|
KASAN: use-after-free Read in compute_effective_progs (2)
|
19 |
C |
error |
|
11 |
1322d |
1449d
|
2/2 |
never |
3527e3cbb84d
bpf: Fix KASAN use-after-free Read in compute_effective_progs
|
|
kernel BUG in ext4_write_inline_data_end (2)
|
-1 |
C |
error |
|
20 |
52d |
1364d
|
2/2 |
never |
f87c7a4b084a
ext4: fix race condition between ext4_write and ext4_convert_inline_data
|
|
BUG: corrupted list in insert_work
|
8 |
C |
done |
done |
9 |
1345d |
1445d
|
2/2 |
never |
d007f49ab789
percpu_ref_init(): clean ->percpu_count_ref on failure
|
|
BUG: corrupted list in process_one_work
|
19 |
C |
error |
done |
35 |
244d |
1442d
|
2/2 |
never |
d007f49ab789
percpu_ref_init(): clean ->percpu_count_ref on failure
|
|
kernel BUG in tun_attach
|
-1 |
C |
error |
|
31 |
1332d |
1374d
|
2/2 |
never |
3b9bc84d3111
net: tun: unlink NAPI from device on destruction
|
|
KASAN: slab-out-of-bounds Read in exfat_clear_bitmap
|
17 |
C |
error |
|
2 |
1435d |
1435d
|
2/2 |
never |
82f723b8a5ad
exfat: check if cluster num is valid
|
|
KASAN: use-after-free Read in free_netdev
|
19 |
C |
error |
|
2 |
1342d |
1374d
|
2/2 |
never |
3b9bc84d3111
net: tun: unlink NAPI from device on destruction
|
|
kernel BUG in ext4_mb_find_by_goal
|
-1 |
C |
error |
done |
31 |
999d |
1040d
|
2/2 |
949d |
100c0ad6c045
ext4: allow ext4_get_group_info() to fail
|
|
general protection fault in chrdev_open
|
2 |
C |
error |
|
1 |
1384d |
1383d
|
2/2 |
963d |
b577d0cd2104
9p: missing chunk of "fs/9p: Don't update file type when updating file attributes"
|
|
kernel BUG in end_page_writeback
f2fs
|
-1 |
C |
error |
inconclusive |
3 |
1089d |
1140d
|
2/2 |
997d |
5cdb422c8391
f2fs: fix to avoid use-after-free for cached IPU bio
|
|
kernel BUG in cdc_ncm_fill_tx_frame (2)
|
-1 |
C |
error |
|
3 |
1041d |
1049d
|
2/2 |
999d |
42b78c8cc774
net: cdc_ncm: Deal with too low values of dwNtbOutMaxSize
|
|
kernel BUG in kvfree
|
-1 |
C |
done |
|
1 |
1051d |
1051d
|
2/2 |
1013d |
1a8822343e67
ext4: fix invalid free tracking in ext4_xattr_move_to_block()
|
|
KASAN: slab-out-of-bounds Read in ext4_group_desc_csum
ext4
|
19 |
C |
error |
inconclusive |
11 |
1022d |
1124d
|
2/2 |
1013d |
0dde3141c527
ext4: avoid a potential slab-out-of-bounds in ext4_group_desc_csum
|
|
general protection fault in ext4_xattr_set_entry (5)
|
2 |
C |
done |
|
11 |
1016d |
1018d
|
2/2 |
1014d |
67d7d8ad99be
ext4: fix use-after-free in ext4_xattr_set_entry
|
|
KASAN: slab-out-of-bounds Read in get_max_inline_xattr_value_size
ext4
|
19 |
C |
error |
|
4 |
1092d |
1171d
|
2/2 |
1019d |
eee22187b536
ext4: add inode table check in __ext4_get_inode_loc to aovid possible infinite loop
|
|
general protection fault in ext4_xattr_set_entry (4)
|
2 |
C |
error |
|
62 |
1019d |
1048d
|
2/2 |
1019d |
67d7d8ad99be
ext4: fix use-after-free in ext4_xattr_set_entry
|
|
KASAN: use-after-free Read in ext4_ext_rm_leaf
ext4
|
19 |
C |
error |
inconclusive |
1 |
1156d |
1156d
|
2/2 |
1033d |
eee22187b536
ext4: add inode table check in __ext4_get_inode_loc to aovid possible infinite loop
|
|
KASAN: use-after-free Read in ext4_rename_dir_prepare (3)
|
19 |
C |
error |
|
4 |
1057d |
1057d
|
2/2 |
1049d |
0be698ecbe44
BACKPORT: ext4: fix use-after-free in ext4_rename_dir_prepare
|
|
general protection fault in ext4_xattr_set_entry (3)
|
2 |
C |
error |
|
9 |
1050d |
1053d
|
2/2 |
1049d |
67d7d8ad99be
ext4: fix use-after-free in ext4_xattr_set_entry
|
|
kernel BUG in ext4_write_inline_data
ext4
|
-1 |
C |
error |
inconclusive |
3 |
1134d |
1232d
|
2/2 |
1053d |
5c099c4fdc43
UPSTREAM: ext4: fix kernel BUG in 'ext4_write_inline_data_end()'
|
|
kernel BUG in __skb_gso_segment
|
-1 |
C |
error |
|
1 |
1194d |
1194d
|
2/2 |
1053d |
e9d3f80935b6
net/af_packet: make sure to pull mac header
|
|
general protection fault in em_cmp_match
|
2 |
C |
error |
|
1 |
1198d |
1198d
|
2/2 |
1053d |
9cd3fd2054c3
net_sched: reject TCF_EM_SIMPLE case for complex ematch module
|
|
general protection fault in fscrypt_limit_io_blocks
|
2 |
C |
error |
|
5 |
1175d |
1239d
|
2/2 |
1053d |
105c78e12468
ext4: don't allow journal inode to have encrypt flag
|
|
kernel BUG in ext4_free_blocks (2)
ext4
|
-1 |
C |
error |
|
25 |
1056d |
1358d
|
2/2 |
1053d |
1e1c2b86ef86
UPSTREAM: ext4: block range must be validated before use in ext4_mb_clear_bb()
1e1c2b86ef86
ext4: block range must be validated before use in ext4_mb_clear_bb()
|
|
general protection fault in ext4_xattr_set_entry (2)
ext4
|
2 |
C |
error |
|
423 |
1054d |
1254d
|
2/2 |
1054d |
67d7d8ad99be
ext4: fix use-after-free in ext4_xattr_set_entry
|
|
KASAN: use-after-free Read in ext4_rename_dir_prepare (2)
|
19 |
C |
error |
inconclusive |
3 |
1124d |
1124d
|
2/2 |
1090d |
0be698ecbe44
BACKPORT: ext4: fix use-after-free in ext4_rename_dir_prepare
|
|
kernel BUG in add_grec (2)
|
-1 |
C |
error |
inconclusive |
1039 |
1215d |
1215d
|
2/2 |
1122d |
d89d7ff01235
ipv6: ensure sane device mtu in tunnels
|
|
KASAN: use-after-free Read in ext4_rename_dir_prepare
|
19 |
C |
error |
|
2 |
1185d |
1220d
|
2/2 |
1160d |
0be698ecbe44
BACKPORT: ext4: fix use-after-free in ext4_rename_dir_prepare
|
|
kernel BUG in ext4_writepages
|
-1 |
C |
error |
|
5 |
1251d |
1413d
|
2/2 |
1222d |
4bb26f2885ac
ext4: avoid crash when inline data creation follows DIO write
|
|
KASAN: use-after-free Read in gc_data_segment
|
19 |
C |
error |
|
4 |
1225d |
1249d
|
2/2 |
1222d |
c6ad7fd16657
f2fs: fix to do sanity check on summary info
|
|
KASAN: use-after-free Read in mon_bin_flush
|
19 |
C |
error |
|
2 |
1282d |
1283d
|
2/2 |
1251d |
a659daf63d16
usb: mon: make mmapped memory read only
|
|
kernel BUG in notify_change (3)
|
-1 |
C |
error |
|
2 |
1308d |
1308d
|
2/2 |
1266d |
bcf6dddd9746
ANDROID: incfs: Add check for ATTR_KILL_SUID and ATTR_MODE in incfs_setattr
|
|
kernel BUG in ext4_ind_remove_space
|
-1 |
C |
error |
|
55 |
1411d |
1522d
|
2/2 |
1410d |
2da376228a24
ext4: limit length to bitmap_maxbytes - blocksize in punch_hole
|
|
kernel BUG in vhost_get_vq_desc
|
-1 |
C |
error |
done |
19 |
1470d |
1514d
|
2/2 |
1410d |
a58da53ffd70
vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
|
|
BUG: stack guard page was hit in sys_open (5)
|
-1 |
|
|
|
4 |
1424d |
1429d
|
2/2 |
1410d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
|
BUG: stack guard page was hit in sys_lsetxattr (2)
|
-1 |
|
|
|
2 |
1480d |
1483d
|
2/2 |
1410d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
|
general protection fault in incfs_kill_sb
|
2 |
C |
done |
|
380 |
1486d |
1488d
|
2/2 |
1410d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
|
BUG: stack guard page was hit in security_file_open
|
-1 |
|
|
|
2 |
1429d |
1481d
|
2/2 |
1410d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
|
BUG: stack guard page was hit in sys_mkdirat
|
-1 |
syz |
error |
|
3 |
1411d |
1445d
|
2/2 |
1410d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
|
BUG: stack guard page was hit in sys_chmod
|
-1 |
|
|
|
1 |
1456d |
1456d
|
2/2 |
1410d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
|
BUG: stack guard page was hit in sys_chown
|
-1 |
|
|
|
2 |
1440d |
1475d
|
2/2 |
1410d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
|
BUG: stack guard page was hit in sys_mknodat
|
-1 |
|
|
|
1 |
1438d |
1438d
|
2/2 |
1410d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
|
BUG: stack guard page was hit in sys_chdir (4)
|
-1 |
|
|
|
1 |
1452d |
1452d
|
2/2 |
1410d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
|
BUG: stack guard page was hit in sys_unlink (8)
|
-1 |
|
|
|
1 |
1451d |
1451d
|
2/2 |
1410d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
|
BUG: stack guard page was hit in sys_listxattr
|
-1 |
|
|
|
1 |
1450d |
1450d
|
2/2 |
1410d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
|
kernel BUG in mpage_prepare_extent_to_map
|
-1 |
C |
error |
|
254 |
1433d |
1601d
|
2/2 |
1431d |
cc5095747edf
ext4: don't BUG if someone dirty pages without asking ext4 first
|
|
KASAN: use-after-free Write in paging64_update_accessed_dirty_bits
|
22 |
C |
error |
|
16 |
1488d |
1597d
|
2/2 |
1431d |
2a8859f373b0
KVM: x86/mmu: do compare-and-exchange of gPTE via the user address
|
|
kernel BUG in add_grec
|
-1 |
C |
error |
|
83 |
1455d |
1529d
|
2/2 |
1454d |
5e34af4142ff
net: ipv6: fix skb_over_panic in __ip6_append_data
|
|
kernel BUG in iput
|
-1 |
C |
error |
|
2 |
1463d |
1463d
|
2/2 |
1454d |
839a534f1e85
exfat: avoid incorrectly releasing for root inode
|
|
KASAN: slab-out-of-bounds Read in packet_recvmsg
|
17 |
C |
error |
|
1 |
1471d |
1471d
|
2/2 |
1460d |
c700525fcc06
net/packet: fix slab-out-of-bounds access in packet_recvmsg()
|
|
KASAN: use-after-free Write in null_skcipher_crypt
|
22 |
|
|
|
1 |
1521d |
1521d
|
2/2 |
1460d |
ebe48d368e97
esp: Fix possible buffer overflow in ESP transformation
|
|
BUG: stack guard page was hit in file_open
|
-1 |
C |
error |
|
25 |
1478d |
1556d
|
2/2 |
1478d |
6f915dd2af92
ANDROID: incremental-fs: remove index and incomplete dir on umount
|
|
kernel BUG in notify_change
|
-1 |
C |
error |
|
3 |
1494d |
1554d
|
2/2 |
1478d |
6f915dd2af92
ANDROID: incremental-fs: remove index and incomplete dir on umount
|
|
KASAN: invalid-free in bitmap_free
|
24 |
C |
error |
done |
1 |
1561d |
1561d
|
2/2 |
1478d |
ec6af094ea28
net/packet: rx_owner_map depends on pg_vec
|
|
general protection fault in pending_reads_dispatch_ioctl
|
2 |
C |
error |
|
4 |
1510d |
1542d
|
2/2 |
1486d |
4b1862e4fc69
ANDROID: incremental-fs: fix GPF in pending_reads_dispatch_ioctl
|
|
KASAN: use-after-free Read in hardware_disable
|
19 |
C |
error |
done |
5 |
1517d |
1520d
|
2/2 |
1486d |
080dbe7e9b86
KVM: x86: Forcibly leave nested virt when SMM state is toggled
|
|
BUG: Dentry still in use in unmount
|
-1 |
C |
done |
|
1184 |
1488d |
1501d
|
2/2 |
1487d |
6f915dd2af92
ANDROID: incremental-fs: remove index and incomplete dir on umount
|
|
general protection fault in reweight_entity
|
2 |
C |
done |
|
2 |
1498d |
1556d
|
1/2 |
1488d |
13765de8148f
BACKPORT: sched/fair: Fix fault in reweight_entity
|
|
kernel BUG in kvm_mmu_notifier_invalidate_range_end
|
-1 |
C |
error |
done |
167 |
1525d |
1612d
|
1/2 |
1488d |
2fc2c66b9ce4
ANDROID: percpu-rwsem: enable percpu_sem destruction in atomic context
|
|
general protection fault in tipc_crypto_key_distr
|
2 |
|
|
|
1 |
1597d |
1597d
|
1/2 |
1508d |
3e6db079751a
tipc: check for null after calling kmemdup
|
|
KASAN: slab-out-of-bounds Write in legacy_parse_param
|
21 |
C |
error |
|
1 |
1542d |
1542d
|
1/2 |
1515d |
722d94847de2
vfs: fs_context: fix up param length parsing in legacy_parse_param
|
|
kernel BUG in cdc_ncm_fill_tx_frame
|
-1 |
C |
error |
|
40 |
1547d |
1613d
|
1/2 |
1544d |
2be6d4d16a08
net: cdc_ncm: Allow for dwNtbOutMaxSize to be unset or zero
|
|
general protection fault in klist_iter_exit
|
2 |
C |
error |
|
5 |
1562d |
1598d
|
1/2 |
1553d |
fd79a0cbf0b2
nfc: fix segfault in nfc_genl_dump_devices_done
|
|
KASAN: null-ptr-deref Write in prepare_to_wait
|
12 |
C |
error |
|
2 |
1605d |
1605d
|
1/2 |
1572d |
748786564a35
Revert "io_uring: reinforce cancel on flush during exit"
|
|
general protection fault in scsi_queue_rq
|
2 |
C |
error |
|
3 |
1580d |
1605d
|
1/2 |
1572d |
06cc8187dbb6
scsi: core: Remove command size deduction from scsi_setup_scsi_cmnd()
|
|
BUG: Dentry still in use [unmount of ramfs ramfs]
|
-1 |
C |
error |
|
3 |
1611d |
1613d
|
1/2 |
1572d |
df4c5491ab63
ANDROID: Incremental fs: Fix dentry get/put imbalance on vfs_mkdir() failure
|
|
KASAN: use-after-free Write in ext4_stop_mmpd
|
22 |
C |
done |
|
3 |
1608d |
1610d
|
1/2 |
1594d |
61bb4a1c417e
ext4: fix possible UAF when remounting r/o a mmp-protected file system
|
|
divide error in genelink_tx_fixup
|
2 |
C |
error |
|
8 |
1605d |
1610d
|
1/2 |
1594d |
6f7c88691191
usbnet: fix error return code in usbnet_probe()
|
|
KASAN: invalid-free in io_commit_cqring
|
24 |
C |
error |
|
3 |
1600d |
1611d
|
1/2 |
1599d |
3f2c12ec8a3f
io_uring: don't take uring_lock during iowq cancel
|