ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2022-1000269
PCI: pciehp: Fix infinite loop in IRQ handler upon power fault
PCI: pciehp: Fix infinite loop in IRQ handler upon power fault This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.20 by commit 1db58c6584a72102e98af2e600ea184ddaf2b8af, it was introduced in version v5.7 by commit 8edf5332c39340b9583cf9cba659eb7ec71f75b5. For more details please see the references link.
null
2022-02-19T05:01:03.939675Z
2022-02-18T22:04:22.319982Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8edf5332c39340b9583cf9cba659eb7ec71f75b5'}
Linux
GSD-2021-1001211
fbmem: Do not delete the mode that is still in use
fbmem: Do not delete the mode that is still in use This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.4 by commit d6e76469157d8f240e5dec6f8411aa8d306b1126, it was introduced in version v5.3 by commit 13ff178ccd6d3b8074c542a911300b79c4eec255. For more details please see the references link.
null
2021-12-20T00:48:18.712797Z
2021-08-03T01:37:59.772606Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/13ff178ccd6d3b8074c542a911300b79c4eec255'}
Linux
GSD-2022-1000286
scsi: target: iscsi: Make sure the np under each tpg is unique
scsi: target: iscsi: Make sure the np under each tpg is unique This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.302 by commit 2953394b3129aaf5df3b61918ea2570ff878a7b8. For more details please see the references link.
null
2022-03-07T01:50:12.301991Z
2022-02-27T02:38:26.248Z
null
null
null
null
null
Linux
GSD-2022-1002311
jfs: prevent NULL deref in diFree
jfs: prevent NULL deref in diFree This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 2ef74e3e0089b6615ee124e1183746974c6bb561. For more details please see the references link.
null
2022-04-25T03:52:37.122975Z
2022-04-24T22:33:13.519395Z
null
null
null
null
null
Linux
GSD-2021-1001641
HID: betop: fix slab-out-of-bounds Write in betop_probe
HID: betop: fix slab-out-of-bounds Write in betop_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.71 by commit dedfc35a2de2bae9fa3da8210a05bfd515f83fee. For more details please see the references link.
null
2021-12-19T22:37:26.465443Z
2021-10-19T16:29:33.148170Z
null
null
null
null
null
Linux
GSD-2021-1000953
usb: dwc3-meson-g12a: fix usb2 PHY glue init when phy0 is disabled
usb: dwc3-meson-g12a: fix usb2 PHY glue init when phy0 is disabled This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.44 by commit 750a0d75564293be3ed50f13ef7f38ab75106421, it was introduced in version v5.8 by commit 013af227f58a97ffc61b99301f8f4448dc7e7f55. For more details please see the references link.
null
2021-12-19T23:15:27.980373Z
2021-06-30T00:28:56.498720Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/013af227f58a97ffc61b99301f8f4448dc7e7f55'}
Linux
GSD-2021-1000400
async_xor: increase src_offs when dropping destination page
async_xor: increase src_offs when dropping destination page This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit cab2e8e5997b592fdb7d02cf2387b4b8e3057174, it was introduced in version v5.10 by commit 29bcff787a2593b2126cfaff612c0b4e560022e9. For more details please see the references link.
null
2021-12-20T00:03:32.121737Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/29bcff787a2593b2126cfaff612c0b4e560022e9'}
Linux
GSD-2022-1001497
clk: Fix clk_hw_get_clk() when dev is NULL
clk: Fix clk_hw_get_clk() when dev is NULL This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit d183f20cf5a7b546d4108e796b98210ceb317579, it was introduced in version v5.11 by commit 30d6f8c15d2cd877c1f3d47d8a1064649ebe58e2. For more details please see the references link.
null
2022-04-25T05:58:20.542209Z
2022-04-24T21:17:15.695789Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/30d6f8c15d2cd877c1f3d47d8a1064649ebe58e2'}
Linux
GSD-2021-1002597
ALSA: pcm: oss: Limit the period size to 16MB
ALSA: pcm: oss: Limit the period size to 16MB This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.8 by commit 35a3e511032146941085f87dd9fb5b82ea5c00a2. For more details please see the references link.
null
2021-12-20T01:11:42.149065Z
2021-12-19T19:44:27.069170Z
null
null
null
null
null
Linux
GSD-2021-1000050
locking/qrwlock: Fix ordering in queued_write_lock_slowpath()
locking/qrwlock: Fix ordering in queued_write_lock_slowpath() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.115 by commit 82808cc026811fbc3ecf0c0b267a12a339eead56, it was introduced in version v4.15 by commit b519b56e378ee82caf9b079b04f5db87dedc3251. For more details please see the references link.
null
2021-12-20T00:47:51.437259Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b519b56e378ee82caf9b079b04f5db87dedc3251'}
Linux
GSD-2021-1001092
usb: dwc3: core: fix kernel panic when do reboot
usb: dwc3: core: fix kernel panic when do reboot This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit fa8c413e6b74ae5d12daf911c73238c5bdacd8e6, it was introduced in version v5.12.13 by commit afd8b0d091d5b4febe2d0ac3b7735c1826329302. For more details please see the references link.
null
2021-06-30T00:39:04.674242Z
2021-06-30T00:39:04.674242Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/afd8b0d091d5b4febe2d0ac3b7735c1826329302'}
Linux
GSD-2022-1002038
mmc: host: Return an error when ->enable_sdio_irq() ops is missing
mmc: host: Return an error when ->enable_sdio_irq() ops is missing This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 2412a5d29411d404698a15cd2f2b965afd57acd6. For more details please see the references link.
null
2022-04-25T05:10:36.465510Z
2022-04-24T22:05:16.767759Z
null
null
null
null
null
Linux
GSD-2021-1001568
blktrace: Fix uaf in blk_trace access after removing by sysfs
blktrace: Fix uaf in blk_trace access after removing by sysfs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.209 by commit 677e362ba807f3aafe6f405c07e0b37244da5222, it was introduced in version v2.6.30 by commit c71a896154119f4ca9e89d6078f5f63ad60ef199. For more details please see the references link.
null
2021-12-19T22:28:13.554547Z
2021-10-19T16:24:10.735377Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c71a896154119f4ca9e89d6078f5f63ad60ef199'}
Linux
GSD-2022-1000455
KVM: x86: nSVM: fix potential NULL derefernce on nested migration
KVM: x86: nSVM: fix potential NULL derefernce on nested migration This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit 74b426bea4f7e3b081add2b88d4fba16d3af7ab6, it was introduced in version v5.13 by commit 232f75d3b4b5456de6f0b671aa86345d62de1473. For more details please see the references link.
null
2022-03-07T01:33:39.177215Z
2022-02-27T03:09:19.683079Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/232f75d3b4b5456de6f0b671aa86345d62de1473'}
Linux
GSD-2022-1002468
mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0)
mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0) This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit a05540f3903bd8295e8c4cd90dd3d416239a115b. For more details please see the references link.
null
2022-04-25T04:44:36.905353Z
2022-04-24T22:51:36.823932Z
null
null
null
null
null
Linux
GSD-2022-1002192
Bluetooth: Fix use after free in hci_send_acl
Bluetooth: Fix use after free in hci_send_acl This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 3803d896ddd97c7c16689a5381c0960040727647. For more details please see the references link.
null
2022-04-25T05:48:22.332770Z
2022-04-24T22:20:31.879574Z
null
null
null
null
null
Linux
GSD-2021-1001138
psi: Fix psi state corruption when schedule() races with cgroup move
psi: Fix psi state corruption when schedule() races with cgroup move This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13 by commit d583d360a620e6229422b3455d0be082b8255f5e, it was introduced in version v5.13 by commit 4117cebf1a9fcbf35b9aabf0e37b6c5eea296798. For more details please see the references link.
null
2021-12-19T23:10:58.988224Z
2021-07-08T01:59:00.273246Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4117cebf1a9fcbf35b9aabf0e37b6c5eea296798'}
Linux
GSD-2021-1001991
media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()
media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.216 by commit 53ec9dab4eb0a8140fc85760fb50effb526fe219. For more details please see the references link.
null
2021-12-19T23:04:37.763128Z
2021-11-14T15:14:54.393953Z
null
null
null
null
null
Linux
GSD-2021-1000683
iommu/vt-d: Fix sysfs leak in alloc_iommu()
iommu/vt-d: Fix sysfs leak in alloc_iommu() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.235 by commit 22da9f4978381a99f1abaeaf6c9b83be6ab5ddd8, it was introduced in version v4.11 by commit 39ab9555c24110671f8dc671311a26e5c985b592. For more details please see the references link.
null
2021-12-19T23:01:06.894424Z
2021-06-04T20:01:33.812739Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/39ab9555c24110671f8dc671311a26e5c985b592'}
Linux
GSD-2022-1000906
mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work
mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.233 by commit 4aee73beb5c8434416206d7c783fa487f24f0391. For more details please see the references link.
null
2022-03-18T03:44:59.687024Z
2022-03-18T00:30:09.791826Z
null
null
null
null
null
Linux
GSD-2022-1001614
riscv: Increase stack size under KASAN
riscv: Increase stack size under KASAN This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit f32e1212e579b6faaa9b4afb303f4d7dd2ecd898, it was introduced in version v5.6 by commit 8ad8b72721d0f07fa02dbe71f901743f9c71c8e6. For more details please see the references link.
null
2022-04-25T03:24:43.256126Z
2022-04-24T21:28:19.581596Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ad8b72721d0f07fa02dbe71f901743f9c71c8e6'}
Linux
GSD-2021-1002344
staging: rtl8723bs: remove a second possible deadlock
staging: rtl8723bs: remove a second possible deadlock This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit 12cfdef56c3b809c3e25dba5366f01856b734c0b. For more details please see the references link.
null
2021-12-20T00:31:04.336168Z
2021-11-29T02:39:43.184178Z
null
null
null
null
null
Linux
GSD-2021-1000379
Drivers: hv: vmbus: Use after free in __vmbus_open()
Drivers: hv: vmbus: Use after free in __vmbus_open() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit d5c7b42c9f56ca46b286daa537d181bd7f69214f, it was introduced in version v4.14 by commit 6f3d791f300618caf82a2be0c27456edd76d5164. For more details please see the references link.
null
2021-12-19T22:26:22.387461Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6f3d791f300618caf82a2be0c27456edd76d5164'}
Linux
GSD-2022-1001244
drm/selftests/test-drm_dp_mst_helper: Fix memory leak in sideband_msg_req_encode_decode
drm/selftests/test-drm_dp_mst_helper: Fix memory leak in sideband_msg_req_encode_decode This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit f6d1fd0abaacce95fdccfc19fc2175d8d9b37bfb, it was introduced in version v5.11 by commit 09234b88ef5598252d1cee37e4d7b26a48b6557f. For more details please see the references link.
null
2022-04-25T03:58:58.403516Z
2022-04-24T20:57:20.648354Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/09234b88ef5598252d1cee37e4d7b26a48b6557f'}
Linux
GSD-2021-1002714
scsi: scsi_debug: Fix type in min_t to avoid stack OOB
scsi: scsi_debug: Fix type in min_t to avoid stack OOB This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.88 by commit bdb854f134b964528fa543e0351022eb45bd7346. For more details please see the references link.
null
2022-01-11T05:48:10.859615Z
2021-12-27T05:38:32.417231Z
null
null
null
null
null
Linux
GSD-2021-1000729
net: caif: fix memory leak in caif_device_notify
net: caif: fix memory leak in caif_device_notify This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.236 by commit 4bca2034b41c15b62d47a19158bb76235fd4455d, it was introduced in version v3.3 by commit 7c18d2205ea76eef9674e59e1ecae4f332a53e9e. For more details please see the references link.
null
2021-12-20T00:12:34.537438Z
2021-06-24T23:59:40.409453Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7c18d2205ea76eef9674e59e1ecae4f332a53e9e'}
Linux
GSD-2021-1002201
IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields
IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit d39bf40e55e666b5905fdbd46a0dced030ce87be, it was introduced in version v2.6.35 by commit f931551bafe1f10ded7f5282e2aa162c267a2e5d. For more details please see the references link.
null
2021-12-20T01:15:19.307465Z
2021-11-14T15:24:27.882761Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f931551bafe1f10ded7f5282e2aa162c267a2e5d'}
Linux
GSD-2022-1000843
tipc: fix a bit overflow in tipc_crypto_key_rcv()
tipc: fix a bit overflow in tipc_crypto_key_rcv() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.104 by commit e3850e211df6817e7a6c3999080a8bc4a63092c0. For more details please see the references link.
null
2022-03-18T03:00:43.451803Z
2022-03-18T00:23:14.770346Z
null
null
null
null
null
Linux
GSD-2022-1001751
io_uring: fix memory leak of uid in files registration
io_uring: fix memory leak of uid in files registration This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 0853bd6885c2f293d88aaa7f7f1702c959b31680, it was introduced in version v5.5 by commit 08a451739a9b5783f67de51e84cb6d9559bb9dc4. For more details please see the references link.
null
2022-04-25T05:25:24.971367Z
2022-04-24T21:39:30.662937Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/08a451739a9b5783f67de51e84cb6d9559bb9dc4'}
Linux
GSD-2021-1002651
dm btree remove: fix use after free in rebalance_children()
dm btree remove: fix use after free in rebalance_children() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.222 by commit 293f957be5e39720778fb1851ced7f5fba6d51c3. For more details please see the references link.
null
2022-01-11T05:53:25.104450Z
2021-12-27T05:33:15.372571Z
null
null
null
null
null
Linux
GSD-2021-1000396
KVM: x86/mmu: Alloc page for PDPTEs when shadowing 32-bit NPT with 64-bit
KVM: x86/mmu: Alloc page for PDPTEs when shadowing 32-bit NPT with 64-bit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit c8b49e01a23b0f5a97dc977812adaf042b474eb7, it was introduced in version v4.19 by commit ee6268ba3a6861b2806e569bff7fe91fbdf846dd. For more details please see the references link.
null
2021-12-19T23:18:12.238602Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ee6268ba3a6861b2806e569bff7fe91fbdf846dd'}
Linux
GSD-2022-1001301
mm,hwpoison: unmap poisoned page before invalidation
mm,hwpoison: unmap poisoned page before invalidation This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 622012d83efaa08c2b7cf32a00756920b8009aaa, it was introduced in version v5.17.2 by commit 6ab5aba503c6d3b926453f5ca18491e8a075e5cf. For more details please see the references link.
null
2022-04-24T21:02:22.973217Z
2022-04-24T21:02:22.973217Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6ab5aba503c6d3b926453f5ca18491e8a075e5cf'}
Linux
GSD-2022-1002487
video: fbdev: cirrusfb: check pixclock to avoid divide by zero
video: fbdev: cirrusfb: check pixclock to avoid divide by zero This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit c656d04247a2654ede5cead2ecbf83431dad5261. For more details please see the references link.
null
2022-04-25T04:34:28.443482Z
2022-04-24T22:53:22.436139Z
null
null
null
null
null
Linux
GSD-2022-1000140
net: ieee802154: ca8210: Stop leaking skb's
net: ieee802154: ca8210: Stop leaking skb's This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.228 by commit d6a44feb2f28d71a7e725f72d09c97c81561cd9a, it was introduced in version v4.12 by commit ded845a781a578dfb0b5b2c138e5a067aa3b1242. For more details please see the references link.
null
2022-02-19T15:41:24.366657Z
2022-02-18T21:46:25.765964Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ded845a781a578dfb0b5b2c138e5a067aa3b1242'}
Linux
GSD-2021-1001587
netfilter: ipset: Fix oversized kvmalloc() calls
netfilter: ipset: Fix oversized kvmalloc() calls This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.151 by commit 6f2f68640b8478b3bd385bc541ee517d7bdddf76. For more details please see the references link.
null
2021-12-19T22:27:49.478268Z
2021-10-19T16:25:06.394969Z
null
null
null
null
null
Linux
GSD-2022-1000510
net: dsa: bcm_sf2: don't use devres for mdiobus
net: dsa: bcm_sf2: don't use devres for mdiobus This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 08e1a3554e99a1a5bd2835907381e2383ee85cae, it was introduced in version v5.9 by commit ac3a68d56651c3dad2c12c7afce065fe15267f44. For more details please see the references link.
null
2022-03-07T01:33:01.533432Z
2022-02-27T03:16:50.616684Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac3a68d56651c3dad2c12c7afce065fe15267f44'}
Linux
GSD-2022-1002203
ax25: fix UAF bug in ax25_send_control()
ax25: fix UAF bug in ax25_send_control() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.190 by commit eaa7eb23fa76db45f7da1b6192518705863d0ebe, it was introduced in version v5.4.190 by commit 9e1e088a57c23251f1cfe9601bbd90ade2ea73b9. For more details please see the references link.
null
2022-04-24T22:21:21.932910Z
2022-04-24T22:21:21.932910Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9e1e088a57c23251f1cfe9601bbd90ade2ea73b9'}
Linux
GSD-2021-1001753
nexthop: Fix memory leaks in nexthop notification chain listeners
nexthop: Fix memory leaks in nexthop notification chain listeners This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.9 by commit 741760fa6252628a3d3afad439b72437d4b123d9, it was introduced in version v5.11 by commit 2a014b200bbd973cc96e082a5bc445fe20b50f32. For more details please see the references link.
null
2021-12-19T23:36:00.108458Z
2021-10-19T16:35:02.573087Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2a014b200bbd973cc96e082a5bc445fe20b50f32'}
Linux
GSD-2021-1000841
net/qla3xxx: fix schedule while atomic in ql_sem_spinlock
net/qla3xxx: fix schedule while atomic in ql_sem_spinlock This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.273 by commit f77d9c0c3aa0a1bc4f5882457b4e3d68938659f8. For more details please see the references link.
null
2021-12-20T00:12:48.763552Z
2021-06-30T00:00:42.625432Z
null
null
null
null
null
Linux
GSD-2021-1001303
mISDN: fix possible use-after-free in HFC_cleanup()
mISDN: fix possible use-after-free in HFC_cleanup() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.51 by commit b7ee9ae1e0cf55a037c4a99af2acc5d78cb7802d. For more details please see the references link.
null
2021-12-20T00:36:29.483329Z
2021-08-03T02:02:27.631709Z
null
null
null
null
null
Linux
GSD-2022-1000394
vsock: remove vsock from connected table when connect is interrupted by a signal
vsock: remove vsock from connected table when connect is interrupted by a signal This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.102 by commit 87cd1bbd6677411e17369cd4b7389ab1e1fdba44, it was introduced in version v3.9 by commit d021c344051af91f42c5ba9fdedc176740cbd238. For more details please see the references link.
null
2022-03-07T01:31:53.485261Z
2022-02-27T03:00:53.800460Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d021c344051af91f42c5ba9fdedc176740cbd238'}
Linux
GSD-2021-1002485
net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound
net: tulip: de4x5: fix the problem that the array 'lp->phy[8]' may be out of bound This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.84 by commit f059fa40f0fcc6bc7a12e0f2a2504e9a4ff74f1f. For more details please see the references link.
null
2021-12-19T23:04:49.698167Z
2021-12-19T19:39:25.798456Z
null
null
null
null
null
Linux
GSD-2021-1000142
NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds
NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.36 by commit 96fa26b74cdcf9f5c98996bf36bec9fb5b19ffe2, it was introduced in version v5.6 by commit 9954bf92c0cddd50a2a470be302e1c1ffdf21d42. For more details please see the references link.
null
2021-12-20T00:25:07.772979Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9954bf92c0cddd50a2a470be302e1c1ffdf21d42'}
Linux
GSD-2021-1000512
RDMA/rxe: Clear all QP fields if creation failed
RDMA/rxe: Clear all QP fields if creation failed This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.40 by commit 2ee4d79c364914989c80de382c0b1a7259a7e4b3, it was introduced in version v4.8 by commit 8700e3e7c4857d28ebaa824509934556da0b3e76. For more details please see the references link.
null
2021-12-20T01:39:48.583068Z
2021-05-31T23:48:40.851101Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8700e3e7c4857d28ebaa824509934556da0b3e76'}
Linux
GSD-2022-1001585
crypto: hisilicon/sec - fix the aead software fallback for engine
crypto: hisilicon/sec - fix the aead software fallback for engine This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit ef7b10f3cac7810ddcfd976304fd125aca33d144, it was introduced in version v5.14 by commit 6c46a3297beae4ae2d22b26da5e091f058381c7c. For more details please see the references link.
null
2022-04-25T04:37:08.756666Z
2022-04-24T21:26:26.016369Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6c46a3297beae4ae2d22b26da5e091f058381c7c'}
Linux
GSD-2022-1001090
net: dsa: felix: fix possible NULL pointer dereference
net: dsa: felix: fix possible NULL pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit b7ff8b5e75d4e91ec8c62d621aac8dfb84c57aa9, it was introduced in version v5.17 by commit 23ae3a7877718931474684ef4fbbaf1d1511ee84. For more details please see the references link.
null
2022-04-25T06:27:41.492122Z
2022-04-24T20:44:25.558434Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/23ae3a7877718931474684ef4fbbaf1d1511ee84'}
Linux
GSD-2021-1000457
spi: Fix use-after-free with devm_spi_alloc_*
spi: Fix use-after-free with devm_spi_alloc_* This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.191 by commit 28a5529068c51cdf0295ab1e11a99a3a909a03e4, it was introduced in version v4.19.163 by commit 234b432c7b6184b2d6c5ba2c55f0dd5023c0edf0. For more details please see the references link.
null
2021-12-19T22:43:42.608044Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/234b432c7b6184b2d6c5ba2c55f0dd5023c0edf0'}
Linux
GSD-2021-1002190
usbnet: sanity check for maxpacket
usbnet: sanity check for maxpacket This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 397430b50a363d8b7bdda00522123f82df6adc5e. For more details please see the references link.
null
2021-12-20T01:01:08.737172Z
2021-11-14T15:24:00.180361Z
null
null
null
null
null
Linux
GSD-2021-1001616
xen/x86: fix PV trap handling on secondary processors
xen/x86: fix PV trap handling on secondary processors This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.150 by commit d4e7647695c9b8cd7e75a208f0fd170bc15c50f1, it was introduced in version v2.6.23 by commit f87e4cac4f4e940b328d3deb5b53e642e3881f43. For more details please see the references link.
null
2021-12-20T01:34:30.390170Z
2021-10-19T16:28:27.100323Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f87e4cac4f4e940b328d3deb5b53e642e3881f43'}
Linux
GSD-2021-1000904
IB/mlx5: Fix initializing CQ fragments buffer
IB/mlx5: Fix initializing CQ fragments buffer This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.126 by commit e3ecd9c09fcc10cf6b2bc67e2990c397c40a8c26, it was introduced in version v4.17 by commit 388ca8be00370db132464e27f745b8a0add19fcb. For more details please see the references link.
null
2021-12-19T23:17:17.356424Z
2021-06-30T00:05:35.800068Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/388ca8be00370db132464e27f745b8a0add19fcb'}
Linux
GSD-2022-1000681
perf/x86/intel/pt: Fix crash with stop filters in single-range mode
perf/x86/intel/pt: Fix crash with stop filters in single-range mode This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.8 by commit feffb6ae2c80b9a8206450cdef90f5943baced99, it was introduced in version v5.5 by commit 670638477aede0d7a355ced04b569214aa3feacd. For more details please see the references link.
null
2022-03-07T01:46:30.827150Z
2022-02-27T03:40:20.013749Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/670638477aede0d7a355ced04b569214aa3feacd'}
Linux
GSD-2022-1001993
staging: wfx: fix an error handling in wfx_init_common()
staging: wfx: fix an error handling in wfx_init_common() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit 93498c6e775ae91732a8109dba1bdcd324908f84. For more details please see the references link.
null
2022-04-25T05:13:52.433252Z
2022-04-24T22:01:44.511006Z
null
null
null
null
null
Linux
GSD-2022-1002346
NFS: remove unneeded check in decode_devicenotify_args()
NFS: remove unneeded check in decode_devicenotify_args() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 97cc035bdfe754dbfbc2c9b04bc46bc71ef5bc93, it was introduced in version v4.0 by commit a4f743a6bb201662962fa888e3f978583d61691e. For more details please see the references link.
null
2022-04-25T03:52:17.398242Z
2022-04-24T22:36:24.124572Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a4f743a6bb201662962fa888e3f978583d61691e'}
Linux
GSD-2021-1001246
xdp, net: Fix use-after-free in bpf_xdp_link_release
xdp, net: Fix use-after-free in bpf_xdp_link_release This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.54 by commit ca9ba1de8f09976b45ccc8e655c51c6201992139, it was introduced in version v5.9 by commit aa8d3a716b59db6c1ad6c68fb8aa05e31980da60. For more details please see the references link.
null
2021-12-19T22:54:09.448334Z
2021-08-03T01:48:07.550408Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/aa8d3a716b59db6c1ad6c68fb8aa05e31980da60'}
Linux
GSD-2022-1001839
mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init
mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit fe0e2ce5c87e9c0b9485ff566362030aa55972cf, it was introduced in version v4.12 by commit f88fc122cc34c2545dec9562eaab121494e401ef. For more details please see the references link.
null
2022-04-25T06:42:11.740718Z
2022-04-24T21:46:52.750181Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f88fc122cc34c2545dec9562eaab121494e401ef'}
Linux
GSD-2021-1002743
rds: memory leak in __rds_conn_create()
rds: memory leak in __rds_conn_create() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit 68014890e4382ff9192e1357be39b7d0455665fa, it was introduced in version v5.13 by commit aced3ce57cd37b5ca332bcacd370d01f5a8c5371. For more details please see the references link.
null
2022-01-11T05:52:46.258343Z
2021-12-27T05:46:08.106683Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/aced3ce57cd37b5ca332bcacd370d01f5a8c5371'}
Linux
GSD-2021-1000284
crypto: sa2ul - Fix memory leak of rxd
crypto: sa2ul - Fix memory leak of rxd This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit b7bd0657c2036add71981d88a7fae50188150b6e, it was introduced in version v5.10 by commit 00c9211f60db2dead16856f81a3e6ab86b31f275. For more details please see the references link.
null
2021-12-20T00:21:07.603323Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/00c9211f60db2dead16856f81a3e6ab86b31f275'}
Linux
GSD-2022-1001213
powerpc: 8xx: fix a return value error in mpc8xx_pic_init
powerpc: 8xx: fix a return value error in mpc8xx_pic_init This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit b3795097173784c9985dcf374c995274d199f3ef, it was introduced in version v5.2 by commit cc76404feaed597bb4f5234d34d3f49e2d1139bf. For more details please see the references link.
null
2022-04-25T06:27:58.499309Z
2022-04-24T20:54:17.349852Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cc76404feaed597bb4f5234d34d3f49e2d1139bf'}
Linux
GSD-2021-1002313
NFC: reorder the logic in nfc_{un,}register_device
NFC: reorder the logic in nfc_{un,}register_device This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit 8a9c61c3ef187d8891225f9b932390670a43a0d3, it was introduced in version v3.10 by commit be055b2f89b5842f41363b5655a33dffb51a8294. For more details please see the references link.
null
2021-12-20T01:33:44.347881Z
2021-11-29T02:38:19.519781Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/be055b2f89b5842f41363b5655a33dffb51a8294'}
Linux
GSD-2022-1000951
openvswitch: Fix setting ipv6 fields causing hw csum failure
openvswitch: Fix setting ipv6 fields causing hw csum failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.304 by commit 952d01d70a5b90808e8c808f96fbfd432644975e, it was introduced in version v3.8 by commit 3fdbd1ce11e5c0d7cafbe44c942c5cad61113d7b. For more details please see the references link.
null
2022-03-18T02:49:53.841744Z
2022-03-18T00:36:14.818497Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3fdbd1ce11e5c0d7cafbe44c942c5cad61113d7b'}
Linux
GSD-2022-1001643
ipv6: fix panic when forwarding a pkt with no in6 dev
ipv6: fix panic when forwarding a pkt with no in6 dev This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.35 by commit adee01bbf6cb5b3e4ed08be8ff866aac90f13836, it was introduced in version v5.14 by commit ccd27f05ae7b8ebc40af5b004e94517a919aa862. For more details please see the references link.
null
2022-04-25T06:38:43.593641Z
2022-04-24T21:31:04.176215Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ccd27f05ae7b8ebc40af5b004e94517a919aa862'}
Linux
GSD-2021-1001495
ipack: ipoctal: fix module reference leak
ipack: ipoctal: fix module reference leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.286 by commit 31398849b84ebae0d43a1cf379cb9895597f221a, it was introduced in version v3.18 by commit 82a82340bab6c251e0705339f60763718eaa2a22. For more details please see the references link.
null
2021-12-20T01:39:35.130459Z
2021-10-19T16:20:48.958149Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/82a82340bab6c251e0705339f60763718eaa2a22'}
Linux
GSD-2022-1000402
perf bpf: Defer freeing string after possible strlen() on it
perf bpf: Defer freeing string after possible strlen() on it This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.102 by commit d3018a19622115e1126f6abb3657c65877a99410, it was introduced in version v5.8 by commit 04f9bf2bac72480ca1d289b751b956dd1707a5d5. For more details please see the references link.
null
2022-03-07T01:34:07.733489Z
2022-02-27T03:01:49.400647Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/04f9bf2bac72480ca1d289b751b956dd1707a5d5'}
Linux
GSD-2022-1000052
net/smc: fix kernel panic caused by race of smc_sock
net/smc: fix kernel panic caused by race of smc_sock This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.13 by commit b85f751d71ae8e2a15e9bda98852ea9af35282eb, it was introduced in version v4.11 by commit 5f08318f617b05b6ee389d8bd174c7af921ebf19. For more details please see the references link.
null
2022-01-11T05:54:40.804223Z
2022-01-10T19:51:56.319975Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5f08318f617b05b6ee389d8bd174c7af921ebf19'}
Linux
GSD-2022-1000547
ipv4: fix data races in fib_alias_hw_flags_set
ipv4: fix data races in fib_alias_hw_flags_set This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit 7ab65ea30c174e3a7e1bb4fe9cd92cc2625002e7, it was introduced in version v5.6 by commit 90b93f1b31f86dcde2fa3c57f1ae33d28d87a1f8. For more details please see the references link.
null
2022-03-07T01:34:52.377855Z
2022-02-27T03:21:51.843265Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/90b93f1b31f86dcde2fa3c57f1ae33d28d87a1f8'}
Linux
GSD-2022-1002080
RDMA/mlx5: Fix memory leak in error flow for subscribe event routine
RDMA/mlx5: Fix memory leak in error flow for subscribe event routine This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit c98d903ff9e79c210beddea4e6bc15ac38e25aa5, it was introduced in version v5.3 by commit 7597385371425febdaa8c6a1da3625d4ffff16f5. For more details please see the references link.
null
2022-04-25T06:23:53.462066Z
2022-04-24T22:08:48.889863Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7597385371425febdaa8c6a1da3625d4ffff16f5'}
Linux
GSD-2021-1001180
memory: fsl_ifc: fix leak of private memory on probe failure
memory: fsl_ifc: fix leak of private memory on probe failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.4 by commit a6b45b4932f7b0c36b41fb56a35ad679ece939a0, it was introduced in version v3.3 by commit a20cbdeffce247a2b6fb83cd8d22433994068565. For more details please see the references link.
null
2021-12-19T22:51:10.523189Z
2021-08-03T01:32:51.502174Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a20cbdeffce247a2b6fb83cd8d22433994068565'}
Linux
GSD-2022-1000117
tipc: improve size validations for received domain records
tipc: improve size validations for received domain records This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.266 by commit fde4ddeadd099bf9fbb9ccbee8e1b5c20d530a2d, it was introduced in version v4.8 by commit 35c55c9877f8de0ab129fa1a309271d0ecc868b9. For more details please see the references link.
null
2022-02-19T10:55:42.933505Z
2022-02-18T21:43:00.646814Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/35c55c9877f8de0ab129fa1a309271d0ecc868b9'}
Linux
GSD-2022-1001356
rxrpc: fix a race in rxrpc_exit_net()
rxrpc: fix a race in rxrpc_exit_net() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 41024a40f6c793abbb916a857f18fb009f07464c, it was introduced in version v4.17 by commit ace45bec6d77bc061c3c3d8ad99e298ea9800c2b. For more details please see the references link.
null
2022-04-25T06:16:59.481403Z
2022-04-24T21:07:20.908764Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ace45bec6d77bc061c3c3d8ad99e298ea9800c2b'}
Linux
GSD-2021-1001929
comedi: ni_usb6501: fix NULL-deref in command paths
comedi: ni_usb6501: fix NULL-deref in command paths This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.292 by commit 58478143771b20ab219937b1c30a706590a59224, it was introduced in version v3.18 by commit a03bb00e50ab4c07107da58a52a0bff7943f360c. For more details please see the references link.
null
2021-12-19T23:57:11.845963Z
2021-11-14T15:12:08.112612Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a03bb00e50ab4c07107da58a52a0bff7943f360c'}
Linux
GSD-2021-1002606
i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc
i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.8 by commit 16431e442db248ecd8aa9457cf0a656f1885f56e, it was introduced in version v3.12 by commit 02e9c290814cc143ceccecb14eac3e7a05da745e. For more details please see the references link.
null
2021-12-19T23:57:37.623376Z
2021-12-19T19:44:48.203342Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/02e9c290814cc143ceccecb14eac3e7a05da745e'}
Linux
GSD-2021-1001883
ocfs2: fix data corruption after conversion from inline format
ocfs2: fix data corruption after conversion from inline format This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit fa9b6b6c953e3f6441ed6cf83b4c771dac2dae08, it was introduced in version v5.10 by commit 6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b. For more details please see the references link.
null
2021-12-20T01:26:35.963215Z
2021-10-28T13:53:48.747361Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6dbf7bb555981fb5faf7b691e8f6169fc2b2e63b'}
Linux
GSD-2021-1000791
efi/fdt: fix panic when no valid fdt found
efi/fdt: fix panic when no valid fdt found This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.10 by commit 8a7e8b4e5631a03ea2fee27957857a56612108ca, it was introduced in version v5.10 by commit b91540d52a08b65eb6a2b09132e1bd54fa82754c. For more details please see the references link.
null
2021-12-20T01:37:27.511705Z
2021-06-25T00:05:52.674457Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b91540d52a08b65eb6a2b09132e1bd54fa82754c'}
Linux
GSD-2022-1000814
ice: fix concurrent reset and removal of VFs
ice: fix concurrent reset and removal of VFs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.26 by commit 3c805fce07c9dbc47d8a9129c7c5458025951957, it was introduced in version v5.14 by commit c503e63200c679e362afca7aca9d3dc63a0f45ed. For more details please see the references link.
null
2022-03-18T03:00:09.375231Z
2022-03-18T00:21:01.170389Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c503e63200c679e362afca7aca9d3dc63a0f45ed'}
Linux
GSD-2022-1001706
staging: wfx: fix an error handling in wfx_init_common()
staging: wfx: fix an error handling in wfx_init_common() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 86efcb524ae1889ae73f2a2f0bb7fff2ec757ab0. For more details please see the references link.
null
2022-04-25T04:23:21.749196Z
2022-04-24T21:36:43.591601Z
null
null
null
null
null
Linux
GSD-2021-1002256
cfg80211: call cfg80211_stop_ap when switch from P2P_GO type
cfg80211: call cfg80211_stop_ap when switch from P2P_GO type This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.162 by commit 52affc201fc22a1ab9a59ef0ed641a9adfcb8d13, it was introduced in version v3.6 by commit ac800140c20e7ae51117e71289065bedd4930fc2. For more details please see the references link.
null
2021-12-20T00:40:02.283533Z
2021-11-29T02:35:38.439272Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac800140c20e7ae51117e71289065bedd4930fc2'}
Linux
GSD-2022-1001593
exec: Force single empty string when argv is empty
exec: Force single empty string when argv is empty This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit a8054d3fa5deb84b215d6be1b910a978f3cb840d. For more details please see the references link.
null
2022-04-25T04:13:28.708022Z
2022-04-24T21:27:00.856866Z
null
null
null
null
null
Linux
GSD-2021-1002539
arm64: uaccess: avoid blocking within critical sections
arm64: uaccess: avoid blocking within critical sections This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.6 by commit ff1a30740f7aa78699cea964640df6ff4f034bb5, it was introduced in version v5.11 by commit f253d827f33cb5a5990b5cfd271941d1a21ecd85. For more details please see the references link.
null
2021-12-20T01:27:53.981741Z
2021-12-19T19:41:49.267994Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f253d827f33cb5a5990b5cfd271941d1a21ecd85'}
Linux
GSD-2021-1000504
habanalabs/gaudi: Fix a potential use after free in gaudi_memset_device_memory
habanalabs/gaudi: Fix a potential use after free in gaudi_memset_device_memory This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.7 by commit b49f5af30b0e4064fbd91e83823a4bfcb2c7a3e7, it was introduced in version v5.12 by commit 423815bf02e257091d5337be5c63b57fc29e4254. For more details please see the references link.
null
2021-12-19T22:45:08.998857Z
2021-05-31T23:47:22.860213Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/423815bf02e257091d5337be5c63b57fc29e4254'}
Linux
GSD-2022-1001069
drm/amdgpu: Fix recursive locking warning
drm/amdgpu: Fix recursive locking warning This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit c6e64930e0f0587591c849db137b4a1ffbf4f546. For more details please see the references link.
null
2022-04-25T04:42:19.466807Z
2022-04-24T20:43:22.848800Z
null
null
null
null
null
Linux
GSD-2021-1002169
can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv
can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit d9d52a3ebd284882f5562c88e55991add5d01586, it was introduced in version v5.4 by commit 9d71dd0c70099914fcd063135da3c580865e924c. For more details please see the references link.
null
2021-12-20T00:57:00.044995Z
2021-11-14T15:23:01.913232Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9d71dd0c70099914fcd063135da3c580865e924c'}
Linux
GSD-2021-1000154
ACPI: custom_method: fix potential use-after-free issue
ACPI: custom_method: fix potential use-after-free issue This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.36 by commit 62dc2440ebb552aa0d7f635e1697e077d9d21203, it was introduced in version v5.4 by commit 03d1571d9513369c17e6848476763ebbd10ec2cb. For more details please see the references link.
null
2021-12-19T22:58:06.481252Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/03d1571d9513369c17e6848476763ebbd10ec2cb'}
Linux
GSD-2021-1002493
net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources()
net/mlx4_en: Fix an use-after-free bug in mlx4_en_try_alloc_resources() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.84 by commit f1d43efa59f1edd3e7eca0e94559b4c6b1cd4e2b, it was introduced in version v4.7 by commit ec25bc04ed8e12947738468cbe2191f1529f9e39. For more details please see the references link.
null
2021-12-20T00:56:13.954387Z
2021-12-19T19:39:45.849251Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ec25bc04ed8e12947738468cbe2191f1529f9e39'}
Linux
GSD-2022-1001439
KVM: SVM: fix panic on out-of-bounds guest IRQ
KVM: SVM: fix panic on out-of-bounds guest IRQ This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit e4d153d53d9648513481eb4ef8c212e7f1f8173d. For more details please see the references link.
null
2022-04-25T05:14:59.078289Z
2022-04-24T21:13:19.754517Z
null
null
null
null
null
Linux
GSD-2022-1000382
perf: Fix list corruption in perf_cgroup_switch()
perf: Fix list corruption in perf_cgroup_switch() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.101 by commit f6b5d51976fcefef5732da3e3feb3ccff680f7c8, it was introduced in version v4.11 by commit 058fe1c0440e68a1ba3c2270ae43e9f0298b27d8. For more details please see the references link.
null
2022-03-07T01:43:59.221579Z
2022-02-27T02:58:50.142415Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/058fe1c0440e68a1ba3c2270ae43e9f0298b27d8'}
Linux
GSD-2021-1001315
cifs: prevent NULL deref in cifs_compose_mount_options()
cifs: prevent NULL deref in cifs_compose_mount_options() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.135 by commit f7d1fa65e74263d11f90ddd33b4d4cd905a93759. For more details please see the references link.
null
2021-12-20T00:09:48.370675Z
2021-08-03T02:06:29.694916Z
null
null
null
null
null
Linux
GSD-2022-1000678
scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe
scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.8 by commit 2d24336c7214b281b51860e54783dfc65f1248df, it was introduced in version v3.16 by commit d576a5e80cd07ea7049f8fd7b303c14df7b5d7d2. For more details please see the references link.
null
2022-03-07T01:44:47.253740Z
2022-02-27T03:39:59.564022Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d576a5e80cd07ea7049f8fd7b303c14df7b5d7d2'}
Linux
GSD-2021-1000857
kvm: avoid speculation-based attacks from out-of-range memslot accesses
kvm: avoid speculation-based attacks from out-of-range memslot accesses This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.237 by commit 361ce3b917aff93123e9e966d8608655c967f438. For more details please see the references link.
null
2021-12-19T23:56:47.592946Z
2021-06-30T00:01:50.479337Z
null
null
null
null
null
Linux
GSD-2021-1001745
nvme-rdma: destroy cm id before destroy qp to avoid use after free
nvme-rdma: destroy cm id before destroy qp to avoid use after free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.9 by commit d268a182c56e8361e19fb781137411643312b994. For more details please see the references link.
null
2021-12-19T22:49:33.740424Z
2021-10-19T16:34:38.998183Z
null
null
null
null
null
Linux
GSD-2022-1000228
iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping()
iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.99 by commit 9d9995b0371e4e8c18d4f955479e5d47efe7b2d4, it was introduced in version v5.8 by commit e3beca48a45b5e0e6e6a4e0124276b8248dcc9bb. For more details please see the references link.
null
2022-02-19T09:37:21.559873Z
2022-02-18T21:58:43.161556Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e3beca48a45b5e0e6e6a4e0124276b8248dcc9bb'}
Linux
GSD-2022-1002215
video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow
video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 055cdd2e7b992921424d4daaa285ced787fb205f. For more details please see the references link.
null
2022-04-25T04:06:17.865681Z
2022-04-24T22:22:33.755334Z
null
null
null
null
null
Linux
GSD-2021-1001250
igb: Fix use-after-free error during reset
igb: Fix use-after-free error during reset This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.54 by commit f153664d8e70c11d0371341613651e1130e20240, it was introduced in version v4.12 by commit 7cc6fd4c60f267e17b0baef1580d7a6258c0a6f0. For more details please see the references link.
null
2021-12-19T22:53:52.458681Z
2021-08-03T01:48:37.699992Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7cc6fd4c60f267e17b0baef1580d7a6258c0a6f0'}
Linux
GSD-2022-1002350
mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init
mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 9843c9c98f26c6ad843260b19bfdaa2598f2ae1e, it was introduced in version v4.12 by commit f88fc122cc34c2545dec9562eaab121494e401ef. For more details please see the references link.
null
2022-04-25T04:20:25.510060Z
2022-04-24T22:37:06.001950Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f88fc122cc34c2545dec9562eaab121494e401ef'}
Linux
GSD-2022-1001985
Drivers: hv: vmbus: Fix potential crash on module unload
Drivers: hv: vmbus: Fix potential crash on module unload This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit cf580d2e3884dbafd6b90269b03a24d661578624, it was introduced in version v5.7 by commit 74347a99e73ae00b8385f1209aaea193c670f901. For more details please see the references link.
null
2022-04-25T06:23:13.211504Z
2022-04-24T22:01:07.680806Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/74347a99e73ae00b8385f1209aaea193c670f901'}
Linux
GSD-2022-1000697
net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe()
net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.13 by commit ca0bdff4249a644f2ca7a49d410d95b8dacf1f72, it was introduced in version v3.18 by commit 8c14f9c70327a6fb75534c4c61d7ea9c82ccf78f. For more details please see the references link.
null
2022-03-18T02:52:07.863769Z
2022-03-18T00:10:23.781652Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c14f9c70327a6fb75534c4c61d7ea9c82ccf78f'}
Linux
GSD-2021-1000912
mm/memory-failure: make sure wait for page writeback in memory_failure
mm/memory-failure: make sure wait for page writeback in memory_failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.128 by commit 566345aaabac853aa866f53a219c4b02a6beb527, it was introduced in version v3.16 by commit 0bc1f8b0682caa39f45ce1e0228ebf43acb46111. For more details please see the references link.
null
2021-12-20T01:09:09.300936Z
2021-06-30T00:06:05.693380Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0bc1f8b0682caa39f45ce1e0228ebf43acb46111'}
Linux
GSD-2021-1001600
cpufreq: schedutil: Use kobject release() method to free sugov_tunables
cpufreq: schedutil: Use kobject release() method to free sugov_tunables This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.151 by commit 67c98e023135ff81b8d52998a6fdb8ca0c518d82, it was introduced in version v4.7 by commit 9bdcb44e391da5c41b98573bf0305a0e0b1c9569. For more details please see the references link.
null
2021-12-20T00:48:47.185525Z
2021-10-19T16:27:42.451767Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9bdcb44e391da5c41b98573bf0305a0e0b1c9569'}
Linux
GSD-2021-1002186
scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els()
scsi: qla2xxx: Fix a memory leak in an error path of qla2x00_process_els() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 7fb223d0ad801f633c78cbe42b1d1b55f5d163ad, it was introduced in version v3.11 by commit 8c0eb596baa51f2b43949c698c644727ef17805c. For more details please see the references link.
null
2021-12-20T01:14:31.564203Z
2021-11-14T15:23:50.358560Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c0eb596baa51f2b43949c698c644727ef17805c'}
Linux
GSD-2021-1000441
rtw88: Fix array overrun in rtw_get_tx_power_params()
rtw88: Fix array overrun in rtw_get_tx_power_params() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.119 by commit 6b5aa0cf321c25f41e09a61c83ee4dc7ab9549cb, it was introduced in version v5.3 by commit fa6dfe6bff246ddd5be3cfe81637f137acd6c294. For more details please see the references link.
null
2021-12-19T23:26:31.138913Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fa6dfe6bff246ddd5be3cfe81637f137acd6c294'}
Linux
GSD-2022-1001086
Bluetooth: fix null ptr deref on hci_sync_conn_complete_evt
Bluetooth: fix null ptr deref on hci_sync_conn_complete_evt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit f61c23e73dc653b957781066abfa8105c3fa3f5b. For more details please see the references link.
null
2022-04-25T04:20:34.143876Z
2022-04-24T20:44:11.834275Z
null
null
null
null
null