Coder Social home page Coder Social logo

gsd-database's People

Contributors

attritionorg avatar bilalmirza74 avatar g-rath avatar gsd-automation avatar joshbressers avatar joshbuker avatar kurtseifried avatar marcisbee avatar ninjapanzer avatar oliverchang avatar oswalpalash avatar random-oskar avatar raphaelahrens avatar rubenwylleman avatar saakshii12 avatar tdunlap607 avatar westonsteimel avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

gsd-database's Issues

[UVI-2021-1000801] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v5.3 to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=0a462e25ef0f7ab305081a08d435bbd1f13c0a94"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "0a462e25ef0f7ab305081a08d435bbd1f13c0a94",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "ipv6: Fix KASAN: slab-out-of-bounds Read in fib6_nh_flush_exceptions\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit 0a462e25ef0f7ab305081a08d435bbd1f13c0a94, it was introduced in version v5.3 by commit f88d8ea67fbdbac7a64bfa6ed9a2ba27bb822f74. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000812] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v2.6.19 to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=9ec52099e4b8678a60e9f93e41ad87885d64f3e6",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=b8ff869f20152fbe66b6c2e2715d26a2f9897cca"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "9ec52099e4b8678a60e9f93e41ad87885d64f3e6",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "b8ff869f20152fbe66b6c2e2715d26a2f9897cca",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "pid: take a reference when initializing `cad_pid`\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit b8ff869f20152fbe66b6c2e2715d26a2f9897cca, it was introduced in version v2.6.19 by commit 9ec52099e4b8678a60e9f93e41ad87885d64f3e6. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000786] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from  to before v5.10.43",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=3b0becf8b1ecf642a9edaf4c9628ffc641e490d6"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "3b0becf8b1ecf642a9edaf4c9628ffc641e490d6",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "x86/kvm: Disable kvmclock on all CPUs on shutdown\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.10.43 by commit 3b0becf8b1ecf642a9edaf4c9628ffc641e490d6, it was introduced in version  by commit . For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000817] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from  to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=b37885cc013516f0412d7d2e99f043dd112c99a6"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "b37885cc013516f0412d7d2e99f043dd112c99a6",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "btrfs: fix fsync failure and transaction abort after writes to prealloc extents\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit b37885cc013516f0412d7d2e99f043dd112c99a6, it was introduced in version  by commit . For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000821] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from  to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=d1629b5b925de9b27979e929dae7fcb766daf6b6"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "d1629b5b925de9b27979e929dae7fcb766daf6b6",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "x86/kvm: Teardown PV features on boot CPU as well\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit d1629b5b925de9b27979e929dae7fcb766daf6b6, it was introduced in version  by commit . For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000796] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v4.18 to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=e8f69799810c32dd40c6724d829eccc70baad07f",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=0f1e6fe66977a864fe850522316f713d7b926fd9"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "e8f69799810c32dd40c6724d829eccc70baad07f",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "0f1e6fe66977a864fe850522316f713d7b926fd9",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "net/tls: Fix use-after-free after the TLS device goes down and up\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit 0f1e6fe66977a864fe850522316f713d7b926fd9, it was introduced in version v4.18 by commit e8f69799810c32dd40c6724d829eccc70baad07f. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000793] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v5.11 to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=4b2c53d93a4bc9d52cc0ec354629cfc9dc217f93",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=29beadea66a226d744d5ffdcde6b984623053d24"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "4b2c53d93a4bc9d52cc0ec354629cfc9dc217f93",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "29beadea66a226d744d5ffdcde6b984623053d24",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "HID: amd_sfh: Fix memory leak in amd_sfh_work\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit 29beadea66a226d744d5ffdcde6b984623053d24, it was introduced in version v5.11 by commit 4b2c53d93a4bc9d52cc0ec354629cfc9dc217f93. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000824] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v5.0 to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=58956317c8de52009d1a38a721474c24aef74fe7",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=ddf088d7aaaaacfc836104f2e632b29b1d383cfc"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "58956317c8de52009d1a38a721474c24aef74fe7",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "ddf088d7aaaaacfc836104f2e632b29b1d383cfc",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "neighbour: allow NUD_NOARP entries to be forced GCed\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit ddf088d7aaaaacfc836104f2e632b29b1d383cfc, it was introduced in version v5.0 by commit 58956317c8de52009d1a38a721474c24aef74fe7. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000807] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v3.3 to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=7c18d2205ea76eef9674e59e1ecae4f332a53e9e",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=88550e9c900b8800f54963ca2c9a6b4744d13e3d"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "7c18d2205ea76eef9674e59e1ecae4f332a53e9e",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "88550e9c900b8800f54963ca2c9a6b4744d13e3d",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "net: caif: add proper error handling\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit 88550e9c900b8800f54963ca2c9a6b4744d13e3d, it was introduced in version v3.3 by commit 7c18d2205ea76eef9674e59e1ecae4f332a53e9e. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000814] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from  to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=04fb2baa0b147f51db065a1b13a11954abe592d0"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "04fb2baa0b147f51db065a1b13a11954abe592d0",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "ext4: fix memory leak in ext4_mb_init_backend on error path.\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit 04fb2baa0b147f51db065a1b13a11954abe592d0, it was introduced in version  by commit . For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000776] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v2.6.25 to before v5.10.43",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=ce40733ce93de402ed629762f0e912d9af187cef",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=01d349a481f0591230300a9171330136f9159bcd"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "ce40733ce93de402ed629762f0e912d9af187cef",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "01d349a481f0591230300a9171330136f9159bcd",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "ext4: fix memory leak in ext4_fill_super\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.10.43 by commit 01d349a481f0591230300a9171330136f9159bcd, it was introduced in version v2.6.25 by commit ce40733ce93de402ed629762f0e912d9af187cef. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000809] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v3.3 to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=7ad65bf68d705b445ef10b77ab50dab22be185ee",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=dde8686985ec24d6b00487080a906609bd613ea1"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "7ad65bf68d705b445ef10b77ab50dab22be185ee",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "dde8686985ec24d6b00487080a906609bd613ea1",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "net: caif: fix memory leak in cfusbl_device_notify\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit dde8686985ec24d6b00487080a906609bd613ea1, it was introduced in version v3.3 by commit 7ad65bf68d705b445ef10b77ab50dab22be185ee. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000825] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from  to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=9b77839fd4b636c78ae75b2fc4fe8321ea0c9da3"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "9b77839fd4b636c78ae75b2fc4fe8321ea0c9da3",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "x86/kvm: Disable all PV features on crash\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit 9b77839fd4b636c78ae75b2fc4fe8321ea0c9da3, it was introduced in version  by commit . For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000804] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v5.12 to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=9ae1f8dd372e0e4c020b345cf9e09f519265e981",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=876808dba2ff7509bdd7f230c4f374a0caf4f410"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "9ae1f8dd372e0e4c020b345cf9e09f519265e981",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "876808dba2ff7509bdd7f230c4f374a0caf4f410",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "io_uring: fix link timeout refs\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit 876808dba2ff7509bdd7f230c4f374a0caf4f410, it was introduced in version v5.12 by commit 9ae1f8dd372e0e4c020b345cf9e09f519265e981. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000794] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v5.12 to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=64b9cea7a0afe579dd2682f1f1c04f2e4e72fd25",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=b9c78b1a95966a7bd2ddae05b73eafc0cda4fba3"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "64b9cea7a0afe579dd2682f1f1c04f2e4e72fd25",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "b9c78b1a95966a7bd2ddae05b73eafc0cda4fba3",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "mptcp: fix sk_forward_memory corruption on retransmission\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit b9c78b1a95966a7bd2ddae05b73eafc0cda4fba3, it was introduced in version v5.12 by commit 64b9cea7a0afe579dd2682f1f1c04f2e4e72fd25. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000795] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v5.5 to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=66f69b2197167cb99330c77a550da50f1f597abc",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=eba7c76a5651392a9132c54aceddc5af8cfb0938"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "66f69b2197167cb99330c77a550da50f1f597abc",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "eba7c76a5651392a9132c54aceddc5af8cfb0938",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "perf probe: Fix NULL pointer dereference in convert_variable_location()\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit eba7c76a5651392a9132c54aceddc5af8cfb0938, it was introduced in version v5.5 by commit 66f69b2197167cb99330c77a550da50f1f597abc. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000785] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from  to before v5.10.43",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=38b858da1c58ad46519a257764e059e663b59ff2"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "38b858da1c58ad46519a257764e059e663b59ff2",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "x86/kvm: Teardown PV features on boot CPU as well\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.10.43 by commit 38b858da1c58ad46519a257764e059e663b59ff2, it was introduced in version  by commit . For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000811] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v2.6.25 to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=ce40733ce93de402ed629762f0e912d9af187cef",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1385b23396d511d5233b8b921ac3058b3f86a5e1"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "ce40733ce93de402ed629762f0e912d9af187cef",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "1385b23396d511d5233b8b921ac3058b3f86a5e1",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "ext4: fix memory leak in ext4_fill_super\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit 1385b23396d511d5233b8b921ac3058b3f86a5e1, it was introduced in version v2.6.25 by commit ce40733ce93de402ed629762f0e912d9af187cef. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000802] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v5.12 to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=ae81feb7338c89cee4e6aa0424bdab2ce2b52da2",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=2411c02d03892a5057499f8102d0cc1e0f852416"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "ae81feb7338c89cee4e6aa0424bdab2ce2b52da2",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "2411c02d03892a5057499f8102d0cc1e0f852416",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "sch_htb: fix refcount leak in htb_parent_to_leaf_offload\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit 2411c02d03892a5057499f8102d0cc1e0f852416, it was introduced in version v5.12 by commit ae81feb7338c89cee4e6aa0424bdab2ce2b52da2. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000803] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v4.12 to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1769152ac64b0b07583f696b621624df2ca4c840",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=5a5357cd2cd9a38944594eb5cd74377932e176bf"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "1769152ac64b0b07583f696b621624df2ca4c840",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "5a5357cd2cd9a38944594eb5cd74377932e176bf",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "amdgpu: fix GEM obj leak in amdgpu_display_user_framebuffer_create\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit 5a5357cd2cd9a38944594eb5cd74377932e176bf, it was introduced in version v4.12 by commit 1769152ac64b0b07583f696b621624df2ca4c840. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000784] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from  to before v5.10.43",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=0df50d47d17401f9f140dfbe752a65e5d72f9932"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "0df50d47d17401f9f140dfbe752a65e5d72f9932",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "btrfs: abort in rename_exchange if we fail to insert the second ref\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.10.43 by commit 0df50d47d17401f9f140dfbe752a65e5d72f9932, it was introduced in version  by commit . For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000777] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v2.6.19 to before v5.10.43",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=9ec52099e4b8678a60e9f93e41ad87885d64f3e6",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=7178be006d495ffb741c329012da289b62dddfe6"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "9ec52099e4b8678a60e9f93e41ad87885d64f3e6",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "7178be006d495ffb741c329012da289b62dddfe6",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "pid: take a reference when initializing `cad_pid`\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.10.43 by commit 7178be006d495ffb741c329012da289b62dddfe6, it was introduced in version v2.6.19 by commit 9ec52099e4b8678a60e9f93e41ad87885d64f3e6. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000820] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from  to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=ff8de2cec65a8c8521faade12a31b39c80e49f5b"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "ff8de2cec65a8c8521faade12a31b39c80e49f5b",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "btrfs: abort in rename_exchange if we fail to insert the second ref\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit ff8de2cec65a8c8521faade12a31b39c80e49f5b, it was introduced in version  by commit . For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000791] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v5.10 to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=b91540d52a08b65eb6a2b09132e1bd54fa82754c",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=8a7e8b4e5631a03ea2fee27957857a56612108ca"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "b91540d52a08b65eb6a2b09132e1bd54fa82754c",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "8a7e8b4e5631a03ea2fee27957857a56612108ca",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "efi/fdt: fix panic when no valid fdt found\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit 8a7e8b4e5631a03ea2fee27957857a56612108ca, it was introduced in version v5.10 by commit b91540d52a08b65eb6a2b09132e1bd54fa82754c. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000810] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v4.20 to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=9d7b18668956c411a422d04c712994c5fdb23a4b",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=9cf27473f21913a3eaf4702dd2a25415afd5f33f"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "9d7b18668956c411a422d04c712994c5fdb23a4b",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "9cf27473f21913a3eaf4702dd2a25415afd5f33f",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "HID: magicmouse: fix NULL-deref on disconnect\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit 9cf27473f21913a3eaf4702dd2a25415afd5f33f, it was introduced in version v4.20 by commit 9d7b18668956c411a422d04c712994c5fdb23a4b. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000797] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v5.8 to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=c6e3f13398123a008cd2ee28f93510b113a32791",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=8a452d62e7cea3c8a2676a3b89a9118755a1a271"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "c6e3f13398123a008cd2ee28f93510b113a32791",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "8a452d62e7cea3c8a2676a3b89a9118755a1a271",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "nvmet: fix freeing unallocated p2pmem\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit 8a452d62e7cea3c8a2676a3b89a9118755a1a271, it was introduced in version v5.8 by commit c6e3f13398123a008cd2ee28f93510b113a32791. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000779] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from  to before v5.10.43",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=2050c6e5b161e5e25ce3c420fef58b24fa388a49"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "2050c6e5b161e5e25ce3c420fef58b24fa388a49",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "ext4: fix memory leak in ext4_mb_init_backend on error path.\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.10.43 by commit 2050c6e5b161e5e25ce3c420fef58b24fa388a49, it was introduced in version  by commit . For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000799] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v5.6 to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=59438b46471ae6cdfb761afc8c9beaf1e428a331",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=acc43fc6cf0d50612193813c5906a1ab9d433e1e"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "59438b46471ae6cdfb761afc8c9beaf1e428a331",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "acc43fc6cf0d50612193813c5906a1ab9d433e1e",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "bpf, lockdown, audit: Fix buggy SELinux lockdown permission checks\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit acc43fc6cf0d50612193813c5906a1ab9d433e1e, it was introduced in version v5.6 by commit 59438b46471ae6cdfb761afc8c9beaf1e428a331. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000816] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from  to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=0a31dd6fd2f4e7db538fb6eb1f06973d81f8dd3b"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "0a31dd6fd2f4e7db538fb6eb1f06973d81f8dd3b",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "ocfs2: fix data corruption by fallocate\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit 0a31dd6fd2f4e7db538fb6eb1f06973d81f8dd3b, it was introduced in version  by commit . For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000805] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v5.11 to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=90cd7e424969d29aff653333b4dcb4e2e199d791",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1f64f5e903b9d1d157875721e02adadc9d6f0a5d"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "90cd7e424969d29aff653333b4dcb4e2e199d791",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "1f64f5e903b9d1d157875721e02adadc9d6f0a5d",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "io_uring: fix ltout double free on completion race\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit 1f64f5e903b9d1d157875721e02adadc9d6f0a5d, it was introduced in version v5.11 by commit 90cd7e424969d29aff653333b4dcb4e2e199d791. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000806] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v5.6 to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=e7096c131e5161fa3b8e52a650d7719d2857adfd",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=5ceb59f40c094e6de1265c1d0e4bd560f692e272"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "e7096c131e5161fa3b8e52a650d7719d2857adfd",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "5ceb59f40c094e6de1265c1d0e4bd560f692e272",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "wireguard: allowedips: free empty intermediate nodes when removing single node\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit 5ceb59f40c094e6de1265c1d0e4bd560f692e272, it was introduced in version v5.6 by commit e7096c131e5161fa3b8e52a650d7719d2857adfd. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000790] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v5.12 to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1c099ab44727c8e42fe4de4d91b53cec3ef02860",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=6919e8a24e70b6ba148fe07f44f835bcdd1a8d02"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "1c099ab44727c8e42fe4de4d91b53cec3ef02860",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "6919e8a24e70b6ba148fe07f44f835bcdd1a8d02",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "mt76: mt7921: fix possible AOOB issue in mt7921_mcu_tx_rate_report\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit 6919e8a24e70b6ba148fe07f44f835bcdd1a8d02, it was introduced in version v5.12 by commit 1c099ab44727c8e42fe4de4d91b53cec3ef02860. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000815] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v3.3 to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=d646960f7986fefb460a2b062d5ccc8ccfeacc3a",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=0c4559736d9a4ec1ca58ba98ca34e7c4da4c422b"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "d646960f7986fefb460a2b062d5ccc8ccfeacc3a",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "0c4559736d9a4ec1ca58ba98ca34e7c4da4c422b",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit 0c4559736d9a4ec1ca58ba98ca34e7c4da4c422b, it was introduced in version v3.3 by commit d646960f7986fefb460a2b062d5ccc8ccfeacc3a. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000792] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v5.8 to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=7a88a6227dc7f2e723bba11ece05e57bd8dce8e4",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=e786eacbf323b632bd4e77fc0f5474b5a422e025"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "7a88a6227dc7f2e723bba11ece05e57bd8dce8e4",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "e786eacbf323b632bd4e77fc0f5474b5a422e025",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "efi/libstub: prevent read overflow in find_file_option()\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit e786eacbf323b632bd4e77fc0f5474b5a422e025, it was introduced in version v5.8 by commit 7a88a6227dc7f2e723bba11ece05e57bd8dce8e4. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000818] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v4.11 to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=8fb5debc5fcd450470cdd789c2d80ef95ebb8cf4",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=6280e8aca1e0c86a36d45032b4f17e68732b8880"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "8fb5debc5fcd450470cdd789c2d80ef95ebb8cf4",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "6280e8aca1e0c86a36d45032b4f17e68732b8880",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "mm, hugetlb: fix simple resv_huge_pages underflow on UFFDIO_COPY\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit 6280e8aca1e0c86a36d45032b4f17e68732b8880, it was introduced in version v4.11 by commit 8fb5debc5fcd450470cdd789c2d80ef95ebb8cf4. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000800] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v5.12 to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=c7a219048e459cf99c6fec0f7c1e42414e9e6202",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1d34fa4fcf06649036ba0c97854fcf7a741ee18c"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "c7a219048e459cf99c6fec0f7c1e42414e9e6202",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "1d34fa4fcf06649036ba0c97854fcf7a741ee18c",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "ice: track AF_XDP ZC enabled queues in bitmap\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit 1d34fa4fcf06649036ba0c97854fcf7a741ee18c, it was introduced in version v5.12 by commit c7a219048e459cf99c6fec0f7c1e42414e9e6202. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000788] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from  to before v5.10.43",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=334c59d58de5faf449d9c9feaa8c50dd8b4046a7"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "334c59d58de5faf449d9c9feaa8c50dd8b4046a7",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "x86/kvm: Disable all PV features on crash\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.10.43 by commit 334c59d58de5faf449d9c9feaa8c50dd8b4046a7, it was introduced in version  by commit . For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000782] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from  to before v5.10.43",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=48568f3944ee7357e8fed394804745bd981e978a"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "48568f3944ee7357e8fed394804745bd981e978a",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "btrfs: fixup error handling in fixup_inode_link_counts\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.10.43 by commit 48568f3944ee7357e8fed394804745bd981e978a, it was introduced in version  by commit . For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000813] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from  to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=48105dc98c9ca35af418746277b087cb2bc6df7c"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "48105dc98c9ca35af418746277b087cb2bc6df7c",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit 48105dc98c9ca35af418746277b087cb2bc6df7c, it was introduced in version  by commit . For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000798] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v5.3 to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=857b46027d6f91150797295752581b7155b9d0e1",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=2c0e6b35b88a961127066a1028bce9c727cbc3e5"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "857b46027d6f91150797295752581b7155b9d0e1",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "2c0e6b35b88a961127066a1028bce9c727cbc3e5",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "netfilter: nft_ct: skip expectations for confirmed conntrack\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit 2c0e6b35b88a961127066a1028bce9c727cbc3e5, it was introduced in version v5.3 by commit 857b46027d6f91150797295752581b7155b9d0e1. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000783] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v4.11 to before v5.10.43",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=8fb5debc5fcd450470cdd789c2d80ef95ebb8cf4",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=2eb4ec9c2c3535b9755c484183cc5c4d90fd37ff"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "8fb5debc5fcd450470cdd789c2d80ef95ebb8cf4",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "2eb4ec9c2c3535b9755c484183cc5c4d90fd37ff",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "mm, hugetlb: fix simple resv_huge_pages underflow on UFFDIO_COPY\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.10.43 by commit 2eb4ec9c2c3535b9755c484183cc5c4d90fd37ff, it was introduced in version v4.11 by commit 8fb5debc5fcd450470cdd789c2d80ef95ebb8cf4. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000823] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from  to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=1df2dc09926f61319116c80ee85701df33577d70"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "1df2dc09926f61319116c80ee85701df33577d70",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "x86/kvm: Disable kvmclock on all CPUs on shutdown\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit 1df2dc09926f61319116c80ee85701df33577d70, it was introduced in version  by commit . For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000822] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v5.5 to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=2ac061ce97f413bfbbdd768f7d2e0fda2e8170df",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=caec9bcaeb1a5f03f2d406305355c853af10c13e"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "2ac061ce97f413bfbbdd768f7d2e0fda2e8170df",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "caec9bcaeb1a5f03f2d406305355c853af10c13e",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "xen-netback: take a reference to the RX task thread\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit caec9bcaeb1a5f03f2d406305355c853af10c13e, it was introduced in version v5.5 by commit 2ac061ce97f413bfbbdd768f7d2e0fda2e8170df. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000780] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v3.3 to before v5.10.43",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=d646960f7986fefb460a2b062d5ccc8ccfeacc3a",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=48ee0db61c8299022ec88c79ad137f290196cac2"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "d646960f7986fefb460a2b062d5ccc8ccfeacc3a",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "48ee0db61c8299022ec88c79ad137f290196cac2",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.10.43 by commit 48ee0db61c8299022ec88c79ad137f290196cac2, it was introduced in version v3.3 by commit d646960f7986fefb460a2b062d5ccc8ccfeacc3a. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000778] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from  to before v5.10.43",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=d3b668b96ad3192c0581a248ae2f596cd054792a"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "d3b668b96ad3192c0581a248ae2f596cd054792a",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "ext4: fix bug on in ext4_es_cache_extent as ext4_split_extent_at failed\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.10.43 by commit d3b668b96ad3192c0581a248ae2f596cd054792a, it was introduced in version  by commit . For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000808] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v3.3 to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=7c18d2205ea76eef9674e59e1ecae4f332a53e9e",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=6a0e317f61094d377335547e015dd2ff12caf893"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "7c18d2205ea76eef9674e59e1ecae4f332a53e9e",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "6a0e317f61094d377335547e015dd2ff12caf893",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "net: caif: fix memory leak in caif_device_notify\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit 6a0e317f61094d377335547e015dd2ff12caf893, it was introduced in version v3.3 by commit 7c18d2205ea76eef9674e59e1ecae4f332a53e9e. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000787] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v5.5 to before v5.10.43",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=2ac061ce97f413bfbbdd768f7d2e0fda2e8170df",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=6b53db8c4c14b4e7256f058d202908b54a7b85b4"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "2ac061ce97f413bfbbdd768f7d2e0fda2e8170df",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "6b53db8c4c14b4e7256f058d202908b54a7b85b4",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "xen-netback: take a reference to the RX task thread\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.10.43 by commit 6b53db8c4c14b4e7256f058d202908b54a7b85b4, it was introduced in version v5.5 by commit 2ac061ce97f413bfbbdd768f7d2e0fda2e8170df. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000819] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from  to before v5.12.10",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=4cd303735bdfacd115ee20a6f3235b0084924174"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "4cd303735bdfacd115ee20a6f3235b0084924174",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "btrfs: fixup error handling in fixup_inode_link_counts\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.12.10 by commit 4cd303735bdfacd115ee20a6f3235b0084924174, it was introduced in version  by commit . For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000789] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from v5.0 to before v5.10.43",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=58956317c8de52009d1a38a721474c24aef74fe7",
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=d17d47da59f726dc4c87caebda3a50333d7e2fd3"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "58956317c8de52009d1a38a721474c24aef74fe7",
      "note": "introduced"
    },
    {
      "type": "commit",
      "value": "d17d47da59f726dc4c87caebda3a50333d7e2fd3",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "neighbour: allow NUD_NOARP entries to be forced GCed\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.10.43 by commit d17d47da59f726dc4c87caebda3a50333d7e2fd3, it was introduced in version v5.0 by commit 58956317c8de52009d1a38a721474c24aef74fe7. For more details please see the references link."
}
--- UVI JSON ---

[UVI-2021-1000781] UVI Request

--- UVI JSON ---
{
  "vendor_name": "Linux",
  "product_name": "Kernel",
  "product_version": "versions from  to before v5.10.43",
  "vulnerability_type": "unspecified",
  "affected_component": "unspecified",
  "attack_vector": "unspecified",
  "impact": "unspecified",
  "credit": "",
  "references": [
    "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?id=c8d5faee46242c3f33b8a71a4d7d52214785bfcc"
  ],
  "extended_references": [
    {
      "type": "commit",
      "value": "c8d5faee46242c3f33b8a71a4d7d52214785bfcc",
      "note": "fixed"
    }
  ],
  "reporter": "joshbressers",
  "reporter_id": 1692786,
  "notes": "",
  "description": "ocfs2: fix data corruption by fallocate\n\nThis is an automated ID intended to aid in discovery of potential security vulnerabilities. The actual impact and attack plausibility have not yet been proven.\nThis ID is fixed in Linux Kernel version v5.10.43 by commit c8d5faee46242c3f33b8a71a4d7d52214785bfcc, it was introduced in version  by commit . For more details please see the references link."
}
--- UVI JSON ---

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.