| Published | Title | Version | Author | Status |
|---|---|---|---|---|
| 2025-10-26 16:33 UTC | net: sctp: fix KMSAN uninit-value in sctp_inq_pop | 3 | vnranganath.20@gmail.com | finished in 3h41m0s |
| 2025-10-25 19:28 UTC | bpf: refactor stack map trace depth calculation into helper function | 1 | contact@arnaud-lcm.com | finished in 3h48m0s |
| 2025-10-25 14:14 UTC | bpf: refactor stack map trace depth calculation into helper function | 1 | contact@arnaud-lcm.com | skipped |
| 2025-10-24 11:44 UTC | net: sctp: fix KMSAN uninit-value in sctp_inq_pop | 2 | vnranganath.20@gmail.com | finished in 3h59m0s |
| 2025-10-24 09:39 UTC | net: rose: Prevent the use of freed digipeat | 1 | lizhi.xu@windriver.com | finished in 3h50m0s |
| 2025-10-24 09:06 UTC | net: rose: Prevent the use of freed digipeat | 1 | lizhi.xu@windriver.com | finished in 4h8m0s |
| 2025-10-24 09:05 UTC | net: rose: Prevent the use of freed digipeat | 1 | lizhi.xu@windriver.com | finished in 4h7m0s |
| 2025-10-24 01:31 UTC | net: rose: Prevent the use of freed digipeat | 1 | lizhi.xu@windriver.com | finished in 3h46m0s |
| 2025-10-23 13:50 UTC | netrom: Preventing the use of abnormal neighbor | 1 | lizhi.xu@windriver.com | finished in 3h42m0s |
| 2025-10-23 12:24 UTC | net: key: Fix potential integer overflow in set_ipsecrequest | 1 | clf700383@gmail.com | finished in 3h43m0s |
| 2025-10-23 09:52 UTC | net: sctp: fix KMSAN uninit-value in sctp_inq_pop | 1 | vnranganath.20@gmail.com | finished in 3h44m0s |
| 2025-10-22 02:40 UTC | usbnet: Prevents free active kevent | 1 | lizhi.xu@windriver.com | finished in 1h28m0s |
| 2025-10-21 08:35 UTC | netrom: Prevent race conditions between neighbor operations | 1 | lizhi.xu@windriver.com | finished in 3h51m0s |
| 2025-10-21 03:00 UTC | fix integer overflow in set_ipsecrequest | 1 | clf700383@gmail.com | finished in 3h44m0s |
| 2025-10-20 13:49 UTC | netrom: Prevent race conditions between multiple add route | 1 | lizhi.xu@windriver.com | skipped |
| 2025-10-20 13:34 UTC | netrom: Prevent race conditions between multiple add route | 1 | lizhi.xu@windriver.com | skipped |
| 2025-10-20 11:20 UTC | Re: [syzbot] [net?] WARNING in xfrm6_tunnel_net_exit (4) | 1 | wangliang74@huawei.com | finished in 5m0s |
| 2025-10-20 11:05 UTC | Re: [syzbot] [net?] WARNING in xfrm_state_fini (4) | 1 | wangliang74@huawei.com | finished in 3h44m0s |
| 2025-10-20 11:02 UTC | netrom: Prevent race conditions between multiple add route | 1 | lizhi.xu@windriver.com | finished in 3h42m0s |
| 2025-10-20 08:13 UTC | netrom: Prevent race conditions between multiple add route | 1 | lizhi.xu@windriver.com | finished in 3h42m0s |
| 2025-10-19 02:34 UTC | key: No support for family zero | 1 | eadavis@qq.com | finished in 3h39m0s |
| 2025-10-18 14:49 UTC | usbnet: Prevents free active kevent | 1 | lizhi.xu@windriver.com | finished in 1h27m0s |
| 2025-10-17 09:05 UTC | usbnet: Prevents free active kevent | 1 | lizhi.xu@windriver.com | finished in 1h42m0s |
| 2025-10-17 08:49 UTC | usbnet: Prevents free active kevent | 1 | lizhi.xu@windriver.com | finished in 1h36m0s |
| 2025-10-17 01:36 UTC | mm/huge_memory: do not change split_huge_page*() target order silently. | 3 | ziy@nvidia.com | skipped |
| 2025-10-16 03:34 UTC | Do not change split folio target order | 2 | ziy@nvidia.com | skipped |
| 2025-10-13 17:11 UTC | bpf: avoid sleeping in invalid context during sock_map_delete_elem path | 2 | listout@listout.xyz | finished in 3h48m0s |
| 2025-10-13 16:29 UTC | bpf: avoid sleeping in invalid context during sock_map_delete_elem path | 1 | listout@listout.xyz | finished in 3h50m0s |
| 2025-10-10 17:39 UTC | Do not change split folio target order | 1 | ziy@nvidia.com | finished in 3h58m0s |
| 2025-10-09 22:28 UTC | bpf: avoid sleeping in invalid context during sock_map_delete_elem path | 1 | listout@listout.xyz | finished in 3h48m0s |
| 2025-10-01 19:28 UTC | bpf: Fix verifier crash on BPF_NEG with pointer register | 4 | listout@listout.xyz | finished in 3h45m0s |
| 2025-10-01 19:17 UTC | bpf: Fix verifier crash on BPF_NEG with pointer register | 4 | listout@listout.xyz | finished in 3h48m0s |
| 2025-10-01 09:56 UTC | bpf: Fix verifier crash on BPF_NEG with pointer register | 3 | listout@listout.xyz | finished in 3h38m0s |
| 2025-09-26 09:24 UTC | mm: silence data-race in update_hiwater_rss | 1 | lance.yang@linux.dev | finished in 49m0s |
| 2025-09-24 14:35 UTC | can: dev: fix out-of-bound read in can_set_default_mtu() | 1 | mailhol@kernel.org | skipped |
| 2025-09-23 17:47 UTC | bpf: fix NULL pointer dereference in print_reg_state() | 2 | listout@listout.xyz | finished in 3h44m0s |
| 2025-09-23 16:43 UTC | bpf: fix NULL pointer dereference in print_reg_state() | 1 | listout@listout.xyz | finished in 3h47m0s |
| 2025-09-23 16:41 UTC | bpf: fix NULL pointer dereference in print_reg_state() | 1 | listout@listout.xyz | finished in 3h47m0s |
| 2025-09-21 03:18 UTC | nsfs: reject file handles with invalid inode number | 1 | kartikey406@gmail.com | finished in 3h37m0s |
| 2025-09-21 00:53 UTC | nsfs: validate file handle type and data in nsfs_fh_to_dentry() | 1 | kartikey406@gmail.com | finished in 3h44m0s |
| 2025-09-21 00:51 UTC | nsfs: validate file handle type and data in nsfs_fh_to_dentry() | 1 | kartikey406@gmail.com | finished in 3h38m0s |
| 2025-09-20 08:11 UTC | nsfs: validate file handle type in nsfs_fh_to_dentry() | 1 | kartikey406@gmail.com | finished in 3h38m0s |
| 2025-09-19 01:32 UTC | ext4: fix allocation failure in ext4_mb_load_buddy_gfp | 1 | kartikey406@gmail.com | finished in 3h45m0s |
| 2025-09-18 13:09 UTC | futex: Use correct exit on failure from futex_hash_allocate_default() | 1 | bigeasy@linutronix.de | finished in 3h55m0s |
| 2025-09-05 13:46 UTC | bpf: refactor max_depth computation in bpf_get_stack() | 8 | contact@arnaud-lcm.com | finished in 4h12m0s |
| 2025-09-03 13:52 UTC | bpf: refactor max_depth computation in bpf_get_stack() | 6 | contact@arnaud-lcm.com | finished in 4h2m0s |
| 2025-08-26 21:22 UTC | bpf: refactor max_depth computation in bpf_get_stack() | 5 | contact@arnaud-lcm.com | finished in 1h34m0s |
| 2025-08-19 16:26 UTC | bpf: refactor max_depth computation in bpf_get_stack() | 4 | contact@arnaud-lcm.com | finished in 2h3m0s |
| 2025-08-19 16:10 UTC | 9p/trans_fd: p9_fd_request: kick rx thread if EPOLLIN | 1 | oleg@redhat.com | finished in 59m0s |
| 2025-08-13 20:46 UTC | bpf: refactor max_depth computation in bpf_get_stack() | 4 | contact@arnaud-lcm.com | finished in 3h38m0s |
| 2025-08-12 19:30 UTC | bpf: refactor max_depth computation in bpf_get_stack() | 3 | contact@arnaud-lcm.com | finished in 3h45m0s |
| 2025-08-09 11:56 UTC | bpf: refactor max_depth computation in bpf_get_stack() | 2 | contact@arnaud-lcm.com | finished in 3h40m0s |
| 2025-08-07 17:50 UTC | bpf: refactor max_depth computation in bpf_get_stack() | 1 | contact@arnaud-lcm.com |
finished
in 3h45m0s
[2 findings] |
| 2025-07-29 16:56 UTC | bpf: fix stackmap overflow check in __bpf_get_stackid() | 2 | contact@arnaud-lcm.com | finished in 3h45m0s |
| 2025-07-27 18:09 UTC | net: team: switch to spinlock in team_change_rx_flags | 1 | ujwal.kundur@gmail.com | skipped |
| 2025-07-24 07:15 UTC | wifi: mac80211: fix use-after-free risk in sta debugfs removal | 1 | moonhee.lee.ca@gmail.com | finished in 3h39m0s |
| 2025-07-18 11:27 UTC | netfilter: xt_nfacct: don't assume acct name is null-terminated | 1 | fw@strlen.de | finished in 3h39m0s |
| 2025-07-17 14:59 UTC | ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr | 1 | tytso@mit.edu | finished in 3h42m0s |
| 2025-07-15 23:09 UTC | wifi: mac80211: reject TDLS operations when station is not associated | 1 | moonhee.lee.ca@gmail.com | finished in 3h40m0s |
| 2025-07-05 01:18 UTC | net/sched: Prevent notify to parent who unsupport class ops | 1 | lizhi.xu@windriver.com | finished in 6h9m0s |
| 2025-07-04 08:04 UTC | net/sched: Prevent notify to parent who unsupport class ops | 1 | lizhi.xu@windriver.com | finished in 3h38m0s |