ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2021-1002149
dm rq: don't queue request to blk-mq during DM suspend
dm rq: don't queue request to blk-mq during DM suspend This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit b4459b11e84092658fa195a2587aff3b9637f0e7. For more details please see the references link.
null
2021-12-20T01:21:21.637111Z
2021-11-14T15:22:04.109950Z
null
null
null
null
null
Linux
GSD-2022-1001419
Revert "nbd: fix possible overflow on 'first_minor' in nbd_dev_add()"
Revert "nbd: fix possible overflow on 'first_minor' in nbd_dev_add()" This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 24781c1b691c60c42748c669973d567a90573337. For more details please see the references link.
null
2022-04-25T06:49:06.189939Z
2022-04-24T21:11:23.876676Z
null
null
null
null
null
Linux
GSD-2021-1001335
scsi: iscsi: Fix conn use after free during resets
scsi: iscsi: Fix conn use after free during resets This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.134 by commit d04958a348e560938410e04a12fb99da9c7e6a00. For more details please see the references link.
null
2021-12-20T00:53:04.487487Z
2021-08-03T02:11:52.177572Z
null
null
null
null
null
Linux
GSD-2022-1000658
drm/amd/display: Update watermark values for DCN301
drm/amd/display: Update watermark values for DCN301 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.8 by commit bd6e1b930e12dd8f5d1d84f4d9729c2cce441ebb. For more details please see the references link.
null
2022-03-07T01:35:48.756886Z
2022-02-27T03:37:04.841254Z
null
null
null
null
null
Linux
GSD-2021-1000877
usb: dwc3: ep0: fix NULL pointer exception
usb: dwc3: ep0: fix NULL pointer exception This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.195 by commit bd551e7c85939de2182010273450bfa78c3742fc. For more details please see the references link.
null
2021-12-19T23:06:45.305552Z
2021-06-30T00:03:06.535636Z
null
null
null
null
null
Linux
GSD-2021-1001765
xen/x86: fix PV trap handling on secondary processors
xen/x86: fix PV trap handling on secondary processors This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.9 by commit 842f8bde1ed922dd8e3ba3e013352f4055ae4e85, it was introduced in version v2.6.23 by commit f87e4cac4f4e940b328d3deb5b53e642e3881f43. For more details please see the references link.
null
2021-12-20T01:05:37.854871Z
2021-10-19T16:35:39.029022Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f87e4cac4f4e940b328d3deb5b53e642e3881f43'}
Linux
GSD-2022-1002235
ax25: Fix NULL pointer dereferences in ax25 timers
ax25: Fix NULL pointer dereferences in ax25 timers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.190 by commit 40cb8b3b19c087a4e20f6740701e53fefbe19a7b, it was introduced in version v5.4.190 by commit d2be5b563ef391f684592a28440067f4fa3735f4. For more details please see the references link.
null
2022-04-24T22:24:21.067593Z
2022-04-24T22:24:21.067593Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d2be5b563ef391f684592a28440067f4fa3735f4'}
Linux
GSD-2022-1000208
net/mlx5: Use del_timer_sync in fw reset flow of halting poll
net/mlx5: Use del_timer_sync in fw reset flow of halting poll This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.97 by commit 502c37b033fab7cde3e95a570af4f073306be45e, it was introduced in version v5.10 by commit 38b9f903f22b9baa5c4b9bfb07c8bbc49f5efbba. For more details please see the references link.
null
2022-02-20T06:31:28.501910Z
2022-02-18T21:55:40.541129Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/38b9f903f22b9baa5c4b9bfb07c8bbc49f5efbba'}
Linux
GSD-2022-1000526
fs/proc: task_mmu.c: don't read mapcount for migration entry
fs/proc: task_mmu.c: don't read mapcount for migration entry This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 05d3f8045efa59457b323caf00bdb9273b7962fa, it was introduced in version v4.5 by commit e9b61f19858a5d6c42ce2298cf138279375d0d9b. For more details please see the references link.
null
2022-03-07T01:35:00.523938Z
2022-02-27T03:19:29.003093Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e9b61f19858a5d6c42ce2298cf138279375d0d9b'}
Linux
GSD-2022-1000176
scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe
scsi: bnx2fc: Make bnx2fc_recv_frame() mp safe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.178 by commit 53e4f71763c61a557283eb43301efd671922d1e8, it was introduced in version v3.16 by commit d576a5e80cd07ea7049f8fd7b303c14df7b5d7d2. For more details please see the references link.
null
2022-02-19T04:05:15.818142Z
2022-02-18T21:51:17.304476Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d576a5e80cd07ea7049f8fd7b303c14df7b5d7d2'}
Linux
GSD-2022-1001337
drm/amd/display: Fix by adding FPU protection for dcn30_internal_validate_bw
drm/amd/display: Fix by adding FPU protection for dcn30_internal_validate_bw This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit e995c5d52ec7415644eee617fc7e906b51aec7ae. For more details please see the references link.
null
2022-04-25T05:47:27.554146Z
2022-04-24T21:05:35.414404Z
null
null
null
null
null
Linux
GSD-2021-1002667
audit: improve robustness of the audit queue handling
audit: improve robustness of the audit queue handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.168 by commit 0d3277eabd542fb662be23696e5ec9f390d688e1, it was introduced in version v4.11 by commit 5b52330bbfe63b3305765354d6046c9f7f89c011. For more details please see the references link.
null
2022-01-11T05:52:50.157459Z
2021-12-27T05:35:17.973824Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5b52330bbfe63b3305765354d6046c9f7f89c011'}
Linux
GSD-2021-1001948
comedi: dt9812: fix DMA buffers on stack
comedi: dt9812: fix DMA buffers on stack This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.290 by commit 365a346cda82f51d835c49136a00a9df8a78c7f2, it was introduced in version v2.6.29 by commit 63274cd7d38a3322d90b66a5bc976de1fb899051. For more details please see the references link.
null
2021-12-20T01:07:56.696821Z
2021-11-14T15:13:01.001520Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63274cd7d38a3322d90b66a5bc976de1fb899051'}
Linux
GSD-2022-1001767
scsi: qla2xxx: Fix premature hw access after PCI error
scsi: qla2xxx: Fix premature hw access after PCI error This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 5ef6319f9882699613d5182fbd7929b017e8c5ab. For more details please see the references link.
null
2022-04-25T04:30:23.117038Z
2022-04-24T21:41:09.588179Z
null
null
null
null
null
Linux
GSD-2022-1000875
netfilter: fix use-after-free in __nf_register_net_hook()
netfilter: fix use-after-free in __nf_register_net_hook() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.183 by commit 49c24579cec41e32f13d57b337fd28fb208d4a5b, it was introduced in version v4.14 by commit 2420b79f8c18a75ee2417cace381f4604b9b4365. For more details please see the references link.
null
2022-03-18T02:59:29.520203Z
2022-03-18T00:26:53.495408Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2420b79f8c18a75ee2417cace381f4604b9b4365'}
Linux
GSD-2021-1002237
i40e: Fix NULL ptr dereference on VSI filter sync
i40e: Fix NULL ptr dereference on VSI filter sync This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.256 by commit 78f2a9e831f9610e3655a0be5e675e1aa2472089, it was introduced in version v3.12 by commit 41c445ff0f482bb6e6b72dcee9e598e20575f743. For more details please see the references link.
null
2021-12-19T22:34:42.490835Z
2021-11-29T02:34:42.077638Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41c445ff0f482bb6e6b72dcee9e598e20575f743'}
Linux
GSD-2021-1002722
RDMA/irdma: Fix a user-after-free in add_pble_prm
RDMA/irdma: Fix a user-after-free in add_pble_prm This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.10 by commit 11eebcf63e98fcf047a876a51d76afdabc3b8b9b, it was introduced in version v5.14 by commit e8c4dbc2fcacf5a7468d312168bb120c27c38b32. For more details please see the references link.
null
2022-01-11T05:58:03.921547Z
2021-12-27T05:39:02.064849Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e8c4dbc2fcacf5a7468d312168bb120c27c38b32'}
Linux
GSD-2022-1001788
ntfs: add sanity check on allocation size
ntfs: add sanity check on allocation size This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 24ab2d4ef52c2dbb62a60844b87fc8872383407a. For more details please see the references link.
null
2022-04-25T06:26:59.222655Z
2022-04-24T21:42:23.730821Z
null
null
null
null
null
Linux
GSD-2022-1001272
watch_queue: Actually free the watch
watch_queue: Actually free the watch This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 31824613a42aacdcbeb325bf07a1c8247a11ebe2, it was introduced in version v5.8 by commit c73be61cede5882f9605a852414db559c0ebedfd. For more details please see the references link.
null
2022-04-25T04:34:17.845979Z
2022-04-24T21:00:11.747123Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c73be61cede5882f9605a852414db559c0ebedfd'}
Linux
GSD-2021-1002372
scsi: mpt3sas: Fix kernel panic during drive powercycle test
scsi: mpt3sas: Fix kernel panic during drive powercycle test This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.292 by commit 58ef2c7a6de13721865d84b80eecf56d6cba0937, it was introduced in version v3.8 by commit f92363d12359498f9a9960511de1a550f0ec41c2. For more details please see the references link.
null
2021-12-19T22:38:48.202261Z
2021-12-19T19:34:23.546358Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f92363d12359498f9a9960511de1a550f0ec41c2'}
Linux
GSD-2022-1001622
f2fs: quota: fix loop condition at f2fs_quota_sync()
f2fs: quota: fix loop condition at f2fs_quota_sync() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit e9ebf1e8fc50b6a9336f9aea1082d7845e568d0e, it was introduced in version v5.15 by commit 9de71ede81e6d1a111fdd868b2d78d459fa77f80. For more details please see the references link.
null
2022-04-25T06:02:08.239830Z
2022-04-24T21:29:37.661873Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9de71ede81e6d1a111fdd868b2d78d459fa77f80'}
Linux
GSD-2022-1000930
RDMA/ib_srp: Fix a deadlock
RDMA/ib_srp: Fix a deadlock This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.269 by commit 4752fafb461821f8c8581090c923ababba68c5bd, it was introduced in version v3.8 by commit ef6c49d87c3418c442a22e55e3ce2f91b163d69e. For more details please see the references link.
null
2022-03-18T02:55:42.303718Z
2022-03-18T00:33:24.552183Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef6c49d87c3418c442a22e55e3ce2f91b163d69e'}
Linux
GSD-2021-1002688
mac80211: validate extended element ID is present
mac80211: validate extended element ID is present This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.88 by commit 7fd214fc7f2ee3a89f91e717e3cfad55f5a27045, it was introduced in version v4.19 by commit 41cbb0f5a29592874355e4159489eb08337cd50e. For more details please see the references link.
null
2022-01-11T05:53:28.808170Z
2021-12-27T05:36:53.278019Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41cbb0f5a29592874355e4159489eb08337cd50e'}
Linux
GSD-2022-1000199
phylib: fix potential use-after-free
phylib: fix potential use-after-free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.96 by commit bd024e36f68174b1793906c39ca16cee0c9295c2, it was introduced in version v4.16 by commit bafbdd527d569c8200521f2f7579f65a044271be. For more details please see the references link.
null
2022-02-19T09:46:52.533046Z
2022-02-18T21:54:40.124236Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bafbdd527d569c8200521f2f7579f65a044271be'}
Linux
GSD-2022-1000463
gcc-plugins/stackleak: Use noinstr in favor of notrace
gcc-plugins/stackleak: Use noinstr in favor of notrace This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit effdcc25058484aaf64b1557efb124c87a733045. For more details please see the references link.
null
2022-03-07T03:17:38.524610Z
2022-02-27T03:10:53.303060Z
null
null
null
null
null
Linux
GSD-2022-1000033
usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.
usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.170 by commit 240fc586e83d645912accce081a48aa63a45f6ee, it was introduced in version v4.0 by commit 5e33f6fdf735cda1d4580fe6f1878da05718fe73. For more details please see the references link.
null
2022-01-11T05:47:50.946994Z
2022-01-10T19:51:00.369114Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5e33f6fdf735cda1d4580fe6f1878da05718fe73'}
Linux
GSD-2021-1000066
tpm: efi: Use local variable for calculating final log size
tpm: efi: Use local variable for calculating final log size This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.3 by commit ac07c557ca12ec9276c0375517bac7ae5be4e50c, it was introduced in version v5.3 by commit 166a2809d65b282272c474835ec22c882a39ca1b. For more details please see the references link.
null
2021-12-20T00:25:28.246371Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/166a2809d65b282272c474835ec22c882a39ca1b'}
Linux
GSD-2021-1000436
mtd: require write permissions for locking and badblock ioctls
mtd: require write permissions for locking and badblock ioctls This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.119 by commit 5880afefe0cb9b2d5e801816acd58bfe91a96981, it was introduced in version v5.4.58 by commit 9a53e8bd59d9f070505e51d3fd19606a270e6b93. For more details please see the references link.
null
2021-12-19T23:06:06.091826Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9a53e8bd59d9f070505e51d3fd19606a270e6b93'}
Linux
GSD-2021-1000965
NFS: Fix a potential NULL dereference in nfs_get_client()
NFS: Fix a potential NULL dereference in nfs_get_client() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.44 by commit 279ad78a00f8b9c5ff24171a59297187a3bd44b7, it was introduced in version v3.17 by commit 31434f496abb9f3410b10f541462fe58613dd3ad. For more details please see the references link.
null
2021-12-19T23:13:47.956054Z
2021-06-30T00:29:42.092852Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/31434f496abb9f3410b10f541462fe58613dd3ad'}
Linux
GSD-2021-1001677
drm/amd/pm: Update intermediate power state for SI
drm/amd/pm: Update intermediate power state for SI This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.70 by commit 68d4fbe6220cd1f3d07cab0a4901e62f8c12cc68. For more details please see the references link.
null
2021-12-20T01:20:52.869139Z
2021-10-19T16:31:22.512052Z
null
null
null
null
null
Linux
GSD-2022-1002327
can: mcba_usb: properly check endpoint type
can: mcba_usb: properly check endpoint type This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit b48d1bb3f1ca337ad653022aefb5a40a47dfe5cd, it was introduced in version v4.12 by commit 51f3baad7de943780ce0c17bd7975df567dd6e14. For more details please see the references link.
null
2022-04-25T04:39:46.087746Z
2022-04-24T22:34:49.159106Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/51f3baad7de943780ce0c17bd7975df567dd6e14'}
Linux
GSD-2021-1001227
virtio-net: Add validation for used length
virtio-net: Add validation for used length This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.3 by commit ba710baa1cc1b17a0483f7befe03e696efd17292. For more details please see the references link.
null
2021-12-20T01:11:52.803999Z
2021-08-03T01:42:04.731996Z
null
null
null
null
null
Linux
GSD-2022-1001858
power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init
power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit ffb8e92b4cef92bd25563cf3d8b4489eb22bc61f, it was introduced in version v4.9 by commit 8c0984e5a75337df513047ec92a6c09d78e3e5cd. For more details please see the references link.
null
2022-04-25T04:57:19.278811Z
2022-04-24T21:48:54.853511Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c0984e5a75337df513047ec92a6c09d78e3e5cd'}
Linux
GSD-2022-1002262
media: usb: go7007: s2250-board: fix leak in probe()
media: usb: go7007: s2250-board: fix leak in probe() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 14cd5a8e61c654828a1f1056d56f0b0a524d2c69, it was introduced in version v3.10 by commit d3b2ccd9e307eae80b4b4eeb0ede46cb02212df2. For more details please see the references link.
null
2022-04-25T06:36:51.501477Z
2022-04-24T22:27:52.963236Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d3b2ccd9e307eae80b4b4eeb0ede46cb02212df2'}
Linux
GSD-2021-1000820
btrfs: abort in rename_exchange if we fail to insert the second ref
btrfs: abort in rename_exchange if we fail to insert the second ref This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.10 by commit ff8de2cec65a8c8521faade12a31b39c80e49f5b, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T23:06:26.425665Z
2021-06-25T00:09:26.424218Z
null
null
null
null
null
Linux
GSD-2021-1001732
mac80211: fix use-after-free in CCMP/GCMP RX
mac80211: fix use-after-free in CCMP/GCMP RX This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit 27d3eb5616ee2c0a3b30c3fa34813368ed1f3dc9, it was introduced in version v5.13 by commit bf30ca922a0c0176007e074b0acc77ed345e9990. For more details please see the references link.
null
2021-12-19T23:44:57.291654Z
2021-10-19T16:33:57.238693Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf30ca922a0c0176007e074b0acc77ed345e9990'}
Linux
GSD-2021-1001698
riscv: Flush current cpu icache before other cpus
riscv: Flush current cpu icache before other cpus This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.12 by commit f1c7aa87c423e765e3862349c2f095fdfccdd9b3, it was introduced in version v4.15 by commit fab957c11efe2f405e08b9f0d080524bc2631428. For more details please see the references link.
null
2021-12-20T00:44:16.638224Z
2021-10-19T16:32:25.074412Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fab957c11efe2f405e08b9f0d080524bc2631428'}
Linux
GSD-2021-1001362
usb: max-3421: Prevent corruption of freed memory
usb: max-3421: Prevent corruption of freed memory This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.199 by commit 51fc12f4d37622fa0c481604833f98f11b1cac4f, it was introduced in version v3.16 by commit 2d53139f31626bad6f8983d8e519ddde2cbba921. For more details please see the references link.
null
2021-12-20T00:15:33.452275Z
2021-08-03T02:18:58.974097Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2d53139f31626bad6f8983d8e519ddde2cbba921'}
Linux
GSD-2021-1000123
s390/zcrypt: fix zcard and zqueue hot-unplug memleak
s390/zcrypt: fix zcard and zqueue hot-unplug memleak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.20 by commit 055a063a18bcd19b93709e3eac8078d6b2f04599, it was introduced in version v5.10 by commit 29c2680fd2bf3862ff5cf2957f198512493156f9. For more details please see the references link.
null
2021-12-20T00:40:07.481330Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/29c2680fd2bf3862ff5cf2957f198512493156f9'}
Linux
GSD-2021-1000089
bpf: Fix masking negation logic upon negative dst register
bpf: Fix masking negation logic upon negative dst register This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.2 by commit 7cf64d8679ca1cb20cf57d6a88bfee79a0922a66, it was introduced in version v5.0 by commit 979d63d50c0c0f7bc537bf821e056cc9fe5abd38. For more details please see the references link.
null
2021-12-19T22:28:48.328273Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/979d63d50c0c0f7bc537bf821e056cc9fe5abd38'}
Linux
GSD-2021-1000573
bpf: No need to simulate speculative domain for immediates
bpf: No need to simulate speculative domain for immediates This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.8 by commit f3ab9709b00ed389f870f6b20d323193bcf572c8, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T22:23:34.610959Z
2021-06-04T19:41:00.781663Z
null
null
null
null
null
Linux
GSD-2021-1002221
usb: host: ohci-tmio: check return value after calling platform_get_resource()
usb: host: ohci-tmio: check return value after calling platform_get_resource() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.293 by commit 28e016e02118917e50a667bc72fb80098cf2b460. For more details please see the references link.
null
2021-12-20T01:14:30.301243Z
2021-11-29T02:34:03.816308Z
null
null
null
null
null
Linux
GSD-2022-1000863
CDC-NCM: avoid overflow in sanity checking
CDC-NCM: avoid overflow in sanity checking This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.103 by commit 69560efa001397ebb8dc1c3e6a3ce00302bb9f7f. For more details please see the references link.
null
2022-03-18T02:50:50.025660Z
2022-03-18T00:25:44.284367Z
null
null
null
null
null
Linux
GSD-2022-1001771
scsi: qla2xxx: Implement ref count for SRB
scsi: qla2xxx: Implement ref count for SRB This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit e17111dd2fda81c35f309b1e5b6ab35809a375e7. For more details please see the references link.
null
2022-04-25T06:36:11.063766Z
2022-04-24T21:41:29.136899Z
null
null
null
null
null
Linux
GSD-2021-1002671
inet_diag: fix kernel-infoleak for UDP sockets
inet_diag: fix kernel-infoleak for UDP sockets This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.168 by commit 7b5596e531253ce84213d9daa7120b71c9d83198, it was introduced in version v3.3 by commit 3c4d05c8056724aff3abc20650807dd828fded54. For more details please see the references link.
null
2022-01-11T05:54:22.292517Z
2021-12-27T05:35:58.197346Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c4d05c8056724aff3abc20650807dd828fded54'}
Linux
GSD-2022-1001321
coresight: syscfg: Fix memleak on registration failure in cscfg_create_device
coresight: syscfg: Fix memleak on registration failure in cscfg_create_device This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 412225b32986d5b11c3c1ad9234c50a3f5c52c76, it was introduced in version v5.15 by commit 85e2414c518a03a21dddd4bc88fec2723c5e1197. For more details please see the references link.
null
2022-04-25T05:18:56.732924Z
2022-04-24T21:04:21.713752Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/85e2414c518a03a21dddd4bc88fec2723c5e1197'}
Linux
GSD-2022-1000160
block: Fix wrong offset in bio_truncate()
block: Fix wrong offset in bio_truncate() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.176 by commit 6cbf4c731d7812518cd857c2cfc3da9fd120f6ae. For more details please see the references link.
null
2022-02-19T03:10:19.654960Z
2022-02-18T21:48:42.085407Z
null
null
null
null
null
Linux
GSD-2022-1000530
mm: memcg: synchronize objcg lists with a dedicated spinlock
mm: memcg: synchronize objcg lists with a dedicated spinlock This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit babfa07e9594373e10b9c01ada6278d0248665e1, it was introduced in version v5.9 by commit bf4f059954dcb221384b2f784677e19a13cd4bdb. For more details please see the references link.
null
2022-03-07T01:38:26.565805Z
2022-02-27T03:19:55.902349Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf4f059954dcb221384b2f784677e19a13cd4bdb'}
Linux
GSD-2022-1002018
KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs
KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit 66b0fa6b22187caf4d789bdac8dcca49940628b0, it was introduced in version v4.2 by commit ca724305a2b02abcbecbf22577536fc8e965ab4f. For more details please see the references link.
null
2022-04-25T06:30:54.205359Z
2022-04-24T22:03:14.143463Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca724305a2b02abcbecbf22577536fc8e965ab4f'}
Linux
GSD-2022-1000025
Input: appletouch - initialize work before device registration
Input: appletouch - initialize work before device registration This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.224 by commit a02e1404e27855089d2b0a0acc4652c2ce65fe46, it was introduced in version v2.6.23 by commit 5a6eb676d3bc4d7a6feab200a92437b62ad298da. For more details please see the references link.
null
2022-01-11T05:53:29.596805Z
2022-01-10T19:50:40.368435Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5a6eb676d3bc4d7a6feab200a92437b62ad298da'}
Linux
GSD-2021-1001548
i2c: acpi: fix resource leak in reconfiguration device addition
i2c: acpi: fix resource leak in reconfiguration device addition This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.211 by commit 3d9d458a8aaafa47268ea4f1b4114a9f12927989, it was introduced in version v4.8 by commit 525e6fabeae286848592363bda13bc34b59bb5ac. For more details please see the references link.
null
2021-12-19T23:06:13.116720Z
2021-10-19T16:23:15.189208Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/525e6fabeae286848592363bda13bc34b59bb5ac'}
Linux
GSD-2022-1002448
drbd: fix potential silent data corruption
drbd: fix potential silent data corruption This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 0452d32bfb419df65f8e200f5ddbf460fef48082. For more details please see the references link.
null
2022-04-25T04:39:05.635751Z
2022-04-24T22:48:55.190636Z
null
null
null
null
null
Linux
GSD-2022-1000475
copy_process(): Move fd_install() out of sighand->siglock critical section
copy_process(): Move fd_install() out of sighand->siglock critical section This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit 795feafb7234f63e975e181f2298811818d85354, it was introduced in version v5.2 by commit 6fd2fe494b17bf2dec37b610d23a43a72b16923a. For more details please see the references link.
null
2022-03-07T01:37:55.423683Z
2022-02-27T03:12:15.210336Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6fd2fe494b17bf2dec37b610d23a43a72b16923a'}
Linux
GSD-2021-1001118
net: caif: fix memory leak in ldisc_open
net: caif: fix memory leak in ldisc_open This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.129 by commit 343406f9c198c5f8e38720bd168c04ef666fe5d9. For more details please see the references link.
null
2021-12-19T23:36:45.312455Z
2021-07-08T01:57:31.400579Z
null
null
null
null
null
Linux
GSD-2022-1000926
mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work
mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.270 by commit 0f7f9b02f97edc2e1135b5172f4eda4aa3cc6535. For more details please see the references link.
null
2022-03-18T03:45:07.765589Z
2022-03-18T00:32:40.529248Z
null
null
null
null
null
Linux
GSD-2022-1001634
ALSA: pcm: Fix races among concurrent hw_params and hw_free calls
ALSA: pcm: Fix races among concurrent hw_params and hw_free calls This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.18 by commit 0090c13cbbdffd7da079ac56f80373a9a1be0bf8. For more details please see the references link.
null
2022-04-25T06:51:02.458424Z
2022-04-24T21:30:23.611057Z
null
null
null
null
null
Linux
GSD-2021-1000359
RDMA/rtrs-clt: destroy sysfs after removing session from active list
RDMA/rtrs-clt: destroy sysfs after removing session from active list This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit b64415c6b3476cf9fa4d0aea3807065b8403a937, it was introduced in version v5.8 by commit 6a98d71daea186247005099758af549e6afdd244. For more details please see the references link.
null
2021-12-20T00:46:45.156775Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6a98d71daea186247005099758af549e6afdd244'}
Linux
GSD-2021-1002364
nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done
nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.295 by commit 87cdb8789c38e44ae5454aafe277997c950d00ed, it was introduced in version v3.12 by commit ac22ac466a659f1b2e02a2e2ee23fc5c42da2c95. For more details please see the references link.
null
2021-12-20T00:01:00.796178Z
2021-12-19T19:34:04.013319Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac22ac466a659f1b2e02a2e2ee23fc5c42da2c95'}
Linux
GSD-2022-1001264
ASoC: codecs: rx-macro: fix accessing array out of bounds for enum type
ASoC: codecs: rx-macro: fix accessing array out of bounds for enum type This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit aed43e92e4b9187029903880d5db608f7fa1c53c, it was introduced in version v5.12 by commit 4f692926f562ff48abfcca6b16f36ff8d57473b6. For more details please see the references link.
null
2022-04-25T05:46:34.859640Z
2022-04-24T20:59:17.381611Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4f692926f562ff48abfcca6b16f36ff8d57473b6'}
Linux
GSD-2021-1000709
serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'
serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.271 by commit 1e04d5d5fe5e76af68f834e1941fcbfa439653be, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T00:51:40.142231Z
2021-06-04T20:07:18.062599Z
null
null
null
null
null
Linux
GSD-2021-1002734
audit: improve robustness of the audit queue handling
audit: improve robustness of the audit queue handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit a5f4d17daf2e6cd7c1d9676b476147f6b4ac53f2, it was introduced in version v4.11 by commit 5b52330bbfe63b3305765354d6046c9f7f89c011. For more details please see the references link.
null
2022-01-11T05:50:13.548689Z
2021-12-27T05:45:27.915312Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5b52330bbfe63b3305765354d6046c9f7f89c011'}
Linux
GSD-2021-1001231
drm/sched: Avoid data corruptions
drm/sched: Avoid data corruptions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.3 by commit 50d7e03ad487cc45fc85164a299b945a41756ac0. For more details please see the references link.
null
2021-12-20T00:21:11.385005Z
2021-08-03T01:43:35.057016Z
null
null
null
null
null
Linux
GSD-2022-1002331
scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair()
scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit f68776f28d9134fa65056e7e63bfc734049730b7. For more details please see the references link.
null
2022-04-25T05:47:19.502828Z
2022-04-24T22:35:19.754959Z
null
null
null
null
null
Linux
GSD-2021-1001661
tty: Fix out-of-bound vmalloc access in imageblit
tty: Fix out-of-bound vmalloc access in imageblit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.71 by commit d570c48dd37dbe8fc6875d4461d01a9554ae2560. For more details please see the references link.
null
2021-12-20T00:08:35.428917Z
2021-10-19T16:30:31.987372Z
null
null
null
null
null
Linux
GSD-2021-1000973
kvm: LAPIC: Restore guard to prevent illegal APIC register access
kvm: LAPIC: Restore guard to prevent illegal APIC register access This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.46 by commit 018685461a5b9a9a70e664ac77aef0d7415a3fd5, it was introduced in version v5.3 by commit 01402cf81051f796dac7c60ca11d6147153ca46a. For more details please see the references link.
null
2021-12-19T23:55:57.188238Z
2021-06-30T00:30:12.239440Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/01402cf81051f796dac7c60ca11d6147153ca46a'}
Linux
GSD-2021-1000420
bnxt_en: Fix RX consumer index logic in the error path.
bnxt_en: Fix RX consumer index logic in the error path. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.119 by commit b1523e4ba293b2a32d9fabaf70c1dcaa6e3e2847, it was introduced in version v5.1 by commit a1b0e4e684e9c300b9e759b46cb7a0147e61ddff. For more details please see the references link.
null
2021-12-20T01:25:25.794648Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a1b0e4e684e9c300b9e759b46cb7a0147e61ddff'}
Linux
GSD-2021-1000070
net/sched: sch_frag: fix stack OOB read while fragmenting IPv4 packets
net/sched: sch_frag: fix stack OOB read while fragmenting IPv4 packets This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.3 by commit 8e6dfb7beeb6489ac1365b8a71052e737f5da76e, it was introduced in version v5.11 by commit c129412f74e99b609f0a8e95fc3915af1fd40f34. For more details please see the references link.
null
2021-12-20T00:43:13.331055Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c129412f74e99b609f0a8e95fc3915af1fd40f34'}
Linux
GSD-2021-1002558
perf hist: Fix memory leak of a perf_hpp_fmt
perf hist: Fix memory leak of a perf_hpp_fmt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.7 by commit 5b5c6f57a1f81499db4c8ea597898cb1b87de0b6. For more details please see the references link.
null
2021-12-20T00:21:33.730305Z
2021-12-19T19:42:36.001769Z
null
null
null
null
null
Linux
GSD-2021-1000565
netfilter: nft_set_pipapo_avx2: Add irq_fpu_usable() check, fallback to non-AVX2 version
netfilter: nft_set_pipapo_avx2: Add irq_fpu_usable() check, fallback to non-AVX2 version This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit 727a2b4fc951ee69847d4904d98961856ea9fbe6, it was introduced in version v5.7 by commit 7400b063969bdca4a06cd97f1294d765c8eecbe1. For more details please see the references link.
null
2021-12-19T23:16:54.815675Z
2021-06-04T19:40:04.763239Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7400b063969bdca4a06cd97f1294d765c8eecbe1'}
Linux
GSD-2022-1001008
highmem: fix checks in __kmap_local_sched_{in,out}
highmem: fix checks in __kmap_local_sched_{in,out} This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 7dd5b3b97716a611fcf67d92fd2370fcb8d50372, it was introduced in version v5.11 by commit 5fbda3ecd14a5343644979c98d6eb65b7e7de9d8. For more details please see the references link.
null
2022-04-25T05:38:03.429364Z
2022-04-24T20:39:13.887877Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5fbda3ecd14a5343644979c98d6eb65b7e7de9d8'}
Linux
GSD-2021-1002108
KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest()
KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit 6d077c37c4643394b1bae9682da48164fc147ea8, it was introduced in version v5.2 by commit 10d91611f426d4bafd2a83d966c36da811b2f7ad. For more details please see the references link.
null
2021-12-19T23:27:55.292429Z
2021-11-14T15:20:14.020905Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/10d91611f426d4bafd2a83d966c36da811b2f7ad'}
Linux
GSD-2021-1000135
media: staging/intel-ipu3: Fix set_fmt error handling
media: staging/intel-ipu3: Fix set_fmt error handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.36 by commit c6b81b897f6f9445d57f8d47c4e060ec21556137, it was introduced in version v5.2 by commit 6d5f26f2e045f2377b524516194657c00efbbce8. For more details please see the references link.
null
2021-12-20T00:44:36.364622Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6d5f26f2e045f2377b524516194657c00efbbce8'}
Linux
GSD-2022-1001458
KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU
KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 0c8a8da182d4333d9bbb9131d765145568c847b2, it was introduced in version v5.13 by commit b7cccd397f310739fb85383033e95580f99927e0. For more details please see the references link.
null
2022-04-25T03:49:08.175589Z
2022-04-24T21:14:46.732204Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b7cccd397f310739fb85383033e95580f99927e0'}
Linux
GSD-2021-1001374
memory: fsl_ifc: fix leak of private memory on probe failure
memory: fsl_ifc: fix leak of private memory on probe failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.198 by commit ee1aa737ba0b75ab8af3444c4ae5bdba36aed6e6, it was introduced in version v3.3 by commit a20cbdeffce247a2b6fb83cd8d22433994068565. For more details please see the references link.
null
2021-12-19T22:28:06.140061Z
2021-08-03T02:22:30.769147Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a20cbdeffce247a2b6fb83cd8d22433994068565'}
Linux
GSD-2022-1000619
i40e: Fix queues reservation for XDP
i40e: Fix queues reservation for XDP This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit 4b3aa858268b7b9aeef02e5f9c4cd8f8fac101c8, it was introduced in version v3.12 by commit 41c445ff0f482bb6e6b72dcee9e598e20575f743. For more details please see the references link.
null
2022-03-07T01:36:53.978761Z
2022-02-27T03:32:02.598811Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41c445ff0f482bb6e6b72dcee9e598e20575f743'}
Linux
GSD-2021-1001724
netfilter: nf_tables: unlink table before deleting it
netfilter: nf_tables: unlink table before deleting it This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit f65c73d3aabb87d4353e0bc4a718b5ae8c43fd04, it was introduced in version v5.12 by commit 6001a930ce0378b62210d4f83583fc88a903d89d. For more details please see the references link.
null
2021-12-20T00:36:09.536091Z
2021-10-19T16:33:36.966131Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6001a930ce0378b62210d4f83583fc88a903d89d'}
Linux
GSD-2021-1000836
isdn: mISDN: netjet: Fix crash in nj_probe:
isdn: mISDN: netjet: Fix crash in nj_probe: This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.273 by commit 4c1fcb6ec964b44edbf84235134582a5ffae1521. For more details please see the references link.
null
2021-12-20T01:35:42.201164Z
2021-06-30T00:00:24.440177Z
null
null
null
null
null
Linux
GSD-2022-1000249
usb: xhci-plat: fix crash when suspend if remote wake enable
usb: xhci-plat: fix crash when suspend if remote wake enable This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.19 by commit d5755832a1e47f5d8773f0776e211ecd4e02da72. For more details please see the references link.
null
2022-02-19T08:06:53.721486Z
2022-02-18T22:01:12.023714Z
null
null
null
null
null
Linux
GSD-2022-1002274
mm/pages_alloc.c: don't create ZONE_MOVABLE beyond the end of a node
mm/pages_alloc.c: don't create ZONE_MOVABLE beyond the end of a node This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 2efe956a74dc9c214237e3d470ca598a1e0fa8af, it was introduced in version v2.6.23 by commit 2a1e274acf0b1c192face19a4be7c12d4503eaaf. For more details please see the references link.
null
2022-04-25T04:44:09.325702Z
2022-04-24T22:29:01.620698Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2a1e274acf0b1c192face19a4be7c12d4503eaaf'}
Linux
GSD-2022-1000567
scsi: ufs: Fix a deadlock in the error handler
scsi: ufs: Fix a deadlock in the error handler This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit d69d98d8edf90e25e4e09930dd36dd6d09dd6768. For more details please see the references link.
null
2022-03-07T01:40:44.105486Z
2022-02-27T03:24:48.649396Z
null
null
null
null
null
Linux
GSD-2022-1000137
ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx()
ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.228 by commit 7659f25a80e6affb784b690df8994b79b4212fd4. For more details please see the references link.
null
2022-02-19T04:11:20.495317Z
2022-02-18T21:45:16.326154Z
null
null
null
null
null
Linux
GSD-2022-1001376
habanalabs: fix possible memory leak in MMU DR fini
habanalabs: fix possible memory leak in MMU DR fini This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 6d421fb7a9eddd8ce0a05641a3db97283fe20699. For more details please see the references link.
null
2022-04-25T03:36:40.615874Z
2022-04-24T21:09:06.752341Z
null
null
null
null
null
Linux
GSD-2021-1001909
usb: musb: dsps: Fix the probe error path
usb: musb: dsps: Fix the probe error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit ff9249aab39820be11b6975a10d94253b7d426fc, it was introduced in version v5.14.6 by commit 72bb3eafcfdd156713a3ea0c9c95d536bd6e6e55. For more details please see the references link.
null
2021-12-19T23:00:13.760942Z
2021-10-28T13:55:14.620260Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/72bb3eafcfdd156713a3ea0c9c95d536bd6e6e55'}
Linux
GSD-2021-1002626
scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select()
scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.294 by commit adcecd50da6cab7b4957cba0606771dcc846c5a9. For more details please see the references link.
null
2022-01-11T05:57:59.771208Z
2021-12-27T05:27:50.031946Z
null
null
null
null
null
Linux
GSD-2022-1000834
xfrm: fix MTU regression
xfrm: fix MTU regression This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.104 by commit 4952faa77d8d1c4c146ac077e13d6245738979f4, it was introduced in version v4.15 by commit 749439bfac6e1a2932c582e2699f91d329658196. For more details please see the references link.
null
2022-03-18T02:55:38.971987Z
2022-03-18T00:22:47.858474Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/749439bfac6e1a2932c582e2699f91d329658196'}
Linux
GSD-2022-1001726
powerpc/set_memory: Avoid spinlock recursion in change_page_attr()
powerpc/set_memory: Avoid spinlock recursion in change_page_attr() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 6def4eaf0391f24be541633a954c0e4876858b1e. For more details please see the references link.
null
2022-04-25T06:36:36.892351Z
2022-04-24T21:37:54.090143Z
null
null
null
null
null
Linux
GSD-2021-1002276
cfg80211: call cfg80211_stop_ap when switch from P2P_GO type
cfg80211: call cfg80211_stop_ap when switch from P2P_GO type This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.82 by commit 7b97b5776daa0b39dbdadfea176f9cc0646d4a66, it was introduced in version v3.6 by commit ac800140c20e7ae51117e71289065bedd4930fc2. For more details please see the references link.
null
2021-12-20T01:12:23.687581Z
2021-11-29T02:36:39.648291Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac800140c20e7ae51117e71289065bedd4930fc2'}
Linux
GSD-2021-1002763
xen/netback: don't queue unlimited number of packages
xen/netback: don't queue unlimited number of packages This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit bd926d189210cd1d5b4e618e45898053be6b4b3b, it was introduced in version v3.18 by commit f48da8b14d04ca87ffcffe68829afd45f926ec6a. For more details please see the references link.
null
2022-01-11T05:56:12.784490Z
2021-12-27T05:49:27.663609Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f48da8b14d04ca87ffcffe68829afd45f926ec6a'}
Linux
GSD-2021-1002299
usb: typec: tipd: Remove WARN_ON in tps6598x_block_read
usb: typec: tipd: Remove WARN_ON in tps6598x_block_read This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.82 by commit eff8b7628410cb2eb562ca0d5d1f12e27063733e. For more details please see the references link.
null
2021-12-20T01:29:05.208593Z
2021-11-29T02:37:37.475859Z
null
null
null
null
null
Linux
GSD-2022-1001233
net: asix: add proper error handling of usb read errors
net: asix: add proper error handling of usb read errors This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 662ff765470ad0d11a1153d6d8e99d69a98e60b4, it was introduced in version v4.9 by commit d9fe64e511144c1ee7d7555b4111f09dde9692ef. For more details please see the references link.
null
2022-04-25T05:16:45.808955Z
2022-04-24T20:56:22.951157Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9fe64e511144c1ee7d7555b4111f09dde9692ef'}
Linux
GSD-2022-1001399
rtw89: fix RCU usage in rtw89_core_txq_push()
rtw89: fix RCU usage in rtw89_core_txq_push() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 6a2d29cb71d5d2e112a6f1cf479385135ede6384. For more details please see the references link.
null
2022-04-25T05:34:29.667754Z
2022-04-24T21:10:26.097871Z
null
null
null
null
null
Linux
GSD-2021-1002333
scsi: lpfc: Fix link down processing to address NULL pointer dereference
scsi: lpfc: Fix link down processing to address NULL pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit 28de48a7cea495ab48082d9ff4ef63f7cb4e563a. For more details please see the references link.
null
2021-12-19T22:59:48.853575Z
2021-11-29T02:39:09.039567Z
null
null
null
null
null
Linux
GSD-2022-1000971
scsi: target: tcmu: Fix possible page UAF
scsi: target: tcmu: Fix possible page UAF This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.4 by commit a9564d84ed9f6ee71017d062d0d2182154294a4b. For more details please see the references link.
null
2022-04-25T05:00:50.023883Z
2022-04-24T20:36:02.545799Z
null
null
null
null
null
Linux
GSD-2022-1001663
gpiolib: acpi: use correct format characters
gpiolib: acpi: use correct format characters This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.35 by commit d40cf3492277d203c1f676cb9df88ab55d0c5d0f, it was introduced in version v4.14 by commit e40a3ae1f794a35c4af3746291ed6fedc1fa0f6f. For more details please see the references link.
null
2022-04-25T06:41:00.181585Z
2022-04-24T21:32:54.639237Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e40a3ae1f794a35c4af3746291ed6fedc1fa0f6f'}
Linux
GSD-2022-1000422
usb: f_fs: Fix use-after-free for epfile
usb: f_fs: Fix use-after-free for epfile This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit 72a8aee863af099d4434314c4536d6c9a61dcf3c, it was introduced in version v4.9 by commit a9e6f83c2df199187a5248f824f31b6787ae23ae. For more details please see the references link.
null
2022-03-07T01:36:19.617362Z
2022-02-27T03:04:44.821890Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a9e6f83c2df199187a5248f824f31b6787ae23ae'}
Linux
GSD-2022-1000588
net: macsec: Fix offload support for NETDEV_UNREGISTER event
net: macsec: Fix offload support for NETDEV_UNREGISTER event This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.22 by commit e7a0b3a0806dae3cc81931f0e83055ca2ac6f455, it was introduced in version v5.6 by commit 3cf3227a21d1fb020fe26128e60321bd2151e922. For more details please see the references link.
null
2022-03-07T01:38:30.633611Z
2022-02-27T03:27:54.061790Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3cf3227a21d1fb020fe26128e60321bd2151e922'}
Linux
GSD-2021-1000027
ixgbe: Fix NULL pointer dereference in ethtool loopback test
ixgbe: Fix NULL pointer dereference in ethtool loopback test This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.16 by commit 758d19098df4b0bbca9f40d6ae6c82c9c18b9bba, it was introduced in version v5.11 by commit b02e5a0ebb172c8276cea3151942aac681f7a4a6. For more details please see the references link.
null
2021-12-19T22:47:42.924676Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b02e5a0ebb172c8276cea3151942aac681f7a4a6'}
Linux
GSD-2021-1000477
ACPI: scan: Fix a memory leak in an error handling path
ACPI: scan: Fix a memory leak in an error handling path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.269 by commit 6901a4f795e0e8d65ae779cb37fc22e0bf294712, it was introduced in version v4.9.264 by commit e5cdbe419004e172f642e876a671a9ff1c52f8bb. For more details please see the references link.
null
2021-12-20T00:32:07.566016Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e5cdbe419004e172f642e876a671a9ff1c52f8bb'}
Linux
GSD-2021-1001636
netfilter: conntrack: serialize hash resizes and cleanups
netfilter: conntrack: serialize hash resizes and cleanups This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.71 by commit e2d192301a0df8160d1555b66ae8611e8050e424. For more details please see the references link.
null
2021-12-20T00:35:52.087561Z
2021-10-19T16:29:19.530573Z
null
null
null
null
null
Linux
GSD-2021-1000924
net: hamradio: fix memory leak in mkiss_close
net: hamradio: fix memory leak in mkiss_close This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.128 by commit a49cbb762ef20655f5c91abdc13658b0af5e159d, it was introduced in version v2.6.14 by commit 815f62bf742718458ba822a7e1f51f285eb997f2. For more details please see the references link.
null
2021-12-19T22:17:22.290755Z
2021-06-30T00:24:51.082443Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/815f62bf742718458ba822a7e1f51f285eb997f2'}