general protection fault in em_cmp_match
|
C |
|
|
1 |
738d |
738d
|
0/1 |
never |
134b529db48a
net_sched: reject TCF_EM_SIMPLE case for complex ematch module
|
KASAN: use-after-free Read in tc_chain_fill_node
|
C |
|
|
1031 |
658d |
1902d
|
0/1 |
never |
cd25f1099284
net: core: netlink: add helper refcount dec and lock function
da1d324088c4
net: sched: add helper function to take reference to Qdisc
f602ed9f8574
net: sched: extend Qdisc with rcu
92833e8b5db6
net: sched: rename qdisc_destroy() to qdisc_put()
ae214e04b95f
net: sched: use Qdisc rcu API instead of relying on rtnl lock
|
KASAN: use-after-free Read in skb_dequeue (2)
|
C |
|
done |
2 |
1194d |
1224d
|
1/1 |
1163d |
f7bffefa322a
tty: Fix data race between tiocsti() and flush_to_ldisc()
|
KASAN: use-after-free Read in ext4_xattr_set_entry (2)
|
C |
|
done |
7 |
1196d |
1654d
|
1/1 |
1166d |
c481607ba522
ext4: fix race writing to an inline_data file while its xattrs are changing
|
inconsistent lock state in sco_sock_timeout
|
C |
|
done |
19 |
1197d |
1587d
|
1/1 |
1166d |
48669c81a656
Bluetooth: schedule SCO timeouts with delayed_work
|
BUG: sleeping function called from invalid context in lock_sock_nested (2)
|
C |
|
done |
3909 |
1197d |
1290d
|
1/1 |
1166d |
3719acc161d5
Bluetooth: defer cleanup of resources in hci_unregister_dev()
|
KASAN: slab-out-of-bounds Write in ext4_write_inline_data
|
C |
|
done |
3 |
1202d |
1409d
|
1/1 |
1172d |
c481607ba522
ext4: fix race writing to an inline_data file while its xattrs are changing
|
BUG: soft lockup in tx
|
C |
|
done |
1 |
1206d |
1236d
|
1/1 |
1175d |
7c113506163a
fq_codel: reject silly quantum parameters
|
BUG: corrupted list in kobject_add_internal
|
C |
|
done |
2 |
1209d |
1457d
|
1/1 |
1179d |
3f7b869c1b44
Bluetooth: avoid circular locks in sco_sock_connect
|
kernel BUG in kvm_hv_set_msr_common
|
syz |
|
done |
2 |
1210d |
1240d
|
1/1 |
1179d |
41d2efaed5bd
KVM: remember position in kvm->vcpus array
|
BUG: unable to handle kernel paging request in do_syscall_64
|
C |
|
done |
3 |
1215d |
1734d
|
1/1 |
1182d |
6be10fb6c143
fbmem: add margin check to fb_check_caps()
|
general protection fault in do_syscall_64 (2)
|
syz |
|
done |
2 |
1214d |
1547d
|
1/1 |
1182d |
6be10fb6c143
fbmem: add margin check to fb_check_caps()
|
KASAN: use-after-free Read in ip_check_mc_rcu
|
syz |
|
done |
7 |
1216d |
1367d
|
1/1 |
1182d |
4768973dffed
igmp: Add ip_mc_list lock in ip_check_mc_rcu
|
KASAN: slab-out-of-bounds Write in decode_data
|
C |
|
done |
1 |
1217d |
1764d
|
1/1 |
1187d |
4e370cc081a7
net: 6pack: fix slab-out-of-bounds in decode_data
|
INFO: task hung in do_fb_ioctl (2)
|
C |
|
done |
7 |
1218d |
1633d
|
1/1 |
1187d |
6be10fb6c143
fbmem: add margin check to fb_check_caps()
|
BUG: unable to handle kernel paging request in do_csum
|
C |
|
done |
1 |
1218d |
1437d
|
1/1 |
1187d |
c33471daf276
ip_gre: add validation for csum_start
|
BUG: unable to handle kernel NULL pointer dereference in __lookup_slow (2)
|
C |
|
done |
15 |
1227d |
1351d
|
1/1 |
1195d |
df2f583b6363
reiserfs: add check for root_inode in reiserfs_fill_super
|
KASAN: use-after-free Read in search_by_entry_key (2)
|
C |
|
done |
2 |
1228d |
1378d
|
1/1 |
1198d |
df2f583b6363
reiserfs: add check for root_inode in reiserfs_fill_super
|
KASAN: use-after-free Read in __queue_work
|
syz |
|
done |
5 |
1230d |
1602d
|
1/1 |
1199d |
3719acc161d5
Bluetooth: defer cleanup of resources in hci_unregister_dev()
|
WARNING in close_fs_devices
|
C |
|
done |
105 |
1240d |
1558d
|
1/1 |
1210d |
4c97ed4332be
ocfs2: fix zero out valid data
|
possible deadlock in cleanup_net
|
C |
|
done |
5212 |
1240d |
1502d
|
1/1 |
1210d |
3719acc161d5
Bluetooth: defer cleanup of resources in hci_unregister_dev()
|
possible deadlock in __sock_release
|
C |
|
done |
57446 |
1240d |
1502d
|
1/1 |
1210d |
7d2c0c0516e6
PCI: Leave Apple Thunderbolt controllers on for s2idle or standby
|
KASAN: use-after-free Write in hci_sock_bind
|
C |
|
done |
12 |
1246d |
1806d
|
1/1 |
1213d |
3719acc161d5
Bluetooth: defer cleanup of resources in hci_unregister_dev()
|
kernel BUG at drivers/dma-buf/dma-buf.c:LINE!
|
syz |
|
done |
1 |
1244d |
1727d
|
1/1 |
1213d |
020a44cc54d6
drm: Return -ENOTTY for non-drm ioctls
|
unexpected kernel reboot
|
C |
|
done |
684 |
1253d |
2029d
|
1/1 |
1222d |
da84e8e9290e
KVM: x86: determine if an exception has an error code only when injecting it.
|
KASAN: use-after-free Read in reservation_object_test_signaled_rcu
|
C |
|
done |
4 |
1253d |
1488d
|
1/1 |
1222d |
020a44cc54d6
drm: Return -ENOTTY for non-drm ioctls
|
BUG: unable to handle kernel paging request in diFree
|
C |
|
done |
18 |
1253d |
1545d
|
1/1 |
1223d |
aff8d95b6905
jfs: fix GPF in diFree
|
KASAN: use-after-free Read in hci_chan_del
|
C |
|
done |
24 |
1256d |
1602d
|
1/1 |
1224d |
35113c4c9fa7
bluetooth: eliminate the potential race condition when removing the HCI controller
|
WARNING in drm_prime_destroy_file_private
|
syz |
|
done |
6 |
1255d |
1446d
|
1/1 |
1224d |
020a44cc54d6
drm: Return -ENOTTY for non-drm ioctls
|
divide error in do_journal_end (2)
|
C |
|
done |
4 |
1259d |
1370d
|
1/1 |
1227d |
47b4b8f0d378
reiserfs: add check for invalid 1st journal block
|
general protection fault in mount_fs
|
C |
|
done |
12 |
1259d |
1490d
|
1/1 |
1227d |
5485fe228f97
ext4: return error code when ext4_fill_flex_info() fails
|
WARNING: suspicious RCU usage in vxlan_xmit
|
C |
|
done |
1 |
1263d |
1263d
|
1/1 |
1233d |
f80201ff7937
vxlan: add missing rcu_read_lock() in neigh_reduce()
|
WARNING in batadv_iv_send_outstanding_bat_ogm_packet
|
C |
|
done |
373 |
1270d |
1886d
|
1/1 |
1240d |
e8e9d2968a9d
batman-adv: Avoid WARN_ON timing related checks
|
general protection fault in ieee802154_llsec_parse_dev_addr
|
C |
|
done |
32 |
1274d |
1393d
|
1/1 |
1243d |
00b16396ad26
HID: quirks: Set INCREMENT_USAGE_ON_DUPLICATE for Saitek X65
|
KASAN: use-after-free Read in qfq_search_class
|
C |
|
done |
2 |
1277d |
1763d
|
1/1 |
1247d |
98fd088c3254
pkt_sched: sch_qfq: fix qfq_change_class() error path
|
KASAN: use-after-free Read in ntfs_iget (2)
|
C |
|
done |
1 |
1278d |
1278d
|
1/1 |
1248d |
00f00f5db888
ntfs: fix validity check for file name attribute
|
WARNING in sta_apply_parameters
|
C |
|
done |
1 |
1279d |
1505d
|
1/1 |
1248d |
25487a5ff100
mac80211: remove warning in ieee80211_get_sband()
|
WARNING in sta_info_alloc
|
C |
|
done |
15 |
1281d |
1538d
|
1/1 |
1251d |
25487a5ff100
mac80211: remove warning in ieee80211_get_sband()
|
KASAN: null-ptr-deref Write in vhci_shutdown_connection
|
syz |
|
done |
498 |
1285d |
1466d
|
1/1 |
1252d |
d42c3ebb3156
can: bcm/raw/isotp: use per module netdevice notifier
|
WARNING in process_one_work
|
C |
|
done |
9 |
1287d |
1852d
|
1/1 |
1256d |
e8e9d2968a9d
batman-adv: Avoid WARN_ON timing related checks
|
general protection fault in try_to_wake_up
|
syz |
|
done |
229 |
1287d |
1375d
|
1/1 |
1257d |
d42c3ebb3156
can: bcm/raw/isotp: use per module netdevice notifier
|
WARNING: ODEBUG bug in slave_kobj_release
|
C |
|
done |
28 |
1293d |
1469d
|
1/1 |
1262d |
f583748c2a4a
bonding: init notify_work earlier to avoid uninitialized use
|
KASAN: use-after-free Read in drm_getunique
|
syz |
|
done |
2 |
1305d |
1473d
|
1/1 |
1275d |
7d233ba700ce
drm: Fix use-after-free read in drm_getunique()
|
BUG: unable to handle kernel NULL pointer dereference in corrupted
|
C |
|
done |
6 |
1306d |
1888d
|
1/1 |
1276d |
93e4ac2a9979
nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect
|
KASAN: global-out-of-bounds Read in soft_cursor
|
C |
|
done |
22 |
1307d |
1774d
|
1/1 |
1277d |
8c5ec4a731e1
vt: Fix character height handling with VT_RESIZEX
|
KASAN: global-out-of-bounds Read in bit_putcs
|
C |
|
done |
214 |
1307d |
1844d
|
1/1 |
1277d |
8c5ec4a731e1
vt: Fix character height handling with VT_RESIZEX
|
WARNING: ODEBUG bug in cancel_delayed_work
|
C |
|
done |
1226 |
1310d |
1605d
|
1/1 |
1277d |
02f681a5e827
Bluetooth: Set CONF_NOT_COMPLETE as l2cap_chan default
|
KASAN: use-after-free Read in hci_send_acl
|
C |
|
done |
3 |
1311d |
1602d
|
1/1 |
1277d |
75e26178e26f
Bluetooth: verify AMP hci_chan before amp_destroy
|
KASAN: use-after-free Read in nfc_llcp_sock_unlink
|
C |
|
done |
22 |
1310d |
1348d
|
1/1 |
1277d |
48fba458fe54
net/nfc: fix use-after-free llcp_sock_bind/connect
|
WARNING in hsr_addr_subst_dest
|
C |
|
done |
3099 |
1310d |
2078d
|
1/1 |
1277d |
40fa36443db3
hsr: use netdev_err() instead of WARN_ONCE()
|
KASAN: slab-out-of-bounds Read in soft_cursor (2)
|
C |
|
done |
8 |
1309d |
1432d
|
1/1 |
1277d |
8c5ec4a731e1
vt: Fix character height handling with VT_RESIZEX
|
possible deadlock in tty_port_close_start
|
C |
|
done |
47 |
1315d |
1781d
|
1/1 |
1285d |
1f51881e2dcc
ttyprintk: Add TTY hangup callback.
|
KASAN: null-ptr-deref Read in llcp_sock_getname
|
C |
|
|
37 |
1319d |
1879d
|
1/1 |
1290d |
93e4ac2a9979
nfc: fix NULL ptr dereference in llcp_sock_getname() after failed connect
|
kernel BUG in z_erofs_map_blocks_iter
|
syz |
|
done |
10 |
1331d |
1392d
|
1/1 |
1301d |
006270aa8f9c
erofs: add unsupported inode i_format check
|
kernel BUG at fs/inode.c:LINE! (2)
|
C |
|
done |
5 |
1335d |
1474d
|
1/1 |
1302d |
006270aa8f9c
erofs: add unsupported inode i_format check
|
general protection fault in __queue_work
|
syz |
|
done |
1 |
1335d |
1583d
|
1/1 |
1302d |
35113c4c9fa7
bluetooth: eliminate the potential race condition when removing the HCI controller
|
general protection fault in nl802154_del_llsec_devkey
|
C |
|
done |
110 |
1348d |
1407d
|
1/1 |
1317d |
22e025c1733b
net: ieee802154: fix nl802154 del llsec devkey
|
general protection fault in nl802154_add_llsec_key
|
C |
|
done |
106 |
1348d |
1403d
|
1/1 |
1317d |
bdd1d2784ad3
net: ieee802154: fix nl802154 add llsec key
|
general protection fault in nl802154_del_llsec_key
|
C |
|
done |
91 |
1348d |
1401d
|
1/1 |
1317d |
79ba55c0e7a7
net: ieee802154: fix nl802154 del llsec key
|
general protection fault in ieee802154_llsec_parse_key_id
|
C |
|
done |
64 |
1348d |
1399d
|
1/1 |
1318d |
5983b9de012e
net: ieee802154: nl-mac: fix check on panid
|
WARNING in cfg80211_connect
|
C |
|
done |
336 |
1348d |
1543d
|
1/1 |
1318d |
ee1a5262eb01
cfg80211: remove WARN_ON() in cfg80211_sme_connect
|
general protection fault in nl802154_del_llsec_dev
|
C |
|
done |
70 |
1349d |
1406d
|
1/1 |
1319d |
3fe0c0485a29
net: ieee802154: fix nl802154 del llsec dev
|
general protection fault in crypto_destroy_tfm
|
syz |
|
done |
12 |
1350d |
1395d
|
1/1 |
1320d |
b58bb4eaa0c2
drivers: net: fix memory leak in peak_usb_create_dev
|
BUG: sleeping function called from invalid context in htb_destroy
|
C |
|
done |
2 |
1370d |
1891d
|
1/1 |
1339d |
66f6f4094ff2
net: sched: validate stab values
|
possible deadlock in red_change
|
C |
|
done |
10 |
1371d |
1611d
|
1/1 |
1341d |
66f6f4094ff2
net: sched: validate stab values
|
BUG: unable to handle kernel NULL pointer dereference in __lookup_slow
|
C |
|
done |
23 |
1384d |
1542d
|
1/1 |
1351d |
b8590c82b3cc
reiserfs: add check for an invalid ih_entry_count
|
WARNING in ext4_xattr_set_entry
|
C |
|
done |
12 |
1385d |
1519d
|
1/1 |
1354d |
a8fb57ec924f
ext4: do not try to set xattr into ea_inode if value is empty
|
BUG: unable to handle kernel NULL pointer dereference in amp_read_loc_assoc_final_data
|
C |
|
done |
114 |
1389d |
1605d
|
1/1 |
1354d |
99c2c8b009c4
Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data
|
KASAN: use-after-free Read in skb_dequeue
|
syz |
|
done |
1 |
1396d |
1601d
|
1/1 |
1363d |
c1a77dbcaa2d
btrfs: raid56: simplify tracking of Q stripe presence
|
KASAN: use-after-free Read in ntfs_iget
|
C |
|
done |
1 |
1396d |
1456d
|
1/1 |
1363d |
23e895868b51
ntfs: check for valid standard information attribute
|
KASAN: use-after-free Read in ntfs_read_locked_inode
|
C |
|
done |
2 |
1399d |
1549d
|
1/1 |
1368d |
23e895868b51
ntfs: check for valid standard information attribute
|
kernel BUG in pfkey_send_acquire
|
C |
|
done |
56 |
1405d |
1434d
|
1/1 |
1375d |
fa137b50f326
block: split .sysfs_lock into two locks
|
general protection fault in ioctl_standard_call
|
C |
|
done |
23 |
1409d |
1523d
|
1/1 |
1378d |
3f33e522a07f
wext: fix NULL-ptr-dereference with cfg80211's lack of commit()
|
KASAN: slab-out-of-bounds Read in squashfs_export_iget
|
C |
|
done |
5 |
1420d |
1521d
|
1/1 |
1390d |
a6f933a30363
squashfs: add more sanity checks in inode lookup
|
general protection fault in ieee80211_subif_start_xmit
|
C |
|
done |
4 |
1425d |
1466d
|
1/1 |
1391d |
b26b5e086157
mac80211: pause TX while changing interface type
|
UBSAN: undefined-behaviour in tcindex_set_parms
|
C |
|
done |
39 |
1437d |
1552d
|
1/1 |
1398d |
22c1b22672f3
net_sched: avoid shift-out-of-bounds in tcindex_set_parms()
|
kernel BUG at fs/reiserfs/prints.c:LINE!
|
C |
|
done |
5 |
1447d |
1538d
|
1/1 |
1399d |
b8590c82b3cc
reiserfs: add check for an invalid ih_entry_count
|
KASAN: use-after-free Read in search_by_entry_key
|
C |
|
done |
1 |
1447d |
1537d
|
1/1 |
1401d |
b8590c82b3cc
reiserfs: add check for an invalid ih_entry_count
|
KASAN: slab-out-of-bounds Read in squashfs_get_id
|
C |
|
|
58 |
1406d |
1550d
|
1/1 |
1401d |
e5099c0e851a
squashfs: add more sanity checks in id lookup
|
KASAN: use-after-free Read in squashfs_get_id
|
C |
|
|
3 |
1445d |
1499d
|
1/1 |
1401d |
e5099c0e851a
squashfs: add more sanity checks in id lookup
|
KASAN: use-after-free Read in tls_write_space
|
C |
|
done |
25 |
1453d |
2078d
|
1/1 |
1423d |
d71f3fb99620
net: usb: rtl8150: set random MAC address when set_ethernet_addr() fails
|
divide error in do_journal_end
|
C |
|
done |
2 |
1455d |
1515d
|
1/1 |
1425d |
b8590c82b3cc
reiserfs: add check for an invalid ih_entry_count
|
general protection fault in dqput
|
C |
|
done |
2 |
1456d |
1469d
|
1/1 |
1425d |
7bae84821b47
quota: Sanity-check quota file headers on load
|
WARNING in md_ioctl
|
C |
|
done |
199 |
1456d |
2073d
|
1/1 |
1425d |
b85abab5913d
md: fix a warning caused by a race between concurrent md_ioctl()s
|
general protection fault in hci_phy_link_complete_evt
|
C |
|
done |
28 |
1460d |
1603d
|
1/1 |
1429d |
abae100355c0
Bluetooth: Fix null pointer dereference in hci_event_packet()
|
KASAN: use-after-free Read in leaf_paste_entries
|
C |
|
done |
1 |
1463d |
1463d
|
1/1 |
1432d |
b8590c82b3cc
reiserfs: add check for an invalid ih_entry_count
|
general protection fault in hci_event_packet
|
C |
|
done |
3 |
1464d |
1530d
|
1/1 |
1433d |
abae100355c0
Bluetooth: Fix null pointer dereference in hci_event_packet()
|
KASAN: slab-out-of-bounds Read in hci_le_meta_evt
|
C |
|
done |
12 |
1464d |
1605d
|
1/1 |
1433d |
61490c481c61
Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt()
|
KASAN: use-after-free Read in reiserfs_read_locked_inode
|
C |
|
done |
4 |
1467d |
1549d
|
1/1 |
1437d |
b8590c82b3cc
reiserfs: add check for an invalid ih_entry_count
|
INFO: task hung in rdma_destroy_id
|
C |
|
done |
2 |
1467d |
1498d
|
1/1 |
1437d |
014133611851
usb: uas: Add PNY USB Portable SSD to unusual_uas
|
INFO: task hung in do_read_cache_page
|
C |
|
done |
2 |
1469d |
1529d
|
1/1 |
1438d |
8e63266b0d42
fcntl: Fix potential deadlock in send_sig{io, urg}()
|
BUG: unable to handle kernel paging request in dquot_add_space
|
C |
|
done |
1 |
1471d |
1531d
|
1/1 |
1439d |
7bae84821b47
quota: Sanity-check quota file headers on load
|
BUG: unable to handle kernel paging request in dqput
|
C |
|
done |
8 |
1469d |
1538d
|
1/1 |
1439d |
7bae84821b47
quota: Sanity-check quota file headers on load
|
general protection fault in gfs2_ri_update
|
C |
|
done |
28 |
1475d |
1551d
|
1/1 |
1443d |
6790f8b9370b
gfs2: check for empty rgrp tree in gfs2_ri_update
|
KASAN: use-after-free Write in sco_chan_del
|
C |
|
done |
10 |
1478d |
1602d
|
1/1 |
1447d |
abae100355c0
Bluetooth: Fix null pointer dereference in hci_event_packet()
|
KASAN: use-after-free Read in btrfs_scan_one_device
|
C |
|
done |
43 |
1482d |
1557d
|
1/1 |
1452d |
aec62fa475af
btrfs: don't access possibly stale fs_info data for printing duplicate device
|
BUG: sleeping function called from invalid context in corrupted
|
C |
|
done |
2 |
1489d |
1490d
|
1/1 |
1458d |
499b109be688
mac80211: free sta in sta_info_insert_finish() on errors
|
BUG: sleeping function called from invalid context in sta_info_move_state
|
C |
|
done |
760 |
1488d |
1491d
|
1/1 |
1458d |
499b109be688
mac80211: free sta in sta_info_insert_finish() on errors
|
KASAN: slab-out-of-bounds Read in ntfs_attr_find
|
C |
|
done |
10 |
1490d |
1547d
|
1/1 |
1459d |
dff5d7741195
ntfs: add check for mft record size in superblock
|
general protection fault in rose_send_frame
|
C |
|
done |
5 |
1494d |
2072d
|
1/1 |
1459d |
731b9890a7f1
rose: Fix Null pointer dereference in rose_send_frame()
|
KASAN: slab-out-of-bounds Read in soft_cursor
|
C |
|
done |
61 |
1507d |
1845d
|
1/1 |
1477d |
3e1600cc10df
ALSA: hda: fix a runtime pm issue in SOF when integrated GPU is disabled
|
KASAN: use-after-free Read in debugfs_remove
|
C |
|
done |
15 |
1512d |
2008d
|
1/1 |
1481d |
8a78b4c0d629
blktrace: fix debugfs use after free
|
UBSAN: undefined-behaviour in init_sb
|
C |
|
done |
2 |
1514d |
1547d
|
1/1 |
1484d |
6a253f385a2d
gfs2: add validation checks for size of superblock
|
WARNING in unlock_new_inode
|
C |
|
done |
66 |
1514d |
1553d
|
1/1 |
1484d |
7a1e074bc18d
reiserfs: only call unlock_new_inode() if I_NEW
|
KASAN: use-after-free Read in tipc_mcast_xmit
|
C |
|
done |
3 |
1515d |
1538d
|
1/1 |
1484d |
26217e062f97
tipc: fix the skb_unshare() in tipc_buf_append()
|
KASAN: global-out-of-bounds Read in fb_pad_aligned_buffer
|
C |
|
done |
5 |
1515d |
1841d
|
1/1 |
1484d |
6612b754ac0c
vt: Disable KD_FONT_OP_COPY
|
KASAN: use-after-free Read in ntfs_attr_find
|
C |
|
done |
13 |
1516d |
1547d
|
1/1 |
1485d |
dff5d7741195
ntfs: add check for mft record size in superblock
|
divide error in tabledist
|
C |
|
done |
3 |
1526d |
1883d
|
1/1 |
1496d |
95ba2236b8e6
netem: fix zero division in tabledist
|
general protection fault in qp_release_pages
|
C |
|
done |
4 |
1527d |
1529d
|
1/1 |
1496d |
0b02a4325780
VMCI: check return value of get_user_pages_fast() for errors
|
UBSAN: undefined-behaviour in tabledist
|
C |
|
done |
2 |
1535d |
1535d
|
1/1 |
1503d |
95ba2236b8e6
netem: fix zero division in tabledist
|
KASAN: global-out-of-bounds Read in fbcon_get_font
|
C |
|
done |
47 |
1534d |
1846d
|
1/1 |
1503d |
43198a5b1c42
fbcon: Fix global-out-of-bounds read in fbcon_get_font()
|
KASAN: slab-out-of-bounds Read in fbcon_get_font
|
C |
|
done |
97 |
1538d |
1846d
|
1/1 |
1507d |
1221d11e5c35
vt_ioctl: change VT_RESIZEX ioctl to check for error return from vc_resize()
|
general protection fault in get_unique_tuple
|
C |
|
done |
33 |
1539d |
1800d
|
1/1 |
1507d |
289fe546ea16
netfilter: ctnetlink: add a range check for l3/l4 protonum
|
general protection fault in nf_nat_setup_info
|
C |
|
done |
22 |
1543d |
1634d
|
1/1 |
1513d |
289fe546ea16
netfilter: ctnetlink: add a range check for l3/l4 protonum
|
KASAN: use-after-free Read in soft_cursor
|
C |
|
done |
16 |
1547d |
1844d
|
1/1 |
1517d |
76fe92986c5c
fbcon: Fix user font detection test at fbcon_resize().
|
KASAN: global-out-of-bounds Read in get_unique_tuple
|
C |
|
done |
1 |
1548d |
1788d
|
1/1 |
1518d |
289fe546ea16
netfilter: ctnetlink: add a range check for l3/l4 protonum
|
KASAN: global-out-of-bounds Read in fbcon_resize
|
C |
|
done |
286 |
1551d |
1570d
|
1/1 |
1520d |
76fe92986c5c
fbcon: Fix user font detection test at fbcon_resize().
|
general protection fault in __sock_release
|
syz |
|
done |
8 |
1565d |
1577d
|
1/1 |
1535d |
37d933e8b41b
fix regression in "epoll: Keep a reference on files added to the check list"
|
WARNING in snd_pcm_plugin_build_mulaw
|
C |
|
done |
2 |
1567d |
1577d
|
1/1 |
1536d |
569e1b621797
ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check
|
KASAN: use-after-free Read in seq_release_private
|
syz |
|
done |
1 |
1566d |
1566d
|
1/1 |
1536d |
37d933e8b41b
fix regression in "epoll: Keep a reference on files added to the check list"
|
WARNING: ODEBUG bug in get_signal
|
syz |
|
done |
3 |
1568d |
1578d
|
1/1 |
1537d |
37d933e8b41b
fix regression in "epoll: Keep a reference on files added to the check list"
|
WARNING in snd_pcm_drop
|
syz |
|
done |
1 |
1568d |
1568d
|
1/1 |
1537d |
37d933e8b41b
fix regression in "epoll: Keep a reference on files added to the check list"
|
WARNING: ODEBUG bug in exit_to_usermode_loop
|
syz |
|
done |
2 |
1568d |
1570d
|
1/1 |
1537d |
dff6a2c2828b
nvmet-fc: Fix a missed _irqsave version of spin_lock in 'nvmet_fc_fod_op_done()'
|
general protection fault in tty_release
|
C |
|
done |
9 |
1569d |
1576d
|
1/1 |
1538d |
37d933e8b41b
fix regression in "epoll: Keep a reference on files added to the check list"
|
KASAN: use-after-free Write in __sock_release
|
syz |
|
done |
1 |
1570d |
1570d
|
1/1 |
1540d |
37d933e8b41b
fix regression in "epoll: Keep a reference on files added to the check list"
|
KASAN: use-after-free Read in locks_remove_file
|
syz |
|
done |
4 |
1570d |
1578d
|
1/1 |
1540d |
37d933e8b41b
fix regression in "epoll: Keep a reference on files added to the check list"
|
KASAN: use-after-free Read in cuse_channel_release
|
syz |
|
done |
1 |
1571d |
1571d
|
1/1 |
1540d |
37d933e8b41b
fix regression in "epoll: Keep a reference on files added to the check list"
|
KASAN: use-after-free Read in __fput
|
syz |
|
done |
1 |
1572d |
1572d
|
1/1 |
1541d |
37d933e8b41b
fix regression in "epoll: Keep a reference on files added to the check list"
|
KASAN: use-after-free Write in ex_handler_refcount
|
C |
|
done |
11 |
1572d |
1780d
|
1/1 |
1541d |
29e1dfcd5150
Bluetooth: add a mutex lock to avoid UAF in do_enale_set
|
kernel BUG at include/linux/fs.h:LINE!
|
syz |
|
done |
1 |
1572d |
1572d
|
1/1 |
1541d |
37d933e8b41b
fix regression in "epoll: Keep a reference on files added to the check list"
|
KASAN: use-after-free Read in snd_pcm_oss_release
|
syz |
|
done |
1 |
1572d |
1572d
|
1/1 |
1541d |
37d933e8b41b
fix regression in "epoll: Keep a reference on files added to the check list"
|
kernel BUG at fs/inode.c:LINE!
|
syz |
|
done |
2 |
1572d |
1602d
|
1/1 |
1542d |
37d933e8b41b
fix regression in "epoll: Keep a reference on files added to the check list"
|
KASAN: invalid-free in vcs_release
|
syz |
|
done |
1 |
1573d |
1573d
|
1/1 |
1543d |
37d933e8b41b
fix regression in "epoll: Keep a reference on files added to the check list"
|
KASAN: use-after-free Read in fbcon_cursor
|
syz |
|
done |
4 |
1574d |
1834d
|
1/1 |
1544d |
770adb5d2b8e
fbcon: remove soft scrollback code
|
BUG: corrupted list in mousedev_release
|
syz |
|
done |
1 |
1574d |
1574d
|
1/1 |
1544d |
37d933e8b41b
fix regression in "epoll: Keep a reference on files added to the check list"
|
KASAN: use-after-free Read in eventfd_release
|
syz |
|
done |
1 |
1576d |
1576d
|
1/1 |
1545d |
37d933e8b41b
fix regression in "epoll: Keep a reference on files added to the check list"
|
INFO: trying to register non-static key in uhid_char_release
|
C |
|
done |
3 |
1575d |
1598d
|
1/1 |
1545d |
abae259fdccc
HID: core: Correctly handle ReportSize being zero
|
WARNING in corrupted (2)
|
C |
|
done |
1 |
1577d |
1577d
|
1/1 |
1546d |
569e1b621797
ALSA: pcm: oss: Remove superfluous WARN_ON() for mulaw sanity check
|
INFO: trying to register non-static key in uhid_dev_destroy
|
C |
|
done |
14 |
1584d |
1752d
|
1/1 |
1553d |
abae259fdccc
HID: core: Correctly handle ReportSize being zero
|
KASAN: slab-out-of-bounds Read in vcs_scr_readw
|
C |
|
inconclusive |
80 |
1836d |
1846d
|
1/1 |
1556d |
627f3b9e4dd8
vcs: prevent write access to vcsu devices
|
WARNING in inc_nlink
|
C |
|
done |
8 |
1586d |
1735d
|
1/1 |
1556d |
169f7f37bd6b
fs/minix: don't allow getting deleted inodes
|
BUG: unable to handle kernel NULL pointer dereference in get_block
|
C |
|
done |
60 |
1590d |
1741d
|
1/1 |
1559d |
954fc7da99a9
fs/minix: reject too-large maximum file size
|
KASAN: slab-out-of-bounds Read in get_block
|
C |
|
done |
3 |
1593d |
1708d
|
1/1 |
1562d |
954fc7da99a9
fs/minix: reject too-large maximum file size
|
KASAN: use-after-free Read in get_block
|
C |
|
done |
6 |
1593d |
1725d
|
1/1 |
1563d |
954fc7da99a9
fs/minix: reject too-large maximum file size
|
KASAN: slab-out-of-bounds Read in hci_event_packet
|
C |
|
done |
15 |
1593d |
1803d
|
1/1 |
1563d |
8c4a649c20fe
Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()
|
KASAN: slab-out-of-bounds Read in bacpy
|
C |
|
done |
3 |
1599d |
2061d
|
1/1 |
1565d |
8c4a649c20fe
Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()
|
KASAN: slab-out-of-bounds Read in hci_extended_inquiry_result_evt
|
C |
|
done |
6 |
1597d |
1631d
|
1/1 |
1565d |
8c4a649c20fe
Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()
|
KASAN: null-ptr-deref Read in drm_dp_aux_dev_get_by_minor
|
C |
|
done |
1 |
1598d |
1658d
|
1/1 |
1565d |
954fc7da99a9
fs/minix: reject too-large maximum file size
|
KASAN: slab-out-of-bounds Read in hci_inquiry_result_with_rssi_evt
|
C |
|
done |
4 |
1597d |
1626d
|
1/1 |
1565d |
48f70ecd6a22
Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt()
|
KASAN: use-after-free Read in l2cap_chan_close
|
C |
|
done |
8 |
1598d |
1780d
|
1/1 |
1565d |
29e1dfcd5150
Bluetooth: add a mutex lock to avoid UAF in do_enale_set
|
BUG: unable to handle kernel NULL pointer dereference in do_syscall_64 (2)
|
C |
|
done |
4 |
1602d |
1614d
|
1/1 |
1571d |
dd58bd1b95b7
fbdev: Detect integer underflow at "struct fbcon_ops"->clear_margins.
|
divide error in fbcon_switch
|
C |
|
done |
259 |
1607d |
1846d
|
1/1 |
1572d |
74752b81eae8
vt: Reject zero-sized screen buffer size.
|
general protection fault in do_con_write
|
C |
|
done |
3008 |
1607d |
1846d
|
1/1 |
1572d |
74752b81eae8
vt: Reject zero-sized screen buffer size.
|
kernel BUG at fs/buffer.c:LINE!
|
syz |
|
done |
23 |
1603d |
2056d
|
1/1 |
1572d |
954fc7da99a9
fs/minix: reject too-large maximum file size
|
general protection fault in free_netdev
|
C |
|
done |
99 |
1604d |
1634d
|
1/1 |
1572d |
abcf95e000b4
ip6_gre: fix null-ptr-deref in ip6gre_init_net()
|
BUG: unable to handle kernel paging request in do_con_trol
|
C |
|
done |
36 |
1607d |
1839d
|
1/1 |
1576d |
74752b81eae8
vt: Reject zero-sized screen buffer size.
|
WARNING in snd_info_get_line
|
C |
|
done |
23 |
1607d |
1619d
|
1/1 |
1576d |
0c9d4b18bb8a
ALSA: info: Drop WARN_ON() from buffer NULL sanity check
|
BUG: unable to handle kernel paging request in insert_char
|
C |
|
done |
46 |
1621d |
1841d
|
1/1 |
1590d |
74752b81eae8
vt: Reject zero-sized screen buffer size.
|
INFO: task hung in __flush_work
|
syz |
|
done |
6 |
1622d |
2072d
|
1/1 |
1592d |
af224c2eeda2
net/9p: validate fds in p9_fd_open
|
KASAN: null-ptr-deref Read in do_con_trol
|
C |
|
done |
1 |
1622d |
1773d
|
1/1 |
1592d |
74752b81eae8
vt: Reject zero-sized screen buffer size.
|
KASAN: null-ptr-deref Read in insert_char
|
C |
|
done |
3 |
1623d |
1818d
|
1/1 |
1593d |
74752b81eae8
vt: Reject zero-sized screen buffer size.
|
KASAN: user-memory-access Read in insert_char
|
C |
|
done |
2 |
1625d |
1838d
|
1/1 |
1594d |
74752b81eae8
vt: Reject zero-sized screen buffer size.
|
BUG: unable to handle kernel paging request in csi_J
|
C |
|
done |
3 |
1634d |
1802d
|
1/1 |
1603d |
74752b81eae8
vt: Reject zero-sized screen buffer size.
|
BUG: unable to handle kernel NULL pointer dereference in generic_perform_write (2)
|
C |
|
done |
1 |
1645d |
1735d
|
1/1 |
1615d |
5dbb625573ab
ext4: avoid race conditions when remounting with options that change dax
|
WARNING in enqueue_task_dl
|
syz |
|
done |
1 |
1653d |
1982d
|
1/1 |
1622d |
edf55b5e3bde
sched/deadline: Initialize ->dl_boosted
|
general protection fault in batadv_iv_ogm_schedule_buff
|
|
|
|
6 |
1740d |
1796d
|
1/1 |
1627d |
bf0ef794e197
batman-adv: Don't schedule OGM for disabled interface
|
general protection fault in fq_codel_enqueue
|
C |
|
done |
5 |
1674d |
1703d
|
1/1 |
1644d |
8920e8ae16a8
net: check untrusted gso_size at kernel entry
|
kernel BUG at arch/x86/mm/physaddr.c:LINE! (2)
|
C |
|
done |
82 |
1675d |
1816d
|
1/1 |
1645d |
a3da2984a40b
vt: fix unicode console freeing with a common interface
|
INFO: trying to register non-static key in hci_uart_flush
|
syz |
|
done |
4 |
1680d |
1924d
|
1/1 |
1649d |
8efa59fc90a5
netfilter: nf_conntrack_pptp: fix compilation warning with W=1 build
|
KASAN: use-after-free Write in snd_rawmidi_kernel_write1
|
C |
|
done |
1 |
1681d |
1711d
|
1/1 |
1651d |
a507658fdb2a
ALSA: rawmidi: Fix racy buffer resize under concurrent accesses
|
KASAN: null-ptr-deref Write in choke_reset
|
C |
|
done |
236 |
1683d |
1708d
|
1/1 |
1652d |
1733fe42d94c
USB: serial: garmin_gps: add sanity checking for data length
|
KASAN: use-after-free Read in rdma_listen
|
syz |
|
done |
143 |
1714d |
2026d
|
1/1 |
1684d |
abc4ea7f1345
RDMA/ucma: Put a lock around every call to the rdma_cm layer
|
KASAN: use-after-free Read in cma_cancel_operation
|
C |
|
done |
6 |
1726d |
1876d
|
1/1 |
1696d |
abc4ea7f1345
RDMA/ucma: Put a lock around every call to the rdma_cm layer
|
WARNING in geneve_exit_batch_net
|
C |
|
done |
2 |
1728d |
1773d
|
1/1 |
1698d |
2c1a05e91fc6
geneve: move debug check after netdev unregister
|
WARNING: ODEBUG bug in rfcomm_dev_ioctl
|
C |
|
done |
1 |
1730d |
1730d
|
1/1 |
1698d |
78a4ad28608a
Bluetooth: RFCOMM: fix ODEBUG bug in rfcomm_dev_ioctl
|
KASAN: use-after-free Write in release_tty
|
C |
|
done |
148 |
1729d |
1846d
|
1/1 |
1698d |
54584f79579b
vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console
|
WARNING: ODEBUG bug in route4_change
|
C |
|
done |
28 |
1733d |
1753d
|
1/1 |
1703d |
ea3d6652c240
net_sched: cls_route: remove the right filter from hashtable
|
WARNING: refcount bug in sock_wfree
|
C |
done |
done |
1 |
1736d |
1856d
|
1/1 |
1706d |
6ce6aea362d4
sctp: fix refcount bug in sctp_wfree
|
KASAN: use-after-free Read in tty_open
|
C |
|
done |
2 |
1740d |
1846d
|
1/1 |
1710d |
54584f79579b
vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console
|
BUG: unable to handle kernel paging request in init_srcu_struct_fields
|
syz |
|
done |
3 |
1740d |
1938d
|
1/1 |
1710d |
e36be7959326
usbip: tools: Fix read_usb_vudc_device() error path handling
|
KASAN: slab-out-of-bounds Read in selinux_xfrm_alloc_user
|
C |
|
done |
3 |
1742d |
1747d
|
1/1 |
1711d |
0a7b397c0133
xfrm: add the missing verify_sec_ctx_len check in xfrm_add_acquire
|
WARNING: ODEBUG bug in rfcomm_dlc_free
|
C |
|
done |
21 |
1743d |
1974d
|
1/1 |
1712d |
78a4ad28608a
Bluetooth: RFCOMM: fix ODEBUG bug in rfcomm_dev_ioctl
|
KASAN: slab-out-of-bounds Write in tcindex_set_parms
|
C |
|
done |
2 |
1747d |
1747d
|
1/1 |
1714d |
557d015ffb27
net_sched: keep alloc_hash updated after hash allocation
|
KASAN: use-after-free Write in tcindex_set_parms
|
C |
|
done |
3 |
1746d |
1750d
|
1/1 |
1714d |
557d015ffb27
net_sched: keep alloc_hash updated after hash allocation
|
possible deadlock in ovl_write_iter (2)
|
syz |
|
done |
2 |
1748d |
1749d
|
1/1 |
1718d |
eae6b4a4d7f8
USB: Disable LPM on WD19's Realtek Hub
|
KASAN: use-after-free Read in n_tty_receive_buf_common
|
C |
|
done |
40 |
1750d |
1844d
|
1/1 |
1719d |
b4492f1e7456
vt: selection, push sel_lock up
|
inconsistent lock state in rxrpc_put_client_connection_id
|
C |
|
done |
89 |
1758d |
1775d
|
1/1 |
1728d |
43cac315bec1
rxrpc: Fix call RCU cleanup using non-bh-safe locks
|
KASAN: use-after-free Read in ext4_xattr_set_entry
|
syz |
|
done |
10 |
1758d |
2006d
|
1/1 |
1728d |
cb1702c403ad
ext4: validate the debug_want_extra_isize mount option at parse time
|
inconsistent lock state in rxrpc_put_client_conn
|
C |
|
done |
6584 |
1758d |
1775d
|
1/1 |
1728d |
43cac315bec1
rxrpc: Fix call RCU cleanup using non-bh-safe locks
|
kernel BUG at net/rxrpc/local_object.c:LINE!
|
C |
|
done |
13912 |
1760d |
1970d
|
1/1 |
1729d |
792668145b56
rxrpc: Fix lack of conn cleanup when local endpoint is cleaned up [ver #2]
|
general protection fault in selinux_socket_sendmsg
|
C |
|
done |
36 |
1761d |
1941d
|
1/1 |
1731d |
43cac315bec1
rxrpc: Fix call RCU cleanup using non-bh-safe locks
|
INFO: task hung in paste_selection
|
C |
|
done |
10 |
1762d |
1837d
|
1/1 |
1731d |
b4492f1e7456
vt: selection, push sel_lock up
|
INFO: task hung in htable_put
|
C |
|
done |
8 |
1763d |
1809d
|
1/1 |
1733d |
acbc5071f073
netfilter: xt_hashlimit: limit the max size of hashtable
|
kernel BUG at fs/reiserfs/lock.c:LINE! (2)
|
C |
|
done |
2 |
1767d |
1767d
|
1/1 |
1736d |
ef3d73fe8836
reiserfs: Fix spurious unlock in reiserfs_fill_super() error handling
|
INFO: task hung in drain_all_pages
|
C |
|
done |
1 |
1767d |
1797d
|
1/1 |
1737d |
8541452acba5
s390/mm: Explicitly compare PAGE_DEFAULT_KEY against zero in storage_key_init_range
|
KASAN: stack-out-of-bounds Write in ax25_getname
|
C |
|
done |
4 |
1771d |
2067d
|
1/1 |
1740d |
ad598a48fe61
vhost: Check docket sk_family instead of call getname
|
INFO: task hung in hashlimit_mt_check_common
|
C |
|
done |
3 |
1774d |
1789d
|
1/1 |
1742d |
acbc5071f073
netfilter: xt_hashlimit: limit the max size of hashtable
|
INFO: task hung in tty_ldisc_hangup
|
C |
|
done |
10 |
1773d |
1840d
|
1/1 |
1742d |
b4492f1e7456
vt: selection, push sel_lock up
|
general protection fault in padata_reorder
|
C |
|
done |
90 |
1772d |
1775d
|
1/1 |
1742d |
cad926f70b5a
padata: fix null pointer deref of pd->pinst
|
KASAN: slab-out-of-bounds Read in tcf_exts_destroy
|
C |
|
done |
1 |
1776d |
1893d
|
1/1 |
1746d |
478c4b2ffd44
net_sched: fix an OOB access in cls_tcindex
|
BUG: sleeping function called from invalid context in tpk_write
|
C |
|
done |
30 |
1781d |
1843d
|
1/1 |
1751d |
fb56687038cf
ttyprintk: fix a potential deadlock in interrupt context issue
|
general protection fault in path_openat
|
C |
|
done |
13 |
1782d |
1788d
|
1/1 |
1752d |
8d7a5100e29d
vfs: fix do_last() regression
|
KASAN: slab-out-of-bounds Read in __nla_put_nohdr
|
C |
|
done |
1 |
1789d |
1789d
|
1/1 |
1758d |
66ac8ee96faa
net_sched: fix datalen for ematch
|
general protection fault in nft_chain_parse_hook
|
C |
|
done |
5 |
1789d |
1801d
|
1/1 |
1758d |
1f7a1bcd27c3
netfilter: nf_tables: add __nft_chain_type_get()
|
WARNING in cbq_destroy_class
|
C |
|
done |
1 |
1794d |
1794d
|
1/1 |
1763d |
9f7a32834b62
net_sched: fix ops->bind_class() implementations
|
KASAN: slab-out-of-bounds Write in setup_udp_tunnel_sock
|
C |
|
done |
1 |
1795d |
1795d
|
1/1 |
1764d |
d3b5ecceea7d
gtp: make sure only SOCK_DGRAM UDP sockets are accepted
|
KASAN: use-after-free Read in snd_timer_resolution
|
C |
|
done |
2 |
1798d |
1798d
|
1/1 |
1768d |
20f2e4c228c7
ALSA: seq: Fix racy access for queue timer in proc read
|
KASAN: use-after-free Read in tcp_check_sack_reordering
|
C |
|
done |
1 |
1798d |
1798d
|
1/1 |
1768d |
fb56687038cf
ttyprintk: fix a potential deadlock in interrupt context issue
|
general protection fault in xt_rateest_put
|
C |
|
done |
10 |
1799d |
1802d
|
1/1 |
1769d |
e3282417b91c
netfilter: arp_tables: init netns pointer in xt_tgdtor_param struct
|
BUG: corrupted list in nf_tables_commit
|
C |
|
done |
2 |
1802d |
1802d
|
1/1 |
1771d |
8260ce5aeee4
netfilter: nf_tables: fix flowtable list del corruption
|
WARNING in nft_request_module
|
C |
|
done |
1 |
1802d |
1802d
|
1/1 |
1771d |
1632efb3553b
netfilter: nf_tables: remove WARN and add NLA_STRING upper limits
|
general protection fault in nft_tunnel_get_init
|
C |
|
done |
1 |
1802d |
1802d
|
1/1 |
1771d |
6de941ce70cd
netfilter: nft_tunnel: fix null-attribute check
|
general protection fault in nf_ct_netns_do_get
|
C |
|
done |
11 |
1806d |
1821d
|
1/1 |
1773d |
46abb2a5cd2f
netfilter: arp_tables: init netns pointer in xt_tgchk_param struct
|
KASAN: use-after-free Write in __alloc_skb
|
C |
|
done |
2 |
1805d |
1873d
|
1/1 |
1775d |
be1a2be7a7b0
net: rtnetlink: validate IFLA_MTU attribute in rtnl_create_link()
|
general protection fault in xt_rateest_tg_checkentry
|
C |
|
done |
12 |
1806d |
1822d
|
1/1 |
1776d |
e3282417b91c
netfilter: arp_tables: init netns pointer in xt_tgdtor_param struct
|
KASAN: slab-out-of-bounds Read in macvlan_broadcast
|
C |
|
done |
10 |
1807d |
1811d
|
1/1 |
1776d |
5f3274c53ae7
macvlan: do not assume mac_header is set in macvlan_broadcast()
|
KASAN: use-after-free Read in macvlan_broadcast
|
C |
|
done |
7 |
1808d |
1811d
|
1/1 |
1778d |
5f3274c53ae7
macvlan: do not assume mac_header is set in macvlan_broadcast()
|
WARNING: bad unlock balance in gtp_encap_enable_socket
|
C |
|
done |
2 |
1810d |
1812d
|
1/1 |
1779d |
776a81a024e7
gtp: fix bad unlock balance in gtp_encap_enable_socket
|
BUG: sleeping function called from invalid context in lock_sock_nested
|
syz |
|
done |
1 |
1814d |
1844d
|
1/1 |
1781d |
6b544caa07e5
crypto: af_alg - Use bh_lock_sock in sk_destruct
|
general protection fault in rxrpc_connect_call
|
C |
|
done |
285 |
1816d |
1981d
|
1/1 |
1786d |
792668145b56
rxrpc: Fix lack of conn cleanup when local endpoint is cleaned up [ver #2]
|
possible deadlock in refcount_dec_and_mutex_lock
|
C |
done |
done |
5 |
1820d |
1875d
|
1/1 |
1789d |
e83a26a49356
nbd: fix shutdown and recv work deadlock v2
|
INFO: rcu detected stall in addrconf_dad_work (2)
|
C |
|
done |
1 |
1829d |
1829d
|
1/1 |
1798d |
94ac4a4d938f
pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM
|
WARNING: refcount bug in cdev_get
|
C |
|
done |
12 |
1829d |
1954d
|
1/1 |
1798d |
f57fd58dda42
bridge/mdb: remove wrong use of NLM_F_MULTI
|
possible deadlock in __might_fault
|
C |
|
done |
385 |
1830d |
2081d
|
1/1 |
1799d |
3757e3818838
usb: mon: Fix a deadlock in usbmon between mmap and read
|
INFO: task hung in fsnotify_mark_destroy_workfn
|
syz |
|
done |
3 |
1832d |
2020d
|
1/1 |
1801d |
42a929edf567
rtc: disable uie before setting time and enable after
|
possible deadlock in mon_bin_vma_fault
|
C |
|
done |
375 |
1832d |
2082d
|
1/1 |
1802d |
3757e3818838
usb: mon: Fix a deadlock in usbmon between mmap and read
|
WARNING in xfrm6_tunnel_net_exit
|
syz |
|
done |
34 |
1834d |
2082d
|
1/1 |
1803d |
bbbe47463da9
xfrm: destroy xfrm_state synchronously on net exit path
|
inconsistent lock state in sp_get
|
C |
|
done |
1 |
1836d |
1836d
|
1/1 |
1805d |
9b8e63d0a6e8
6pack,mkiss: fix possible deadlock
|
KASAN: slab-out-of-bounds Read in linear_transfer
|
C |
|
done |
2 |
1845d |
1845d
|
1/1 |
1814d |
c6bebccd3c62
ALSA: pcm: oss: Avoid potential buffer overflows
|
WARNING: refcount bug in kobject_get
|
C |
|
done |
21 |
1845d |
2074d
|
1/1 |
1815d |
e1666bcbae0c
driver core: Fix use-after-free and double free on glue directory
|
KASAN: use-after-free Read in slip_open
|
C |
done |
done |
7 |
1845d |
1857d
|
1/1 |
1815d |
0c6e6ceae72c
slip: Fix use-after-free Read in slip_open
|
INFO: task hung in vivid_stop_generating_vid_cap
|
C |
|
done |
291 |
1848d |
2082d
|
1/1 |
1818d |
467052f6ea5a
media: vivid: Fix wrong locking that causes race conditions on streaming stop
|
INFO: task hung in sdr_cap_stop_streaming
|
C |
|
done |
152 |
1848d |
2082d
|
1/1 |
1818d |
467052f6ea5a
media: vivid: Fix wrong locking that causes race conditions on streaming stop
|
KASAN: use-after-free Read in __vb2_perform_fileio
|
C |
|
done |
13 |
1849d |
2078d
|
1/1 |
1818d |
467052f6ea5a
media: vivid: Fix wrong locking that causes race conditions on streaming stop
|
KASAN: use-after-free Read in kfree_skb
|
C |
|
done |
95 |
1852d |
1973d
|
1/1 |
1820d |
03bf4876a593
Bluetooth: Fix invalid-free in bcsp_close()
|
WARNING in __vb2_queue_cancel
|
C |
|
done |
11 |
1856d |
2068d
|
1/1 |
1826d |
467052f6ea5a
media: vivid: Fix wrong locking that causes race conditions on streaming stop
|
WARNING: suspicious RCU usage in memfd_fcntl
|
C |
done |
done |
1879 |
1858d |
1881d
|
1/1 |
1828d |
e4cc9c81e230
memfd: Use radix_tree_deref_slot_protected to avoid the warning.
|
possible deadlock in ovl_write_iter
|
syz |
|
done |
84 |
1865d |
2075d
|
1/1 |
1829d |
ab69a2304210
Revert "tipc: fix modprobe tipc failed after switch order of device registration"
|
KASAN: use-after-free Read in rxrpc_send_keepalive
|
syz |
|
done |
6 |
1880d |
1953d
|
1/1 |
1830d |
570ab0dd35f9
rxrpc: Fix call ref leak
|
BUG: corrupted list in p9_fd_cancelled
|
syz |
|
done |
2 |
1866d |
1929d
|
1/1 |
1830d |
78a917bea6ed
perf/core: Consistently fail fork on allocation failures
|
KASAN: use-after-free Read in __lock_sock
|
syz |
|
done |
2 |
1882d |
1882d
|
1/1 |
1831d |
51f0c10890aa
libata/ahci: Fix PCS quirk application
|
WARNING in corrupted
|
syz |
|
done |
25 |
1902d |
2055d
|
1/1 |
1831d |
ed568ca73601
bpf: fix use after free in prog symbol exposure
|
possible deadlock in io_submit_one
|
syz |
|
done |
406 |
1905d |
2082d
|
1/1 |
1831d |
052b31810085
fs/userfaultfd.c: disable irqs for fault_pending and event locks
|
WARNING in bpf_jit_free
|
syz |
|
done |
293 |
1905d |
2082d
|
1/1 |
1832d |
ed568ca73601
bpf: fix use after free in prog symbol exposure
|
KASAN: use-after-free Read in pneigh_get_next
|
syz |
|
done |
1 |
2016d |
2016d
|
1/1 |
1833d |
103835df6821
neigh: fix use-after-free read in pneigh_get_next
|
WARNING in ovl_rename
|
syz |
|
done |
1 |
2065d |
2065d
|
1/1 |
1833d |
f1c5aa5eda08
ovl: detect overlapping layers
|
kernel BUG at arch/x86/mm/physaddr.c:LINE!
|
syz |
|
done |
1 |
2003d |
2003d
|
1/1 |
1833d |
4736bb277744
ip_tunnel: allow not to count pkts on tstats by setting skb's dev to NULL
|
WARNING in ovl_instantiate
|
syz |
|
done |
5 |
2073d |
2077d
|
1/1 |
1833d |
f1c5aa5eda08
ovl: detect overlapping layers
|
WARNING: suspicious RCU usage in llc_sap_close
|
C |
|
done |
10 |
1871d |
2027d
|
1/1 |
1833d |
9a484516a410
llc: avoid blocking in llc_sap_close()
|
BUG: unable to handle kernel NULL pointer dereference in blk_mq_map_swqueue
|
C |
|
done |
12 |
1881d |
2066d
|
1/1 |
1835d |
9f0f39c92e4f
nbd: fix max number of supported devs
|
KASAN: null-ptr-deref Write in kvm_write_guest_virt_system
|
C |
|
done |
50 |
1899d |
1917d
|
1/1 |
1837d |
3683dd7074dc
crypto: cavium/zip - Add missing single_release()
|
possible deadlock in free_ioctx_users
|
C |
|
done |
77 |
1904d |
2027d
|
1/1 |
1837d |
5bead06b3443
fuse: fix deadlock with aio poll and fuse_iqueue::waitq.lock
|
KASAN: use-after-free Read in wait_consider_task
|
C |
|
done |
58 |
1909d |
1919d
|
1/1 |
1837d |
4eb92a114834
RDMA/restrack: Protect from reentry to resource return path
|
WARNING: ODEBUG bug in free_task
|
C |
|
done |
165 |
1909d |
1919d
|
1/1 |
1837d |
4eb92a114834
RDMA/restrack: Protect from reentry to resource return path
|
general protection fault in tcf_action_destroy
|
C |
|
done |
15 |
1906d |
1928d
|
1/1 |
1837d |
50dddec689cb
mISDN: enforce CAP_NET_RAW for raw sockets
|
WARNING: suspicious RCU usage in netem_enqueue
|
C |
|
done |
2 |
1911d |
1916d
|
1/1 |
1838d |
195a3ea494d2
net_sched: add max len check for TCA_KIND
|
KASAN: use-after-free Read in __change_pid
|
C |
|
done |
4 |
1911d |
1918d
|
1/1 |
1838d |
4eb92a114834
RDMA/restrack: Protect from reentry to resource return path
|
possible deadlock in do_io_accounting
|
C |
|
done |
4 |
1909d |
2021d
|
1/1 |
1838d |
f1c5aa5eda08
ovl: detect overlapping layers
|
KASAN: use-after-free Read in pids_release
|
C |
|
done |
7 |
1911d |
1918d
|
1/1 |
1838d |
4eb92a114834
RDMA/restrack: Protect from reentry to resource return path
|
general protection fault in release_task
|
C |
|
done |
3 |
1912d |
1918d
|
1/1 |
1839d |
4eb92a114834
RDMA/restrack: Protect from reentry to resource return path
|
general protection fault in wait_consider_task
|
C |
|
done |
5 |
1911d |
1917d
|
1/1 |
1839d |
4eb92a114834
RDMA/restrack: Protect from reentry to resource return path
|
INFO: rcu detected stall in netlink_sendmsg
|
C |
|
done |
3 |
1923d |
1928d
|
1/1 |
1839d |
a9e91767b921
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
KASAN: use-after-free Read in release_task
|
C |
|
done |
2 |
1913d |
1916d
|
1/1 |
1839d |
4eb92a114834
RDMA/restrack: Protect from reentry to resource return path
|
WARNING in handle_desc
|
C |
|
done |
1 |
1920d |
1919d
|
1/1 |
1839d |
21874027e1de
KVM: X86: Fix userspace set invalid CR4
|
BUG: unable to handle kernel NULL pointer dereference in tc_bind_tclass
|
C |
|
done |
18 |
1914d |
1933d
|
1/1 |
1839d |
07f7ec87b5f6
net_sched: check cops->tcf_block in tc_bind_tclass()
|
general protection fault in qdisc_destroy
|
C |
|
done |
9 |
1919d |
1929d
|
1/1 |
1839d |
7a1bad565ceb
net_sched: let qdisc_put() accept NULL pointer
|
INFO: rcu detected stall in addrconf_dad_work
|
C |
|
done |
19 |
1921d |
1932d
|
1/1 |
1841d |
a9e91767b921
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
INFO: rcu detected stall in mld_ifc_timer_expire
|
C |
|
done |
33 |
1921d |
1933d
|
1/1 |
1841d |
a9e91767b921
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
INFO: rcu detected stall in br_handle_frame
|
C |
|
done |
41 |
1921d |
1933d
|
1/1 |
1841d |
a9e91767b921
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
INFO: task hung in __x64_sys_io_destroy
|
C |
|
done |
1 |
1922d |
1922d
|
1/1 |
1841d |
ec2a3681b30c
media: tvp5150: fix switch exit in set control handler
|
WARNING: refcount bug in hci_register_dev
|
C |
|
done |
3 |
1927d |
1939d
|
1/1 |
1843d |
e1666bcbae0c
driver core: Fix use-after-free and double free on glue directory
|
WARNING in kernfs_get
|
C |
|
done |
14 |
1927d |
2067d
|
1/1 |
1843d |
e1666bcbae0c
driver core: Fix use-after-free and double free on glue directory
|
general protection fault in kernfs_add_one
|
C |
|
done |
8 |
1936d |
2075d
|
1/1 |
1843d |
e1666bcbae0c
driver core: Fix use-after-free and double free on glue directory
|
general protection fault in packet_lookup_frame
|
C |
|
done |
1 |
1957d |
1957d
|
1/1 |
1844d |
154e6bc497c9
net/packet: fix race in tpacket_snd()
|
WARNING in tty_set_termios
|
C |
|
done |
151 |
1967d |
2077d
|
1/1 |
1845d |
56966212e23f
Bluetooth: hci_uart: check for missing tty operations
|
general protection fault in tcf_ife_init
|
C |
|
done |
15 |
1965d |
1982d
|
1/1 |
1845d |
c4c8899376c2
ife: error out when nla attributes are empty
|
KASAN: null-ptr-deref Write in kthread_stop
|
C |
|
done |
12 |
1965d |
2070d
|
1/1 |
1845d |
467052f6ea5a
media: vivid: Fix wrong locking that causes race conditions on streaming stop
|
general protection fault in rds_recv_rcvbuf_delta
|
C |
|
done |
7 |
1972d |
2019d
|
1/1 |
1846d |
3de749d6d7ce
net/rds: An rds_sock is added too early to the hash table
|
INFO: task hung in blkdev_issue_flush
|
C |
|
done |
2 |
2000d |
2000d
|
1/1 |
1846d |
76cf93f04c3d
hwmon: (acpi_power_meter) Change log level for 'unsafe software power cap'
|
general protection fault in iptunnel_xmit
|
C |
|
done |
2 |
1974d |
1974d
|
1/1 |
1846d |
4736bb277744
ip_tunnel: allow not to count pkts on tstats by setting skb's dev to NULL
|
WARNING in kernfs_put
|
C |
|
done |
1 |
2005d |
2005d
|
1/1 |
1847d |
e1666bcbae0c
driver core: Fix use-after-free and double free on glue directory
|
WARNING in notify_change
|
C |
|
done |
12 |
2010d |
2067d
|
1/1 |
1848d |
e8e448b08450
Abort file_remove_privs() for non-reg. files
|
BUG: unable to handle kernel paging request in coalesced_mmio_write
|
C |
|
done |
2 |
2009d |
2009d
|
1/1 |
1848d |
232a6462f43f
KVM: coalesced_mmio: add bounds checking
|
possible deadlock in userfaultfd_release
|
C |
|
done |
4 |
2010d |
2015d
|
1/1 |
1848d |
052b31810085
fs/userfaultfd.c: disable irqs for fault_pending and event locks
|
possible deadlock in acct_pin_kill
|
C |
|
done |
125 |
2041d |
2075d
|
1/1 |
1848d |
ab69a2304210
Revert "tipc: fix modprobe tipc failed after switch order of device registration"
|
WARNING in xfrm_state_fini
|
C |
|
done |
78 |
2057d |
2081d
|
1/1 |
1849d |
ab69a2304210
Revert "tipc: fix modprobe tipc failed after switch order of device registration"
|
WARNING in __flush_work
|
C |
|
done |
135 |
2055d |
2061d
|
1/1 |
1849d |
af48f7d79fae
drm/udl: Replace drm_dev_unref with drm_dev_put
|
KASAN: use-after-free Read in get_mem_cgroup_from_mm
|
C |
|
done |
6 |
2063d |
2077d
|
1/1 |
1849d |
ab69a2304210
Revert "tipc: fix modprobe tipc failed after switch order of device registration"
|
general protection fault in ip6erspan_set_version
|
C |
|
done |
7 |
2073d |
2082d
|
1/1 |
1849d |
ab69a2304210
Revert "tipc: fix modprobe tipc failed after switch order of device registration"
|
possible deadlock in pipe_lock
|
C |
|
done |
2 |
2065d |
2068d
|
1/1 |
1849d |
f1c5aa5eda08
ovl: detect overlapping layers
|
general protection fault in sctp_timeout_obj_to_nlattr
|
C |
|
done |
7 |
2077d |
2081d
|
1/1 |
1850d |
ab69a2304210
Revert "tipc: fix modprobe tipc failed after switch order of device registration"
|
general protection fault in generic_timeout_obj_to_nlattr
|
C |
|
done |
11 |
2078d |
2082d
|
1/1 |
1850d |
ab69a2304210
Revert "tipc: fix modprobe tipc failed after switch order of device registration"
|
general protection fault in gre_timeout_obj_to_nlattr
|
C |
|
done |
13 |
2077d |
2082d
|
1/1 |
1850d |
ab69a2304210
Revert "tipc: fix modprobe tipc failed after switch order of device registration"
|
general protection fault in tcp_timeout_obj_to_nlattr
|
C |
|
done |
7 |
2078d |
2080d
|
1/1 |
1851d |
ab69a2304210
Revert "tipc: fix modprobe tipc failed after switch order of device registration"
|
general protection fault in icmp_timeout_obj_to_nlattr
|
C |
|
done |
3 |
2080d |
2082d
|
1/1 |
1851d |
ab69a2304210
Revert "tipc: fix modprobe tipc failed after switch order of device registration"
|
general protection fault in udp_timeout_obj_to_nlattr
|
C |
|
done |
8 |
2078d |
2082d
|
1/1 |
1851d |
ab69a2304210
Revert "tipc: fix modprobe tipc failed after switch order of device registration"
|
general protection fault in dccp_timeout_obj_to_nlattr
|
C |
|
done |
7 |
2078d |
2082d
|
1/1 |
1851d |
ab69a2304210
Revert "tipc: fix modprobe tipc failed after switch order of device registration"
|