ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2022-1001358 | dpaa2-ptp: Fix refcount leak in dpaa2_ptp_probe | dpaa2-ptp: Fix refcount leak in dpaa2_ptp_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 46d120f7c163706d6c31ee00baa0be64c4572b78, it was introduced in version v5.3 by commit d346c9e86d8685d7cdceddf5b2e9c4376334620c. For more details please see the references link. | null | 2022-04-25T05:28:07.772640Z | 2022-04-24T21:07:33.418348Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d346c9e86d8685d7cdceddf5b2e9c4376334620c'} |
Linux | GSD-2021-1000320 | hfsplus: prevent corruption in shrinking truncate | hfsplus: prevent corruption in shrinking truncate
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.38 by commit adbd8a2a8cc05d9e501f93e5c95c59307874cc99, it was introduced in version v4.19 by commit 31651c607151f1034cfb57e5a78678bea54c362b. For more details please see the references link. | null | 2021-12-19T23:21:11.674729Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/31651c607151f1034cfb57e5a78678bea54c362b'} |
Linux | GSD-2021-1000770 | io_uring: fix link timeout refs | io_uring: fix link timeout refs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.43 by commit 0b2a990e5d2f76d020cb840c456e6ec5f0c27530, it was introduced in version v5.10.26 by commit 1c20e9040f49687ba2ccc2ffd4411351a6c2ebff. For more details please see the references link. | null | 2021-12-20T00:22:41.793123Z | 2021-06-25T00:04:30.477661Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c20e9040f49687ba2ccc2ffd4411351a6c2ebff'} |
Linux | GSD-2021-1001862 | btrfs: fix abort logic in btrfs_replace_file_extents | btrfs: fix abort logic in btrfs_replace_file_extents
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.75 by commit 0e32a2b85c7d92ece86c17dfef390c5ed79c6378. For more details please see the references link. | null | 2021-12-20T00:06:01.157107Z | 2021-10-28T13:52:49.339356Z | null | null | null | null | null |
Linux | GSD-2022-1002061 | net/x25: Fix null-ptr-deref caused by x25_disconnect | net/x25: Fix null-ptr-deref caused by x25_disconnect
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 5c94b6205e87411dbe9dc1ca088eb36b8837fb47, it was introduced in version v5.7 by commit 4becb7ee5b3d2829ed7b9261a245a77d5b7de902. For more details please see the references link. | null | 2022-04-25T06:07:08.510133Z | 2022-04-24T22:06:32.599447Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4becb7ee5b3d2829ed7b9261a245a77d5b7de902'} |
Linux | GSD-2021-1001531 | HID: betop: fix slab-out-of-bounds Write in betop_probe | HID: betop: fix slab-out-of-bounds Write in betop_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.249 by commit 1c83c38dec83d57bc18d0c01d82c413d3b34ccb9. For more details please see the references link. | null | 2021-12-19T22:17:05.786830Z | 2021-10-19T16:22:29.926671Z | null | null | null | null | null |
Linux | GSD-2022-1002431 | mxser: fix xmit_buf leak in activate when LSR == 0xff | mxser: fix xmit_buf leak in activate when LSR == 0xff
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 125b7c929fc9b1e5eaa344bceb6367dfa6fd3f9d, it was introduced in version v2.6.33 by commit 6769140d304731f0a3b177470a2adb4bacd9036b. For more details please see the references link. | null | 2022-04-25T05:05:34.337864Z | 2022-04-24T22:46:24.196402Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6769140d304731f0a3b177470a2adb4bacd9036b'} |
Linux | GSD-2021-1001161 | net: fix uninit-value in caif_seqpkt_sendmsg | net: fix uninit-value in caif_seqpkt_sendmsg
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.6 by commit d4c7797ab1517515f0d08b3bc1c6b48883889c54, it was introduced in version v2.6.35 by commit bece7b2398d073d11b2e352405a3ecd3a1e39c60. For more details please see the references link. | null | 2021-12-19T23:20:39.448452Z | 2021-08-03T01:31:31.368089Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bece7b2398d073d11b2e352405a3ecd3a1e39c60'} |
Linux | GSD-2022-1000322 | vt_ioctl: fix array_index_nospec in vt_setactivate | vt_ioctl: fix array_index_nospec in vt_setactivate
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.230 by commit 170325aba4608bde3e7d21c9c19b7bc266ac0885. For more details please see the references link. | null | 2022-03-07T01:35:28.477452Z | 2022-02-27T02:50:38.736585Z | null | null | null | null | null |
Linux | GSD-2022-1000288 | ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path | ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.302 by commit 80c529322600dfb1f985b5e3f14c3c6f522ce154, it was introduced in version v4.0 by commit f243e5a7859a24d10975afb9a1708cac624ba6f1. For more details please see the references link. | null | 2022-03-07T01:47:51.223458Z | 2022-02-27T02:38:40.258981Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f243e5a7859a24d10975afb9a1708cac624ba6f1'} |
Linux | GSD-2022-1001860 | igc: avoid kernel warning when changing RX ring parameters | igc: avoid kernel warning when changing RX ring parameters
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit ab8c107470d12e7ef99030bf0911a10cdef62d16, it was introduced in version v5.13 by commit 73f1071c1d2952b8c93cd6cd99744768c59ec840. For more details please see the references link. | null | 2022-04-25T05:21:18.719424Z | 2022-04-24T21:49:06.848484Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/73f1071c1d2952b8c93cd6cd99744768c59ec840'} |
Linux | GSD-2022-1000772 | bpf, sockmap: Do not ignore orig_len parameter | bpf, sockmap: Do not ignore orig_len parameter
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.27 by commit 00c74b587197b0c503a8b1057a464ad13462444f, it was introduced in version v5.10 by commit ef5659280eb13e8ac31c296f58cfdfa1684ac06b. For more details please see the references link. | null | 2022-03-18T03:05:41.678966Z | 2022-03-18T00:17:02.181029Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef5659280eb13e8ac31c296f58cfdfa1684ac06b'} |
Linux | GSD-2021-1002063 | drm/amdgpu: fix out of bounds write | drm/amdgpu: fix out of bounds write
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.77 by commit eb3b6805e3e9d98b2507201fd061a231988ce623. For more details please see the references link. | null | 2021-12-20T01:12:54.983175Z | 2021-11-14T15:18:07.438554Z | null | null | null | null | null |
Linux | GSD-2022-1001533 | gpu: host1x: Fix a memory leak in 'host1x_remove()' | gpu: host1x: Fix a memory leak in 'host1x_remove()'
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 5124a344983e1b9670dae7add0e4d00d589aabcd, it was introduced in version v4.13 by commit 8474b02531c4881a762c52ef869c52429e38633f. For more details please see the references link. | null | 2022-04-25T05:32:53.941354Z | 2022-04-24T21:20:58.602835Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8474b02531c4881a762c52ef869c52429e38633f'} |
Linux | GSD-2021-1002599 | nfsd: Fix nsfd startup race (again) | nfsd: Fix nsfd startup race (again)
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.8 by commit 8bf902fee5893cfc2f04a698abab47629699ae9a, it was introduced in version v5.12 by commit bd5ae9288d6451bd346a1b4a59d4fe7e62ba29b7. For more details please see the references link. | null | 2021-12-20T01:09:35.535247Z | 2021-12-19T19:44:31.823088Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bd5ae9288d6451bd346a1b4a59d4fe7e62ba29b7'} |
Linux | GSD-2021-1002433 | staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() | staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.163 by commit 2e1ec01af2c7139c6a600bbfaea1a018b35094b6, it was introduced in version v3.2 by commit 66898177e7e5486dc77a4ba742efa4e2e9e900a4. For more details please see the references link. | null | 2021-12-20T00:30:27.969683Z | 2021-12-19T19:37:05.745091Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/66898177e7e5486dc77a4ba742efa4e2e9e900a4'} |
Linux | GSD-2022-1001499 | remoteproc: qcom_q6v5_mss: Fix some leaks in q6v5_alloc_memory_region | remoteproc: qcom_q6v5_mss: Fix some leaks in q6v5_alloc_memory_region
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit a7d988735e757e111f9722de7cf1b40a84a48b1f, it was introduced in version v4.17 by commit 278d744c46fd4f1925aec77752d18a0e4a9cbec3. For more details please see the references link. | null | 2022-04-25T05:24:03.498709Z | 2022-04-24T21:17:31.467084Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/278d744c46fd4f1925aec77752d18a0e4a9cbec3'} |
Linux | GSD-2022-1001163 | crypto: octeontx2 - CN10K CPT to RNM workaround | crypto: octeontx2 - CN10K CPT to RNM workaround
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit c756b8a20176f5537b2604c9d917827f1a3834bc. For more details please see the references link. | null | 2022-04-25T04:52:33.037850Z | 2022-04-24T20:49:41.272892Z | null | null | null | null | null |
Linux | GSD-2022-1001476 | spi: fsi: Implement a timeout for polling status | spi: fsi: Implement a timeout for polling status
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit d4982ceb137e6ecd2b466a6de639790a148cf19a. For more details please see the references link. | null | 2022-04-25T05:55:22.806372Z | 2022-04-24T21:15:41.794022Z | null | null | null | null | null |
Linux | GSD-2021-1002126 | mm: khugepaged: skip huge page collapse for special files | mm: khugepaged: skip huge page collapse for special files
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.16 by commit 5fcb6fce74ffa614d964667110cf1a516c48c6d9, it was introduced in version v5.4 by commit 99cb0dbd47a15d395bf3faa78dc122bc5efe3fc0. For more details please see the references link. | null | 2021-12-20T00:31:25.274808Z | 2021-11-14T15:21:07.480168Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/99cb0dbd47a15d395bf3faa78dc122bc5efe3fc0'} |
Linux | GSD-2022-1001026 | Drivers: hv: vmbus: Fix potential crash on module unload | Drivers: hv: vmbus: Fix potential crash on module unload
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 3d0078f8bddd58d9bb1ad40bbe929f8633abb276, it was introduced in version v5.7 by commit 74347a99e73ae00b8385f1209aaea193c670f901. For more details please see the references link. | null | 2022-04-25T04:25:27.642649Z | 2022-04-24T20:41:01.404492Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/74347a99e73ae00b8385f1209aaea193c670f901'} |
Linux | GSD-2021-1002576 | x86/xen: Add xenpv_restore_regs_and_return_to_usermode() | x86/xen: Add xenpv_restore_regs_and_return_to_usermode()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.7 by commit e19a07833960e50ba6e969751291483d4e94a024, it was introduced in version v4.15 by commit 7f2590a110b837af5679d08fc25c6227c5a8c497. For more details please see the references link. | null | 2021-12-19T22:48:59.948244Z | 2021-12-19T19:43:28.476484Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7f2590a110b837af5679d08fc25c6227c5a8c497'} |
Linux | GSD-2022-1000267 | net: bridge: vlan: fix memory leak in __allowed_ingress | net: bridge: vlan: fix memory leak in __allowed_ingress
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.19 by commit c5e216e880fa6f2cd9d4a6541269377657163098, it was introduced in version v5.6 by commit a580c76d534c7360ba68042b19cb255e8420e987. For more details please see the references link. | null | 2022-02-19T02:53:37.992339Z | 2022-02-18T22:04:08.547981Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a580c76d534c7360ba68042b19cb255e8420e987'} |
Linux | GSD-2021-1000818 | mm, hugetlb: fix simple resv_huge_pages underflow on UFFDIO_COPY | mm, hugetlb: fix simple resv_huge_pages underflow on UFFDIO_COPY
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit 6280e8aca1e0c86a36d45032b4f17e68732b8880, it was introduced in version v4.11 by commit 8fb5debc5fcd450470cdd789c2d80ef95ebb8cf4. For more details please see the references link. | null | 2021-12-19T23:13:50.746448Z | 2021-06-25T00:09:19.083296Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8fb5debc5fcd450470cdd789c2d80ef95ebb8cf4'} |
Linux | GSD-2021-1002825 | ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module | ipmi: Fix UAF when uninstall ipmi_si and ipmi_msghandler module
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.12 by commit 6b3f7e4b10f343f05b5fb513b07a9168fbf1172e, it was introduced in version v4.15 by commit b2cfd8ab4add53c2070367bfee2f5b738f51698d. For more details please see the references link. | null | 2022-01-11T05:54:28.616266Z | 2021-12-30T02:45:04.996Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b2cfd8ab4add53c2070367bfee2f5b738f51698d'} |
Linux | GSD-2022-1001925 | remoteproc: Fix count check in rproc_coredump_write() | remoteproc: Fix count check in rproc_coredump_write()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 34afac3c75fa08d6fabbab4c93f0a90618afaaa6, it was introduced in version v5.9 by commit 3afdc59e4390487f04f2435b7e8a6289984e0a1e. For more details please see the references link. | null | 2022-04-25T05:49:08.974893Z | 2022-04-24T21:55:31.484068Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3afdc59e4390487f04f2435b7e8a6289984e0a1e'} |
Linux | GSD-2022-1000637 | net: ipa: prevent concurrent replenish | net: ipa: prevent concurrent replenish
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.6 by commit 62600b0fbc6e69adfec2fca0fb6c69d10b72204b, it was introduced in version v5.7 by commit 84f9bd12d46dbe8ac7d4b650a8fbb4c49657a38b. For more details please see the references link. | null | 2022-03-07T01:38:32.045839Z | 2022-02-27T03:34:03.741894Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/84f9bd12d46dbe8ac7d4b650a8fbb4c49657a38b'} |
Linux | GSD-2021-1000398 | drm: bridge/panel: Cleanup connector on bridge detach | drm: bridge/panel: Cleanup connector on bridge detach
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit ce450934a00cf896e648fde08d0bd1426653d7a2, it was introduced in version v4.13 by commit 13dfc0540a575b47b2d640b093ac16e9e09474f6. For more details please see the references link. | null | 2021-12-19T22:27:55.113605Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/13dfc0540a575b47b2d640b093ac16e9e09474f6'} |
Linux | GSD-2021-1000662 | USB: usbfs: Don't WARN about excessively large memory allocations | USB: usbfs: Don't WARN about excessively large memory allocations
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.193 by commit 2ab21d6e1411999b5fb43434f421f00bf50002eb, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T22:46:53.660791Z | 2021-06-04T19:56:59.971648Z | null | null | null | null | null |
Linux | GSD-2021-1001970 | comedi: dt9812: fix DMA buffers on stack | comedi: dt9812: fix DMA buffers on stack
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.255 by commit 8a52bc480992c7c9da3ebfea456af731f50a4b97, it was introduced in version v2.6.29 by commit 63274cd7d38a3322d90b66a5bc976de1fb899051. For more details please see the references link. | null | 2021-12-20T01:00:24.572279Z | 2021-11-14T15:13:55.081912Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63274cd7d38a3322d90b66a5bc976de1fb899051'} |
Linux | GSD-2021-1000232 | wlcore: Fix buffer overrun by snprintf due to incorrect buffer size | wlcore: Fix buffer overrun by snprintf due to incorrect buffer size
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 7748383030f2dbffde9b4c24d0a899a7c0c621e8, it was introduced in version v5.12.4 by commit f5f2fd30be85a5dd71856e09db9623385e61590f. For more details please see the references link. | null | 2021-06-24T22:55:39.150043Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f5f2fd30be85a5dd71856e09db9623385e61590f'} |
Linux | GSD-2021-1001589 | ext4: fix reserved space counter leakage | ext4: fix reserved space counter leakage
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.151 by commit 59c19fdcde79287a7a45813eec1db9ebf784f727, it was introduced in version v3.8 by commit 51865fda28e585bdcc164474ff6438a9ccdbfada. For more details please see the references link. | null | 2021-12-19T22:57:00.690948Z | 2021-10-19T16:25:12.027023Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/51865fda28e585bdcc164474ff6438a9ccdbfada'} |
Linux | GSD-2021-1001073 | can: bcm: fix infoleak in struct bcm_msg_head | can: bcm: fix infoleak in struct bcm_msg_head
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit dc6415cb5cf8ebc8b334b7d0be916a0bf4353779, it was introduced in version v2.6.25 by commit ffd980f976e7fd666c2e61bf8ab35107efd11828. For more details please see the references link. | null | 2021-12-19T22:03:54.725364Z | 2021-06-30T00:37:51.434136Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ffd980f976e7fd666c2e61bf8ab35107efd11828'} |
Linux | GSD-2022-1002173 | lz4: fix LZ4_decompress_safe_partial read out of bound | lz4: fix LZ4_decompress_safe_partial read out of bound
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 73953dfa9d50e5c9fe98ee13fd1d3427aa12a0a3. For more details please see the references link. | null | 2022-04-25T06:22:20.303646Z | 2022-04-24T22:18:33.678981Z | null | null | null | null | null |
Linux | GSD-2022-1002489 | ntfs: add sanity check on allocation size | ntfs: add sanity check on allocation size
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit bd8d7daa0e53b184a2f3c6e0d47330780d0a0650. For more details please see the references link. | null | 2022-04-25T03:59:06.181343Z | 2022-04-24T22:53:28.122924Z | null | null | null | null | null |
Linux | GSD-2021-1001423 | smackfs: restrict bytes count in smk_set_cipso() | smackfs: restrict bytes count in smk_set_cipso()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.240 by commit 5c2dca9a7a7ff6a2df34158903515e2e4fd3d2b2. For more details please see the references link. | null | 2021-12-20T01:39:12.359667Z | 2021-08-03T02:36:18.039570Z | null | null | null | null | null |
Linux | GSD-2021-1001136 | s390/stack: fix possible register corruption with stack switch helper | s390/stack: fix possible register corruption with stack switch helper
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.14 by commit 24b8aa8c90a86d95600549f2dbdd2fc7381e48d9, it was introduced in version v4.20 by commit ff340d2472ec7618443913928af9fb85a7009270. For more details please see the references link. | null | 2021-12-20T00:48:01.067647Z | 2021-07-08T01:58:52.284604Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ff340d2472ec7618443913928af9fb85a7009270'} |
Linux | GSD-2022-1002466 | net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link | net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit edba120f094394454f5b9511d04abd7e8c2c31ee, it was introduced in version v4.8 by commit fb3bbdb859891e6bc27fd1afb3a07319f82c2ee4. For more details please see the references link. | null | 2022-04-25T03:36:31.463668Z | 2022-04-24T22:51:21.683490Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb3bbdb859891e6bc27fd1afb3a07319f82c2ee4'} |
Linux | GSD-2021-1001566 | crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() | crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.209 by commit 710be7c42d2f724869e5b18b21998ceddaffc4a9, it was introduced in version v4.12 by commit 36cf515b9bbe298e1ce7384620f0d4ec45ad3328. For more details please see the references link. | null | 2021-12-19T23:51:19.967275Z | 2021-10-19T16:24:04.374730Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/36cf515b9bbe298e1ce7384620f0d4ec45ad3328'} |
Linux | GSD-2022-1002036 | scsi: qla2xxx: Fix scheduling while atomic | scsi: qla2xxx: Fix scheduling while atomic
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 7fef50214dd04427233a2e66cd624d468e67aecb. For more details please see the references link. | null | 2022-04-25T04:21:17.396085Z | 2022-04-24T22:05:08.022074Z | null | null | null | null | null |
Linux | GSD-2021-1000727 | btrfs: fixup error handling in fixup_inode_link_counts | btrfs: fixup error handling in fixup_inode_link_counts
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.272 by commit 7a7ccd02dcb9f09550f95e9d697c31af35d1a60b, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T22:17:39.146463Z | 2021-06-24T23:59:32.990869Z | null | null | null | null | null |
Linux | GSD-2021-1001835 | drm: mxsfb: Fix NULL pointer dereference crash on unload | drm: mxsfb: Fix NULL pointer dereference crash on unload
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.76 by commit f40c2281d2c0674d32ba732fee45222d76495472, it was introduced in version v5.10 by commit ae1ed0093281939b80664a687689f12436c0e874. For more details please see the references link. | null | 2021-12-19T23:43:21.912388Z | 2021-10-28T13:51:25.982682Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ae1ed0093281939b80664a687689f12436c0e874'} |
Linux | GSD-2021-1000377 | spi: spi-zynqmp-gqspi: fix use-after-free in zynqmp_qspi_exec_op | spi: spi-zynqmp-gqspi: fix use-after-free in zynqmp_qspi_exec_op
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 1231279389b5e638bc3b66b9741c94077aed4b5a, it was introduced in version v5.10 by commit 1c26372e5aa9e53391a1f8fe0dc7cd93a7e5ba9e. For more details please see the references link. | null | 2021-12-20T01:06:59.198140Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c26372e5aa9e53391a1f8fe0dc7cd93a7e5ba9e'} |
Linux | GSD-2022-1000908 | usb: gadget: rndis: add spinlock for rndis response list | usb: gadget: rndis: add spinlock for rndis response list
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.232 by commit 9f688aadede6b862a0a898792b1a35421c93636f, it was introduced in version v4.6 by commit f6281af9d62e128aa6efad29cf7265062af114f2. For more details please see the references link. | null | 2022-03-18T02:55:27.185755Z | 2022-03-18T00:30:30.806214Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f6281af9d62e128aa6efad29cf7265062af114f2'} |
Linux | GSD-2021-1000160 | s390/zcrypt: fix zcard and zqueue hot-unplug memleak | s390/zcrypt: fix zcard and zqueue hot-unplug memleak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.36 by commit 026499a9c2e002e621ad568d1378324ae97e5524, it was introduced in version v5.10 by commit 29c2680fd2bf3862ff5cf2957f198512493156f9. For more details please see the references link. | null | 2021-12-19T22:52:09.819553Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/29c2680fd2bf3862ff5cf2957f198512493156f9'} |
Linux | GSD-2021-1000530 | cxgb4: avoid accessing registers when clearing filters | cxgb4: avoid accessing registers when clearing filters
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit 285207a558ab456aa7d8aa877ecc7e91fcc51710, it was introduced in version v5.2 by commit b1a79360ee862f8ada4798ad2346fa45bb41b527. For more details please see the references link. | null | 2021-12-19T23:47:35.585003Z | 2021-06-04T19:34:17.480571Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b1a79360ee862f8ada4798ad2346fa45bb41b527'} |
Linux | GSD-2022-1002221 | bfq: fix use-after-free in bfq_dispatch_request | bfq: fix use-after-free in bfq_dispatch_request
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 5117c9ff4c2ebae0f5c2c262d42a25a8fbc086e6. For more details please see the references link. | null | 2022-04-25T04:11:27.822434Z | 2022-04-24T22:22:53.510593Z | null | null | null | null | null |
Linux | GSD-2021-1000863 | perf: Fix data race between pin_count increment/decrement | perf: Fix data race between pin_count increment/decrement
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.237 by commit e0e5c5ea305d21a4f8a3f8ac0b1a47fc7591d492, it was introduced in version v2.6.39 by commit fe4b04fa31a6dcf4358aa84cf81e5a7fd079469b. For more details please see the references link. | null | 2021-12-20T01:35:28.757066Z | 2021-06-30T00:02:12.569890Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fe4b04fa31a6dcf4358aa84cf81e5a7fd079469b'} |
Linux | GSD-2021-1001771 | isdn: mISDN: Fix sleeping function called from invalid context | isdn: mISDN: Fix sleeping function called from invalid context
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.290 by commit 6f95c97e0f9d6eb39c3f2cb45e8fa4268d1b372b. For more details please see the references link. | null | 2021-12-19T22:46:05.779895Z | 2021-10-28T13:48:06.710885Z | null | null | null | null | null |
Linux | GSD-2021-1001321 | net: ti: fix UAF in tlan_remove_one | net: ti: fix UAF in tlan_remove_one
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.135 by commit b7e5563f2a7862a9e4796abb9908b092f677e3c1, it was introduced in version v3.10 by commit 1e0a8b13d35510e711fdf72e9a3e30bcb2bd49fa. For more details please see the references link. | null | 2021-12-20T01:29:13.030324Z | 2021-08-03T02:08:09.651999Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e0a8b13d35510e711fdf72e9a3e30bcb2bd49fa'} |
Linux | GSD-2021-1000926 | net: ethernet: fix potential use-after-free in ec_bhf_remove | net: ethernet: fix potential use-after-free in ec_bhf_remove
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.128 by commit 19f88ca68ccf8771276a606765239b167654f84a, it was introduced in version v3.15 by commit 6af55ff52b02d492d45db88df3e461fa51a6f753. For more details please see the references link. | null | 2021-12-19T23:08:45.073600Z | 2021-06-30T00:24:58.834275Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6af55ff52b02d492d45db88df3e461fa51a6f753'} |
Linux | GSD-2021-1001634 | netfilter: nf_tables: Fix oversized kvmalloc() calls | netfilter: nf_tables: Fix oversized kvmalloc() calls
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.71 by commit 96f439a7eda6e80b1f45a97da7d3020b259b04a4. For more details please see the references link. | null | 2021-12-20T01:17:12.505197Z | 2021-10-19T16:29:14.205269Z | null | null | null | null | null |
Linux | GSD-2022-1002364 | media: usb: go7007: s2250-board: fix leak in probe() | media: usb: go7007: s2250-board: fix leak in probe()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit b7dd177225355da55f8d80d8e568928e0eec3608, it was introduced in version v3.10 by commit d3b2ccd9e307eae80b4b4eeb0ede46cb02212df2. For more details please see the references link. | null | 2022-04-25T06:36:15.673399Z | 2022-04-24T22:39:14.552382Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d3b2ccd9e307eae80b4b4eeb0ede46cb02212df2'} |
Linux | GSD-2022-1000359 | can: isotp: fix potential CAN frame reception race in isotp_rcv() | can: isotp: fix potential CAN frame reception race in isotp_rcv()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.101 by commit 7b53d2204ce79b27a878074a77d64f40ec21dbca, it was introduced in version v5.10 by commit e057dd3fc20ffb3d7f150af46542a51b59b90127. For more details please see the references link. | null | 2022-03-07T01:45:44.283913Z | 2022-02-27T02:56:14.943364Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e057dd3fc20ffb3d7f150af46542a51b59b90127'} |
Linux | GSD-2021-1001264 | virtio_console: Assure used length from device is limited | virtio_console: Assure used length from device is limited
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.52 by commit f6ec306b93dc600a0ab3bb2693568ef1cc5f7f7a. For more details please see the references link. | null | 2021-12-19T23:27:47.537516Z | 2021-08-03T01:52:40.023293Z | null | null | null | null | null |
Linux | GSD-2022-1000709 | xen/netfront: destroy queues before real_num_tx_queues is zeroed | xen/netfront: destroy queues before real_num_tx_queues is zeroed
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.13 by commit 47e2f166ed9fe17f24561d6315be2228f6a90209, it was introduced in version v5.16.3 by commit c5eb468cbc1fa663bf0cc6c5360802dea4e611c2. For more details please see the references link. | null | 2022-03-18T02:49:46.915248Z | 2022-03-18T00:11:31.552002Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c5eb468cbc1fa663bf0cc6c5360802dea4e611c2'} |
Linux | GSD-2021-1000025 | dmaengine: idxd: clear MSIX permission entry on shutdown | dmaengine: idxd: clear MSIX permission entry on shutdown
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.16 by commit c84b8982d7aa9b4717dc36a1c6cbc93ee153b500, it was introduced in version v5.11 by commit 8e50d392652f20616a136165dff516b86baf5e49. For more details please see the references link. | null | 2021-12-20T01:20:51.535515Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8e50d392652f20616a136165dff516b86baf5e49'} |
Linux | GSD-2021-1002018 | IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields | IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.157 by commit 0f8cdfff06829a0b0348b6debc29ff6a61967724, it was introduced in version v2.6.35 by commit f931551bafe1f10ded7f5282e2aa162c267a2e5d. For more details please see the references link. | null | 2021-12-19T22:01:46.647598Z | 2021-11-14T15:16:09.229084Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f931551bafe1f10ded7f5282e2aa162c267a2e5d'} |
Linux | GSD-2022-1001548 | bpf: Fix a btf decl_tag bug when tagging a function | bpf: Fix a btf decl_tag bug when tagging a function
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit a3bcd2110c087bc62e90fddd4a93237b049d6e68, it was introduced in version v5.16 by commit b5ea834dde6b6e7f75e51d5f66dac8cd7c97b5ef. For more details please see the references link. | null | 2022-04-25T03:00:14.681099Z | 2022-04-24T21:22:27.066330Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b5ea834dde6b6e7f75e51d5f66dac8cd7c97b5ef'} |
Linux | GSD-2021-1000475 | mtd: require write permissions for locking and badblock ioctls | mtd: require write permissions for locking and badblock ioctls
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.233 by commit f73b29819c6314c0ba8b7d5892dfb03487424bee, it was introduced in version v4.14.194 by commit 389c74c218d3b182e9cd767e98cee0e0fd0dabaa. For more details please see the references link. | null | 2021-12-19T22:27:25.839218Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/389c74c218d3b182e9cd767e98cee0e0fd0dabaa'} |
Linux | GSD-2021-1002448 | net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() | net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.164 by commit bbeb0325a7460ebf1e03f5e0bfc5c652fba9519f, it was introduced in version v3.9 by commit 7f9664525f9cb507de9198a395a111371413f230. For more details please see the references link. | null | 2021-12-19T22:31:50.061880Z | 2021-12-19T19:37:49.399547Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7f9664525f9cb507de9198a395a111371413f230'} |
Linux | GSD-2022-1001118 | ubifs: Fix 'ui->dirty' race between do_tmpfile() and writeback work | ubifs: Fix 'ui->dirty' race between do_tmpfile() and writeback work
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 52b18c0b28a58d7f83ed497abdf95c9361189f66, it was introduced in version v4.9 by commit 474b93704f32163af4bfa728fddc570eba357353. For more details please see the references link. | null | 2022-04-25T06:14:46.495730Z | 2022-04-24T20:47:03.480117Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/474b93704f32163af4bfa728fddc570eba357353'} |
Linux | GSD-2022-1000420 | scsi: myrs: Fix crash in error case | scsi: myrs: Fix crash in error case
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit 6207f35c213f6cb2fc3f13b5e77f08c710e1de19. For more details please see the references link. | null | 2022-03-07T01:33:16.036178Z | 2022-02-27T03:04:31.402097Z | null | null | null | null | null |
Linux | GSD-2021-1002761 | io-wq: drop wqe lock before creating new worker | io-wq: drop wqe lock before creating new worker
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit 11053a021937aa403c883d3e8ef78d8c5308f583, it was introduced in version v5.15.11 by commit 4b4e5bbf9386d4ec21d91c0cb0fd60b9bba778ec. For more details please see the references link. | null | 2021-12-27T05:49:22.703441Z | 2021-12-27T05:49:22.703441Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4b4e5bbf9386d4ec21d91c0cb0fd60b9bba778ec'} |
Linux | GSD-2022-1001231 | power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init | power: supply: ab8500: Fix memory leak in ab8500_fg_sysfs_init
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit c32f6b6196b6efc1c68990dfeaac36fb8eb3b8e1, it was introduced in version v4.9 by commit 8c0984e5a75337df513047ec92a6c09d78e3e5cd. For more details please see the references link. | null | 2022-04-25T06:09:38.029164Z | 2022-04-24T20:56:11.580622Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c0984e5a75337df513047ec92a6c09d78e3e5cd'} |
Linux | GSD-2021-1002331 | ALSA: usb-audio: fix null pointer dereference on pointer cs_desc | ALSA: usb-audio: fix null pointer dereference on pointer cs_desc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit 58fa50de595f152900594c28ec9915c169643739. For more details please see the references link. | null | 2021-12-20T00:50:58.389337Z | 2021-11-29T02:39:03.576191Z | null | null | null | null | null |
Linux | GSD-2022-1001661 | net/smc: use memcpy instead of snprintf to avoid out of bounds read | net/smc: use memcpy instead of snprintf to avoid out of bounds read
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11 by commit 8a4465368964b4fbaf084760c94c7aabf61059fb, it was introduced in version v5.11 by commit a3db10efcc4cc9c03a6375920179ade75ea2df7a. For more details please see the references link. | null | 2022-04-25T03:52:44.203325Z | 2022-04-24T21:32:44.505405Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a3db10efcc4cc9c03a6375920179ade75ea2df7a'} |
Linux | GSD-2022-1000973 | Drivers: hv: vmbus: Deactivate sysctl_record_panic_msg by default in isolated guests | Drivers: hv: vmbus: Deactivate sysctl_record_panic_msg by default in isolated guests
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.4 by commit 6230bc50d6d21cae4c084766623d0a6d17958721. For more details please see the references link. | null | 2022-04-25T06:33:14.245250Z | 2022-04-24T20:36:08.281126Z | null | null | null | null | null |
Linux | GSD-2022-1001374 | xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu>=32 | xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu>=32
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit be63f365f454e39d09c41bbd21ea72b5244160b5. For more details please see the references link. | null | 2022-04-25T03:35:17.974479Z | 2022-04-24T21:08:56.129795Z | null | null | null | null | null |
Linux | GSD-2021-1002624 | dm btree remove: fix use after free in rebalance_children() | dm btree remove: fix use after free in rebalance_children()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.294 by commit 66ea642af6fd4eacb5d0271a922130fcf8700424. For more details please see the references link. | null | 2022-01-11T05:54:20.585851Z | 2021-12-27T05:27:45.397754Z | null | null | null | null | null |
Linux | GSD-2021-1000619 | mld: fix panic in mld_newpack() | mld: fix panic in mld_newpack()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.124 by commit 37d697759958d111439080bab7e14d2b0e7b39f5, it was introduced in version v2.6.35 by commit 72e09ad107e78d69ff4d3b97a69f0aad2b77280f. For more details please see the references link. | null | 2021-12-19T22:58:16.500855Z | 2021-06-04T19:48:39.424144Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/72e09ad107e78d69ff4d3b97a69f0aad2b77280f'} |
Linux | GSD-2022-1001724 | scsi: pm8001: Fix task leak in pm8001_send_abort_all() | scsi: pm8001: Fix task leak in pm8001_send_abort_all()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 2290dcad6f65864dec518fb2d5fb45f67d684150. For more details please see the references link. | null | 2022-04-25T05:22:11.843156Z | 2022-04-24T21:37:48.298504Z | null | null | null | null | null |
Linux | GSD-2022-1000836 | iommu/amd: Recover from event log overflow | iommu/amd: Recover from event log overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.104 by commit 61a895da48443c899083c9eddd9b77484e232707. For more details please see the references link. | null | 2022-03-18T02:50:39.464967Z | 2022-03-18T00:22:53.059389Z | null | null | null | null | null |
Linux | GSD-2021-1002274 | scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq() | scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.162 by commit 16bcbfb56d759c25665f786e33ec633b9508a08f. For more details please see the references link. | null | 2021-12-19T22:04:28.108829Z | 2021-11-29T02:36:27.626778Z | null | null | null | null | null |
Linux | GSD-2021-1000249 | RDMA/qedr: Fix error return code in qedr_iw_connect() | RDMA/qedr: Fix error return code in qedr_iw_connect()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 296eb4ca08e47ec77b27d5e476c19bf23f91f6cd, it was introduced in version v5.5 by commit 82af6d19d8d9227c22a53ff00b40fb2a4f9fce69. For more details please see the references link. | null | 2021-12-19T22:12:56.295175Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/82af6d19d8d9227c22a53ff00b40fb2a4f9fce69'} |
Linux | GSD-2022-1000565 | lockdep: Correct lock_classes index mapping | lockdep: Correct lock_classes index mapping
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit c20f90fe009ffdccba826d2ee839e5d55118a2bf, it was introduced in version v5.10 by commit f611e8cf98ec908b9c2c0da6064a660fc6022487. For more details please see the references link. | null | 2022-03-07T01:43:55.663607Z | 2022-02-27T03:24:35.108777Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f611e8cf98ec908b9c2c0da6064a660fc6022487'} |
Linux | GSD-2021-1001008 | mm/slub: actually fix freelist pointer vs redzoning | mm/slub: actually fix freelist pointer vs redzoning
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.46 by commit f6ed2357541612a13a5841b3af4dc32ed984a25f. For more details please see the references link. | null | 2021-12-19T23:56:22.575862Z | 2021-06-30T00:33:35.277600Z | null | null | null | null | null |
Linux | GSD-2022-1000135 | ASoC: ops: Reject out of bounds values in snd_soc_put_volsw() | ASoC: ops: Reject out of bounds values in snd_soc_put_volsw()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.228 by commit 65a61b1f56f5386486757930069fbdce94af08bf. For more details please see the references link. | null | 2022-02-20T02:23:36.525997Z | 2022-02-18T21:45:02.968238Z | null | null | null | null | null |
Linux | GSD-2022-1002108 | media: usb: go7007: s2250-board: fix leak in probe() | media: usb: go7007: s2250-board: fix leak in probe()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 44973633b0064c46083833b55dd0a45e6235f8ca, it was introduced in version v3.10 by commit d3b2ccd9e307eae80b4b4eeb0ede46cb02212df2. For more details please see the references link. | null | 2022-04-25T05:57:40.315726Z | 2022-04-24T22:12:21.913977Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d3b2ccd9e307eae80b4b4eeb0ede46cb02212df2'} |
Linux | GSD-2021-1001458 | scsi: core: Fix bad pointer dereference when ehandler kthread is invalid | scsi: core: Fix bad pointer dereference when ehandler kthread is invalid
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.276 by commit d2f0b960d07e52bb664471b4de0ed8b08c636b3a, it was introduced in version v4.9.273 by commit 8958181c1663e24a13434448e7d6b96b5d04900a. For more details please see the references link. | null | 2021-12-20T00:43:18.301366Z | 2021-08-03T02:47:08.084500Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8958181c1663e24a13434448e7d6b96b5d04900a'} |
Linux | GSD-2021-1001376 | net: ti: fix UAF in tlan_remove_one | net: ti: fix UAF in tlan_remove_one
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.199 by commit a0a817b2d308fac090a05cbbe80988e073ac5193, it was introduced in version v3.10 by commit 1e0a8b13d35510e711fdf72e9a3e30bcb2bd49fa. For more details please see the references link. | null | 2021-12-20T01:06:12.476806Z | 2021-08-03T02:23:31.255541Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e0a8b13d35510e711fdf72e9a3e30bcb2bd49fa'} |
Linux | GSD-2022-1001909 | can: isotp: sanitize CAN ID checks in isotp_bind() | can: isotp: sanitize CAN ID checks in isotp_bind()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit f343dbe82314ab457153c9afd970be4e9e553020, it was introduced in version v5.10 by commit e057dd3fc20ffb3d7f150af46542a51b59b90127. For more details please see the references link. | null | 2022-04-25T07:10:25.179698Z | 2022-04-24T21:53:49.701845Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e057dd3fc20ffb3d7f150af46542a51b59b90127'} |
Linux | GSD-2021-1000834 | NFS: Fix a potential NULL dereference in nfs_get_client() | NFS: Fix a potential NULL dereference in nfs_get_client()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.273 by commit fab8bfdfb4aac9e4e8363666333adfdf21e89106, it was introduced in version v3.17 by commit 31434f496abb9f3410b10f541462fe58613dd3ad. For more details please see the references link. | null | 2021-12-20T01:22:24.662866Z | 2021-06-30T00:00:16.574243Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/31434f496abb9f3410b10f541462fe58613dd3ad'} |
Linux | GSD-2021-1002809 | mm/hwpoison: clear MF_COUNT_INCREASED before retrying get_any_page() | mm/hwpoison: clear MF_COUNT_INCREASED before retrying get_any_page()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.89 by commit 1f207076740101fed87074a6bc924dbe806f08a5, it was introduced in version v5.10 by commit b94e02822debdf0cc473556aad7dcc859f216653. For more details please see the references link. | null | 2022-01-11T05:47:24.286616Z | 2021-12-30T02:44:23.985679Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b94e02822debdf0cc473556aad7dcc859f216653'} |
Linux | GSD-2021-1001726 | drm/i915/gvt: fix the usage of ww lock in gvt scheduler. | drm/i915/gvt: fix the usage of ww lock in gvt scheduler.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit ce1cccb000bda07a172518894c3439c1cb699f42, it was introduced in version v5.12 by commit 67f1120381df022a7016f4acc8d4880da9a66c03. For more details please see the references link. | null | 2021-12-19T22:13:23.889292Z | 2021-10-19T16:33:42.084851Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/67f1120381df022a7016f4acc8d4880da9a66c03'} |
Linux | GSD-2022-1002276 | jffs2: fix memory leak in jffs2_scan_medium | jffs2: fix memory leak in jffs2_scan_medium
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 455f4a23490bfcbedc8e5c245c463a59b19e5ddd, it was introduced in version v2.6.15 by commit e631ddba588783edd521c5a89f7b2902772fb691. For more details please see the references link. | null | 2022-04-25T04:27:17.710473Z | 2022-04-24T22:29:26.878396Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e631ddba588783edd521c5a89f7b2902772fb691'} |
Linux | GSD-2021-1000567 | net/sched: fq_pie: fix OOB access in the traffic path | net/sched: fq_pie: fix OOB access in the traffic path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit 7a1bdec12e43e29cc34a4394590337069d8812ce, it was introduced in version v5.6 by commit ec97ecf1ebe485a17cd8395a5f35e6b80b57665a. For more details please see the references link. | null | 2021-12-19T22:41:25.184486Z | 2021-06-04T19:40:15.901607Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ec97ecf1ebe485a17cd8395a5f35e6b80b57665a'} |
Linux | GSD-2021-1000137 | media: dvbdev: Fix memory leak in dvb_media_device_free() | media: dvbdev: Fix memory leak in dvb_media_device_free()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.36 by commit 43263fd43083e412311fa764cd04a727b0c6a749, it was introduced in version v4.5 by commit 0230d60e4661d9ced6fb0b9a30f182ebdafbba7a. For more details please see the references link. | null | 2021-12-20T00:47:35.753542Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0230d60e4661d9ced6fb0b9a30f182ebdafbba7a'} |
Linux | GSD-2021-1000422 | i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails | i2c: imx-lpi2c: fix reference leak when pm_runtime_get_sync fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.119 by commit 815859cb1d2302e74f11bf6894bceace9ca9eb4a, it was introduced in version v4.16 by commit 13d6eb20fc79a1e606307256dad4098375539a09. For more details please see the references link. | null | 2021-12-20T00:55:00.506261Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/13d6eb20fc79a1e606307256dad4098375539a09'} |
Linux | GSD-2021-1000588 | btrfs: do not BUG_ON in link_to_fixup_dir | btrfs: do not BUG_ON in link_to_fixup_dir
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.42 by commit 7e13db503918820e6333811cdc6f151dcea5090a, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T22:59:12.327952Z | 2021-06-04T19:43:18.881087Z | null | null | null | null | null |
Linux | GSD-2021-1000072 | openvswitch: fix stack OOB read while fragmenting IPv4 packets | openvswitch: fix stack OOB read while fragmenting IPv4 packets
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.3 by commit b3502b04e84ac5349be95fc033c17bd701d2787a, it was introduced in version v4.16 by commit d52e5a7e7ca49457dd31fc8b42fb7c0d58a31221. For more details please see the references link. | null | 2021-12-19T22:24:22.766518Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d52e5a7e7ca49457dd31fc8b42fb7c0d58a31221'} |
Linux | GSD-2022-1002299 | veth: Ensure eth header is in skb's linear part | veth: Ensure eth header is in skb's linear part
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.239 by commit 1ef0088e43af1de4e3b365218c4d3179d9a37eec, it was introduced in version v2.6.24 by commit e314dbdc1c0dc6a548ecf0afce28ecfd538ff568. For more details please see the references link. | null | 2022-04-25T05:10:58.214839Z | 2022-04-24T22:31:53.553291Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e314dbdc1c0dc6a548ecf0afce28ecfd538ff568'} |
Linux | GSD-2021-1001233 | mISDN: fix possible use-after-free in HFC_cleanup() | mISDN: fix possible use-after-free in HFC_cleanup()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.3 by commit ed7c3739d0a07e2ec3ccbffe7e93cea01c438cda. For more details please see the references link. | null | 2021-12-19T22:34:46.343210Z | 2021-08-03T01:44:05.436120Z | null | null | null | null | null |
Linux | GSD-2021-1001399 | atm: iphase: fix possible use-after-free in ia_module_exit() | atm: iphase: fix possible use-after-free in ia_module_exit()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.198 by commit 89ce0b0747f319eb70f85bc820dcc43cebbd5417. For more details please see the references link. | null | 2021-12-20T01:00:11.523844Z | 2021-08-03T02:29:10.551892Z | null | null | null | null | null |
Linux | GSD-2022-1002333 | mmc: host: Return an error when ->enable_sdio_irq() ops is missing | mmc: host: Return an error when ->enable_sdio_irq() ops is missing
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 63535a20f4f3c54f60c6ea27eebac09262d3ce77. For more details please see the references link. | null | 2022-04-25T03:38:18.664157Z | 2022-04-24T22:35:25.508622Z | null | null | null | null | null |
Linux | GSD-2021-1000971 | mm/memory-failure: make sure wait for page writeback in memory_failure | mm/memory-failure: make sure wait for page writeback in memory_failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.46 by commit 9e379da727a7a031be9b877cde7b9c34a0fb8306, it was introduced in version v3.16 by commit 0bc1f8b0682caa39f45ce1e0228ebf43acb46111. For more details please see the references link. | null | 2021-12-20T00:16:06.060981Z | 2021-06-30T00:30:04.725494Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0bc1f8b0682caa39f45ce1e0228ebf43acb46111'} |
Linux | GSD-2021-1001663 | nvme-rdma: destroy cm id before destroy qp to avoid use after free | nvme-rdma: destroy cm id before destroy qp to avoid use after free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.70 by commit ecf0dc5a904830c926a64feffd8e01141f89822f. For more details please see the references link. | null | 2021-12-20T00:29:40.241263Z | 2021-10-19T16:30:37.354461Z | null | null | null | null | null |
Linux | GSD-2022-1001636 | uaccess: fix integer overflow on access_ok() | uaccess: fix integer overflow on access_ok()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.18 by commit 99801e2f457824955da4aadaa035913a6dede03a, it was introduced in version v4.20 by commit da551281947cb2c0ab6e0045529a706af5d79584. For more details please see the references link. | null | 2022-04-25T05:33:35.923716Z | 2022-04-24T21:30:32.825773Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/da551281947cb2c0ab6e0045529a706af5d79584'} |
Linux | GSD-2022-1000924 | ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min | ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.270 by commit 7e0e4bc93811cf600508ff36f07abea7b40643ed, it was introduced in version v4.14.265 by commit 586ef863c94354a7e00e5ae5ef01443d1dc99bc7. For more details please see the references link. | null | 2022-03-18T02:54:22.593302Z | 2022-03-18T00:32:35.665349Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/586ef863c94354a7e00e5ae5ef01443d1dc99bc7'} |
Linux | GSD-2021-1002366 | ALSA: pcm: oss: Limit the period size to 16MB | ALSA: pcm: oss: Limit the period size to 16MB
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.295 by commit d1bb703ad050de9095f10b2d3416c32921ac6bcc. For more details please see the references link. | null | 2021-12-20T00:16:40.650711Z | 2021-12-19T19:34:09.114525Z | null | null | null | null | null |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.