ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2022-1002092 | drm/msm/dp: populate connector of struct dp_panel | drm/msm/dp: populate connector of struct dp_panel
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 413c62697b61226a236c8b1f5cd64dcf42bcc12f, it was introduced in version v5.10.67 by commit f86bc4a1a401d3691bad41e67f9db0c2ea94da32. For more details please see the references link. | null | 2022-04-25T04:19:37.044846Z | 2022-04-24T22:10:11.868193Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f86bc4a1a401d3691bad41e67f9db0c2ea94da32'} |
Linux | GSD-2021-1001038 | ASoC: core: Fix Null-point-dereference in fmt_single_name() | ASoC: core: Fix Null-point-dereference in fmt_single_name()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.11 by commit 047fd16015a79180771650aa6ce71f68b2c23368, it was introduced in version v5.10 by commit 45dd9943fce08f1b38352ff9453682253bdf19b7. For more details please see the references link. | null | 2021-12-20T00:54:53.038013Z | 2021-06-30T00:35:36.041380Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/45dd9943fce08f1b38352ff9453682253bdf19b7'} |
Linux | GSD-2022-1000040 | net: fix use-after-free in tw_timer_handler | net: fix use-after-free in tw_timer_handler
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.90 by commit 2386e81a1d277f540e1285565c9d41d531bb69d4, it was introduced in version v2.6.27 by commit 61a7e26028b94805fd686a6dc9dbd9941f8f19b0. For more details please see the references link. | null | 2022-01-11T05:48:40.166658Z | 2022-01-10T19:51:26.340639Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61a7e26028b94805fd686a6dc9dbd9941f8f19b0'} |
Linux | GSD-2021-1001487 | RDMA/cma: Fix rdma_resolve_route() memory leak | RDMA/cma: Fix rdma_resolve_route() memory leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.276 by commit 40b613db3a95bc27998e4097d74c2f7e5d083a0b. For more details please see the references link. | null | 2021-12-19T23:28:43.981472Z | 2021-08-03T02:56:16.126766Z | null | null | null | null | null |
Linux | GSD-2022-1000410 | can: isotp: fix potential CAN frame reception race in isotp_rcv() | can: isotp: fix potential CAN frame reception race in isotp_rcv()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit f90cc68f9f4b5d8585ad5d0a206a9d37ac299ef3, it was introduced in version v5.10 by commit e057dd3fc20ffb3d7f150af46542a51b59b90127. For more details please see the references link. | null | 2022-03-07T01:37:43.840912Z | 2022-02-27T03:02:43.774945Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e057dd3fc20ffb3d7f150af46542a51b59b90127'} |
Linux | GSD-2021-1002301 | scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq() | scsi: lpfc: Fix list_add() corruption in lpfc_drain_txq()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.82 by commit c097bd5a59162156d9c2077a2f58732ffbaa9fca. For more details please see the references link. | null | 2021-12-19T22:21:41.871082Z | 2021-11-29T02:37:42.860520Z | null | null | null | null | null |
Linux | GSD-2022-1000943 | ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min | ASoC: ops: Shift tested values in snd_soc_put_volsw() by +min
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.305 by commit 69f42e41256d5a234d3ae0d35fa66dc6d8171846, it was introduced in version v4.9.300 by commit 40f598698129b5ceaf31012f9501b775c7b6e57d. For more details please see the references link. | null | 2022-03-18T02:49:33.103812Z | 2022-03-18T00:34:59.008162Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/40f598698129b5ceaf31012f9501b775c7b6e57d'} |
Linux | GSD-2022-1001651 | drivers: net: slip: fix NPD bug in sl_tx_timeout() | drivers: net: slip: fix NPD bug in sl_tx_timeout()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.35 by commit efb020924a71391fc12e6f204eaf25694cc116a1. For more details please see the references link. | null | 2022-04-25T04:46:50.331798Z | 2022-04-24T21:31:47.108492Z | null | null | null | null | null |
Linux | GSD-2021-1002751 | net/packet: rx_owner_map depends on pg_vec | net/packet: rx_owner_map depends on pg_vec
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit feb116a0ecc5625d6532c616d9a10ef4ef81514b, it was introduced in version v5.6 by commit 61fad6816fc10fb8793a925d5c1256d1c3db0cd2. For more details please see the references link. | null | 2022-01-11T05:58:43.675573Z | 2021-12-27T05:47:01.747975Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61fad6816fc10fb8793a925d5c1256d1c3db0cd2'} |
Linux | GSD-2021-1000296 | KVM: Stop looking for coalesced MMIO zones if the bus is destroyed | KVM: Stop looking for coalesced MMIO zones if the bus is destroyed
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 50cbad42bfea8c052b7ca590bd4126cdc898713c, it was introduced in version v5.9 by commit f65886606c2d3b562716de030706dfe1bea4ed5e. For more details please see the references link. | null | 2021-12-20T00:48:50.472776Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f65886606c2d3b562716de030706dfe1bea4ed5e'} |
Linux | GSD-2022-1001201 | drm/amd/display: Fix double free during GPU reset on DC streams | drm/amd/display: Fix double free during GPU reset on DC streams
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit bbfcdd6289ba6f00f0cd7d496946dce9f6c600ac, it was introduced in version v5.17 by commit 6d63fcc2a334f7bd15e4e9b1db50a19335d2af4f. For more details please see the references link. | null | 2022-04-25T04:17:58.873083Z | 2022-04-24T20:53:14.377199Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6d63fcc2a334f7bd15e4e9b1db50a19335d2af4f'} |
Linux | GSD-2021-1001254 | scsi: libfc: Fix array index out of bound exception | scsi: libfc: Fix array index out of bound exception
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.53 by commit a4a54c54af2516caa9c145015844543cfc84316a. For more details please see the references link. | null | 2021-12-19T22:03:14.867616Z | 2021-08-03T01:49:23.268934Z | null | null | null | null | null |
Linux | GSD-2022-1000739 | net/smc: Use a mutex for locking "struct smc_pnettable" | net/smc: Use a mutex for locking "struct smc_pnettable"
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.12 by commit 8507fba18161ef1cab9e627f44b9bb22da29f7e8, it was introduced in version v5.1 by commit 64e28b52c7a6616217bee67ba2ad886f478f9737. For more details please see the references link. | null | 2022-03-18T03:01:09.785705Z | 2022-03-18T00:14:14.221508Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/64e28b52c7a6616217bee67ba2ad886f478f9737'} |
Linux | GSD-2021-1001604 | hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field | hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.151 by commit 6cb01fe630eaffc5a2c3f7364436caddba286623. For more details please see the references link. | null | 2021-12-19T22:44:10.625593Z | 2021-10-19T16:27:52.489528Z | null | null | null | null | null |
Linux | GSD-2021-1000916 | net: rds: fix memory leak in rds_recvmsg | net: rds: fix memory leak in rds_recvmsg
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.128 by commit 2038cd15eacdf7512755c27686822e0052eb9042, it was introduced in version v2.6.30 by commit bdbe6fbc6a2f2ccfb384b141b257677d2a8d36fb. For more details please see the references link. | null | 2021-12-20T00:27:53.640651Z | 2021-06-30T00:24:19.404945Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bdbe6fbc6a2f2ccfb384b141b257677d2a8d36fb'} |
Linux | GSD-2022-1000693 | iommu/amd: Fix I/O page table memory leak | iommu/amd: Fix I/O page table memory leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.13 by commit c78627f757e37c2cf386b59c700c4e1574988597, it was introduced in version v5.12 by commit e42ba0633064ef23eb1c8c21edf96bac1541bd4b. For more details please see the references link. | null | 2022-03-18T02:59:47.736320Z | 2022-03-18T00:09:58.619127Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e42ba0633064ef23eb1c8c21edf96bac1541bd4b'} |
Linux | GSD-2022-1001981 | net: ipv4: fix route with nexthop object delete warning | net: ipv4: fix route with nexthop object delete warning
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit 63ea57478aaa3e06a597081a0f537318fc04e49f, it was introduced in version v5.3 by commit 4c7e8084fd467ddb2b0e6c6011f9c1064afb7e56. For more details please see the references link. | null | 2022-04-25T06:13:45.266416Z | 2022-04-24T22:00:45.882073Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4c7e8084fd467ddb2b0e6c6011f9c1064afb7e56'} |
Linux | GSD-2022-1000369 | net: dsa: ar9331: register the mdiobus under devres | net: dsa: ar9331: register the mdiobus under devres
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.101 by commit 475ce5dcf2d88fd4f3c213a0ac944e3e40702970, it was introduced in version v5.9 by commit ac3a68d56651c3dad2c12c7afce065fe15267f44. For more details please see the references link. | null | 2022-03-07T01:53:01.235723Z | 2022-02-27T02:57:22.241251Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac3a68d56651c3dad2c12c7afce065fe15267f44'} |
Linux | GSD-2022-1002354 | ext2: correct max file size computing | ext2: correct max file size computing
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 6e073baf1934440c73bfe69e8c66caa84051acd1, it was introduced in version v4.19.31 by commit 62600af3a7cb11d20439f745451db96bde7ff08c. For more details please see the references link. | null | 2022-04-25T03:35:07.617561Z | 2022-04-24T22:37:40.568160Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/62600af3a7cb11d20439f745451db96bde7ff08c'} |
Linux | GSD-2021-1002478 | net: vlan: fix underflow for the real_dev refcnt | net: vlan: fix underflow for the real_dev refcnt
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.83 by commit 6e800ee43218a56acc93676bbb3d93b74779e555, it was introduced in version v5.10.80 by commit e04a7a84bb77f9cdf4475340fe931389bc72331c. For more details please see the references link. | null | 2021-12-19T23:35:05.605320Z | 2021-12-19T19:39:08.731202Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e04a7a84bb77f9cdf4475340fe931389bc72331c'} |
Linux | GSD-2021-1000445 | hfsplus: prevent corruption in shrinking truncate | hfsplus: prevent corruption in shrinking truncate
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.191 by commit 52dde855663e5db824af51db39b5757d2ef3e28a, it was introduced in version v4.19 by commit 31651c607151f1034cfb57e5a78678bea54c362b. For more details please see the references link. | null | 2021-12-19T23:16:59.102458Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/31651c607151f1034cfb57e5a78678bea54c362b'} |
Linux | GSD-2022-1001128 | scsi: qla2xxx: Fix crash during module load unload test | scsi: qla2xxx: Fix crash during module load unload test
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 67f744f73eba870ab96411d0310e831a4adc3713, it was introduced in version v5.9 by commit 62e9dd177732843ae6c5b9d2ed61e7c9538fa276. For more details please see the references link. | null | 2022-04-25T06:46:14.844749Z | 2022-04-24T20:47:47.136187Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/62e9dd177732843ae6c5b9d2ed61e7c9538fa276'} |
Linux | GSD-2021-1002182 | isdn: cpai: check ctr->cnr to avoid array index out of bound | isdn: cpai: check ctr->cnr to avoid array index out of bound
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 1f3e2e97c003f80c4b087092b225c8787ff91e4d. For more details please see the references link. | null | 2021-12-20T01:00:01.670006Z | 2021-11-14T15:23:33.614941Z | null | null | null | null | null |
Linux | GSD-2021-1002028 | drm/msm: Avoid potential overflow in timeout_to_jiffies() | drm/msm: Avoid potential overflow in timeout_to_jiffies()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.75 by commit e7e3ed5c92b6b7255f19605b56de2bf7a0f2f7db, it was introduced in version v5.6 by commit 6cedb8b377bba6520508399b74754b9a0ca06edf. For more details please see the references link. | null | 2021-12-20T01:04:34.854602Z | 2021-11-14T15:16:33.811163Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6cedb8b377bba6520508399b74754b9a0ca06edf'} |
Linux | GSD-2021-1000015 | netfilter: nftables: clone set element expression template | netfilter: nftables: clone set element expression template
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.16 by commit 47d8de3c226574a3ddb8b87d0c152028d1bafef4, it was introduced in version v5.7 by commit 4094445229760d0d31a4190dfe88fe815c9fc34e. For more details please see the references link. | null | 2021-12-20T00:15:04.522231Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4094445229760d0d31a4190dfe88fe815c9fc34e'} |
Linux | GSD-2022-1001082 | Bluetooth: hci_sync: Fix queuing commands when HCI_UNREGISTER is set | Bluetooth: hci_sync: Fix queuing commands when HCI_UNREGISTER is set
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 1c69ef84a808676cceb69210addf5df45b741323. For more details please see the references link. | null | 2022-04-25T05:38:46.272104Z | 2022-04-24T20:44:00.356683Z | null | null | null | null | null |
Linux | GSD-2022-1001578 | f2fs: fix missing free nid in f2fs_handle_failed_inode | f2fs: fix missing free nid in f2fs_handle_failed_inode
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit aa80bf73e3b3fb7026d343c77b3ddc849e26a095, it was introduced in version v4.19 by commit 7735730d39d75e70476c1b01435b9b1f41637f0e. For more details please see the references link. | null | 2022-04-25T05:07:56.297981Z | 2022-04-24T21:25:41.211224Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7735730d39d75e70476c1b01435b9b1f41637f0e'} |
Linux | GSD-2021-1000500 | scsi: qedf: Add pointer checks in qedf_update_link_speed() | scsi: qedf: Add pointer checks in qedf_update_link_speed()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.7 by commit 11014efcec378bb0050a6cf08eaf375e3693400a, it was introduced in version v4.11 by commit 61d8658b4a435eac729966cc94cdda077a8df5cd. For more details please see the references link. | null | 2021-12-20T00:17:39.848061Z | 2021-05-31T23:46:49.371617Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61d8658b4a435eac729966cc94cdda077a8df5cd'} |
Linux | GSD-2022-1001597 | mmc: core: use sysfs_emit() instead of sprintf() | mmc: core: use sysfs_emit() instead of sprintf()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 659ca56b5415c7a1d05e185c36fad80ba165d063. For more details please see the references link. | null | 2022-04-25T06:46:56.711676Z | 2022-04-24T21:27:16.381506Z | null | null | null | null | null |
Linux | GSD-2021-1002497 | net/smc: fix wrong list_del in smc_lgr_cleanup_early | net/smc: fix wrong list_del in smc_lgr_cleanup_early
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.84 by commit 77731fede297a23d26f2d169b4269466b2c82529, it was introduced in version v5.5 by commit a0a62ee15a829ebf8aeec55a4f1688230439b3e0. For more details please see the references link. | null | 2021-12-20T01:24:43.042221Z | 2021-12-19T19:39:55.217567Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a0a62ee15a829ebf8aeec55a4f1688230439b3e0'} |
Linux | GSD-2021-1000150 | irqchip/gic-v3: Do not enable irqs when handling spurious interrups | irqchip/gic-v3: Do not enable irqs when handling spurious interrups
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.36 by commit 7be4db5c2b59fa77071c93ca4329876fb9777202, it was introduced in version v5.1 by commit 3f1f3234bc2db1c16b9818b9a15a5d58ad45251c. For more details please see the references link. | null | 2021-12-19T22:56:32.709060Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f1f3234bc2db1c16b9818b9a15a5d58ad45251c'} |
Linux | GSD-2021-1001311 | net: sched: fix memory leak in tcindex_partial_destroy_work | net: sched: fix memory leak in tcindex_partial_destroy_work
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.136 by commit 8d7924ce85bae64e7a67c366c7c50840f49f3a62, it was introduced in version v3.18 by commit 8332904aa971ed4547514f57c8b3780ad4f0f949. For more details please see the references link. | null | 2021-12-20T00:26:32.164722Z | 2021-08-03T02:05:14.166765Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8332904aa971ed4547514f57c8b3780ad4f0f949'} |
Linux | GSD-2022-1000386 | iommu: Fix potential use-after-free during probe | iommu: Fix potential use-after-free during probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.101 by commit cb86e511e78e796de6947b8f3acca1b7c76fb2ff. For more details please see the references link. | null | 2022-03-07T01:39:56.900282Z | 2022-02-27T02:59:58.907621Z | null | null | null | null | null |
Linux | GSD-2022-1002211 | KVM: x86/mmu: do compare-and-exchange of gPTE via the user address | KVM: x86/mmu: do compare-and-exchange of gPTE via the user address
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 1553126eccf4fad17afaeaed08db9e5944aa2d55, it was introduced in version v5.2 by commit bd53cb35a3e9adb73a834a36586e9ad80e877767. For more details please see the references link. | null | 2022-04-25T04:18:11.749444Z | 2022-04-24T22:22:22.311730Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bd53cb35a3e9adb73a834a36586e9ad80e877767'} |
Linux | GSD-2021-1001741 | s390/qeth: Fix deadlock in remove_discipline | s390/qeth: Fix deadlock in remove_discipline
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit 0184084365c4d0a99ddd2ab1e1d8dbf9fd3c4714, it was introduced in version v5.11 by commit b41b554c1ee75070a14c02a88496b1f231c7eacc. For more details please see the references link. | null | 2021-12-19T22:46:19.668973Z | 2021-10-19T16:34:27.851255Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b41b554c1ee75070a14c02a88496b1f231c7eacc'} |
Linux | GSD-2021-1000853 | wq: handle VM suspension in stall detection | wq: handle VM suspension in stall detection
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.237 by commit ec32c8aee92a2750557c504eed3a04fe0500a725. For more details please see the references link. | null | 2021-12-19T23:45:15.398194Z | 2021-06-30T00:01:28.420401Z | null | null | null | null | null |
Linux | GSD-2022-1002084 | ath10k: Fix error handling in ath10k_setup_msa_resources | ath10k: Fix error handling in ath10k_setup_msa_resources
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 315772133a4b960859e4f5efe0e738e347188cdc, it was introduced in version v5.8 by commit 727fec790ead3d75e2735f66209949c2163523ea. For more details please see the references link. | null | 2022-04-25T05:09:14.173056Z | 2022-04-24T22:09:09.551828Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/727fec790ead3d75e2735f66209949c2163523ea'} |
Linux | GSD-2022-1000543 | nvme-rdma: fix possible use-after-free in transport error_recovery work | nvme-rdma: fix possible use-after-free in transport error_recovery work
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit ea86027ac467a055849c4945906f799e7f65ab99. For more details please see the references link. | null | 2022-03-07T02:54:54.233043Z | 2022-02-27T03:21:24.568998Z | null | null | null | null | null |
Linux | GSD-2022-1000113 | iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() | iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.265 by commit a0c685ba99961b1dd894b2e470e692a539770f6d, it was introduced in version v4.14.190 by commit 03992c88d71ba79d956f2ed54e370e630b8750f4. For more details please see the references link. | null | 2022-02-19T02:34:11.968647Z | 2022-02-18T21:42:33.481868Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/03992c88d71ba79d956f2ed54e370e630b8750f4'} |
Linux | GSD-2021-1001184 | net: qcom/emac: fix UAF in emac_remove | net: qcom/emac: fix UAF in emac_remove
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.5 by commit 8a225a6e07a57a1538d53637cb3d82bd3e477839, it was introduced in version v4.9 by commit 54e19bc74f3380d414681762ceed9f7245bc6a6e. For more details please see the references link. | null | 2021-12-20T00:50:02.641411Z | 2021-08-03T01:33:06.955331Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/54e19bc74f3380d414681762ceed9f7245bc6a6e'} |
Linux | GSD-2021-1002602 | io_uring: ensure task_work gets run as part of cancelations | io_uring: ensure task_work gets run as part of cancelations
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.8 by commit 8e12976c0c19ebc14b60046b1348c516a74c25a2. For more details please see the references link. | null | 2021-12-20T00:52:21.520517Z | 2021-12-19T19:44:39.013545Z | null | null | null | null | null |
Linux | GSD-2022-1001352 | mm/mempolicy: fix mpol_new leak in shared_policy_replace | mm/mempolicy: fix mpol_new leak in shared_policy_replace
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 6e00309ac716fa8225f0cbde2cd9c24f0e74ee21, it was introduced in version v3.8 by commit 42288fe366c4f1ce7522bc9f27d0bc2a81c55264. For more details please see the references link. | null | 2022-04-25T04:21:38.906052Z | 2022-04-24T21:06:56.257947Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/42288fe366c4f1ce7522bc9f27d0bc2a81c55264'} |
Linux | GSD-2021-1002252 | scsi: advansys: Fix kernel pointer leak | scsi: advansys: Fix kernel pointer leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.218 by commit f5a0ba4a9b5e70e7b2f767636d26523f9d1ac59d. For more details please see the references link. | null | 2021-12-19T22:58:52.490816Z | 2021-11-29T02:35:27.709099Z | null | null | null | null | null |
Linux | GSD-2022-1001702 | drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire() | drm/amdgpu: fix off by one in amdgpu_gfx_kiq_acquire()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 5ba9d78a72948325ecdb4dca2a31a46bc9169574, it was introduced in version v4.13 by commit 71c37505e7eaa01fa259debad1a71a7ae061039d. For more details please see the references link. | null | 2022-04-25T04:58:36.489246Z | 2022-04-24T21:36:31.968719Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/71c37505e7eaa01fa259debad1a71a7ae061039d'} |
Linux | GSD-2022-1000810 | gso: do not skip outer ip header in case of ipip and net_failover | gso: do not skip outer ip header in case of ipip and net_failover
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.26 by commit 899e56a1ad435261812355550ae869d8be3df395, it was introduced in version v3.13 by commit cb32f511a70be8967ac9025cf49c44324ced9a39. For more details please see the references link. | null | 2022-03-18T04:27:37.380968Z | 2022-03-18T00:20:44.833038Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cb32f511a70be8967ac9025cf49c44324ced9a39'} |
Linux | GSD-2021-1000795 | perf probe: Fix NULL pointer dereference in convert_variable_location() | perf probe: Fix NULL pointer dereference in convert_variable_location()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit eba7c76a5651392a9132c54aceddc5af8cfb0938, it was introduced in version v5.5 by commit 66f69b2197167cb99330c77a550da50f1f597abc. For more details please see the references link. | null | 2021-12-19T22:23:31.068175Z | 2021-06-25T00:06:08.558268Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/66f69b2197167cb99330c77a550da50f1f597abc'} |
Linux | GSD-2021-1001887 | can: peak_pci: peak_pci_remove(): fix UAF | can: peak_pci: peak_pci_remove(): fix UAF
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit 0e5afdc2315b0737edcf55bede4ee1640d2d464d, it was introduced in version v3.4 by commit e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd. For more details please see the references link. | null | 2021-12-20T00:00:45.594580Z | 2021-10-28T13:54:01.023105Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd'} |
Linux | GSD-2022-1001217 | xsk: Fix race at socket teardown | xsk: Fix race at socket teardown
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 8a2dea162b92c322f3e42eae0c4a74b8d20aa7a9, it was introduced in version v5.4 by commit 42fddcc7c64b723a867c7b2f5f7505e244212f13. For more details please see the references link. | null | 2022-04-25T07:09:04.765002Z | 2022-04-24T20:54:43.665411Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/42fddcc7c64b723a867c7b2f5f7505e244212f13'} |
Linux | GSD-2021-1000280 | spi: spi-zynqmp-gqspi: fix use-after-free in zynqmp_qspi_exec_op | spi: spi-zynqmp-gqspi: fix use-after-free in zynqmp_qspi_exec_op
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 23269ac9f123eca3aea7682d3345c02e71ed696c, it was introduced in version v5.10 by commit 1c26372e5aa9e53391a1f8fe0dc7cd93a7e5ba9e. For more details please see the references link. | null | 2021-12-20T00:39:55.551466Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c26372e5aa9e53391a1f8fe0dc7cd93a7e5ba9e'} |
Linux | GSD-2021-1002747 | net: stmmac: fix tc flower deletion for VLAN priority Rx steering | net: stmmac: fix tc flower deletion for VLAN priority Rx steering
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit 97cb5c82aa1dd85a39b1bd021c8b5f18af623779, it was introduced in version v5.13 by commit 0e039f5cf86ce2fcb62077a163e7ff3d7b7b7cf3. For more details please see the references link. | null | 2022-01-11T05:53:50.747902Z | 2021-12-27T05:46:52.530505Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0e039f5cf86ce2fcb62077a163e7ff3d7b7b7cf3'} |
Linux | GSD-2021-1001868 | drm: mxsfb: Fix NULL pointer dereference crash on unload | drm: mxsfb: Fix NULL pointer dereference crash on unload
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit b0e6db0656ddfd8bb57303c2ef61ee1c1cc694a8, it was introduced in version v5.10 by commit ae1ed0093281939b80664a687689f12436c0e874. For more details please see the references link. | null | 2021-12-20T00:55:08.745388Z | 2021-10-28T13:53:06.951340Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ae1ed0093281939b80664a687689f12436c0e874'} |
Linux | GSD-2022-1001647 | gcc-plugins: latent_entropy: use /dev/urandom | gcc-plugins: latent_entropy: use /dev/urandom
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.35 by commit bd17422b9b675414d0f1a5e070d42fe85b785cd6, it was introduced in version v4.9 by commit 38addce8b600ca335dc86fa3d48c890f1c6fa1f4. For more details please see the references link. | null | 2022-04-25T05:18:20.747507Z | 2022-04-24T21:31:29.579702Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/38addce8b600ca335dc86fa3d48c890f1c6fa1f4'} |
Linux | GSD-2021-1002317 | scsi: ufs: core: Improve SCSI abort handling | scsi: ufs: core: Improve SCSI abort handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit c36baca06efa833adaefba61f45fefdc49b6d070, it was introduced in version v3.4 by commit 7a3e97b0dc4bbac2ba7803564ab0057722689921. For more details please see the references link. | null | 2021-12-19T23:04:24.245781Z | 2021-11-29T02:38:29.037969Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7a3e97b0dc4bbac2ba7803564ab0057722689921'} |
Linux | GSD-2022-1000406 | Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj | Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.102 by commit 91d8866ca55232d21995a3d54fac96de33c9e20c, it was introduced in version v4.15 by commit c2e5df616e1ae6c2a074cb241ebb65a318ebaf7c. For more details please see the references link. | null | 2022-03-07T01:44:09.209992Z | 2022-02-27T03:02:17.010892Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c2e5df616e1ae6c2a074cb241ebb65a318ebaf7c'} |
Linux | GSD-2021-1001491 | mISDN: fix possible use-after-free in HFC_cleanup() | mISDN: fix possible use-after-free in HFC_cleanup()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.276 by commit 49331c07ef0f8fdfa42b30ba6a83a657b29d7fbe. For more details please see the references link. | null | 2021-12-19T22:37:30.735781Z | 2021-08-03T02:57:31.819277Z | null | null | null | null | null |
Linux | GSD-2022-1000056 | binder: fix async_free_space accounting for empty parcels | binder: fix async_free_space accounting for empty parcels
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.13 by commit 17691bada6b2f1d5f1c0f6d28cd9d0727023b0ff, it was introduced in version v4.14 by commit 74310e06be4d74dcf67cd108366710dee5c576d5. For more details please see the references link. | null | 2022-01-11T05:59:29.550574Z | 2022-01-10T19:52:06.893892Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/74310e06be4d74dcf67cd108366710dee5c576d5'} |
Linux | GSD-2022-1001094 | Reinstate some of "swiotlb: rework "fix info leak with DMA_FROM_DEVICE"" | Reinstate some of "swiotlb: rework "fix info leak with DMA_FROM_DEVICE""
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit f2141881b530738777c28bb51c62175895c8178b. For more details please see the references link. | null | 2022-04-25T03:31:03.446498Z | 2022-04-24T20:44:46.503005Z | null | null | null | null | null |
Linux | GSD-2021-1002194 | mm, thp: bail out early in collapse_file for writeback page | mm, thp: bail out early in collapse_file for writeback page
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 74c42e1baacf206338b1dd6b6199ac964512b5bb, it was introduced in version v5.4 by commit 99cb0dbd47a15d395bf3faa78dc122bc5efe3fc0. For more details please see the references link. | null | 2021-12-20T00:54:33.295655Z | 2021-11-14T15:24:10.769511Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/99cb0dbd47a15d395bf3faa78dc122bc5efe3fc0'} |
Linux | GSD-2021-1000453 | powerpc/64s: Fix pte update for kernel memory on radix | powerpc/64s: Fix pte update for kernel memory on radix
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.191 by commit b3d5d0983388d6c4fb35f7d722556d5595f167a7, it was introduced in version v4.18 by commit f1cb8f9beba8699dd1b4518418191499e53f7b17. For more details please see the references link. | null | 2021-12-19T23:38:12.481234Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f1cb8f9beba8699dd1b4518418191499e53f7b17'} |
Linux | GSD-2022-1002342 | lib/test: use after free in register_test_dev_kmod() | lib/test: use after free in register_test_dev_kmod()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 46012ed6a533431d004fe76162faf05a60fae975, it was introduced in version v4.13 by commit d9c6a72d6fa29d3a7999dda726577e5d1fccafa5. For more details please see the references link. | null | 2022-04-25T05:54:37.070619Z | 2022-04-24T22:35:55.748485Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9c6a72d6fa29d3a7999dda726577e5d1fccafa5'} |
Linux | GSD-2022-1001997 | powerpc/secvar: fix refcount leak in format_show() | powerpc/secvar: fix refcount leak in format_show()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit 02222bf4f0a27f6eba66d1f597cdb5daadd51829. For more details please see the references link. | null | 2022-04-25T05:42:55.731542Z | 2022-04-24T22:01:55.891602Z | null | null | null | null | null |
Linux | GSD-2022-1000685 | xen/netfront: react properly to failing gnttab_end_foreign_access_ref() | xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.14 by commit 34630641e955f23ae06db178822d99d0a9d89b20. For more details please see the references link. | null | 2022-03-18T02:48:06.703161Z | 2022-03-18T00:09:36.736770Z | null | null | null | null | null |
Linux | GSD-2021-1000900 | usb: fix various gadget panics on 10gbps cabling | usb: fix various gadget panics on 10gbps cabling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.126 by commit 5ef23506695b01d5d56a13a092a97f2478069d75. For more details please see the references link. | null | 2021-12-20T01:35:55.956072Z | 2021-06-30T00:05:21.060043Z | null | null | null | null | null |
Linux | GSD-2021-1001612 | enetc: Fix illegal access when reading affinity_hint | enetc: Fix illegal access when reading affinity_hint
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.150 by commit 4c4c3052911b577920353a7646e4883d5da40c28, it was introduced in version v5.1 by commit d4fd0404c1c95b17880f254ebfee3485693fa8ba. For more details please see the references link. | null | 2021-12-19T21:47:13.736042Z | 2021-10-19T16:28:14.605062Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d4fd0404c1c95b17880f254ebfee3485693fa8ba'} |
Linux | GSD-2021-1001242 | net: sched: fix memory leak in tcindex_partial_destroy_work | net: sched: fix memory leak in tcindex_partial_destroy_work
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.54 by commit 8e9662fde6d63c78eb1350f6167f64c9d71a865b, it was introduced in version v3.18 by commit 8332904aa971ed4547514f57c8b3780ad4f0f949. For more details please see the references link. | null | 2021-12-20T00:54:42.828026Z | 2021-08-03T01:47:07.034949Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8332904aa971ed4547514f57c8b3780ad4f0f949'} |
Linux | GSD-2021-1000845 | usb: dwc3: ep0: fix NULL pointer exception | usb: dwc3: ep0: fix NULL pointer exception
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.273 by commit 60156089f07e724e4dc8483702d5e1ede4522749. For more details please see the references link. | null | 2021-12-20T01:17:56.754711Z | 2021-06-30T00:00:58.645227Z | null | null | null | null | null |
Linux | GSD-2021-1001757 | enetc: Fix illegal access when reading affinity_hint | enetc: Fix illegal access when reading affinity_hint
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.9 by commit 6f329d9da2a5ae032fcde800a99b118124ed5270, it was introduced in version v5.1 by commit d4fd0404c1c95b17880f254ebfee3485693fa8ba. For more details please see the references link. | null | 2021-12-20T01:15:54.437907Z | 2021-10-19T16:35:15.476210Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d4fd0404c1c95b17880f254ebfee3485693fa8ba'} |
Linux | GSD-2022-1002207 | scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() | scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 8077a7162bc3cf658dd9ff112bc77716c08458c5. For more details please see the references link. | null | 2022-04-25T04:25:52.972392Z | 2022-04-24T22:21:48.682844Z | null | null | null | null | null |
Linux | GSD-2022-1000390 | scsi: pm8001: Fix use-after-free for aborted TMF sas_task | scsi: pm8001: Fix use-after-free for aborted TMF sas_task
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.102 by commit d872e7b5fe38f325f5206b6872746fa02c2b4819. For more details please see the references link. | null | 2022-03-07T03:58:01.861956Z | 2022-02-27T03:00:26.249177Z | null | null | null | null | null |
Linux | GSD-2021-1001307 | KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow | KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.136 by commit 2b9ffddd70b449cdc42b943788dc82a6d7b0d175, it was introduced in version v3.10 by commit 8e591cb7204739efa8e15967ea334eb367039dde. For more details please see the references link. | null | 2021-12-20T00:53:33.398632Z | 2021-08-03T02:04:01.854965Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8e591cb7204739efa8e15967ea334eb367039dde'} |
Linux | GSD-2022-1001978 | qede: confirm skb is allocated before using | qede: confirm skb is allocated before using
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit 8928239e5e2e460d95b8a0b89f61671625e7ece0, it was introduced in version v4.18 by commit 8a8633978b842c88fbcfe00d4e5dde96048f630e. For more details please see the references link. | null | 2022-04-25T04:24:40.005789Z | 2022-04-24T22:00:28.466838Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8a8633978b842c88fbcfe00d4e5dde96048f630e'} |
Linux | GSD-2021-1000146 | virtiofs: fix memory leak in virtio_fs_probe() | virtiofs: fix memory leak in virtio_fs_probe()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.36 by commit d19555ff225d0896a33246a49279e6d578095f15, it was introduced in version v5.4 by commit a62a8ef9d97da23762a588592c8b8eb50a8deb6a. For more details please see the references link. | null | 2021-12-19T23:58:42.472730Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a62a8ef9d97da23762a588592c8b8eb50a8deb6a'} |
Linux | GSD-2021-1002481 | atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait | atlantic: Fix OOB read and write in hw_atl_utils_fw_rpc_wait
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.84 by commit 2c514d25003ac89bb7716bb4402918ccb141f8f5. For more details please see the references link. | null | 2021-12-19T23:45:02.825741Z | 2021-12-19T19:39:15.905538Z | null | null | null | null | null |
Linux | GSD-2022-1001581 | crypto: ccree - Fix use after free in cc_cipher_exit() | crypto: ccree - Fix use after free in cc_cipher_exit()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 25c358efee5153dfd240d4e0d3169d5bebe9cacd, it was introduced in version v4.17 by commit 63ee04c8b491ee148489347e7da9fbfd982ca2bb. For more details please see the references link. | null | 2022-04-25T05:47:11.604410Z | 2022-04-24T21:26:00.109938Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63ee04c8b491ee148489347e7da9fbfd982ca2bb'} |
Linux | GSD-2021-1000516 | RDMA/rxe: Clear all QP fields if creation failed | RDMA/rxe: Clear all QP fields if creation failed
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.122 by commit a62225d951d77eb20208fed8fc199e0c9b1df08b, it was introduced in version v4.8 by commit 8700e3e7c4857d28ebaa824509934556da0b3e76. For more details please see the references link. | null | 2021-12-19T22:33:17.951957Z | 2021-05-31T23:49:14.641629Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8700e3e7c4857d28ebaa824509934556da0b3e76'} |
Linux | GSD-2022-1001755 | watch_queue: Free the page array when watch_queue is dismantled | watch_queue: Free the page array when watch_queue is dismantled
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 4913daecd04addb41bc96a9175a885e1c19862a8, it was introduced in version v5.8 by commit c73be61cede5882f9605a852414db559c0ebedfd. For more details please see the references link. | null | 2022-04-25T06:45:02.427029Z | 2022-04-24T21:39:55.210037Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c73be61cede5882f9605a852414db559c0ebedfd'} |
Linux | GSD-2022-1000847 | thermal: int340x: fix memory leak in int3400_notify() | thermal: int340x: fix memory leak in int3400_notify()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.103 by commit e098933866f9e1dd3ef4eebbe2e3d504f970f599, it was introduced in version v4.14 by commit 38e44da591303d08b0d965a033e11ade284999d0. For more details please see the references link. | null | 2022-03-18T03:00:25.959332Z | 2022-03-18T00:23:34.632142Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/38e44da591303d08b0d965a033e11ade284999d0'} |
Linux | GSD-2021-1002205 | regmap: Fix possible double-free in regcache_rbtree_exit() | regmap: Fix possible double-free in regcache_rbtree_exit()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 55e6d8037805b3400096d621091dfbf713f97e83, it was introduced in version v3.12 by commit 3f4ff561bc88b074d5e868dde4012d89cbb06c87. For more details please see the references link. | null | 2021-12-20T00:55:12.976333Z | 2021-11-14T15:24:37.801825Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f4ff561bc88b074d5e868dde4012d89cbb06c87'} |
Linux | GSD-2021-1000238 | net: marvell: prestera: fix port event handling on init | net: marvell: prestera: fix port event handling on init
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 9d1ba11fabdd8f25abb24272ef1621417981320b, it was introduced in version v5.10 by commit 501ef3066c89d7f9045315e1be58749cf9e6814d. For more details please see the references link. | null | 2021-12-19T22:38:41.628056Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/501ef3066c89d7f9045315e1be58749cf9e6814d'} |
Linux | GSD-2022-1001305 | rtc: pl031: fix rtc features null pointer dereference | rtc: pl031: fix rtc features null pointer dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 1b915703964f7e636961df04c540261dc55c6c70, it was introduced in version v5.12 by commit d9b0dd54a1943f47a381a474f8ea2c94466110c0. For more details please see the references link. | null | 2022-04-25T04:28:26.954349Z | 2022-04-24T21:02:35.976924Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9b0dd54a1943f47a381a474f8ea2c94466110c0'} |
Linux | GSD-2021-1000392 | crypto: sun8i-ss - fix result memory leak on error path | crypto: sun8i-ss - fix result memory leak on error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 1f12aaf07f61122cf5074d29714ee26f8d44b0e7, it was introduced in version v5.10 by commit d9b45418a91773b7672e4c60037a28074b495c6d. For more details please see the references link. | null | 2021-12-19T22:10:18.176065Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9b45418a91773b7672e4c60037a28074b495c6d'} |
Linux | GSD-2021-1002655 | net/packet: rx_owner_map depends on pg_vec | net/packet: rx_owner_map depends on pg_vec
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.222 by commit 18c73170de6719491f79b04c727ea8314c246b03, it was introduced in version v4.19.114 by commit 6fb0e4385928900ccb8697748555b3f54bba5193. For more details please see the references link. | null | 2022-01-11T05:47:16.233061Z | 2021-12-27T05:33:25.114894Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6fb0e4385928900ccb8697748555b3f54bba5193'} |
Linux | GSD-2021-1000668 | NFC: nci: fix memory leak in nci_allocate_device | NFC: nci: fix memory leak in nci_allocate_device
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.193 by commit 0365701bc44e078682ee1224866a71897495c7ef, it was introduced in version v4.0 by commit 11f54f228643d0248ec00ce8c9fb8d872f87e7b8. For more details please see the references link. | null | 2021-12-19T23:41:33.341930Z | 2021-06-04T19:58:29.415529Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/11f54f228643d0248ec00ce8c9fb8d872f87e7b8'} |
Linux | GSD-2022-1000144 | tipc: improve size validations for received domain records | tipc: improve size validations for received domain records
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.229 by commit f1af11edd08dd8376f7a84487cbb0ea8203e3a1d, it was introduced in version v4.8 by commit 35c55c9877f8de0ab129fa1a309271d0ecc868b9. For more details please see the references link. | null | 2022-02-20T02:04:45.088435Z | 2022-02-18T21:46:52.945997Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/35c55c9877f8de0ab129fa1a309271d0ecc868b9'} |
Linux | GSD-2022-1002179 | drbd: Fix five use after free bugs in get_initial_state | drbd: Fix five use after free bugs in get_initial_state
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit b6a4055036eed1f5e239ce3d8b0db1ce38bba447, it was introduced in version v4.5 by commit a29728463b254ce81ecefdf20c1a02e01d9361da. For more details please see the references link. | null | 2022-04-25T04:09:07.888709Z | 2022-04-24T22:19:17.554644Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a29728463b254ce81ecefdf20c1a02e01d9361da'} |
Linux | GSD-2021-1001429 | wl1251: Fix possible buffer overflow in wl1251_cmd_scan | wl1251: Fix possible buffer overflow in wl1251_cmd_scan
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.240 by commit 0f6c0488368c9ac1aa685821916fadba32f5d1ef. For more details please see the references link. | null | 2021-12-20T00:38:32.889227Z | 2021-08-03T02:38:03.595805Z | null | null | null | null | null |
Linux | GSD-2022-1002483 | ACPI: CPPC: Avoid out of bounds access when parsing _CPC data | ACPI: CPPC: Avoid out of bounds access when parsing _CPC data
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit b3f15609ffa521de12244cd6af24002030dda3f5, it was introduced in version v4.4 by commit 337aadff8e4567e39669e07d9a88b789d78458b5. For more details please see the references link. | null | 2022-04-25T05:16:54.007965Z | 2022-04-24T22:53:11.062791Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/337aadff8e4567e39669e07d9a88b789d78458b5'} |
Linux | GSD-2022-1000514 | ibmvnic: don't release napi in __ibmvnic_open() | ibmvnic: don't release napi in __ibmvnic_open()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit e08cb9056fb2564d1f6bad789bdf79ab09bf2f81, it was introduced in version v4.12 by commit ed651a10875f13135a5f59c1bae4d51b377b3925. For more details please see the references link. | null | 2022-03-07T01:44:07.305065Z | 2022-02-27T03:17:18.356968Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ed651a10875f13135a5f59c1bae4d51b377b3925'} |
Linux | GSD-2021-1001583 | phy: mdio: fix memory leak | phy: mdio: fix memory leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.153 by commit 414bb4ead1362ef2c8592db723c017258f213988, it was introduced in version v2.6.28 by commit 46abc02175b3c246dd5141d878f565a8725060c9. For more details please see the references link. | null | 2021-12-20T00:28:34.463497Z | 2021-10-19T16:24:52.759169Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/46abc02175b3c246dd5141d878f565a8725060c9'} |
Linux | GSD-2021-1001079 | PCI: aardvark: Fix kernel panic during PIO transfer | PCI: aardvark: Fix kernel panic during PIO transfer
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit 3d213a4ddf49a860be6e795482c17f87e0c82b2a. For more details please see the references link. | null | 2021-12-20T03:00:08.137877Z | 2021-06-30T00:38:13.806319Z | null | null | null | null | null |
Linux | GSD-2021-1001096 | i2c: robotfuzz-osif: fix control-request directions | i2c: robotfuzz-osif: fix control-request directions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.274 by commit 9fd1b4e41a80e52d5f846b1f04966f2b7b84e6b3, it was introduced in version v3.14 by commit 83e53a8f120f2f273cf0ad717f5372ab79ac24fe. For more details please see the references link. | null | 2021-12-20T00:28:13.477143Z | 2021-07-08T01:56:04.343515Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/83e53a8f120f2f273cf0ad717f5372ab79ac24fe'} |
Linux | GSD-2022-1002196 | netlabel: fix out-of-bounds memory accesses | netlabel: fix out-of-bounds memory accesses
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.0 by commit 5578de4834fe0f2a34fedc7374be691443396d1f, it was introduced in version v2.6.19 by commit 446fda4f26822b2d42ab3396aafcedf38a9ff2b6. For more details please see the references link. | null | 2022-04-25T03:31:37.933329Z | 2022-04-24T22:20:55.941078Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/446fda4f26822b2d42ab3396aafcedf38a9ff2b6'} |
Linux | GSD-2022-1000451 | ax25: improve the incomplete fix to avoid UAF and NPD bugs | ax25: improve the incomplete fix to avoid UAF and NPD bugs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit 4c958f0c5714812461da7785393315b35145ac8c. For more details please see the references link. | null | 2022-03-07T02:20:12.289455Z | 2022-02-27T03:08:51.574758Z | null | null | null | null | null |
Linux | GSD-2021-1002340 | scsi: core: Fix scsi_mode_sense() buffer length handling | scsi: core: Fix scsi_mode_sense() buffer length handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit e15de347faf4a9f494cbd4e9a623d343dc1b5851. For more details please see the references link. | null | 2021-12-20T01:05:23.879914Z | 2021-11-29T02:39:33.974555Z | null | null | null | null | null |
Linux | GSD-2022-1001610 | cifs: prevent bad output lengths in smb2_ioctl_query_info() | cifs: prevent bad output lengths in smb2_ioctl_query_info()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit fadddfc1dc3c6f79b21cff4a7e9a6c40b84fbc53. For more details please see the references link. | null | 2022-04-25T05:12:42.394752Z | 2022-04-24T21:28:03.636241Z | null | null | null | null | null |
Linux | GSD-2022-1000902 | xen/netfront: destroy queues before real_num_tx_queues is zeroed | xen/netfront: destroy queues before real_num_tx_queues is zeroed
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.233 by commit 198cdc287769c717dafff5887c6125cb7a373bf3, it was introduced in version v4.19.226 by commit 35cad2003b6447932cfe91f795090586306738e8. For more details please see the references link. | null | 2022-03-18T02:54:39.192900Z | 2022-03-18T00:29:59.959308Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/35cad2003b6447932cfe91f795090586306738e8'} |
Linux | GSD-2021-1000687 | net: fujitsu: fix potential null-ptr-deref | net: fujitsu: fix potential null-ptr-deref
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.271 by commit 6dbf1101594f7c76990b63c35b5a40205a914b6b, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T23:15:51.355520Z | 2021-06-04T20:02:27.445814Z | null | null | null | null | null |
Linux | GSD-2021-1001995 | comedi: vmk80xx: fix transfer-buffer overflows | comedi: vmk80xx: fix transfer-buffer overflows
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.217 by commit 7a2021b896de1ad559d33b5c5cdd20b982242088, it was introduced in version v2.6.31 by commit 985cafccbf9b7f862aa1c5ee566801e18b5161fb. For more details please see the references link. | null | 2021-12-20T01:02:33.428094Z | 2021-11-14T15:15:04.966037Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/985cafccbf9b7f862aa1c5ee566801e18b5161fb'} |
Linux | GSD-2021-1002710 | iocost: Fix divide-by-zero on donation from low hweight cgroup | iocost: Fix divide-by-zero on donation from low hweight cgroup
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.88 by commit a7c80674538f15f85d68138240aae440b8039519, it was introduced in version v5.10 by commit f1de2439ec43b74764f2a26e3a310b24407e3bde. For more details please see the references link. | null | 2022-01-11T05:57:28.558099Z | 2021-12-27T05:38:23.086939Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f1de2439ec43b74764f2a26e3a310b24407e3bde'} |
Linux | GSD-2022-1001240 | drm/amd/display: Call dc_stream_release for remove link enc assignment | drm/amd/display: Call dc_stream_release for remove link enc assignment
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit a28b7b6a0c827ce672edcdb5b2b5916b0beebe03, it was introduced in version v5.17 by commit 0bb24555858403671657f6dc025d2931e3e857bb. For more details please see the references link. | null | 2022-04-25T06:09:35.361895Z | 2022-04-24T20:56:51.685030Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0bb24555858403671657f6dc025d2931e3e857bb'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.