ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2022-1002465
nfc: nci: add flush_workqueue to prevent uaf
nfc: nci: add flush_workqueue to prevent uaf This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit 7d3232214ca4ea8f7d18df264c3b254aa8089d7f, it was introduced in version v3.2 by commit 6a2968aaf50c7a22fced77a5e24aa636281efca8. For more details please see the references link.
null
2022-04-25T06:08:03.797995Z
2022-04-24T22:51:13.655259Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6a2968aaf50c7a22fced77a5e24aa636281efca8'}
Linux
GSD-2021-1001565
cpufreq: schedutil: Destroy mutex before kobject_put() frees the memory
cpufreq: schedutil: Destroy mutex before kobject_put() frees the memory This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.209 by commit 3cb9595e23d879824ebcefeabdf5156bc288000c, it was introduced in version v4.19.209 by commit 30d57cf2c4116ca6d34ecd1cac94ad84f8bc446c. For more details please see the references link.
null
2021-10-19T16:24:00.862579Z
2021-10-19T16:24:00.862579Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/30d57cf2c4116ca6d34ecd1cac94ad84f8bc446c'}
Linux
GSD-2022-1002035
scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair()
scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit f97316dd393bc8df1cc2af6295a97b876eecf252. For more details please see the references link.
null
2022-04-25T07:28:11.994075Z
2022-04-24T22:05:05.161586Z
null
null
null
null
null
Linux
GSD-2021-1001070
net: hamradio: fix memory leak in mkiss_close
net: hamradio: fix memory leak in mkiss_close This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit f4de2b43d13b7cf3ced9310e371b90c836dbd7cd, it was introduced in version v2.6.14 by commit 815f62bf742718458ba822a7e1f51f285eb997f2. For more details please see the references link.
null
2021-12-20T00:28:13.175956Z
2021-06-30T00:37:39.626940Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/815f62bf742718458ba822a7e1f51f285eb997f2'}
Linux
GSD-2022-1002170
powerpc: Fix virt_addr_valid() for 64-bit Book3E & 32-bit
powerpc: Fix virt_addr_valid() for 64-bit Book3E & 32-bit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.190 by commit deab81144d5a043f42804207fb76cfbd8a806978. For more details please see the references link.
null
2022-04-25T03:27:53.851690Z
2022-04-24T22:18:15.462838Z
null
null
null
null
null
Linux
GSD-2021-1001420
tty: serial: 8250: serial_cs: Fix a memory leak in error handling path
tty: serial: 8250: serial_cs: Fix a memory leak in error handling path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.240 by commit 34f4590f5ec9859ea9136249f528173d150bd584. For more details please see the references link.
null
2021-12-19T23:09:49.395391Z
2021-08-03T02:35:43.869782Z
null
null
null
null
null
Linux
GSD-2021-1001973
comedi: vmk80xx: fix bulk-buffer overflow
comedi: vmk80xx: fix bulk-buffer overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.255 by commit 0866dcaa828c21bc2f94dac00e086078f11b5772, it was introduced in version v2.6.31 by commit 985cafccbf9b7f862aa1c5ee566801e18b5161fb. For more details please see the references link.
null
2021-12-20T01:35:20.230076Z
2021-11-14T15:14:02.452156Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/985cafccbf9b7f862aa1c5ee566801e18b5161fb'}
Linux
GSD-2021-1000661
NFS: fix an incorrect limit in filelayout_decode_layout()
NFS: fix an incorrect limit in filelayout_decode_layout() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.193 by commit 945ebef997227ca8c20bad7f8a8358c8ee57a84a, it was introduced in version v2.6.37 by commit 16b374ca439fb406e46e071f75428f5b033056f8. For more details please see the references link.
null
2021-12-19T22:14:23.729133Z
2021-06-04T19:56:52.093933Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/16b374ca439fb406e46e071f75428f5b033056f8'}
Linux
GSD-2021-1000231
ath10k: Fix a use after free in ath10k_htc_send_bundle
ath10k: Fix a use after free in ath10k_htc_send_bundle This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 5e413c0831ff4700d1739db3fa3ae9f859744676, it was introduced in version v5.8 by commit c8334512f3dd1b94844baca629f9bedca4271593. For more details please see the references link.
null
2021-12-19T21:47:57.543459Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c8334512f3dd1b94844baca629f9bedca4271593'}
Linux
GSD-2021-1000026
dmaengine: idxd: fix wq cleanup of WQCFG registers
dmaengine: idxd: fix wq cleanup of WQCFG registers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.16 by commit f7dc8f5619165e1fa3383d0c2519f502d9e2a1a9, it was introduced in version v5.8 by commit da32b28c95a79e399e18c03f8178f41aec9c66e4. For more details please see the references link.
null
2021-12-19T23:24:12.581311Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/da32b28c95a79e399e18c03f8178f41aec9c66e4'}
Linux
GSD-2021-1000476
crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init
crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.233 by commit 446045cf682af12d9294765f6c46084b374b5654, it was introduced in version v4.7 by commit 25c6ffb249f612c56a48ce48a3887adf57b8f4bd. For more details please see the references link.
null
2021-12-20T00:22:25.111250Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/25c6ffb249f612c56a48ce48a3887adf57b8f4bd'}
Linux
GSD-2021-1001637
HID: usbhid: free raw_report buffers in usbhid_stop
HID: usbhid: free raw_report buffers in usbhid_stop This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.71 by commit f7ac4d24e1610b92689946fa88177673f1e88a3f. For more details please see the references link.
null
2021-12-19T22:24:19.674281Z
2021-10-19T16:29:22.392622Z
null
null
null
null
null
Linux
GSD-2021-1000925
net: cdc_eem: fix tx fixup skb leak
net: cdc_eem: fix tx fixup skb leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.128 by commit 81de2ed06df8b5451e050fe6a318af3263dbff3f, it was introduced in version v2.6.30 by commit 9f722c0978b04acba209f8ca1896ad05814bc3a3. For more details please see the references link.
null
2021-12-20T00:20:32.274708Z
2021-06-30T00:24:54.815441Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9f722c0978b04acba209f8ca1896ad05814bc3a3'}
Linux
GSD-2022-1002367
drbd: fix potential silent data corruption
drbd: fix potential silent data corruption This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 92c60ae6f827cf41604eafccbc8608ce4fb41cc1. For more details please see the references link.
null
2022-04-25T06:27:54.053599Z
2022-04-24T22:39:31.151729Z
null
null
null
null
null
Linux
GSD-2021-1001267
virtio-blk: Fix memory leak among suspend/resume procedure
virtio-blk: Fix memory leak among suspend/resume procedure This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.52 by commit cd24da0db9f75ca11eaf6060f0ccb90e2f3be3b0. For more details please see the references link.
null
2021-12-19T23:25:20.407889Z
2021-08-03T01:53:29.220925Z
null
null
null
null
null
Linux
GSD-2022-1001818
drivers: ethernet: cpsw: fix panic when interrupt coaleceing is set via ethtool
drivers: ethernet: cpsw: fix panic when interrupt coaleceing is set via ethtool This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 585dc196a08fccdcd1b7fcf473cf566b34c4b840, it was introduced in version v5.15 by commit d43c65b05b848e0b2db1a6c78b02c189da3a95b5. For more details please see the references link.
null
2022-04-25T03:18:08.288386Z
2022-04-24T21:44:45.237385Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d43c65b05b848e0b2db1a6c78b02c189da3a95b5'}
Linux
GSD-2021-1001288
jfs: fix GPF in diFree
jfs: fix GPF in diFree This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.51 by commit 8018936950360f1c503bb385e158cfc5e4945d18. For more details please see the references link.
null
2021-12-20T02:30:10.309240Z
2021-08-03T01:57:46.518574Z
null
null
null
null
null
Linux
GSD-2022-1002222
Revert "Revert "block, bfq: honor already-setup queue merges""
Revert "Revert "block, bfq: honor already-setup queue merges"" This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 931aff627469a75c77b9fd3823146d0575afffd6. For more details please see the references link.
null
2022-04-25T04:15:32.797462Z
2022-04-24T22:22:56.352859Z
null
null
null
null
null
Linux
GSD-2021-1001772
drm/msm: Fix null pointer dereference on pointer edp
drm/msm: Fix null pointer dereference on pointer edp This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.290 by commit f175b9a83e5c252d7c74acddc792840016caae0a, it was introduced in version v4.0 by commit ab5b0107ccf3821a6837b0f2819270d6fa0b278f. For more details please see the references link.
null
2021-12-19T22:42:10.721592Z
2021-10-28T13:48:09.580326Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab5b0107ccf3821a6837b0f2819270d6fa0b278f'}
Linux
GSD-2021-1000860
usb: dwc3: ep0: fix NULL pointer exception
usb: dwc3: ep0: fix NULL pointer exception This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.237 by commit 990dc90750772622d44ca2ea6652c521e6f67e16. For more details please see the references link.
null
2021-12-20T00:59:28.039068Z
2021-06-30T00:02:01.639855Z
null
null
null
null
null
Linux
GSD-2022-1002388
ARM: davinci: da850-evm: Avoid NULL pointer dereference
ARM: davinci: da850-evm: Avoid NULL pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit a12b356d45cbb6e8a1b718d1436b3d6239a862f3, it was introduced in version v2.6.33 by commit bae105879f2f2404155da6f50b3636193d228a62. For more details please see the references link.
null
2022-04-25T05:36:58.961417Z
2022-04-24T22:41:48.359898Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bae105879f2f2404155da6f50b3636193d228a62'}
Linux
GSD-2021-1001322
net: qcom/emac: fix UAF in emac_remove
net: qcom/emac: fix UAF in emac_remove This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.135 by commit 2b70ca92847c619d6264c7372ef74fcbfd1e048c, it was introduced in version v4.9 by commit 54e19bc74f3380d414681762ceed9f7245bc6a6e. For more details please see the references link.
null
2021-12-20T00:00:09.913935Z
2021-08-03T02:08:19.804847Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/54e19bc74f3380d414681762ceed9f7245bc6a6e'}
Linux
GSD-2021-1000499
RDMA/rxe: Return CQE error if invalid lkey was supplied
RDMA/rxe: Return CQE error if invalid lkey was supplied This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.7 by commit abe31d25facdb9109fe2cf69890748295291570c, it was introduced in version v4.8 by commit 8700e3e7c4857d28ebaa824509934556da0b3e76. For more details please see the references link.
null
2021-12-20T01:17:32.858006Z
2021-05-31T23:46:38.282006Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8700e3e7c4857d28ebaa824509934556da0b3e76'}
Linux
GSD-2021-1000163
net: qrtr: Avoid potential use after free in MHI send
net: qrtr: Avoid potential use after free in MHI send This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.35 by commit 48ec949ac979b4b42d740f67b6177797af834f80, it was introduced in version v5.8 by commit 6e728f321393b1fce9e1c2c3e55f9f7c15991321. For more details please see the references link.
null
2021-12-19T23:52:05.777792Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6e728f321393b1fce9e1c2c3e55f9f7c15991321'}
Linux
GSD-2021-1000533
gve: Add NULL pointer checks when freeing irqs.
gve: Add NULL pointer checks when freeing irqs. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit 5278c75266c5094d3c0958793bf12fc90300e580, it was introduced in version v5.3 by commit 893ce44df56580fb878ca5af9c4a5fd87567da50. For more details please see the references link.
null
2021-12-20T00:18:46.253065Z
2021-06-04T19:34:39.924836Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/893ce44df56580fb878ca5af9c4a5fd87567da50'}
Linux
GSD-2022-1000566
HID: elo: fix memory leak in elo_probe
HID: elo: fix memory leak in elo_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit 80dad7483e3940dc9d9d55f8b34d1f4ba85a505e, it was introduced in version v5.15 by commit fbf42729d0e91332e8ce75a1ecce08b8a2dab9c1. For more details please see the references link.
null
2022-03-07T01:38:09.631360Z
2022-02-27T03:24:41.860961Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fbf42729d0e91332e8ce75a1ecce08b8a2dab9c1'}
Linux
GSD-2022-1000136
ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx()
ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.228 by commit 9a12fcbf3c622f9bf6b110a873d62b0cba93972e. For more details please see the references link.
null
2022-02-19T04:05:11.130045Z
2022-02-18T21:45:09.590492Z
null
null
null
null
null
Linux
GSD-2022-1001377
NFSv4.2: fix reference count leaks in _nfs42_proc_copy_notify()
NFSv4.2: fix reference count leaks in _nfs42_proc_copy_notify() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit fb73bf6305f4eb8f0cf9a61ee874d55f019d6dc4. For more details please see the references link.
null
2022-04-25T07:13:42.462079Z
2022-04-24T21:09:09.649550Z
null
null
null
null
null
Linux
GSD-2021-1001908
iio: adis16475: fix deadlock on frequency set
iio: adis16475: fix deadlock on frequency set This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit 04e03b907022ebd876f422f17efcc2c6cc934dc6, it was introduced in version v5.13 by commit 39c024b51b5607e9d2fc6c04c2573e4a778c728d. For more details please see the references link.
null
2021-12-19T22:17:44.524840Z
2021-10-28T13:55:10.244457Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/39c024b51b5607e9d2fc6c04c2573e4a778c728d'}
Linux
GSD-2021-1002627
xen/blkfront: harden blkfront against event channel storms
xen/blkfront: harden blkfront against event channel storms This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.294 by commit 25898389795bd85d8e1520c0c75c3ad906c17da7. For more details please see the references link.
null
2022-01-11T05:53:53.729594Z
2021-12-27T05:27:53.274064Z
null
null
null
null
null
Linux
GSD-2022-1000835
mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls
mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.104 by commit e93f2be33d4f4c1aa350dd79b6d1179746ff4cb5, it was introduced in version v5.10.71 by commit 57a269a1b12a3a6fe51f62e1be5e74494bad1d92. For more details please see the references link.
null
2022-03-18T02:54:46.290567Z
2022-03-18T00:22:50.717691Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/57a269a1b12a3a6fe51f62e1be5e74494bad1d92'}
Linux
GSD-2022-1001727
scsi: mpi3mr: Fix memory leaks
scsi: mpi3mr: Fix memory leaks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 5d76a88b8536d75ff5362e232097e85946b8aadf. For more details please see the references link.
null
2022-04-25T04:47:32.537232Z
2022-04-24T21:37:57.025506Z
null
null
null
null
null
Linux
GSD-2021-1002277
btrfs: fix memory ordering between normal and ordered work functions
btrfs: fix memory ordering between normal and ordered work functions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.82 by commit 6adbc07ebcaf8bead08b21687d49e0fc94400987, it was introduced in version v3.15 by commit 08a9ff3264181986d1d692a4e6fce3669700c9f8. For more details please see the references link.
null
2021-12-20T01:08:18.554322Z
2021-11-29T02:36:41.936101Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/08a9ff3264181986d1d692a4e6fce3669700c9f8'}
Linux
GSD-2021-1002762
USB: core: Make do_proc_control() and do_proc_bulk() killable
USB: core: Make do_proc_control() and do_proc_bulk() killable This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit 403716741c6c2c510dce44e88f085a740f535de6. For more details please see the references link.
null
2022-01-11T05:50:39.399182Z
2021-12-27T05:49:25.033313Z
null
null
null
null
null
Linux
GSD-2022-1001232
mt76: mt7921s: fix a possible memory leak in mt7921_load_patch
mt76: mt7921s: fix a possible memory leak in mt7921_load_patch This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit b301043384c5c2447357952be9a536c2026d8ad0, it was introduced in version v5.17 by commit 78b217580c50994ae22dde4ecaaf147de0f355f6. For more details please see the references link.
null
2022-04-25T08:38:09.592404Z
2022-04-24T20:56:14.936210Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/78b217580c50994ae22dde4ecaaf147de0f355f6'}
Linux
GSD-2021-1002298
staging: rtl8723bs: remove possible deadlock when disconnect (v2)
staging: rtl8723bs: remove possible deadlock when disconnect (v2) This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.82 by commit 3a53d9ad9bc3408ad7f0424d60d25381f9fa6c81. For more details please see the references link.
null
2021-12-20T00:10:33.877543Z
2021-11-29T02:37:34.750383Z
null
null
null
null
null
Linux
GSD-2021-1002332
ALSA: gus: fix null pointer dereference on pointer block
ALSA: gus: fix null pointer dereference on pointer block This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit 16721797dcef2c7c030ffe73a07f39a65f9323c3. For more details please see the references link.
null
2021-12-19T22:32:26.236099Z
2021-11-29T02:39:06.771785Z
null
null
null
null
null
Linux
GSD-2022-1001398
scsi: pm8001: Fix task leak in pm8001_send_abort_all()
scsi: pm8001: Fix task leak in pm8001_send_abort_all() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 146cae06d2682d7563732544be334e8e6d3862b8. For more details please see the references link.
null
2022-04-25T06:42:40.132238Z
2022-04-24T21:10:23.172869Z
null
null
null
null
null
Linux
GSD-2022-1000970
mm: fix unexpected zeroed page mapping with zram swap
mm: fix unexpected zeroed page mapping with zram swap This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.4 by commit afac4b88699a06c8b9369f9d759a1ec3c254b788, it was introduced in version v4.15 by commit 0bcac06f27d7528591c27ac2b093ccd71c5d0168. For more details please see the references link.
null
2022-04-25T03:44:36.361783Z
2022-04-24T20:35:59.682397Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0bcac06f27d7528591c27ac2b093ccd71c5d0168'}
Linux
GSD-2022-1001662
powerpc: Fix virt_addr_valid() for 64-bit Book3E & 32-bit
powerpc: Fix virt_addr_valid() for 64-bit Book3E & 32-bit This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit fddb88bd266f4513abab7c36bca98935c9148a98. For more details please see the references link.
null
2022-04-25T03:39:09.828124Z
2022-04-24T21:32:47.405138Z
null
null
null
null
null
Linux
GSD-2022-1000423
phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable()
phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit 94b16ca86ab688ed6fad4548f70137f93cf1f0a9, it was introduced in version v5.12 by commit 5b1af71280abd82efbe28cd28d553363dfde0a34. For more details please see the references link.
null
2022-03-07T01:43:04.957054Z
2022-02-27T03:04:51.433806Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5b1af71280abd82efbe28cd28d553363dfde0a34'}
Linux
GSD-2022-1000589
ASoC: max9759: fix underflow in speaker_gain_control_put()
ASoC: max9759: fix underflow in speaker_gain_control_put() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.22 by commit baead410e5db49e962a67fffc17ac30e44b50b7c, it was introduced in version v4.17 by commit fa8d915172b8c10ec0734c4021e99e9705023b07. For more details please see the references link.
null
2022-03-07T01:55:41.450398Z
2022-02-27T03:28:00.792732Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fa8d915172b8c10ec0734c4021e99e9705023b07'}
Linux
GSD-2021-1001230
udf: Fix NULL pointer dereference in udf_symlink function
udf: Fix NULL pointer dereference in udf_symlink function This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.3 by commit 5150877e4d99f85057a458daac7cd7c01005d5c6. For more details please see the references link.
null
2021-12-19T22:18:25.526056Z
2021-08-03T01:43:19.929363Z
null
null
null
null
null
Linux
GSD-2022-1002330
ubifs: Fix deadlock in concurrent rename whiteout and inode writeback
ubifs: Fix deadlock in concurrent rename whiteout and inode writeback This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 9dddc8211430fb851ddf0b168e3a00c6f66cc185, it was introduced in version v4.9 by commit 9e0a1fff8db56eaaebb74b4a3ef65f86811c4798. For more details please see the references link.
null
2022-04-25T03:10:58.664259Z
2022-04-24T22:35:16.875054Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9e0a1fff8db56eaaebb74b4a3ef65f86811c4798'}
Linux
GSD-2021-1001660
hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field
hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.71 by commit 7c4fd5de39f273626a2b0f3a446d2cc85cd47616. For more details please see the references link.
null
2021-12-19T22:46:51.518Z
2021-10-19T16:30:29.367577Z
null
null
null
null
null
Linux
GSD-2021-1000972
gfs2: Fix use-after-free in gfs2_glock_shrink_scan
gfs2: Fix use-after-free in gfs2_glock_shrink_scan This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.45 by commit a61156314b66456ab6a291ed5deba1ebd002ab3c. For more details please see the references link.
null
2021-12-19T23:28:05.425024Z
2021-06-30T00:30:08.494665Z
null
null
null
null
null
Linux
GSD-2021-1000421
i2c: sprd: fix reference leak when pm_runtime_get_sync fails
i2c: sprd: fix reference leak when pm_runtime_get_sync fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.119 by commit 7e1764312440c5df9dfe6b436035a03673b0c1b9, it was introduced in version v4.14 by commit 8b9ec0719834fe66146d138d62ed66cef025c864. For more details please see the references link.
null
2021-12-19T22:22:12.977608Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8b9ec0719834fe66146d138d62ed66cef025c864'}
Linux
GSD-2021-1000071
virtiofs: fix memory leak in virtio_fs_probe()
virtiofs: fix memory leak in virtio_fs_probe() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.3 by commit 5116e79fc6e6725b8acdad8b7e928a83ab7b47e6, it was introduced in version v5.4 by commit a62a8ef9d97da23762a588592c8b8eb50a8deb6a. For more details please see the references link.
null
2021-12-20T00:05:29.600585Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a62a8ef9d97da23762a588592c8b8eb50a8deb6a'}
Linux
GSD-2021-1000564
iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers
iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit 26da8040eccc6c6b0e415e9a3baf72fd39eb2fdc, it was introduced in version v5.5 by commit d7857e4ee1ba69732b16c73b2f2dde83ecd78ee4. For more details please see the references link.
null
2021-12-19T22:56:03.179634Z
2021-06-04T19:39:41.765440Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d7857e4ee1ba69732b16c73b2f2dde83ecd78ee4'}
Linux
GSD-2021-1002559
tcp: fix page frag corruption on page fault
tcp: fix page frag corruption on page fault This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.7 by commit 5a9afcd827cafe14a95c9fcbded2c2d104f18dfc, it was introduced in version v3.7 by commit 5640f7685831e088fe6c2e1f863a6805962f8e81. For more details please see the references link.
null
2021-12-19T23:17:07.771590Z
2021-12-19T19:42:38.402281Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5640f7685831e088fe6c2e1f863a6805962f8e81'}
Linux
GSD-2022-1001009
scsi: mpt3sas: Fix use after free in _scsih_expander_node_remove()
scsi: mpt3sas: Fix use after free in _scsih_expander_node_remove() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 1bb8a7fc64d63ec818e367e1b37676ea2ef2d20c, it was introduced in version v5.11 by commit 7d310f241001e090cf1ec0f3ae836b38d8c6ebec. For more details please see the references link.
null
2022-04-25T03:34:50.674036Z
2022-04-24T20:39:18.259356Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7d310f241001e090cf1ec0f3ae836b38d8c6ebec'}
Linux
GSD-2021-1000134
usb: dwc3: core: Do core softreset when switch mode
usb: dwc3: core: Do core softreset when switch mode This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.36 by commit fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50, it was introduced in version v4.12 by commit 41ce1456e1dbbc7355d0fcc10cf7c337c13def24. For more details please see the references link.
null
2021-12-19T23:51:24.622518Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41ce1456e1dbbc7355d0fcc10cf7c337c13def24'}
Linux
GSD-2021-1002109
powerpc/idle: Don't corrupt back chain when going idle
powerpc/idle: Don't corrupt back chain when going idle This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit 65ede7bd97138435c07de602efc8812c586a1d38, it was introduced in version v5.14.15 by commit 6d077c37c4643394b1bae9682da48164fc147ea8. For more details please see the references link.
null
2021-11-14T15:20:16.588673Z
2021-11-14T15:20:16.588673Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6d077c37c4643394b1bae9682da48164fc147ea8'}
Linux
GSD-2022-1001459
powerpc/kasan: Fix early region not updated correctly
powerpc/kasan: Fix early region not updated correctly This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit de56beace6648065d404cd9835aa7d30e3df519d, it was introduced in version v5.4 by commit cbd18991e24fea2c31da3bb117c83e4a3538cd11. For more details please see the references link.
null
2022-04-25T06:45:58.620395Z
2022-04-24T21:14:52.198991Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cbd18991e24fea2c31da3bb117c83e4a3538cd11'}
Linux
GSD-2021-1001375
net: fix uninit-value in caif_seqpkt_sendmsg
net: fix uninit-value in caif_seqpkt_sendmsg This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.199 by commit 452c3ed7bf63721b07bc2238ed1261bb26027e85, it was introduced in version v2.6.35 by commit bece7b2398d073d11b2e352405a3ecd3a1e39c60. For more details please see the references link.
null
2021-12-19T23:26:47.784825Z
2021-08-03T02:23:01.139717Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bece7b2398d073d11b2e352405a3ecd3a1e39c60'}
Linux
GSD-2022-1000618
powerpc/32s: Fix kasan_init_region() for KASAN
powerpc/32s: Fix kasan_init_region() for KASAN This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit d324727b0e5ae74cd5cd097cff37de627423a264, it was introduced in version v5.8 by commit 7974c4732642f710b5111165ae1f7f7fed822282. For more details please see the references link.
null
2022-03-07T01:38:29.952485Z
2022-02-27T03:31:55.729166Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7974c4732642f710b5111165ae1f7f7fed822282'}
Linux
GSD-2021-1001725
hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs
hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit aa85fb7bde558bb2e364e85976b14b259c8b6fe8, it was introduced in version v4.19 by commit 65afb4c8e7e4e7e74b28efa1df62da503ca3e7a6. For more details please see the references link.
null
2021-12-20T01:14:37.414025Z
2021-10-19T16:33:39.588560Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/65afb4c8e7e4e7e74b28efa1df62da503ca3e7a6'}
Linux
GSD-2021-1000837
ftrace: Do not blindly read the ip address in ftrace_bug()
ftrace: Do not blindly read the ip address in ftrace_bug() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.273 by commit 4aedc2bc2b32c93555f47c95610efb89cc1ec09b, it was introduced in version v2.6.28 by commit 05736a427f7e16be948ccbf39782bd3a6ae16b14. For more details please see the references link.
null
2021-12-20T01:38:44.832529Z
2021-06-30T00:00:28.005382Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/05736a427f7e16be948ccbf39782bd3a6ae16b14'}
Linux
GSD-2022-1002275
jffs2: fix memory leak in jffs2_do_mount_fs
jffs2: fix memory leak in jffs2_do_mount_fs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 0978e9af4559a171ac7a74a1b3ef21804b0a0fa9, it was introduced in version v2.6.15 by commit e631ddba588783edd521c5a89f7b2902772fb691. For more details please see the references link.
null
2022-04-25T04:00:35.484057Z
2022-04-24T22:29:14.294539Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e631ddba588783edd521c5a89f7b2902772fb691'}
Linux
GSD-2022-1000248
KVM: x86: Forcibly leave nested virt when SMM state is toggled
KVM: x86: Forcibly leave nested virt when SMM state is toggled This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.19 by commit e302786233e6bc512986d007c96458ccf5ca21c7. For more details please see the references link.
null
2022-02-19T10:00:45.306126Z
2022-02-18T22:01:05.165544Z
null
null
null
null
null
Linux
GSD-2021-1002220
tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc
tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.293 by commit 0380f643f3a7a61b0845cdc738959c2ad5735d61. For more details please see the references link.
null
2021-12-20T01:08:45.591245Z
2021-11-29T02:34:01.279663Z
null
null
null
null
null
Linux
GSD-2022-1000862
io_uring: add a schedule point in io_add_buffers()
io_uring: add a schedule point in io_add_buffers() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.103 by commit 4a93c6594613c3429b6f30136fff115c7f803af4, it was introduced in version v5.7 by commit ddf0322db79c5984dc1a1db890f946dd19b7d6d9. For more details please see the references link.
null
2022-03-18T04:23:05.729096Z
2022-03-18T00:25:41.955359Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ddf0322db79c5984dc1a1db890f946dd19b7d6d9'}
Linux
GSD-2022-1001770
ubifs: rename_whiteout: Fix double free for whiteout_ui->data
ubifs: rename_whiteout: Fix double free for whiteout_ui->data This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit 2ad07009c459e56ebdcc089d850d664660fdb742, it was introduced in version v4.9 by commit 9e0a1fff8db56eaaebb74b4a3ef65f86811c4798. For more details please see the references link.
null
2022-04-25T05:12:46.612162Z
2022-04-24T21:41:26.237621Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9e0a1fff8db56eaaebb74b4a3ef65f86811c4798'}
Linux
GSD-2021-1002670
mac80211: track only QoS data frames for admission control
mac80211: track only QoS data frames for admission control This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.168 by commit 46b9e29db2012a4d2a40a26101862e002ccf387b, it was introduced in version v3.19 by commit 02219b3abca59fca81711bfe7ee78df7abad97ce. For more details please see the references link.
null
2022-01-11T05:47:29.205415Z
2021-12-27T05:35:50.334583Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/02219b3abca59fca81711bfe7ee78df7abad97ce'}
Linux
GSD-2022-1001320
firmware: sysfb: fix platform-device leak in error path
firmware: sysfb: fix platform-device leak in error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit fed4df558b8cdb6f3beea38a7c977f118f082b0d, it was introduced in version v5.17 by commit 0589e8889dce8e0f0ea5bbf757f38865e2a469c1. For more details please see the references link.
null
2022-04-25T04:57:57.895532Z
2022-04-24T21:04:18.099506Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0589e8889dce8e0f0ea5bbf757f38865e2a469c1'}
Linux
GSD-2022-1000161
PCI: pciehp: Fix infinite loop in IRQ handler upon power fault
PCI: pciehp: Fix infinite loop in IRQ handler upon power fault This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.177 by commit 464da38ba827f670deac6500a1de9a4f0f44c41d, it was introduced in version v5.4.69 by commit 4667358dab9cc07da044d5bc087065545b1000df. For more details please see the references link.
null
2022-02-19T04:31:40.578326Z
2022-02-18T21:48:48.866234Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4667358dab9cc07da044d5bc087065545b1000df'}
Linux
GSD-2022-1000531
s390/cio: verify the driver availability for path_event call
s390/cio: verify the driver availability for path_event call This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit a0619027f11590b2070624297530c34dc7f91bcd, it was introduced in version v5.11 by commit 32ef938815c1fb42d65212aac860ab153a64de1a. For more details please see the references link.
null
2022-03-07T01:55:15.095672Z
2022-02-27T03:20:02.982651Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/32ef938815c1fb42d65212aac860ab153a64de1a'}
Linux
GSD-2022-1000024
binder: fix async_free_space accounting for empty parcels
binder: fix async_free_space accounting for empty parcels This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.224 by commit 7c7064402609aeb6fb11be1b4ec10673ff17b593, it was introduced in version v4.14 by commit 74310e06be4d74dcf67cd108366710dee5c576d5. For more details please see the references link.
null
2022-01-11T05:52:26.406951Z
2022-01-10T19:50:38.087912Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/74310e06be4d74dcf67cd108366710dee5c576d5'}
Linux
GSD-2022-1002019
coredump: Use the vma snapshot in fill_files_note
coredump: Use the vma snapshot in fill_files_note This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 558564db44755dfb3e48b0d64de327d20981e950, it was introduced in version v5.10 by commit a07279c9a8cd7dbd321640ff7210591599ee00a4. For more details please see the references link.
null
2022-04-25T06:18:27.226294Z
2022-04-24T22:03:18.591944Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a07279c9a8cd7dbd321640ff7210591599ee00a4'}
Linux
GSD-2021-1001549
i40e: Fix freeing of uninitialized misc IRQ vector
i40e: Fix freeing of uninitialized misc IRQ vector This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.211 by commit 60ad4cde0ad28921f9ea25b0201c774b95ffa4b4, it was introduced in version v4.15 by commit c17401a1dd210a5f22ab1ec7c7366037c158a14c. For more details please see the references link.
null
2021-12-19T22:52:03.264260Z
2021-10-19T16:23:18.055466Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c17401a1dd210a5f22ab1ec7c7366037c158a14c'}
Linux
GSD-2022-1000474
dmaengine: ptdma: Fix the error handling path in pt_core_init()
dmaengine: ptdma: Fix the error handling path in pt_core_init() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.25 by commit 3e41445287afa3cf6d572778e5aab31d25e60a8d, it was introduced in version v5.15 by commit fa5d823b16a9442d609617abeec31da8b6afa224. For more details please see the references link.
null
2022-03-07T01:43:36.886722Z
2022-02-27T03:12:08.319804Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fa5d823b16a9442d609617abeec31da8b6afa224'}
Linux
GSD-2022-1002449
NFSD: prevent underflow in nfssvc_decode_writeargs()
NFSD: prevent underflow in nfssvc_decode_writeargs() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.276 by commit 438068f4912183a59fcb6b7496a06437f7fd4e2b. For more details please see the references link.
null
2022-04-25T05:17:53.743720Z
2022-04-24T22:48:58.039623Z
null
null
null
null
null
Linux
GSD-2021-1001119
nilfs2: fix memory leak in nilfs_sysfs_delete_device_group
nilfs2: fix memory leak in nilfs_sysfs_delete_device_group This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.129 by commit d6f751ecccfb7a7b75e038a0ca052138dc52119b, it was introduced in version v3.17 by commit da7141fb78db915680616e15677539fc8140cf53. For more details please see the references link.
null
2021-12-20T00:06:39.939113Z
2021-07-08T01:57:35.482477Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/da7141fb78db915680616e15677539fc8140cf53'}
Linux
GSD-2022-1000927
xhci: Prevent futile URB re-submissions due to incorrect return value.
xhci: Prevent futile URB re-submissions due to incorrect return value. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.269 by commit cd65dbb0b9adcf1a094886c4b8148da0380c1dcf, it was introduced in version v3.11 by commit 203a86613fb3bf2767335659513fa98563a3eb71. For more details please see the references link.
null
2022-03-18T02:50:08.933985Z
2022-03-18T00:32:52.062433Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/203a86613fb3bf2767335659513fa98563a3eb71'}
Linux
GSD-2022-1001635
ALSA: oss: Fix PCM OSS buffer allocation overflow
ALSA: oss: Fix PCM OSS buffer allocation overflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.18 by commit fb08bf99195a87c798bc8ae1357337a981faeade. For more details please see the references link.
null
2022-04-25T04:17:20.339846Z
2022-04-24T21:30:26.521616Z
null
null
null
null
null
Linux
GSD-2021-1002365
ALSA: pcm: oss: Fix negative period/buffer sizes
ALSA: pcm: oss: Fix negative period/buffer sizes This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.295 by commit be8869d388593e57223ad39297c8e54be632f2f2. For more details please see the references link.
null
2021-12-20T00:46:11.306561Z
2021-12-19T19:34:06.345253Z
null
null
null
null
null
Linux
GSD-2021-1000358
RDMA/qedr: Fix error return code in qedr_iw_connect()
RDMA/qedr: Fix error return code in qedr_iw_connect() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit a12d75f5dcfbeb0557c79b036c780606dce99d60, it was introduced in version v5.5 by commit 82af6d19d8d9227c22a53ff00b40fb2a4f9fce69. For more details please see the references link.
null
2021-12-20T00:54:32.266279Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/82af6d19d8d9227c22a53ff00b40fb2a4f9fce69'}
Linux
GSD-2022-1001265
media: usb: go7007: s2250-board: fix leak in probe()
media: usb: go7007: s2250-board: fix leak in probe() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 948ad5e5624487079c24cb5c81c74ddd02832440, it was introduced in version v3.10 by commit d3b2ccd9e307eae80b4b4eeb0ede46cb02212df2. For more details please see the references link.
null
2022-04-25T08:29:57.739728Z
2022-04-24T20:59:27.473406Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d3b2ccd9e307eae80b4b4eeb0ede46cb02212df2'}
Linux
GSD-2021-1002735
mac80211: track only QoS data frames for admission control
mac80211: track only QoS data frames for admission control This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit 42d08e97b196479f593499e887a9ab81446a34b9, it was introduced in version v3.19 by commit 02219b3abca59fca81711bfe7ee78df7abad97ce. For more details please see the references link.
null
2022-01-11T06:51:38.194208Z
2021-12-27T05:45:30.263383Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/02219b3abca59fca81711bfe7ee78df7abad97ce'}
Linux
GSD-2021-1000708
net: usb: fix memory leak in smsc75xx_bind
net: usb: fix memory leak in smsc75xx_bind This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.271 by commit 200dbfcad8011e50c3cec269ed7b980836eeb1fa, it was introduced in version v2.6.34 by commit d0cad871703b898a442e4049c532ec39168e5b57. For more details please see the references link.
null
2021-12-19T22:09:02.736349Z
2021-06-04T20:07:06.940927Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0cad871703b898a442e4049c532ec39168e5b57'}
Linux
GSD-2021-1000067
md/raid1: properly indicate failure when ending a failed write request
md/raid1: properly indicate failure when ending a failed write request This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.3 by commit 538244fba59fde17186322776247cd9c05be86dd, it was introduced in version v5.4 by commit eeba6809d8d58908b5ed1b5ceb5fcb09a98a7cad. For more details please see the references link.
null
2021-12-20T01:23:45.290725Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/eeba6809d8d58908b5ed1b5ceb5fcb09a98a7cad'}
Linux
GSD-2021-1000437
regmap: set debugfs_name to NULL after it is freed
regmap: set debugfs_name to NULL after it is freed This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.119 by commit d8897f7b2283a500666c85ef06e820df38ed7b52, it was introduced in version v5.4.90 by commit 480c5e9c7e4c76c01d5f1f7b73832d7b77e6b427. For more details please see the references link.
null
2021-12-19T23:41:52.504464Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/480c5e9c7e4c76c01d5f1f7b73832d7b77e6b427'}
Linux
GSD-2021-1000964
IB/mlx5: Fix initializing CQ fragments buffer
IB/mlx5: Fix initializing CQ fragments buffer This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.44 by commit 91f7fdc4cc10542ca1045c06aad23365f0d067e0, it was introduced in version v4.17 by commit 388ca8be00370db132464e27f745b8a0add19fcb. For more details please see the references link.
null
2021-12-20T01:30:53.664331Z
2021-06-30T00:29:38.298816Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/388ca8be00370db132464e27f745b8a0add19fcb'}
Linux
GSD-2021-1001676
xen/x86: fix PV trap handling on secondary processors
xen/x86: fix PV trap handling on secondary processors This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.70 by commit f79282849187604697b6c5944121c817a0d640e5, it was introduced in version v2.6.23 by commit f87e4cac4f4e940b328d3deb5b53e642e3881f43. For more details please see the references link.
null
2021-12-20T01:21:31.530795Z
2021-10-19T16:31:19.748493Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f87e4cac4f4e940b328d3deb5b53e642e3881f43'}
Linux
GSD-2022-1002326
ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl
ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit a8ecee49259f8f78d91ddb329ab2be7e6fd01974, it was introduced in version v4.8 by commit 714fb87e8bc05ff78255afc0dca981e8c5242785. For more details please see the references link.
null
2022-04-25T06:13:15.162093Z
2022-04-24T22:34:41.608681Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/714fb87e8bc05ff78255afc0dca981e8c5242785'}
Linux
GSD-2021-1001226
ubifs: Fix races between xattr_{set|get} and listxattr operations
ubifs: Fix races between xattr_{set|get} and listxattr operations This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.3 by commit c0756f75c22149d20fcb7d8409827cee905eb386, it was introduced in version v2.6.27 by commit 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d. For more details please see the references link.
null
2021-12-20T00:07:16.779587Z
2021-08-03T01:41:48.990772Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d'}
Linux
GSD-2022-1001859
net: asix: add proper error handling of usb read errors
net: asix: add proper error handling of usb read errors This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit b96a7265f763b37ff3138b9ca8122a950f13b00e, it was introduced in version v4.9 by commit d9fe64e511144c1ee7d7555b4111f09dde9692ef. For more details please see the references link.
null
2022-04-25T05:19:11.043124Z
2022-04-24T21:49:02.824322Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9fe64e511144c1ee7d7555b4111f09dde9692ef'}
Linux
GSD-2022-1002263
f2fs: fix missing free nid in f2fs_handle_failed_inode
f2fs: fix missing free nid in f2fs_handle_failed_inode This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 005f9cdab70c915702254c5eb67a8efced80e821, it was introduced in version v4.19 by commit 7735730d39d75e70476c1b01435b9b1f41637f0e. For more details please see the references link.
null
2022-04-25T05:44:08.184160Z
2022-04-24T22:27:59.371361Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7735730d39d75e70476c1b01435b9b1f41637f0e'}
Linux
GSD-2021-1000821
x86/kvm: Teardown PV features on boot CPU as well
x86/kvm: Teardown PV features on boot CPU as well This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.10 by commit d1629b5b925de9b27979e929dae7fcb766daf6b6, it was introduced in version by commit . For more details please see the references link.
null
2021-12-20T01:13:20.273418Z
2021-06-25T00:09:30.162698Z
null
null
null
null
null
Linux
GSD-2021-1001733
cpufreq: schedutil: Destroy mutex before kobject_put() frees the memory
cpufreq: schedutil: Destroy mutex before kobject_put() frees the memory This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit e130f2ed1da99309db1e8893a39938ddd7c77312, it was introduced in version v5.14.10 by commit 8d62aec52a8c5b1d25a2364b243fcc5098a2ede9. For more details please see the references link.
null
2021-10-19T16:34:02.967239Z
2021-10-19T16:34:02.967239Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8d62aec52a8c5b1d25a2364b243fcc5098a2ede9'}
Linux
GSD-2021-1001699
usb: chipidea: ci_hdrc_imx: Also search for 'phys' phandle
usb: chipidea: ci_hdrc_imx: Also search for 'phys' phandle This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.12 by commit 66dd03b10e1c0b2fae006c6e34c18ea8ee033e7b, it was introduced in version v5.8 by commit 746f316b753a83e366bfc5f936cbf0d72d1c2d1d. For more details please see the references link.
null
2021-12-19T22:58:10.373272Z
2021-10-19T16:32:27.741938Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/746f316b753a83e366bfc5f936cbf0d72d1c2d1d'}
Linux
GSD-2021-1001363
scsi: libfc: Fix array index out of bound exception
scsi: libfc: Fix array index out of bound exception This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.199 by commit 4921b1618045ffab71b1050bf0014df3313a2289. For more details please see the references link.
null
2021-12-19T23:54:01.281868Z
2021-08-03T02:19:14.042708Z
null
null
null
null
null
Linux
GSD-2021-1000122
bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue
bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.20 by commit abd1510c08a13c88d24b622a83c82e87ff1d3135, it was introduced in version v5.11 by commit 8f70397876872789b2a5deba804eb6216fb5deb7. For more details please see the references link.
null
2021-12-19T22:50:48.656984Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8f70397876872789b2a5deba804eb6216fb5deb7'}
Linux
GSD-2021-1000088
ovl: fix leaked dentry
ovl: fix leaked dentry This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.2 by commit d587cfaef72b1b6f4b2774827123bce91f497cc8, it was introduced in version v5.8 by commit 6815f479ca90ee7fd2e28b2a420f796b974155fe. For more details please see the references link.
null
2021-12-20T00:54:23.675150Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6815f479ca90ee7fd2e28b2a420f796b974155fe'}
Linux
GSD-2021-1000572
NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()
NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit b090d110e66636bca473fd8b98d5c97b555a965a, it was introduced in version v5.12.3 by commit 7e65ea887d0c0997f3053acd91a027af45e71c5b. For more details please see the references link.
null
2021-12-19T22:51:18.945849Z
2021-06-04T19:40:52.864550Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7e65ea887d0c0997f3053acd91a027af45e71c5b'}
Linux
GSD-2022-1000527
iio: buffer: Fix file related error handling in IIO_BUFFER_GET_FD_IOCTL
iio: buffer: Fix file related error handling in IIO_BUFFER_GET_FD_IOCTL This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 202071d2518537866d291aa7cf26af54e674f4d4, it was introduced in version v5.13 by commit f73f7f4da581875f9b1f2fb8ebd1ab15ed634488. For more details please see the references link.
null
2022-03-07T01:51:05.969782Z
2022-02-27T03:19:35.773986Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f73f7f4da581875f9b1f2fb8ebd1ab15ed634488'}
Linux
GSD-2022-1000177
moxart: fix potential use-after-free on remove path
moxart: fix potential use-after-free on remove path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.179 by commit 3a0a7ec5574b510b067cfc734b8bdb6564b31d4e. For more details please see the references link.
null
2022-02-19T10:59:42.800144Z
2022-02-18T21:51:23.918998Z
null
null
null
null
null
Linux
GSD-2022-1001336
KVM: avoid NULL pointer dereference in kvm_dirty_ring_push
KVM: avoid NULL pointer dereference in kvm_dirty_ring_push This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit a1f48251918d825785af9cab83996d4c12ef795a. For more details please see the references link.
null
2022-04-25T05:15:59.249273Z
2022-04-24T21:05:32.543704Z
null
null
null
null
null
Linux
GSD-2021-1002666
mac80211: validate extended element ID is present
mac80211: validate extended element ID is present This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.168 by commit a19cf6844b509d44ecbd536f33d314d91ecdd2b5, it was introduced in version v4.19 by commit 41cbb0f5a29592874355e4159489eb08337cd50e. For more details please see the references link.
null
2022-01-11T05:52:54.922262Z
2021-12-27T05:35:15.643966Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41cbb0f5a29592874355e4159489eb08337cd50e'}
Linux
GSD-2021-1001949
comedi: ni_usb6501: fix NULL-deref in command paths
comedi: ni_usb6501: fix NULL-deref in command paths This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.290 by commit aa39738423503825625853b643b9e99d11c23816, it was introduced in version v3.18 by commit a03bb00e50ab4c07107da58a52a0bff7943f360c. For more details please see the references link.
null
2021-12-20T01:16:03.796979Z
2021-11-14T15:13:03.931225Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a03bb00e50ab4c07107da58a52a0bff7943f360c'}