ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2022-1002366
video: fbdev: sm712fb: Fix crash in smtcfb_read()
video: fbdev: sm712fb: Fix crash in smtcfb_read() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 1caa40af491dcfe17b3ae870a854388d8ea01984. For more details please see the references link.
null
2022-04-25T05:35:55.714807Z
2022-04-24T22:39:28.304349Z
null
null
null
null
null
Linux
GSD-2021-1001266
NFSv4: Fix an Oops in pnfs_mark_request_commit() when doing O_DIRECT
NFSv4: Fix an Oops in pnfs_mark_request_commit() when doing O_DIRECT This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.52 by commit 5c7ef8a3705542136a1e19b070e951f0730b2153, it was introduced in version v5.7 by commit 9c455a8c1e146dac3a6d1405fe6a7096177b9546. For more details please see the references link.
null
2021-12-19T23:30:14.872335Z
2021-08-03T01:53:25.523838Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9c455a8c1e146dac3a6d1405fe6a7096177b9546'}
Linux
GSD-2022-1001819
tipc: fix the timer expires after interval 100ms
tipc: fix the timer expires after interval 100ms This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 21a2b4ab48a4878205825f2c8344a49edad8476d, it was introduced in version v4.20 by commit 6787927475e52f6933e3affce365dabb2aa2fadf. For more details please see the references link.
null
2022-04-25T03:19:28.166370Z
2022-04-24T21:44:51.581235Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6787927475e52f6933e3affce365dabb2aa2fadf'}
Linux
GSD-2022-1002223
block, bfq: don't move oom_bfqq
block, bfq: don't move oom_bfqq This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit c4f5a678add58a8a0e7ee5e038496b376ea6d205. For more details please see the references link.
null
2022-04-25T06:10:46.954134Z
2022-04-24T22:22:59.248238Z
null
null
null
null
null
Linux
GSD-2021-1001289
KVM: mmio: Fix use-after-free Read in kvm_vm_ioctl_unregister_coalesced_mmio
KVM: mmio: Fix use-after-free Read in kvm_vm_ioctl_unregister_coalesced_mmio This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.52 by commit 679837dc0abaa2c6e2a7bcd86483e05eee1d5066, it was introduced in version v5.10.37 by commit 2a20592baff59c5351c5200ec667e1a2aa22af85. For more details please see the references link.
null
2021-12-19T22:39:39.477878Z
2021-08-03T01:57:50.266867Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2a20592baff59c5351c5200ec667e1a2aa22af85'}
Linux
GSD-2021-1001773
net: encx24j600: check error in devm_regmap_init_encx24j600
net: encx24j600: check error in devm_regmap_init_encx24j600 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.290 by commit 66358471fa75a713fd76bc8a4bd74cb14cd50a4f, it was introduced in version v4.4 by commit 04fbfce7a222327b97ca165294ef19f0faa45960. For more details please see the references link.
null
2021-12-20T01:12:35.732008Z
2021-10-28T13:48:12.241495Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/04fbfce7a222327b97ca165294ef19f0faa45960'}
Linux
GSD-2021-1000861
usb: fix various gadgets null ptr deref on 10gbps cabling.
usb: fix various gadgets null ptr deref on 10gbps cabling. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.237 by commit 8cd5f45c1b769e3e9e0f4325dd08b6c3749dc7ee, it was introduced in version v4.6 by commit eaef50c760576bca70b87fdc26eb87a3660529f8. For more details please see the references link.
null
2021-12-19T22:00:49.995718Z
2021-06-30T00:02:05.229215Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/eaef50c760576bca70b87fdc26eb87a3660529f8'}
Linux
GSD-2021-1001323
seq_file: disallow extremely large seq buffer allocations
seq_file: disallow extremely large seq buffer allocations This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.134 by commit c1dafbb26164f43f2bb70bee9e5c4e1cad228ca7, it was introduced in version v3.16 by commit 058504edd02667eef8fac9be27ab3ea74332e9b4. For more details please see the references link.
null
2021-12-19T23:36:28.057169Z
2021-08-03T02:08:34.997614Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/058504edd02667eef8fac9be27ab3ea74332e9b4'}
Linux
GSD-2022-1002389
nfc: nci: add flush_workqueue to prevent uaf
nfc: nci: add flush_workqueue to prevent uaf This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 9d243aff5f7e6b04e907c617426bbdf26e996ac8, it was introduced in version v3.2 by commit 6a2968aaf50c7a22fced77a5e24aa636281efca8. For more details please see the references link.
null
2022-04-25T06:09:47.129711Z
2022-04-24T22:41:59.316699Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6a2968aaf50c7a22fced77a5e24aa636281efca8'}
Linux
GSD-2021-1000498
nvmet: fix memory leak in nvmet_alloc_ctrl()
nvmet: fix memory leak in nvmet_alloc_ctrl() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.7 by commit afb680ed7ecbb7fd66ddb43650e9b533fd8b4b9a, it was introduced in version v5.7 by commit 94a39d61f80fcd679debda11e1ca02b88d90e67e. For more details please see the references link.
null
2021-12-19T23:52:28.668108Z
2021-05-31T23:46:27.218325Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/94a39d61f80fcd679debda11e1ca02b88d90e67e'}
Linux
GSD-2021-1000162
perf/core: Fix unconditional security_locked_down() call
perf/core: Fix unconditional security_locked_down() call This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.35 by commit 4348d3b5027bc3ff6336368b6c60605d4ef8e1ce, it was introduced in version v5.4 by commit b0c8fdc7fdb77586c3d1937050925b960743306e. For more details please see the references link.
null
2021-12-20T01:10:08.846523Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b0c8fdc7fdb77586c3d1937050925b960743306e'}
Linux
GSD-2021-1000532
net: hns3: put off calling register_netdev() until client initialize complete
net: hns3: put off calling register_netdev() until client initialize complete This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit 0921a0620b5077796fddffb22a8e6bc635a4bb50, it was introduced in version v5.6 by commit 08a100689d4baf296d6898c687ea8d005da8d234. For more details please see the references link.
null
2021-12-20T01:29:14.745091Z
2021-06-04T19:34:32.131798Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/08a100689d4baf296d6898c687ea8d005da8d234'}
Linux
GSD-2021-1001837
isdn: mISDN: Fix sleeping function called from invalid context
isdn: mISDN: Fix sleeping function called from invalid context This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit 9f591cbdbed3d7822b2bdba89b34a6d7b434317d. For more details please see the references link.
null
2021-12-20T00:25:53.224998Z
2021-10-28T13:51:31.514215Z
null
null
null
null
null
Linux
GSD-2021-1000725
ocfs2: fix data corruption by fallocate
ocfs2: fix data corruption by fallocate This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.272 by commit 33e03adafb29eedae1bae9cdb50c1385279fcf65, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T01:02:21.744915Z
2021-06-24T23:59:25.742192Z
null
null
null
null
null
Linux
GSD-2021-1002718
xen/console: harden hvc_xen against event channel storms
xen/console: harden hvc_xen against event channel storms This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.88 by commit 8fa3a370cc2af858a9ba662ca4f2bd0917550563. For more details please see the references link.
null
2022-01-11T05:54:12.604369Z
2021-12-27T05:38:49.731402Z
null
null
null
null
null
Linux
GSD-2022-1001248
libbpf: Fix possible NULL pointer dereference when destroying skeleton
libbpf: Fix possible NULL pointer dereference when destroying skeleton This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 31e124e77dc2dad3dfd9eb16088345460cfdfe15, it was introduced in version v5.6 by commit d66562fba1ce66975bd61b0786fb8b1810f33caa. For more details please see the references link.
null
2022-04-25T04:12:00.379660Z
2022-04-24T20:57:39.904457Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d66562fba1ce66975bd61b0786fb8b1810f33caa'}
Linux
GSD-2021-1000375
Drivers: hv: vmbus: Increase wait time for VMbus unload
Drivers: hv: vmbus: Increase wait time for VMbus unload This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 8b4d4bd1f1ce21f74e1af561b74538e5c98ea603, it was introduced in version v5.9 by commit 911e1987efc8f3e6445955fbae7f54b428b92bd3. For more details please see the references link.
null
2021-12-20T00:25:52.874085Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/911e1987efc8f3e6445955fbae7f54b428b92bd3'}
Linux
GSD-2021-1002348
scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()
scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit 814d3610c4ce86e8cf285b2cdac0057a42e82de5. For more details please see the references link.
null
2021-12-19T22:28:02.365522Z
2021-11-29T02:39:52.932714Z
null
null
null
null
null
Linux
GSD-2022-1001618
jffs2: fix memory leak in jffs2_scan_medium
jffs2: fix memory leak in jffs2_scan_medium This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit b26bbc0c122cad038831f226a4cb4de702225e16, it was introduced in version v2.6.15 by commit e631ddba588783edd521c5a89f7b2902772fb691. For more details please see the references link.
null
2022-04-25T06:59:46.095093Z
2022-04-24T21:29:06.591986Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e631ddba588783edd521c5a89f7b2902772fb691'}
Linux
GSD-2021-1001134
nilfs2: fix memory leak in nilfs_sysfs_delete_device_group
nilfs2: fix memory leak in nilfs_sysfs_delete_device_group This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.14 by commit 2eb327bf4de3d1713496f231ea7ede5e4df06458, it was introduced in version v3.17 by commit da7141fb78db915680616e15677539fc8140cf53. For more details please see the references link.
null
2021-12-19T22:29:55.293810Z
2021-07-08T01:58:44.350749Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/da7141fb78db915680616e15677539fc8140cf53'}
Linux
GSD-2022-1002464
cifs: potential buffer overflow in handling symlinks
cifs: potential buffer overflow in handling symlinks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit 3e582749e742e662a8e9bb37cffac62dccaaa1e2, it was introduced in version v2.6.37 by commit c69c1b6eaea1b3e1eecf7ad2fba0208ac4a11131. For more details please see the references link.
null
2022-04-25T03:31:11.695212Z
2022-04-24T22:51:02.686537Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c69c1b6eaea1b3e1eecf7ad2fba0208ac4a11131'}
Linux
GSD-2022-1000459
vsock: remove vsock from connected table when connect is interrupted by a signal
vsock: remove vsock from connected table when connect is interrupted by a signal This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit 787468ee7a435777521d33399d012fd591ae2f94, it was introduced in version v3.9 by commit d021c344051af91f42c5ba9fdedc176740cbd238. For more details please see the references link.
null
2022-03-07T01:36:59.271237Z
2022-02-27T03:10:26.006973Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d021c344051af91f42c5ba9fdedc176740cbd238'}
Linux
GSD-2021-1001564
cpufreq: schedutil: Use kobject release() method to free sugov_tunables
cpufreq: schedutil: Use kobject release() method to free sugov_tunables This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.209 by commit 30d57cf2c4116ca6d34ecd1cac94ad84f8bc446c, it was introduced in version v4.7 by commit 9bdcb44e391da5c41b98573bf0305a0e0b1c9569. For more details please see the references link.
null
2021-12-20T00:02:34.612776Z
2021-10-19T16:23:58.196813Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9bdcb44e391da5c41b98573bf0305a0e0b1c9569'}
Linux
GSD-2022-1002034
KVM: SVM: fix panic on out-of-bounds guest IRQ
KVM: SVM: fix panic on out-of-bounds guest IRQ This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 0fb470eb48892e131d10aa3be6915239e65758f3. For more details please see the references link.
null
2022-04-25T04:25:57.137767Z
2022-04-24T22:05:02.263244Z
null
null
null
null
null
Linux
GSD-2022-1000009
net: fix use-after-free in tw_timer_handler
net: fix use-after-free in tw_timer_handler This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.298 by commit 15579e1301f856ad9385d720c9267c11032a5022, it was introduced in version v2.6.27 by commit 61a7e26028b94805fd686a6dc9dbd9941f8f19b0. For more details please see the references link.
null
2022-01-11T05:48:06.154934Z
2022-01-10T19:49:58.814266Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61a7e26028b94805fd686a6dc9dbd9941f8f19b0'}
Linux
GSD-2021-1001071
net: cdc_eem: fix tx fixup skb leak
net: cdc_eem: fix tx fixup skb leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit b4f7a9fc9d094c0c4a66f2ad7c37b1dbe9e78f88, it was introduced in version v2.6.30 by commit 9f722c0978b04acba209f8ca1896ad05814bc3a3. For more details please see the references link.
null
2021-12-19T22:14:54.639110Z
2021-06-30T00:37:43.421009Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9f722c0978b04acba209f8ca1896ad05814bc3a3'}
Linux
GSD-2022-1002171
btrfs: fix qgroup reserve overflow the qgroup limit
btrfs: fix qgroup reserve overflow the qgroup limit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 44277c50fdba5019ca25bfad1b71e2561b0de11b. For more details please see the references link.
null
2022-04-25T03:27:24.371048Z
2022-04-24T22:18:18.285343Z
null
null
null
null
null
Linux
GSD-2021-1001421
misc/libmasm/module: Fix two use after free in ibmasm_init_one
misc/libmasm/module: Fix two use after free in ibmasm_init_one This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.240 by commit 5b06ca113bf197aab2ab61288f42506e0049fbab. For more details please see the references link.
null
2021-12-19T23:33:19.219861Z
2021-08-03T02:35:59.077092Z
null
null
null
null
null
Linux
GSD-2021-1001972
comedi: vmk80xx: fix transfer-buffer overflows
comedi: vmk80xx: fix transfer-buffer overflows This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.255 by commit 40d2a7e278e2e7c0a5fd7e997e7eb63945bf93f7, it was introduced in version v2.6.31 by commit 985cafccbf9b7f862aa1c5ee566801e18b5161fb. For more details please see the references link.
null
2021-12-19T22:27:02.151561Z
2021-11-14T15:13:59.840249Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/985cafccbf9b7f862aa1c5ee566801e18b5161fb'}
Linux
GSD-2021-1000660
serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'
serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.193 by commit 35265552c7fe9553c75e324c80f45e28ff14eb6e, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T22:58:58.455684Z
2021-06-04T19:56:48.572047Z
null
null
null
null
null
Linux
GSD-2021-1000230
bnxt_en: Fix RX consumer index logic in the error path.
bnxt_en: Fix RX consumer index logic in the error path. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 3fbc5bc651d688fbea2a59cdc91520a2f5334d0a, it was introduced in version v5.1 by commit a1b0e4e684e9c300b9e759b46cb7a0147e61ddff. For more details please see the references link.
null
2021-12-19T23:19:48.128280Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a1b0e4e684e9c300b9e759b46cb7a0147e61ddff'}
Linux
GSD-2022-1000265
drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc
drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.19 by commit 8f069f6dde518dfebe86e848508c07e497bd9298, it was introduced in version v5.8 by commit 4259ff7ae509ed880b3a7bb685972c3a3bf4b74b. For more details please see the references link.
null
2022-02-20T06:17:54.349125Z
2022-02-18T22:03:54.378659Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4259ff7ae509ed880b3a7bb685972c3a3bf4b74b'}
Linux
GSD-2022-1002258
ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe
ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 0325193cf40dc3a6e27d55a5b98680936deebcd0, it was introduced in version v3.8 by commit 531f67e41dcde1e358cf821d056241a66355cf03. For more details please see the references link.
null
2022-04-25T06:33:54.679039Z
2022-04-24T22:27:17.907115Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/531f67e41dcde1e358cf821d056241a66355cf03'}
Linux
GSD-2021-1001708
KVM: x86: Handle SRCU initialization failure during page track init
KVM: x86: Handle SRCU initialization failure during page track init This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit 4664318f73e496cd22c71b10888e75434a123e23. For more details please see the references link.
null
2021-12-19T23:45:45.654767Z
2021-10-19T16:32:53.957524Z
null
null
null
null
null
Linux
GSD-2021-1002827
hwmon: (lm90) Prevent integer overflow/underflow in hysteresis calculations
hwmon: (lm90) Prevent integer overflow/underflow in hysteresis calculations This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.12 by commit d105f30bea9104c590a9e5b495cb8a49bdfe405f, it was introduced in version v5.14 by commit b50aa49638c7e12abf4ecc483f4e928c5cccc1b0. For more details please see the references link.
null
2022-01-11T05:47:12.080788Z
2021-12-30T02:45:09.754142Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b50aa49638c7e12abf4ecc483f4e928c5cccc1b0'}
Linux
GSD-2022-1000635
block: Fix wrong offset in bio_truncate()
block: Fix wrong offset in bio_truncate() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit 941d5180c430ce5b0f7a3622ef9b76077bfa3d82. For more details please see the references link.
null
2022-03-07T02:34:43.819278Z
2022-02-27T03:33:50.106903Z
null
null
null
null
null
Linux
GSD-2022-1001927
NFSD: prevent underflow in nfssvc_decode_writeargs()
NFSD: prevent underflow in nfssvc_decode_writeargs() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 614a61e1592051cc42d3c38f899c9f7bdaad8a1d. For more details please see the references link.
null
2022-04-25T03:54:58.040281Z
2022-04-24T21:55:44.663722Z
null
null
null
null
null
Linux
GSD-2021-1001358
atm: iphase: fix possible use-after-free in ia_module_exit()
atm: iphase: fix possible use-after-free in ia_module_exit() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.133 by commit c9172498d4d62c9b64e5fb37c1ee0343e65fe51b. For more details please see the references link.
null
2021-12-19T23:38:56.817680Z
2021-08-03T02:17:28.070977Z
null
null
null
null
null
Linux
GSD-2022-1001474
ext4: fix ext4_mb_mark_bb() with flex_bg with fast_commit
ext4: fix ext4_mb_mark_bb() with flex_bg with fast_commit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit b07eedd0222e9548ffc568ec429bb1f61d21a39c. For more details please see the references link.
null
2022-04-25T06:30:22.066919Z
2022-04-24T21:15:35.915263Z
null
null
null
null
null
Linux
GSD-2021-1002124
mm: filemap: check if THP has hwpoisoned subpage for PMD page fault
mm: filemap: check if THP has hwpoisoned subpage for PMD page fault This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.16 by commit 6ac017254b597709f39a083e1b1dfe09ef684f04, it was introduced in version v4.8 by commit 800d8c63b2e989c2e349632d1648119bf5862f01. For more details please see the references link.
null
2021-12-20T00:25:19.950531Z
2021-11-14T15:21:02.494439Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/800d8c63b2e989c2e349632d1648119bf5862f01'}
Linux
GSD-2021-1000119
mtd: physmap: physmap-bt1-rom: Fix unintentional stack access
mtd: physmap: physmap-bt1-rom: Fix unintentional stack access This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.20 by commit 4e4ebb827bf09311469ffd9d0c14ed40ed9747aa, it was introduced in version v5.10 by commit b3e79e7682e075326df8041b826b03453acacd0a. For more details please see the references link.
null
2021-12-20T00:32:17.466978Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b3e79e7682e075326df8041b826b03453acacd0a'}
Linux
GSD-2022-1001024
jfs: prevent NULL deref in diFree
jfs: prevent NULL deref in diFree This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 2e0e1de4f7a17e0886524c1d6701b8e2bf5a7363. For more details please see the references link.
null
2022-04-25T05:54:13.942787Z
2022-04-24T20:40:53.509345Z
null
null
null
null
null
Linux
GSD-2021-1002574
drm/msm: Fix wait_fence submitqueue leak
drm/msm: Fix wait_fence submitqueue leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.7 by commit 4c3cdbf2540319ea674f1f3c54f31f14c6f39647, it was introduced in version v5.15 by commit a61acbbe9cf873f869fc634ae6f72f214f5994cc. For more details please see the references link.
null
2021-12-19T23:20:33.827130Z
2021-12-19T19:43:23.885043Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a61acbbe9cf873f869fc634ae6f72f214f5994cc'}
Linux
GSD-2021-1000549
net: dsa: sja1105: add error handling in sja1105_setup()
net: dsa: sja1105: add error handling in sja1105_setup() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit 987e4ab8b8a4fcbf783069e03e7524cd39ffd563, it was introduced in version v5.10 by commit 0a7bdbc23d8a1d5e6f6f74abf00ba572f7369dd6. For more details please see the references link.
null
2021-12-20T01:32:13.228775Z
2021-06-04T19:36:54.227372Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0a7bdbc23d8a1d5e6f6f74abf00ba572f7369dd6'}
Linux
GSD-2021-1002061
mm: khugepaged: skip huge page collapse for special files
mm: khugepaged: skip huge page collapse for special files This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.78 by commit 6d67b2a73b8e3a079c355bab3c1aef7d85a044b8, it was introduced in version v5.4 by commit 99cb0dbd47a15d395bf3faa78dc122bc5efe3fc0. For more details please see the references link.
null
2021-12-19T23:45:18.324306Z
2021-11-14T15:18:01.856601Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/99cb0dbd47a15d395bf3faa78dc122bc5efe3fc0'}
Linux
GSD-2022-1001531
PCI: Reduce warnings on possible RW1C corruption
PCI: Reduce warnings on possible RW1C corruption This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 2167b75ad88fe3e97a8d326e7252ac6a05530a23, it was introduced in version v4.10 by commit fb26592301200dbbe4a9943fe188b57a46716900. For more details please see the references link.
null
2022-04-25T03:37:52.415425Z
2022-04-24T21:20:39.113566Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb26592301200dbbe4a9943fe188b57a46716900'}
Linux
GSD-2021-1002431
iio: mma8452: Fix trigger reference couting
iio: mma8452: Fix trigger reference couting This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.221 by commit f5deab10ced368c807866283f8b79144c4823be8, it was introduced in version v4.2 by commit ae6d9ce05691bf79694074db7c7da980080548af. For more details please see the references link.
null
2021-12-19T22:00:23.386594Z
2021-12-19T19:37:00.894427Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ae6d9ce05691bf79694074db7c7da980080548af'}
Linux
GSD-2022-1001161
block, bfq: don't move oom_bfqq
block, bfq: don't move oom_bfqq This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit c01fced8d38fbccc82787065229578006f28e020. For more details please see the references link.
null
2022-04-25T04:12:19.092420Z
2022-04-24T20:49:35.483655Z
null
null
null
null
null
Linux
GSD-2022-1000320
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup
net: usb: ax88179_178a: Fix out-of-bounds accesses in RX fixup This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.231 by commit 1668781ed24da43498799aa4f65714a7de201930, it was introduced in version v3.9 by commit e2ca90c276e1fc410d7cd3c1a4eee245ec902a20. For more details please see the references link.
null
2022-03-07T01:52:09.392618Z
2022-02-27T02:50:25.138638Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e2ca90c276e1fc410d7cd3c1a4eee245ec902a20'}
Linux
GSD-2022-1000770
netfilter: nf_queue: fix possible use-after-free
netfilter: nf_queue: fix possible use-after-free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.27 by commit dd648bd1b33a828f62befa696b206c688da0ec43, it was introduced in version v2.6.29 by commit 271b72c7fa82c2c7a795bc16896149933110672d. For more details please see the references link.
null
2022-03-18T03:03:32.174483Z
2022-03-18T00:16:54.216182Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/271b72c7fa82c2c7a795bc16896149933110672d'}
Linux
GSD-2022-1001862
ath9k_htc: fix uninit value bugs
ath9k_htc: fix uninit value bugs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 0b700f7d06492de34964b6f414120043364f8191, it was introduced in version v2.6.35 by commit fb9987d0f748c983bb795a86f47522313f701a08. For more details please see the references link.
null
2022-04-25T05:31:06.746444Z
2022-04-24T21:49:22.187729Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb9987d0f748c983bb795a86f47522313f701a08'}
Linux
GSD-2022-1002063
kgdboc: fix return value of __setup handler
kgdboc: fix return value of __setup handler This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 45e95a7bf8c4fd2e5408e89bafe7ccf2a52f7864, it was introduced in version v4.20 by commit 1bd54d851f50dea6af30c3e6ff4f3e9aab5558f9. For more details please see the references link.
null
2022-04-25T05:04:37.305712Z
2022-04-24T22:06:47.444583Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1bd54d851f50dea6af30c3e6ff4f3e9aab5558f9'}
Linux
GSD-2021-1001533
mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap
mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.249 by commit ce5f372f5f084ff51c285fc27b232f15a3d00f0b, it was introduced in version v4.7 by commit 646e76bb5daf4ca38438c69ffb72cccb605f3466. For more details please see the references link.
null
2021-12-19T22:58:31.919784Z
2021-10-19T16:22:35.047221Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/646e76bb5daf4ca38438c69ffb72cccb605f3466'}
Linux
GSD-2022-1002433
mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init
mtd: rawnand: atmel: fix refcount issue in atmel_nand_controller_init This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 0856bf27057561f42b37df111603cf5a0d040294, it was introduced in version v4.12 by commit f88fc122cc34c2545dec9562eaab121494e401ef. For more details please see the references link.
null
2022-04-25T06:50:16.305490Z
2022-04-24T22:46:44.280212Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f88fc122cc34c2545dec9562eaab121494e401ef'}
Linux
GSD-2021-1001499
HID: betop: fix slab-out-of-bounds Write in betop_probe
HID: betop: fix slab-out-of-bounds Write in betop_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.286 by commit a4faa7153b87fbcfe4be15f4278676f79ca6e019. For more details please see the references link.
null
2021-12-19T23:51:13.348851Z
2021-10-19T16:21:00.019877Z
null
null
null
null
null
Linux
GSD-2021-1001163
KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak
KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.6 by commit a4a488915feaad38345cc01b80d52e8200ff5209, it was introduced in version v4.18 by commit b3cebfe8c1cadf1817939dcc3688a2504a69c662. For more details please see the references link.
null
2021-12-20T00:04:53.432618Z
2021-08-03T01:31:38.858689Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b3cebfe8c1cadf1817939dcc3688a2504a69c662'}
Linux
GSD-2021-1000322
powerpc/64s: Fix crashes when toggling entry flush barrier
powerpc/64s: Fix crashes when toggling entry flush barrier This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.38 by commit d2e3590ca39ccfd8a5a46d8c7f095cb6c7b9ae92, it was introduced in version v5.10 by commit f79643787e0a0762d2409b7b8334e83f22d85695. For more details please see the references link.
null
2021-12-20T00:37:40.637244Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f79643787e0a0762d2409b7b8334e83f22d85695'}
Linux
GSD-2021-1000288
soundwire: stream: fix memory leak in stream config error path
soundwire: stream: fix memory leak in stream config error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit effd2bd62b416f6629e18e3ce077c60de14cfdea, it was introduced in version v4.18 by commit 89e590535f32d4bc548bcf266f3b046e50942f6d. For more details please see the references link.
null
2021-12-20T00:29:22.681612Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/89e590535f32d4bc548bcf266f3b046e50942f6d'}
Linux
GSD-2021-1001860
nvme-pci: Fix abort command id
nvme-pci: Fix abort command id This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.75 by commit 6fecdb5b54a5d37e5c018307ea9180502c85d158, it was introduced in version v5.10.67 by commit 240a7025a6f89f9596c36134bd07f3855c56c712. For more details please see the references link.
null
2021-12-19T22:09:32.338361Z
2021-10-28T13:52:43.834105Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/240a7025a6f89f9596c36134bd07f3855c56c712'}
Linux
GSD-2021-1000772
net: caif: add proper error handling
net: caif: add proper error handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.43 by commit d6db727457dd29938524f04b301c83ac67cccb87, it was introduced in version v3.3 by commit 7c18d2205ea76eef9674e59e1ecae4f332a53e9e. For more details please see the references link.
null
2021-12-19T22:39:28.414283Z
2021-06-25T00:04:37.912994Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7c18d2205ea76eef9674e59e1ecae4f332a53e9e'}
Linux
GSD-2021-1000267
bcache: Use 64-bit arithmetic instead of 32-bit
bcache: Use 64-bit arithmetic instead of 32-bit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 4fa8634493253c3f8932410a65680f588c7b7e4a, it was introduced in version v5.12 by commit d0cf9503e908ee7b235a5efecedeb74aabc482f3. For more details please see the references link.
null
2021-12-19T23:28:30.688237Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0cf9503e908ee7b235a5efecedeb74aabc482f3'}
Linux
GSD-2022-1000818
KVM: x86/mmu: make apf token non-zero to fix bug
KVM: x86/mmu: make apf token non-zero to fix bug This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.26 by commit 4c3644b6c96c5daa5149e5abddc07234eea47c7c. For more details please see the references link.
null
2022-03-18T02:57:40.515778Z
2022-03-18T00:21:12.886210Z
null
null
null
null
null
Linux
GSD-2021-1001925
regmap: Fix possible double-free in regcache_rbtree_exit()
regmap: Fix possible double-free in regcache_rbtree_exit() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.291 by commit e72dce9afbdbfa70d9b44f5908a50ff6c4858999, it was introduced in version v3.12 by commit 3f4ff561bc88b074d5e868dde4012d89cbb06c87. For more details please see the references link.
null
2021-12-19T23:29:48.730080Z
2021-11-14T15:11:58.022860Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f4ff561bc88b074d5e868dde4012d89cbb06c87'}
Linux
GSD-2021-1000637
NFS: fix an incorrect limit in filelayout_decode_layout()
NFS: fix an incorrect limit in filelayout_decode_layout() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.124 by commit e411df81cd862ef3d5b878120b2a2fef0ca9cdb1, it was introduced in version v2.6.37 by commit 16b374ca439fb406e46e071f75428f5b033056f8. For more details please see the references link.
null
2021-12-20T00:37:06.652404Z
2021-06-04T19:52:12.342712Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/16b374ca439fb406e46e071f75428f5b033056f8'}
Linux
GSD-2021-1001476
virtio_console: Assure used length from device is limited
virtio_console: Assure used length from device is limited This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.276 by commit 187f14fb88a9e62d55924748a274816fe6f34de6. For more details please see the references link.
null
2021-12-19T23:30:14.208971Z
2021-08-03T02:52:59.339521Z
null
null
null
null
null
Linux
GSD-2022-1002126
cifs: fix NULL ptr dereference in smb2_ioctl_query_info()
cifs: fix NULL ptr dereference in smb2_ioctl_query_info() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit edefc4b2a8e8310eee8e2b1714709ad5b2a93928. For more details please see the references link.
null
2022-04-25T06:56:52.312836Z
2022-04-24T22:13:57.966313Z
null
null
null
null
null
Linux
GSD-2021-1001026
bcache: avoid oversized read request in cache missing code path
bcache: avoid oversized read request in cache missing code path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit 555002a840ab88468e252b0eedf0b05e2ce7099c. For more details please see the references link.
null
2021-12-20T00:32:52.531684Z
2021-06-30T00:34:44.020136Z
null
null
null
null
null
Linux
GSD-2022-1001589
crypto: octeontx2 - remove CONFIG_DM_CRYPT check
crypto: octeontx2 - remove CONFIG_DM_CRYPT check This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit a462214866eebbca87e13ff6d73092b1c4895624, it was introduced in version v5.12 by commit 6f03f0e8b6c8a82d8e740ff3a87ed407ad423243. For more details please see the references link.
null
2022-04-25T05:11:22.103302Z
2022-04-24T21:26:41.340379Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6f03f0e8b6c8a82d8e740ff3a87ed407ad423243'}
Linux
GSD-2021-1002523
net: nexthop: fix null pointer dereference when IPv6 is not enabled
net: nexthop: fix null pointer dereference when IPv6 is not enabled This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.6 by commit 39509d76a9a3d02f379d52cb4b1449469c56c0e0, it was introduced in version v5.3 by commit 53010f991a9f5e4ed2db705ddde6ff32709192a2. For more details please see the references link.
null
2021-12-19T22:14:10.245012Z
2021-12-19T19:41:03.854120Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/53010f991a9f5e4ed2db705ddde6ff32709192a2'}
Linux
GSD-2022-1001073
mt76: mt7921: fix crash when startup fails.
mt76: mt7921: fix crash when startup fails. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit ac1260b661c2ef0d0a56680cdb5672b931b7be8f. For more details please see the references link.
null
2022-04-25T05:04:20.775319Z
2022-04-24T20:43:34.374730Z
null
null
null
null
null
Linux
GSD-2021-1002173
mm/mempolicy: do not allow illegal MPOL_F_NUMA_BALANCING | MPOL_LOCAL in mbind()
mm/mempolicy: do not allow illegal MPOL_F_NUMA_BALANCING | MPOL_LOCAL in mbind() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 6d2aec9e123bb9c49cb5c7fc654f25f81e688e8c, it was introduced in version v5.12 by commit bda420b985054a3badafef23807c4b4fa38a3dff. For more details please see the references link.
null
2021-12-19T23:56:53.790417Z
2021-11-14T15:23:11.776335Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bda420b985054a3badafef23807c4b4fa38a3dff'}
Linux
GSD-2021-1002489
perf hist: Fix memory leak of a perf_hpp_fmt
perf hist: Fix memory leak of a perf_hpp_fmt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.84 by commit a4c17ebdd6249cb4e061358d3693383f6628e069. For more details please see the references link.
null
2021-12-20T00:34:18.019783Z
2021-12-19T19:39:36.074924Z
null
null
null
null
null
Linux
GSD-2022-1001423
docs: sysctl/kernel: add missing bit to panic_print
docs: sysctl/kernel: add missing bit to panic_print This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 9eff62b7b8ae0e322897aa54f23b615f90d99084, it was introduced in version v5.2 by commit de6da1e8bcf0dd2058b950b127491821207679dc. For more details please see the references link.
null
2022-04-25T05:54:51.145278Z
2022-04-24T21:11:46.303369Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/de6da1e8bcf0dd2058b950b127491821207679dc'}
Linux
GSD-2022-1000398
drop_monitor: fix data-race in dropmon_net_event / trace_napi_poll_hit
drop_monitor: fix data-race in dropmon_net_event / trace_napi_poll_hit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.102 by commit 877a05672f95d819ba2e45af3b7e95e01ece4c28, it was introduced in version v2.6.31 by commit 4ea7e38696c7e798c47ebbecadfd392f23f814f9. For more details please see the references link.
null
2022-03-07T01:33:30.705573Z
2022-02-27T03:01:22.377190Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4ea7e38696c7e798c47ebbecadfd392f23f814f9'}
Linux
GSD-2022-1000662
IB/hfi1: Fix panic with larger ipoib send_queue_size
IB/hfi1: Fix panic with larger ipoib send_queue_size This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.8 by commit 1530d84fba1e459ba55f46aa42649b88773210e7, it was introduced in version v5.16 by commit d47dfc2b00e69001c8eeae71f7e25066ccc36144. For more details please see the references link.
null
2022-03-07T01:38:51.234364Z
2022-02-27T03:37:31.731993Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d47dfc2b00e69001c8eeae71f7e25066ccc36144'}
Linux
GSD-2022-1001970
RDMA/hfi1: Fix use-after-free bug for mm struct
RDMA/hfi1: Fix use-after-free bug for mm struct This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit 5f54364ff6cfcd14cddf5441c4a490bb28dd69f7, it was introduced in version v5.10 by commit 3d2a9d642512c21a12d19b9250e7a835dcb41a79. For more details please see the references link.
null
2022-04-25T06:09:20.486915Z
2022-04-24T21:59:36.728309Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3d2a9d642512c21a12d19b9250e7a835dcb41a79'}
Linux
GSD-2022-1000232
gve: fix the wrong AdminQ buffer queue index check
gve: fix the wrong AdminQ buffer queue index check This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.99 by commit f744a064041cc1d84e1ad9d6a8e571f371850648, it was introduced in version v5.10 by commit 5cdad90de62c27c6af53edb1b4b91712622b892b. For more details please see the references link.
null
2022-02-20T02:08:26.691740Z
2022-02-18T21:59:13.568179Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5cdad90de62c27c6af53edb1b4b91712622b892b'}
Linux
GSD-2022-1000727
xhci: Prevent futile URB re-submissions due to incorrect return value.
xhci: Prevent futile URB re-submissions due to incorrect return value. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.12 by commit 12231153fa97aeef8e478da3c3bd4081cbf10bdb, it was introduced in version v3.11 by commit 203a86613fb3bf2767335659513fa98563a3eb71. For more details please see the references link.
null
2022-03-18T03:02:43.339312Z
2022-03-18T00:12:43.023471Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/203a86613fb3bf2767335659513fa98563a3eb71'}
Linux
GSD-2022-1001835
bpf, sockmap: Fix memleak in sk_psock_queue_msg
bpf, sockmap: Fix memleak in sk_psock_queue_msg This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit ef9785f429794567792561a584901faa9291d3ee, it was introduced in version v5.14 by commit 9635720b7c88592214562cb72605bdab6708006c. For more details please see the references link.
null
2022-04-25T03:23:37.397260Z
2022-04-24T21:46:32.580676Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9635720b7c88592214562cb72605bdab6708006c'}
Linux
GSD-2022-1000377
net: dsa: mv88e6xxx: fix use-after-free in mv88e6xxx_mdios_unregister
net: dsa: mv88e6xxx: fix use-after-free in mv88e6xxx_mdios_unregister This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.101 by commit 22249886dc5bc3d6bcc212f07e65b49d85c582fe, it was introduced in version v5.10.101 by commit 8ccebe77df6e0d88c72ba5e69cf1835927e53b6c. For more details please see the references link.
null
2022-02-27T02:58:16.546016Z
2022-02-27T02:58:16.546016Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ccebe77df6e0d88c72ba5e69cf1835927e53b6c'}
Linux
GSD-2021-1000908
net: ieee802154: fix null deref in parse dev addr
net: ieee802154: fix null deref in parse dev addr This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.127 by commit d0f47648b87b6d5f204cb7f3cbce6d36dab85a67. For more details please see the references link.
null
2021-12-19T22:39:38.757033Z
2021-06-30T00:05:50.728786Z
null
null
null
null
null
Linux
GSD-2022-1001136
KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU
KVM: x86/mmu: Zap _all_ roots when unmapping gfn range in TDP MMU This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 8cf6f98ab1d16d5e607635a0c21c4231eb15367e, it was introduced in version v5.13 by commit b7cccd397f310739fb85383033e95580f99927e0. For more details please see the references link.
null
2022-04-25T03:14:12.558289Z
2022-04-24T20:48:12.853309Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b7cccd397f310739fb85383033e95580f99927e0'}
Linux
GSD-2021-1002466
net: nexthop: fix null pointer dereference when IPv6 is not enabled
net: nexthop: fix null pointer dereference when IPv6 is not enabled This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.83 by commit b70ff391deeec35cdd8a05f5f63f5fe28bc4f225, it was introduced in version v5.3 by commit 53010f991a9f5e4ed2db705ddde6ff32709192a2. For more details please see the references link.
null
2021-12-20T00:47:55.826670Z
2021-12-19T19:38:32.879169Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/53010f991a9f5e4ed2db705ddde6ff32709192a2'}
Linux
GSD-2022-1001566
ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction
ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit d07e4bbaff6fbba6f70c04b092ea7d9afcdf392e, it was introduced in version v3.16 by commit 00a7bb81c20f3e81711e28e0f6c08cee8fd18514. For more details please see the references link.
null
2022-04-25T06:28:22.286599Z
2022-04-24T21:24:29.592298Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/00a7bb81c20f3e81711e28e0f6c08cee8fd18514'}
Linux
GSD-2021-1002036
mlxsw: thermal: Fix out-of-bounds memory accesses
mlxsw: thermal: Fix out-of-bounds memory accesses This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.75 by commit e59d839743b50cb1d3f42a786bea48cc5621d254, it was introduced in version v4.10 by commit a50c1e35650b929500bd89be61c89d95a267ce56. For more details please see the references link.
null
2021-12-19T23:44:03.700648Z
2021-11-14T15:16:59.603309Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a50c1e35650b929500bd89be61c89d95a267ce56'}
Linux
GSD-2021-1002759
iocost: Fix divide-by-zero on donation from low hweight cgroup
iocost: Fix divide-by-zero on donation from low hweight cgroup This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit 3a1a4eb574178c21241a6200f4785572e661c472, it was introduced in version v5.10 by commit f1de2439ec43b74764f2a26e3a310b24407e3bde. For more details please see the references link.
null
2022-01-11T05:54:10.534395Z
2021-12-27T05:49:10.899226Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f1de2439ec43b74764f2a26e3a310b24407e3bde'}
Linux
GSD-2021-1000764
perf probe: Fix NULL pointer dereference in convert_variable_location()
perf probe: Fix NULL pointer dereference in convert_variable_location() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.43 by commit 091283e3d5eb9f424b85e71804fc26092c3c4915, it was introduced in version v5.5 by commit 66f69b2197167cb99330c77a550da50f1f597abc. For more details please see the references link.
null
2021-12-20T00:05:16.843254Z
2021-06-25T00:03:17.298772Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/66f69b2197167cb99330c77a550da50f1f597abc'}
Linux
GSD-2021-1001876
KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest()
KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit 6d077c37c4643394b1bae9682da48164fc147ea8, it was introduced in version v5.2 by commit 10d91611f426d4bafd2a83d966c36da811b2f7ad. For more details please see the references link.
null
2021-12-20T00:10:22.136768Z
2021-10-28T13:53:29.384417Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/10d91611f426d4bafd2a83d966c36da811b2f7ad'}
Linux
GSD-2022-1001209
MIPS: pgalloc: fix memory leak caused by pgd_free()
MIPS: pgalloc: fix memory leak caused by pgd_free() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 1bf0d78c8cc3cf615a6e7bf33ada70b73592f0a1, it was introduced in version v5.9 by commit f9cb654cb550b7b87e8608b14fc3eca432429ffe. For more details please see the references link.
null
2022-04-25T03:10:56.930521Z
2022-04-24T20:53:54.289835Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f9cb654cb550b7b87e8608b14fc3eca432429ffe'}
Linux
GSD-2021-1002309
x86/hyperv: Fix NULL deref in set_hv_tscchange_cb() if Hyper-V setup fails
x86/hyperv: Fix NULL deref in set_hv_tscchange_cb() if Hyper-V setup fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit 8823ea27fff6084bbb4bc71d15378fae0220b1d8, it was introduced in version v4.16 by commit 93286261de1b46339aa27cd4c639b21778f6cade. For more details please see the references link.
null
2021-12-20T01:25:29.671945Z
2021-11-29T02:38:10.420957Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/93286261de1b46339aa27cd4c639b21778f6cade'}
Linux
GSD-2021-1000334
dmaengine: idxd: Fix potential null dereference on pointer status
dmaengine: idxd: Fix potential null dereference on pointer status This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.38 by commit 5756f757c72501ef1a16f5f63f940623044180e9, it was introduced in version v5.10.17 by commit 40e3b5c128645d2ddad12310c7be98758cafb2b0. For more details please see the references link.
null
2021-12-19T23:48:36.559102Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/40e3b5c128645d2ddad12310c7be98758cafb2b0'}
Linux
GSD-2022-1001659
cifs: potential buffer overflow in handling symlinks
cifs: potential buffer overflow in handling symlinks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.35 by commit 9901b07ba42b39266b34a888e48d7306fd707bee, it was introduced in version v2.6.37 by commit c69c1b6eaea1b3e1eecf7ad2fba0208ac4a11131. For more details please see the references link.
null
2022-04-25T06:36:45.117879Z
2022-04-24T21:32:30.960713Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c69c1b6eaea1b3e1eecf7ad2fba0208ac4a11131'}
Linux
GSD-2021-1001175
btrfs: fix lock inversion problem when doing qgroup extent tracing
btrfs: fix lock inversion problem when doing qgroup extent tracing This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.6 by commit f5ef2fe05d386995b951476ffc8d6a6023888d99. For more details please see the references link.
null
2021-12-20T00:55:36.974020Z
2021-08-03T01:32:25.781178Z
null
null
null
null
null
Linux
GSD-2022-1000418
scsi: qedf: Add stag_work to all the vports
scsi: qedf: Add stag_work to all the vports This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit 1f53bbf27a876f7e61262bd74c18680ac11d4c31. For more details please see the references link.
null
2022-03-07T02:19:32.920414Z
2022-02-27T03:04:17.971814Z
null
null
null
null
null
Linux
GSD-2022-1002425
lib/test: use after free in register_test_dev_kmod()
lib/test: use after free in register_test_dev_kmod() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit fdf2c2e4ff14dab7648e7d4431e10c0c18df2ff8, it was introduced in version v4.13 by commit d9c6a72d6fa29d3a7999dda726577e5d1fccafa5. For more details please see the references link.
null
2022-04-25T04:53:01.630696Z
2022-04-24T22:45:34.396005Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9c6a72d6fa29d3a7999dda726577e5d1fccafa5'}
Linux
GSD-2021-1001525
phy: mdio: fix memory leak
phy: mdio: fix memory leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.251 by commit f4f502a04ee1e543825af78f47eb7785015cd9f6, it was introduced in version v2.6.28 by commit 46abc02175b3c246dd5141d878f565a8725060c9. For more details please see the references link.
null
2021-12-19T22:38:41.267111Z
2021-10-19T16:22:13.747693Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/46abc02175b3c246dd5141d878f565a8725060c9'}
Linux
GSD-2022-1000048
tomoyo: Check exceeded quota early in tomoyo_domain_quota_is_ok().
tomoyo: Check exceeded quota early in tomoyo_domain_quota_is_ok(). This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.90 by commit e2048a1f91869d0226a0bfc867ecc40fc5897107. For more details please see the references link.
null
2022-01-11T05:48:21.492221Z
2022-01-10T19:51:46.417147Z
null
null
null
null
null
Linux
GSD-2022-1002075
af_netlink: Fix shift out of bounds in group mask calculation
af_netlink: Fix shift out of bounds in group mask calculation This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit b0898362188e05b2202656058cc32d98fabf3bac, it was introduced in version v2.6.14 by commit f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198. For more details please see the references link.
null
2022-04-25T04:51:11.764350Z
2022-04-24T22:08:16.789587Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198'}
Linux
GSD-2021-1001030
usb: dwc3: gadget: Bail from dwc3_gadget_exit() if dwc->gadget is NULL
usb: dwc3: gadget: Bail from dwc3_gadget_exit() if dwc->gadget is NULL This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit 4aad390363d2b9b3e92428dd34d27bb7ea8f1ee8, it was introduced in version v5.10 by commit e81a7018d93a7de31a3f121c9a7eecd0a5ec58b0. For more details please see the references link.
null
2021-12-20T00:13:51.595309Z
2021-06-30T00:35:00.597329Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e81a7018d93a7de31a3f121c9a7eecd0a5ec58b0'}
Linux
GSD-2022-1002130
cifs: prevent bad output lengths in smb2_ioctl_query_info()
cifs: prevent bad output lengths in smb2_ioctl_query_info() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 9963ccea6087268e1275b992dca5d0dd4b938765. For more details please see the references link.
null
2022-04-25T05:37:01.748234Z
2022-04-24T22:14:14.137098Z
null
null
null
null
null