ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2022-1002278 | NFSD: prevent integer overflow on 32 bit systems | NFSD: prevent integer overflow on 32 bit systems
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit ce1aa09cc14ed625104acc2d487bd92b9a88efe2. For more details please see the references link. | null | 2022-04-25T06:18:43.167689Z | 2022-04-24T22:29:32.608023Z | null | null | null | null | null |
Linux | GSD-2022-1000245 | ceph: properly put ceph_string reference after async create attempt | ceph: properly put ceph_string reference after async create attempt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.19 by commit 36d433ae3242aa714176378850e6d1a5a3e78f18, it was introduced in version v5.7 by commit 9a8d03ca2e2c334d08ee91a3e07dcce31a02fdc6. For more details please see the references link. | null | 2022-02-19T08:44:49.117672Z | 2022-02-18T22:00:43.602206Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9a8d03ca2e2c334d08ee91a3e07dcce31a02fdc6'} |
Linux | GSD-2021-1001728 | RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests | RDMA/cma: Ensure rdma_addr_cancel() happens before issuing more requests
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit 03d884671572af8bcfbc9e63944c1021efce7589, it was introduced in version v2.6.18 by commit e51060f08a61965c4dd91516d82fe90617152590. For more details please see the references link. | null | 2021-12-20T00:55:26.615508Z | 2021-10-19T16:33:47.100956Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e51060f08a61965c4dd91516d82fe90617152590'} |
Linux | GSD-2021-1002807 | Input: elantech - fix stack out of bound access in elantech_change_report_id() | Input: elantech - fix stack out of bound access in elantech_change_report_id()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.89 by commit 676c572439e58b7ee6b7ca3f1e5595382921045c, it was introduced in version v5.10.21 by commit dde807b4a44273fa5f62c0cb308295e6d6642550. For more details please see the references link. | null | 2022-01-11T05:47:44.150729Z | 2021-12-30T02:44:19.060603Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/dde807b4a44273fa5f62c0cb308295e6d6642550'} |
Linux | GSD-2021-1001682 | powerpc/64s: fix program check interrupt emergency stack path | powerpc/64s: fix program check interrupt emergency stack path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.12 by commit c835b3d1d6362b4a4ebb192da7e7fd27a0a45d01, it was introduced in version v5.3 by commit 0a882e28468f48ab3d9a36dde0a5723ea29ed1ed. For more details please see the references link. | null | 2021-12-19T22:21:52.825088Z | 2021-10-19T16:31:38.795696Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0a882e28468f48ab3d9a36dde0a5723ea29ed1ed'} |
Linux | GSD-2021-1000990 | net: cdc_eem: fix tx fixup skb leak | net: cdc_eem: fix tx fixup skb leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.46 by commit 05b2b9f7d24b5663d9b47427fe1555bdafd3ea02, it was introduced in version v2.6.30 by commit 9f722c0978b04acba209f8ca1896ad05814bc3a3. For more details please see the references link. | null | 2021-12-19T22:26:42.233711Z | 2021-06-30T00:31:44.638606Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9f722c0978b04acba209f8ca1896ad05814bc3a3'} |
Linux | GSD-2022-1000615 | usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS | usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.5 by commit 103938dd5798e150689362290274b87af54e3a52, it was introduced in version v5.13 by commit 90c4d05780d47e14a50e11a7f17373104cd47d25. For more details please see the references link. | null | 2022-03-07T01:42:52.592775Z | 2022-02-27T03:31:35.315606Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/90c4d05780d47e14a50e11a7f17373104cd47d25'} |
Linux | GSD-2022-1001907 | drbd: fix potential silent data corruption | drbd: fix potential silent data corruption
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 024c2a0db53a0f6f0f227ce6b88288e5b9e3f099. For more details please see the references link. | null | 2022-04-25T05:19:28.744209Z | 2022-04-24T21:53:42.316986Z | null | null | null | null | null |
Linux | GSD-2021-1001378 | seq_file: disallow extremely large seq buffer allocations | seq_file: disallow extremely large seq buffer allocations
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.198 by commit 6de9f0bf7cacc772a618699f9ed5c9f6fca58a1d, it was introduced in version v3.16 by commit 058504edd02667eef8fac9be27ab3ea74332e9b4. For more details please see the references link. | null | 2021-12-20T00:10:09.118592Z | 2021-08-03T02:24:01.840162Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/058504edd02667eef8fac9be27ab3ea74332e9b4'} |
Linux | GSD-2022-1001454 | video: fbdev: sm712fb: Fix crash in smtcfb_write() | video: fbdev: sm712fb: Fix crash in smtcfb_write()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit aeb635b49530b7d19e140949753409f759ba99be. For more details please see the references link. | null | 2022-04-25T05:23:04.050248Z | 2022-04-24T21:14:32.488941Z | null | null | null | null | null |
Linux | GSD-2021-1000139 | sfc: farch: fix TX queue lookup in TX flush done handling | sfc: farch: fix TX queue lookup in TX flush done handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.36 by commit fb791572d6747ef385f628450f8d57cd132e6e5a, it was introduced in version v5.10 by commit 12804793b17c0e19115a90d98f2f3df0cb79e233. For more details please see the references link. | null | 2021-12-20T00:08:22.203126Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/12804793b17c0e19115a90d98f2f3df0cb79e233'} |
Linux | GSD-2021-1002104 | mm/mempolicy: do not allow illegal MPOL_F_NUMA_BALANCING | MPOL_LOCAL in mbind() | mm/mempolicy: do not allow illegal MPOL_F_NUMA_BALANCING | MPOL_LOCAL in mbind()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit 9ee4e9ae98f1f262d6fae0d266cfdf3ba2c321d9, it was introduced in version v5.12 by commit bda420b985054a3badafef23807c4b4fa38a3dff. For more details please see the references link. | null | 2021-12-19T23:08:52.539378Z | 2021-11-14T15:20:04.322739Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bda420b985054a3badafef23807c4b4fa38a3dff'} |
Linux | GSD-2021-1000093 | net: hso: fix NULL-deref on disconnect regression | net: hso: fix NULL-deref on disconnect regression
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.1 by commit 41c44e1f3112d7265dae522c026399b2a42d19ef, it was introduced in version v5.12 by commit 8a12f8836145ffe37e9c8733dce18c22fb668b66. For more details please see the references link. | null | 2021-12-19T22:00:22.637173Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8a12f8836145ffe37e9c8733dce18c22fb668b66'} |
Linux | GSD-2022-1001004 | mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0) | mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0)
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 04bc13dae4a27b8d030843c85ae452bb2f1d9c1f. For more details please see the references link. | null | 2022-04-25T05:31:53.260359Z | 2022-04-24T20:38:53.035683Z | null | null | null | null | null |
Linux | GSD-2021-1000569 | scsi: target: core: Avoid smp_processor_id() in preemptible code | scsi: target: core: Avoid smp_processor_id() in preemptible code
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit a20b6eaf4f35046a429cde57bee7eb5f13d6857f, it was introduced in version v5.11 by commit 1526d9f10c6184031e42afad0adbdde1213e8ad1. For more details please see the references link. | null | 2021-12-20T00:17:13.873814Z | 2021-06-04T19:40:38.328732Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1526d9f10c6184031e42afad0adbdde1213e8ad1'} |
Linux | GSD-2021-1002554 | ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port() | ethernet: hisilicon: hns: hns_dsaf_misc: fix a possible array overflow in hns_dsaf_ge_srst_by_port()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.7 by commit fc7ffa7f10b9454a86369405d9814bf141b30627. For more details please see the references link. | null | 2021-12-19T22:56:35.435365Z | 2021-12-19T19:42:26.607311Z | null | null | null | null | null |
Linux | GSD-2022-1002501 | scsi: pm8001: Fix abort all task initialization | scsi: pm8001: Fix abort all task initialization
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit 9914461db82caee6c519acfbe10a86fe11bcdeca, it was introduced in version v3.10 by commit c6b9ef5779c3e1edfa9de949d2a51252bc347663. For more details please see the references link. | null | 2022-04-25T06:49:44.463294Z | 2022-04-24T22:55:04.237632Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6b9ef5779c3e1edfa9de949d2a51252bc347663'} |
Linux | GSD-2021-1001051 | gfs2: Fix use-after-free in gfs2_glock_shrink_scan | gfs2: Fix use-after-free in gfs2_glock_shrink_scan
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.12 by commit e87ef30fe73e7e10d2c85bdcc778dcec24dca553. For more details please see the references link. | null | 2021-12-20T00:56:01.952620Z | 2021-06-30T00:36:24.493297Z | null | null | null | null | null |
Linux | GSD-2022-1002151 | ALSA: pcm: Fix races among concurrent hw_params and hw_free calls | ALSA: pcm: Fix races among concurrent hw_params and hw_free calls
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.109 by commit 0f6947f5f5208f6ebd4d76a82a4757e2839a23f8. For more details please see the references link. | null | 2022-04-25T04:54:47.275119Z | 2022-04-24T22:16:28.376767Z | null | null | null | null | null |
Linux | GSD-2021-1001401 | usb: max-3421: Prevent corruption of freed memory | usb: max-3421: Prevent corruption of freed memory
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.241 by commit edddc79c4391f8001095320d3ca423214b9aa4bf, it was introduced in version v3.16 by commit 2d53139f31626bad6f8983d8e519ddde2cbba921. For more details please see the references link. | null | 2021-12-20T00:35:37.917454Z | 2021-08-03T02:29:55.877654Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2d53139f31626bad6f8983d8e519ddde2cbba921'} |
Linux | GSD-2022-1000496 | scsi: qedf: Fix refcount issue when LOGO is received during TMF | scsi: qedf: Fix refcount issue when LOGO is received during TMF
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 7fcbed38503bb34c6e6538b6a9482d1c6bead1e8. For more details please see the references link. | null | 2022-03-07T03:27:22.610499Z | 2022-02-27T03:15:16.883489Z | null | null | null | null | null |
Linux | GSD-2021-1002387 | proc/vmcore: fix clearing user buffer by properly using clear_user() | proc/vmcore: fix clearing user buffer by properly using clear_user()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.257 by commit 99d348b82bcb36171f24411d3f1a15706a2a937a, it was introduced in version v3.0 by commit 997c136f518c5debd63847e78e2a8694f56dcf90. For more details please see the references link. | null | 2021-12-19T22:37:05.334141Z | 2021-12-19T19:35:07.533575Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/997c136f518c5debd63847e78e2a8694f56dcf90'} |
Linux | GSD-2021-1001952 | xhci: Fix command ring pointer corruption while aborting a command | xhci: Fix command ring pointer corruption while aborting a command
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.252 by commit 22bcb65ea41072ab5d03c0c6290e04e0df6d09a0. For more details please see the references link. | null | 2021-12-19T23:02:41.330041Z | 2021-11-14T15:13:11.314746Z | null | null | null | null | null |
Linux | GSD-2021-1000640 | iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers | iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.124 by commit f49149964d2423fb618fb6b755bb1eaa431cca2c, it was introduced in version v5.4.14 by commit 5408cbc6337300d6f1a87c797273c535ed96305a. For more details please see the references link. | null | 2021-12-19T22:53:34.570141Z | 2021-06-04T19:52:52.810641Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5408cbc6337300d6f1a87c797273c535ed96305a'} |
Linux | GSD-2021-1000210 | can: mcp251xfd: mcp251xfd_probe(): fix an error pointer dereference in probe | can: mcp251xfd: mcp251xfd_probe(): fix an error pointer dereference in probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.5 by commit 15f8f96ec7fc35024d4e03296e4d838fcea33d83, it was introduced in version v5.12 by commit cf8ee6de2543a0fa6d9471ddbb7216464a9681a1. For more details please see the references link. | null | 2021-12-19T22:28:20.792510Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cf8ee6de2543a0fa6d9471ddbb7216464a9681a1'} |
Linux | GSD-2022-1001287 | exec: Force single empty string when argv is empty | exec: Force single empty string when argv is empty
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit cfbfff8ce5e3d674947581f1eb9af0a1b1807950. For more details please see the references link. | null | 2022-04-25T06:09:44.280223Z | 2022-04-24T21:01:29.056050Z | null | null | null | null | null |
Linux | GSD-2021-1001817 | KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest() | KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.156 by commit 80bbb0bc3a0288442f7fe6fc514f4ee1cb06ccb7, it was introduced in version v5.2 by commit 10d91611f426d4bafd2a83d966c36da811b2f7ad. For more details please see the references link. | null | 2021-12-19T23:10:48.215879Z | 2021-10-28T13:50:29.513251Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/10d91611f426d4bafd2a83d966c36da811b2f7ad'} |
Linux | GSD-2021-1002738 | btrfs: use latest_dev in btrfs_show_devname | btrfs: use latest_dev in btrfs_show_devname
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit e342c2558016ead462f376b6c6c2ac5efc17f3b1. For more details please see the references link. | null | 2022-01-11T05:51:08.036325Z | 2021-12-27T05:45:50.984912Z | null | null | null | null | null |
Linux | GSD-2021-1000705 | NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() | NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.271 by commit e8b8418ce14ae66ee55179901edd12191ab06a9e, it was introduced in version v4.0 by commit a7d42ddb3099727f58366fa006f850a219cce6c8. For more details please see the references link. | null | 2021-12-19T23:31:03.893780Z | 2021-06-04T20:06:21.997832Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a7d42ddb3099727f58366fa006f850a219cce6c8'} |
Linux | GSD-2022-1000880 | ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min | ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.183 by commit f3537f1b2bfd3b1df15723df49fc26eccd5112fe, it was introduced in version v5.4.178 by commit 68fd718724284788fc5f379e0b7cac541429ece7. For more details please see the references link. | null | 2022-03-18T02:58:01.722412Z | 2022-03-18T00:27:10.771083Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/68fd718724284788fc5f379e0b7cac541429ece7'} |
Linux | GSD-2022-1001792 | ext4: fix ext4_mb_mark_bb() with flex_bg with fast_commit | ext4: fix ext4_mb_mark_bb() with flex_bg with fast_commit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 6a6beb074186a0452368a023a261c7d0eaebe838. For more details please see the references link. | null | 2022-04-25T06:55:12.989587Z | 2022-04-24T21:42:35.500578Z | null | null | null | null | null |
Linux | GSD-2022-1001268 | video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe() | video: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 9280ef235b05e8f19f8bc6d547b992f0a0ef398d, it was introduced in version v3.2 by commit 3c8a63e22a0802fd56380f6ab305b419f18eb6f5. For more details please see the references link. | null | 2022-04-25T07:56:47.469807Z | 2022-04-24T20:59:48.914479Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c8a63e22a0802fd56380f6ab305b419f18eb6f5'} |
Linux | GSD-2021-1002368 | iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove | iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.295 by commit 8c1d43f3a3fc7184c42d7398bdf59a2a2903e4fc, it was introduced in version v4.2 by commit a25691c1f9674090fb66586cf4c5d60d3efdf339. For more details please see the references link. | null | 2021-12-20T00:39:04.212059Z | 2021-12-19T19:34:13.770904Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a25691c1f9674090fb66586cf4c5d60d3efdf339'} |
Linux | GSD-2021-1000355 | i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails | i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit cc49d206414240483bb93ffa3d80243e6a776916, it was introduced in version v4.16 by commit 13d6eb20fc79a1e606307256dad4098375539a09. For more details please see the references link. | null | 2021-12-19T23:18:10.399812Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/13d6eb20fc79a1e606307256dad4098375539a09'} |
Linux | GSD-2022-1001638 | netfilter: nf_tables: initialize registers in nft_do_chain() | netfilter: nf_tables: initialize registers in nft_do_chain()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.18 by commit 64f24c76dd0ce53d0fa3a0bfb9aeea507c769485, it was introduced in version v3.13 by commit 96518518cc417bb0a8c80b9fb736202e28acdf96. For more details please see the references link. | null | 2022-04-25T03:13:33.430196Z | 2022-04-24T21:30:46.811961Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/96518518cc417bb0a8c80b9fb736202e28acdf96'} |
Linux | GSD-2021-1002692 | mac80211: track only QoS data frames for admission control | mac80211: track only QoS data frames for admission control
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.88 by commit eed897a22230e3231a740eddd7d6d95ba476625f, it was introduced in version v3.19 by commit 02219b3abca59fca81711bfe7ee78df7abad97ce. For more details please see the references link. | null | 2022-01-11T05:48:18.502463Z | 2021-12-27T05:37:02.630871Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/02219b3abca59fca81711bfe7ee78df7abad97ce'} |
Linux | GSD-2021-1001114 | i2c: robotfuzz-osif: fix control-request directions | i2c: robotfuzz-osif: fix control-request directions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.196 by commit f376dd8a409fe4cca5b121cd7c42b894689aada6, it was introduced in version v3.14 by commit 83e53a8f120f2f273cf0ad717f5372ab79ac24fe. For more details please see the references link. | null | 2021-12-19T22:01:08.321072Z | 2021-07-08T01:57:15.177370Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/83e53a8f120f2f273cf0ad717f5372ab79ac24fe'} |
Linux | GSD-2022-1000183 | udf: Fix NULL ptr deref when converting from inline format | udf: Fix NULL ptr deref when converting from inline format
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.96 by commit de7cc8bcca90a9d77c915ee1d922dbd670c47d84, it was introduced in version v4.2 by commit 52ebea749aaed195245701a8f90a23d672c7a933. For more details please see the references link. | null | 2022-02-19T15:36:10.758343Z | 2022-02-18T21:52:04.034875Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/52ebea749aaed195245701a8f90a23d672c7a933'} |
Linux | GSD-2022-1000479 | scsi: ufs: Fix a deadlock in the error handler | scsi: ufs: Fix a deadlock in the error handler
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit 493c9e850677df8b4eda150c2364b1c1a72ed724. For more details please see the references link. | null | 2022-03-07T01:34:59.574283Z | 2022-02-27T03:12:42.054062Z | null | null | null | null | null |
Linux | GSD-2022-1002444 | media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED | media: stk1160: If start stream fails, return buffers with VB2_BUF_STATE_QUEUED
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 03054f22d5abd80ad89547512c2bfbfb2714d3ed, it was introduced in version v3.7 by commit 8ac456495a33d9466076fea94594181ceefb76d9. For more details please see the references link. | null | 2022-04-25T04:20:57.549418Z | 2022-04-24T22:48:28.517730Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ac456495a33d9466076fea94594181ceefb76d9'} |
Linux | GSD-2021-1001544 | net: macb: fix use after free on rmmod | net: macb: fix use after free on rmmod
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.249 by commit a7d521cc726f30b8e679a6f36d04b18a8ab3c536. For more details please see the references link. | null | 2021-12-19T22:30:47.821852Z | 2021-10-19T16:23:04.030182Z | null | null | null | null | null |
Linux | GSD-2022-1000029 | NFC: st21nfca: Fix memory leak in device probe and remove | NFC: st21nfca: Fix memory leak in device probe and remove
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.170 by commit 1cd4063dbc91cf7965d73a6a3855e2028cd4613b, it was introduced in version v3.16 by commit 68957303f44a501af5cf37913208a2acaa6bcdf1. For more details please see the references link. | null | 2022-01-11T05:47:56.426748Z | 2022-01-10T19:50:50.494297Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/68957303f44a501af5cf37913208a2acaa6bcdf1'} |
Linux | GSD-2022-1002014 | ath11k: mhi: use mhi_sync_power_up() | ath11k: mhi: use mhi_sync_power_up()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit 339bd0b55ecdd0f7f341e9357c4cfde799de9418. For more details please see the references link. | null | 2022-04-25T06:29:10.503702Z | 2022-04-24T22:02:56.859368Z | null | null | null | null | null |
Linux | GSD-2021-1001790 | can: peak_pci: peak_pci_remove(): fix UAF | can: peak_pci: peak_pci_remove(): fix UAF
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.253 by commit 34914971bb3244db4ce2be44e9438a9b30c56250, it was introduced in version v3.4 by commit e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd. For more details please see the references link. | null | 2021-12-20T00:21:22.474314Z | 2021-10-28T13:48:59.124129Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd'} |
Linux | GSD-2021-1000882 | NFS: Fix a potential NULL dereference in nfs_get_client() | NFS: Fix a potential NULL dereference in nfs_get_client()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.195 by commit 4b380a7d84ef2ce3f4f5bec5d8706ed937ac6502, it was introduced in version v3.17 by commit 31434f496abb9f3410b10f541462fe58613dd3ad. For more details please see the references link. | null | 2021-12-19T22:44:21.074115Z | 2021-06-30T00:03:25.539044Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/31434f496abb9f3410b10f541462fe58613dd3ad'} |
Linux | GSD-2022-1000707 | iommu/amd: Recover from event log overflow | iommu/amd: Recover from event log overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.13 by commit 4aafe9f8acbebcf4e7b759283573f930b34e360f. For more details please see the references link. | null | 2022-03-18T02:57:05.439477Z | 2022-03-18T00:11:25.246235Z | null | null | null | null | null |
Linux | GSD-2022-1001815 | clk: Fix clk_hw_get_clk() when dev is NULL | clk: Fix clk_hw_get_clk() when dev is NULL
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 4be3e4c05d8dd1b83b75652cad88c9e752ec7054, it was introduced in version v5.11 by commit 30d6f8c15d2cd877c1f3d47d8a1064649ebe58e2. For more details please see the references link. | null | 2022-04-25T03:02:15.172151Z | 2022-04-24T21:44:31.723531Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/30d6f8c15d2cd877c1f3d47d8a1064649ebe58e2'} |
Linux | GSD-2022-1000357 | copy_process(): Move fd_install() out of sighand->siglock critical section | copy_process(): Move fd_install() out of sighand->siglock critical section
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.181 by commit 6f08452c560d0b2468c7e362b4124e62906001f5, it was introduced in version v5.2 by commit 6fd2fe494b17bf2dec37b610d23a43a72b16923a. For more details please see the references link. | null | 2022-03-07T01:46:47.835653Z | 2022-02-27T02:56:01.537874Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6fd2fe494b17bf2dec37b610d23a43a72b16923a'} |
Linux | GSD-2021-1000928 | can: j1939: fix Use-after-Free, hold skb ref while in use | can: j1939: fix Use-after-Free, hold skb ref while in use
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.128 by commit 22cba878abf646cd3a02ee7c8c2cef7afe66a256, it was introduced in version v5.4 by commit 9d71dd0c70099914fcd063135da3c580865e924c. For more details please see the references link. | null | 2021-12-19T22:42:29.012613Z | 2021-06-30T00:25:06.253215Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9d71dd0c70099914fcd063135da3c580865e924c'} |
Linux | GSD-2021-1000181 | scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() | scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.118 by commit 77509a238547863040a42d57c72403f7d4c89a8f, it was introduced in version v5.4.4 by commit dea6ee7173039d489977c9ed92e3749154615db4. For more details please see the references link. | null | 2021-12-19T23:17:34.743470Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/dea6ee7173039d489977c9ed92e3749154615db4'} |
Linux | GSD-2022-1001116 | ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock() | ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 3b7fb89135a20587d57f8877c02e25003e9edbdf, it was introduced in version v2.6.27 by commit 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d. For more details please see the references link. | null | 2022-04-25T04:45:20.483513Z | 2022-04-24T20:46:52.650870Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d'} |
Linux | GSD-2021-1002446 | perf report: Fix memory leaks around perf_tip() | perf report: Fix memory leaks around perf_tip()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.164 by commit df5990db088d4c7fea9a2f9b8195a7859e1768c4. For more details please see the references link. | null | 2021-12-19T22:12:42.786375Z | 2021-12-19T19:37:44.705884Z | null | null | null | null | null |
Linux | GSD-2022-1001546 | net: asix: add proper error handling of usb read errors | net: asix: add proper error handling of usb read errors
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 9ea8d2fca8fea3b17005b4dc02f8ef15f7a2fb97, it was introduced in version v4.9 by commit d9fe64e511144c1ee7d7555b4111f09dde9692ef. For more details please see the references link. | null | 2022-04-25T06:46:44.285042Z | 2022-04-24T21:22:19.443224Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9fe64e511144c1ee7d7555b4111f09dde9692ef'} |
Linux | GSD-2021-1002016 | net/tls: Fix flipped sign in tls_err_abort() calls | net/tls: Fix flipped sign in tls_err_abort() calls
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.157 by commit e0cfd5159f314d6b304d030363650b06a2299cbb, it was introduced in version v4.17 by commit c46234ebb4d1eee5e09819f49169e51cfc6eb909. For more details please see the references link. | null | 2021-12-19T22:10:56.971607Z | 2021-11-14T15:16:03.467723Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c46234ebb4d1eee5e09819f49169e51cfc6eb909'} |
Linux | GSD-2021-1002503 | can: sja1000: fix use after free in ems_pcmcia_add_card() | can: sja1000: fix use after free in ems_pcmcia_add_card()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.85 by commit 923f4dc5df679f678e121c20bf2fd70f7bf3e288, it was introduced in version v3.2 by commit fd734c6f25aea4b2b44b045e489aec67b388577e. For more details please see the references link. | null | 2021-12-20T01:25:09.521136Z | 2021-12-19T19:40:09.553050Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fd734c6f25aea4b2b44b045e489aec67b388577e'} |
Linux | GSD-2022-1001053 | mt76: mt7915: fix injected MPDU transmission to not use HW A-MSDU | mt76: mt7915: fix injected MPDU transmission to not use HW A-MSDU
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 7d478a66b9c990366087cc8f054256da5effa6c7. For more details please see the references link. | null | 2022-04-25T06:15:35.489804Z | 2022-04-24T20:42:36.697431Z | null | null | null | null | null |
Linux | GSD-2021-1002153 | btrfs: fix abort logic in btrfs_replace_file_extents | btrfs: fix abort logic in btrfs_replace_file_extents
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 4afb912f439c4bc4e6a4f3e7547f2e69e354108f. For more details please see the references link. | null | 2021-12-20T01:22:59.484422Z | 2021-11-14T15:22:14.736917Z | null | null | null | null | null |
Linux | GSD-2021-1000494 | btrfs: fix removed dentries still existing after log is synced | btrfs: fix removed dentries still existing after log is synced
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.7 by commit 6d0924c5b742036b4f20a0ffdf2b6cf3f963f5f6, it was introduced in version v5.12 by commit 64d6b281ba4db044c946158387c74e1149b9487e. For more details please see the references link. | null | 2021-12-19T21:47:45.220144Z | 2021-05-31T23:45:53.699005Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/64d6b281ba4db044c946158387c74e1149b9487e'} |
Linux | GSD-2022-1001403 | tcp: Don't acquire inet_listen_hashbucket::lock with disabled BH. | tcp: Don't acquire inet_listen_hashbucket::lock with disabled BH.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit b897d79a0658d2a0fe037612bd70ce0eb21741e9. For more details please see the references link. | null | 2022-04-25T06:29:57.673887Z | 2022-04-24T21:10:37.759113Z | null | null | null | null | null |
Linux | GSD-2022-1002385 | scsi: target: tcmu: Fix possible page UAF | scsi: target: tcmu: Fix possible page UAF
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit d7c5d79e50be6e06b669141e3db1f977a0dd4e8e. For more details please see the references link. | null | 2022-04-25T03:51:31.716648Z | 2022-04-24T22:41:26.158020Z | null | null | null | null | null |
Linux | GSD-2022-1000642 | net/mlx5e: Avoid implicit modify hdr for decap drop rule | net/mlx5e: Avoid implicit modify hdr for decap drop rule
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.6 by commit e23a2f4e43a4a18de4137a446705281a8969b375, it was introduced in version v5.16 by commit b16eb3c81fe27978afdb2c111908d4d627a88d99. For more details please see the references link. | null | 2022-03-07T01:44:09.061402Z | 2022-02-27T03:35:15.776132Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b16eb3c81fe27978afdb2c111908d4d627a88d99'} |
Linux | GSD-2022-1001950 | memory: renesas-rpc-if: fix platform-device leak in error path | memory: renesas-rpc-if: fix platform-device leak in error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.112 by commit c089ffc846c85f200db34ad208338f4f81a6d82d, it was introduced in version v5.9 by commit ca7d8b980b67f133317525c4273e144116ee1ae5. For more details please see the references link. | null | 2022-04-25T02:59:26.862116Z | 2022-04-24T21:57:25.884589Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca7d8b980b67f133317525c4273e144116ee1ae5'} |
Linux | GSD-2021-1001285 | smackfs: restrict bytes count in smk_set_cipso() | smackfs: restrict bytes count in smk_set_cipso()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.51 by commit 3780348c1a0e14ffefcaf1fc521f815bcaac94b0. For more details please see the references link. | null | 2021-12-19T22:22:02.086576Z | 2021-08-03T01:57:27.570230Z | null | null | null | null | null |
Linux | GSD-2022-1000212 | rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink() | rtnetlink: make sure to refresh master_dev/m_ops in __rtnl_newlink()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.97 by commit 3bbe2019dd12b8d13671ee6cda055d49637b4c39, it was introduced in version v3.14 by commit ba7d49b1f0f8e5f24294a880ed576964059af5ef. For more details please see the references link. | null | 2022-02-20T02:14:48.714778Z | 2022-02-18T21:56:08.354146Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ba7d49b1f0f8e5f24294a880ed576964059af5ef'} |
Linux | GSD-2021-1000247 | i2c: cadence: fix reference leak when pm_runtime_get_sync fails | i2c: cadence: fix reference leak when pm_runtime_get_sync fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit a45fc41beed8e0fe31864619c34aa00797fb60c1, it was introduced in version v4.5 by commit 7fa32329ca03148fb2c07b4ef3247b8fc0488d6a. For more details please see the references link. | null | 2021-12-20T01:26:36.625206Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7fa32329ca03148fb2c07b4ef3247b8fc0488d6a'} |
Linux | GSD-2022-1000838 | xen/netfront: destroy queues before real_num_tx_queues is zeroed | xen/netfront: destroy queues before real_num_tx_queues is zeroed
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.104 by commit a1753d5c29a6fb9a8966dcf04cb4f3b71e303ae8, it was introduced in version v5.10.94 by commit 443133330a5d4a3fd429179d460cc297724fefe8. For more details please see the references link. | null | 2022-03-18T02:58:30.256468Z | 2022-03-18T00:23:00.034685Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/443133330a5d4a3fd429179d460cc297724fefe8'} |
Linux | GSD-2021-1002780 | IB/qib: Fix memory leak in qib_user_sdma_queue_pkts() | IB/qib: Fix memory leak in qib_user_sdma_queue_pkts()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.260 by commit d53456492b5d02033c73dfa0f3b94c86337791ba, it was introduced in version v4.14.255 by commit 60833707b968d5ae02a75edb7886dcd4a957cf0d. For more details please see the references link. | null | 2022-01-11T05:53:11.098884Z | 2021-12-30T02:43:07.928716Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/60833707b968d5ae02a75edb7886dcd4a957cf0d'} |
Linux | GSD-2021-1001905 | net: dsa: microchip: Added the condition for scheduling ksz_mib_read_work | net: dsa: microchip: Added the condition for scheduling ksz_mib_read_work
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit 383239a33cf29ebee9ce0d4e0e5c900b77a16148, it was introduced in version v5.7 by commit 469b390e1ba330e888175e55d78573db2e9a8cb4. For more details please see the references link. | null | 2021-12-19T22:44:55.132903Z | 2021-10-28T13:55:00.208609Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/469b390e1ba330e888175e55d78573db2e9a8cb4'} |
Linux | GSD-2021-1000617 | cxgb4: avoid accessing registers when clearing filters | cxgb4: avoid accessing registers when clearing filters
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.124 by commit 0bf49b3c8d8b3a43ce09f1b2db70e5484d31fcdf, it was introduced in version v5.2 by commit b1a79360ee862f8ada4798ad2346fa45bb41b527. For more details please see the references link. | null | 2021-12-20T00:21:26.262370Z | 2021-06-04T19:48:17.113965Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b1a79360ee862f8ada4798ad2346fa45bb41b527'} |
Linux | GSD-2022-1000992 | drm/amd/display: Fix by adding FPU protection for dcn30_internal_validate_bw | drm/amd/display: Fix by adding FPU protection for dcn30_internal_validate_bw
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 76f4c5e5f99ee7084b555d9a38e8ffeb16ec65a2. For more details please see the references link. | null | 2022-04-25T05:59:36.257684Z | 2022-04-24T20:37:52.943667Z | null | null | null | null | null |
Linux | GSD-2022-1001680 | scsi: mpt3sas: Fix use after free in _scsih_expander_node_remove() | scsi: mpt3sas: Fix use after free in _scsih_expander_node_remove()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 25c1353dca74ad7cf3fd7ce258fe7c957a147d5e, it was introduced in version v5.11 by commit 7d310f241001e090cf1ec0f3ae836b38d8c6ebec. For more details please see the references link. | null | 2022-04-25T02:59:24.376838Z | 2022-04-24T21:34:29.554989Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7d310f241001e090cf1ec0f3ae836b38d8c6ebec'} |
Linux | GSD-2021-1001456 | udf: Fix NULL pointer dereference in udf_symlink function | udf: Fix NULL pointer dereference in udf_symlink function
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.276 by commit 371566f63cbd0bb6fbb25b8fe9d5798268d35af9. For more details please see the references link. | null | 2021-12-19T23:28:05.396261Z | 2021-08-03T02:46:37.711402Z | null | null | null | null | null |
Linux | GSD-2022-1002106 | ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction | ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 7e6f5786621df060f8296f074efd275eaf20361a, it was introduced in version v3.16 by commit 00a7bb81c20f3e81711e28e0f6c08cee8fd18514. For more details please see the references link. | null | 2022-04-25T03:19:08.974917Z | 2022-04-24T22:12:06.173246Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/00a7bb81c20f3e81711e28e0f6c08cee8fd18514'} |
Linux | GSD-2021-1001006 | net: bridge: fix vlan tunnel dst null pointer dereference | net: bridge: fix vlan tunnel dst null pointer dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.46 by commit fe0448a3fad365a747283a00a1d1ad5e8d6675b7, it was introduced in version v4.11 by commit 11538d039ac6efcf4f1a6c536e1b87cd3668a9fd. For more details please see the references link. | null | 2021-12-20T00:40:44.569138Z | 2021-06-30T00:33:27.534756Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/11538d039ac6efcf4f1a6c536e1b87cd3668a9fd'} |
Linux | GSD-2022-1000091 | drm/nouveau: fix off by one in BIOS boundary checking | drm/nouveau: fix off by one in BIOS boundary checking
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.300 by commit d4b746e60fd8eaa8016e144223abe91158edcdad, it was introduced in version v4.8 by commit 4d4e9907ff572bb1d1c0f6913ad6e3d6d4525077. For more details please see the references link. | null | 2022-02-19T09:31:50.232816Z | 2022-02-18T21:34:11.689133Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4d4e9907ff572bb1d1c0f6913ad6e3d6d4525077'} |
Linux | GSD-2022-1002043 | video: fbdev: cirrusfb: check pixclock to avoid divide by zero | video: fbdev: cirrusfb: check pixclock to avoid divide by zero
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 8c7e2141fb89c620ab4e41512e262fbf25b8260d. For more details please see the references link. | null | 2022-04-25T06:31:49.930095Z | 2022-04-24T22:05:33.752522Z | null | null | null | null | null |
Linux | GSD-2021-1001513 | mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap | mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.285 by commit e5bb852aa2ad963074f0ad73030dbc20a30853e3, it was introduced in version v4.7 by commit 646e76bb5daf4ca38438c69ffb72cccb605f3466. For more details please see the references link. | null | 2021-12-19T22:42:49.614106Z | 2021-10-19T16:21:37.907145Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/646e76bb5daf4ca38438c69ffb72cccb605f3466'} |
Linux | GSD-2022-1000584 | iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() | iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.22 by commit 336d096b62bdc673e852b6b80d5072d7888ce85d, it was introduced in version v5.8 by commit e3beca48a45b5e0e6e6a4e0124276b8248dcc9bb. For more details please see the references link. | null | 2022-03-07T01:47:38.189688Z | 2022-02-27T03:27:27.202881Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e3beca48a45b5e0e6e6a4e0124276b8248dcc9bb'} |
Linux | GSD-2022-1002413 | ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl | ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit f149b1bd213820363731aa119e5011ca892a2aac, it was introduced in version v4.8 by commit 714fb87e8bc05ff78255afc0dca981e8c5242785. For more details please see the references link. | null | 2022-04-25T03:05:04.075794Z | 2022-04-24T22:44:45.942880Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/714fb87e8bc05ff78255afc0dca981e8c5242785'} |
Linux | GSD-2021-1001143 | nilfs2: fix memory leak in nilfs_sysfs_delete_device_group | nilfs2: fix memory leak in nilfs_sysfs_delete_device_group
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13 by commit 8fd0c1b0647a6bda4067ee0cd61e8395954b6f28, it was introduced in version v3.17 by commit da7141fb78db915680616e15677539fc8140cf53. For more details please see the references link. | null | 2021-12-19T23:12:05.334795Z | 2021-07-08T01:59:21.588503Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/da7141fb78db915680616e15677539fc8140cf53'} |
Linux | GSD-2021-1000302 | drm: bridge/panel: Cleanup connector on bridge detach | drm: bridge/panel: Cleanup connector on bridge detach
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 98d7d76a74e48ec3ddf2e23950adff7edcab9327, it was introduced in version v4.13 by commit 13dfc0540a575b47b2d640b093ac16e9e09474f6. For more details please see the references link. | null | 2021-12-19T22:54:25.639729Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/13dfc0540a575b47b2d640b093ac16e9e09474f6'} |
Linux | GSD-2022-1001395 | mt76: mt7915: fix injected MPDU transmission to not use HW A-MSDU | mt76: mt7915: fix injected MPDU transmission to not use HW A-MSDU
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 64d50b03c3816c76d969116b25322a2be47868d3. For more details please see the references link. | null | 2022-04-25T05:49:27.164203Z | 2022-04-24T21:10:14.476917Z | null | null | null | null | null |
Linux | GSD-2021-1002295 | scsi: advansys: Fix kernel pointer leak | scsi: advansys: Fix kernel pointer leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.82 by commit 055eced3edf5b675d12189081303f6285ef26511. For more details please see the references link. | null | 2021-12-20T00:23:59.576110Z | 2021-11-29T02:37:27.722422Z | null | null | null | null | null |
Linux | GSD-2021-1001840 | KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest() | KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit fbd724c49bead048ae9fc1a5b7bff2fb3e54f855, it was introduced in version v5.2 by commit 10d91611f426d4bafd2a83d966c36da811b2f7ad. For more details please see the references link. | null | 2021-12-20T01:31:09.877316Z | 2021-10-28T13:51:39.501658Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/10d91611f426d4bafd2a83d966c36da811b2f7ad'} |
Linux | GSD-2021-1000752 | pid: take a reference when initializing `cad_pid` | pid: take a reference when initializing `cad_pid`
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.125 by commit 2cd6eedfa6344f5ef5c3dac3aee57a39b5b46dff, it was introduced in version v2.6.19 by commit 9ec52099e4b8678a60e9f93e41ad87885d64f3e6. For more details please see the references link. | null | 2021-12-19T22:36:21.626254Z | 2021-06-25T00:02:28.418459Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9ec52099e4b8678a60e9f93e41ad87885d64f3e6'} |
Linux | GSD-2021-1000545 | interconnect: qcom: bcm-voter: add a missing of_node_put() | interconnect: qcom: bcm-voter: add a missing of_node_put()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit 93d1dbe7043b3c9492bdf396b2e98a008435b55b, it was introduced in version v5.7 by commit 976daac4a1c581e5d5fd64047519fd6fcde39738. For more details please see the references link. | null | 2021-12-19T23:31:09.045108Z | 2021-06-04T19:36:20.714652Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/976daac4a1c581e5d5fd64047519fd6fcde39738'} |
Linux | GSD-2021-1002578 | usb: cdnsp: Fix a NULL pointer dereference in cdnsp_endpoint_init() | usb: cdnsp: Fix a NULL pointer dereference in cdnsp_endpoint_init()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.7 by commit 7d94bc8e335cb33918e52efdbe192c36707bfa24, it was introduced in version v5.12 by commit 3d82904559f4f5a2622db1b21de3edf2eded7664. For more details please see the references link. | null | 2021-12-19T22:47:07.420438Z | 2021-12-19T19:43:33.082090Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3d82904559f4f5a2622db1b21de3edf2eded7664'} |
Linux | GSD-2022-1001028 | Drivers: hv: vmbus: Fix initialization of device object in vmbus_device_register() | Drivers: hv: vmbus: Fix initialization of device object in vmbus_device_register()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 2fe4b8631427618175a32f125062df91a5fe3f73, it was introduced in version v5.17 by commit 743b237c3a7b0f5b44aa704aae8a1058877b6322. For more details please see the references link. | null | 2022-04-25T03:00:08.686955Z | 2022-04-24T20:41:12.174967Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/743b237c3a7b0f5b44aa704aae8a1058877b6322'} |
Linux | GSD-2021-1002082 | xhci: Fix command ring pointer corruption while aborting a command | xhci: Fix command ring pointer corruption while aborting a command
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit e54abefe703ab7c4e5983e889babd1447738ca42. For more details please see the references link. | null | 2021-12-20T01:37:04.057394Z | 2021-11-14T15:19:02.823606Z | null | null | null | null | null |
Linux | GSD-2021-1000115 | irqchip/gic-v3: Do not enable irqs when handling spurious interrups | irqchip/gic-v3: Do not enable irqs when handling spurious interrups
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.20 by commit ea817ac1014c04f47885532b55f5d0898deadfba, it was introduced in version v5.1 by commit 3f1f3234bc2db1c16b9818b9a15a5d58ad45251c. For more details please see the references link. | null | 2021-12-19T23:18:21.423571Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f1f3234bc2db1c16b9818b9a15a5d58ad45251c'} |
Linux | GSD-2021-1002128 | drm/amdgpu: Fix even more out of bound writes from debugfs | drm/amdgpu: Fix even more out of bound writes from debugfs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.16 by commit 9eb4bdd554fc31a5ef6bf645a20ff21618ce45a9, it was introduced in version v5.10 by commit 918698d5c2b50433714d2042f55b55b090faa167. For more details please see the references link. | null | 2021-12-19T23:22:30.998211Z | 2021-11-14T15:21:12.470396Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/918698d5c2b50433714d2042f55b55b090faa167'} |
Linux | GSD-2022-1001182 | kernel/resource: fix kfree() of bootmem memory again | kernel/resource: fix kfree() of bootmem memory again
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit ab86020070999e758ce2e60c4348f20bf7ddba56, it was introduced in version v3.10 by commit ebff7d8f270d045338d9f4796014f4db429a17f9. For more details please see the references link. | null | 2022-04-25T03:20:44.741833Z | 2022-04-24T20:51:32.885642Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ebff7d8f270d045338d9f4796014f4db429a17f9'} |
Linux | GSD-2022-1001478 | bfq: fix use-after-free in bfq_dispatch_request | bfq: fix use-after-free in bfq_dispatch_request
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 5687958bf18f84384d809f521210d0f5deed03b0. For more details please see the references link. | null | 2022-04-25T04:46:46.012677Z | 2022-04-24T21:15:47.655563Z | null | null | null | null | null |
Linux | GSD-2021-1001354 | udf: Fix NULL pointer dereference in udf_symlink function | udf: Fix NULL pointer dereference in udf_symlink function
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.133 by commit 80d505aee6398cf8beb72475c7edcf1733c1c68b. For more details please see the references link. | null | 2021-12-19T23:50:50.575727Z | 2021-08-03T02:16:12.544420Z | null | null | null | null | null |
Linux | GSD-2022-1000639 | net/mlx5: Use del_timer_sync in fw reset flow of halting poll | net/mlx5: Use del_timer_sync in fw reset flow of halting poll
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.6 by commit 2a038dd1d942f8fbc495c58fa592ff24af05f1c2, it was introduced in version v5.10 by commit 38b9f903f22b9baa5c4b9bfb07c8bbc49f5efbba. For more details please see the references link. | null | 2022-03-07T01:35:14.548110Z | 2022-02-27T03:34:55.237452Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/38b9f903f22b9baa5c4b9bfb07c8bbc49f5efbba'} |
Linux | GSD-2021-1001704 | drm/amdkfd: fix svm_migrate_fini warning | drm/amdkfd: fix svm_migrate_fini warning
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.11 by commit ac7d732b24f4061f8a732ada49b054ab38c63e15. For more details please see the references link. | null | 2021-12-19T22:25:16.308533Z | 2021-10-19T16:32:43.716137Z | null | null | null | null | null |
Linux | GSD-2021-1000816 | ocfs2: fix data corruption by fallocate | ocfs2: fix data corruption by fallocate
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit 0a31dd6fd2f4e7db538fb6eb1f06973d81f8dd3b, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T23:15:27.914341Z | 2021-06-25T00:09:11.872136Z | null | null | null | null | null |
Linux | GSD-2022-1000793 | riscv: fix oops caused by irqsoff latency tracer | riscv: fix oops caused by irqsoff latency tracer
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.26 by commit 1851b9a467065b18ec2cba156eea345206df1c8f, it was introduced in version v5.9 by commit 3c46979829824da5af8766d89fa877976bdae884. For more details please see the references link. | null | 2022-03-18T03:00:31.138651Z | 2022-03-18T00:18:22.810754Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c46979829824da5af8766d89fa877976bdae884'} |
Linux | GSD-2022-1001881 | ASoC: codecs: rx-macro: fix accessing compander for aux | ASoC: codecs: rx-macro: fix accessing compander for aux
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 9208ecc703b5ed5b12d7ea13c79207f4c8456638, it was introduced in version v5.12 by commit 4f692926f562ff48abfcca6b16f36ff8d57473b6. For more details please see the references link. | null | 2022-04-25T05:31:05.307545Z | 2022-04-24T21:51:24.562813Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4f692926f562ff48abfcca6b16f36ff8d57473b6'} |
Linux | GSD-2022-1002254 | drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes() | drm/amd/display: Fix a NULL pointer dereference in amdgpu_dm_connector_add_common_modes()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 57f4ad5e286fe4599c8fc63cf89f85f9eec7f9c9, it was introduced in version v4.15 by commit e7b07ceef2a650e5ed8ca37997689e086c680daf. For more details please see the references link. | null | 2022-04-25T06:48:31.822084Z | 2022-04-24T22:26:43.941881Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e7b07ceef2a650e5ed8ca37997689e086c680daf'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.