ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2021-1002748 | mptcp: remove tcp ulp setsockopt support | mptcp: remove tcp ulp setsockopt support
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit 3de0c86d42f841d1d64f316cd949e65c566f0734, it was introduced in version v5.13 by commit d9e4c129181004ec94b315b0c9db5eeb09da75e6. For more details please see the references link. | null | 2022-01-11T05:47:38.253547Z | 2021-12-27T05:46:54.886940Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9e4c129181004ec94b315b0c9db5eeb09da75e6'} |
Linux | GSD-2022-1001218 | power: supply: wm8350-power: Add missing free in free_charger_irq | power: supply: wm8350-power: Add missing free in free_charger_irq
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 011ce263361608bb2a1a5cbcc0e3c53b1d7a41d7, it was introduced in version v2.6.29 by commit 14431aa0c5a443d13d24e6f865a8838f97dab973. For more details please see the references link. | null | 2022-04-25T05:13:15.865892Z | 2022-04-24T20:54:55.673565Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/14431aa0c5a443d13d24e6f865a8838f97dab973'} |
Linux | GSD-2021-1001534 | sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb | sctp: break out if skb_header_pointer returns NULL in sctp_rcv_ootb
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.249 by commit 77bc7dcf0fcc1519341a91788d7a2914fcfddf6d, it was introduced in version v4.8 by commit 3acb50c18d8d6650f10919464ade4dcdaf41d62f. For more details please see the references link. | null | 2021-12-19T23:51:54.281261Z | 2021-10-19T16:22:37.408257Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3acb50c18d8d6650f10919464ade4dcdaf41d62f'} |
Linux | GSD-2022-1002064 | NFS: remove unneeded check in decode_devicenotify_args() | NFS: remove unneeded check in decode_devicenotify_args()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 942f68bf2950b4057804eff1c636bc3f6c7625d4, it was introduced in version v4.0 by commit a4f743a6bb201662962fa888e3f978583d61691e. For more details please see the references link. | null | 2022-04-25T04:24:44.739339Z | 2022-04-24T22:06:56.552689Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a4f743a6bb201662962fa888e3f978583d61691e'} |
Linux | GSD-2022-1000059 | nitro_enclaves: Use get_user_pages_unlocked() call to handle mmap assert | nitro_enclaves: Use get_user_pages_unlocked() call to handle mmap assert
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.13 by commit 90d2beed5e753805c5eab656b8d48257638fe543, it was introduced in version v5.15 by commit 5b78ed24e8ec48602c1d6f5a188e58d000c81e2b. For more details please see the references link. | null | 2022-01-11T05:47:32.830927Z | 2022-01-10T19:52:14.387581Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5b78ed24e8ec48602c1d6f5a188e58d000c81e2b'} |
Linux | GSD-2021-1001164 | net: sched: fix memory leak in tcindex_partial_destroy_work | net: sched: fix memory leak in tcindex_partial_destroy_work
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.6 by commit cac71d27745f92ee13f0ecc668ffe151a4a9c9b1, it was introduced in version v3.18 by commit 8332904aa971ed4547514f57c8b3780ad4f0f949. For more details please see the references link. | null | 2021-12-19T23:07:37.162432Z | 2021-08-03T01:31:43.247382Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8332904aa971ed4547514f57c8b3780ad4f0f949'} |
Linux | GSD-2022-1002434 | PCI: Reduce warnings on possible RW1C corruption | PCI: Reduce warnings on possible RW1C corruption
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 1c63f5ab2d5bd5ac606d4f5576f732d9fa704747, it was introduced in version v4.10 by commit fb26592301200dbbe4a9943fe188b57a46716900. For more details please see the references link. | null | 2022-04-25T05:23:43.361842Z | 2022-04-24T22:46:52.038929Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fb26592301200dbbe4a9943fe188b57a46716900'} |
Linux | GSD-2022-1000409 | ima: fix reference leak in asymmetric_verify() | ima: fix reference leak in asymmetric_verify()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit 0838d6d68182f0b28a5434bc6d50727c4757e35b, it was introduced in version v5.13 by commit 947d70597236dd5ae65c1f68c8eabfb962ee5a6b. For more details please see the references link. | null | 2022-03-07T01:34:09.733610Z | 2022-02-27T03:02:37.057108Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/947d70597236dd5ae65c1f68c8eabfb962ee5a6b'} |
Linux | GSD-2022-1002121 | drm/i915/gem: add missing boundary check in vm_access | drm/i915/gem: add missing boundary check in vm_access
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 89ddcc81914ab58cc203acc844f27d55ada8ec0e, it was introduced in version v5.8 by commit 9f909e215fea0652023b9ed09d3d7bfe10386423. For more details please see the references link. | null | 2022-04-25T05:37:38.769372Z | 2022-04-24T22:13:40.898738Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9f909e215fea0652023b9ed09d3d7bfe10386423'} |
Linux | GSD-2021-1001471 | net: ti: fix UAF in tlan_remove_one | net: ti: fix UAF in tlan_remove_one
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.277 by commit a18a8d9cfbb112ad72e625372849adc3986fd6bf, it was introduced in version v3.10 by commit 1e0a8b13d35510e711fdf72e9a3e30bcb2bd49fa. For more details please see the references link. | null | 2021-12-19T22:25:09.079750Z | 2021-08-03T02:51:13.362305Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e0a8b13d35510e711fdf72e9a3e30bcb2bd49fa'} |
Linux | GSD-2021-1001021 | drm: Lock pointer access in drm_master_release() | drm: Lock pointer access in drm_master_release()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.11 by commit dfedcac75b81e617b3a554c76e817d7961637a33. For more details please see the references link. | null | 2021-12-19T23:57:30.456293Z | 2021-06-30T00:34:25.077083Z | null | null | null | null | null |
Linux | GSD-2021-1001888 | ptp: Fix possible memory leak in ptp_clock_register() | ptp: Fix possible memory leak in ptp_clock_register()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit 95c0a0c5ec8839f8f21672be786e87a100319ca8, it was introduced in version v5.5 by commit a33121e5487b424339636b25c35d3a180eaa5f5e. For more details please see the references link. | null | 2021-12-20T01:13:45.559956Z | 2021-10-28T13:54:06.140106Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a33121e5487b424339636b25c35d3a180eaa5f5e'} |
Linux | GSD-2021-1000260 | iommu/vt-d: Remove WO permissions on second-level paging entries | iommu/vt-d: Remove WO permissions on second-level paging entries
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 66c24699f266ff310381a9552d3576eea8ad6e20, it was introduced in version v5.6 by commit b802d070a52a1565b47daaa808872cfbd4a17b01. For more details please see the references link. | null | 2021-12-20T01:32:50.175189Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b802d070a52a1565b47daaa808872cfbd4a17b01'} |
Linux | GSD-2021-1001922 | net: mdiobus: Fix memory leak in __mdiobus_register | net: mdiobus: Fix memory leak in __mdiobus_register
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.290 by commit fd2400dd4f1b8bd7a309b1b424d9e0d188151b01. For more details please see the references link. | null | 2021-12-20T01:34:43.813827Z | 2021-11-14T15:11:50.972412Z | null | null | null | null | null |
Linux | GSD-2021-1000630 | spi: spi-fsl-dspi: Fix a resource leak in an error handling path | spi: spi-fsl-dspi: Fix a resource leak in an error handling path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.124 by commit 15d1cc4b4b585f9a2ce72c52cca004d5d735bdf1, it was introduced in version v4.10 by commit 90ba37033cb94207e97c4ced9be575770438213b. For more details please see the references link. | null | 2021-12-19T23:09:08.929670Z | 2021-06-04T19:50:31.704736Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/90ba37033cb94207e97c4ced9be575770438213b'} |
Linux | GSD-2021-1002123 | ocfs2: fix race between searching chunks and release journal_head from buffer_head | ocfs2: fix race between searching chunks and release journal_head from buffer_head
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.16 by commit 2e382600e8856ea654677b5134ee66e03ea72bc2. For more details please see the references link. | null | 2021-12-20T00:03:45.175732Z | 2021-11-14T15:20:52.697377Z | null | null | null | null | null |
Linux | GSD-2022-1001189 | net: bcmgenet: Use stronger register read/writes to assure ordering | net: bcmgenet: Use stronger register read/writes to assure ordering
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit f49769b462f282477ca801cf648f875b1c5b59db, it was introduced in version v4.14 by commit 69d2ea9c798983c4a7157278ec84ff969d1cd8e8. For more details please see the references link. | null | 2022-04-25T06:52:36.367425Z | 2022-04-24T20:52:15.341305Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69d2ea9c798983c4a7157278ec84ff969d1cd8e8'} |
Linux | GSD-2022-1001473 | btrfs: make search_csum_tree return 0 if we get -EFBIG | btrfs: make search_csum_tree return 0 if we get -EFBIG
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 3c40052e3fde325cbe9dac4f52a229d74a5f3b8a. For more details please see the references link. | null | 2022-04-25T06:48:11.405535Z | 2022-04-24T21:15:33.003148Z | null | null | null | null | null |
Linux | GSD-2021-1002573 | drm/msm: Fix mmap to include VM_IO and VM_DONTDUMP | drm/msm: Fix mmap to include VM_IO and VM_DONTDUMP
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.7 by commit 8e2b7fe5e8a4be5e571561d9afcfbd92097288ba, it was introduced in version v5.15 by commit 510410bfc034c57cc3caf1572aa47c1017bab2f9. For more details please see the references link. | null | 2021-12-20T00:07:59.107953Z | 2021-12-19T19:43:21.654422Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/510410bfc034c57cc3caf1572aa47c1017bab2f9'} |
Linux | GSD-2022-1001023 | net: sfc: add missing xdp queue reinitialization | net: sfc: add missing xdp queue reinitialization
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit dcc85e1593686e42c6749ef3d356db34759d59e8, it was introduced in version v5.5 by commit 3990a8fffbdad5765f47ea593f9de66c91762059. For more details please see the references link. | null | 2022-04-25T06:12:53.622122Z | 2022-04-24T20:40:50.652641Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3990a8fffbdad5765f47ea593f9de66c91762059'} |
Linux | GSD-2021-1002089 | drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read | drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit 09f3946bb452918dbfb1982add56f9ffaae393dc, it was introduced in version v5.7 by commit e11f5bd8228fc3760c221f940b9f6365dbf3e7ed. For more details please see the references link. | null | 2021-12-20T00:27:51.322024Z | 2021-11-14T15:19:20.410342Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e11f5bd8228fc3760c221f940b9f6365dbf3e7ed'} |
Linux | GSD-2021-1002820 | ice: xsk: return xsk buffers back to pool when cleaning the ring | ice: xsk: return xsk buffers back to pool when cleaning the ring
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.12 by commit ad6d20da2cfbe14b7b1200d15f39e65988b0b9e8, it was introduced in version v5.5 by commit 2d4238f5569722197612656163d824098208519c. For more details please see the references link. | null | 2022-01-11T05:48:37.265134Z | 2021-12-30T02:44:51.171319Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2d4238f5569722197612656163d824098208519c'} |
Linux | GSD-2022-1000798 | iio: imu: st_lsm6dsx: wait for settling time in st_lsm6dsx_read_oneshot | iio: imu: st_lsm6dsx: wait for settling time in st_lsm6dsx_read_oneshot
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.26 by commit 1f05c75684455f1fd0c43637f5c86981a3f80a81, it was introduced in version v4.11 by commit 290a6ce11d938be52634b3ce1bbc6b78be4d23c1. For more details please see the references link. | null | 2022-03-18T02:50:59.892250Z | 2022-03-18T00:19:00.786022Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/290a6ce11d938be52634b3ce1bbc6b78be4d23c1'} |
Linux | GSD-2022-1000262 | phylib: fix potential use-after-free | phylib: fix potential use-after-free
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.19 by commit aefaccd19379d6c4620269a162bfb88ff687f289, it was introduced in version v4.16 by commit bafbdd527d569c8200521f2f7579f65a044271be. For more details please see the references link. | null | 2022-02-20T06:35:12.950057Z | 2022-02-18T22:03:32.714087Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bafbdd527d569c8200521f2f7579f65a044271be'} |
Linux | GSD-2022-1000632 | drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc | drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.5 by commit 1ebc18836d5df09061657f8c548e594cbb519476, it was introduced in version v5.8 by commit 4259ff7ae509ed880b3a7bb685972c3a3bf4b74b. For more details please see the references link. | null | 2022-03-07T01:38:04.299925Z | 2022-02-27T03:33:29.977187Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4259ff7ae509ed880b3a7bb685972c3a3bf4b74b'} |
Linux | GSD-2022-1001920 | jffs2: fix use-after-free in jffs2_clear_xattr_subsystem | jffs2: fix use-after-free in jffs2_clear_xattr_subsystem
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 7a75740206af5f17e9f3efa384211cba70213da1, it was introduced in version v2.6.18 by commit aa98d7cf59b5b0764d3502662053489585faf2fe. For more details please see the references link. | null | 2022-04-25T03:38:07.699162Z | 2022-04-24T21:54:39.818150Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/aa98d7cf59b5b0764d3502662053489585faf2fe'} |
Linux | GSD-2022-1000327 | ax25: improve the incomplete fix to avoid UAF and NPD bugs | ax25: improve the incomplete fix to avoid UAF and NPD bugs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.231 by commit 3072e72814de56f3c674650a8af98233ddf78b19. For more details please see the references link. | null | 2022-03-07T01:39:04.694846Z | 2022-02-27T02:51:54.010055Z | null | null | null | null | null |
Linux | GSD-2021-1000958 | usb: fix various gadget panics on 10gbps cabling | usb: fix various gadget panics on 10gbps cabling
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.44 by commit b972eff874637402ddc4a7dd11fb22538a0b6d28. For more details please see the references link. | null | 2021-12-20T00:54:38.890634Z | 2021-06-30T00:29:15.279057Z | null | null | null | null | null |
Linux | GSD-2022-1000777 | blktrace: fix use after free for struct blk_trace | blktrace: fix use after free for struct blk_trace
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.27 by commit 78acc7dbd84a8c173a08584750845c31611160f2, it was introduced in version v5.12 by commit c0ea57608b691d6cde8aff23e11f9858a86b5918. For more details please see the references link. | null | 2022-03-18T03:00:46.827566Z | 2022-03-18T00:17:26.786512Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c0ea57608b691d6cde8aff23e11f9858a86b5918'} |
Linux | GSD-2022-1001865 | drm/selftests/test-drm_dp_mst_helper: Fix memory leak in sideband_msg_req_encode_decode | drm/selftests/test-drm_dp_mst_helper: Fix memory leak in sideband_msg_req_encode_decode
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 0728ccb66468b7a59959f9f4fb518ff9c655485f, it was introduced in version v5.11 by commit 09234b88ef5598252d1cee37e4d7b26a48b6557f. For more details please see the references link. | null | 2022-04-25T05:52:34.922933Z | 2022-04-24T21:49:40.969463Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/09234b88ef5598252d1cee37e4d7b26a48b6557f'} |
Linux | GSD-2022-1001536 | ext2: correct max file size computing | ext2: correct max file size computing
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit 9b30cc5d313b64b56ce6da7cfe30366c291a0d82, it was introduced in version v5.1 by commit 1c2d14212b15a60300a2d4f6364753e87394c521. For more details please see the references link. | null | 2022-04-25T06:12:12.543124Z | 2022-04-24T21:21:20.427459Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1c2d14212b15a60300a2d4f6364753e87394c521'} |
Linux | GSD-2021-1002066 | IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields | IB/qib: Protect from buffer overflow in struct qib_user_sdma_pkt fields
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.77 by commit c3e17e58f571f34c51aeb17274ed02c2ed5cf780, it was introduced in version v2.6.35 by commit f931551bafe1f10ded7f5282e2aa162c267a2e5d. For more details please see the references link. | null | 2021-12-20T00:48:08.759309Z | 2021-11-14T15:18:21.960118Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f931551bafe1f10ded7f5282e2aa162c267a2e5d'} |
Linux | GSD-2022-1001166 | fs: fix fd table size alignment properly | fs: fix fd table size alignment properly
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 28dfe0fc1115d884061fa54a25f434158625500a, it was introduced in version v5.17.2 by commit 11f03ba4bcaba6d3a26e109ab7bd5a2b2a53bd93. For more details please see the references link. | null | 2022-04-24T20:49:50.062471Z | 2022-04-24T20:49:50.062471Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/11f03ba4bcaba6d3a26e109ab7bd5a2b2a53bd93'} |
Linux | GSD-2021-1002436 | scsi: mpt3sas: Fix kernel panic during drive powercycle test | scsi: mpt3sas: Fix kernel panic during drive powercycle test
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.163 by commit 7e324f734a914957b8cc3ff4b4c9f0409558adb5, it was introduced in version v3.8 by commit f92363d12359498f9a9960511de1a550f0ec41c2. For more details please see the references link. | null | 2021-12-19T22:44:49.698014Z | 2021-12-19T19:37:13.404206Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f92363d12359498f9a9960511de1a550f0ec41c2'} |
Linux | GSD-2022-1002463 | gcc-plugins: latent_entropy: use /dev/urandom | gcc-plugins: latent_entropy: use /dev/urandom
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit 942352131b4ed824fefddf87810faf2711a5e967, it was introduced in version v4.9 by commit 38addce8b600ca335dc86fa3d48c890f1c6fa1f4. For more details please see the references link. | null | 2022-04-25T06:00:25.564471Z | 2022-04-24T22:50:51.332229Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/38addce8b600ca335dc86fa3d48c890f1c6fa1f4'} |
Linux | GSD-2022-1002199 | drm/amdgpu: Fix recursive locking warning | drm/amdgpu: Fix recursive locking warning
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit c0e9d868a1e03b120562da0abb5bfa2c47f3f9fa. For more details please see the references link. | null | 2022-04-25T03:53:06.032888Z | 2022-04-24T22:21:04.471317Z | null | null | null | null | null |
Linux | GSD-2021-1001133 | net: caif: fix memory leak in ldisc_open | net: caif: fix memory leak in ldisc_open
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.14 by commit e056cc440ae71fda770814a7aa865279fc8d6462. For more details please see the references link. | null | 2021-12-20T02:17:57.441908Z | 2021-07-08T01:58:40.305Z | null | null | null | null | null |
Linux | GSD-2021-1001099 | net: caif: fix memory leak in ldisc_open | net: caif: fix memory leak in ldisc_open
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.274 by commit 45a99589a9a3445dce114060f3b52f2df13bc79b. For more details please see the references link. | null | 2021-12-19T23:16:12.824618Z | 2021-07-08T01:56:16.120780Z | null | null | null | null | null |
Linux | GSD-2022-1002033 | ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock() | ubifs: Fix read out-of-bounds in ubifs_wbuf_write_nolock()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 07a209fadee7b53b46858538e1177597273862e4, it was introduced in version v2.6.27 by commit 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d. For more details please see the references link. | null | 2022-04-25T05:23:00.777569Z | 2022-04-24T22:04:59.384203Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d'} |
Linux | GSD-2021-1001563 | mac80211: fix use-after-free in CCMP/GCMP RX | mac80211: fix use-after-free in CCMP/GCMP RX
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.209 by commit 3d5d629c99c468458022e9b381789de3595bf4dd, it was introduced in version v4.19.193 by commit 0f716b48ed25503e6961f4b5b40ece36f7e4ed26. For more details please see the references link. | null | 2021-12-19T22:41:08.733536Z | 2021-10-19T16:23:55.533814Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0f716b48ed25503e6961f4b5b40ece36f7e4ed26'} |
Linux | GSD-2021-1001830 | usb: musb: dsps: Fix the probe error path | usb: musb: dsps: Fix the probe error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.155 by commit 9ab5d539bc975b8dcde86eca1b58d836b657732e, it was introduced in version v5.4.148 by commit 9a4a6805294fa7d2653e82972bdaf9e3e1f3d3c9. For more details please see the references link. | null | 2021-12-19T23:35:12.331819Z | 2021-10-28T13:51:11.238180Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9a4a6805294fa7d2653e82972bdaf9e3e1f3d3c9'} |
Linux | GSD-2021-1000722 | net: caif: fix memory leak in cfusbl_device_notify | net: caif: fix memory leak in cfusbl_device_notify
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.272 by commit 81afc61cb6e2b553f2c5f992fa79e0ae73857141, it was introduced in version v3.3 by commit 7ad65bf68d705b445ef10b77ab50dab22be185ee. For more details please see the references link. | null | 2021-12-19T23:52:59.730065Z | 2021-06-24T23:59:14.855809Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7ad65bf68d705b445ef10b77ab50dab22be185ee'} |
Linux | GSD-2021-1000688 | btrfs: do not BUG_ON in link_to_fixup_dir | btrfs: do not BUG_ON in link_to_fixup_dir
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.271 by commit e934c4ee17b33bafb0444f2f9766cda7166d3c40, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T23:19:25.437069Z | 2021-06-04T20:02:30.783707Z | null | null | null | null | null |
Linux | GSD-2021-1000372 | media: [next] staging: media: atomisp: fix memory leak of object flash | media: [next] staging: media: atomisp: fix memory leak of object flash
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit cc4cc2fb5aaf9adb83c02211eb13b16cfcb7ba64, it was introduced in version v5.10 by commit 9289cdf399922a1bd801a8cd946a79581c00a380. For more details please see the references link. | null | 2021-12-20T01:34:21.786775Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9289cdf399922a1bd801a8cd946a79581c00a380'} |
Linux | GSD-2021-1001975 | nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells | nvmem: Fix shift-out-of-bound (UBSAN) with byte size cells
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.213 by commit eb0fc8e7170e61eaf65d28dee4a8baf4e86b19ca, it was introduced in version v4.3 by commit 69aba7948cbe53f2f1827e84e9dd0ae470a5072e. For more details please see the references link. | null | 2021-12-20T00:38:21.193764Z | 2021-11-14T15:14:14.174374Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/69aba7948cbe53f2f1827e84e9dd0ae470a5072e'} |
Linux | GSD-2021-1000667 | NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() | NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.193 by commit 39785761feadf261bc5101372b0b0bbaf6a94494, it was introduced in version v4.19.191 by commit 9ffa7967f9379a0a1b924e9ffeda709d72237da7. For more details please see the references link. | null | 2021-12-20T00:21:01.297641Z | 2021-06-04T19:58:10.444012Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9ffa7967f9379a0a1b924e9ffeda709d72237da7'} |
Linux | GSD-2021-1000237 | mt76: mt7915: fix memleak when mt7915_unregister_device() | mt76: mt7915: fix memleak when mt7915_unregister_device()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit d754c80ae82a662e692a82faad71b8c218cb7f52, it was introduced in version v5.12 by commit f285dfb98562e8380101095d168910df1d07d8be. For more details please see the references link. | null | 2021-12-20T00:13:34.321059Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f285dfb98562e8380101095d168910df1d07d8be'} |
Linux | GSD-2022-1000848 | RDMA/cma: Do not change route.addr.src_addr outside state checks | RDMA/cma: Do not change route.addr.src_addr outside state checks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.103 by commit 5b1cef5798b4fd6e4fd5522e7b8a26248beeacaa, it was introduced in version v5.10 by commit 732d41c545bb359cbb8c94698bdc1f8bcf82279c. For more details please see the references link. | null | 2022-03-18T02:49:10.695394Z | 2022-03-18T00:23:38.945434Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/732d41c545bb359cbb8c94698bdc1f8bcf82279c'} |
Linux | GSD-2021-1001076 | can: j1939: fix Use-after-Free, hold skb ref while in use | can: j1939: fix Use-after-Free, hold skb ref while in use
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit 1071065eeb33d32b7d98c2ce7591881ae7381705, it was introduced in version v5.4 by commit 9d71dd0c70099914fcd063135da3c580865e924c. For more details please see the references link. | null | 2021-12-20T01:16:19.093793Z | 2021-06-30T00:38:02.738346Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9d71dd0c70099914fcd063135da3c580865e924c'} |
Linux | GSD-2021-1001426 | media: zr364xx: fix memory leak in zr364xx_start_readpipe | media: zr364xx: fix memory leak in zr364xx_start_readpipe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.240 by commit b0633051a6cb24186ff04ce1af99c7de18c1987e, it was introduced in version v2.6.32 by commit ccbf035ae5de4c535160fc99f73feb44cc55b534. For more details please see the references link. | null | 2021-12-19T23:45:41.019403Z | 2021-08-03T02:37:02.853869Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ccbf035ae5de4c535160fc99f73feb44cc55b534'} |
Linux | GSD-2022-1002176 | ata: sata_dwc_460ex: Fix crash due to OOB write | ata: sata_dwc_460ex: Fix crash due to OOB write
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 55e1465ba79562a191708a40eeae3f8082a209e3, it was introduced in version v4.18 by commit 28361c403683c2b00d4f5e76045f3ccd299bf99d. For more details please see the references link. | null | 2022-04-25T03:36:44.466523Z | 2022-04-24T22:18:52.373126Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/28361c403683c2b00d4f5e76045f3ccd299bf99d'} |
Linux | GSD-2022-1002361 | ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction | ALSA: firewire-lib: fix uninitialized flag for AV/C deferred transaction
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 60e5d391805d70458a01998de00d0c28cba40bf3, it was introduced in version v3.16 by commit 00a7bb81c20f3e81711e28e0f6c08cee8fd18514. For more details please see the references link. | null | 2022-04-25T07:26:41.700969Z | 2022-04-24T22:38:44.013085Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/00a7bb81c20f3e81711e28e0f6c08cee8fd18514'} |
Linux | GSD-2021-1001631 | riscv: Flush current cpu icache before other cpus | riscv: Flush current cpu icache before other cpus
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.73 by commit 427faa29e06f0709476ea1bd59758f997ec8b64e, it was introduced in version v4.15 by commit fab957c11efe2f405e08b9f0d080524bc2631428. For more details please see the references link. | null | 2021-12-19T23:39:18.386692Z | 2021-10-19T16:29:06.004369Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fab957c11efe2f405e08b9f0d080524bc2631428'} |
Linux | GSD-2021-1000923 | net: ipv4: fix memory leak in ip_mc_add1_src | net: ipv4: fix memory leak in ip_mc_add1_src
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.128 by commit 3dd2aeac2e9624cff9fa634710837e4f2e352758, it was introduced in version v4.9 by commit 24803f38a5c0b6c57ed800b47e695f9ce474bc3a. For more details please see the references link. | null | 2021-12-20T01:06:26.822092Z | 2021-06-30T00:24:47.302681Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/24803f38a5c0b6c57ed800b47e695f9ce474bc3a'} |
Linux | GSD-2021-1000889 | net/qla3xxx: fix schedule while atomic in ql_sem_spinlock | net/qla3xxx: fix schedule while atomic in ql_sem_spinlock
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.126 by commit 3e324774411dc94282e166a301af822d75741263. For more details please see the references link. | null | 2021-12-19T23:07:39.061159Z | 2021-06-30T00:04:39.425291Z | null | null | null | null | null |
Linux | GSD-2021-1001261 | seq_file: disallow extremely large seq buffer allocations | seq_file: disallow extremely large seq buffer allocations
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.52 by commit 174c34d9cda1b5818419b8f5a332ced10755e52f, it was introduced in version v3.16 by commit 058504edd02667eef8fac9be27ab3ea74332e9b4. For more details please see the references link. | null | 2021-12-19T23:16:40.008218Z | 2021-08-03T01:51:24.314564Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/058504edd02667eef8fac9be27ab3ea74332e9b4'} |
Linux | GSD-2021-1000020 | ARM: footbridge: fix PCI interrupt mapping | ARM: footbridge: fix PCI interrupt mapping
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.16 by commit c3efce8cc9807339633ee30e39882f4c8626ee1d, it was introduced in version v4.13 by commit 30fdfb929e82450bbf3d0e0aba56efbc29b52b52. For more details please see the references link. | null | 2021-12-19T22:24:19.801604Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/30fdfb929e82450bbf3d0e0aba56efbc29b52b52'} |
Linux | GSD-2021-1000470 | liquidio: Fix unintented sign extension of a left shift of a u16 | liquidio: Fix unintented sign extension of a left shift of a u16
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.233 by commit 114826c4bca1f02cccd6b4b8a36e1d14cc00f161, it was introduced in version v4.9 by commit 5bc67f587ba7eaa8dd3976bfeff8f2b60718c871. For more details please see the references link. | null | 2021-12-19T23:14:11.962031Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5bc67f587ba7eaa8dd3976bfeff8f2b60718c871'} |
Linux | GSD-2021-1002158 | drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read | drm/edid: In connector_bad_edid() cap num_of_ext by num_blocks read
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15 by commit 97794170b696856483f74b47bfb6049780d2d3a0, it was introduced in version v5.7 by commit e11f5bd8228fc3760c221f940b9f6365dbf3e7ed. For more details please see the references link. | null | 2021-12-20T01:15:55.063091Z | 2021-11-14T15:22:34.144288Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e11f5bd8228fc3760c221f940b9f6365dbf3e7ed'} |
Linux | GSD-2021-1000165 | bpf: Fix masking negation logic upon negative dst register | bpf: Fix masking negation logic upon negative dst register
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.35 by commit 2cfa537674cd1051a3b8111536d77d0558f33d5d, it was introduced in version v5.0 by commit 979d63d50c0c0f7bc537bf821e056cc9fe5abd38. For more details please see the references link. | null | 2021-12-19T22:44:03.850377Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/979d63d50c0c0f7bc537bf821e056cc9fe5abd38'} |
Linux | GSD-2022-1001408 | mt76: mt7921: fix crash when startup fails. | mt76: mt7921: fix crash when startup fails.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit c1a5e6002ec441a3b9fb4d048b4b49ae93409a46. For more details please see the references link. | null | 2022-04-25T05:20:42.347115Z | 2022-04-24T21:10:52.197286Z | null | null | null | null | null |
Linux | GSD-2021-1002508 | seg6: fix the iif in the IPv6 socket control block | seg6: fix the iif in the IPv6 socket control block
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.85 by commit 666521b3852d2b2f52d570f9122b1e4b50d96831, it was introduced in version v5.0 by commit ef489749aae508e6f17886775c075f12ff919fb1. For more details please see the references link. | null | 2021-12-20T00:52:25.317245Z | 2021-12-19T19:40:28.367420Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ef489749aae508e6f17886775c075f12ff919fb1'} |
Linux | GSD-2021-1000535 | drm/amd/amdgpu: fix a potential deadlock in gpu reset | drm/amd/amdgpu: fix a potential deadlock in gpu reset
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit 42cdbad4f1e6845afabffce7aa631f6136b58fb6, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-19T23:19:40.227572Z | 2021-06-04T19:34:54.282937Z | null | null | null | null | null |
Linux | GSD-2022-1001058 | dm ioctl: prevent potential spectre v1 gadget | dm ioctl: prevent potential spectre v1 gadget
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit dd86064417de828ff2102ddc6049c829bf7585b4. For more details please see the references link. | null | 2022-04-25T05:03:44.297346Z | 2022-04-24T20:42:51.068983Z | null | null | null | null | null |
Linux | GSD-2021-1001774 | NFC: digital: fix possible memory leak in digital_in_send_sdd_req() | NFC: digital: fix possible memory leak in digital_in_send_sdd_req()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.290 by commit 74569c78aa84f8c958f1334b465bc530906ec99a, it was introduced in version v3.13 by commit 2c66daecc4092e6049673c281b2e6f0d5e59a94c. For more details please see the references link. | null | 2021-12-20T01:04:55.884552Z | 2021-10-28T13:48:15.031830Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2c66daecc4092e6049673c281b2e6f0d5e59a94c'} |
Linux | GSD-2021-1000866 | scsi: core: Fix error handling of scsi_host_alloc() | scsi: core: Fix error handling of scsi_host_alloc()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.237 by commit db08ce595dd64ea9859f7d088b51cbfc8e685c66. For more details please see the references link. | null | 2021-12-19T22:49:15.741735Z | 2021-06-30T00:02:23.559363Z | null | null | null | null | null |
Linux | GSD-2022-1000219 | btrfs: fix deadlock between quota disable and qgroup rescan worker | btrfs: fix deadlock between quota disable and qgroup rescan worker
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.99 by commit 32747e01436aac8ef93fe85b5b523b4f3b52f040. For more details please see the references link. | null | 2022-02-19T13:00:46.254887Z | 2022-02-18T21:56:55.429806Z | null | null | null | null | null |
Linux | GSD-2022-1002224 | gcc-plugins/stackleak: Exactly match strings instead of prefixes | gcc-plugins/stackleak: Exactly match strings instead of prefixes
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit f36dd10d1b9533129c86bc9b4f707fda1abfee06. For more details please see the references link. | null | 2022-04-25T06:42:21.415768Z | 2022-04-24T22:23:02.126526Z | null | null | null | null | null |
Linux | GSD-2021-1001324 | memory: fsl_ifc: fix leak of private memory on probe failure | memory: fsl_ifc: fix leak of private memory on probe failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.134 by commit 443f6ca6fd186b4fa4e6f377b6e19a91feb1a0d5, it was introduced in version v3.3 by commit a20cbdeffce247a2b6fb83cd8d22433994068565. For more details please see the references link. | null | 2021-12-20T01:13:48.873625Z | 2021-08-03T02:09:05.266596Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a20cbdeffce247a2b6fb83cd8d22433994068565'} |
Linux | GSD-2022-1000649 | selinux: fix double free of cond_list on error paths | selinux: fix double free of cond_list on error paths
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.8 by commit 7ed9cbf7ac0d4ed86b356e1b944304ae9ee450d4. For more details please see the references link. | null | 2022-03-07T01:50:58.414126Z | 2022-02-27T03:36:03.659955Z | null | null | null | null | null |
Linux | GSD-2021-1002621 | net: netlink: af_netlink: Prevent empty skb by adding a check on len. | net: netlink: af_netlink: Prevent empty skb by adding a check on len.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.294 by commit 40cf2e058832d9cfaae98dfd77334926275598b6. For more details please see the references link. | null | 2022-01-11T05:47:12.959517Z | 2021-12-27T05:27:38.517351Z | null | null | null | null | null |
Linux | GSD-2022-1000999 | gpio: Restrict usage of GPIO chip irq members before initialization | gpio: Restrict usage of GPIO chip irq members before initialization
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit f8dea54f74cae8c2e4d7b2952e8fed7743a85c87. For more details please see the references link. | null | 2022-04-25T06:36:30.026621Z | 2022-04-24T20:38:27.074408Z | null | null | null | null | null |
Linux | GSD-2022-1001371 | x86/Kconfig: Do not allow CONFIG_X86_X32_ABI=y with llvm-objcopy | x86/Kconfig: Do not allow CONFIG_X86_X32_ABI=y with llvm-objcopy
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 2141b80328b45f7bfe9691de7804988b4b4b1262. For more details please see the references link. | null | 2022-04-25T06:40:51.349509Z | 2022-04-24T21:08:37.905279Z | null | null | null | null | null |
Linux | GSD-2021-1002271 | arm64: dts: qcom: msm8998: Fix CPU/L2 idle state latency and residency | arm64: dts: qcom: msm8998: Fix CPU/L2 idle state latency and residency
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.162 by commit a14d7038ea201c5526375becfc43b9ba281b1e82. For more details please see the references link. | null | 2021-12-20T00:31:46.680662Z | 2021-11-29T02:36:19.832405Z | null | null | null | null | null |
Linux | GSD-2022-1000833 | netfilter: fix use-after-free in __nf_register_net_hook() | netfilter: fix use-after-free in __nf_register_net_hook()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.104 by commit 8b0142c4143c1ca297dcf2c0cdd045d65dae2344, it was introduced in version v4.14 by commit 2420b79f8c18a75ee2417cace381f4604b9b4365. For more details please see the references link. | null | 2022-03-18T02:50:14.466781Z | 2022-03-18T00:22:40.436556Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2420b79f8c18a75ee2417cace381f4604b9b4365'} |
Linux | GSD-2022-1001721 | mt76: mt7915: fix injected MPDU transmission to not use HW A-MSDU | mt76: mt7915: fix injected MPDU transmission to not use HW A-MSDU
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit df467929a0408efccd9495ccc5b650d9a3782313. For more details please see the references link. | null | 2022-04-25T03:36:33.341281Z | 2022-04-24T21:37:39.532810Z | null | null | null | null | null |
Linux | GSD-2022-1000560 | mtd: parsers: qcom: Fix kernel panic on skipped partition | mtd: parsers: qcom: Fix kernel panic on skipped partition
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit a2995fe23095ceda2dc382fbe057f5e164595548, it was introduced in version v5.12 by commit 803eb124e1a64e42888542c3444bfe6dac412c7f. For more details please see the references link. | null | 2022-03-07T01:38:47.328541Z | 2022-02-27T03:24:01.390339Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/803eb124e1a64e42888542c3444bfe6dac412c7f'} |
Linux | GSD-2022-1000130 | yam: fix a memory leak in yam_siocdevprivate() | yam: fix a memory leak in yam_siocdevprivate()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.228 by commit 4bd197ce18329e3725fe3af5bd27daa4256d3ac7, it was introduced in version v4.19 by commit 0781168e23a2fc8dceb989f11fc5b39b3ccacc35. For more details please see the references link. | null | 2022-02-20T06:39:44.299253Z | 2022-02-18T21:44:28.327070Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0781168e23a2fc8dceb989f11fc5b39b3ccacc35'} |
Linux | GSD-2022-1002418 | video: fbdev: sm712fb: Fix crash in smtcfb_write() | video: fbdev: sm712fb: Fix crash in smtcfb_write()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 0ec746674296c94137f074309c26d17e644c0498. For more details please see the references link. | null | 2022-04-25T04:51:26.657681Z | 2022-04-24T22:45:09.935615Z | null | null | null | null | null |
Linux | GSD-2022-1000425 | arm64: dts: meson-sm1-odroid: use correct enable-gpio pin for tf-io regulator | arm64: dts: meson-sm1-odroid: use correct enable-gpio pin for tf-io regulator
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit 162f8057192c247096c1ba4d39c8450f14b86e40, it was introduced in version v5.14 by commit 1f80a5cf74a60997b92d2cde772edec093bec4d9. For more details please see the references link. | null | 2022-03-07T01:51:06.982115Z | 2022-02-27T03:05:04.882297Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1f80a5cf74a60997b92d2cde772edec093bec4d9'} |
Linux | GSD-2021-1001148 | net: validate lwtstate->data before returning from skb_tunnel_info() | net: validate lwtstate->data before returning from skb_tunnel_info()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.5 by commit a915379594f1e045421635c6316d8f3ffa018c58, it was introduced in version v4.3 by commit 61adedf3e3f1d3f032c5a6a299978d91eff6d555. For more details please see the references link. | null | 2021-12-19T22:55:38.472887Z | 2021-08-03T01:30:34.377698Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/61adedf3e3f1d3f032c5a6a299978d91eff6d555'} |
Linux | GSD-2022-1002048 | ntfs: add sanity check on allocation size | ntfs: add sanity check on allocation size
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit b230f2d9441a34c7f483d39ab78519bcf73cc2e0. For more details please see the references link. | null | 2022-04-25T05:48:52.727791Z | 2022-04-24T22:05:48.110634Z | null | null | null | null | null |
Linux | GSD-2021-1001518 | tty: Fix out-of-bound vmalloc access in imageblit | tty: Fix out-of-bound vmalloc access in imageblit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.285 by commit 70aed03b1d5a5df974f456cdc8eedb213c94bb8b. For more details please see the references link. | null | 2021-12-20T00:47:26.708537Z | 2021-10-19T16:21:51.084861Z | null | null | null | null | null |
Linux | GSD-2022-1001234 | igc: avoid kernel warning when changing RX ring parameters | igc: avoid kernel warning when changing RX ring parameters
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 65aebcf1e05bd97d2e7ffcdff36efea1757c9450, it was introduced in version v5.13 by commit 73f1071c1d2952b8c93cd6cd99744768c59ec840. For more details please see the references link. | null | 2022-04-25T06:03:58.304470Z | 2022-04-24T20:56:26.961929Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/73f1071c1d2952b8c93cd6cd99744768c59ec840'} |
Linux | GSD-2021-1000759 | x86/kvm: Disable kvmclock on all CPUs on shutdown | x86/kvm: Disable kvmclock on all CPUs on shutdown
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.125 by commit 9084fe1b3572664ad276f427dce575f580c9799a, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T00:42:32.548575Z | 2021-06-25T00:02:56.940176Z | null | null | null | null | null |
Linux | GSD-2021-1002764 | scsi: scsi_debug: Fix type in min_t to avoid stack OOB | scsi: scsi_debug: Fix type in min_t to avoid stack OOB
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit 3085147645938eb41f0bc0e25ef9791e71f5ee4b. For more details please see the references link. | null | 2022-01-11T05:51:05.269398Z | 2021-12-27T05:49:34.722673Z | null | null | null | null | null |
Linux | GSD-2022-1000976 | block: null_blk: end timed out poll request | block: null_blk: end timed out poll request
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.4 by commit 407d09a22f3f685fd634aa5d05840c64b23bfebc, it was introduced in version v5.16 by commit 0a593fbbc245a85940ed34caa3aa1e4cb060c54b. For more details please see the references link. | null | 2022-04-25T05:17:24.568642Z | 2022-04-24T20:36:17.568175Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0a593fbbc245a85940ed34caa3aa1e4cb060c54b'} |
Linux | GSD-2022-1001664 | veth: Ensure eth header is in skb's linear part | veth: Ensure eth header is in skb's linear part
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.35 by commit 93940fc4cb81840dc0fa202de48cccb949a0261d, it was introduced in version v2.6.24 by commit e314dbdc1c0dc6a548ecf0afce28ecfd538ff568. For more details please see the references link. | null | 2022-04-25T06:19:41.285239Z | 2022-04-24T21:33:06.972530Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e314dbdc1c0dc6a548ecf0afce28ecfd538ff568'} |
Linux | GSD-2021-1000309 | net/nfc: fix use-after-free llcp_sock_bind/connect | net/nfc: fix use-after-free llcp_sock_bind/connect
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 18175fe17ae043a0b81e5d511f8817825784c299, it was introduced in version v5.12 by commit c33b1cc62ac05c1dbb1cdafe2eb66da01c76ca8d. For more details please see the references link. | null | 2021-12-19T22:22:37.670306Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c33b1cc62ac05c1dbb1cdafe2eb66da01c76ca8d'} |
Linux | GSD-2021-1002334 | scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine | scsi: lpfc: Fix use-after-free in lpfc_unreg_rpi() routine
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit dbebf865b3239595c1d4dba063b122862583b52a. For more details please see the references link. | null | 2021-12-19T23:35:40.092858Z | 2021-11-29T02:39:11.958972Z | null | null | null | null | null |
Linux | GSD-2021-1000427 | powerpc: Fix HAVE_HARDLOCKUP_DETECTOR_ARCH build configuration | powerpc: Fix HAVE_HARDLOCKUP_DETECTOR_ARCH build configuration
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.119 by commit 3733a64d5828e72b46fd670b98435c11d291139e, it was introduced in version v4.13 by commit 2104180a53698df5aec35aed5f840a26ade0551d. For more details please see the references link. | null | 2021-12-19T23:27:01.725831Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/2104180a53698df5aec35aed5f840a26ade0551d'} |
Linux | GSD-2021-1000077 | irqchip/gic-v3: Do not enable irqs when handling spurious interrups | irqchip/gic-v3: Do not enable irqs when handling spurious interrups
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.3 by commit 3f72d3709f53af72835af7dc8b15ba61611a0e36, it was introduced in version v5.1 by commit 3f1f3234bc2db1c16b9818b9a15a5d58ad45251c. For more details please see the references link. | null | 2021-12-19T23:30:49.707584Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/3f1f3234bc2db1c16b9818b9a15a5d58ad45251c'} |
Linux | GSD-2021-1001236 | media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf() | media: ngene: Fix out-of-bounds bug in ngene_command_config_free_buf()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.54 by commit e991457afdcb5f4dbc5bc9d79eaf775be33e7092, it was introduced in version v2.6.34 by commit dae52d009fc950b5c209260d50fcc000f5becd3c. For more details please see the references link. | null | 2021-12-20T00:00:42.389778Z | 2021-08-03T01:45:07.480478Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/dae52d009fc950b5c209260d50fcc000f5becd3c'} |
Linux | GSD-2022-1001849 | drm/tegra: Fix reference leak in tegra_dsi_ganged_probe | drm/tegra: Fix reference leak in tegra_dsi_ganged_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 852c1f5f3119a38ee68e319bab10277fc1ab06b7, it was introduced in version v3.19 by commit e94236cde4d519cdecd45e2435defba33abdc99f. For more details please see the references link. | null | 2022-04-25T06:26:38.872160Z | 2022-04-24T21:48:00.519741Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e94236cde4d519cdecd45e2435defba33abdc99f'} |
Linux | GSD-2021-1001666 | md: fix a lock order reversal in md_alloc | md: fix a lock order reversal in md_alloc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.70 by commit b18ba3f477a2fdd12d2ca2e01d2bd874968714e2, it was introduced in version v3.0 by commit b0140891a8cea36469f58d23859e599b1122bd37. For more details please see the references link. | null | 2021-12-20T01:27:24.514522Z | 2021-10-19T16:30:46.775279Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/b0140891a8cea36469f58d23859e599b1122bd37'} |
Linux | GSD-2021-1000974 | drm/amd/display: Fix potential memory leak in DMUB hw_init | drm/amd/display: Fix potential memory leak in DMUB hw_init
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.45 by commit 9e8c2af010463197315fa54a6c17e74988b5259c. For more details please see the references link. | null | 2021-12-20T00:24:05.113378Z | 2021-06-30T00:30:16.384711Z | null | null | null | null | null |
Linux | GSD-2022-1002336 | video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow | video: fbdev: nvidiafb: Use strscpy() to prevent buffer overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 72dd5c46a152136712a55bf026a9aa8c1b12b60d. For more details please see the references link. | null | 2022-04-25T06:26:16.399177Z | 2022-04-24T22:35:34.093068Z | null | null | null | null | null |
Linux | GSD-2021-1001689 | drm/nouveau: avoid a use-after-free when BO init fails | drm/nouveau: avoid a use-after-free when BO init fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.12 by commit 548f2ff8ea5e0ce767ae3418d1ec5308990be87d, it was introduced in version v5.4 by commit 019cbd4a4feb3aa3a917d78e7110e3011bbff6d5. For more details please see the references link. | null | 2021-12-20T01:38:54.031140Z | 2021-10-19T16:31:58.045596Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/019cbd4a4feb3aa3a917d78e7110e3011bbff6d5'} |
Linux | GSD-2021-1001373 | memory: fsl_ifc: fix leak of IO mapping on probe failure | memory: fsl_ifc: fix leak of IO mapping on probe failure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.198 by commit 94bc2fe46102d1e060fc749c0c19511e76c9995f, it was introduced in version v3.3 by commit a20cbdeffce247a2b6fb83cd8d22433994068565. For more details please see the references link. | null | 2021-12-20T00:29:02.434900Z | 2021-08-03T02:22:15.666816Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a20cbdeffce247a2b6fb83cd8d22433994068565'} |
Linux | GSD-2022-1002273 | mm,hwpoison: unmap poisoned page before invalidation | mm,hwpoison: unmap poisoned page before invalidation
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit d102fcacfcf35d137d07127e223bed8cf0de17a2, it was introduced in version v5.4.189 by commit d1313f5e8fe50ce84ec3eac162873ee028a30631. For more details please see the references link. | null | 2022-04-24T22:28:49.416676Z | 2022-04-24T22:28:49.416676Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d1313f5e8fe50ce84ec3eac162873ee028a30631'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.