lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20190528074410.GD14601@gauss3.secunet.de> Date: Tue, 28 May 2019 09:44:10 +0200 From: Steffen Klassert <steffen.klassert@...unet.com> To: Herbert Xu <herbert@...dor.apana.org.au> CC: Anirudh Gupta <anirudhrudr@...il.com>, Anirudh Gupta <anirudh.gupta@...hos.com>, "David S. Miller" <davem@...emloft.net>, <netdev@...r.kernel.org>, <linux-kernel@...r.kernel.org> Subject: Re: [PATCH net] xfrm: Fix xfrm sel prefix length validation On Wed, May 22, 2019 at 11:17:00AM +0800, Herbert Xu wrote: > On Tue, May 21, 2019 at 08:59:47PM +0530, Anirudh Gupta wrote: > > Family of src/dst can be different from family of selector src/dst. > > Use xfrm selector family to validate address prefix length, > > while verifying new sa from userspace. > > > > Validated patch with this command: > > ip xfrm state add src 1.1.6.1 dst 1.1.6.2 proto esp spi 4260196 \ > > reqid 20004 mode tunnel aead "rfc4106(gcm(aes))" \ > > 0x1111016400000000000000000000000044440001 128 \ > > sel src 1011:1:4::2/128 sel dst 1021:1:4::2/128 dev Port5 > > > > Fixes: 07bf7908950a ("xfrm: Validate address prefix lengths in the xfrm selector.") > > Signed-off-by: Anirudh Gupta <anirudh.gupta@...hos.com> > > Acked-by: Herbert Xu <herbert@...dor.apana.org.au> Patch applied, thanks everyone!
Powered by blists - more mailing lists