1 | ID | Flag submission time | Flags | 0-day / 1-day | LTS slot | COS slot | Patch commit | Patch commit title | CVE | Notes | Syzkaller reference | Exploit hash | Patch commit submission time | Last modification | Flag capture times |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2 | exp257 | 2025-02-10T07:08:14.970Z | kernelCTF{v2:lts-6.6.75:io_uring:1739151644} | 0-day | (io_uring LTS promotion between 2024-12-13 - 2025-02-26) | 6691d97e928ffa4158063e121b5ce540ad5dca28971183b65874053cbd31b22c | 2025-02-10T07:08:14.970Z | 2025-02-10T01:40:44.000Z | |||||||
3 | exp256 | 2025-02-10T02:20:23.829Z | kernelCTF{v2:lts-6.6.75:io_uring:1739151644} | 0-day | (io_uring LTS promotion between 2024-12-13 - 2025-02-26) | cb1500e4450c7d6f5a4c23cfb392ad3a0d5b9cf9f7d32d27950840680a4b34a5 | 2025-02-10T06:46:50.008Z | 2025-02-10T01:40:44.000Z | |||||||
4 | exp255 | 2025-02-08T04:10:28.252Z | kernelCTF{v2:lts-6.6.66:io_uring:1738987489} | 1-day | (io_uring LTS promotion between 2024-12-13 - 2025-02-26) | 1220017d4cc51858c77f611ed04579dbb834b27db536925d8bdf88a5e4a5e7c9 | 2025-02-08T04:10:28.252Z | 2025-02-08T04:04:49.000Z | |||||||
5 | exp254 | 2025-02-07T12:42:08.288Z | kernelCTF{v1:cos-109-17800.436.14:1738932066} | 1-day | (dupe) | 75c177cd3479a422f19b41a697787e1c2efe529ee776ec432f951228d0f299bf | 2025-02-07T12:42:08.288Z | 2025-02-07T12:41:06.000Z | |||||||
6 | exp253 | 2025-02-07T12:03:24.982Z | kernelCTF{v1:cos-109-17800.436.14:1738929777} | 0-day | (dupe) | fab190e52e4d233c4349bcd3d5799f6985ef4d58fa10d81239ad91f1fef60585 | 2025-02-07T12:03:24.982Z | 2025-02-07T12:02:57.000Z | |||||||
7 | exp252 | 2025-02-07T12:01:58.784Z | kernelCTF{v1:cos-109-17800.436.14:1738929657} | 1-day | cos-109-17800.436.14 (not final, needs to be verified manually) | bca71f040582cd795f7658efcd16350b977624e1b7e50f01ce815d9964e81a86 | 2025-02-07T12:01:58.784Z | 2025-02-07T12:00:57.000Z | |||||||
8 | exp251 | 2025-02-07T12:01:38.535Z | kernelCTF{v1:lts-6.6.75:1738929615} | 0-day | (dupe) | 8d1ba2ab27c7f60c899ec6d9e323bebc376a781fec891921fa8ed3f0a96282f7 | 2025-02-07T12:01:38.535Z | 2025-02-07T12:00:15.000Z | |||||||
9 | exp250 | 2025-02-07T12:00:56.011Z | kernelCTF{v1:lts-6.6.75:1738929604} | 0-day | (dupe) | d142bc0348b7e4bac82d803b44c2f9114128201324f22875b69a9de8d29955e7 | 2025-02-07T12:00:56.011Z | 2025-02-07T12:00:04.000Z | |||||||
10 | exp249 | 2025-02-07T12:00:39.948Z | kernelCTF{v1:lts-6.6.75:1738929605} | 1-day | lts-6.6.75 (not final, needs to be verified manually) | acc1b9d0672283ae6634461c2ff2ae75d4b6f438357cd3cbad4a9cd1d5b4dae2 | 2025-02-07T12:00:39.948Z | 2025-02-07T12:00:05.000Z | |||||||
11 | exp248 | 2025-01-24T12:23:22.338Z | kernelCTF{v1:cos-109-17800.372.99:1737720991} | 0-day | (dupe) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=638ba5089324796c2ee49af10427459c2de35f71 | 6cb431495301d409301c81d882b54d99cfbd9651287b4b23a7e966e657053a37 | 2025-02-10T05:06:42.242Z | 2025-02-10T05:06:42.242Z | 2025-01-24T12:16:31.000Z | |||||
12 | exp247 | 2025-01-24T12:02:56.585Z | kernelCTF{v1:lts-6.6.71:1737720127} | 0-day | (dupe) | 31a9b6b632dd1c0e8f09ac47a74c105f6cffb60c5607a2f487c866e089ac0a54 | 2025-01-24T12:02:56.585Z | 2025-01-24T12:02:07.000Z | |||||||
13 | exp246 | 2025-01-24T12:02:44.060Z | kernelCTF{v1:cos-109-17800.372.99:1737720140} | 1-day | (dupe) | 1ed4086a377c8644358a4d315f0f22da3828185677e21f5df303eb500ba96ac8 | 2025-01-24T12:02:44.060Z | 2025-01-24T12:02:20.000Z | |||||||
14 | exp245 | 2025-01-24T12:02:03.079Z | kernelCTF{v1:cos-109-17800.372.99:1737720030} | 0-day | cos-109-17800.372.99 | 0cd713179f42671d6cc73167fb281183dc7b0e293d168bab7c8fdd42af02da06 | 2025-01-24T12:02:03.079Z | 2025-01-24T12:00:30.000Z | |||||||
15 | exp244 | 2025-01-24T12:01:30.626Z | kernelCTF{v1:lts-6.6.71:1737720004} | 0-day | (dupe) | 5385f7627fe0e784cc477a73aca990782a70d08643302674721d2588c7bebdb5 | 2025-01-24T12:01:30.626Z | 2025-01-24T12:00:04.000Z | |||||||
16 | exp243 | 2025-01-24T12:01:20.769Z | kernelCTF{v1:lts-6.6.71:1737720008} | 1-day | (dupe) | 02b03b8a059931ee1fc648d4264d349acb92ebbb97f23644fbcbd3ea7bd03ed1 | 2025-01-24T12:01:20.769Z | 2025-01-24T12:00:08.000Z | |||||||
17 | exp242 | 2025-01-24T12:01:20.206Z | kernelCTF{v1:lts-6.6.71:1737720005} | 1-day | (dupe) | c56f1b55803a5e301a83767daa1fb17a6e7c0589a58289749acd31b50c49b438 | 2025-01-24T12:01:20.206Z | 2025-01-24T12:00:05.000Z | |||||||
18 | exp241 | 2025-01-24T12:01:16.371Z | kernelCTF{v1:lts-6.6.71:1737720004} | 0-day | lts-6.6.71 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=12e070eb6964b341b41677fd260af5a305316a1f | 8f60eb6a92b6a07a12b9c9dc709e9d17556293429e8e4108931959d96a733173 | 2025-01-25T15:29:20.650Z | 2025-01-25T15:29:20.650Z | 2025-01-24T12:00:04.000Z | |||||
19 | exp240 | 2025-01-24T11:48:41.659Z | kernelCTF{v1:mitigation-v3b-6.1.55:1737719308} | 0-day | 3bc9f2f9988b8287a0e83ea8c7ce4d6c9415c60fd6a7ef049f1b2bb5f06ed305 | 2025-01-24T11:48:41.659Z | 2025-01-24T11:48:28.000Z | ||||||||
20 | 2025-01-24T06:11:58.028Z | invalid flag (signature error) | 0-day | 31a9b6b632dd1c0e8f09ac47a74c105f6cffb60c5607a2f487c866e089ac0a54 | 2025-01-24T06:11:58.028Z | ||||||||||
21 | exp239 | 2025-01-17T12:01:41.244Z | kernelCTF{v1:lts-6.6.69:1737115282} | 0-day | (dupe) | 18309b169ceb6fca8ac6ae88b83dddae0637e390f173d5abe5eff7da8b18d797 | 2025-01-17T12:01:41.244Z | 2025-01-17T12:01:22.000Z | |||||||
22 | exp238 | 2025-01-17T11:36:45.979Z | kernelCTF{v1:lts-6.6.69:1737113789} | 0-day | (dupe) | 854558fe8433430d9a0bb7380507ca5a3b03b550dee1d1100a4a015e537646a9 | 2025-01-17T11:36:45.979Z | 2025-01-17T11:36:29.000Z | |||||||
23 | exp237 | 2025-01-17T08:54:30.881Z | kernelCTF{v1:cos-105-17412.495.75:1737102254} | 1-day | cos-105-17412.495.75 (not final, needs to be verified manually) | aa2cb07f8c8b039a5f87f866894159a83806ea46fbc4c3b86d7a1c1439720783 | 2025-01-17T08:54:30.881Z | 2025-01-17T08:24:14.000Z | |||||||
24 | exp236 | 2025-01-17T05:42:43.856Z | kernelCTF{v2:cos-109-17800.372.84:io_uring:1737092378} | 0-day | (io_uring LTS promotion between 2024-12-13 - 2025-02-26) | 5dd09ea9c4e4aae05c2a39d67856e6e049cf3b067beb66d3ff5dbb97a19398e4 | 2025-01-17T05:42:43.856Z | 2025-01-17T05:39:38.000Z | |||||||
25 | exp235 | 2025-01-17T01:28:11.087Z | kernelCTF{v2:lts-6.6.69:io_uring:1737076911} | 0-day | (io_uring LTS promotion between 2024-12-13 - 2025-02-26) | 681ca4369608d3f86fe76bca8d67e12485245fefe6e2408d1008dbbde546083f | 2025-01-17T01:28:11.087Z | 2025-01-17T01:21:51.000Z | |||||||
26 | exp234 | 2025-01-10T12:01:45.109Z | kernelCTF{v1:cos-109-17800.372.84:1736510422} | 0-day | cos-109-17800.372.84 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=647cef20e649c576dff271e018d5d15d998b629d | 731b87603e17205aebecef80b4282cee24952d61cc98426e10214db9e21c8898 | 2025-02-10T09:04:28.044Z | 2025-02-10T09:04:28.044Z | 2025-01-10T12:00:22.000Z | |||||
27 | exp233 | 2025-01-10T12:01:00.219Z | kernelCTF{v1:lts-6.6.69:1736510410} | 0-day | (dupe) | 07eecaf66d45fc9cd28897593e9f02b0801c71416db821896a22603aebd07b53 | 2025-01-10T12:07:34.260Z | 2025-01-10T12:00:10.000Z | |||||||
28 | exp232 | 2025-01-10T12:00:54.485Z | kernelCTF{v1:lts-6.6.69:1736510404} | 0-day | (dupe) | 4b24333b0e166172e8bebc7f16f87381dc6ee9e49aabf00e2698b4c29c9e8927 | 2025-01-10T12:00:54.485Z | 2025-01-10T12:00:04.000Z | |||||||
29 | exp231 | 2025-01-10T12:00:41.699Z | kernelCTF{v1:lts-6.6.69:1736510405} | 0-day | (dupe) | be20a96877249a4508016b3eccc768f11ef8eab26ee33987008cad551ab7ffd4 | 2025-01-10T12:00:41.699Z | 2025-01-10T12:00:05.000Z | |||||||
30 | exp230 | 2025-01-10T12:00:41.041Z | kernelCTF{v1:lts-6.6.69:1736510404} | 0-day | (dupe) | 9c809957f399b6b16e153fdbbdb87dc994450456170a3a40ac0a312f4c350f23 | 2025-01-10T12:00:41.041Z | 2025-01-10T12:00:04.000Z | |||||||
31 | exp229 | 2025-01-10T12:00:35.136Z | kernelCTF{v1:lts-6.6.69:1736510404} | 0-day | lts-6.6.69 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=638ba5089324796c2ee49af10427459c2de35f71 | 97886210a02d4fa461ef58efc701caf0a32f680ecd6a3a0b6f83ca2ed0abf2a2 | 2025-02-10T05:05:45.617Z | 2025-02-10T05:05:45.617Z | 2025-01-10T12:00:04.000Z | |||||
32 | exp228 | 2025-01-02T10:00:18.363Z | kernelCTF{v1:mitigation-v4-6.6:1735810865} | 1-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6fa1066fc5d00cb9f1b0e83b7ff6ef98d26ba2aa | mm/mremap: fix move_normal_pmd/retract_page_tables race | CVE-2024-50066 | fe2ab4b342e080f586db3ec72714bc5cb00dd79ddda4ab304fa8c3ce82863874 | 2025-01-02T10:00:18.363Z | 2025-01-02T10:00:18.363Z | 2025-01-02T09:41:05.000Z | ||||
33 | exp227 | 2024-12-30T07:18:56.765Z | kernelCTF{v1:mitigation-v3b-6.1.55:1735542805} | 0-day | 966f3c83e69b95e22b4a168c17e5e9771ae3ef482ad6adce4744eb60114351ee | 2024-12-30T07:18:56.765Z | 2024-12-30T07:13:25.000Z | ||||||||
34 | exp226 | 2024-12-27T12:10:20.436Z | kernelCTF{v1:cos-109-17800.372.71:1735300810} | 0-day | (dupe) | 849904e0d485726a665541a3faff7e2b121ee6614b78e75f2bdd6db26295459d | 2024-12-27T12:10:20.436Z | 2024-12-27T12:00:10.000Z | |||||||
35 | exp225 | 2024-12-27T12:07:14.853Z | kernelCTF{v1:cos-109-17800.372.71:1735301186} | 0-day | cos-109-17800.372.71 | fb05756dec4a2bdf6a59467da9932ab81a846faac71129f18ff3eb5029e1b266 | 2024-12-27T12:07:14.853Z | 2024-12-27T12:06:26.000Z | |||||||
36 | 2024-12-27T12:05:01.617Z | invalid flag (signature error) | 0-day | 554fb4be0f598dbfc27f6b68fdda7ae2774dbacb912e4a9e40563c082f5ee768 | 2024-12-27T12:05:01.617Z | ||||||||||
37 | exp224 | 2024-12-27T12:03:48.026Z | kernelCTF{v1:cos-105-17412.495.73:1735300944} kernelCTF{v1:mitigation-v3b-6.1.55:1734950374} | 0-day | cos-105-17412.495.73 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc50835e83f60f56e9bec2b392fb5544f250fb6f | 9da7ae9d8ffb6420126aed9ab6988a3a838e0465fc904393f7d0dbe0d88bd6e4 | 2025-01-30T07:26:45.804Z | 2025-01-30T07:26:45.804Z | 2024-12-27T12:02:24.000Z 2024-12-23T10:39:34.000Z | |||||
38 | exp223 | 2024-12-27T12:01:55.601Z | kernelCTF{v1:lts-6.6.66:1735300904} | 1-day | (dupe) | 081424db670e01c2f3168cb91cb18833bd36146487de97f641c392ac3810e73e | 2024-12-27T12:01:55.601Z | 2024-12-27T12:01:44.000Z | |||||||
39 | exp222 | 2024-12-27T12:01:55.770Z | kernelCTF{v1:lts-6.6.66:1735300822} | 0-day | (dupe) | 70053df6c43c5ddea5c7460bd4129bde75bff1572aa4e3230f8d525bd1f098e1 | 2024-12-27T12:01:55.770Z | 2024-12-27T12:00:22.000Z | |||||||
40 | exp221 | 2024-12-27T12:01:50.854Z | kernelCTF{v1:lts-6.6.66:1735300879} | 0-day | (dupe) | aa4c46fb35746e4d32d88986dd2f9a235db5361a3ef252946289ccf51a640ebe | 2024-12-27T12:01:50.854Z | 2024-12-27T12:01:19.000Z | |||||||
41 | exp220 | 2024-12-27T12:00:57.970Z | kernelCTF{v1:lts-6.6.66:1735300833} | 1-day | (dupe) | 8b09b38d8bc3e526c519d7597ef8502e39a8e7a7e1fc6820a317de878e08e233 | 2024-12-27T12:00:57.970Z | 2024-12-27T12:00:33.000Z | |||||||
42 | exp219 | 2024-12-27T12:00:37.241Z | kernelCTF{v1:lts-6.6.66:1735300805} | 0-day | lts-6.6.66 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc50835e83f60f56e9bec2b392fb5544f250fb6f | b63b1b022eed44a1e8a22b03e9aaac01aa082daee26d1de82a835ce4e9caa8fe | 2025-01-30T07:29:45.574Z | 2025-01-30T07:29:45.574Z | 2024-12-27T12:00:05.000Z | |||||
43 | exp218 | 2024-12-24T14:33:23.305Z | kernelCTF{v1:mitigation-v3b-6.1.55:1735048115} | 1-day | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=382c27f4ed28f803b1f1473ac2d8db0afc795a1b | perf: Fix perf_event_validate_size() | CVE-2023-6931 | 3cf79086723c838c8cbe3d17c2d5ad6c3badd96e4372ae420ab360ccaf8e7d83 | 2024-12-24T14:33:23.305Z | 2024-12-25T04:57:48.986Z | 2024-12-24T13:48:35.000Z | ||||
44 | exp217 | 2024-12-22T12:07:27.892Z | kernelCTF{v1:cos-109-17800.372.64:1734867417} | 0-day | (dupe) | 14203b21502773cfe71ffd624c4ff4cfc579a275703e24660a97eb09000ab91c | 2024-12-22T12:07:27.892Z | 2024-12-22T11:36:57.000Z | |||||||
45 | exp216 | 2024-12-21T04:04:55.896Z | kernelCTF{v1:cos-109-17800.372.64:1734753555} | 0-day | (dupe) | bb001b4163aee18060203f1496b414f7d5f3b0a01b719a13299f8348591bd195 | 2024-12-21T04:04:55.896Z | 2024-12-21T03:59:15.000Z | |||||||
46 | exp215 | 2024-12-19T03:41:54.045Z | kernelCTF{v1:lts-6.6.64:1734577611} | 1-day | (dupe) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f8d4bc455047cf3903cd6f85f49978987dbb3027 | net/sched: netem: account for backlog updates from child qdisc | CVE-2024-56770 | fed3500896544f95d075af5072ffe83e7ff7181c6c1c2e770dd9f7b742c9704c | 2024-12-19T03:41:54.045Z | 2024-12-19T03:41:54.045Z | 2024-12-19T03:06:51.000Z | |||
47 | exp214 | 2024-12-18T23:04:07.290Z | kernelCTF{v1:mitigation-v4-6.6:1734562384} kernelCTF{v1:cos-109-17800.372.64:1734561991} | 1-day | cos-109-17800.372.64 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f8d4bc455047cf3903cd6f85f49978987dbb3027 | net/sched: netem: account for backlog updates from child qdisc | CVE-2024-56770 | ca571401106ad722a0516c511194f3cfd8d313860b5cb536b3ce4eee4eb571c0 | 2024-12-18T23:04:07.290Z | 2024-12-18T23:04:07.290Z | 2024-12-18T22:53:04.000Z 2024-12-18T22:46:31.000Z | |||
48 | exp213 | 2024-12-13T12:01:47.216Z | kernelCTF{v1:lts-6.6.64:1734091232} | 0-day | lts-6.6.64 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=647cef20e649c576dff271e018d5d15d998b629d | c76082d1f3bf16c614f3a31b87571cdb2e4f1e7d1b9a70732f39ef16ef8c6a06 | 2025-02-10T08:41:42.628Z | 2025-02-10T08:41:42.628Z | 2024-12-13T12:00:32.000Z | |||||
49 | exp212 | 2024-12-13T12:00:49.237Z | kernelCTF{v2:mitigation-v4-6.6:io_uring:1734091205} | 1-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=820d070feb668aab5bc9413c285a1dda2a70e076 | io_uring: don't allow discontig pages for IORING_SETUP_NO_MMAP | CVE-2023-6560 | fb85071818329e7a25e12316f65ec8dc82d95adf377feec6ffa3f0fb59e74efe | 2024-12-13T12:00:49.237Z | 2024-12-13T12:00:49.237Z | 2024-12-13T12:00:05.000Z | ||||
50 | exp211 | 2024-12-13T12:00:18.489Z | kernelCTF{v2:mitigation-v4-6.6:io_uring:1734091204} | 1-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c392cbecd8eca4c53f2bf508731257d9d0a21c2d | io_uring/kbuf: defer release of mapped buffer rings | CVE-2024-0582 | 01b64735faeb10cf7b49d2e73ebf89b2a02c714ddcdf726bd7e1eb04128fe069 | 2024-12-13T12:00:18.489Z | 2024-12-13T12:00:18.489Z | 2024-12-13T12:00:04.000Z | ||||
51 | exp210 | 2024-12-13T12:00:16.989Z | kernelCTF{v1:lts-6.6.64:1734091205} | 1-day | (vuln dupe of exp199) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5eb7de8cd58e73851cd37ff8d0666517d9926948 | net: sched: fix ordering of qlen adjustment | CVE-2024-53164 | db90f03a383d9c335d962775b8a59de0ab10dfba72f98b7e087acce6bc064333 | 2024-12-16T10:45:58.913Z | 2024-12-16T10:45:58.913Z | 2024-12-13T12:00:05.000Z | |||
52 | exp209 | 2024-12-04T17:34:52.840Z | kernelCTF{v1:cos-105-17412.495.37:1733328146} kernelCTF{v1:mitigation-v3b-6.1.55:1733333537} | 1-day | cos-105-17412.495.37 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5eb7de8cd58e73851cd37ff8d0666517d9926948 | net: sched: fix ordering of qlen adjustment | CVE-2024-53164 | 0cf57460205c4c0cd278987089ced4fe86432920bcc58e86e1c9701b54d84fc5 | 2024-12-16T10:50:20.685Z | 2024-12-16T10:50:20.685Z | 2024-12-04T16:02:26.000Z 2024-12-04T17:32:17.000Z | |||
53 | exp208 | 2024-11-29T12:06:00.778Z | kernelCTF{v1:cos-109-17800.372.38:1732881707} | 1-day | cos-109-17800.372.38 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f8d4bc455047cf3903cd6f85f49978987dbb3027 | net/sched: netem: account for backlog updates from child qdisc | CVE-2024-56770 | 44b054e3f5a1c4522b660b84fe2e846cd67541e53c5fe3d4db1fd1af362c9f12 | 2024-12-19T05:14:52.953Z | 2024-12-19T05:14:52.953Z | 2024-11-29T12:01:47.000Z | |||
54 | exp207 | 2024-11-29T12:00:23.268Z | kernelCTF{v1:lts-6.6.62:1732881605} | 0-day | (dupe) | bdea61f7056e1db41c2fe65cf3391b1f2309fd1d5e04131ce3b2ce52336569ed | 2024-11-29T12:00:23.268Z | 2024-11-29T12:00:05.000Z | |||||||
55 | exp206 | 2024-11-29T12:00:20.823Z | kernelCTF{v1:lts-6.6.62:1732881605} | 1-day | (dupe) | 27c45f6352bb27bda1591cb6424829d0b96d5ca615f4d667a953739b182a5a3a | 2024-11-29T12:00:20.823Z | 2024-11-29T12:00:05.000Z | |||||||
56 | exp205 | 2024-11-29T12:00:19.970Z | kernelCTF{v1:lts-6.6.62:1732881605} | 1-day | lts-6.6.62 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=35f56c554eb1b56b77b3cf197a6b00922d49033d | netfilter: ipset: add missing range check in bitmap_ip_uadt | CVE-2024-53141 | 3a125bc09c2d828e81d89eba25882c69e33a49e9b65b00fa70def119e219021e | 2024-11-29T12:02:19.720Z | 2024-11-29T12:02:19.720Z | 2024-11-29T12:00:05.000Z | |||
57 | exp204 | 2024-11-29T05:40:09.313Z | kernelCTF{v1:mitigation-v3b-6.1.55:1732857935} | 1-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/events?id=32671e3799ca2e4590773fd0e63aaa4229e50c06 | perf: Disallow mis-matched inherited group reads | CVE-2023-5717 | 4884ca7e00afdef0c0d19267208e8581d4219dba7ea5046299302cf065e7cf2b | 2024-11-29T05:40:09.313Z | 2024-11-29T05:40:09.313Z | 2024-11-29T05:25:35.000Z | ||||
58 | exp203 | 2024-11-27T17:53:00.546Z | kernelCTF{v1:mitigation-v3b-6.1.55:1732729647} | 1-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f8d4bc455047cf3903cd6f85f49978987dbb3027 | net/sched: netem: account for backlog updates from child qdisc | CVE-2024-56770 | f143bf8cdb06571a50a87b2765c19d546991f105787b4de55d256d4380353121 | 2024-12-19T05:13:47.667Z | 2024-12-19T05:13:47.667Z | 2024-11-27T17:47:27.000Z | ||||
59 | exp202 | 2024-11-22T10:42:48.261Z | kernelCTF{v1:cos-109-17800.372.31:1732271905} kernelCTF{v1:mitigation-v3b-6.1.55:1732271879} | 1-day | cos-109-17800.372.31 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=35f56c554eb1b56b77b3cf197a6b00922d49033d | netfilter: ipset: add missing range check in bitmap_ip_uadt | CVE-2024-53141 | f07583db9cee06c3314a39f0efcbdb5143839ddf05d41344a3d18e8ecee9e77b | 2024-11-25T07:44:35.621Z | 2024-11-25T07:44:35.621Z | 2024-11-22T10:38:25.000Z 2024-11-22T10:37:59.000Z | |||
60 | exp201 | 2024-11-15T12:04:53.679Z | kernelCTF{v1:lts-6.6.60:1731672198} | 0-day | (dupe) | 344d116c0624db5fed121541933d302d35e87b7b9a13d55a2e24fc6fc51a8168 | 2024-11-15T12:04:53.679Z | 2024-11-15T12:03:18.000Z | |||||||
61 | exp200 | 2024-11-15T12:02:32.242Z | kernelCTF{v1:cos-105-17412.495.28:1731672091} kernelCTF{v1:mitigation-v3b-6.1.55:1731658117} | 0-day | cos-105-17412.495.28 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5eb7de8cd58e73851cd37ff8d0666517d9926948 | net: sched: fix ordering of qlen adjustment | CVE-2024-53164 | 82a006059be040b965508998210758bc8bf37597dc1348e7ad6f3208dfa69639 | 2024-12-16T07:48:54.917Z | 2024-12-16T07:48:54.917Z | 2024-11-15T12:01:31.000Z 2024-11-15T08:08:37.000Z | |||
62 | exp199 | 2024-11-15T12:00:26.031Z | kernelCTF{v1:lts-6.6.60:1731672006} | 0-day | lts-6.6.60 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5eb7de8cd58e73851cd37ff8d0666517d9926948 | net: sched: fix ordering of qlen adjustment | CVE-2024-53164 | eec6bc194c43fba001506de2b0161c387d8b40d89b370b0bfc42a98cde782ac9 | 2024-12-16T07:54:24.388Z | 2024-12-16T07:54:24.388Z | 2024-11-15T12:00:06.000Z | |||
63 | exp198 | 2024-11-05T07:37:51.274Z | kernelCTF{v1:mitigation-v3b-6.1.55:1730717209} | 1-day | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=382c27f4ed28f803b1f1473ac2d8db0afc795a1b | perf: Fix perf_event_validate_size() | CVE-2023-6931 | 380c557dfaaa36977485030c340ff54ad0a4187e522506f3a1c0ab530acb49dd | 2024-11-05T07:37:51.274Z | 2024-11-05T08:12:00.108Z | 2024-11-04T10:46:49.000Z | ||||
64 | exp197 | 2024-10-21T10:38:51.378Z | kernelCTF{v1:cos-109-17800.309.84:1729506282} | 0-day | cos-109-17800.309.84 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/vmw_vsock?id=6ca575374dd9a507cdd16dfa0e78c2e9e20bd05f | vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans | CVE-2024-50264 | 221c2ff8a687904902cb3c8be8f86c8b44a8be59c3ac5ba821c21845b2029198 | 2024-11-13T12:34:37.240Z | 2024-11-13T12:34:37.240Z | 2024-10-21T10:24:42.000Z | |||
65 | exp196 | 2024-10-20T13:36:14.358Z | kernelCTF{v1:lts-6.6.56:1729430867} | 0-day | lts-6.6.56 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/vmw_vsock?id=6ca575374dd9a507cdd16dfa0e78c2e9e20bd05f | vsock/virtio: Initialization of the dangling pointer occurring in vsk->trans | CVE-2024-50264 | 7968cd1f134b82cbc488496fc129bc168c71711ee474c773bc44268934e14fab | 2024-11-13T12:36:07.533Z | 2024-11-13T12:36:07.533Z | 2024-10-20T13:27:47.000Z | |||
66 | exp195 | 2024-10-09T20:14:55.557Z | kernelCTF{v1:mitigation-v3-6.1.55:1728504436} kernelCTF{v1:lts-6.6.52:1728504270} kernelCTF{v1:cos-109-17800.309.59:1728504017} | 0-day | lts-6.6.52 | cos-109-17800.309.59 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2e95c4384438adeaa772caa560244b1a2efef816 | net/sched: stop qdisc_tree_reduce_backlog on TC_H_ROOT | CVE-2024-53057 | 85f51e9e2cd46b8358ec18e91caf33949324370103231a959ae927b976872e5d | 2024-11-04T06:16:46.343Z | 2024-11-04T06:16:46.343Z | 2024-10-09T20:07:16.000Z 2024-10-09T20:04:30.000Z 2024-10-09T20:00:17.000Z | ||
67 | exp194 | 2024-09-22T11:14:51.052Z | kernelCTF{v1:mitigation-v3-6.1.55:1727002022} kernelCTF{v1:lts-6.6.50:1727001380} kernelCTF{v1:cos-109-17800.309.33:1727001907} | 0-day | lts-6.6.50 | cos-109-17800.309.33 | ab23e84a348ec0452fd71de7a168e9bbaa5e5c79f3321a86a94e8c60b90407fc | 2024-09-22T11:14:51.052Z | 2024-09-22T10:47:02.000Z 2024-09-22T10:36:20.000Z 2024-09-22T10:45:07.000Z | ||||||
68 | exp193 | 2024-09-05T11:07:21.816Z | kernelCTF{v1:lts-6.6.47:1725534317} | 0-day | lts-6.6.47 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e9bd9c498cb0f5843996dbe5cbce7a1836a83c70 | bpf: sync_linked_regs() must preserve subreg_def | CVE-2024-53125 | 78d884d0dced0582489d8c8320b2ba2d04f1f479c79c43a174868e94b44241de | 2024-10-28T12:33:17.457Z | 2024-10-28T12:33:17.457Z | 2024-09-05T11:05:17.000Z | |||
69 | exp192 | 2024-08-24T07:51:20.631Z | kernelCTF{v1:mitigation-v3-6.1.55:1724484213} kernelCTF{v1:lts-6.6.45:1724484466} kernelCTF{v1:cos-109-17800.309.7:1724483846} | 0-day | (mitigation-v3-6.1.55 0-day promotion) | cos-109-17800.309.7 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b3a2a9c6349e25a025d2330f479bc33a6ccb54a | sch/netem: fix use after free in netem_dequeue | CVE-2024-46800 | e6a233135856f20c90a04127115b9ea0abaffa5f315c4288ef4746c1d9e72780 | 2024-09-08T10:39:50.802Z | 2024-09-08T10:39:50.802Z | 2024-08-24T07:23:33.000Z 2024-08-24T07:27:46.000Z 2024-08-24T07:17:26.000Z | ||
70 | exp191 | 2024-08-16T12:01:08.670Z | kernelCTF{v1:lts-6.6.45:1723809625} | 0-day | lts-6.6.45 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8ea607330a39184f51737c6ae706db7fdca7628e | bpf: Fix overloading of MEM_UNINIT's meaning | CVE-2024-50164 | 60b04d885b513f7d5225ec73f262aa1ccc64aa2dda600531958b4ab6a1543a27 | 2024-10-28T13:06:20.135Z | 2024-10-28T13:06:20.135Z | 2024-08-16T12:00:25.000Z | |||
71 | exp190 | 2024-08-14T10:55:47.298Z | kernelCTF{v1:mitigation-v3-6.1.55:1723632581} | 1-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5f68718b34a531a556f2f50300ead2862278da26 | netfilter: nf_tables: GC transaction API to avoid race with control plane | CVE-2023-4244 | 6b63c86f22d4f967d385073ad1fc8709cdca17e5afdff5833a6cfd7e4bd14176 | 2024-08-14T10:55:47.298Z | 2024-08-14T10:55:47.298Z | 2024-08-14T10:49:41.000Z | ||||
72 | exp189 | 2024-08-13T18:24:36.428Z | kernelCTF{v1:mitigation-v3-6.1.55:1723572797} | 1-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7845914f45f066497ac75b30c50dbc735e84e884 | netfilter: nf_tables: don't fail inserts if duplicate has expired | CVE-2023-4244 | 0bc99048154eaaad6cb86a6352643b33fe1cad2a1de86d2a09ac758f8f80b936 | 2024-08-13T18:24:36.428Z | 2024-08-13T18:24:36.428Z | 2024-08-13T18:13:17.000Z | ||||
73 | exp188 | 2024-08-13T11:08:44.694Z | kernelCTF{v1:mitigation-v3-6.1.55:1723546674} | 1-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24138933b97b055d486e8064b4a1721702442a9b | netfilter: nf_tables: don't skip expired elements during walk | CVE-2023-4244 | f1812a61ad8bd084c9e93c8e36ee48a8990d72dad8e3121c39c80316105d526b | 2024-08-13T11:08:44.694Z | 2024-08-13T11:08:44.694Z | 2024-08-13T10:57:54.000Z | ||||
74 | exp187 | 2024-08-13T08:41:53.763Z | kernelCTF{v1:mitigation-v3-6.1.55:1723531810} | 1-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=791a615b7ad2258c560f91852be54b0480837c93 | netfilter: nf_set_pipapo: fix initial map fill | CVE-2024-57947 | b854bbc5e490ce69a920c75802b07085e746169b8c66d4760edc73eea6d403bc | 2024-08-13T08:41:53.763Z | 2024-08-13T08:41:53.763Z | 2024-08-13T06:50:10.000Z | ||||
75 | exp186 | 2024-08-10T10:44:10.302Z | kernelCTF{v1:mitigation-v3-6.1.55:1723285840} kernelCTF{v1:lts-6.6.42:1723285956} kernelCTF{v1:cos-109-17800.218.76:1723285744} | 0-day | lts-6.6.42 | cos-109-17800.218.76 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c07ff8592d57ed258afee5a5e04991a48dbaf382 | netem: fix return value if duplicate enqueue fails | CVE-2024-45016 | d157fc1df4258da288684d1b0395f932706eef07d600bdf0f46f7d2fe8d2e082 | 2024-08-27T04:16:49.727Z | 2024-08-27T04:16:49.727Z | 2024-08-10T10:30:40.000Z 2024-08-10T10:32:36.000Z 2024-08-10T10:29:04.000Z | ||
76 | exp185 | 2024-07-17T10:28:07.840Z | kernelCTF{v1:lts-6.6.38:1721211910} | 0-day | lts-6.6.38 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/bpf?id=32556ce93bc45c730829083cb60f95a2728ea48b | bpf: Fix helper writes to read-only maps | CVE-2024-49861 | 2b1f3610e7971ca3ae07a1abffd31b6f2e660537cf18cf736ce7a32b16005b52 | 2024-09-24T14:45:20.916Z | 2024-09-24T14:45:20.916Z | 2024-07-17T10:25:10.000Z | |||
77 | exp184 | 2024-07-05T08:14:05.956Z | kernelCTF{v1:mitigation-v3-6.1.55:1720167070} | 1-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=affc18fdc694190ca7575b9a86632a73b9fe043d | net: sched: sch_multiq: fix possible OOB write in multiq_tune() | CVE-2024-36978 | b82875415d8e4ee5386799f6fde317b2899d6d60d016e25bab02379ae969d39c | 2024-07-05T08:14:05.956Z | 2024-07-05T08:14:05.956Z | 2024-07-05T08:11:10.000Z | ||||
78 | exp183 | 2024-06-28T12:00:33.518Z | kernelCTF{v1:lts-6.6.35:1719576008} | 0-day | lts-6.6.35 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1cb6f0bae50441f4b4b32a28315853b279c7404e | bpf: Fix too early release of tcx_entry | CVE-2024-41010 | 2178ec1e5559b67dd07ffe5cb990d56d05d9d0c0a35e5af70b189caa82afed1a | 2024-07-19T15:51:57.243Z | 2024-07-19T15:51:57.243Z | 2024-06-28T12:00:08.000Z | |||
79 | exp182 | 2024-06-25T06:31:38.511Z | kernelCTF{v1:lts-6.6.31:1719296902} | 1-day | (dupe) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=affc18fdc694190ca7575b9a86632a73b9fe043d | net: sched: sch_multiq: fix possible OOB write in multiq_tune() | CVE-2024-36978 | c6257ab5b42fa2529254ebc42bc59b5af8458006b0bec82fc5da570bc59b9b85 | 2024-06-26T05:09:48.771Z | 2024-06-26T05:09:48.771Z | 2024-06-25T06:28:22.000Z | |||
80 | exp181 | 2024-06-18T18:32:25.195Z | kernelCTF{v1:cos-109-17800.218.44:1718734149} | 1-day | cos-109-17800.218.44 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=affc18fdc694190ca7575b9a86632a73b9fe043d | net: sched: sch_multiq: fix possible OOB write in multiq_tune() | CVE-2024-36978 | 8bfd4690f867495e8b0b73e819002f6b5ced40c9dca92fbe38a372ef53c65afc | 2024-06-26T05:11:08.631Z | 2024-06-26T05:11:08.631Z | 2024-06-18T18:09:09.000Z | |||
81 | exp180 | 2024-06-14T12:01:24.233Z | kernelCTF{v1:lts-6.6.31:1718366455} | 0-day | (dupe) | 8f51850001991f171dfaa6647db3ba1b22bf4ae7c76fd150fa1dd51980557ca6 | 2024-06-14T12:01:24.233Z | 2024-06-14T12:00:55.000Z | |||||||
82 | exp179 | 2024-06-14T12:00:46.526Z | kernelCTF{v1:lts-6.6.31:1718366406} | 0-day | lts-6.6.31 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=1cb6f0bae50441f4b4b32a28315853b279c7404e | bpf: Fix too early release of tcx_entry | CVE-2024-41010 | 98188c9bff155f447c2417561876bafebf13513e6d8cec55035ee81ff6f79953 | 2024-07-11T20:14:45.277Z | 2024-07-11T20:14:45.277Z | 2024-06-14T12:00:06.000Z | |||
83 | exp178 | 2024-06-13T18:03:12.347Z | kernelCTF{v1:lts-6.6.32:1718301759} | 0-day | (dupe) | 52be31682bcea77972b5b7b378875963af29d652bcc6541c4c48c5fb998d9de4 | 2024-06-13T18:03:12.347Z | 2024-06-13T18:02:39.000Z | |||||||
84 | exp177 | 2024-06-12T00:40:34.359Z | kernelCTF{v1:lts-6.6.32:1718152801} | 0-day | (dupe) | cd9ac8c997a0920be6112cb9c99ddac5ceda0c18084a2e972a88b10e47ece559 | 2024-06-12T00:40:34.359Z | 2024-06-12T00:40:01.000Z | |||||||
85 | exp176 | 2024-05-31T12:00:42.939Z | kernelCTF{v1:lts-6.6.32:1717156808} | 0-day | (dupe) | 56ef49ad3bf1031dc0c511551b89c6bf80c93ed6970ed61a129360bed625294c | 2024-05-31T12:00:42.939Z | 2024-05-31T12:00:08.000Z | |||||||
86 | exp175 | 2024-05-31T12:00:35.794Z | kernelCTF{v1:lts-6.6.32:1717156807} | 0-day | lts-6.6.32 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=cfa1a2329a691ffd991fcf7248a57d752e712881 | bpf: Fix overrunning reservations in ringbuf | CVE-2024-41009 | f1d99a6a619f64dcaf67dc278d9973b5f22ef871bb4f75715e7c997ef20f1a97 | 2024-06-28T09:30:35.111Z | 2024-06-28T09:30:35.111Z | 2024-05-31T12:00:07.000Z | |||
87 | exp174 | 2024-05-17T20:57:47.144Z | kernelCTF{v1:lts-6.6.30:1715979365} | 0-day | (dupe) | bf3dd62d887e65d40578e9e83d15447cd93ee8cb5d57f6e96818f22eefd825e7 | 2024-05-17T20:57:47.144Z | 2024-05-17T20:56:05.000Z | |||||||
88 | exp173 | 2024-05-17T20:53:13.842Z | kernelCTF{v1:cos-105-17412.370.23:1715979160} | 0-day | cos-105-17412.370.23 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=cfa1a2329a691ffd991fcf7248a57d752e712881 | bpf: Fix overrunning reservations in ringbuf | CVE-2024-41009 | 01efe775533781430eba45a23ec92503731e7db10f961578b8548a961bc81cd7 | 2024-06-28T09:06:31.655Z | 2024-06-28T09:06:31.655Z | 2024-05-17T20:52:40.000Z | |||
89 | exp172 | 2024-05-17T12:05:49.993Z | kernelCTF{v1:cos-109-17800.218.20:1715947457} | 0-day | (dupe, but eligible because of the LTS 0-day - exp169) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/ipset?id=4e7aaa6b82d63e8ddcbfb56b4fd3d014ca586f10 | netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type | CVE-2024-39503 | fa690ee801babf381c5e22d6698da8727546930ad21dddd9f294d6ad6811e2a0 | 2024-06-17T17:20:45.447Z | 2024-06-17T17:20:45.447Z | 2024-05-17T12:04:17.000Z | |||
90 | exp171 | 2024-05-17T12:01:28.920Z | kernelCTF{v1:lts-6.6.30:1715947207} | 0-day | (dupe) | 27d5a0b6777edf383ab375a1106f8145264617eafbb4db87a7b5c84b0bf85794 | 2024-05-17T12:01:28.920Z | 2024-05-17T12:00:07.000Z | |||||||
91 | exp170 | 2024-05-17T12:01:23.751Z | kernelCTF{v1:cos-109-17800.218.20:1715947208} | 1-day | cos-109-17800.218.20 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9841991a446c87f90f66f4b9fee6fe934c1336a2 | af_unix: Update unix_sk(sk)->oob_skb under sk_receive_queue lock. | CVE-2024-36972 | 8f2b4d20590301e310d0d753554cb74ccc0c57c8a38df903e85e33d64c3312d2 | 2024-05-24T00:38:56.883Z | 2024-05-24T00:38:56.883Z | 2024-05-17T12:00:08.000Z | |||
92 | exp169 | 2024-05-17T12:00:55.014Z | kernelCTF{v1:lts-6.6.30:1715947206} | 0-day | lts-6.6.30 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter/ipset?id=4e7aaa6b82d63e8ddcbfb56b4fd3d014ca586f10 | netfilter: ipset: Fix race between namespace cleanup and gc in the list:set type | CVE-2024-39503 | a1030da58902aa6abf455273829e60a877342db106f51fab87f0a57fadece039 | 2024-06-17T07:50:35.416Z | 2024-06-17T07:50:35.416Z | 2024-05-17T12:00:06.000Z | |||
93 | exp168 | 2024-05-03T13:00:50.436Z | kernelCTF{v1:cos-109-17800.147.60:1714741127} | 1-day | cos-109-17800.147.60 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13114dc5543069f7b97991e3b79937b6da05f5b0 | tls: fix use-after-free on failed backlog decryption | CVE-2024-26800 | 59bbb87273856782679dfb406251f1bc66660f8c140042d6ff6439a41a6c03a0 | 2024-05-03T13:00:50.436Z | 2024-05-03T13:00:50.436Z | 2024-05-03T12:58:47.000Z | |||
94 | exp167 | 2024-05-03T12:04:09.246Z | kernelCTF{v1:cos-105-17412.294.68:1714737814} | 1-day | cos-105-17412.294.68 | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/io_uring?h=linux-5.15.y&id=d909d381c3152393421403be4b6435f17a2378b4 | io_uring: drop any code related to SCM_RIGHTS | CVE-2023-52656 | originally patch commit ("io_uring/af_unix: disable sending io_uring over sockets") was reported, but turned out that was not the correct one | b50d50b846b518a89a037a02d5ba4a86de0a3f542339e864c31bdbf99320ccac | 2024-05-06T02:26:07.697Z | 2024-05-10T10:03:47.756Z | 2024-05-03T12:03:34.000Z | ||
95 | exp166 | 2024-05-03T12:00:39.392Z | kernelCTF{v1:lts-6.6.28:1714737612} | 0-day | lts-6.6.28 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9841991a446c87f90f66f4b9fee6fe934c1336a2 | af_unix: Update unix_sk(sk)->oob_skb under sk_receive_queue lock. | CVE-2024-36972 | d2081f3555f57a2874329cd90a77a0b63842f58975daffee86aa7168884977d2 | 2024-05-24T00:35:37.820Z | 2024-05-24T00:35:37.820Z | 2024-05-03T12:00:12.000Z | |||
96 | exp165 | 2024-04-25T06:32:40.505Z | kernelCTF{v1:mitigation-v3-6.1.55:1714026547} | 1-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3cfc9ec039af60dbd8965ae085b2c2ccdcfbe1cc | netfilter: nft_set_pipapo: do not free live element | CVE-2024-26924 | c7ea57d08c2356015a3358b76b56007cf25ceb29bfdbc129d81d443912bff12a | 2024-04-25T06:32:40.505Z | 2024-04-25T06:32:40.505Z | 2024-04-25T06:29:07.000Z | ||||
97 | exp164 | 2024-04-24T17:16:53.567Z | kernelCTF{v1:mitigation-v3-6.1.55:1713975776} | 1-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7395dfacfff65e9938ac0889dafa1ab01e987d15 | netfilter: nf_tables: use timestamp to check for set element timeout | CVE-2024-27397 | 49530c65e36d19182466bc307cf642d8e802836f954e91f35311555e61f12cc0 | 2024-04-24T17:16:53.567Z | 2024-04-24T17:16:53.567Z | 2024-04-24T16:22:56.000Z | ||||
98 | exp163 | 2024-04-24T12:49:42.954Z | kernelCTF{v1:cos-105-17412.294.62:1713961831} | 1-day | cos-105-17412.294.62 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=64620e0a1e712a778095bd35cbb277dc2259281f | bpf: Fix out of bounds access for ringbuf helpers | CVE-2022-23222 | 46dbc0260faeaad98f0b74f7b597a200273197c058f899ed7f1a1b30f1aca599 | 2024-05-03T10:57:09.471Z | 2024-05-03T10:57:09.471Z | 2024-04-24T12:30:31.000Z | |||
99 | exp162 | 2024-04-24T12:47:01.165Z | kernelCTF{v1:cos-109-17800.147.54:1713960503} | 1-day | cos-109-17800.147.54 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=47d8ac011fe1c9251070e1bd64cb10b48193ec51 | af_unix: Fix garbage collector racing against connect() | CVE-2024-26923 | 91260b22ee4981ead7eaa3d2fea929ba6de311c60bfb5904f786eb867e4983bd | 2024-04-24T12:47:01.165Z | 2024-04-24T12:47:01.165Z | 2024-04-24T12:08:23.000Z | |||
100 | exp161 | 2024-04-20T01:38:15.446Z | kernelCTF{v1:cos-105-17412.294.62:1713576359} | 1-day | (revoked) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=47d8ac011fe1c9251070e1bd64cb10b48193ec51 | af_unix: Fix garbage collector racing against connect() | CVE-2024-26923 | submission was revoked by the researcher | 01bff43966c815675048bbf658ea515db769cf36214aa1203fabd8a6ecd0fe68 | 2024-04-20T01:38:15.446Z | 2024-04-20T01:38:15.446Z | 2024-04-20T01:25:59.000Z | ||
101 | exp160 | 2024-04-19T18:15:51.815Z | kernelCTF{v1:lts-6.6.27:1713549684} | 1-day | lts-6.6.27 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=47d8ac011fe1c9251070e1bd64cb10b48193ec51 | af_unix: Fix garbage collector racing against connect() | CVE-2024-26923 | 0d88332ef2fa6ea49620a0799e7fd17abd1b7b82938b76513ab56f32a737781f | 2024-04-20T01:39:01.353Z | 2024-04-20T01:39:01.353Z | 2024-04-19T18:01:24.000Z | |||
102 | exp159 | 2024-04-12T08:32:00.639Z | kernelCTF{v1:cos-109-17800.147.41:1712909479} | 1-day | cos-109-17800.147.41 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3cfc9ec039af60dbd8965ae085b2c2ccdcfbe1cc | netfilter: nft_set_pipapo: do not free live element | CVE-2024-26924 | 5a1fe25fa5193246662576c1d7124a32b82afd328dcea35a7d816b0e50bdae17 | 2024-04-24T10:12:45.753Z | 2024-04-24T10:12:45.753Z | 2024-04-12T08:11:19.000Z | |||
103 | exp158 | 2024-04-06T00:24:29.010Z | kernelCTF{v1:cos-97-16919.450.26:1712362027} | 1-day | cos-97-16919.450.26 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=18685451fc4e546fc0e718580d32df3c0e5c8272 | inet: inet_defrag: prevent sk release while still in use | CVE-2024-26921 | ef6672b14f6d5dcd17e0ffb4ae0804a4810bccad6c174e1484a368225785b787 | 2024-04-06T00:24:29.010Z | 2024-04-06T00:26:24.234Z | 2024-04-06T00:07:07.000Z | |||
104 | exp157 | 2024-04-05T23:45:32.908Z | kernelCTF{v1:lts-6.6.23:1712360246} | 1-day | lts-6.6.23 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=18685451fc4e546fc0e718580d32df3c0e5c8272 | inet: inet_defrag: prevent sk release while still in use | CVE-2024-26921 | 032588f62a925cdced34a5d8ea4149732b32d6308c5fd63c31999eb1585606ad | 2024-04-06T00:26:44.731Z | 2024-04-06T00:26:44.731Z | 2024-04-05T23:37:26.000Z | |||
105 | exp156 | 2024-03-22T12:01:11.757Z | kernelCTF{v1:cos-105-17412.294.36:1711108845} | 0-day | (dupe, but eligible because of the LTS 0-day - exp153) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0d459e2ffb541841714839e8228b845458ed3b27 | netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path | CVE-2024-26925 | 11288d3debf80ad9366e474ebf4e245512a11dc913fc55b982435a4561c3fd46 | 2024-05-27T06:56:23.993Z | 2024-05-27T07:01:28.448Z | 2024-03-22T12:00:45.000Z | |||
106 | exp155 | 2024-03-22T12:00:48.331Z | kernelCTF{v1:cos-105-17412.294.36:1711108811} | 1-day | (dupe) | 5f3d08a9e47506a26201d2a4d62b8d8362d3c7378b4a9a2133b9911b649fe9cf | 2024-03-22T12:00:48.331Z | 2024-03-22T12:00:11.000Z | |||||||
107 | exp154 | 2024-03-22T12:00:35.694Z | kernelCTF{v1:cos-105-17412.294.36:1711108805} | 1-day | cos-105-17412.294.36 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=01acb2e8666a6529697141a6017edbf206921913 | netfilter: nft_chain_filter: handle NETDEV_UNREGISTER for inet/ingress basechain | CVE-2024-26808 | 4bc7b0b9e53209cee905ffce7982f7c04a9266dd508a8b89d868a9e92284a092 | 2024-04-04T03:28:24.337Z | 2024-04-04T03:33:07.247Z | 2024-03-22T12:00:05.000Z | |||
108 | exp153 | 2024-03-22T12:00:35.074Z | kernelCTF{v1:lts-6.1.81:1711108805} | 0-day | lts-6.1.81 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0d459e2ffb541841714839e8228b845458ed3b27 | netfilter: nf_tables: release mutex after nft_gc_seq_end from abort path | CVE-2024-26925 | 11288d3debf80ad9366e474ebf4e245512a11dc913fc55b982435a4561c3fd46 | 2024-04-05T03:32:48.986Z | 2024-04-05T07:39:55.314Z | 2024-03-22T12:00:05.000Z | |||
109 | exp152 | 2024-03-22T12:00:26.934Z | kernelCTF{v1:lts-6.1.81:1711108810} | 1-day | (vuln dupe of exp151) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b0e256f3dd2ba6532f37c5c22e07cb07a36031ee | netfilter: nft_set_pipapo: release elements in clone only from destroy path | CVE-2024-26809 | 8a89a532b6769520327b29b95dede07fa5997a695dfbb5247ef5c678d47dbe45 | 2024-03-23T05:35:25.323Z | 2024-03-23T05:35:25.323Z | 2024-03-22T12:00:10.000Z | |||
110 | exp151 | 2024-03-08T12:23:43.768Z | kernelCTF{v1:lts-6.1.79:1709900145} kernelCTF{v1:cos-105-17412.294.34:1709900397} | 0-day | lts-6.1.79 | (dupe, but eligible because of the LTS 0-day) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b0e256f3dd2ba6532f37c5c22e07cb07a36031ee | netfilter: nft_set_pipapo: release elements in clone only from destroy path | CVE-2024-26809 | 1948d85041424ee8b4cab65589c50199afeb1be7f0b56c03766ef64ae34bdcb4 | 2024-03-22T14:00:36.416Z | 2024-03-22T14:00:36.416Z | 2024-03-08T12:15:45.000Z 2024-03-08T12:19:57.000Z | ||
111 | exp150 | 2024-03-08T12:12:58.695Z | kernelCTF{v1:lts-6.1.79:1709899963} | 0-day | (revoked) | 268769b0d2a96f516ad5c9d8b4f1897e6a356eb5d1918f667472e23c37582e3e | 2024-03-08T12:12:58.695Z | 2024-03-08T12:12:43.000Z | |||||||
112 | exp149 | 2024-03-08T12:00:22.257Z | kernelCTF{v1:cos-105-17412.294.34:1709899205} | 1-day | cos-105-17412.294.34 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e26d3009efda338f19016df4175f354a9bd0a4ab | netfilter: nf_tables: disallow timeout for anonymous sets | CVE-2023-52620 | 09fa94b908498da6f8c8eebff77784205793bd81d2bb1b36c238ddb80b23c588 | 2024-03-12T07:56:31.931Z | 2024-03-12T07:56:31.931Z | 2024-03-08T12:00:05.000Z | |||
113 | exp148 | 2024-03-04T02:51:08.845Z | kernelCTF{v1:mitigation-v3-6.1.55:1709520453} | 1-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f15f29fd4779be8a418b66e9d52979bb6d6c2325 | netfilter: nf_tables: disallow rule removal from chain binding | CVE-2023-5197 | fc2f5c78dc2fae6910718a4a5856dca517b51a9931e2be4d8098573970f9165d | 2024-03-04T02:51:08.845Z | 2024-03-04T02:51:08.845Z | 2024-03-04T02:47:33.000Z | ||||
114 | exp147 | 2024-03-03T14:22:32.597Z | kernelCTF{v1:mitigation-v3-6.1.55:1709475640} | 0-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=16603605b667b70da974bea8216c93e7db043bf1 | netfilter: nf_tables: disallow anonymous set with timeout flag | CVE-2024-26642 | aa846a4070086977f20e04c46de8ad09967590044ff022adccf7425e7b7072f1 | 2024-03-11T12:03:19.983Z | 2024-03-11T12:03:19.983Z | 2024-03-03T14:20:40.000Z | ||||
115 | exp146 | 2024-03-02T10:09:25.400Z | kernelCTF{v1:mitigation-v3-6.1.55:1709371737} | 1-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7315dc1e122c85ffdfc8defffbb8f8b616c2eb1a | netfilter: nf_tables: skip set commit for deleted/destroyed sets | CVE-2024-0193 | 8022236c59f4bff82511f11614e8650be75c148dc72a6d4deed5b6c9cb23685c | 2024-03-02T10:09:25.400Z | 2024-03-02T10:09:25.400Z | 2024-03-02T09:28:57.000Z | ||||
116 | exp145 | 2024-03-01T02:47:02.023Z | kernelCTF{v1:lts-6.1.78:1709260919} kernelCTF{v1:cos-105-17412.294.29:1709260979} kernelCTF{v1:mitigation-v3-6.1.55:1709261115} | 0-day | (mitigation-v3-6.1.55 0-day promotion) | (dupe, but eligible because of the LTS 0-day) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=552705a3650bbf46a22b1adedc1b04181490fc36 | netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout | CVE-2024-26643 | 13857bc17f8fdeb7cf42f1001f7def0e193f092cdf57de21b35c029cce547234 | 2024-03-12T08:00:25.277Z | 2024-03-12T08:00:25.277Z | 2024-03-01T02:41:59.000Z 2024-03-01T02:42:59.000Z 2024-03-01T02:45:15.000Z | ||
117 | exp144 | 2024-02-29T12:00:18.355Z | kernelCTF{v1:lts-6.1.78:1709208007} | 0-day | lts-6.1.78 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=16603605b667b70da974bea8216c93e7db043bf1 | netfilter: nf_tables: disallow anonymous set with timeout flag | CVE-2024-26642 | 79e0241c2b66d7015fe9de3eb4dc1ac81140806e8ee12057227921e10a8c903b | 2024-03-11T12:01:34.167Z | 2024-03-11T12:01:34.167Z | 2024-02-29T12:00:07.000Z | |||
118 | exp143 | 2024-02-29T12:01:41.619Z | kernelCTF{v1:lts-6.1.78:1709208075} | 1-day | lts-6.1.78 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e26d3009efda338f19016df4175f354a9bd0a4ab | netfilter: nf_tables: disallow timeout for anonymous sets | CVE-2023-52620 | f6359c83617c9dffdcb1a64b55645de64add15aff5c84a55003b5795ceed2316 | 2024-03-12T07:58:11.373Z | 2024-03-12T07:58:11.373Z | 2024-02-29T12:01:15.000Z | |||
119 | exp142 | 2024-02-29T12:00:17.045Z | kernelCTF{v1:cos-105-17412.294.29:1709208005} | 1-day | cos-105-17412.294.29 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8590541473188741055d27b955db0777569438e3 | net: tls: handle backlogging of crypto requests | CVE-2024-26584 | ac901527633cf2f3de388582e5e73d290f050d7c96bcb3bb556fbb362213b956 | 2024-02-29T12:00:17.045Z | 2024-02-29T12:00:17.045Z | 2024-02-29T12:00:05.000Z | |||
120 | exp141 | 2024-02-28T16:39:42.243Z | kernelCTF{v1:mitigation-v3-6.1.55:1709137495} | 1-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e26d3009efda338f19016df4175f354a9bd0a4ab | netfilter: nf_tables: disallow timeout for anonymous sets | CVE-2023-52620 | f8f269da597ff2f0795a73b2a92cccd3b71f9eee862db72d61a0f50374936c87 | 2024-03-12T07:57:24.950Z | 2024-03-12T07:57:24.950Z | 2024-02-28T16:24:55.000Z | ||||
121 | exp140 | 2024-02-20T12:05:28.735Z | kernelCTF{v1:cos-105-17412.294.23:1708430709} | 0-day | cos-105-17412.294.23 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter?id=16603605b667b70da974bea8216c93e7db043bf1 | netfilter: nf_tables: disallow anonymous set with timeout flag | CVE-2024-26642 | 3dffc742a1953aad68fc702b27cdecffa27f0a7ad0f0bb4627311d4b5bd71e4b | 2024-03-11T11:58:34.347Z | 2024-03-11T11:59:41.949Z | 2024-02-20T12:05:09.000Z | |||
122 | exp139 | 2024-02-20T12:01:06.267Z | kernelCTF{v1:lts-6.1.76:1708430448} | 0-day | (dupe) | fb65445184f1079fb064163e0865459cae02e6e7f971c2bdc31b832b8eb468a9 | 2024-02-20T12:01:06.267Z | 2024-02-20T12:00:48.000Z | |||||||
123 | exp138 | 2024-02-20T12:00:23.123Z | kernelCTF{v1:lts-6.1.76:1708430407} | 0-day | (dupe) | aff6805324cb77ac41089c04c5b95b7e64c756a232801bf1991b09e013d58bfc | 2024-02-20T12:00:23.123Z | 2024-02-20T12:00:07.000Z | |||||||
124 | exp137 | 2024-02-20T12:00:13.669Z | kernelCTF{v1:cos-105-17412.294.10:1708429265} kernelCTF{v1:lts-6.1.76:1708430404} | 1-day | lts-6.1.76 | (dupe) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8590541473188741055d27b955db0777569438e3 | net: tls: handle backlogging of crypto requests | CVE-2024-26584 | 5d1ca123451e79c9ae515f18f7749a18b5e6edd1da6a116d067958de72668026 | 2024-02-21T01:26:07.786Z | 2024-02-21T01:26:07.786Z | 2024-02-20T11:41:05.000Z 2024-02-20T12:00:04.000Z | ||
125 | exp136 | 2024-02-14T10:33:24.722Z | kernelCTF{v1:mitigation-v3-6.1.55:1707141238} | 1-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=317eb9685095678f2c9f5a8189de698c5354316a | netfilter: nft_set_pipapo: skip inactive elements during set walk | CVE-2023-6817 | e877e7678bde049a8f175768e928e5b7b2fe5bea24b25ccbc98b24b6f1fd7f93 | 2024-02-14T10:33:24.722Z | 2024-02-14T10:33:24.722Z | 2024-02-05T13:53:58.000Z | ||||
126 | exp135 | 2024-02-14T01:30:14.426Z | kernelCTF{v1:mitigation-v3-6.1.55:1707873883} | 1-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=2ee52ae94baabf7ee09cf2a8d854b990dac5d0e4 | netfilter: nft_set_rbtree: skip sync GC for new elements in this transaction | CVE-2023-52433 | 02be5c301684923ef93b3140fb1e68a6d8d9558ffab1f0c67efbd05f002ce42c | 2024-02-14T01:30:14.426Z | 2024-02-14T01:30:14.426Z | 2024-02-14T01:24:43.000Z | ||||
127 | exp134 | 2024-02-09T14:30:32.694Z | kernelCTF{v1:cos-105-17412.294.10:1707488871} | 1-day | cos-105-17412.294.10 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=876673364161da50eed6b472d746ef88242b2368 | bpf: Defer the free of inner map when necessary | CVE-2023-52447 | Originally commit 20c20bd was linked by mistake. | bffdf76384867089593389f22cd999baebdf3a7237a13f6952a895a9f251f864 | 2024-02-23T14:41:56.950Z | 2024-02-23T14:41:56.950Z | 2024-02-09T14:27:51.000Z | ||
128 | exp133 | 2024-02-09T13:24:41.999Z | kernelCTF{v1:cos-105-17412.294.10:1707484843} | 1-day | (revoked) | 0787a474c8542cf0502dae5025724832b84f42eb070836f6b02efdd825e4b730 | 2024-02-09T13:24:41.999Z | 2024-02-09T13:20:43.000Z | |||||||
129 | exp132 | 2024-02-09T12:01:00.311Z | kernelCTF{v1:lts-6.1.77:1707480040} | 0-day | (dupe) | 1f2e119d62bef8f436a79eaa05c585ec109b7d4094438fab160bd0bbe5680b8e | 2024-02-09T12:01:00.311Z | 2024-02-09T12:00:40.000Z | |||||||
130 | exp131 | 2024-02-09T12:00:26.701Z | kernelCTF{v1:lts-6.1.77:1707480011} | 0-day | (dupe) | 81077a1ce0f715468f173abbc25a9474665a0e7ee3fd9b5df4743195187509ce | 2024-02-09T12:00:26.701Z | 2024-02-09T12:00:11.000Z | |||||||
131 | exp130 | 2024-02-09T12:00:18.847Z | kernelCTF{v1:lts-6.1.77:1707480004} | 1-day | lts-6.1.77 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=32b55c5ff9103b8508c1e04bfa5a08c64e7a925f | net: tls: fix use-after-free with partial reads and async decrypt | CVE-2024-26582 | 00918492d49b1c07de0e16041765c4780b62157f3c65c659e49b27399c2ba486 | 2024-02-21T00:17:27.883Z | 2024-02-21T00:17:27.883Z | 2024-02-09T12:00:04.000Z | |||
132 | exp129 | 2024-02-03T03:29:36.373Z | kernelCTF{v1:lts-6.1.74:1706926097} kernelCTF{v1:cos-105-17412.226.68:1706930613} kernelCTF{v1:mitigation-v3-6.1.55:1706930714} | 0-day | (mitigation-v3-6.1.55 0-day promotion) | (dupe, but eligible because of the LTS 0-day) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/netfilter?id=60c0c230c6f046da536d3df8b39a20b9a9fd6af0 | netfilter: nft_set_rbtree: skip end interval element from gc | CVE-2024-26581 | 53e45f4a38b94b0e215e48cd5df7797e4cce21db9872f3ec1b199f20c3510dba | 2024-02-14T00:48:26.374Z | 2024-02-14T00:49:37.204Z | 2024-02-03T02:08:17.000Z 2024-02-03T03:23:33.000Z 2024-02-03T03:25:14.000Z | ||
133 | exp128 | 2024-01-26T15:59:49.311Z | kernelCTF{v1:cos-105-17412.226.68:1706275015} | 0-day | cos-105-17412.226.68 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=aec7961916f3f9e88766e2688992da6980f11b8d | tls: fix race between async notify and socket close | CVE-2024-26583 | 0f6e616227f7d4a72cdcc1fbe2c60235ced44670a29176966bc4bdee62cc78e9 | 2024-02-20T21:39:04.535Z | 2024-02-20T21:39:04.535Z | 2024-01-26T13:16:55.000Z | |||
134 | 2024-01-26T15:50:25.187Z | invalid flag (signature error) | 0-day | 0f6e616227f7d4a72cdcc1fbe2c60235ced44670a29176966bc4bdee62cc78e9 | 2024-01-26T15:50:25.187Z | ||||||||||
135 | exp127 | 2024-01-26T12:00:37.802Z | kernelCTF{v1:lts-6.1.74:1706270415} | 0-day | (dupe) | 7f1c15ddf2277be6490ee14cbe85fa174960fc89aa9a5e9cccc026dd10191aa0 | 2024-01-26T12:00:37.802Z | 2024-01-26T12:00:15.000Z | |||||||
136 | exp126 | 2024-01-26T12:00:21.677Z | kernelCTF{v1:lts-6.1.74:1706270405} | 0-day | lts-6.1.74 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=aec7961916f3f9e88766e2688992da6980f11b8d | tls: fix race between async notify and socket close | CVE-2024-26583 | 9acee30d1b8cd94c8fc3b5f93b1690ce1af87317ce18ce34d14de1b99a7ccb96 | 2024-02-20T21:35:18.841Z | 2024-02-20T21:35:18.841Z | 2024-01-26T12:00:05.000Z | |||
137 | exp125 | 2024-01-19T12:00:33.769Z | kernelCTF{v1:lts-6.1.72:1705665607} | 1-day | lts-6.1.72 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7 | netfilter: nf_tables: check if catch-all set element is active in next generation | CVE-2024-1085 | (was flagged as CVE-2024-1087 by mistake) | 6cd34612d1bc8c4301128712dd4e3d6925efa22a7de67623b981047bad65db2b | 2024-01-19T12:00:33.769Z | 2024-01-19T12:00:33.769Z | 2024-01-19T12:00:07.000Z | ||
138 | exp124 | 2024-01-19T12:08:35.571Z | kernelCTF{v1:mitigation-v3-6.1.55:1705665799} | 0-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660 | netfilter: nf_tables: reject QUEUE/DROP verdict parameters | CVE-2024-1086 | dbd9e77e429d375014982a5397469c580f73197ebd44586230713714a9e3ba2f | 2024-01-26T11:15:24.686Z | 2024-01-26T11:18:34.038Z | 2024-01-19T12:03:19.000Z | ||||
139 | exp123 | 2024-01-19T12:01:31.139Z | kernelCTF{v1:lts-6.1.72:1705665672} | 0-day | (dupe) | 934dead687871f092677262c1bb3efcd437553be8136b25ca621f80ccec44b82 | 2024-01-19T12:01:31.139Z | 2024-01-19T12:01:12.000Z | |||||||
140 | exp122 | 2024-01-19T12:01:10.981Z | kernelCTF{v1:lts-6.1.72:1705665653} | 0-day | (dupe) | ffefc88aee42d73f4d65319b2cb8f66bd598c31da23d00679df451b5a87731ad | 2024-01-19T12:01:10.981Z | 2024-01-19T12:00:53.000Z | |||||||
141 | 2024-01-19T12:00:49.230Z | invalid flag (signature error) | 0-day | 934dead687871f092677262c1bb3efcd437553be8136b25ca621f80ccec44b82 | 2024-01-19T12:00:49.230Z | ||||||||||
142 | exp121 | 2024-01-19T12:00:43.287Z | kernelCTF{v1:lts-6.1.72:1705665604} | 0-day | lts-6.1.72 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f342de4e2f33e0e39165d8639387aa6c19dff660 | netfilter: nf_tables: reject QUEUE/DROP verdict parameters | CVE-2024-1086 | also eligible for lts-6.1.72 due to a bug in kernelCTF decision logic | dbd9e77e429d375014982a5397469c580f73197ebd44586230713714a9e3ba2f | 2024-01-26T11:17:37.254Z | 2024-01-26T11:17:37.254Z | 2024-01-19T12:00:04.000Z | ||
143 | exp120 | 2024-01-19T12:00:35.116Z | kernelCTF{v1:cos-105-17412.226.67:1705665608} | 1-day | cos-105-17412.226.67 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7 | netfilter: nf_tables: check if catch-all set element is active in next generation | CVE-2024-1085 | 6cd34612d1bc8c4301128712dd4e3d6925efa22a7de67623b981047bad65db2b | 2024-01-19T12:00:35.116Z | 2024-01-19T15:18:43.356Z | 2024-01-19T12:00:08.000Z | |||
144 | exp119 | 2024-01-12T12:01:32.798Z | kernelCTF{v1:lts-6.1.70:1705060866} | 0-day | (dupe) | 60443f91575a6dda125960dafe1055cbd576ca8826aa3b31b8e57c1cb98a31da | 2024-01-12T12:01:32.798Z | 2024-01-12T12:01:06.000Z | |||||||
145 | exp118 | 2024-01-12T12:01:05.328Z | kernelCTF{v1:lts-6.1.70:1705060842} | 0-day | lts-6.1.70 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7 | netfilter: nf_tables: check if catch-all set element is active in next generation | CVE-2024-1085 | 26d2710cf9c4cb56514354efc6b17843968829f8328318e9c8713ea85147336b | 2024-01-27T14:20:12.554Z | 2024-01-27T14:20:12.554Z | 2024-01-12T12:00:42.000Z | |||
146 | exp117 | 2024-01-12T12:00:44.124Z | kernelCTF{v1:cos-105-17412.226.52:1705060818} | 1-day | cos-105-17412.226.52 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7315dc1e122c85ffdfc8defffbb8f8b616c2eb1a | netfilter: nf_tables: skip set commit for deleted/destroyed sets | CVE-2024-0193 | (dupe CVE: CVE-2024-0228) | 7c30763d339f13c8576444dc2911f4576a1845ff24c8750177fee04f4ec3e181 | 2024-01-12T12:00:44.124Z | 2024-01-12T12:00:44.124Z | 2024-01-12T12:00:18.000Z | ||
147 | exp116 | 2024-01-12T09:43:13.337Z | kernelCTF{v1:cos-105-17412.226.43:1705052579} | 0-day | cos-105-17412.226.43 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b1db244ffd041a49ecc9618e8feb6b5c1afcdaa7 | netfilter: nf_tables: check if catch-all set element is active in next generation | CVE-2024-1085 | 7fcf3808efa1f81a32adc045085c9fea2967baa0419e6a44dbd2b009be8ae2b6 | 2024-01-27T14:23:49.353Z | 2024-01-27T14:23:49.353Z | 2024-01-12T09:42:59.000Z | |||
148 | 2024-01-08T13:07:38.336Z | invalid flag (signature error) | 0-day | 55335ee890ff14eb36bd07faa33e4f3dd921f806c483859be69bd6260f646943 | 2024-01-08T13:07:38.336Z | ||||||||||
149 | 2024-01-08T13:05:11.010Z | invalid flag (signature error) | 0-day | 55335ee890ff14eb36bd07faa33e4f3dd921f806c483859be69bd6260f646943 | 2024-01-08T13:05:11.010Z | ||||||||||
150 | 2024-01-08T12:54:12.034Z | invalid flag (signature error) | 0-day | 55335ee890ff14eb36bd07faa33e4f3dd921f806c483859be69bd6260f646943 | 2024-01-08T12:54:12.034Z | ||||||||||
151 | exp115 | 2023-12-18T12:02:58.325Z | kernelCTF{v1:lts-6.1.67:1702900804} | 0-day | (dupe) | d719d154ad88e57bafd4f66c6f2c5f4a384e515b00a7291fb80024ad1245ccef | 2023-12-18T12:02:58.325Z | 2023-12-18T12:00:04.000Z | |||||||
152 | exp114 | 2023-12-18T12:00:34.913Z | kernelCTF{v1:lts-6.1.67:1702900813} | 0-day | lts-6.1.67 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7315dc1e122c85ffdfc8defffbb8f8b616c2eb1a | netfilter: nf_tables: skip set commit for deleted/destroyed sets | CVE-2024-0193 | (dupe CVE: CVE-2024-0228) | e9da28ad35a47ad97daa0341e9206f7f5308f50358e1555e17bc251a4a6c04c5 | 2024-01-03T05:09:32.370Z | 2024-01-03T05:09:32.370Z | 2023-12-18T12:00:13.000Z | ||
153 | exp113 | 2023-12-15T18:27:55.154Z | kernelCTF{v1:cos-97-16919.404.13:1702664063} | 1-day | cos-97-16919.404.13 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=e2b706c691905fe78468c361aaabc719d0a496f1 | ipv4: igmp: fix refcnt uaf issue when receiving igmp query packet | CVE-2023-6932 | d1e6560c1e6773e2118aa371243ccfe3750207f8523fd9a543ff051cada5b658 | 2023-12-15T18:27:55.154Z | 2023-12-15T18:27:55.154Z | 2023-12-15T18:14:23.000Z | |||
154 | exp112 | 2023-12-01T12:02:23.524Z | kernelCTF{v1:cos-105-17412.226.28:1701428866} kernelCTF{v1:lts-6.1.63:1701432027} | 0-day | lts-6.1.63 | (dupe, but eligible because of the LTS 0-day) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=317eb9685095678f2c9f5a8189de698c5354316a | netfilter: nft_set_pipapo: skip inactive elements during set walk | CVE-2023-6817 | 5a167670a34f52c5cf32c5838e628041e187d3cfd51df78c144e86fedafbb735 | 2023-12-10T06:40:35.035Z | 2023-12-10T06:40:35.035Z | 2023-12-01T11:07:46.000Z 2023-12-01T12:00:27.000Z | ||
155 | exp111 | 2023-11-17T18:17:25.212Z | kernelCTF{v1:lts-6.1.61:1700244220} kernelCTF{v1:cos-105-17412.226.28:1700243946} | 0-day | lts-6.1.61 | (dupe, but eligible because of the LTS 0-day) | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=382c27f4ed28f803b1f1473ac2d8db0afc795a1b | perf: Fix perf_event_validate_size() | CVE-2023-6931 | 8dc27b677e7868a9751a9bb9d3d9a9ab7838059c6ff979af839e48568649427c | 2023-12-16T10:37:25.353Z | 2023-12-16T10:37:25.353Z | 2023-11-17T18:03:40.000Z 2023-11-17T17:59:06.000Z | ||
156 | exp110 | 2023-11-17T12:06:55.442Z | kernelCTF{v1:cos-105-17412.226.28:1700222490} | 1-day | cos-105-17412.226.28 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=93995bf4af2c5a99e2a87f0cd5ce547d31eb7630 | netfilter: nf_tables: remove catchall element in GC sync path | CVE-2023-6111 | 665eee753eb8d19d780d492441ec9202e6581fa34d56dcba594af8ae3d5cbfae | 2023-11-17T12:06:55.442Z | 2023-11-17T12:06:55.442Z | 2023-11-17T12:01:30.000Z | |||
157 | exp109 | 2023-11-03T12:02:16.898Z | kernelCTF{v1:lts-6.1.60:1699012826} | 0-day | lts-6.1.60 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=93995bf4af2c5a99e2a87f0cd5ce547d31eb7630 | netfilter: nf_tables: remove catchall element in GC sync path | CVE-2023-6111 | c7c99c76e0c95bfc132d15ffafd5f308758779c885df32bd398e1b75961d165b | 2023-11-13T16:52:26.716Z | 2023-11-13T16:52:26.716Z | 2023-11-03T12:00:26.000Z | |||
158 | exp108 | 2023-10-20T12:05:59.137Z | kernelCTF{v1:cos-105-17412.156.69:1697803506} | 1-day | cos-105-17412.156.69 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e01e3934a1b2d122919f73bc6ddbe1cdafc4bbdb | tls: fix race between tx work scheduling and socket close | CVE-2024-26585 | https://syzkaller.appspot.com/bug?extid=29c22ea2d6b2c5fd2eae | 911f92ffdbc7ed25231a48ca1fe412f29a6ac168a701abb463cca54ff319039f | 2024-02-20T20:52:45.912Z | 2024-02-20T20:52:45.912Z | 2023-10-20T12:05:06.000Z | ||
159 | exp107 | 2023-10-20T12:04:50.785Z | kernelCTF{v1:lts-6.1.58:1697803357} | 1-day | lts-6.1.58 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e01e3934a1b2d122919f73bc6ddbe1cdafc4bbdb | tls: fix race between tx work scheduling and socket close | CVE-2024-26585 | https://syzkaller.appspot.com/bug?extid=29c22ea2d6b2c5fd2eae | ecbf7402253f48db24b901d913fd3686eeae67125dceb5bcfa6aa748fb6f5168 | 2024-02-20T20:50:06.081Z | 2024-02-20T20:50:06.081Z | 2023-10-20T12:02:37.000Z | ||
160 | exp106 | 2023-10-09T18:17:28.939Z | kernelCTF{v1:lts-6.1.54:1696872912} kernelCTF{v1:cos-105-17412.156.59:1696872330} | 0-day | lts-6.1.54 | cos-105-17412.156.59 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/kernel/events?id=32671e3799ca2e4590773fd0e63aaa4229e50c06 | perf: Disallow mis-matched inherited group reads | CVE-2023-5717 | 567c5891127fc53f913b1266ae520dbec0be53d565c7effb3921f5fb5d9224d0 | 2023-10-23T06:45:45.831Z | 2023-10-23T06:45:45.831Z | 2023-10-09T17:35:12.000Z 2023-10-09T17:25:30.000Z | ||
161 | exp105 | 2023-09-30T18:30:04.182Z | kernelCTF{v1:mitigation-6.1-v2:1696098067} | 1-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e6e43b8aa7cd3c3af686caf0c2e11819a886d705 | fs/smb/client: Reset password pointer to NULL | CVE-2023-5345 | 84f2ffde58781145cfb95eb9886c5e9f0b8b3c6d1bc2b7e4f4b932d7576b2c5f | 2023-09-30T18:30:04.182Z | 2023-09-30T18:30:04.182Z | 2023-09-30T18:21:07.000Z | ||||
162 | exp104 | 2023-09-28T09:51:15.344Z | kernelCTF{v1:lts-6.1.52:1695893683} | 0-day | (dupe) | e274fdd6d3229435e800eabafb602bd61d1487aee4954335b3a7d292f34a92aa | 2023-09-28T10:04:37.387Z | 2023-09-28T09:34:43.000Z | |||||||
163 | exp103 | 2023-09-28T09:47:04.411Z | kernelCTF{v1:lts-6.1.52:1695893683} | 0-day | lts-6.1.52 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e6e43b8aa7cd3c3af686caf0c2e11819a886d705 | fs/smb/client: Reset password pointer to NULL | CVE-2023-5345 | e274fdd6d3229435e800eabafb602bd61d1487aee4954335b3a7d292f34a92aa | 2023-09-30T18:11:02.018Z | 2023-09-30T18:11:02.018Z | 2023-09-28T09:34:43.000Z | |||
164 | exp102 | 2023-09-16T20:18:09.599Z | kernelCTF{v1:mitigation-6.1-v2:1694894965} | 1-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/sched?id=b3d26c5702c7d6c45456326e56d2ccf3f103e60f | net/sched: sch_hfsc: Ensure inner classes have fsc curve | CVE-2023-4623 | 43d0ed70fab04e01e88743f7d9e077856599aeaa14a61808c5a61a39e1a27f2a | 2023-09-16T20:18:09.599Z | 2023-09-16T20:18:09.599Z | 2023-09-16T20:09:25.000Z | ||||
165 | exp101 | 2023-09-13T12:02:13.251Z | kernelCTF{v1:cos-105-17412.156.30:1694606419} | 0-day | (dupe) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f15f29fd4779be8a418b66e9d52979bb6d6c2325 | netfilter: nf_tables: disallow rule removal from chain binding | CVE-2023-5197 | 099d07e104e9a63477ade2936cd51f55d7ffc7ab83847cf63a3b54cdc460ea97 | 2023-09-26T08:33:46.564Z | 2023-09-26T08:33:46.564Z | 2023-09-13T12:00:19.000Z | |||
166 | exp100 | 2023-09-13T12:01:00.688Z | kernelCTF{v1:lts-6.1.52:1694606433} kernelCTF{v1:cos-105-17412.156.30:1694606435} | 1-day | (vuln dupe of exp97) | cos-105-17412.156.30 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f15f29fd4779be8a418b66e9d52979bb6d6c2325 | netfilter: nf_tables: disallow rule removal from chain binding | CVE-2023-5197 | 44686df6d5726e1b608faf5d82489811bc863e1b8a239895449c9561a9dcfa26 | 2023-09-27T13:39:38.736Z | 2023-09-27T13:39:38.736Z | 2023-09-13T12:00:33.000Z 2023-09-13T12:00:35.000Z | ||
167 | exp99 | 2023-09-06T13:36:24.524Z | kernelCTF{v1:lts-6.1.47:1693396845} kernelCTF{v1:cos-105-17412.156.23:1694006929} | 0-day | lts-6.1.47 | (dupe, but eligible because of the LTS 0-day) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f15f29fd4779be8a418b66e9d52979bb6d6c2325 | netfilter: nf_tables: disallow rule removal from chain binding | CVE-2023-5197 | fff9d236ab8de481638ac826dde8711de038561073383fc6fc4d904398ab31eb | 2023-09-26T08:31:57.933Z | 2023-09-26T08:31:57.933Z | 2023-08-30T12:00:45.000Z 2023-09-06T13:28:49.000Z | ||
168 | exp98 | 2023-08-30T12:01:24.310Z | kernelCTF{v1:cos-97-16919.353.23:1693396825} | 1-day | cos-97-16919.353.23 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/sched?id=b3d26c5702c7d6c45456326e56d2ccf3f103e60f | net/sched: sch_hfsc: Ensure inner classes have fsc curve | CVE-2023-4623 | 24522e1e9a038e5d8af3be5f0c29a10141c910461318728bb951da49769b81a7 | 2023-08-30T12:01:24.310Z | 2023-08-30T12:01:24.310Z | 2023-08-30T12:00:25.000Z | |||
169 | exp97 | 2023-08-30T12:01:04.870Z | kernelCTF{v1:lts-6.1.47:1693396845} | 0-day | (revoked by submitter) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f15f29fd4779be8a418b66e9d52979bb6d6c2325 | netfilter: nf_tables: disallow rule removal from chain binding | CVE-2023-5197 | bf5a08100b2e54ce38c29657c236f3fef664f20a13e46c078dada9692e7f7a12 | 2023-09-26T08:36:08.054Z | 2023-09-26T08:36:08.054Z | 2023-08-30T12:00:45.000Z | |||
170 | exp96 | 2023-08-30T12:00:37.028Z | kernelCTF{v1:cos-105-17412.156.23:1693396815} | 1-day | cos-105-17412.156.23 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0a771f7b266b02d262900c75f1e175c7fe76fec2 | netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR | CVE-2023-4015 | 3d26f0ca437ea6ace84b04768888d32ce8ae4fa1c2bde3d1391411f2c5e085fd | 2023-08-30T12:00:37.028Z | 2023-08-30T12:01:38.175Z | 2023-08-30T12:00:15.000Z | |||
171 | exp95 | 2023-08-21T13:34:22.065Z | kernelCTF{v1:cos-105-17412.101.42:1692007091} | 1-day | (dupe) | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-6.1.y&id=790c2f9d15b594350ae9bca7b236f2b1859de02c | af_unix: Fix null-ptr-deref in unix_stream_sendpage(). | CVE-2023-4622 | 316fae225d83165c8edc8ab2c69ef7f7cc4786995554f75221f49b3cd1ff5290 | 2023-08-30T02:33:21.718Z | 2023-08-30T02:33:21.718Z | 2023-08-14T09:58:11.000Z | |||
172 | exp94 | 2023-08-18T19:16:50.785Z | kernelCTF{v1:lts-6.1.36:1692385918} | 1-day | (dupe) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=caf3ef7468f7534771b5c44cd8dbd6f7f87c2cbd | netfilter: nf_tables: prevent OOB access in nft_byteorder_eval | CVE-2023-35001 | f495f24f0ee0e7c49c5d71270d2eb371a02d937df56c6d4a76a961dfb72d6760 | 2023-08-18T19:16:50.785Z | 2023-08-18T19:16:50.785Z | 2023-08-18T19:11:58.000Z | |||
173 | exp93 | 2023-08-12T09:48:39.960Z | kernelCTF{v1:lts-6.1.36:1691832672} | 0-day | (LTS 0-day between 2023-07-19 - 2023-08-18) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/sched?id=b3d26c5702c7d6c45456326e56d2ccf3f103e60f | net/sched: sch_hfsc: Ensure inner classes have fsc curve | CVE-2023-4623 | 13a42255e5a941191aa288877d27e28683696ea72415dc79e79dec8267e2a82c | 2023-08-30T08:19:21.195Z | 2023-08-30T08:19:21.195Z | 2023-08-12T09:31:12.000Z | |||
174 | exp92 | 2023-08-04T13:31:31.670Z | kernelCTF{v1:lts-6.1.36:1691124335} | 0-day | (LTS 0-day between 2023-07-19 - 2023-08-18) | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-6.1.y&id=790c2f9d15b594350ae9bca7b236f2b1859de02c | af_unix: Fix null-ptr-deref in unix_stream_sendpage(). | CVE-2023-4622 | 3f2327a3517775b98249233186fbc899fcfbb5b9caaff9978588f2413a266e27 | 2023-08-30T02:30:46.569Z | 2023-08-30T02:30:46.569Z | 2023-08-04T04:45:35.000Z | |||
175 | exp91 | 2023-08-03T13:44:43.609Z | kernelCTF{v1:lts-6.1.36:1691069649} | 0-day | (LTS 0-day between 2023-07-19 - 2023-08-18) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e91b0ebd994635df2346353322ac51ce84ce6d8 | Merge tag 'nf-23-08-10' of git://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf netfilter: nf_tables: remove busy mark and gc batch API netfilter: nft_set_hash: mark set element as dead when deleting from packet path netfilter: nf_tables: adapt set backend to use GC transaction API netfilter: nf_tables: GC transaction API to avoid race with control plane netfilter: nf_tables: don't skip expired elements during walk | CVE-2023-4244 | 8d7a01ccb058a4e80baeebfc18a2046c7c555392c5bdf3eeb4aa166fd3aee719 | 2023-08-11T11:03:05.207Z | 2023-08-11T11:03:05.207Z | 2023-08-03T13:34:09.000Z | |||
176 | exp90 | 2023-08-02T16:00:05.195Z | kernelCTF{v1:lts-6.1.36:1689931052} kernelCTF{v1:cos-105-17412.101.42:1690968846} | 0-day | (LTS 0-day between 2023-07-19 - 2023-08-18) | (dupe, but eligible because of the LTS 0-day) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0ebc1064e4874d5987722a2ddbc18f94aa53b211 | netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID | CVE-2023-4147 | (dupe CVE: CVE-2023-3995) | 1fd10bf938cfe552e9ddf0192e08291000d32b61ebc1dafbeabd7c7b0646e4eb | 2023-08-02T16:00:05.195Z | 2023-08-02T16:00:05.195Z | 2023-07-21T09:17:32.000Z 2023-08-02T09:34:06.000Z | |
177 | exp89 | 2023-08-02T12:58:49.533Z | kernelCTF{v1:mitigation-6.1-v2:1690980888} | 0-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8fc134fee27f2263988ae38920bc03da416b03d8 | net: sched: sch_qfq: Fix UAF in qfq_dequeue() | CVE-2023-4921 | 9065d183bc00ad33f54d8f11f31f35b8a16ac04398437d2a6f480b12e9cc6011 | 2023-09-08T10:23:39.406Z | 2023-09-08T10:23:39.406Z | 2023-08-02T12:54:48.000Z | ||||
178 | exp88 | 2023-08-02T12:05:08.980Z | kernelCTF{v1:lts-6.1.36:1690977318} kernelCTF{v1:cos-101-17162.210.48:1690977637} | 0-day | (LTS 0-day between 2023-07-19 - 2023-08-18) | (dupe, but eligible because of the LTS 0-day) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8fc134fee27f2263988ae38920bc03da416b03d8 | net: sched: sch_qfq: Fix UAF in qfq_dequeue() | CVE-2023-4921 | 615d74adddbc0c2c16fb857283410c085042f60060526f440df3a51161a373f9 | 2023-09-08T10:21:37.375Z | 2023-09-08T10:21:37.375Z | 2023-08-02T11:55:18.000Z 2023-08-02T12:00:37.000Z | ||
179 | exp87 | 2023-08-02T10:38:03.966Z | kernelCTF{v1:cos-105-17412.101.42:1690968846} | 0-day | (dupe) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0ebc1064e4874d5987722a2ddbc18f94aa53b211 | netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID | CVE-2023-4147 | dupe, resubmitted as exp90 (dupe CVE: CVE-2023-3995) | 8a09a9438ab0ece8853f0c3a92a9f26985fb2a9717203f288d5ce6a2d95fd6d7 | 2023-08-02T10:38:03.966Z | 2023-08-02T10:38:03.966Z | 2023-08-02T09:34:06.000Z | ||
180 | exp86 | 2023-08-02T10:36:50.457Z | kernelCTF{v1:mitigation-6.1-v2:1690972255} | 0-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0ebc1064e4874d5987722a2ddbc18f94aa53b211 | netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID | CVE-2023-4147 | (dupe CVE: CVE-2023-3995) | d56cfe833d22aaa741807460bf669375248ea289b87f25165fc09426a57acfa1 | 2023-08-02T10:36:50.457Z | 2023-08-02T10:36:50.457Z | 2023-08-02T10:30:55.000Z | |||
181 | exp85 | 2023-07-31T15:09:50.982Z | kernelCTF{v1:lts-6.1.36:1690815661} | 0-day | (LTS 0-day between 2023-07-19 - 2023-08-18) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=90e5b3462efa37b8bba82d7c4e63683856e188af | netfilter: nf_tables: deactivate catchall elements in next generation | CVE-2023-4569 | (dupe CVE: CVE-2023-4621) | db0ec30ef284005bf77be3e407f1b9f5f3b18a6689e5a8ffac6c71b18af3af4f | 2023-08-19T04:44:54.576Z | 2023-08-19T04:44:54.576Z | 2023-07-31T15:01:01.000Z | ||
182 | exp84 | 2023-07-29T17:46:46.896Z | kernelCTF{v1:cos-105-17412.101.42:1690651133} | 0-day | (dupe, but may be eligible because same researcher as exp67 0-day LTS submission) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8 | netfilter: nf_tables: skip bound chain on rule flush | CVE-2023-3777 | 886329bc3443c446caa2096e62f701f008c2a30a58fddaa23c77f7582fd99e91 | 2023-07-29T17:46:46.896Z | 2023-07-29T17:49:13.327Z | 2023-07-29T17:18:53.000Z | |||
183 | exp83 | 2023-07-29T17:45:43.469Z | kernelCTF{v1:mitigation-6.1-v2:1690641037} | 0-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8 | netfilter: nf_tables: skip bound chain on rule flush | CVE-2023-3777 | 39fd6440d52f00294c12b71c27b425083f20c24522288b22da485a0830aefde3 | 2023-07-29T17:45:43.469Z | 2023-07-29T17:45:43.469Z | 2023-07-29T14:30:37.000Z | ||||
184 | exp82 | 2023-07-26T09:55:52.653Z | kernelCTF{v1:lts-6.1.36:1690364460} | 0-day | (LTS 0-day between 2023-07-19 - 2023-08-18) | 974963754fe9cf7b13fa0de004db55ab166ff43aea5ff947e648c296da7524ef | 2023-07-26T09:55:52.653Z | 2023-07-26T09:41:00.000Z | |||||||
185 | exp81 | 2023-07-21T09:20:26.537Z | kernelCTF{v1:lts-6.1.36:1689931052} | 0-day | (LTS 0-day between 2023-07-19 - 2023-08-18) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0ebc1064e4874d5987722a2ddbc18f94aa53b211 | netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID | CVE-2023-4147 | dupe, resubmitted as exp90 (dupe CVE: CVE-2023-3995) | 80936067cbe3427a6b198bd27ae584f31035cd0dace5f8f3b9a35ea8dafaf513 | 2023-08-02T16:01:35.257Z | 2023-08-02T16:01:35.257Z | 2023-07-21T09:17:32.000Z | ||
186 | exp80 | 2023-07-21T08:20:03.354Z | kernelCTF{v1:lts-6.1.36:1689927450} | 0-day | (LTS 0-day between 2023-07-19 - 2023-08-18) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0ebc1064e4874d5987722a2ddbc18f94aa53b211 | netfilter: nf_tables: disallow rule addition to bound chain via NFTA_RULE_CHAIN_ID | CVE-2023-4147 | dupe, resubmitted as exp90 (dupe CVE: CVE-2023-3995) | f12e2a1eb943625211a71aa5c0a43f852218270917315c42f9863321fa0f0fa7 | 2023-08-02T16:00:55.415Z | 2023-08-02T16:00:55.415Z | 2023-07-21T08:17:30.000Z | ||
187 | exp79 | 2023-07-20T11:20:03.649Z | kernelCTF{v1:lts-6.1.36:1689850541} | 0-day | (LTS 0-day between 2023-07-19 - 2023-08-18) | 0bbb4778caa5c453862fbfdddf5c2229150209160aae6cb4e1a12ca77f24d083 | 2023-07-20T11:20:03.649Z | 2023-07-20T10:55:41.000Z | |||||||
188 | exp78 | 2023-07-19T00:21:04.266Z | kernelCTF{v1:cos-97-16919.294.48:1689725988} | 0-day | cos-97-16919.294.48 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=76e42ae831991c828cffa8c37736ebfb831ad5ec | net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free | CVE-2023-4207 | dupe of exp72, (dupe CVE: CVE-2023-4128) | 89862d8665965d0f9241918ca9375890bed108785ec942f1a5c9327e7141384f | 2023-08-04T09:07:23.523Z | 2023-08-04T09:07:23.523Z | 2023-07-19T00:19:48.000Z | ||
189 | exp77 | 2023-07-19T00:16:49.942Z | kernelCTF{v1:mitigation-6.1-v2:1689725651} | 0-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8 | net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free | CVE-2023-4206 | (dupe CVE: CVE-2023-4128) | c5251a78a4eb0f234b14fec3927f18ccbc998cc5dd171bcabe6897773254954b | 2023-08-04T09:12:50.717Z | 2023-08-04T09:12:50.717Z | 2023-07-19T00:14:11.000Z | |||
190 | exp76 | 2023-07-19T00:16:33.125Z | kernelCTF{v1:mitigation-6.1-v2:1689725712} | 0-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=76e42ae831991c828cffa8c37736ebfb831ad5ec | net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free | CVE-2023-4207 | (dupe CVE: CVE-2023-4128) | 8097850ae32618709881c396bba4a0e0a74ca39bba2ebf012aeca75369ef3653 | 2023-08-04T09:05:43.306Z | 2023-08-04T09:05:43.306Z | 2023-07-19T00:15:12.000Z | |||
191 | exp75 | 2023-07-19T00:09:42.989Z | kernelCTF{v1:cos-101-17162.210.48:1689725274} kernelCTF{v1:lts-6.1.36:1689725334} | 0-day | (LTS 0-day between 2023-07-19 - 2023-08-18) | cos-101-17162.210.48 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8 | net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free | CVE-2023-4206 | (dupe CVE: CVE-2023-4128) | 5eff0d7f02bf96dcdea0f127d1d83b8f016510cc607a6c656a4adc7bd9b15525 | 2023-08-04T09:10:54.279Z | 2023-08-04T09:10:54.279Z | 2023-07-19T00:07:54.000Z 2023-07-19T00:08:54.000Z | |
192 | exp74 | 2023-07-19T00:08:35.108Z | kernelCTF{v1:lts-6.1.36:1689724963} kernelCTF{v1:cos-93-16623.402.40:1689725041} kernelCTF{v1:mitigation-6.1-v2:1689725181} | 0-day | (LTS 0-day between 2023-07-19 - 2023-08-18) | cos-93-16623.402.40 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/sched?id=3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81 | net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free | CVE-2023-4208 | (dupe CVE: CVE-2023-4128) | c127319d0420c780b3d951bc6c691c858cd86013e8ab6ce467310802d82f4565 | 2023-08-04T08:57:07.213Z | 2023-08-04T08:57:07.213Z | 2023-07-19T00:02:43.000Z 2023-07-19T00:04:01.000Z 2023-07-19T00:06:21.000Z | |
193 | exp73 | 2023-07-19T00:06:16.056Z | kernelCTF{v1:lts-6.1.36:1688192577} kernelCTF{v1:mitigation-6.1-v2:1689584130} kernelCTF{v1:cos-105-17412.101.17:1688179284} | 0-day | (LTS 0-day between 2023-07-19 - 2023-08-18) | (dupe, but eligible because of the LTS 0-day) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=87b5a5c209405cb6b57424cdfa226a6dbd349232 | netfilter: nft_set_pipapo: fix improper element removal | CVE-2023-4004 | 31c0942e08283a0280279cabaf1cbfa329b859704675f354769ac43695299841 | 2023-07-27T12:37:04.943Z | 2023-07-27T12:37:04.943Z | 2023-07-01T06:22:57.000Z 2023-07-17T08:55:30.000Z 2023-07-01T02:41:24.000Z | ||
194 | exp72 | 2023-07-19T00:05:24.927Z | kernelCTF{v1:cos-105-17412.101.42:1689724999} kernelCTF{v1:lts-6.1.36:1689725042} | 0-day | (LTS 0-day between 2023-07-19 - 2023-08-18) | (dupe, but eligible because of the LTS 0-day) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=76e42ae831991c828cffa8c37736ebfb831ad5ec | net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free | CVE-2023-4207 | (dupe CVE: CVE-2023-4128) | 6d3c4e8e0d16ce4f1dfe28002505ce8597c247a3aee5a04b34ab8ae674ac5c50 | 2023-08-04T09:03:21.138Z | 2023-08-04T09:03:21.138Z | 2023-07-19T00:03:19.000Z 2023-07-19T00:04:02.000Z | |
195 | exp71 | 2023-07-19T00:01:58.591Z | kernelCTF{v1:cos-105-17412.101.42:1689724826} | 1-day | cos-105-17412.101.42 | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&id=314a8697d08092df6d00521450d44c352c602943 | netfilter: nf_tables: fix chain binding transaction logic | CVE-2023-3610 | dbcf035f898f4c8e45099bbe438e6dbcff2caaad9dae21189833eeba346f91ec | 2023-07-19T00:01:58.591Z | 2023-07-21T10:45:32.010Z | 2023-07-19T00:00:26.000Z | |||
196 | exp70 | 2023-07-19T00:01:09.243Z | kernelCTF{v1:lts-6.1.36:1689720123} | 0-day | (LTS 0-day between 2023-07-19 - 2023-08-18) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0a771f7b266b02d262900c75f1e175c7fe76fec2 | netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR | CVE-2023-4015 | 828a1ae4dc9799cec66a54bf3a2df23af329062d20e23c5ce42f5639fd9e1f67 | 2023-07-31T05:40:55.131Z | 2023-07-31T05:40:55.131Z | 2023-07-18T22:42:03.000Z | |||
197 | exp69 | 2023-07-19T00:01:00.740Z | kernelCTF{v1:lts-6.1.36:1689697439} kernelCTF{v1:cos-101-17162.127.42:1689697499} kernelCTF{v1:mitigation-6.1-v2:1689697555} | 0-day | (LTS 0-day between 2023-07-19 - 2023-08-18) | (dupe, but eligible because of the LTS 0-day) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3044b16e7c6fe5d24b1cdbcf1bd0a9d92d1ebd81 | net/sched: cls_u32: No longer copy tcf_result on update to avoid use-after-free | CVE-2023-4208 | (dupe CVE: CVE-2023-4128) | d14356f0d12abc5c694ba4397e0bea41d33be577dc1f5d384b2514c916243b8c | 2023-08-05T10:54:18.001Z | 2023-08-05T10:54:18.001Z | 2023-07-18T16:23:59.000Z 2023-07-18T16:24:59.000Z 2023-07-18T16:25:55.000Z | |
198 | exp68 | 2023-07-19T00:00:55.541Z | kernelCTF{v1:lts-6.1.36:1689724817} | 0-day | (LTS 0-day between 2023-07-19 - 2023-08-18) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=0a771f7b266b02d262900c75f1e175c7fe76fec2 | netfilter: nf_tables: skip immediate deactivate in _PREPARE_ERROR | CVE-2023-4015 | 31cf9c2c3de6fa479c275e1fb4a0127dfbd5dc33d6289692209afe86fdb439b2 | 2023-07-31T10:29:09.527Z | 2023-07-31T10:29:09.527Z | 2023-07-19T00:00:17.000Z | |||
199 | exp67 | 2023-07-19T00:00:41.085Z | kernelCTF{v1:lts-6.1.36:1689715409} | 0-day | (LTS 0-day between 2023-07-19 - 2023-08-18) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6eaf41e87a223ae6f8e7a28d6e78384ad7e407f8 | netfilter: nf_tables: skip bound chain on rule flush | CVE-2023-3777 | 9b8be04f4ec6628fbef7458b2b3feb6082d27e38a872c660f81f133b217b2b04 | 2023-07-28T04:20:12.186Z | 2023-07-28T04:20:12.186Z | 2023-07-18T21:23:29.000Z | |||
200 | exp66 | 2023-07-19T00:00:34.518Z | kernelCTF{v1:lts-6.1.36:1689696136} kernelCTF{v1:cos-101-17162.127.42:1689696874} kernelCTF{v1:mitigation-6.1-v2:1689696982} | 0-day | (LTS 0-day between 2023-07-19 - 2023-08-18) | (dupe, but eligible because of the LTS 0-day) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=76e42ae831991c828cffa8c37736ebfb831ad5ec | net/sched: cls_fw: No longer copy tcf_result on update to avoid use-after-free | CVE-2023-4207 | (dupe CVE: CVE-2023-4128) | 84dbe0bcadded42514725bbcba1a3d548e28bb3eccc188f5cfbbf0bf8a4b3f36 | 2023-08-05T10:46:48.699Z | 2023-08-05T10:46:48.699Z | 2023-07-18T16:02:16.000Z 2023-07-18T16:14:34.000Z 2023-07-18T16:16:22.000Z | |
201 | exp65 | 2023-07-19T00:00:02.733Z | kernelCTF{v1:lts-6.1.36:1689697199} kernelCTF{v1:cos-101-17162.127.42:1689697270} kernelCTF{v1:mitigation-6.1-v2:1689697351} | 0-day | (LTS 0-day between 2023-07-19 - 2023-08-18) | (dupe, but eligible because of the LTS 0-day) | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b80b829e9e2c1b3f7aae34855e04d8f6ecaf13c8 | net/sched: cls_route: No longer copy tcf_result on update to avoid use-after-free | CVE-2023-4206 | (dupe CVE: CVE-2023-4128) | 1619a4ed6e2ee8222b0f58dcbdddddaac32682ee5a754b3cc2bc1ae543e5cf90 | 2023-08-05T10:49:55.641Z | 2023-08-05T10:49:55.641Z | 2023-07-18T16:19:59.000Z 2023-07-18T16:21:10.000Z 2023-07-18T16:22:31.000Z | |
202 | exp64 | 2023-07-13T11:52:19.878Z | kernelCTF{v1:mitigation-6.1-v2:1689249078} | 1-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9cb36faedeafb9720ac236aeae2ea57091d90a09 | net: sched: cls_u32: Undo tcf_bind_filter if u32_replace_hw_knode | 07f9cc2 (CVE-2023-3609) fixes this issue too | b8004ab7f8afaf4dbe22d272d90861274477f208c2863242515de31acdd1a995 | 2023-07-23T20:02:43.967Z | 2023-07-23T20:02:43.967Z | 2023-07-13T11:51:18.000Z | ||||
203 | exp63 | 2023-07-11T08:52:59.999Z | kernelCTF{v1:mitigation-6.1-v2:1689064959} | 1-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=515ad530795c118f012539ed76d02bacfd426d89 | netfilter: nf_tables: do not ignore genmask when looking up chain by id | CVE-2023-31248 | cec11eefcbddafce70b7d657e7a62aa845d7531d1a3a3701e9b45ed6dfa46b17 | 2023-07-14T07:47:44.516Z | 2023-07-14T07:47:44.516Z | 2023-07-11T08:42:39.000Z | ||||
204 | exp62 | 2023-07-09T23:33:34.957Z | kernelCTF{v1:mitigation-6.1-v2:1688945060} | 1-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=0323bce598eea038714f941ce2b22541c46d488f | net/sched: cls_fw: Fix improper refcount update leads to use-after-free | CVE-2023-3776 | da14c7a321dc0293d4ef24b8d56fc838a54e54e4cf01ff5b9372c07804d6b9f8 | 2023-07-21T11:50:42.866Z | 2023-07-21T11:50:42.866Z | 2023-07-09T23:24:20.000Z | ||||
205 | exp61 | 2023-07-06T19:42:10.512Z | kernelCTF{v1:mitigation-6.1:1688671826} kernelCTF{v1:mitigation-6.1-v2:1689152160} | 1-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c1592a89942e9678f7d9c8030efa777c0d57edab | netfilter: nf_tables: deactivate anonymous set from preparation phase | CVE-2023-32233 | Mitigation was not correctly enabled on the mitigation-6.1 instance (CONFIG_KMALLOC_SPLIT_VARSIZE was missing), but new instance, mitigation-6.1-v2 was released and the flag for the new instance was resubmitted (new flag was added to the table manually but timestamps reflect the original submission date). | 8798cab4a00b35e51db83d6ce3870bca45d41c2232ed6a2656f7c584b28f2ae7 | 2023-07-06T19:42:10.512Z | 2023-07-12T09:02:49.766Z | 2023-07-06T19:30:26.000Z | |||
206 | exp60 | 2023-07-01T14:46:02.885Z | kernelCTF{v1:mitigation-6.1:1688222221} kernelCTF{v1:mitigation-6.1-v2:1689155253} | 1-day | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-6.1.y&id=891cd2edddc76c58e842706ad27e2ff96000bd5d | netfilter: nf_tables: fix chain binding transaction logic | CVE-2023-3610 | Mitigation was not correctly enabled on the mitigation-6.1 instance (CONFIG_KMALLOC_SPLIT_VARSIZE was missing), but new instance, mitigation-6.1-v2 was released and the flag for the new instance was resubmitted (new flag was added to the table manually but timestamps reflect the original submission date). | cd96f49b1523dd2d64944764e50f0c5154185b37da5a25dd99af0092494234b2 | 2023-07-01T14:46:02.885Z | 2023-07-14T08:24:05.327Z | 2023-07-01T14:37:01.000Z | |||
207 | exp59 | 2023-07-01T06:30:47.534Z | kernelCTF{v1:lts-6.1.36:1688192577} kernelCTF{v1:mitigation-6.1:1688019797} kernelCTF{v1:cos-105-17412.101.17:1688179284} | 0-day | (dupe) | (dupe) | 7a5bbfd3bf3fef0a873660abbff2e53f3ef4e6e9301de463c4e3b9285654e0b2 | 2023-07-01T06:30:47.534Z | 2023-07-01T06:22:57.000Z 2023-06-29T06:23:17.000Z 2023-07-01T02:41:24.000Z | ||||||
208 | exp58 | 2023-06-30T15:09:15.003Z | kernelCTF{v1:cos-93-16623.341.29:1688133477} kernelCTF{v1:mitigation-6.1:1688132860} kernelCTF{v1:mitigation-6.1-v2:1689175784} | 0-day | cos-93-16623.341.29 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=0323bce598eea038714f941ce2b22541c46d488f | net/sched: cls_fw: Fix improper refcount update leads to use-after-free | CVE-2023-3776 | Mitigation was not correctly enabled on the mitigation-6.1 instance (CONFIG_KMALLOC_SPLIT_VARSIZE was missing), but new instance, mitigation-6.1-v2 was released and the flag for the new instance was resubmitted (new flag was added to the table manually but timestamps reflect the original submission date). | 46ad653b9f77b33de3bd300c71c60898febd6f8625e27f8eea9efa8395b40b4c | 2023-07-14T07:06:25.082Z | 2023-07-20T15:14:53.029Z | 2023-06-30T13:57:57.000Z 2023-06-30T13:47:40.000Z | ||
209 | exp57 | 2023-06-30T15:06:18.401Z | kernelCTF{v1:mitigation-6.1:1688136619} kernelCTF{v1:cos-97-16919.294.28:1688136907} | 1-day | cos-97-16919.294.28 | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/net/sched?h=linux-6.1.y&id=07f9cc229b44cbcee6385802d390091d915f38c3 | net/sched: cls_u32: Fix reference counter leak leading to overflow | CVE-2023-3609 | a405f31572d403da0d6dd582ce6e57634c974d013ff2eea32cfd3ccb5f9026bd | 2023-06-30T15:06:18.401Z | 2023-07-20T15:19:09.717Z | 2023-06-30T14:50:19.000Z 2023-06-30T14:55:07.000Z | |||
210 | exp56 | 2023-06-30T14:47:06.668Z | kernelCTF{v1:lts-6.1.35:1688135008} kernelCTF{v1:cos-101-17162.127.42:1688136203} kernelCTF{v1:mitigation-6.1:1688136316} | 0-day | (dupe) | cos-101-17162.127.42 | 2561b8f3af37aaba764632c905597feb5b9e805dcce6027c414b936c21b682c9 | 2023-06-30T14:47:06.668Z | 2023-06-30T14:23:28.000Z 2023-06-30T14:43:23.000Z 2023-06-30T14:45:16.000Z | ||||||
211 | exp55 | 2023-06-30T14:30:46.158Z | kernelCTF{v1:lts-6.1.35:1688135277} kernelCTF{v1:mitigation-6.1:1688119118} | 0-day | lts-6.1.35 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3e337087c3b5805fe0b8a46ba622a962880b5d64 | net/sched: sch_qfq: account for stab overhead in qfq_enqueue | CVE-2023-3611 | e71411f03a07a4dd7704e5acc8df038e8c3478187a8e18401218fbf0e86fe326 | 2023-07-14T09:53:41.597Z | 2023-07-14T09:53:41.597Z | 2023-06-30T14:27:57.000Z 2023-06-30T09:58:38.000Z | |||
212 | exp54 | 2023-06-30T13:59:13.873Z | kernelCTF{v1:lts-6.1.36:1688132204} | 0-day | lts-6.1.36 | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/sched?id=0323bce598eea038714f941ce2b22541c46d488f | net/sched: cls_fw: Fix improper refcount update leads to use-after-free | CVE-2023-3776 | b12ac23cb3e71ae06cf173c028fd8174e3d24bea0eb14d000d280f3d2087bf33 | 2023-07-14T07:03:47.754Z | 2023-07-20T15:14:01.927Z | 2023-06-30T13:36:44.000Z | |||
213 | exp53 | 2023-06-29T11:15:47.301Z | kernelCTF{v1:lts-6.1.31:1688002611} kernelCTF{v1:mitigation-6.1:1688019797} | 0-day | (dupe) | 99a4d75e4fdcb5fcd2fbbf7aabd1ea87facd045378f21d8c9aad7ccae297dd06 | 2023-07-01T06:28:02.782Z | 2023-06-29T01:36:51.000Z 2023-06-29T06:23:17.000Z | |||||||
214 | exp52 | 2023-06-28T07:30:04.725Z | kernelCTF{v1:mitigation-6.1:1687935929} kernelCTF{v1:mitigation-6.1-v2:1688980403} | 1-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3037933448f60f9acb705997eae62013ecb81e0d | net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg | CVE-2023-31436 | Mitigation was not correctly enabled on the mitigation-6.1 instance (CONFIG_KMALLOC_SPLIT_VARSIZE was missing), but new instance, mitigation-6.1-v2 was released and the flag for the new instance was resubmitted (new flag was added to the table manually but timestamps reflect the original submission date). | dc8b44a438d7bbc4303da233fc78060e321adb70590145f0f895000d31421815 | 2023-06-28T07:30:04.725Z | 2023-07-10T09:25:06.327Z | 2023-06-28T07:05:29.000Z | |||
215 | exp51 | 2023-06-26T19:20:55.992Z | kernelCTF{v1:lts-6.1.31:1687806236} | 0-day | (dupe) | a24cdfaf5b3a7efcfce9b0804c52a57b159a930d2865e6c978d68bb812b90352 | 2023-06-26T19:20:55.992Z | 2023-06-26T19:03:56.000Z | |||||||
216 | exp50 | 2023-06-22T20:58:29.213Z | kernelCTF{v1:mitigation-6.1:1687467335} | 1-day | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1240eb93f0616b21c675416516ff3d74798fdc97 | netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE | CVE-2023-3390 | 7bdead6f53957a270ca89cc8acd0d193e6a873aa4bb03da3ce58834aec431c28 | 2023-06-22T20:58:29.213Z | 2023-07-12T15:39:29.837Z | 2023-06-22T20:55:35.000Z | ||||
217 | exp49 | 2023-06-22T00:50:05.631Z | kernelCTF{v1:cos-105-17412.101.17:1687394420} | 1-day | cos-105-17412.101.17 | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1240eb93f0616b21c675416516ff3d74798fdc97 | netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE | CVE-2023-3390 | a4b37eae079d896ea228258d3c6e0d735dad3ca7afe95a24c88d728009d69980 | 2023-06-22T00:50:05.631Z | 2023-07-09T02:18:06.653Z | 2023-06-22T00:40:20.000Z | |||
218 | exp48 | 2023-06-21T12:44:28.429Z | kernelCTF{v1:lts-6.1.31:1687350592} | 1-day | lts-6.1.31 | https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1240eb93f0616b21c675416516ff3d74798fdc97 | netfilter: nf_tables: incorrect error path handling with NFT_MSG_NEWRULE | CVE-2023-3390 | 4978de7e9cc89c8680fce664228b0410fcbd9b257b9fb1e21f4f146fe48df47a | 2023-06-21T12:44:28.429Z | 2023-07-09T02:18:08.546Z | 2023-06-21T12:29:52.000Z | |||
219 | exp47 | 2023-06-16T13:45:28.797Z | kernelCTF{v1:mitigation-6.1:1686922770} | 1-day | https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2c02d41d71f90a5168 | net/ulp: prevent ULP without clone op from entering the LISTEN status | CVE-2023-0461 | e7db4e79c6e4bdba0a3d746246ad51a10d97f0464aa1e7d6675907ebc45d556f | 2023-06-16T13:45:28.797Z | 2023-07-12T15:28:20.384Z | 2023-06-16T13:39:30.000Z |
1 | Initial Submission (Form) | Flag Submission (Form) | Details | CVE | Notes |
---|---|---|---|---|---|
2 | 2023-06-30T00:12:28.715Z | 2023-06-30T00:12:28.718Z | { "Environment": "Linux kernel x86 boot executable bzImage, version 6.1.25-242002-gf17b0ab65d17 (poprdi@rbx.c.googlers.com) #4 SMP PREEMPT_DYNAMIC Wed Apr 26 15:51:57 UTC 2023, RO-rootFS, swap_dev 0XA, Normal VGA", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9471f1f2f50282b9e8f59198ec6bb738b4ccc009", "Syzkaller reference": "https://syzkaller.appspot.com/bug?extid=f3728183b2f78d0d40f6", "Flag": [ "custominfra-6.1-upstream-dynflag-1687971601" ], "Time": "2023-06-30T00:12:28.714Z" } | CVE-2023-3269 | self-dupe of the previous CVE-2023-3269 |
3 | 2023-06-22T12:51:23.548Z | 2023-06-22T12:51:23.551Z | { "Environment": "NAME=\"Container-Optimized OS\"\nID=cos\nPRETTY_NAME=\"Container-Optimized OS from Google\"\nHOME_URL=\"https://cloud.google.com/container-optimized-os/docs\"\nBUG_REPORT_URL=\"https://cloud.google.com/container-optimized-os/docs/resources/support-policy#contact_us\"\nGOOGLE_METRICS_PRODUCT_ID=26\nKERNEL_COMMIT_ID=49bc994351b9c898076f2d1e9a5d0565c5152de8\nGOOGLE_CRASH_ID=Lakitu\nVERSION=101\nVERSION_ID=101\nBUILD_ID=17162.210.12\nhttps://console.cloud.google.com/compute/imagesDetail/projects/gke-node-images/global/images/gke-12317-gke2000-cos-93-16623-341-29-v230328-pre\nhttps://console.cloud.google.com/compute/imagesDetail/projects/gke-node-images/global/images/gke-1259-gke2300-cos-101-17162-210-12-v230516-c-cgpv1-pre\nhttps://console.cloud.google.com/compute/imagesDetail/projects/cos-cloud/global/images/cos-stable-97-16919-103-1;https://compute.googleapis.com/compute/v1/projects/cos-cloud/global/images/cos-stable-97-16919-103-1", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&id=0e388fce7aec40992eadee654193cad345d62663", "Syzkaller reference": "", "Flag": [ "full-chain-1686866406" ], "Time": "2023-06-22T12:51:23.546Z" } | CVE-2023-3389 | self-dupe of the previous (by mistake) |
4 | 2023-06-15T23:45:01.761Z | 2023-06-23T14:04:12.723Z | { "uname -a": "Linux NSJAIL 5.15.107+ #1 SMP Sat May 6 09:12:19 UTC 2023 x86_64 x86_64 x86_64 GNU/Linux", "Hash checksum of exploit": "8c548f587dde569b7b6dadd170bfed5d973a27a5940e09584b506c9ea1658175", "Time": "2023-06-23T14:04:12.722Z", "Environment": "NAME=\"Container-Optimized OS\"\nID=cos\nPRETTY_NAME=\"Container-Optimized OS from Google\"\nHOME_URL=\"https://cloud.google.com/container-optimized-os/docs\"\nBUG_REPORT_URL=\"https://cloud.google.com/container-optimized-os/docs/resources/support-policy#contact_us\"\nGOOGLE_METRICS_PRODUCT_ID=26\nKERNEL_COMMIT_ID=49bc994351b9c898076f2d1e9a5d0565c5152de8\nGOOGLE_CRASH_ID=Lakitu\nVERSION=101\nVERSION_ID=101\nBUILD_ID=17162.210.12\nhttps://console.cloud.google.com/compute/imagesDetail/projects/gke-node-images/global/images/gke-12317-gke2000-cos-93-16623-341-29-v230328-pre\nhttps://console.cloud.google.com/compute/imagesDetail/projects/gke-node-images/global/images/gke-1259-gke2300-cos-101-17162-210-12-v230516-c-cgpv1-pre\nhttps://console.cloud.google.com/compute/imagesDetail/projects/cos-cloud/global/images/cos-stable-97-16919-103-1;https://compute.googleapis.com/compute/v1/projects/cos-cloud/global/images/cos-stable-97-16919-103-1", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&id=0e388fce7aec40992eadee654193cad345d62663", "Syzkaller reference": "", "Flag": [ "full-chain-1686866406" ] } | CVE-2023-3389 | |
5 | 2023-06-12T23:00:06.036Z | 2023-06-30T15:32:14.324Z | { "uname -a": "bzImage_upstream_6.1.25: Linux kernel x86 boot executable bzImage, version 6.1.25-242002-gf17b0ab65d17 (poprdi@rbx.c.googlers.com) #4 SMP PREEMPT_DYNAMIC Wed Apr 26 15:51:57 UTC 2023, RO-rootFS, swap_dev 0XA, Normal VGA", "Hash checksum of exploit": "be57b0fb054f8fe8405d53e38239c9ef6e075a74efbaf47e705a7513b8f7225c kctf.tar.xz", "Time": "2023-06-30T15:32:14.321Z", "Environment": "Linux kernel x86 boot executable bzImage, version 6.1.25-242002-gf17b0ab65d17 (poprdi@rbx.c.googlers.com) #4 SMP PREEMPT_DYNAMIC Wed Apr 26 15:51:57 UTC 2023, RO-rootFS, swap_dev 0XA, Normal VGA", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9471f1f2f50282b9e8f59198ec6bb738b4ccc009", "Syzkaller reference": "https://syzkaller.appspot.com/bug?extid=f3728183b2f78d0d40f6", "Flag": [ "custominfra-6.1-upstream-dynflag-1687971601" ] } | CVE-2023-3269 | |
6 | 2023-06-03T14:06:59.566Z | 2023-07-14T11:40:55.374Z | { "Environment": "NAME=\"Container-Optimized OS\"\nID=cos\nPRETTY_NAME=\"Container-Optimized OS from Google\"\nHOME_URL=\"https://cloud.google.com/container-optimized-os/docs\"\nBUG_REPORT_URL=\"https://cloud.google.com/container-optimized-os/docs/resources/support-policy#contact_us\"\nGOOGLE_CRASH_ID=Lakitu\nGOOGLE_METRICS_PRODUCT_ID=26\nKERNEL_COMMIT_ID=2ca604f1a1e64c7f3b26a42974ba0cb7fda8b1ce\nVERSION=101\nVERSION_ID=101\nBUILD_ID=17162.127.42", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=90cbed5247439a966b645b34eb0a2e037836ea8e", "Syzkaller reference": "", "Flag": [ "full-chain-1685750405" ], "Time": "2023-07-14T11:40:55.372Z" } | CVE-2023-3090 | |
7 | 2023-05-17T10:15:31.845Z | 2023-08-31T23:50:10.210Z | { "Environment": "NAME=\"Container-Optimized OS\"\nID=cos\nPRETTY_NAME=\"Container-Optimized OS from Google\"\nHOME_URL=\"https://cloud.google.com/container-optimized-os/docs\"\nBUG_REPORT_URL=\"https://cloud.google.com/container-optimized-os/docs/resources/support-policy#contact_us\"\nGOOGLE_CRASH_ID=Lakitu\nGOOGLE_METRICS_PRODUCT_ID=26\nKERNEL_COMMIT_ID=2ca604f1a1e64c7f3b26a42974ba0cb7fda8b1ce\nVERSION=101\nVERSION_ID=101\nBUILD_ID=17162.127.42", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=08681391b84da27133deefaaddefd0acfa90c2be", "Syzkaller reference": "", "Flag": [ "full-chain-1684314008" ], "Time": "2023-08-31T23:50:10.189Z" } | CVE-2023-1872 | Only eligible for novelty as the vulnerability (fixed in commit 0868139) was exploited before |
8 | 2023-05-04T18:56:48.086Z | 2023-05-04T18:56:48.091Z | { "Environment": "Linux mitigations-old 5.19.0-00015-gc02401c87a2d-dirty #20 SMP PREEMPT_DYNAMIC Thu Aug 11 14:56:54 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d94c04c0db024922e886c9fd429659f22f48ea4", "Syzkaller reference": "", "Flag": [ "custominfra-6.1-mitigation-dynflag-1683223201" ], "Time": "2023-05-07T17:46:11.800Z" } | CVE-2023-2236 | |
9 | 2023-04-25T13:36:53.959Z | 2023-04-25T13:36:53.964Z | { "Environment": "NAME=\"Container-Optimized OS\"\nID=cos\nPRETTY_NAME=\"Container-Optimized OS from Google\"\nHOME_URL=\"https://cloud.google.com/container-optimized-os/docs\"\nBUG_REPORT_URL=\"https://cloud.google.com/container-optimized-os/docs/resources/support-policy#contact_us\"\nGOOGLE_METRICS_PRODUCT_ID=26\nGOOGLE_CRASH_ID=Lakitu\nKERNEL_COMMIT_ID=f6e5d2660ae03961baf03d01fbe3cd39a10da5e6\nVERSION=101\nVERSION_ID=101\nBUILD_ID=17162.127.27\nhttps://console.cloud.google.com/compute/imagesDetail/projects/gke-node-images/global/images/gke-12316-gke2500-cos-93-16623-341-12-v230222-pre\nhttps://console.cloud.google.com/compute/imagesDetail/projects/gke-node-images/global/images/gke-1257-gke1000-cos-101-17162-127-27-v230314-c-cgpv1-pre\nhttps://console.cloud.google.com/compute/imagesDetail/projects/cos-cloud/global/images/cos-stable-97-16919-103-1;https://compute.googleapis.com/compute/v1/projects/cos-cloud/global/images/cos-stable-97-16919-103-1", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a26a35e9019fd70bf3cf647dcfdae87abc7bacea", "Syzkaller reference": "", "Flag": [ "full-chain-1681830005" ], "Time": "2023-04-25T13:36:53.956Z" } | CVE-2023-0468 | |
10 | 2023-04-20T20:11:26.876Z | 2023-04-20T20:11:26.880Z | { "Environment": "NAME=\"Container-Optimized OS\"\nID=cos\nPRETTY_NAME=\"Container-Optimized OS from Google\"\nHOME_URL=\"https://cloud.google.com/container-optimized-os/docs\"\nBUG_REPORT_URL=\"https://cloud.google.com/container-optimized-os/docs/resources/support-policy#contact_us\"\nKERNEL_COMMIT_ID=6ad610c565f244fe339f5b6b22ee309ed7ae882f\nGOOGLE_METRICS_PRODUCT_ID=26\nGOOGLE_CRASH_ID=Lakitu\nVERSION=101\nVERSION_ID=101\nBUILD_ID=17162.127.33\nhttps://console.cloud.google.com/compute/imagesDetail/projects/gke-node-images/global/images/gke-12317-gke300-cos-93-16623-341-12-v230303-pre\nhttps://console.cloud.google.com/compute/imagesDetail/projects/gke-node-images/global/images/gke-1258-gke500-cos-101-17162-127-33-v230323-c-cgpv1-pre\nhttps://console.cloud.google.com/compute/imagesDetail/projects/cos-cloud/global/images/cos-stable-97-16919-103-1;", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=80102f2ee715ab07be476df443bba388d5458fd1", "Syzkaller reference": "", "Flag": [ "kctf-1682992805" ], "Time": "2023-05-07T07:06:57.575Z" } | CVE-2023-2235 | |
11 | 2023-04-20T03:12:44.815Z | 2023-04-22T12:40:46.946Z | { "uname -a": "Linux cos 5.10.162+ #1 SMP Thu Feb 9 10:02:03 UTC 2023 x86_64 Intel(R) Xeon(R) CPU @ 2.80GHz GenuineIntel GNU/Linux", "Hash checksum of exploit": "7456251f4b6bc2897433c2ed9bee042cb1becc81a958f43f8c651933a70a2d9b", "Time": "2023-04-22T12:40:46.944Z", "Environment": "NAME=\"Container-Optimized OS\"\nID=cos\nPRETTY_NAME=\"Container-Optimized OS from Google\"\nHOME_URL=\"https://cloud.google.com/container-optimized-os/docs\"\nBUG_REPORT_URL=\"https://cloud.google.com/container-optimized-os/docs/resources/support-policy#contact_us\"\nGOOGLE_METRICS_PRODUCT_ID=26\nGOOGLE_CRASH_ID=Lakitu\nKERNEL_COMMIT_ID=208d6e1a64e623b491a290b6a8ecc563f2b99dde\nVERSION=93\nVERSION_ID=93\nBUILD_ID=16623.341.12", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3037933448f60f9acb705997eae62013ecb81e0d", "Syzkaller reference": "", "Flag": [ "full-chain-1682164815" ] } | CVE-2023-31436 | |
12 | 2023-04-19T02:43:18.570Z | 2023-04-19T02:43:18.570Z | { "Environment": "Linux (none) 5.19.0 #18 SMP PREEMPT_DYNAMIC Thu Aug 11 09:16:20 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fc7222c3a9f56271fba02aabbfbae999042f1679", "Syzkaller reference": "None", "Flag": ["custominfra-5.19-upstream-dynflag-1681866001"], "Time": "2023-04-19T02:43:18.567Z" } | CVE-2022-3910 | |
13 | 2023-03-28T14:33:09.698Z | 2023-03-28T14:33:09.698Z | { "Environment": "Linux mitigations 5.19.0-00015-gc02401c87a2d-dirty #20 SMP PREEMPT_DYNAMIC Thu Aug 11 14:56:54 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a26a35e9019fd70bf3cf647dcfdae87abc7bacea", "Syzkaller reference": "", "Flag": ["custominfra-5.19-mitigation-dynflag-1678719601"], "Time": "2023-03-28T14:33:09.696Z" } | CVE-2023-0468 | |
14 | 2023-03-21T13:42:23.493Z | 2023-03-21T13:42:23.493Z | { "Environment": "Linux upstream 5.19.0 #18 SMP PREEMPT_DYNAMIC Thu Aug 11 09:16:20 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9d94c04c0db024922e886c9fd429659f22f48ea4", "Syzkaller reference": "", "Flag": ["custominfra-5.19-upstream-dynflag-1679403601"], "Time": "2023-03-21T13:42:23.492Z" } | CVE-2023-2236 | |
15 | 2023-03-02T11:35:20.813Z | 2023-03-06T15:03:14.009Z | { "uname -a": "Linux NSJAIL 5.10.162+ #1 SMP Thu Jan 26 15:59:51 UTC 2023 x86_64 x86_64 x86_64 GNU/Linux", "Hash checksum of exploit": "40afef3ce1d38d2546a3ac64b265730e37e5607d4e252d90d3b349c202a47fe1", "Time": "2023-03-06T15:03:14.007Z", "Environment": "Environment\nNAME=\"Container-Optimized OS\"\nID=cos\nPRETTY_NAME=\"Container-Optimized OS from Google\"\nHOME_URL=\"https://cloud.google.com/container-optimized-os/docs\"\nBUG_REPORT_URL=\"https://cloud.google.com/container-optimized-os/docs/resources/support-policy#contact_us\"\nKERNEL_COMMIT_ID=3db1b2d6a249eff0e52d0964503af751941088d3\nGOOGLE_METRICS_PRODUCT_ID=26\nGOOGLE_CRASH_ID=Lakitu\nVERSION=97\nVERSION_ID=97\nBUILD_ID=16919.235.9\nhttps://console.cloud.google.com/compute/imagesDetail/projects/gke-node-images/global/images/gke-12114-gke14600-cos-89-16108-766-19-v230104-pre\nhttps://console.cloud.google.com/compute/imagesDetail/projects/gke-node-images/global/images/gke-12410-gke1200-cos-97-16919-235-9-v230207-c-pre\nhttps://console.cloud.google.com/compute/imagesDetail/projects/cos-cloud/global/images/cos-stable-97-16919-103-1;https://compute.googleapis.com/compute/v1/projects/cos-cloud/global/images/cos-stable-97-16919-103-1", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=da24142b1ef9fd5d36b76e36bab328a5b27523e8 https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=08681391b84da27133deefaaddefd0acfa90c2be", "Syzkaller reference": "", "Flag": [ "full-chain-1677751205" ] } | CVE-2023-1872 | |
16 | 2023-02-15T21:49:10.573Z | 2023-02-25T15:25:21.339Z | { "uname -a": "Linux cos 5.4.202+ #1 SMP Sat Sep 10 09:46:17 PDT 2022 x86_64 Intel(R) Xeon(R) CPU @ 2.80GHz GenuineIntel GNU/Linux", "Hash checksum of exploit": "902ea63766c45cc4ef61bd52552ef1b75ebb99810df3f904779df28eb6aedb3c", "Time": "2023-02-25T15:25:21.337Z", "Environment": "VERSION=89\nVERSION_ID=89\nBUILD_ID=16108.717.30", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c710f75256bb3cf05ac7b1672c82b92c43f3d28", "Syzkaller reference": "", "Flag": [ "full-chain-1677333612" ] } | CVE-2023-1829 | |
17 | 2023-02-06T13:39:11.756Z | 2023-02-06T13:39:11.758Z | { "Environment": "NAME=\"Container-Optimized OS\"\nID=cos\nPRETTY_NAME=\"Container-Optimized OS from Google\"\nHOME_URL=\"https://cloud.google.com/container-optimized-os/docs\"\nBUG_REPORT_URL=\"https://cloud.google.com/container-optimized-os/docs/resources/support-policy#contact_us\"\nGOOGLE_CRASH_ID=Lakitu\nKERNEL_COMMIT_ID=d45a5f95207952be35f6d99da9bf7e5b1c3c1d7a\nGOOGLE_METRICS_PRODUCT_ID=26\nVERSION=97\nVERSION_ID=97\nBUILD_ID=16919.189.3\nhttps://console.cloud.google.com/compute/imagesDetail/projects/gke-node-images/global/images/gke-12114-gke5300-cos-89-16108-717-14-v220831-pre\nhttps://console.cloud.google.com/compute/imagesDetail/projects/gke-node-images/global/images/gke-1247-gke900-cos-97-16919-189-3-v221026-c-pre\nhttps://console.cloud.google.com/compute/imagesDetail/projects/cos-cloud/global/images/cos-stable-97-16919-103-1;https://compute.googleapis.com/compute/v1/projects/cos-cloud/global/images/cos-stable-97-16919-103-1", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/io_uring?h=linux-5.10.y&id=788d0824269bef539fe31a785b1517882eafed93", "Syzkaller reference": "", "Flag": [ "full-chain-1675404006" ], "Time": "2023-02-06T13:39:11.754Z" } | CVE-2023-1295 | |
18 | 2023-01-21T00:44:45.621Z | 2023-02-27T23:08:50.354Z | { "uname -a": "Linux NSJAIL 5.10.147+ #1 SMP Sat Oct 22 14:54:40 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux", "Hash checksum of exploit": "4e2355c9c26440a91095ced2ecf6072c7da829d10f29168fb08a201eaf1eeb78", "Time": "2023-02-27T23:08:50.352Z", "Environment": "NAME=\\\"Container-Optimized OS\\\"\\nID=cos\\nPRETTY_NAME=\\\"Container-Optimized OS from Google\\\"\\nHOME_URL=\\\"https://cloud.google.com/container-optimized-os/docs\\\"\\nBUG_REPORT_URL=\\\"https://cloud.google.com/container-optimized-os/docs/resources/support-policy#contact_us\\\"\\nGOOGLE_CRASH_ID=Lakitu\\nKERNEL_COMMIT_ID=d45a5f95207952be35f6d99da9bf7e5b1c3c1d7a\\nGOOGLE_METRICS_PRODUCT_ID=26\\nVERSION=97\\nVERSION_ID=97\\nBUILD_ID=16919.189.3\\nhttps://console.cloud.google.com/compute/imagesDetail/projects/gke-node-images/global/images/gke-12114-gke7100-cos-89-16108-717-30-v220922-pre\\nhttps://console.cloud.google.com/compute/imagesDetail/projects/gke-node-images/global/images/gke-1247-gke900-cos-97-16919-189-3-v221026-c-pre\\nhttps://console.cloud.google.com/compute/imagesDetail/projects/cos-cloud/global/images/cos-stable-97-16919-103-1;https://compute.googleapis.com/compute/v1/projects/cos-cloud/global/images/cos-stable-97-16919-103-1", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=8c710f75256bb3cf05ac7b1672c82b92c43f3d28", "Syzkaller reference": "", "Flag": [ "full-chain-1674259205" ] } | CVE-2023-1829 | |
19 | 2023-01-19T20:50:44.782Z | 2023-02-17T04:00:08.886Z | { "uname -a": "Linux cos 5.10.147+ #1 SMP Sat Oct 22 14:54:40 UTC 2022 x86_64 Intel(R) Xeon(R) CPU @ 2.80GHz GenuineIntel GNU/Linux", "Hash checksum of exploit": "5c4c15b2ecb2f5cf2b685a5a43aa7906286ce3dca8513523bfaa4f5d4b11361f", "Time": "2023-02-17T04:00:08.885Z", "Environment": "NAME=\"Container-Optimized OS\"\nID=cos\nPRETTY_NAME=\"Container-Optimized OS from Google\"\nHOME_URL=\"https://cloud.google.com/container-optimized-os/docs\"\nBUG_REPORT_URL=\"https://cloud.google.com/container-optimized-os/docs/resources/support-policy#contact_us\"\nGOOGLE_CRASH_ID=Lakitu\nKERNEL_COMMIT_ID=d45a5f95207952be35f6d99da9bf7e5b1c3c1d7a\nGOOGLE_METRICS_PRODUCT_ID=26\nVERSION=97\nVERSION_ID=97\nBUILD_ID=16919.189.3\nhttps://console.cloud.google.com/compute/imagesDetail/projects/gke-node-images/global/images/gke-12114-gke7100-cos-89-16108-717-30-v220922-pre\nhttps://console.cloud.google.com/compute/imagesDetail/projects/gke-node-images/global/images/gke-1247-gke900-cos-97-16919-189-3-v221026-c-pre\nhttps://console.cloud.google.com/compute/imagesDetail/projects/cos-cloud/global/images/cos-stable-97-16919-103-1;https://compute.googleapis.com/compute/v1/projects/cos-cloud/global/images/cos-stable-97-16919-103-1", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ee059170b1f7e94e55fa6cadee544e176a6e59c2", "Syzkaller reference": "", "Flag": [ "full-chain-1676602805" ] } | CVE-2023-1281 | |
20 | 2023-01-19T08:00:25.732Z | 2023-03-21T10:22:49.000Z | { "uname -a": "Linux upstream 5.19.0 #18 SMP PREEMPT_DYNAMIC Thu Aug 11 09:16:20 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux", "Hash checksum of exploit": "bd80ca5a488f7e37349d962804e83fd2f7aa738f564d1cf44cc8c3f166ce5a0f", "Time": "2023-03-21T10:22:55.506Z", "Environment": "Linux upstream 5.19.0 #18 SMP PREEMPT_DYNAMIC Thu Aug 11 09:16:20 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=80102f2ee715ab07be476df443bba388d5458fd1", "Syzkaller reference": "", "Flag": ["custominfra-5.19-upstream-dynflag-1679252401"] } | CVE-2023-2235 | |
21 | 2022-12-29T10:38:55.544Z | 2023-01-06T10:46:16.773Z | { "uname -a": "Linux NSJAIL 5.4.202+ #1 SMP Thu Aug 18 09:47:13 PDT 2022 x86_64 x86_64 x86_64 GNU/Linux", "Hash checksum of exploit": "c66f2fcdb23202d7c90273b57110c93072f0f4e1", "Time": "2023-01-06T10:46:16.772Z", "Environment": "NAME=\"Container-Optimized OS\"\nID=cos\nPRETTY_NAME=\"Container-Optimized OS from Google\"\nHOME_URL=\"https://cloud.google.com/container-optimized-os/docs\"\nBUG_REPORT_URL=\"https://cloud.google.com/container-optimized-os/docs/resources/support-policy#contact_us\"\nKERNEL_COMMIT_ID=30e4756a0a1122a53e663e99130dbd560163db94\nGOOGLE_CRASH_ID=Lakitu\nGOOGLE_METRICS_PRODUCT_ID=26\nVERSION=89\nVERSION_ID=89\nBUILD_ID=16108.717.14\nhttps://console.cloud.google.com/compute/imagesDetail/projects/gke-node-images/global/images/gke-12114-gke5300-cos-89-16108-717-14-v220831-pre\nhttps://console.cloud.google.com/compute/imagesDetail/projects/gke-node-images/global/images/gke-1246-gke1500-cos-97-16919-103-48-v221013-c-pre\nhttps://console.cloud.google.com/compute/imagesDetail/projects/cos-cloud/global/images/cos-stable-97-16919-103-1;https://compute.googleapis.com/compute/v1/projects/cos-cloud/global/images/cos-stable-97-16919-103-1", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2c02d41d71f90a5168391b6a5f2954112ba2307c", "Syzkaller reference": "", "Flag": [ "full-chain-1672408819" ] } | CVE-2023-0461 | |
22 | 2022-12-18T08:44:34.241Z | { "uname -a": "Linux NSJAIL 5.4.202+ #1 SMP Thu Aug 18 09:47:13 PDT 2022 x86_64 x86_64 x86_64 GNU/Linux", "Hash checksum of exploit": "8fe10d51829456abe3cf92dcc743867c32479a2e918ea2ce6fe6f37bee06f2f5", "Time": "2022-12-18T08:44:34.237Z" } | n/a | ||
23 | 2022-12-16T09:31:17.072Z | 2023-01-06T03:17:03.323Z | { "uname -a": "Linux NSJAIL 5.10.133+ #1 SMP Sat Sep 10 14:54:12 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux", "Hash checksum of exploit": "f2d020330a99f83c35e7c7a6adc3d7d1ece8a9c09910cfea32160056603cef3c", "Time": "2023-01-06T03:17:03.321Z", "Environment": "Environment\nNAME=\"Container-Optimized OS\"\nID=cos\nPRETTY_NAME=\"Container-Optimized OS from Google\"\nHOME_URL=\"https://cloud.google.com/container-optimized-os/docs\"\nBUG_REPORT_URL=\"https://cloud.google.com/container-optimized-os/docs/resources/support-policy#contact_us\"\nGOOGLE_CRASH_ID=Lakitu\nGOOGLE_METRICS_PRODUCT_ID=26\nKERNEL_COMMIT_ID=815160aaef4a8c2faad58a46af3920545602dc88\nVERSION=97\nVERSION_ID=97\nBUILD_ID=16919.103.48\nhttps://console.cloud.google.com/compute/imagesDetail/projects/gke-node-images/global/images/gke-12114-gke5300-cos-89-16108-717-14-v220831-pre\nhttps://console.cloud.google.com/compute/imagesDetail/projects/gke-node-images/global/images/gke-1246-gke1500-cos-97-16919-103-48-v221013-c-pre\nhttps://console.cloud.google.com/compute/imagesDetail/projects/cos-cloud/global/images/cos-stable-97-16919-103-1;https://compute.googleapis.com/compute/v1/projects/cos-cloud/global/images/cos-stable-97-16919-103-1\n", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/io_uring?h=linux-5.10.y&id=788d0824269bef539fe31a785b1517882eafed93", "Syzkaller reference": "", "Flag": [ "full-chain-1671181209" ] } | CVE-2023-0240 CVE-2023-23586 | |
24 | 2022-12-15T03:12:11.525Z | 2022-12-20T09:19:03.418Z | { "uname -a": "uname -a Linux NSJAIL 5.10.133+ #1 SMP Sat Sep 10 14:54:12 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux", "Hash checksum of exploit": "72f185f7df16c9fa19c339b46707e435cedbe6832339b250a46693696aafb7ae", "Time": "2022-12-20T09:19:03.417Z", "Environment": "NAME=\"Container-Optimized OS\"\nID=cos\nPRETTY_NAME=\"Container-Optimized OS from Google\"\nHOME_URL=\"https://cloud.google.com/container-optimized-os/docs\"\nBUG_REPORT_URL=\"https://cloud.google.com/container-optimized-os/docs/resources/support-policy#contact_us\"\nGOOGLE_CRASH_ID=Lakitu\nGOOGLE_METRICS_PRODUCT_ID=26\nKERNEL_COMMIT_ID=815160aaef4a8c2faad58a46af3920545602dc88\nVERSION=97\nVERSION_ID=97\nBUILD_ID=16919.103.48\nhttps://console.cloud.google.com/compute/imagesDetail/projects/gke-node-images/global/images/gke-12114-gke5300-cos-89-16108-717-14-v220831-pre\nhttps://console.cloud.google.com/compute/imagesDetail/projects/gke-node-images/global/images/gke-1246-gke1500-cos-97-16919-103-48-v221013-c-pre\nhttps://console.cloud.google.com/compute/imagesDetail/projects/cos-cloud/global/images/cos-stable-97-16919-103-1;https://compute.googleapis.com/compute/v1/projects/cos-cloud/global/images/cos-stable-97-16919-1", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=75454b4bbfc7e6a4dd8338556f36ea9107ddf61a", "Syzkaller reference": "", "Flag": [ "full-chain-1671030008" ] } | CVE-2022-4696 | |
25 | 2022-12-13T14:28:30.059Z | { "uname -a": "Linux NSJAIL 5.10.133+ #1 SMP Sat Sep 10 14:54:12 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux", "Hash checksum of exploit": "da4129818f4fe683b62c339f2fd8845f5a26368501ff32f826b8b4d2e623e2f1", "Time": "2022-12-15T07:40:16.845Z" } | n/a | ||
26 | 2022-11-23T21:46:31.707Z | 2022-11-23T21:46:31.707Z | { "Environment": "Linux upstream 5.19.0 #18 SMP PREEMPT_DYNAMIC Thu Aug 11 09:16:20 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fc7222c3a9f56271fba02aabbfbae999042f1679", "Syzkaller reference": "", "Time": "2022-11-23T21:46:31.705Z", "Flag": ["custominfra-5.19-upstream-staticflag-1666267569"] } | CVE-2022-3910 | |
27 | 2022-11-23T21:40:21.687Z | 2022-11-23T21:40:21.687Z | { "Environment": "Linux upstream 5.19.0 #18 SMP PREEMPT_DYNAMIC Thu Aug 11 09:16:20 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fc7222c3a9f56271fba02aabbfbae999042f1679", "Syzkaller reference": "", "Time": "2022-11-23T21:40:21.685Z", "Flag": ["custominfra-5.19-upstream-staticflag-1666267569"] } | CVE-2022-3910 | |
28 | 2022-10-01T16:58:45.995Z | 2022-10-15T14:21:33.000Z | { "uname -a": "Linux mitigations 5.19.0-00015-gc02401c87a2d-dirty #20 SMP PREEMPT_DYNAMIC Thu Aug 11 14:56:54 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux", "Hash checksum of exploit": "source: b1313f2dd26661c1ea2597b6bf138cfc4f6d23d681c640cce3b3e75e271304cc", "Time": "2022-10-15T14:21:38.513Z", "Environment": "Linux mitigations 5.19.0-00015-gc02401c87a2d-dirty #20 SMP PREEMPT_DYNAMIC Thu Aug 11 14:56:54 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=0091bfc81741b8d3aeb3b7ab8636f911b2de6e80", "Syzkaller reference": "", "Flag": ["custominfra-5.19-mitigation-staticflag-1662996596"] } | CVE-2022-2602 | |
29 | 2022-09-12T04:32:59.739Z | 2022-10-16T02:30:21.000Z | { "uname -a": "Linux mitigations 5.19.0-00015-gc02401c87a2d-dirty #20 SMP PREEMPT_DYNAMIC Thu Aug 11 14:56:54 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux", "Hash checksum of exploit": "1182199429fdcdb2f2d8ec736499e34c960ad2ccfb8babb8f727bb59b880f7a5", "Time": "2022-10-16T02:30:25.640Z", "VERSION and BUILD": "5.19", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fc7222c3a9f56271fba02aabbfbae999042f1679", "Syzkaller reference": "", "Environment": "5.19", "Flag": ["custominfra-5.19-mitigation-staticflag-1662713079"] } | CVE-2022-3910 | |
30 | 2022-09-11T15:26:52.085Z | { "uname -a": "5.4.202+ #1 SMP Mon Jul 11 17:24:54 PDT 2022 x86_64 Intel(R) Xeon(R) CPU @ 2.30GHz GenuineIntel GNU/Linux", "Hash checksum of exploit": "cf60b5406eecc0265ecabda269abd3f88fb95f2e1b816d74923d778b68ed6b6e", "Time": "2022-09-11T15:26:52.082Z" } | n/a | ||
31 | 2022-09-11T08:51:15.011Z | 2022-10-15T14:32:29.638Z | { "uname -a": "Linux NSJAIL 5.10.123+ #1 SMP Sat Jul 9 14:51:14 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux", "Hash checksum of exploit": "source: d0e58f5e47545f909bf2e071104e70b847e579575565b8435805cab2c1f958d6", "Time": "2022-10-15T14:32:29.636Z", "Environment": "I did not save these files, and the version has updated by now... Uname: Linux NSJAIL 5.10.123+ #1 SMP Sat Jul 9 14:51:14 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux, from commit ID 6150cfec353314bdc7a9d98a82963b469d9011ea", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=0091bfc81741b8d3aeb3b7ab8636f911b2de6e80", "Syzkaller reference": "", "Flag": [ "full-chain-1662883206" ] } | CVE-2022-2602 | |
32 | 2022-09-08T04:15:28.926Z | 2022-10-19T03:02:57.000Z | { "uname -a": "Linux mitigations 5.19.0-00015-gc02401c87a2d-dirty #20 SMP PREEMPT_DYNAMIC Thu Aug 11 14:56:54 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux", "Hash checksum of exploit": "09528ced4dbaaf3f0e0c20ab84cd75a82cc6a03e5913d16249cce77573114711", "Time": "2022-10-19T03:03:03.418Z", "Environment": "Linux mitigations 5.19.0-00015-gc02401c87a2d-dirty #20 SMP PREEMPT_DYNAMIC Thu Aug 11 14:56:54 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit?id=0091bfc81741b8d3aeb3b7ab8636f911b2de6e80", "Syzkaller reference": "", "Flag": ["custominfra-5.19-mitigation-staticflag-1662713079"] } | CVE-2022-2602 | |
33 | 2022-09-01T12:07:59.728Z | { "uname -a": "5.4.188+ #1 SMP Wed Jun 1 10:05:42 PDT 2022 x86_64 Intel(R) Xeon(R) CPU @ 2.30GHz GenuineIntel GNU/Linux", "Hash checksum of exploit": "ea9037ccd92536089ab4b9f639ec1aa082d3115bc2749171acd07bec1e9553c5", "Time": "2022-09-01T12:07:59.725Z" } | n/a | ||
34 | 2022-08-25T05:53:16.834Z | 2022-08-25T05:53:16.836Z | { "VERSION and BUILD": "Linux NSJAIL 5.10.123+ #1 SMP Sat Jul 9 14:51:14 UTC 2022 x86_64 Intel(R) Xeon(R) CPU @ 2.80GHz GenuineIntel GNU/Linux", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9ad36309e2719a884f946678e0296be10f0bb4c1", "Syzkaller reference": "", "Flag": [ "full-chain-1661403605" ], "Time": "2022-08-25T16:20:41.140Z" } | CVE-2022-2588 | |
35 | 2022-08-16T06:48:52.845Z | 2022-08-16T11:17:48.000Z | { "uname -a": "Linux upstream 5.19.0 #18 SMP PREEMPT_DYNAMIC Thu Aug 11 09:16:20 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux", "Hash checksum of exploit": "15cad460e1665252679aeaf3624b2e7f0400c052e31f04f176389dbe49544d39", "Time": "2022-08-16T11:17:53.572Z", "VERSION and BUILD": "5.19 as of 16/08/2022", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e362359ace6f87c201531872486ff295df306d13", "Syzkaller reference": "", "Flag": ["upstream-5.18-mitigation-builtinflag-1657543477"] } | CVE-2022-2585 | |
36 | 2022-08-15T17:48:04.392Z | 2022-08-16T11:06:14.000Z | { "uname -a": "Linux upstream 5.19.0 #18 SMP PREEMPT_DYNAMIC Thu Aug 11 09:16:20 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux", "Hash checksum of exploit": "f5a234ee561228ca73d80d3312c02d15ed4dbcc816e78f3c8796f191b096463a", "Time": "2022-08-16T11:06:21.415Z", "VERSION and BUILD": "5.19 as of 16/08/2022", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e362359ace6f87c201531872486ff295df306d13", "Syzkaller reference": "", "Flag": ["upstream-5.18-mitigation-builtinflag-1657543477"] } | CVE-2022-2585 | |
37 | 2022-08-10T07:56:50.048Z | 2022-08-16T07:55:13.554Z | { "uname -a": "Linux NSJAIL 5.10.107+ #1 SMP Sat May 28 15:06:36 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux", "Hash checksum of exploit": "3bc3088862fade6c93ba4d55b456735c6d6f02f067368f49ebed379efba7f58f", "Time": "2022-08-16T07:55:13.553Z", "VERSION and BUILD": "VERSION:97, BUILD_ID:16919.29.40", "Link to the patch": "https://github.com/torvalds/linux/commit/e362359ace6f87c201531872486ff295df306d13", "Syzkaller reference": "", "Flag": [ "full-chain-1660125606" ] } | CVE-2022-2585 | |
38 | 2022-08-05T06:13:28.081Z | 2022-09-06T06:44:51.790Z | { "uname -a": "Linux NSJAIL 5.4.188+ #1 SMP Sun Apr 24 10:03:06 PDT 2022 x86_64 x86_64 x86_64 GNU/Linux", "Hash checksum of exploit": "233be378d5e6e38ec46532454c3a5a4a8325f914bf8523e37027026e7dbe5573 exp.tar.gz", "Time": "2022-09-06T06:44:51.789Z", "VERSION and BUILD": "VERSION=89 BUILD_ID=16108.659.8", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit?h=linux-5.4.y&id=fc78b2fc21f10c4c9c4d5d659a685710ffa63659", "Syzkaller reference": "", "Flag": [ "full-chain-1659668418" ] } | CVE-2022-3176 | |
39 | 2022-06-22T05:56:05.827Z | 2022-06-27T10:30:59.278Z | { "uname -a": "Linux NSJAIL 5.10.107+ #1 SMP Fri Apr 8 00:42:09 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux", "Hash checksum of exploit": "2555b1a8fb63badd714c9630b180ae85d47a0520bf70ee728b7b054ede91d2bc", "Time": "2022-06-27T10:30:59.277Z", "VERSION and BUILD": "VERSION=97 VERSION_ID=97 BUILD_ID=16919.29.9", "Link to the patch": "https://git,.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=df3f3bb5059d20ef094d6b2f0256c4bf4127a859", "Syzkaller reference": "", "Flag": [ "full-chain-1655856006" ] } | CVE-2022-2327 | |
40 | 2022-06-19T17:23:22.362Z | 2022-08-04T23:50:43.766Z | { "uname -a": "Linux NSJAIL 5.10.109+ #1 SMP Wed Apr 6 00:40:21 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux", "Hash checksum of exploit": "101cedc12b7357ff3377cb6fcbf5ac2ace15511a8ad18e1e2239f3a53006816d", "Time": "2022-08-04T23:50:43.764Z", "VERSION and BUILD": "Linux instance-2 5.10.107+ #1 SMP Sat May 28 15:06:36 UTC 2022 x86_64 Intel(R) Xeon(R) CPU @ 2.20GHz GenuineIntel GNU/Linux", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=2ee0cab11f6626071f8a64c7792406dabdd94c8d", "Syzkaller reference": "", "Flag": [ "full-chain-1659654005" ] } | CVE-2022-20409 | |
41 | 2022-06-07T22:56:56.725Z | 2022-08-16T08:38:15.194Z | { "uname -a": "Linux NSJAIL 5.10.109+ #1 SMP Wed Apr 6 00:40:21 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux", "Hash checksum of exploit": "991ef8863d17b67c0f1a0a74038bcd18aa8bf701e757bfffaa3d8b7c5611e26d", "Time": "2022-08-16T08:38:15.193Z", "VERSION and BUILD": "Linux NSJAIL 5.10.109+ #1 SMP Wed Apr 6 00:40:21 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e362359ace6f87c201531872486ff295df306d13", "Syzkaller reference": "", "Flag": [ "full-chain-1654898405" ] } | CVE-2022-2585 | |
42 | 2022-05-12T16:35:29.771Z | { "uname -a": "Linux NSJAIL 5.10.90+ #1 SMP Sat Mar 5 10:09:49 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux", "Hash checksum of exploit": "136acdaaad480fc141000375015f1b281369ae05a0c84884d3cf10658c195969", "Time": "2022-05-12T16:35:29.767Z" } | n/a | ||
43 | 2022-04-29T19:35:57.722Z | 2022-05-27T22:52:00.070Z | { "uname -a": "5.10.90+ #1 SMP Sat Mar 5 10:09:49 UTC 2022 x86_64 Intel(R) Xeon(R) CPU @ 2.80GHz GenuineIntel GNU/Linux", "Hash checksum of exploit": "65733f4fd504631b4e04c2f8f66b71d9ac9d70d2878084ced9cac644f5f1d9c1", "Time": "2022-05-27T22:52:00.068Z", "VERSION and BUILD": "Linux NSJAIL 5.10.90+ #1 SMP Sat Mar 5 10:09:49 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable-rc.git/commit/?h=linux-5.10.y&id=29f077d070519a88a793fbc70f1e6484dc6d9e35", "Syzkaller reference": "", "Flag": [ "full-chain-1651258806" ] } | CVE-2022-1786 | |
44 | 2022-04-28T23:59:24.349Z | 2022-04-28T23:59:24.353Z | { "VERSION and BUILD": "VERSION=93 VERSION_ID=93 BUILD_ID=16623.102.23", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ebe48d368e97d007bfeb76fcb065d6cfc4c96645", "Syzkaller reference": "https://syzkaller.appspot.com/bug?id=517fa734b92b7db404c409b924cf5c997640e324", "Flag": [ "full-chain-1651183206" ], "Time": "2022-04-28T23:59:24.339Z" } | CVE-2022-27666 CVE-2022-0886 | |
45 | 2022-04-11T07:31:31.935Z | 2022-04-15T15:30:54.019Z | { "uname -a": "Linux instance-8 5.4.170+ #1 SMP Tue Jan 18 21:21:01 PST 2022 x86_64 x86_64 x86_64 GNU/Linux", "Hash checksum of exploit": "17f08e63d6ddabcdc994747800eb3033109a7122200b9ca490777d31c8fbfc11 /tmp/exp", "Time": "2022-04-15T15:30:54.015Z", "VERSION and BUILD": "VERSION=89 VERSION_ID=89 BUILD_ID=16108.604.3", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/fs/io_uring.c?h=v5.4.189&id=1a623d361ffe5cecd4244a02f449528416360038", "Syzkaller reference": "", "Flag": [ "full-chain-1649898020" ] } | CVE-2022-1116 | |
46 | 2022-04-08T05:30:50.283Z | 2022-04-12T09:44:55.428Z | { "uname -a": "Linux NSJAIL 5.10.90+ #1 SMP Sat Feb 12 10:05:14 UTC 2022 x86_64 Intel(R) Xeon(R) CPU @ 2.80GHz GenuineIntel GNU/Linux", "Hash checksum of exploit": "source:2608c4bcdb091ed2176d6ecdd319a473407c55233d61ed9beccb9b1d99c18202, binary:d75ec46b5c3f0d364b3f7c51ca14956c94f9de54aca84b6e159ac3ee55873541", "Time": "2022-04-12T09:44:55.425Z", "VERSION and BUILD": "93 and 16623.102.12 ", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e677edbcabee849bfdd43f1602bccbecf736a646", "Syzkaller reference": "", "Flag": [ "full-chain-1649394007" ] } | CVE-2022-29582 | |
47 | 2022-03-16T00:06:06.187Z | 2022-03-16T00:06:06.191Z | { "VERSION and BUILD": "VERSION=89 BUILD_ID=16108.534.18", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04c2a47ffb13c29778e2a14e414ad4cb5a5db4b5", "Syzkaller reference": "", "Flag": [ "full-chain-1647385213" ], "Time": "2022-03-19T23:43:26.203Z" } | CVE-2022-1055 | |
48 | 2022-02-22T04:40:29.167Z | 2022-03-15T12:51:38.967Z | { "uname -a": "Linux NSJAIL 5.4.144+ #1 SMP Wed Nov 3 09:56:10 PDT 2021 x86_64 x86_64 x86_64 GNU/Linux", "Hash checksum of exploit": "a8a997e5b98d2b22f23f54bd26793a11cabf17f821c34a8b683c89834ab41492", "Time": "2022-03-17T03:01:20.786Z", "VERSION and BUILD": "VERSION=93 BUILD_ID=16623.102.4", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ebe48d368e97d007bfeb76fcb065d6cfc4c96645", "Syzkaller reference": "https://syzkaller.appspot.com/bug?id=517fa734b92b7db404c409b924cf5c997640e324", "Flag": [ "full-chain-1647471605" ] } | CVE-2022-27666 CVE-2022-0886 | |
49 | 2022-02-12T16:44:40.916Z | 2022-03-14T13:22:51.881Z | { "uname -a": "Linux NSJAIL 5.4.120+ #1 SMP Wed Aug 18 10:20:32 PDT 2021 x86_64 Intel(R) Xeon(R) CPU @ 2.80GHz GenuineIntel GNU/Linux", "Hash checksum of exploit": "e25f127fc3b32be97a040faac5f97164e04fc266", "Time": "2022-03-14T13:22:51.876Z", "VERSION and BUILD": "VERSION_ID=89 BUILD_ID=16108.470.16", "Link to the patch": "ebe48d368e97d007bfeb76fcb065d6cfc4c96645", "Syzkaller reference": "57375340ab81a369df5da5eb16cfcd4aef9dfb9d", "Flag": [ "full-chain-1644681623" ] } | CVE-2022-27666 CVE-2022-0886 | |
50 | 2022-01-24T10:39:33.924Z | { "uname -a": "Linux NSJAIL 5.4.120+ #1 SMP Wed Aug 18 10:20:32 PDT 2021 x86_64 Intel(R) Xeon(R) CPU @ 2.80GHz GenuineIntel GNU/Linux", "Hash checksum of exploit": "f3c5659e93474c9434a7afb8120f139d78930fc2" } | n/a | ||
51 | 2022-01-22T08:34:29.779Z | 2022-08-17T22:18:39.943Z | { "uname -a": "Linux NSJAIL 5.10.68+", "Hash checksum of exploit": "5859a79450bdebdaa4a9f41c187ab5cafd2666f102d3cdb77382b0bd5234ae86", "VERSION and BUILD": "Linux NSJAIL 5.10.123+ #1 SMP Sat Jul 9 14:51:14 UTC 2022 x86_64 Intel(R) Xeon(R) CPU @ 2.80GHz GenuineIntel GNU/Linux", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9ad36309e2719a884f946678e0296be10f0bb4c1", "Syzkaller reference": "", "Flag": [ "full-chain-1660773606" ], "Time": "2022-08-17T22:18:39.941Z" } | CVE-2022-2588 | |
52 | 2022-01-14T17:23:59.014Z | 2022-01-14T17:23:59.014Z | { "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de29310e8aa03fcbdb41fc92c521756", "Syzkaller reference": "https://syzkaller.appspot.com/bug?id=852ddf3aee4937a946abb6b1331c4336122981b9", "Flag": [ "full-chain-1642176006" ] } | CVE-2022-0185 | |
53 | 2022-01-06T11:30:10.428Z | 2022-01-06T11:30:10.428Z | { "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de29310e8aa03fcbdb41fc92c521756", "Syzkaller reference": "https://syzkaller.appspot.com/bug?id=53c05996968fc87df17de205b461f4f96d5b5907", "Flag": [ "full-chain-1641456005", "kctf-1641456005" ] } | CVE-2022-0185 | |
54 | 2022-01-05T08:25:17.260Z | 2022-01-05T08:25:17.260Z | { "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ec6af094ea28f0f2dda1a6a33b14cd57e36a9755", "Syzkaller reference": "https://syzkaller.appspot.com/bug?id=8b2fd4b920d0bb1e6d9c839a1da0a6b5f5c1b118", "Flag": [ "full-chain-1641358805", "kctf-1641358805" ] } | CVE-2021-22600 | |
55 | 2021-12-27T02:19:49.154Z | 2022-04-21T22:05:16.645Z | { "uname -a": "5.13.0-28-generic #31-Ubuntu SMP Thu Jan 13 17:41:06 UTC 2022 x86_64 x86_64 x86_64 GNU/Linux", "Hash checksum of exploit": "dfad77dfb3fdd5c640834f548cba6c90bacf8f14a5e7eb9a980b61ea084fb03b", "VERSION and BUILD": "VERSION_ID=89 BUILD_ID=16108.470.16", "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3db09e762dc79584a69c10d74a6b98f89a9979f8", "Syzkaller reference": "", "Flag": [ "full-chain-1640566803" ], "Time": "2022-04-21T22:05:16.644Z" } | CVE-2022-29581 | |
56 | 2021-12-24T11:46:53.874Z | 2021-12-24T11:46:53.874Z | { "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b0462726e7ef281c35a7a4ae33e93ee2bc9975b", "Syzkaller reference": "https://syzkaller.appspot.com/bug?id=1bef50bdd9622a1969608d1090b2b4a588d0c6ac", "Flag": [ "full-chain-1640340003", "kctf-1640340003" ] } | CVE-2021-4154 | |
57 | 2021-12-14T04:28:31.137Z | 2021-12-14T04:28:31.137Z | { "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3b0462726e7ef281c35a7a4ae33e93ee2bc9975b", "Syzkaller reference": "https://syzkaller.appspot.com/bug?id=1bef50bdd9622a1969608d1090b2b4a588d0c6ac", "Flag": [ "full-chain-1639450805" ] } | CVE-2021-4154 | |
58 | 2021-04-01T13:15:44.446Z | 2021-04-01T13:15:44.446Z | { "Link to the patch": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b29c457a6511435960115c0f548c4360d5f4801d", "Syzkaller reference": "https://syzkaller.appspot.com/bug?extid=cfc0247ac173f597aaaa", "Flag": [ "full-chain-1617274803" ] } | CVE-2021-22555 |