ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2021-1000341 | net: Only allow init netns to set default tcp cong to a restricted algo | net: Only allow init netns to set default tcp cong to a restricted algo
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 6c1ea8bee75df8fe2184a50fcd0f70bf82986f42, it was introduced in version v4.15 by commit 6670e152447732ba90626f36dfc015a13fbf150e. For more details please see the references link. | null | 2021-12-19T22:24:05.949933Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6670e152447732ba90626f36dfc015a13fbf150e'} |
Linux | GSD-2021-1001803 | can: peak_pci: peak_pci_remove(): fix UAF | can: peak_pci: peak_pci_remove(): fix UAF
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.214 by commit adbda14730aacce41c0d3596415aa39ad63eafd9, it was introduced in version v3.4 by commit e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd. For more details please see the references link. | null | 2021-12-19T23:02:48.092303Z | 2021-10-28T13:49:44.913753Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd'} |
Linux | GSD-2021-1000711 | NFC: nci: fix memory leak in nci_allocate_device | NFC: nci: fix memory leak in nci_allocate_device
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.271 by commit 448a1cb12977f52142e6feb12022c59662d88dc1, it was introduced in version v4.0 by commit 11f54f228643d0248ec00ce8c9fb8d872f87e7b8. For more details please see the references link. | null | 2021-12-20T01:31:17.748468Z | 2021-06-04T20:07:51.958538Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/11f54f228643d0248ec00ce8c9fb8d872f87e7b8'} |
Linux | GSD-2022-1000894 | xen/netfront: react properly to failing gnttab_end_foreign_access_ref() | xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.234 by commit c307029d811e03546d18d0e512fe295b3103b8e5. For more details please see the references link. | null | 2022-03-18T02:55:57.394574Z | 2022-03-18T00:29:05.159515Z | null | null | null | null | null |
Linux | GSD-2022-1001786 | media: imx-jpeg: Prevent decoding NV12M jpegs into single-planar buffers | media: imx-jpeg: Prevent decoding NV12M jpegs into single-planar buffers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit eff76b180751e5e55c872d17755680c3b83ba9ab. For more details please see the references link. | null | 2022-04-25T04:25:53.575962Z | 2022-04-24T21:42:17.947954Z | null | null | null | null | null |
Linux | GSD-2022-1002000 | PCI: endpoint: Fix misused goto label | PCI: endpoint: Fix misused goto label
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit 7c657c0694ff690e361a13ce41c36b9dfb433ec8. For more details please see the references link. | null | 2022-04-25T06:45:54.814740Z | 2022-04-24T22:02:04.389727Z | null | null | null | null | null |
Linux | GSD-2021-1001550 | drm/nouveau/debugfs: fix file release memory leak | drm/nouveau/debugfs: fix file release memory leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.211 by commit 1508b09945bde393326a9dab73b1fc35f672d771, it was introduced in version v4.5 by commit 6e9fc177399f08446293fec7607913fdbc95e191. For more details please see the references link. | null | 2021-12-19T23:59:49.216074Z | 2021-10-19T16:23:20.511943Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6e9fc177399f08446293fec7607913fdbc95e191'} |
Linux | GSD-2022-1002450 | mm/pages_alloc.c: don't create ZONE_MOVABLE beyond the end of a node | mm/pages_alloc.c: don't create ZONE_MOVABLE beyond the end of a node
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 4d6d259e5fa3647b5bc41a17276464ab8c2e1a44, it was introduced in version v2.6.23 by commit 2a1e274acf0b1c192face19a4be7c12d4503eaaf. For more details please see the references link. | null | 2022-04-25T05:24:55.979694Z | 2022-04-24T22:49:10.429940Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2a1e274acf0b1c192face19a4be7c12d4503eaaf'} |
Linux | GSD-2021-1001100 | nilfs2: fix memory leak in nilfs_sysfs_delete_device_group | nilfs2: fix memory leak in nilfs_sysfs_delete_device_group
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.274 by commit 46c38e258b6767e034c7142e8528d033da11107f, it was introduced in version v3.17 by commit da7141fb78db915680616e15677539fc8140cf53. For more details please see the references link. | null | 2021-12-19T22:23:54.399999Z | 2021-07-08T01:56:20.054141Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/da7141fb78db915680616e15677539fc8140cf53'} |
Linux | GSD-2022-1000197 | drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable | drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.96 by commit 79c0b5287ded74f4eacde4dfd8aa0a76cbd853b5, it was introduced in version v4.3 by commit 5c8290284402bf7d2c12269402b3177b899c78b7. For more details please see the references link. | null | 2022-02-19T09:49:07.811807Z | 2022-02-18T21:53:37.977286Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5c8290284402bf7d2c12269402b3177b899c78b7'} |
Linux | GSD-2021-1001415 | watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff() | watchdog: sc520_wdt: Fix possible use-after-free in wdt_turnoff()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.240 by commit 2aef07017fae21c3d8acea9656b10e3b9c0f1e04. For more details please see the references link. | null | 2021-12-19T23:04:51.695552Z | 2021-08-03T02:34:01.643437Z | null | null | null | null | null |
Linux | GSD-2022-1000482 | xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create | xprtrdma: fix pointer derefs in error cases of rpcrdma_ep_create
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit 9921c866dc369577c3ebb9adf2383b01b58c18de. For more details please see the references link. | null | 2022-03-07T01:48:26.001441Z | 2022-02-27T03:13:02.023006Z | null | null | null | null | null |
Linux | GSD-2022-1000178 | tipc: improve size validations for received domain records | tipc: improve size validations for received domain records
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.179 by commit d692e3406e052dbf9f6d9da0cba36cb763272529, it was introduced in version v4.8 by commit 35c55c9877f8de0ab129fa1a309271d0ecc868b9. For more details please see the references link. | null | 2022-02-19T15:45:17.515569Z | 2022-02-18T21:51:30.529274Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/35c55c9877f8de0ab129fa1a309271d0ecc868b9'} |
Linux | GSD-2022-1002145 | tpm: fix reference counting for struct tpm_chip | tpm: fix reference counting for struct tpm_chip
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 290e05f346d1829e849662c97e42d5ad984f5258, it was introduced in version v4.12 by commit fdc915f7f71939ad5a3dda3389b8d2d7a7c5ee66. For more details please see the references link. | null | 2022-04-25T04:59:04.293240Z | 2022-04-24T22:15:59.058207Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fdc915f7f71939ad5a3dda3389b8d2d7a7c5ee66'} |
Linux | GSD-2021-1001045 | scsi: core: Fix error handling of scsi_host_alloc() | scsi: core: Fix error handling of scsi_host_alloc()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.11 by commit 45d83db4728127944b237c0c8248987df9d478e7. For more details please see the references link. | null | 2021-12-20T00:53:38.155811Z | 2021-06-30T00:36:02.660788Z | null | null | null | null | null |
Linux | GSD-2022-1000528 | mm: vmscan: remove deadlock due to throttling failing to make progress | mm: vmscan: remove deadlock due to throttling failing to make progress
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 3980cff6349687f73d5109f156f23cb261c24164, it was introduced in version v5.16 by commit d818fca1cac31b1fc9301bda83e195a46fb4ebaa. For more details please see the references link. | null | 2022-03-07T01:34:05.283468Z | 2022-02-27T03:19:42.344890Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d818fca1cac31b1fc9301bda83e195a46fb4ebaa'} |
Linux | GSD-2022-1002515 | llc: only change llc->dev when bind() succeeds | llc: only change llc->dev when bind() succeeds
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.309 by commit e82b631e22920bffbd7e4a15c14a823d36d45233, it was introduced in version v4.9.309 by commit 0a7aad979bfb43c4a78d33a5f356caf4ceb28bca. For more details please see the references link. | null | 2022-04-24T22:57:13.535117Z | 2022-04-24T22:57:13.535117Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0a7aad979bfb43c4a78d33a5f356caf4ceb28bca'} |
Linux | GSD-2021-1002239 | tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc | tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.256 by commit 4c1623651a0936ee197859824cdae6ebbd04d3ed. For more details please see the references link. | null | 2021-12-20T00:45:01.984551Z | 2021-11-29T02:34:47.040376Z | null | null | null | null | null |
Linux | GSD-2021-1000204 | i40e: Fix use-after-free in i40e_client_subtask() | i40e: Fix use-after-free in i40e_client_subtask()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.5 by commit 1fd5d262e7442192ac7611ff1597a36c5b044323, it was introduced in version v4.16 by commit 7b0b1a6d0ac983ce1928432285d0222d4fb7c38b. For more details please see the references link. | null | 2021-12-19T23:43:44.274464Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7b0b1a6d0ac983ce1928432285d0222d4fb7c38b'} |
Linux | GSD-2022-1001293 | block: fix rq-qos breakage from skipping rq_qos_done_bio() | block: fix rq-qos breakage from skipping rq_qos_done_bio()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 09737db4c891eba25e6f6383a7c38afd4acc883f, it was introduced in version v5.15 by commit a647a524a46736786c95cdb553a070322ca096e3. For more details please see the references link. | null | 2022-04-25T02:49:31.563384Z | 2022-04-24T21:01:52.884713Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a647a524a46736786c95cdb553a070322ca096e3'} |
Linux | GSD-2022-1001769 | KVM: x86/mmu: do compare-and-exchange of gPTE via the user address | KVM: x86/mmu: do compare-and-exchange of gPTE via the user address
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 8771d9673e0bdb7148299f3c074667124bde6dff, it was introduced in version v5.2 by commit bd53cb35a3e9adb73a834a36586e9ad80e877767. For more details please see the references link. | null | 2022-04-25T03:56:13.837640Z | 2022-04-24T21:41:18.313283Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bd53cb35a3e9adb73a834a36586e9ad80e877767'} |
Linux | GSD-2021-1001946 | scsi: core: Put LLD module refcnt after SCSI device is released | scsi: core: Put LLD module refcnt after SCSI device is released
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.290 by commit 8e4814a461787e15a31d322d9efbe0d4f6822428. For more details please see the references link. | null | 2021-12-20T01:17:41.490462Z | 2021-11-14T15:12:55.993733Z | null | null | null | null | null |
Linux | GSD-2021-1002669 | net: netlink: af_netlink: Prevent empty skb by adding a check on len. | net: netlink: af_netlink: Prevent empty skb by adding a check on len.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.167 by commit c0315e93552e0d840e9edc6abd71c7db82ec8f51. For more details please see the references link. | null | 2022-01-11T06:43:26.184284Z | 2021-12-27T05:35:41.121082Z | null | null | null | null | null |
Linux | GSD-2021-1000654 | net: dsa: fix a crash if ->get_sset_count() fails | net: dsa: fix a crash if ->get_sset_count() fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.193 by commit 0f2cb08c57edefb0e7b5045e0e3e9980a3d3aa37, it was introduced in version v4.7 by commit badf3ada60ab8f76f9488dc8f5c0c57f70682f5a. For more details please see the references link. | null | 2021-12-20T00:48:13.090470Z | 2021-06-04T19:55:30.285863Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/badf3ada60ab8f76f9488dc8f5c0c57f70682f5a'} |
Linux | GSD-2022-1001339 | mm/sparsemem: fix 'mem_section' will never be NULL gcc 12 warning | mm/sparsemem: fix 'mem_section' will never be NULL gcc 12 warning
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 3d0089f08712392e5340ad5cffbdb60baefff72c, it was introduced in version v2.6.14 by commit 3e347261a80b57df792ab9464b5f0ed59add53a8. For more details please see the references link. | null | 2022-04-25T06:16:23.601430Z | 2022-04-24T21:05:53.662710Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3e347261a80b57df792ab9464b5f0ed59add53a8'} |
Linux | GSD-2021-1002393 | net: ethernet: dec: tulip: de4x5: fix possible array overflows in type3_infoblock() | net: ethernet: dec: tulip: de4x5: fix possible array overflows in type3_infoblock()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.257 by commit ae3c30ca1894ead38e39576289e5a8346621450f. For more details please see the references link. | null | 2021-12-19T23:44:29.242162Z | 2021-12-19T19:35:22.740687Z | null | null | null | null | null |
Linux | GSD-2021-1001696 | bpf: Fix integer overflow in prealloc_elems_and_freelist() | bpf: Fix integer overflow in prealloc_elems_and_freelist()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.12 by commit 3a1ac1e368bedae2777d9a7cfdc65df4859f7e71, it was introduced in version v4.6 by commit 557c0c6e7df8e14a46bd7560d193fa5bbc00a858. For more details please see the references link. | null | 2021-12-20T01:06:09.815113Z | 2021-10-19T16:32:19.413505Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/557c0c6e7df8e14a46bd7560d193fa5bbc00a858'} |
Linux | GSD-2021-1000984 | ethtool: strset: fix message length calculation | ethtool: strset: fix message length calculation
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.46 by commit fb3a948143688e14e2cfd2a2812877923d0e5e92, it was introduced in version v5.6 by commit 71921690f9745fef60a2bad425f30adf8cdc9da0. For more details please see the references link. | null | 2021-12-20T01:18:49.325746Z | 2021-06-30T00:31:22.284748Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/71921690f9745fef60a2bad425f30adf8cdc9da0'} |
Linux | GSD-2022-1000601 | btrfs: fix too long loop when defragging a 1 byte file | btrfs: fix too long loop when defragging a 1 byte file
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.5 by commit bac3babdabdc53f8f47b513cff805b3b98c467bb, it was introduced in version v5.16 by commit 7b508037d4cac3bcde7187b70170caf81cae3aad. For more details please see the references link. | null | 2022-03-07T01:38:42.895698Z | 2022-02-27T03:29:22.231406Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7b508037d4cac3bcde7187b70170caf81cae3aad'} |
Linux | GSD-2022-1001913 | cifs: fix NULL ptr dereference in smb2_ioctl_query_info() | cifs: fix NULL ptr dereference in smb2_ioctl_query_info()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 39a4bf7d1a23dd172526c2fb0db480c5d5c63bd6. For more details please see the references link. | null | 2022-04-25T06:30:41.322146Z | 2022-04-24T21:54:05.395108Z | null | null | null | null | null |
Linux | GSD-2021-1002813 | f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr() | f2fs: fix to do sanity check on last xattr entry in __f2fs_setxattr()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.89 by commit fffb6581a23add416239dfcf7e7f3980c6b913da. For more details please see the references link. | null | 2022-01-11T05:48:44.299471Z | 2021-12-30T02:44:33.868618Z | null | null | null | null | null |
Linux | GSD-2022-1000251 | USB: core: Fix hang in usb_kill_urb by adding memory barriers | USB: core: Fix hang in usb_kill_urb by adding memory barriers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.19 by commit 9340226388c66a7e090ebb00e91ed64a753b6c26. For more details please see the references link. | null | 2022-02-19T04:28:16.969720Z | 2022-02-18T22:01:26.571282Z | null | null | null | null | null |
Linux | GSD-2021-1002540 | net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk() | net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.6 by commit bb851d0fb02547d03cd40106b5f2391c4fed6ed1, it was introduced in version v4.18 by commit cb9d43f6775457cac75544bc4197f26ac2b6f294. For more details please see the references link. | null | 2021-12-19T23:33:01.000650Z | 2021-12-19T19:41:51.852246Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cb9d43f6775457cac75544bc4197f26ac2b6f294'} |
Linux | GSD-2021-1000087 | bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue | bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.3 by commit ed541cff35cbdb695f0c98ef506dd7218883fc07, it was introduced in version v5.11 by commit 8f70397876872789b2a5deba804eb6216fb5deb7. For more details please see the references link. | null | 2021-12-19T22:17:09.651607Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8f70397876872789b2a5deba804eb6216fb5deb7'} |
Linux | GSD-2022-1001010 | iommu/omap: Fix regression in probe for NULL pointer dereference | iommu/omap: Fix regression in probe for NULL pointer dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 1d89f2b9eadbcf3ce93c6d7238f68299a1f84968, it was introduced in version v5.8 by commit 6785eb9105e3363aa51408c700a55e8b5f88fcf6. For more details please see the references link. | null | 2022-04-25T03:14:45.225948Z | 2022-04-24T20:39:23.131120Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6785eb9105e3363aa51408c700a55e8b5f88fcf6'} |
Linux | GSD-2021-1002110 | mm, slub: fix mismatch between reconstructed freelist depth and cnt | mm, slub: fix mismatch between reconstructed freelist depth and cnt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit ec93d4a439c3a619b6682ba5778dc885d1460d3e, it was introduced in version v4.17 by commit c3895391df385c6628638f014c87e16f5e2efd45. For more details please see the references link. | null | 2021-12-19T22:27:49.776745Z | 2021-11-14T15:20:18.986936Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c3895391df385c6628638f014c87e16f5e2efd45'} |
Linux | GSD-2022-1001440 | ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock() | ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit e09fa5318d51f522e1af4fbaf8f74999355980c8, it was introduced in version v2.6.27 by commit 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d. For more details please see the references link. | null | 2022-04-25T06:57:57.449770Z | 2022-04-24T21:13:31.873554Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d'} |
Linux | GSD-2022-1001155 | ext4: fix ext4_mb_mark_bb() with flex_bg with fast_commit | ext4: fix ext4_mb_mark_bb() with flex_bg with fast_commit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 803fb0e8240cc16585a5c9df76add1dfaa781773. For more details please see the references link. | null | 2022-04-25T04:13:37.538587Z | 2022-04-24T20:49:17.983298Z | null | null | null | null | null |
Linux | GSD-2021-1000438 | crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init | crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.119 by commit 05ec8192ee4bfdf2a8894a68350dac9f1a155fa6, it was introduced in version v4.7 by commit 25c6ffb249f612c56a48ce48a3887adf57b8f4bd. For more details please see the references link. | null | 2021-12-20T00:44:57.532394Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/25c6ffb249f612c56a48ce48a3887adf57b8f4bd'} |
Linux | GSD-2021-1002405 | iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove | iio: accel: kxcjk-1013: Fix possible memory leak in probe and remove
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.258 by commit 3899700ddacbf7aaafadf44464fff3ff0d4e3307, it was introduced in version v4.2 by commit a25691c1f9674090fb66586cf4c5d60d3efdf339. For more details please see the references link. | null | 2021-12-19T23:44:51.777139Z | 2021-12-19T19:35:52.153243Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a25691c1f9674090fb66586cf4c5d60d3efdf339'} |
Linux | GSD-2021-1000592 | i2c: i801: Don't generate an interrupt on bus reset | i2c: i801: Don't generate an interrupt on bus reset
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.42 by commit b523feb7e8e44652f92f3babb953a976e7ccbbef, it was introduced in version v3.6 by commit 636752bcb5177a301d0266270661581de8624828. For more details please see the references link. | null | 2021-12-19T23:47:13.737649Z | 2021-06-04T19:43:48.325713Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/636752bcb5177a301d0266270661581de8624828'} |
Linux | GSD-2022-1001505 | kernel/resource: fix kfree() of bootmem memory again | kernel/resource: fix kfree() of bootmem memory again
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit d7faa04a44a0c37ac3d222fa8e0bdcbfcee9c0c8, it was introduced in version v3.10 by commit ebff7d8f270d045338d9f4796014f4db429a17f9. For more details please see the references link. | null | 2022-04-25T06:13:46.371198Z | 2022-04-24T21:18:15.831338Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ebff7d8f270d045338d9f4796014f4db429a17f9'} |
Linux | GSD-2021-1000068 | NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds | NFS: fs_context: validate UDP retrans to prevent shift out-of-bounds
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.3 by commit 3d0163821c035040a46d816a42c0780f0f0a30a8, it was introduced in version v5.6 by commit 9954bf92c0cddd50a2a470be302e1c1ffdf21d42. For more details please see the references link. | null | 2021-12-20T01:03:28.619268Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9954bf92c0cddd50a2a470be302e1c1ffdf21d42'} |
Linux | GSD-2021-1002055 | net: mdiobus: Fix memory leak in __mdiobus_register | net: mdiobus: Fix memory leak in __mdiobus_register
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit 3a0dc2e35a5d6546b1db87fe985582dadc64fe7b. For more details please see the references link. | null | 2021-12-19T23:29:34.065833Z | 2021-11-14T15:17:47.092441Z | null | null | null | null | null |
Linux | GSD-2022-1000744 | gso: do not skip outer ip header in case of ipip and net_failover | gso: do not skip outer ip header in case of ipip and net_failover
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.12 by commit a739963f43269297c3f438b776194542e2a97499, it was introduced in version v3.13 by commit cb32f511a70be8967ac9025cf49c44324ced9a39. For more details please see the references link. | null | 2022-03-18T02:57:31.063763Z | 2022-03-18T00:14:54.245466Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cb32f511a70be8967ac9025cf49c44324ced9a39'} |
Linux | GSD-2022-1001856 | drm/amd/display: Add affected crtcs to atomic state for dsc mst unplug | drm/amd/display: Add affected crtcs to atomic state for dsc mst unplug
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 0f47edc22c2b7e4c1903d74c3992f09db9453d11, it was introduced in version v5.6 by commit 44be939ff7ac5858f0dbd8a2a4af1fe198e14db1. For more details please see the references link. | null | 2022-04-25T06:37:50.468146Z | 2022-04-24T21:48:42.370878Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/44be939ff7ac5858f0dbd8a2a4af1fe198e14db1'} |
Linux | GSD-2022-1002283 | llc: only change llc->dev when bind() succeeds | llc: only change llc->dev when bind() succeeds
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.188 by commit 993c23880bcecf5e74090c9288ea680b5eb29005, it was introduced in version v5.4.188 by commit 572f9a0d3f3feb8bd3422e88ad71882bc034b3ff. For more details please see the references link. | null | 2022-04-24T22:30:04.824641Z | 2022-04-24T22:30:04.824641Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/572f9a0d3f3feb8bd3422e88ad71882bc034b3ff'} |
Linux | GSD-2021-1001229 | ext4: fix memory leak in ext4_fill_super | ext4: fix memory leak in ext4_fill_super
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13 by commit afd09b617db3786b6ef3dc43e28fe728cfea84df, it was introduced in version v2.6.25 by commit ce40733ce93de402ed629762f0e912d9af187cef. For more details please see the references link. | null | 2021-12-19T22:40:44.578049Z | 2021-08-03T01:42:49.646372Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ce40733ce93de402ed629762f0e912d9af187cef'} |
Linux | GSD-2021-1001383 | scsi: iscsi: Fix conn use after free during resets | scsi: iscsi: Fix conn use after free during resets
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.198 by commit bf20d85a88384574fabb3d53ad62a8af57e7ab11. For more details please see the references link. | null | 2021-12-19T23:32:38.351650Z | 2021-08-03T02:25:32.389776Z | null | null | null | null | null |
Linux | GSD-2022-1002329 | ubifs: rename_whiteout: Fix double free for whiteout_ui->data | ubifs: rename_whiteout: Fix double free for whiteout_ui->data
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 2b3236ecf96db7af5836e1366ce39ace8ce832fa, it was introduced in version v4.9 by commit 9e0a1fff8db56eaaebb74b4a3ef65f86811c4798. For more details please see the references link. | null | 2022-04-25T06:24:19.043336Z | 2022-04-24T22:35:08.987917Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9e0a1fff8db56eaaebb74b4a3ef65f86811c4798'} |
Linux | GSD-2022-1000314 | usb: f_fs: Fix use-after-free for epfile | usb: f_fs: Fix use-after-free for epfile
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.230 by commit cfe5f6fd335d882bcc829a1c8a7d462a455c626e, it was introduced in version v4.9 by commit a9e6f83c2df199187a5248f824f31b6787ae23ae. For more details please see the references link. | null | 2022-03-07T01:37:44.023413Z | 2022-02-27T02:49:44.753075Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a9e6f83c2df199187a5248f824f31b6787ae23ae'} |
Linux | GSD-2021-1001679 | drm/amdgpu: fix gart.bo pin_count leak | drm/amdgpu: fix gart.bo pin_count leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.13 by commit 18d1c5ea3798ba42cfa0f8b2264d873463facb03. For more details please see the references link. | null | 2021-12-20T01:25:59.797389Z | 2021-10-19T16:31:29.041614Z | null | null | null | null | null |
Linux | GSD-2021-1001157 | bonding: fix null dereference in bond_ipsec_add_sa() | bonding: fix null dereference in bond_ipsec_add_sa()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.6 by commit 9863701fa0ecd2abfadb27b0e7a9b0fe1c9d02b6, it was introduced in version v5.9 by commit 18cb261afd7bf50134e5ccacc5ec91ea16efadd4. For more details please see the references link. | null | 2021-12-19T22:11:37.938619Z | 2021-08-03T01:31:16.406701Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/18cb261afd7bf50134e5ccacc5ec91ea16efadd4'} |
Linux | GSD-2022-1002407 | netlabel: fix out-of-bounds memory accesses | netlabel: fix out-of-bounds memory accesses
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.106 by commit fcfe700acdc1c72eab231300e82b962bac2b2b2c, it was introduced in version v2.6.19 by commit 446fda4f26822b2d42ab3396aafcedf38a9ff2b6. For more details please see the references link. | null | 2022-04-25T05:48:43.638323Z | 2022-04-24T22:44:12.218610Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/446fda4f26822b2d42ab3396aafcedf38a9ff2b6'} |
Linux | GSD-2021-1001507 | bpf: Fix integer overflow in prealloc_elems_and_freelist() | bpf: Fix integer overflow in prealloc_elems_and_freelist()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.287 by commit 4fd6663eb01bc3c73143cd27fefd7b8351bc6aa6, it was introduced in version v4.6 by commit 557c0c6e7df8e14a46bd7560d193fa5bbc00a858. For more details please see the references link. | null | 2021-12-19T22:21:32.423730Z | 2021-10-19T16:21:21.930736Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/557c0c6e7df8e14a46bd7560d193fa5bbc00a858'} |
Linux | GSD-2022-1000590 | ASoC: codecs: wcd938x: fix incorrect used of portid | ASoC: codecs: wcd938x: fix incorrect used of portid
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.22 by commit aa7152f9f117b3e66b3c0d4158ca4c6d46ab229f, it was introduced in version v5.14 by commit e8ba1e05bdc016700c85fad559a812c2e795442f. For more details please see the references link. | null | 2022-03-07T01:49:38.539126Z | 2022-02-27T03:28:07.671297Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e8ba1e05bdc016700c85fad559a812c2e795442f'} |
Linux | GSD-2022-1002057 | gcc-plugins/stackleak: Exactly match strings instead of prefixes | gcc-plugins/stackleak: Exactly match strings instead of prefixes
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 9d1d8e5e42941d3a51f7cde3bee93c2b47838aaa. For more details please see the references link. | null | 2022-04-25T06:03:15.273150Z | 2022-04-24T22:06:14.155530Z | null | null | null | null | null |
Linux | GSD-2021-1001854 | drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read | drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.75 by commit a7b45024f66f9ec769e8dbb1a51ae83cd05929c7, it was introduced in version v5.7 by commit e11f5bd8228fc3760c221f940b9f6365dbf3e7ed. For more details please see the references link. | null | 2021-12-20T00:43:02.846654Z | 2021-10-28T13:52:20.258305Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e11f5bd8228fc3760c221f940b9f6365dbf3e7ed'} |
Linux | GSD-2021-1000746 | netfilter: nft_ct: skip expectations for confirmed conntrack | netfilter: nft_ct: skip expectations for confirmed conntrack
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.125 by commit da8d31e80ff425f5a65dab7060d5c4aba749e562, it was introduced in version v5.3 by commit 857b46027d6f91150797295752581b7155b9d0e1. For more details please see the references link. | null | 2021-12-20T01:33:59.838122Z | 2021-06-25T00:02:05.936453Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/857b46027d6f91150797295752581b7155b9d0e1'} |
Linux | GSD-2021-1002281 | NFC: reorder the logic in nfc_{un,}register_device | NFC: reorder the logic in nfc_{un,}register_device
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.82 by commit 73a0d12114b4bc1a9def79a623264754b9df698e, it was introduced in version v3.10 by commit be055b2f89b5842f41363b5655a33dffb51a8294. For more details please see the references link. | null | 2021-12-19T23:58:52.996947Z | 2021-11-29T02:36:52.998851Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/be055b2f89b5842f41363b5655a33dffb51a8294'} |
Linux | GSD-2021-1000316 | f2fs: compress: fix race condition of overwrite vs truncate | f2fs: compress: fix race condition of overwrite vs truncate
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.38 by commit 5639b73fd3bc6fc8ca72e3a9ac15aacaabd7ebff, it was introduced in version v5.6 by commit 4c8ff7095bef64fc47e996a938f7d57f9e077da3. For more details please see the references link. | null | 2021-12-19T22:59:11.869721Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4c8ff7095bef64fc47e996a938f7d57f9e077da3'} |
Linux | GSD-2022-1001381 | clk: mediatek: Fix memory leaks on probe | clk: mediatek: Fix memory leaks on probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit c6a0b413398588fc2d8b174a79ea715b66413fca. For more details please see the references link. | null | 2022-04-25T05:35:38.914805Z | 2022-04-24T21:09:21.198005Z | null | null | null | null | null |
Linux | GSD-2022-1000969 | drivers: net: slip: fix NPD bug in sl_tx_timeout() | drivers: net: slip: fix NPD bug in sl_tx_timeout()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.4 by commit b39fdc7a0d87f7f5d287dce1ae297a329775a1a3. For more details please see the references link. | null | 2022-04-25T04:25:52.113605Z | 2022-04-24T20:35:52.570045Z | null | null | null | null | null |
Linux | GSD-2021-1001911 | efi: Change down_interruptible() in virt_efi_reset_system() to down_trylock() | efi: Change down_interruptible() in virt_efi_reset_system() to down_trylock()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit 85c6f477b3574ba0efa05603247b39e00be0c1b5. For more details please see the references link. | null | 2021-12-19T23:42:43.495962Z | 2021-10-28T13:55:20.070210Z | null | null | null | null | null |
Linux | GSD-2021-1000603 | Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails | Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.42 by commit 1b364f8ede200e79e25df0df588fcedc322518fb, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T23:51:42.158768Z | 2021-06-04T19:45:51.603963Z | null | null | null | null | null |
Linux | GSD-2022-1000986 | cachefiles: unmark inode in use in error path | cachefiles: unmark inode in use in error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.4 by commit b2055abafd3d4ee0376fb3eed5cae866316995a1, it was introduced in version v5.17 by commit 1f08c925e7a38002bde509e66f6f891468848511. For more details please see the references link. | null | 2022-04-25T04:38:53.143730Z | 2022-04-24T20:37:21.694076Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1f08c925e7a38002bde509e66f6f891468848511'} |
Linux | GSD-2022-1001694 | NFS: Avoid writeback threads getting stuck in mempool_alloc() | NFS: Avoid writeback threads getting stuck in mempool_alloc()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit ea029e4ce760f786919d06ef52efa2e50ea92a5f. For more details please see the references link. | null | 2022-04-25T06:04:44.162250Z | 2022-04-24T21:35:52.697852Z | null | null | null | null | null |
Linux | GSD-2021-1002794 | Input: elantech - fix stack out of bound access in elantech_change_report_id() | Input: elantech - fix stack out of bound access in elantech_change_report_id()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.169 by commit a7f95328c6f0afffdc4555f16e3bbab8bbf0d9be, it was introduced in version v5.4.103 by commit 9e4815cf178561104881e5d687ef69396aca1c8d. For more details please see the references link. | null | 2022-01-11T05:58:02.394167Z | 2021-12-30T02:43:41.965391Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9e4815cf178561104881e5d687ef69396aca1c8d'} |
Linux | GSD-2021-1000253 | mt76: connac: fix kernel warning adding monitor interface | mt76: connac: fix kernel warning adding monitor interface
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 2554b9cb4b5e097c6071ec3ed5bc7c665c477ca7, it was introduced in version v5.12 by commit d0e274af2f2e44b9d496f5d2c0431fdd2ea76fb8. For more details please see the references link. | null | 2021-12-19T22:57:40.489746Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0e274af2f2e44b9d496f5d2c0431fdd2ea76fb8'} |
Linux | GSD-2021-1001012 | bonding: init notify_work earlier to avoid uninitialized use | bonding: init notify_work earlier to avoid uninitialized use
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.11 by commit cf3f90b7b5abc2154c3c611b6846b265932f47ce. For more details please see the references link. | null | 2021-12-20T01:28:03.777953Z | 2021-06-30T00:33:51.719982Z | null | null | null | null | null |
Linux | GSD-2022-1000085 | net: amd-xgbe: Fix skb data length underflow | net: amd-xgbe: Fix skb data length underflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.300 by commit 9924c80bd484340191e586110ca22bff23a49f2e, it was introduced in version v4.9.19 by commit fafc9555d87a19c78bcd43ed731c3a73bf0b37a9. For more details please see the references link. | null | 2022-02-20T06:24:08.051618Z | 2022-02-18T21:33:31.618202Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fafc9555d87a19c78bcd43ed731c3a73bf0b37a9'} |
Linux | GSD-2022-1002112 | ASoC: xilinx: xlnx_formatter_pcm: Handle sysclk setting | ASoC: xilinx: xlnx_formatter_pcm: Handle sysclk setting
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 2c357e027725b55f2300cb4744c9c5c67dfa5e01, it was introduced in version v5.1 by commit 6f6c3c36f0917be24587eeba818ab4fdfcb5465a. For more details please see the references link. | null | 2022-04-25T03:59:30.043716Z | 2022-04-24T22:12:49.940526Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6f6c3c36f0917be24587eeba818ab4fdfcb5465a'} |
Linux | GSD-2021-1001442 | seq_file: disallow extremely large seq buffer allocations | seq_file: disallow extremely large seq buffer allocations
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.276 by commit c5157b3e775dac31d51b11f993a06a84dc11fc8c, it was introduced in version v3.16 by commit 058504edd02667eef8fac9be27ab3ea74332e9b4. For more details please see the references link. | null | 2021-12-20T00:25:56.944414Z | 2021-08-03T02:42:35.542480Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/058504edd02667eef8fac9be27ab3ea74332e9b4'} |
Linux | GSD-2021-1000480 | ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook | ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.269 by commit 555a70f7fff03bd669123487905c47ae27dbdaac, it was introduced in version v4.7 by commit 1879445dfa7bbd6fe21b09c5cc72f4934798afed. For more details please see the references link. | null | 2021-12-19T23:13:18.711492Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1879445dfa7bbd6fe21b09c5cc72f4934798afed'} |
Linux | GSD-2022-1001417 | drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj | drm/amd/amdgpu/amdgpu_cs: fix refcount leak of a dma_fence obj
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit b6d1f7d97c81ebaf2cda9c4c943ee2e484fffdcf. For more details please see the references link. | null | 2022-04-25T04:32:55.063384Z | 2022-04-24T21:11:18.143737Z | null | null | null | null | null |
Linux | GSD-2021-1002147 | dm: fix mempool NULL pointer race when completing IO | dm: fix mempool NULL pointer race when completing IO
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit d208b89401e073de986dc891037c5a668f5d5d95. For more details please see the references link. | null | 2021-12-19T23:41:09.077737Z | 2021-11-14T15:21:58.758987Z | null | null | null | null | null |
Linux | GSD-2022-1001047 | powerpc/code-patching: Pre-map patch area | powerpc/code-patching: Pre-map patch area
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 38b268093c5abdb2fc7c88c52bba5a12dd7be984. For more details please see the references link. | null | 2022-04-25T06:16:11.322448Z | 2022-04-24T20:42:19.421972Z | null | null | null | null | null |
Linux | GSD-2021-1002517 | i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc | i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.85 by commit e5b7fb2198abc50058f1a29c395b004f76ab1c83, it was introduced in version v3.12 by commit 02e9c290814cc143ceccecb14eac3e7a05da745e. For more details please see the references link. | null | 2021-12-19T22:56:02.821129Z | 2021-12-19T19:40:49.321770Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/02e9c290814cc143ceccecb14eac3e7a05da745e'} |
Linux | GSD-2021-1001291 | coresight: tmc-etf: Fix global-out-of-bounds in tmc_update_etf_buffer() | coresight: tmc-etf: Fix global-out-of-bounds in tmc_update_etf_buffer()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.51 by commit 35c1c4bd2d59ad734129d4e232af9d1098023918, it was introduced in version v4.14 by commit 0c3fc4d5fa26092853278145aca9b21fa52a3e93. For more details please see the references link. | null | 2021-12-20T00:20:41.241888Z | 2021-08-03T01:58:30.776009Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0c3fc4d5fa26092853278145aca9b21fa52a3e93'} |
Linux | GSD-2022-1000206 | net: ipa: prevent concurrent replenish | net: ipa: prevent concurrent replenish
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.97 by commit 42fdbf8b7dab0328554899455a5b0a58526f8a63, it was introduced in version v5.7 by commit 84f9bd12d46dbe8ac7d4b650a8fbb4c49657a38b. For more details please see the references link. | null | 2022-02-19T08:44:12.787271Z | 2022-02-18T21:55:27.168840Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/84f9bd12d46dbe8ac7d4b650a8fbb4c49657a38b'} |
Linux | GSD-2021-1000879 | usb: fix various gadget panics on 10gbps cabling | usb: fix various gadget panics on 10gbps cabling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.195 by commit 45f9a2fe737dc0a5df270787f2231aee8985cd59. For more details please see the references link. | null | 2021-12-19T23:16:12.134883Z | 2021-06-30T00:03:13.963692Z | null | null | null | null | null |
Linux | GSD-2021-1002844 | hamradio: improve the incomplete fix to avoid NPD | hamradio: improve the incomplete fix to avoid NPD
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.12 by commit 03d00f7f1815ec00dab5035851b3de83afd054a8. For more details please see the references link. | null | 2022-01-11T05:51:12.822436Z | 2021-12-30T02:45:57.440625Z | null | null | null | null | null |
Linux | GSD-2022-1000656 | btrfs: fix use-after-free after failure to create a snapshot | btrfs: fix use-after-free after failure to create a snapshot
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.8 by commit 9372fa1d73da5f1673921e365d0cd2c27ec7adc2. For more details please see the references link. | null | 2022-03-07T02:46:24.926796Z | 2022-02-27T03:36:51.275078Z | null | null | null | null | null |
Linux | GSD-2022-1001944 | ax25: Fix UAF bugs in ax25 timers | ax25: Fix UAF bugs in ax25 timers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.112 by commit 5c62d3bf14100a88d30888b925fcb61a8c11c012. For more details please see the references link. | null | 2022-04-25T04:21:15.463960Z | 2022-04-24T21:56:57.456103Z | null | null | null | null | null |
Linux | GSD-2022-1002391 | net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link | net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 75e105d068cb98e43a6bb6b196fc006da52f9ee5, it was introduced in version v4.8 by commit fb3bbdb859891e6bc27fd1afb3a07319f82c2ee4. For more details please see the references link. | null | 2022-04-25T06:46:16.645224Z | 2022-04-24T22:42:18.660913Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb3bbdb859891e6bc27fd1afb3a07319f82c2ee4'} |
Linux | GSD-2022-1000343 | eeprom: ee1004: limit i2c reads to I2C_SMBUS_BLOCK_MAX | eeprom: ee1004: limit i2c reads to I2C_SMBUS_BLOCK_MAX
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.180 by commit 3937c35493ee2847aaefcfa5460e94b7443eef49, it was introduced in version v5.4.174 by commit aca56c298e2a6d20ab6308e203a8d37f2a7759d3. For more details please see the references link. | null | 2022-03-07T01:49:58.585311Z | 2022-02-27T02:53:42.835334Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/aca56c298e2a6d20ab6308e203a8d37f2a7759d3'} |
Linux | GSD-2021-1001784 | NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() | NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.288 by commit a67d47e32c91e2b10402cb8c081774cbf08edb2e, it was introduced in version v3.13 by commit 1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8. For more details please see the references link. | null | 2021-12-19T23:52:49.795003Z | 2021-10-28T13:48:42.961822Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8'} |
Linux | GSD-2021-1000896 | btrfs: promote debugging asserts to full-fledged checks in validate_super | btrfs: promote debugging asserts to full-fledged checks in validate_super
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.126 by commit 298499d73d2dd380adb1da4e0e94b36122eb1171. For more details please see the references link. | null | 2021-12-19T22:33:32.636351Z | 2021-06-30T00:05:06.531648Z | null | null | null | null | null |
Linux | GSD-2022-1000713 | iwlwifi: mvm: check debugfs_dir ptr before use | iwlwifi: mvm: check debugfs_dir ptr before use
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.13 by commit fe51975ff13831e794e1bcd0039b305dcad3d7ba, it was introduced in version v5.12 by commit 8c082a99edb997d7999eb7cdb648e47a2bf4a638. For more details please see the references link. | null | 2022-03-18T02:55:11.735153Z | 2022-03-18T00:11:45.461117Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c082a99edb997d7999eb7cdb648e47a2bf4a638'} |
Linux | GSD-2022-1001801 | fs: fix fd table size alignment properly | fs: fix fd table size alignment properly
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit c331c9d1d2b7a5ce875f8f1ac53e3987f73ecc75, it was introduced in version v5.15.33 by commit 136736abcd35f51a4be76e6cb1a1c3544a4580fa. For more details please see the references link. | null | 2022-04-24T21:43:01.822402Z | 2022-04-24T21:43:01.822402Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/136736abcd35f51a4be76e6cb1a1c3544a4580fa'} |
Linux | GSD-2021-1002002 | drm/msm: Fix null pointer dereference on pointer edp | drm/msm: Fix null pointer dereference on pointer edp
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.155 by commit f302be08e3de94db8863a0b2958b2bb3e8e998e6, it was introduced in version v4.0 by commit ab5b0107ccf3821a6837b0f2819270d6fa0b278f. For more details please see the references link. | null | 2021-12-19T22:46:10.537904Z | 2021-11-14T15:15:22.065407Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab5b0107ccf3821a6837b0f2819270d6fa0b278f'} |
Linux | GSD-2022-1001552 | ath9k_htc: fix uninit value bugs | ath9k_htc: fix uninit value bugs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 7da6169b6ebb75816b57be3beb829afa74f3b4b6, it was introduced in version v2.6.35 by commit fb9987d0f748c983bb795a86f47522313f701a08. For more details please see the references link. | null | 2022-04-25T06:49:45.351020Z | 2022-04-24T21:22:53.223314Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb9987d0f748c983bb795a86f47522313f701a08'} |
Linux | GSD-2021-1002452 | serial: core: fix transmit-buffer reset and memleak | serial: core: fix transmit-buffer reset and memleak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.164 by commit c5da8aa441053958594f94254592bb41264bdfbf, it was introduced in version v4.9 by commit 761ed4a94582ab291aa24dcbea4e01e8936488c8. For more details please see the references link. | null | 2021-12-20T00:27:44.971665Z | 2021-12-19T19:37:58.845400Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/761ed4a94582ab291aa24dcbea4e01e8936488c8'} |
Linux | GSD-2021-1000195 | nbd: Fix NULL pointer in flush_workqueue | nbd: Fix NULL pointer in flush_workqueue
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.5 by commit 54b78ba7e96e5fe1edb8054e375d31a6c0dc60dc, it was introduced in version v5.4 by commit e9e006f5fcf2bab59149cb38a48a4817c1b538b4. For more details please see the references link. | null | 2021-12-20T01:03:43.240522Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e9e006f5fcf2bab59149cb38a48a4817c1b538b4'} |
Linux | GSD-2022-1001102 | io_uring: bump poll refs to full 31-bits | io_uring: bump poll refs to full 31-bits
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit f3d218c450e5bbc96a107a9882b9450c9421f55a, it was introduced in version v5.17 by commit aa43477b040251f451db0d844073ac00a8ab66ee. For more details please see the references link. | null | 2022-04-25T03:49:48.551467Z | 2022-04-24T20:45:28.416660Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/aa43477b040251f451db0d844073ac00a8ab66ee'} |
Linux | GSD-2022-1001175 | pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe | pinctrl: nomadik: Add missing of_node_put() in nmk_pinctrl_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 62580a40c9bef3d8a90629c64dda381344b35ffd, it was introduced in version v3.9 by commit 32e67eee670e1254ee5ab41e2f454680acb9c17c. For more details please see the references link. | null | 2022-04-25T05:08:34.111422Z | 2022-04-24T20:50:48.584169Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/32e67eee670e1254ee5ab41e2f454680acb9c17c'} |
Linux | GSD-2021-1002425 | nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done | nfc: fix potential NULL pointer deref in nfc_genl_dump_ses_done
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.221 by commit 3b861a40325eac9c4c13b6c53874ad90617e944d, it was introduced in version v3.12 by commit ac22ac466a659f1b2e02a2e2ee23fc5c42da2c95. For more details please see the references link. | null | 2021-12-20T00:49:52.754047Z | 2021-12-19T19:36:46.879964Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac22ac466a659f1b2e02a2e2ee23fc5c42da2c95'} |
Linux | GSD-2021-1000418 | RDMA/siw: Fix a use after free in siw_alloc_mr | RDMA/siw: Fix a use after free in siw_alloc_mr
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.119 by commit 30b9e92d0b5e5d5dc1101ab856c17009537cbca4, it was introduced in version v5.3 by commit 2251334dcac9eb337575d8767e2a6a7e81848f7f. For more details please see the references link. | null | 2021-12-20T00:25:27.987826Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2251334dcac9eb337575d8767e2a6a7e81848f7f'} |
Linux | GSD-2022-1001525 | MIPS: pgalloc: fix memory leak caused by pgd_free() | MIPS: pgalloc: fix memory leak caused by pgd_free()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 5a8501d34b261906e4c76ec9da679f2cb4d309ed, it was introduced in version v5.9 by commit f9cb654cb550b7b87e8608b14fc3eca432429ffe. For more details please see the references link. | null | 2022-04-25T06:29:12.039841Z | 2022-04-24T21:20:02.860453Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f9cb654cb550b7b87e8608b14fc3eca432429ffe'} |
Linux | GSD-2021-1002075 | comedi: ni_usb6501: fix NULL-deref in command paths | comedi: ni_usb6501: fix NULL-deref in command paths
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.79 by commit ef143dc0c3defe56730ecd3a9de7b3e1d7e557c1, it was introduced in version v3.18 by commit a03bb00e50ab4c07107da58a52a0bff7943f360c. For more details please see the references link. | null | 2021-12-19T22:34:52.156367Z | 2021-11-14T15:18:43.792004Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a03bb00e50ab4c07107da58a52a0bff7943f360c'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.