Datasets:
fixing_commit
stringlengths 12
12
| introducing_commit
stringlengths 12
12
| lifetime_days
int64 0
7.55k
| subsystem
stringclasses 94
values | subsystem_path
stringlengths 6
71
⌀ | bug_type
stringclasses 24
values | severity_hint
stringclasses 7
values | cve_id
stringclasses 127
values | cc_stable
bool 2
classes | fix_subject
stringlengths 13
210
| fix_author
stringlengths 2
43
| fix_author_email
stringlengths 7
52
| intro_author
stringlengths 2
41
⌀ | intro_author_email
stringlengths 7
47
| fixing_date
stringlengths 25
25
| introducing_date
stringlengths 25
25
| files_changed
stringlengths 6
1.15k
⌀ | insertions
int64 0
705k
| deletions
int64 0
276k
| keywords
stringclasses 271
values | related_fixes
stringlengths 12
285
⌀ | stable_versions
stringlengths 3
3.51k
⌀ |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1adaea51c61b
|
d2d6422f8bd1
| 469
|
networking/ipv6
|
net/ipv6/route.c
|
crash
|
high
| null | false
|
ipv6: fix a BUG in rt6_get_pcpu_route() under PREEMPT_RT
|
Jiayuan Chen
|
jiayuan.chen@linux.dev
|
Sebastian Andrzej Siewior
|
bigeasy@linutronix.de
|
2025-12-30 12:04:36 +0100
|
2024-09-17 11:05:53 +0200
|
net/ipv6/route.c
| 12
| 1
| null | null |
20251223051413.124687;0220.1;88.050
|
6595beb40fb0
|
64b8bc7d5f14
| 745
|
networking
|
net/rose/af_rose.c
|
out-of-bounds
|
low
| null | false
|
net: rose: fix invalid array index in rose_kill_by_device()
|
Pwnverse
|
stanksal@purdue.edu
|
Eric Dumazet
|
edumazet@google.com
|
2025-12-30 11:45:51 +0100
|
2023-12-15 11:59:53 +0000
|
net/rose/af_rose.c
| 1
| 1
|
out of bounds;uninitialized
| null |
20251222212227.4116041
|
5939b6dbcda8
|
50bfd9c06f0f
| 34
|
drivers/net
|
drivers/net/ethernet/freescale/enetc/netc_blk_ctrl.c
|
unknown
|
unknown
| null | false
|
net: enetc: do not print error log if addr is 0
|
Wei Fang
|
wei.fang@nxp.com
|
Wei Fang
|
wei.fang@nxp.com
|
2025-12-30 11:30:41 +0100
|
2025-11-25 17:44:47 -0800
|
drivers/net/ethernet/freescale/enetc/netc_blk_ctrl.c
| 7
| 1
| null | null |
20251222022628.4016403
|
99537d5c476c
|
633e98a711ac
| 2,132
|
drivers/net
|
drivers/net/ethernet/cadence/macb_main.c
|
deadlock
|
high
| null | true
|
net: macb: Relocate mog_init_rings() callback from macb_mac_link_up() to macb_open()
|
Xiaolei Wang
|
xiaolei.wang@windriver.com
|
Russell King
|
rmk+kernel@armlinux.org.uk
|
2025-12-30 11:27:45 +0100
|
2020-02-27 12:02:14 -0800
|
drivers/net/ethernet/cadence/macb_main.c
| 2
| 1
|
deadlock
| null |
6.18;20251222015624.1994551
|
6e17474aa9fe
|
32607a332cfe
| 244
|
networking/ipv4
|
net/ipv4/fib_semantics.c
|
dos
|
unknown
| null | false
|
net: fib: restore ECMP balance from loopback
|
Vadim Fedorenko
|
vadim.fedorenko@linux.dev
|
Willem de Bruijn
|
willemb@google.com
|
2025-12-30 11:07:38 +0100
|
2025-04-29 16:22:25 +0200
|
net/ipv4/fib_semantics.c
| 10
| 16
| null | null |
20251221192639.3911901;10.0;203.0;198.51;192.0
|
ac782f4e3bfc
|
493ced1ac47c
| 2,394
|
networking/ipv4
|
net/ipv4/fib_trie.c
|
refcount
|
low
| null | false
|
ipv4: Fix reference count leak when using error routes with nexthop objects
|
Ido Schimmel
|
idosch@nvidia.com
|
David Ahern
|
dsahern@gmail.com
|
2025-12-30 10:39:22 +0100
|
2019-06-10 10:44:56 -0700
|
net/ipv4/fib_trie.c
| 4
| 3
|
reference count
| null |
70.516258;20251221144829.197694;198.51
|
fa0b198be1c6
|
c9b37458e956
| 4,500
|
drivers/net
|
drivers/net/usb/sr9700.c
|
unknown
|
unknown
| null | true
|
net: usb: sr9700: fix incorrect command used to write single register
|
Ethan Nelson-Moore
|
enelsonmoore@gmail.com
|
Liu Junliang
|
liujunliang_ljl@163.com
|
2025-12-30 10:31:54 +0100
|
2013-09-03 22:26:03 -0400
|
drivers/net/usb/sr9700.c
| 2
| 2
| null | null |
1.1;20251221082400.50688
|
58fc7342b529
|
2917f57b6bc1
| 3,472
|
networking/ipv6
|
net/ipv6/calipso.c
|
crash
|
security
| null | false
|
ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr()
|
Will Rosenberg
|
whrosenb@asu.edu
|
Huw Davies
|
huw@codeweavers.com
|
2025-12-29 19:36:45 +0100
|
2016-06-27 15:06:15 -0400
|
net/ipv6/calipso.c
| 2
| 1
| null | null |
20251219173637.797418
|
e34f0df3d81a
|
7ff14c52049e
| 49
|
drivers/net
|
drivers/net/usb/usbnet.c
|
crash
|
high
| null | false
|
usbnet: avoid a possible crash in dql_completed()
|
Eric Dumazet
|
edumazet@google.com
|
Simon Schippers
|
simon.schippers@tu-dortmund.de
|
2025-12-29 19:23:34 +0100
|
2025-11-10 17:28:38 -0800
|
drivers/net/usb/usbnet.c
| 2
| 1
| null | null |
20251219144459.692715;0220.207337
|
3d970eda0034
|
1dfc2e46117e
| 706
|
drivers/net
|
drivers/net/ethernet/google/gve/gve_utils.c
|
unknown
|
unknown
| null | true
|
gve: defer interrupt enabling until NAPI registration
|
Ankit Garg
|
nktgrg@google.com
|
Shailend Chand
|
shailend@google.com
|
2025-12-29 19:09:49 +0100
|
2024-01-23 17:41:31 -0800
|
drivers/net/ethernet/google/gve/gve_main.c;drivers/net/ethernet/google/gve/gve_utils.c
| 3
| 1
| null | null |
0.946369;20251219102945.2193617
|
a48e23221000
|
bba2556efad6
| 1,721
|
drivers/net
|
drivers/net/ethernet/stmicro/stmmac/stmmac_main.c
|
crash
|
high
| null | false
|
net: stmmac: fix the crash issue for zero copy XDP_TX action
|
Wei Fang
|
wei.fang@nxp.com
|
Ong Boon Leong
|
boon.leong.ong@intel.com
|
2025-12-29 17:35:36 +0100
|
2021-04-13 15:06:51 -0700
|
drivers/net/ethernet/stmicro/stmmac/stmmac_main.c
| 15
| 2
| null | null |
216.408054;216.187524;216.308308;216.326576;20251204071332.1907111;216.313351;216.317701;216.122464;216.301694;216.304130;216.322139
|
85f4b0c650d9
|
d45d8979840d
| 2,163
|
drivers/net
|
drivers/net/ethernet/marvell/octeontx2/nic/otx2_ethtool.c
|
out-of-bounds
|
unknown
| null | false
|
octeontx2-pf: fix "UBSAN: shift-out-of-bounds error"
|
Anshumali Gaur
|
agaur@marvell.com
|
Christina Jacob
|
cjacob@marvell.com
|
2025-12-29 16:46:19 +0100
|
2020-01-27 14:33:39 +0100
|
drivers/net/ethernet/marvell/octeontx2/nic/otx2_ethtool.c
| 8
| 0
|
out of bounds
| null |
20251219062226.524844
|
6a02651c4c4b
|
39ae6c50e599
| 41
|
platform
|
drivers/platform/x86/asus-armoury.h
|
hang
|
medium
| null | false
|
platform/x86: asus-armoury: fix ppt data for FA507R
|
Denis Benato
|
denis.benato@linux.dev
|
Luke D. Jones
|
luke@ljones.dev
|
2025-12-29 17:41:21 +0200
|
2025-11-18 10:52:22 +0200
|
drivers/platform/x86/asus-armoury.h
| 18
| 3
| null | null |
20251229150755.1351495
|
66e245db16f0
|
d9a078809356
| 179
|
platform
|
drivers/platform/x86/intel/pmt/discovery.c
|
hang
|
medium
| null | false
|
platform/x86/intel/pmt/discovery: use valid device pointer in dev_err_probe
|
Alok Tiwari
|
alok.a.tiwari@oracle.com
|
David E. Box
|
david.e.box@linux.intel.com
|
2025-12-29 17:22:44 +0200
|
2025-07-03 11:09:32 +0300
|
drivers/platform/x86/intel/pmt/discovery.c
| 2
| 2
| null | null |
20251224095133.115678
|
e44c42c830b7
|
e6c7b3e15559
| 903
|
platform
|
drivers/platform/x86/hp/hp-bioscfg/order-list-attributes.c
|
out-of-bounds
|
high
| null | false
|
platform/x86: hp-bioscfg: Fix out-of-bounds array access in ACPI package parsing
|
Junrui Luo
|
moonafterrain@outlook.com
|
Jorge Lopez
|
jorge.lopez2@hp.com
|
2025-12-29 15:42:53 +0200
|
2023-07-10 14:41:28 +0200
|
drivers/platform/x86/hp/hp-bioscfg/enum-attributes.c;drivers/platform/x86/hp/hp-bioscfg/int-attributes.c;drivers/platform/x86/hp/hp-bioscfg/order-list-attributes.c;drivers/platform/x86/hp/hp-bioscfg/passwdobj-attributes.c;drivers/platform/x86/hp/hp-bioscfg/string-attributes.c
| 14
| 4
|
out of bounds
| null | null |
d37cd54ebeac
|
56f529ce4370
| 324
|
platform
|
drivers/platform/x86/samsung-galaxybook.c
|
uninitialized
|
unknown
| null | true
|
platform/x86: samsung-galaxybook: Fix problematic pointer cast
|
Armin Wolf
|
W_Armin@gmx.de
|
Joshua Grisham
|
josh@joshuagrisham.com
|
2025-12-29 12:55:50 +0200
|
2025-02-07 13:57:03 +0200
|
drivers/platform/x86/samsung-galaxybook.c
| 6
| 3
|
uninitialized
| null |
20251228115556.14362;20251228214217.35972
|
acf44a2361b8
|
1f5556ec8b9e
| 27
|
drivers
|
drivers/vfio/pci/xe/main.c
|
use-after-free
|
unknown
| null | false
|
vfio/xe: Fix use-after-free in xe_vfio_pci_alloc_file()
|
Alper Ak
|
alperyasinak1@gmail.com
|
Michał Winiarski
|
michal.winiarski@intel.com
|
2025-12-28 12:42:46 -0700
|
2025-12-01 09:45:48 +0100
|
drivers/vfio/pci/xe/main.c
| 3
| 1
|
use after free
| null |
20251225151349.360870
|
665077d78dc7
|
2e7c6feb4ef5
| 754
|
drivers
|
drivers/vfio/pci/pds/dirty.c
|
memory-leak
|
low
| null | false
|
vfio/pds: Fix memory leak in pds_vfio_dirty_enable()
|
Zilin Guan
|
zilin@seu.edu.cn
|
Brett Creeley
|
brett.creeley@amd.com
|
2025-12-28 12:33:40 -0700
|
2023-12-04 14:33:21 -0700
|
drivers/vfio/pci/pds/dirty.c
| 5
| 2
|
memory leak
| null |
20251225143150.1117366
|
c9894e6f0160
|
a69040ed57f5
| 45
|
tools
|
tools/sched_ext/scx_show_state.py
|
hang
|
medium
| null | false
|
tools/sched_ext: update scx_show_state.py for scx_aborting change
|
Kohei Enju
|
enjuk@amazon.com
|
Tejun Heo
|
tj@kernel.org
|
2025-12-28 06:11:26 -1000
|
2025-11-12 06:43:44 -1000
|
tools/sched_ext/scx_show_state.py
| 1
| 2
| null | null | null |
f92ff79ba264
|
48e126777386
| 242
|
tools
|
tools/sched_ext/scx_show_state.py
|
null-deref
|
security
| null | false
|
tools/sched_ext: fix scx_show_state.py for scx_root change
|
Kohei Enju
|
enjuk@amazon.com
|
Tejun Heo
|
tj@kernel.org
|
2025-12-28 06:11:13 -1000
|
2025-04-29 08:40:10 -1000
|
tools/sched_ext/scx_show_state.py
| 5
| 2
|
null pointer
| null |
3.14
|
4d1442979e4a
|
df30285b3670
| 172
|
networking
|
net/unix/af_unix.c
|
unknown
|
unknown
| null | true
|
af_unix: don't post cmsg for SO_INQ unless explicitly asked for
|
Jens Axboe
|
axboe@kernel.dk
|
Kuniyuki Iwashima
|
kuniyu@google.com
|
2025-12-28 16:11:22 +0100
|
2025-07-08 18:05:25 -0700
|
net/unix/af_unix.c
| 8
| 3
| null | null | null |
3387a7ad478b
|
9bf66036d686
| 26
|
drivers/net
|
drivers/net/ethernet/microsoft/mana/gdma_main.c
|
use-after-free
|
high
| null | false
|
net: mana: Fix use-after-free in reset service rescan path
|
Dipayaan Roy
|
dipayanroy@linux.microsoft.com
|
Long Li
|
longli@microsoft.com
|
2025-12-28 10:34:00 +0100
|
2025-12-01 13:53:53 -0800
|
drivers/net/ethernet/microsoft/mana/gdma_main.c
| 1
| 1
|
use after free
| null |
698.944283;698.942636;698.943423;00.0;698.943121;698.943793;698.944611;699.121594
|
c04de0c79534
|
b2e9821cff6c
| 32
|
networking
|
net/core/dev.c
|
null-deref
|
security
| null | false
|
net: avoid prefetching NULL pointers
|
Eric Dumazet
|
edumazet@google.com
|
Eric Dumazet
|
edumazet@google.com
|
2025-12-28 10:19:11 +0100
|
2025-11-25 16:10:32 +0100
|
net/core/dev.c
| 5
| 3
|
null pointer
| null |
20251218081844.809008
|
f79f9b7ace17
|
efa5356b0d97
| 3,249
|
networking
|
net/bridge/br_private.h
|
dos
|
low
| null | false
|
net: bridge: Describe @tunnel_hash member in net_bridge_vlan_group struct
|
Bagas Sanjaya
|
bagasdotme@gmail.com
|
Roopa Prabhu
|
roopa@cumulusnetworks.com
|
2025-12-28 10:17:14 +0100
|
2017-02-03 15:21:22 -0500
|
net/bridge/br_private.h
| 1
| 0
| null | null |
20251218042936.24175
|
1ab526d97a57
|
3e3b5dfcd16a
| 1,501
|
nfc
|
net/nfc/core.c
|
use-after-free
|
critical
| null | true
|
net: nfc: fix deadlock between nfc_unregister_device and rfkill_fop_write
|
Deepanshu Kartikey
|
kartikey406@gmail.com
|
Lin Ma
|
linma@zju.edu.cn
|
2025-12-28 09:15:42 +0100
|
2021-11-17 20:17:05 -0800
|
net/nfc/core.c
| 7
| 2
|
use after free;deadlock
| null |
20251217054908.178907;20251218012355.279940
|
a1e077a3f76e
|
7e88b11a862a
| 1,664
|
drivers/net
|
drivers/net/usb/asix_common.c
|
crash
|
high
| null | false
|
net: usb: asix: validate PHY address before use
|
Deepanshu Kartikey
|
kartikey406@gmail.com
|
Oleksij Rempel
|
o.rempel@pengutronix.de
|
2025-12-28 09:05:12 +0100
|
2021-06-07 13:23:02 -0700
|
drivers/net/usb/asix_common.c;drivers/net/usb/ax88172a.c
| 6
| 5
| null | null |
20251218011156.276824;20251217085057.270704
|
a4f800c4487d
|
24e31e474769
| 256
|
drivers/net
|
drivers/net/mdio/mdio-realtek-rtl9300.c
|
crash
|
high
| null | false
|
net: mdio: rtl9300: use scoped for loops
|
Rosen Penev
|
rosenp@gmail.com
|
Chris Packham
|
chris.packham@alliedtelesis.co.nz
|
2025-12-28 08:55:48 +0100
|
2025-04-15 11:00:37 +0200
|
drivers/net/mdio/mdio-realtek-rtl9300.c
| 2
| 4
| null | null |
20251217210153.14641
|
1f4ea4838b13
|
3764e82e5150
| 4,320
|
scripts
|
scripts/mod/devicetable-offsets.c
|
unknown
|
unknown
| null | false
|
mcb: Add missing modpost build support
|
Jose Javier Rodriguez Barbarin
|
dev-josejavier.rodriguez@duagon.com
|
Johannes Thumshirn
|
johannes.thumshirn@men.de
|
2025-12-27 20:48:01 +0100
|
2014-02-28 15:36:37 -0800
|
scripts/mod/devicetable-offsets.c;scripts/mod/file2alias.c
| 12
| 0
| null | null |
20251202084200.10410
|
b08fc4d0ec24
|
e7e2941300d2
| 473
|
scripts
|
scripts/Makefile.build
|
unknown
|
unknown
| null | false
|
kbuild: fix compilation of dtb specified on command-line without make rule
|
Thomas De Schampheleire
|
thomas.de_schampheleire@nokia.com
|
Masahiro Yamada
|
masahiroy@kernel.org
|
2025-12-27 20:48:01 +0100
|
2024-09-09 23:42:13 +0900
|
scripts/Makefile.build
| 14
| 12
| null | null |
20251126100017.1162330
|
07fe35b766a6
|
9362d34acf91
| 49
|
scripts
|
scripts/clang-tools/gen_compile_commands.py
|
unknown
|
unknown
| null | false
|
Revert "scripts/clang-tools: Handle included .c files in gen_compile_commands"
|
Nicolas Schier
|
nsc@kernel.org
|
Pat Somaru
|
patso@likewhatevs.io
|
2025-12-27 20:48:01 +0100
|
2025-11-08 12:18:00 +0100
|
scripts/clang-tools/gen_compile_commands.py
| 7
| 128
| null | null | null |
d42bce414d1c
|
1da6df85c6fb
| 3,487
|
drivers/net
|
drivers/net/dsa/b53/b53_common.c
|
unknown
|
unknown
| null | false
|
net: dsa: b53: skip multicast entries for fdb_dump()
|
Jonas Gorski
|
jonas.gorski@gmail.com
|
Florian Fainelli
|
f.fainelli@gmail.com
|
2025-12-27 17:17:32 +0100
|
2016-06-09 22:21:29 -0700
|
drivers/net/dsa/b53/b53_common.c
| 3
| 0
| null | null |
20251217205756.172123
|
d5dc28305143
|
74715c4ab0fa
| 172
|
drivers/net
|
drivers/net/ethernet/broadcom/bnge/bnge_core.c
|
unknown
|
unknown
| null | false
|
bng_en: update module description
|
Rajashekar Hudumula
|
rajashekar.hudumula@broadcom.com
|
Vikas Gupta
|
vikas.gupta@broadcom.com
|
2025-12-27 16:51:19 +0100
|
2025-07-07 18:54:00 -0700
|
drivers/net/ethernet/broadcom/Kconfig;drivers/net/ethernet/broadcom/bnge/bnge.h;drivers/net/ethernet/broadcom/bnge/bnge_core.c
| 6
| 6
| null | null |
20251217104748.3004706
|
c48c0fd0e196
|
286468210d83
| 5,631
|
drivers
|
drivers/firewire/nosy.c
|
unknown
|
unknown
| null | false
|
firewire: nosy: Fix dma_free_coherent() size
|
Thomas Fourier
|
fourier.thomas@gmail.com
|
Stefan Richter
|
stefanr@s5r6.in-berlin.de
|
2025-12-26 22:04:03 +0900
|
2010-07-27 11:04:10 +0200
|
drivers/firewire/nosy.c
| 5
| 5
| null | null |
20251216165420.38355
|
b14fad555302
|
b9445598d8c6
| 1,583
|
io_uring
|
io_uring/openclose.c
|
memory-leak
|
high
| null | true
|
io_uring: fix filename leak in __io_openat_prep()
|
Prithvi Tambewagh
|
activprithvi@gmail.com
|
Pavel Begunkov
|
asml.silence@gmail.com
|
2025-12-25 07:58:33 -0700
|
2021-08-25 06:36:56 -0600
|
io_uring/openclose.c
| 1
| 1
|
memory leak
| null | null |
1f941b2c23fd
|
78599c42ae3c
| 2,366
|
filesystem
|
fs/nfsd/nfs4state.c
|
error-handling
|
unknown
| null | true
|
nfsd: Drop the client reference in client_states_open()
|
Haoxiang Li
|
lihaoxiang@isrc.iscas.ac.cn
|
J. Bruce Fields
|
bfields@redhat.com
|
2025-12-24 21:33:12 -0500
|
2019-07-03 17:52:50 -0400
|
fs/nfsd/nfs4state.c
| 3
| 1
| null | null | null |
8f9e967830ff
|
e5e9b24ab8fa
| 94
|
filesystem
|
fs/nfsd/nfs4state.c
|
hang
|
medium
| null | true
|
nfsd: use ATTR_DELEG in nfsd4_finalize_deleg_timestamps()
|
Jeff Layton
|
jlayton@kernel.org
|
Jeff Layton
|
jlayton@kernel.org
|
2025-12-24 21:32:34 -0500
|
2025-09-21 19:24:50 -0400
|
fs/nfsd/nfs4state.c
| 1
| 1
| null | null |
2709.375785
|
8072e34e1387
|
e7a8ebc305f2
| 163
|
filesystem
|
fs/nfsd/nfs4state.c
|
refcount
|
high
| null | true
|
nfsd: fix nfsd_file reference leak in nfsd4_add_rdaccess_to_wrdeleg()
|
Chuck Lever
|
chuck.lever@oracle.com
|
Dai Ngo
|
dai.ngo@oracle.com
|
2025-12-24 21:29:24 -0500
|
2025-07-14 12:46:36 -0400
|
fs/nfsd/nfs4state.c
| 10
| 4
|
reference count
| null | null |
a49a2a1baa0c
|
20fa19027286
| 3,086
|
filesystem
|
fs/lockd/svc4proc.c
|
hang
|
medium
| null | true
|
lockd: fix vfs_test_lock() calls
|
NeilBrown
|
neil@brown.name
|
Peng Tao
|
tao.peng@primarydata.com
|
2025-12-24 21:18:46 -0500
|
2017-07-13 17:12:04 -0400
|
fs/lockd/svc4proc.c;fs/lockd/svclock.c;fs/lockd/svcproc.c;fs/locks.c
| 24
| 18
| null | null |
20251021130506.45065
|
61ed08c2fd1d
|
a5baf582f4c0
| 43
|
drivers
|
drivers/firmware/efi/efi.c
|
null-deref
|
security
| null | false
|
arm64: efi: Fix NULL pointer dereference by initializing user_ns
|
Breno Leitao
|
leitao@debian.org
|
Ard Biesheuvel
|
ardb@kernel.org
|
2025-12-24 21:32:57 +0100
|
2025-11-11 18:59:22 +0000
|
drivers/firmware/efi/efi.c
| 1
| 0
|
null pointer
| null |
6.19
|
5688e977ed2b
|
17029cdd8f9d
| 36
|
drivers
|
drivers/firmware/efi/libstub/gop.c
|
crash
|
high
| null | false
|
efi/libstub: gop: Fix EDID support in mixed-mode
|
Hans de Goede
|
johannes.goede@oss.qualcomm.com
|
Thomas Zimmermann
|
tzimmermann@suse.de
|
2025-12-24 21:32:31 +0100
|
2025-11-18 20:39:55 +0100
|
drivers/firmware/efi/libstub/gop.c
| 4
| 4
| null | null | null |
cb6d5aa9c0f1
|
0f0e35790295
| 391
|
fs/smb
|
fs/smb/client/fs_context.c
|
memory-leak
|
low
| null | false
|
cifs: Fix memory and information leak in smb3_reconfigure()
|
Zilin Guan
|
zilin@seu.edu.cn
|
Shyam Prasad N
|
sprasad@microsoft.com
|
2025-12-24 11:07:15 -0600
|
2024-11-28 09:51:07 -0600
|
fs/smb/client/fs_context.c
| 2
| 0
|
memory leak
| null | null |
d8ee3cfdc89b
|
834e772c8db0
| 2,574
|
vhost
|
drivers/vhost/vsock.c
|
use-after-free
|
critical
| null | false
|
vhost/vsock: improve RCU read sections around vhost_vsock_get()
|
Stefano Garzarella
|
sgarzare@redhat.com
|
Stefan Hajnoczi
|
stefanha@redhat.com
|
2025-12-24 08:02:57 -0500
|
2018-12-06 14:28:38 -0500
|
drivers/vhost/vsock.c
| 11
| 4
|
use after free
| null |
1.17;6.18;20251126133826.142496
|
60489936aced
|
12d821bd13d4
| 33
|
regulator
|
drivers/regulator/fp9931.c
|
unknown
|
unknown
| null | false
|
regulator: fp9931: fix regulator node pointer
|
Andreas Kemnade
|
andreas@kemnade.info
|
Andreas Kemnade
|
andreas@kemnade.info
|
2025-12-24 11:31:29 +0000
|
2025-11-20 16:29:17 +0000
|
drivers/regulator/fp9931.c
| 3
| 0
| null | null | null |
88733a0b6487
|
d7d0e73f7de3
| 1,332
|
gpu
|
drivers/gpu/drm/msm/disp/dpu1/dpu_encoder_phys_wb.c
|
null-deref
|
unknown
| null | true
|
drm/msm/dpu: Add missing NULL pointer check for pingpong interface
|
Nikolay Kuratov
|
kniv@yandex-team.ru
|
Abhinav Kumar
|
quic_abhinavk@quicinc.com
|
2025-12-24 11:24:19 +0200
|
2022-05-02 02:13:00 +0300
|
drivers/gpu/drm/msm/disp/dpu1/dpu_encoder_phys_wb.c
| 4
| 6
|
null pointer
| null |
20251211093630.171014
|
da9168d8ef1c
|
d7ec9366b15c
| 39
|
gpu
|
drivers/gpu/drm/msm/disp/dpu1/dpu_encoder_phys.h
|
unknown
|
unknown
| null | false
|
Revert "drm/msm/dpu: Enable quad-pipe for DSC and dual-DSI case"
|
Abel Vesa
|
abel.vesa@oss.qualcomm.com
|
Jun Nie
|
jun.nie@linaro.org
|
2025-12-24 11:24:19 +0200
|
2025-11-14 16:59:27 +0200
|
drivers/gpu/drm/msm/disp/dpu1/dpu_crtc.c;drivers/gpu/drm/msm/disp/dpu1/dpu_crtc.h;drivers/gpu/drm/msm/disp/dpu1/dpu_encoder.c;drivers/gpu/drm/msm/disp/dpu1/dpu_encoder_phys.h;drivers/gpu/drm/msm/disp/dpu1/dpu_hw_catalog.h;drivers/gpu/drm/msm/disp/dpu1/dpu_hw_mdss.h
| 33
| 35
| null | null | null |
35ab5123bd24
|
5978864e34b6
| 40
|
gpu
|
drivers/gpu/drm/msm/disp/dpu1/dpu_plane.c
|
unknown
|
unknown
| null | false
|
Revert "drm/msm/dpu: support plane splitting in quad-pipe case"
|
Abel Vesa
|
abel.vesa@oss.qualcomm.com
|
Jun Nie
|
jun.nie@linaro.org
|
2025-12-24 11:24:19 +0200
|
2025-11-14 05:58:31 +0200
|
drivers/gpu/drm/msm/disp/dpu1/dpu_crtc.c;drivers/gpu/drm/msm/disp/dpu1/dpu_crtc.h;drivers/gpu/drm/msm/disp/dpu1/dpu_plane.c
| 40
| 110
| null | null | null |
dc85a46928c4
|
2b938e3db335
| 351
|
drivers
|
drivers/vfio/pci/nvgrace-gpu/main.c
|
crash
|
high
| null | true
|
vfio/pci: Disable qword access to the PCI ROM bar
|
Kevin Tian
|
kevin.tian@intel.com
|
Ramesh Thomas
|
ramesh.thomas@intel.com
|
2025-12-23 14:07:08 -0700
|
2025-01-06 08:09:53 -0700
|
drivers/vfio/pci/nvgrace-gpu/main.c;drivers/vfio/pci/vfio_pci_rdwr.c;include/linux/vfio_pci_core.h
| 29
| 10
| null | null |
20251218081650.555015
|
d6b5a8d6f142
|
5d4939fc2258
| 36
|
memory
|
mm/ksm.c
|
crash
|
high
| null | false
|
mm/ksm: fix pte_unmap_unlock of wrong address in break_ksm_pmd_entry
|
Sasha Levin
|
sashal@kernel.org
|
Pedro Demarchi Gomes
|
pedrodemargomes@gmail.com
|
2025-12-23 11:23:17 -0800
|
2025-11-16 17:28:28 -0800
|
mm/ksm.c
| 1
| 1
| null | null |
20251220202926.318366
|
a76a5ae2c6c6
|
765973a09803
| 668
|
memory
|
mm/page_owner.c
|
memory-leak
|
low
| null | true
|
mm/page_owner: fix memory leak in page_owner_stack_fops->release()
|
Ran Xiaokai
|
ran.xiaokai@zte.com.cn
|
Oscar Salvador
|
osalvador@suse.de
|
2025-12-23 11:23:17 -0800
|
2024-02-23 17:48:17 -0800
|
mm/page_owner.c
| 1
| 1
|
memory leak
| null |
20251219074232.136482
|
077d925b60c3
|
d245f9b4ab80
| 28
|
memory
|
mm/memremap.c
|
unknown
|
low
| null | false
|
mm/memremap: fix spurious large folio warning for FS-DAX
|
John Groves
|
John@Groves.net
|
Balbir Singh
|
balbirs@nvidia.com
|
2025-12-23 11:23:16 -0800
|
2025-11-24 15:08:47 -0800
|
mm/memremap.c
| 0
| 2
| null | null |
20251219123717.39330
|
0c75714095e0
|
2783088ef24e
| 36
|
memory
|
mm/page_alloc.c
|
deadlock
|
high
| null | false
|
mm/page_alloc: report 1 as zone_batchsize for !CONFIG_MMU
|
Joshua Hahn
|
joshua.hahnjy@gmail.com
|
Joshua Hahn
|
joshua.hahnjy@gmail.com
|
2025-12-23 11:23:16 -0800
|
2025-11-16 17:27:59 -0800
|
mm/page_alloc.c
| 1
| 1
|
deadlock
| null |
20251218083200.2435789
|
f183663901f2
|
86ebd50224c0
| 224
|
other
|
include/linux/mm.h
|
refcount
|
high
| null | true
|
mm: consider non-anon swap cache folios in folio_expected_ref_count()
|
Bijan Tabatabai
|
bijan311@gmail.com
|
Shivank Garg
|
shivankg@amd.com
|
2025-12-23 11:23:15 -0800
|
2025-05-12 23:50:46 -0700
|
include/linux/mm.h
| 4
| 4
|
refcount;reference count
| null |
8.5;6.18;49.641310;49.641311;49.641313;49.641315;20251216200727.2360228;6.8;24.04;49.641314;49.641309
|
6558749ef340
|
da939ef4c494
| 92
|
other
|
rust/kernel/maple_tree.rs
|
crash
|
high
| null | true
|
rust: maple_tree: rcu_read_lock() in destructor to silence lockdep
|
Alice Ryhl
|
aliceryhl@google.com
|
Alice Ryhl
|
aliceryhl@google.com
|
2025-12-23 11:23:15 -0800
|
2025-09-21 14:22:19 -0700
|
rust/kernel/maple_tree.rs
| 10
| 1
| null | null |
1.17;6.19
|
6db12d5c474d
|
bc8e51c05ad5
| 32
|
memory
|
mm/memcontrol.c
|
unknown
|
unknown
| null | false
|
mm: memcg: fix unit conversion for K() macro in OOM log
|
Shakeel Butt
|
shakeel.butt@linux.dev
|
Shakeel Butt
|
shakeel.butt@linux.dev
|
2025-12-23 11:23:15 -0800
|
2025-11-20 13:43:59 -0800
|
mm/memcontrol.c
| 2
| 2
| null | null |
20251216212054.484079
|
e6dbcb7c0e7b
|
2ec41967189c
| 36
|
memory
|
mm/memory-failure.c
|
unknown
|
unknown
| null | false
|
mm: fixup pfnmap memory failure handling to use pgoff
|
Ankit Agrawal
|
ankita@nvidia.com
|
Ankit Agrawal
|
ankita@nvidia.com
|
2025-12-23 11:23:15 -0800
|
2025-11-16 17:28:29 -0800
|
include/linux/memory-failure.h;mm/memory-failure.c
| 20
| 11
| null | null |
20251211070603.338701
|
7013803444dd
|
8f9c447e2e2b
| 1,369
|
tools
|
tools/mm/page_owner_sort.c
|
unknown
|
unknown
| null | true
|
tools/mm/page_owner_sort: fix timestamp comparison for stable sorting
|
Kaushlendra Kumar
|
kaushlendra.kumar@intel.com
|
Chongxi Zhao
|
zhaochongxi2019@email.szu.edu.cn
|
2025-12-23 11:23:14 -0800
|
2022-03-24 19:06:44 -0700
|
tools/mm/page_owner_sort.c
| 5
| 1
| null | null |
20251209044552.3396468
|
632b874d59a3
|
f60b6634cd88
| 224
|
tools
|
tools/testing/selftests/mm/uffd-unit-tests.c
|
crash
|
high
| null | true
|
selftests/mm: fix thread state check in uffd-unit-tests
|
Wake Liu
|
wakel@google.com
|
Peter Xu
|
peterx@redhat.com
|
2025-12-23 11:23:14 -0800
|
2025-05-12 23:50:45 -0700
|
tools/testing/selftests/mm/uffd-unit-tests.c
| 1
| 1
| null | null |
20251210091408.3781445;19.0
|
a3785ae5d334
|
07d24902977e
| 142
|
kernel
|
kernel/kexec_core.c
|
crash
|
security
| null | true
|
kernel/kexec: fix IMA when allocation happens in CMA area
|
Pingfan Liu
|
piliu@redhat.com
|
Alexander Graf
|
graf@amazon.com
|
2025-12-23 11:23:14 -0800
|
2025-08-02 12:01:38 -0700
|
kernel/kexec_core.c
| 7
| 2
| null | null |
40.712576;40.823221;40.827246;40.818498;40.855423;40.816047;20251216014852.8737;40.712410
|
fe55ea85939e
|
07d24902977e
| 142
|
kernel
|
security/integrity/ima/ima_kexec.c
|
hang
|
medium
| null | true
|
kernel/kexec: change the prototype of kimage_map_segment()
|
Pingfan Liu
|
piliu@redhat.com
|
Alexander Graf
|
graf@amazon.com
|
2025-12-23 11:23:13 -0800
|
2025-08-02 12:01:38 -0700
|
include/linux/kexec.h;kernel/kexec_core.c;security/integrity/ima/ima_kexec.c
| 9
| 8
| null | null |
20251216014852.8737
|
02129e623c18
|
09efc56a3b1c
| 32
|
memory
|
mm/damon/vaddr.c
|
unknown
|
unknown
| null | false
|
mm/damon/vaddr: fix missing pte_unmap_unlock in damos_va_migrate_pmd_entry()
|
Akinobu Mita
|
akinobu.mita@gmail.com
|
SeongJae Park
|
sj@kernel.org
|
2025-12-23 11:23:13 -0800
|
2025-11-20 13:44:01 -0800
|
mm/damon/vaddr.c
| 1
| 1
| null | null |
20251209151034.77221
|
7838a4eb8a1d
|
e6cf9e1c4cde
| 606
|
memory
|
mm/page_alloc.c
|
crash
|
high
| null | true
|
mm/page_alloc: change all pageblocks migrate type on coalescing
|
Alexander Gordeev
|
agordeev@linux.ibm.com
|
Johannes Weiner
|
hannes@cmpxchg.org
|
2025-12-23 11:23:12 -0800
|
2024-04-25 20:56:02 -0700
|
mm/page_alloc.c
| 12
| 12
| null | null |
308.988322;308.988253;308.987763;308.988366;308.988373;308.987838;308.988360;308.988153;308.988070;308.988279;308.987275;6.18;308.987791;308.987951;308.987901;308.988267;308.987293;308.988233;308.988133;308.987688;308.988286;308.987774;308.986589;308.988260;308.988139;308.987666;308.988184;308.987960;308.988214;308.988388;308.987692;308.988195;20251215081002.3353900;308.987813;308.987809;308.988087;7.3;308.988227;308.987871;308.987781;308.987768;308.988188;308.987822;308.987439;308.988273;308.988240;308.987890;20251212151457.3898073;308.987859;308.987799;308.987940;308.987657;308.987842;308.987734;308.987682;308.987227;308.988100;308.987830;308.987738;308.987676;308.987708;308.987886;308.988095;308.987929;308.988105;308.987661;308.987786;308.987913;308.988118;308.987744;308.988247;308.987650;308.987749;308.988300;308.987936;308.988202;308.988293;308.987922;308.988305;308.988127;308.987754;308.987759;308.987897;308.988334;308.988350;308.988346;308.987696;308.987907;308.988144;308.987804;308.988208;308.988356;308.988221;308.988380
|
6a0e5b333842
|
1d96320f8d53
| 1,369
|
memory
|
mm/kasan/common.c
|
crash
|
high
| null | true
|
kasan: unpoison vms[area] addresses with a common tag
|
Maciej Wieczor-Retman
|
maciej.wieczor-retman@intel.com
|
Andrey Konovalov
|
andreyknvl@google.com
|
2025-12-23 11:23:12 -0800
|
2022-03-24 19:06:47 -0700
|
mm/kasan/common.c
| 18
| 3
| null | null |
033991.1764945396;6.1
|
6f13db031e27
|
1d96320f8d53
| 1,369
|
memory
|
mm/kasan/common.c
|
crash
|
high
| null | true
|
kasan: refactor pcpu kasan vmalloc unpoison
|
Maciej Wieczor-Retman
|
maciej.wieczor-retman@intel.com
|
Andrey Konovalov
|
andreyknvl@google.com
|
2025-12-23 11:23:11 -0800
|
2022-03-24 19:06:47 -0700
|
include/linux/kasan.h;mm/kasan/common.c;mm/vmalloc.c
| 33
| 3
| null | null |
51.1764874575;6.1
|
007f5da43b3d
|
a0309faf1cb0
| 229
|
memory
|
mm/kasan/hw_tags.c
|
out-of-bounds
|
high
| null | true
|
mm/kasan: fix incorrect unpoisoning in vrealloc for KASAN
|
Jiayuan Chen
|
jiayuan.chen@linux.dev
|
Kees Cook
|
kees@kernel.org
|
2025-12-23 11:23:11 -0800
|
2025-05-07 23:39:41 -0700
|
include/linux/kasan.h;mm/kasan/hw_tags.c;mm/kasan/shadow.c;mm/vmalloc.c
| 8
| 3
|
out of bounds
| null |
2.050;4.1738686764;6.007;0220.1696;5.1764874575
|
c6e8e595a079
|
6ce711f27500
| 2,876
|
lib
|
tools/testing/radix-tree/idr-test.c
|
unknown
|
unknown
| null | true
|
idr: fix idr_alloc() returning an ID out of range
|
Matthew Wilcox (Oracle)
|
willy@infradead.org
|
Matthew Wilcox
|
mawilcox@microsoft.com
|
2025-12-23 11:23:11 -0800
|
2018-02-06 16:41:29 -0500
|
lib/idr.c;tools/testing/radix-tree/idr-test.c
| 23
| 0
| null | null |
20251128161853.3200058
|
5393802c94e0
|
52fbf1134d47
| 2,544
|
other
|
include/linux/genalloc.h
|
unknown
|
low
| null | false
|
genalloc.h: fix htmldocs warning
|
Andrew Morton
|
akpm@linux-foundation.org
|
Alexey Skidanov
|
alexey.skidanov@intel.com
|
2025-12-23 11:23:10 -0800
|
2019-01-04 13:13:46 -0800
|
include/linux/genalloc.h
| 1
| 0
| null | null |
20251127130624.563597
|
2b742094582d
|
382b1e8f30f7
| 27
|
fs/kernfs
|
fs/kernfs/dir.c
|
memory-leak
|
high
| null | false
|
fs/kernfs: null-ptr deref in simple_xattrs_free()
|
Will Rosenberg
|
whrosenb@asu.edu
|
Will Rosenberg
|
whrosenb@asu.edu
|
2025-12-23 16:14:43 +0100
|
2025-11-26 15:19:11 +0100
|
fs/kernfs/dir.c
| 4
| 2
|
memory leak;null pointer
| null |
20251217060107.4171558
|
e7a9f6600166
|
3e082978c331
| 32
|
usb
|
drivers/usb/typec/ucsi/ucsi_yoga_c630.c
|
null-deref
|
medium
| null | false
|
Revert "usb: typec: ucsi: Update UCSI structure to have message in and message out fields"
|
Johan Hovold
|
johan@kernel.org
|
Pooja Katiyar
|
pooja.katiyar@intel.com
|
2025-12-23 15:59:01 +0100
|
2025-11-21 15:13:07 +0100
|
drivers/usb/typec/ucsi/cros_ec_ucsi.c;drivers/usb/typec/ucsi/debugfs.c;drivers/usb/typec/ucsi/displayport.c;drivers/usb/typec/ucsi/ucsi.c;drivers/usb/typec/ucsi/ucsi.h;drivers/usb/typec/ucsi/ucsi_acpi.c;drivers/usb/typec/ucsi/ucsi_ccg.c;drivers/usb/typec/ucsi/ucsi_yoga_c630.c
| 71
| 112
|
null pointer
| null |
1.59;20251222152204.2846;6.19
|
df3e3169303f
|
14ad4c10d5bd
| 6
|
usb
|
drivers/usb/typec/ucsi/ucsi.c
|
null-deref
|
unknown
| null | true
|
Revert "usb: typec: ucsi: Fix null pointer dereference in ucsi_sync_control_common"
|
Greg Kroah-Hartman
|
gregkh@linuxfoundation.org
|
Mario Limonciello (AMD)
|
superm1@kernel.org
|
2025-12-23 15:57:16 +0100
|
2025-12-17 14:54:23 +0100
|
drivers/usb/typec/ucsi/ucsi.c
| 1
| 1
|
null pointer
| null |
20251222152204.2846
|
0dc580d4a651
|
5106dbab44fb
| 0
|
usb
|
drivers/usb/typec/ucsi/ucsi.c
|
hang
|
medium
| null | true
|
Revert "usb: typec: ucsi: Get connector status after enable notifications"
|
Greg Kroah-Hartman
|
gregkh@linuxfoundation.org
|
Hsin-Te Yuan
|
yuanhsinte@chromium.org
|
2025-12-23 15:56:04 +0100
|
2025-12-23 15:41:44 +0100
|
drivers/usb/typec/ucsi/ucsi.c
| 59
| 74
| null | null |
20251222152204.2846
|
b4c61e542faf
|
73108aa90cbf
| 4,984
|
usb
|
drivers/usb/host/ohci-nxp.c
|
unknown
|
low
| null | true
|
usb: ohci-nxp: fix device leak on probe failure
|
Johan Hovold
|
johan@kernel.org
|
Roland Stigge
|
stigge@antcom.de
|
2025-12-23 15:48:46 +0100
|
2012-05-01 13:36:18 -0400
|
drivers/usb/host/ohci-nxp.c
| 2
| 0
| null | null |
20251117013428.21840;3.5;20251218153519.19453
|
b4b64fda4d30
|
c84117912bdd
| 6
|
usb
|
drivers/usb/phy/phy-isp1301.c
|
use-after-free
|
medium
| null | true
|
usb: phy: isp1301: fix non-OF device reference imbalance
|
Johan Hovold
|
johan@kernel.org
|
Ma Ke
|
make24@iscas.ac.cn
|
2025-12-23 15:48:46 +0100
|
2025-12-17 14:53:36 +0100
|
drivers/usb/phy/phy-isp1301.c
| 6
| 1
|
use after free;reference count
| null |
20251218153519.19453
|
782be79e4551
|
c84117912bdd
| 6
|
usb
|
drivers/usb/gadget/udc/lpc32xx_udc.c
|
null-deref
|
medium
| null | true
|
usb: gadget: lpc32xx_udc: fix clock imbalance in error path
|
Johan Hovold
|
johan@kernel.org
|
Ma Ke
|
make24@iscas.ac.cn
|
2025-12-23 15:48:46 +0100
|
2025-12-17 14:53:36 +0100
|
drivers/usb/gadget/udc/lpc32xx_udc.c
| 10
| 10
|
null pointer
| null |
20251218153519.19453
|
5106dbab44fb
|
c1b0bc2dabfa
| 3,100
|
usb
|
drivers/usb/typec/ucsi/ucsi.c
|
hang
|
medium
| null | true
|
usb: typec: ucsi: Get connector status after enable notifications
|
Hsin-Te Yuan
|
yuanhsinte@chromium.org
|
Heikki Krogerus
|
heikki.krogerus@linux.intel.com
|
2025-12-23 15:41:44 +0100
|
2017-06-27 17:55:45 +0200
|
drivers/usb/typec/ucsi/ucsi.c
| 74
| 59
| null | null | null |
0831269b5f71
|
955a48a5353f
| 32
|
usb
|
drivers/usb/storage/unusual_uas.h
|
hang
|
medium
| null | false
|
usb: usb-storage: Maintain minimal modifications to the bcdDevice range.
|
Chen Changcheng
|
chenchangcheng@kylinos.cn
|
Chen Changcheng
|
chenchangcheng@kylinos.cn
|
2025-12-23 15:41:31 +0100
|
2025-11-21 15:18:54 +0100
|
drivers/usb/storage/unusual_uas.h
| 1
| 1
| null | null |
20251218012318.15978
|
6402078bd9d1
|
342a93247e08
| 1,588
|
drivers/net
|
drivers/net/ethernet/smsc/smc91x.c
|
crash
|
high
| null | false
|
smc91x: fix broken irq-context in PREEMPT_RT
|
Yeoreum Yun
|
yeoreum.yun@arm.com
|
Thomas Gleixner
|
tglx@linutronix.de
|
2025-12-23 15:28:34 +0100
|
2021-08-17 17:43:24 +0200
|
drivers/net/ethernet/smsc/smc91x.c
| 1
| 9
| null | null |
6.18;20251217085115.1730036;13.063043;13.062382;13.062266;13.063235;13.062137;13.062469;13.062494;13.062710;13.062818;13.055000;13.062926;13.062602;13.063124;13.062353
|
00c22b1e8428
|
d9a078809356
| 173
|
platform
|
drivers/platform/x86/intel/pmt/discovery.c
|
memory-leak
|
low
| null | false
|
platform/x86/intel/pmt: Fix kobject memory leak on init failure
|
Kaushlendra Kumar
|
kaushlendra.kumar@intel.com
|
David E. Box
|
david.e.box@linux.intel.com
|
2025-12-23 13:57:48 +0200
|
2025-07-03 11:09:32 +0300
|
drivers/platform/x86/intel/pmt/discovery.c
| 3
| 1
|
memory leak
| null |
20251223084041.3832933
|
b94f11af9d92
|
a0008a3658a3
| 166
|
drivers/net
|
drivers/net/ethernet/wangxun/Kconfig
|
unknown
|
unknown
| null | false
|
net: wangxun: move PHYLINK dependency
|
Arnd Bergmann
|
arnd@arndb.de
|
Mengyuan Lou
|
mengyuanlou@net-swift.com
|
2025-12-23 12:46:11 +0100
|
2025-07-09 18:39:13 -0700
|
drivers/net/ethernet/wangxun/Kconfig
| 1
| 3
| null | null |
20251216213547.115026
|
472c5dd6b95c
|
2e64fe4624d1
| 1,236
|
tools
|
tools/testing/selftests/net/tap.c
|
buffer-overflow
|
high
| null | false
|
selftests: net: fix "buffer overflow detected" for tap.c
|
Alice C. Munduruca
|
alice.munduruca@canonical.com
|
Cezar Bulinaru
|
cbulinaru@gmail.com
|
2025-12-23 12:30:23 +0100
|
2022-08-05 08:59:15 +0100
|
tools/testing/selftests/net/tap.c
| 5
| 11
|
buffer overflow
| null |
20251216170641.250494
|
12cab1191d98
|
4d12997a9bb3
| 4,599
|
drivers/net
|
drivers/net/usb/rtl8150.c
|
memory-leak
|
high
| null | false
|
net: usb: rtl8150: fix memory leak on usb_submit_urb() failure
|
Deepakkumar Karn
|
dkarn@redhat.com
|
Petko Manolov
|
petkan@nucleusys.com
|
2025-12-23 12:12:34 +0100
|
2013-05-20 13:42:05 -0700
|
drivers/net/usb/rtl8150.c
| 2
| 0
|
memory leak
| null |
20251216151304.59865
|
f0e5126f5e55
|
81236c74dba6
| 83
|
tools
|
tools/testing/selftests/drivers/net/psp.py
|
unknown
|
unknown
| null | false
|
selftests: drv-net: psp: fix test names in ipver_test_builder()
|
Daniel Zahka
|
daniel.zahka@gmail.com
|
Jakub Kicinski
|
kuba@kernel.org
|
2025-12-23 12:05:04 +0100
|
2025-09-30 15:17:22 +0200
|
tools/testing/selftests/drivers/net/psp.py
| 2
| 1
| null | null | null |
d52668cac3f9
|
8f90dc6e417a
| 83
|
tools
|
tools/testing/selftests/drivers/net/psp.py
|
unknown
|
unknown
| null | false
|
selftests: drv-net: psp: fix templated test names in psp_ip_ver_test_builder()
|
Daniel Zahka
|
daniel.zahka@gmail.com
|
Jakub Kicinski
|
kuba@kernel.org
|
2025-12-23 12:05:04 +0100
|
2025-09-30 15:17:22 +0200
|
tools/testing/selftests/drivers/net/psp.py
| 2
| 1
| null | null | null |
267ee93c417e
|
fccc9d9233f9
| 695
|
tty
|
drivers/tty/serial/xilinx_uartps.c
|
hang
|
medium
| null | true
|
serial: xilinx_uartps: fix rs485 delay_rts_after_send
|
j.turek
|
jakub.turek@elsta.tech
|
Manikanta Guntupalli
|
manikanta.guntupalli@amd.com
|
2025-12-23 11:55:16 +0100
|
2024-01-27 19:07:08 -0800
|
drivers/tty/serial/xilinx_uartps.c
| 7
| 7
| null | null |
20251221103221.1971125
|
c3ca8a0aac83
|
7cc0e0a43a91
| 383
|
tty
|
drivers/tty/serial/sh-sci.c
|
unknown
|
unknown
| null | true
|
serial: sh-sci: Check that the DMA cookie is valid
|
Claudiu Beznea
|
claudiu.beznea.uj@bp.renesas.com
|
Claudiu Beznea
|
claudiu.beznea.uj@bp.renesas.com
|
2025-12-23 11:54:00 +0100
|
2024-12-04 16:51:25 +0100
|
drivers/tty/serial/sh-sci.c
| 1
| 1
| null | null |
20251217135759.402015
|
f54151148b96
|
24ec03cc5512
| 5
|
tty
|
drivers/tty/serial/serial_base_bus.c
|
unknown
|
unknown
| null | true
|
serial: core: Fix serial device initialization
|
Alexander Stein
|
alexander.stein@ew.tq-group.com
|
Andy Shevchenko
|
andriy.shevchenko@linux.intel.com
|
2025-12-23 11:53:37 +0100
|
2025-12-17 15:10:46 +0100
|
drivers/tty/serial/serial_base_bus.c
| 1
| 0
| null | null |
20251219152813.1893982
|
df60c332caf9
|
4f3b20bfbb75
| 1,054
|
drivers/net
|
drivers/net/ethernet/amd/xgbe/xgbe-phy-v2.c
|
unknown
|
unknown
| null | false
|
amd-xgbe: reset retries and mode on RX adapt failures
|
Raju Rangoju
|
Raju.Rangoju@amd.com
|
Raju Rangoju
|
Raju.Rangoju@amd.com
|
2025-12-23 10:35:15 +0100
|
2023-02-02 15:17:19 +0100
|
drivers/net/ethernet/amd/xgbe/xgbe-phy-v2.c
| 2
| 0
| null | null |
20251215151728.311713
|
a9f96dc59b4a
|
acc43b7bf52a
| 1,189
|
networking
|
net/dsa/dsa.c
|
refcount
|
medium
| null | false
|
net: dsa: fix missing put_device() in dsa_tree_find_first_conduit()
|
Vladimir Oltean
|
vladimir.oltean@nxp.com
|
Vladimir Oltean
|
vladimir.oltean@nxp.com
|
2025-12-23 10:32:08 +0100
|
2022-09-20 10:32:36 +0200
|
net/dsa/dsa.c
| 1
| 7
|
refcount
| null |
00.2;20251215150236.3931670;00.5
|
06e219f6a706
|
71e0bbde0d88
| 3,240
|
networking
|
net/dsa/dsa.c
|
refcount
|
high
| null | false
|
net: dsa: properly keep track of conduit reference
|
Vladimir Oltean
|
vladimir.oltean@nxp.com
|
Florian Fainelli
|
f.fainelli@gmail.com
|
2025-12-23 10:32:08 +0100
|
2017-02-07 10:51:45 -0500
|
include/net/dsa.h;net/dsa/dsa.c
| 35
| 25
|
refcount
|
83c0afaec7b7
|
20251215150236.3931670;00.2;20251214131204.4684
|
06e219f6a706
|
83c0afaec7b7
| 3,488
|
networking
|
net/dsa/dsa.c
|
refcount
|
high
| null | false
|
net: dsa: properly keep track of conduit reference
|
Vladimir Oltean
|
vladimir.oltean@nxp.com
|
Andrew Lunn
|
andrew@lunn.ch
|
2025-12-23 10:32:08 +0100
|
2016-06-04 14:29:55 -0700
|
include/net/dsa.h;net/dsa/dsa.c
| 35
| 25
|
refcount
|
71e0bbde0d88
|
20251215150236.3931670;00.2;20251214131204.4684
|
5e7365b5a1ac
|
9cd451d414f6
| 293
|
drivers/net
|
drivers/net/ethernet/airoha/airoha_eth.c
|
unknown
|
unknown
| null | false
|
net: airoha: Move net_devs registration in a dedicated routine
|
Lorenzo Bianconi
|
lorenzo@kernel.org
|
Lorenzo Bianconi
|
lorenzo@kernel.org
|
2025-12-23 09:30:15 +0100
|
2025-03-04 13:22:10 +0100
|
drivers/net/ethernet/airoha/airoha_eth.c
| 26
| 13
| null | null | null |
35ddf66c65ef
|
bb5e62f2d547
| 305
|
networking/ipv4
|
net/ipv6/ip6_gre.c
|
buffer-overflow
|
high
| null | true
|
erspan: Initialize options_len before referencing options.
|
Frode Nordahl
|
fnordahl@ubuntu.com
|
Gal Pressman
|
gal@nvidia.com
|
2025-12-23 09:21:00 +0100
|
2025-02-20 13:17:16 -0800
|
net/ipv4/ip_gre.c;net/ipv6/ip6_gre.c
| 8
| 4
|
buffer overflow
| null |
20251213101338.4693
|
86730ac255b0
|
ae155060247b
| 33
|
networking
|
net/mptcp/protocol.c
|
unknown
|
low
| null | true
|
mptcp: ensure context reset on disconnect()
|
Paolo Abeni
|
pabeni@redhat.com
|
Paolo Abeni
|
pabeni@redhat.com
|
2025-12-23 09:12:25 +0100
|
2025-11-19 20:07:15 -0800
|
net/mptcp/protocol.c;net/mptcp/protocol.h
| 7
| 4
| null | null |
22.39;6.18
|
71154bbe4942
|
23e89e8ee7be
| 527
|
networking
|
net/mptcp/protocol.h
|
hang
|
medium
| null | true
|
mptcp: fallback earlier on simult connection
|
Paolo Abeni
|
pabeni@redhat.com
|
Kuniyuki Iwashima
|
kuniyu@amazon.com
|
2025-12-23 09:12:25 +0100
|
2024-07-13 15:19:49 -0700
|
net/mptcp/options.c;net/mptcp/protocol.h;net/mptcp/subflow.c
| 12
| 10
| null |
4fd19a307016;1e777f39b4d7
|
1.16
|
71154bbe4942
|
4fd19a307016
| 736
|
networking
|
net/mptcp/protocol.h
|
hang
|
medium
| null | true
|
mptcp: fallback earlier on simult connection
|
Paolo Abeni
|
pabeni@redhat.com
|
Paolo Abeni
|
pabeni@redhat.com
|
2025-12-23 09:12:25 +0100
|
2023-12-17 20:54:22 +0000
|
net/mptcp/options.c;net/mptcp/protocol.h;net/mptcp/subflow.c
| 12
| 10
| null |
23e89e8ee7be;1e777f39b4d7
|
1.16
|
71154bbe4942
|
1e777f39b4d7
| 1,119
|
networking
|
net/mptcp/protocol.h
|
hang
|
medium
| null | true
|
mptcp: fallback earlier on simult connection
|
Paolo Abeni
|
pabeni@redhat.com
|
Dmytro Shytyi
|
dmytro@shytyi.net
|
2025-12-23 09:12:25 +0100
|
2022-11-29 20:24:24 -0800
|
net/mptcp/options.c;net/mptcp/protocol.h;net/mptcp/subflow.c
| 12
| 10
| null |
23e89e8ee7be;4fd19a307016
|
1.16
|
932ac51d9953
|
6c31ff366c11
| 4,577
|
drivers/net
|
drivers/net/team/team_core.c
|
crash
|
high
| null | false
|
team: fix check for port enabled in team_queue_override_port_prio_changed()
|
Jiri Pirko
|
jiri@nvidia.com
|
Jiri Pirko
|
jiri@resnulli.us
|
2025-12-23 09:07:48 +0100
|
2013-06-12 03:05:53 -0700
|
drivers/net/team/team_core.c
| 1
| 1
| null | null |
1.16;20251212102953.167287;0.2928
|
15dd100349b8
|
35f0ce032b0f
| 5,541
|
platform
|
drivers/platform/x86/ibm_rtl.c
|
unknown
|
unknown
| null | false
|
platform/x86: ibm_rtl: fix EBDA signature search pointer arithmetic
|
Junrui Luo
|
moonafterrain@outlook.com
|
Vernon Mauery
|
vernux@us.ibm.com
|
2025-12-22 16:19:19 +0200
|
2010-10-21 10:10:46 -0400
|
drivers/platform/x86/ibm_rtl.c
| 1
| 1
| null | null | null |
1461209cf813
|
03696e51d75a
| 4,684
|
platform
|
drivers/platform/x86/msi-laptop.c
|
unknown
|
unknown
| null | false
|
platform/x86: msi-laptop: add missing sysfs_remove_group()
|
Thomas Fourier
|
fourier.thomas@gmail.com
|
Maxim Mikityanskiy
|
maxtram95@gmail.com
|
2025-12-22 16:17:49 +0200
|
2013-02-24 14:49:53 -0800
|
drivers/platform/x86/msi-laptop.c
| 3
| 0
| null | null |
20251217103617.27668
|
f13bce715d16
|
423c3361855c
| 831
|
platform
|
drivers/platform/mellanox/mlxbf-pmc.c
|
unknown
|
unknown
| null | false
|
platform/mellanox: mlxbf-pmc: Remove trailing whitespaces from event names
|
Shravan Kumar Ramani
|
shravankr@nvidia.com
|
Shravan Kumar Ramani
|
shravankr@nvidia.com
|
2025-12-22 16:09:29 +0200
|
2023-09-13 13:42:29 +0200
|
drivers/platform/mellanox/mlxbf-pmc.c
| 7
| 7
| null | null |
3.1766059953
|
608328ba5b06
|
2997876c4a1a
| 41
|
arch/powerpc
|
arch/powerpc/include/asm/hw_irq.h
|
unknown
|
unknown
| null | false
|
powerpc/32: Restore disabling of interrupts at interrupt/syscall exit
|
Christophe Leroy (CS GROUP)
|
chleroy@kernel.org
|
Christophe Leroy
|
christophe.leroy@csgroup.eu
|
2025-12-22 18:25:07 +0530
|
2025-11-11 14:13:37 +0530
|
arch/powerpc/include/asm/hw_irq.h;arch/powerpc/include/asm/reg.h;arch/powerpc/kernel/entry_32.S;arch/powerpc/kernel/interrupt.c
| 6
| 17
| null | null |
3687.1766146895
|
End of preview. Expand
in Data Studio
Linux Kernel Vulnerability Dataset
125,183 bug-introducing commits mined from 20 years of Linux kernel git history (2005-2025).
Dataset Description
This dataset maps every kernel bug fix with a Fixes: tag back to the commit that introduced the bug. It enables research on:
- Vulnerability detection: Train models to identify bug-introducing commits
- Bug lifetime analysis: Study how long different bug types persist
- Subsystem risk assessment: Identify which kernel subsystems have the longest-lived bugs
- Developer patterns: Analyze who introduces and fixes bugs
Key Statistics
| Metric | Value |
|---|---|
| Total bug-fix pairs | 125,183 |
| Valid records (0 < lifetime < 27 years) | 123,696 |
| Average bug lifetime | 2.1 years |
| Median bug lifetime | 0.7 years |
| Longest-lived bug | 20.7 years |
| Bugs hiding 5+ years | 13.5% |
| Unique fixing commits | 119,449 |
| Unique bug-introducing authors | 9,159 |
| With CVE ID | 158 |
| With Cc: stable | 27,875 (22%) |
Dataset Structure
Data Fields
| Column | Type | Description |
|---|---|---|
fixing_commit |
string | SHA of the commit that fixed the bug |
introducing_commit |
string | SHA of the commit that introduced the bug |
lifetime_days |
int | Days between introduction and fix |
subsystem |
string | Kernel subsystem (networking, drivers, fs, etc.) |
bug_type |
string | Detected bug type (race-condition, null-deref, etc.) |
fix_subject |
string | Commit message subject of the fix |
fixing_date |
datetime | When the fix was committed |
introducing_date |
datetime | When the bug was introduced |
files_changed |
string | Files modified in introducing commit |
insertions |
int | Lines added in introducing commit |
deletions |
int | Lines removed in introducing commit |
cve_id |
string | CVE ID if mentioned in fix commit (nullable) |
cc_stable |
bool | Whether fix was tagged for stable backport |
fix_author |
string | Author of the fix |
intro_author |
string | Author who introduced the bug |
Subsystem Distribution
| Subsystem | Count | Avg Lifetime |
|---|---|---|
| drivers | 38,412 | 2.3 years |
| networking | 6,079 | 2.9 years |
| gpu | 5,212 | 1.4 years |
| filesystem | 4,891 | 2.6 years |
| sound | 3,847 | 2.1 years |
| usb | 2,505 | 3.5 years |
| memory | 2,459 | 1.8 years |
| bpf | 959 | 1.1 years |
Bug Type Distribution
| Bug Type | Count | Avg Lifetime |
|---|---|---|
| null-deref | 4,931 | 2.2 years |
| use-after-free | 2,963 | 3.2 years |
| memory-leak | 2,846 | 3.1 years |
| refcount | 2,209 | 2.8 years |
| deadlock | 1,683 | 2.2 years |
| race-condition | 1,188 | 5.1 years |
| buffer-overflow | 399 | 3.1 years |
| integer-overflow | 298 | 3.9 years |
Collection Methodology
Mining Process
- Clone Linux kernel repository at v6.19-rc3
- Run
git log --grep="Fixes:"to find all fixing commits - Extract the referenced commit hash from each
Fixes:tag using regex - Retrieve metadata (dates, authors, files) from both commits
- Classify subsystem from file paths using 70+ regex patterns
- Detect bug type from commit message keywords
- Calculate lifetime as
fixing_date - introducing_date
Extraction Code
import re
def extract_fixes_tag(commit_msg: str) -> str | None:
"""Extract the commit ID from a Fixes: tag"""
pattern = r'Fixes:\s*([a-f0-9]{12,40})'
match = re.search(pattern, commit_msg, re.IGNORECASE)
return match.group(1) if match else None
Filtering
- Excluded commits where
Fixes:tag points to non-existent hash - Excluded merge commits
- For lifetime analysis: excluded same-day fixes (lifetime_days = 0)
- For lifetime analysis: excluded outliers (lifetime > 10,000 days)
Limitations
- Selection bias: Only ~28% of fix commits use
Fixes:tags. Well-documented bugs (likely more serious) are overrepresented. - Mainline only: Doesn't include bugs fixed only in stable branches or vendor kernels.
- Subsystem classification: Heuristic-based on file paths; some bugs span multiple subsystems.
- Bug type detection: Keyword-based; many bugs classified as "unknown".
- Timestamp accuracy: Uses author dates, not commit dates. Rebasing can skew.
Intended Uses
Recommended
- Training vulnerability detection models (e.g., VulnBERT)
- Analyzing bug lifetime patterns across subsystems
- Studying the evolution of kernel security over time
- Research on code review and testing effectiveness
Out of Scope
- Direct exploit development (commits don't include full code context)
- Claiming completeness of kernel vulnerability data
Citation
@dataset{qu2026kernelvuln,
author = {Qu, Jenny Guanni},
title = {Linux Kernel Vulnerability Dataset},
year = {2026},
publisher = {HuggingFace},
url = {https://huggingface.co/datasets/quguanni/kernel-vuln-dataset}
}
License
MIT License
Contact
- Author: Jenny Guanni Qu
- Email: jenny@pebblebed.com
- Blog post: Kernel bugs hide for 2 years on average
- Downloads last month
- 9