|
memory leak in prepare_creds (6)
lsm
|
3 |
C |
|
|
2 |
14d |
37d
|
2/29 |
never |
nfsd: Fix cred ref leak in nfsd_nl_threads_set_doit().
|
|
INFO: task hung in restrict_one_thread_callback
lsm
kernel
|
1 |
C |
|
|
14 |
1d21h |
10d
|
2/29 |
never |
landlock: Serialize TSYNC thread restriction
|
|
memory leak in prepare_creds (5)
lsm
|
3 |
C |
|
|
60 |
41d |
115d
|
29/29 |
40d |
df8d829bba3a
nfsd: fix memory leak in nfsd_create_serv error paths
|
|
Unable to handle kernel write to read-only memory at virtual address ADDR (2)
net
lsm
|
-1 |
|
|
|
1 |
237d |
236d
|
29/29 |
178d |
60ada4fe644e
smc: Fix various oops due to inet_sock type confusion.
|
|
WARNING in kvfree_call_rcu
net
lsm
|
-1 |
C |
|
|
2 |
237d |
236d
|
29/29 |
178d |
60ada4fe644e
smc: Fix various oops due to inet_sock type confusion.
|
|
KASAN: slab-use-after-free Read in key_put
lsm
keyrings
|
19 |
C |
done |
|
9 |
371d |
468d
|
28/29 |
264d |
75845c6c1a64
keys: Fix UAF in key_put()
|
|
WARNING in free_ruleset
lsm
|
-1 |
C |
|
|
76 |
311d |
337d
|
28/29 |
264d |
fe81536af397
landlock: Remove incorrect warning
|
|
WARNING in get_mode_access
lsm
|
-1 |
C |
inconclusive |
|
12 |
414d |
471d
|
28/29 |
299d |
49440290a093
landlock: Handle weird files
|
|
WARNING in handle_policy_update
lsm
|
-1 |
C |
|
|
61 |
420d |
441d
|
28/29 |
299d |
f09ff307c729
safesetid: check size of policy writes
|
|
INFO: task hung in process_measurement (2)
integrity
lsm
|
1 |
C |
done |
|
607 |
301d |
905d
|
28/29 |
299d |
a5324b3a488d
exfat: fix the infinite loop in __exfat_free_cluster()
|
|
WARNING in current_check_refer_path
lsm
|
-1 |
C |
|
|
90 |
414d |
598d
|
28/29 |
299d |
49440290a093
landlock: Handle weird files
|
|
possible deadlock in process_measurement (4)
integrity
lsm
|
4 |
C |
done |
|
7976 |
483d |
520d
|
28/29 |
473d |
58a039e679fe
mm: split critical region in remap_file_pages() and invoke LSMs in between
|
|
general protection fault in hook_inode_free_security
lsm
|
2 |
|
|
|
12 |
595d |
662d
|
28/29 |
495d |
63dff3e48871
lsm: add the inode_free_security_rcu() LSM implementation hook
|
|
WARNING in collect_domain_accesses
lsm
|
-1 |
C |
done |
|
3 |
649d |
660d
|
25/29 |
629d |
88da52ccd66e
landlock: Fix d_parent walk
|
|
WARNING in __mod_timer
keyrings
lsm
|
-1 |
|
|
|
2 |
1064d |
1099d
|
22/29 |
997d |
63a759694eed
debugobject: Prevent init race with static objects
|
|
kernel BUG in commit_creds
lsm
io-uring
|
-1 |
C |
done |
|
5 |
1413d |
1417d
|
22/29 |
1101d |
701521403cfb
io_uring: abort file assignment prior to assigning creds
|
|
memory leak in keyctl_watch_key
keyrings
lsm
|
3 |
C |
|
|
1 |
1446d |
1442d
|
22/29 |
1101d |
3d8dcf278b1e
watch_queue: Actually free the watch
|
|
BUG: unable to handle kernel NULL pointer dereference in smack_inode_permission
lsm
mm
|
10 |
C |
|
|
1 |
1208d |
1204d
|
22/29 |
1101d |
578b565b240a
9p/fd: Fix write overflow in p9_read_work
|
|
kernel panic: stack is corrupted in __kmalloc
integrity
lsm
sctp
|
2 |
|
|
|
4 |
1107d |
1360d
|
22/29 |
1101d |
b81d591386c3
riscv: Increase stack size under KASAN
|
|
KASAN: use-after-free Read in netlbl_catmap_walk
lsm
net
|
19 |
C |
inconclusive |
|
1 |
1649d |
1649d
|
20/29 |
1454d |
0817534ff9ea
smackfs: Fix use-after-free in netlbl_catmap_walk()
|
|
KASAN: use-after-free Read in cipso_v4_doi_add
lsm
net
|
19 |
|
|
|
1 |
1599d |
1595d
|
20/29 |
1454d |
0934ad42bb2c
smackfs: use netlbl_cfg_cipsov4_del() for deleting cipso_v4_doi
|
|
kernel panic: smack: Failed to initialize cipso DOI.
lsm
|
2 |
C |
done |
error |
128 |
1581d |
2162d
|
20/29 |
1454d |
f91488ee15bd
smackfs: use __GFP_NOFAIL for smk_cipso_doi()
|
|
KASAN: use-after-free Read in cipso_v4_genopt
lsm
net
|
19 |
C |
inconclusive |
|
5 |
1824d |
1826d
|
20/29 |
1573d |
ad5d07f4a9cd
cipso,calipso: resolve a number of problems with the DOI refcounts
1165affd4848
net: mac802154: Fix general protection fault
|
|
BUG: unable to handle kernel paging request in cap_capable
lsm
|
8 |
C |
unreliable |
|
4 |
1670d |
1670d
|
20/29 |
1573d |
9384eacd80f3
net: core: don't call SIOCBRADD/DELIF for non-bridge devices
|
|
UBSAN: array-index-out-of-bounds in ima_inode_setxattr
lsm
integrity
|
15 |
C |
unreliable |
|
6 |
1654d |
1655d
|
20/29 |
1573d |
cb181da16196
IMA: reject unknown hash algorithms in ima_get_hash_algo
|
|
WARNING in smk_set_cipso (2)
lsm
|
-1 |
C |
inconclusive |
|
24 |
1707d |
1785d
|
20/29 |
1573d |
49ec114a6e62
smackfs: restrict bytes count in smk_set_cipso()
|
|
memory leak in prepare_creds (2)
lsm
|
3 |
C |
|
|
2 |
1711d |
1807d
|
20/29 |
1573d |
f60a85cad677
bpf: Fix umd memory leak in copy_process()
|
|
WARNING in memdup_user_nul
lsm
|
-1 |
C |
inconclusive |
|
2 |
1873d |
1872d
|
20/29 |
1787d |
7ef4c19d245f
smackfs: restrict bytes count in smackfs write functions
|
|
memory leak in prepare_creds
lsm
|
3 |
C |
|
|
10 |
1838d |
2012d
|
19/29 |
1818d |
f26c08b444df
io_uring: fix file leak on error path of io ctx creation
|
|
possible deadlock in process_measurement (2)
integrity
lsm
|
4 |
C |
done |
done |
56 |
1914d |
2281d
|
15/29 |
1881d |
15a8d68e9dc2
mm/hugetlb: a page from buddy is not on any list
|
|
KASAN: slab-out-of-bounds Read in vsscanf (2)
lsm
|
17 |
C |
error |
|
5 |
2035d |
2048d
|
15/29 |
1992d |
a6bd4f6d9b07
Smack: fix another vsscanf out of bounds
|
|
KASAN: use-after-free Read in smk_write_relabel_self
lsm
|
19 |
C |
done |
|
2 |
2096d |
2092d
|
15/29 |
1992d |
beb4ee6770a8
Smack: fix use-after-free in smk_write_relabel_self()
|
|
KASAN: slab-out-of-bounds Read in vsscanf
lsm
|
17 |
C |
done |
|
61 |
2063d |
2166d
|
15/29 |
2053d |
84e99e58e8d1
Smack: slab-out-of-bounds in vsscanf
|
|
general protection fault in ima_free_template_entry
lsm
integrity
|
2 |
C |
done |
|
3 |
2076d |
2096d
|
15/29 |
2053d |
42413b49804b
ima: Directly free *entry in ima_alloc_init_template() if digests is NULL
|
|
BUG: unable to handle kernel NULL pointer dereference in cipso_v4_sock_setattr
lsm
net
|
10 |
C |
done |
|
8 |
2187d |
2197d
|
15/29 |
2146d |
dc24f8b4ecd3
mptcp: add dummy icsk_sync_mss()
|
|
general protection fault in override_creds
lsm
|
2 |
C |
done |
|
6 |
2279d |
2282d
|
15/29 |
2245d |
0b8c0ec7eedc
io_uring: use current task creds instead of allocating a new one
|
|
KMSAN: use-after-free in hidraw_ioctl
fs
lsm
|
18 |
|
|
|
1 |
2336d |
2336d
|
13/29 |
2287d |
416dacb819f5
HID: hidraw: Fix invalid read in hidraw_ioctl
|
|
kernel BUG at security/keys/keyring.c:LINE!
keyrings
lsm
|
-1 |
C |
|
|
12 |
2605d |
2705d
|
11/29 |
2553d |
ede0fa98a900
KEYS: always initialize keyring_index_key::desc_len
|
|
KASAN: use-after-free Read in task_is_descendant
lsm
|
19 |
C |
|
|
27 |
2602d |
2689d
|
11/29 |
2553d |
9474f4e7cd71
Yama: Check for pid death before checking ancestry
|
|
general protection fault in keyctl_pkey_params_get
keyrings
lsm
|
2 |
C |
|
|
85 |
2616d |
2675d
|
11/29 |
2602d |
57b0e3145320
KEYS: fix parsing invalid pkey info string
94c13f66e13c
security: don't use a negative Opt_err token index
|
|
KASAN: stack-out-of-bounds Read in keyctl_pkey_params_get
keyrings
lsm
|
17 |
|
|
|
2 |
2616d |
2615d
|
11/29 |
2602d |
57b0e3145320
KEYS: fix parsing invalid pkey info string
|
|
general protection fault in rb_erase
integrity
lsm
|
2 |
C |
|
|
79836 |
2673d |
2714d
|
11/29 |
2666d |
18aded174920
ext4: fix EXT4_IOC_SWAP_BOOT
|
|
KASAN: slab-out-of-bounds Read in cap_inode_getsecurity
lsm
|
17 |
C |
|
|
11 |
2977d |
2978d
|
3/29 |
2972d |
dc32b5c3e6e2
capabilities: fix buffer overread on very short xattr
|
|
KASAN: slab-out-of-bounds Read in cap_convert_nscap
lsm
|
17 |
C |
|
|
4148 |
2977d |
2981d
|
3/29 |
2972d |
dc32b5c3e6e2
capabilities: fix buffer overread on very short xattr
|