lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 28 May 2013 10:47:45 +0100
From:	Ian Campbell <Ian.Campbell@...rix.com>
To:	<stable@...r.kernel.org>, "David S. Miller" <davem@...emloft.net>
CC:	xen-devel <xen-devel@...ts.xen.org>, <netdev@...r.kernel.org>,
	Wei Liu <wei.liu2@...rix.com>
Subject: xen-netback stable backports request (regression fixes)

Hi Dave, stable folks,

The following set of patches fix a xen netback regression caused by the
fixes for CVE-2013-0216 / CVE-2013-0217 / XSA-39 (the original change
was several patches starting at 48856286b64e), we'd like to see them
backported to stable branches if possible. I think the fixups have now
been in Linus tree since around the start of May.

Wei and I are happy to help with backports if necessary. Some of the
patches are cleanups which make backports easier but if you would prefer
we could produce backports without them.

27f85228 xen-netback: remove skb in xen_netbk_alloc_page
2810e5b9 xen-netback: coalesce slots in TX path and fix regressions
03393fd5 xen-netback: don't disconnect frontend when seeing oversize packet
ac69c26e xen-netback: remove redundent parameter in netbk_count_requests
59ccb4eb xen-netback: avoid allocating variable size array on stack
37641494 xen-netback: better names for thresholds

In addition there are some useful related (but not security relevant)
fixes to netfront:

e2d617c0 xen-netfront: remove unused variable `extra'
7158ff6d xen-netfront: frags -> slots in xennet_get_responses
697089dc xen-netfront: frags -> slots in log message
9ecd1a75 xen-netfront: reduce gso_max_size to account for max TCP header

Thanks,
Ian.

--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ