|
general protection fault in em_cmp_match
|
2 |
C |
|
|
1 |
1194d |
1194d
|
1/1 |
1164d |
9cd3fd2054c3
net_sched: reject TCF_EM_SIMPLE case for complex ematch module
|
|
KASAN: use-after-free Read in bcm_can_tx
|
19 |
C |
|
|
2 |
1537d |
1993d
|
1/1 |
1518d |
632881680ba0
can: bcm: fix UAF of bcm op
|
|
general protection fault in ieee802154_llsec_parse_key_id
|
11 |
C |
|
done |
101 |
1806d |
1862d
|
1/1 |
1775d |
6f7f657f2440
net: ieee802154: nl-mac: fix check on panid
|
|
general protection fault in nl802154_del_llsec_devkey
|
2 |
C |
|
done |
171 |
1806d |
1868d
|
1/1 |
1775d |
27c746869e1a
net: ieee802154: fix nl802154 del llsec devkey
|
|
general protection fault in nl802154_del_llsec_key
|
2 |
C |
|
done |
135 |
1806d |
1862d
|
1/1 |
1775d |
37feaaf5ceb2
net: ieee802154: fix nl802154 del llsec key
|
|
general protection fault in try_to_wake_up
|
2 |
C |
|
done |
707 |
1806d |
1835d
|
1/1 |
1775d |
cca8ea3b05c9
net: tun: set tun->dev->addr_len during TUNSETLINK processing
|
|
general protection fault in nl802154_add_llsec_key
|
2 |
C |
|
done |
168 |
1806d |
1866d
|
1/1 |
1775d |
20d5fe2d7103
net: ieee802154: fix nl802154 add llsec key
|
|
general protection fault in nl802154_del_llsec_dev
|
2 |
C |
|
done |
136 |
1806d |
1868d
|
1/1 |
1776d |
3d1eac2f4558
net: ieee802154: fix nl802154 del llsec dev
|
|
INFO: trying to register non-static key in ieee802154_get_llsec_params
|
-1 |
C |
|
done |
8 |
1809d |
1833d
|
1/1 |
1779d |
1534efc7bbc1
net: ieee802154: stop dump llsec params for monitors
|
|
WARNING in cfg80211_connect
|
-1 |
C |
|
done |
101 |
1824d |
2003d
|
1/1 |
1789d |
1b5ab825d9ac
cfg80211: remove WARN_ON() in cfg80211_sme_connect
|
|
BUG: unable to handle kernel NULL pointer dereference in __lookup_hash
|
10 |
C |
|
done |
31 |
1819d |
2012d
|
1/1 |
1789d |
d24396c5290b
reiserfs: add check for an invalid ih_entry_count
|
|
general protection fault in selinux_socket_sendmsg
|
2 |
C |
|
done |
3 |
1828d |
2001d
|
1/1 |
1797d |
363eaa3a450a
usbip: synchronize event handler with sysfs code paths
|
|
KASAN: use-after-free Read in ieee80211_ibss_build_presp
|
19 |
C |
|
done |
2 |
1830d |
1976d
|
1/1 |
1799d |
3bd801b14e0c
mac80211: fix double free in ibss_leave
|
|
possible deadlock in red_adaptative_timer
|
4 |
C |
|
done |
2 |
1832d |
1923d
|
1/1 |
1801d |
e323d865b361
net: sched: validate stab values
|
|
BUG: unable to handle kernel NULL pointer dereference in vhci_shutdown_connection
|
10 |
syz |
|
done |
1335 |
1836d |
1926d
|
1/1 |
1803d |
363eaa3a450a
usbip: synchronize event handler with sysfs code paths
|
|
WARNING in ext4_xattr_set_entry
|
-1 |
C |
|
done |
19 |
1847d |
2003d
|
1/1 |
1815d |
6b22489911b7
ext4: do not try to set xattr into ea_inode if value is empty
|
|
BUG: unable to handle kernel NULL pointer dereference in amp_read_loc_assoc_final_data
|
10 |
C |
|
done |
207 |
1848d |
2065d
|
1/1 |
1815d |
e8bd76ede155
Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data
|
|
KASAN: use-after-free Read in ntfs_iget
|
19 |
C |
|
done |
2 |
1860d |
1936d
|
1/1 |
1830d |
4dfe6bd94959
ntfs: check for valid standard information attribute
|
|
KASAN: use-after-free Read in ntfs_read_locked_inode
|
19 |
C |
|
done |
2 |
1862d |
2013d
|
1/1 |
1831d |
4dfe6bd94959
ntfs: check for valid standard information attribute
|
|
KASAN: slab-out-of-bounds Read in squashfs_export_iget
|
17 |
C |
|
done |
4 |
1889d |
1993d
|
1/1 |
1856d |
eabac19e40c0
squashfs: add more sanity checks in inode lookup
|
|
general protection fault in ieee80211_subif_start_xmit
|
2 |
syz |
|
done |
1 |
1886d |
1946d
|
1/1 |
1856d |
054c9939b480
mac80211: pause TX while changing interface type
|
|
general protection fault in ioctl_standard_call
|
2 |
C |
|
done |
24 |
1887d |
1983d
|
1/1 |
1856d |
5122565188ba
wext: fix NULL-ptr-dereference with cfg80211's lack of commit()
|
|
KASAN: slab-out-of-bounds Read in squashfs_get_id
|
17 |
C |
|
|
11 |
1859d |
2012d
|
1/1 |
1858d |
f37aa4c7366e
squashfs: add more sanity checks in id lookup
|
|
KASAN: use-after-free Read in squashfs_get_id
|
19 |
C |
|
|
1 |
1858d |
1954d
|
1/1 |
1858d |
f37aa4c7366e
squashfs: add more sanity checks in id lookup
|
|
KASAN: use-after-free Read in reiserfs_fill_super
|
19 |
C |
|
done |
2 |
1907d |
1907d
|
1/1 |
1860d |
d24396c5290b
reiserfs: add check for an invalid ih_entry_count
|
|
divide error in do_journal_end
|
2 |
C |
|
done |
1 |
1904d |
1964d
|
1/1 |
1860d |
d24396c5290b
reiserfs: add check for an invalid ih_entry_count
|
|
KASAN: use-after-free Read in search_by_entry_key
|
19 |
C |
|
done |
3 |
1906d |
2012d
|
1/1 |
1860d |
d24396c5290b
reiserfs: add check for an invalid ih_entry_count
|
|
KASAN: use-after-free Read in reiserfs_read_locked_inode
|
19 |
C |
|
done |
5 |
1908d |
2013d
|
1/1 |
1861d |
d24396c5290b
reiserfs: add check for an invalid ih_entry_count
|
|
general protection fault in dqput
|
2 |
C |
|
done |
1 |
1915d |
1915d
|
1/1 |
1885d |
11c514a99bb9
quota: Sanity-check quota file headers on load
|
|
KASAN: use-after-free Read in leaf_paste_entries
|
19 |
C |
|
done |
6 |
1917d |
1961d
|
1/1 |
1886d |
d24396c5290b
reiserfs: add check for an invalid ih_entry_count
|
|
general protection fault in hci_phy_link_complete_evt
|
2 |
C |
|
done |
40 |
1917d |
2063d
|
1/1 |
1886d |
6dfccd13db2f
Bluetooth: Fix null pointer dereference in hci_event_packet()
|
|
BUG: unable to handle kernel paging request in dquot_add_inodes
|
8 |
C |
|
done |
2 |
1919d |
1941d
|
1/1 |
1889d |
11c514a99bb9
quota: Sanity-check quota file headers on load
|
|
BUG: unable to handle kernel paging request in dqput
|
8 |
C |
|
done |
9 |
1921d |
2011d
|
1/1 |
1890d |
11c514a99bb9
quota: Sanity-check quota file headers on load
|
|
kernel BUG at net/core/dev.c:LINE!
|
-1 |
C |
|
inconclusive |
3 |
1914d |
2183d
|
1/1 |
1895d |
54970a2fbb67
net: drop bogus skb with CHECKSUM_PARTIAL and offset beyond end of trimmed packet
|
|
kernel BUG at fs/reiserfs/prints.c:LINE!
|
-1 |
C |
|
done |
3 |
1930d |
2010d
|
1/1 |
1900d |
d24396c5290b
reiserfs: add check for an invalid ih_entry_count
|
|
general protection fault in get_work_pool
|
2 |
C |
|
done |
1 |
1933d |
1963d
|
1/1 |
1902d |
905b2032fa42
mac80211: mesh: fix mesh_pathtbl_init() error path
|
|
BUG: corrupted list in dquot_disable
|
8 |
C |
|
done |
1 |
1934d |
1934d
|
1/1 |
1903d |
11c514a99bb9
quota: Sanity-check quota file headers on load
|
|
KASAN: use-after-free Read in sco_chan_del
|
19 |
C |
|
done |
10 |
1936d |
2062d
|
1/1 |
1906d |
6dfccd13db2f
Bluetooth: Fix null pointer dereference in hci_event_packet()
|
|
INFO: trying to register non-static key in rhashtable_free_and_destroy
|
-1 |
C |
|
done |
4 |
1940d |
1954d
|
1/1 |
1907d |
905b2032fa42
mac80211: mesh: fix mesh_pathtbl_init() error path
|
|
KASAN: slab-out-of-bounds Read in hci_le_meta_evt
|
17 |
C |
|
done |
15 |
1943d |
2063d
|
1/1 |
1913d |
f7e0e8b2f1b0
Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt()
|
|
BUG: unable to handle kernel paging request in dquot_add_space
|
8 |
C |
|
done |
1 |
1944d |
2004d
|
1/1 |
1913d |
11c514a99bb9
quota: Sanity-check quota file headers on load
|
|
BUG: sleeping function called from invalid context in sta_info_move_state
|
5 |
C |
|
done |
1101 |
1949d |
1951d
|
1/1 |
1918d |
7bc40aedf24d
mac80211: free sta in sta_info_insert_finish() on errors
|
|
general protection fault in qp_release_pages
|
2 |
C |
|
done |
2 |
1951d |
1981d
|
1/1 |
1920d |
90ca6333fd65
VMCI: check return value of get_user_pages_fast() for errors
|
|
WARNING in unlock_new_inode
|
-1 |
C |
|
done |
55 |
1977d |
2015d
|
1/1 |
1947d |
8859bf2b1278
reiserfs: only call unlock_new_inode() if I_NEW
|
|
KASAN: slab-out-of-bounds Write in init_sb
|
21 |
C |
|
done |
3 |
1979d |
2012d
|
1/1 |
1948d |
0ddc5154b24c
gfs2: add validation checks for size of superblock
|
|
KASAN: global-out-of-bounds Read in fbcon_resize
|
17 |
C |
|
done |
529 |
1983d |
2031d
|
1/1 |
1952d |
ec0972adecb3
fbcon: Fix user font detection test at fbcon_resize().
|
|
INFO: task hung in ucma_close
|
1 |
C |
|
done |
421 |
1983d |
2396d
|
1/1 |
1953d |
ef95a90ae6f4
RDMA/ucma: ucma_context reference leak in error path
|
|
KASAN: global-out-of-bounds Read in vga16fb_imageblit
|
17 |
C |
|
done |
723 |
1983d |
2306d
|
1/1 |
1953d |
bd018a6a75ce
video: fbdev: fix OOB read in vga_8planes_imageblit()
|
|
KASAN: slab-out-of-bounds Read in ntfs_attr_find
|
17 |
C |
|
done |
10 |
1983d |
2011d
|
1/1 |
1953d |
4f8c94022f0b
ntfs: add check for mft record size in superblock
|
|
KASAN: global-out-of-bounds Read in fbcon_get_font
|
17 |
C |
|
done |
42 |
1990d |
2306d
|
1/1 |
1959d |
5af08640795b
fbcon: Fix global-out-of-bounds read in fbcon_get_font()
|
|
KASAN: use-after-free Read in ntfs_attr_find
|
19 |
C |
|
done |
4 |
1992d |
2011d
|
1/1 |
1961d |
4f8c94022f0b
ntfs: add check for mft record size in superblock
|
|
KASAN: global-out-of-bounds Read in get_unique_tuple
|
17 |
C |
|
done |
5 |
2004d |
2177d
|
1/1 |
1974d |
1cc5ef91d2ff
netfilter: ctnetlink: add a range check for l3/l4 protonum
|
|
general protection fault in open_xa_dir
|
2 |
C |
|
done |
1 |
2012d |
2012d
|
1/1 |
1981d |
c2bb80b8bdd0
reiserfs: Fix oops during mount
|
|
KASAN: use-after-free Read in rxrpc_see_skb
|
19 |
syz |
|
done |
1 |
2033d |
2033d
|
1/1 |
1983d |
564c836fd945
MIPS: SNI: Fix MIPS_L1_CACHE_SHIFT
|
|
INFO: task hung in nbd_ioctl (2)
|
1 |
C |
|
done |
16 |
2029d |
2275d
|
1/1 |
1983d |
a4b5cc9e1080
tipc: fix shutdown() of connection oriented socket
|
|
WARNING in restore_regulatory_settings
|
-1 |
C |
|
done |
2264 |
2025d |
2271d
|
1/1 |
1994d |
47caf685a685
cfg80211: regulatory: reject invalid hints
|
|
general protection fault in __sock_release
|
2 |
syz |
|
done |
12 |
2025d |
2037d
|
1/1 |
1994d |
77f4689de17c
fix regression in "epoll: Keep a reference on files added to the check list"
|
|
general protection fault in locks_remove_file
|
2 |
syz |
|
done |
6 |
2025d |
2036d
|
1/1 |
1995d |
77f4689de17c
fix regression in "epoll: Keep a reference on files added to the check list"
|
|
general protection fault in tty_release
|
2 |
C |
|
done |
10 |
2026d |
2036d
|
1/1 |
1996d |
77f4689de17c
fix regression in "epoll: Keep a reference on files added to the check list"
|
|
KASAN: use-after-free Read in seq_release_private
|
19 |
syz |
|
done |
1 |
2027d |
2027d
|
1/1 |
1996d |
77f4689de17c
fix regression in "epoll: Keep a reference on files added to the check list"
|
|
WARNING: ODEBUG bug in corrupted
|
-1 |
syz |
|
done |
1 |
2028d |
2028d
|
1/1 |
1996d |
77f4689de17c
fix regression in "epoll: Keep a reference on files added to the check list"
|
|
WARNING: ODEBUG bug in exit_to_usermode_loop
|
-1 |
syz |
|
done |
2 |
2030d |
2032d
|
1/1 |
1999d |
77f4689de17c
fix regression in "epoll: Keep a reference on files added to the check list"
|
|
KASAN: use-after-free Read in __sock_release
|
19 |
syz |
|
done |
3 |
2030d |
2038d
|
1/1 |
1999d |
77f4689de17c
fix regression in "epoll: Keep a reference on files added to the check list"
|
|
WARNING in snd_pcm_drop
|
-1 |
syz |
|
done |
1 |
2029d |
2029d
|
1/1 |
1999d |
77f4689de17c
fix regression in "epoll: Keep a reference on files added to the check list"
|
|
BUG: corrupted list in fuse_dev_free
|
8 |
syz |
|
done |
1 |
2032d |
2032d
|
1/1 |
2001d |
77f4689de17c
fix regression in "epoll: Keep a reference on files added to the check list"
|
|
general protection fault in kmem_cache_free
|
2 |
syz |
|
done |
3 |
2032d |
2032d
|
1/1 |
2001d |
77f4689de17c
fix regression in "epoll: Keep a reference on files added to the check list"
|
|
KASAN: use-after-free Read in snd_pcm_oss_release
|
19 |
syz |
|
done |
1 |
2032d |
2032d
|
1/1 |
2001d |
77f4689de17c
fix regression in "epoll: Keep a reference on files added to the check list"
|
|
KASAN: use-after-free Write in ex_handler_refcount
|
22 |
C |
|
done |
16 |
2032d |
2241d
|
1/1 |
2001d |
f9c70bdc279b
Bluetooth: add a mutex lock to avoid UAF in do_enale_set
|
|
KASAN: double-free or invalid-free in (null)
|
24 |
syz |
|
done |
1 |
2033d |
2033d
|
1/1 |
2002d |
77f4689de17c
fix regression in "epoll: Keep a reference on files added to the check list"
|
|
BUG: corrupted list in mousedev_release
|
8 |
syz |
|
done |
1 |
2035d |
2035d
|
1/1 |
2004d |
77f4689de17c
fix regression in "epoll: Keep a reference on files added to the check list"
|
|
INFO: trying to register non-static key in uhid_char_release
|
-1 |
C |
|
done |
2 |
2036d |
2055d
|
1/1 |
2005d |
bce1305c0ece
HID: core: Correctly handle ReportSize being zero
|
|
KASAN: slab-out-of-bounds Read in hci_event_packet
|
17 |
C |
|
done |
17 |
2047d |
2521d
|
1/1 |
2017d |
629b49c848ee
Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt()
|
|
KASAN: slab-out-of-bounds Read in hci_inquiry_result_with_rssi_evt
|
17 |
C |
|
done |
6 |
2048d |
2065d
|
1/1 |
2018d |
629b49c848ee
Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt()
|
|
KASAN: use-after-free Read in get_block
|
19 |
C |
|
done |
8 |
2053d |
2178d
|
1/1 |
2022d |
270ef41094e9
fs/minix: reject too-large maximum file size
|
|
WARNING in inc_nlink
|
-1 |
C |
|
done |
21 |
2054d |
2196d
|
1/1 |
2023d |
facb03dddec0
fs/minix: don't allow getting deleted inodes
|
|
KASAN: slab-out-of-bounds Read in get_block
|
17 |
C |
|
done |
2 |
2053d |
2084d
|
1/1 |
2023d |
270ef41094e9
fs/minix: reject too-large maximum file size
|
|
BUG: unable to handle kernel NULL pointer dereference in get_block
|
10 |
C |
|
done |
45 |
2054d |
2201d
|
1/1 |
2024d |
da27e0a0e5f6
fs/minix: check return value of sb_getblk()
|
|
KASAN: slab-out-of-bounds Read in hci_extended_inquiry_result_evt
|
17 |
C |
|
done |
5 |
2058d |
2063d
|
1/1 |
2025d |
51c19bf3d5cf
Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()
|
|
KASAN: use-after-free Read in delete_and_unsubscribe_port
|
19 |
syz |
|
done |
2 |
2066d |
2066d
|
1/1 |
2033d |
80982c7e834e
ALSA: seq: oss: Serialize ioctls
|
|
KASAN: double-free or invalid-free in 0x2
|
24 |
syz |
|
done |
1 |
2066d |
2066d
|
1/1 |
2033d |
80982c7e834e
ALSA: seq: oss: Serialize ioctls
|
|
INFO: task hung in fb_release
|
1 |
C |
|
done |
48 |
2068d |
2299d
|
1/1 |
2037d |
033724d68642
fbdev: Detect integer underflow at "struct fbcon_ops"->clear_margins.
|
|
unregister_netdevice: waiting for DEV to become free
|
2 |
C |
|
done |
120 |
2094d |
2533d
|
1/1 |
2063d |
5db7c8b9f9fc
ipvs: fix tinfo memory leak in start_sync_thread
|
|
general protection fault in batadv_iv_ogm_schedule_buff
|
2 |
|
|
|
1 |
2170d |
2170d
|
1/1 |
2088d |
8e8ce08198de
batman-adv: Don't schedule OGM for disabled interface
|
|
KASAN: null-ptr-deref Write in choke_reset
|
12 |
C |
|
done |
283 |
2137d |
2167d
|
1/1 |
2107d |
8738c85c72b3
sch_choke: avoid potential panic in choke_reset()
|
|
KASAN: use-after-free Read in do_blk_trace_setup
|
19 |
C |
|
done |
342 |
2138d |
2542d
|
1/1 |
2107d |
1f2cac107c59
blktrace: fix unlocked access to init/start-stop/teardown
|
|
WARNING in xfrm_policy_insert
|
-1 |
syz |
|
done |
8 |
2141d |
2400d
|
1/1 |
2111d |
ed17b8d377ea
xfrm: fix a warning in xfrm_policy_insert_list
|
|
KASAN: slab-out-of-bounds Write in snd_rawmidi_kernel_write1
|
21 |
C |
|
done |
1 |
2143d |
2173d
|
1/1 |
2112d |
c1f6e3c818dd
ALSA: rawmidi: Fix racy buffer resize under concurrent accesses
|
|
WARNING: ODEBUG bug in route4_change
|
-1 |
C |
|
done |
23 |
2185d |
2213d
|
1/1 |
2155d |
ef299cc3fa1a
net_sched: cls_route: remove the right filter from hashtable
|
|
KASAN: use-after-free Write in release_tty
|
22 |
C |
|
done |
124 |
2186d |
2305d
|
1/1 |
2155d |
ca4463bf8438
vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console
|
|
WARNING: ODEBUG bug in rfcomm_dev_ioctl
|
-1 |
C |
|
done |
2 |
2195d |
2195d
|
1/1 |
2164d |
71811cac8532
Bluetooth: RFCOMM: fix ODEBUG bug in rfcomm_dev_ioctl
|
|
KASAN: slab-out-of-bounds Read in selinux_xfrm_alloc_user
|
17 |
C |
|
done |
1 |
2195d |
2195d
|
1/1 |
2165d |
a1a7e3a36e01
xfrm: add the missing verify_sec_ctx_len check in xfrm_add_acquire
|
|
WARNING: refcount bug in sock_wfree
|
13 |
C |
done |
done |
3 |
2196d |
2317d
|
1/1 |
2166d |
5c3e82fe1596
sctp: fix refcount bug in sctp_wfree
|
|
KASAN: use-after-free Write in tcindex_set_parms
|
22 |
C |
|
done |
3 |
2199d |
2200d
|
1/1 |
2169d |
0d1c3530e1bd
net_sched: keep alloc_hash updated after hash allocation
|
|
KASAN: slab-out-of-bounds Write in tcindex_set_parms
|
21 |
C |
|
done |
2 |
2200d |
2200d
|
1/1 |
2169d |
0d1c3530e1bd
net_sched: keep alloc_hash updated after hash allocation
|
|
WARNING: ODEBUG bug in rfcomm_dlc_free
|
-1 |
C |
|
done |
16 |
2202d |
2435d
|
1/1 |
2171d |
71811cac8532
Bluetooth: RFCOMM: fix ODEBUG bug in rfcomm_dev_ioctl
|
|
KASAN: use-after-free Read in tty_open
|
19 |
C |
|
done |
5 |
2204d |
2306d
|
1/1 |
2174d |
ca4463bf8438
vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console
|
|
KASAN: use-after-free Read in tty_buffer_cancel_work
|
19 |
C |
|
done |
2 |
2213d |
2301d
|
1/1 |
2183d |
ca4463bf8438
vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console
|
|
KASAN: use-after-free Read in get_work_pool
|
19 |
C |
|
done |
1 |
2214d |
2304d
|
1/1 |
2184d |
ca4463bf8438
vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console
|
|
KASAN: use-after-free Read in n_tty_receive_buf_common
|
19 |
C |
|
done |
25 |
2216d |
2305d
|
1/1 |
2185d |
e8c75a30a23c
vt: selection, push sel_lock up
|
|
WARNING: kernel stack frame pointer has bad value
|
-1 |
C |
|
done |
65 |
2221d |
2525d
|
1/1 |
2187d |
a288f105a03a
fjes: fix missed check in fjes_acpi_add
|
|
INFO: task hung in paste_selection
|
1 |
C |
|
done |
8 |
2222d |
2297d
|
1/1 |
2191d |
afe207d80a61
ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast()
|
|
INFO: task hung in drain_all_pages
|
1 |
C |
|
done |
1 |
2222d |
2222d
|
1/1 |
2192d |
8d0015a7ab76
netfilter: xt_hashlimit: limit the max size of hashtable
|
|
INFO: task hung in tty_ldisc_hangup
|
1 |
C |
|
done |
17 |
2229d |
2301d
|
1/1 |
2199d |
e8c75a30a23c
vt: selection, push sel_lock up
|
|
INFO: task hung in hashlimit_mt_check_common
|
1 |
C |
|
done |
6 |
2232d |
2284d
|
1/1 |
2200d |
8d0015a7ab76
netfilter: xt_hashlimit: limit the max size of hashtable
|
|
KASAN: stack-out-of-bounds Write in ax25_getname
|
21 |
C |
|
done |
4 |
2232d |
2527d
|
1/1 |
2200d |
42d84c8490f9
vhost: Check docket sk_family instead of call getname
|
|
KASAN: slab-out-of-bounds Read in tcf_exts_destroy
|
17 |
C |
|
done |
1 |
2236d |
2349d
|
1/1 |
2206d |
599be01ee567
net_sched: fix an OOB access in cls_tcindex
|
|
general protection fault in path_openat
|
2 |
C |
|
done |
40 |
2242d |
2248d
|
1/1 |
2211d |
6404674acd59
vfs: fix do_last() regression
|
|
BUG: sleeping function called from invalid context in tpk_write
|
5 |
C |
|
done |
10 |
2242d |
2303d
|
1/1 |
2211d |
9a655c77ff8f
ttyprintk: fix a potential deadlock in interrupt context issue
|
|
BUG: sleeping function called from invalid context in lock_sock_nested (2)
|
5 |
syz |
|
done |
1 |
2244d |
2304d
|
1/1 |
2214d |
37f96694cf73
crypto: af_alg - Use bh_lock_sock in sk_destruct
|
|
KASAN: use-after-free Read in ext4_xattr_set_entry
|
19 |
C |
|
done |
9 |
2247d |
2339d
|
1/1 |
2216d |
9803387c55f7
ext4: validate the debug_want_extra_isize mount option at parse time
|
|
KASAN: slab-out-of-bounds Read in __nla_put_nohdr
|
17 |
C |
|
done |
2 |
2250d |
2250d
|
1/1 |
2220d |
cb626bf566eb
net-sysfs: Fix reference count leak
|
|
KASAN: slab-out-of-bounds Write in setup_udp_tunnel_sock
|
21 |
C |
|
done |
1 |
2254d |
2254d
|
1/1 |
2223d |
de19055564c8
Documentation: Document arm64 kpti control
|
|
KASAN: use-after-free Read in snd_timer_resolution
|
19 |
C |
|
done |
1 |
2256d |
2256d
|
1/1 |
2226d |
60adcfde92fa
ALSA: seq: Fix racy access for queue timer in proc read
|
|
INFO: task hung in genl_rcv_msg
|
1 |
syz |
|
done |
2 |
2260d |
2261d
|
1/1 |
2230d |
c13c48c00a6b
tcp: clear tp->total_retrans in tcp_disconnect()
|
|
WARNING in reconnect_path
|
-1 |
C |
done |
done |
1 |
2262d |
2322d
|
1/1 |
2231d |
909e22e05353
exportfs: fix 'passing zero to ERR_PTR()' warning
|
|
KASAN: use-after-free Write in __alloc_skb
|
22 |
C |
|
done |
1 |
2266d |
2296d
|
1/1 |
2232d |
d836f5c69d87
net: rtnetlink: validate IFLA_MTU attribute in rtnl_create_link()
|
|
KASAN: use-after-free Read in cdev_put
|
19 |
C |
|
done |
6 |
2266d |
2309d
|
1/1 |
2235d |
fa2ac657f978
xen-blkback: prevent premature module unload
|
|
KASAN: slab-out-of-bounds Read in macvlan_broadcast
|
17 |
C |
|
done |
6 |
2267d |
2272d
|
1/1 |
2237d |
96cc4b69581d
macvlan: do not assume mac_header is set in macvlan_broadcast()
|
|
KASAN: use-after-free Read in macvlan_broadcast
|
19 |
C |
|
done |
8 |
2269d |
2272d
|
1/1 |
2238d |
96cc4b69581d
macvlan: do not assume mac_header is set in macvlan_broadcast()
|
|
WARNING: bad unlock balance in gtp_encap_enable_socket
|
4 |
C |
|
done |
2 |
2269d |
2272d
|
1/1 |
2238d |
90d72256addf
gtp: fix bad unlock balance in gtp_encap_enable_socket
|
|
KASAN: slab-out-of-bounds Read in bpf_skb_change_tail
|
17 |
C |
|
done |
2 |
2275d |
2421d
|
1/1 |
2242d |
58990d1ff3f7
bpf: reject passing modified ctx to helper functions
|
|
KASAN: slab-out-of-bounds Read in bpf_skb_change_proto
|
17 |
C |
|
done |
2 |
2274d |
2421d
|
1/1 |
2242d |
58990d1ff3f7
bpf: reject passing modified ctx to helper functions
|
|
KASAN: slab-out-of-bounds Read in bpf_clone_redirect
|
17 |
C |
|
done |
11 |
2280d |
2443d
|
1/1 |
2250d |
58990d1ff3f7
bpf: reject passing modified ctx to helper functions
|
|
KASAN: slab-out-of-bounds Read in bpf_skb_change_head
|
17 |
C |
|
done |
2 |
2284d |
2353d
|
1/1 |
2252d |
58990d1ff3f7
bpf: reject passing modified ctx to helper functions
|
|
possible deadlock in refcount_dec_and_mutex_lock
|
4 |
C |
|
done |
10 |
2283d |
2355d
|
1/1 |
2252d |
cf1b2326b734
nbd: verify socket is supported during setup
|
|
WARNING: refcount bug in cdev_get
|
13 |
C |
|
done |
21 |
2284d |
2414d
|
1/1 |
2254d |
38b4fe320119
net: usb: lan78xx: Connect PHY before registering MAC
|
|
INFO: rcu detected stall in br_handle_frame (2)
|
1 |
C |
|
done |
1 |
2289d |
2289d
|
1/1 |
2259d |
d9e15a273306
pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM
|
|
WARNING in ovl_rename
|
-1 |
syz |
|
done |
2 |
2293d |
2525d
|
1/1 |
2259d |
6889ee5a53b8
ovl: relax WARN_ON() on rename to self
|
|
inconsistent lock state in sp_get
|
4 |
C |
|
done |
2 |
2297d |
2297d
|
1/1 |
2266d |
5c9934b6767b
6pack,mkiss: fix possible deadlock
|
|
KASAN: slab-out-of-bounds Read in linear_transfer
|
17 |
C |
|
done |
4 |
2298d |
2305d
|
1/1 |
2268d |
4cc8d6505ab8
ALSA: pcm: oss: Avoid potential buffer overflows
|
|
possible deadlock in __might_fault
|
4 |
C |
|
done |
295 |
2300d |
2540d
|
1/1 |
2269d |
19e6317d24c2
usb: mon: Fix a deadlock in usbmon between mmap and read
|
|
possible deadlock in mon_bin_vma_fault
|
4 |
C |
|
done |
282 |
2301d |
2536d
|
1/1 |
2270d |
19e6317d24c2
usb: mon: Fix a deadlock in usbmon between mmap and read
|
|
WARNING: refcount bug in kobject_get
|
13 |
C |
|
done |
20 |
2305d |
2539d
|
1/1 |
2275d |
e95584a889e1
tipc: fix unlimited bundling of small messages
|
|
WARNING in refcount_error_report
|
-1 |
syz |
|
done |
1 |
2307d |
2307d
|
1/1 |
2275d |
501a90c94510
inet: protect against too small mtu values.
|
|
BUG: corrupted list in p9_fd_cancelled
|
8 |
syz |
|
done |
2 |
2306d |
2352d
|
1/1 |
2275d |
6e616864f211
arm64: Add MIDR encoding for Arm Cortex-A55 and Cortex-A35
|
|
BUG: unable to handle kernel paging request in slhc_free
|
8 |
C |
|
done |
4 |
2310d |
2537d
|
1/1 |
2279d |
baf76f0c58ae
slip: make slhc_free() silently accept an error pointer
|
|
WARNING in dio_complete
|
-1 |
C |
|
done |
27 |
2310d |
2539d
|
1/1 |
2279d |
8962842ca5ab
blk-mq: avoid sysfs buffer overflow with too many CPU cores
|
|
KASAN: use-after-free Read in slip_open
|
19 |
C |
done |
done |
2 |
2313d |
2313d
|
1/1 |
2281d |
e58c19124189
slip: Fix use-after-free Read in slip_open
|
|
KASAN: use-after-free Read in kfree_skb
|
19 |
C |
|
done |
98 |
2311d |
2439d
|
1/1 |
2281d |
cf94da6f502d
Bluetooth: Fix invalid-free in bcsp_close()
|
|
INFO: task hung in nbd_ioctl
|
1 |
C |
|
done |
18 |
2282d |
2356d
|
1/1 |
2281d |
cf1b2326b734
nbd: verify socket is supported during setup
|
|
WARNING: suspicious RCU usage in shmem_add_seals
|
4 |
C |
done |
done |
1435 |
2318d |
2341d
|
1/1 |
2288d |
988f701a805b
memfd: Use radix_tree_deref_slot_protected to avoid the warning.
|
|
possible deadlock in flush_workqueue
|
4 |
C |
|
done |
15 |
2321d |
2414d
|
1/1 |
2291d |
cf1b2326b734
nbd: verify socket is supported during setup
|
|
WARNING in bpf_jit_free
|
-1 |
syz |
|
done |
60 |
2363d |
2536d
|
1/1 |
2292d |
c751798aa224
bpf: fix use after free in prog symbol exposure
|
|
INFO: task hung in lo_release
|
1 |
syz |
|
done |
128 |
2429d |
2542d
|
1/1 |
2292d |
22f36db48781
Revert "block/loop: Use global lock for ioctl() operation."
|
|
BUG: unable to handle kernel NULL pointer dereference in inet_autobind
|
10 |
C |
inconclusive |
done |
3133 |
2333d |
2341d
|
1/1 |
2293d |
9b6c08878e23
sctp: not bind the socket in sctp_connect
|
|
BUG: unable to handle kernel NULL pointer dereference in blk_mq_map_swqueue
|
10 |
C |
|
done |
20 |
2294d |
2532d
|
1/1 |
2293d |
e9e006f5fcf2
nbd: fix max number of supported devs
|
|
BUG: unable to handle kernel paging request in dummy_set_vf_vlan
|
8 |
C |
|
done |
5 |
2327d |
2420d
|
1/1 |
2293d |
ff08ddba3a55
net: rtnetlink: prevent underflows in do_setvfinfo()
|
|
BUG: unable to handle kernel paging request in dummy_set_vf_spoofchk
|
8 |
C |
|
done |
6 |
2330d |
2441d
|
1/1 |
2293d |
ff08ddba3a55
net: rtnetlink: prevent underflows in do_setvfinfo()
|
|
BUG: unable to handle kernel paging request in dummy_get_vf_config
|
8 |
C |
|
done |
4 |
2346d |
2443d
|
1/1 |
2296d |
ff08ddba3a55
net: rtnetlink: prevent underflows in do_setvfinfo()
|
|
WARNING: suspicious RCU usage in netem_enqueue
|
4 |
C |
|
done |
3 |
2350d |
2373d
|
1/1 |
2296d |
62794fc4fbf5
net_sched: add max len check for TCA_KIND
|
|
BUG: unable to handle kernel paging request in dummy_set_vf_rss_query_en
|
8 |
C |
|
done |
5 |
2350d |
2441d
|
1/1 |
2296d |
ff08ddba3a55
net: rtnetlink: prevent underflows in do_setvfinfo()
|
|
BUG: unable to handle kernel paging request in dummy_set_vf_mac
|
8 |
C |
|
done |
5 |
2359d |
2431d
|
1/1 |
2297d |
ff08ddba3a55
net: rtnetlink: prevent underflows in do_setvfinfo()
|
|
BUG: unable to handle kernel NULL pointer dereference in tc_bind_tclass
|
10 |
C |
|
done |
14 |
2353d |
2393d
|
1/1 |
2297d |
8b142a00edcf
net_sched: check cops->tcf_block in tc_bind_tclass()
|
|
KASAN: null-ptr-deref Write in kvm_write_guest_virt_system
|
12 |
C |
|
done |
53 |
2359d |
2377d
|
1/1 |
2297d |
144783a80cd2
watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout
|
|
WARNING in tcp_send_loss_probe
|
-1 |
C |
|
done |
22 |
2380d |
2390d
|
1/1 |
2300d |
ba2ddb43f270
tcp: Don't dequeue SYN/FIN-segments from write-queue
|
|
general protection fault in tcp_push
|
2 |
C |
|
done |
55 |
2379d |
2390d
|
1/1 |
2300d |
f1dcc5ed4bea
tcp: Reset send_head when removing skb from write-queue
|
|
BUG: unable to handle kernel paging request in dummy_set_vf_rate
|
8 |
C |
|
done |
3 |
2380d |
2394d
|
1/1 |
2300d |
ff08ddba3a55
net: rtnetlink: prevent underflows in do_setvfinfo()
|
|
WARNING in tcp_retransmit_timer
|
-1 |
C |
|
done |
215 |
2379d |
2390d
|
1/1 |
2300d |
ba2ddb43f270
tcp: Don't dequeue SYN/FIN-segments from write-queue
|
|
general protection fault in qdisc_destroy
|
2 |
C |
|
done |
4 |
2379d |
2384d
|
1/1 |
2300d |
6efb971ba8ed
net_sched: let qdisc_put() accept NULL pointer
|
|
INFO: rcu detected stall in mld_dad_timer_expire
|
1 |
C |
|
done |
1 |
2385d |
2385d
|
1/1 |
2300d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
|
INFO: rcu detected stall in br_handle_frame
|
1 |
C |
|
done |
15 |
2382d |
2393d
|
1/1 |
2302d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
|
WARNING in kernfs_get
|
-1 |
C |
|
done |
17 |
2412d |
2532d
|
1/1 |
2302d |
ac43432cb1f5
driver core: Fix use-after-free and double free on glue directory
|
|
INFO: rcu detected stall in mld_ifc_timer_expire
|
1 |
C |
|
done |
9 |
2384d |
2393d
|
1/1 |
2303d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
|
WARNING in xfrm_state_fini
|
-1 |
C |
|
done |
193 |
2386d |
2541d
|
1/1 |
2303d |
dbb2483b2a46
xfrm: clean up xfrm protocol checks
|
|
INFO: rcu detected stall in addrconf_dad_work
|
1 |
C |
|
done |
18 |
2386d |
2393d
|
1/1 |
2303d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
|
INFO: rcu detected stall in corrupted
|
1 |
C |
|
done |
3 |
2387d |
2409d
|
1/1 |
2303d |
d4d6ec6dac07
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
|
BUG: unable to handle kernel paging request in dummy_set_vf_trust
|
8 |
C |
|
done |
2 |
2395d |
2428d
|
1/1 |
2304d |
ff08ddba3a55
net: rtnetlink: prevent underflows in do_setvfinfo()
|
|
WARNING in map_lookup_elem
|
-1 |
C |
|
done |
2 |
2402d |
2402d
|
1/1 |
2304d |
335e192a3fa4
KVM: x86: add tracepoints around __direct_map and FNAME(fetch)
|
|
WARNING: refcount bug in hci_register_dev
|
13 |
C |
|
done |
3 |
2399d |
2414d
|
1/1 |
2304d |
ac43432cb1f5
driver core: Fix use-after-free and double free on glue directory
|
|
kernel BUG at ./include/linux/skbuff.h:LINE!
|
-1 |
C |
|
done |
16 |
2395d |
2421d
|
1/1 |
2304d |
e5df4baea324
tcp: fix tcp_rtx_queue_tail in case of empty retransmit queue
|
|
general protection fault in packet_lookup_frame
|
2 |
C |
|
done |
1 |
2417d |
2417d
|
1/1 |
2305d |
32d3182cd2cd
net/packet: fix race in tpacket_snd()
|
|
WARNING: refcount bug in kobject_put
|
13 |
C |
|
done |
3 |
2421d |
2528d
|
1/1 |
2305d |
ac43432cb1f5
driver core: Fix use-after-free and double free on glue directory
|
|
general protection fault in tcf_ife_init
|
2 |
C |
|
done |
12 |
2433d |
2442d
|
1/1 |
2306d |
c8ec4632c6ac
ife: error out when nla attributes are empty
|
|
general protection fault in kernfs_add_one
|
2 |
C |
|
done |
5 |
2429d |
2498d
|
1/1 |
2306d |
ac43432cb1f5
driver core: Fix use-after-free and double free on glue directory
|
|
WARNING in sysfs_remove_group
|
-1 |
C |
|
done |
1 |
2445d |
2445d
|
1/1 |
2307d |
ac43432cb1f5
driver core: Fix use-after-free and double free on glue directory
|
|
BUG: unable to handle kernel paging request in coalesced_mmio_write
|
8 |
C |
|
done |
4 |
2463d |
2469d
|
1/1 |
2307d |
b60fe990c6b0
KVM: coalesced_mmio: add bounds checking
|
|
WARNING in kernfs_put
|
-1 |
C |
|
done |
2 |
2461d |
2528d
|
1/1 |
2307d |
ac43432cb1f5
driver core: Fix use-after-free and double free on glue directory
|
|
KASAN: use-after-free Read in erspan_build_header
|
19 |
C |
|
done |
18 |
2508d |
2542d
|
1/1 |
2308d |
b423d13c08a6
net: erspan: fix use-after-free
|
|
KASAN: slab-out-of-bounds Read in erspan_build_header
|
17 |
C |
|
done |
8 |
2506d |
2542d
|
1/1 |
2308d |
526f5b851a96
tipc: fix modprobe tipc failed after switch order of device registration
|
|
WARNING in notify_change
|
-1 |
C |
|
done |
14 |
2471d |
2537d
|
1/1 |
2308d |
f69e749a4935
Abort file_remove_privs() for non-reg. files
|
|
KASAN: use-after-free Read in tcp_init_tso_segs
|
19 |
C |
|
|
1424 |
2379d |
2390d
|
1/1 |
2366d |
f1dcc5ed4bea
tcp: Reset send_head when removing skb from write-queue
|