bfd3b1df15723df49fc26eccd5112fe, it was introduced in version v5.4.178 by commit 68fd718724284788fc5f379e0b7cac541429ece7. For more details please see the references link.
null
2022-03-18T02:58:01.722412Z
2022-03-18T00:27:10.771083Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/68fd718724284788fc5f379e0b7cac541429ece7'}
Linux
GSD-2022-1001792
ext4: fix ext4_mb_mark_bb() with flex_bg with fast_commit
ext4: fix ext4_mb_mark_bb() with flex_bg with fast_commit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 6a6beb074186a0452368a023a261c7d0eaebe838. For more details please see the references link.
null
2022-04-25T06:55:12.989587Z
2022-04-24T21:42:35.500578Z
null
null
null
null
null
Linux
GSD-2022-1001268
video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe()
video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 9280ef235b05e8f19f8bc6d547b992f0a0ef398d, it was introduced in version v3.2 by commit 3c8a63e22a0802fd56380f6ab305b419f18eb6f5. For more details please see the references link.
null
2022-04-25T07:56:47.469807Z
2022-04-24T20:59:48.914479Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c8a63e22a0802fd56380f6ab305b419f18eb6f5'}
Linux
GSD-2021-1002368
iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove
iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.295 by commit 8c1d43f3a3fc7184c42d7398bdf59a2a2903e4fc, it was introduced in version v4.2 by commit a25691c1f9674090fb66586cf4c5d60d3efdf339. For more details please see the references link.
null
2021-12-20T00:39:04.212059Z
2021-12-19T19:34:13.770904Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a25691c1f9674090fb66586cf4c5d60d3efdf339'}
Linux
GSD-2021-1000355
i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails
i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit cc49d206414240483bb93ffa3d80243e6a776916, it was introduced in version v4.16 by commit 13d6eb20fc79a1e606307256dad4098375539a09. For more details please see the references link.
null
2021-12-19T23:18:10.399812Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/13d6eb20fc79a1e606307256dad4098375539a09'}
Linux
GSD-2022-1001638
netfilter: nf_tables: initialize registers in nft_do_chain()
netfilter: nf_tables: initialize registers in nft_do_chain() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.18 by commit 64f24c76dd0ce53d0fa3a0bfb9aeea507c769485, it was introduced in version v3.13 by commit 96518518cc417bb0a8c80b9fb736202e28acdf96. For more details please see the references link.
null
2022-04-25T03:13:33.430196Z
2022-04-24T21:30:46.811961Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/96518518cc417bb0a8c80b9fb736202e28acdf96'}
Linux
GSD-2021-1002692
mac80211: track only QoS data frames for admission control
mac80211: track only QoS data frames for admission control This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.88 by commit eed897a22230e3231a740eddd7d6d95ba476625f, it was introduced in version v3.19 by commit 02219b3abca59fca81711bfe7ee78df7abad97ce. For more details please see the references link.
null
2022-01-11T05:48:18.502463Z
2021-12-27T05:37:02.630871Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/02219b3abca59fca81711bfe7ee78df7abad97ce'}
Linux
GSD-2021-1001114
i2c: robotfuzz-osif: fix control-request directions
i2c: robotfuzz-osif: fix control-request directions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.196 by commit f376dd8a409fe4cca5b121cd7c42b894689aada6, it was introduced in version v3.14 by commit 83e53a8f120f2f273cf0ad717f5372ab79ac24fe. For more details please see the references link.
null
2021-12-19T22:01:08.321072Z
2021-07-08T01:57:15.177370Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/83e53a8f120f2f273cf0ad717f5372ab79ac24fe'}
Linux
GSD-2022-1000183
udf: Fix NULL ptr deref when converting from inline format
udf: Fix NULL ptr deref when converting from inline format This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.96 by commit de7cc8bcca90a9d77c915ee1d922dbd670c47d84, it was introduced in version v4.2 by commit 52ebea749aaed195245701a8f90a23d672c7a933. For more details please see the references link.
null
2022-02-19T15:36:10.758343Z
2022-02-18T21:52:04.034875Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/52ebea749aaed195245701a8f90a23d672c7a933'}
Linux
GSD-2022-1000479
scsi: ufs: Fix a deadlock in the error handler
scsi: ufs: Fix a deadlock in the error handler This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit 493c9e850677df8b4eda150c2364b1c1a72ed724. For more details please see the references link.
null
2022-03-07T01:34:59.574283Z
2022-02-27T03:12:42.054062Z
null
null
null
null
null
Linux
GSD-2022-1002444
media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED
media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 03054f22d5abd80ad89547512c2bfbfb2714d3ed, it was introduced in version v3.7 by commit 8ac456495a33d9466076fea94594181ceefb76d9. For more details please see the references link.
null
2022-04-25T04:20:57.549418Z
2022-04-24T22:48:28.517730Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ac456495a33d9466076fea94594181ceefb76d9'}
Linux
GSD-2021-1001544
net: macb: fix use after free on rmmod
net: macb: fix use after free on rmmod This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.249 by commit a7d521cc726f30b8e679a6f36d04b18a8ab3c536. For more details please see the references link.
null
2021-12-19T22:30:47.821852Z
2021-10-19T16:23:04.030182Z
null
null
null
null
null
Linux
GSD-2022-1000029
NFC: st21nfca: Fix memory leak in device probe and remove
NFC: st21nfca: Fix memory leak in device probe and remove This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.170 by commit 1cd4063dbc91cf7965d73a6a3855e2028cd4613b, it was introduced in version v3.16 by commit 68957303f44a501af5cf37913208a2acaa6bcdf1. For more details please see the references link.
null
2022-01-11T05:47:56.426748Z
2022-01-10T19:50:50.494297Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/68957303f44a501af5cf37913208a2acaa6bcdf1'}
Linux
GSD-2022-1002014
ath11k: mhi: use mhi_sync_power_up()
ath11k: mhi: use mhi_sync_power_up() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit 339bd0b55ecdd0f7f341e9357c4cfde799de9418. For more details please see the references link.
null
2022-04-25T06:29:10.503702Z
2022-04-24T22:02:56.859368Z
null
null
null
null
null
Linux
GSD-2021-1001790
can: peak_pci: peak_pci_remove(): fix UAF
can: peak_pci: peak_pci_remove(): fix UAF This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.253 by commit 34914971bb3244db4ce2be44e9438a9b30c56250, it was introduced in version v3.4 by commit e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd. For more details please see the references link.
null
2021-12-20T00:21:22.474314Z
2021-10-28T13:48:59.124129Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd'}
Linux
GSD-2021-1000882
NFS: Fix a potential NULL dereference in nfs_get_client()
NFS: Fix a potential NULL dereference in nfs_get_client() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.195 by commit 4b380a7d84ef2ce3f4f5bec5d8706ed937ac6502, it was introduced in version v3.17 by commit 31434f496abb9f3410b10f541462fe58613dd3ad. For more details please see the references link.
null
2021-12-19T22:44:21.074115Z
2021-06-30T00:03:25.539044Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/31434f496abb9f3410b10f541462fe58613dd3ad'}
Linux
GSD-2022-1000707
iommu/amd: Recover from event log overflow
iommu/amd: Recover from event log overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.13 by commit 4aafe9f8acbebcf4e7b759283573f930b34e360f. For more details please see the references link.
null
2022-03-18T02:57:05.439477Z
2022-03-18T00:11:25.246235Z
null
null
null
null
null
Linux
GSD-2022-1001815
clk: Fix clk_hw_get_clk() when dev is NULL
clk: Fix clk_hw_get_clk() when dev is NULL This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 4be3e4c05d8dd1b83b75652cad88c9e752ec7054, it was introduced in version v5.11 by commit 30d6f8c15d2cd877c1f3d47d8a1064649ebe58e2. For more details please see the references link.
null
2022-04-25T03:02:15.172151Z
2022-04-24T21:44:31.723531Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/30d6f8c15d2cd877c1f3d47d8a1064649ebe58e2'}
Linux
GSD-2022-1000357
copy_process(): Move fd_install() out of sighand->siglock critical section
copy_process(): Move fd_install() out of sighand->siglock critical section This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.181 by commit 6f08452c560d0b2468c7e362b4124e62906001f5, it was introduced in version v5.2 by commit 6fd2fe494b17bf2dec37b610d23a43a72b16923a. For more details please see the references link.
null
2022-03-07T01:46:47.835653Z
2022-02-27T02:56:01.537874Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6fd2fe494b17bf2dec37b610d23a43a72b16923a'}
Linux
GSD-2021-1000928
can: j1939: fix Use-after-Free, hold skb ref while in use
can: j1939: fix Use-after-Free, hold skb ref while in use This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.128 by commit 22cba878abf646cd3a02ee7c8c2cef7afe66a256, it was introduced in version v5.4 by commit 9d71dd0c70099914fcd063135da3c580865e924c. For more details please see the references link.
null
2021-12-19T22:42:29.012613Z
2021-06-30T00:25:06.253215Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9d71dd0c70099914fcd063135da3c580865e924c'}
Linux
GSD-2021-1000181
scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand()
scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.118 by commit 77509a238547863040a42d57c72403f7d4c89a8f, it was introduced in version v5.4.4 by commit dea6ee7173039d489977c9ed92e3749154615db4. For more details please see the references link.
null
2021-12-19T23:17:34.743470Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/dea6ee7173039d489977c9ed92e3749154615db4'}
Linux
GSD-2022-1001116
ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock()
ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 3b7fb89135a20587d57f8877c02e25003e9edbdf, it was introduced in version v2.6.27 by commit 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d. For more details please see the references link.
null
2022-04-25T04:45:20.483513Z
2022-04-24T20:46:52.650870Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d'}
Linux
GSD-2021-1002446
perf report: Fix memory leaks around perf_tip()
perf report: Fix memory leaks around perf_tip() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.164 by commit df5990db088d4c7fea9a2f9b8195a7859e1768c4. For more details please see the references link.
null
2021-12-19T22:12:42.786375Z
2021-12-19T19:37:44.705884Z
null
null
null
null
null
Linux
GSD-2022-1001546
net: asix: add proper error handling of usb read errors
net: asix: add proper error handling of usb read errors This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 9ea8d2fca8fea3b17005b4dc02f8ef15f7a2fb97, it was introduced in version v4.9 by commit d9fe64e511144c1ee7d7555b4111f09dde9692ef. For more details please see the references link.
null
2022-04-25T06:46:44.285042Z
2022-04-24T21:22:19.443224Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9fe64e511144c1ee7d7555b4111f09dde9692ef'}
Linux
GSD-2021-1002016
net/tls: Fix flipped sign in tls_err_abort() calls
net/tls: Fix flipped sign in tls_err_abort() calls This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.157 by commit e0cfd5159f314d6b304d030363650b06a2299cbb, it was introduced in version v4.17 by commit c46234ebb4d1eee5e09819f49169e51cfc6eb909. For more details please see the references link.
null
2021-12-19T22:10:56.971607Z
2021-11-14T15:16:03.467723Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c46234ebb4d1eee5e09819f49169e51cfc6eb909'}
Linux
GSD-2021-1002503
can: sja1000: fix use after free in ems_pcmcia_add_card()
can: sja1000: fix use after free in ems_pcmcia_add_card() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.85 by commit 923f4dc5df679f678e121c20bf2fd70f7bf3e288, it was introduced in version v3.2 by commit fd734c6f25aea4b2b44b045e489aec67b388577e. For more details please see the references link.
null
2021-12-20T01:25:09.521136Z
2021-12-19T19:40:09.553050Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fd734c6f25aea4b2b44b045e489aec67b388577e'}
Linux
GSD-2022-1001053
mt76: mt7915: fix injected MPDU transmission to not use HW A-MSDU
mt76: mt7915: fix injected MPDU transmission to not use HW A-MSDU This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 7d478a66b9c990366087cc8f054256da5effa6c7. For more details please see the references link.
null
2022-04-25T06:15:35.489804Z
2022-04-24T20:42:36.697431Z
null
null
null
null
null
Linux
GSD-2021-1002153
btrfs: fix abort logic in btrfs_replace_file_extents
btrfs: fix abort logic in btrfs_replace_file_extents This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 4afb912f439c4bc4e6a4f3e7547f2e69e354108f. For more details please see the references link.
null
2021-12-20T01:22:59.484422Z
2021-11-14T15:22:14.736917Z
null
null
null
null
null
Linux
GSD-2021-1000494
btrfs: fix removed dentries still existing after log is synced
btrfs: fix removed dentries still existing after log is synced This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.7 by commit 6d0924c5b742036b4f20a0ffdf2b6cf3f963f5f6, it was introduced in version v5.12 by commit 64d6b281ba4db044c946158387c74e1149b9487e. For more details please see the references link.
null
2021-12-19T21:47:45.220144Z
2021-05-31T23:45:53.699005Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/64d6b281ba4db044c946158387c74e1149b9487e'}
Linux
GSD-2022-1001403
tcp: Don't acquire inet_listen_hashbucket::lock with disabled BH.
tcp: Don't acquire inet_listen_hashbucket::lock with disabled BH. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit b897d79a0658d2a0fe037612bd70ce0eb21741e9. For more details please see the references link.
null
2022-04-25T06:29:57.673887Z
2022-04-24T21:10:37.759113Z
null
null
null
null
null
Linux
GSD-2022-1002385
scsi: target: tcmu: Fix possible page UAF
scsi: target: tcmu: Fix possible page UAF This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit d7c5d79e50be6e06b669141e3db1f977a0dd4e8e. For more details please see the references link.
null
2022-04-25T03:51:31.716648Z
2022-04-24T22:41:26.158020Z
null
null
null
null
null
Linux
GSD-2022-1000642
net/mlx5e: Avoid implicit modify hdr for decap drop rule
net/mlx5e: Avoid implicit modify hdr for decap drop rule This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.6 by commit e23a2f4e43a4a18de4137a446705281a8969b375, it was introduced in version v5.16 by commit b16eb3c81fe27978afdb2c111908d4d627a88d99. For more details please see the references link.
null
2022-03-07T01:44:09.061402Z
2022-02-27T03:35:15.776132Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b16eb3c81fe27978afdb2c111908d4d627a88d99'}
Linux
GSD-2022-1001950
memory: renesas-rpc-if: fix platform-device leak in error path
memory: renesas-rpc-if: fix platform-device leak in error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.112 by commit c089ffc846c85f200db34ad208338f4f81a6d82d, it was introduced in version v5.9 by commit ca7d8b980b67f133317525c4273e144116ee1ae5. For more details please see the references link.
null
2022-04-25T02:59:26.862116Z
2022-04-24T21:57:25.884589Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca7d8b980b67f133317525c4273e144116ee1ae5'}
Linux
GSD-2021-1001285
smackfs: restrict bytes count in smk_set_cipso()
smackfs: restrict bytes count in smk_set_cipso() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.51 by commit 3780348c1a0e14ffefcaf1fc521f815bcaac94b0. For more details please see the references link.
null
2021-12-19T22:22:02.086576Z
2021-08-03T01:57:27.570230Z
null
null
null
null
null
Linux
GSD-2022-1000212
rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink()
rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.97 by commit 3bbe2019dd12b8d13671ee6cda055d49637b4c39, it was introduced in version v3.14 by commit ba7d49b1f0f8e5f24294a880ed576964059af5ef. For more details please see the references link.
null
2022-02-20T02:14:48.714778Z
2022-02-18T21:56:08.354146Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ba7d49b1f0f8e5f24294a880ed576964059af5ef'}
Linux
GSD-2021-1000247
i2c: cadence: fix reference leak when pm_runtime_get_sync fails
i2c: cadence: fix reference leak when pm_runtime_get_sync fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit a45fc41beed8e0fe31864619c34aa00797fb60c1, it was introduced in version v4.5 by commit 7fa32329ca03148fb2c07b4ef3247b8fc0488d6a. For more details please see the references link.
null
2021-12-20T01:26:36.625206Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7fa32329ca03148fb2c07b4ef3247b8fc0488d6a'}
Linux
GSD-2022-1000838
xen/netfront: destroy queues before real_num_tx_queues is zeroed
xen/netfront: destroy queues before real_num_tx_queues is zeroed This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.104 by commit a1753d5c29a6fb9a8966dcf04cb4f3b71e303ae8, it was introduced in version v5.10.94 by commit 443133330a5d4a3fd429179d460cc297724fefe8. For more details please see the references link.
null
2022-03-18T02:58:30.256468Z
2022-03-18T00:23:00.034685Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/443133330a5d4a3fd429179d460cc297724fefe8'}
Linux
GSD-2021-1002780
IB/qib: Fix memory leak in qib_user_sdma_queue_pkts()
IB/qib: Fix memory leak in qib_user_sdma_queue_pkts() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.260 by commit d53456492b5d02033c73dfa0f3b94c86337791ba, it was introduced in version v4.14.255 by commit 60833707b968d5ae02a75edb7886dcd4a957cf0d. For more details please see the references link.
null
2022-01-11T05:53:11.098884Z
2021-12-30T02:43:07.928716Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/60833707b968d5ae02a75edb7886dcd4a957cf0d'}
Linux
GSD-2021-1001905
net: dsa: microchip: Added the condition for scheduling ksz_mib_read_work
net: dsa: microchip: Added the condition for scheduling ksz_mib_read_work This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit 383239a33cf29ebee9ce0d4e0e5c900b77a16148, it was introduced in version v5.7 by commit 469b390e1ba330e888175e55d78573db2e9a8cb4. For more details please see the references link.
null
2021-12-19T22:44:55.132903Z
2021-10-28T13:55:00.208609Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/469b390e1ba330e888175e55d78573db2e9a8cb4'}
Linux
GSD-2021-1000617
cxgb4: avoid accessing registers when clearing filters
cxgb4: avoid accessing registers when clearing filters This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.124 by commit 0bf49b3c8d8b3a43ce09f1b2db70e5484d31fcdf, it was introduced in version v5.2 by commit b1a79360ee862f8ada4798ad2346fa45bb41b527. For more details please see the references link.
null
2021-12-20T00:21:26.262370Z
2021-06-04T19:48:17.113965Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b1a79360ee862f8ada4798ad2346fa45bb41b527'}
Linux
GSD-2022-1000992
drm/amd/display: Fix by adding FPU protection for dcn30_internal_validate_bw
drm/amd/display: Fix by adding FPU protection for dcn30_internal_validate_bw This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 76f4c5e5f99ee7084b555d9a38e8ffeb16ec65a2. For more details please see the references link.
null
2022-04-25T05:59:36.257684Z
2022-04-24T20:37:52.943667Z
null
null
null
null
null
Linux
GSD-2022-1001680
scsi: mpt3sas: Fix use after free in _scsih_expander_node_remove()
scsi: mpt3sas: Fix use after free in _scsih_expander_node_remove() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 25c1353dca74ad7cf3fd7ce258fe7c957a147d5e, it was introduced in version v5.11 by commit 7d310f241001e090cf1ec0f3ae836b38d8c6ebec. For more details please see the references link.
null
2022-04-25T02:59:24.376838Z
2022-04-24T21:34:29.554989Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7d310f241001e090cf1ec0f3ae836b38d8c6ebec'}
Linux
GSD-2021-1001456
udf: Fix NULL pointer dereference in udf_symlink function
udf: Fix NULL pointer dereference in udf_symlink function This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.276 by commit 371566f63cbd0bb6fbb25b8fe9d5798268d35af9. For more details please see the references link.
null
2021-12-19T23:28:05.396261Z
2021-08-03T02:46:37.711402Z
null
null
null
null
null
Linux
GSD-2022-1002106
ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction
ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 7e6f5786621df060f8296f074efd275eaf20361a, it was introduced in version v3.16 by commit 00a7bb81c20f3e81711e28e0f6c08cee8fd18514. For more details please see the references link.
null
2022-04-25T03:19:08.974917Z
2022-04-24T22:12:06.173246Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/00a7bb81c20f3e81711e28e0f6c08cee8fd18514'}
Linux
GSD-2021-1001006
net: bridge: fix vlan tunnel dst null pointer dereference
net: bridge: fix vlan tunnel dst null pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit fe0448a3fad365a747283a00a1d1ad5e8d6675b7, it was introduced in version v4.11 by commit 11538d039ac6efcf4f1a6c536e1b87cd3668a9fd. For more details please see the references link.
null
2021-12-20T00:40:44.569138Z
2021-06-30T00:33:27.534756Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/11538d039ac6efcf4f1a6c536e1b87cd3668a9fd'}
Linux
GSD-2022-1000091
drm/nouveau: fix off by one in BIOS boundary checking
drm/nouveau: fix off by one in BIOS boundary checking This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.300 by commit d4b746e60fd8eaa8016e144223abe91158edcdad, it was introduced in version v4.8 by commit 4d4e9907ff572bb1d1c0f6913ad6e3d6d4525077. For more details please see the references link.
null
2022-02-19T09:31:50.232816Z
2022-02-18T21:34:11.689133Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4d4e9907ff572bb1d1c0f6913ad6e3d6d4525077'}
Linux
GSD-2022-1002043
video: fbdev: cirrusfb: check pixclock to avoid divide by zero
video: fbdev: cirrusfb: check pixclock to avoid divide by zero This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 8c7e2141fb89c620ab4e41512e262fbf25b8260d. For more details please see the references link.
null
2022-04-25T06:31:49.930095Z
2022-04-24T22:05:33.752522Z
null
null
null
null
null
Linux
GSD-2021-1001513
mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap
mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.285 by commit e5bb852aa2ad963074f0ad73030dbc20a30853e3, it was introduced in version v4.7 by commit 646e76bb5daf4ca38438c69ffb72cccb605f3466. For more details please see the references link.
null
2021-12-19T22:42:49.614106Z
2021-10-19T16:21:37.907145Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/646e76bb5daf4ca38438c69ffb72cccb605f3466'}
Linux
GSD-2022-1000584
iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping()
iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.22 by commit 336d096b62bdc673e852b6b80d5072d7888ce85d, it was introduced in version v5.8 by commit e3beca48a45b5e0e6e6a4e0124276b8248dcc9bb. For more details please see the references link.
null
2022-03-07T01:47:38.189688Z
2022-02-27T03:27:27.202881Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e3beca48a45b5e0e6e6a4e0124276b8248dcc9bb'}
Linux
GSD-2022-1002413
ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl
ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit f149b1bd213820363731aa119e5011ca892a2aac, it was introduced in version v4.8 by commit 714fb87e8bc05ff78255afc0dca981e8c5242785. For more details please see the references link.
null
2022-04-25T03:05:04.075794Z
2022-04-24T22:44:45.942880Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/714fb87e8bc05ff78255afc0dca981e8c5242785'}
Linux
GSD-2021-1001143
nilfs2: fix memory leak in nilfs_sysfs_delete_device_group
nilfs2: fix memory leak in nilfs_sysfs_delete_device_group This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13 by commit 8fd0c1b0647a6bda4067ee0cd61e8395954b6f28, it was introduced in version v3.17 by commit da7141fb78db915680616e15677539fc8140cf53. For more details please see the references link.
null
2021-12-19T23:12:05.334795Z
2021-07-08T01:59:21.588503Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/da7141fb78db915680616e15677539fc8140cf53'}
Linux
GSD-2021-1000302
drm: bridge/panel: Cleanup connector on bridge detach
drm: bridge/panel: Cleanup connector on bridge detach This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 98d7d76a74e48ec3ddf2e23950adff7edcab9327, it was introduced in version v4.13 by commit 13dfc0540a575b47b2d640b093ac16e9e09474f6. For more details please see the references link.
null
2021-12-19T22:54:25.639729Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/13dfc0540a575b47b2d640b093ac16e9e09474f6'}
Linux
GSD-2022-1001395
mt76: mt7915: fix injected MPDU transmission to not use HW A-MSDU
mt76: mt7915: fix injected MPDU transmission to not use HW A-MSDU This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 64d50b03c3816c76d969116b25322a2be47868d3. For more details please see the references link.
null
2022-04-25T05:49:27.164203Z
2022-04-24T21:10:14.476917Z
null
null
null
null
null
Linux
GSD-2021-1002295
scsi: advansys: Fix kernel pointer leak
scsi: advansys: Fix kernel pointer leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.82 by commit 055eced3edf5b675d12189081303f6285ef26511. For more details please see the references link.
null
2021-12-20T00:23:59.576110Z
2021-11-29T02:37:27.722422Z
null
null
null
null
null
Linux
GSD-2021-1001840
KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest()
KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit fbd724c49bead048ae9fc1a5b7bff2fb3e54f855, it was introduced in version v5.2 by commit 10d91611f426d4bafd2a83d966c36da811b2f7ad. For more details please see the references link.
null
2021-12-20T01:31:09.877316Z
2021-10-28T13:51:39.501658Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/10d91611f426d4bafd2a83d966c36da811b2f7ad'}
Linux
GSD-2021-1000752
pid: take a reference when initializing `cad_pid`
pid: take a reference when initializing `cad_pid` This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.125 by commit 2cd6eedfa6344f5ef5c3dac3aee57a39b5b46dff, it was introduced in version v2.6.19 by commit 9ec52099e4b8678a60e9f93e41ad87885d64f3e6. For more details please see the references link.
null
2021-12-19T22:36:21.626254Z
2021-06-25T00:02:28.418459Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9ec52099e4b8678a60e9f93e41ad87885d64f3e6'}
Linux
GSD-2021-1000545
interconnect: qcom: bcm-voter: add a missing of_node_put()
interconnect: qcom: bcm-voter: add a missing of_node_put() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit 93d1dbe7043b3c9492bdf396b2e98a008435b55b, it was introduced in version v5.7 by commit 976daac4a1c581e5d5fd64047519fd6fcde39738. For more details please see the references link.
null
2021-12-19T23:31:09.045108Z
2021-06-04T19:36:20.714652Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/976daac4a1c581e5d5fd64047519fd6fcde39738'}
Linux
GSD-2021-1002578
usb: cdnsp: Fix a NULL pointer dereference in cdnsp_endpoint_init()
usb: cdnsp: Fix a NULL pointer dereference in cdnsp_endpoint_init() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.7 by commit 7d94bc8e335cb33918e52efdbe192c36707bfa24, it was introduced in version v5.12 by commit 3d82904559f4f5a2622db1b21de3edf2eded7664. For more details please see the references link.
null
2021-12-19T22:47:07.420438Z
2021-12-19T19:43:33.082090Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3d82904559f4f5a2622db1b21de3edf2eded7664'}
Linux
GSD-2022-1001028
Drivers: hv: vmbus: Fix initialization of device object in vmbus_device_register()
Drivers: hv: vmbus: Fix initialization of device object in vmbus_device_register() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 2fe4b8631427618175a32f125062df91a5fe3f73, it was introduced in version v5.17 by commit 743b237c3a7b0f5b44aa704aae8a1058877b6322. For more details please see the references link.
null
2022-04-25T03:00:08.686955Z
2022-04-24T20:41:12.174967Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/743b237c3a7b0f5b44aa704aae8a1058877b6322'}
Linux
GSD-2021-1002082
xhci: Fix command ring pointer corruption while aborting a command
xhci: Fix command ring pointer corruption while aborting a command This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit e54abefe703ab7c4e5983e889babd1447738ca42. For more details please see the references link.
null
2021-12-20T01:37:04.057394Z
2021-11-14T15:19:02.823606Z
null
null
null
null
null
Linux
GSD-2021-1000115
irqchip/gic-v3: Do not enable irqs when handling spurious interrups
irqchip/gic-v3: Do not enable irqs when handling spurious interrups This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.20 by commit ea817ac1014c04f47885532b55f5d0898deadfba, it was introduced in version v5.1 by commit 3f1f3234bc2db1c16b9818b9a15a5d58ad45251c. For more details please see the references link.
null
2021-12-19T23:18:21.423571Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f1f3234bc2db1c16b9818b9a15a5d58ad45251c'}
Linux
GSD-2021-1002128
drm/amdgpu: Fix even more out of bound writes from debugfs
drm/amdgpu: Fix even more out of bound writes from debugfs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.16 by commit 9eb4bdd554fc31a5ef6bf645a20ff21618ce45a9, it was introduced in version v5.10 by commit 918698d5c2b50433714d2042f55b55b090faa167. For more details please see the references link.
null
2021-12-19T23:22:30.998211Z
2021-11-14T15:21:12.470396Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/918698d5c2b50433714d2042f55b55b090faa167'}
Linux
GSD-2022-1001182
kernel/resource: fix kfree() of bootmem memory again
kernel/resource: fix kfree() of bootmem memory again This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit ab86020070999e758ce2e60c4348f20bf7ddba56, it was introduced in version v3.10 by commit ebff7d8f270d045338d9f4796014f4db429a17f9. For more details please see the references link.
null
2022-04-25T03:20:44.741833Z
2022-04-24T20:51:32.885642Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ebff7d8f270d045338d9f4796014f4db429a17f9'}
Linux
GSD-2022-1001478
bfq: fix use-after-free in bfq_dispatch_request
bfq: fix use-after-free in bfq_dispatch_request This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 5687958bf18f84384d809f521210d0f5deed03b0. For more details please see the references link.
null
2022-04-25T04:46:46.012677Z
2022-04-24T21:15:47.655563Z
null
null
null
null
null
Linux
GSD-2021-1001354
udf: Fix NULL pointer dereference in udf_symlink function
udf: Fix NULL pointer dereference in udf_symlink function This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.133 by commit 80d505aee6398cf8beb72475c7edcf1733c1c68b. For more details please see the references link.
null
2021-12-19T23:50:50.575727Z
2021-08-03T02:16:12.544420Z
null
null
null
null
null
Linux
GSD-2022-1000639
net/mlx5: Use del_timer_sync in fw reset flow of halting poll
net/mlx5: Use del_timer_sync in fw reset flow of halting poll This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.6 by commit 2a038dd1d942f8fbc495c58fa592ff24af05f1c2, it was introduced in version v5.10 by commit 38b9f903f22b9baa5c4b9bfb07c8bbc49f5efbba. For more details please see the references link.
null
2022-03-07T01:35:14.548110Z
2022-02-27T03:34:55.237452Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/38b9f903f22b9baa5c4b9bfb07c8bbc49f5efbba'}
Linux
GSD-2021-1001704
drm/amdkfd: fix svm_migrate_fini warning
drm/amdkfd: fix svm_migrate_fini warning This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.11 by commit ac7d732b24f4061f8a732ada49b054ab38c63e15. For more details please see the references link.
null
2021-12-19T22:25:16.308533Z
2021-10-19T16:32:43.716137Z
null
null
null
null
null
Linux
GSD-2021-1000816
ocfs2: fix data corruption by fallocate
ocfs2: fix data corruption by fallocate This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.10 by commit 0a31dd6fd2f4e7db538fb6eb1f06973d81f8dd3b, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T23:15:27.914341Z
2021-06-25T00:09:11.872136Z
null
null
null
null
null
Linux
GSD-2022-1000793
riscv: fix oops caused by irqsoff latency tracer
riscv: fix oops caused by irqsoff latency tracer This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.26 by commit 1851b9a467065b18ec2cba156eea345206df1c8f, it was introduced in version v5.9 by commit 3c46979829824da5af8766d89fa877976bdae884. For more details please see the references link.
null
2022-03-18T03:00:31.138651Z
2022-03-18T00:18:22.810754Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c46979829824da5af8766d89fa877976bdae884'}
Linux
GSD-2022-1001881
ASoC: codecs: rx-macro: fix accessing compander for aux
ASoC: codecs: rx-macro: fix accessing compander for aux This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 9208ecc703b5ed5b12d7ea13c79207f4c8456638, it was introduced in version v5.12 by commit 4f692926f562ff48abfcca6b16f36ff8d57473b6. For more details please see the references link.
null
2022-04-25T05:31:05.307545Z
2022-04-24T21:51:24.562813Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4f692926f562ff48abfcca6b16f36ff8d57473b6'}
Linux
GSD-2022-1002254
drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes()
drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 57f4ad5e286fe4599c8fc63cf89f85f9eec7f9c9, it was introduced in version v4.15 by commit e7b07ceef2a650e5ed8ca37997689e086c680daf. For more details please see the references link.
null
2022-04-25T06:48:31.822084Z
2022-04-24T22:26:43.941881Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e7b07ceef2a650e5ed8ca37997689e086c680daf'}