lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <20190221.160906.791491589241737065.davem@davemloft.net>
Date:   Thu, 21 Feb 2019 16:09:06 -0800 (PST)
From:   David Miller <davem@...emloft.net>
To:     steffen.klassert@...unet.com
Cc:     herbert@...dor.apana.org.au, netdev@...r.kernel.org
Subject: Re: pull request (net): ipsec 2019-02-21

From: Steffen Klassert <steffen.klassert@...unet.com>
Date: Thu, 21 Feb 2019 09:22:00 +0100

> 1) Don't do TX bytes accounting for the esp trailer when sending
>    from a request socket as this will result in an out of bounds
>    memory write. From Martin Willi.
> 
> 2) Destroy xfrm_state synchronously on net exit path to
>    avoid nested gc flush callbacks that may trigger a
>    warning in xfrm6_tunnel_net_exit(). From Cong Wang.
> 
> 3) Do an unconditionally clone in pfkey_broadcast_one()
>    to avoid a race when freeing the skb.
>    From Sean Tranchetti.
> 
> 4) Fix inbound traffic via XFRM interfaces across network
>    namespaces. We did the lookup for interfaces and policies
>    in the wrong namespace. From Tobias Brunner.
> 
> Please pull or let me know if there are problems.

Pulled, thanks.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ