Trinity

Bugs found so far using Trinity. (git hashes from linux.git)

Fixed:
This list is partial, as it's a lot of work to keep track of all the bugs trinity finds.
Fixed:

* world writable acpi file in sysfs
  ed3aada1bf34c5a9e98af167f125f8a740fc726a

* Unnecessary noisy backtrace spew
  52ca0e84b05595cf74f1ff772b3f9807256b1b27

* mprotect/perf oops. (CVE-2010-4169)
  63bfd7384b119409685a17d5c58f0b56e5dc03da

* pipe_fcntl oopses when called on non-pipes. (CVE-2010-4256)
  c66fb347946ebdd5b10908866ecc9fa05ee2cf3d
  71993e62a47dabddf10302807d6aa260455503f4
  72083646528d4887b920deb71b37e09bc7d227bb

* ntp: fix non privileged system time shifting
  4352d9d44b935e4d000be6ec89ddb55c2bf35f24

* appletalk: Fix OOPS in atalk_release().
  c100c8f4c3c6f2a407bdbaaad2c4f1062e6a473a

* tty: fix endless work loop when the buffer fills up
  a5660b41af6a28f8004e70eb261e1202ad55c5e3

* sctp spew on allocation failure.
  a84b50ceb7d640437d0dc28a2bef0d0de054de89

* Assorted debug spew from ieee802154 sendmsg
  bfac3693c426d280b026f6a1b77dc2294ea43fea

* broken locking in irda
  020318d0d2af51e0fd59ba654ede9b2171558720

* CAN bcm_release NULL sock-> sk  (CVE-2011-1598)
  c6914a6f261aca0c9f715f883a353ae7ff51fe83

* CAN raw_release NULL sock-> sk (CVE-2011-1748)
  10022a6c66e199d8f61d9044543f38785713cbbd

* irias_seq_show recursive locking
  79b3891587741dfac72cdfead1f2764b56a567b0

* ipq_rcv_skb page allocation order >= MAX_ORDER
  http://permalink.gmane.org/gmane.linux.network/192892
  d232b8dded624af3e346b13807a591c63b601c44

* ip_rt_bug: 0.0.0.0 -> 255.255.255.255
  ed6e4ef836d425bc35e33bf20fcec95e68203afa

* hung_task: fix false positive during vfork
  f9fab10bbd768b0e5254e53a4a8477a94bfc4b96

* futex: Fix uninterruptible loop due to gate_area
  e6780f7243eddb133cc20ec37fa69317c218b709
  http://lkml.org/lkml/2011/12/21/182

* hugetlbfs lockdep spew.
  http://lkml.org/lkml/2011/4/15/272
  http://lkml.org/lkml/2012/2/16/498
  65ed76010dfed3cb75c863c9052c367a1bacf80a

* 3.4-rc7: kernel BUG at mm/mempolicy.c:1564!
  3.4-rc7 numa_policy slab poison.
  http://lkml.org/lkml/2012/5/18/399
  05f144a0d5c2207a0349348127f996e104ad7404

* vma_resv_map bug.
  06f97f6d58a1704681725f96117a152ee3e8c432

* WARNING: at mm/page-writeback.c:1990 __set_page_dirty_nobuffers+0x13a/0x170()
  http://lkml.org/lkml/2012/5/30/580
  752dc185dacba1edcba425e67fc6df3c7793a5c3

* vmsplice triggering bug in kfree.
  047fe3605235888f3ebcda0c728cb31937eadfe6
  http://lkml.org/lkml/2012/6/6/713

* (compaction related corruption) WARNING: at mm/page-writeback.c:1990 __set_page_dirty_nobuffers+0x13a/0x170()
  http://lkml.org/lkml/2012/6/1/341
  68e3e92620c323703bc7db75c2ba15239ee85c39

* sctp: Fix list corruption resulting from freeing an association on a list
  2eebc1e188e9e45886ee00662519849339884d6d

* [PATCH] NFC: Prevent NULL deref when getting socket name
  147f20e316f3949f3f5ffe6c8658e9fe1c6ceb23
  http://lkml.org/lkml/2012/6/30/44

* Remove easily user-triggerable BUG from generic_setlease
  8d657eb3b43861064d36241e88d9d61c709f33f0
  0ec4f431eb56d633da3a55da67d5c4b88886ccc7
  http://lkml.org/lkml/2012/7/13/311

* 3.5-rc6 futex_wait_requeue_pi oops.
  6f7b0a2a5c0fb03be7c25bd1745baa50582348ef
  f27071cb7fe3e1d37a9dbe6c0dfc5395cd40fa43
  b6070a8d9853eda010a549fa9a09eb8d7269b929
  http://lkml.org/lkml/2012/7/13/328
  http://lkml.org/lkml/2012/7/20/350

* selinux_inode_setxattr oops.
  e3fea3f70fd68af0574a5f24246cdb4ed07f2b74
  http://lkml.org/lkml/2012/6/4/477

* Replace BUG() in mpol_to_str with -EINVAL
  80de7c3138ee9fd86a98696fd2cf7ad89b995d0a
  http://lkml.org/lkml/2012/8/1/170
  https://lkml.org/lkml/2012/9/6/356

* 3.5-rc6: kernel BUG at kernel/timer.c:711!
  3e10986d1d698140747fcfc2761ec9cb64c1d582
  http://lkml.org/lkml/2012/7/11/234
  http://www.spinics.net/lists/netdev/msg209628.html

* 3.6rc6 slab corruption.
  36048853c5257a7b6df346b83758ffa776a59e9f
  https://lkml.org/lkml/2012/9/18/272

* pi futex oops in __lock_acquire
  aa10990e028cac3d5e255711fb9fb47e00700e35

* [PATCH] sctp: fix memory leak in sctp_datamsg_from_user() when copy from user space fails
  be364c8c0f17a3dd42707b5a090b318028538eb9

* sctp: fix -ENOMEM result with invalid user space pointer in sendto() syscall
  6e51fe7572590d8d86e93b547fab6693d305fd0d

* irda: irttp: fix memory leak in irttp_open_tsap() error path
  c3b2c2581988d304127c2aa218430b5fca88ce56

* sctp: fix /proc/net/sctp/ memory leak 
  0da9a0c2638c8476b4a5021841912f249e3187dc


back to Dave Jones home page..