Unable to handle kernel write to read-only memory at virtual address ADDR (2)
lsm
net
|
-1 |
|
|
|
1 |
21d |
20d
|
27/29 |
never |
60ada4fe644e
smc: Fix various oops due to inet_sock type confusion.
|
WARNING in kvfree_call_rcu
net
lsm
|
-1 |
C |
|
|
2 |
21d |
20d
|
27/29 |
never |
60ada4fe644e
smc: Fix various oops due to inet_sock type confusion.
|
KASAN: slab-use-after-free Read in key_put
keyrings
lsm
|
19 |
C |
done |
|
9 |
155d |
253d
|
28/29 |
49d |
75845c6c1a64
keys: Fix UAF in key_put()
|
WARNING in free_ruleset
lsm
|
-1 |
C |
|
|
76 |
95d |
121d
|
28/29 |
49d |
fe81536af397
landlock: Remove incorrect warning
|
WARNING in get_mode_access
lsm
|
-1 |
C |
inconclusive |
|
12 |
198d |
255d
|
28/29 |
84d |
49440290a093
landlock: Handle weird files
|
WARNING in handle_policy_update
lsm
|
-1 |
C |
|
|
61 |
204d |
225d
|
28/29 |
84d |
f09ff307c729
safesetid: check size of policy writes
|
INFO: task hung in process_measurement (2)
lsm
integrity
|
1 |
C |
done |
|
607 |
85d |
689d
|
28/29 |
84d |
a5324b3a488d
exfat: fix the infinite loop in __exfat_free_cluster()
|
WARNING in current_check_refer_path
lsm
|
-1 |
C |
|
|
90 |
198d |
382d
|
28/29 |
84d |
49440290a093
landlock: Handle weird files
|
possible deadlock in process_measurement (4)
lsm
integrity
|
4 |
C |
done |
|
7976 |
267d |
304d
|
28/29 |
257d |
58a039e679fe
mm: split critical region in remap_file_pages() and invoke LSMs in between
|
general protection fault in hook_inode_free_security
lsm
|
2 |
|
|
|
12 |
380d |
446d
|
28/29 |
280d |
63dff3e48871
lsm: add the inode_free_security_rcu() LSM implementation hook
|
WARNING in collect_domain_accesses
lsm
|
-1 |
C |
done |
|
3 |
433d |
445d
|
25/29 |
413d |
88da52ccd66e
landlock: Fix d_parent walk
|
WARNING in __mod_timer
keyrings
lsm
|
-1 |
|
|
|
2 |
848d |
883d
|
22/29 |
782d |
63a759694eed
debugobject: Prevent init race with static objects
|
kernel BUG in commit_creds
lsm
io-uring
|
-1 |
C |
done |
|
5 |
1197d |
1201d
|
22/29 |
886d |
701521403cfb
io_uring: abort file assignment prior to assigning creds
|
memory leak in keyctl_watch_key
keyrings
lsm
|
3 |
C |
|
|
1 |
1230d |
1226d
|
22/29 |
886d |
3d8dcf278b1e
watch_queue: Actually free the watch
|
BUG: unable to handle kernel NULL pointer dereference in smack_inode_permission
lsm
mm
|
10 |
C |
|
|
1 |
992d |
988d
|
22/29 |
886d |
578b565b240a
9p/fd: Fix write overflow in p9_read_work
|
kernel panic: stack is corrupted in __kmalloc
integrity
lsm
sctp
|
2 |
|
|
|
4 |
891d |
1145d
|
22/29 |
886d |
b81d591386c3
riscv: Increase stack size under KASAN
|
KASAN: use-after-free Read in netlbl_catmap_walk
net
lsm
|
19 |
C |
inconclusive |
|
1 |
1434d |
1434d
|
20/29 |
1239d |
0817534ff9ea
smackfs: Fix use-after-free in netlbl_catmap_walk()
|
KASAN: use-after-free Read in cipso_v4_doi_add
lsm
net
|
19 |
|
|
|
1 |
1383d |
1379d
|
20/29 |
1239d |
0934ad42bb2c
smackfs: use netlbl_cfg_cipsov4_del() for deleting cipso_v4_doi
|
kernel panic: smack: Failed to initialize cipso DOI.
lsm
|
2 |
C |
done |
error |
128 |
1365d |
1947d
|
20/29 |
1239d |
f91488ee15bd
smackfs: use __GFP_NOFAIL for smk_cipso_doi()
|
KASAN: use-after-free Read in cipso_v4_genopt
net
lsm
|
19 |
C |
inconclusive |
|
5 |
1608d |
1610d
|
20/29 |
1357d |
ad5d07f4a9cd
cipso,calipso: resolve a number of problems with the DOI refcounts
1165affd4848
net: mac802154: Fix general protection fault
|
BUG: unable to handle kernel paging request in cap_capable
lsm
|
8 |
C |
unreliable |
|
4 |
1454d |
1455d
|
20/29 |
1357d |
9384eacd80f3
net: core: don't call SIOCBRADD/DELIF for non-bridge devices
|
UBSAN: array-index-out-of-bounds in ima_inode_setxattr
integrity
lsm
|
15 |
C |
unreliable |
|
6 |
1438d |
1440d
|
20/29 |
1357d |
cb181da16196
IMA: reject unknown hash algorithms in ima_get_hash_algo
|
WARNING in smk_set_cipso (2)
lsm
|
-1 |
C |
inconclusive |
|
24 |
1491d |
1569d
|
20/29 |
1357d |
49ec114a6e62
smackfs: restrict bytes count in smk_set_cipso()
|
memory leak in prepare_creds (2)
lsm
|
3 |
C |
|
|
2 |
1496d |
1591d
|
20/29 |
1357d |
f60a85cad677
bpf: Fix umd memory leak in copy_process()
|
WARNING in memdup_user_nul
lsm
|
-1 |
C |
inconclusive |
|
2 |
1657d |
1657d
|
20/29 |
1571d |
7ef4c19d245f
smackfs: restrict bytes count in smackfs write functions
|
memory leak in prepare_creds
lsm
|
3 |
C |
|
|
10 |
1622d |
1796d
|
19/29 |
1602d |
f26c08b444df
io_uring: fix file leak on error path of io ctx creation
|
possible deadlock in process_measurement (2)
lsm
integrity
|
4 |
C |
done |
done |
56 |
1698d |
2065d
|
15/29 |
1665d |
15a8d68e9dc2
mm/hugetlb: a page from buddy is not on any list
|
KASAN: slab-out-of-bounds Read in vsscanf (2)
lsm
|
17 |
C |
error |
|
5 |
1819d |
1832d
|
15/29 |
1776d |
a6bd4f6d9b07
Smack: fix another vsscanf out of bounds
|
KASAN: use-after-free Read in smk_write_relabel_self
lsm
|
19 |
C |
done |
|
2 |
1880d |
1876d
|
15/29 |
1776d |
beb4ee6770a8
Smack: fix use-after-free in smk_write_relabel_self()
|
KASAN: slab-out-of-bounds Read in vsscanf
lsm
|
17 |
C |
done |
|
61 |
1847d |
1950d
|
15/29 |
1838d |
84e99e58e8d1
Smack: slab-out-of-bounds in vsscanf
|
general protection fault in ima_free_template_entry
integrity
lsm
|
2 |
C |
done |
|
3 |
1860d |
1881d
|
15/29 |
1838d |
42413b49804b
ima: Directly free *entry in ima_alloc_init_template() if digests is NULL
|
BUG: unable to handle kernel NULL pointer dereference in cipso_v4_sock_setattr
lsm
net
|
10 |
C |
done |
|
8 |
1971d |
1981d
|
15/29 |
1931d |
dc24f8b4ecd3
mptcp: add dummy icsk_sync_mss()
|
general protection fault in override_creds
lsm
|
2 |
C |
done |
|
6 |
2063d |
2066d
|
15/29 |
2029d |
0b8c0ec7eedc
io_uring: use current task creds instead of allocating a new one
|
KMSAN: use-after-free in hidraw_ioctl
fs
lsm
|
18 |
|
|
|
1 |
2121d |
2121d
|
13/29 |
2071d |
416dacb819f5
HID: hidraw: Fix invalid read in hidraw_ioctl
|
kernel BUG at security/keys/keyring.c:LINE!
keyrings
lsm
|
-1 |
C |
|
|
12 |
2389d |
2489d
|
11/29 |
2337d |
ede0fa98a900
KEYS: always initialize keyring_index_key::desc_len
|
KASAN: use-after-free Read in task_is_descendant
lsm
|
19 |
C |
|
|
27 |
2386d |
2473d
|
11/29 |
2337d |
9474f4e7cd71
Yama: Check for pid death before checking ancestry
|
general protection fault in keyctl_pkey_params_get
keyrings
lsm
|
2 |
C |
|
|
85 |
2400d |
2460d
|
11/29 |
2386d |
57b0e3145320
KEYS: fix parsing invalid pkey info string
94c13f66e13c
security: don't use a negative Opt_err token index
|
KASAN: stack-out-of-bounds Read in keyctl_pkey_params_get
keyrings
lsm
|
17 |
|
|
|
2 |
2401d |
2400d
|
11/29 |
2386d |
57b0e3145320
KEYS: fix parsing invalid pkey info string
|
general protection fault in rb_erase
integrity
lsm
|
2 |
C |
|
|
79836 |
2458d |
2498d
|
11/29 |
2450d |
18aded174920
ext4: fix EXT4_IOC_SWAP_BOOT
|
KASAN: slab-out-of-bounds Read in cap_convert_nscap
lsm
|
17 |
C |
|
|
4148 |
2761d |
2765d
|
3/29 |
2756d |
dc32b5c3e6e2
capabilities: fix buffer overread on very short xattr
|
KASAN: slab-out-of-bounds Read in cap_inode_getsecurity
lsm
|
17 |
C |
|
|
11 |
2762d |
2763d
|
3/29 |
2756d |
dc32b5c3e6e2
capabilities: fix buffer overread on very short xattr
|