lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 21 Mar 2022 07:47:20 -0700 From: Tadeusz Struk <tadeusz.struk@...aro.org> To: Greg KH <gregkh@...uxfoundation.org>, linux-kernel@...r.kernel.org Cc: sec@...is.email, steffen.klassert@...unet.com, stable-commits@...r.kernel.org Subject: Re: Patch "esp: Fix possible buffer overflow in ESP transformation" has been added to the 4.19-stable tree On 3/21/22 06:12, Greg KH wrote: > On Mon, Mar 21, 2022 at 01:37:08PM +0100, gregkh@...uxfoundation.org wrote: >> >> This is a note to let you know that I've just added the patch titled >> >> esp: Fix possible buffer overflow in ESP transformation >> >> to the 4.19-stable tree which can be found at: >> http://www.kernel.org/git/?p=linux/kernel/git/stable/stable-queue.git;a=summary >> >> The filename of the patch is: >> esp-fix-possible-buffer-overflow-in-esp-transformation.patch >> and it can be found in the queue-4.19 subdirectory. >> >> If you, or anyone else, feels it should not be added to the stable tree, >> please let <stable@...r.kernel.org> know about it. > > Oops, nope, sorry this breaks the build on 5.4 and older kernels, now > dropped. Yes, that is for 5.10 only. -- Thanks, Tadeusz
Powered by blists - more mailing lists