general protection fault in em_cmp_match
|
2 |
C |
|
|
1 |
989d |
989d
|
1/1 |
959d |
b9b47801cef5
net_sched: reject TCF_EM_SIMPLE case for complex ematch module
|
KASAN: use-after-free Read in bcm_can_tx
|
19 |
C |
|
|
2 |
1332d |
1788d
|
1/1 |
1313d |
632881680ba0
can: bcm: fix UAF of bcm op
|
general protection fault in ieee802154_llsec_parse_key_id
|
11 |
C |
|
done |
101 |
1602d |
1657d
|
1/1 |
1570d |
37580e6837c0
net: ieee802154: nl-mac: fix check on panid
|
general protection fault in nl802154_del_llsec_devkey
|
2 |
C |
|
done |
171 |
1601d |
1663d
|
1/1 |
1570d |
266e3f2ef0d1
net: ieee802154: fix nl802154 del llsec devkey
|
general protection fault in nl802154_del_llsec_key
|
2 |
C |
|
done |
135 |
1601d |
1657d
|
1/1 |
1570d |
1804bf103e73
net: ieee802154: fix nl802154 del llsec key
|
general protection fault in try_to_wake_up
|
2 |
C |
|
done |
707 |
1601d |
1631d
|
1/1 |
1570d |
f6420532cfd7
net: tun: set tun->dev->addr_len during TUNSETLINK processing
|
general protection fault in nl802154_add_llsec_key
|
2 |
C |
|
done |
168 |
1601d |
1662d
|
1/1 |
1570d |
3a94a5b2e0ba
net: ieee802154: fix nl802154 add llsec key
|
general protection fault in nl802154_del_llsec_dev
|
2 |
C |
|
done |
136 |
1602d |
1663d
|
1/1 |
1572d |
3ee9f1bafd06
net: ieee802154: fix nl802154 del llsec dev
|
INFO: trying to register non-static key in ieee802154_get_llsec_params
|
-1 |
C |
|
done |
8 |
1604d |
1628d
|
1/1 |
1574d |
df9aa96b613d
net: ieee802154: stop dump llsec params for monitors
|
WARNING in cfg80211_connect
|
-1 |
C |
|
done |
101 |
1619d |
1798d
|
1/1 |
1584d |
bd7b29fb365e
cfg80211: remove WARN_ON() in cfg80211_sme_connect
|
BUG: unable to handle kernel NULL pointer dereference in __lookup_hash
|
10 |
C |
|
done |
31 |
1615d |
1808d
|
1/1 |
1584d |
b74d5f70523a
reiserfs: add check for an invalid ih_entry_count
|
general protection fault in selinux_socket_sendmsg
|
2 |
C |
|
done |
3 |
1623d |
1796d
|
1/1 |
1592d |
534d2cf487b9
usbip: synchronize event handler with sysfs code paths
|
KASAN: use-after-free Read in ieee80211_ibss_build_presp
|
19 |
C |
|
done |
2 |
1625d |
1771d
|
1/1 |
1595d |
d2ddd5417f6d
mac80211: fix double free in ibss_leave
|
possible deadlock in red_adaptative_timer
|
4 |
C |
|
done |
2 |
1627d |
1718d
|
1/1 |
1596d |
43c9bffda3a2
net: sched: validate stab values
|
BUG: unable to handle kernel NULL pointer dereference in vhci_shutdown_connection
|
10 |
syz |
|
done |
1335 |
1631d |
1722d
|
1/1 |
1598d |
534d2cf487b9
usbip: synchronize event handler with sysfs code paths
|
WARNING in ext4_xattr_set_entry
|
-1 |
C |
|
done |
19 |
1642d |
1798d
|
1/1 |
1610d |
470f69cb3742
ext4: do not try to set xattr into ea_inode if value is empty
|
BUG: unable to handle kernel NULL pointer dereference in amp_read_loc_assoc_final_data
|
10 |
C |
|
done |
207 |
1643d |
1860d
|
1/1 |
1610d |
2f642a2b3365
Bluetooth: Fix null pointer dereference in amp_read_loc_assoc_final_data
|
KASAN: use-after-free Read in ntfs_iget
|
19 |
C |
|
done |
2 |
1655d |
1731d
|
1/1 |
1625d |
49ee014a2070
ntfs: check for valid standard information attribute
|
KASAN: use-after-free Read in ntfs_read_locked_inode
|
19 |
C |
|
done |
2 |
1657d |
1809d
|
1/1 |
1626d |
49ee014a2070
ntfs: check for valid standard information attribute
|
KASAN: slab-out-of-bounds Read in squashfs_export_iget
|
17 |
C |
|
done |
4 |
1685d |
1788d
|
1/1 |
1651d |
69396cfd7908
squashfs: add more sanity checks in inode lookup
|
general protection fault in ieee80211_subif_start_xmit
|
2 |
syz |
|
done |
1 |
1682d |
1742d
|
1/1 |
1651d |
d882652c1c6f
mac80211: pause TX while changing interface type
|
general protection fault in ioctl_standard_call
|
2 |
C |
|
done |
24 |
1682d |
1778d
|
1/1 |
1651d |
173b67cf1e72
wext: fix NULL-ptr-dereference with cfg80211's lack of commit()
|
KASAN: slab-out-of-bounds Read in squashfs_get_id
|
17 |
C |
|
|
11 |
1654d |
1807d
|
1/1 |
1653d |
8d9ca7e328ef
squashfs: add more sanity checks in id lookup
|
KASAN: use-after-free Read in squashfs_get_id
|
19 |
C |
|
|
1 |
1653d |
1749d
|
1/1 |
1653d |
8d9ca7e328ef
squashfs: add more sanity checks in id lookup
|
KASAN: use-after-free Read in reiserfs_fill_super
|
19 |
C |
|
done |
2 |
1702d |
1702d
|
1/1 |
1655d |
b74d5f70523a
reiserfs: add check for an invalid ih_entry_count
|
divide error in do_journal_end
|
2 |
C |
|
done |
1 |
1699d |
1759d
|
1/1 |
1655d |
b74d5f70523a
reiserfs: add check for an invalid ih_entry_count
|
KASAN: use-after-free Read in search_by_entry_key
|
19 |
C |
|
done |
3 |
1701d |
1807d
|
1/1 |
1655d |
b74d5f70523a
reiserfs: add check for an invalid ih_entry_count
|
KASAN: use-after-free Read in reiserfs_read_locked_inode
|
19 |
C |
|
done |
5 |
1704d |
1808d
|
1/1 |
1656d |
b74d5f70523a
reiserfs: add check for an invalid ih_entry_count
|
general protection fault in dqput
|
2 |
C |
|
done |
1 |
1711d |
1711d
|
1/1 |
1680d |
a9c625fcddc0
quota: Sanity-check quota file headers on load
|
KASAN: use-after-free Read in leaf_paste_entries
|
19 |
C |
|
done |
6 |
1712d |
1756d
|
1/1 |
1681d |
b74d5f70523a
reiserfs: add check for an invalid ih_entry_count
|
general protection fault in hci_phy_link_complete_evt
|
2 |
C |
|
done |
40 |
1712d |
1858d
|
1/1 |
1681d |
4113f6f73f6e
Bluetooth: Fix null pointer dereference in hci_event_packet()
|
BUG: unable to handle kernel paging request in dquot_add_inodes
|
8 |
C |
|
done |
2 |
1714d |
1736d
|
1/1 |
1684d |
a9c625fcddc0
quota: Sanity-check quota file headers on load
|
BUG: unable to handle kernel paging request in dqput
|
8 |
C |
|
done |
9 |
1716d |
1806d
|
1/1 |
1685d |
a9c625fcddc0
quota: Sanity-check quota file headers on load
|
kernel BUG at net/core/dev.c:LINE!
|
-1 |
C |
|
inconclusive |
3 |
1709d |
1978d
|
1/1 |
1690d |
8f9a69a92fc6
net: drop bogus skb with CHECKSUM_PARTIAL and offset beyond end of trimmed packet
|
kernel BUG at fs/reiserfs/prints.c:LINE!
|
-1 |
C |
|
done |
3 |
1725d |
1806d
|
1/1 |
1695d |
b74d5f70523a
reiserfs: add check for an invalid ih_entry_count
|
general protection fault in get_work_pool
|
2 |
C |
|
done |
1 |
1728d |
1758d
|
1/1 |
1698d |
42a387dc80c3
mac80211: mesh: fix mesh_pathtbl_init() error path
|
BUG: corrupted list in dquot_disable
|
8 |
C |
|
done |
1 |
1729d |
1729d
|
1/1 |
1698d |
a9c625fcddc0
quota: Sanity-check quota file headers on load
|
KASAN: use-after-free Read in sco_chan_del
|
19 |
C |
|
done |
10 |
1732d |
1857d
|
1/1 |
1701d |
4113f6f73f6e
Bluetooth: Fix null pointer dereference in hci_event_packet()
|
INFO: trying to register non-static key in rhashtable_free_and_destroy
|
-1 |
C |
|
done |
4 |
1736d |
1749d
|
1/1 |
1703d |
42a387dc80c3
mac80211: mesh: fix mesh_pathtbl_init() error path
|
KASAN: slab-out-of-bounds Read in hci_le_meta_evt
|
17 |
C |
|
done |
15 |
1738d |
1858d
|
1/1 |
1708d |
7ee2cd49f722
Bluetooth: Fix slab-out-of-bounds read in hci_le_direct_adv_report_evt()
|
BUG: unable to handle kernel paging request in dquot_add_space
|
8 |
C |
|
done |
1 |
1739d |
1799d
|
1/1 |
1709d |
a9c625fcddc0
quota: Sanity-check quota file headers on load
|
BUG: sleeping function called from invalid context in sta_info_move_state
|
5 |
C |
|
done |
1101 |
1744d |
1746d
|
1/1 |
1713d |
89ab6b90b7d9
mac80211: free sta in sta_info_insert_finish() on errors
|
general protection fault in qp_release_pages
|
2 |
C |
|
done |
2 |
1746d |
1776d
|
1/1 |
1715d |
2b8c7395d275
VMCI: check return value of get_user_pages_fast() for errors
|
WARNING in unlock_new_inode
|
-1 |
C |
|
done |
55 |
1772d |
1810d
|
1/1 |
1742d |
a8ca9f684674
reiserfs: only call unlock_new_inode() if I_NEW
|
KASAN: slab-out-of-bounds Write in init_sb
|
23 |
C |
|
done |
3 |
1774d |
1808d
|
1/1 |
1743d |
78734edd11cc
gfs2: add validation checks for size of superblock
|
KASAN: global-out-of-bounds Read in fbcon_resize
|
17 |
C |
|
done |
529 |
1778d |
1826d
|
1/1 |
1747d |
d31eccab7abd
fbcon: Fix user font detection test at fbcon_resize().
|
INFO: task hung in ucma_close
|
1 |
C |
|
done |
421 |
1778d |
2191d
|
1/1 |
1748d |
ef13017d65b0
RDMA/ucma: ucma_context reference leak in error path
|
KASAN: global-out-of-bounds Read in vga16fb_imageblit
|
17 |
C |
|
done |
723 |
1778d |
2102d
|
1/1 |
1748d |
0472aa0c36c7
video: fbdev: fix OOB read in vga_8planes_imageblit()
|
KASAN: slab-out-of-bounds Read in ntfs_attr_find
|
17 |
C |
|
done |
10 |
1778d |
1806d
|
1/1 |
1748d |
d2918cca649f
ntfs: add check for mft record size in superblock
|
KASAN: global-out-of-bounds Read in fbcon_get_font
|
17 |
C |
|
done |
42 |
1785d |
2101d
|
1/1 |
1755d |
30386c13a1bf
fbcon: Fix global-out-of-bounds read in fbcon_get_font()
|
KASAN: use-after-free Read in ntfs_attr_find
|
19 |
C |
|
done |
4 |
1787d |
1806d
|
1/1 |
1756d |
d2918cca649f
ntfs: add check for mft record size in superblock
|
KASAN: global-out-of-bounds Read in get_unique_tuple
|
17 |
C |
|
done |
5 |
1800d |
1972d
|
1/1 |
1769d |
60634d81cb43
netfilter: ctnetlink: add a range check for l3/l4 protonum
|
general protection fault in open_xa_dir
|
2 |
C |
|
done |
1 |
1807d |
1807d
|
1/1 |
1777d |
e2b6b34324c4
reiserfs: Fix oops during mount
|
KASAN: use-after-free Read in rxrpc_see_skb
|
19 |
syz |
|
done |
1 |
1828d |
1828d
|
1/1 |
1778d |
38eefb196438
MIPS: SNI: Fix MIPS_L1_CACHE_SHIFT
|
INFO: task hung in nbd_ioctl (2)
|
1 |
C |
|
done |
16 |
1825d |
2070d
|
1/1 |
1778d |
7241d653bcc1
tipc: fix shutdown() of connection oriented socket
|
WARNING in restore_regulatory_settings
|
-1 |
C |
|
done |
2264 |
1820d |
2066d
|
1/1 |
1790d |
02015d244d9c
cfg80211: regulatory: reject invalid hints
|
general protection fault in __sock_release
|
2 |
syz |
|
done |
12 |
1820d |
1833d
|
1/1 |
1790d |
c5c6e00f6cc5
fix regression in "epoll: Keep a reference on files added to the check list"
|
general protection fault in locks_remove_file
|
2 |
syz |
|
done |
6 |
1821d |
1832d
|
1/1 |
1790d |
c5c6e00f6cc5
fix regression in "epoll: Keep a reference on files added to the check list"
|
general protection fault in tty_release
|
2 |
C |
|
done |
10 |
1821d |
1831d
|
1/1 |
1791d |
c5c6e00f6cc5
fix regression in "epoll: Keep a reference on files added to the check list"
|
KASAN: use-after-free Read in seq_release_private
|
19 |
syz |
|
done |
1 |
1823d |
1823d
|
1/1 |
1791d |
c5c6e00f6cc5
fix regression in "epoll: Keep a reference on files added to the check list"
|
WARNING: ODEBUG bug in corrupted
|
-1 |
syz |
|
done |
1 |
1823d |
1823d
|
1/1 |
1791d |
c5c6e00f6cc5
fix regression in "epoll: Keep a reference on files added to the check list"
|
WARNING: ODEBUG bug in exit_to_usermode_loop
|
-1 |
syz |
|
done |
2 |
1825d |
1827d
|
1/1 |
1794d |
c5c6e00f6cc5
fix regression in "epoll: Keep a reference on files added to the check list"
|
KASAN: use-after-free Read in __sock_release
|
19 |
syz |
|
done |
3 |
1825d |
1833d
|
1/1 |
1794d |
c5c6e00f6cc5
fix regression in "epoll: Keep a reference on files added to the check list"
|
WARNING in snd_pcm_drop
|
-1 |
syz |
|
done |
1 |
1824d |
1824d
|
1/1 |
1794d |
c5c6e00f6cc5
fix regression in "epoll: Keep a reference on files added to the check list"
|
BUG: corrupted list in fuse_dev_free
|
8 |
syz |
|
done |
1 |
1827d |
1827d
|
1/1 |
1796d |
c5c6e00f6cc5
fix regression in "epoll: Keep a reference on files added to the check list"
|
general protection fault in kmem_cache_free
|
2 |
syz |
|
done |
3 |
1827d |
1828d
|
1/1 |
1796d |
c5c6e00f6cc5
fix regression in "epoll: Keep a reference on files added to the check list"
|
KASAN: use-after-free Read in snd_pcm_oss_release
|
19 |
syz |
|
done |
1 |
1827d |
1827d
|
1/1 |
1796d |
c5c6e00f6cc5
fix regression in "epoll: Keep a reference on files added to the check list"
|
KASAN: use-after-free Write in ex_handler_refcount
|
24 |
C |
|
done |
16 |
1827d |
2036d
|
1/1 |
1796d |
af7122cfbaee
Bluetooth: add a mutex lock to avoid UAF in do_enale_set
|
KASAN: double-free or invalid-free in (null)
|
22 |
syz |
|
done |
1 |
1828d |
1828d
|
1/1 |
1798d |
c5c6e00f6cc5
fix regression in "epoll: Keep a reference on files added to the check list"
|
BUG: corrupted list in mousedev_release
|
8 |
syz |
|
done |
1 |
1830d |
1830d
|
1/1 |
1799d |
c5c6e00f6cc5
fix regression in "epoll: Keep a reference on files added to the check list"
|
INFO: trying to register non-static key in uhid_char_release
|
-1 |
C |
|
done |
2 |
1831d |
1850d
|
1/1 |
1801d |
9e5894b7e222
HID: core: Correctly handle ReportSize being zero
|
KASAN: slab-out-of-bounds Read in hci_event_packet
|
17 |
C |
|
done |
17 |
1843d |
2316d
|
1/1 |
1812d |
68bb9eddbf5d
Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt()
|
KASAN: slab-out-of-bounds Read in hci_inquiry_result_with_rssi_evt
|
17 |
C |
|
done |
6 |
1843d |
1860d
|
1/1 |
1813d |
68bb9eddbf5d
Bluetooth: Prevent out-of-bounds read in hci_inquiry_result_with_rssi_evt()
|
KASAN: use-after-free Read in get_block
|
19 |
C |
|
done |
8 |
1849d |
1974d
|
1/1 |
1818d |
0900097ef667
fs/minix: reject too-large maximum file size
|
WARNING in inc_nlink
|
-1 |
C |
|
done |
21 |
1849d |
1991d
|
1/1 |
1818d |
12490f06ef08
fs/minix: don't allow getting deleted inodes
|
KASAN: slab-out-of-bounds Read in get_block
|
17 |
C |
|
done |
2 |
1849d |
1879d
|
1/1 |
1818d |
0900097ef667
fs/minix: reject too-large maximum file size
|
BUG: unable to handle kernel NULL pointer dereference in get_block
|
10 |
C |
|
done |
45 |
1849d |
1996d
|
1/1 |
1819d |
3c775629a5ff
fs/minix: check return value of sb_getblk()
|
KASAN: slab-out-of-bounds Read in hci_extended_inquiry_result_evt
|
17 |
C |
|
done |
5 |
1853d |
1858d
|
1/1 |
1820d |
d91299b8382b
Bluetooth: Fix slab-out-of-bounds read in hci_extended_inquiry_result_evt()
|
KASAN: use-after-free Read in delete_and_unsubscribe_port
|
19 |
syz |
|
done |
2 |
1861d |
1861d
|
1/1 |
1828d |
ccafbed8b2f6
ALSA: seq: oss: Serialize ioctls
|
KASAN: double-free or invalid-free in 0x2
|
22 |
syz |
|
done |
1 |
1861d |
1861d
|
1/1 |
1828d |
ccafbed8b2f6
ALSA: seq: oss: Serialize ioctls
|
INFO: task hung in fb_release
|
1 |
C |
|
done |
48 |
1863d |
2094d
|
1/1 |
1832d |
c388072f90cc
fbdev: Detect integer underflow at "struct fbcon_ops"->clear_margins.
|
unregister_netdevice: waiting for DEV to become free
|
2 |
C |
|
done |
120 |
1890d |
2328d
|
1/1 |
1858d |
0f7f0b057417
ipvs: fix tinfo memory leak in start_sync_thread
|
general protection fault in batadv_iv_ogm_schedule_buff
|
2 |
|
|
|
1 |
1965d |
1965d
|
1/1 |
1883d |
e181bb93c904
batman-adv: Don't schedule OGM for disabled interface
|
KASAN: null-ptr-deref Write in choke_reset
|
12 |
C |
|
done |
283 |
1932d |
1962d
|
1/1 |
1902d |
4836eb6b5965
sch_choke: avoid potential panic in choke_reset()
|
KASAN: use-after-free Read in do_blk_trace_setup
|
19 |
C |
|
done |
342 |
1933d |
2337d
|
1/1 |
1903d |
b390c22c0bc7
blktrace: fix unlocked access to init/start-stop/teardown
|
WARNING in xfrm_policy_insert
|
-1 |
syz |
|
done |
8 |
1937d |
2195d
|
1/1 |
1906d |
1cd914b02b5a
xfrm: fix a warning in xfrm_policy_insert_list
|
KASAN: slab-out-of-bounds Write in snd_rawmidi_kernel_write1
|
23 |
C |
|
done |
1 |
1938d |
1968d
|
1/1 |
1908d |
8645ac3684a7
ALSA: rawmidi: Fix racy buffer resize under concurrent accesses
|
WARNING: ODEBUG bug in route4_change
|
-1 |
C |
|
done |
23 |
1980d |
2008d
|
1/1 |
1950d |
f0c92f59cf52
net_sched: cls_route: remove the right filter from hashtable
|
KASAN: use-after-free Write in release_tty
|
24 |
C |
|
done |
124 |
1981d |
2100d
|
1/1 |
1951d |
b9eb60a0ef39
vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console
|
WARNING: ODEBUG bug in rfcomm_dev_ioctl
|
-1 |
C |
|
done |
2 |
1990d |
1990d
|
1/1 |
1959d |
0da9c032adbb
Bluetooth: RFCOMM: fix ODEBUG bug in rfcomm_dev_ioctl
|
KASAN: slab-out-of-bounds Read in selinux_xfrm_alloc_user
|
17 |
C |
|
done |
1 |
1991d |
1991d
|
1/1 |
1961d |
25106012e91a
xfrm: add the missing verify_sec_ctx_len check in xfrm_add_acquire
|
WARNING: refcount bug in sock_wfree
|
13 |
C |
done |
done |
3 |
1992d |
2112d
|
1/1 |
1962d |
968f831d9056
sctp: fix refcount bug in sctp_wfree
|
KASAN: use-after-free Write in tcindex_set_parms
|
24 |
C |
|
done |
3 |
1994d |
1995d
|
1/1 |
1964d |
9f8b6c44be17
net_sched: keep alloc_hash updated after hash allocation
|
KASAN: slab-out-of-bounds Write in tcindex_set_parms
|
23 |
C |
|
done |
2 |
1995d |
1995d
|
1/1 |
1965d |
9f8b6c44be17
net_sched: keep alloc_hash updated after hash allocation
|
WARNING: ODEBUG bug in rfcomm_dlc_free
|
-1 |
C |
|
done |
16 |
1997d |
2230d
|
1/1 |
1966d |
0da9c032adbb
Bluetooth: RFCOMM: fix ODEBUG bug in rfcomm_dev_ioctl
|
KASAN: use-after-free Read in tty_open
|
19 |
C |
|
done |
5 |
1999d |
2101d
|
1/1 |
1969d |
b9eb60a0ef39
vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console
|
KASAN: use-after-free Read in tty_buffer_cancel_work
|
19 |
C |
|
done |
2 |
2008d |
2097d
|
1/1 |
1978d |
b9eb60a0ef39
vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console
|
KASAN: use-after-free Read in get_work_pool
|
19 |
C |
|
done |
1 |
2009d |
2100d
|
1/1 |
1979d |
b9eb60a0ef39
vt: vt_ioctl: fix VT_DISALLOCATE freeing in-use virtual console
|
KASAN: use-after-free Read in n_tty_receive_buf_common
|
19 |
C |
|
done |
25 |
2011d |
2100d
|
1/1 |
1980d |
a4719f6d07b2
vt: selection, push sel_lock up
|
WARNING: kernel stack frame pointer has bad value
|
-1 |
C |
|
done |
65 |
2016d |
2320d
|
1/1 |
1982d |
377d7378a605
fjes: fix missed check in fjes_acpi_add
|
INFO: task hung in paste_selection
|
1 |
C |
|
done |
8 |
2017d |
2092d
|
1/1 |
1986d |
7c315855c6f4
ipvlan: do not use cond_resched_rcu() in ipvlan_process_multicast()
|
INFO: task hung in drain_all_pages
|
1 |
C |
|
done |
1 |
2017d |
2017d
|
1/1 |
1987d |
a86265edeb33
netfilter: xt_hashlimit: limit the max size of hashtable
|
INFO: task hung in tty_ldisc_hangup
|
1 |
C |
|
done |
17 |
2025d |
2096d
|
1/1 |
1995d |
a4719f6d07b2
vt: selection, push sel_lock up
|
INFO: task hung in hashlimit_mt_check_common
|
1 |
C |
|
done |
6 |
2028d |
2079d
|
1/1 |
1996d |
a86265edeb33
netfilter: xt_hashlimit: limit the max size of hashtable
|
KASAN: stack-out-of-bounds Write in ax25_getname
|
23 |
C |
|
done |
4 |
2027d |
2323d
|
1/1 |
1996d |
ff8e12b0cfe2
vhost: Check docket sk_family instead of call getname
|
KASAN: slab-out-of-bounds Read in tcf_exts_destroy
|
17 |
C |
|
done |
1 |
2031d |
2144d
|
1/1 |
2001d |
6cb448ee493c
net_sched: fix an OOB access in cls_tcindex
|
general protection fault in path_openat
|
2 |
C |
|
done |
40 |
2037d |
2044d
|
1/1 |
2007d |
40642747dd9f
vfs: fix do_last() regression
|
BUG: sleeping function called from invalid context in tpk_write
|
5 |
C |
|
done |
10 |
2037d |
2099d
|
1/1 |
2007d |
ab84fd0d3dc8
ttyprintk: fix a potential deadlock in interrupt context issue
|
BUG: sleeping function called from invalid context in lock_sock_nested (2)
|
5 |
syz |
|
done |
1 |
2039d |
2100d
|
1/1 |
2009d |
713ff7e4d605
crypto: af_alg - Use bh_lock_sock in sk_destruct
|
KASAN: use-after-free Read in ext4_xattr_set_entry
|
19 |
C |
|
done |
9 |
2042d |
2134d
|
1/1 |
2012d |
08e4a312439c
ext4: validate the debug_want_extra_isize mount option at parse time
|
KASAN: slab-out-of-bounds Read in __nla_put_nohdr
|
17 |
C |
|
done |
2 |
2046d |
2046d
|
1/1 |
2015d |
c5fd8a37e971
net-sysfs: Fix reference count leak
|
KASAN: slab-out-of-bounds Write in setup_udp_tunnel_sock
|
23 |
C |
|
done |
1 |
2049d |
2049d
|
1/1 |
2019d |
c57b0f88fce8
Documentation: Document arm64 kpti control
|
KASAN: use-after-free Read in snd_timer_resolution
|
19 |
C |
|
done |
1 |
2052d |
2052d
|
1/1 |
2021d |
43bb0a16b25d
ALSA: seq: Fix racy access for queue timer in proc read
|
INFO: task hung in genl_rcv_msg
|
1 |
syz |
|
done |
2 |
2056d |
2056d
|
1/1 |
2026d |
24070b40926b
tcp: clear tp->total_retrans in tcp_disconnect()
|
WARNING in reconnect_path
|
-1 |
C |
done |
done |
1 |
2057d |
2117d
|
1/1 |
2026d |
b6e209a13a61
exportfs: fix 'passing zero to ERR_PTR()' warning
|
KASAN: use-after-free Write in __alloc_skb
|
24 |
C |
|
done |
1 |
2061d |
2091d
|
1/1 |
2028d |
e841252840c4
net: rtnetlink: validate IFLA_MTU attribute in rtnl_create_link()
|
KASAN: use-after-free Read in cdev_put
|
19 |
C |
|
done |
6 |
2061d |
2104d
|
1/1 |
2030d |
0ce254bc68ed
xen-blkback: prevent premature module unload
|
KASAN: slab-out-of-bounds Read in macvlan_broadcast
|
17 |
C |
|
done |
6 |
2062d |
2067d
|
1/1 |
2032d |
4a953272f2d2
macvlan: do not assume mac_header is set in macvlan_broadcast()
|
KASAN: use-after-free Read in macvlan_broadcast
|
19 |
C |
|
done |
8 |
2064d |
2067d
|
1/1 |
2033d |
4a953272f2d2
macvlan: do not assume mac_header is set in macvlan_broadcast()
|
WARNING: bad unlock balance in gtp_encap_enable_socket
|
4 |
C |
|
done |
2 |
2064d |
2067d
|
1/1 |
2033d |
887b0296a905
gtp: fix bad unlock balance in gtp_encap_enable_socket
|
KASAN: slab-out-of-bounds Read in bpf_skb_change_tail
|
17 |
C |
|
done |
2 |
2070d |
2216d
|
1/1 |
2037d |
7fed98f4a1e6
bpf: reject passing modified ctx to helper functions
|
KASAN: slab-out-of-bounds Read in bpf_skb_change_proto
|
17 |
C |
|
done |
2 |
2070d |
2217d
|
1/1 |
2037d |
7fed98f4a1e6
bpf: reject passing modified ctx to helper functions
|
KASAN: slab-out-of-bounds Read in bpf_clone_redirect
|
17 |
C |
|
done |
11 |
2075d |
2238d
|
1/1 |
2045d |
7fed98f4a1e6
bpf: reject passing modified ctx to helper functions
|
KASAN: slab-out-of-bounds Read in bpf_skb_change_head
|
17 |
C |
|
done |
2 |
2079d |
2148d
|
1/1 |
2048d |
7fed98f4a1e6
bpf: reject passing modified ctx to helper functions
|
possible deadlock in refcount_dec_and_mutex_lock
|
4 |
C |
|
done |
10 |
2078d |
2151d
|
1/1 |
2048d |
4df728651b8a
nbd: verify socket is supported during setup
|
WARNING: refcount bug in cdev_get
|
13 |
C |
|
done |
21 |
2079d |
2210d
|
1/1 |
2049d |
03a709593040
net: usb: lan78xx: Connect PHY before registering MAC
|
INFO: rcu detected stall in br_handle_frame (2)
|
1 |
C |
|
done |
1 |
2084d |
2084d
|
1/1 |
2054d |
73a6f18d8390
pkt_sched: fq: do not accept silly TCA_FQ_QUANTUM
|
WARNING in ovl_rename
|
-1 |
syz |
|
done |
2 |
2088d |
2320d
|
1/1 |
2055d |
6890751cfea7
ovl: relax WARN_ON() on rename to self
|
inconsistent lock state in sp_get
|
4 |
C |
|
done |
2 |
2092d |
2092d
|
1/1 |
2061d |
8b58905f212b
6pack,mkiss: fix possible deadlock
|
KASAN: slab-out-of-bounds Read in linear_transfer
|
17 |
C |
|
done |
4 |
2093d |
2100d
|
1/1 |
2063d |
2a76606d8a83
ALSA: pcm: oss: Avoid potential buffer overflows
|
possible deadlock in __might_fault
|
4 |
C |
|
done |
295 |
2095d |
2335d
|
1/1 |
2064d |
d41971493d28
usb: mon: Fix a deadlock in usbmon between mmap and read
|
possible deadlock in mon_bin_vma_fault
|
4 |
C |
|
done |
282 |
2096d |
2332d
|
1/1 |
2066d |
d41971493d28
usb: mon: Fix a deadlock in usbmon between mmap and read
|
WARNING: refcount bug in kobject_get
|
13 |
C |
|
done |
20 |
2101d |
2334d
|
1/1 |
2070d |
227db8e4c346
tipc: fix unlimited bundling of small messages
|
WARNING in refcount_error_report
|
-1 |
syz |
|
done |
1 |
2103d |
2103d
|
1/1 |
2070d |
7272e8e3bfa3
inet: protect against too small mtu values.
|
BUG: corrupted list in p9_fd_cancelled
|
8 |
syz |
|
done |
2 |
2102d |
2147d
|
1/1 |
2070d |
8a82aee7bdfd
arm64: Add MIDR encoding for Arm Cortex-A55 and Cortex-A35
|
BUG: unable to handle kernel paging request in slhc_free
|
8 |
C |
|
done |
4 |
2105d |
2332d
|
1/1 |
2074d |
da0bbf51bdcb
slip: make slhc_free() silently accept an error pointer
|
WARNING in dio_complete
|
-1 |
C |
|
done |
27 |
2105d |
2335d
|
1/1 |
2074d |
365874a0eab5
blk-mq: avoid sysfs buffer overflow with too many CPU cores
|
KASAN: use-after-free Read in slip_open
|
19 |
C |
done |
done |
2 |
2109d |
2109d
|
1/1 |
2076d |
f5bcc687e3d6
slip: Fix use-after-free Read in slip_open
|
KASAN: use-after-free Read in kfree_skb
|
19 |
C |
|
done |
98 |
2107d |
2234d
|
1/1 |
2076d |
79d404a2aa86
Bluetooth: Fix invalid-free in bcsp_close()
|
INFO: task hung in nbd_ioctl
|
1 |
C |
|
done |
18 |
2078d |
2152d
|
1/1 |
2076d |
4df728651b8a
nbd: verify socket is supported during setup
|
WARNING: suspicious RCU usage in shmem_add_seals
|
4 |
C |
done |
done |
1435 |
2114d |
2136d
|
1/1 |
2083d |
988f701a805b
memfd: Use radix_tree_deref_slot_protected to avoid the warning.
|
possible deadlock in flush_workqueue
|
4 |
C |
|
done |
15 |
2116d |
2209d
|
1/1 |
2086d |
4df728651b8a
nbd: verify socket is supported during setup
|
WARNING in bpf_jit_free
|
-1 |
syz |
|
done |
60 |
2158d |
2331d
|
1/1 |
2087d |
47569360be87
bpf: fix use after free in prog symbol exposure
|
INFO: task hung in lo_release
|
1 |
syz |
|
done |
128 |
2224d |
2337d
|
1/1 |
2088d |
22f36db48781
Revert "block/loop: Use global lock for ioctl() operation."
|
BUG: unable to handle kernel NULL pointer dereference in inet_autobind
|
10 |
C |
inconclusive |
done |
3133 |
2128d |
2136d
|
1/1 |
2088d |
7c3c0d51129a
sctp: not bind the socket in sctp_connect
|
BUG: unable to handle kernel NULL pointer dereference in blk_mq_map_swqueue
|
10 |
C |
|
done |
20 |
2089d |
2327d
|
1/1 |
2088d |
0b584bf573ae
nbd: fix max number of supported devs
|
BUG: unable to handle kernel paging request in dummy_set_vf_vlan
|
8 |
C |
|
done |
5 |
2122d |
2216d
|
1/1 |
2088d |
9ed49fc95f37
net: rtnetlink: prevent underflows in do_setvfinfo()
|
BUG: unable to handle kernel paging request in dummy_set_vf_spoofchk
|
8 |
C |
|
done |
6 |
2125d |
2237d
|
1/1 |
2088d |
9ed49fc95f37
net: rtnetlink: prevent underflows in do_setvfinfo()
|
BUG: unable to handle kernel paging request in dummy_get_vf_config
|
8 |
C |
|
done |
4 |
2141d |
2238d
|
1/1 |
2091d |
9ed49fc95f37
net: rtnetlink: prevent underflows in do_setvfinfo()
|
WARNING: suspicious RCU usage in netem_enqueue
|
4 |
C |
|
done |
3 |
2145d |
2168d
|
1/1 |
2091d |
6f492e801033
net_sched: add max len check for TCA_KIND
|
BUG: unable to handle kernel paging request in dummy_set_vf_rss_query_en
|
8 |
C |
|
done |
5 |
2145d |
2237d
|
1/1 |
2091d |
9ed49fc95f37
net: rtnetlink: prevent underflows in do_setvfinfo()
|
BUG: unable to handle kernel paging request in dummy_set_vf_mac
|
8 |
C |
|
done |
5 |
2154d |
2227d
|
1/1 |
2092d |
9ed49fc95f37
net: rtnetlink: prevent underflows in do_setvfinfo()
|
BUG: unable to handle kernel NULL pointer dereference in tc_bind_tclass
|
10 |
C |
|
done |
14 |
2148d |
2188d
|
1/1 |
2092d |
54b9f5791846
net_sched: check cops->tcf_block in tc_bind_tclass()
|
KASAN: null-ptr-deref Write in kvm_write_guest_virt_system
|
12 |
C |
|
done |
53 |
2154d |
2172d
|
1/1 |
2092d |
2890b718f4a8
watchdog: imx2_wdt: fix min() calculation in imx2_wdt_set_timeout
|
WARNING in tcp_send_loss_probe
|
-1 |
C |
|
done |
22 |
2175d |
2185d
|
1/1 |
2095d |
ba2ddb43f270
tcp: Don't dequeue SYN/FIN-segments from write-queue
|
general protection fault in tcp_push
|
2 |
C |
|
done |
55 |
2174d |
2185d
|
1/1 |
2095d |
f1dcc5ed4bea
tcp: Reset send_head when removing skb from write-queue
|
BUG: unable to handle kernel paging request in dummy_set_vf_rate
|
8 |
C |
|
done |
3 |
2175d |
2190d
|
1/1 |
2095d |
9ed49fc95f37
net: rtnetlink: prevent underflows in do_setvfinfo()
|
WARNING in tcp_retransmit_timer
|
-1 |
C |
|
done |
215 |
2174d |
2185d
|
1/1 |
2095d |
ba2ddb43f270
tcp: Don't dequeue SYN/FIN-segments from write-queue
|
general protection fault in qdisc_destroy
|
2 |
C |
|
done |
4 |
2175d |
2179d
|
1/1 |
2095d |
e0f600b69df3
net_sched: let qdisc_put() accept NULL pointer
|
INFO: rcu detected stall in mld_dad_timer_expire
|
1 |
C |
|
done |
1 |
2181d |
2181d
|
1/1 |
2095d |
cc243e2427ce
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
INFO: rcu detected stall in br_handle_frame
|
1 |
C |
|
done |
15 |
2177d |
2188d
|
1/1 |
2097d |
cc243e2427ce
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
WARNING in kernfs_get
|
-1 |
C |
|
done |
17 |
2207d |
2327d
|
1/1 |
2097d |
5432923a6b20
driver core: Fix use-after-free and double free on glue directory
|
INFO: rcu detected stall in mld_ifc_timer_expire
|
1 |
C |
|
done |
9 |
2179d |
2188d
|
1/1 |
2098d |
cc243e2427ce
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
WARNING in xfrm_state_fini
|
-1 |
C |
|
done |
193 |
2181d |
2336d
|
1/1 |
2098d |
cd393b38514d
xfrm: clean up xfrm protocol checks
|
INFO: rcu detected stall in addrconf_dad_work
|
1 |
C |
|
done |
18 |
2182d |
2189d
|
1/1 |
2098d |
cc243e2427ce
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
INFO: rcu detected stall in corrupted
|
1 |
C |
|
done |
3 |
2182d |
2204d
|
1/1 |
2099d |
cc243e2427ce
sch_hhf: ensure quantum and hhf_non_hh_weight are non-zero
|
BUG: unable to handle kernel paging request in dummy_set_vf_trust
|
8 |
C |
|
done |
2 |
2190d |
2224d
|
1/1 |
2099d |
9ed49fc95f37
net: rtnetlink: prevent underflows in do_setvfinfo()
|
WARNING in map_lookup_elem
|
-1 |
C |
|
done |
2 |
2197d |
2197d
|
1/1 |
2099d |
95867919494d
KVM: x86: add tracepoints around __direct_map and FNAME(fetch)
|
WARNING: refcount bug in hci_register_dev
|
13 |
C |
|
done |
3 |
2195d |
2209d
|
1/1 |
2099d |
5432923a6b20
driver core: Fix use-after-free and double free on glue directory
|
kernel BUG at ./include/linux/skbuff.h:LINE!
|
-1 |
C |
|
done |
16 |
2190d |
2216d
|
1/1 |
2099d |
e5df4baea324
tcp: fix tcp_rtx_queue_tail in case of empty retransmit queue
|
general protection fault in packet_lookup_frame
|
2 |
C |
|
done |
1 |
2212d |
2212d
|
1/1 |
2100d |
5ac73816dda7
net/packet: fix race in tpacket_snd()
|
WARNING: refcount bug in kobject_put
|
13 |
C |
|
done |
3 |
2217d |
2323d
|
1/1 |
2100d |
5432923a6b20
driver core: Fix use-after-free and double free on glue directory
|
general protection fault in tcf_ife_init
|
2 |
C |
|
done |
12 |
2228d |
2238d
|
1/1 |
2101d |
7fcc60e5f837
ife: error out when nla attributes are empty
|
general protection fault in kernfs_add_one
|
2 |
C |
|
done |
5 |
2225d |
2294d
|
1/1 |
2101d |
5432923a6b20
driver core: Fix use-after-free and double free on glue directory
|
WARNING in sysfs_remove_group
|
-1 |
C |
|
done |
1 |
2241d |
2241d
|
1/1 |
2102d |
5432923a6b20
driver core: Fix use-after-free and double free on glue directory
|
BUG: unable to handle kernel paging request in coalesced_mmio_write
|
8 |
C |
|
done |
4 |
2258d |
2265d
|
1/1 |
2103d |
bf81752d808c
KVM: coalesced_mmio: add bounds checking
|
WARNING in kernfs_put
|
-1 |
C |
|
done |
2 |
2257d |
2323d
|
1/1 |
2103d |
5432923a6b20
driver core: Fix use-after-free and double free on glue directory
|
KASAN: use-after-free Read in erspan_build_header
|
19 |
C |
|
done |
18 |
2303d |
2337d
|
1/1 |
2104d |
1d629bf9b576
net: erspan: fix use-after-free
|
KASAN: slab-out-of-bounds Read in erspan_build_header
|
17 |
C |
|
done |
8 |
2301d |
2337d
|
1/1 |
2104d |
d93fb604c079
tipc: fix modprobe tipc failed after switch order of device registration
|
WARNING in notify_change
|
-1 |
C |
|
done |
14 |
2266d |
2332d
|
1/1 |
2104d |
2c5462425563
Abort file_remove_privs() for non-reg. files
|
KASAN: use-after-free Read in tcp_init_tso_segs
|
19 |
C |
|
|
1424 |
2174d |
2185d
|
1/1 |
2161d |
f1dcc5ed4bea
tcp: Reset send_head when removing skb from write-queue
|