|
WARNING in hashtab_init
selinux
|
-1 |
C |
|
|
992 |
231d |
273d
|
29/29 |
195d |
9ab71d9204c3
selinux: add __GFP_NOWARN to hashtab_init() allocations
|
|
KASAN: slab-out-of-bounds Read in selinux_ip_output
selinux
|
19 |
C |
done |
|
1490 |
467d |
477d
|
28/29 |
316d |
eedcad2f2a37
selinux: use sk_to_full_sk() in selinux_ip_output()
|
|
KCSAN: data-race in inode_doinit_with_dentry / selinux_file_open
selinux
|
6 |
|
|
|
1 |
572d |
572d
|
28/29 |
512d |
2571bb9d553b
selinux: annotate false positive data race to avoid KCSAN warnings
|
|
KASAN: invalid-free in security_tun_dev_free_security
selinux
|
24 |
syz |
error |
error |
346 |
1546d |
1888d
|
20/29 |
1471d |
158b515f703e
tun: avoid double free in tun_free_netdev
|
|
general protection fault in selinux_socket_recvmsg
selinux
|
2 |
C |
done |
|
4 |
2125d |
2125d
|
15/29 |
2069d |
0a82e230c688
mptcp: avoid NULL-ptr derefence on fallback
|
|
KASAN: slab-out-of-bounds Read in selinux_xfrm_alloc_user
selinux
|
17 |
C |
done |
|
1 |
2180d |
2179d
|
15/29 |
2138d |
a1a7e3a36e01
xfrm: add the missing verify_sec_ctx_len check in xfrm_add_acquire
|
|
possible deadlock in sidtab_sid2str_put
selinux
|
4 |
C |
done |
|
1382 |
2224d |
2241d
|
15/29 |
2163d |
39a706fbcf26
selinux: fix sidtab string cache locking
|
|
general protection fault in ebitmap_destroy (2)
selinux
|
2 |
C |
done |
|
36 |
2553d |
2560d
|
11/29 |
2543d |
6a1afffb08ce
selinux: fix NULL dereference in policydb_destroy()
|
|
KASAN: use-after-free Read in selinux_netlbl_socket_setsockopt
selinux
|
19 |
|
|
|
1 |
2604d |
2603d
|
11/29 |
2569d |
63346650c1a9
netrom: switch to sock timer API
|
|
general protection fault in ebitmap_destroy
selinux
|
2 |
syz |
|
|
1 |
2625d |
2625d
|
11/29 |
2569d |
5b0e7310a2a3
selinux: fix GPF on invalid policy
|
|
WARNING: kmalloc bug in str_read
selinux
|
-1 |
C |
|
|
11 |
2704d |
2749d
|
11/29 |
2682d |
4458bba09788
selinux: Add __GFP_NOWARN to allocation at str_read()
|
|
general protection fault in sidtab_search_core
selinux
|
2 |
syz |
|
|
1306 |
3023d |
3029d
|
4/29 |
2967d |
4b14752ec4e0
selinux: skip bounded transition processing if the policy isn't loaded
|
|
KASAN: slab-out-of-bounds Read in strcmp
selinux
|
17 |
C |
|
|
150 |
3023d |
3032d
|
4/29 |
2967d |
ef28df55ac27
selinux: ensure the context is NUL terminated in security_context_to_sid_core()
|
|
general protection fault in __lock_acquire
selinux
|
2 |
|
|
|
5 |
3077d |
3129d
|
3/29 |
3067d |
383143f31d7d
ipv6: reset fn->rr_ptr when replacing route
|