lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <000000000000b6320d060374e933@google.com> Date: Mon, 21 Aug 2023 13:42:12 -0700 From: syzbot <syzbot+list1892093e816ecfe5f01a@...kaller.appspotmail.com> To: linux-hams@...r.kernel.org, linux-kernel@...r.kernel.org, netdev@...r.kernel.org, syzkaller-bugs@...glegroups.com Subject: [syzbot] Monthly hams report (Aug 2023) Hello hams maintainers/developers, This is a 31-day syzbot report for the hams subsystem. All related reports/information can be found at: https://syzkaller.appspot.com/upstream/s/hams During the period, 1 new issues were detected and 0 were fixed. In total, 5 issues are still open and 30 have been fixed so far. Some of the still happening issues: Ref Crashes Repro Title <1> 17 No general protection fault in rose_transmit_link (3) https://syzkaller.appspot.com/bug?extid=677921bcd8c3a67a3df3 <2> 4 Yes memory leak in nr_create (3) https://syzkaller.appspot.com/bug?extid=d327a1f3b12e1e206c16 <3> 3 Yes general protection fault in prepare_to_wait (2) https://syzkaller.appspot.com/bug?extid=666c97e4686410e79649 --- This report is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@...glegroups.com. To disable reminders for individual bugs, reply with the following command: #syz set <Ref> no-reminders To change bug's subsystems, reply with: #syz set <Ref> subsystems: new-subsystem You may send multiple commands in a single email message.
Powered by blists - more mailing lists