ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2021-1000011
bpf: Use correct permission flag for mixed signed bounds arithmetic
bpf: Use correct permission flag for mixed signed bounds arithmetic This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.16 by commit 4ccdc6c6cae38b91c871293fb0ed8c6845a61b51, it was introduced in version v5.8 by commit 2c78ee898d8f10ae6fb2fa23a3fbaec96b1b7366. For more details please see the references link.
null
2021-12-19T23:42:39.775596Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c78ee898d8f10ae6fb2fa23a3fbaec96b1b7366'}
Linux
GSD-2022-1002079
bpf, sockmap: Fix memleak in tcp_bpf_sendmsg while sk msg is full
bpf, sockmap: Fix memleak in tcp_bpf_sendmsg while sk msg is full This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit bec34a91eba3483e1830c02bdd36f8f968642047, it was introduced in version v4.20 by commit 604326b41a6fb9b4a78b6179335decee0365cd8c. For more details please see the references link.
null
2022-04-25T04:43:47.250059Z
2022-04-24T22:08:43.235058Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/604326b41a6fb9b4a78b6179335decee0365cd8c'}
Linux
GSD-2022-1000044
net/smc: fix kernel panic caused by race of smc_sock
net/smc: fix kernel panic caused by race of smc_sock This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.90 by commit e8a5988a85c719ce7205cb00dcf0716dcf611332, it was introduced in version v4.11 by commit 5f08318f617b05b6ee389d8bd174c7af921ebf19. For more details please see the references link.
null
2022-01-11T05:47:08.564460Z
2022-01-10T19:51:36.290632Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5f08318f617b05b6ee389d8bd174c7af921ebf19'}
Linux
GSD-2021-1001529
netfilter: ipset: Fix oversized kvmalloc() calls
netfilter: ipset: Fix oversized kvmalloc() calls This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.249 by commit 633bd6d69eac5deffbaeab4b33b34c7a98a7fc2c. For more details please see the references link.
null
2021-12-20T00:52:37.572857Z
2021-10-19T16:22:24.806776Z
null
null
null
null
null
Linux
GSD-2022-1002429
pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe
pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 0356d4b64a03d23daf99a2a29d7d7d91d6ec2ea8, it was introduced in version v3.9 by commit 32e67eee670e1254ee5ab41e2f454680acb9c17c. For more details please see the references link.
null
2022-04-25T06:29:59.194848Z
2022-04-24T22:46:03.765081Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/32e67eee670e1254ee5ab41e2f454680acb9c17c'}
Linux
GSD-2022-1000414
net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change
net/sunrpc: fix reference count leaks in rpc_sysfs_xprt_state_change This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit 4b22aa42bd4d2d630ef1854c139275c3532937cb. For more details please see the references link.
null
2022-03-07T01:50:13.964698Z
2022-02-27T03:03:50.722132Z
null
null
null
null
null
Linux
GSD-2021-1001483
jfs: fix GPF in diFree
jfs: fix GPF in diFree This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.276 by commit 7bde24bde490f3139eee147efc6d60d6040fe975. For more details please see the references link.
null
2021-12-19T23:43:28.955454Z
2021-08-03T02:54:45.255195Z
null
null
null
null
null
Linux
GSD-2021-1001179
memory: fsl_ifc: fix leak of IO mapping on probe failure
memory: fsl_ifc: fix leak of IO mapping on probe failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.4 by commit 28f71fd81ebd3b386bf5c7c5539664156f7d72c1, it was introduced in version v3.3 by commit a20cbdeffce247a2b6fb83cd8d22433994068565. For more details please see the references link.
null
2021-12-19T23:05:38.698568Z
2021-08-03T01:32:47.733135Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a20cbdeffce247a2b6fb83cd8d22433994068565'}
Linux
GSD-2022-1001655
drm/amdkfd: Check for potential null return of kmalloc_array()
drm/amdkfd: Check for potential null return of kmalloc_array() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.35 by commit f2658d5966bcee8c3eb487875f459756d4f7cdfc. For more details please see the references link.
null
2022-04-25T04:45:12.293675Z
2022-04-24T21:31:58.575213Z
null
null
null
null
null
Linux
GSD-2022-1000947
usb: gadget: rndis: add spinlock for rndis response list
usb: gadget: rndis: add spinlock for rndis response list This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.304 by commit 9f5d8ba538ef81cd86ea587ca3f8c77e26bea405, it was introduced in version v4.6 by commit f6281af9d62e128aa6efad29cf7265062af114f2. For more details please see the references link.
null
2022-03-18T02:55:12.020251Z
2022-03-18T00:35:24.938101Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f6281af9d62e128aa6efad29cf7265062af114f2'}
Linux
GSD-2021-1000338
ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook
ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.38 by commit 630146203108bf6b8934eec0dfdb3e46dcb917de, it was introduced in version v4.7 by commit 1879445dfa7bbd6fe21b09c5cc72f4934798afed. For more details please see the references link.
null
2021-12-19T22:01:38.803362Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1879445dfa7bbd6fe21b09c5cc72f4934798afed'}
Linux
GSD-2021-1002305
drm/prime: Fix use after free in mmap with drm_gem_ttm_mmap
drm/prime: Fix use after free in mmap with drm_gem_ttm_mmap This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit 4f8e469a2384dfa4047145b0093126462cbb6dc0, it was introduced in version v5.5 by commit 9786b65bc61acec63f923978c75e707afbb74bc7. For more details please see the references link.
null
2021-12-20T01:20:40.686458Z
2021-11-29T02:37:53.367552Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9786b65bc61acec63f923978c75e707afbb74bc7'}
Linux
GSD-2022-1001205
RDMA/mlx5: Fix memory leak in error flow for subscribe event routine
RDMA/mlx5: Fix memory leak in error flow for subscribe event routine This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 414b4e8738484379f18d6c4e780787c80dbf8a2c, it was introduced in version v5.3 by commit 7597385371425febdaa8c6a1da3625d4ffff16f5. For more details please see the references link.
null
2022-04-25T04:26:09.185518Z
2022-04-24T20:53:35.860556Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7597385371425febdaa8c6a1da3625d4ffff16f5'}
Linux
GSD-2021-1000292
crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init
crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 1ea500ce6f7c9106e4a561d28e69215f3d451818, it was introduced in version v4.7 by commit 25c6ffb249f612c56a48ce48a3887adf57b8f4bd. For more details please see the references link.
null
2021-12-19T23:17:04.736792Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/25c6ffb249f612c56a48ce48a3887adf57b8f4bd'}
Linux
GSD-2021-1000768
bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks
bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.43 by commit ff5039ec75c83d2ed5b781dc7733420ee8c985fc, it was introduced in version v5.6 by commit 59438b46471ae6cdfb761afc8c9beaf1e428a331. For more details please see the references link.
null
2021-12-20T01:10:50.803448Z
2021-06-25T00:04:23.006028Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/59438b46471ae6cdfb761afc8c9beaf1e428a331'}
Linux
GSD-2021-1002755
net: stmmac: dwmac-rk: fix oob read in rk_gmac_setup
net: stmmac: dwmac-rk: fix oob read in rk_gmac_setup This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit 0b4a5d1e15ce72f69be48f38dc0401dab890ae0f, it was introduced in version v5.14 by commit 3bb3d6b1c1957e88bfc5e77a4557f7e6ba761fe3. For more details please see the references link.
null
2022-01-11T05:52:38.831136Z
2021-12-27T05:48:25.600817Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3bb3d6b1c1957e88bfc5e77a4557f7e6ba761fe3'}
Linux
GSD-2021-1002240
usb: host: ohci-tmio: check return value after calling platform_get_resource()
usb: host: ohci-tmio: check return value after calling platform_get_resource() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.256 by commit bb6ed2e05eb6e8619b30fa854f9becd50c11723f. For more details please see the references link.
null
2021-12-20T00:51:43.729812Z
2021-11-29T02:34:49.526482Z
null
null
null
null
null
Linux
GSD-2022-1001710
netfilter: conntrack: revisit gc autotuning
netfilter: conntrack: revisit gc autotuning This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 58d52743ae85d28c9335c6034d6ce350b8689951. For more details please see the references link.
null
2022-04-25T03:20:53.967958Z
2022-04-24T21:36:55.154415Z
null
null
null
null
null
Linux
GSD-2022-1000802
configfs: fix a race in configfs_{,un}register_subsystem()
configfs: fix a race in configfs_{,un}register_subsystem() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.26 by commit e7a66dd2687758718eddd79b542a95cf3aa488cc, it was introduced in version v2.6.16 by commit 7063fbf2261194f72ee75afca67b3b38b554b5fa. For more details please see the references link.
null
2022-03-18T03:03:59.320115Z
2022-03-18T00:19:41.644974Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7063fbf2261194f72ee75afca67b3b38b554b5fa'}
Linux
GSD-2021-1000787
xen-netback: take a reference to the RX task thread
xen-netback: take a reference to the RX task thread This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.43 by commit 6b53db8c4c14b4e7256f058d202908b54a7b85b4, it was introduced in version v5.5 by commit 2ac061ce97f413bfbbdd768f7d2e0fda2e8170df. For more details please see the references link.
null
2021-12-20T00:53:26.051384Z
2021-06-25T00:05:38.133445Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2ac061ce97f413bfbbdd768f7d2e0fda2e8170df'}
Linux
GSD-2021-1001895
ice: fix locking for Tx timestamp tracking flush
ice: fix locking for Tx timestamp tracking flush This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit 61616be899975404df44c20ab902464b60882cd7, it was introduced in version v5.14.4 by commit 46720ac66c21bf85e08823664b7b314b85e43f26. For more details please see the references link.
null
2021-12-19T22:54:13.686749Z
2021-10-28T13:54:32.559581Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/46720ac66c21bf85e08823664b7b314b85e43f26'}
Linux
GSD-2021-1002610
nfc: fix segfault in nfc_genl_dump_devices_done
nfc: fix segfault in nfc_genl_dump_devices_done This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.296 by commit ea55b3797878752aa076b118afb727dcf79cac34. For more details please see the references link.
null
2022-01-11T05:56:55.340739Z
2021-12-27T05:27:07.621865Z
null
null
null
null
null
Linux
GSD-2022-1001340
SUNRPC: Ensure we flush any closed sockets before xs_xprt_free()
SUNRPC: Ensure we flush any closed sockets before xs_xprt_free() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 7a0921a23cae42e9fa5ce964f6907181b6dc80d8, it was introduced in version v5.1 by commit a73881c96d73ee72b7dbbd38a6eeef66182a8ef7. For more details please see the references link.
null
2022-04-25T04:34:09.901903Z
2022-04-24T21:05:59.598928Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a73881c96d73ee72b7dbbd38a6eeef66182a8ef7'}
Linux
GSD-2022-1000101
scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put()
scsi: bnx2fc: Flush destroy_work queue before calling bnx2fc_interface_put() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.265 by commit c93a290c862ccfa404e42d7420565730d67cbff9, it was introduced in version v3.2 by commit 0cbf32e1681d870632a1772601cbaadd996dc978. For more details please see the references link.
null
2022-02-20T06:16:40.596811Z
2022-02-18T21:35:18.562548Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0cbf32e1681d870632a1772601cbaadd996dc978'}
Linux
GSD-2021-1001196
iommu/arm-smmu: Fix arm_smmu_device refcount leak in address translation
iommu/arm-smmu: Fix arm_smmu_device refcount leak in address translation This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.4 by commit 5f9741a9a91f25c89e04b408cd61e3ab050ce24b. For more details please see the references link.
null
2021-12-19T22:54:07.702725Z
2021-08-03T01:34:42.753856Z
null
null
null
null
null
Linux
GSD-2022-1002096
drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes()
drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 19a7eba284790cfbba2945deb2363cf03ce41648, it was introduced in version v4.15 by commit e7b07ceef2a650e5ed8ca37997689e086c680daf. For more details please see the references link.
null
2022-04-25T06:31:30.129199Z
2022-04-24T22:10:40.197072Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e7b07ceef2a650e5ed8ca37997689e086c680daf'}
Linux
GSD-2022-1000551
mctp: fix use after free
mctp: fix use after free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit 1dd3ecbec5f606b2a526c47925c8634b1a6bb81e, it was introduced in version v5.16 by commit 4f9e1ba6de45aa8797a83f1fe5b82ec4bac16899. For more details please see the references link.
null
2022-03-07T01:37:35.230262Z
2022-02-27T03:22:58.351677Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4f9e1ba6de45aa8797a83f1fe5b82ec4bac16899'}
Linux
GSD-2022-1002242
RDMA/mlx5: Fix memory leak in error flow for subscribe event routine
RDMA/mlx5: Fix memory leak in error flow for subscribe event routine This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 0174a89663a5ef83617da15bf24c0af2f62b6c7f, it was introduced in version v5.3 by commit 7597385371425febdaa8c6a1da3625d4ffff16f5. For more details please see the references link.
null
2022-04-25T02:56:20.842911Z
2022-04-24T22:25:06.950319Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7597385371425febdaa8c6a1da3625d4ffff16f5'}
Linux
GSD-2022-1001897
crypto: hisilicon/sec - fix the aead software fallback for engine
crypto: hisilicon/sec - fix the aead software fallback for engine This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 40dba7c26e897c637e91312b35f664f1d4d0073c, it was introduced in version v5.14 by commit 6c46a3297beae4ae2d22b26da5e091f058381c7c. For more details please see the references link.
null
2022-04-25T06:39:21.904418Z
2022-04-24T21:53:06.150082Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6c46a3297beae4ae2d22b26da5e091f058381c7c'}
Linux
GSD-2022-1000785
usb: gadget: clear related members when goto fail
usb: gadget: clear related members when goto fail This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.27 by commit ab3656acb7b4f33a30970a920ed90f0db36d940b. For more details please see the references link.
null
2022-03-18T02:57:32.365935Z
2022-03-18T00:17:55.988136Z
null
null
null
null
null
Linux
GSD-2021-1000800
ice: track AF_XDP ZC enabled queues in bitmap
ice: track AF_XDP ZC enabled queues in bitmap This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.10 by commit 1d34fa4fcf06649036ba0c97854fcf7a741ee18c, it was introduced in version v5.12 by commit c7a219048e459cf99c6fec0f7c1e42414e9e6202. For more details please see the references link.
null
2021-12-20T01:25:14.995465Z
2021-06-25T00:08:12.108676Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c7a219048e459cf99c6fec0f7c1e42414e9e6202'}
Linux
GSD-2021-1001712
HID: usbhid: free raw_report buffers in usbhid_stop
HID: usbhid: free raw_report buffers in usbhid_stop This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit 2b704864c92dcec2b295f276fcfbfb81d9831f81. For more details please see the references link.
null
2021-12-20T00:18:04.669701Z
2021-10-19T16:33:05.834517Z
null
null
null
null
null
Linux
GSD-2021-1001342
fbmem: Do not delete the mode that is still in use
fbmem: Do not delete the mode that is still in use This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.134 by commit 359311b85ebec7c07c3a08ae2f3def946cad33fa, it was introduced in version v5.3 by commit 13ff178ccd6d3b8074c542a911300b79c4eec255. For more details please see the references link.
null
2021-12-19T23:59:30.995985Z
2021-08-03T02:13:22.411947Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/13ff178ccd6d3b8074c542a911300b79c4eec255'}
Linux
GSD-2022-1001194
af_netlink: Fix shift out of bounds in group mask calculation
af_netlink: Fix shift out of bounds in group mask calculation This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit e23e1e981247feb3c7d0236fe58aceb685f234ae, it was introduced in version v2.6.14 by commit f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198. For more details please see the references link.
null
2022-04-25T06:03:48.500490Z
2022-04-24T20:52:45.977869Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198'}
Linux
GSD-2021-1000103
ext4: fix check to prevent false positive report of incorrect used inodes
ext4: fix check to prevent false positive report of incorrect used inodes This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.20 by commit f42789ee5f96743cdb5f69445cab3609458733f7, it was introduced in version v4.18 by commit 5012284700775a4e6e3fbe7eac4c543c4874b559. For more details please see the references link.
null
2021-12-20T01:36:20.907590Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5012284700775a4e6e3fbe7eac4c543c4874b559'}
Linux
GSD-2021-1002094
net: mscc: ocelot: avoid overflowing the PTP timestamp FIFO
net: mscc: ocelot: avoid overflowing the PTP timestamp FIFO This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit 3b4241817601a2f59beea471baa51763d7262232, it was introduced in version v5.4 by commit 4e3b0468e6d7f3c38ce52320803769b49ba87930. For more details please see the references link.
null
2021-12-20T01:09:39.605263Z
2021-11-14T15:19:39.837428Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4e3b0468e6d7f3c38ce52320803769b49ba87930'}
Linux
GSD-2021-1000553
tipc: skb_linearize the head skb when reassembling msgs
tipc: skb_linearize the head skb when reassembling msgs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit ace300eecbccaa698e2b472843c74a5f33f7dce8, it was introduced in version v4.3 by commit 45c8b7b175ceb2d542e0fe15247377bf3bce29ec. For more details please see the references link.
null
2021-12-19T22:15:31.772318Z
2021-06-04T19:37:38.821224Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/45c8b7b175ceb2d542e0fe15247377bf3bce29ec'}
Linux
GSD-2021-1000046
net: hso: fix NULL-deref on disconnect regression
net: hso: fix NULL-deref on disconnect regression This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.33 by commit 90642ee9eb581a13569b1c0bd57e85d962215273, it was introduced in version v5.10.30 by commit dc195928d7e4ec7b5cfc6cd10dc4c8d87a7c72ac. For more details please see the references link.
null
2021-12-20T01:29:19.747096Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/dc195928d7e4ec7b5cfc6cd10dc4c8d87a7c72ac'}
Linux
GSD-2021-1002581
serial: liteuart: fix use-after-free and memleak on unbind
serial: liteuart: fix use-after-free and memleak on unbind This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.7 by commit 602824cf9aa9db8830ffe5cfb2cd54365cada4fe, it was introduced in version v5.11 by commit 1da81e5562fac8286567422cc56a7fbd0dc646d4. For more details please see the references link.
null
2021-12-19T22:55:33.983269Z
2021-12-19T19:43:40.171813Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1da81e5562fac8286567422cc56a7fbd0dc646d4'}
Linux
GSD-2022-1001481
selinux: allow FIOCLEX and FIONCLEX with policy capability
selinux: allow FIOCLEX and FIONCLEX with policy capability This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit b2ec24277169ea5b68d6c25f9885afe5b711ff5a. For more details please see the references link.
null
2022-04-25T04:49:27.202800Z
2022-04-24T21:15:56.369764Z
null
null
null
null
null
Linux
GSD-2021-1000416
ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook
ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.120 by commit 3ed8832aeaa9a37b0fc386bb72ff604352567c80, it was introduced in version v4.7 by commit 1879445dfa7bbd6fe21b09c5cc72f4934798afed. For more details please see the references link.
null
2021-12-19T23:40:57.165617Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1879445dfa7bbd6fe21b09c5cc72f4934798afed'}
Linux
GSD-2021-1000945
ALSA: seq: Fix race of snd_seq_timer_open()
ALSA: seq: Fix race of snd_seq_timer_open() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.44 by commit bd7d88b0874f82f7b29d1a53e574cedaf23166ba. For more details please see the references link.
null
2021-12-19T23:15:34.777412Z
2021-06-30T00:26:11.672359Z
null
null
null
null
null
Linux
GSD-2021-1001657
cpufreq: schedutil: Use kobject release() method to free sugov_tunables
cpufreq: schedutil: Use kobject release() method to free sugov_tunables This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.71 by commit a7d4fc84404d45d72f4490417e8cc3efa4af93f1, it was introduced in version v4.7 by commit 9bdcb44e391da5c41b98573bf0305a0e0b1c9569. For more details please see the references link.
null
2021-12-20T00:38:17.124196Z
2021-10-19T16:30:21.206052Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9bdcb44e391da5c41b98573bf0305a0e0b1c9569'}
Linux
GSD-2022-1002307
qede: confirm skb is allocated before using
qede: confirm skb is allocated before using This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 9648adb1b3ece55c657d3a4f52bfee663b710dfe, it was introduced in version v4.18 by commit 8a8633978b842c88fbcfe00d4e5dde96048f630e. For more details please see the references link.
null
2022-04-25T04:44:08.858248Z
2022-04-24T22:32:51.330951Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8a8633978b842c88fbcfe00d4e5dde96048f630e'}
Linux
GSD-2022-1000290
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.303 by commit 711b6bf3fb052f0a6b5b3205d50e30c0c2980382, it was introduced in version v3.9 by commit e2ca90c276e1fc410d7cd3c1a4eee245ec902a20. For more details please see the references link.
null
2022-03-07T01:33:35.719041Z
2022-02-27T02:38:53.661607Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e2ca90c276e1fc410d7cd3c1a4eee245ec902a20'}
Linux
GSD-2021-1001207
smackfs: restrict bytes count in smk_set_cipso()
smackfs: restrict bytes count in smk_set_cipso() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.3 by commit 258fd821f69378453c071b9dd767b298810fc766. For more details please see the references link.
null
2021-12-19T22:20:14.166561Z
2021-08-03T01:37:29.477790Z
null
null
null
null
null
Linux
GSD-2022-1001878
ASoC: codecs: va-macro: fix accessing array out of bounds for enum type
ASoC: codecs: va-macro: fix accessing array out of bounds for enum type This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 966408e37d84b762d11978b7bfb03fff0c6222ad, it was introduced in version v5.11 by commit 908e6b1df26efc9d2df70c9a7bf4f5eae5c5702f. For more details please see the references link.
null
2022-04-25T03:35:08.832915Z
2022-04-24T21:51:10.569913Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/908e6b1df26efc9d2df70c9a7bf4f5eae5c5702f'}
Linux
GSD-2021-1002702
rds: memory leak in __rds_conn_create()
rds: memory leak in __rds_conn_create() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.88 by commit 74dc97dfb276542f12746d706abef63364d816bb, it was introduced in version v5.10.44 by commit e806df71eed223ab8ca099c61a41f3e9a576733f. For more details please see the references link.
null
2022-01-11T05:52:17.920510Z
2021-12-27T05:37:51.971268Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e806df71eed223ab8ca099c61a41f3e9a576733f'}
Linux
GSD-2022-1001252
ASoC: atmel: Fix error handling in sam9x5_wm8731_driver_probe
ASoC: atmel: Fix error handling in sam9x5_wm8731_driver_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit f43ad5dc43240289f4cf13c16cc506f4f7087931, it was introduced in version v3.12 by commit fdbcb3cba54b29a37dfe42acdc0e72c543e0807d. For more details please see the references link.
null
2022-04-25T03:38:53.217745Z
2022-04-24T20:58:01.696759Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fdbcb3cba54b29a37dfe42acdc0e72c543e0807d'}
Linux
GSD-2022-1001602
drbd: fix potential silent data corruption
drbd: fix potential silent data corruption This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit b5073d72d06d95ad406a99acbdd499026b55f8e0. For more details please see the references link.
null
2022-04-25T04:42:24.573673Z
2022-04-24T21:27:34.221485Z
null
null
null
null
null
Linux
GSD-2022-1000910
RDMA/ib_srp: Fix a deadlock
RDMA/ib_srp: Fix a deadlock This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.232 by commit d7997d19dfa7001ca41e971cd9efd091bb195b51, it was introduced in version v3.8 by commit ef6c49d87c3418c442a22e55e3ce2f91b163d69e. For more details please see the references link.
null
2022-03-18T03:00:27.561924Z
2022-03-18T00:30:53.839948Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef6c49d87c3418c442a22e55e3ce2f91b163d69e'}
Linux
GSD-2021-1000695
net: usb: fix memory leak in smsc75xx_bind
net: usb: fix memory leak in smsc75xx_bind This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.271 by commit 22c840596af0c09068b6cf948616e6496e59e07f, it was introduced in version v2.6.34 by commit d0cad871703b898a442e4049c532ec39168e5b57. For more details please see the references link.
null
2021-12-20T00:56:21.397541Z
2021-06-04T20:04:07.734215Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0cad871703b898a442e4049c532ec39168e5b57'}
Linux
GSD-2021-1001987
IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields
IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.216 by commit 73d2892148aa4397a885b4f4afcfc5b27a325c42, it was introduced in version v2.6.35 by commit f931551bafe1f10ded7f5282e2aa162c267a2e5d. For more details please see the references link.
null
2021-12-19T22:26:59.778400Z
2021-11-14T15:14:44.314078Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f931551bafe1f10ded7f5282e2aa162c267a2e5d'}
Linux
GSD-2022-1002184
net: ipv4: fix route with nexthop object delete warning
net: ipv4: fix route with nexthop object delete warning This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit f5064531c23ad646da7be8b938292b00a7e61438, it was introduced in version v5.3 by commit 4c7e8084fd467ddb2b0e6c6011f9c1064afb7e56. For more details please see the references link.
null
2022-04-25T05:16:42.456242Z
2022-04-24T22:19:49.716259Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4c7e8084fd467ddb2b0e6c6011f9c1064afb7e56'}
Linux
GSD-2022-1000443
s390/cio: verify the driver availability for path_event call
s390/cio: verify the driver availability for path_event call This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit fe990b7bf6ac93f1d850d076b8f0e758268aa4ab, it was introduced in version v5.11 by commit 32ef938815c1fb42d65212aac860ab153a64de1a. For more details please see the references link.
null
2022-03-07T01:44:12.878804Z
2022-02-27T03:07:54.571245Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/32ef938815c1fb42d65212aac860ab153a64de1a'}
Linux
GSD-2022-1000013
net: fix use-after-free in tw_timer_handler
net: fix use-after-free in tw_timer_handler This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.296 by commit e73164e89d1be561228a4534e1091369ee4ba41a, it was introduced in version v2.6.27 by commit 61a7e26028b94805fd686a6dc9dbd9941f8f19b0. For more details please see the references link.
null
2022-01-11T06:33:52.070961Z
2022-01-10T19:50:10.460337Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61a7e26028b94805fd686a6dc9dbd9941f8f19b0'}
Linux
GSD-2021-1001084
powerpc/perf: Fix crash in perf_instruction_pointer() when ppmu is not set
powerpc/perf: Fix crash in perf_instruction_pointer() when ppmu is not set This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit 74c3c34a04bc226f77b9e515aa067072cff44e52, it was introduced in version v5.11 by commit 2ca13a4cc56c920a6c9fc8ee45d02bccacd7f46c. For more details please see the references link.
null
2021-12-19T22:12:04.589402Z
2021-06-30T00:38:33.569650Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2ca13a4cc56c920a6c9fc8ee45d02bccacd7f46c'}
Linux
GSD-2022-1000506
tcp: take care of mixed splice()/sendmsg(MSG_ZEROCOPY) case
tcp: take care of mixed splice()/sendmsg(MSG_ZEROCOPY) case This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 47f3860c4931175f112f28dcac66eacca9b1040f, it was introduced in version v5.16 by commit f1a456f8f3fc5828d8abcad941860380ae147b1d. For more details please see the references link.
null
2022-03-07T01:33:00.863965Z
2022-02-27T03:16:23.610740Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f1a456f8f3fc5828d8abcad941860380ae147b1d'}
Linux
GSD-2021-1001591
ipack: ipoctal: fix stack information leak
ipack: ipoctal: fix stack information leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.151 by commit 8657158a3b68c85234e6da3d8eae33d6183588b7, it was introduced in version v3.5 by commit ba4dc61fe8c545a5d6a68b63616776556b771f51. For more details please see the references link.
null
2021-12-20T01:18:33.520153Z
2021-10-19T16:25:18.067871Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ba4dc61fe8c545a5d6a68b63616776556b771f51'}
Linux
GSD-2022-1000156
net: fix information leakage in /proc/net/ptype
net: fix information leakage in /proc/net/ptype This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.176 by commit e372ecd455b6ebc7720f52bf4b5f5d44d02f2092, it was introduced in version v2.6.26 by commit 2feb27dbe00cbb4f7d31f90acf6bd0d751dd0a50. For more details please see the references link.
null
2022-02-19T03:01:03.533912Z
2022-02-18T21:48:15.222582Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2feb27dbe00cbb4f7d31f90acf6bd0d751dd0a50'}
Linux
GSD-2022-1002491
PM: core: keep irq flags in device_pm_check_callbacks()
PM: core: keep irq flags in device_pm_check_callbacks() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit 3ec80d52b9b74b9e691997632a543c73eddfeba0. For more details please see the references link.
null
2022-04-25T04:52:19.072975Z
2022-04-24T22:53:33.817666Z
null
null
null
null
null
Linux
GSD-2022-1001317
NFSD: prevent underflow in nfssvc_decode_writeargs()
NFSD: prevent underflow in nfssvc_decode_writeargs() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 413d8fefafe531a9442bb623e3fe292a38f88d65. For more details please see the references link.
null
2022-04-25T05:04:13.012328Z
2022-04-24T21:04:08.181697Z
null
null
null
null
null
Linux
GSD-2021-1000380
memory: renesas-rpc-if: fix possible NULL pointer dereference of resource
memory: renesas-rpc-if: fix possible NULL pointer dereference of resource This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 71bcc1b4a1743534d8abdcb57ff912e6bc390438, it was introduced in version v5.9 by commit ca7d8b980b67f133317525c4273e144116ee1ae5. For more details please see the references link.
null
2021-12-19T23:31:25.105136Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca7d8b980b67f133317525c4273e144116ee1ae5'}
Linux
GSD-2021-1002647
mac80211: track only QoS data frames for admission control
mac80211: track only QoS data frames for admission control This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.222 by commit 69f054d6642c8f6173724ce17e7ee3ff66b8f682, it was introduced in version v3.19 by commit 02219b3abca59fca81711bfe7ee78df7abad97ce. For more details please see the references link.
null
2022-01-11T05:48:02.526012Z
2021-12-27T05:32:42.900337Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/02219b3abca59fca81711bfe7ee78df7abad97ce'}
Linux
GSD-2021-1001968
media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()
media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.255 by commit 8d6c05da808f8351db844b69a9d6ce7f295214bb. For more details please see the references link.
null
2021-12-20T01:07:04.003042Z
2021-11-14T15:13:50.226246Z
null
null
null
null
null
Linux
GSD-2022-1001747
docs: sysctl/kernel: add missing bit to panic_print
docs: sysctl/kernel: add missing bit to panic_print This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 3fc38521fc3007af03c606d37997cbb75caa4361, it was introduced in version v5.2 by commit de6da1e8bcf0dd2058b950b127491821207679dc. For more details please see the references link.
null
2022-04-25T06:47:00.529311Z
2022-04-24T21:39:05.871267Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/de6da1e8bcf0dd2058b950b127491821207679dc'}
Linux
GSD-2022-1000855
configfs: fix a race in configfs_{,un}register_subsystem()
configfs: fix a race in configfs_{,un}register_subsystem() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.103 by commit a7ab53d3c27dfe83bb594456b9f38a37796ec39b, it was introduced in version v2.6.16 by commit 7063fbf2261194f72ee75afca67b3b38b554b5fa. For more details please see the references link.
null
2022-03-18T04:18:31.959470Z
2022-03-18T00:24:49.921183Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7063fbf2261194f72ee75afca67b3b38b554b5fa'}
Linux
GSD-2021-1002217
cfg80211: call cfg80211_stop_ap when switch from P2P_GO type
cfg80211: call cfg80211_stop_ap when switch from P2P_GO type This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.293 by commit 8f06bb8c216bcd172394f61e557727e691b4cb24, it was introduced in version v3.6 by commit ac800140c20e7ae51117e71289065bedd4930fc2. For more details please see the references link.
null
2021-12-19T23:29:30.058311Z
2021-11-29T02:33:53.483670Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac800140c20e7ae51117e71289065bedd4930fc2'}
Linux
GSD-2021-1002260
i40e: Fix NULL ptr dereference on VSI filter sync
i40e: Fix NULL ptr dereference on VSI filter sync This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.162 by commit c30162da91327e4cdf7cd03079f096bb3654738c, it was introduced in version v3.12 by commit 41c445ff0f482bb6e6b72dcee9e598e20575f743. For more details please see the references link.
null
2021-12-20T00:00:59.403154Z
2021-11-29T02:35:49.421195Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41c445ff0f482bb6e6b72dcee9e598e20575f743'}
Linux
GSD-2022-1001730
tcp: Don't acquire inet_listen_hashbucket::lock with disabled BH.
tcp: Don't acquire inet_listen_hashbucket::lock with disabled BH. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit aa9c9fd0ef9d83bdca5203fa72ebeadedd2a8400. For more details please see the references link.
null
2022-04-25T06:35:55.387552Z
2022-04-24T21:38:05.798507Z
null
null
null
null
null
Linux
GSD-2022-1000822
xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
xen/netfront: react properly to failing gnttab_end_foreign_access_ref() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.105 by commit 206c8e271ba2630f1d809123945d9c428f93b0f0. For more details please see the references link.
null
2022-03-18T03:01:06.104070Z
2022-03-18T00:21:30.066955Z
null
null
null
null
null
Linux
GSD-2021-1002630
firmware: arm_scpi: Fix string overflow in SCPI genpd driver
firmware: arm_scpi: Fix string overflow in SCPI genpd driver This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.259 by commit 4694b1ec425a2d20d6f8ca3db594829fdf5f2672, it was introduced in version v4.8 by commit 8bec4337ad4023b26de35d3b0c3a3b2735ffc5c7. For more details please see the references link.
null
2022-01-11T05:52:27.796166Z
2021-12-27T05:28:01.478395Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8bec4337ad4023b26de35d3b0c3a3b2735ffc5c7'}
Linux
GSD-2022-1000988
veth: Ensure eth header is in skb's linear part
veth: Ensure eth header is in skb's linear part This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.4 by commit 46bc359fec0c6d87b70d7a008bcd9a5e30dd6f27, it was introduced in version v2.6.24 by commit e314dbdc1c0dc6a548ecf0afce28ecfd538ff568. For more details please see the references link.
null
2022-04-25T08:03:28.374821Z
2022-04-24T20:37:40.580673Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e314dbdc1c0dc6a548ecf0afce28ecfd538ff568'}
Linux
GSD-2022-1001360
IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition
IB/rdmavt: add lock to call to rvt_error_qp to prevent a race condition This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 77ffb2495a41098f9d6a14f8aefde3188da75944, it was introduced in version v5.1 by commit d757c60eca9b22f4d108929a24401e0fdecda0b1. For more details please see the references link.
null
2022-04-25T04:23:30.169901Z
2022-04-24T21:07:48.190262Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d757c60eca9b22f4d108929a24401e0fdecda0b1'}
Linux
GSD-2022-1000121
udf: Fix NULL ptr deref when converting from inline format
udf: Fix NULL ptr deref when converting from inline format This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.228 by commit a23a59717f9f01a49394488f515550f9382fbada, it was introduced in version v4.2 by commit 52ebea749aaed195245701a8f90a23d672c7a933. For more details please see the references link.
null
2022-02-19T02:47:32.312051Z
2022-02-18T21:43:28.140454Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/52ebea749aaed195245701a8f90a23d672c7a933'}
Linux
GSD-2022-1000571
ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx()
ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.22 by commit b0a7836ecf1345814a7d8ef748fb797c520dad18. For more details please see the references link.
null
2022-03-07T03:22:47.942294Z
2022-02-27T03:25:16.188678Z
null
null
null
null
null
Linux
GSD-2022-1000064
tomoyo: Check exceeded quota early in tomoyo_domain_quota_is_ok().
tomoyo: Check exceeded quota early in tomoyo_domain_quota_is_ok(). This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.13 by commit 3fe6a63b5dbdc0864f01d3171046af03d34ee747. For more details please see the references link.
null
2022-01-11T05:56:45.876512Z
2022-01-10T19:52:30.876811Z
null
null
null
null
null
Linux
GSD-2022-1002059
fs: fix fd table size alignment properly
fs: fix fd table size alignment properly This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit e600b5973e808848a23eeba3fdbb9b288e5558c1, it was introduced in version v5.10.110 by commit 00d2b9fe5e02b41c6e4d7a4c1171cc6dd3008617. For more details please see the references link.
null
2022-04-24T22:06:20.175918Z
2022-04-24T22:06:20.175918Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/00d2b9fe5e02b41c6e4d7a4c1171cc6dd3008617'}
Linux
GSD-2021-1001509
ipack: ipoctal: fix module reference leak
ipack: ipoctal: fix module reference leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.285 by commit c0adb5a947dec6cff7050ec56d78ecd3916f9ce6, it was introduced in version v3.18 by commit 82a82340bab6c251e0705339f60763718eaa2a22. For more details please see the references link.
null
2021-12-20T00:05:51.660669Z
2021-10-19T16:21:27.053562Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/82a82340bab6c251e0705339f60763718eaa2a22'}
Linux
GSD-2022-1000434
net: do not keep the dst cache when uncloning an skb dst and its metadata
net: do not keep the dst cache when uncloning an skb dst and its metadata This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit f1ab1ba32d36bae06fabe41c0ff2edc5b2ce628d, it was introduced in version v4.6 by commit d71785ffc7e7cae3fbdc4ea8a9d05b7a1c59f7b8. For more details please see the references link.
null
2022-03-07T01:35:43.343422Z
2022-02-27T03:06:53.644609Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d71785ffc7e7cae3fbdc4ea8a9d05b7a1c59f7b8'}
Linux
GSD-2022-1002409
iommu/arm-smmu-v3: fix event handling soft lockup
iommu/arm-smmu-v3: fix event handling soft lockup This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 5e580cce4d58b35e0ceb875578a53b49cc2e98b1. For more details please see the references link.
null
2022-04-25T05:31:15.870975Z
2022-04-24T22:44:17.927809Z
null
null
null
null
null
Linux
GSD-2021-1001159
xdp, net: Fix use-after-free in bpf_xdp_link_release
xdp, net: Fix use-after-free in bpf_xdp_link_release This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.6 by commit a7537dc73e69ad9c0b67ad24ad3ebee954ed0af6, it was introduced in version v5.9 by commit aa8d3a716b59db6c1ad6c68fb8aa05e31980da60. For more details please see the references link.
null
2021-12-20T00:58:46.682900Z
2021-08-03T01:31:23.793929Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/aa8d3a716b59db6c1ad6c68fb8aa05e31980da60'}
Linux
GSD-2022-1001675
RDMA/hfi1: Fix use-after-free bug for mm struct
RDMA/hfi1: Fix use-after-free bug for mm struct This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 9ca11bd8222a612de0d2f54d050bfcf61ae2883f, it was introduced in version v5.10 by commit 3d2a9d642512c21a12d19b9250e7a835dcb41a79. For more details please see the references link.
null
2022-04-25T06:52:49.336380Z
2022-04-24T21:34:04.896723Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3d2a9d642512c21a12d19b9250e7a835dcb41a79'}
Linux
GSD-2022-1000967
net: usb: aqc111: Fix out-of-bounds accesses in RX fixup
net: usb: aqc111: Fix out-of-bounds accesses in RX fixup This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.4 by commit 36311fe98f55dea9200c69e2dd6d6ddb8fc94080. For more details please see the references link.
null
2022-04-25T06:45:12.318452Z
2022-04-24T20:35:46.876217Z
null
null
null
null
null
Linux
GSD-2021-1002325
NFSD: Fix exposure in nfsd4_decode_bitmap()
NFSD: Fix exposure in nfsd4_decode_bitmap() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit 10c22d9519f3f5939de61a1500aa3a926b778d3a, it was introduced in version v5.11 by commit d1c263a031e876ac3ca5223c728e4d98ed50b3c0. For more details please see the references link.
null
2021-12-20T01:26:31.639887Z
2021-11-29T02:38:49.016586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d1c263a031e876ac3ca5223c728e4d98ed50b3c0'}
Linux
GSD-2021-1000318
usb: dwc3: gadget: Free gadget structure only after freeing endpoints
usb: dwc3: gadget: Free gadget structure only after freeing endpoints This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.38 by commit 1ea775021282d90e1d08d696b7ab54aa75d688e5, it was introduced in version v5.10 by commit e81a7018d93a7de31a3f121c9a7eecd0a5ec58b0. For more details please see the references link.
null
2021-12-20T00:35:17.477134Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e81a7018d93a7de31a3f121c9a7eecd0a5ec58b0'}
Linux
GSD-2022-1001225
drm/msm/dp: populate connector of struct dp_panel
drm/msm/dp: populate connector of struct dp_panel This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 104074ebc0c3f358dd1ee944fbcde92c6e5a21dd, it was introduced in version v5.15 by commit 7948fe12d47a946fb8025a0534c900e3dd4b5839. For more details please see the references link.
null
2022-04-25T05:11:41.585238Z
2022-04-24T20:55:43.806664Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7948fe12d47a946fb8025a0534c900e3dd4b5839'}
Linux
GSD-2021-1002775
phonet/pep: refuse to enable an unbound pipe
phonet/pep: refuse to enable an unbound pipe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.297 by commit 0bbdd62ce9d44f3a22059b3d20a0df977d9f6d59. For more details please see the references link.
null
2022-01-11T05:47:54.990195Z
2021-12-30T02:42:55.607713Z
null
null
null
null
null
Linux
GSD-2021-1000748
net: caif: add proper error handling
net: caif: add proper error handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.125 by commit c97cdb70b72d0eb81ad43c8722a78522c4a9b5be, it was introduced in version v3.3 by commit 7c18d2205ea76eef9674e59e1ecae4f332a53e9e. For more details please see the references link.
null
2021-12-19T23:34:29.975338Z
2021-06-25T00:02:13.136104Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7c18d2205ea76eef9674e59e1ecae4f332a53e9e'}
Linux
GSD-2021-1000898
usb: dwc3: ep0: fix NULL pointer exception
usb: dwc3: ep0: fix NULL pointer exception This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.126 by commit 366369b89bedd59b1425386e8d4a18a466e420e4. For more details please see the references link.
null
2021-12-20T01:09:02.317564Z
2021-06-30T00:05:13.770044Z
null
null
null
null
null
Linux
GSD-2021-1001270
NFSv4: Initialise connection to the server in nfs4_alloc_client()
NFSv4: Initialise connection to the server in nfs4_alloc_client() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.52 by commit ff4023d0194263a0827c954f623c314978cf7ddd, it was introduced in version v4.8 by commit 5c6e5b60aae4347223f176966455010a5715b863. For more details please see the references link.
null
2021-12-20T01:01:32.259540Z
2021-08-03T01:53:55.718992Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5c6e5b60aae4347223f176966455010a5715b863'}
Linux
GSD-2022-1002370
mm,hwpoison: unmap poisoned page before invalidation
mm,hwpoison: unmap poisoned page before invalidation This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 79a8b36e124001547906f3612959fa548b58bb95, it was introduced in version v4.19.238 by commit e83d4184908c4ebd6adfd3e1252439af91d6b0e9. For more details please see the references link.
null
2022-04-24T22:39:43.894627Z
2022-04-24T22:39:43.894627Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e83d4184908c4ebd6adfd3e1252439af91d6b0e9'}
Linux
GSD-2021-1000932
net: ll_temac: Fix TX BD buffer overwrite
net: ll_temac: Fix TX BD buffer overwrite This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.128 by commit b6c0ab11c88fb016bfc85fa4f6f878f5f4263646, it was introduced in version v5.4.27 by commit 0c050d6554757f1be861b9f288406989c4053449. For more details please see the references link.
null
2021-12-19T23:30:44.142250Z
2021-06-30T00:25:21.355857Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0c050d6554757f1be861b9f288406989c4053449'}
Linux
GSD-2021-1001620
drm/amdgpu: fix gart.bo pin_count leak
drm/amdgpu: fix gart.bo pin_count leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.74 by commit 621ddffb70db824eabd63d18ac635180fe9500f9. For more details please see the references link.
null
2021-12-20T01:25:33.790165Z
2021-10-19T16:28:37.750498Z
null
null
null
null
null
Linux
GSD-2021-1000461
crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init
crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.191 by commit 09d16cee6285d37cc76311c29add6d97a7e4acda, it was introduced in version v4.7 by commit 25c6ffb249f612c56a48ce48a3887adf57b8f4bd. For more details please see the references link.
null
2021-12-19T22:57:29.402085Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/25c6ffb249f612c56a48ce48a3887adf57b8f4bd'}
Linux
GSD-2021-1000031
dmaengine: idxd: fix wq cleanup of WQCFG registers
dmaengine: idxd: fix wq cleanup of WQCFG registers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.32 by commit e5eb9757fe4c2392e069246ae78badc573af1833, it was introduced in version v5.8 by commit da32b28c95a79e399e18c03f8178f41aec9c66e4. For more details please see the references link.
null
2021-12-19T23:10:06.015530Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/da32b28c95a79e399e18c03f8178f41aec9c66e4'}
Linux
GSD-2021-1000524
Bluetooth: SMP: Fail if remote and local public keys are identical
Bluetooth: SMP: Fail if remote and local public keys are identical This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.192 by commit 30126d4ba73119565f1748b116b9869ac6bbda6b, it was introduced in version v3.17 by commit bfe01a5ba2490f299e1d2d5508cbbbadd897bbe9. For more details please see the references link.
null
2021-12-19T23:23:01.720647Z
2021-05-31T23:51:06.203776Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bfe01a5ba2490f299e1d2d5508cbbbadd897bbe9'}
Linux
GSD-2021-1002519
iio: mma8452: Fix trigger reference couting
iio: mma8452: Fix trigger reference couting This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.85 by commit db12d95085367de8b0223929d1332731024441f1, it was introduced in version v4.2 by commit ae6d9ce05691bf79694074db7c7da980080548af. For more details please see the references link.
null
2021-12-20T01:22:04.619653Z
2021-12-19T19:40:54.110932Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ae6d9ce05691bf79694074db7c7da980080548af'}
Linux
GSD-2022-1001049
PCI: endpoint: Fix misused goto label
PCI: endpoint: Fix misused goto label This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit d3642fc64276b06446290f82fd45630aeaa4b007. For more details please see the references link.
null
2022-04-25T08:29:55.004820Z
2022-04-24T20:42:25.192483Z
null
null
null
null
null
Linux
GSD-2021-1000174
tpm: efi: Use local variable for calculating final log size
tpm: efi: Use local variable for calculating final log size This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.118 by commit 2f12258b5224cfaa808c54fd29345f3c1cbfca76, it was introduced in version v5.3 by commit 166a2809d65b282272c474835ec22c882a39ca1b. For more details please see the references link.
null
2021-12-19T21:44:27.035480Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/166a2809d65b282272c474835ec22c882a39ca1b'}