ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2021-1000196 | nvmet-rdma: Fix NULL deref when SEND is completed with error | nvmet-rdma: Fix NULL deref when SEND is completed with error
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.5 by commit 5bdb34466ad8370546dfa0497594fb1d6f2fed90, it was introduced in version v5.9 by commit ca0f1a8055be2a04073af435dc68419334481638. For more details please see the references link. | null | 2021-12-20T01:12:13.688437Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca0f1a8055be2a04073af435dc68419334481638'} |
Linux | GSD-2022-1001101 | virtio: use virtio_device_ready() in virtio_device_restore() | virtio: use virtio_device_ready() in virtio_device_restore()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 4ae431113179d72c668b61df320af0c06d1aa5c5, it was introduced in version v5.16 by commit d50497eb4e554e1f0351e1836ee7241c059592e6. For more details please see the references link. | null | 2022-04-25T02:49:33.451273Z | 2022-04-24T20:45:25.191044Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d50497eb4e554e1f0351e1836ee7241c059592e6'} |
Linux | GSD-2022-1000340 | net: fix a memleak when uncloning an skb dst and its metadata | net: fix a memleak when uncloning an skb dst and its metadata
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.180 by commit a80817adc2a4c1ba26a7aa5f3ed886e4a18dff88, it was introduced in version v4.3 by commit fc4099f17240767554ff3a73977acb78ef615404. For more details please see the references link. | null | 2022-03-07T01:33:31.809028Z | 2022-02-27T02:53:22.062462Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fc4099f17240767554ff3a73977acb78ef615404'} |
Linux | GSD-2021-1000895 | ftrace: Do not blindly read the ip address in ftrace_bug() | ftrace: Do not blindly read the ip address in ftrace_bug()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.126 by commit 7e4e824b109f1d41ccf223fbb0565d877d6223a2, it was introduced in version v2.6.28 by commit 05736a427f7e16be948ccbf39782bd3a6ae16b14. For more details please see the references link. | null | 2021-12-19T22:20:06.955131Z | 2021-06-30T00:05:02.837933Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/05736a427f7e16be948ccbf39782bd3a6ae16b14'} |
Linux | GSD-2021-1001787 | net: mdiobus: Fix memory leak in __mdiobus_register | net: mdiobus: Fix memory leak in __mdiobus_register
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.253 by commit 4ec0f9abc512cc02fb04daa89ccf6697e80ab417. For more details please see the references link. | null | 2021-12-20T00:42:18.721201Z | 2021-10-28T13:48:50.949847Z | null | null | null | null | null |
Linux | GSD-2022-1001802 | lib/test: use after free in register_test_dev_kmod() | lib/test: use after free in register_test_dev_kmod()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 611170142b4244d7d6edba1e3400517d8625296b, it was introduced in version v4.13 by commit d9c6a72d6fa29d3a7999dda726577e5d1fccafa5. For more details please see the references link. | null | 2022-04-25T05:54:52.809993Z | 2022-04-24T21:43:09.254400Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9c6a72d6fa29d3a7999dda726577e5d1fccafa5'} |
Linux | GSD-2022-1000710 | thermal: core: Fix TZ_GET_TRIP NULL pointer dereference | thermal: core: Fix TZ_GET_TRIP NULL pointer dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.13 by commit 4c294285cec3964b3291772ac0642c2bf440bd1b, it was introduced in version v5.9 by commit 1ce50e7d408ef2bdc8ca021363fd46d1b8bfad00. For more details please see the references link. | null | 2022-03-18T03:00:24.417711Z | 2022-03-18T00:11:36.002221Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1ce50e7d408ef2bdc8ca021363fd46d1b8bfad00'} |
Linux | GSD-2021-1001292 | seq_buf: Fix overflow in seq_buf_putmem_hex() | seq_buf: Fix overflow in seq_buf_putmem_hex()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.51 by commit f9fb4986f4d81182f938d16beb4f983fe71212aa, it was introduced in version v2.6.27 by commit 5e3ca0ec76fce92daa4eed0d02de9c79b1fe3920. For more details please see the references link. | null | 2021-12-19T23:51:50.349803Z | 2021-08-03T01:59:01.092893Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5e3ca0ec76fce92daa4eed0d02de9c79b1fe3920'} |
Linux | GSD-2022-1002238 | af_netlink: Fix shift out of bounds in group mask calculation | af_netlink: Fix shift out of bounds in group mask calculation
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 41249fff507387c3323b198d0052faed08b14de4, it was introduced in version v2.6.14 by commit f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198. For more details please see the references link. | null | 2022-04-25T04:11:38.053553Z | 2022-04-24T22:24:42.507578Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198'} |
Linux | GSD-2022-1000205 | block: Fix wrong offset in bio_truncate() | block: Fix wrong offset in bio_truncate()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.96 by commit b63e120189fd92aff00096d11e2fc5253f60248b. For more details please see the references link. | null | 2022-02-19T10:59:37.061808Z | 2022-02-18T21:55:20.676232Z | null | null | null | null | null |
Linux | GSD-2021-1002847 | tun: avoid double free in tun_free_netdev | tun: avoid double free in tun_free_netdev
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.12 by commit 3cb5ae77799e8ed6ec3fec0b6b4cd07f01650cc5. For more details please see the references link. | null | 2022-01-11T05:56:23.616646Z | 2021-12-30T02:46:05.199689Z | null | null | null | null | null |
Linux | GSD-2021-1001768 | cifs: Fix soft lockup during fsstress | cifs: Fix soft lockup during fsstress
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.9 by commit 9f6c7aff21f81ae8856da1f63847d1362d523409. For more details please see the references link. | null | 2021-12-19T22:27:00.808620Z | 2021-10-19T16:35:48.653001Z | null | null | null | null | null |
Linux | GSD-2022-1001947 | ARM: davinci: da850-evm: Avoid NULL pointer dereference | ARM: davinci: da850-evm: Avoid NULL pointer dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.112 by commit 0a312ec66a03133d28570f07bc52749ccfef54da, it was introduced in version v2.6.33 by commit bae105879f2f2404155da6f50b3636193d228a62. For more details please see the references link. | null | 2022-04-25T06:30:32.596213Z | 2022-04-24T21:57:14.730293Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bae105879f2f2404155da6f50b3636193d228a62'} |
Linux | GSD-2022-1000655 | btrfs: fix deadlock between quota disable and qgroup rescan worker | btrfs: fix deadlock between quota disable and qgroup rescan worker
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.8 by commit 31198e58c09e21d4f65c49d2361f76b87aca4c3f. For more details please see the references link. | null | 2022-03-07T01:35:48.223431Z | 2022-02-27T03:36:44.582213Z | null | null | null | null | null |
Linux | GSD-2022-1002392 | gpiolib: acpi: use correct format characters | gpiolib: acpi: use correct format characters
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 64f42625d8b6a6ac8651cc1520bafebb0ab9552d, it was introduced in version v4.14 by commit e40a3ae1f794a35c4af3746291ed6fedc1fa0f6f. For more details please see the references link. | null | 2022-04-25T06:56:27.103659Z | 2022-04-24T22:42:25.878248Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e40a3ae1f794a35c4af3746291ed6fedc1fa0f6f'} |
Linux | GSD-2021-1001338 | ALSA: usx2y: Don't call free_pages_exact() with NULL address | ALSA: usx2y: Don't call free_pages_exact() with NULL address
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.134 by commit 88262229b778f4f7a896da828d966f94dcb35d19. For more details please see the references link. | null | 2021-12-20T00:45:25.051642Z | 2021-08-03T02:12:21.884211Z | null | null | null | null | null |
Linux | GSD-2021-1000483 | Drivers: hv: vmbus: Increase wait time for VMbus unload | Drivers: hv: vmbus: Increase wait time for VMbus unload
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.269 by commit 9e5f64bb615b435a9af501dc4167258acc1ba44e, it was introduced in version v4.9.237 by commit 2b557a0612ae0aec89c6649c19467830f6965e76. For more details please see the references link. | null | 2021-12-19T22:33:18.374961Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2b557a0612ae0aec89c6649c19467830f6965e76'} |
Linux | GSD-2022-1001414 | drm/amdkfd: Ensure mm remain valid in svm deferred_list work | drm/amdkfd: Ensure mm remain valid in svm deferred_list work
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 84771f82b6459668cbeae544a13ca05e64c6ee7d. For more details please see the references link. | null | 2022-04-25T05:04:06.272841Z | 2022-04-24T21:11:09.519940Z | null | null | null | null | null |
Linux | GSD-2021-1000179 | irqchip/gic-v3: Do not enable irqs when handling spurious interrups | irqchip/gic-v3: Do not enable irqs when handling spurious interrups
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.118 by commit e7ea8e46e3b777be26aa855fe07778c415f24926, it was introduced in version v5.1 by commit 3f1f3234bc2db1c16b9818b9a15a5d58ad45251c. For more details please see the references link. | null | 2021-12-19T22:26:36.002268Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f1f3234bc2db1c16b9818b9a15a5d58ad45251c'} |
Linux | GSD-2021-1002144 | scsi: core: Put LLD module refcnt after SCSI device is released | scsi: core: Put LLD module refcnt after SCSI device is released
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.17 by commit f30822c0b4c35ec86187ab055263943dc71a6836. For more details please see the references link. | null | 2021-12-20T00:14:46.390985Z | 2021-11-14T15:21:51.292792Z | null | null | null | null | null |
Linux | GSD-2022-1001044 | powerpc/secvar: fix refcount leak in format_show() | powerpc/secvar: fix refcount leak in format_show()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit d05e4265d33af60b39606c20c731e3e719bfe3d6. For more details please see the references link. | null | 2022-04-25T05:43:38.037329Z | 2022-04-24T20:41:58.231617Z | null | null | null | null | null |
Linux | GSD-2021-1000529 | net: lantiq: fix memory corruption in RX ring | net: lantiq: fix memory corruption in RX ring
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit 46dd4abced3cb2c912916f4a5353e0927db0c4a2, it was introduced in version v4.20 by commit fe1a56420cf2ec28c8eceef672b87de0bbe1a260. For more details please see the references link. | null | 2021-12-19T22:11:35.294034Z | 2021-06-04T19:34:06.443006Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fe1a56420cf2ec28c8eceef672b87de0bbe1a260'} |
Linux | GSD-2021-1002514 | mtd: rawnand: fsmc: Fix timing computation | mtd: rawnand: fsmc: Fix timing computation
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.85 by commit 347cc9b4d9662aebc3aa7a12c12f0c8c091d1db9, it was introduced in version v4.13 by commit d9fb0795718333e36f7e472d7d81b7b8efe347c8. For more details please see the references link. | null | 2021-12-19T23:07:18.664282Z | 2021-12-19T19:40:42.060869Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9fb0795718333e36f7e472d7d81b7b8efe347c8'} |
Linux | GSD-2021-1000382 | spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() | spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit ce02e58ddf8658a4c3bed2296f32a5873b3f7cce, it was introduced in version v5.2 by commit 944c01a889d97dc08e1b71f4ed868f4023fd6034. For more details please see the references link. | null | 2021-12-19T23:41:58.401562Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/944c01a889d97dc08e1b71f4ed868f4023fd6034'} |
Linux | GSD-2022-1001315 | remoteproc: Fix count check in rproc_coredump_write() | remoteproc: Fix count check in rproc_coredump_write()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 11572dad9fbadbd9269a2550f7e236b5b8c2d80c, it was introduced in version v5.9 by commit 3afdc59e4390487f04f2435b7e8a6289984e0a1e. For more details please see the references link. | null | 2022-04-25T03:09:51.428267Z | 2022-04-24T21:04:02.358033Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3afdc59e4390487f04f2435b7e8a6289984e0a1e'} |
Linux | GSD-2021-1002645 | firmware: arm_scpi: Fix string overflow in SCPI genpd driver | firmware: arm_scpi: Fix string overflow in SCPI genpd driver
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.222 by commit 7e8645ca2c0046f7cd2f0f7d569fc036c8abaedb, it was introduced in version v4.8 by commit 8bec4337ad4023b26de35d3b0c3a3b2735ffc5c7. For more details please see the references link. | null | 2022-01-11T05:57:56.452798Z | 2021-12-27T05:31:22.220704Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8bec4337ad4023b26de35d3b0c3a3b2735ffc5c7'} |
Linux | GSD-2021-1000678 | NFS: fix an incorrect limit in filelayout_decode_layout() | NFS: fix an incorrect limit in filelayout_decode_layout()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.235 by commit f299522eda1566cbfbae4b15c82970fc41b03714, it was introduced in version v2.6.37 by commit 16b374ca439fb406e46e071f75428f5b033056f8. For more details please see the references link. | null | 2021-12-19T23:59:08.759344Z | 2021-06-04T20:00:22.193775Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/16b374ca439fb406e46e071f75428f5b033056f8'} |
Linux | GSD-2022-1000857 | net/smc: Use a mutex for locking "struct smc_pnettable" | net/smc: Use a mutex for locking "struct smc_pnettable"
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.103 by commit 91f56a85278ebd6440ded1a6f82a9706cfcb0a7f, it was introduced in version v5.1 by commit 64e28b52c7a6616217bee67ba2ad886f478f9737. For more details please see the references link. | null | 2022-03-18T02:45:27.742200Z | 2022-03-18T00:25:02.201047Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/64e28b52c7a6616217bee67ba2ad886f478f9737'} |
Linux | GSD-2022-1001745 | Reinstate some of "swiotlb: rework "fix info leak with DMA_FROM_DEVICE"" | Reinstate some of "swiotlb: rework "fix info leak with DMA_FROM_DEVICE""
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 7007c894631cf43041dcfa0da7142bbaa7eb673c. For more details please see the references link. | null | 2022-04-25T05:51:05.909170Z | 2022-04-24T21:38:56.594804Z | null | null | null | null | null |
Linux | GSD-2021-1002215 | comedi: vmk80xx: fix bulk-buffer overflow | comedi: vmk80xx: fix bulk-buffer overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.2 by commit 47b4636ebdbeba2044b3db937c4d2b6a4fe3d0f2, it was introduced in version v2.6.31 by commit 985cafccbf9b7f862aa1c5ee566801e18b5161fb. For more details please see the references link. | null | 2021-12-20T00:06:21.528606Z | 2021-11-14T15:25:09.150831Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/985cafccbf9b7f862aa1c5ee566801e18b5161fb'} |
Linux | GSD-2021-1000228 | net/sched: act_ct: fix wild memory access when clearing fragments | net/sched: act_ct: fix wild memory access when clearing fragments
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 0648941f4c8bbf8b4b6c0b270889ae7aa769b921, it was introduced in version v5.8 by commit ae372cb1750f6c95370f92fe5f5620e0954663ba. For more details please see the references link. | null | 2021-12-19T22:16:15.656444Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ae372cb1750f6c95370f92fe5f5620e0954663ba'} |
Linux | GSD-2021-1001593 | net: sched: flower: protect fl_walk() with rcu | net: sched: flower: protect fl_walk() with rcu
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.151 by commit 694b0cee7f8546b69a80996a29cb3cf4149c0453, it was introduced in version v5.3 by commit d39d714969cda5cbda291402c8c6b1fb1047f42e. For more details please see the references link. | null | 2021-12-19T23:15:12.741082Z | 2021-10-19T16:25:23.710943Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d39d714969cda5cbda291402c8c6b1fb1047f42e'} |
Linux | GSD-2022-1000504 | kasan: test: fix compatibility with FORTIFY_SOURCE | kasan: test: fix compatibility with FORTIFY_SOURCE
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 4d4710b7dfea13e7e2793824bf38c36129594ad8. For more details please see the references link. | null | 2022-03-07T03:15:10.680843Z | 2022-02-27T03:16:10.215455Z | null | null | null | null | null |
Linux | GSD-2021-1001069 | net: ipv4: fix memory leak in ip_mc_add1_src | net: ipv4: fix memory leak in ip_mc_add1_src
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit 77de6ee73f54a9a89c0afa0bf4c53b239aa9953a, it was introduced in version v4.9 by commit 24803f38a5c0b6c57ed800b47e695f9ce474bc3a. For more details please see the references link. | null | 2021-12-19T22:04:30.644319Z | 2021-06-30T00:37:35.915238Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/24803f38a5c0b6c57ed800b47e695f9ce474bc3a'} |
Linux | GSD-2022-1000154 | rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev | rpmsg: char: Fix race between the release of rpmsg_ctrldev and cdev
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.176 by commit da27b834c1e0222e149e06caddf7718478086d1b, it was introduced in version v4.11 by commit c0cdc19f84a4712cf74888f83af286e3c2e14efd. For more details please see the references link. | null | 2022-02-19T07:59:35.065929Z | 2022-02-18T21:48:00.596248Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c0cdc19f84a4712cf74888f83af286e3c2e14efd'} |
Linux | GSD-2022-1002169 | veth: Ensure eth header is in skb's linear part | veth: Ensure eth header is in skb's linear part
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.190 by commit 2fd90b86dff413fbf8128780c04ea9c6849c16e2, it was introduced in version v2.6.24 by commit e314dbdc1c0dc6a548ecf0afce28ecfd538ff568. For more details please see the references link. | null | 2022-04-25T06:51:21.532274Z | 2022-04-24T22:18:12.620087Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e314dbdc1c0dc6a548ecf0afce28ecfd538ff568'} |
Linux | GSD-2022-1002493 | pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe | pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit 59250d547542f1c7765a78dc97ddfe5e6b0d2ab0, it was introduced in version v3.9 by commit 32e67eee670e1254ee5ab41e2f454680acb9c17c. For more details please see the references link. | null | 2022-04-25T06:16:19.924128Z | 2022-04-24T22:53:48.412699Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/32e67eee670e1254ee5ab41e2f454680acb9c17c'} |
Linux | GSD-2021-1001439 | net: validate lwtstate->data before returning from skb_tunnel_info() | net: validate lwtstate->data before returning from skb_tunnel_info()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.277 by commit b61d327cd3cc5ea591f3bf751dd11e034f388bb5, it was introduced in version v4.3 by commit 61adedf3e3f1d3f032c5a6a299978d91eff6d555. For more details please see the references link. | null | 2021-12-20T00:55:12.860094Z | 2021-08-03T02:41:35.101984Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61adedf3e3f1d3f032c5a6a299978d91eff6d555'} |
Linux | GSD-2022-1002186 | jfs: prevent NULL deref in diFree | jfs: prevent NULL deref in diFree
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit e19c3149a80e4fc8df298d6546640e01601f3758. For more details please see the references link. | null | 2022-04-25T04:32:17.895034Z | 2022-04-24T22:19:55.387682Z | null | null | null | null | null |
Linux | GSD-2022-1000441 | fs/proc: task_mmu.c: don't read mapcount for migration entry | fs/proc: task_mmu.c: don't read mapcount for migration entry
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit a8dd0cfa37792863b6c4bf9542975212a6715d49, it was introduced in version v4.5 by commit e9b61f19858a5d6c42ce2298cf138279375d0d9b. For more details please see the references link. | null | 2022-03-07T01:35:34.632230Z | 2022-02-27T03:07:41.171919Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e9b61f19858a5d6c42ce2298cf138279375d0d9b'} |
Linux | GSD-2021-1001086 | mac80211: Fix NULL ptr deref for injected rate info | mac80211: Fix NULL ptr deref for injected rate info
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit 7b1b88232e40396ee1d8b19d42a050cda0a5aebb, it was introduced in version v5.9 by commit cb17ed29a7a5fea8c9bf70e8a05757d71650e025. For more details please see the references link. | null | 2021-12-20T00:39:29.487265Z | 2021-06-30T00:38:41.446212Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cb17ed29a7a5fea8c9bf70e8a05757d71650e025'} |
Linux | GSD-2022-1000011 | usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. | usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.298 by commit f976dd7011150244a7ba820f2c331e9fb253befa, it was introduced in version v4.0 by commit 5e33f6fdf735cda1d4580fe6f1878da05718fe73. For more details please see the references link. | null | 2022-01-11T05:53:31.866770Z | 2022-01-10T19:50:04.887105Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5e33f6fdf735cda1d4580fe6f1878da05718fe73'} |
Linux | GSD-2021-1002700 | drm/amd/pm: fix a potential gpu_metrics_table memory leak | drm/amd/pm: fix a potential gpu_metrics_table memory leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.88 by commit 222cebd995cdf11fe0d502749560f65e64990e55, it was introduced in version v5.10 by commit 95868b85764aff2dcbf78d3054076df75446ad15. For more details please see the references link. | null | 2022-01-11T05:47:50.561274Z | 2021-12-27T05:37:43.189153Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/95868b85764aff2dcbf78d3054076df75446ad15'} |
Linux | GSD-2022-1001250 | ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data | ASoC: codecs: wcd934x: Add missing of_node_put() in wcd934x_codec_parse_data
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit f8e89d84ea83c51ba3ba97ff154f7aa679326760, it was introduced in version v5.6 by commit a61f3b4f476eceb25274161e5a53a8d18e42610b. For more details please see the references link. | null | 2022-04-25T03:52:14.613501Z | 2022-04-24T20:57:48.595975Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a61f3b4f476eceb25274161e5a53a8d18e42610b'} |
Linux | GSD-2021-1002350 | clk: sunxi-ng: Unregister clocks/resets when unbinding | clk: sunxi-ng: Unregister clocks/resets when unbinding
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit b5dd513daa70ee8f6d281a20bd28485ee9bb7db2. For more details please see the references link. | null | 2021-12-19T23:15:37.588081Z | 2021-11-29T02:39:59.168414Z | null | null | null | null | null |
Linux | GSD-2021-1001985 | net: mdiobus: Fix memory leak in __mdiobus_register | net: mdiobus: Fix memory leak in __mdiobus_register
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.214 by commit a9831afa2dc8a18205403907c41aa4e0950ac611. For more details please see the references link. | null | 2021-12-20T01:06:13.295182Z | 2021-11-14T15:14:39.354787Z | null | null | null | null | null |
Linux | GSD-2021-1000697 | NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() | NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.271 by commit 4e1ba532dbc1a0e19fc2458d74ab8d98680c4e42, it was introduced in version v4.9.269 by commit 80e34f4957ec3010c85f9bb0b568a8d46acdf535. For more details please see the references link. | null | 2021-12-20T01:18:32.886422Z | 2021-06-04T20:04:41.049973Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80e34f4957ec3010c85f9bb0b568a8d46acdf535'} |
Linux | GSD-2022-1000912 | openvswitch: Fix setting ipv6 fields causing hw csum failure | openvswitch: Fix setting ipv6 fields causing hw csum failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.232 by commit 99e6d88878090929953f68cf3e15ee72a9a37941, it was introduced in version v3.8 by commit 3fdbd1ce11e5c0d7cafbe44c942c5cad61113d7b. For more details please see the references link. | null | 2022-03-18T02:50:31.434548Z | 2022-03-18T00:31:20.477379Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3fdbd1ce11e5c0d7cafbe44c942c5cad61113d7b'} |
Linux | GSD-2022-1001600 | block: fix rq-qos breakage from skipping rq_qos_done_bio() | block: fix rq-qos breakage from skipping rq_qos_done_bio()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit dbd20bb904ad5731aaca8d009367a930d6ada111, it was introduced in version v5.15 by commit a647a524a46736786c95cdb553a070322ca096e3. For more details please see the references link. | null | 2022-04-25T03:18:18.311716Z | 2022-04-24T21:27:27.253533Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a647a524a46736786c95cdb553a070322ca096e3'} |
Linux | GSD-2021-1001655 | hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field | hwmon: (w83791d) Fix NULL pointer dereference by removing unnecessary structure field
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.71 by commit 516d9055039017a20a698103be2b556b4c976bb8. For more details please see the references link. | null | 2021-12-19T23:21:59.497866Z | 2021-10-19T16:30:16.258539Z | null | null | null | null | null |
Linux | GSD-2021-1000947 | KVM: X86: MMU: Use the correct inherited permissions to get shadow page | KVM: X86: MMU: Use the correct inherited permissions to get shadow page
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.44 by commit 6b6ff4d1f349cb35a7c7d2057819af1b14f80437, it was introduced in version v2.6.20 by commit cea0f0e7ea54753c3265dc77f605a6dad1912cfc. For more details please see the references link. | null | 2021-12-19T23:53:55.212761Z | 2021-06-30T00:28:32.735422Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cea0f0e7ea54753c3265dc77f605a6dad1912cfc'} |
Linux | GSD-2022-1002305 | mm/mempolicy: fix mpol_new leak in shared_policy_replace | mm/mempolicy: fix mpol_new leak in shared_policy_replace
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 39a32f3c06f6d68a530bf9612afa19f50f12e93d, it was introduced in version v3.8 by commit 42288fe366c4f1ce7522bc9f27d0bc2a81c55264. For more details please see the references link. | null | 2022-04-25T05:15:09.151849Z | 2022-04-24T22:32:38.084010Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/42288fe366c4f1ce7522bc9f27d0bc2a81c55264'} |
Linux | GSD-2022-1000338 | ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path | ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.180 by commit 16dcfde98a25340ff0f7879a16bea141d824a196, it was introduced in version v4.0 by commit f243e5a7859a24d10975afb9a1708cac624ba6f1. For more details please see the references link. | null | 2022-03-07T01:55:28.858532Z | 2022-02-27T02:53:08.438392Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f243e5a7859a24d10975afb9a1708cac624ba6f1'} |
Linux | GSD-2021-1001205 | misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge | misc: alcor_pci: fix null-ptr-deref when there is no PCI bridge
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.4 by commit 09d154990ca82d14aed2b72796f6c8845e2e605d. For more details please see the references link. | null | 2021-12-19T23:31:12.422426Z | 2021-08-03T01:36:59.230219Z | null | null | null | null | null |
Linux | GSD-2022-1000768 | net/smc: fix connection leak | net/smc: fix connection leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.27 by commit 80895b6f9154fb22d36fab311ccbb75503a2c87b, it was introduced in version v5.3 by commit 39f41f367b08650e9aa314e3a13fb6dda1e9eec7. For more details please see the references link. | null | 2022-03-18T03:00:45.108702Z | 2022-03-18T00:16:29.937431Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/39f41f367b08650e9aa314e3a13fb6dda1e9eec7'} |
Linux | GSD-2021-1000044 | locking/qrwlock: Fix ordering in queued_write_lock_slowpath() | locking/qrwlock: Fix ordering in queued_write_lock_slowpath()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.33 by commit 82fa9ced35d88581cffa4a1c856fc41fca96d80a, it was introduced in version v4.15 by commit b519b56e378ee82caf9b079b04f5db87dedc3251. For more details please see the references link. | null | 2021-12-20T00:11:31.078119Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b519b56e378ee82caf9b079b04f5db87dedc3251'} |
Linux | GSD-2021-1002079 | dm rq: don't queue request to blk-mq during DM suspend | dm rq: don't queue request to blk-mq during DM suspend
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit 8ca9745efe3528feb06ca4e117188038eea2d351. For more details please see the references link. | null | 2021-12-20T00:44:09.336523Z | 2021-11-14T15:18:54.675205Z | null | null | null | null | null |
Linux | GSD-2022-1001529 | ath10k: Fix error handling in ath10k_setup_msa_resources | ath10k: Fix error handling in ath10k_setup_msa_resources
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 74b1d41e1b6410eed5c76d00eedb262036e9eff5, it was introduced in version v5.8 by commit 727fec790ead3d75e2735f66209949c2163523ea. For more details please see the references link. | null | 2022-04-25T04:43:02.998556Z | 2022-04-24T21:20:25.926904Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/727fec790ead3d75e2735f66209949c2163523ea'} |
Linux | GSD-2021-1002583 | IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr | IB/hfi1: Fix leak of rcvhdrtail_dummy_kvaddr
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.8 by commit 834d0fb978643eaf09da425de197cc16a7c2761b, it was introduced in version v4.5 by commit 46b010d3eeb8eb29c740c4ef09c666485f5c07e6. For more details please see the references link. | null | 2021-12-20T00:21:06.840977Z | 2021-12-19T19:43:44.747796Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/46b010d3eeb8eb29c740c4ef09c666485f5c07e6'} |
Linux | GSD-2021-1000414 | ethernet:enic: Fix a use after free bug in enic_hard_start_xmit | ethernet:enic: Fix a use after free bug in enic_hard_start_xmit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.120 by commit f7f6f07774091a6ddd98500b85386c3c6afb30d3, it was introduced in version v4.16 by commit fb7516d42478ebc8e2f00efb76ef96f7b68fd8d3. For more details please see the references link. | null | 2021-12-20T00:01:20.621969Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb7516d42478ebc8e2f00efb76ef96f7b68fd8d3'} |
Linux | GSD-2021-1002429 | ALSA: pcm: oss: Limit the period size to 16MB | ALSA: pcm: oss: Limit the period size to 16MB
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.221 by commit 2e54cf6794bf82a54aaefc78da13819aea9cd28a. For more details please see the references link. | null | 2021-12-19T22:47:46.257704Z | 2021-12-19T19:36:56.187722Z | null | null | null | null | null |
Linux | GSD-2022-1001483 | memstick/mspro_block: fix handling of read-only devices | memstick/mspro_block: fix handling of read-only devices
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 057b53c4f87690d626203acef8b63d52a9bf2f43. For more details please see the references link. | null | 2022-04-25T04:24:47.084597Z | 2022-04-24T21:16:02.266506Z | null | null | null | null | null |
Linux | GSD-2022-1001179 | clk: Fix clk_hw_get_clk() when dev is NULL | clk: Fix clk_hw_get_clk() when dev is NULL
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 23f89fe005b105f0dcc55034c13eb89f9b570fac, it was introduced in version v5.11 by commit 30d6f8c15d2cd877c1f3d47d8a1064649ebe58e2. For more details please see the references link. | null | 2022-04-25T03:18:50.601585Z | 2022-04-24T20:51:06.728805Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/30d6f8c15d2cd877c1f3d47d8a1064649ebe58e2'} |
Linux | GSD-2021-1000101 | ext4: always panic when errors=panic is specified | ext4: always panic when errors=panic is specified
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.20 by commit 64e1eebe2131183174f4fbb6b1491355f96c6cde, it was introduced in version v5.11 by commit 014c9caa29d3a44e0de695c99ef18bec3e887d52. For more details please see the references link. | null | 2021-12-19T23:46:24.407450Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/014c9caa29d3a44e0de695c99ef18bec3e887d52'} |
Linux | GSD-2022-1001196 | mptcp: Fix crash due to tcp_tsorted_anchor was initialized before release skb | mptcp: Fix crash due to tcp_tsorted_anchor was initialized before release skb
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 4d54181eba4b077fb74033a7186898ad4000a7a5, it was introduced in version v5.16 by commit f70cad1085d1e01d3ec73c1078405f906237feee. For more details please see the references link. | null | 2022-04-25T06:11:32.943924Z | 2022-04-24T20:52:52.478637Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f70cad1085d1e01d3ec73c1078405f906237feee'} |
Linux | GSD-2021-1002096 | netfilter: xt_IDLETIMER: fix panic that occurs when timer_type has garbage value | netfilter: xt_IDLETIMER: fix panic that occurs when timer_type has garbage value
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit cae7cab804c943d723d52724a3aeb07a3f4a2650, it was introduced in version v5.7 by commit 68983a354a655c35d3fb204489d383a2a051fda7. For more details please see the references link. | null | 2021-12-20T01:03:09.310020Z | 2021-11-14T15:19:44.690371Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/68983a354a655c35d3fb204489d383a2a051fda7'} |
Linux | GSD-2021-1000551 | net: dsa: mt7530: fix VLAN traffic leaks | net: dsa: mt7530: fix VLAN traffic leaks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit 82ae35b6c14feae5f216913d5b433e143c756d4e, it was introduced in version v4.16 by commit 83163f7dca5684816d01c8ccf4857aa74801e7b7. For more details please see the references link. | null | 2021-12-19T22:21:14.433574Z | 2021-06-04T19:37:16.503378Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/83163f7dca5684816d01c8ccf4857aa74801e7b7'} |
Linux | GSD-2022-1002240 | bpf, sockmap: Fix more uncharged while msg has more_data | bpf, sockmap: Fix more uncharged while msg has more_data
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 244ce90c8d0bd10ebf957da02c6f3fcd5d920bdf, it was introduced in version v4.20 by commit 604326b41a6fb9b4a78b6179335decee0365cd8c. For more details please see the references link. | null | 2022-04-25T05:17:41.219307Z | 2022-04-24T22:24:55.017252Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/604326b41a6fb9b4a78b6179335decee0365cd8c'} |
Linux | GSD-2021-1001710 | ext4: add error checking to ext4_ext_replay_set_iblocks() | ext4: add error checking to ext4_ext_replay_set_iblocks()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit 27e10c5d31ff1d222c7f797f1ee96d422859ba67, it was introduced in version v5.10 by commit 8016e29f4362e285f0f7e38fadc61a5b7bdfdfa2. For more details please see the references link. | null | 2021-12-19T23:42:28.221141Z | 2021-10-19T16:32:59.690234Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8016e29f4362e285f0f7e38fadc61a5b7bdfdfa2'} |
Linux | GSD-2021-1000802 | sch_htb: fix refcount leak in htb_parent_to_leaf_offload | sch_htb: fix refcount leak in htb_parent_to_leaf_offload
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit 2411c02d03892a5057499f8102d0cc1e0f852416, it was introduced in version v5.12 by commit ae81feb7338c89cee4e6aa0424bdab2ce2b52da2. For more details please see the references link. | null | 2021-12-19T22:40:05.181951Z | 2021-06-25T00:08:19.302091Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ae81feb7338c89cee4e6aa0424bdab2ce2b52da2'} |
Linux | GSD-2022-1000787 | tipc: fix a bit overflow in tipc_crypto_key_rcv() | tipc: fix a bit overflow in tipc_crypto_key_rcv()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.27 by commit 5340a0924ea9c07c5d9a7c5476317731131eead2. For more details please see the references link. | null | 2022-03-18T05:00:34.821475Z | 2022-03-18T00:18:00.711959Z | null | null | null | null | null |
Linux | GSD-2022-1001895 | clocksource/drivers/exynos_mct: Handle DTS with higher number of interrupts | clocksource/drivers/exynos_mct: Handle DTS with higher number of interrupts
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit a81de4315ecf5a401212154dad0168a0cb9ed857, it was introduced in version v3.10 by commit 36ba5d527e9567ed303bad6e86a5f3c2723470f6. For more details please see the references link. | null | 2022-04-25T04:12:01.338710Z | 2022-04-24T21:52:58.048068Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/36ba5d527e9567ed303bad6e86a5f3c2723470f6'} |
Linux | GSD-2021-1001340 | x86/signal: Detect and prevent an alternate signal stack overflow | x86/signal: Detect and prevent an alternate signal stack overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.134 by commit 00fcd8f33e9b9f57115c3b1cfc4cb96450c18796, it was introduced in version v3.15 by commit c2bc11f10a39527cd1bb252097b5525664560956. For more details please see the references link. | null | 2021-12-19T22:19:03.840782Z | 2021-08-03T02:12:52.198628Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c2bc11f10a39527cd1bb252097b5525664560956'} |
Linux | GSD-2021-1001194 | watchdog: Fix possible use-after-free in wdt_startup() | watchdog: Fix possible use-after-free in wdt_startup()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.4 by commit 8adbbe6c86bb13e14f8a19e036ae5f4f5661fd90. For more details please see the references link. | null | 2021-12-20T00:17:58.689167Z | 2021-08-03T01:34:12.599421Z | null | null | null | null | null |
Linux | GSD-2022-1000103 | drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable | drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.265 by commit 6d9f8ba28f3747ca0f910a363e46f1114856dbbe, it was introduced in version v4.3 by commit 5c8290284402bf7d2c12269402b3177b899c78b7. For more details please see the references link. | null | 2022-02-19T05:01:17.250791Z | 2022-02-18T21:35:31.776110Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5c8290284402bf7d2c12269402b3177b899c78b7'} |
Linux | GSD-2022-1002094 | drm/amd/display: Add affected crtcs to atomic state for dsc mst unplug | drm/amd/display: Add affected crtcs to atomic state for dsc mst unplug
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 9c384e1afa552c94b5684036d5a26fa6dc11c37e, it was introduced in version v5.6 by commit 44be939ff7ac5858f0dbd8a2a4af1fe198e14db1. For more details please see the references link. | null | 2022-04-25T06:55:23.542411Z | 2022-04-24T22:10:24.880071Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/44be939ff7ac5858f0dbd8a2a4af1fe198e14db1'} |
Linux | GSD-2022-1000553 | net_sched: add __rcu annotation to netdev->qdisc | net_sched: add __rcu annotation to netdev->qdisc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit 18b57afacdc8dc1fa0d1a3c3a15a1d5a599159fa, it was introduced in version v5.1 by commit 470502de5bdb1ed0def643a4458593a40b8f6b66. For more details please see the references link. | null | 2022-03-07T01:45:53.934408Z | 2022-02-27T03:23:12.067081Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/470502de5bdb1ed0def643a4458593a40b8f6b66'} |
Linux | GSD-2021-1002242 | usb: musb: tusb6010: check return value after calling platform_get_resource() | usb: musb: tusb6010: check return value after calling platform_get_resource()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.256 by commit 28be095eb612a489705d38c210afaf1103c5f4f8. For more details please see the references link. | null | 2021-12-19T22:27:07.557894Z | 2021-11-29T02:34:55.491156Z | null | null | null | null | null |
Linux | GSD-2021-1001897 | drm/msm/a3xx: fix error handling in a3xx_gpu_init() | drm/msm/a3xx: fix error handling in a3xx_gpu_init()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit d59e44e7821a8f2bb6f2e846b9167397a5f01608, it was introduced in version v5.11 by commit 5785dd7a8ef0de8049f40a1a109de6a1bf17b479. For more details please see the references link. | null | 2021-12-20T00:16:15.474641Z | 2021-10-28T13:54:38.087946Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5785dd7a8ef0de8049f40a1a109de6a1bf17b479'} |
Linux | GSD-2021-1000785 | x86/kvm: Teardown PV features on boot CPU as well | x86/kvm: Teardown PV features on boot CPU as well
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.43 by commit 38b858da1c58ad46519a257764e059e663b59ff2, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T23:15:00.963258Z | 2021-06-25T00:05:30.485785Z | null | null | null | null | null |
Linux | GSD-2022-1000800 | iio: adc: men_z188_adc: Fix a resource leak in an error handling path | iio: adc: men_z188_adc: Fix a resource leak in an error handling path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.26 by commit fe73477802981bd0d0d70f2b22f109bcca801bdb, it was introduced in version v3.15 by commit 74aeac4da66fbfa246edbfc849002eac9b5af9ca. For more details please see the references link. | null | 2022-03-18T03:02:07.731482Z | 2022-03-18T00:19:15.028972Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/74aeac4da66fbfa246edbfc849002eac9b5af9ca'} |
Linux | GSD-2022-1001712 | mt76: fix monitor mode crash with sdio driver | mt76: fix monitor mode crash with sdio driver
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 13946d5a68efd11dd6af2f6ef4c908f6b00158a5. For more details please see the references link. | null | 2022-04-25T03:28:19.584505Z | 2022-04-24T21:37:00.938761Z | null | null | null | null | null |
Linux | GSD-2021-1002612 | igbvf: fix double free in `igbvf_probe` | igbvf: fix double free in `igbvf_probe`
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.296 by commit ffe1695b678729edec04037e691007900a2b2beb, it was introduced in version v2.6.30 by commit d4e0fe01a38a073568aee541a0247fe734095979. For more details please see the references link. | null | 2022-01-11T05:58:15.488098Z | 2021-12-27T05:27:12.191351Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d4e0fe01a38a073568aee541a0247fe734095979'} |
Linux | GSD-2022-1001342 | gpio: Restrict usage of GPIO chip irq members before initialization | gpio: Restrict usage of GPIO chip irq members before initialization
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 2c1fa3614795e2b24da1ba95de0b27b8f6ea4537. For more details please see the references link. | null | 2022-04-25T04:53:45.735870Z | 2022-04-24T21:06:06.120793Z | null | null | null | null | null |
Linux | GSD-2022-1000945 | mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work | mac80211_hwsim: initialize ieee80211_tx_info at hw_scan_work
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.305 by commit f2e57587aaf971aa80fd801152ccc33e8343aef3. For more details please see the references link. | null | 2022-03-18T02:55:14.738788Z | 2022-03-18T00:35:03.848880Z | null | null | null | null | null |
Linux | GSD-2022-1001657 | macvlan: Fix leaking skb in source mode with nodst option | macvlan: Fix leaking skb in source mode with nodst option
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.35 by commit 8f79ce226ad2e9b2ec598de2b9560863b7549d1b, it was introduced in version v5.13 by commit 427f0c8c194b22edcafef1b0a42995ddc5c2227d. For more details please see the references link. | null | 2022-04-25T06:53:04.139013Z | 2022-04-24T21:32:08.525153Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/427f0c8c194b22edcafef1b0a42995ddc5c2227d'} |
Linux | GSD-2021-1002307 | btrfs: fix memory ordering between normal and ordered work functions | btrfs: fix memory ordering between normal and ordered work functions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit 47e6f9f69153247109042010f3a77579e9dc61ff, it was introduced in version v3.15 by commit 08a9ff3264181986d1d692a4e6fce3669700c9f8. For more details please see the references link. | null | 2021-12-20T01:33:45.895280Z | 2021-11-29T02:38:05.690414Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/08a9ff3264181986d1d692a4e6fce3669700c9f8'} |
Linux | GSD-2021-1000290 | mtd: require write permissions for locking and badblock ioctls | mtd: require write permissions for locking and badblock ioctls
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit a08799d3e8c8088640956237c183f83463c39668, it was introduced in version v5.9 by commit f7e6b19bc76471ba03725fe58e0c218a3d6266c3. For more details please see the references link. | null | 2021-12-19T22:30:18.341093Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f7e6b19bc76471ba03725fe58e0c218a3d6266c3'} |
Linux | GSD-2022-1001207 | RDMA/irdma: Prevent some integer underflows | RDMA/irdma: Prevent some integer underflows
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 7340c3675d7ac946f4019b84cd7c64ed542dfe4c, it was introduced in version v5.14 by commit 3f49d684256963d3f27dfb9d9ff228e2255be78d. For more details please see the references link. | null | 2022-04-25T04:42:58.855578Z | 2022-04-24T20:53:43.363530Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f49d684256963d3f27dfb9d9ff228e2255be78d'} |
Linux | GSD-2021-1001878 | audit: fix possible null-pointer dereference in audit_filter_rules | audit: fix possible null-pointer dereference in audit_filter_rules
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit 4e9e46a700201b4c85081fd478c99c692a9aaa0d, it was introduced in version v5.3 by commit bf361231c295d92a28ca283ea713f56e93e55796. For more details please see the references link. | null | 2021-12-19T23:59:12.607645Z | 2021-10-28T13:53:35.216869Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf361231c295d92a28ca283ea713f56e93e55796'} |
Linux | GSD-2021-1002757 | btrfs: fix memory leak in __add_inode_ref() | btrfs: fix memory leak in __add_inode_ref()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit 493ff661d434d6bdf02e3a21adae04d7a0b4265d, it was introduced in version v5.5 by commit d3316c8233bb05e0dd855d30aac347bb8ad76ee4. For more details please see the references link. | null | 2022-01-11T05:54:13.275353Z | 2021-12-27T05:49:05.675587Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d3316c8233bb05e0dd855d30aac347bb8ad76ee4'} |
Linux | GSD-2022-1000046 | usb: mtu3: fix list_head check warning | usb: mtu3: fix list_head check warning
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.90 by commit 3b6efe0b7ba03cc2acf0694b46d6ff33c5b4c295, it was introduced in version v5.2 by commit 83374e035b6286731c5aa617844c7b724294c2a7. For more details please see the references link. | null | 2022-01-11T05:47:48.028238Z | 2022-01-10T19:51:41.426096Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/83374e035b6286731c5aa617844c7b724294c2a7'} |
Linux | GSD-2021-1001481 | tty: serial: 8250: serial_cs: Fix a memory leak in error handling path | tty: serial: 8250: serial_cs: Fix a memory leak in error handling path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.276 by commit b5a2799cd62ed30c81b22c23028d9ee374e2138c. For more details please see the references link. | null | 2021-12-19T22:21:26.261231Z | 2021-08-03T02:54:14.972141Z | null | null | null | null | null |
Linux | GSD-2022-1000416 | powerpc/fixmap: Fix VM debug warning on unmap | powerpc/fixmap: Fix VM debug warning on unmap
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit 43ae0ccc4d2722b833fb59b905af129428e06d03. For more details please see the references link. | null | 2022-03-07T01:41:37.167422Z | 2022-02-27T03:04:04.738007Z | null | null | null | null | null |
Linux | GSD-2021-1002184 | kunit: fix reference count leak in kfree_at_end | kunit: fix reference count leak in kfree_at_end
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit f62314b1ced25c58b86e044fc951cd6a1ea234cf. For more details please see the references link. | null | 2021-12-20T02:51:59.304025Z | 2021-11-14T15:23:45.488700Z | null | null | null | null | null |
Linux | GSD-2021-1000443 | userfaultfd: release page in error path to avoid BUG_ON | userfaultfd: release page in error path to avoid BUG_ON
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.191 by commit 07c9b834c97d0fa3402fb7f3f3b32df370a6ff1f, it was introduced in version v4.11 by commit cb658a453b9327ce96ce5222c24d162b5b65b564. For more details please see the references link. | null | 2021-12-20T00:59:14.562407Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cb658a453b9327ce96ce5222c24d162b5b65b564'} |
Linux | GSD-2021-1000013 | kasan: remove redundant config option | kasan: remove redundant config option
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.16 by commit 86463b30e4ef70c4551a94cb68b5a667c2e00846, it was introduced in version v5.11.7 by commit 8f105cac6c48f62147a7a15db51ebbe7b4c27377. For more details please see the references link. | null | 2021-12-20T01:00:02.469025Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8f105cac6c48f62147a7a15db51ebbe7b4c27377'} |
Linux | GSD-2022-1001084 | drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj | drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit bc2d5c0775c839e2b072884f4ee6a93ba410f107. For more details please see the references link. | null | 2022-04-25T06:35:43.342087Z | 2022-04-24T20:44:06.092819Z | null | null | null | null | null |
Linux | GSD-2021-1001252 | cifs: prevent NULL deref in cifs_compose_mount_options() | cifs: prevent NULL deref in cifs_compose_mount_options()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.53 by commit e58c162789becede894d3e94c0ce6695a2ef5796. For more details please see the references link. | null | 2021-12-20T00:03:34.717847Z | 2021-08-03T01:49:08.056673Z | null | null | null | null | null |
Linux | GSD-2022-1002352 | drm/tegra: Fix reference leak in tegra_dsi_ganged_probe | drm/tegra: Fix reference leak in tegra_dsi_ganged_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 2d6ae8b747fe55f54de4a4441d636974aa53f56a, it was introduced in version v3.19 by commit e94236cde4d519cdecd45e2435defba33abdc99f. For more details please see the references link. | null | 2022-04-25T05:29:59.129873Z | 2022-04-24T22:37:22.819619Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e94236cde4d519cdecd45e2435defba33abdc99f'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.