ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2021-1001312 | KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak | KVM: PPC: Fix kvm_arch_vcpu_ioctl vcpu_load leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.136 by commit f38527f1890543cdfca8dfd06f75f9887cce6151, it was introduced in version v4.18 by commit b3cebfe8c1cadf1817939dcc3688a2504a69c662. For more details please see the references link. | null | 2021-12-19T22:21:49.990349Z | 2021-08-03T02:05:29.011865Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b3cebfe8c1cadf1817939dcc3688a2504a69c662'} |
Linux | GSD-2022-1000385 | mm: don't try to NUMA-migrate COW pages that have other uses | mm: don't try to NUMA-migrate COW pages that have other uses
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.102 by commit 254090925e16abd914c87b4ad1b489440d89c4c3, it was introduced in version v5.9 by commit 09854ba94c6aad7886996bfbee2530b3d8a7f4f4. For more details please see the references link. | null | 2022-03-07T01:51:18.150158Z | 2022-02-27T02:59:52.288023Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/09854ba94c6aad7886996bfbee2530b3d8a7f4f4'} |
Linux | GSD-2022-1002212 | mmc: host: Return an error when ->enable_sdio_irq() ops is missing | mmc: host: Return an error when ->enable_sdio_irq() ops is missing
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 95d65bca6eb9967aa5f6ed7a32e041b4f11ffbc2. For more details please see the references link. | null | 2022-04-25T06:56:54.320471Z | 2022-04-24T22:22:25.195220Z | null | null | null | null | null |
Linux | GSD-2021-1000850 | net/nfc/rawsock.c: fix a permission check bug | net/nfc/rawsock.c: fix a permission check bug
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.237 by commit 38cb2e23188af29c43966acee9dbb18b62e26cfe. For more details please see the references link. | null | 2021-12-19T23:35:32.804778Z | 2021-06-30T00:01:17.185580Z | null | null | null | null | null |
Linux | GSD-2021-1001742 | ASoC: SOF: Fix DSP oops stack dump output contents | ASoC: SOF: Fix DSP oops stack dump output contents
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit a6bb576ead074ca6fa3b53cb1c5d4037a23de81b, it was introduced in version v5.2 by commit e657c18a01c85d2c4ec0e96d52be8ba42b956593. For more details please see the references link. | null | 2021-12-20T01:13:39.838915Z | 2021-10-19T16:34:30.443951Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e657c18a01c85d2c4ec0e96d52be8ba42b956593'} |
Linux | GSD-2021-1000503 | platform/x86: ideapad-laptop: fix a NULL pointer dereference | platform/x86: ideapad-laptop: fix a NULL pointer dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.7 by commit beab753fe3b4e087411a850a64c6cd748544d8a1, it was introduced in version v5.12 by commit ff36b0d953dc4cbc40a72945920ff8e805f1b0da. For more details please see the references link. | null | 2021-12-19T23:22:57.739370Z | 2021-05-31T23:47:14.556Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ff36b0d953dc4cbc40a72945920ff8e805f1b0da'} |
Linux | GSD-2022-1001594 | video: fbdev: sm712fb: Fix crash in smtcfb_read() | video: fbdev: sm712fb: Fix crash in smtcfb_read()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 34d986f6ee5f5ac48cd2b9e2d061196fd3c29d39. For more details please see the references link. | null | 2022-04-25T05:36:55.893948Z | 2022-04-24T21:27:03.809736Z | null | null | null | null | null |
Linux | GSD-2021-1002494 | mt76: mt7915: fix NULL pointer dereference in mt7915_get_phy_mode | mt76: mt7915: fix NULL pointer dereference in mt7915_get_phy_mode
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.84 by commit 932b338f4e5c4cb0c2ed640da3bced1e63620198, it was introduced in version v5.8 by commit 37f4ca907c462d7c8a1ac9e7e3473681b5f893dd. For more details please see the references link. | null | 2021-12-19T22:37:06.590162Z | 2021-12-19T19:39:48.115057Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/37f4ca907c462d7c8a1ac9e7e3473681b5f893dd'} |
Linux | GSD-2021-1000153 | vhost-vdpa: fix vm_flags for virtqueue doorbell mapping | vhost-vdpa: fix vm_flags for virtqueue doorbell mapping
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.36 by commit 3b8b6399666a29daa30b0bb3f5c9e3fc81c5a6a6, it was introduced in version v5.8 by commit ddd89d0a059d8e9740c75a97e0efe9bf07ee51f9. For more details please see the references link. | null | 2021-12-19T22:16:19.535052Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ddd89d0a059d8e9740c75a97e0efe9bf07ee51f9'} |
Linux | GSD-2021-1000446 | i40e: Fix use-after-free in i40e_client_subtask() | i40e: Fix use-after-free in i40e_client_subtask()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.191 by commit c1322eaeb8af0d8985b5cc5fa759140fa0e57b84, it was introduced in version v4.16 by commit 7b0b1a6d0ac983ce1928432285d0222d4fb7c38b. For more details please see the references link. | null | 2021-12-19T22:54:59.673420Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7b0b1a6d0ac983ce1928432285d0222d4fb7c38b'} |
Linux | GSD-2021-1002181 | mm, slub: fix potential use-after-free in slab_debugfs_fops | mm, slub: fix potential use-after-free in slab_debugfs_fops
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 67823a544414def2a36c212abadb55b23bcda00c, it was introduced in version v5.14 by commit 64dd68497be76ab4e237cca06f5324e220d0f050. For more details please see the references link. | null | 2021-12-19T22:55:19.619661Z | 2021-11-14T15:23:31.094759Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/64dd68497be76ab4e237cca06f5324e220d0f050'} |
Linux | GSD-2021-1000016 | libbpf: Fix potential NULL pointer dereference | libbpf: Fix potential NULL pointer dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.16 by commit b33f7e0d5e86e1c758d76838ef7e831d99b176bf, it was introduced in version v5.11.14 by commit 00b6712eae9f046cb6f820a9ff9fd6b966f01f9c. For more details please see the references link. | null | 2021-12-19T22:37:01.967103Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/00b6712eae9f046cb6f820a9ff9fd6b966f01f9c'} |
Linux | GSD-2022-1001081 | drm/amd/display: Fix memory leak | drm/amd/display: Fix memory leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 9d0bef3cc22cf250278ed45b829f062a00af9e27. For more details please see the references link. | null | 2022-04-25T05:37:08.246146Z | 2022-04-24T20:43:57.445834Z | null | null | null | null | null |
Linux | GSD-2021-1001257 | net: fddi: fix UAF in fza_probe | net: fddi: fix UAF in fza_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.53 by commit f33605908a9b6063525e9f68e62d739948c5fccf, it was introduced in version v4.20 by commit 61414f5ec9834df8aa4f55c90de16b71a3d6ca8d. For more details please see the references link. | null | 2021-12-19T23:17:39.014573Z | 2021-08-03T01:49:53.420746Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61414f5ec9834df8aa4f55c90de16b71a3d6ca8d'} |
Linux | GSD-2022-1001828 | powerpc/pseries: Fix use after free in remove_phb_dynamic() | powerpc/pseries: Fix use after free in remove_phb_dynamic()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 33d39efb61a84e055ca2386157d39ebbdf6b7d31, it was introduced in version v4.8 by commit 2dd9c11b9d4dfbd6c070eab7b81197f65e82f1a0. For more details please see the references link. | null | 2022-04-25T04:17:08.449641Z | 2022-04-24T21:45:54.866139Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2dd9c11b9d4dfbd6c070eab7b81197f65e82f1a0'} |
Linux | GSD-2021-1000915 | net: ipv4: fix memory leak in netlbl_cipsov4_add_std | net: ipv4: fix memory leak in netlbl_cipsov4_add_std
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.128 by commit 398a24447eb60f060c8994221cb5ae6caf355fa1, it was introduced in version v2.6.19 by commit 96cb8e3313c7a12e026c1ed510522ae6f6023875. For more details please see the references link. | null | 2021-12-19T23:26:41.769901Z | 2021-06-30T00:06:17.160815Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/96cb8e3313c7a12e026c1ed510522ae6f6023875'} |
Linux | GSD-2021-1001607 | bpf: Add oversize check before call kvcalloc() | bpf: Add oversize check before call kvcalloc()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.150 by commit 93937596e0652d50973f9dc944fea1694ac8cdfd. For more details please see the references link. | null | 2021-12-19T22:19:13.734560Z | 2021-10-19T16:27:59.963544Z | null | null | null | null | null |
Linux | GSD-2022-1001982 | drm/imx: Fix memory leak in imx_pd_connector_get_modes | drm/imx: Fix memory leak in imx_pd_connector_get_modes
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit f8b0ef0a5889890b50482b6593bd8de544736351, it was introduced in version v4.8 by commit 76ecd9c9fb24b014a6f33fbb1287ede3be12158b. For more details please see the references link. | null | 2022-04-25T05:10:56.270124Z | 2022-04-24T22:00:53.966059Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/76ecd9c9fb24b014a6f33fbb1287ede3be12158b'} |
Linux | GSD-2022-1000690 | btrfs: fallback to blocking mode when doing async dio over multiple extents | btrfs: fallback to blocking mode when doing async dio over multiple extents
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.13 by commit 91a5000bba81690cf92528f17577675a9c7cd185. For more details please see the references link. | null | 2022-03-18T02:57:40.307105Z | 2022-03-18T00:09:48.642322Z | null | null | null | null | null |
Linux | GSD-2022-1002357 | Bluetooth: hci_serdev: call init_rwsem() before p->open() | Bluetooth: hci_serdev: call init_rwsem() before p->open()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 7af24ae489f7932f8f6a9786f755578555c110aa, it was introduced in version v4.16 by commit d73e172816652772114827abaa2dbc053eecbbd7. For more details please see the references link. | null | 2022-04-25T02:54:39.971990Z | 2022-04-24T22:38:05.473905Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d73e172816652772114827abaa2dbc053eecbbd7'} |
Linux | GSD-2022-1000405 | lockdep: Correct lock_classes index mapping | lockdep: Correct lock_classes index mapping
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.102 by commit 6062d1267ff3e5570165c974bb0dc2120c9d363c, it was introduced in version v5.10 by commit f611e8cf98ec908b9c2c0da6064a660fc6022487. For more details please see the references link. | null | 2022-03-07T01:35:09.760874Z | 2022-02-27T03:02:10.252186Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f611e8cf98ec908b9c2c0da6064a660fc6022487'} |
Linux | GSD-2022-1002438 | scsi: pm8001: Fix abort all task initialization | scsi: pm8001: Fix abort all task initialization
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit d6ec4471550cc53e96485a7124c5891e6a38d1c3, it was introduced in version v3.10 by commit c6b9ef5779c3e1edfa9de949d2a51252bc347663. For more details please see the references link. | null | 2022-04-25T06:33:41.516635Z | 2022-04-24T22:47:28.895730Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6b9ef5779c3e1edfa9de949d2a51252bc347663'} |
Linux | GSD-2021-1001492 | atm: iphase: fix possible use-after-free in ia_module_exit() | atm: iphase: fix possible use-after-free in ia_module_exit()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.276 by commit 9e161687855175334ca93c6c3ccb221731194479. For more details please see the references link. | null | 2021-12-19T22:25:55.728944Z | 2021-08-03T02:57:46.955158Z | null | null | null | null | null |
Linux | GSD-2021-1001168 | ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions | ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.6 by commit 115784bcccf135c3a3548098153413d76f16aae0, it was introduced in version v5.3 by commit f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74. For more details please see the references link. | null | 2021-12-20T00:04:19.079914Z | 2021-08-03T01:31:58.368163Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74'} |
Linux | GSD-2022-1000055 | usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear. | usb: gadget: f_fs: Clear ffs_eventfd in ffs_data_clear.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.13 by commit ebef2aa29f370b5096c16020c104e393192ef684, it was introduced in version v4.0 by commit 5e33f6fdf735cda1d4580fe6f1878da05718fe73. For more details please see the references link. | null | 2022-01-11T05:55:14.678073Z | 2022-01-10T19:52:04.384424Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5e33f6fdf735cda1d4580fe6f1878da05718fe73'} |
Linux | GSD-2022-1002068 | clk: qcom: ipq8074: fix PCI-E clock oops | clk: qcom: ipq8074: fix PCI-E clock oops
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 8b89c9e68a01a19a1dd689a42aa65d545e931899, it was introduced in version v5.9 by commit f0cfcf1ade201dcfd3365f231efc90e846fa46df. For more details please see the references link. | null | 2022-04-25T05:19:01.491554Z | 2022-04-24T22:07:27.535556Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f0cfcf1ade201dcfd3365f231efc90e846fa46df'} |
Linux | GSD-2021-1001538 | crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd() | crypto: ccp - fix resource leaks in ccp_run_aes_gcm_cmd()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.249 by commit 3707e37b3fcef4d5e9a81b9c2c48ba7248051c2a, it was introduced in version v4.12 by commit 36cf515b9bbe298e1ce7384620f0d4ec45ad3328. For more details please see the references link. | null | 2021-12-19T23:31:04.027890Z | 2021-10-19T16:22:47.521090Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/36cf515b9bbe298e1ce7384620f0d4ec45ad3328'} |
Linux | GSD-2022-1001214 | powerpc/64s: Don't use DSISR for SLB faults | powerpc/64s: Don't use DSISR for SLB faults
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 093449bb182db885dae816d62874cccab7a4c42a, it was introduced in version v5.5 by commit 46ddcb3950a28c0df4815e8dbb8d4b91d5d9f22d. For more details please see the references link. | null | 2022-04-25T05:03:34.830584Z | 2022-04-24T20:54:22.764596Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/46ddcb3950a28c0df4815e8dbb8d4b91d5d9f22d'} |
Linux | GSD-2021-1000283 | spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware() | spi: fsl-lpspi: Fix PM reference leak in lpspi_prepare_xfer_hardware()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 6a2b5cee0d31ab6cc51030c441135b0e31217282, it was introduced in version v5.2 by commit 944c01a889d97dc08e1b71f4ed868f4023fd6034. For more details please see the references link. | null | 2021-12-20T01:18:31.128859Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/944c01a889d97dc08e1b71f4ed868f4023fd6034'} |
Linux | GSD-2021-1002744 | drm/amd/pm: fix a potential gpu_metrics_table memory leak | drm/amd/pm: fix a potential gpu_metrics_table memory leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit 257b3bb16634fd936129fe2f57a91594a75b8751, it was introduced in version v5.10 by commit 95868b85764aff2dcbf78d3054076df75446ad15. For more details please see the references link. | null | 2022-01-11T05:58:27.109739Z | 2021-12-27T05:46:10.558507Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/95868b85764aff2dcbf78d3054076df75446ad15'} |
Linux | GSD-2021-1000779 | ext4: fix memory leak in ext4_mb_init_backend on error path. | ext4: fix memory leak in ext4_mb_init_backend on error path.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.43 by commit 2050c6e5b161e5e25ce3c420fef58b24fa388a49, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T23:49:57.375760Z | 2021-06-25T00:05:04.089557Z | null | null | null | null | null |
Linux | GSD-2022-1000956 | ax25: Fix UAF bugs in ax25 timers | ax25: Fix UAF bugs in ax25 timers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.4 by commit 76ff66bb3b22f202c226ddbb0a811f8fb8aab2fa. For more details please see the references link. | null | 2022-04-25T06:09:42.301752Z | 2022-04-24T20:34:55.603807Z | null | null | null | null | null |
Linux | GSD-2022-1001644 | ARM: davinci: da850-evm: Avoid NULL pointer dereference | ARM: davinci: da850-evm: Avoid NULL pointer dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.35 by commit 0940795c6834fbe7705acc5c3d4b2f7a5f67527a, it was introduced in version v2.6.33 by commit bae105879f2f2404155da6f50b3636193d228a62. For more details please see the references link. | null | 2022-04-25T04:33:15.866882Z | 2022-04-24T21:31:15.886699Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bae105879f2f2404155da6f50b3636193d228a62'} |
Linux | GSD-2021-1002314 | i40e: Fix NULL ptr dereference on VSI filter sync | i40e: Fix NULL ptr dereference on VSI filter sync
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit e91e8427a1e1633a0261e3bb0201c836ac5b3890, it was introduced in version v3.12 by commit 41c445ff0f482bb6e6b72dcee9e598e20575f743. For more details please see the references link. | null | 2021-12-20T00:28:24.326993Z | 2021-11-29T02:38:21.758216Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41c445ff0f482bb6e6b72dcee9e598e20575f743'} |
Linux | GSD-2021-1000329 | libbpf: Fix signed overflow in ringbuf_process_ring | libbpf: Fix signed overflow in ringbuf_process_ring
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.38 by commit 4aae6eb6af7d1ac2ee5762077892185884d8f169, it was introduced in version v5.8 by commit bf99c936f9478a05d51e9f101f90de70bee9a89c. For more details please see the references link. | null | 2021-12-20T00:04:29.982476Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bf99c936f9478a05d51e9f101f90de70bee9a89c'} |
Linux | GSD-2021-1002601 | aio: fix use-after-free due to missing POLLFREE handling | aio: fix use-after-free due to missing POLLFREE handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.8 by commit 60d311f9e6381d779d7d53371f87285698ecee24, it was introduced in version v4.18 by commit 2c14fa838cbefc23cf1c73ca167ed85b274b2913. For more details please see the references link. | null | 2021-12-19T22:45:33.623156Z | 2021-12-19T19:44:36.656571Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c14fa838cbefc23cf1c73ca167ed85b274b2913'} |
Linux | GSD-2022-1001351 | highmem: fix checks in __kmap_local_sched_{in,out} | highmem: fix checks in __kmap_local_sched_{in,out}
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 85550b0f5fa5dd3c30469ea702c44444ef242c83, it was introduced in version v5.11 by commit 5fbda3ecd14a5343644979c98d6eb65b7e7de9d8. For more details please see the references link. | null | 2022-04-25T07:58:43.409566Z | 2022-04-24T21:06:46.140884Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5fbda3ecd14a5343644979c98d6eb65b7e7de9d8'} |
Linux | GSD-2021-1002251 | usb: host: ohci-tmio: check return value after calling platform_get_resource() | usb: host: ohci-tmio: check return value after calling platform_get_resource()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.218 by commit 951b8239fd24678b56c995c5c0456ab12e059d19. For more details please see the references link. | null | 2021-12-19T23:50:28.392322Z | 2021-11-29T02:35:25.364620Z | null | null | null | null | null |
Linux | GSD-2022-1000813 | bpf: Fix crash due to incorrect copy_map_value | bpf: Fix crash due to incorrect copy_map_value
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.26 by commit 719d1c2524c89ada78c4c9202641c1d9e942a322, it was introduced in version v5.15 by commit 68134668c17f31f51930478f75495b552a411550. For more details please see the references link. | null | 2022-03-18T03:04:47.787664Z | 2022-03-18T00:20:58.103748Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/68134668c17f31f51930478f75495b552a411550'} |
Linux | GSD-2022-1001701 | xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu>=32 | xen: delay xen_hvm_init_time_ops() if kdump is boot on vcpu>=32
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 5c0750cad73350e1c504eb91a94093a79f6f6296. For more details please see the references link. | null | 2022-04-25T06:27:05.189559Z | 2022-04-24T21:36:24.454824Z | null | null | null | null | null |
Linux | GSD-2021-1001884 | can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv | can: j1939: j1939_netdev_start(): fix UAF for rx_kref of j1939_priv
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit 6e8811707e2df0c6ba920f0cad3a3bca7b42132f, it was introduced in version v5.4 by commit 9d71dd0c70099914fcd063135da3c580865e924c. For more details please see the references link. | null | 2021-12-19T22:01:34.341505Z | 2021-10-28T13:53:51.715964Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9d71dd0c70099914fcd063135da3c580865e924c'} |
Linux | GSD-2021-1000796 | net/tls: Fix use-after-free after the TLS device goes down and up | net/tls: Fix use-after-free after the TLS device goes down and up
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit 0f1e6fe66977a864fe850522316f713d7b926fd9, it was introduced in version v4.18 by commit e8f69799810c32dd40c6724d829eccc70baad07f. For more details please see the references link. | null | 2021-12-19T22:31:14.632598Z | 2021-06-25T00:07:56.472471Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e8f69799810c32dd40c6724d829eccc70baad07f'} |
Linux | GSD-2022-1002087 | power: supply: wm8350-power: Add missing free in free_charger_irq | power: supply: wm8350-power: Add missing free in free_charger_irq
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 48d23ef90116c8c702bfa4cad93744e4e5588d7d, it was introduced in version v2.6.29 by commit 14431aa0c5a443d13d24e6f865a8838f97dab973. For more details please see the references link. | null | 2022-04-25T04:00:23.543609Z | 2022-04-24T22:09:35.416608Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/14431aa0c5a443d13d24e6f865a8838f97dab973'} |
Linux | GSD-2022-1000540 | nvme: fix a possible use-after-free in controller reset during load | nvme: fix a possible use-after-free in controller reset during load
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit 9e956a2596ae276124ef0d96829c013dd0faf861. For more details please see the references link. | null | 2022-03-07T01:37:04.910304Z | 2022-02-27T03:21:04.170275Z | null | null | null | null | null |
Linux | GSD-2022-1000110 | ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() | ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.265 by commit 4977491e4b3aad8567f57e2a9992d251410c1db3. For more details please see the references link. | null | 2022-02-19T04:00:47.269889Z | 2022-02-18T21:42:12.539542Z | null | null | null | null | null |
Linux | GSD-2021-1001187 | arch_topology: Avoid use-after-free for scale_freq_data | arch_topology: Avoid use-after-free for scale_freq_data
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.4 by commit ccdf7e073170886bc370c613e269de610a794c4a, it was introduced in version v5.13 by commit 01e055c120a46e78650b5f903088badbbdaae9ad. For more details please see the references link. | null | 2021-12-20T00:01:53.979741Z | 2021-08-03T01:33:24.769357Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/01e055c120a46e78650b5f903088badbbdaae9ad'} |
Linux | GSD-2021-1000145 | openvswitch: fix stack OOB read while fragmenting IPv4 packets | openvswitch: fix stack OOB read while fragmenting IPv4 packets
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.36 by commit a1478374b0bda89b4277a8afd39208271faad4be, it was introduced in version v4.16 by commit d52e5a7e7ca49457dd31fc8b42fb7c0d58a31221. For more details please see the references link. | null | 2021-12-20T00:17:52.331911Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d52e5a7e7ca49457dd31fc8b42fb7c0d58a31221'} |
Linux | GSD-2021-1002178 | powerpc/idle: Don't corrupt back chain when going idle | powerpc/idle: Don't corrupt back chain when going idle
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 496c5fe25c377ddb7815c4ce8ecfb676f051e9b6, it was introduced in version v5.15 by commit 9b4416c5095c20e110c82ae602c254099b83b72f. For more details please see the references link. | null | 2021-11-14T15:23:24.032950Z | 2021-11-14T15:23:24.032950Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9b4416c5095c20e110c82ae602c254099b83b72f'} |
Linux | GSD-2021-1002482 | drm/amd/amdkfd: Fix kernel panic when reset failed and been triggered again | drm/amd/amdkfd: Fix kernel panic when reset failed and been triggered again
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.84 by commit 74aafe99efb68f15e50be9f7032c2168512f98a8. For more details please see the references link. | null | 2021-12-19T23:53:33.407270Z | 2021-12-19T19:39:18.359530Z | null | null | null | null | null |
Linux | GSD-2022-1001428 | block: Fix the maximum minor value is blk_alloc_ext_minor() | block: Fix the maximum minor value is blk_alloc_ext_minor()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 0f8cf8f5ccbad25ed6828875b222dbab29d5c272, it was introduced in version v5.11 by commit 22ae8ce8b89241c94ac00c237752c0ffa37ba5ae. For more details please see the references link. | null | 2022-04-25T03:11:30.787902Z | 2022-04-24T21:12:15.200764Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/22ae8ce8b89241c94ac00c237752c0ffa37ba5ae'} |
Linux | GSD-2022-1001582 | watch_queue: Actually free the watch | watch_queue: Actually free the watch
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 7e8c9b0df07a77f0d072603b8ced2677e30e1893, it was introduced in version v5.8 by commit c73be61cede5882f9605a852414db559c0ebedfd. For more details please see the references link. | null | 2022-04-25T03:37:26.283333Z | 2022-04-24T21:26:04.981511Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c73be61cede5882f9605a852414db559c0ebedfd'} |
Linux | GSD-2021-1000515 | platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios | platform/x86: dell-smbios-wmi: Fix oops on rmmod dell_smbios
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.122 by commit 6fa78a6b9a3beb676a010dc489c1257f7e432525, it was introduced in version v4.15 by commit 1a258e670434f404a4500b65ba1afea2c2b29bba. For more details please see the references link. | null | 2021-12-19T23:30:09.039693Z | 2021-05-31T23:49:03.572924Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1a258e670434f404a4500b65ba1afea2c2b29bba'} |
Linux | GSD-2021-1002528 | ksmbd: fix memleak in get_file_stream_info() | ksmbd: fix memleak in get_file_stream_info()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.6 by commit 11e659827c3a2facb3a04e08cc97ff14d5091f51, it was introduced in version v5.15 by commit 34061d6b76a41b1e43c19e1e50d98e5d77f77d4e. For more details please see the references link. | null | 2021-12-19T23:23:48.204719Z | 2021-12-19T19:41:15.925980Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/34061d6b76a41b1e43c19e1e50d98e5d77f77d4e'} |
Linux | GSD-2022-1001078 | mlxsw: spectrum: Guard against invalid local ports | mlxsw: spectrum: Guard against invalid local ports
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 4cad27ba2e5a5843a7fab5aa30de2b8e8c3db3a8. For more details please see the references link. | null | 2022-04-25T05:51:12.732009Z | 2022-04-24T20:43:48.841383Z | null | null | null | null | null |
Linux | GSD-2021-1001754 | mptcp: ensure tx skbs always have the MPTCP ext | mptcp: ensure tx skbs always have the MPTCP ext
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.9 by commit f8ff625a8082db8c2b58dcb5229b27928943b94b, it was introduced in version v5.14.7 by commit e35820fb56415be6924bf552ec223ed5f347b4be. For more details please see the references link. | null | 2021-12-19T23:51:49.736136Z | 2021-10-19T16:35:06.874694Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e35820fb56415be6924bf552ec223ed5f347b4be'} |
Linux | GSD-2021-1000846 | usb: fix various gadget panics on 10gbps cabling | usb: fix various gadget panics on 10gbps cabling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.273 by commit fd24be23abf3e94260be0f00bb42c7e91d495f87. For more details please see the references link. | null | 2021-12-19T22:50:28.230173Z | 2021-06-30T00:01:02.306823Z | null | null | null | null | null |
Linux | GSD-2022-1002204 | ACPI: CPPC: Avoid out of bounds access when parsing _CPC data | ACPI: CPPC: Avoid out of bounds access when parsing _CPC data
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit cb249f8c00f40dba83b7da8207ac14ca46e9ec9e, it was introduced in version v4.4 by commit 337aadff8e4567e39669e07d9a88b789d78458b5. For more details please see the references link. | null | 2022-04-25T06:46:48.920218Z | 2022-04-24T22:21:30.443071Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/337aadff8e4567e39669e07d9a88b789d78458b5'} |
Linux | GSD-2022-1000239 | drm/vmwgfx: Fix stale file descriptors on failed usercopy | drm/vmwgfx: Fix stale file descriptors on failed usercopy
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.18 by commit 6066977961fc6f437bc064f628cf9b0e4571c56c, it was introduced in version v4.14 by commit c906965dee22d5e95d0651759ba107b420212a9f. For more details please see the references link. | null | 2022-02-20T02:05:15.755440Z | 2022-02-18T22:00:01.585027Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c906965dee22d5e95d0651759ba107b420212a9f'} |
Linux | GSD-2022-1000393 | iwlwifi: fix use-after-free | iwlwifi: fix use-after-free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.102 by commit 008508c16af0087cda0394e1ac6f0493b01b6063, it was introduced in version v5.10.94 by commit febab6b60d61d13cd9f30a2991deea56df39567d. For more details please see the references link. | null | 2022-03-07T01:32:01.847105Z | 2022-02-27T03:00:47.118552Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/febab6b60d61d13cd9f30a2991deea56df39567d'} |
Linux | GSD-2021-1001304 | atm: iphase: fix possible use-after-free in ia_module_exit() | atm: iphase: fix possible use-after-free in ia_module_exit()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.51 by commit e759ff76ebbbfcdcf83b6634c54dc47828573d8b. For more details please see the references link. | null | 2021-12-20T01:05:40.422587Z | 2021-08-03T02:02:42.933654Z | null | null | null | null | null |
Linux | GSD-2022-1000669 | iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping() | iommu/vt-d: Fix potential memory leak in intel_setup_irq_remapping()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.8 by commit b62eceb5f8f08815fe3f945fc55bbf997c344ecd, it was introduced in version v5.8 by commit e3beca48a45b5e0e6e6a4e0124276b8248dcc9bb. For more details please see the references link. | null | 2022-03-07T01:34:59.566944Z | 2022-02-27T03:38:58.945630Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e3beca48a45b5e0e6e6a4e0124276b8248dcc9bb'} |
Linux | GSD-2022-1002341 | bfq: fix use-after-free in bfq_dispatch_request | bfq: fix use-after-free in bfq_dispatch_request
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 74e610b5ee0d95e751280567100509eb11517efa. For more details please see the references link. | null | 2022-04-25T04:57:32.624550Z | 2022-04-24T22:35:48.315249Z | null | null | null | null | null |
Linux | GSD-2022-1000686 | xen/gnttab: fix gnttab_end_foreign_access() without page specified | xen/gnttab: fix gnttab_end_foreign_access() without page specified
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.14 by commit 6d168929b4c497a8c1945dd71e467b2db12bbad2. For more details please see the references link. | null | 2022-03-18T02:57:27.047633Z | 2022-03-18T00:09:39.154865Z | null | null | null | null | null |
Linux | GSD-2022-1001994 | staging: vchiq_core: handle NULL result of find_service_by_handle | staging: vchiq_core: handle NULL result of find_service_by_handle
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit aa0b7296785312a4bfa8fac0ba8ad78698fd9fcf. For more details please see the references link. | null | 2022-04-25T05:38:57.106137Z | 2022-04-24T22:01:47.341081Z | null | null | null | null | null |
Linux | GSD-2021-1001611 | irqchip/gic-v3-its: Fix potential VPE leak on error | irqchip/gic-v3-its: Fix potential VPE leak on error
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.150 by commit 42d3711c23781045e7a5cd28536c774b9a66d20b, it was introduced in version v4.14 by commit 7d75bbb4bc1ad90386776459d37e4ddfe605671e. For more details please see the references link. | null | 2021-12-20T01:21:21.559136Z | 2021-10-19T16:28:10.921367Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7d75bbb4bc1ad90386776459d37e4ddfe605671e'} |
Linux | GSD-2021-1000903 | KVM: x86: Ensure liveliness of nested VM-Enter fail tracepoint message | KVM: x86: Ensure liveliness of nested VM-Enter fail tracepoint message
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.126 by commit 796d3bd4ac9316e70c181189318cd2bd98af34bc, it was introduced in version v5.4 by commit 380e0055bc7e4a5c687436ba3ccebb4667836b95. For more details please see the references link. | null | 2021-12-20T00:29:35.410934Z | 2021-06-30T00:05:32.015905Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/380e0055bc7e4a5c687436ba3ccebb4667836b95'} |
Linux | GSD-2021-1001241 | netrom: Decrease sock refcount when sock timers expire | netrom: Decrease sock refcount when sock timers expire
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.54 by commit 6811744bd0efb9e472cb15d066cdb460beb8cb8a, it was introduced in version v5.0 by commit 63346650c1a94a92be61a57416ac88c0a47c4327. For more details please see the references link. | null | 2021-12-20T00:08:31.923817Z | 2021-08-03T01:46:36.656675Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/63346650c1a94a92be61a57416ac88c0a47c4327'} |
Linux | GSD-2022-1001097 | ax25: fix UAF bug in ax25_send_control() | ax25: fix UAF bug in ax25_send_control()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 01619aa347d35ac8b79751757784ec6f507a3215, it was introduced in version v5.17.2 by commit 534156dd4ed768e30a43de0036f45dca7c54818f. For more details please see the references link. | null | 2022-04-24T20:45:00.473488Z | 2022-04-24T20:45:00.473488Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/534156dd4ed768e30a43de0036f45dca7c54818f'} |
Linux | GSD-2021-1002197 | drm/ttm: fix memleak in ttm_transfered_destroy | drm/ttm: fix memleak in ttm_transfered_destroy
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 0db55f9a1bafbe3dac750ea669de9134922389b5. For more details please see the references link. | null | 2021-12-19T22:46:42.425683Z | 2021-11-14T15:24:18.174439Z | null | null | null | null | null |
Linux | GSD-2021-1000450 | ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook | ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.191 by commit a9938d6d78a238d6ab8de57a4d3dcf77adceb9bb, it was introduced in version v4.7 by commit 1879445dfa7bbd6fe21b09c5cc72f4934798afed. For more details please see the references link. | null | 2021-12-19T23:51:01.965081Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1879445dfa7bbd6fe21b09c5cc72f4934798afed'} |
Linux | GSD-2021-1002343 | staging: rtl8723bs: remove a third possible deadlock | staging: rtl8723bs: remove a third possible deadlock
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit d330f1d4f797b05c85eaa76ad1db114f7214bd61. For more details please see the references link. | null | 2021-12-20T01:00:58.103108Z | 2021-11-29T02:39:40.859409Z | null | null | null | null | null |
Linux | GSD-2022-1000901 | xfrm: fix MTU regression | xfrm: fix MTU regression
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.233 by commit 20fe64c54412ca42efb9ba07f856ed8cac6e007e, it was introduced in version v4.15 by commit 749439bfac6e1a2932c582e2699f91d329658196. For more details please see the references link. | null | 2022-03-18T02:54:51.427370Z | 2022-03-18T00:29:57.286897Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/749439bfac6e1a2932c582e2699f91d329658196'} |
Linux | GSD-2022-1001613 | mm: invalidate hwpoison page cache page in fault path | mm: invalidate hwpoison page cache page in fault path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit d66a7ce91383e1910fd6bcae038a27771d5630f0. For more details please see the references link. | null | 2022-04-25T06:02:49.275370Z | 2022-04-24T21:28:14.319891Z | null | null | null | null | null |
Linux | GSD-2021-1001996 | comedi: vmk80xx: fix bulk-buffer overflow | comedi: vmk80xx: fix bulk-buffer overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.217 by commit 063f576c43d589a4c153554b681d32b3f8317c7b, it was introduced in version v2.6.31 by commit 985cafccbf9b7f862aa1c5ee566801e18b5161fb. For more details please see the references link. | null | 2021-12-20T00:35:11.240381Z | 2021-11-14T15:15:07.384631Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/985cafccbf9b7f862aa1c5ee566801e18b5161fb'} |
Linux | GSD-2021-1000684 | NFC: nci: fix memory leak in nci_allocate_device | NFC: nci: fix memory leak in nci_allocate_device
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.235 by commit 2c2fb2df46ea866b49fea5ec7112ec3cd4896c74, it was introduced in version v4.0 by commit 11f54f228643d0248ec00ce8c9fb8d872f87e7b8. For more details please see the references link. | null | 2021-12-19T23:19:27.502555Z | 2021-06-04T20:01:52.524678Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/11f54f228643d0248ec00ce8c9fb8d872f87e7b8'} |
Linux | GSD-2021-1002713 | ovl: fix warning in ovl_create_real() | ovl: fix warning in ovl_create_real()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.88 by commit 6859985a2fbda5d1586bf44538853e1be69e85f7. For more details please see the references link. | null | 2022-01-11T06:48:25.921745Z | 2021-12-27T05:38:30.146294Z | null | null | null | null | null |
Linux | GSD-2022-1001243 | Bluetooth: hci_serdev: call init_rwsem() before p->open() | Bluetooth: hci_serdev: call init_rwsem() before p->open()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit c6049161291737242d5a008bd8ebe0409b175a43, it was introduced in version v4.16 by commit d73e172816652772114827abaa2dbc053eecbbd7. For more details please see the references link. | null | 2022-04-25T06:31:15.352160Z | 2022-04-24T20:57:16.273863Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d73e172816652772114827abaa2dbc053eecbbd7'} |
Linux | GSD-2021-1001095 | nilfs2: fix memory leak in nilfs_sysfs_delete_device_group | nilfs2: fix memory leak in nilfs_sysfs_delete_device_group
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.274 by commit 7bbb84c72484db9f95c63d523425c2189fb06b29, it was introduced in version v3.17 by commit da7141fb78db915680616e15677539fc8140cf53. For more details please see the references link. | null | 2021-12-20T00:33:34.273048Z | 2021-07-08T01:55:59.524474Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/da7141fb78db915680616e15677539fc8140cf53'} |
Linux | GSD-2022-1002195 | mips: ralink: fix a refcount leak in ill_acc_of_setup() | mips: ralink: fix a refcount leak in ill_acc_of_setup()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 060a485df4ec1183d543317511cb4caa43468b5d. For more details please see the references link. | null | 2022-04-25T06:07:41.951474Z | 2022-04-24T22:20:40.427887Z | null | null | null | null | null |
Linux | GSD-2022-1000452 | scsi: pm8001: Fix use-after-free for aborted TMF sas_task | scsi: pm8001: Fix use-after-free for aborted TMF sas_task
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit 3c334cdfd94945b8edb94022a0371a8665b17366. For more details please see the references link. | null | 2022-03-07T01:40:22.292278Z | 2022-02-27T03:08:58.543247Z | null | null | null | null | null |
Linux | GSD-2022-1000147 | Bluetooth: refactor malicious adv data check | Bluetooth: refactor malicious adv data check
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.176 by commit 835d3706852537bf92eb23eb8635b8dee0c0aa67. For more details please see the references link. | null | 2022-02-19T03:07:06.543115Z | 2022-02-18T21:47:13.066301Z | null | null | null | null | null |
Linux | GSD-2022-1002480 | iommu/arm-smmu-v3: fix event handling soft lockup | iommu/arm-smmu-v3: fix event handling soft lockup
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit ffa0495a506d5edbd1b4ad45a2759bc080856695. For more details please see the references link. | null | 2022-04-25T05:23:45.590222Z | 2022-04-24T22:52:51.017086Z | null | null | null | null | null |
Linux | GSD-2022-1000517 | net: fix a memleak when uncloning an skb dst and its metadata | net: fix a memleak when uncloning an skb dst and its metadata
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 8b1087b998e273f07be13dcb5f3ca4c309c7f108, it was introduced in version v4.3 by commit fc4099f17240767554ff3a73977acb78ef615404. For more details please see the references link. | null | 2022-03-07T01:39:35.881362Z | 2022-02-27T03:17:38.560149Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fc4099f17240767554ff3a73977acb78ef615404'} |
Linux | GSD-2021-1001580 | drm/nouveau/debugfs: fix file release memory leak | drm/nouveau/debugfs: fix file release memory leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.153 by commit 11cd944bb87d9e575b94c07c952105eda745b459, it was introduced in version v4.5 by commit 6e9fc177399f08446293fec7607913fdbc95e191. For more details please see the references link. | null | 2021-12-19T22:11:55.446329Z | 2021-10-19T16:24:42.842290Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6e9fc177399f08446293fec7607913fdbc95e191'} |
Linux | GSD-2022-1000844 | riscv: Fix config KASAN && SPARSEMEM && !SPARSE_VMEMMAP | riscv: Fix config KASAN && SPARSEMEM && !SPARSE_VMEMMAP
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.104 by commit 7211aab2881b0a8b6a002ec2eb341b2d3cb9f003, it was introduced in version v5.6 by commit 8ad8b72721d0f07fa02dbe71f901743f9c71c8e6. For more details please see the references link. | null | 2022-03-18T02:54:40.094388Z | 2022-03-18T00:23:19.962957Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ad8b72721d0f07fa02dbe71f901743f9c71c8e6'} |
Linux | GSD-2022-1001756 | rxrpc: fix some null-ptr-deref bugs in server_key.c | rxrpc: fix some null-ptr-deref bugs in server_key.c
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 432297011caf71dbc95c3365a65adf365e79aff3, it was introduced in version v5.11 by commit 12da59fcab5a05d01773e7cb413b8b8f3bb4e334. For more details please see the references link. | null | 2022-04-25T08:35:16.739394Z | 2022-04-24T21:39:59.572286Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/12da59fcab5a05d01773e7cb413b8b8f3bb4e334'} |
Linux | GSD-2021-1002206 | net: batman-adv: fix error handling | net: batman-adv: fix error handling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 6f68cd634856f8ca93bafd623ba5357e0f648c68, it was introduced in version v2.6.38 by commit c6c8fea29769d998d94fcec9b9f14d4b52b349d3. For more details please see the references link. | null | 2021-12-19T23:06:54.160240Z | 2021-11-14T15:24:40.205176Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6c8fea29769d998d94fcec9b9f14d4b52b349d3'} |
Linux | GSD-2022-1001306 | ocfs2: fix crash when mount with quota enabled | ocfs2: fix crash when mount with quota enabled
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit eda31f77317647b9fbf889779ee1fb6907651865, it was introduced in version v5.15 by commit 6c85c2c728193d19d6a908ae9fb312d0325e65ca. For more details please see the references link. | null | 2022-04-25T04:34:48.694861Z | 2022-04-24T21:02:39.538326Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6c85c2c728193d19d6a908ae9fb312d0325e65ca'} |
Linux | GSD-2021-1000391 | spi: stm32: Fix use-after-free on unbind | spi: stm32: Fix use-after-free on unbind
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit 05b3f9b0ac32fb3714efa13270700868b3000019, it was introduced in version v5.10.37 by commit 0390f6f1d0bcd36d0ab22367498cc2c4619c05d8. For more details please see the references link. | null | 2021-06-24T22:55:39.227901Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0390f6f1d0bcd36d0ab22367498cc2c4619c05d8'} |
Linux | GSD-2021-1001979 | can: peak_pci: peak_pci_remove(): fix UAF | can: peak_pci: peak_pci_remove(): fix UAF
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.214 by commit adbda14730aacce41c0d3596415aa39ad63eafd9, it was introduced in version v3.4 by commit e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd. For more details please see the references link. | null | 2021-12-19T22:25:04.614240Z | 2021-11-14T15:14:24.150021Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e6d9c80b7ca1504411ad6d7acdb8683e4ae1c9cd'} |
Linux | GSD-2021-1002656 | sit: do not call ipip6_dev_free() from sit_init_net() | sit: do not call ipip6_dev_free() from sit_init_net()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.222 by commit e56b65c1e74d7f706d74b51baba15187be2fb4b5, it was introduced in version v4.12 by commit cf124db566e6b036b8bcbe8decbed740bdfac8c6. For more details please see the references link. | null | 2022-01-11T05:51:59.520872Z | 2021-12-27T05:33:27.494291Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cf124db566e6b036b8bcbe8decbed740bdfac8c6'} |
Linux | GSD-2021-1001353 | wl1251: Fix possible buffer overflow in wl1251_cmd_scan | wl1251: Fix possible buffer overflow in wl1251_cmd_scan
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.133 by commit d71dddeb5380613f9ef199f3e7368fd78fb1a46e. For more details please see the references link. | null | 2021-12-19T22:40:08.531532Z | 2021-08-03T02:15:57.250961Z | null | null | null | null | null |
Linux | GSD-2022-1002253 | ath9k_htc: fix uninit value bugs | ath9k_htc: fix uninit value bugs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 4d244b731188e0b63fc40a9d2dec72e9181fb37c, it was introduced in version v2.6.35 by commit fb9987d0f748c983bb795a86f47522313f701a08. For more details please see the references link. | null | 2022-04-25T06:21:36.447507Z | 2022-04-24T22:26:36.714353Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb9987d0f748c983bb795a86f47522313f701a08'} |
Linux | GSD-2022-1000794 | RDMA/cma: Do not change route.addr.src_addr outside state checks | RDMA/cma: Do not change route.addr.src_addr outside state checks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.26 by commit 00265efbd3e5705038c9492a434fda8cf960c8a2, it was introduced in version v5.10 by commit 732d41c545bb359cbb8c94698bdc1f8bcf82279c. For more details please see the references link. | null | 2022-03-18T03:00:09.649455Z | 2022-03-18T00:18:27.047415Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/732d41c545bb359cbb8c94698bdc1f8bcf82279c'} |
Linux | GSD-2022-1001886 | f2fs: fix compressed file start atomic write may cause data corruption | f2fs: fix compressed file start atomic write may cause data corruption
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 0f42a02e4773efc4f1edf202fc73d0cd14e8fb09, it was introduced in version v5.6 by commit 4c8ff7095bef64fc47e996a938f7d57f9e077da3. For more details please see the references link. | null | 2022-04-25T04:38:45.736092Z | 2022-04-24T21:52:01.343091Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4c8ff7095bef64fc47e996a938f7d57f9e077da3'} |
Linux | GSD-2021-1001703 | swiotlb-xen: ensure to issue well-formed XENMEM_exchange requests | swiotlb-xen: ensure to issue well-formed XENMEM_exchange requests
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.11 by commit 2e4a7695c8df896ad325610a87a776f185c62ee1. For more details please see the references link. | null | 2021-12-20T01:08:58.416868Z | 2021-10-19T16:32:41.117945Z | null | null | null | null | null |
Linux | GSD-2021-1000811 | ext4: fix memory leak in ext4_fill_super | ext4: fix memory leak in ext4_fill_super
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit 1385b23396d511d5233b8b921ac3058b3f86a5e1, it was introduced in version v2.6.25 by commit ce40733ce93de402ed629762f0e912d9af187cef. For more details please see the references link. | null | 2021-12-20T01:04:50.757391Z | 2021-06-25T00:08:53.223555Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ce40733ce93de402ed629762f0e912d9af187cef'} |
Linux | GSD-2021-1002085 | net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path | net/mlx5e: Fix memory leak in mlx5_core_destroy_cq() error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit ed8aafea4fec9c654e63445236e0b505e27ed3a7, it was introduced in version v3.11 by commit e126ba97dba9edeb6fafa3665b5f8497fc9cdf8c. For more details please see the references link. | null | 2021-12-20T00:48:56.877177Z | 2021-11-14T15:19:10.843043Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e126ba97dba9edeb6fafa3665b5f8497fc9cdf8c'} |
Linux | GSD-2021-1000542 | ptp: ocp: Fix a resource leak in an error handling path | ptp: ocp: Fix a resource leak in an error handling path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit 0e38e702f1152479e6afac34f151dbfd99417f99, it was introduced in version v5.11 by commit a7e1abad13f3f0366ee625831fecda2b603cdc17. For more details please see the references link. | null | 2021-12-20T00:55:31.003525Z | 2021-06-04T19:35:50.406812Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a7e1abad13f3f0366ee625831fecda2b603cdc17'} |
Linux | GSD-2022-1001185 | clk: qcom: ipq8074: fix PCI-E clock oops | clk: qcom: ipq8074: fix PCI-E clock oops
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 5a5576ad405c3c89fc9afb245c4dcc3e412b0aa9, it was introduced in version v5.9 by commit f0cfcf1ade201dcfd3365f231efc90e846fa46df. For more details please see the references link. | null | 2022-04-25T03:15:41.316661Z | 2022-04-24T20:51:54.252129Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f0cfcf1ade201dcfd3365f231efc90e846fa46df'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.