ecosystem
stringclasses
14 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
267
details
stringlengths
9
13.5k
aliases
stringlengths
17
144
modified_date
stringdate
2010-05-27 05:47:00
2022-05-10 08:46:52
published_date
stringdate
2005-12-31 05:00:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
988 values
refs
stringlengths
30
17.7k
introduced
stringlengths
75
4.26k
Linux
GSD-2022-1000445
perf: Fix list corruption in perf_cgroup_switch()
perf: Fix list corruption in perf_cgroup_switch() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit 7969fe91c9830e045901970e9d755b7505881d4a, it was introduced in version v4.11 by commit 058fe1c0440e68a1ba3c2270ae43e9f0298b27d8. For more details please see the references link.
null
2022-03-07T01:34:28.762184Z
2022-02-27T03:08:08.172897Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/058fe1c0440e68a1ba3c2270ae43e9f0298b27d8'}
Linux
GSD-2022-1002478
dm ioctl: prevent potential spectre v1 gadget
dm ioctl: prevent potential spectre v1 gadget This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit 76c94651005f58885facf9c973007f5ea01ab01f. For more details please see the references link.
null
2022-04-25T05:17:52.394135Z
2022-04-24T22:52:32.661943Z
null
null
null
null
null
Linux
GSD-2021-1001128
s390/stack: fix possible register corruption with stack switch helper
s390/stack: fix possible register corruption with stack switch helper This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.47 by commit 5fd0c2cf7b11c23aebbbc512cfed08485f0a422a, it was introduced in version v4.20 by commit ff340d2472ec7618443913928af9fb85a7009270. For more details please see the references link.
null
2021-12-20T01:30:36.536162Z
2021-07-08T01:58:20.132359Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ff340d2472ec7618443913928af9fb85a7009270'}
Linux
GSD-2022-1002182
qede: confirm skb is allocated before using
qede: confirm skb is allocated before using This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 034a92c6a81048128fc7b18d278d52438a13902a, it was introduced in version v4.18 by commit 8a8633978b842c88fbcfe00d4e5dde96048f630e. For more details please see the references link.
null
2022-04-25T06:09:23.513587Z
2022-04-24T22:19:35.870657Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8a8633978b842c88fbcfe00d4e5dde96048f630e'}
Linux
GSD-2022-1000015
binder: fix async_free_space accounting for empty parcels
binder: fix async_free_space accounting for empty parcels This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.261 by commit 2d2df539d05205fd83c404d5f2dff48d36f9b495, it was introduced in version v4.14 by commit 74310e06be4d74dcf67cd108366710dee5c576d5. For more details please see the references link.
null
2022-01-11T05:56:43.576990Z
2022-01-10T19:50:15.580101Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/74310e06be4d74dcf67cd108366710dee5c576d5'}
Linux
GSD-2022-1002028
wireguard: socket: free skb in send6 when ipv6 is disabled
wireguard: socket: free skb in send6 when ipv6 is disabled This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 096f9d35cac0a0c95ffafc00db84786b665a4837, it was introduced in version v5.6 by commit e7096c131e5161fa3b8e52a650d7719d2857adfd. For more details please see the references link.
null
2022-04-25T03:35:41.228898Z
2022-04-24T22:04:14.182205Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e7096c131e5161fa3b8e52a650d7719d2857adfd'}
Linux
GSD-2021-1001082
x86/fpu: Prevent state corruption in __fpu__restore_sig()
x86/fpu: Prevent state corruption in __fpu__restore_sig() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit ec25ea1f3f05d6f8ee51d1277efea986eafd4f2a, it was introduced in version v5.8 by commit b860eb8dce5906b14e3a7f3c771e0b3d6ef61b94. For more details please see the references link.
null
2021-12-19T23:02:37.729304Z
2021-06-30T00:38:25.011601Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b860eb8dce5906b14e3a7f3c771e0b3d6ef61b94'}
Linux
GSD-2021-1001578
bpf, s390: Fix potential memory leak about jit_data
bpf, s390: Fix potential memory leak about jit_data This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.153 by commit a326f9c01cfbee4450ae49ce618ae6cbc0f76842, it was introduced in version v5.4 by commit 1c8f9b91c456f5b47a377a0c8c5d4130fc39433a. For more details please see the references link.
null
2021-12-19T23:53:24.223556Z
2021-10-19T16:24:37.485594Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c8f9b91c456f5b47a377a0c8c5d4130fc39433a'}
Linux
GSD-2022-1001254
ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe
ASoC: atmel: Add missing of_node_put() in at91sam9g20ek_audio_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 4793a02deb31b71b3984abc67bf1011a03c13b18, it was introduced in version v3.8 by commit 531f67e41dcde1e358cf821d056241a66355cf03. For more details please see the references link.
null
2022-04-25T06:13:26.470361Z
2022-04-24T20:58:22.396007Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/531f67e41dcde1e358cf821d056241a66355cf03'}
Linux
GSD-2021-1002704
netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc
netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.88 by commit 1a34fb9e2bf3029f7c0882069d67ff69cbd645d8, it was introduced in version v4.16 by commit 395cacb5f1a0a290f1ae9ca4692c400d2b57a705. For more details please see the references link.
null
2022-01-11T05:53:39.431858Z
2021-12-27T05:38:07.944597Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/395cacb5f1a0a290f1ae9ca4692c400d2b57a705'}
Linux
GSD-2021-1000739
net: caif: fix memory leak in cfusbl_device_notify
net: caif: fix memory leak in cfusbl_device_notify This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.194 by commit 9ea0ab48e755d8f29fe89eb235fb86176fdb597f, it was introduced in version v3.3 by commit 7ad65bf68d705b445ef10b77ab50dab22be185ee. For more details please see the references link.
null
2021-12-19T23:24:59.466933Z
2021-06-25T00:00:20.587529Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ad65bf68d705b445ef10b77ab50dab22be185ee'}
Linux
GSD-2022-1001604
ASoC: SOF: Intel: Fix NULL ptr dereference when ENOMEM
ASoC: SOF: Intel: Fix NULL ptr dereference when ENOMEM This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit 09eca322d4118dc26570ca6100fa34e59e5a5143, it was introduced in version v5.2 by commit d16046ffa6de040bf580a64d5f4d0aa18258a854. For more details please see the references link.
null
2022-04-25T03:23:57.928894Z
2022-04-24T21:27:43.125193Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d16046ffa6de040bf580a64d5f4d0aa18258a854'}
Linux
GSD-2022-1000916
xen/netfront: react properly to failing gnttab_end_foreign_access_ref()
xen/netfront: react properly to failing gnttab_end_foreign_access_ref() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.271 by commit 1b9f4115738af90427a8c94a3980bc52fbb23296. For more details please see the references link.
null
2022-03-18T02:55:32.573153Z
2022-03-18T00:31:45.652916Z
null
null
null
null
null
Linux
GSD-2021-1000693
serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait'
serial: rp2: use 'request_firmware' instead of 'request_firmware_nowait' This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.271 by commit c697244ce940ec07e2d745ccb63ca97fc0266fbc, it was introduced in version by commit . For more details please see the references link.
null
2021-12-19T23:28:21.827074Z
2021-06-04T20:03:45.470470Z
null
null
null
null
null
Linux
GSD-2021-1001981
ocfs2: mount fails with buffer overflow in strlen
ocfs2: mount fails with buffer overflow in strlen This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.214 by commit 7623b1035ca2d17bde0f6a086ad6844a34648df1. For more details please see the references link.
null
2021-12-19T22:11:31.964731Z
2021-11-14T15:14:29.298541Z
null
null
null
null
null
Linux
GSD-2021-1002354
staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect()
staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.294 by commit d43aecb694b10db9a4228ce2d38b5ae8de374443, it was introduced in version v3.2 by commit 66898177e7e5486dc77a4ba742efa4e2e9e900a4. For more details please see the references link.
null
2021-12-19T22:44:23.040763Z
2021-12-19T19:33:40.484289Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/66898177e7e5486dc77a4ba742efa4e2e9e900a4'}
Linux
GSD-2021-1000369
nvmet-tcp: fix incorrect locking in state_change sk callback
nvmet-tcp: fix incorrect locking in state_change sk callback This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 60ade0d56b06537a28884745059b3801c78e03bc, it was introduced in version v5.0 by commit 872d26a391da92ed8f0c0f5cb5fef428067b7f30. For more details please see the references link.
null
2021-12-19T23:13:44.019274Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/872d26a391da92ed8f0c0f5cb5fef428067b7f30'}
Linux
GSD-2021-1002641
xen/blkfront: harden blkfront against event channel storms
xen/blkfront: harden blkfront against event channel storms This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.259 by commit 5ac3b68b79c9e964dd6f3cf80ff825518e502b79. For more details please see the references link.
null
2022-01-11T05:53:06.308251Z
2021-12-27T05:29:04.591788Z
null
null
null
null
null
Linux
GSD-2022-1001311
mm/pages_alloc.c: don't create ZONE_MOVABLE beyond the end of a node
mm/pages_alloc.c: don't create ZONE_MOVABLE beyond the end of a node This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 00fd0bbd8c8f7e3d2d370097b9475aaa3446a25c, it was introduced in version v2.6.23 by commit 2a1e274acf0b1c192face19a4be7c12d4503eaaf. For more details please see the references link.
null
2022-04-25T06:38:31.021295Z
2022-04-24T21:03:21.885214Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2a1e274acf0b1c192face19a4be7c12d4503eaaf'}
Linux
GSD-2021-1000386
soundwire: stream: fix memory leak in stream config error path
soundwire: stream: fix memory leak in stream config error path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 7c468deae306d0cbbd539408c26cfec04c66159a, it was introduced in version v4.18 by commit 89e590535f32d4bc548bcf266f3b046e50942f6d. For more details please see the references link.
null
2021-12-20T01:02:13.986054Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/89e590535f32d4bc548bcf266f3b046e50942f6d'}
Linux
GSD-2021-1002211
isofs: Fix out of bound access for corrupted isofs image
isofs: Fix out of bound access for corrupted isofs image This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.2 by commit e7fb722586a2936b37bdff096c095c30ca06404d. For more details please see the references link.
null
2021-12-19T22:16:03.534711Z
2021-11-14T15:24:52.376974Z
null
null
null
null
null
Linux
GSD-2022-1001741
ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111
ath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111 This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit be2f81024e7981565d90a4c9ca3067d11b6bca7f. For more details please see the references link.
null
2022-04-25T03:26:15.763963Z
2022-04-24T21:38:37.549362Z
null
null
null
null
null
Linux
GSD-2022-1000853
iio: adc: men_z188_adc: Fix a resource leak in an error handling path
iio: adc: men_z188_adc: Fix a resource leak in an error handling path This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.103 by commit 1aa12ecfdcbafebc218910ec47acf6262e600cf5, it was introduced in version v3.15 by commit 74aeac4da66fbfa246edbfc849002eac9b5af9ca. For more details please see the references link.
null
2022-03-18T03:33:48.088277Z
2022-03-18T00:24:23.418691Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/74aeac4da66fbfa246edbfc849002eac9b5af9ca'}
Linux
GSD-2022-1000500
usb: f_fs: Fix use-after-free for epfile
usb: f_fs: Fix use-after-free for epfile This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 3e078b18753669615301d946297bafd69294ad2c, it was introduced in version v4.9 by commit a9e6f83c2df199187a5248f824f31b6787ae23ae. For more details please see the references link.
null
2022-03-07T01:53:35.092691Z
2022-02-27T03:15:43.276694Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a9e6f83c2df199187a5248f824f31b6787ae23ae'}
Linux
GSD-2021-1001597
hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs
hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.151 by commit a6c42ae1530f94724d3c42cf91fe3d3c5e394f8a, it was introduced in version v4.19 by commit 65afb4c8e7e4e7e74b28efa1df62da503ca3e7a6. For more details please see the references link.
null
2021-12-20T00:07:43.467204Z
2021-10-19T16:25:34.862495Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/65afb4c8e7e4e7e74b28efa1df62da503ca3e7a6'}
Linux
GSD-2022-1002497
af_netlink: Fix shift out of bounds in group mask calculation
af_netlink: Fix shift out of bounds in group mask calculation This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit e1c5d46f05aa23d740daae5cd3a6472145afac42, it was introduced in version v2.6.14 by commit f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198. For more details please see the references link.
null
2022-04-25T06:25:44.177124Z
2022-04-24T22:54:27.597366Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f7fa9b10edbb9391bdd4ec8e8b3d621d0664b198'}
Linux
GSD-2022-1000150
psi: Fix uaf issue when psi trigger is destroyed while being polled
psi: Fix uaf issue when psi trigger is destroyed while being polled This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.177 by commit 2fd752ed77ab9880da927257b73294f29a199f1a, it was introduced in version v5.2 by commit 0e94682b73bfa6c44c98af7a26771c9c08c055d5. For more details please see the references link.
null
2022-02-19T03:05:24.405657Z
2022-02-18T21:47:33.442794Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0e94682b73bfa6c44c98af7a26771c9c08c055d5'}
Linux
GSD-2022-1002479
netlabel: fix out-of-bounds memory accesses
netlabel: fix out-of-bounds memory accesses This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.163 by commit 1c973f9c7cc2b3caae93192fdc8ecb3f0b4ac000, it was introduced in version v2.6.19 by commit 446fda4f26822b2d42ab3396aafcedf38a9ff2b6. For more details please see the references link.
null
2022-04-25T04:44:50.005567Z
2022-04-24T22:52:48.127514Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/446fda4f26822b2d42ab3396aafcedf38a9ff2b6'}
Linux
GSD-2022-1000444
mm: memcg: synchronize objcg lists with a dedicated spinlock
mm: memcg: synchronize objcg lists with a dedicated spinlock This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit 956cf21cd1ae1de63dd5850e2e287641cb4cc34a, it was introduced in version v5.9 by commit bf4f059954dcb221384b2f784677e19a13cd4bdb. For more details please see the references link.
null
2022-03-07T01:34:06.744520Z
2022-02-27T03:08:01.306871Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf4f059954dcb221384b2f784677e19a13cd4bdb'}
Linux
GSD-2022-1002183
drm/imx: Fix memory leak in imx_pd_connector_get_modes
drm/imx: Fix memory leak in imx_pd_connector_get_modes This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit c539a6a5896ed92bfb91494e46996d013f3d5967, it was introduced in version v4.8 by commit 76ecd9c9fb24b014a6f33fbb1287ede3be12158b. For more details please see the references link.
null
2022-04-25T06:03:32.278170Z
2022-04-24T22:19:43.967520Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/76ecd9c9fb24b014a6f33fbb1287ede3be12158b'}
Linux
GSD-2021-1001129
i2c: robotfuzz-osif: fix control-request directions
i2c: robotfuzz-osif: fix control-request directions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.47 by commit de0af2651daac89dac3eab73bcd1bfd653ccd36f, it was introduced in version v3.14 by commit 83e53a8f120f2f273cf0ad717f5372ab79ac24fe. For more details please see the references link.
null
2021-12-19T22:54:13.584333Z
2021-07-08T01:58:24.437886Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/83e53a8f120f2f273cf0ad717f5372ab79ac24fe'}
Linux
GSD-2021-1001083
x86/fpu: Invalidate FPU state after a failed XRSTOR from a user buffer
x86/fpu: Invalidate FPU state after a failed XRSTOR from a user buffer This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.13 by commit 002665dcba4bbec8c82f0aeb4bd3f44334ed2c14, it was introduced in version v5.2 by commit 1d731e731c4cd7cbd3b1aa295f0932e7610da82f. For more details please see the references link.
null
2021-12-20T01:21:50.178577Z
2021-06-30T00:38:28.878789Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1d731e731c4cd7cbd3b1aa295f0932e7610da82f'}
Linux
GSD-2022-1002029
wireguard: socket: ignore v6 endpoints when ipv6 is disabled
wireguard: socket: ignore v6 endpoints when ipv6 is disabled This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 49f77ab50a31ffad7b61fef01e42d8f105835cdb, it was introduced in version v5.6 by commit e7096c131e5161fa3b8e52a650d7719d2857adfd. For more details please see the references link.
null
2022-04-25T04:59:31.973360Z
2022-04-24T22:04:19.467107Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e7096c131e5161fa3b8e52a650d7719d2857adfd'}
Linux
GSD-2022-1000014
usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.
usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.296 by commit cc8c8028c21b2a3842a1e98e99e55028df275919, it was introduced in version v4.0 by commit 5e33f6fdf735cda1d4580fe6f1878da05718fe73. For more details please see the references link.
null
2022-01-11T05:47:35.195793Z
2022-01-10T19:50:13.084792Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5e33f6fdf735cda1d4580fe6f1878da05718fe73'}
Linux
GSD-2021-1001579
i40e: Fix freeing of uninitialized misc IRQ vector
i40e: Fix freeing of uninitialized misc IRQ vector This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.153 by commit 17063cac4088b8e2fc0f633abddca5426ed58312, it was introduced in version v4.15 by commit c17401a1dd210a5f22ab1ec7c7366037c158a14c. For more details please see the references link.
null
2021-12-20T01:00:29.523637Z
2021-10-19T16:24:40.180684Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c17401a1dd210a5f22ab1ec7c7366037c158a14c'}
Linux
GSD-2022-1001255
ASoC: mediatek: mt8192-mt6359: Fix error handling in mt8192_mt6359_dev_probe
ASoC: mediatek: mt8192-mt6359: Fix error handling in mt8192_mt6359_dev_probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 1765787ec02e824f4f5e672cf269280a5da09d2f, it was introduced in version v5.17 by commit 4e28491a7a198c668437f2be8a91a76aa52f20eb. For more details please see the references link.
null
2022-04-25T03:11:14.353356Z
2022-04-24T20:58:25.685831Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4e28491a7a198c668437f2be8a91a76aa52f20eb'}
Linux
GSD-2021-1000738
net: caif: fix memory leak in caif_device_notify
net: caif: fix memory leak in caif_device_notify This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.194 by commit 3be863c11cab725add9fef4237ed4e232c3fc3bb, it was introduced in version v3.3 by commit 7c18d2205ea76eef9674e59e1ecae4f332a53e9e. For more details please see the references link.
null
2021-12-19T22:25:32.032417Z
2021-06-25T00:00:16.839372Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7c18d2205ea76eef9674e59e1ecae4f332a53e9e'}
Linux
GSD-2021-1002705
sit: do not call ipip6_dev_free() from sit_init_net()
sit: do not call ipip6_dev_free() from sit_init_net() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.88 by commit 6f46c59e60b64620d5d386c8ee2eaa11ebe3b595, it was introduced in version v4.12 by commit cf124db566e6b036b8bcbe8decbed740bdfac8c6. For more details please see the references link.
null
2022-01-11T05:53:51.792829Z
2021-12-27T05:38:10.291623Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cf124db566e6b036b8bcbe8decbed740bdfac8c6'}
Linux
GSD-2021-1000692
NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce()
NFS: Don't corrupt the value of pg_bytes_written in nfs_do_recoalesce() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.271 by commit b291baae24f876acd5a5dd57d0bb2bbac8a68b0c, it was introduced in version v4.0 by commit a7d42ddb3099727f58366fa006f850a219cce6c8. For more details please see the references link.
null
2021-12-20T00:00:44.806217Z
2021-06-04T20:03:26.821716Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a7d42ddb3099727f58366fa006f850a219cce6c8'}
Linux
GSD-2021-1001980
ocfs2: fix data corruption after conversion from inline format
ocfs2: fix data corruption after conversion from inline format This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.214 by commit a3a089c241cd49b33a8cdd7fcb37cc87a086912a, it was introduced in version v4.19.155 by commit 7ce2b16bad2cbfa3fa7bbc42c4448914f639ca47. For more details please see the references link.
null
2021-12-20T00:10:50.271626Z
2021-11-14T15:14:26.946790Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ce2b16bad2cbfa3fa7bbc42c4448914f639ca47'}
Linux
GSD-2022-1001605
can: isotp: sanitize CAN ID checks in isotp_bind()
can: isotp: sanitize CAN ID checks in isotp_bind() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit cf522d741f5301223cc94b978eb1603c7590d65e, it was introduced in version v5.10 by commit e057dd3fc20ffb3d7f150af46542a51b59b90127. For more details please see the references link.
null
2022-04-25T04:58:40.761007Z
2022-04-24T21:27:47.569662Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e057dd3fc20ffb3d7f150af46542a51b59b90127'}
Linux
GSD-2022-1000917
xen/gnttab: fix gnttab_end_foreign_access() without page specified
xen/gnttab: fix gnttab_end_foreign_access() without page specified This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.271 by commit 94b8ccbcc063325d23daa1cea89ef799c8c673e9. For more details please see the references link.
null
2022-03-18T02:55:38.337544Z
2022-03-18T00:31:48.068546Z
null
null
null
null
null
Linux
GSD-2021-1000368
io_uring: fix overflows checks in provide buffers
io_uring: fix overflows checks in provide buffers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit cbbc13b115b8f18e0a714d89f87fbdc499acfe2d, it was introduced in version v5.8 by commit efe68c1ca8f49e8c06afd74b699411bfbb8ba1ff. For more details please see the references link.
null
2021-12-19T22:29:52.007618Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/efe68c1ca8f49e8c06afd74b699411bfbb8ba1ff'}
Linux
GSD-2021-1002355
proc/vmcore: fix clearing user buffer by properly using clear_user()
proc/vmcore: fix clearing user buffer by properly using clear_user() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.294 by commit a9e164bd160be8cbee1df70acb379129e3cd2e7c, it was introduced in version v3.0 by commit 997c136f518c5debd63847e78e2a8694f56dcf90. For more details please see the references link.
null
2021-12-20T00:07:17.872461Z
2021-12-19T19:33:42.891957Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/997c136f518c5debd63847e78e2a8694f56dcf90'}
Linux
GSD-2021-1002640
scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select()
scsi: scsi_debug: Sanity check block descriptor length in resp_mode_select() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.259 by commit 90491283b4064220682e4b0687d07b05df01e3bf. For more details please see the references link.
null
2022-01-11T07:17:48.740788Z
2021-12-27T05:28:40.069634Z
null
null
null
null
null
Linux
GSD-2021-1000387
bus: qcom: Put child node before return
bus: qcom: Put child node before return This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.37 by commit 00f6abd3509b1d70d0ab0fbe65ce5685cebed8be, it was introduced in version v4.9 by commit 335a127548081322bd2b294d715418648912f20c. For more details please see the references link.
null
2021-12-19T22:15:51.043907Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/335a127548081322bd2b294d715418648912f20c'}
Linux
GSD-2022-1001310
jffs2: fix memory leak in jffs2_scan_medium
jffs2: fix memory leak in jffs2_scan_medium This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 82462324bf35b6b553400af1c1aa265069cee28f, it was introduced in version v2.6.15 by commit e631ddba588783edd521c5a89f7b2902772fb691. For more details please see the references link.
null
2022-04-25T06:16:48.562134Z
2022-04-24T21:03:09.551980Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e631ddba588783edd521c5a89f7b2902772fb691'}
Linux
GSD-2021-1002210
media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt()
media: firewire: firedtv-avc: fix a buffer overflow in avc_ca_pmt() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.1 by commit cb667140875a3b1db92e4c50b4617a7cbf84659b. For more details please see the references link.
null
2021-12-19T22:36:25.047996Z
2021-11-14T15:24:50.001497Z
null
null
null
null
null
Linux
GSD-2022-1001740
drm/amd/display: Fix memory leak
drm/amd/display: Fix memory leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit 7e10369c72db7a0e2f77b2e306aadc07aef6b07a. For more details please see the references link.
null
2022-04-25T05:53:23.857566Z
2022-04-24T21:38:34.628160Z
null
null
null
null
null
Linux
GSD-2022-1000852
iio: imu: st_lsm6dsx: wait for settling time in st_lsm6dsx_read_oneshot
iio: imu: st_lsm6dsx: wait for settling time in st_lsm6dsx_read_oneshot This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.103 by commit eabcc609cb8accf16a5c53fd9b91a827854b1ca9, it was introduced in version v4.11 by commit 290a6ce11d938be52634b3ce1bbc6b78be4d23c1. For more details please see the references link.
null
2022-03-18T03:00:35.202082Z
2022-03-18T00:24:12.602015Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/290a6ce11d938be52634b3ce1bbc6b78be4d23c1'}
Linux
GSD-2021-1001596
mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap
mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.151 by commit ab85997465b972d39d9747fc16311fa5773374b2, it was introduced in version v4.7 by commit 646e76bb5daf4ca38438c69ffb72cccb605f3466. For more details please see the references link.
null
2021-12-20T01:35:13.146395Z
2021-10-19T16:25:32.096298Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/646e76bb5daf4ca38438c69ffb72cccb605f3466'}
Linux
GSD-2022-1000501
misc: fastrpc: avoid double fput() on failed usercopy
misc: fastrpc: avoid double fput() on failed usercopy This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.10 by commit 76f85c307ef9f10aa2cef1b1d5ee654c1f3345fc, it was introduced in version v5.1 by commit 6cffd79504ce040f460831030d3069fa1c99bb71. For more details please see the references link.
null
2022-03-07T01:35:05.412744Z
2022-02-27T03:15:50.046455Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6cffd79504ce040f460831030d3069fa1c99bb71'}
Linux
GSD-2022-1002496
mxser: fix xmit_buf leak in activate when LSR == 0xff
mxser: fix xmit_buf leak in activate when LSR == 0xff This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.311 by commit 376922045009f8ea2d20a8fa3475e95b47c41690, it was introduced in version v2.6.33 by commit 6769140d304731f0a3b177470a2adb4bacd9036b. For more details please see the references link.
null
2022-04-25T04:18:45.467150Z
2022-04-24T22:54:14.994808Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6769140d304731f0a3b177470a2adb4bacd9036b'}
Linux
GSD-2022-1000151
usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS
usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.176 by commit 4fc6519bdecb051afb0d2010e6f548d27830c4c3, it was introduced in version v5.4.126 by commit b4903f7fdc484628d0b8022daf86e2439d3ab4db. For more details please see the references link.
null
2022-02-19T03:04:20.468800Z
2022-02-18T21:47:40.237084Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b4903f7fdc484628d0b8022daf86e2439d3ab4db'}
Linux
GSD-2021-1002139
staging: rtl8712: fix use-after-free in rtl8712_dl_fw
staging: rtl8712: fix use-after-free in rtl8712_dl_fw This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.18 by commit befd23bd3b17f1a3f9c943a8580b47444c7c63ed, it was introduced in version v3.3 by commit 8c213fa59199f9673d66970d6940fa093186642f. For more details please see the references link.
null
2021-12-20T00:06:10.168433Z
2021-11-14T15:21:39.175912Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c213fa59199f9673d66970d6940fa093186642f'}
Linux
GSD-2021-1000104
sfc: farch: fix TX queue lookup in TX flush done handling
sfc: farch: fix TX queue lookup in TX flush done handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.20 by commit a1570985ec04116cc665b760faf666a104154170, it was introduced in version v5.10 by commit 12804793b17c0e19115a90d98f2f3df0cb79e233. For more details please see the references link.
null
2021-12-19T22:51:37.465274Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/12804793b17c0e19115a90d98f2f3df0cb79e233'}
Linux
GSD-2022-1001193
powerpc/pseries: Fix use after free in remove_phb_dynamic()
powerpc/pseries: Fix use after free in remove_phb_dynamic() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit 895ca4ae1f72e0a0160ab162723e59c9f265ec93, it was introduced in version v4.8 by commit 2dd9c11b9d4dfbd6c070eab7b81197f65e82f1a0. For more details please see the references link.
null
2022-04-25T06:35:55.027533Z
2022-04-24T20:52:33.345621Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2dd9c11b9d4dfbd6c070eab7b81197f65e82f1a0'}
Linux
GSD-2022-1001469
btrfs: do not clean up repair bio if submit fails
btrfs: do not clean up repair bio if submit fails This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit e76c78c48902dae6fa612749f59162bca0a79e0b. For more details please see the references link.
null
2022-04-25T04:23:10.723874Z
2022-04-24T21:15:21.404331Z
null
null
null
null
null
Linux
GSD-2021-1002569
drm/msm/a6xx: Allocate enough space for GMU registers
drm/msm/a6xx: Allocate enough space for GMU registers This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.7 by commit 83e54fcf0b14ca2d869dd37abe1bb6542805f538, it was introduced in version v5.9 by commit 142639a52a01e90c512a9a8d2156997e02a65b53. For more details please see the references link.
null
2021-12-20T01:10:26.107988Z
2021-12-19T19:43:12.296256Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/142639a52a01e90c512a9a8d2156997e02a65b53'}
Linux
GSD-2021-1000554
net/mlx5e: Fix null deref accessing lag dev
net/mlx5e: Fix null deref accessing lag dev This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.9 by commit bdfd3593a8248eea6ecfcbf7b47b56b86515672d, it was introduced in version v5.8 by commit 7e51891a237f9ea319f53f9beb83afb0077d88e6. For more details please see the references link.
null
2021-12-19T23:34:04.200149Z
2021-06-04T19:38:01.257473Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7e51891a237f9ea319f53f9beb83afb0077d88e6'}
Linux
GSD-2022-1001039
clk: mediatek: Fix memory leaks on probe
clk: mediatek: Fix memory leaks on probe This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.3 by commit 02742d1d5c95cff8b6e9379aae4ab12674f7265d. For more details please see the references link.
null
2022-04-25T03:53:38.649877Z
2022-04-24T20:41:43.783972Z
null
null
null
null
null
Linux
GSD-2021-1002093
ice: fix locking for Tx timestamp tracking flush
ice: fix locking for Tx timestamp tracking flush This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.14 by commit 61616be899975404df44c20ab902464b60882cd7, it was introduced in version v5.14.4 by commit 46720ac66c21bf85e08823664b7b314b85e43f26. For more details please see the references link.
null
2021-12-19T22:49:10.786791Z
2021-11-14T15:19:30.289159Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/46720ac66c21bf85e08823664b7b314b85e43f26'}
Linux
GSD-2021-1000807
net: caif: add proper error handling
net: caif: add proper error handling This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.10 by commit 88550e9c900b8800f54963ca2c9a6b4744d13e3d, it was introduced in version v3.3 by commit 7c18d2205ea76eef9674e59e1ecae4f332a53e9e. For more details please see the references link.
null
2021-12-19T23:41:32.517409Z
2021-06-25T00:08:38.481556Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7c18d2205ea76eef9674e59e1ecae4f332a53e9e'}
Linux
GSD-2021-1001715
ipack: ipoctal: fix module reference leak
ipack: ipoctal: fix module reference leak This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.10 by commit 811178f296b16af30264def74c8d2179a72d5562, it was introduced in version v3.18 by commit 82a82340bab6c251e0705339f60763718eaa2a22. For more details please see the references link.
null
2021-12-20T01:23:52.873333Z
2021-10-19T16:33:14.028149Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/82a82340bab6c251e0705339f60763718eaa2a22'}
Linux
GSD-2022-1001890
watch_queue: Actually free the watch
watch_queue: Actually free the watch This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.33 by commit f69aecb49968e14196366bbe896eab0a904229f5, it was introduced in version v5.8 by commit c73be61cede5882f9605a852414db559c0ebedfd. For more details please see the references link.
null
2022-04-25T05:04:07.651568Z
2022-04-24T21:52:23.740004Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c73be61cede5882f9605a852414db559c0ebedfd'}
Linux
GSD-2022-1000782
iwlwifi: mvm: check debugfs_dir ptr before use
iwlwifi: mvm: check debugfs_dir ptr before use This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.27 by commit 7de1ed755e1ace30d97a724bad32452ed86b653b, it was introduced in version v5.12 by commit 8c082a99edb997d7999eb7cdb648e47a2bf4a638. For more details please see the references link.
null
2022-03-18T02:55:08.079294Z
2022-03-18T00:17:43.362042Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8c082a99edb997d7999eb7cdb648e47a2bf4a638'}
Linux
GSD-2022-1000278
ovl: fix NULL pointer dereference in copy up warning
ovl: fix NULL pointer dereference in copy up warning This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.20 by commit e6b678c1a3673de6a5d2f4e22bb725a086a0701a, it was introduced in version v5.15.3 by commit 5cffa333a2b263821561328cc75a3ffc8097d093. For more details please see the references link.
null
2022-02-20T06:42:56.984048Z
2022-02-18T22:05:24.586301Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5cffa333a2b263821561328cc75a3ffc8097d093'}
Linux
GSD-2022-1002245
PCI: Reduce warnings on possible RW1C corruption
PCI: Reduce warnings on possible RW1C corruption This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.189 by commit 10705a4305579518da06662c045a90a4bcdd15f7, it was introduced in version v4.10 by commit fb26592301200dbbe4a9943fe188b57a46716900. For more details please see the references link.
null
2022-04-25T06:07:24.725529Z
2022-04-24T22:25:28.185062Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb26592301200dbbe4a9943fe188b57a46716900'}
Linux
GSD-2021-1001345
jfs: fix GPF in diFree
jfs: fix GPF in diFree This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.133 by commit a21e5cb1a64c904f1f0ef7b2d386fc7d2b1d2ce2. For more details please see the references link.
null
2021-12-20T01:08:53.955Z
2021-08-03T02:13:52.741005Z
null
null
null
null
null
Linux
GSD-2022-1000628
block: fix memory leak in disk_register_independent_access_ranges
block: fix memory leak in disk_register_independent_access_ranges This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.5 by commit fe4214a07e0b53d2af711f57519e33739c5df23f, it was introduced in version v5.16 by commit a2247f19ee1c5ad75ef095cdfb909a3244b88aa8. For more details please see the references link.
null
2022-03-07T01:51:32.160959Z
2022-02-27T03:33:03.104724Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a2247f19ee1c5ad75ef095cdfb909a3244b88aa8'}
Linux
GSD-2022-1002300
mm/sparsemem: fix 'mem_section' will never be NULL gcc 12 warning
mm/sparsemem: fix 'mem_section' will never be NULL gcc 12 warning This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.238 by commit ff929e3abef16c409a9beef08bcc29ab940d0ce6, it was introduced in version v2.6.14 by commit 3e347261a80b57df792ab9464b5f0ed59add53a8. For more details please see the references link.
null
2022-04-25T06:41:24.053294Z
2022-04-24T22:32:06.259603Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3e347261a80b57df792ab9464b5f0ed59add53a8'}
Linux
GSD-2021-1000942
net:sfc: fix non-freed irq in legacy irq mode
net:sfc: fix non-freed irq in legacy irq mode This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.44 by commit 8d717c9135a3340ae62d1699484850bfb4112b0c. For more details please see the references link.
null
2021-12-19T22:27:41.175541Z
2021-06-30T00:26:00.525181Z
null
null
null
null
null
Linux
GSD-2021-1001650
hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs
hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.71 by commit 76bbb482d33bfcd7e9070ecf594c9ec73e01c930, it was introduced in version v4.19 by commit 65afb4c8e7e4e7e74b28efa1df62da503ca3e7a6. For more details please see the references link.
null
2021-12-19T23:11:15.651201Z
2021-10-19T16:29:59.876169Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/65afb4c8e7e4e7e74b28efa1df62da503ca3e7a6'}
Linux
GSD-2021-1001200
scsi: iscsi: Fix conn use after free during resets
scsi: iscsi: Fix conn use after free during resets This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.4 by commit fa9542b35ceb4202e8f8d65f440529a63524dca9. For more details please see the references link.
null
2021-12-19T23:44:35.706592Z
2021-08-03T01:35:43.317875Z
null
null
null
null
null
Linux
GSD-2022-1000297
ax25: improve the incomplete fix to avoid UAF and NPD bugs
ax25: improve the incomplete fix to avoid UAF and NPD bugs This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.303 by commit 851901d339b2ba766ffcf754d37a6f52fa07cea2. For more details please see the references link.
null
2022-03-07T02:17:53.117215Z
2022-02-27T02:47:49.176351Z
null
null
null
null
null
Linux
GSD-2021-1002586
can: pch_can: pch_can_rx_normal: fix use after free
can: pch_can: pch_can_rx_normal: fix use after free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.8 by commit 6c73fc931658d8cbc8a1714b326cb31eb71d16a7, it was introduced in version v2.6.37 by commit b21d18b51b31a24d17f883b678432fbdee3d5675. For more details please see the references link.
null
2021-12-19T23:42:32.355771Z
2021-12-19T19:43:51.816647Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b21d18b51b31a24d17f883b678432fbdee3d5675'}
Linux
GSD-2021-1000041
KEYS: trusted: Fix TPM reservation for seal/unseal
KEYS: trusted: Fix TPM reservation for seal/unseal This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.11.17 by commit 39c8d760d44cb3fa0d67e8cd505df81cf4d80999, it was introduced in version v5.11.3 by commit 498b8fc1cdc13b57b02dd28544b18323900fae10. For more details please see the references link.
null
2021-12-19T23:11:38.810823Z
2021-05-31T15:39:45.031586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/498b8fc1cdc13b57b02dd28544b18323900fae10'}
Linux
GSD-2021-1000411
netfilter: nftables: avoid overflows in nft_hash_buckets()
netfilter: nftables: avoid overflows in nft_hash_buckets() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.4.120 by commit c77e2ef18167ad334e27610ced9a7f6af5ec1787, it was introduced in version v4.9 by commit 0ed6389c483dc77cdbdd48de0ca7ce41723dd667. For more details please see the references link.
null
2021-12-19T22:51:49.704748Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0ed6389c483dc77cdbdd48de0ca7ce41723dd667'}
Linux
GSD-2022-1001486
fs: fix fd table size alignment properly
fs: fix fd table size alignment properly This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.19 by commit afc46998a32e7670fe77321e33f10e31e980d56f, it was introduced in version v5.16.19 by commit 2ee9660213b7aee78b7a6bd7c91b3cbcfc965d2e. For more details please see the references link.
null
2022-04-24T21:16:11.136390Z
2022-04-24T21:16:11.136390Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2ee9660213b7aee78b7a6bd7c91b3cbcfc965d2e'}
Linux
GSD-2021-1002302
thermal: Fix NULL pointer dereferences in of_thermal_ functions
thermal: Fix NULL pointer dereferences in of_thermal_ functions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.81 by commit 6a315471cb6a07f651e1d3adc8962730f4fcccac. For more details please see the references link.
null
2021-12-20T00:50:15.300877Z
2021-11-29T02:37:46.076605Z
null
null
null
null
null
Linux
GSD-2022-1001652
net: usb: aqc111: Fix out-of-bounds accesses in RX fixup
net: usb: aqc111: Fix out-of-bounds accesses in RX fixup This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.35 by commit b416898442f2b6aa9f1b2f2968ce07e3abaa05f7. For more details please see the references link.
null
2022-04-25T05:02:47.401453Z
2022-04-24T21:31:49.950561Z
null
null
null
null
null
Linux
GSD-2022-1000940
netfilter: nf_queue: fix possible use-after-free
netfilter: nf_queue: fix possible use-after-free This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.305 by commit 21b27b2baa27423286e9b8d3f0b194d587083d95, it was introduced in version v2.6.29 by commit 271b72c7fa82c2c7a795bc16896149933110672d. For more details please see the references link.
null
2022-03-18T02:50:33.977055Z
2022-03-18T00:34:46.337174Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/271b72c7fa82c2c7a795bc16896149933110672d'}
Linux
GSD-2021-1002752
netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc
netdevsim: Zero-initialize memory for new map's value in function nsim_bpf_map_alloc This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.11 by commit 27358aa81a7d60e6bd36f0bb1db65cd084c2cad0, it was introduced in version v4.16 by commit 395cacb5f1a0a290f1ae9ca4692c400d2b57a705. For more details please see the references link.
null
2022-01-11T05:55:05.910826Z
2021-12-27T05:48:18.606565Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/395cacb5f1a0a290f1ae9ca4692c400d2b57a705'}
Linux
GSD-2021-1000295
regmap: set debugfs_name to NULL after it is freed
regmap: set debugfs_name to NULL after it is freed This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.12.4 by commit b9e569ae1da3a113b3acee8703c94777fd20938a, it was introduced in version v5.11 by commit cffa4b2122f5f3e53cf3d529bbc74651f95856d5. For more details please see the references link.
null
2021-12-20T00:09:31.840496Z
2021-05-31T15:39:45.041586Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cffa4b2122f5f3e53cf3d529bbc74651f95856d5'}
Linux
GSD-2022-1001202
bpf, sockmap: Fix more uncharged while msg has more_data
bpf, sockmap: Fix more uncharged while msg has more_data This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.17.2 by commit abb4caa477a5450817d2aa1198edce66450aecf8, it was introduced in version v4.20 by commit 604326b41a6fb9b4a78b6179335decee0365cd8c. For more details please see the references link.
null
2022-04-25T06:22:07.265147Z
2022-04-24T20:53:20.728476Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/604326b41a6fb9b4a78b6179335decee0365cd8c'}
Linux
GSD-2022-1000043
NFC: st21nfca: Fix memory leak in device probe and remove
NFC: st21nfca: Fix memory leak in device probe and remove This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.90 by commit e553265ea56482da5700f56319fda9ff53e7dcb4, it was introduced in version v3.16 by commit 68957303f44a501af5cf37913208a2acaa6bcdf1. For more details please see the references link.
null
2022-01-11T05:53:25.122500Z
2022-01-10T19:51:33.683736Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/68957303f44a501af5cf37913208a2acaa6bcdf1'}
Linux
GSD-2021-1001484
dm btree remove: assign new_root only when removal succeeds
dm btree remove: assign new_root only when removal succeeds This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.276 by commit 4c84b3e0728ffe10d89c633694c35a02b5c477dc. For more details please see the references link.
null
2021-12-20T00:16:09.210117Z
2021-08-03T02:55:00.384552Z
null
null
null
null
null
Linux
GSD-2022-1000413
NFSD: Fix the behavior of READ near OFFSET_MAX
NFSD: Fix the behavior of READ near OFFSET_MAX This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.24 by commit c6eff5c4277146a78b4fb8c9b668dd64542c41b0. For more details please see the references link.
null
2022-03-07T01:57:17.177063Z
2022-02-27T03:03:43.968722Z
null
null
null
null
null
Linux
GSD-2021-1001191
nfs: fix acl memory leak of posix_acl_create()
nfs: fix acl memory leak of posix_acl_create() This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.13.4 by commit 687cf32865b2d6960214bce523f2afac58dd3cd2, it was introduced in version v3.14 by commit 013cdf1088d7235da9477a2375654921d9b9ba9f. For more details please see the references link.
null
2021-12-20T00:42:26.797589Z
2021-08-03T01:33:46.135143Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/013cdf1088d7235da9477a2375654921d9b9ba9f'}
Linux
GSD-2022-1000106
net: amd-xgbe: Fix skb data length underflow
net: amd-xgbe: Fix skb data length underflow This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.14.265 by commit 617f9934bb37993b9813832516f318ba874bcb7d, it was introduced in version v4.11 by commit 622c36f143fc9566ba49d7cec994c2da1182d9e2. For more details please see the references link.
null
2022-02-19T02:55:29.457403Z
2022-02-18T21:35:52.798577Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/622c36f143fc9566ba49d7cec994c2da1182d9e2'}
Linux
GSD-2022-1000556
net/smc: Avoid overwriting the copies of clcsock callback functions
net/smc: Avoid overwriting the copies of clcsock callback functions This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.11 by commit f00b6c976ae0dfbd9b891175f713f59095d23842, it was introduced in version v5.16.8 by commit 504078fbe9dd570d685361b57784a6050bc40aaa. For more details please see the references link.
null
2022-03-07T01:42:11.687805Z
2022-02-27T03:23:33.479382Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/504078fbe9dd570d685361b57784a6050bc40aaa'}
Linux
GSD-2022-1002091
scsi: pm8001: Fix abort all task initialization
scsi: pm8001: Fix abort all task initialization This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.110 by commit 279f318bd7d6e04e6e0bc7b8cd8e190da8fa37a4, it was introduced in version v3.10 by commit c6b9ef5779c3e1edfa9de949d2a51252bc347663. For more details please see the references link.
null
2022-04-25T05:43:23.856444Z
2022-04-24T22:10:08.321716Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6b9ef5779c3e1edfa9de949d2a51252bc347663'}
Linux
GSD-2021-1000780
nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect
nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.10.43 by commit 48ee0db61c8299022ec88c79ad137f290196cac2, it was introduced in version v3.3 by commit d646960f7986fefb460a2b062d5ccc8ccfeacc3a. For more details please see the references link.
null
2021-12-19T23:45:49.525244Z
2021-06-25T00:05:09.988806Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d646960f7986fefb460a2b062d5ccc8ccfeacc3a'}
Linux
GSD-2021-1001892
netfilter: nf_tables: skip netdev events generated on netns removal
netfilter: nf_tables: skip netdev events generated on netns removal This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.14.15 by commit 90c7c58aa2bd02c65a4c63b7dfe0b16eab12cf9f, it was introduced in version v5.11 by commit 767d1216bff82507c945e92fe719dff2083bb2f4. For more details please see the references link.
null
2021-12-19T23:21:26.290650Z
2021-10-28T13:54:24.367246Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/767d1216bff82507c945e92fe719dff2083bb2f4'}
Linux
GSD-2022-1001717
PCI: endpoint: Fix misused goto label
PCI: endpoint: Fix misused goto label This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.34 by commit dc9d33b2d8d09e6478e8ef817a81cf26930acc3e. For more details please see the references link.
null
2022-04-25T06:57:14.287061Z
2022-04-24T21:37:27.981656Z
null
null
null
null
null
Linux
GSD-2022-1000805
net/smc: Use a mutex for locking "struct smc_pnettable"
net/smc: Use a mutex for locking "struct smc_pnettable" This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.15.26 by commit 062772d5cc8cd4018585cdbc2c03457dfb5a3d88, it was introduced in version v5.1 by commit 64e28b52c7a6616217bee67ba2ad886f478f9737. For more details please see the references link.
null
2022-03-18T03:01:02.769985Z
2022-03-18T00:20:04.416311Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/64e28b52c7a6616217bee67ba2ad886f478f9737'}
Linux
GSD-2021-1002247
NFC: reorder the logic in nfc_{un,}register_device
NFC: reorder the logic in nfc_{un,}register_device This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.19.218 by commit c45cea83e13699bdfd47842e04d09dd43af4c371, it was introduced in version v3.10 by commit be055b2f89b5842f41363b5655a33dffb51a8294. For more details please see the references link.
null
2021-12-20T01:38:06.662534Z
2021-11-29T02:35:15.702174Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/be055b2f89b5842f41363b5655a33dffb51a8294'}
Linux
GSD-2022-1001347
RDMA/hfi1: Fix use-after-free bug for mm struct
RDMA/hfi1: Fix use-after-free bug for mm struct This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v5.16.20 by commit 0b7186d657ee55e2cdefae498f07d5c1961e8023, it was introduced in version v5.10 by commit 3d2a9d642512c21a12d19b9250e7a835dcb41a79. For more details please see the references link.
null
2022-04-25T04:05:08.631926Z
2022-04-24T21:06:32.609284Z
null
null
null
null
{'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3d2a9d642512c21a12d19b9250e7a835dcb41a79'}
Linux
GSD-2021-1002617
xen/netfront: harden netfront against event channel storms
xen/netfront: harden netfront against event channel storms This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.4.296 by commit 81900aa7d7a130dec4c55b68875e30fb8c9effec. For more details please see the references link.
null
2022-01-11T05:53:08.082991Z
2021-12-27T05:27:24.385107Z
null
null
null
null
null
Linux
GSD-2021-1001938
ocfs2: mount fails with buffer overflow in strlen
ocfs2: mount fails with buffer overflow in strlen This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven. This ID is fixed in Linux Kernel version v4.9.288 by commit 4b74ddcc22ee6455946e80a9c4808801f8f8561e. For more details please see the references link.
null
2021-12-19T23:17:06.655273Z
2021-11-14T15:12:30.023715Z
null
null
null
null
null