ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2022-1001967
btrfs: fix qgroup reserve overflow the qgroup limit
btrfs: fix qgroup reserve overflow the qgroup limit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit 82ae73ac963cee877ce34f7c31b2b456b516e96c. For more details please see the references link.
null
2022-04-25T06:30:57.632158Z
2022-04-24T21:59:16.461932Z
null
null
null
null
null
Linux
GSD-2022-1000675
drm: mxsfb: Fix NULL pointer dereference
drm: mxsfb: Fix NULL pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.8 by commit 6f9267e01cca749137349d8ffb0d0ebbadf567f4, it was introduced in version v5.15 by commit b776b0f00f246d093c595bac4453c6e51541d5c5. For more details please see the references link.
null
2022-03-07T01:43:24.823528Z
2022-02-27T03:39:39.562390Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b776b0f00f246d093c595bac4453c6e51541d5c5'}
Linux
GSD-2021-1001318
dma-buf/sync_file: Don't leak fences on merge failure
dma-buf/sync_file: Don't leak fences on merge failure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.135 by commit 41f45e91c92c8480242ea448d54e28c753b13902, it was introduced in version v4.9 by commit a02b9dc90d844cc7df7b63264e7920cc425052d9. For more details please see the references link.
null
2021-12-19T22:27:20.665352Z
2021-08-03T02:07:06.577639Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a02b9dc90d844cc7df7b63264e7920cc425052d9'}
Linux
GSD-2022-1001434
rxrpc: fix some null-ptr-deref bugs in server_key.c
rxrpc: fix some null-ptr-deref bugs in server_key.c This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit c3c415ae0c82da1349d85b8c9b18e6480aa6a230, it was introduced in version v5.11 by commit 12da59fcab5a05d01773e7cb413b8b8f3bb4e334. For more details please see the references link.
null
2022-04-25T06:34:37.995772Z
2022-04-24T21:12:46.529584Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/12da59fcab5a05d01773e7cb413b8b8f3bb4e334'}
Linux
GSD-2021-1002164
KVM: arm64: Fix host stage-2 PGD refcount
KVM: arm64: Fix host stage-2 PGD refcount This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 1d58a17ef54599506d44c45ac95be27273a4d2b1, it was introduced in version v5.13 by commit 1025c8c0c6accfcbdc8f52ca1940160f65cd87d6. For more details please see the references link.
null
2021-12-19T22:32:23.884988Z
2021-11-14T15:22:49.278590Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1025c8c0c6accfcbdc8f52ca1940160f65cd87d6'}
Linux
GSD-2021-1000159
ACPI: custom_method: fix potential use-after-free issue
ACPI: custom_method: fix potential use-after-free issue This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.36 by commit 62dc2440ebb552aa0d7f635e1697e077d9d21203, it was introduced in version v5.4 by commit 03d1571d9513369c17e6848476763ebbd10ec2cb. For more details please see the references link.
null
2021-12-19T22:52:52.402008Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/03d1571d9513369c17e6848476763ebbd10ec2cb'}
Linux
GSD-2022-1001064
drm/sprd: fix potential NULL dereference
drm/sprd: fix potential NULL dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit c3acc8db1bc221604e2db9807f01d8a44b97a64d. For more details please see the references link.
null
2022-04-25T06:42:09.047563Z
2022-04-24T20:43:08.308154Z
null
null
null
null
null
Linux
GSD-2021-1002534
net: marvell: prestera: fix double free issue on err path
net: marvell: prestera: fix double free issue on err path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.6 by commit 03e5203d2161a00afe4d97d206d2293e40b2f253, it was introduced in version v5.10 by commit e1189d9a5fbec8153dbe03f3589bc2baa96694e2. For more details please see the references link.
null
2021-12-19T22:33:57.520075Z
2021-12-19T19:41:36.952523Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e1189d9a5fbec8153dbe03f3589bc2baa96694e2'}
Linux
GSD-2021-1000509
nvme-loop: fix memory leak in nvme_loop_create_ctrl()
nvme-loop: fix memory leak in nvme_loop_create_ctrl() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.40 by commit 9c980795ccd77e8abec33dd6fe28dfe1c4083e65, it was introduced in version v4.8 by commit 3a85a5de29ea779634ddfd768059e06196687aba. For more details please see the references link.
null
2021-12-20T01:10:37.426374Z
2021-05-31T23:48:07.340532Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3a85a5de29ea779634ddfd768059e06196687aba'}
Linux
GSD-2021-1002021
scsi: core: Put LLD module refcnt after SCSI device is released
scsi: core: Put LLD module refcnt after SCSI device is released This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.158 by commit 1ce287eff9f23181d5644db787f472463a61f68b. For more details please see the references link.
null
2021-12-20T01:16:29.539501Z
2021-11-14T15:16:16.449682Z
null
null
null
null
null
Linux
GSD-2022-1001571
ASoC: codecs: rx-macro: fix accessing compander for aux
ASoC: codecs: rx-macro: fix accessing compander for aux This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 87a2b44cb3005d30c3a72234d1e47b03ae3bb29a, it was introduced in version v5.12 by commit 4f692926f562ff48abfcca6b16f36ff8d57473b6. For more details please see the references link.
null
2022-04-25T03:33:34.031743Z
2022-04-24T21:24:51.821229Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4f692926f562ff48abfcca6b16f36ff8d57473b6'}
Linux
GSD-2021-1002471
scsi: mpt3sas: Fix kernel panic during drive powercycle test
scsi: mpt3sas: Fix kernel panic during drive powercycle test This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.83 by commit 2bf9c5a5039c8f4b037236aed505e6a25c1d5f7b, it was introduced in version v3.8 by commit f92363d12359498f9a9960511de1a550f0ec41c2. For more details please see the references link.
null
2021-12-19T22:56:06.025984Z
2021-12-19T19:38:44.954418Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f92363d12359498f9a9960511de1a550f0ec41c2'}
Linux
GSD-2022-1001121
scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair()
scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit a669a22aef0ceff706b885370af74b5a60a8ac85. For more details please see the references link.
null
2022-04-25T05:32:21.967611Z
2022-04-24T20:47:22.089107Z
null
null
null
null
null
Linux
GSD-2022-1001988
virtio_console: eliminate anonymous module_init & module_exit
virtio_console: eliminate anonymous module_init & module_exit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit c69b442125bf009fce26e15aa5616caf8a3673c3. For more details please see the references link.
null
2022-04-25T03:36:24.305038Z
2022-04-24T22:01:30.211410Z
null
null
null
null
null
Linux
GSD-2022-1000360
powerpc/fixmap: Fix VM debug warning on unmap
powerpc/fixmap: Fix VM debug warning on unmap This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.101 by commit 67baac10dd5ad1e9f50e8f2659984b3b0728d54e. For more details please see the references link.
null
2022-03-07T01:30:56.749009Z
2022-02-27T02:56:21.947003Z
null
null
null
null
null
Linux
GSD-2022-1001822
mxser: fix xmit_buf leak in activate when LSR == 0xff
mxser: fix xmit_buf leak in activate when LSR == 0xff This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit b125b08dbee3611f03f53b71471813ed4ccafcdd, it was introduced in version v2.6.33 by commit 6769140d304731f0a3b177470a2adb4bacd9036b. For more details please see the references link.
null
2022-04-25T08:02:27.440456Z
2022-04-24T21:45:17.188837Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6769140d304731f0a3b177470a2adb4bacd9036b'}
Linux
GSD-2022-1000730
iio: imu: st_lsm6dsx: wait for settling time in st_lsm6dsx_read_oneshot
iio: imu: st_lsm6dsx: wait for settling time in st_lsm6dsx_read_oneshot This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.12 by commit 9445c508883270e1093494e6654dd5ccaf507d97, it was introduced in version v4.11 by commit 290a6ce11d938be52634b3ce1bbc6b78be4d23c1. For more details please see the references link.
null
2022-03-18T02:56:23.770878Z
2022-03-18T00:13:05.380058Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/290a6ce11d938be52634b3ce1bbc6b78be4d23c1'}
Linux
GSD-2021-1000765
net/tls: Fix use-after-free after the TLS device goes down and up
net/tls: Fix use-after-free after the TLS device goes down and up This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.43 by commit f1d4184f128dede82a59a841658ed40d4e6d3aa2, it was introduced in version v4.18 by commit e8f69799810c32dd40c6724d829eccc70baad07f. For more details please see the references link.
null
2021-12-19T23:29:19.726870Z
2021-06-25T00:03:21.145731Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e8f69799810c32dd40c6724d829eccc70baad07f'}
Linux
GSD-2021-1002758
usb: xhci-mtk: fix list_del warning when enable list debug
usb: xhci-mtk: fix list_del warning when enable list debug This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit 67cbcd3fb8e6412cc5220315c7266e52c2b66268, it was introduced in version v5.15 by commit b8731209958a1dffccc2888121f4c0280c990550. For more details please see the references link.
null
2022-01-11T05:47:43.160320Z
2021-12-27T05:49:08.569281Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b8731209958a1dffccc2888121f4c0280c990550'}
Linux
GSD-2021-1001877
ucounts: Proper error handling in set_cred_ucounts
ucounts: Proper error handling in set_cred_ucounts This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit 1eb825343d636bcf7198a9cdbacd07867e313f51, it was introduced in version v5.14 by commit 905ae01c4ae2ae3df05bb141801b1db4b7d83c61. For more details please see the references link.
null
2021-12-19T22:39:50.471904Z
2021-10-28T13:53:32.552493Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/905ae01c4ae2ae3df05bb141801b1db4b7d83c61'}
Linux
GSD-2022-1001208
bpf, sockmap: Fix memleak in tcp_bpf_sendmsg while sk msg is full
bpf, sockmap: Fix memleak in tcp_bpf_sendmsg while sk msg is full This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit d0b85dfc6f01d26808e2576c6537c131b590e270, it was introduced in version v4.20 by commit 604326b41a6fb9b4a78b6179335decee0365cd8c. For more details please see the references link.
null
2022-04-25T03:35:36.024265Z
2022-04-24T20:53:49.674156Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/604326b41a6fb9b4a78b6179335decee0365cd8c'}
Linux
GSD-2021-1000335
PCI: endpoint: Fix NULL pointer dereference for ->get_features()
PCI: endpoint: Fix NULL pointer dereference for ->get_features() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.38 by commit bbed83d7060e07a5d309104d25a00f0a24441428, it was introduced in version v5.1 by commit 2c04c5b8eef797dca99699cfb55ff42dd3c12c23. For more details please see the references link.
null
2021-12-20T00:19:02.227867Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c04c5b8eef797dca99699cfb55ff42dd3c12c23'}
Linux
GSD-2021-1002308
spi: fix use-after-free of the add_lock mutex
spi: fix use-after-free of the add_lock mutex This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit 37330f37f6666c7739a44b2b6b95b047ccdbed2d, it was introduced in version v5.15 by commit 6098475d4cb48d821bdf453c61118c56e26294f0. For more details please see the references link.
null
2021-12-20T00:44:33.166402Z
2021-11-29T02:38:07.892924Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6098475d4cb48d821bdf453c61118c56e26294f0'}
Linux
GSD-2022-1001658
nfc: nci: add flush_workqueue to prevent uaf
nfc: nci: add flush_workqueue to prevent uaf This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.35 by commit 9ded5ae40f4fe37fcc28f36d76bf45df20be5432, it was introduced in version v3.2 by commit 6a2968aaf50c7a22fced77a5e24aa636281efca8. For more details please see the references link.
null
2022-04-25T06:30:01.614332Z
2022-04-24T21:32:19.401341Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6a2968aaf50c7a22fced77a5e24aa636281efca8'}
Linux
GSD-2021-1001174
driver core: auxiliary bus: Fix memory leak when driver_register() fail
driver core: auxiliary bus: Fix memory leak when driver_register() fail This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.6 by commit ce5b3de58fc21303722df46551f7eb9a91afb409, it was introduced in version v5.11 by commit 7de3697e9cbd4bd3d62bafa249d57990e1b8f294. For more details please see the references link.
null
2021-12-20T01:39:04.692972Z
2021-08-03T01:32:22.071453Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7de3697e9cbd4bd3d62bafa249d57990e1b8f294'}
Linux
GSD-2022-1002424
PM: core: keep irq flags in device_pm_check_callbacks()
PM: core: keep irq flags in device_pm_check_callbacks() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 78c4d68b952f5f537788dbd454031ea9bf50f642. For more details please see the references link.
null
2022-04-25T04:18:15.854101Z
2022-04-24T22:45:27.059561Z
null
null
null
null
null
Linux
GSD-2022-1000419
scsi: qedf: Fix refcount issue when LOGO is received during TMF
scsi: qedf: Fix refcount issue when LOGO is received during TMF This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit 6be8eaad75ca73131e2a697f0270dc8ee73814a8. For more details please see the references link.
null
2022-03-07T02:20:01.962264Z
2022-02-27T03:04:24.733238Z
null
null
null
null
null
Linux
GSD-2021-1001524
net_sched: fix NULL deref in fifo_set_limit()
net_sched: fix NULL deref in fifo_set_limit() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.251 by commit 26af64d71b6277841285fa40e3f7164a378dfda9, it was introduced in version v2.6.27 by commit fb0305ce1b03f6ff17f84f2c63daccecb45f2805. For more details please see the references link.
null
2021-12-19T22:40:11.076420Z
2021-10-19T16:22:11.084528Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb0305ce1b03f6ff17f84f2c63daccecb45f2805'}
Linux
GSD-2022-1002074
net: bcmgenet: Use stronger register read/writes to assure ordering
net: bcmgenet: Use stronger register read/writes to assure ordering This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit b26091a02093104259ca64aeca73601e56160d62, it was introduced in version v4.14 by commit 69d2ea9c798983c4a7157278ec84ff969d1cd8e8. For more details please see the references link.
null
2022-04-25T07:24:48.422642Z
2022-04-24T22:08:03.936513Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69d2ea9c798983c4a7157278ec84ff969d1cd8e8'}
Linux
GSD-2022-1000049
Input: appletouch - initialize work before device registration
Input: appletouch - initialize work before device registration This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.13 by commit e79ff8c68acb1eddf709d3ac84716868f2a91012, it was introduced in version v2.6.23 by commit 5a6eb676d3bc4d7a6feab200a92437b62ad298da. For more details please see the references link.
null
2022-01-11T07:35:05.987092Z
2022-01-10T19:51:48.822294Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5a6eb676d3bc4d7a6feab200a92437b62ad298da'}
Linux
GSD-2021-1001031
usb: cdnsp: Fix deadlock issue in cdnsp_thread_irq_handler
usb: cdnsp: Fix deadlock issue in cdnsp_thread_irq_handler This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit ae746b6f4ce619cf4032fd798a232b010907a397, it was introduced in version v5.12 by commit 3d82904559f4f5a2622db1b21de3edf2eded7664. For more details please see the references link.
null
2021-12-19T22:49:44.889781Z
2021-06-30T00:35:04.400588Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3d82904559f4f5a2622db1b21de3edf2eded7664'}
Linux
GSD-2022-1002131
mm: invalidate hwpoison page cache page in fault path
mm: invalidate hwpoison page cache page in fault path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit fa37c1714367e530f592d451607433ab58d56643. For more details please see the references link.
null
2022-04-25T06:44:56.583559Z
2022-04-24T22:14:17.014034Z
null
null
null
null
null
Linux
GSD-2021-1001461
mISDN: fix possible use-after-free in HFC_cleanup()
mISDN: fix possible use-after-free in HFC_cleanup() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.276 by commit 54ff3202928952a100c477248e65ac6db01258a7. For more details please see the references link.
null
2021-12-19T23:02:50.397905Z
2021-08-03T02:47:27.449080Z
null
null
null
null
null
Linux
GSD-2021-1000620
drm/amd/amdgpu: fix a potential deadlock in gpu reset
drm/amd/amdgpu: fix a potential deadlock in gpu reset This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.124 by commit de2bf5de17be2b552d18ddea9a16b233f4f009e3, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T23:33:18.326512Z
2021-06-04T19:49:02.128617Z
null
null
null
null
null
Linux
GSD-2021-1001932
nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells
nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.288 by commit 60df06bbdf497e37ed25ad40572c362e5b0998df, it was introduced in version v4.3 by commit 69aba7948cbe53f2f1827e84e9dd0ae470a5072e. For more details please see the references link.
null
2021-12-19T23:47:03.212001Z
2021-11-14T15:12:15.486466Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69aba7948cbe53f2f1827e84e9dd0ae470a5072e'}
Linux
GSD-2021-1001898
drm/msm/a4xx: fix error handling in a4xx_gpu_init()
drm/msm/a4xx: fix error handling in a4xx_gpu_init() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit 3962d626eb3e3b23ebb2e2a61537fa764acbfe11, it was introduced in version v5.11 by commit 5785dd7a8ef0de8049f40a1a109de6a1bf17b479. For more details please see the references link.
null
2021-12-19T22:22:04.836700Z
2021-10-28T13:54:41.058048Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5785dd7a8ef0de8049f40a1a109de6a1bf17b479'}
Linux
GSD-2021-1000270
drm/amd/display: Free local data after use
drm/amd/display: Free local data after use This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 296443139f893b554dddd56a99ba8471ab5802d4, it was introduced in version v5.12 by commit 3a00c04212d1cfe1426338b78f4ead623508c874. For more details please see the references link.
null
2021-12-19T23:15:43.386307Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3a00c04212d1cfe1426338b78f4ead623508c874'}
Linux
GSD-2021-1002522
iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove
iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.85 by commit ee86d0bad80bdcd11a87e188a596727f41b62320, it was introduced in version v4.2 by commit a25691c1f9674090fb66586cf4c5d60d3efdf339. For more details please see the references link.
null
2021-12-19T22:50:43.573909Z
2021-12-19T19:41:01.270303Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a25691c1f9674090fb66586cf4c5d60d3efdf339'}
Linux
GSD-2022-1001588
drm/i915/gem: add missing boundary check in vm_access
drm/i915/gem: add missing boundary check in vm_access This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 5f6e560e3e86ac053447524224e411034f41f5c7, it was introduced in version v5.8 by commit 9f909e215fea0652023b9ed09d3d7bfe10386423. For more details please see the references link.
null
2022-04-25T05:55:18.770781Z
2022-04-24T21:26:37.147469Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9f909e215fea0652023b9ed09d3d7bfe10386423'}
Linux
GSD-2022-1001072
drm/bridge: Add missing pm_runtime_put_sync
drm/bridge: Add missing pm_runtime_put_sync This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 9df80dc738926a2ea4bd1ce5993c3d0f4b0e855c. For more details please see the references link.
null
2022-04-25T04:41:35.276479Z
2022-04-24T20:43:31.502230Z
null
null
null
null
null
Linux
GSD-2021-1002172
userfaultfd: fix a race between writeprotect and exit_mmap()
userfaultfd: fix a race between writeprotect and exit_mmap() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit cb185d5f1ebf900f4ae3bf84cee212e6dd035aca, it was introduced in version v5.7 by commit 63b2d4174c4ad1f40b48d7138e71bcb564c1fe03. For more details please see the references link.
null
2021-12-20T00:19:50.163069Z
2021-11-14T15:23:09.385919Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63b2d4174c4ad1f40b48d7138e71bcb564c1fe03'}
Linux
GSD-2022-1001422
net: preserve skb_end_offset() in skb_unclone_keeptruesize()
net: preserve skb_end_offset() in skb_unclone_keeptruesize() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit a9a6d30264327d8ff7f23da33e7a77ffb793fa3f, it was introduced in version v5.16 by commit c4777efa751d293e369aec464ce6875e957be255. For more details please see the references link.
null
2022-04-25T03:19:01.796861Z
2022-04-24T21:11:40.488667Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c4777efa751d293e369aec464ce6875e957be255'}
Linux
GSD-2021-1002488
net: ethernet: dec: tulip: de4x5: fix possible array overflows in type3_infoblock()
net: ethernet: dec: tulip: de4x5: fix possible array overflows in type3_infoblock() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.84 by commit 2c15d2a6ba2709dd8e209e597d1ff2a1a1996936. For more details please see the references link.
null
2021-12-19T22:58:43.800927Z
2021-12-19T19:39:33.691594Z
null
null
null
null
null
Linux
GSD-2022-1000399
net: dsa: lantiq_gswip: fix use after free in gswip_remove()
net: dsa: lantiq_gswip: fix use after free in gswip_remove() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.102 by commit f48bd34137718042872d06f2c7332b3267a29165, it was introduced in version v5.10.101 by commit e177d2e85ebcd3008c4b2abc293f4118e04eedef. For more details please see the references link.
null
2022-03-07T01:43:21.978765Z
2022-02-27T03:01:29.107551Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e177d2e85ebcd3008c4b2abc293f4118e04eedef'}
Linux
GSD-2022-1000663
IB/hfi1: Fix alloc failure with larger txqueuelen
IB/hfi1: Fix alloc failure with larger txqueuelen This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.8 by commit 2d0587a70e5356e42c8427eb8e954c129bd97ece, it was introduced in version v5.8 by commit d99dc602e2a55a99940ba9506a7126dfa54d54ea. For more details please see the references link.
null
2022-03-07T01:34:09.443954Z
2022-02-27T03:37:38.469466Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d99dc602e2a55a99940ba9506a7126dfa54d54ea'}
Linux
GSD-2022-1001971
mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0)
mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0) This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.111 by commit 7d659cb1763ff17d1c6ee082fa6feb4267c7a30b. For more details please see the references link.
null
2022-04-25T04:15:49.214715Z
2022-04-24T21:59:39.654945Z
null
null
null
null
null
Linux
GSD-2022-1000233
bpf: Use VM_MAP instead of VM_ALLOC for ringbuf
bpf: Use VM_MAP instead of VM_ALLOC for ringbuf This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.99 by commit 6304a613a97d6dcd49b93fbad31e9f39d1e138d6, it was introduced in version v5.8 by commit 457f44363a8894135c85b7a9afd2bd8196db24ab. For more details please see the references link.
null
2022-02-19T15:32:15.286636Z
2022-02-18T21:59:20.328193Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/457f44363a8894135c85b7a9afd2bd8196db24ab'}
Linux
GSD-2022-1000726
RDMA/cma: Do not change route.addr.src_addr outside state checks
RDMA/cma: Do not change route.addr.src_addr outside state checks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.12 by commit d350724795c7a48b05bf921d94699fbfecf7da0b, it was introduced in version v5.10 by commit 732d41c545bb359cbb8c94698bdc1f8bcf82279c. For more details please see the references link.
null
2022-03-18T03:33:02.079031Z
2022-03-18T00:12:31.711557Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/732d41c545bb359cbb8c94698bdc1f8bcf82279c'}
Linux
GSD-2022-1001834
bpf, sockmap: Fix memleak in tcp_bpf_sendmsg while sk msg is full
bpf, sockmap: Fix memleak in tcp_bpf_sendmsg while sk msg is full This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit de3a8d8fab0710186f7864ec812836d8d70da3c9, it was introduced in version v4.20 by commit 604326b41a6fb9b4a78b6179335decee0365cd8c. For more details please see the references link.
null
2022-04-25T06:04:14.289838Z
2022-04-24T21:46:28.933029Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/604326b41a6fb9b4a78b6179335decee0365cd8c'}
Linux
GSD-2022-1000376
veth: fix races around rq->rx_notify_masked
veth: fix races around rq->rx_notify_masked This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.101 by commit bf99c144360dc0ba338eedc0917953157ce211ec, it was introduced in version v4.19 by commit 948d4f214fde43743c57aae0c708bff44f6345f2. For more details please see the references link.
null
2022-03-07T01:38:06.568554Z
2022-02-27T02:58:09.729272Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/948d4f214fde43743c57aae0c708bff44f6345f2'}
Linux
GSD-2021-1000909
HID: usbhid: fix info leak in hid_submit_ctrl
HID: usbhid: fix info leak in hid_submit_ctrl This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.127 by commit 7f5a4b24cdbd7372770a02f23e347d7d9a9ac8f1. For more details please see the references link.
null
2021-12-19T23:24:31.589373Z
2021-06-30T00:05:54.408390Z
null
null
null
null
null
Linux
GSD-2022-1001137
powerpc/kasan: Fix early region not updated correctly
powerpc/kasan: Fix early region not updated correctly This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit e3d157a4b4f4e0268c98be5b7013bf4b31234bb6, it was introduced in version v5.4 by commit cbd18991e24fea2c31da3bb117c83e4a3538cd11. For more details please see the references link.
null
2022-04-25T04:57:13.368487Z
2022-04-24T20:48:18.361240Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cbd18991e24fea2c31da3bb117c83e4a3538cd11'}
Linux
GSD-2021-1002467
staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect()
staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.83 by commit 8d0163cec7de995f9eb9c3128c83fb84f0cb1c64, it was introduced in version v3.2 by commit 66898177e7e5486dc77a4ba742efa4e2e9e900a4. For more details please see the references link.
null
2021-12-20T00:34:41.315866Z
2021-12-19T19:38:35.376996Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/66898177e7e5486dc77a4ba742efa4e2e9e900a4'}
Linux
GSD-2022-1001567
ASoC: codecs: va-macro: fix accessing array out of bounds for enum type
ASoC: codecs: va-macro: fix accessing array out of bounds for enum type This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 4a799972a283ab4ec031041304d7e2d34e1a16eb, it was introduced in version v5.11 by commit 908e6b1df26efc9d2df70c9a7bf4f5eae5c5702f. For more details please see the references link.
null
2022-04-25T06:36:47.179286Z
2022-04-24T21:24:33.948176Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/908e6b1df26efc9d2df70c9a7bf4f5eae5c5702f'}
Linux
GSD-2021-1002037
drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read
drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.75 by commit a7b45024f66f9ec769e8dbb1a51ae83cd05929c7, it was introduced in version v5.7 by commit e11f5bd8228fc3760c221f940b9f6365dbf3e7ed. For more details please see the references link.
null
2021-12-19T22:18:29.472196Z
2021-11-14T15:17:02.004193Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e11f5bd8228fc3760c221f940b9f6365dbf3e7ed'}
Linux
GSD-2022-1002062
xen: fix is_xen_pmu()
xen: fix is_xen_pmu() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit e9445a7a59d84ed3ae6c85f299d2a6c4930b1ee9, it was introduced in version v4.3 by commit bf6dfb154d935725c9a2005033ca33017b9df439. For more details please see the references link.
null
2022-04-25T06:44:20.383446Z
2022-04-24T22:06:41.134371Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf6dfb154d935725c9a2005033ca33017b9df439'}
Linux
GSD-2021-1001532
ipack: ipoctal: fix stack information leak
ipack: ipoctal: fix stack information leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.249 by commit 2725925982dc96a78069cd118ea3d66759bfdad7, it was introduced in version v3.5 by commit ba4dc61fe8c545a5d6a68b63616776556b771f51. For more details please see the references link.
null
2021-12-20T01:33:50.875560Z
2021-10-19T16:22:32.315346Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ba4dc61fe8c545a5d6a68b63616776556b771f51'}
Linux
GSD-2021-1001498
netfilter: ipset: Fix oversized kvmalloc() calls
netfilter: ipset: Fix oversized kvmalloc() calls This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.286 by commit c55127a19d3cc334978eaddc2d7cdb19e2c2b29f. For more details please see the references link.
null
2021-12-20T01:27:02.161990Z
2021-10-19T16:20:57.150811Z
null
null
null
null
null
Linux
GSD-2022-1002432
af_netlink: Fix shift out of bounds in group mask calculation
af_netlink: Fix shift out of bounds in group mask calculation This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit ac5883a8890a11c00b32a19949a25d4afeaa2f5a, it was introduced in version v2.6.14 by commit f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198. For more details please see the references link.
null
2022-04-25T05:00:38.234389Z
2022-04-24T22:46:36.773135Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198'}
Linux
GSD-2021-1001162
usb: hso: fix error handling code of hso_create_net_device
usb: hso: fix error handling code of hso_create_net_device This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.6 by commit eeaa4b8d1e2e6f10362673d283a97dccc7275afa, it was introduced in version v5.9 by commit 5fcfb6d0bfcda17f0d0656e4e5b3710af2bbaae5. For more details please see the references link.
null
2021-12-19T23:43:41.356682Z
2021-08-03T01:31:35.157582Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5fcfb6d0bfcda17f0d0656e4e5b3710af2bbaae5'}
Linux
GSD-2021-1000323
i40e: Fix use-after-free in i40e_client_subtask()
i40e: Fix use-after-free in i40e_client_subtask() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.38 by commit 829a713450b8fb127cbabfc1244c1d8179ec5107, it was introduced in version v4.16 by commit 7b0b1a6d0ac983ce1928432285d0222d4fb7c38b. For more details please see the references link.
null
2021-12-20T00:54:58.832027Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7b0b1a6d0ac983ce1928432285d0222d4fb7c38b'}
Linux
GSD-2021-1000289
bus: qcom: Put child node before return
bus: qcom: Put child node before return This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit c6f8e0dc8da1cd78d640dee392071cc2326ec1b2, it was introduced in version v4.9 by commit 335a127548081322bd2b294d715418648912f20c. For more details please see the references link.
null
2021-12-19T23:26:49.508853Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/335a127548081322bd2b294d715418648912f20c'}
Linux
GSD-2021-1001861
usb: musb: dsps: Fix the probe error path
usb: musb: dsps: Fix the probe error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.75 by commit 9d89e287116796bf987cc48f5c8632ef3048f8eb, it was introduced in version v5.10.67 by commit 8de01a896c1bc14b6b65b8d26013626597a45eda. For more details please see the references link.
null
2021-12-20T00:00:31.292231Z
2021-10-28T13:52:46.676581Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8de01a896c1bc14b6b65b8d26013626597a45eda'}
Linux
GSD-2021-1000773
net: caif: fix memory leak in caif_device_notify
net: caif: fix memory leak in caif_device_notify This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.43 by commit af2806345a37313f01b1c9f15e046745b8ee2daa, it was introduced in version v3.3 by commit 7c18d2205ea76eef9674e59e1ecae4f332a53e9e. For more details please see the references link.
null
2021-12-20T00:16:50.368996Z
2021-06-25T00:04:41.692570Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7c18d2205ea76eef9674e59e1ecae4f332a53e9e'}
Linux
GSD-2021-1000266
drm: xlnx: zynqmp: fix a memset in zynqmp_dp_train()
drm: xlnx: zynqmp: fix a memset in zynqmp_dp_train() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 58a54902ec869b8d051a0a282f252c750c1f33c8, it was introduced in version v5.9 by commit d76271d22694e874ed70791702db9252ffe96a4c. For more details please see the references link.
null
2021-12-19T22:00:48.442686Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d76271d22694e874ed70791702db9252ffe96a4c'}
Linux
GSD-2022-1000819
io_uring: disallow modification of rsrc_data during quiesce
io_uring: disallow modification of rsrc_data during quiesce This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.26 by commit 0d773aaf5a90e2856301bd30781bf107db917a66. For more details please see the references link.
null
2022-03-18T02:52:27.527882Z
2022-03-18T00:21:15.244375Z
null
null
null
null
null
Linux
GSD-2021-1001924
IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields
IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.292 by commit bda41654b6e0c125a624ca35d6d20beb8015b5d0, it was introduced in version v2.6.35 by commit f931551bafe1f10ded7f5282e2aa162c267a2e5d. For more details please see the references link.
null
2021-12-19T23:04:00.234698Z
2021-11-14T15:11:55.667931Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f931551bafe1f10ded7f5282e2aa162c267a2e5d'}
Linux
GSD-2021-1000636
NFS: Fix an Oopsable condition in __nfs_pageio_add_request()
NFS: Fix an Oopsable condition in __nfs_pageio_add_request() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.124 by commit 1fc5f4eb9d31268ac3ce152d74ad5501ad24ca3e, it was introduced in version v4.0 by commit a7d42ddb3099727f58366fa006f850a219cce6c8. For more details please see the references link.
null
2021-12-19T23:35:04.877569Z
2021-06-04T19:51:53.733879Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a7d42ddb3099727f58366fa006f850a219cce6c8'}
Linux
GSD-2021-1001477
virtio-blk: Fix memory leak among suspend/resume procedure
virtio-blk: Fix memory leak among suspend/resume procedure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.276 by commit 381bde79d11e596002edfd914e6714291826967a. For more details please see the references link.
null
2021-12-20T01:06:27.895465Z
2021-08-03T02:53:14.471490Z
null
null
null
null
null
Linux
GSD-2022-1002127
can: isotp: sanitize CAN ID checks in isotp_bind()
can: isotp: sanitize CAN ID checks in isotp_bind() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit d72866a7f5326160d2a9d945a33eb6ef1883e25d, it was introduced in version v5.10 by commit e057dd3fc20ffb3d7f150af46542a51b59b90127. For more details please see the references link.
null
2022-04-25T05:56:55.151951Z
2022-04-24T22:14:02.346725Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e057dd3fc20ffb3d7f150af46542a51b59b90127'}
Linux
GSD-2021-1001027
tracing: Correct the length check which causes memory corruption
tracing: Correct the length check which causes memory corruption This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit b16a249eca2230c2cd66fa1d4b94743bd9b6ef92, it was introduced in version v5.11 by commit b220c049d5196dd94d992dd2dc8cba1a5e6123bf. For more details please see the references link.
null
2021-12-20T00:52:47.505966Z
2021-06-30T00:34:49.187520Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b220c049d5196dd94d992dd2dc8cba1a5e6123bf'}
Linux
GSD-2022-1002259
media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED
media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 3cc050df73e3d973f1870a8dc0e177e77670bc7f, it was introduced in version v3.7 by commit 8ac456495a33d9466076fea94594181ceefb76d9. For more details please see the references link.
null
2022-04-25T07:16:56.388941Z
2022-04-24T22:27:28.106213Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ac456495a33d9466076fea94594181ceefb76d9'}
Linux
GSD-2022-1000264
net/smc: Transitional solution for clcsock race issue
net/smc: Transitional solution for clcsock race issue This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.19 by commit 38f0bdd548fd2ef5d481b88d8a2bfef968452e34, it was introduced in version v5.1 by commit fd57770dd198f5b2ddd5b9e6bf282cf98d63adb9. For more details please see the references link.
null
2022-02-19T02:38:03.184361Z
2022-02-18T22:03:46.437021Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fd57770dd198f5b2ddd5b9e6bf282cf98d63adb9'}
Linux
GSD-2021-1001709
crypto: aesni - xts_crypt() return if walk.nbytes is 0
crypto: aesni - xts_crypt() return if walk.nbytes is 0 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit 38c84dfafed5b1193d083e0121ccd985ce5f5bdc. For more details please see the references link.
null
2021-12-19T23:03:35.635868Z
2021-10-19T16:32:57.089464Z
null
null
null
null
null
Linux
GSD-2021-1002826
veth: ensure skb entering GRO are not cloned.
veth: ensure skb entering GRO are not cloned. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.12 by commit d2269ae48598e05b59ec9ea9e6e44fd33941130d, it was introduced in version v5.13 by commit d3256efd8e8b234a6251e4d4580bd2c3c31fdc4c. For more details please see the references link.
null
2022-01-11T05:58:08.168655Z
2021-12-30T02:45:07.375826Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d3256efd8e8b234a6251e4d4580bd2c3c31fdc4c'}
Linux
GSD-2022-1000634
net: bridge: vlan: fix memory leak in __allowed_ingress
net: bridge: vlan: fix memory leak in __allowed_ingress This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit 14be8d448fca6fe7b2a413831eedd55aef6c6511, it was introduced in version v5.6 by commit a580c76d534c7360ba68042b19cb255e8420e987. For more details please see the references link.
null
2022-03-07T01:52:09.539089Z
2022-02-27T03:33:43.457847Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a580c76d534c7360ba68042b19cb255e8420e987'}
Linux
GSD-2022-1001926
pinctrl: samsung: drop pin banks references on error paths
pinctrl: samsung: drop pin banks references on error paths This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 89d369454267123bc2986a3bb49b7eaef6de2d7e, it was introduced in version v3.8 by commit ab663789d69760d2735402f66501f20b60312a3d. For more details please see the references link.
null
2022-04-25T06:45:24.771615Z
2022-04-24T21:55:41.733201Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab663789d69760d2735402f66501f20b60312a3d'}
Linux
GSD-2021-1001359
ubifs: Fix races between xattr_{set|get} and listxattr operations
ubifs: Fix races between xattr_{set|get} and listxattr operations This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.133 by commit 7adc05b73d91a5e3d4ca7714fa53ad9b70c53d08, it was introduced in version v2.6.27 by commit 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d. For more details please see the references link.
null
2021-12-20T01:05:54.656799Z
2021-08-03T02:17:58.421297Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d'}
Linux
GSD-2022-1001475
ext4: don't BUG if someone dirty pages without asking ext4 first
ext4: don't BUG if someone dirty pages without asking ext4 first This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 343117559ef41e992e326f7a92da1a8f254dfa8c. For more details please see the references link.
null
2022-04-25T05:49:35.528391Z
2022-04-24T21:15:38.830738Z
null
null
null
null
null
Linux
GSD-2021-1000118
scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand()
scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.20 by commit 80ef24175df2cba3860d0369d1c662b49ee2de56, it was introduced in version v5.5 by commit af2a0c51b1205327f55a7e82e530403ae1d42cbb. For more details please see the references link.
null
2021-12-19T23:59:31.662989Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/af2a0c51b1205327f55a7e82e530403ae1d42cbb'}
Linux
GSD-2021-1002125
mm, thp: bail out early in collapse_file for writeback page
mm, thp: bail out early in collapse_file for writeback page This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.16 by commit 5e669d8ab30ab61dec3c36e27b4711f07611e6fc, it was introduced in version v5.4 by commit 99cb0dbd47a15d395bf3faa78dc122bc5efe3fc0. For more details please see the references link.
null
2021-12-20T00:19:38.990083Z
2021-11-14T15:21:05.041071Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/99cb0dbd47a15d395bf3faa78dc122bc5efe3fc0'}
Linux
GSD-2022-1001025
NFS: Avoid writeback threads getting stuck in mempool_alloc()
NFS: Avoid writeback threads getting stuck in mempool_alloc() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit a6caeddd68977a1aaaf62fbd1955b41dd5c3c5d3. For more details please see the references link.
null
2022-04-25T04:30:30.931558Z
2022-04-24T20:40:56.394108Z
null
null
null
null
null
Linux
GSD-2021-1000548
i2c: i801: Don't generate an interrupt on bus reset
i2c: i801: Don't generate an interrupt on bus reset This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit 1f583d3813f204449037cd2acbfc09168171362a, it was introduced in version v3.6 by commit 636752bcb5177a301d0266270661581de8624828. For more details please see the references link.
null
2021-12-19T23:27:53.674935Z
2021-06-04T19:36:43.041865Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/636752bcb5177a301d0266270661581de8624828'}
Linux
GSD-2021-1002575
iwlwifi: Fix memory leaks in error handling path
iwlwifi: Fix memory leaks in error handling path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.7 by commit 4768935c25403ba96e7a745645df24a51a774b7e, it was introduced in version v5.14 by commit 9dad325f9d57508b154f0bebbc341a8528e5729c. For more details please see the references link.
null
2021-12-20T00:34:25.163254Z
2021-12-19T19:43:26.132693Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9dad325f9d57508b154f0bebbc341a8528e5729c'}
Linux
GSD-2021-1002060
mm, thp: bail out early in collapse_file for writeback page
mm, thp: bail out early in collapse_file for writeback page This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.77 by commit 69a7fa5cb0de06c8956b040f19a7248c8c8308ca, it was introduced in version v5.4 by commit 99cb0dbd47a15d395bf3faa78dc122bc5efe3fc0. For more details please see the references link.
null
2021-12-19T22:22:57.533187Z
2021-11-14T15:17:59.417165Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/99cb0dbd47a15d395bf3faa78dc122bc5efe3fc0'}
Linux
GSD-2022-1001530
powerpc/64s: Don't use DSISR for SLB faults
powerpc/64s: Don't use DSISR for SLB faults This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit a3dae36d632b2cf6eb20314273e512a96cb43c9a, it was introduced in version v5.5 by commit 46ddcb3950a28c0df4815e8dbb8d4b91d5d9f22d. For more details please see the references link.
null
2022-04-25T04:11:38.245857Z
2022-04-24T21:20:31.306660Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/46ddcb3950a28c0df4815e8dbb8d4b91d5d9f22d'}
Linux
GSD-2021-1002430
aio: fix use-after-free due to missing POLLFREE handling
aio: fix use-after-free due to missing POLLFREE handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.221 by commit 321fba81ec034f88aea4898993c1bf15605c023f, it was introduced in version v4.18 by commit 2c14fa838cbefc23cf1c73ca167ed85b274b2913. For more details please see the references link.
null
2021-12-20T01:34:12.222147Z
2021-12-19T19:36:58.454418Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c14fa838cbefc23cf1c73ca167ed85b274b2913'}
Linux
GSD-2022-1001160
memstick/mspro_block: fix handling of read-only devices
memstick/mspro_block: fix handling of read-only devices This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 6a0725b9d78ff6efdc95a37e4f05072e79c63918. For more details please see the references link.
null
2022-04-25T04:38:40.637105Z
2022-04-24T20:49:32.564868Z
null
null
null
null
null
Linux
GSD-2022-1000321
perf: Fix list corruption in perf_cgroup_switch()
perf: Fix list corruption in perf_cgroup_switch() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.230 by commit 30d9f3cbe47e1018ddc8069ac5b5c9e66fbdf727, it was introduced in version v4.11 by commit 058fe1c0440e68a1ba3c2270ae43e9f0298b27d8. For more details please see the references link.
null
2022-03-07T01:38:20.738703Z
2022-02-27T02:50:32.055158Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/058fe1c0440e68a1ba3c2270ae43e9f0298b27d8'}
Linux
GSD-2022-1000771
net: fix up skbs delta_truesize in UDP GRO frag_list
net: fix up skbs delta_truesize in UDP GRO frag_list This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.27 by commit 3a65b82b1ef28ec97233e77e93a265035f948ea5, it was introduced in version v5.11 by commit 53475c5dd856212e91538a9501162e821cc1f791. For more details please see the references link.
null
2022-03-18T02:55:23.964933Z
2022-03-18T00:16:58.056797Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/53475c5dd856212e91538a9501162e821cc1f791'}
Linux
GSD-2022-1001863
drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes()
drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit bdc7429708a0772d90c208975694f7c2133b1202, it was introduced in version v4.15 by commit e7b07ceef2a650e5ed8ca37997689e086c680daf. For more details please see the references link.
null
2022-04-25T05:43:20.124943Z
2022-04-24T21:49:29.496446Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e7b07ceef2a650e5ed8ca37997689e086c680daf'}
Linux
GSD-2021-1001836
net: mdiobus: Fix memory leak in __mdiobus_register
net: mdiobus: Fix memory leak in __mdiobus_register This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.76 by commit 3a0dc2e35a5d6546b1db87fe985582dadc64fe7b. For more details please see the references link.
null
2021-12-20T00:00:42.345978Z
2021-10-28T13:51:28.587555Z
null
null
null
null
null
Linux
GSD-2021-1002719
RDMA: Fix use-after-free in rxe_queue_cleanup
RDMA: Fix use-after-free in rxe_queue_cleanup This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.10 by commit acb53e47db1fbc7cd37ab10b46388f045a76e383, it was introduced in version v5.15 by commit 514aee660df493cd673154a6ba6bab745ec47b8c. For more details please see the references link.
null
2022-01-11T05:58:10.302434Z
2021-12-27T05:38:53.107022Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/514aee660df493cd673154a6ba6bab745ec47b8c'}
Linux
GSD-2021-1000724
pid: take a reference when initializing `cad_pid`
pid: take a reference when initializing `cad_pid` This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.272 by commit f86c80515a8a3703e0ca2e56deb50fc2879c5ea4, it was introduced in version v2.6.19 by commit 9ec52099e4b8678a60e9f93e41ad87885d64f3e6. For more details please see the references link.
null
2021-12-20T01:23:11.373816Z
2021-06-24T23:59:22.181410Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9ec52099e4b8678a60e9f93e41ad87885d64f3e6'}
Linux
GSD-2022-1001249
ath11k: free peer for station when disconnect from AP for QCA6390/WCN6855
ath11k: free peer for station when disconnect from AP for QCA6390/WCN6855 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 400705c50bbf184794c885d1efad7fe9ccf1471a, it was introduced in version v5.17 by commit b4a0f54156ac7720de1750b6ea06657c91c52163. For more details please see the references link.
null
2022-04-25T06:36:02.859981Z
2022-04-24T20:57:43.318600Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b4a0f54156ac7720de1750b6ea06657c91c52163'}
Linux
GSD-2021-1002349
scsi: pm80xx: Fix memory leak during rmmod
scsi: pm80xx: Fix memory leak during rmmod This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit 269a4311b15f68d24e816f43f123888f241ed13d. For more details please see the references link.
null
2021-12-20T01:35:22.849876Z
2021-11-29T02:39:56.384832Z
null
null
null
null
null
Linux
GSD-2021-1000374
sched/fair: Fix shift-out-of-bounds in load_balance()
sched/fair: Fix shift-out-of-bounds in load_balance() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 80862cbf76c2646f709a57c4517aefe0b094c774, it was introduced in version v5.10 by commit 5a7f555904671c0737819fe4d19bd6143de3f6c0. For more details please see the references link.
null
2021-12-19T23:00:26.953002Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5a7f555904671c0737819fe4d19bd6143de3f6c0'}
Linux
GSD-2022-1001619
mm/pages_alloc.c: don't create ZONE_MOVABLE beyond the end of a node
mm/pages_alloc.c: don't create ZONE_MOVABLE beyond the end of a node This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit fde1dd4f4b3c29c605846777a92f2eb49d806f81, it was introduced in version v2.6.23 by commit 2a1e274acf0b1c192face19a4be7c12d4503eaaf. For more details please see the references link.
null
2022-04-25T06:36:16.109912Z
2022-04-24T21:29:19.005106Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2a1e274acf0b1c192face19a4be7c12d4503eaaf'}
Linux
GSD-2021-1001135
net: qed: Fix memcpy() overflow of qed_dcbx_params()
net: qed: Fix memcpy() overflow of qed_dcbx_params() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.14 by commit 961535de34950d3f1920c11a712c541c0a9018a4. For more details please see the references link.
null
2021-12-20T00:24:43.553155Z
2021-07-08T01:58:48.394966Z
null
null
null
null
null
Linux
GSD-2022-1000458
nvme-rdma: fix possible use-after-free in transport error_recovery work
nvme-rdma: fix possible use-after-free in transport error_recovery work This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit 646952b2210f19e584d2bf9eb5d092abdca2fcc1. For more details please see the references link.
null
2022-03-07T02:19:36.856692Z
2022-02-27T03:10:19.064738Z
null
null
null
null
null