kernel BUG in tun_attach
|
C |
error |
|
31 |
184d |
225d
|
2/2 |
never |
bec1be0a745a
net: tun: unlink NAPI from device on destruction
|
kernel BUG in blk_mq_dispatch_rq_list (4)
fat
|
C |
error |
|
9 |
8d22h |
97d
|
0/2 |
never |
block: set .bi_max_vecs as actual allocated vector number
|
KASAN: slab-out-of-bounds Read in get_max_inline_xattr_value_size
ext4
|
C |
error |
|
2 |
13d |
23d
|
0/2 |
never |
ext4: add inode table check in __ext4_get_inode_loc to aovid
|
KASAN: use-after-free Read in compute_effective_progs (2)
|
C |
error |
|
11 |
174d |
301d
|
2/2 |
never |
3527e3cbb84d
bpf: Fix KASAN use-after-free Read in compute_effective_progs
|
kernel BUG in ext4_free_blocks (2)
ext4
|
C |
error |
|
8 |
10d |
209d
|
0/2 |
never |
ext4: block range must be validated before use in ext4_mb_clear_bb()
|
KASAN: slab-out-of-bounds Read in exfat_clear_bitmap
|
C |
error |
|
2 |
287d |
287d
|
2/2 |
never |
82f723b8a5ad
exfat: check if cluster num is valid
|
BUG: corrupted list in insert_work
|
C |
done |
done |
9 |
196d |
297d
|
2/2 |
never |
d007f49ab789
percpu_ref_init(): clean ->percpu_count_ref on failure
|
general protection fault in chrdev_open
|
C |
error |
|
1 |
236d |
235d
|
0/2 |
never |
fs/9p: Don't update file type when updating file attributes
|
BUG: corrupted list in process_one_work
|
C |
error |
done |
2 |
209d |
294d
|
2/2 |
never |
d007f49ab789
percpu_ref_init(): clean ->percpu_count_ref on failure
|
kernel BUG in __skb_gso_segment
|
C |
error |
|
1 |
45d |
45d
|
0/2 |
never |
net/af_packet: make sure to pull mac header
|
general protection fault in fscrypt_limit_io_blocks
|
C |
error |
|
5 |
26d |
90d
|
0/2 |
never |
ext4: don't allow journal inode to have encrypt flag
|
KASAN: use-after-free Read in free_netdev
|
C |
error |
|
2 |
193d |
225d
|
2/2 |
never |
bec1be0a745a
net: tun: unlink NAPI from device on destruction
|
general protection fault in em_cmp_match
|
C |
error |
|
1 |
49d |
49d
|
0/2 |
never |
net_sched: reject TCF_EM_SIMPLE case for complex ematch module
|
kernel BUG in ext4_write_inline_data_end (2)
|
C |
error |
|
1 |
216d |
216d
|
2/2 |
never |
91f90b571f1a
ext4: fix race condition between ext4_write and ext4_convert_inline_data
|
KASAN: use-after-free Read in ext4_rename_dir_prepare
|
C |
error |
|
2 |
37d |
72d
|
2/2 |
12d |
c83ab50b6e83
BACKPORT: ext4: fix use-after-free in ext4_rename_dir_prepare
|
kernel BUG in ext4_writepages
|
C |
error |
|
5 |
103d |
265d
|
2/2 |
74d |
fb98cb61efff
ext4: avoid crash when inline data creation follows DIO write
|
KASAN: use-after-free Read in gc_data_segment
|
C |
error |
|
4 |
77d |
101d
|
2/2 |
74d |
4a8e8bf28070
f2fs: fix to do sanity check on summary info
|
KASAN: use-after-free Read in mon_bin_flush
|
C |
error |
|
2 |
133d |
135d
|
2/2 |
102d |
1b257f97fec4
usb: mon: make mmapped memory read only
|
kernel BUG in notify_change (3)
|
C |
error |
|
2 |
160d |
160d
|
2/2 |
118d |
bcf6dddd9746
ANDROID: incfs: Add check for ATTR_KILL_SUID and ATTR_MODE in incfs_setattr
|
kernel BUG in ext4_ind_remove_space
|
C |
error |
|
55 |
263d |
374d
|
2/2 |
261d |
22c450d39f89
ext4: limit length to bitmap_maxbytes - blocksize in punch_hole
|
kernel BUG in vhost_get_vq_desc
|
C |
error |
done |
19 |
321d |
365d
|
2/2 |
261d |
698dc7d13c4e
vhost/vsock: don't check owner in vhost_vsock_stop() while releasing
|
BUG: stack guard page was hit in sys_open (5)
|
|
|
|
4 |
275d |
281d
|
2/2 |
262d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
BUG: stack guard page was hit in sys_lsetxattr (2)
|
|
|
|
2 |
332d |
334d
|
2/2 |
262d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
general protection fault in incfs_kill_sb
|
C |
done |
|
380 |
338d |
340d
|
2/2 |
262d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
BUG: stack guard page was hit in security_file_open
|
|
|
|
2 |
280d |
333d
|
2/2 |
262d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
BUG: stack guard page was hit in sys_mkdirat
|
syz |
error |
|
3 |
263d |
296d
|
2/2 |
262d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
BUG: stack guard page was hit in sys_chmod
|
|
|
|
1 |
308d |
308d
|
2/2 |
262d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
BUG: stack guard page was hit in sys_chown
|
|
|
|
2 |
292d |
327d
|
2/2 |
262d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
BUG: stack guard page was hit in sys_mknodat
|
|
|
|
1 |
290d |
290d
|
2/2 |
262d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
BUG: stack guard page was hit in sys_chdir (4)
|
|
|
|
1 |
303d |
303d
|
2/2 |
262d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
BUG: stack guard page was hit in sys_unlink (8)
|
|
|
|
1 |
302d |
302d
|
2/2 |
262d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
BUG: stack guard page was hit in sys_listxattr
|
|
|
|
1 |
302d |
302d
|
2/2 |
262d |
3e45af8a72c0
ANDROID: incremental-fs: limit mount stack depth
|
kernel BUG in mpage_prepare_extent_to_map
|
C |
error |
|
254 |
284d |
453d
|
2/2 |
283d |
330d0e44fc5a
ext4: don't BUG if someone dirty pages without asking ext4 first
|
KASAN: use-after-free Write in paging64_update_accessed_dirty_bits
|
C |
error |
|
16 |
340d |
449d
|
2/2 |
283d |
e90518d10c7d
KVM: x86/mmu: do compare-and-exchange of gPTE via the user address
|
kernel BUG in add_grec
|
C |
error |
|
83 |
307d |
381d
|
2/2 |
306d |
ae8ec5eabb1a
net: ipv6: fix skb_over_panic in __ip6_append_data
|
kernel BUG in iput
|
C |
error |
|
2 |
315d |
315d
|
2/2 |
306d |
9eeaa2d7d58a
exfat: avoid incorrectly releasing for root inode
|
KASAN: slab-out-of-bounds Read in packet_recvmsg
|
C |
error |
|
1 |
323d |
323d
|
2/2 |
311d |
70b7b3c055fd
net/packet: fix slab-out-of-bounds access in packet_recvmsg()
|
KASAN: use-after-free Write in null_skcipher_crypt
|
|
|
|
1 |
372d |
372d
|
2/2 |
311d |
9248694dac20
esp: Fix possible buffer overflow in ESP transformation
|
BUG: stack guard page was hit in file_open
|
C |
error |
|
25 |
330d |
408d
|
2/2 |
330d |
6f915dd2af92
ANDROID: incremental-fs: remove index and incomplete dir on umount
|
kernel BUG in notify_change
|
C |
error |
|
3 |
346d |
405d
|
2/2 |
330d |
6f915dd2af92
ANDROID: incremental-fs: remove index and incomplete dir on umount
|
KASAN: invalid-free in bitmap_free
|
C |
error |
done |
1 |
413d |
413d
|
2/2 |
330d |
7da349f07e45
net/packet: rx_owner_map depends on pg_vec
|
general protection fault in pending_reads_dispatch_ioctl
|
C |
error |
|
4 |
362d |
394d
|
2/2 |
338d |
4b1862e4fc69
ANDROID: incremental-fs: fix GPF in pending_reads_dispatch_ioctl
|
KASAN: use-after-free Read in hardware_disable
|
C |
error |
done |
5 |
368d |
372d
|
2/2 |
338d |
080dbe7e9b86
KVM: x86: Forcibly leave nested virt when SMM state is toggled
|
BUG: Dentry still in use in unmount
|
C |
done |
|
1184 |
340d |
352d
|
2/2 |
338d |
6f915dd2af92
ANDROID: incremental-fs: remove index and incomplete dir on umount
|
general protection fault in reweight_entity
|
C |
done |
|
2 |
350d |
408d
|
1/2 |
340d |
4c47eaa7c828
BACKPORT: sched/fair: Fix fault in reweight_entity
|
kernel BUG in kvm_mmu_notifier_invalidate_range_end
|
C |
error |
done |
167 |
376d |
464d
|
1/2 |
340d |
2fc2c66b9ce4
ANDROID: percpu-rwsem: enable percpu_sem destruction in atomic context
|
general protection fault in tipc_crypto_key_distr
|
|
|
|
1 |
449d |
449d
|
1/2 |
360d |
a7d91625863d
tipc: check for null after calling kmemdup
|
KASAN: slab-out-of-bounds Write in legacy_parse_param
|
C |
error |
|
1 |
393d |
393d
|
1/2 |
367d |
eadde287a62e
vfs: fs_context: fix up param length parsing in legacy_parse_param
|
kernel BUG in cdc_ncm_fill_tx_frame
|
C |
error |
|
40 |
399d |
464d
|
1/2 |
396d |
385ffd31ebdb
net: cdc_ncm: Allow for dwNtbOutMaxSize to be unset or zero
|
general protection fault in klist_iter_exit
|
C |
error |
|
5 |
414d |
450d
|
1/2 |
405d |
c602863ad28e
nfc: fix segfault in nfc_genl_dump_devices_done
|
KASAN: null-ptr-deref Write in prepare_to_wait
|
C |
error |
|
2 |
457d |
457d
|
1/2 |
423d |
748786564a35
Revert "io_uring: reinforce cancel on flush during exit"
|
general protection fault in scsi_queue_rq
|
C |
error |
|
3 |
432d |
457d
|
1/2 |
423d |
06cc8187dbb6
scsi: core: Remove command size deduction from scsi_setup_scsi_cmnd()
|
BUG: Dentry still in use [unmount of ramfs ramfs]
|
C |
error |
|
3 |
463d |
464d
|
1/2 |
423d |
aee113fcef3a
ANDROID: Incremental fs: Fix dentry get/put imbalance on vfs_mkdir() failure
|
KASAN: use-after-free Write in ext4_stop_mmpd
|
C |
done |
|
3 |
460d |
462d
|
1/2 |
445d |
b663890d8544
ext4: fix possible UAF when remounting r/o a mmp-protected file system
|
divide error in genelink_tx_fixup
|
C |
error |
|
8 |
456d |
461d
|
1/2 |
445d |
017718dfbb6f
usbnet: fix error return code in usbnet_probe()
|
KASAN: invalid-free in io_commit_cqring
|
C |
error |
|
3 |
452d |
462d
|
1/2 |
451d |
3f2c12ec8a3f
io_uring: don't take uring_lock during iowq cancel
|