Patch Series

Subject net: cxgb4/ch_ipsec: fix potential use-after-free in ch_ipsec_xfrm_add_state() callback
Author pavel.zhigulin@kaspersky.com
Date 2025-10-24 16:13:02 +0000 UTC
Version 4
Cc andrew@lunn.ch atul.gupta@chelsio.com ayush.sawal@chelsio.com cratiu@nvidia.com davem@davemloft.net edumazet@google.com ganeshgr@chelsio.com harsh@chelsio.com herbert@gondor.apana.org.au kuba@kernel.org leon@kernel.org linux-kernel@vger.kernel.org lvc-project@linuxtesting.org netdev@vger.kernel.org pabeni@redhat.com pavel.zhigulin@kaspersky.com steffen.klassert@secunet.com yanjun.zhu@linux.dev

Patches (1)

Name Content [All]
[PATCH net v4] net: cxgb4/ch_ipsec: fix potential use-after-free in ch_ipsec_xfrm_add_state() callback [Body]

Session 2025-10-24

ID (for dev) 9b157872-0b1f-4445-a401-19c7db2e37cd
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base ab431bc39741e9d9bd3102688439e1864c857a74 [Config] passed [Log]
[KASAN] Boot test: Base ab431bc39741e9d9bd3102688439e1864c857a74 [Config] passed
[KASAN] Build Patched ab431bc39741e9d9bd3102688439e1864c857a74 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched ab431bc39741e9d9bd3102688439e1864c857a74 [Config] [patched] passed
[KASAN] Fuzzing ab431bc39741e9d9bd3102688439e1864c857a74 [Config] ab431bc39741e9d9bd3102688439e1864c857a74 [Config] [patched] skipped [Log] [Artifacts]