syzbot


Applied filters: Label=subsystems:selinux (drop)
Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Closed Patch
WARNING in hashtab_init selinux -1 C 893 41m 36d 2/29 never selinux: add __GFP_NOWARN to hashtab_init() allocations
KASAN: slab-out-of-bounds Read in selinux_ip_output selinux 19 C done 1490 230d 240d 28/29 79d eedcad2f2a37 selinux: use sk_to_full_sk() in selinux_ip_output()
KCSAN: data-race in inode_doinit_with_dentry / selinux_file_open selinux 6 1 336d 335d 28/29 275d 2571bb9d553b selinux: annotate false positive data race to avoid KCSAN warnings
KASAN: invalid-free in security_tun_dev_free_security selinux 22 syz error error 346 1310d 1652d 20/29 1234d 158b515f703e tun: avoid double free in tun_free_netdev
general protection fault in selinux_socket_recvmsg selinux 2 C done 4 1889d 1889d 15/29 1833d 0a82e230c688 mptcp: avoid NULL-ptr derefence on fallback
KASAN: slab-out-of-bounds Read in selinux_xfrm_alloc_user selinux 17 C done 1 1943d 1942d 15/29 1901d a1a7e3a36e01 xfrm: add the missing verify_sec_ctx_len check in xfrm_add_acquire
possible deadlock in sidtab_sid2str_put selinux 4 C done 1382 1988d 2005d 15/29 1926d 39a706fbcf26 selinux: fix sidtab string cache locking
general protection fault in ebitmap_destroy (2) selinux 2 C done 36 2316d 2324d 11/29 2306d 6a1afffb08ce selinux: fix NULL dereference in policydb_destroy()
KASAN: use-after-free Read in selinux_netlbl_socket_setsockopt selinux 19 1 2367d 2367d 11/29 2333d 63346650c1a9 netrom: switch to sock timer API
general protection fault in ebitmap_destroy selinux 2 syz 1 2388d 2388d 11/29 2333d 5b0e7310a2a3 selinux: fix GPF on invalid policy
WARNING: kmalloc bug in str_read selinux -1 C 11 2468d 2512d 11/29 2446d 4458bba09788 selinux: Add __GFP_NOWARN to allocation at str_read()
general protection fault in sidtab_search_core selinux 2 syz 1306 2786d 2792d 4/29 2730d 4b14752ec4e0 selinux: skip bounded transition processing if the policy isn't loaded
KASAN: slab-out-of-bounds Read in strcmp selinux 17 C 150 2786d 2796d 4/29 2730d ef28df55ac27 selinux: ensure the context is NUL terminated in security_context_to_sid_core()
general protection fault in __lock_acquire selinux 2 5 2841d 2893d 3/29 2831d 383143f31d7d ipv6: reset fn->rr_ptr when replacing route