ecosystem stringclasses 14 values | vuln_id stringlengths 10 19 | summary stringlengths 4 267 ⌀ | details stringlengths 9 13.5k | aliases stringlengths 17 144 ⌀ | modified_date stringdate 2010-05-27 05:47:00 2022-05-10 08:46:52 | published_date stringdate 2005-12-31 05:00:00 2022-05-10 08:46:50 | severity stringclasses 5 values | score float64 0 10 ⌀ | cwe_id stringclasses 988 values | refs stringlengths 30 17.7k ⌀ | introduced stringlengths 75 4.26k ⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|
Linux | GSD-2022-1002465 | nfc: nci: add flush_workqueue to prevent uaf | nfc: nci: add flush_workqueue to prevent uaf
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.311 by commit 7d3232214ca4ea8f7d18df264c3b254aa8089d7f, it was introduced in version v3.2 by commit 6a2968aaf50c7a22fced77a5e24aa636281efca8. For more details please see the references link. | null | 2022-04-25T06:08:03.797995Z | 2022-04-24T22:51:13.655259Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6a2968aaf50c7a22fced77a5e24aa636281efca8'} |
Linux | GSD-2021-1001565 | cpufreq: schedutil: Destroy mutex before kobject_put() frees the memory | cpufreq: schedutil: Destroy mutex before kobject_put() frees the memory
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.209 by commit 3cb9595e23d879824ebcefeabdf5156bc288000c, it was introduced in version v4.19.209 by commit 30d57cf2c4116ca6d34ecd1cac94ad84f8bc446c. For more details please see the references link. | null | 2021-10-19T16:24:00.862579Z | 2021-10-19T16:24:00.862579Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/30d57cf2c4116ca6d34ecd1cac94ad84f8bc446c'} |
Linux | GSD-2022-1002035 | scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair() | scsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit f97316dd393bc8df1cc2af6295a97b876eecf252. For more details please see the references link. | null | 2022-04-25T07:28:11.994075Z | 2022-04-24T22:05:05.161586Z | null | null | null | null | null |
Linux | GSD-2021-1001070 | net: hamradio: fix memory leak in mkiss_close | net: hamradio: fix memory leak in mkiss_close
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.13 by commit f4de2b43d13b7cf3ced9310e371b90c836dbd7cd, it was introduced in version v2.6.14 by commit 815f62bf742718458ba822a7e1f51f285eb997f2. For more details please see the references link. | null | 2021-12-20T00:28:13.175956Z | 2021-06-30T00:37:39.626940Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/815f62bf742718458ba822a7e1f51f285eb997f2'} |
Linux | GSD-2022-1002170 | powerpc: Fix virt_addr_valid() for 64-bit Book3E & 32-bit | powerpc: Fix virt_addr_valid() for 64-bit Book3E & 32-bit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.190 by commit deab81144d5a043f42804207fb76cfbd8a806978. For more details please see the references link. | null | 2022-04-25T03:27:53.851690Z | 2022-04-24T22:18:15.462838Z | null | null | null | null | null |
Linux | GSD-2021-1001420 | tty: serial: 8250: serial_cs: Fix a memory leak in error handling path | tty: serial: 8250: serial_cs: Fix a memory leak in error handling path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.240 by commit 34f4590f5ec9859ea9136249f528173d150bd584. For more details please see the references link. | null | 2021-12-19T23:09:49.395391Z | 2021-08-03T02:35:43.869782Z | null | null | null | null | null |
Linux | GSD-2021-1001973 | comedi: vmk80xx: fix bulk-buffer overflow | comedi: vmk80xx: fix bulk-buffer overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.255 by commit 0866dcaa828c21bc2f94dac00e086078f11b5772, it was introduced in version v2.6.31 by commit 985cafccbf9b7f862aa1c5ee566801e18b5161fb. For more details please see the references link. | null | 2021-12-20T01:35:20.230076Z | 2021-11-14T15:14:02.452156Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/985cafccbf9b7f862aa1c5ee566801e18b5161fb'} |
Linux | GSD-2021-1000661 | NFS: fix an incorrect limit in filelayout_decode_layout() | NFS: fix an incorrect limit in filelayout_decode_layout()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.193 by commit 945ebef997227ca8c20bad7f8a8358c8ee57a84a, it was introduced in version v2.6.37 by commit 16b374ca439fb406e46e071f75428f5b033056f8. For more details please see the references link. | null | 2021-12-19T22:14:23.729133Z | 2021-06-04T19:56:52.093933Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/16b374ca439fb406e46e071f75428f5b033056f8'} |
Linux | GSD-2021-1000231 | ath10k: Fix a use after free in ath10k_htc_send_bundle | ath10k: Fix a use after free in ath10k_htc_send_bundle
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.4 by commit 5e413c0831ff4700d1739db3fa3ae9f859744676, it was introduced in version v5.8 by commit c8334512f3dd1b94844baca629f9bedca4271593. For more details please see the references link. | null | 2021-12-19T21:47:57.543459Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c8334512f3dd1b94844baca629f9bedca4271593'} |
Linux | GSD-2021-1000026 | dmaengine: idxd: fix wq cleanup of WQCFG registers | dmaengine: idxd: fix wq cleanup of WQCFG registers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.16 by commit f7dc8f5619165e1fa3383d0c2519f502d9e2a1a9, it was introduced in version v5.8 by commit da32b28c95a79e399e18c03f8178f41aec9c66e4. For more details please see the references link. | null | 2021-12-19T23:24:12.581311Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/da32b28c95a79e399e18c03f8178f41aec9c66e4'} |
Linux | GSD-2021-1000476 | crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init | crypto: qat - ADF_STATUS_PF_RUNNING should be set after adf_dev_init
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.233 by commit 446045cf682af12d9294765f6c46084b374b5654, it was introduced in version v4.7 by commit 25c6ffb249f612c56a48ce48a3887adf57b8f4bd. For more details please see the references link. | null | 2021-12-20T00:22:25.111250Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/25c6ffb249f612c56a48ce48a3887adf57b8f4bd'} |
Linux | GSD-2021-1001637 | HID: usbhid: free raw_report buffers in usbhid_stop | HID: usbhid: free raw_report buffers in usbhid_stop
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.71 by commit f7ac4d24e1610b92689946fa88177673f1e88a3f. For more details please see the references link. | null | 2021-12-19T22:24:19.674281Z | 2021-10-19T16:29:22.392622Z | null | null | null | null | null |
Linux | GSD-2021-1000925 | net: cdc_eem: fix tx fixup skb leak | net: cdc_eem: fix tx fixup skb leak
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.128 by commit 81de2ed06df8b5451e050fe6a318af3263dbff3f, it was introduced in version v2.6.30 by commit 9f722c0978b04acba209f8ca1896ad05814bc3a3. For more details please see the references link. | null | 2021-12-20T00:20:32.274708Z | 2021-06-30T00:24:54.815441Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9f722c0978b04acba209f8ca1896ad05814bc3a3'} |
Linux | GSD-2022-1002367 | drbd: fix potential silent data corruption | drbd: fix potential silent data corruption
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 92c60ae6f827cf41604eafccbc8608ce4fb41cc1. For more details please see the references link. | null | 2022-04-25T06:27:54.053599Z | 2022-04-24T22:39:31.151729Z | null | null | null | null | null |
Linux | GSD-2021-1001267 | virtio-blk: Fix memory leak among suspend/resume procedure | virtio-blk: Fix memory leak among suspend/resume procedure
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.52 by commit cd24da0db9f75ca11eaf6060f0ccb90e2f3be3b0. For more details please see the references link. | null | 2021-12-19T23:25:20.407889Z | 2021-08-03T01:53:29.220925Z | null | null | null | null | null |
Linux | GSD-2022-1001818 | drivers: ethernet: cpsw: fix panic when interrupt coaleceing is set via ethtool | drivers: ethernet: cpsw: fix panic when interrupt coaleceing is set via ethtool
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 585dc196a08fccdcd1b7fcf473cf566b34c4b840, it was introduced in version v5.15 by commit d43c65b05b848e0b2db1a6c78b02c189da3a95b5. For more details please see the references link. | null | 2022-04-25T03:18:08.288386Z | 2022-04-24T21:44:45.237385Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d43c65b05b848e0b2db1a6c78b02c189da3a95b5'} |
Linux | GSD-2021-1001288 | jfs: fix GPF in diFree | jfs: fix GPF in diFree
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.51 by commit 8018936950360f1c503bb385e158cfc5e4945d18. For more details please see the references link. | null | 2021-12-20T02:30:10.309240Z | 2021-08-03T01:57:46.518574Z | null | null | null | null | null |
Linux | GSD-2022-1002222 | Revert "Revert "block, bfq: honor already-setup queue merges"" | Revert "Revert "block, bfq: honor already-setup queue merges""
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 931aff627469a75c77b9fd3823146d0575afffd6. For more details please see the references link. | null | 2022-04-25T04:15:32.797462Z | 2022-04-24T22:22:56.352859Z | null | null | null | null | null |
Linux | GSD-2021-1001772 | drm/msm: Fix null pointer dereference on pointer edp | drm/msm: Fix null pointer dereference on pointer edp
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.290 by commit f175b9a83e5c252d7c74acddc792840016caae0a, it was introduced in version v4.0 by commit ab5b0107ccf3821a6837b0f2819270d6fa0b278f. For more details please see the references link. | null | 2021-12-19T22:42:10.721592Z | 2021-10-28T13:48:09.580326Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ab5b0107ccf3821a6837b0f2819270d6fa0b278f'} |
Linux | GSD-2021-1000860 | usb: dwc3: ep0: fix NULL pointer exception | usb: dwc3: ep0: fix NULL pointer exception
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.237 by commit 990dc90750772622d44ca2ea6652c521e6f67e16. For more details please see the references link. | null | 2021-12-20T00:59:28.039068Z | 2021-06-30T00:02:01.639855Z | null | null | null | null | null |
Linux | GSD-2022-1002388 | ARM: davinci: da850-evm: Avoid NULL pointer dereference | ARM: davinci: da850-evm: Avoid NULL pointer dereference
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit a12b356d45cbb6e8a1b718d1436b3d6239a862f3, it was introduced in version v2.6.33 by commit bae105879f2f2404155da6f50b3636193d228a62. For more details please see the references link. | null | 2022-04-25T05:36:58.961417Z | 2022-04-24T22:41:48.359898Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bae105879f2f2404155da6f50b3636193d228a62'} |
Linux | GSD-2021-1001322 | net: qcom/emac: fix UAF in emac_remove | net: qcom/emac: fix UAF in emac_remove
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.135 by commit 2b70ca92847c619d6264c7372ef74fcbfd1e048c, it was introduced in version v4.9 by commit 54e19bc74f3380d414681762ceed9f7245bc6a6e. For more details please see the references link. | null | 2021-12-20T00:00:09.913935Z | 2021-08-03T02:08:19.804847Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/54e19bc74f3380d414681762ceed9f7245bc6a6e'} |
Linux | GSD-2021-1000499 | RDMA/rxe: Return CQE error if invalid lkey was supplied | RDMA/rxe: Return CQE error if invalid lkey was supplied
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.7 by commit abe31d25facdb9109fe2cf69890748295291570c, it was introduced in version v4.8 by commit 8700e3e7c4857d28ebaa824509934556da0b3e76. For more details please see the references link. | null | 2021-12-20T01:17:32.858006Z | 2021-05-31T23:46:38.282006Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8700e3e7c4857d28ebaa824509934556da0b3e76'} |
Linux | GSD-2021-1000163 | net: qrtr: Avoid potential use after free in MHI send | net: qrtr: Avoid potential use after free in MHI send
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.35 by commit 48ec949ac979b4b42d740f67b6177797af834f80, it was introduced in version v5.8 by commit 6e728f321393b1fce9e1c2c3e55f9f7c15991321. For more details please see the references link. | null | 2021-12-19T23:52:05.777792Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6e728f321393b1fce9e1c2c3e55f9f7c15991321'} |
Linux | GSD-2021-1000533 | gve: Add NULL pointer checks when freeing irqs. | gve: Add NULL pointer checks when freeing irqs.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit 5278c75266c5094d3c0958793bf12fc90300e580, it was introduced in version v5.3 by commit 893ce44df56580fb878ca5af9c4a5fd87567da50. For more details please see the references link. | null | 2021-12-20T00:18:46.253065Z | 2021-06-04T19:34:39.924836Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/893ce44df56580fb878ca5af9c4a5fd87567da50'} |
Linux | GSD-2022-1000566 | HID: elo: fix memory leak in elo_probe | HID: elo: fix memory leak in elo_probe
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.11 by commit 80dad7483e3940dc9d9d55f8b34d1f4ba85a505e, it was introduced in version v5.15 by commit fbf42729d0e91332e8ce75a1ecce08b8a2dab9c1. For more details please see the references link. | null | 2022-03-07T01:38:09.631360Z | 2022-02-27T03:24:41.860961Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fbf42729d0e91332e8ce75a1ecce08b8a2dab9c1'} |
Linux | GSD-2022-1000136 | ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx() | ASoC: ops: Reject out of bounds values in snd_soc_put_volsw_sx()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.228 by commit 9a12fcbf3c622f9bf6b110a873d62b0cba93972e. For more details please see the references link. | null | 2022-02-19T04:05:11.130045Z | 2022-02-18T21:45:09.590492Z | null | null | null | null | null |
Linux | GSD-2022-1001377 | NFSv4.2: fix reference count leaks in _nfs42_proc_copy_notify() | NFSv4.2: fix reference count leaks in _nfs42_proc_copy_notify()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit fb73bf6305f4eb8f0cf9a61ee874d55f019d6dc4. For more details please see the references link. | null | 2022-04-25T07:13:42.462079Z | 2022-04-24T21:09:09.649550Z | null | null | null | null | null |
Linux | GSD-2021-1001908 | iio: adis16475: fix deadlock on frequency set | iio: adis16475: fix deadlock on frequency set
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.14 by commit 04e03b907022ebd876f422f17efcc2c6cc934dc6, it was introduced in version v5.13 by commit 39c024b51b5607e9d2fc6c04c2573e4a778c728d. For more details please see the references link. | null | 2021-12-19T22:17:44.524840Z | 2021-10-28T13:55:10.244457Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/39c024b51b5607e9d2fc6c04c2573e4a778c728d'} |
Linux | GSD-2021-1002627 | xen/blkfront: harden blkfront against event channel storms | xen/blkfront: harden blkfront against event channel storms
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.294 by commit 25898389795bd85d8e1520c0c75c3ad906c17da7. For more details please see the references link. | null | 2022-01-11T05:53:53.729594Z | 2021-12-27T05:27:53.274064Z | null | null | null | null | null |
Linux | GSD-2022-1000835 | mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls | mm: Consider __GFP_NOWARN flag for oversized kvmalloc() calls
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.104 by commit e93f2be33d4f4c1aa350dd79b6d1179746ff4cb5, it was introduced in version v5.10.71 by commit 57a269a1b12a3a6fe51f62e1be5e74494bad1d92. For more details please see the references link. | null | 2022-03-18T02:54:46.290567Z | 2022-03-18T00:22:50.717691Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/57a269a1b12a3a6fe51f62e1be5e74494bad1d92'} |
Linux | GSD-2022-1001727 | scsi: mpi3mr: Fix memory leaks | scsi: mpi3mr: Fix memory leaks
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit 5d76a88b8536d75ff5362e232097e85946b8aadf. For more details please see the references link. | null | 2022-04-25T04:47:32.537232Z | 2022-04-24T21:37:57.025506Z | null | null | null | null | null |
Linux | GSD-2021-1002277 | btrfs: fix memory ordering between normal and ordered work functions | btrfs: fix memory ordering between normal and ordered work functions
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.82 by commit 6adbc07ebcaf8bead08b21687d49e0fc94400987, it was introduced in version v3.15 by commit 08a9ff3264181986d1d692a4e6fce3669700c9f8. For more details please see the references link. | null | 2021-12-20T01:08:18.554322Z | 2021-11-29T02:36:41.936101Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/08a9ff3264181986d1d692a4e6fce3669700c9f8'} |
Linux | GSD-2021-1002762 | USB: core: Make do_proc_control() and do_proc_bulk() killable | USB: core: Make do_proc_control() and do_proc_bulk() killable
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit 403716741c6c2c510dce44e88f085a740f535de6. For more details please see the references link. | null | 2022-01-11T05:50:39.399182Z | 2021-12-27T05:49:25.033313Z | null | null | null | null | null |
Linux | GSD-2022-1001232 | mt76: mt7921s: fix a possible memory leak in mt7921_load_patch | mt76: mt7921s: fix a possible memory leak in mt7921_load_patch
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit b301043384c5c2447357952be9a536c2026d8ad0, it was introduced in version v5.17 by commit 78b217580c50994ae22dde4ecaaf147de0f355f6. For more details please see the references link. | null | 2022-04-25T08:38:09.592404Z | 2022-04-24T20:56:14.936210Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/78b217580c50994ae22dde4ecaaf147de0f355f6'} |
Linux | GSD-2021-1002298 | staging: rtl8723bs: remove possible deadlock when disconnect (v2) | staging: rtl8723bs: remove possible deadlock when disconnect (v2)
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.82 by commit 3a53d9ad9bc3408ad7f0424d60d25381f9fa6c81. For more details please see the references link. | null | 2021-12-20T00:10:33.877543Z | 2021-11-29T02:37:34.750383Z | null | null | null | null | null |
Linux | GSD-2021-1002332 | ALSA: gus: fix null pointer dereference on pointer block | ALSA: gus: fix null pointer dereference on pointer block
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.5 by commit 16721797dcef2c7c030ffe73a07f39a65f9323c3. For more details please see the references link. | null | 2021-12-19T22:32:26.236099Z | 2021-11-29T02:39:06.771785Z | null | null | null | null | null |
Linux | GSD-2022-1001398 | scsi: pm8001: Fix task leak in pm8001_send_abort_all() | scsi: pm8001: Fix task leak in pm8001_send_abort_all()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit 146cae06d2682d7563732544be334e8e6d3862b8. For more details please see the references link. | null | 2022-04-25T06:42:40.132238Z | 2022-04-24T21:10:23.172869Z | null | null | null | null | null |
Linux | GSD-2022-1000970 | mm: fix unexpected zeroed page mapping with zram swap | mm: fix unexpected zeroed page mapping with zram swap
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.4 by commit afac4b88699a06c8b9369f9d759a1ec3c254b788, it was introduced in version v4.15 by commit 0bcac06f27d7528591c27ac2b093ccd71c5d0168. For more details please see the references link. | null | 2022-04-25T03:44:36.361783Z | 2022-04-24T20:35:59.682397Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0bcac06f27d7528591c27ac2b093ccd71c5d0168'} |
Linux | GSD-2022-1001662 | powerpc: Fix virt_addr_valid() for 64-bit Book3E & 32-bit | powerpc: Fix virt_addr_valid() for 64-bit Book3E & 32-bit
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.34 by commit fddb88bd266f4513abab7c36bca98935c9148a98. For more details please see the references link. | null | 2022-04-25T03:39:09.828124Z | 2022-04-24T21:32:47.405138Z | null | null | null | null | null |
Linux | GSD-2022-1000423 | phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable() | phy: stm32: fix a refcount leak in stm32_usbphyc_pll_enable()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.24 by commit 94b16ca86ab688ed6fad4548f70137f93cf1f0a9, it was introduced in version v5.12 by commit 5b1af71280abd82efbe28cd28d553363dfde0a34. For more details please see the references link. | null | 2022-03-07T01:43:04.957054Z | 2022-02-27T03:04:51.433806Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5b1af71280abd82efbe28cd28d553363dfde0a34'} |
Linux | GSD-2022-1000589 | ASoC: max9759: fix underflow in speaker_gain_control_put() | ASoC: max9759: fix underflow in speaker_gain_control_put()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.22 by commit baead410e5db49e962a67fffc17ac30e44b50b7c, it was introduced in version v4.17 by commit fa8d915172b8c10ec0734c4021e99e9705023b07. For more details please see the references link. | null | 2022-03-07T01:55:41.450398Z | 2022-02-27T03:28:00.792732Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fa8d915172b8c10ec0734c4021e99e9705023b07'} |
Linux | GSD-2021-1001230 | udf: Fix NULL pointer dereference in udf_symlink function | udf: Fix NULL pointer dereference in udf_symlink function
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.3 by commit 5150877e4d99f85057a458daac7cd7c01005d5c6. For more details please see the references link. | null | 2021-12-19T22:18:25.526056Z | 2021-08-03T01:43:19.929363Z | null | null | null | null | null |
Linux | GSD-2022-1002330 | ubifs: Fix deadlock in concurrent rename whiteout and inode writeback | ubifs: Fix deadlock in concurrent rename whiteout and inode writeback
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit 9dddc8211430fb851ddf0b168e3a00c6f66cc185, it was introduced in version v4.9 by commit 9e0a1fff8db56eaaebb74b4a3ef65f86811c4798. For more details please see the references link. | null | 2022-04-25T03:10:58.664259Z | 2022-04-24T22:35:16.875054Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9e0a1fff8db56eaaebb74b4a3ef65f86811c4798'} |
Linux | GSD-2021-1001660 | hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field | hwmon: (w83793) Fix NULL pointer dereference by removing unnecessary structure field
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.71 by commit 7c4fd5de39f273626a2b0f3a446d2cc85cd47616. For more details please see the references link. | null | 2021-12-19T22:46:51.518Z | 2021-10-19T16:30:29.367577Z | null | null | null | null | null |
Linux | GSD-2021-1000972 | gfs2: Fix use-after-free in gfs2_glock_shrink_scan | gfs2: Fix use-after-free in gfs2_glock_shrink_scan
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.45 by commit a61156314b66456ab6a291ed5deba1ebd002ab3c. For more details please see the references link. | null | 2021-12-19T23:28:05.425024Z | 2021-06-30T00:30:08.494665Z | null | null | null | null | null |
Linux | GSD-2021-1000421 | i2c: sprd: fix reference leak when pm_runtime_get_sync fails | i2c: sprd: fix reference leak when pm_runtime_get_sync fails
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.119 by commit 7e1764312440c5df9dfe6b436035a03673b0c1b9, it was introduced in version v4.14 by commit 8b9ec0719834fe66146d138d62ed66cef025c864. For more details please see the references link. | null | 2021-12-19T22:22:12.977608Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8b9ec0719834fe66146d138d62ed66cef025c864'} |
Linux | GSD-2021-1000071 | virtiofs: fix memory leak in virtio_fs_probe() | virtiofs: fix memory leak in virtio_fs_probe()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.3 by commit 5116e79fc6e6725b8acdad8b7e928a83ab7b47e6, it was introduced in version v5.4 by commit a62a8ef9d97da23762a588592c8b8eb50a8deb6a. For more details please see the references link. | null | 2021-12-20T00:05:29.600585Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a62a8ef9d97da23762a588592c8b8eb50a8deb6a'} |
Linux | GSD-2021-1000564 | iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers | iio: adc: ad7124: Fix potential overflow due to non sequential channel numbers
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit 26da8040eccc6c6b0e415e9a3baf72fd39eb2fdc, it was introduced in version v5.5 by commit d7857e4ee1ba69732b16c73b2f2dde83ecd78ee4. For more details please see the references link. | null | 2021-12-19T22:56:03.179634Z | 2021-06-04T19:39:41.765440Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d7857e4ee1ba69732b16c73b2f2dde83ecd78ee4'} |
Linux | GSD-2021-1002559 | tcp: fix page frag corruption on page fault | tcp: fix page frag corruption on page fault
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.7 by commit 5a9afcd827cafe14a95c9fcbded2c2d104f18dfc, it was introduced in version v3.7 by commit 5640f7685831e088fe6c2e1f863a6805962f8e81. For more details please see the references link. | null | 2021-12-19T23:17:07.771590Z | 2021-12-19T19:42:38.402281Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/5640f7685831e088fe6c2e1f863a6805962f8e81'} |
Linux | GSD-2022-1001009 | scsi: mpt3sas: Fix use after free in _scsih_expander_node_remove() | scsi: mpt3sas: Fix use after free in _scsih_expander_node_remove()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.3 by commit 1bb8a7fc64d63ec818e367e1b37676ea2ef2d20c, it was introduced in version v5.11 by commit 7d310f241001e090cf1ec0f3ae836b38d8c6ebec. For more details please see the references link. | null | 2022-04-25T03:34:50.674036Z | 2022-04-24T20:39:18.259356Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7d310f241001e090cf1ec0f3ae836b38d8c6ebec'} |
Linux | GSD-2021-1000134 | usb: dwc3: core: Do core softreset when switch mode | usb: dwc3: core: Do core softreset when switch mode
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.36 by commit fce7bbcd07d59ac30dba8ce225316b3b4c1c7b50, it was introduced in version v4.12 by commit 41ce1456e1dbbc7355d0fcc10cf7c337c13def24. For more details please see the references link. | null | 2021-12-19T23:51:24.622518Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41ce1456e1dbbc7355d0fcc10cf7c337c13def24'} |
Linux | GSD-2021-1002109 | powerpc/idle: Don't corrupt back chain when going idle | powerpc/idle: Don't corrupt back chain when going idle
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.15 by commit 65ede7bd97138435c07de602efc8812c586a1d38, it was introduced in version v5.14.15 by commit 6d077c37c4643394b1bae9682da48164fc147ea8. For more details please see the references link. | null | 2021-11-14T15:20:16.588673Z | 2021-11-14T15:20:16.588673Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6d077c37c4643394b1bae9682da48164fc147ea8'} |
Linux | GSD-2022-1001459 | powerpc/kasan: Fix early region not updated correctly | powerpc/kasan: Fix early region not updated correctly
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.19 by commit de56beace6648065d404cd9835aa7d30e3df519d, it was introduced in version v5.4 by commit cbd18991e24fea2c31da3bb117c83e4a3538cd11. For more details please see the references link. | null | 2022-04-25T06:45:58.620395Z | 2022-04-24T21:14:52.198991Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/cbd18991e24fea2c31da3bb117c83e4a3538cd11'} |
Linux | GSD-2021-1001375 | net: fix uninit-value in caif_seqpkt_sendmsg | net: fix uninit-value in caif_seqpkt_sendmsg
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.199 by commit 452c3ed7bf63721b07bc2238ed1261bb26027e85, it was introduced in version v2.6.35 by commit bece7b2398d073d11b2e352405a3ecd3a1e39c60. For more details please see the references link. | null | 2021-12-19T23:26:47.784825Z | 2021-08-03T02:23:01.139717Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/bece7b2398d073d11b2e352405a3ecd3a1e39c60'} |
Linux | GSD-2022-1000618 | powerpc/32s: Fix kasan_init_region() for KASAN | powerpc/32s: Fix kasan_init_region() for KASAN
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.5 by commit d324727b0e5ae74cd5cd097cff37de627423a264, it was introduced in version v5.8 by commit 7974c4732642f710b5111165ae1f7f7fed822282. For more details please see the references link. | null | 2022-03-07T01:38:29.952485Z | 2022-02-27T03:31:55.729166Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7974c4732642f710b5111165ae1f7f7fed822282'} |
Linux | GSD-2021-1001725 | hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs | hwmon: (mlxreg-fan) Return non-zero value when fan current state is enforced from sysfs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit aa85fb7bde558bb2e364e85976b14b259c8b6fe8, it was introduced in version v4.19 by commit 65afb4c8e7e4e7e74b28efa1df62da503ca3e7a6. For more details please see the references link. | null | 2021-12-20T01:14:37.414025Z | 2021-10-19T16:33:39.588560Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/65afb4c8e7e4e7e74b28efa1df62da503ca3e7a6'} |
Linux | GSD-2021-1000837 | ftrace: Do not blindly read the ip address in ftrace_bug() | ftrace: Do not blindly read the ip address in ftrace_bug()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.273 by commit 4aedc2bc2b32c93555f47c95610efb89cc1ec09b, it was introduced in version v2.6.28 by commit 05736a427f7e16be948ccbf39782bd3a6ae16b14. For more details please see the references link. | null | 2021-12-20T01:38:44.832529Z | 2021-06-30T00:00:28.005382Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/05736a427f7e16be948ccbf39782bd3a6ae16b14'} |
Linux | GSD-2022-1002275 | jffs2: fix memory leak in jffs2_do_mount_fs | jffs2: fix memory leak in jffs2_do_mount_fs
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 0978e9af4559a171ac7a74a1b3ef21804b0a0fa9, it was introduced in version v2.6.15 by commit e631ddba588783edd521c5a89f7b2902772fb691. For more details please see the references link. | null | 2022-04-25T04:00:35.484057Z | 2022-04-24T22:29:14.294539Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/e631ddba588783edd521c5a89f7b2902772fb691'} |
Linux | GSD-2022-1000248 | KVM: x86: Forcibly leave nested virt when SMM state is toggled | KVM: x86: Forcibly leave nested virt when SMM state is toggled
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.19 by commit e302786233e6bc512986d007c96458ccf5ca21c7. For more details please see the references link. | null | 2022-02-19T10:00:45.306126Z | 2022-02-18T22:01:05.165544Z | null | null | null | null | null |
Linux | GSD-2021-1002220 | tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc | tty: tty_buffer: Fix the softlockup issue in flush_to_ldisc
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.293 by commit 0380f643f3a7a61b0845cdc738959c2ad5735d61. For more details please see the references link. | null | 2021-12-20T01:08:45.591245Z | 2021-11-29T02:34:01.279663Z | null | null | null | null | null |
Linux | GSD-2022-1000862 | io_uring: add a schedule point in io_add_buffers() | io_uring: add a schedule point in io_add_buffers()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.103 by commit 4a93c6594613c3429b6f30136fff115c7f803af4, it was introduced in version v5.7 by commit ddf0322db79c5984dc1a1db890f946dd19b7d6d9. For more details please see the references link. | null | 2022-03-18T04:23:05.729096Z | 2022-03-18T00:25:41.955359Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/ddf0322db79c5984dc1a1db890f946dd19b7d6d9'} |
Linux | GSD-2022-1001770 | ubifs: rename_whiteout: Fix double free for whiteout_ui->data | ubifs: rename_whiteout: Fix double free for whiteout_ui->data
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit 2ad07009c459e56ebdcc089d850d664660fdb742, it was introduced in version v4.9 by commit 9e0a1fff8db56eaaebb74b4a3ef65f86811c4798. For more details please see the references link. | null | 2022-04-25T05:12:46.612162Z | 2022-04-24T21:41:26.237621Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/9e0a1fff8db56eaaebb74b4a3ef65f86811c4798'} |
Linux | GSD-2021-1002670 | mac80211: track only QoS data frames for admission control | mac80211: track only QoS data frames for admission control
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.168 by commit 46b9e29db2012a4d2a40a26101862e002ccf387b, it was introduced in version v3.19 by commit 02219b3abca59fca81711bfe7ee78df7abad97ce. For more details please see the references link. | null | 2022-01-11T05:47:29.205415Z | 2021-12-27T05:35:50.334583Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/02219b3abca59fca81711bfe7ee78df7abad97ce'} |
Linux | GSD-2022-1001320 | firmware: sysfb: fix platform-device leak in error path | firmware: sysfb: fix platform-device leak in error path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit fed4df558b8cdb6f3beea38a7c977f118f082b0d, it was introduced in version v5.17 by commit 0589e8889dce8e0f0ea5bbf757f38865e2a469c1. For more details please see the references link. | null | 2022-04-25T04:57:57.895532Z | 2022-04-24T21:04:18.099506Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/0589e8889dce8e0f0ea5bbf757f38865e2a469c1'} |
Linux | GSD-2022-1000161 | PCI: pciehp: Fix infinite loop in IRQ handler upon power fault | PCI: pciehp: Fix infinite loop in IRQ handler upon power fault
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.177 by commit 464da38ba827f670deac6500a1de9a4f0f44c41d, it was introduced in version v5.4.69 by commit 4667358dab9cc07da044d5bc087065545b1000df. For more details please see the references link. | null | 2022-02-19T04:31:40.578326Z | 2022-02-18T21:48:48.866234Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/4667358dab9cc07da044d5bc087065545b1000df'} |
Linux | GSD-2022-1000531 | s390/cio: verify the driver availability for path_event call | s390/cio: verify the driver availability for path_event call
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit a0619027f11590b2070624297530c34dc7f91bcd, it was introduced in version v5.11 by commit 32ef938815c1fb42d65212aac860ab153a64de1a. For more details please see the references link. | null | 2022-03-07T01:55:15.095672Z | 2022-02-27T03:20:02.982651Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/32ef938815c1fb42d65212aac860ab153a64de1a'} |
Linux | GSD-2022-1000024 | binder: fix async_free_space accounting for empty parcels | binder: fix async_free_space accounting for empty parcels
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.224 by commit 7c7064402609aeb6fb11be1b4ec10673ff17b593, it was introduced in version v4.14 by commit 74310e06be4d74dcf67cd108366710dee5c576d5. For more details please see the references link. | null | 2022-01-11T05:52:26.406951Z | 2022-01-10T19:50:38.087912Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/74310e06be4d74dcf67cd108366710dee5c576d5'} |
Linux | GSD-2022-1002019 | coredump: Use the vma snapshot in fill_files_note | coredump: Use the vma snapshot in fill_files_note
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.110 by commit 558564db44755dfb3e48b0d64de327d20981e950, it was introduced in version v5.10 by commit a07279c9a8cd7dbd321640ff7210591599ee00a4. For more details please see the references link. | null | 2022-04-25T06:18:27.226294Z | 2022-04-24T22:03:18.591944Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a07279c9a8cd7dbd321640ff7210591599ee00a4'} |
Linux | GSD-2021-1001549 | i40e: Fix freeing of uninitialized misc IRQ vector | i40e: Fix freeing of uninitialized misc IRQ vector
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.211 by commit 60ad4cde0ad28921f9ea25b0201c774b95ffa4b4, it was introduced in version v4.15 by commit c17401a1dd210a5f22ab1ec7c7366037c158a14c. For more details please see the references link. | null | 2021-12-19T22:52:03.264260Z | 2021-10-19T16:23:18.055466Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/c17401a1dd210a5f22ab1ec7c7366037c158a14c'} |
Linux | GSD-2022-1000474 | dmaengine: ptdma: Fix the error handling path in pt_core_init() | dmaengine: ptdma: Fix the error handling path in pt_core_init()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.25 by commit 3e41445287afa3cf6d572778e5aab31d25e60a8d, it was introduced in version v5.15 by commit fa5d823b16a9442d609617abeec31da8b6afa224. For more details please see the references link. | null | 2022-03-07T01:43:36.886722Z | 2022-02-27T03:12:08.319804Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/fa5d823b16a9442d609617abeec31da8b6afa224'} |
Linux | GSD-2022-1002449 | NFSD: prevent underflow in nfssvc_decode_writeargs() | NFSD: prevent underflow in nfssvc_decode_writeargs()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.276 by commit 438068f4912183a59fcb6b7496a06437f7fd4e2b. For more details please see the references link. | null | 2022-04-25T05:17:53.743720Z | 2022-04-24T22:48:58.039623Z | null | null | null | null | null |
Linux | GSD-2021-1001119 | nilfs2: fix memory leak in nilfs_sysfs_delete_device_group | nilfs2: fix memory leak in nilfs_sysfs_delete_device_group
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.129 by commit d6f751ecccfb7a7b75e038a0ca052138dc52119b, it was introduced in version v3.17 by commit da7141fb78db915680616e15677539fc8140cf53. For more details please see the references link. | null | 2021-12-20T00:06:39.939113Z | 2021-07-08T01:57:35.482477Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/da7141fb78db915680616e15677539fc8140cf53'} |
Linux | GSD-2022-1000927 | xhci: Prevent futile URB re-submissions due to incorrect return value. | xhci: Prevent futile URB re-submissions due to incorrect return value.
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.14.269 by commit cd65dbb0b9adcf1a094886c4b8148da0380c1dcf, it was introduced in version v3.11 by commit 203a86613fb3bf2767335659513fa98563a3eb71. For more details please see the references link. | null | 2022-03-18T02:50:08.933985Z | 2022-03-18T00:32:52.062433Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/203a86613fb3bf2767335659513fa98563a3eb71'} |
Linux | GSD-2022-1001635 | ALSA: oss: Fix PCM OSS buffer allocation overflow | ALSA: oss: Fix PCM OSS buffer allocation overflow
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.18 by commit fb08bf99195a87c798bc8ae1357337a981faeade. For more details please see the references link. | null | 2022-04-25T04:17:20.339846Z | 2022-04-24T21:30:26.521616Z | null | null | null | null | null |
Linux | GSD-2021-1002365 | ALSA: pcm: oss: Fix negative period/buffer sizes | ALSA: pcm: oss: Fix negative period/buffer sizes
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.295 by commit be8869d388593e57223ad39297c8e54be632f2f2. For more details please see the references link. | null | 2021-12-20T00:46:11.306561Z | 2021-12-19T19:34:06.345253Z | null | null | null | null | null |
Linux | GSD-2021-1000358 | RDMA/qedr: Fix error return code in qedr_iw_connect() | RDMA/qedr: Fix error return code in qedr_iw_connect()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.37 by commit a12d75f5dcfbeb0557c79b036c780606dce99d60, it was introduced in version v5.5 by commit 82af6d19d8d9227c22a53ff00b40fb2a4f9fce69. For more details please see the references link. | null | 2021-12-20T00:54:32.266279Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/82af6d19d8d9227c22a53ff00b40fb2a4f9fce69'} |
Linux | GSD-2022-1001265 | media: usb: go7007: s2250-board: fix leak in probe() | media: usb: go7007: s2250-board: fix leak in probe()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.17.2 by commit 948ad5e5624487079c24cb5c81c74ddd02832440, it was introduced in version v3.10 by commit d3b2ccd9e307eae80b4b4eeb0ede46cb02212df2. For more details please see the references link. | null | 2022-04-25T08:29:57.739728Z | 2022-04-24T20:59:27.473406Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d3b2ccd9e307eae80b4b4eeb0ede46cb02212df2'} |
Linux | GSD-2021-1002735 | mac80211: track only QoS data frames for admission control | mac80211: track only QoS data frames for admission control
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.11 by commit 42d08e97b196479f593499e887a9ab81446a34b9, it was introduced in version v3.19 by commit 02219b3abca59fca81711bfe7ee78df7abad97ce. For more details please see the references link. | null | 2022-01-11T06:51:38.194208Z | 2021-12-27T05:45:30.263383Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/02219b3abca59fca81711bfe7ee78df7abad97ce'} |
Linux | GSD-2021-1000708 | net: usb: fix memory leak in smsc75xx_bind | net: usb: fix memory leak in smsc75xx_bind
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.4.271 by commit 200dbfcad8011e50c3cec269ed7b980836eeb1fa, it was introduced in version v2.6.34 by commit d0cad871703b898a442e4049c532ec39168e5b57. For more details please see the references link. | null | 2021-12-19T22:09:02.736349Z | 2021-06-04T20:07:06.940927Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d0cad871703b898a442e4049c532ec39168e5b57'} |
Linux | GSD-2021-1000067 | md/raid1: properly indicate failure when ending a failed write request | md/raid1: properly indicate failure when ending a failed write request
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.3 by commit 538244fba59fde17186322776247cd9c05be86dd, it was introduced in version v5.4 by commit eeba6809d8d58908b5ed1b5ceb5fcb09a98a7cad. For more details please see the references link. | null | 2021-12-20T01:23:45.290725Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/eeba6809d8d58908b5ed1b5ceb5fcb09a98a7cad'} |
Linux | GSD-2021-1000437 | regmap: set debugfs_name to NULL after it is freed | regmap: set debugfs_name to NULL after it is freed
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.119 by commit d8897f7b2283a500666c85ef06e820df38ed7b52, it was introduced in version v5.4.90 by commit 480c5e9c7e4c76c01d5f1f7b73832d7b77e6b427. For more details please see the references link. | null | 2021-12-19T23:41:52.504464Z | 2021-05-31T15:39:45.041586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/480c5e9c7e4c76c01d5f1f7b73832d7b77e6b427'} |
Linux | GSD-2021-1000964 | IB/mlx5: Fix initializing CQ fragments buffer | IB/mlx5: Fix initializing CQ fragments buffer
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.44 by commit 91f7fdc4cc10542ca1045c06aad23365f0d067e0, it was introduced in version v4.17 by commit 388ca8be00370db132464e27f745b8a0add19fcb. For more details please see the references link. | null | 2021-12-20T01:30:53.664331Z | 2021-06-30T00:29:38.298816Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/388ca8be00370db132464e27f745b8a0add19fcb'} |
Linux | GSD-2021-1001676 | xen/x86: fix PV trap handling on secondary processors | xen/x86: fix PV trap handling on secondary processors
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.10.70 by commit f79282849187604697b6c5944121c817a0d640e5, it was introduced in version v2.6.23 by commit f87e4cac4f4e940b328d3deb5b53e642e3881f43. For more details please see the references link. | null | 2021-12-20T01:21:31.530795Z | 2021-10-19T16:31:19.748493Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f87e4cac4f4e940b328d3deb5b53e642e3881f43'} |
Linux | GSD-2022-1002326 | ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl | ubi: Fix race condition between ctrl_cdev_ioctl and ubi_cdev_ioctl
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.238 by commit a8ecee49259f8f78d91ddb329ab2be7e6fd01974, it was introduced in version v4.8 by commit 714fb87e8bc05ff78255afc0dca981e8c5242785. For more details please see the references link. | null | 2022-04-25T06:13:15.162093Z | 2022-04-24T22:34:41.608681Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/714fb87e8bc05ff78255afc0dca981e8c5242785'} |
Linux | GSD-2021-1001226 | ubifs: Fix races between xattr_{set|get} and listxattr operations | ubifs: Fix races between xattr_{set|get} and listxattr operations
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.13.3 by commit c0756f75c22149d20fcb7d8409827cee905eb386, it was introduced in version v2.6.27 by commit 1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d. For more details please see the references link. | null | 2021-12-20T00:07:16.779587Z | 2021-08-03T01:41:48.990772Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/1e51764a3c2ac05a23a22b2a95ddee4d9bffb16d'} |
Linux | GSD-2022-1001859 | net: asix: add proper error handling of usb read errors | net: asix: add proper error handling of usb read errors
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.15.33 by commit b96a7265f763b37ff3138b9ca8122a950f13b00e, it was introduced in version v4.9 by commit d9fe64e511144c1ee7d7555b4111f09dde9692ef. For more details please see the references link. | null | 2022-04-25T05:19:11.043124Z | 2022-04-24T21:49:02.824322Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/d9fe64e511144c1ee7d7555b4111f09dde9692ef'} |
Linux | GSD-2022-1002263 | f2fs: fix missing free nid in f2fs_handle_failed_inode | f2fs: fix missing free nid in f2fs_handle_failed_inode
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.189 by commit 005f9cdab70c915702254c5eb67a8efced80e821, it was introduced in version v4.19 by commit 7735730d39d75e70476c1b01435b9b1f41637f0e. For more details please see the references link. | null | 2022-04-25T05:44:08.184160Z | 2022-04-24T22:27:59.371361Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7735730d39d75e70476c1b01435b9b1f41637f0e'} |
Linux | GSD-2021-1000821 | x86/kvm: Teardown PV features on boot CPU as well | x86/kvm: Teardown PV features on boot CPU as well
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.10 by commit d1629b5b925de9b27979e929dae7fcb766daf6b6, it was introduced in version by commit . For more details please see the references link. | null | 2021-12-20T01:13:20.273418Z | 2021-06-25T00:09:30.162698Z | null | null | null | null | null |
Linux | GSD-2021-1001733 | cpufreq: schedutil: Destroy mutex before kobject_put() frees the memory | cpufreq: schedutil: Destroy mutex before kobject_put() frees the memory
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.10 by commit e130f2ed1da99309db1e8893a39938ddd7c77312, it was introduced in version v5.14.10 by commit 8d62aec52a8c5b1d25a2364b243fcc5098a2ede9. For more details please see the references link. | null | 2021-10-19T16:34:02.967239Z | 2021-10-19T16:34:02.967239Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8d62aec52a8c5b1d25a2364b243fcc5098a2ede9'} |
Linux | GSD-2021-1001699 | usb: chipidea: ci_hdrc_imx: Also search for 'phys' phandle | usb: chipidea: ci_hdrc_imx: Also search for 'phys' phandle
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.14.12 by commit 66dd03b10e1c0b2fae006c6e34c18ea8ee033e7b, it was introduced in version v5.8 by commit 746f316b753a83e366bfc5f936cbf0d72d1c2d1d. For more details please see the references link. | null | 2021-12-19T22:58:10.373272Z | 2021-10-19T16:32:27.741938Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/746f316b753a83e366bfc5f936cbf0d72d1c2d1d'} |
Linux | GSD-2021-1001363 | scsi: libfc: Fix array index out of bound exception | scsi: libfc: Fix array index out of bound exception
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.19.199 by commit 4921b1618045ffab71b1050bf0014df3313a2289. For more details please see the references link. | null | 2021-12-19T23:54:01.281868Z | 2021-08-03T02:19:14.042708Z | null | null | null | null | null |
Linux | GSD-2021-1000122 | bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue | bus: mhi: pci_generic: Remove WQ_MEM_RECLAIM flag from state workqueue
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.11.20 by commit abd1510c08a13c88d24b622a83c82e87ff1d3135, it was introduced in version v5.11 by commit 8f70397876872789b2a5deba804eb6216fb5deb7. For more details please see the references link. | null | 2021-12-19T22:50:48.656984Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/8f70397876872789b2a5deba804eb6216fb5deb7'} |
Linux | GSD-2021-1000088 | ovl: fix leaked dentry | ovl: fix leaked dentry
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.2 by commit d587cfaef72b1b6f4b2774827123bce91f497cc8, it was introduced in version v5.8 by commit 6815f479ca90ee7fd2e28b2a420f796b974155fe. For more details please see the references link. | null | 2021-12-20T00:54:23.675150Z | 2021-05-31T15:39:45.031586Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/6815f479ca90ee7fd2e28b2a420f796b974155fe'} |
Linux | GSD-2021-1000572 | NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return() | NFSv4: Fix a NULL pointer dereference in pnfs_mark_matching_lsegs_return()
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.12.9 by commit b090d110e66636bca473fd8b98d5c97b555a965a, it was introduced in version v5.12.3 by commit 7e65ea887d0c0997f3053acd91a027af45e71c5b. For more details please see the references link. | null | 2021-12-19T22:51:18.945849Z | 2021-06-04T19:40:52.864550Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/7e65ea887d0c0997f3053acd91a027af45e71c5b'} |
Linux | GSD-2022-1000527 | iio: buffer: Fix file related error handling in IIO_BUFFER_GET_FD_IOCTL | iio: buffer: Fix file related error handling in IIO_BUFFER_GET_FD_IOCTL
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.10 by commit 202071d2518537866d291aa7cf26af54e674f4d4, it was introduced in version v5.13 by commit f73f7f4da581875f9b1f2fb8ebd1ab15ed634488. For more details please see the references link. | null | 2022-03-07T01:51:05.969782Z | 2022-02-27T03:19:35.773986Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/f73f7f4da581875f9b1f2fb8ebd1ab15ed634488'} |
Linux | GSD-2022-1000177 | moxart: fix potential use-after-free on remove path | moxart: fix potential use-after-free on remove path
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.179 by commit 3a0a7ec5574b510b067cfc734b8bdb6564b31d4e. For more details please see the references link. | null | 2022-02-19T10:59:42.800144Z | 2022-02-18T21:51:23.918998Z | null | null | null | null | null |
Linux | GSD-2022-1001336 | KVM: avoid NULL pointer dereference in kvm_dirty_ring_push | KVM: avoid NULL pointer dereference in kvm_dirty_ring_push
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.16.20 by commit a1f48251918d825785af9cab83996d4c12ef795a. For more details please see the references link. | null | 2022-04-25T05:15:59.249273Z | 2022-04-24T21:05:32.543704Z | null | null | null | null | null |
Linux | GSD-2021-1002666 | mac80211: validate extended element ID is present | mac80211: validate extended element ID is present
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v5.4.168 by commit a19cf6844b509d44ecbd536f33d314d91ecdd2b5, it was introduced in version v4.19 by commit 41cbb0f5a29592874355e4159489eb08337cd50e. For more details please see the references link. | null | 2022-01-11T05:52:54.922262Z | 2021-12-27T05:35:15.643966Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/41cbb0f5a29592874355e4159489eb08337cd50e'} |
Linux | GSD-2021-1001949 | comedi: ni_usb6501: fix NULL-deref in command paths | comedi: ni_usb6501: fix NULL-deref in command paths
This is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.
This ID is fixed in Linux Kernel version v4.9.290 by commit aa39738423503825625853b643b9e99d11c23816, it was introduced in version v3.18 by commit a03bb00e50ab4c07107da58a52a0bff7943f360c. For more details please see the references link. | null | 2021-12-20T01:16:03.796979Z | 2021-11-14T15:13:03.931225Z | null | null | null | null | {'https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux//commit/a03bb00e50ab4c07107da58a52a0bff7943f360c'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.