ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2021-1002633 | net: netlink: af_netlink: Prevent empty skb by adding a check on len. | net: netlink: af_netlink: Prevent empty skb by adding a check on len.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.259 by commit 54e785f7d5c197bc06dbb8053700df7e2a093ced. For more details please see the references link. | null | 2022-01-11T05:54:35.873697Z | 2021-12-27T05:28:09.846515Z | null | null | null | null | null |
Linux | GSD-2022-1001699 | virtio_console: eliminate anonymous module_init & module_exit | virtio_console: eliminate anonymous module_init & module_exit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 44c2d5fbe7b2bd1f8cb114d608a591a73a5d4ae6. For more details please see the references link. | null | 2022-04-25T04:54:22.476189Z | 2022-04-24T21:36:18.660227Z | null | null | null | null | null |
Linux | GSD-2022-1001363 | skbuff: fix coalescing for page_pool fragment recycling | skbuff: fix coalescing for page_pool fragment recycling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit c4fa19615806a9a7e518c295b39175aa47a685ac, it was introduced in version v5.15 by commit 53e0961da1c7bbdabd1abebb20de403ec237ec09. For more details please see the references link. | null | 2022-04-25T03:07:32.401718Z | 2022-04-24T21:08:03.983658Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/53e0961da1c7bbdabd1abebb20de403ec237ec09'} |
Linux | GSD-2021-1001336 | tty: serial: 8250: serial_cs: Fix a memory leak in error handling path | tty: serial: 8250: serial_cs: Fix a memory leak in error handling path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.134 by commit ee16bed959862a6de2913f71a04cb563d7237b67. For more details please see the references link. | null | 2021-12-20T02:12:34.815778Z | 2021-08-03T02:12:06.876521Z | null | null | null | null | null |
Linux | GSD-2022-1001949 | perf/imx_ddr: Fix undefined behavior due to shift overflowing the constant | perf/imx_ddr: Fix undefined behavior due to shift overflowing the constant
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.112 by commit 000b3921b4d52399865ea398e5f6c999246437f4. For more details please see the references link. | null | 2022-04-25T05:25:50.886578Z | 2022-04-24T21:57:21.179970Z | null | null | null | null | null |
Linux | GSD-2021-1001766 | binder: make sure fd closes complete | binder: make sure fd closes complete
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.9 by commit b95483d8d94b41fa31a84c1d86710b7907a37621, it was introduced in version v5.0 by commit 80cd795630d6526ba729a089a435bf74a57af927. For more details please see the references link. | null | 2021-12-19T22:53:37.747485Z | 2021-10-19T16:35:42.098429Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80cd795630d6526ba729a089a435bf74a57af927'} |
Linux | GSD-2021-1000874 | kvm: avoid speculation-based attacks from out-of-range memslot accesses | kvm: avoid speculation-based attacks from out-of-range memslot accesses
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.195 by commit 22b87fb17a28d37331bb9c1110737627b17f6781. For more details please see the references link. | null | 2021-12-20T01:34:33.310872Z | 2021-06-30T00:02:54.948064Z | null | null | null | null | null |
Linux | GSD-2022-1002236 | ax25: Fix refcount leaks caused by ax25_cb_del() | ax25: Fix refcount leaks caused by ax25_cb_del()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.190 by commit 9e1e088a57c23251f1cfe9601bbd90ade2ea73b9, it was introduced in version v5.4.190 by commit 418993bbaafb0cd48f904ba68eeda052d624c821. For more details please see the references link. | null | 2022-04-24T22:24:24.032088Z | 2022-04-24T22:24:24.032088Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/418993bbaafb0cd48f904ba68eeda052d624c821'} |
Linux | GSD-2021-1000527 | Bluetooth: SMP: Fail if remote and local public keys are identical | Bluetooth: SMP: Fail if remote and local public keys are identical
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.270 by commit 75523bbfb0eaead670c97fbcf096ca2ab556f0c0, it was introduced in version v3.17 by commit bfe01a5ba2490f299e1d2d5508cbbbadd897bbe9. For more details please see the references link. | null | 2021-12-19T22:10:58.839101Z | 2021-05-31T23:51:50.600851Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bfe01a5ba2490f299e1d2d5508cbbbadd897bbe9'} |
Linux | GSD-2021-1000177 | openvswitch: fix stack OOB read while fragmenting IPv4 packets | openvswitch: fix stack OOB read while fragmenting IPv4 packets
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.118 by commit 490ad0a2390442d0a7b8c00972a83dbb09cab142, it was introduced in version v4.16 by commit d52e5a7e7ca49457dd31fc8b42fb7c0d58a31221. For more details please see the references link. | null | 2021-12-19T22:00:09.559267Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d52e5a7e7ca49457dd31fc8b42fb7c0d58a31221'} |
Linux | GSD-2021-1000198 | kyber: fix out of bounds access when preempted | kyber: fix out of bounds access when preempted
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.5 by commit 2ef3c76540c49167a0bc3d5f80d00fd1fc4586df, it was introduced in version v4.18 by commit a6088845c2bf754d6cb2572b484180680b037804. For more details please see the references link. | null | 2021-12-19T23:52:22.281035Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a6088845c2bf754d6cb2572b484180680b037804'} |
Linux | GSD-2021-1000462 | net/nfc: fix use-after-free llcp_sock_bind/connect | net/nfc: fix use-after-free llcp_sock_bind/connect
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.191 by commit 48fba458fe54cc2a980a05c13e6c19b8b2cfb610, it was introduced in version v4.19.187 by commit adbb1d218c5f56dbae052765da83c0f57fce2a31. For more details please see the references link. | null | 2021-12-19T23:29:41.452752Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/adbb1d218c5f56dbae052765da83c0f57fce2a31'} |
Linux | GSD-2021-1000032 | ixgbe: fix unbalanced device enable/disable in suspend/resume | ixgbe: fix unbalanced device enable/disable in suspend/resume
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.32 by commit be07581aacae7cd0a073afae8e8862032f794309, it was introduced in version v5.9 by commit 6f82b25587354ce7c9c42e0b53d8b0770b900847. For more details please see the references link. | null | 2021-12-19T22:04:17.873888Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6f82b25587354ce7c9c42e0b53d8b0770b900847'} |
Linux | GSD-2021-1001789 | ocfs2: fix data corruption after conversion from inline format | ocfs2: fix data corruption after conversion from inline format
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.253 by commit 8e6bfb4f70168ddfd32fb6dc028ad52faaf1f32e, it was introduced in version v4.14.204 by commit 7ed80e77c908cbaa686529a49f8ae0060c5caee7. For more details please see the references link. | null | 2021-12-19T23:28:08.367284Z | 2021-10-28T13:48:56.651623Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ed80e77c908cbaa686529a49f8ae0060c5caee7'} |
Linux | GSD-2021-1001273 | iommu/arm-smmu: Fix arm_smmu_device refcount leak in address translation | iommu/arm-smmu: Fix arm_smmu_device refcount leak in address translation
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.52 by commit 43d1aaa1965f9b58035196dac49b1e1e6c9c25eb. For more details please see the references link. | null | 2021-12-19T23:06:52.438510Z | 2021-08-03T01:54:56.321206Z | null | null | null | null | null |
Linux | GSD-2022-1002373 | jffs2: fix memory leak in jffs2_do_mount_fs | jffs2: fix memory leak in jffs2_do_mount_fs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit dbe0d0521eaa6a3d235517319266c539bb5c5112, it was introduced in version v2.6.15 by commit e631ddba588783edd521c5a89f7b2902772fb691. For more details please see the references link. | null | 2022-04-25T04:10:04.254067Z | 2022-04-24T22:40:21.359260Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e631ddba588783edd521c5a89f7b2902772fb691'} |
Linux | GSD-2021-1001623 | i40e: Fix freeing of uninitialized misc IRQ vector | i40e: Fix freeing of uninitialized misc IRQ vector
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.73 by commit 97aeed72af4f83ae51534f0a2473ff52f8d66236, it was introduced in version v4.15 by commit c17401a1dd210a5f22ab1ec7c7366037c158a14c. For more details please see the references link. | null | 2021-12-20T00:43:33.314350Z | 2021-10-19T16:28:45.325761Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c17401a1dd210a5f22ab1ec7c7366037c158a14c'} |
Linux | GSD-2021-1000931 | KVM: x86: Immediately reset the MMU context when the SMM flag is cleared | KVM: x86: Immediately reset the MMU context when the SMM flag is cleared
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.128 by commit cbb425f62df9df7abee4b3f068f7ed6ffc3561e2, it was introduced in version v5.1 by commit 9ec19493fb86d6d5fbf9286b94ff21e56ef66376. For more details please see the references link. | null | 2021-12-19T23:32:38.704061Z | 2021-06-30T00:25:17.353455Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9ec19493fb86d6d5fbf9286b94ff21e56ef66376'} |
Linux | GSD-2022-1000460 | ipv4: fix data races in fib_alias_hw_flags_set | ipv4: fix data races in fib_alias_hw_flags_set
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit db333693b052cf769d8d6dde034ad679ce2e9ab9, it was introduced in version v5.6 by commit 90b93f1b31f86dcde2fa3c57f1ae33d28d87a1f8. For more details please see the references link. | null | 2022-03-07T01:33:25.055942Z | 2022-02-27T03:10:32.892730Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/90b93f1b31f86dcde2fa3c57f1ae33d28d87a1f8'} |
Linux | GSD-2022-1000030 | net: fix use-after-free in tw_timer_handler | net: fix use-after-free in tw_timer_handler
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.170 by commit fe5838c22b986c1190f1dce9aa09bf6a491c1a69, it was introduced in version v2.6.27 by commit 61a7e26028b94805fd686a6dc9dbd9941f8f19b0. For more details please see the references link. | null | 2022-01-11T05:48:33.240028Z | 2022-01-10T19:50:53.006294Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61a7e26028b94805fd686a6dc9dbd9941f8f19b0'} |
Linux | GSD-2021-1002721 | netfs: Fix lockdep warning from taking sb_writers whilst holding mmap_lock | netfs: Fix lockdep warning from taking sb_writers whilst holding mmap_lock
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.10 by commit 1ac287b7b61520d00255b4ec8c8e2dd5f0277169, it was introduced in version v5.13 by commit 726218fdc22c9b52f16e1228499a804bbf262a20. For more details please see the references link. | null | 2022-01-11T05:58:15.224549Z | 2021-12-27T05:38:59.678089Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/726218fdc22c9b52f16e1228499a804bbf262a20'} |
Linux | GSD-2022-1000899 | netfilter: nf_queue: fix possible use-after-free | netfilter: nf_queue: fix possible use-after-free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.233 by commit 34dc4a6a7f261736ef7183868a5bddad31c7f9e3, it was introduced in version v2.6.29 by commit 271b72c7fa82c2c7a795bc16896149933110672d. For more details please see the references link. | null | 2022-03-18T03:00:23.238745Z | 2022-03-18T00:29:41.688861Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/271b72c7fa82c2c7a795bc16896149933110672d'} |
Linux | GSD-2022-1001271 | f2fs: fix compressed file start atomic write may cause data corruption | f2fs: fix compressed file start atomic write may cause data corruption
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 9fa8e3e691b344348651d8b1f52666be70138724, it was introduced in version v5.6 by commit 4c8ff7095bef64fc47e996a938f7d57f9e077da3. For more details please see the references link. | null | 2022-04-25T03:41:34.886587Z | 2022-04-24T21:00:06.810033Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4c8ff7095bef64fc47e996a938f7d57f9e077da3'} |
Linux | GSD-2021-1002371 | ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE | ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.292 by commit 7afc6600ba3e2190a798c28898f132025d303d5a, it was introduced in version v3.8 by commit 9c4566a117a6fe404a0e49b27ac71b631945a70f. For more details please see the references link. | null | 2021-12-19T22:16:45.625606Z | 2021-12-19T19:34:21.395972Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9c4566a117a6fe404a0e49b27ac71b631945a70f'} |
Linux | GSD-2022-1000933 | gso: do not skip outer ip header in case of ipip and net_failover | gso: do not skip outer ip header in case of ipip and net_failover
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.269 by commit 7840e559799a08a8588ee6de27516a991cb2e5e7, it was introduced in version v3.13 by commit cb32f511a70be8967ac9025cf49c44324ced9a39. For more details please see the references link. | null | 2022-03-18T02:55:45.875527Z | 2022-03-18T00:34:02.798567Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cb32f511a70be8967ac9025cf49c44324ced9a39'} |
Linux | GSD-2022-1001621 | pinctrl: samsung: drop pin banks references on error paths | pinctrl: samsung: drop pin banks references on error paths
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 04ea05612ef74896ee3371d4ebe2c3747384d5f0, it was introduced in version v3.8 by commit ab663789d69760d2735402f66501f20b60312a3d. For more details please see the references link. | null | 2022-04-25T05:12:39.961742Z | 2022-04-24T21:29:33.960520Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab663789d69760d2735402f66501f20b60312a3d'} |
Linux | GSD-2022-1001334 | drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free() | drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.1 by commit abc9ad36df16e27ac1c665085157f1a082d39bac, it was introduced in version v5.13 by commit 377f8331d0565e6f71ba081c894029a92d0c7e77. For more details please see the references link. | null | 2022-04-25T05:32:45.051943Z | 2022-04-24T21:05:26.782837Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/377f8331d0565e6f71ba081c894029a92d0c7e77'} |
Linux | GSD-2021-1002664 | xen/netfront: harden netfront against event channel storms | xen/netfront: harden netfront against event channel storms
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.222 by commit 3559ca594f15fcd23ed10c0056d40d71e5dab8e5. For more details please see the references link. | null | 2022-01-11T05:53:44.234206Z | 2021-12-27T05:35:09.247173Z | null | null | null | null | null |
Linux | GSD-2021-1000659 | NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() | NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.193 by commit 40f139a6d50c232c0d1fd1c5e65a845c62db0ede, it was introduced in version v4.0 by commit a7d42ddb3099727f58366fa006f850a219cce6c8. For more details please see the references link. | null | 2021-12-20T00:02:51.260766Z | 2021-06-04T19:56:29.739310Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a7d42ddb3099727f58366fa006f850a219cce6c8'} |
Linux | GSD-2022-1000876 | xfrm: fix MTU regression | xfrm: fix MTU regression
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.183 by commit ac858e4462bdc5c589b0c062420c09dab3e579cd, it was introduced in version v4.15 by commit 749439bfac6e1a2932c582e2699f91d329658196. For more details please see the references link. | null | 2022-03-18T03:35:32.759683Z | 2022-03-18T00:27:01.047688Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/749439bfac6e1a2932c582e2699f91d329658196'} |
Linux | GSD-2022-1001764 | KVM: SVM: fix panic on out-of-bounds guest IRQ | KVM: SVM: fix panic on out-of-bounds guest IRQ
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 3fa2d747960521a646fc1aad7aea82e95e139a68. For more details please see the references link. | null | 2022-04-25T04:50:40.025810Z | 2022-04-24T21:41:00.816613Z | null | null | null | null | null |
Linux | GSD-2021-1002234 | cfg80211: call cfg80211_stop_ap when switch from P2P_GO type | cfg80211: call cfg80211_stop_ap when switch from P2P_GO type
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.256 by commit 4e458abbb4a523f1413bfe15c079cf4e24c15b21, it was introduced in version v3.6 by commit ac800140c20e7ae51117e71289065bedd4930fc2. For more details please see the references link. | null | 2021-12-19T22:26:20.809683Z | 2021-11-29T02:34:34.520898Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac800140c20e7ae51117e71289065bedd4930fc2'} |
Linux | GSD-2021-1000209 | netfilter: nftables: Fix a memleak from userdata error path in new objects | netfilter: nftables: Fix a memleak from userdata error path in new objects
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.5 by commit dd3bebf515f336214a91994348a2b86b9a1d3d7f, it was introduced in version v5.10 by commit b131c96496b369c7b14125e7c50e89ac7cec8051. For more details please see the references link. | null | 2021-12-19T23:33:03.660602Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b131c96496b369c7b14125e7c50e89ac7cec8051'} |
Linux | GSD-2022-1000525 | phy: ti: Fix missing sentinel for clk_div_table | phy: ti: Fix missing sentinel for clk_div_table
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 5b0c9569135a37348c1267c81e8b0274b21a86ed, it was introduced in version v5.6 by commit 091876cc355d6739e393efa4b3d07f451a6a035c. For more details please see the references link. | null | 2022-03-07T01:47:04.080249Z | 2022-02-27T03:19:22.191132Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/091876cc355d6739e393efa4b3d07f451a6a035c'} |
Linux | GSD-2021-1001048 | HID: usbhid: fix info leak in hid_submit_ctrl | HID: usbhid: fix info leak in hid_submit_ctrl
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.12 by commit 21883bff0fd854e07429a773ff18f1e9658f50e8. For more details please see the references link. | null | 2021-12-20T00:46:47.187048Z | 2021-06-30T00:36:13.688684Z | null | null | null | null | null |
Linux | GSD-2022-1000175 | ASoC: max9759: fix underflow in speaker_gain_control_put() | ASoC: max9759: fix underflow in speaker_gain_control_put()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.178 by commit 71e60c170105d153e34d01766c1e4db26a4b24cc, it was introduced in version v4.17 by commit fa8d915172b8c10ec0734c4021e99e9705023b07. For more details please see the references link. | null | 2022-02-20T02:17:14.045672Z | 2022-02-18T21:51:10.604853Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fa8d915172b8c10ec0734c4021e99e9705023b07'} |
Linux | GSD-2022-1002148 | llc: only change llc->dev when bind() succeeds | llc: only change llc->dev when bind() succeeds
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.109 by commit 163960a7de1333514c9352deb7c80c6b9fd9abf2, it was introduced in version v5.10.109 by commit 571df3393f523b59cba87e2f3e80a3a624030f9c. For more details please see the references link. | null | 2022-04-24T22:16:10.912337Z | 2022-04-24T22:16:10.912337Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/571df3393f523b59cba87e2f3e80a3a624030f9c'} |
Linux | GSD-2021-1001418 | memory: fsl_ifc: fix leak of IO mapping on probe failure | memory: fsl_ifc: fix leak of IO mapping on probe failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.240 by commit 6b3b002de90738e3c85853a682ce7e0fa078d42b, it was introduced in version v3.3 by commit a20cbdeffce247a2b6fb83cd8d22433994068565. For more details please see the references link. | null | 2021-12-20T01:31:05.571004Z | 2021-08-03T02:35:13.790710Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a20cbdeffce247a2b6fb83cd8d22433994068565'} |
Linux | GSD-2021-1000120 | vhost-vdpa: fix vm_flags for virtqueue doorbell mapping | vhost-vdpa: fix vm_flags for virtqueue doorbell mapping
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.20 by commit 940230a5c31e2714722aee04c521a21f484b4df7, it was introduced in version v5.8 by commit ddd89d0a059d8e9740c75a97e0efe9bf07ee51f9. For more details please see the references link. | null | 2021-12-19T22:41:29.499327Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ddd89d0a059d8e9740c75a97e0efe9bf07ee51f9'} |
Linux | GSD-2021-1000570 | iommu/vt-d: Fix sysfs leak in alloc_iommu() | iommu/vt-d: Fix sysfs leak in alloc_iommu()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit ca466561eef36d1ec657673e3944eb6340bddb5b, it was introduced in version v4.11 by commit 39ab9555c24110671f8dc671311a26e5c985b592. For more details please see the references link. | null | 2021-12-19T23:30:26.606399Z | 2021-06-04T19:40:41.667654Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/39ab9555c24110671f8dc671311a26e5c985b592'} |
Linux | GSD-2022-1002261 | ASoC: soc-compress: prevent the potentially use of null pointer | ASoC: soc-compress: prevent the potentially use of null pointer
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 68a69ad8df959e5211ed4a8e120783b2d352ea74, it was introduced in version v5.4 by commit 467fece8fbc6774a3a3bd0981e1a342fb5022706. For more details please see the references link. | null | 2022-04-25T03:30:48.443486Z | 2022-04-24T22:27:43.032167Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/467fece8fbc6774a3a3bd0981e1a342fb5022706'} |
Linux | GSD-2021-1001731 | KVM: SVM: fix missing sev_decommission in sev_receive_start | KVM: SVM: fix missing sev_decommission in sev_receive_start
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit efd7866e114dcb44f86d151e843f8276b7efbc67, it was introduced in version v5.13 by commit af43cbbf954b50ca97d5e7bb56c2edc6ffd209ef. For more details please see the references link. | null | 2021-12-19T22:52:41.334273Z | 2021-10-19T16:33:54.784609Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/af43cbbf954b50ca97d5e7bb56c2edc6ffd209ef'} |
Linux | GSD-2021-1000823 | x86/kvm: Disable kvmclock on all CPUs on shutdown | x86/kvm: Disable kvmclock on all CPUs on shutdown
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit 1df2dc09926f61319116c80ee85701df33577d70, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T22:34:03.347156Z | 2021-06-25T00:09:37.581210Z | null | null | null | null | null |
Linux | GSD-2021-1000989 | net: hamradio: fix memory leak in mkiss_close | net: hamradio: fix memory leak in mkiss_close
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.46 by commit 290b0b6432e2599021db0b8d6046f756d931c29f, it was introduced in version v2.6.14 by commit 815f62bf742718458ba822a7e1f51f285eb997f2. For more details please see the references link. | null | 2021-12-19T23:25:53.050150Z | 2021-06-30T00:31:40.878430Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/815f62bf742718458ba822a7e1f51f285eb997f2'} |
Linux | GSD-2021-1001361 | media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() | media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.199 by commit ec731c6ef564ee6fc101fc5d73e3a3a953d09a00, it was introduced in version v2.6.34 by commit dae52d009fc950b5c209260d50fcc000f5becd3c. For more details please see the references link. | null | 2021-12-20T00:17:16.638473Z | 2021-08-03T02:18:43.918008Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/dae52d009fc950b5c209260d50fcc000f5becd3c'} |
Linux | GSD-2021-1001674 | staging: greybus: uart: fix tty use after free | staging: greybus: uart: fix tty use after free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.70 by commit b9e697e60ce9890e9258a73eb061288e7d68e5e6, it was introduced in version v4.9 by commit a18e15175708d39abbe9746ddc3479466b7800c3. For more details please see the references link. | null | 2021-12-20T00:22:19.912407Z | 2021-10-19T16:31:14.218182Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a18e15175708d39abbe9746ddc3479466b7800c3'} |
Linux | GSD-2021-1000966 | NFS: Fix use-after-free in nfs4_init_client() | NFS: Fix use-after-free in nfs4_init_client()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.44 by commit c3b6cf64dfe4ef96e7341508d50d6998da7062c7, it was introduced in version v4.13 by commit 8dcbec6d20eb881ba368d0aebc3a8a678aebb1da. For more details please see the references link. | null | 2021-12-19T22:23:59.336288Z | 2021-06-30T00:29:46.043129Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8dcbec6d20eb881ba368d0aebc3a8a678aebb1da'} |
Linux | GSD-2022-1002324 | KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs | KVM: x86/svm: Clear reserved bits written to PerfEvtSeln MSRs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 7f32e8f5fd68216a271d8d5ebb57d0eca88e1bb7, it was introduced in version v4.2 by commit ca724305a2b02abcbecbf22577536fc8e965ab4f. For more details please see the references link. | null | 2022-04-25T04:47:39.033336Z | 2022-04-24T22:34:25.166363Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca724305a2b02abcbecbf22577536fc8e965ab4f'} |
Linux | GSD-2022-1000319 | veth: fix races around rq->rx_notify_masked | veth: fix races around rq->rx_notify_masked
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.230 by commit 8f0ea3777590c16222d4251a49e31dd376ff5ac1, it was introduced in version v4.19 by commit 948d4f214fde43743c57aae0c708bff44f6345f2. For more details please see the references link. | null | 2022-03-07T01:33:44.177270Z | 2022-02-27T02:50:18.294959Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/948d4f214fde43743c57aae0c708bff44f6345f2'} |
Linux | GSD-2021-1001224 | mwifiex: bring down link before deleting interface | mwifiex: bring down link before deleting interface
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.3 by commit 35af69c7c0490fdccfc159c6a87e4d1dc070838a, it was introduced in version v5.12 by commit a05829a7222e9d10c416dd2dbbf3929fe6646b89. For more details please see the references link. | null | 2021-12-19T23:23:21.626546Z | 2021-08-03T01:41:04.092376Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a05829a7222e9d10c416dd2dbbf3929fe6646b89'} |
Linux | GSD-2022-1000749 | ice: fix concurrent reset and removal of VFs | ice: fix concurrent reset and removal of VFs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.12 by commit 2a3e61de89bab6696aa28b70030eb119968c5586, it was introduced in version v5.14 by commit c503e63200c679e362afca7aca9d3dc63a0f45ed. For more details please see the references link. | null | 2022-03-18T03:44:09.890031Z | 2022-03-18T00:15:13.042114Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c503e63200c679e362afca7aca9d3dc63a0f45ed'} |
Linux | GSD-2021-1000065 | sfc: farch: fix TX queue lookup in TX flush done handling | sfc: farch: fix TX queue lookup in TX flush done handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.3 by commit 98d91180748986bfb6dfb3e72765f3225719a647, it was introduced in version v5.10 by commit 12804793b17c0e19115a90d98f2f3df0cb79e233. For more details please see the references link. | null | 2021-12-19T22:30:06.760928Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/12804793b17c0e19115a90d98f2f3df0cb79e233'} |
Linux | GSD-2021-1002058 | ocfs2: fix race between searching chunks and release journal_head from buffer_head | ocfs2: fix race between searching chunks and release journal_head from buffer_head
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.77 by commit 5043fbd294f5909a080ade0f04b70a4da9e122b7. For more details please see the references link. | null | 2021-12-20T00:07:55.416552Z | 2021-11-14T15:17:54.589274Z | null | null | null | null | null |
Linux | GSD-2022-1001508 | net: bcmgenet: Use stronger register read/writes to assure ordering | net: bcmgenet: Use stronger register read/writes to assure ordering
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 1d717816189fd68f9e089cf89ed1f7327d2c2e71, it was introduced in version v4.14 by commit 69d2ea9c798983c4a7157278ec84ff969d1cd8e8. For more details please see the references link. | null | 2022-04-25T04:47:12.075295Z | 2022-04-24T21:18:33.557193Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69d2ea9c798983c4a7157278ec84ff969d1cd8e8'} |
Linux | GSD-2021-1000435 | bus: qcom: Put child node before return | bus: qcom: Put child node before return
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.119 by commit 3a76ec28824c01b57aa1f0927841d75e4f167cb8, it was introduced in version v4.9 by commit 335a127548081322bd2b294d715418648912f20c. For more details please see the references link. | null | 2021-12-19T22:55:15.728930Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/335a127548081322bd2b294d715418648912f20c'} |
Linux | GSD-2021-1002408 | staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() | staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.219 by commit bca19bb2dc2d89ce60c4a4a6e59609d4cf2e13ef, it was introduced in version v3.2 by commit 66898177e7e5486dc77a4ba742efa4e2e9e900a4. For more details please see the references link. | null | 2021-12-19T23:58:50.717775Z | 2021-12-19T19:35:59.394862Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/66898177e7e5486dc77a4ba742efa4e2e9e900a4'} |
Linux | GSD-2022-1001158 | bfq: fix use-after-free in bfq_dispatch_request | bfq: fix use-after-free in bfq_dispatch_request
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 40b4ba0030e0b02cbacd424ebb9f4c8b0976c786. For more details please see the references link. | null | 2022-04-25T05:03:28.429591Z | 2022-04-24T20:49:26.748775Z | null | null | null | null | null |
Linux | GSD-2022-1001637 | drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free() | drm/virtio: Ensure that objs is not NULL in virtio_gpu_array_put_free()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.18 by commit ac92b474eeeed75b8660374ba1d129a121c09da8, it was introduced in version v5.13 by commit 377f8331d0565e6f71ba081c894029a92d0c7e77. For more details please see the references link. | null | 2022-04-25T06:04:04.712853Z | 2022-04-24T21:30:36.932846Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/377f8331d0565e6f71ba081c894029a92d0c7e77'} |
Linux | GSD-2022-1000925 | cifs: fix double free race when mount fails in cifs_get_root() | cifs: fix double free race when mount fails in cifs_get_root()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.270 by commit 147a0e71ccf96df9fc8c2ac500829d8e423ef02c. For more details please see the references link. | null | 2022-03-18T02:55:09.938742Z | 2022-03-18T00:32:38.107703Z | null | null | null | null | null |
Linux | GSD-2021-1002367 | iio: mma8452: Fix trigger reference couting | iio: mma8452: Fix trigger reference couting
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.295 by commit 094d513b78b1714113bc016684b8142382e071ba, it was introduced in version v4.2 by commit ae6d9ce05691bf79694074db7c7da980080548af. For more details please see the references link. | null | 2021-12-20T01:09:28.449108Z | 2021-12-19T19:34:11.375369Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ae6d9ce05691bf79694074db7c7da980080548af'} |
Linux | GSD-2022-1001267 | soc: qcom: rpmpd: Check for null return of devm_kcalloc | soc: qcom: rpmpd: Check for null return of devm_kcalloc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 31b5124d742969ea8bf7a1360596f548ca23e770, it was introduced in version v5.1 by commit bbe3a66c3f5a65fb3d702351bac2a6033944d389. For more details please see the references link. | null | 2022-04-25T03:52:40.355357Z | 2022-04-24T20:59:37.907669Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bbe3a66c3f5a65fb3d702351bac2a6033944d389'} |
Linux | GSD-2021-1002737 | dm btree remove: fix use after free in rebalance_children() | dm btree remove: fix use after free in rebalance_children()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit 607beb420b3fe23b948a9bf447d993521a02fbbb. For more details please see the references link. | null | 2022-01-11T05:51:18.506873Z | 2021-12-27T05:45:40.661178Z | null | null | null | null | null |
Linux | GSD-2021-1001818 | audit: fix possible null-pointer dereference in audit_filter_rules | audit: fix possible null-pointer dereference in audit_filter_rules
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.156 by commit d6f451f1f60c58d73038c7c3177066f8f084e2a2, it was introduced in version v5.3 by commit bf361231c295d92a28ca283ea713f56e93e55796. For more details please see the references link. | null | 2021-12-20T01:28:16.590732Z | 2021-10-28T13:50:32.123040Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf361231c295d92a28ca283ea713f56e93e55796'} |
Linux | GSD-2022-1000026 | i2c: validate user data in compat ioctl | i2c: validate user data in compat ioctl
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.224 by commit 407c8708fb1bf2d4afc5337ef50635cf540c364b, it was introduced in version v4.15 by commit 7d5cb45655f2e9e37ef75d18f50c0072ef14a38b. For more details please see the references link. | null | 2022-01-11T05:47:07.186556Z | 2022-01-10T19:50:42.959386Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7d5cb45655f2e9e37ef75d18f50c0072ef14a38b'} |
Linux | GSD-2022-1000476 | lockdep: Correct lock_classes index mapping | lockdep: Correct lock_classes index mapping
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit 5dcc365697340599b7ef63a9352fcea890f0e78b, it was introduced in version v5.10 by commit f611e8cf98ec908b9c2c0da6064a660fc6022487. For more details please see the references link. | null | 2022-03-07T01:52:35.689873Z | 2022-02-27T03:12:21.936195Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f611e8cf98ec908b9c2c0da6064a660fc6022487'} |
Linux | GSD-2022-1000499 | arm64: errata: Add detection for TRBE trace data corruption | arm64: errata: Add detection for TRBE trace data corruption
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit aff260ffbaa3c45df62e56ec7e543698039ae237. For more details please see the references link. | null | 2022-03-07T01:36:37.224925Z | 2022-02-27T03:15:36.585048Z | null | null | null | null | null |
Linux | GSD-2022-1000163 | net: amd-xgbe: Fix skb data length underflow | net: amd-xgbe: Fix skb data length underflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.177 by commit 9892742f035f7aa7dcd2bb0750effa486db89576, it was introduced in version v4.11 by commit 622c36f143fc9566ba49d7cec994c2da1182d9e2. For more details please see the references link. | null | 2022-02-19T03:17:26.823951Z | 2022-02-18T21:49:03.802153Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/622c36f143fc9566ba49d7cec994c2da1182d9e2'} |
Linux | GSD-2022-1000533 | iommu: Fix potential use-after-free during probe | iommu: Fix potential use-after-free during probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit f74fc4b5bd533ea3d30ce47cccb8ef8d21fda85a. For more details please see the references link. | null | 2022-03-07T01:35:55.263858Z | 2022-02-27T03:20:16.643911Z | null | null | null | null | null |
Linux | GSD-2022-1001288 | samples/landlock: Fix path_list memory leak | samples/landlock: Fix path_list memory leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 017196730299ccd6eed24bbfabed8af4ffd81530. For more details please see the references link. | null | 2022-04-25T04:42:52.177602Z | 2022-04-24T21:01:31.995005Z | null | null | null | null | null |
Linux | GSD-2021-1002222 | scsi: advansys: Fix kernel pointer leak | scsi: advansys: Fix kernel pointer leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.293 by commit 06d7d12efb5c62db9dea15141ae2b322c2719515. For more details please see the references link. | null | 2021-12-20T01:16:26.153703Z | 2021-11-29T02:34:06.086560Z | null | null | null | null | null |
Linux | GSD-2022-1001772 | scsi: qla2xxx: Fix warning message due to adisc being flushed | scsi: qla2xxx: Fix warning message due to adisc being flushed
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 7a3457777c4f700c64836e78dc71e6ce459f62b8. For more details please see the references link. | null | 2022-04-25T04:50:27.577638Z | 2022-04-24T21:41:32.048598Z | null | null | null | null | null |
Linux | GSD-2022-1000860 | openvswitch: Fix setting ipv6 fields causing hw csum failure | openvswitch: Fix setting ipv6 fields causing hw csum failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.103 by commit 1df9d552fe84bb7d7a6a361b5bb8a9273f9f799d, it was introduced in version v3.8 by commit 3fdbd1ce11e5c0d7cafbe44c942c5cad61113d7b. For more details please see the references link. | null | 2022-03-18T02:50:23.481262Z | 2022-03-18T00:25:25.876619Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3fdbd1ce11e5c0d7cafbe44c942c5cad61113d7b'} |
Linux | GSD-2021-1002672 | sch_cake: do not call cake_destroy() from cake_init() | sch_cake: do not call cake_destroy() from cake_init()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.168 by commit 0d80462fbdcafd536dcad7569e65d3d14a7e9f2f, it was introduced in version v4.19 by commit 046f6fd5daefac7f5abdafb436b30f63bc7c602b. For more details please see the references link. | null | 2022-01-11T05:57:58.073080Z | 2021-12-27T05:36:05.285742Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/046f6fd5daefac7f5abdafb436b30f63bc7c602b'} |
Linux | GSD-2021-1002388 | ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE | ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.257 by commit 25bd60b9f6e820e317c0c4fb6a2451a748d6ef58, it was introduced in version v3.8 by commit 9c4566a117a6fe404a0e49b27ac71b631945a70f. For more details please see the references link. | null | 2021-12-19T22:36:28.591037Z | 2021-12-19T19:35:09.954428Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9c4566a117a6fe404a0e49b27ac71b631945a70f'} |
Linux | GSD-2022-1001322 | iio: accel: mma8452: use the correct logic to get mma8452_data | iio: accel: mma8452: use the correct logic to get mma8452_data
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit d2d9ebdbff79d87d27652578e6d1638ad3b5f3bf, it was introduced in version v4.4 by commit c3cdd6e48e35b7a02f28e301ef30a87ff3cd6527. For more details please see the references link. | null | 2022-04-25T06:40:42.154986Z | 2022-04-24T21:04:30.272937Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c3cdd6e48e35b7a02f28e301ef30a87ff3cd6527'} |
Linux | GSD-2021-1001377 | net: qcom/emac: fix UAF in emac_remove | net: qcom/emac: fix UAF in emac_remove
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.199 by commit 11e9d163d631198bb3eb41a677a61b499516c0f7, it was introduced in version v4.9 by commit 54e19bc74f3380d414681762ceed9f7245bc6a6e. For more details please see the references link. | null | 2021-12-19T23:53:14.957770Z | 2021-08-03T02:23:46.473229Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/54e19bc74f3380d414681762ceed9f7245bc6a6e'} |
Linux | GSD-2022-1001908 | mm/kmemleak: reset tag when compare object pointer | mm/kmemleak: reset tag when compare object pointer
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 7d3bd683e0849f0ec52fefa8070734dedc3b33a1. For more details please see the references link. | null | 2022-04-25T05:31:49.429991Z | 2022-04-24T21:53:45.211150Z | null | null | null | null | null |
Linux | GSD-2021-1002808 | platform/x86: intel_pmc_core: fix memleak on registration failure | platform/x86: intel_pmc_core: fix memleak on registration failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.89 by commit 7a37f2e370699e2feca3dca6c8178c71ceee7e8a, it was introduced in version v5.9 by commit 938835aa903ae19ad62805134f79bbcf20fc3bea. For more details please see the references link. | null | 2022-01-11T05:52:54.331704Z | 2021-12-30T02:44:21.371312Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/938835aa903ae19ad62805134f79bbcf20fc3bea'} |
Linux | GSD-2021-1000835 | net/nfc/rawsock.c: fix a permission check bug | net/nfc/rawsock.c: fix a permission check bug
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.273 by commit d6a21a3fb03300fbaa9fc3ed99f8b0962ce28362. For more details please see the references link. | null | 2021-12-19T22:23:31.702844Z | 2021-06-30T00:00:20.832825Z | null | null | null | null | null |
Linux | GSD-2021-1001727 | RDMA/cma: Fix listener leak in rdma_cma_listen_on_all() failure | RDMA/cma: Fix listener leak in rdma_cma_listen_on_all() failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit e56a5146ef8cb51cd7c9e748267dce7564448a35, it was introduced in version v5.11 by commit c80a0c52d85c49a910d0dc0e342e8d8898677dc0. For more details please see the references link. | null | 2021-12-20T01:33:15.214820Z | 2021-10-19T16:33:44.543635Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c80a0c52d85c49a910d0dc0e342e8d8898677dc0'} |
Linux | GSD-2022-1002277 | NFSD: prevent underflow in nfssvc_decode_writeargs() | NFSD: prevent underflow in nfssvc_decode_writeargs()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 85259340fc9bd54e3d567b41b881ecb4d0055da1. For more details please see the references link. | null | 2022-04-25T06:30:54.846272Z | 2022-04-24T22:29:29.732502Z | null | null | null | null | null |
Linux | GSD-2021-1000566 | misc/uss720: fix memory leak in uss720_probe | misc/uss720: fix memory leak in uss720_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit a3c3face38cb49932c62adcc1289914f1c742096, it was introduced in version v2.6.14 by commit 0f36163d3abefbda1b21a330b3fdf3c2dc076d94. For more details please see the references link. | null | 2021-12-19T23:43:54.256594Z | 2021-06-04T19:40:08.343292Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0f36163d3abefbda1b21a330b3fdf3c2dc076d94'} |
Linux | GSD-2021-1000136 | media: staging/intel-ipu3: Fix memory leak in imu_fmt | media: staging/intel-ipu3: Fix memory leak in imu_fmt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.36 by commit 517f6f570566a863c2422b843c8b7d099474f6a9, it was introduced in version v5.2 by commit 6d5f26f2e045f2377b524516194657c00efbbce8. For more details please see the references link. | null | 2021-12-19T23:15:16.266996Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6d5f26f2e045f2377b524516194657c00efbbce8'} |
Linux | GSD-2021-1000423 | RDMA/qedr: Fix error return code in qedr_iw_connect() | RDMA/qedr: Fix error return code in qedr_iw_connect()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.119 by commit 53656a2a01834e3d90fb2813ae5c82febcb96218, it was introduced in version v5.4.45 by commit 8a69220b659c31ccd481538193220d732814b324. For more details please see the references link. | null | 2021-12-19T23:46:50.373861Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8a69220b659c31ccd481538193220d732814b324'} |
Linux | GSD-2021-1000589 | net: fujitsu: fix potential null-ptr-deref | net: fujitsu: fix potential null-ptr-deref
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.42 by commit 71723a796ab7881f491d663c6cd94b29be5fba50, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T23:01:15.001820Z | 2021-06-04T19:43:26.108045Z | null | null | null | null | null |
Linux | GSD-2021-1000073 | btrfs: fix race between transaction aborts and fsyncs leading to use-after-free | btrfs: fix race between transaction aborts and fsyncs leading to use-after-free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.3 by commit e2da98788369bfba1138bada72765c47989a4338, it was introduced in version v5.7 by commit ef67963dac255b293e19815ea3d440567be4626f. For more details please see the references link. | null | 2021-12-19T23:11:28.792380Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef67963dac255b293e19815ea3d440567be4626f'} |
Linux | GSD-2021-1001232 | atm: nicstar: Fix possible use-after-free in nicstar_cleanup() | atm: nicstar: Fix possible use-after-free in nicstar_cleanup()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.3 by commit 5b991df8881088448cb223e769e37cab8dd40706. For more details please see the references link. | null | 2021-12-20T00:16:16.974656Z | 2021-08-03T01:43:50.117777Z | null | null | null | null | null |
Linux | GSD-2022-1002298 | gpiolib: acpi: use correct format characters | gpiolib: acpi: use correct format characters
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.239 by commit 38b0bd0f251010073efb3fc37a708ae9079bb332, it was introduced in version v4.14 by commit e40a3ae1f794a35c4af3746291ed6fedc1fa0f6f. For more details please see the references link. | null | 2022-04-25T06:40:52.714631Z | 2022-04-24T22:31:41.312898Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e40a3ae1f794a35c4af3746291ed6fedc1fa0f6f'} |
Linux | GSD-2022-1002332 | video: fbdev: sm712fb: Fix crash in smtcfb_write() | video: fbdev: sm712fb: Fix crash in smtcfb_write()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 1aea36a62f0a0ad67eccc945bac0bd6422ef720f. For more details please see the references link. | null | 2022-04-25T03:34:38.600344Z | 2022-04-24T22:35:22.621724Z | null | null | null | null | null |
Linux | GSD-2021-1001398 | mISDN: fix possible use-after-free in HFC_cleanup() | mISDN: fix possible use-after-free in HFC_cleanup()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.198 by commit 5f2818185da0fe82a932f0856633038b66faf124. For more details please see the references link. | null | 2021-12-19T22:31:15.011223Z | 2021-08-03T02:28:40.172023Z | null | null | null | null | null |
Linux | GSD-2021-1000970 | drm/tegra: sor: Do not leak runtime PM reference | drm/tegra: sor: Do not leak runtime PM reference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.45 by commit 570b3e4020f2aa7ab6908042e7f3a41ab24ce261. For more details please see the references link. | null | 2021-12-19T22:04:22.302759Z | 2021-06-30T00:30:01.228183Z | null | null | null | null | null |
Linux | GSD-2021-1001662 | blk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd | blk-cgroup: fix UAF by grabbing blkcg lock before destroying blkg pd
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.70 by commit f58d305887ad7b24986d58e881f6806bb81b2bdf. For more details please see the references link. | null | 2021-12-19T22:43:05.378699Z | 2021-10-19T16:30:34.897226Z | null | null | null | null | null |
Linux | GSD-2022-1000421 | riscv: eliminate unreliable __builtin_frame_address(1) | riscv: eliminate unreliable __builtin_frame_address(1)
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit 71f46f3d1bf29ee5b0a53dc21462125f754491dd, it was introduced in version v5.13 by commit eac2f3059e02382d91f8c887462083841d6ea2a3. For more details please see the references link. | null | 2022-03-07T01:43:34.326295Z | 2022-02-27T03:04:38.144230Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/eac2f3059e02382d91f8c887462083841d6ea2a3'} |
Linux | GSD-2021-1002760 | media: mxl111sf: change mutex_init() location | media: mxl111sf: change mutex_init() location
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit 8c6fdf62bfe1bc72bfceeaf832ef7499c7ed09ba, it was introduced in version v3.7 by commit 8572211842afc53c8450fb470f2b8d02ba7592e0. For more details please see the references link. | null | 2022-01-11T06:47:17.813521Z | 2021-12-27T05:49:19.993169Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8572211842afc53c8450fb470f2b8d02ba7592e0'} |
Linux | GSD-2022-1001230 | rtw88: fix use after free in rtw_hw_scan_update_probe_req() | rtw88: fix use after free in rtw_hw_scan_update_probe_req()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit d9fb80ad781e28b332df8c10b0511e9ca856e55d, it was introduced in version v5.17.2 by commit ec5da191bfcd5fd22b95459b623694f66c1cc10b. For more details please see the references link. | null | 2022-04-24T20:56:03.572304Z | 2022-04-24T20:56:03.572304Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ec5da191bfcd5fd22b95459b623694f66c1cc10b'} |
Linux | GSD-2021-1002330 | f2fs: fix incorrect return value in f2fs_sanity_check_ckpt() | f2fs: fix incorrect return value in f2fs_sanity_check_ckpt()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit 680a0c6332c48df1b900b3c535e920e7cc453b7e, it was introduced in version v5.15 by commit 65ddf6564843890a58ee3b18bb46ce67d96333fb. For more details please see the references link. | null | 2021-12-19T23:43:18.528133Z | 2021-11-29T02:39:00.870181Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/65ddf6564843890a58ee3b18bb46ce67d96333fb'} |
Linux | GSD-2022-1001660 | net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link | net: ethernet: stmmac: fix altr_tse_pcs function when using a fixed-link
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.35 by commit 62a48383ebe2e159fd68425dd3e16d4c6bd6599a, it was introduced in version v4.8 by commit fb3bbdb859891e6bc27fd1afb3a07319f82c2ee4. For more details please see the references link. | null | 2022-04-25T04:31:18.962834Z | 2022-04-24T21:32:39.080736Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb3bbdb859891e6bc27fd1afb3a07319f82c2ee4'} |
Linux | GSD-2022-1000972 | scsi: lpfc: Fix unload hang after back to back PCI EEH faults | scsi: lpfc: Fix unload hang after back to back PCI EEH faults
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.4 by commit d0b040c2297c13bd2b00a84556dd6104771dc171. For more details please see the references link. | null | 2022-04-25T06:50:05.465045Z | 2022-04-24T20:36:05.426710Z | null | null | null | null | null |
Linux | GSD-2022-1001375 | drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire() | drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 946c33fefcb9dd0c2c820ef9c3fe91a45401d321, it was introduced in version v4.13 by commit 71c37505e7eaa01fa259debad1a71a7ae061039d. For more details please see the references link. | null | 2022-04-25T06:56:15.768955Z | 2022-04-24T21:09:03.783957Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/71c37505e7eaa01fa259debad1a71a7ae061039d'} |
Linux | GSD-2021-1000618 | gve: Add NULL pointer checks when freeing irqs. | gve: Add NULL pointer checks when freeing irqs.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.124 by commit 821149ee88c206fa37e79c1868cc270518484876, it was introduced in version v5.3 by commit 893ce44df56580fb878ca5af9c4a5fd87567da50. For more details please see the references link. | null | 2021-12-20T00:02:44.754576Z | 2021-06-04T19:48:28.208456Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/893ce44df56580fb878ca5af9c4a5fd87567da50'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.