|
WARNING in br_multicast_del_pg
bridge
|
-1 |
|
|
|
2 |
5d16h |
11d
|
26/29 |
never |
8b769e311a86
net: bridge: mcast: always update mdb_n_entries for vlan contexts
|
|
KCSAN: data-race in br_fdb_update / br_fdb_update (8)
bridge
|
6 |
|
|
|
44 |
45d |
45d
|
28/29 |
never |
b25a0b4a2193
net: bridge: annotate data-races around fdb->{updated,used}
|
|
KASAN: slab-use-after-free Read in br_switchdev_fdb_notify (2)
bridge
|
19 |
|
|
|
4 |
117d |
133d
|
29/29 |
30d |
8dca36978aa8
net: bridge: fix use-after-free due to MST port state bypass
|
|
KASAN: slab-use-after-free Read in br_switchdev_fdb_populate
bridge
|
19 |
|
|
|
1 |
116d |
110d
|
29/29 |
45d |
8dca36978aa8
net: bridge: fix use-after-free due to MST port state bypass
|
|
WARNING in br_nf_local_in
bridge
netfilter
|
-1 |
|
|
|
1 |
169d |
165d
|
29/29 |
110d |
netfilter: br_netfilter: do not check confirmed bit in br_nf_local_in() after confirm
|
|
KASAN: slab-use-after-free Read in br_multicast_has_router_adjacent
bridge
|
19 |
|
|
|
2 |
243d |
241d
|
29/29 |
169d |
7544f3f5b0b5
bridge: mcast: Fix use-after-free during router port configuration
|
|
KASAN: slab-use-after-free Read in br_multicast_add_router
bridge
|
19 |
|
|
|
1 |
257d |
253d
|
29/29 |
169d |
7544f3f5b0b5
bridge: mcast: Fix use-after-free during router port configuration
|
|
INFO: rcu detected stall in br_handle_frame (5)
bridge
|
1 |
syz |
|
|
24 |
469d |
497d
|
28/29 |
465d |
a1494d532e28
netdevsim: use cond_resched() in nsim_dev_trap_report_work()
|
|
KASAN: slab-use-after-free Read in br_multicast_port_group_expired
bridge
|
19 |
|
|
|
1 |
604d |
604d
|
28/29 |
506d |
92c4ee25208d
net: bridge: mcast: wait for previous gc cycles when removing port
|
|
WARNING: suspicious RCU usage in br_mst_set_state (2)
bridge
|
4 |
|
|
|
10 |
611d |
622d
|
26/29 |
591d |
546ceb1dfdac
net: bridge: mst: fix suspicious rcu usage in br_mst_set_state
36c92936e868
net: bridge: mst: pass vlan group directly to br_mst_vlan_set_state
|
|
KMSAN: uninit-value in br_dev_xmit (2)
bridge
|
7 |
C |
|
|
2 |
654d |
650d
|
25/29 |
626d |
8bd67ebb50c0
net: bridge: xmit: make sure we have at least eth header len bytes
|
|
WARNING: suspicious RCU usage in br_mst_set_state
bridge
|
4 |
|
|
|
45 |
626d |
659d
|
25/29 |
626d |
3a7c1661ae13
net: bridge: mst: fix vlan use-after-free
|
|
KASAN: slab-out-of-bounds Read in update_counters
netfilter
bridge
|
17 |
C |
|
|
3 |
686d |
686d
|
25/29 |
639d |
0c83842df40f
netfilter: validate user input for expected length
|
|
KCSAN: data-race in br_handle_frame_finish / br_handle_frame_finish (8)
bridge
|
6 |
|
|
|
1 |
888d |
887d
|
25/29 |
793d |
44bdb313da57
net: bridge: use DEV_STATS_INC()
|
|
WARNING in dev_index_reserve
bridge
|
-1 |
C |
done |
|
7120 |
865d |
919d
|
23/29 |
863d |
f534f6581ec0
net: validate veth and vxcan peer ifindexes
30188bd7838c
rtnetlink: Reject negative ifindexes in RTM_NEWLINK
|
|
KASAN: vmalloc-out-of-bounds Read in __ebt_unregister_table
bridge
netfilter
|
17 |
C |
error |
|
4 |
1099d |
1099d
|
22/29 |
989d |
e58a171d35e3
netfilter: ebtables: fix table blob use-after-free
|
|
general protection fault in br_mst_info_size
bridge
|
2 |
C |
error |
|
26 |
1429d |
1433d
|
22/29 |
1093d |
cde3fc244b3d
net: bridge: mst: prevent NULL deref in br_mst_info_size()
|
|
memory leak in do_replace
bridge
netfilter
|
3 |
C |
|
|
1 |
1254d |
1250d
|
22/29 |
1093d |
62ce44c4fff9
netfilter: ebtables: fix memory leak when blob is malformed
|
|
KASAN: slab-out-of-bounds Read in add_del_if
bridge
|
17 |
C |
unreliable |
|
970 |
1655d |
1632d
|
20/29 |
1564d |
9384eacd80f3
net: core: don't call SIOCBRADD/DELIF for non-bridge devices
|
|
general protection fault in br_switchdev_fdb_notify
bridge
|
2 |
C |
error |
|
82 |
1659d |
1664d
|
20/29 |
1564d |
0541a6293298
net: bridge: validate the NUD_PERMANENT bit when adding an extern_learn FDB entry
|
|
WARNING in compat_do_ebt_get_ctl
bridge
netfilter
|
-1 |
C |
done |
|
15 |
2013d |
2024d
|
15/29 |
1983d |
5c04da55c754
netfilter: ebtables: reject bogus getopt len value
|
|
KASAN: slab-out-of-bounds Read in br_mrp_parse
bridge
|
17 |
C |
done |
|
5 |
2101d |
2102d
|
15/29 |
2044d |
617504c67e01
bridge: mrp: Fix out-of-bounds read in br_mrp_parse
|
|
KASAN: use-after-free Read in br_dev_xmit
bridge
|
19 |
|
|
|
1 |
2187d |
2187d
|
15/29 |
2137d |
823d81b0fa2c
net: bridge: fix stale eth hdr pointer in br_dev_xmit
|
|
KMSAN: uninit-value in br_nf_forward_arp (3)
bridge
netfilter
|
7 |
|
|
|
2 |
2275d |
2267d
|
15/29 |
2199d |
5604285839aa
net-backports: netfilter: bridge: make sure to pull arp header in br_nf_forward_arp()
|
|
KASAN: vmalloc-out-of-bounds Read in compat_copy_entries
netfilter
bridge
|
17 |
C |
done |
|
3 |
2260d |
2260d
|
15/29 |
2199d |
e608f631f0ba
netfilter: ebtables: compat: reject all padding in matches/watchers
|
|
memory leak in fdb_create (2)
bridge
|
3 |
C |
|
|
1 |
2273d |
2272d
|
15/29 |
2236d |
c4b4c421857d
net: bridge: deny dev_set_mac_address() when unregistering
|
|
memory leak in fdb_create
bridge
|
3 |
C |
done |
|
4 |
2394d |
2434d
|
12/29 |
2369d |
d7bae09fa008
net: bridge: delete local fdb on device init failure
|
|
KASAN: use-after-free Read in brnf_exit_net
bridge
netfilter
|
19 |
syz |
done |
|
3 |
2435d |
2438d
|
12/29 |
2392d |
7e6daf50e1f4
netfilter: bridge: prevent UAF in brnf_exit_net()
|
|
KASAN: use-after-free Read in br_mdb_ip_get
bridge
|
19 |
|
|
|
1 |
2582d |
2581d
|
12/29 |
2457d |
1515a63fc413
net: bridge: always clear mcast matching struct on reports and leaves
|
|
KMSAN: uninit-value in br_mdb_ip_get
bridge
|
7 |
|
|
|
5 |
2522d |
2580d
|
12/29 |
2458d |
1515a63fc413
net: bridge: always clear mcast matching struct on reports and leaves
|
|
KASAN: use-after-free Read in br_multicast_rcv
bridge
|
19 |
|
|
|
1 |
2540d |
2540d
|
11/29 |
2522d |
083b78a9ed64
ip: fix ip_mc_may_pull() return value
|
|
general protection fault in fdb_find_rcu
bridge
|
2 |
C |
|
|
3 |
2614d |
2610d
|
11/29 |
2593d |
f989d03ef25d
net: rtnetlink: address is mandatory for rtnl_fdb_get
|
|
KASAN: use-after-free Read in nbp_vlan_rcu_free
bridge
|
19 |
|
|
|
1 |
2658d |
2658d
|
11/29 |
2633d |
9d332e69c1dc
net: bridge: fix vlan stats use-after-free on destruction
|
|
KMSAN: uninit-value in br_nf_forward_arp
netfilter
bridge
|
7 |
|
|
|
1 |
2822d |
2819d
|
8/29 |
2775d |
b84bbaf7a6c8
packet: in packet_snd start writing at link layer allocation
|
|
KMSAN: uninit-value in ebt_stp_mt_check (2)
bridge
netfilter
|
7 |
C |
|
|
222 |
2783d |
2815d
|
8/29 |
2783d |
c568503ef020
netfilter: x_tables: initialise match/target check parameter struct
|
|
WARNING in ebt_do_table
bridge
netfilter
|
-1 |
C |
|
|
13 |
2792d |
2817d
|
8/29 |
2783d |
11ff7288beb2
netfilter: ebtables: reject non-bridge targets
|
|
KMSAN: uninit-value in ebt_stp_mt_check
netfilter
bridge
|
7 |
C |
|
|
211 |
2816d |
2861d
|
5/29 |
2816d |
a4995684a949
netfilter: bridge: stp fix reference to uninitialized data
|
|
KASAN: stack-out-of-bounds Write in compat_copy_entries
netfilter
bridge
|
21 |
syz |
|
|
10 |
2821d |
2859d
|
5/29 |
2816d |
94c752f99954
netfilter: ebtables: handle string from userspace with care
|
|
WARNING: kobject bug in br_add_if
bridge
|
-1 |
|
|
|
41 |
2846d |
2873d
|
5/29 |
2838d |
e8238fc2bd7b
bridge: check iface upper dev when setting master via ioctl
3e14c6abbfb5
kobject: don't use WARN for registration failures
|
|
BUG: unable to handle kernel paging request in compat_copy_entries
netfilter
bridge
|
8 |
syz |
|
|
5 |
2911d |
2910d
|
5/29 |
2859d |
b71812168571
netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets
|
|
BUG: unable to handle kernel paging request in ebt_among_mt_check (2)
netfilter
bridge
|
8 |
C |
|
|
946 |
2891d |
2907d
|
4/29 |
2891d |
c8d70a700a5b
netfilter: bridge: ebt_among: add more missing match size checks
|
|
BUG: unable to handle kernel paging request in ebt_among_mt_check
bridge
netfilter
|
8 |
C |
|
|
823 |
2909d |
2924d
|
4/29 |
2909d |
c4585a2823ed
netfilter: bridge: ebt_among: add missing match size checks
|
|
WARNING in compat_copy_entries
netfilter
bridge
|
-1 |
C |
|
|
434 |
2909d |
2924d
|
4/29 |
2909d |
b71812168571
netfilter: ebtables: CONFIG_COMPAT: don't trust userland offsets
|