lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Thu,  3 Dec 2009 21:19:32 +0100 (MET)
From:	Patrick McHardy <kaber@...sh.net>
To:	davem@...emloft.net
Cc:	netdev@...r.kernel.org, Patrick McHardy <kaber@...sh.net>,
	netfilter-devel@...r.kernel.org
Subject: netfilter 00/08: Netfilter Update

Hi Dave,

following is a small netfilter update for 2.6.32, containing:

- various cleanups by Changli Gao, Hannes Eder and Joe Perches

- a patch from Pablo to improve TCP window tracking behaviour
  when connection tracking is out-of-sync with the connection
  endpoints.

- INPUT chain support for the xt_socket match

- a fix for dumping the revision 1 data of the conntrack match
  by Florian Westphal.

- Removal of some unnecessary code by myself and Eric

Please apply or pull from:

git://git.kernel.org/pub/scm/linux/kernel/git/kaber/nf-next-2.6.git master

Thanks!


 include/linux/netfilter/nf_conntrack_tcp.h     |    3 +
 net/ipv4/netfilter/arp_tables.c                |   22 ++++----
 net/ipv4/netfilter/ip_queue.c                  |    5 +-
 net/ipv4/netfilter/ip_tables.c                 |   46 +++++++++---------
 net/ipv4/netfilter/ipt_CLUSTERIP.c             |   20 ++++----
 net/ipv4/netfilter/ipt_ECN.c                   |    8 ++--
 net/ipv4/netfilter/ipt_LOG.c                   |   22 ++++----
 net/ipv4/netfilter/ipt_MASQUERADE.c            |    4 +-
 net/ipv4/netfilter/ipt_REJECT.c                |    4 +-
 net/ipv4/netfilter/ipt_ULOG.c                  |    6 +-
 net/ipv4/netfilter/ipt_ecn.c                   |    4 +-
 net/ipv4/netfilter/iptable_mangle.c            |    4 +-
 net/ipv4/netfilter/iptable_security.c          |    4 +-
 net/ipv4/netfilter/nf_conntrack_proto_icmp.c   |   28 +++++-----
 net/ipv4/netfilter/nf_nat_helper.c             |   22 ++++-----
 net/ipv4/netfilter/nf_nat_standalone.c         |   10 ++--
 net/ipv6/netfilter/ip6_queue.c                 |    5 +-
 net/ipv6/netfilter/ip6_tables.c                |   42 ++++++++--------
 net/ipv6/netfilter/ip6t_LOG.c                  |    4 +-
 net/ipv6/netfilter/ip6t_REJECT.c               |    4 +-
 net/ipv6/netfilter/ip6t_ah.c                   |   19 +++----
 net/ipv6/netfilter/ip6t_frag.c                 |   47 ++++++++----------
 net/ipv6/netfilter/ip6t_rt.c                   |    9 +--
 net/ipv6/netfilter/ip6table_filter.c           |    4 +-
 net/ipv6/netfilter/ip6table_mangle.c           |   14 +++---
 net/ipv6/netfilter/nf_conntrack_proto_icmpv6.c |   12 ++--
 net/netfilter/nf_conntrack_core.c              |   14 ++++--
 net/netfilter/nf_conntrack_proto_tcp.c         |   51 ++++++++++++++++----
 net/netfilter/nfnetlink_log.c                  |    3 +-
 net/netfilter/nfnetlink_queue.c                |    3 +-
 net/netfilter/xt_conntrack.c                   |   61 +++++++-----------------
 net/netfilter/xt_socket.c                      |    6 ++-
 32 files changed, 253 insertions(+), 257 deletions(-)

Changli Gao (1):
      netfilter: nf_conntrack: avoid additional compare.

Eric Dumazet (1):
      netfilter: remove synchronize_net() calls in ip_queue/ip6_queue

Florian Westphal (1):
      netfilter: xtables: fix conntrack match v1 ipt-save output

Hannes Eder (1):
      netfilter: nf_nat_helper: tidy up adjust_tcp_sequence

Jan Engelhardt (1):
      netfilter: xt_socket: make module available for INPUT chain

Joe Perches (1):
      netfilter: net/ipv[46]/netfilter: Move && and || to end of previous line

Pablo Neira Ayuso (1):
      netfilter: nf_ct_tcp: improve out-of-sync situation in TCP tracking

Patrick McHardy (1):
      netfilter: remove unneccessary checks from netlink notifiers
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ