lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 30 Jun 2014 11:27:46 +0200 From: Steffen Klassert <steffen.klassert@...unet.com> To: Tobias Brunner <tobias@...ongswan.org> CC: "David S. Miller" <davem@...emloft.net>, <netdev@...r.kernel.org>, Fan Du <fan.du@...driver.com>, Andreas Steffen <andreas.steffen@...ongswan.org> Subject: Re: [PATCH ipsec] xfrm: Fix installation of AH IPsec SAs On Thu, Jun 26, 2014 at 03:12:45PM +0200, Tobias Brunner wrote: > The SPI check introduced in ea9884b3acf3311c8a11db67bfab21773f6f82ba > was intended for IPComp SAs but actually prevented AH SAs from getting > installed (depending on the SPI). Yes, this patch was apparently wrong. > > Fixes: ea9884b3acf3 ("xfrm: check user specified spi for IPComp") > Cc: Fan Du <fan.du@...driver.com> > Signed-off-by: Tobias Brunner <tobias@...ongswan.org> Applied to the ipsec tree, thanks a lot Tobias! -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists