lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <1512322408.19682.55.camel@gmail.com>
Date:   Sun, 03 Dec 2017 09:33:28 -0800
From:   Eric Dumazet <eric.dumazet@...il.com>
To:     David Miller <davem@...emloft.net>, edumazet@...gle.com
Cc:     netdev@...r.kernel.org, dsa@...ulusnetworks.com,
        james.l.morris@...cle.com, casey@...aufler-ca.com
Subject: Re: [PATCH net 0/2] tcp: fix SELinux/Smack corruptions

On Sun, 2017-12-03 at 10:42 -0500, David Miller wrote:
> From: Eric Dumazet <edumazet@...gle.com>
> Date: Fri,  1 Dec 2017 15:08:11 -0800
> 
> > James Morris reported kernel stack corruption bug that
> > we tracked back to commit 971f10eca186 ("tcp: better TCP_SKB_CB
> > layout to reduce cache line misses")
> > 
> > First patch needs to be backported to kernels >= 3.18,
> > while second patch needs to be backported to kernels >= 4.9, since
> > this was the time when inet_exact_dif_match appeared.
> 
> I don't know why but patch #2 never made it into patchwork which
> makes
> it really difficult for me to queue it up for -stable properly and
> reliably.
> 
> Can you please repost this series?  Hopefully it will work.
> 
> If it doesn't work we'll ask the patchwork folks to take a look.
> 
> Thanks!

Sure, I have rebased and resent.

Thanks.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ