Unable to handle kernel write to read-only memory at virtual address ADDR (2)
lsm
net
|
-1 |
|
|
|
1 |
21d |
19d
|
27/29 |
never |
60ada4fe644e
smc: Fix various oops due to inet_sock type confusion.
|
WARNING in kvfree_call_rcu
net
lsm
|
-1 |
C |
|
|
2 |
20d |
19d
|
27/29 |
never |
60ada4fe644e
smc: Fix various oops due to inet_sock type confusion.
|
KASAN: slab-use-after-free Read in key_put
keyrings
lsm
|
19 |
C |
done |
|
9 |
154d |
252d
|
28/29 |
48d |
75845c6c1a64
keys: Fix UAF in key_put()
|
WARNING in free_ruleset
lsm
|
-1 |
C |
|
|
76 |
94d |
120d
|
28/29 |
48d |
fe81536af397
landlock: Remove incorrect warning
|
WARNING in get_mode_access
lsm
|
-1 |
C |
inconclusive |
|
12 |
197d |
254d
|
28/29 |
83d |
49440290a093
landlock: Handle weird files
|
WARNING in handle_policy_update
lsm
|
-1 |
C |
|
|
61 |
203d |
224d
|
28/29 |
83d |
f09ff307c729
safesetid: check size of policy writes
|
INFO: task hung in process_measurement (2)
lsm
integrity
|
1 |
C |
done |
|
607 |
84d |
688d
|
28/29 |
83d |
a5324b3a488d
exfat: fix the infinite loop in __exfat_free_cluster()
|
WARNING in current_check_refer_path
lsm
|
-1 |
C |
|
|
90 |
197d |
381d
|
28/29 |
83d |
49440290a093
landlock: Handle weird files
|
possible deadlock in process_measurement (4)
lsm
integrity
|
4 |
C |
done |
|
7976 |
266d |
303d
|
28/29 |
256d |
58a039e679fe
mm: split critical region in remap_file_pages() and invoke LSMs in between
|
general protection fault in hook_inode_free_security
lsm
|
2 |
|
|
|
12 |
379d |
445d
|
28/29 |
279d |
63dff3e48871
lsm: add the inode_free_security_rcu() LSM implementation hook
|
WARNING in collect_domain_accesses
lsm
|
-1 |
C |
done |
|
3 |
432d |
444d
|
25/29 |
412d |
88da52ccd66e
landlock: Fix d_parent walk
|
WARNING in __mod_timer
keyrings
lsm
|
-1 |
|
|
|
2 |
847d |
882d
|
22/29 |
781d |
63a759694eed
debugobject: Prevent init race with static objects
|
kernel BUG in commit_creds
lsm
io-uring
|
-1 |
C |
done |
|
5 |
1196d |
1200d
|
22/29 |
885d |
701521403cfb
io_uring: abort file assignment prior to assigning creds
|
memory leak in keyctl_watch_key
keyrings
lsm
|
3 |
C |
|
|
1 |
1229d |
1225d
|
22/29 |
885d |
3d8dcf278b1e
watch_queue: Actually free the watch
|
BUG: unable to handle kernel NULL pointer dereference in smack_inode_permission
lsm
mm
|
10 |
C |
|
|
1 |
991d |
987d
|
22/29 |
885d |
578b565b240a
9p/fd: Fix write overflow in p9_read_work
|
kernel panic: stack is corrupted in __kmalloc
integrity
lsm
sctp
|
2 |
|
|
|
4 |
890d |
1144d
|
22/29 |
885d |
b81d591386c3
riscv: Increase stack size under KASAN
|
KASAN: use-after-free Read in netlbl_catmap_walk
net
lsm
|
19 |
C |
inconclusive |
|
1 |
1433d |
1433d
|
20/29 |
1238d |
0817534ff9ea
smackfs: Fix use-after-free in netlbl_catmap_walk()
|
KASAN: use-after-free Read in cipso_v4_doi_add
lsm
net
|
19 |
|
|
|
1 |
1382d |
1378d
|
20/29 |
1238d |
0934ad42bb2c
smackfs: use netlbl_cfg_cipsov4_del() for deleting cipso_v4_doi
|
kernel panic: smack: Failed to initialize cipso DOI.
lsm
|
2 |
C |
done |
error |
128 |
1364d |
1946d
|
20/29 |
1238d |
f91488ee15bd
smackfs: use __GFP_NOFAIL for smk_cipso_doi()
|
KASAN: use-after-free Read in cipso_v4_genopt
net
lsm
|
19 |
C |
inconclusive |
|
5 |
1607d |
1609d
|
20/29 |
1356d |
ad5d07f4a9cd
cipso,calipso: resolve a number of problems with the DOI refcounts
1165affd4848
net: mac802154: Fix general protection fault
|
BUG: unable to handle kernel paging request in cap_capable
lsm
|
8 |
C |
unreliable |
|
4 |
1453d |
1454d
|
20/29 |
1356d |
9384eacd80f3
net: core: don't call SIOCBRADD/DELIF for non-bridge devices
|
UBSAN: array-index-out-of-bounds in ima_inode_setxattr
integrity
lsm
|
15 |
C |
unreliable |
|
6 |
1437d |
1439d
|
20/29 |
1356d |
cb181da16196
IMA: reject unknown hash algorithms in ima_get_hash_algo
|
WARNING in smk_set_cipso (2)
lsm
|
-1 |
C |
inconclusive |
|
24 |
1490d |
1568d
|
20/29 |
1356d |
49ec114a6e62
smackfs: restrict bytes count in smk_set_cipso()
|
memory leak in prepare_creds (2)
lsm
|
3 |
C |
|
|
2 |
1495d |
1590d
|
20/29 |
1356d |
f60a85cad677
bpf: Fix umd memory leak in copy_process()
|
WARNING in memdup_user_nul
lsm
|
-1 |
C |
inconclusive |
|
2 |
1656d |
1656d
|
20/29 |
1570d |
7ef4c19d245f
smackfs: restrict bytes count in smackfs write functions
|
memory leak in prepare_creds
lsm
|
3 |
C |
|
|
10 |
1621d |
1795d
|
19/29 |
1601d |
f26c08b444df
io_uring: fix file leak on error path of io ctx creation
|
possible deadlock in process_measurement (2)
lsm
integrity
|
4 |
C |
done |
done |
56 |
1697d |
2065d
|
15/29 |
1664d |
15a8d68e9dc2
mm/hugetlb: a page from buddy is not on any list
|
KASAN: slab-out-of-bounds Read in vsscanf (2)
lsm
|
17 |
C |
error |
|
5 |
1818d |
1832d
|
15/29 |
1775d |
a6bd4f6d9b07
Smack: fix another vsscanf out of bounds
|
KASAN: use-after-free Read in smk_write_relabel_self
lsm
|
19 |
C |
done |
|
2 |
1879d |
1875d
|
15/29 |
1775d |
beb4ee6770a8
Smack: fix use-after-free in smk_write_relabel_self()
|
KASAN: slab-out-of-bounds Read in vsscanf
lsm
|
17 |
C |
done |
|
61 |
1846d |
1949d
|
15/29 |
1837d |
84e99e58e8d1
Smack: slab-out-of-bounds in vsscanf
|
general protection fault in ima_free_template_entry
integrity
lsm
|
2 |
C |
done |
|
3 |
1859d |
1880d
|
15/29 |
1837d |
42413b49804b
ima: Directly free *entry in ima_alloc_init_template() if digests is NULL
|
BUG: unable to handle kernel NULL pointer dereference in cipso_v4_sock_setattr
lsm
net
|
10 |
C |
done |
|
8 |
1970d |
1980d
|
15/29 |
1930d |
dc24f8b4ecd3
mptcp: add dummy icsk_sync_mss()
|
general protection fault in override_creds
lsm
|
2 |
C |
done |
|
6 |
2062d |
2065d
|
15/29 |
2028d |
0b8c0ec7eedc
io_uring: use current task creds instead of allocating a new one
|
KMSAN: use-after-free in hidraw_ioctl
fs
lsm
|
18 |
|
|
|
1 |
2120d |
2120d
|
13/29 |
2070d |
416dacb819f5
HID: hidraw: Fix invalid read in hidraw_ioctl
|
kernel BUG at security/keys/keyring.c:LINE!
keyrings
lsm
|
-1 |
C |
|
|
12 |
2388d |
2488d
|
11/29 |
2336d |
ede0fa98a900
KEYS: always initialize keyring_index_key::desc_len
|
KASAN: use-after-free Read in task_is_descendant
lsm
|
19 |
C |
|
|
27 |
2385d |
2472d
|
11/29 |
2336d |
9474f4e7cd71
Yama: Check for pid death before checking ancestry
|
general protection fault in keyctl_pkey_params_get
keyrings
lsm
|
2 |
C |
|
|
85 |
2399d |
2459d
|
11/29 |
2385d |
57b0e3145320
KEYS: fix parsing invalid pkey info string
94c13f66e13c
security: don't use a negative Opt_err token index
|
KASAN: stack-out-of-bounds Read in keyctl_pkey_params_get
keyrings
lsm
|
17 |
|
|
|
2 |
2400d |
2399d
|
11/29 |
2385d |
57b0e3145320
KEYS: fix parsing invalid pkey info string
|
general protection fault in rb_erase
integrity
lsm
|
2 |
C |
|
|
79836 |
2457d |
2497d
|
11/29 |
2449d |
18aded174920
ext4: fix EXT4_IOC_SWAP_BOOT
|
KASAN: slab-out-of-bounds Read in cap_inode_getsecurity
lsm
|
17 |
C |
|
|
11 |
2761d |
2762d
|
3/29 |
2755d |
dc32b5c3e6e2
capabilities: fix buffer overread on very short xattr
|
KASAN: slab-out-of-bounds Read in cap_convert_nscap
lsm
|
17 |
C |
|
|
4148 |
2760d |
2764d
|
3/29 |
2755d |
dc32b5c3e6e2
capabilities: fix buffer overread on very short xattr
|