lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20190522031700.ynp6ctodqlztybb2@gondor.apana.org.au> Date: Wed, 22 May 2019 11:17:00 +0800 From: Herbert Xu <herbert@...dor.apana.org.au> To: Anirudh Gupta <anirudhrudr@...il.com> Cc: Steffen Klassert <steffen.klassert@...unet.com>, Anirudh Gupta <anirudh.gupta@...hos.com>, "David S. Miller" <davem@...emloft.net>, netdev@...r.kernel.org, linux-kernel@...r.kernel.org Subject: Re: [PATCH net] xfrm: Fix xfrm sel prefix length validation On Tue, May 21, 2019 at 08:59:47PM +0530, Anirudh Gupta wrote: > Family of src/dst can be different from family of selector src/dst. > Use xfrm selector family to validate address prefix length, > while verifying new sa from userspace. > > Validated patch with this command: > ip xfrm state add src 1.1.6.1 dst 1.1.6.2 proto esp spi 4260196 \ > reqid 20004 mode tunnel aead "rfc4106(gcm(aes))" \ > 0x1111016400000000000000000000000044440001 128 \ > sel src 1011:1:4::2/128 sel dst 1021:1:4::2/128 dev Port5 > > Fixes: 07bf7908950a ("xfrm: Validate address prefix lengths in the xfrm selector.") > Signed-off-by: Anirudh Gupta <anirudh.gupta@...hos.com> Acked-by: Herbert Xu <herbert@...dor.apana.org.au> -- Email: Herbert Xu <herbert@...dor.apana.org.au> Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt
Powered by blists - more mailing lists