ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2021-1000917
udp: fix race between close() and udp_abort()
udp: fix race between close() and udp_abort() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.128 by commit 5a88477c1c85e4baa51e91f2d40f2166235daa56, it was introduced in version v4.9 by commit 5d77dca82839ef016a93ad7acd7058b14d967752. For more details please see the references link.
null
2021-12-19T23:55:20.787364Z
2021-06-30T00:24:23.501424Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5d77dca82839ef016a93ad7acd7058b14d967752'}
Linux
GSD-2022-1002355
scsi: pm8001: Fix abort all task initialization
scsi: pm8001: Fix abort all task initialization This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit 1824a21b2cedc5774a5adfa74f5f7b90472d8677, it was introduced in version v3.10 by commit c6b9ef5779c3e1edfa9de949d2a51252bc347663. For more details please see the references link.
null
2022-04-25T05:57:32.117445Z
2022-04-24T22:37:50.438636Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6b9ef5779c3e1edfa9de949d2a51252bc347663'}
Linux
GSD-2022-1000368
net: dsa: mv88e6xxx: don't use devres for mdiobus
net: dsa: mv88e6xxx: don't use devres for mdiobus This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.101 by commit 8ccebe77df6e0d88c72ba5e69cf1835927e53b6c, it was introduced in version v5.9 by commit ac3a68d56651c3dad2c12c7afce065fe15267f44. For more details please see the references link.
null
2022-03-07T01:43:25.114344Z
2022-02-27T02:57:15.488317Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac3a68d56651c3dad2c12c7afce065fe15267f44'}
Linux
GSD-2021-1000444
powerpc/64s: Fix crashes when toggling entry flush barrier
powerpc/64s: Fix crashes when toggling entry flush barrier This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.191 by commit 2db22ba4e0e103f00e0512e0ecce36ac78c644f8, it was introduced in version v4.19.159 by commit f69bb4e51f41973fb7594be1479fa689831efe1a. For more details please see the references link.
null
2021-12-19T22:23:22.994842Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f69bb4e51f41973fb7594be1479fa689831efe1a'}
Linux
GSD-2021-1002479
sched/scs: Reset task stack state in bringup_cpu()
sched/scs: Reset task stack state in bringup_cpu() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.83 by commit e6ee7abd6bfe559ad9989004b34c320fd638c526, it was introduced in version v5.10.50 by commit 3c51d82d0b7862d7d246016c74b4390fb1fa1f11. For more details please see the references link.
null
2021-12-20T00:01:33.856013Z
2021-12-19T19:39:11.224983Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3c51d82d0b7862d7d246016c74b4390fb1fa1f11'}
Linux
GSD-2021-1002183
drm: mxsfb: Fix NULL pointer dereference crash on unload
drm: mxsfb: Fix NULL pointer dereference crash on unload This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15 by commit 3cfc183052c3dbf8eae57b6c1685dab00ed3db4a, it was introduced in version v5.10 by commit ae1ed0093281939b80664a687689f12436c0e874. For more details please see the references link.
null
2021-12-19T22:43:30.616252Z
2021-11-14T15:23:35.955448Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ae1ed0093281939b80664a687689f12436c0e874'}
Linux
GSD-2022-1001129
ASoC: mediatek: Fix error handling in mt8183_da7219_max98357_dev_probe
ASoC: mediatek: Fix error handling in mt8183_da7219_max98357_dev_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 9b9f6227e8d0c7c46b6d9d7b8a5c4e0536049fcf. For more details please see the references link.
null
2022-04-25T04:20:09.355064Z
2022-04-24T20:47:50.092744Z
null
null
null
null
null
Linux
GSD-2022-1001083
usb: cdnsp: fix cdnsp_decode_trb function to properly handle ret value
usb: cdnsp: fix cdnsp_decode_trb function to properly handle ret value This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 185918644ec10a6308e892ee6880e292971321b7. For more details please see the references link.
null
2022-04-25T05:20:32.911075Z
2022-04-24T20:44:03.213933Z
null
null
null
null
null
Linux
GSD-2021-1000014
ixgbe: fix unbalanced device enable/disable in suspend/resume
ixgbe: fix unbalanced device enable/disable in suspend/resume This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.16 by commit f1b4be4a753caa4056496f679d70550d0c11a264, it was introduced in version v5.9 by commit 6f82b25587354ce7c9c42e0b53d8b0770b900847. For more details please see the references link.
null
2021-12-20T00:08:07.343340Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6f82b25587354ce7c9c42e0b53d8b0770b900847'}
Linux
GSD-2021-1002029
btrfs: fix abort logic in btrfs_replace_file_extents
btrfs: fix abort logic in btrfs_replace_file_extents This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.75 by commit 0e32a2b85c7d92ece86c17dfef390c5ed79c6378. For more details please see the references link.
null
2021-12-19T23:19:13.585481Z
2021-11-14T15:16:36.219676Z
null
null
null
null
null
Linux
GSD-2022-1001579
arm64: prevent instrumentation of bp hardening callbacks
arm64: prevent instrumentation of bp hardening callbacks This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit cdf805717b28ff8c587121c4e0590d7fdb63bc23, it was introduced in version v4.16 by commit ec82b567a74fbdffdf418d4bb381d55f6a9096af. For more details please see the references link.
null
2022-04-25T04:45:50.158611Z
2022-04-24T21:25:48.277533Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ec82b567a74fbdffdf418d4bb381d55f6a9096af'}
Linux
GSD-2022-1001596
media: omap3isp: Use struct_group() for memcpy() region
media: omap3isp: Use struct_group() for memcpy() region This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 2b4584b5d631af625ad812bf06dcea7fa1ac3fa3, it was introduced in version v4.18 by commit 378e3f81cb5653b28100d3231db6da07b0581ff4. For more details please see the references link.
null
2022-04-25T04:28:33.644684Z
2022-04-24T21:27:13.465440Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/378e3f81cb5653b28100d3231db6da07b0581ff4'}
Linux
GSD-2021-1000501
RDMA/rxe: Clear all QP fields if creation failed
RDMA/rxe: Clear all QP fields if creation failed This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.7 by commit 03344e843ab6dd3b3f2cadfb65ed910590856c70, it was introduced in version v4.8 by commit 8700e3e7c4857d28ebaa824509934556da0b3e76. For more details please see the references link.
null
2021-12-20T00:49:06.527275Z
2021-05-31T23:47:00.520433Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8700e3e7c4857d28ebaa824509934556da0b3e76'}
Linux
GSD-2021-1002496
rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer()
rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.84 by commit 60f0b9c42cb80833a03ca57c1c8b078d716e71d1, it was introduced in version v5.4 by commit 9ebeddef58c41bd700419cdcece24cf64ce32276. For more details please see the references link.
null
2021-12-19T22:35:49.271075Z
2021-12-19T19:39:52.755695Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9ebeddef58c41bd700419cdcece24cf64ce32276'}
Linux
GSD-2021-1000151
scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand()
scsi: qla2xxx: Fix crash in qla2xxx_mqueuecommand() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.36 by commit 702cdaa2c6283c135ef16d52e0e4e3c1005aa538, it was introduced in version v5.5 by commit af2a0c51b1205327f55a7e82e530403ae1d42cbb. For more details please see the references link.
null
2021-12-20T00:00:10.639531Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/af2a0c51b1205327f55a7e82e530403ae1d42cbb'}
Linux
GSD-2022-1000387
parisc: Fix data TLB miss in sba_unmap_sg
parisc: Fix data TLB miss in sba_unmap_sg This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.102 by commit f8f519d7df66c334b5e08f896ac70ee3b53add3b. For more details please see the references link.
null
2022-03-07T02:42:41.004382Z
2022-02-27T03:00:05.816223Z
null
null
null
null
null
Linux
GSD-2021-1001310
netrom: Decrease sock refcount when sock timers expire
netrom: Decrease sock refcount when sock timers expire This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.136 by commit 25df44e90ff5959b5c24ad361b648504a7e39ef3, it was introduced in version v5.0 by commit 63346650c1a94a92be61a57416ac88c0a47c4327. For more details please see the references link.
null
2021-12-19T22:11:03.921589Z
2021-08-03T02:04:45.257761Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63346650c1a94a92be61a57416ac88c0a47c4327'}
Linux
GSD-2022-1002210
ubifs: rename_whiteout: Fix double free for whiteout_ui->data
ubifs: rename_whiteout: Fix double free for whiteout_ui->data This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 14276d38c89a170363e90b6ac0a53c3cf61b87fc, it was introduced in version v4.9 by commit 9e0a1fff8db56eaaebb74b4a3ef65f86811c4798. For more details please see the references link.
null
2022-04-25T04:23:45.652086Z
2022-04-24T22:22:16.529312Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9e0a1fff8db56eaaebb74b4a3ef65f86811c4798'}
Linux
GSD-2021-1001740
s390/qeth: fix deadlock during failing recovery
s390/qeth: fix deadlock during failing recovery This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit 0bfe741741327822d1482c7edef0184636d08b40, it was introduced in version v5.11 by commit b41b554c1ee75070a14c02a88496b1f231c7eacc. For more details please see the references link.
null
2021-12-20T01:12:28.209505Z
2021-10-19T16:34:25.091169Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b41b554c1ee75070a14c02a88496b1f231c7eacc'}
Linux
GSD-2021-1000852
bonding: init notify_work earlier to avoid uninitialized use
bonding: init notify_work earlier to avoid uninitialized use This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.237 by commit 1fb72dd4bcbce6eca085f7c1403e5b03d4e70f83. For more details please see the references link.
null
2021-12-19T22:54:00.530065Z
2021-06-30T00:01:24.745179Z
null
null
null
null
null
Linux
GSD-2022-1000807
nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac()
nfp: flower: Fix a potential leak in nfp_tunnel_add_shared_mac() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.26 by commit 9d8097caa73200710d52b9f4d9f430548f46a900, it was introduced in version v5.1 by commit 20cce88650981ec504d328dbbdd004d991eb8535. For more details please see the references link.
null
2022-03-18T03:58:30.031874Z
2022-03-18T00:20:16.687369Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/20cce88650981ec504d328dbbdd004d991eb8535'}
Linux
GSD-2022-1001715
netlabel: fix out-of-bounds memory accesses
netlabel: fix out-of-bounds memory accesses This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.0 by commit 5578de4834fe0f2a34fedc7374be691443396d1f, it was introduced in version v2.6.19 by commit 446fda4f26822b2d42ab3396aafcedf38a9ff2b6. For more details please see the references link.
null
2022-04-25T06:59:05.271673Z
2022-04-24T21:37:22.133242Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/446fda4f26822b2d42ab3396aafcedf38a9ff2b6'}
Linux
GSD-2021-1001890
ice: Avoid crash from unnecessary IDA free
ice: Avoid crash from unnecessary IDA free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit 777682e59840e24e6c5672197e6ffbcf4bff823b, it was introduced in version v5.14 by commit d25a0fc41c1f927bb914e72a03c1898052557406. For more details please see the references link.
null
2021-12-19T22:47:57.647571Z
2021-10-28T13:54:18.632658Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d25a0fc41c1f927bb914e72a03c1898052557406'}
Linux
GSD-2021-1000782
btrfs: fixup error handling in fixup_inode_link_counts
btrfs: fixup error handling in fixup_inode_link_counts This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.43 by commit 48568f3944ee7357e8fed394804745bd981e978a, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T23:18:43.345151Z
2021-06-25T00:05:17.855189Z
null
null
null
null
null
Linux
GSD-2021-1002245
btrfs: fix memory ordering between normal and ordered work functions
btrfs: fix memory ordering between normal and ordered work functions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.218 by commit ed058d735a70f4b063323f1a7bb33cda0f987513, it was introduced in version v3.15 by commit 08a9ff3264181986d1d692a4e6fce3669700c9f8. For more details please see the references link.
null
2021-12-20T00:31:44.516684Z
2021-11-29T02:35:03.215274Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/08a9ff3264181986d1d692a4e6fce3669700c9f8'}
Linux
GSD-2021-1000278
spi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails
spi: spi-zynqmp-gqspi: return -ENOMEM if dma_map_single fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit bad5a23cf2b477fa78b85fd392736dae09a1e818, it was introduced in version v5.10 by commit 1c26372e5aa9e53391a1f8fe0dc7cd93a7e5ba9e. For more details please see the references link.
null
2021-12-20T00:38:20.942497Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c26372e5aa9e53391a1f8fe0dc7cd93a7e5ba9e'}
Linux
GSD-2022-1001345
ata: sata_dwc_460ex: Fix crash due to OOB write
ata: sata_dwc_460ex: Fix crash due to OOB write This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 234c0132f76f0676d175757f61b0025191a3d935, it was introduced in version v4.18 by commit 28361c403683c2b00d4f5e76045f3ccd299bf99d. For more details please see the references link.
null
2022-04-25T05:22:35.224647Z
2022-04-24T21:06:25.387127Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/28361c403683c2b00d4f5e76045f3ccd299bf99d'}
Linux
GSD-2021-1002615
xen/netback: don't queue unlimited number of packages
xen/netback: don't queue unlimited number of packages This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.296 by commit 0928efb09178e01d3dc8e8849aa1c807436c3c37, it was introduced in version v3.18 by commit f48da8b14d04ca87ffcffe68829afd45f926ec6a. For more details please see the references link.
null
2022-01-11T05:56:52.591803Z
2021-12-27T05:27:19.695198Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f48da8b14d04ca87ffcffe68829afd45f926ec6a'}
Linux
GSD-2021-1000628
net: dsa: fix a crash if ->get_sset_count() fails
net: dsa: fix a crash if ->get_sset_count() fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.124 by commit ce5355f140a7987011388c7e30c4f8fbe180d3e8, it was introduced in version v4.7 by commit badf3ada60ab8f76f9488dc8f5c0c57f70682f5a. For more details please see the references link.
null
2021-12-20T01:26:38.599481Z
2021-06-04T19:50:09.066889Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/badf3ada60ab8f76f9488dc8f5c0c57f70682f5a'}
Linux
GSD-2022-1000104
yam: fix a memory leak in yam_siocdevprivate()
yam: fix a memory leak in yam_siocdevprivate() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.265 by commit 4bbdfb71d2898a9d6e777a948a7484903a4ad2c3, it was introduced in version v4.14.79 by commit d0539c56391d449603f7ff2bcddf38995df49749. For more details please see the references link.
null
2022-02-19T09:35:57.047594Z
2022-02-18T21:35:39.462224Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0539c56391d449603f7ff2bcddf38995df49749'}
Linux
GSD-2022-1002139
NFSD: prevent underflow in nfssvc_decode_writeargs()
NFSD: prevent underflow in nfssvc_decode_writeargs() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 65e21cc042f4c1518c8c55283f53bc725b78419d. For more details please see the references link.
null
2022-04-25T05:48:26.138326Z
2022-04-24T22:15:27.267989Z
null
null
null
null
null
Linux
GSD-2021-1001193
sunrpc: Avoid a KASAN slab-out-of-bounds bug in xdr_set_page_base()
sunrpc: Avoid a KASAN slab-out-of-bounds bug in xdr_set_page_base() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.4 by commit a02357d7532b88e97329bd7786c7e72601109704, it was introduced in version v5.11 by commit 8d86e373b0ef52d091ced9583ffbb33ad2771576. For more details please see the references link.
null
2021-12-20T00:38:09.039247Z
2021-08-03T01:34:01.170625Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8d86e373b0ef52d091ced9583ffbb33ad2771576'}
Linux
GSD-2021-1001469
net: fix uninit-value in caif_seqpkt_sendmsg
net: fix uninit-value in caif_seqpkt_sendmsg This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.277 by commit d9d646acad2c3590e189bb5d5c86ab8bd8a2dfc3, it was introduced in version v2.6.35 by commit bece7b2398d073d11b2e352405a3ecd3a1e39c60. For more details please see the references link.
null
2021-12-19T22:12:31.391758Z
2021-08-03T02:50:28.028060Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bece7b2398d073d11b2e352405a3ecd3a1e39c60'}
Linux
GSD-2022-1000554
crypto: af_alg - get rid of alg_memory_allocated
crypto: af_alg - get rid of alg_memory_allocated This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit 9d06f489b9e901580159e21fdc29f73df7ed08dc, it was introduced in version v5.16 by commit 2bb2f5fb21b0486ff69b7b4a1fe03a760527d133. For more details please see the references link.
null
2022-03-07T01:44:37.728248Z
2022-02-27T03:23:18.840642Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2bb2f5fb21b0486ff69b7b4a1fe03a760527d133'}
Linux
GSD-2021-1001039
gpio: wcd934x: Fix shift-out-of-bounds error
gpio: wcd934x: Fix shift-out-of-bounds error This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.11 by commit dd55331d493b7ea75c5db1f24d6822946fde2862, it was introduced in version v5.6 by commit 59c324683400b41caa6d85b091e812ee3d5415c3. For more details please see the references link.
null
2021-12-20T00:16:37.436141Z
2021-06-30T00:35:39.669891Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/59c324683400b41caa6d85b091e812ee3d5415c3'}
Linux
GSD-2022-1002093
dax: make sure inodes are flushed before destroy cache
dax: make sure inodes are flushed before destroy cache This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit ec376f5c11c88c0215d173599db8449cd4196759, it was introduced in version v4.12 by commit 7b6be8444e0f0dd675b54d059793423d3c9b4c03. For more details please see the references link.
null
2022-04-25T05:46:26.772251Z
2022-04-24T22:10:19.599208Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7b6be8444e0f0dd675b54d059793423d3c9b4c03'}
Linux
GSD-2022-1000041
usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.
usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.90 by commit 1c4ace3e6b8575745c50dca9e76e0021e697d645, it was introduced in version v4.0 by commit 5e33f6fdf735cda1d4580fe6f1878da05718fe73. For more details please see the references link.
null
2022-01-11T05:57:12.420102Z
2022-01-10T19:51:28.687092Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5e33f6fdf735cda1d4580fe6f1878da05718fe73'}
Linux
GSD-2022-1000411
NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes
NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit 37f2d2cd8eadddbbd9c7bda327a9393399b2f89b. For more details please see the references link.
null
2022-03-07T02:33:04.535526Z
2022-02-27T03:02:50.432770Z
null
null
null
null
null
Linux
GSD-2021-1001486
seq_buf: Fix overflow in seq_buf_putmem_hex()
seq_buf: Fix overflow in seq_buf_putmem_hex() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.276 by commit 7ad5c2f4dff68a00d24f0692e027b99c7231b995, it was introduced in version v2.6.27 by commit 5e3ca0ec76fce92daa4eed0d02de9c79b1fe3920. For more details please see the references link.
null
2021-12-20T00:37:44.730393Z
2021-08-03T02:56:00.967460Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5e3ca0ec76fce92daa4eed0d02de9c79b1fe3920'}
Linux
GSD-2021-1002300
usb: musb: tusb6010: check return value after calling platform_get_resource()
usb: musb: tusb6010: check return value after calling platform_get_resource() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.82 by commit 679eee466d0f9ffa60a2b0c6ec19be5128927f04. For more details please see the references link.
null
2021-12-19T23:51:46.438999Z
2021-11-29T02:37:40.197870Z
null
null
null
null
null
Linux
GSD-2022-1000942
usb: gadget: clear related members when goto fail
usb: gadget: clear related members when goto fail This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.305 by commit e09100044e658fb7906494ed5109323ba64f3e7a. For more details please see the references link.
null
2022-03-18T02:55:09.594327Z
2022-03-18T00:34:56.415416Z
null
null
null
null
null
Linux
GSD-2022-1001650
memory: renesas-rpc-if: fix platform-device leak in error path
memory: renesas-rpc-if: fix platform-device leak in error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.35 by commit 05d1824a7fb43ab9adb1eb82404954af81d8c984, it was introduced in version v5.9 by commit ca7d8b980b67f133317525c4273e144116ee1ae5. For more details please see the references link.
null
2022-04-25T06:51:13.526454Z
2022-04-24T21:31:44.277443Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca7d8b980b67f133317525c4273e144116ee1ae5'}
Linux
GSD-2021-1002750
igbvf: fix double free in `igbvf_probe`
igbvf: fix double free in `igbvf_probe` This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit 944b8be08131f5faf2cd2440aa1c24a39a163a54, it was introduced in version v2.6.30 by commit d4e0fe01a38a073568aee541a0247fe734095979. For more details please see the references link.
null
2022-01-11T05:57:43.942475Z
2021-12-27T05:46:59.441709Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d4e0fe01a38a073568aee541a0247fe734095979'}
Linux
GSD-2022-1001200
Bluetooth: hci_uart: add missing NULL check in h5_enqueue
Bluetooth: hci_uart: add missing NULL check in h5_enqueue This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 8a3896c30f542439d36303183dc96f65df8cc528, it was introduced in version v5.15 by commit d9dd833cf6d29695682ec7e7924c0d0992b906bc. For more details please see the references link.
null
2022-04-25T05:50:06.266335Z
2022-04-24T20:53:11.016250Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9dd833cf6d29695682ec7e7924c0d0992b906bc'}
Linux
GSD-2021-1000297
crypto: sun8i-ss - fix result memory leak on error path
crypto: sun8i-ss - fix result memory leak on error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 50e7b39b808430ad49a637dc6fb72ca93b451b13, it was introduced in version v5.10 by commit d9b45418a91773b7672e4c60037a28074b495c6d. For more details please see the references link.
null
2021-12-19T23:51:27.914423Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9b45418a91773b7672e4c60037a28074b495c6d'}
Linux
GSD-2021-1002584
HID: bigbenff: prevent null pointer dereference
HID: bigbenff: prevent null pointer dereference This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.8 by commit 58f15f5ae7786c824868f3a7e093859b74669ce7. For more details please see the references link.
null
2021-12-20T01:35:38.156918Z
2021-12-19T19:43:47.093352Z
null
null
null
null
null
Linux
GSD-2021-1000043
net: hso: fix NULL-deref on disconnect regression
net: hso: fix NULL-deref on disconnect regression This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.115 by commit d7fad2ce15bdbbd0fec3ebe999fd7cab2267f53e, it was introduced in version v5.4.112 by commit 4a2933c88399c0ebc738db39bbce3ae89786d723. For more details please see the references link.
null
2021-12-20T01:30:08.111854Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4a2933c88399c0ebc738db39bbce3ae89786d723'}
Linux
GSD-2022-1001484
gcc-plugins/stackleak: Exactly match strings instead of prefixes
gcc-plugins/stackleak: Exactly match strings instead of prefixes This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 59a1131272663ebfcb58b80b926c1aad6fd6d75b. For more details please see the references link.
null
2022-04-25T06:37:20.340583Z
2022-04-24T21:16:05.188569Z
null
null
null
null
null
Linux
GSD-2021-1000413
sctp: do asoc update earlier in sctp_sf_do_dupcook_a
sctp: do asoc update earlier in sctp_sf_do_dupcook_a This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.120 by commit b1b31948c0af44628e43353828453461bb74098f, it was introduced in version v5.4.41 by commit a204d577be70e0a0a6023cf1b9859c9ebffaeecd. For more details please see the references link.
null
2021-12-19T22:34:24.608645Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a204d577be70e0a0a6023cf1b9859c9ebffaeecd'}
Linux
GSD-2022-1002302
mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0)
mmmremap.c: avoid pointless invalidate_range_start/end on mremap(old_size=0) This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit e2c328c2a8f9de8b761bd4025b66c63120c55761. For more details please see the references link.
null
2022-04-25T05:45:26.533598Z
2022-04-24T22:32:11.944780Z
null
null
null
null
null
Linux
GSD-2021-1001652
RDMA/cma: Do not change route.addr.src_addr.ss_family
RDMA/cma: Do not change route.addr.src_addr.ss_family This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.71 by commit 0a16c9751e0f1de96f08643216cf1f19e8a5a787, it was introduced in version v5.10 by commit 732d41c545bb359cbb8c94698bdc1f8bcf82279c. For more details please see the references link.
null
2021-12-20T00:01:53.858347Z
2021-10-19T16:30:08.067943Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/732d41c545bb359cbb8c94698bdc1f8bcf82279c'}
Linux
GSD-2021-1000940
wq: handle VM suspension in stall detection
wq: handle VM suspension in stall detection This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.44 by commit ad241cb1cffbe7f9d121ba728a381416e8540954. For more details please see the references link.
null
2021-12-20T00:28:55.020056Z
2021-06-30T00:25:52.649591Z
null
null
null
null
null
Linux
GSD-2022-1000295
parisc: Fix data TLB miss in sba_unmap_sg
parisc: Fix data TLB miss in sba_unmap_sg This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.303 by commit f23f0444ead4d941165aa82ce2fcbb997dc00e97. For more details please see the references link.
null
2022-03-07T01:49:43.300169Z
2022-02-27T02:47:35.524773Z
null
null
null
null
null
Linux
GSD-2021-1001202
tty: serial: 8250: serial_cs: Fix a memory leak in error handling path
tty: serial: 8250: serial_cs: Fix a memory leak in error handling path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.4 by commit b2ef1f5de40342de44fc5355321595f91774dab5. For more details please see the references link.
null
2021-12-20T01:19:42.175358Z
2021-08-03T01:36:13.606733Z
null
null
null
null
null
Linux
GSD-2022-1000780
iommu/vt-d: Fix double list_add when enabling VMD in scalable mode
iommu/vt-d: Fix double list_add when enabling VMD in scalable mode This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.27 by commit 2aaa085bd012a83be7104356301828585a2253ed, it was introduced in version v5.14 by commit 474dd1c6506411752a9b2f2233eec11f1733a099. For more details please see the references link.
null
2022-03-18T02:49:43.311849Z
2022-03-18T00:17:37.156971Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/474dd1c6506411752a9b2f2233eec11f1733a099'}
Linux
GSD-2022-1001892
block: don't delete queue kobject before its children
block: don't delete queue kobject before its children This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit efaa0e969261e97c1fdd8e0338e5dd3ba5b9219c, it was introduced in version v4.16 by commit 2c2086afc2b8b974fac32cb028e73dc27bfae442. For more details please see the references link.
null
2022-04-25T03:11:49.869527Z
2022-04-24T21:52:37.705101Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c2086afc2b8b974fac32cb028e73dc27bfae442'}
Linux
GSD-2021-1001717
ipack: ipoctal: fix stack information leak
ipack: ipoctal: fix stack information leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit 0a9c36a2e06a249acbed64e8e0b84637c2ad7575, it was introduced in version v3.5 by commit ba4dc61fe8c545a5d6a68b63616776556b771f51. For more details please see the references link.
null
2021-12-20T00:15:07.872406Z
2021-10-19T16:33:18.935161Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ba4dc61fe8c545a5d6a68b63616776556b771f51'}
Linux
GSD-2021-1000805
io_uring: fix ltout double free on completion race
io_uring: fix ltout double free on completion race This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.10 by commit 1f64f5e903b9d1d157875721e02adadc9d6f0a5d, it was introduced in version v5.11 by commit 90cd7e424969d29aff653333b4dcb4e2e199d791. For more details please see the references link.
null
2021-12-20T01:35:52.209441Z
2021-06-25T00:08:30.486275Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/90cd7e424969d29aff653333b4dcb4e2e199d791'}
Linux
GSD-2021-1002838
kfence: fix memory leak when cat kfence objects
kfence: fix memory leak when cat kfence objects This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.12 by commit 2f06c8293d27f6337f907042c602c9c953988c48, it was introduced in version v5.12 by commit 0ce20dd840897b12ae70869c69f1ba34d6d16965. For more details please see the references link.
null
2022-01-11T05:57:55.770190Z
2021-12-30T02:45:43.403363Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0ce20dd840897b12ae70869c69f1ba34d6d16965'}
Linux
GSD-2022-1002247
drm/tegra: Fix reference leak in tegra_dsi_ganged_probe
drm/tegra: Fix reference leak in tegra_dsi_ganged_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit a725070701883fe62266ee6d2f31d67e6cdd31df, it was introduced in version v3.19 by commit e94236cde4d519cdecd45e2435defba33abdc99f. For more details please see the references link.
null
2022-04-25T05:28:37.890814Z
2022-04-24T22:25:49.068001Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e94236cde4d519cdecd45e2435defba33abdc99f'}
Linux
GSD-2021-1001347
smackfs: restrict bytes count in smk_set_cipso()
smackfs: restrict bytes count in smk_set_cipso() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.133 by commit 135122f174c357b7a3e58f40fa5792156c5e93e6. For more details please see the references link.
null
2021-12-19T23:44:31.206758Z
2021-08-03T02:14:00.667610Z
null
null
null
null
null
Linux
GSD-2022-1001938
ALSA: pcm: Fix races among concurrent hw_params and hw_free calls
ALSA: pcm: Fix races among concurrent hw_params and hw_free calls This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.32 by commit 33061d0fba51d2bf70a2ef9645f703c33fe8e438. For more details please see the references link.
null
2022-04-25T05:51:13.257108Z
2022-04-24T21:56:28.440946Z
null
null
null
null
null
Linux
GSD-2022-1001191
ax25: Fix NULL pointer dereferences in ax25 timers
ax25: Fix NULL pointer dereferences in ax25 timers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit a45dba71849a963c427637b3330e2ccf098f42d1, it was introduced in version v5.17 by commit 7ec02f5ac8a5be5a3f20611731243dc5e1d9ba10. For more details please see the references link.
null
2022-04-25T03:14:02.987246Z
2022-04-24T20:52:22.129112Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ec02f5ac8a5be5a3f20611731243dc5e1d9ba10'}
Linux
GSD-2021-1000106
md/raid1: properly indicate failure when ending a failed write request
md/raid1: properly indicate failure when ending a failed write request This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.20 by commit 59452e551784b7a57a45d971727e9db63b192515, it was introduced in version v5.4 by commit eeba6809d8d58908b5ed1b5ceb5fcb09a98a7cad. For more details please see the references link.
null
2021-12-20T00:53:31.573415Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/eeba6809d8d58908b5ed1b5ceb5fcb09a98a7cad'}
Linux
GSD-2021-1000556
drm/meson: fix shutdown crash when component not probed
drm/meson: fix shutdown crash when component not probed This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit b4b91033a0b11fe9ade58156cd9168f89f4a8c1a, it was introduced in version v5.12 by commit fa0c16caf3d73ab4d2e5d6fa2ef2394dbec91791. For more details please see the references link.
null
2021-12-20T00:53:29.484183Z
2021-06-04T19:38:12.655017Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fa0c16caf3d73ab4d2e5d6fa2ef2394dbec91791'}
Linux
GSD-2021-1002091
drm/msm/submit: fix overflow check on 64-bit architectures
drm/msm/submit: fix overflow check on 64-bit architectures This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit 00ba7a3951f4ea7c91b29e2bfbb3a4ecf72bf542, it was introduced in version v5.11 by commit 20224d715a882210428ea62bba93f1bc4a0afe23. For more details please see the references link.
null
2021-12-19T22:45:38.142228Z
2021-11-14T15:19:25.342915Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/20224d715a882210428ea62bba93f1bc4a0afe23'}
Linux
GSD-2022-1000503
arm64: dts: meson-sm1-odroid: use correct enable-gpio pin for tf-io regulator
arm64: dts: meson-sm1-odroid: use correct enable-gpio pin for tf-io regulator This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 0a0a0be9ed6144ffb1698487d7c7bff3543cfe9c, it was introduced in version v5.14 by commit 1f80a5cf74a60997b92d2cde772edec093bec4d9. For more details please see the references link.
null
2022-03-07T01:44:22.658569Z
2022-02-27T03:16:03.604739Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1f80a5cf74a60997b92d2cde772edec093bec4d9'}
Linux
GSD-2021-1001594
sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb
sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.151 by commit ec018021cf445abbe8e2f3e2a7f1dcc813cb8ea1, it was introduced in version v4.8 by commit 3acb50c18d8d6650f10919464ade4dcdaf41d62f. For more details please see the references link.
null
2021-12-19T22:39:38.560729Z
2021-10-19T16:25:26.670929Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3acb50c18d8d6650f10919464ade4dcdaf41d62f'}
Linux
GSD-2022-1002494
kgdboc: fix return value of __setup handler
kgdboc: fix return value of __setup handler This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit 1e7e9c5794bed0bc87c687d9496c83f1c389e7b4, it was introduced in version v4.9.137 by commit c90ea7d8b3109d2a09af1791908f0edd91bbe745. For more details please see the references link.
null
2022-04-25T06:13:56.449241Z
2022-04-24T22:53:54.601923Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c90ea7d8b3109d2a09af1791908f0edd91bbe745'}
Linux
GSD-2022-1000153
i40e: Fix queues reservation for XDP
i40e: Fix queues reservation for XDP This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.176 by commit be6998f232b8e4ca8225029e305b8329d89bfd59, it was introduced in version v3.12 by commit 41c445ff0f482bb6e6b72dcee9e598e20575f743. For more details please see the references link.
null
2022-02-19T10:59:54.451322Z
2022-02-18T21:47:53.785475Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41c445ff0f482bb6e6b72dcee9e598e20575f743'}
Linux
GSD-2021-1002642
xen/netfront: harden netfront against event channel storms
xen/netfront: harden netfront against event channel storms This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.259 by commit 4bf81386e3d6e5083c93d51eff70260bcec091bb. For more details please see the references link.
null
2022-01-11T06:43:51.881657Z
2021-12-27T05:29:09.800510Z
null
null
null
null
null
Linux
GSD-2022-1001312
jffs2: fix use-after-free in jffs2_clear_xattr_subsystem
jffs2: fix use-after-free in jffs2_clear_xattr_subsystem This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 8c0f024f29e055840a5a89fe23b96ae3f921afed, it was introduced in version v2.6.18 by commit aa98d7cf59b5b0764d3502662053489585faf2fe. For more details please see the references link.
null
2022-04-25T05:22:48.859727Z
2022-04-24T21:03:34.577670Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/aa98d7cf59b5b0764d3502662053489585faf2fe'}
Linux
GSD-2021-1000385
spi: Fix use-after-free with devm_spi_alloc_*
spi: Fix use-after-free with devm_spi_alloc_* This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit c7fabe372a9031acd00498bc718ce27c253abfd1, it was introduced in version v5.10 by commit 5e844cc37a5cbaa460e68f9a989d321d63088a89. For more details please see the references link.
null
2021-12-19T23:57:15.800993Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5e844cc37a5cbaa460e68f9a989d321d63088a89'}
Linux
GSD-2021-1002212
comedi: dt9812: fix DMA buffers on stack
comedi: dt9812: fix DMA buffers on stack This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.2 by commit 20cebb8b620dc987e55ddc46801de986e081757e, it was introduced in version v2.6.29 by commit 63274cd7d38a3322d90b66a5bc976de1fb899051. For more details please see the references link.
null
2021-12-20T01:35:01.324459Z
2021-11-14T15:24:54.795770Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63274cd7d38a3322d90b66a5bc976de1fb899051'}
Linux
GSD-2022-1000850
usb: gadget: rndis: add spinlock for rndis response list
usb: gadget: rndis: add spinlock for rndis response list This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.103 by commit 4ce247af3f30078d5b97554f1ae6200a0222c15a, it was introduced in version v4.6 by commit f6281af9d62e128aa6efad29cf7265062af114f2. For more details please see the references link.
null
2022-03-18T02:58:25.735374Z
2022-03-18T00:23:59.526351Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f6281af9d62e128aa6efad29cf7265062af114f2'}
Linux
GSD-2022-1001742
Revert "nbd: fix possible overflow on 'first_minor' in nbd_dev_add()"
Revert "nbd: fix possible overflow on 'first_minor' in nbd_dev_add()" This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 3b14aa053181709d42319d4145855025c23ddd12. For more details please see the references link.
null
2022-04-25T06:35:46.415292Z
2022-04-24T21:38:40.485643Z
null
null
null
null
null
Linux
GSD-2022-1001257
ASoC: atmel: Fix error handling in snd_proto_probe
ASoC: atmel: Fix error handling in snd_proto_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 8fa969cd8485031294f91fc7184399000cae6355, it was introduced in version v4.20 by commit a45f8853a5f95e3760dfbd7ba09d3d597d247040. For more details please see the references link.
null
2022-04-25T04:00:14.568303Z
2022-04-24T20:58:35.560205Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a45f8853a5f95e3760dfbd7ba09d3d597d247040'}
Linux
GSD-2021-1001828
NFC: digital: fix possible memory leak in digital_tg_listen_mdaa()
NFC: digital: fix possible memory leak in digital_tg_listen_mdaa() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.155 by commit 7ab488d7228a9dceb2456867f1f0919decf6efed, it was introduced in version v3.13 by commit 1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8. For more details please see the references link.
null
2021-12-19T23:03:52.154724Z
2021-10-28T13:50:58.541494Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c7a4c24fbfd99442cc6e14dc80fcb00f118e8b8'}
Linux
GSD-2021-1002707
net/packet: rx_owner_map depends on pg_vec
net/packet: rx_owner_map depends on pg_vec This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.88 by commit 7da349f07e457cad135df0920a3f670e423fb5e9, it was introduced in version v5.6 by commit 61fad6816fc10fb8793a925d5c1256d1c3db0cd2. For more details please see the references link.
null
2022-01-11T05:47:42.223106Z
2021-12-27T05:38:16.032420Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61fad6816fc10fb8793a925d5c1256d1c3db0cd2'}
Linux
GSD-2022-1000915
vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
vhost/vsock: don't check owner in vhost_vsock_stop() while releasing This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.232 by commit 914f93fee61a05b524ed8d8d795fa236d19f4400, it was introduced in version v4.8 by commit 433fc58e6bf2c8bd97e57153ed28e64fd78207b8. For more details please see the references link.
null
2022-03-18T03:44:04.501486Z
2022-03-18T00:31:43.244912Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/433fc58e6bf2c8bd97e57153ed28e64fd78207b8'}
Linux
GSD-2022-1001607
cifs: fix NULL ptr dereference in smb2_ioctl_query_info()
cifs: fix NULL ptr dereference in smb2_ioctl_query_info() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 0f0ce73e7dad17084222da19989049ebfb8be541. For more details please see the references link.
null
2022-04-25T05:26:13.269247Z
2022-04-24T21:27:54.458192Z
null
null
null
null
null
Linux
GSD-2021-1001982
mm, slub: fix mismatch between reconstructed freelist depth and cnt
mm, slub: fix mismatch between reconstructed freelist depth and cnt This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.214 by commit 21e23e4c02fc9aa1f4b037f30e47d215d1a27f21, it was introduced in version v4.17 by commit c3895391df385c6628638f014c87e16f5e2efd45. For more details please see the references link.
null
2021-12-19T23:56:58.245214Z
2021-11-14T15:14:31.760215Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c3895391df385c6628638f014c87e16f5e2efd45'}
Linux
GSD-2021-1000690
tipc: skb_linearize the head skb when reassembling msgs
tipc: skb_linearize the head skb when reassembling msgs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.271 by commit 5489f30bb78ff0dafb4229a69632afc2ba20765c, it was introduced in version v4.3 by commit 45c8b7b175ceb2d542e0fe15247377bf3bce29ec. For more details please see the references link.
null
2021-12-19T23:00:10.336099Z
2021-06-04T20:03:00.675178Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/45c8b7b175ceb2d542e0fe15247377bf3bce29ec'}
Linux
GSD-2021-1002357
scsi: mpt3sas: Fix kernel panic during drive powercycle test
scsi: mpt3sas: Fix kernel panic during drive powercycle test This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.294 by commit 5d4d50b1f159a5ebab7617f47121b4370aa58afe, it was introduced in version v3.8 by commit f92363d12359498f9a9960511de1a550f0ec41c2. For more details please see the references link.
null
2021-12-20T01:00:01.774027Z
2021-12-19T19:33:47.459392Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f92363d12359498f9a9960511de1a550f0ec41c2'}
Linux
GSD-2022-1000446
vt_ioctl: fix array_index_nospec in vt_setactivate
vt_ioctl: fix array_index_nospec in vt_setactivate This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit ffe54289b02e9c732d6f04c8ebbe3b2d90d32118. For more details please see the references link.
null
2022-03-07T01:40:11.304183Z
2022-02-27T03:08:14.980331Z
null
null
null
null
null
Linux
GSD-2022-1002181
dpaa2-ptp: Fix refcount leak in dpaa2_ptp_probe
dpaa2-ptp: Fix refcount leak in dpaa2_ptp_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit fbe5f4c0dd3475178f17ddd8b8d5044ebeae0be7, it was introduced in version v5.3 by commit d346c9e86d8685d7cdceddf5b2e9c4376334620c. For more details please see the references link.
null
2022-04-25T07:37:08.858786Z
2022-04-24T22:19:29.269038Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d346c9e86d8685d7cdceddf5b2e9c4376334620c'}
Linux
GSD-2022-1000016
net: fix use-after-free in tw_timer_handler
net: fix use-after-free in tw_timer_handler This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.261 by commit 5c2fe20ad37ff56070ae0acb34152333976929b4, it was introduced in version v2.6.27 by commit 61a7e26028b94805fd686a6dc9dbd9941f8f19b0. For more details please see the references link.
null
2022-01-11T05:54:01.028263Z
2022-01-10T19:50:17.942238Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61a7e26028b94805fd686a6dc9dbd9941f8f19b0'}
Linux
GSD-2021-1001081
x86/ioremap: Map EFI-reserved memory as encrypted for SEV
x86/ioremap: Map EFI-reserved memory as encrypted for SEV This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit b7a05aba39f733ec337c5b952e112dd2dc4fc404, it was introduced in version v5.10 by commit 58c909022a5a56cd1d9e89c8c5461fd1f6a27bb5. For more details please see the references link.
null
2021-12-19T23:41:00.046268Z
2021-06-30T00:38:21.249314Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/58c909022a5a56cd1d9e89c8c5461fd1f6a27bb5'}
Linux
GSD-2022-1000061
usb: mtu3: fix list_head check warning
usb: mtu3: fix list_head check warning This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.13 by commit 249ddfbe00570d6dc76208e88017937d4d374c79, it was introduced in version v5.2 by commit 83374e035b6286731c5aa617844c7b724294c2a7. For more details please see the references link.
null
2022-01-11T05:48:20.554431Z
2022-01-10T19:52:20.263637Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/83374e035b6286731c5aa617844c7b724294c2a7'}
Linux
GSD-2022-1000431
net: dsa: lantiq_gswip: don't use devres for mdiobus
net: dsa: lantiq_gswip: don't use devres for mdiobus This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit b5652bc50dde7b84e93dfb25479b64b817e377c1, it was introduced in version v5.9 by commit ac3a68d56651c3dad2c12c7afce065fe15267f44. For more details please see the references link.
null
2022-03-07T01:33:50.227090Z
2022-02-27T03:06:32.884313Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac3a68d56651c3dad2c12c7afce065fe15267f44'}
Linux
GSD-2021-1002320
net/mlx5e: nullify cq->dbg pointer in mlx5_debug_cq_remove()
net/mlx5e: nullify cq->dbg pointer in mlx5_debug_cq_remove() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.5 by commit 2ae38157080616a13a9fe3f0b4b6ec0070aa408a, it was introduced in version v5.15 by commit 94b960b9deffc02fc0747afc01f72cc62ab099e3. For more details please see the references link.
null
2021-12-20T00:07:07.517108Z
2021-11-29T02:38:36.306378Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/94b960b9deffc02fc0747afc01f72cc62ab099e3'}
Linux
GSD-2022-1000962
ipv6: fix panic when forwarding a pkt with no in6 dev
ipv6: fix panic when forwarding a pkt with no in6 dev This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.4 by commit e69fb3de87a8923e5931a272a38fa3cceb01da44, it was introduced in version v5.14 by commit ccd27f05ae7b8ebc40af5b004e94517a919aa862. For more details please see the references link.
null
2022-04-25T04:20:04.577827Z
2022-04-24T20:35:25.515301Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ccd27f05ae7b8ebc40af5b004e94517a919aa862'}
Linux
GSD-2022-1001670
ata: sata_dwc_460ex: Fix crash due to OOB write
ata: sata_dwc_460ex: Fix crash due to OOB write This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 8a05a6952ecd59aaa62cbdcdaf523ae2c8f436e8, it was introduced in version v4.18 by commit 28361c403683c2b00d4f5e76045f3ccd299bf99d. For more details please see the references link.
null
2022-04-25T03:50:09.978496Z
2022-04-24T21:33:41.812064Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/28361c403683c2b00d4f5e76045f3ccd299bf99d'}
Linux
GSD-2021-1002770
xen/netfront: harden netfront against event channel storms
xen/netfront: harden netfront against event channel storms This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit a29c8b5226eda52e6d6ff151d9343558ea3ad451. For more details please see the references link.
null
2022-01-11T08:30:41.995794Z
2021-12-27T05:53:37.770205Z
null
null
null
null
null
Linux
GSD-2022-1001220
drm/tegra: Fix reference leak in tegra_dsi_ganged_probe
drm/tegra: Fix reference leak in tegra_dsi_ganged_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit f3c99c686e098300c246e5e8a1474133e3dacb05, it was introduced in version v3.19 by commit e94236cde4d519cdecd45e2435defba33abdc99f. For more details please see the references link.
null
2022-04-25T05:15:41.503055Z
2022-04-24T20:55:10.972907Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e94236cde4d519cdecd45e2435defba33abdc99f'}
Linux
GSD-2022-1000827
net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe()
net: arcnet: com20020: Fix null-ptr-deref in com20020pci_probe() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.104 by commit 5f394102ee27dbf051a4e283390cd8d1759dacea, it was introduced in version v3.18 by commit 8c14f9c70327a6fb75534c4c61d7ea9c82ccf78f. For more details please see the references link.
null
2022-03-18T02:50:13.170519Z
2022-03-18T00:21:54.418277Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c14f9c70327a6fb75534c4c61d7ea9c82ccf78f'}
Linux
GSD-2022-1001735
ath11k: pci: fix crash on suspend if board file is not found
ath11k: pci: fix crash on suspend if board file is not found This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit fed4cef115ab21a18faf499b3fa9b9a4b544f941. For more details please see the references link.
null
2022-04-25T06:01:46.086571Z
2022-04-24T21:38:20.087561Z
null
null
null
null
null
Linux
GSD-2021-1000258
liquidio: Fix unintented sign extension of a left shift of a u16
liquidio: Fix unintented sign extension of a left shift of a u16 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit 769003fd970c05a2ad21fee5429dd5a49feefd09, it was introduced in version v4.9 by commit 5bc67f587ba7eaa8dd3976bfeff8f2b60718c871. For more details please see the references link.
null
2021-12-19T22:01:57.196005Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5bc67f587ba7eaa8dd3976bfeff8f2b60718c871'}
Linux
GSD-2021-1002265
perf bpf: Avoid memory leak from perf_env__insert_btf()
perf bpf: Avoid memory leak from perf_env__insert_btf() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.162 by commit 642fc22210a5e59d40b1e4d56d21ec3effd401f2, it was introduced in version v5.1 by commit 3792cb2ff43b1b193136a03ce1336462a827d792. For more details please see the references link.
null
2021-12-20T00:35:44.924460Z
2021-11-29T02:36:04.247909Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3792cb2ff43b1b193136a03ce1336462a827d792'}
Linux
GSD-2022-1001365
net/tls: fix slab-out-of-bounds bug in decrypt_internal
net/tls: fix slab-out-of-bounds bug in decrypt_internal This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 29be1816cbab9a0dc6243120939fd10a92753756, it was introduced in version v5.2 by commit f295b3ae9f5927e084bd5decdff82390e3471801. For more details please see the references link.
null
2022-04-25T06:36:44.690794Z
2022-04-24T21:08:15.719926Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f295b3ae9f5927e084bd5decdff82390e3471801'}