Patch Series

Subject net: key: Fix potential integer overflow in set_ipsecrequest
Author clf700383@gmail.com
Date 2025-10-23 12:24:51 +0000 UTC
Version 1
Cc clf700383@gmail.com davem@davemloft.net edumazet@google.com herbert@gondor.apana.org.au horms@kernel.org kuba@kernel.org linux-kernel@vger.kernel.org netdev@vger.kernel.org pabeni@redhat.com steffen.klassert@secunet.com syzbot@syzkaller.appspotmail.com syzkaller-bugs@googlegroups.com

Patches (1)

Name Content [All]
[PATCH net] net: key: Fix potential integer overflow in set_ipsecrequest [Body]

Session 2025-10-23

ID (for dev) c36541eb-252c-41e3-a485-99bd914e1537
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 10843e1492e474c02b91314963161731fa92af91 [Config] passed [Log]
[KASAN] Boot test: Base 10843e1492e474c02b91314963161731fa92af91 [Config] passed
[KASAN] Build Patched 10843e1492e474c02b91314963161731fa92af91 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 10843e1492e474c02b91314963161731fa92af91 [Config] [patched] passed
[KASAN] Fuzzing 10843e1492e474c02b91314963161731fa92af91 [Config] 10843e1492e474c02b91314963161731fa92af91 [Config] [patched] passed [Log] [Artifacts]