syzbot


Applied filters: Label=subsystems:selinux (drop)
Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
WARNING in hashtab_init selinux -1 C 751 35m 31d 2/29 never selinux: add __GFP_NOWARN to hashtab_init() allocations
KASAN: slab-out-of-bounds Read in selinux_ip_output selinux 19 C done 1490 225d 235d 28/29 74d eedcad2f2a37 selinux: use sk_to_full_sk() in selinux_ip_output()
KCSAN: data-race in inode_doinit_with_dentry / selinux_file_open selinux 6 1 330d 330d 28/29 270d 2571bb9d553b selinux: annotate false positive data race to avoid KCSAN warnings
KASAN: invalid-free in security_tun_dev_free_security selinux 22 syz error error 346 1304d 1646d 20/29 1229d 158b515f703e tun: avoid double free in tun_free_netdev
general protection fault in selinux_socket_recvmsg selinux 2 C done 4 1883d 1883d 15/29 1828d 0a82e230c688 mptcp: avoid NULL-ptr derefence on fallback
KASAN: slab-out-of-bounds Read in selinux_xfrm_alloc_user selinux 17 C done 1 1938d 1937d 15/29 1896d a1a7e3a36e01 xfrm: add the missing verify_sec_ctx_len check in xfrm_add_acquire
possible deadlock in sidtab_sid2str_put selinux 4 C done 1382 1983d 1999d 15/29 1921d 39a706fbcf26 selinux: fix sidtab string cache locking
general protection fault in ebitmap_destroy (2) selinux 2 C done 36 2311d 2319d 11/29 2301d 6a1afffb08ce selinux: fix NULL dereference in policydb_destroy()
KASAN: use-after-free Read in selinux_netlbl_socket_setsockopt selinux 19 1 2362d 2362d 11/29 2327d 63346650c1a9 netrom: switch to sock timer API
general protection fault in ebitmap_destroy selinux 2 syz 1 2383d 2383d 11/29 2327d 5b0e7310a2a3 selinux: fix GPF on invalid policy
WARNING: kmalloc bug in str_read selinux -1 C 11 2463d 2507d 11/29 2441d 4458bba09788 selinux: Add __GFP_NOWARN to allocation at str_read()
general protection fault in sidtab_search_core selinux 2 syz 1306 2781d 2787d 4/29 2725d 4b14752ec4e0 selinux: skip bounded transition processing if the policy isn't loaded
KASAN: slab-out-of-bounds Read in strcmp selinux 17 C 150 2781d 2790d 4/29 2725d ef28df55ac27 selinux: ensure the context is NUL terminated in security_context_to_sid_core()
general protection fault in __lock_acquire selinux 2 5 2836d 2887d 3/29 2825d 383143f31d7d ipv6: reset fn->rr_ptr when replacing route