ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2022-1001941 | ALSA: oss: Fix PCM OSS buffer allocation overflow | ALSA: oss: Fix PCM OSS buffer allocation overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.32 by commit 7a40cbf3579a8e14849ba7ce46309c1992658d2b. For more details please see the references link. | null | 2022-04-25T03:54:03.060736Z | 2022-04-24T21:56:40.632014Z | null | null | null | null | null |
Linux | GSD-2022-1000653 | ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx() | ASoC: ops: Reject out of bounds values in snd_soc_put_xr_sx()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.8 by commit e09cf398e8c6db69c620b6d8073abc4377a07af5. For more details please see the references link. | null | 2022-03-07T01:50:07.616944Z | 2022-02-27T03:36:31.266871Z | null | null | null | null | null |
Linux | GSD-2022-1001936 | tpm: fix reference counting for struct tpm_chip | tpm: fix reference counting for struct tpm_chip
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 662893b4f6bd466ff9e1cd454c44c26d32d554fe, it was introduced in version v4.12 by commit fdc915f7f71939ad5a3dda3389b8d2d7a7c5ee66. For more details please see the references link. | null | 2022-04-25T04:59:18.657884Z | 2022-04-24T21:56:20.834960Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fdc915f7f71939ad5a3dda3389b8d2d7a7c5ee66'} |
Linux | GSD-2022-1000624 | drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable | drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.5 by commit 2b7e7df1eacd280e561ede3e977853606871c951, it was introduced in version v4.3 by commit 5c8290284402bf7d2c12269402b3177b899c78b7. For more details please see the references link. | null | 2022-03-07T01:37:45.792286Z | 2022-02-27T03:32:35.884406Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5c8290284402bf7d2c12269402b3177b899c78b7'} |
Linux | GSD-2021-1001349 | media: zr364xx: fix memory leak in zr364xx_start_readpipe | media: zr364xx: fix memory leak in zr364xx_start_readpipe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.133 by commit 0edd6759167295ea9969e89283b81017b4c688aa, it was introduced in version v2.6.32 by commit ccbf035ae5de4c535160fc99f73feb44cc55b534. For more details please see the references link. | null | 2021-12-19T22:38:44.888926Z | 2021-08-03T02:14:41.578450Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ccbf035ae5de4c535160fc99f73feb44cc55b534'} |
Linux | GSD-2022-1002249 | scsi: pm8001: Fix abort all task initialization | scsi: pm8001: Fix abort all task initialization
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 765674e3b30121782a2b792684554baa48c61f5e, it was introduced in version v3.10 by commit c6b9ef5779c3e1edfa9de949d2a51252bc347663. For more details please see the references link. | null | 2022-04-25T03:35:34.149994Z | 2022-04-24T22:26:04.993776Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c6b9ef5779c3e1edfa9de949d2a51252bc347663'} |
Linux | GSD-2022-1000274 | net: amd-xgbe: Fix skb data length underflow | net: amd-xgbe: Fix skb data length underflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.20 by commit db6fd92316a254be2097556f01bccecf560e53ce, it was introduced in version v4.11 by commit 622c36f143fc9566ba49d7cec994c2da1182d9e2. For more details please see the references link. | null | 2022-02-20T02:11:04.042500Z | 2022-02-18T22:04:56.701495Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/622c36f143fc9566ba49d7cec994c2da1182d9e2'} |
Linux | GSD-2021-1002836 | mac80211: fix locking in ieee80211_start_ap error path | mac80211: fix locking in ieee80211_start_ap error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.12 by commit c1d1ec4db5f7264cfc21993e59e8f2dcecf4b44f, it was introduced in version v5.10 by commit 295b02c4be74bebf988593b8322369513fcecf68. For more details please see the references link. | null | 2022-01-11T05:47:23.098528Z | 2021-12-30T02:45:38.104091Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/295b02c4be74bebf988593b8322369513fcecf68'} |
Linux | GSD-2021-1001719 | ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup | ixgbe: Fix NULL pointer dereference in ixgbe_xdp_setup
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit 2744341dd52e935344ca1b4bf189ba0d182a3e8e, it was introduced in version v5.0 by commit 4a9b32f30f805ca596d76605903a48eab58e0b88. For more details please see the references link. | null | 2021-12-19T23:54:03.729859Z | 2021-10-19T16:33:24.575405Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4a9b32f30f805ca596d76605903a48eab58e0b88'} |
Linux | GSD-2022-1001035 | staging: vchiq_core: handle NULL result of find_service_by_handle | staging: vchiq_core: handle NULL result of find_service_by_handle
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 3b424f6586a870b8d657c5e5419465bbe0e7b61f. For more details please see the references link. | null | 2022-04-25T04:43:02.341456Z | 2022-04-24T20:41:32.268490Z | null | null | null | null | null |
Linux | GSD-2021-1000558 | Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails | Bluetooth: cmtp: fix file refcount when cmtp_attach_device fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit 3178e0a38f204a61ed4fe5739d6a4732879b34d1, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T01:22:21.869325Z | 2021-06-04T19:38:34.635708Z | null | null | null | null | null |
Linux | GSD-2021-1002565 | rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle() | rxrpc: Fix rxrpc_peer leak in rxrpc_look_up_bundle()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.7 by commit bc97458620e38961af9505cc060ad4cf5c9e4af7, it was introduced in version v5.10 by commit 245500d853e9f20036cec7df4f6984ece4c6bf26. For more details please see the references link. | null | 2021-12-19T23:55:32.962386Z | 2021-12-19T19:43:00.266378Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/245500d853e9f20036cec7df4f6984ece4c6bf26'} |
Linux | GSD-2022-1001465 | media: staging: media: zoran: calculate the right buffer number for zoran_reap_stat_com | media: staging: media: zoran: calculate the right buffer number for zoran_reap_stat_com
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 20db2ed1e2f9fcd417fa67853e5154f0c2537d6c. For more details please see the references link. | null | 2022-04-25T05:59:11.039693Z | 2022-04-24T21:15:09.655719Z | null | null | null | null | null |
Linux | GSD-2021-1000108 | ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure | ACPI: GTDT: Don't corrupt interrupt mappings on watchdow probe failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.20 by commit 42e69521ee1fa5abf21f478d147d06bbfe6bf6a8, it was introduced in version v4.12 by commit ca9ae5ec4ef0ed13833b03297ab319676965492c. For more details please see the references link. | null | 2021-12-19T22:52:15.657036Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ca9ae5ec4ef0ed13833b03297ab319676965492c'} |
Linux | GSD-2021-1002135 | ice: check whether PTP is initialized in ice_ptp_release() | ice: check whether PTP is initialized in ice_ptp_release()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.16 by commit 63a97a9f95f26fb64c72087bfbdce767f69929e6, it was introduced in version v5.14.4 by commit 46720ac66c21bf85e08823664b7b314b85e43f26. For more details please see the references link. | null | 2021-12-20T00:05:37.795275Z | 2021-11-14T15:21:29.423042Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/46720ac66c21bf85e08823664b7b314b85e43f26'} |
Linux | GSD-2021-1002420 | rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer() | rxrpc: Fix rxrpc_local leak in rxrpc_lookup_peer()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.220 by commit 913c24af2d13a3fd304462916ee98e298d56bdce, it was introduced in version v4.19.82 by commit e8e51ce79c157188e209e5ea0afaf6b42dd76104. For more details please see the references link. | null | 2021-12-20T00:48:54.358300Z | 2021-12-19T19:36:35.382867Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e8e51ce79c157188e209e5ea0afaf6b42dd76104'} |
Linux | GSD-2022-1001170 | lib/test: use after free in register_test_dev_kmod() | lib/test: use after free in register_test_dev_kmod()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 05f90fe2c7e8f27d7691ae57cb604e4c156b70e6, it was introduced in version v4.13 by commit d9c6a72d6fa29d3a7999dda726577e5d1fccafa5. For more details please see the references link. | null | 2022-04-25T06:47:43.702074Z | 2022-04-24T20:50:15.216618Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9c6a72d6fa29d3a7999dda726577e5d1fccafa5'} |
Linux | GSD-2021-1002070 | scsi: core: Put LLD module refcnt after SCSI device is released | scsi: core: Put LLD module refcnt after SCSI device is released
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.78 by commit 7b57c38d12aed1b5d92f74748bed25e0d041729f. For more details please see the references link. | null | 2021-12-19T23:44:41.978993Z | 2021-11-14T15:18:31.733113Z | null | null | null | null | null |
Linux | GSD-2022-1001520 | bpf, sockmap: Fix more uncharged while msg has more_data | bpf, sockmap: Fix more uncharged while msg has more_data
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 87d532d41ef937e16f61b3d2094f3a2ac49be365, it was introduced in version v4.20 by commit 604326b41a6fb9b4a78b6179335decee0365cd8c. For more details please see the references link. | null | 2022-04-25T05:49:02.165010Z | 2022-04-24T21:19:42.018702Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/604326b41a6fb9b4a78b6179335decee0365cd8c'} |
Linux | GSD-2022-1001873 | ASoC: mxs: Fix error handling in mxs_sgtl5000_probe | ASoC: mxs: Fix error handling in mxs_sgtl5000_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 44acdaf7acb60054d872bed18ce0e7db8ce900ce, it was introduced in version v3.5 by commit e968194b45c4e8077dada75c5bae5660b37628fe. For more details please see the references link. | null | 2022-04-25T07:09:34.618509Z | 2022-04-24T21:50:32.340037Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e968194b45c4e8077dada75c5bae5660b37628fe'} |
Linux | GSD-2022-1000761 | btrfs: do not WARN_ON() if we have PageError set | btrfs: do not WARN_ON() if we have PageError set
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.27 by commit e00077aa439f0e8f416699fa4e9600db6583db70. For more details please see the references link. | null | 2022-03-18T02:50:27.796184Z | 2022-03-18T00:15:51.394478Z | null | null | null | null | null |
Linux | GSD-2022-1000331 | libsubcmd: Fix use-after-free for realloc(..., 0) | libsubcmd: Fix use-after-free for realloc(..., 0)
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.231 by commit 1029268dc50d3eb54ab0e8d7075d33b190cad9d2, it was introduced in version v4.5 by commit 2f4ce5ec1d447beb42143a9653716a2ab025161e. For more details please see the references link. | null | 2022-03-07T01:50:48.113405Z | 2022-02-27T02:52:20.852579Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2f4ce5ec1d447beb42143a9653716a2ab025161e'} |
Linux | GSD-2021-1002359 | sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl | sata_fsl: fix UAF in sata_fsl_port_stop when rmmod sata_fsl
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.294 by commit cdcd80292106df5cda325426e96495503e41f947, it was introduced in version v2.6.24 by commit faf0b2e5afe7dae072d2715763c7f992b612b628. For more details please see the references link. | null | 2021-12-19T23:11:24.939832Z | 2021-12-19T19:33:52.062275Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/faf0b2e5afe7dae072d2715763c7f992b612b628'} |
Linux | GSD-2021-1000364 | liquidio: Fix unintented sign extension of a left shift of a u16 | liquidio: Fix unintented sign extension of a left shift of a u16
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit f9e9df72dc08873fccfc688fe19b85e93655f052, it was introduced in version v4.9 by commit 5bc67f587ba7eaa8dd3976bfeff8f2b60718c871. For more details please see the references link. | null | 2021-12-20T00:14:10.943749Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5bc67f587ba7eaa8dd3976bfeff8f2b60718c871'} |
Linux | GSD-2022-1001609 | mm,hwpoison: unmap poisoned page before invalidation | mm,hwpoison: unmap poisoned page before invalidation
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 46f3292a16b09bbd1b4541a9b9e7888945f89c04, it was introduced in version v5.16.19 by commit d66a7ce91383e1910fd6bcae038a27771d5630f0. For more details please see the references link. | null | 2022-04-24T21:28:00.663409Z | 2022-04-24T21:28:00.663409Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d66a7ce91383e1910fd6bcae038a27771d5630f0'} |
Linux | GSD-2021-1002709 | media: mxl111sf: change mutex_init() location | media: mxl111sf: change mutex_init() location
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.88 by commit b99bdf127af91d53919e96292c05f737c45ea59a, it was introduced in version v3.7 by commit 8572211842afc53c8450fb470f2b8d02ba7592e0. For more details please see the references link. | null | 2022-01-11T07:49:44.988601Z | 2021-12-27T05:38:20.739285Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8572211842afc53c8450fb470f2b8d02ba7592e0'} |
Linux | GSD-2021-1000734 | nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect | nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.236 by commit ffff05b9ee5c74c04bba2801c1f99b31975d74d9, it was introduced in version v3.3 by commit d646960f7986fefb460a2b062d5ccc8ccfeacc3a. For more details please see the references link. | null | 2021-12-19T22:47:32.295002Z | 2021-06-24T23:59:58.252154Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d646960f7986fefb460a2b062d5ccc8ccfeacc3a'} |
Linux | GSD-2021-1001826 | mlxsw: thermal: Fix out-of-bounds memory accesses | mlxsw: thermal: Fix out-of-bounds memory accesses
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.155 by commit ae0993739e14a102d506aa09e11b0065f3144f10, it was introduced in version v4.10 by commit a50c1e35650b929500bd89be61c89d95a267ce56. For more details please see the references link. | null | 2021-12-19T22:50:42.823966Z | 2021-10-28T13:50:53.216632Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a50c1e35650b929500bd89be61c89d95a267ce56'} |
Linux | GSD-2022-1001259 | ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction | ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 39d2c4a33dc1b4402cec68a3c8f82c6588b6edce, it was introduced in version v3.16 by commit 00a7bb81c20f3e81711e28e0f6c08cee8fd18514. For more details please see the references link. | null | 2022-04-25T05:34:18.753087Z | 2022-04-24T20:58:55.301380Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/00a7bb81c20f3e81711e28e0f6c08cee8fd18514'} |
Linux | GSD-2021-1001575 | staging: greybus: uart: fix tty use after free | staging: greybus: uart: fix tty use after free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.209 by commit a5cfd51f6348e8fd7531461366946039c29c7e69, it was introduced in version v4.9 by commit a18e15175708d39abbe9746ddc3479466b7800c3. For more details please see the references link. | null | 2021-12-20T00:28:10.081734Z | 2021-10-19T16:24:29.017821Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a18e15175708d39abbe9746ddc3479466b7800c3'} |
Linux | GSD-2022-1000018 | sctp: use call_rcu to free endpoint | sctp: use call_rcu to free endpoint
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.261 by commit 8873140f95d4977bf37e4cf0d5c5e3f6e34cdd3e, it was introduced in version v4.14 by commit d25adbeb0cdb860fb39e09cdd025e9cfc954c5ab. For more details please see the references link. | null | 2022-01-11T05:52:37.242866Z | 2022-01-10T19:50:23.320957Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d25adbeb0cdb860fb39e09cdd025e9cfc954c5ab'} |
Linux | GSD-2022-1002025 | rxrpc: Fix call timer start racing with call destruction | rxrpc: Fix call timer start racing with call destruction
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 051360e51341cd17738d82c15a8226010c7cb7f6, it was introduced in version v4.15 by commit a158bdd3247b9656df36ba133235fff702e9fdc3. For more details please see the references link. | null | 2022-04-25T06:01:55.501577Z | 2022-04-24T22:03:56.385303Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a158bdd3247b9656df36ba133235fff702e9fdc3'} |
Linux | GSD-2021-1001125 | net: caif: fix memory leak in ldisc_open | net: caif: fix memory leak in ldisc_open
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.47 by commit 18ed1789bbce54f34367877344e35d9bb877f8f4. For more details please see the references link. | null | 2021-12-20T03:55:14.812547Z | 2021-07-08T01:58:07.846901Z | null | null | null | null | null |
Linux | GSD-2022-1000448 | iommu: Fix potential use-after-free during probe | iommu: Fix potential use-after-free during probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit 65ab30f6a6952fa9ee13009862736cf8d110e6e5. For more details please see the references link. | null | 2022-03-07T01:35:24.270760Z | 2022-02-27T03:08:28.610880Z | null | null | null | null | null |
Linux | GSD-2022-1002475 | Bluetooth: Fix use after free in hci_send_acl | Bluetooth: Fix use after free in hci_send_acl
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit c41de54b0a963e59e4dd04c029a4a6d73f45ef9c. For more details please see the references link. | null | 2022-04-25T05:19:15.925473Z | 2022-04-24T22:52:24.033635Z | null | null | null | null | null |
Linux | GSD-2022-1002160 | drivers: net: slip: fix NPD bug in sl_tx_timeout() | drivers: net: slip: fix NPD bug in sl_tx_timeout()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.190 by commit d05cd68ed8460cb158cc62c41ffe39fe0ca16169. For more details please see the references link. | null | 2022-04-25T06:29:56.617713Z | 2022-04-24T22:17:08.477154Z | null | null | null | null | null |
Linux | GSD-2021-1001430 | udf: Fix NULL pointer dereference in udf_symlink function | udf: Fix NULL pointer dereference in udf_symlink function
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.240 by commit baea588a42d675e35daeaddd10fbc9700550bc4d. For more details please see the references link. | null | 2021-12-19T23:49:10.815778Z | 2021-08-03T02:38:18.260565Z | null | null | null | null | null |
Linux | GSD-2021-1001060 | net/mlx5e: Fix page reclaim for dead peer hairpin | net/mlx5e: Fix page reclaim for dead peer hairpin
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit b374c1304f6d3d4752ad1412427b7bf02bb1fd61, it was introduced in version v4.19 by commit 4d8fcf216c90bc25e34ae2200aa8985ee3158898. For more details please see the references link. | null | 2021-12-19T23:29:35.895729Z | 2021-06-30T00:36:58.308971Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4d8fcf216c90bc25e34ae2200aa8985ee3158898'} |
Linux | GSD-2021-1000221 | ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook | ARM: 9064/1: hw_breakpoint: Do not directly check the event's overflow_handler hook
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.5 by commit dabe299425b1a53a69461fed7ac8922ea6733a25, it was introduced in version v4.7 by commit 1879445dfa7bbd6fe21b09c5cc72f4934798afed. For more details please see the references link. | null | 2021-12-19T22:52:13.949635Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1879445dfa7bbd6fe21b09c5cc72f4934798afed'} |
Linux | GSD-2021-1000671 | drm/amdgpu: Fix a use-after-free | drm/amdgpu: Fix a use-after-free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.235 by commit 952ab3f9f48eb0e8050596d41951cf516be6b122, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T22:36:04.653695Z | 2021-06-04T19:58:55.038888Z | null | null | null | null | null |
Linux | GSD-2021-1001963 | usbnet: sanity check for maxpacket | usbnet: sanity check for maxpacket
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.254 by commit 74b3b27cf9fecce00cd8918b7882fd81191d0aa4. For more details please see the references link. | null | 2021-12-19T23:27:42.152617Z | 2021-11-14T15:13:38.292216Z | null | null | null | null | null |
Linux | GSD-2021-1002162 | ice: fix locking for Tx timestamp tracking flush | ice: fix locking for Tx timestamp tracking flush
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 4d4a223a86afe658cd878800f09458e8bb54415d, it was introduced in version v5.15 by commit 4dd0d5c33c3ebf24a07cae6141648aeb7ba56072. For more details please see the references link. | null | 2021-12-19T22:23:24.130064Z | 2021-11-14T15:22:44.023764Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4dd0d5c33c3ebf24a07cae6141648aeb7ba56072'} |
Linux | GSD-2021-1002498 | drm/msm/a6xx: Allocate enough space for GMU registers | drm/msm/a6xx: Allocate enough space for GMU registers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.84 by commit d646856a600e8635ba498f20b194219b158626e8, it was introduced in version v5.9 by commit 142639a52a01e90c512a9a8d2156997e02a65b53. For more details please see the references link. | null | 2021-12-19T22:22:27.659009Z | 2021-12-19T19:39:57.537362Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/142639a52a01e90c512a9a8d2156997e02a65b53'} |
Linux | GSD-2022-1001432 | rxrpc: Fix call timer start racing with call destruction | rxrpc: Fix call timer start racing with call destruction
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 54df5a37f1d951ed27fd47bf9b15a42279582110, it was introduced in version v4.15 by commit a158bdd3247b9656df36ba133235fff702e9fdc3. For more details please see the references link. | null | 2022-04-25T06:22:31.571917Z | 2022-04-24T21:12:38.752266Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a158bdd3247b9656df36ba133235fff702e9fdc3'} |
Linux | GSD-2022-1001598 | ext4: fix fs corruption when tring to remove a non-empty directory with IO error | ext4: fix fs corruption when tring to remove a non-empty directory with IO error
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit ba8d348eae3261d80007067a74645e786891ce17. For more details please see the references link. | null | 2022-04-25T05:38:30.240587Z | 2022-04-24T21:27:19.329070Z | null | null | null | null | null |
Linux | GSD-2021-1002532 | ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE | ARM: socfpga: Fix crash with CONFIG_FORTIRY_SOURCE
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.6 by commit 20a09c8b25a21506cf8b60bdef78f31a6549ebfc, it was introduced in version v3.8 by commit 9c4566a117a6fe404a0e49b27ac71b631945a70f. For more details please see the references link. | null | 2021-12-20T00:46:58.956771Z | 2021-12-19T19:41:25.447020Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9c4566a117a6fe404a0e49b27ac71b631945a70f'} |
Linux | GSD-2022-1001062 | rtw89: fix RCU usage in rtw89_core_txq_push() | rtw89: fix RCU usage in rtw89_core_txq_push()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 30713cffc9a3e36799049019a2209ce5ea9f458a. For more details please see the references link. | null | 2022-04-25T06:47:18.392777Z | 2022-04-24T20:43:02.613675Z | null | null | null | null | null |
Linux | GSD-2022-1000223 | IB/hfi1: Fix AIP early init panic | IB/hfi1: Fix AIP early init panic
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.99 by commit 4a9bd1e6780fc59f81466ec3489d5ad535a37190, it was introduced in version v5.8 by commit d99dc602e2a55a99940ba9506a7126dfa54d54ea. For more details please see the references link. | null | 2022-02-19T04:36:37.636549Z | 2022-02-18T21:57:22.652308Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d99dc602e2a55a99940ba9506a7126dfa54d54ea'} |
Linux | GSD-2022-1000389 | ax25: improve the incomplete fix to avoid UAF and NPD bugs | ax25: improve the incomplete fix to avoid UAF and NPD bugs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.102 by commit b9a229fd48bfa45edb954c75a57e3931a3da6c5f. For more details please see the references link. | null | 2022-03-07T01:38:45.615385Z | 2022-02-27T03:00:19.582612Z | null | null | null | null | null |
Linux | GSD-2022-1001961 | gpiolib: acpi: use correct format characters | gpiolib: acpi: use correct format characters
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.112 by commit 9709c8b5cdc88b1adb77acdbfd6e8a3f942d9af5, it was introduced in version v4.14 by commit e40a3ae1f794a35c4af3746291ed6fedc1fa0f6f. For more details please see the references link. | null | 2022-04-25T05:06:03.299347Z | 2022-04-24T21:58:36.103447Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e40a3ae1f794a35c4af3746291ed6fedc1fa0f6f'} |
Linux | GSD-2022-1000673 | net: macsec: Fix offload support for NETDEV_UNREGISTER event | net: macsec: Fix offload support for NETDEV_UNREGISTER event
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.8 by commit 8299be160aad8548071d080518712dec0df92bd5, it was introduced in version v5.6 by commit 3cf3227a21d1fb020fe26128e60321bd2151e922. For more details please see the references link. | null | 2022-03-07T01:34:16.442761Z | 2022-02-27T03:39:26.196715Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3cf3227a21d1fb020fe26128e60321bd2151e922'} |
Linux | GSD-2022-1000366 | scsi: myrs: Fix crash in error case | scsi: myrs: Fix crash in error case
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.101 by commit 0e42c4a3d732517edc3766dd45a14e60d29dd929. For more details please see the references link. | null | 2022-03-07T01:39:06.384884Z | 2022-02-27T02:57:02.179835Z | null | null | null | null | null |
Linux | GSD-2021-1000919 | netfilter: synproxy: Fix out of bounds when parsing TCP options | netfilter: synproxy: Fix out of bounds when parsing TCP options
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.128 by commit 6defc77d48eff74075b80ad5925061b2fc010d98, it was introduced in version v3.12 by commit 48b1de4c110a7afa4b85862f6c75af817db26fad. For more details please see the references link. | null | 2021-12-19T23:49:56.399450Z | 2021-06-30T00:24:30.910765Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/48b1de4c110a7afa4b85862f6c75af817db26fad'} |
Linux | GSD-2022-1001824 | net: dsa: fix panic on shutdown if multi-chip tree failed to probe | net: dsa: fix panic on shutdown if multi-chip tree failed to probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 95df5cd5a446df6738d2d45872e08594819080e4, it was introduced in version v5.15 by commit 0650bf52b31ff35dc6430fc2e37969c36baba724. For more details please see the references link. | null | 2022-04-25T07:55:01.404893Z | 2022-04-24T21:45:28.203590Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0650bf52b31ff35dc6430fc2e37969c36baba724'} |
Linux | GSD-2022-1000736 | net-timestamp: convert sk->sk_tskey to atomic_t | net-timestamp: convert sk->sk_tskey to atomic_t
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.12 by commit caf122caad0374f79dcf821b5cb46ad320d49848, it was introduced in version v3.17 by commit 09c2d251b70723650ba47e83571ff49281320f7c. For more details please see the references link. | null | 2022-03-18T02:57:03.698256Z | 2022-03-18T00:13:59.023209Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/09c2d251b70723650ba47e83571ff49281320f7c'} |
Linux | GSD-2022-1001577 | ASoC: xilinx: xlnx_formatter_pcm: Handle sysclk setting | ASoC: xilinx: xlnx_formatter_pcm: Handle sysclk setting
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 915f0bf118248e527f721f0c39e17eb6845a7820, it was introduced in version v5.1 by commit 6f6c3c36f0917be24587eeba818ab4fdfcb5465a. For more details please see the references link. | null | 2022-04-25T05:34:42.944052Z | 2022-04-24T21:25:34.705Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6f6c3c36f0917be24587eeba818ab4fdfcb5465a'} |
Linux | GSD-2021-1002027 | comedi: vmk80xx: fix bulk-buffer overflow | comedi: vmk80xx: fix bulk-buffer overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.159 by commit 1ae4715121a57bc6fa29fd992127b01907f2f993, it was introduced in version v2.6.31 by commit 985cafccbf9b7f862aa1c5ee566801e18b5161fb. For more details please see the references link. | null | 2021-12-19T22:16:19.919527Z | 2021-11-14T15:16:31.364459Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/985cafccbf9b7f862aa1c5ee566801e18b5161fb'} |
Linux | GSD-2022-1001127 | drm/i915: Treat SAGV block time 0 as SAGV disabled | drm/i915: Treat SAGV block time 0 as SAGV disabled
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit df06213334740f4001b10c69ed447b8f6a6f4262. For more details please see the references link. | null | 2022-04-25T04:08:18.179713Z | 2022-04-24T20:47:42.397743Z | null | null | null | null | null |
Linux | GSD-2021-1002477 | net/sched: sch_ets: don't peek at classes beyond 'nbands' | net/sched: sch_ets: don't peek at classes beyond 'nbands'
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.83 by commit ae2659d2c670252759ee9c823c4e039c0e05a6f2, it was introduced in version v5.6 by commit dcc68b4d8084e1ac9af0d4022d6b1aff6a139a33. For more details please see the references link. | null | 2021-12-19T22:33:36.651697Z | 2021-12-19T19:39:06.380661Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/dcc68b4d8084e1ac9af0d4022d6b1aff6a139a33'} |
Linux | GSD-2022-1002422 | ntfs: add sanity check on allocation size | ntfs: add sanity check on allocation size
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 21d490232f323ed4053eb9924615e6fea291f154. For more details please see the references link. | null | 2022-04-25T04:38:24.257735Z | 2022-04-24T22:45:21.354559Z | null | null | null | null | null |
Linux | GSD-2021-1001488 | wl1251: Fix possible buffer overflow in wl1251_cmd_scan | wl1251: Fix possible buffer overflow in wl1251_cmd_scan
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.276 by commit 57ad99ae3c6738ba87bad259bb57c641ca68ebf6. For more details please see the references link. | null | 2021-12-20T00:57:27.312702Z | 2021-08-03T02:56:31.918771Z | null | null | null | null | null |
Linux | GSD-2021-1001172 | ACPI: fix NULL pointer dereference | ACPI: fix NULL pointer dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.6 by commit ccf23a0888077a25a0793a746c3941db2a7562e4. For more details please see the references link. | null | 2021-12-20T00:07:38.469895Z | 2021-08-03T01:32:14.627420Z | null | null | null | null | null |
Linux | GSD-2022-1002072 | ax25: Fix NULL pointer dereferences in ax25 timers | ax25: Fix NULL pointer dereferences in ax25 timers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.112 by commit f934fa478dd17411bc6884153dc824ff9e7505d8, it was introduced in version v5.10.112 by commit 145ea8d213e8f46667cd904ae79d17f298750f00. For more details please see the references link. | null | 2022-04-24T22:07:53.531960Z | 2022-04-24T22:07:53.531960Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/145ea8d213e8f46667cd904ae79d17f298750f00'} |
Linux | GSD-2021-1001522 | i2c: acpi: fix resource leak in reconfiguration device addition | i2c: acpi: fix resource leak in reconfiguration device addition
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.251 by commit b8090a84d7758b929d348bafbd86bb7a10c5fb63, it was introduced in version v4.8 by commit 525e6fabeae286848592363bda13bc34b59bb5ac. For more details please see the references link. | null | 2021-12-19T23:56:01.508491Z | 2021-10-19T16:22:01.873628Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/525e6fabeae286848592363bda13bc34b59bb5ac'} |
Linux | GSD-2021-1000299 | KVM: Destroy I/O bus devices on unregister failure _after_ sync'ing SRCU | KVM: Destroy I/O bus devices on unregister failure _after_ sync'ing SRCU
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 30f46c6993731efb2a690c9197c0fd9ed425da2d, it was introduced in version v5.9 by commit f65886606c2d3b562716de030706dfe1bea4ed5e. For more details please see the references link. | null | 2021-12-19T22:34:18.132247Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f65886606c2d3b562716de030706dfe1bea4ed5e'} |
Linux | GSD-2021-1000763 | efi/libstub: prevent read overflow in find_file_option() | efi/libstub: prevent read overflow in find_file_option()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.43 by commit 951f8ef71d691f754483cc9d871cb493379fdb35, it was introduced in version v5.8 by commit 7a88a6227dc7f2e723bba11ece05e57bd8dce8e4. For more details please see the references link. | null | 2021-12-19T23:18:58.287944Z | 2021-06-25T00:03:13.428683Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7a88a6227dc7f2e723bba11ece05e57bd8dce8e4'} |
Linux | GSD-2021-1001871 | isdn: mISDN: Fix sleeping function called from invalid context | isdn: mISDN: Fix sleeping function called from invalid context
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit f5966ba53013149bcf94e1536644a958dd00a026. For more details please see the references link. | null | 2021-12-20T00:13:32.186494Z | 2021-10-28T13:53:15.348727Z | null | null | null | null | null |
Linux | GSD-2021-1000333 | ceph: fix inode leak on getattr error in __fh_to_dentry | ceph: fix inode leak on getattr error in __fh_to_dentry
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.38 by commit bf45c9fe99aa8003d2703f1bd353f956dea47e40, it was introduced in version v5.8 by commit 878dabb64117406abd40977b87544d05bb3031fc. For more details please see the references link. | null | 2021-12-19T22:33:07.150530Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/878dabb64117406abd40977b87544d05bb3031fc'} |
Linux | GSD-2021-1000626 | net: fujitsu: fix potential null-ptr-deref | net: fujitsu: fix potential null-ptr-deref
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.124 by commit 22049c3d40f08facd1867548716a484dad6b3251, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T23:27:37.732290Z | 2021-06-04T19:49:35.564223Z | null | null | null | null | null |
Linux | GSD-2021-1001934 | NFC: digital: fix possible memory leak in digital_in_send_sdd_req() | NFC: digital: fix possible memory leak in digital_in_send_sdd_req()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.288 by commit 88c890b0b9a1fb9fcd01c61ada515e8b636c34f9, it was introduced in version v3.13 by commit 2c66daecc4092e6049673c281b2e6f0d5e59a94c. For more details please see the references link. | null | 2021-12-19T23:33:22.633136Z | 2021-11-14T15:12:20.428313Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c66daecc4092e6049673c281b2e6f0d5e59a94c'} |
Linux | GSD-2021-1000276 | scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb() | scsi: lpfc: Fix null pointer dereference in lpfc_prep_els_iocb()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 9bdcfbed2a9fe24d2c7eaa1bad7c705e18de8cc7, it was introduced in version v5.11 by commit 4430f7fd09ecb037570119e0aacbf0c17b8f98b2. For more details please see the references link. | null | 2021-12-19T23:33:58.776586Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4430f7fd09ecb037570119e0aacbf0c17b8f98b2'} |
Linux | GSD-2022-1000809 | openvswitch: Fix setting ipv6 fields causing hw csum failure | openvswitch: Fix setting ipv6 fields causing hw csum failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.26 by commit f941104aa116aaa7d80e3b72d776494136f1c466, it was introduced in version v3.8 by commit 3fdbd1ce11e5c0d7cafbe44c942c5cad61113d7b. For more details please see the references link. | null | 2022-03-18T02:52:26.473480Z | 2022-03-18T00:20:33.791948Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3fdbd1ce11e5c0d7cafbe44c942c5cad61113d7b'} |
Linux | GSD-2021-1001037 | RDMA: Verify port when creating flow rule | RDMA: Verify port when creating flow rule
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.11 by commit 8dc1b0e0ca204596c50bcd159ee069ae0f998176, it was introduced in version v3.12 by commit 436f2ad05a0b65b1467ddf51bc68171c381bf844. For more details please see the references link. | null | 2021-12-19T22:49:24.420867Z | 2021-06-30T00:35:32.485455Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/436f2ad05a0b65b1467ddf51bc68171c381bf844'} |
Linux | GSD-2021-1001467 | KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow | KVM: PPC: Book3S: Fix H_RTAS rets buffer overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.277 by commit 1e90a673f6ee09c668fe01aa1b94924f972c9811, it was introduced in version v3.10 by commit 8e591cb7204739efa8e15967ea334eb367039dde. For more details please see the references link. | null | 2021-12-20T00:56:11.376364Z | 2021-08-03T02:49:42.646886Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8e591cb7204739efa8e15967ea334eb367039dde'} |
Linux | GSD-2022-1002137 | can: m_can: m_can_tx_handler(): fix use after free of skb | can: m_can: m_can_tx_handler(): fix use after free of skb
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 869016a2938ac44f7b2fb7fc22c89edad99eb9b3, it was introduced in version v3.18 by commit 80646733f11c2e9de3b6339f7e635047e6087280. For more details please see the references link. | null | 2022-04-25T04:12:09.387527Z | 2022-04-24T22:15:11.863568Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80646733f11c2e9de3b6339f7e635047e6087280'} |
Linux | GSD-2022-1000665 | KVM: arm64: Avoid consuming a stale esr value when SError occur | KVM: arm64: Avoid consuming a stale esr value when SError occur
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.8 by commit 57e2986c3b25092691a6e3d6ee9168caf8978932, it was introduced in version v5.11 by commit defe21f49bc98b095300752aa1e19bb608f3e97d. For more details please see the references link. | null | 2022-03-07T01:44:35.488612Z | 2022-02-27T03:37:51.696714Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/defe21f49bc98b095300752aa1e19bb608f3e97d'} |
Linux | GSD-2022-1001977 | rxrpc: fix a race in rxrpc_exit_net() | rxrpc: fix a race in rxrpc_exit_net()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit 08ff0e74fab517dbc44e11b8bc683dd4ecc65950, it was introduced in version v4.17 by commit ace45bec6d77bc061c3c3d8ad99e298ea9800c2b. For more details please see the references link. | null | 2022-04-25T04:07:44.257910Z | 2022-04-24T22:00:21.852091Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ace45bec6d77bc061c3c3d8ad99e298ea9800c2b'} |
Linux | GSD-2021-1001308 | ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions | ipv6: fix another slab-out-of-bounds in fib6_nh_flush_exceptions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.136 by commit 830251361425c5be044db4d826aaf304ea3d14c6, it was introduced in version v5.3 by commit f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74. For more details please see the references link. | null | 2021-12-20T00:30:49.784964Z | 2021-08-03T02:04:13.868698Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74'} |
Linux | GSD-2022-1000235 | ext4: fix error handling in ext4_fc_record_modified_inode() | ext4: fix error handling in ext4_fc_record_modified_inode()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.99 by commit 62e46e0ffc02daa8fcfc02f7a932cc8a19601b19. For more details please see the references link. | null | 2022-02-20T01:57:49.180574Z | 2022-02-18T21:59:33.734560Z | null | null | null | null | null |
Linux | GSD-2022-1002208 | ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock() | ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit b80ccbec0e4804436c382d7dd60e943c386ed83a, it was introduced in version v2.6.27 by commit 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d. For more details please see the references link. | null | 2022-04-25T06:13:08.196562Z | 2022-04-24T22:22:00.771567Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d'} |
Linux | GSD-2021-1001758 | virtio-net: fix pages leaking when building skb in big mode | virtio-net: fix pages leaking when building skb in big mode
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.9 by commit f020bb63b5d2e5576acadd10e158fe3b04af67ba, it was introduced in version v5.13 by commit fb32856b16ad9d5bcd75b76a274e2c515ac7b9d7. For more details please see the references link. | null | 2021-12-20T00:20:17.233072Z | 2021-10-19T16:35:18.239990Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb32856b16ad9d5bcd75b76a274e2c515ac7b9d7'} |
Linux | GSD-2022-1001074 | ath11k: mhi: use mhi_sync_power_up() | ath11k: mhi: use mhi_sync_power_up()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 646d533af2911be1184eaee8c900b7eb8ecc4396. For more details please see the references link. | null | 2022-04-25T06:15:15.511407Z | 2022-04-24T20:43:37.237834Z | null | null | null | null | null |
Linux | GSD-2021-1002524 | staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect() | staging: rtl8192e: Fix use after free in _rtl92e_pci_disconnect()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.6 by commit e27ee2f607fe6a9b923ef1fc65461c0613c97594, it was introduced in version v3.2 by commit 66898177e7e5486dc77a4ba742efa4e2e9e900a4. For more details please see the references link. | null | 2021-12-19T22:22:27.470743Z | 2021-12-19T19:41:06.252575Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/66898177e7e5486dc77a4ba742efa4e2e9e900a4'} |
Linux | GSD-2021-1000519 | RDMA/rxe: Clear all QP fields if creation failed | RDMA/rxe: Clear all QP fields if creation failed
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.234 by commit 6a8086a42dfbf548a42bf2ae4faa291645c72c66, it was introduced in version v4.8 by commit 8700e3e7c4857d28ebaa824509934556da0b3e76. For more details please see the references link. | null | 2021-12-19T22:39:35.082392Z | 2021-05-31T23:49:59.352670Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8700e3e7c4857d28ebaa824509934556da0b3e76'} |
Linux | GSD-2022-1001424 | Reinstate some of "swiotlb: rework "fix info leak with DMA_FROM_DEVICE"" | Reinstate some of "swiotlb: rework "fix info leak with DMA_FROM_DEVICE""
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit dcead36b19d999d687cd9c99b7f37520d9102b57. For more details please see the references link. | null | 2022-04-25T04:42:38.843474Z | 2022-04-24T21:11:49.216727Z | null | null | null | null | null |
Linux | GSD-2021-1002174 | mm/secretmem: fix NULL page->mapping dereference in page_is_secretmem() | mm/secretmem: fix NULL page->mapping dereference in page_is_secretmem()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 79f9bc5843142b649575f887dccdf1c07ad75c20, it was introduced in version v5.14 by commit 1507f51255c9ff07d75909a84e7c0d7f3c4b2f49. For more details please see the references link. | null | 2021-12-20T00:01:05.020134Z | 2021-11-14T15:23:14.219108Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1507f51255c9ff07d75909a84e7c0d7f3c4b2f49'} |
Linux | GSD-2021-1000149 | mmc: uniphier-sd: Fix a resource leak in the remove function | mmc: uniphier-sd: Fix a resource leak in the remove function
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.36 by commit 25ac6ce65f1ab458982d15ec1caf441acd37106a, it was introduced in version v4.20 by commit 3fd784f745dd1747863775a99ec749619ee6759c. For more details please see the references link. | null | 2021-12-20T01:06:57.013536Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3fd784f745dd1747863775a99ec749619ee6759c'} |
Linux | GSD-2021-1002461 | nfsd: Fix nsfd startup race (again) | nfsd: Fix nsfd startup race (again)
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.165 by commit f5734b1714ca355703e9ea8fb61d04beff1790b9, it was introduced in version v5.4.102 by commit 8677e99150b0830d29cc1318b4cc559e176940bb. For more details please see the references link. | null | 2021-12-19T22:51:13.115580Z | 2021-12-19T19:38:21.337762Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8677e99150b0830d29cc1318b4cc559e176940bb'} |
Linux | GSD-2022-1001131 | video: fbdev: sm712fb: Fix crash in smtcfb_write() | video: fbdev: sm712fb: Fix crash in smtcfb_write()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 809b8cde86320698661eec677222bc5c5df76176. For more details please see the references link. | null | 2022-04-25T04:34:40.654323Z | 2022-04-24T20:47:55.851195Z | null | null | null | null | null |
Linux | GSD-2021-1002031 | misc: fastrpc: Add missing lock before accessing find_vma() | misc: fastrpc: Add missing lock before accessing find_vma()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.75 by commit 86e3ad8b759d1152d69442a4bb36cfa65448c9e7, it was introduced in version v5.2 by commit 80f3afd72bd4149c57daf852905476b43bb47647. For more details please see the references link. | null | 2021-12-19T23:01:31.621096Z | 2021-11-14T15:16:40.967083Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/80f3afd72bd4149c57daf852905476b43bb47647'} |
Linux | GSD-2022-1001561 | ASoC: atmel: Fix error handling in sam9x5_wm8731_driver_probe | ASoC: atmel: Fix error handling in sam9x5_wm8731_driver_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 14228225091a0854b1de23e5b4fe8bdeeca9683b, it was introduced in version v3.12 by commit fdbcb3cba54b29a37dfe42acdc0e72c543e0807d. For more details please see the references link. | null | 2022-04-25T06:33:55.811374Z | 2022-04-24T21:23:49.597785Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fdbcb3cba54b29a37dfe42acdc0e72c543e0807d'} |
Linux | GSD-2022-1000720 | sched/fair: Fix fault in reweight_entity | sched/fair: Fix fault in reweight_entity
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.13 by commit 589a954daab5e18399860b6c8ffaeaf79844eb20, it was introduced in version v5.16 by commit 4ef0c5c6b5ba1f38f0ea1cedad0cad722f00c14a. For more details please see the references link. | null | 2022-03-18T02:49:32.018616Z | 2022-03-18T00:12:08.060435Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4ef0c5c6b5ba1f38f0ea1cedad0cad722f00c14a'} |
Linux | GSD-2022-1001832 | bpf, sockmap: Fix more uncharged while msg has more_data | bpf, sockmap: Fix more uncharged while msg has more_data
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 168ff181f5b6e7fce684c98a30d35da1dbf8f82a, it was introduced in version v4.20 by commit 604326b41a6fb9b4a78b6179335decee0365cd8c. For more details please see the references link. | null | 2022-04-25T05:58:41.246809Z | 2022-04-24T21:46:16.218946Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/604326b41a6fb9b4a78b6179335decee0365cd8c'} |
Linux | GSD-2022-1001998 | scsi: libfc: Fix use after free in fc_exch_abts_resp() | scsi: libfc: Fix use after free in fc_exch_abts_resp()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.111 by commit 1d7effe5fff9d28e45e18ac3a564067c7ddfe898. For more details please see the references link. | null | 2022-04-25T05:07:24.758882Z | 2022-04-24T22:01:58.716748Z | null | null | null | null | null |
Linux | GSD-2022-1000370 | net: dsa: bcm_sf2: don't use devres for mdiobus | net: dsa: bcm_sf2: don't use devres for mdiobus
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.101 by commit 2770b795294ed312375c11ef1d0b810499c66b83, it was introduced in version v5.9 by commit ac3a68d56651c3dad2c12c7afce065fe15267f44. For more details please see the references link. | null | 2022-03-07T01:37:24.583573Z | 2022-02-27T02:57:29.046993Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ac3a68d56651c3dad2c12c7afce065fe15267f44'} |
Linux | GSD-2021-1000325 | can: mcp251x: fix resume from sleep before interface was brought up | can: mcp251x: fix resume from sleep before interface was brought up
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.38 by commit eecb4df8ec9f896b19ee05bfa632ac6c1dcd8f21, it was introduced in version v5.5 by commit 8ce8c0abcba314e1fe954a1840f6568bf5aef2ef. For more details please see the references link. | null | 2021-12-19T22:24:10.567796Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8ce8c0abcba314e1fe954a1840f6568bf5aef2ef'} |
Linux | GSD-2021-1002318 | net/mlx5e: CT, Fix multiple allocations and memleak of mod acts | net/mlx5e: CT, Fix multiple allocations and memleak of mod acts
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit 486e8de6e233ff2999493533c6259d1cb538653b, it was introduced in version v5.7 by commit 1ef3018f5af3da6376fae546e4dfc3f05f063815. For more details please see the references link. | null | 2021-12-20T01:30:36.600192Z | 2021-11-29T02:38:31.497338Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1ef3018f5af3da6376fae546e4dfc3f05f063815'} |
Linux | GSD-2022-1001648 | mm: fix unexpected zeroed page mapping with zram swap | mm: fix unexpected zeroed page mapping with zram swap
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.35 by commit 12ba1d38115a101c45d8e0ca3aa1181fd148e57f, it was introduced in version v4.15 by commit 0bcac06f27d7528591c27ac2b093ccd71c5d0168. For more details please see the references link. | null | 2022-04-25T04:14:07.320242Z | 2022-04-24T21:31:36.687218Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0bcac06f27d7528591c27ac2b093ccd71c5d0168'} |
Linux | GSD-2021-1001867 | net: mdiobus: Fix memory leak in __mdiobus_register | net: mdiobus: Fix memory leak in __mdiobus_register
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit 0c4e87ba11eb331dca2315d484d08441b8c13193. For more details please see the references link. | null | 2021-12-19T23:28:29.313051Z | 2021-10-28T13:53:03.879834Z | null | null | null | null | null |
Linux | GSD-2021-1000775 | HID: magicmouse: fix NULL-deref on disconnect | HID: magicmouse: fix NULL-deref on disconnect
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.43 by commit b5d013c4c76b276890135b5d32803c4c63924b77, it was introduced in version v4.20 by commit 9d7b18668956c411a422d04c712994c5fdb23a4b. For more details please see the references link. | null | 2021-12-19T22:02:25.864847Z | 2021-06-25T00:04:49.455546Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9d7b18668956c411a422d04c712994c5fdb23a4b'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.