[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20210121121558.621339-1-steffen.klassert@secunet.com>
Date: Thu, 21 Jan 2021 13:15:53 +0100
From: Steffen Klassert <steffen.klassert@...unet.com>
To: David Miller <davem@...emloft.net>,
Jakub Kicinski <kuba@...nel.org>
CC: Herbert Xu <herbert@...dor.apana.org.au>,
Steffen Klassert <steffen.klassert@...unet.com>,
<netdev@...r.kernel.org>
Subject: pull request (net): ipsec 2021-01-21
1) Fix a rare panic on SMP systems when packet reordering
happens between anti replay check and update.
From Shmulik Ladkani.
2) Fix disable_xfrm sysctl when used on xfrm interfaces.
From Eyal Birger.
3) Fix a race in PF_KEY when the availability of crypto
algorithms is set. From Cong Wang.
4) Fix a return value override in the xfrm policy selftests.
From Po-Hsu Lin.
5) Fix an integer wraparound in xfrm_policy_addr_delta.
From Visa Hankala.
Please pull or let me know if there are problems.
Thanks!
The following changes since commit 7f376f1917d7461e05b648983e8d2aea9d0712b2:
Merge tag 'mtd/fixes-for-5.10-rc8' of git://git.kernel.org/pub/scm/linux/kernel/git/mtd/linux (2020-12-11 14:29:46 -0800)
are available in the Git repository at:
git://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec.git master
for you to fetch changes up to da64ae2d35d3673233f0403b035d4c6acbf71965:
xfrm: Fix wraparound in xfrm_policy_addr_delta() (2021-01-04 10:35:09 +0100)
----------------------------------------------------------------
Cong Wang (1):
af_key: relax availability checks for skb size calculation
Eyal Birger (1):
xfrm: fix disable_xfrm sysctl when used on xfrm interfaces
Po-Hsu Lin (1):
selftests: xfrm: fix test return value override issue in xfrm_policy.sh
Shmulik Ladkani (1):
xfrm: Fix oops in xfrm_replay_advance_bmp
Visa Hankala (1):
xfrm: Fix wraparound in xfrm_policy_addr_delta()
net/key/af_key.c | 6 ++--
net/xfrm/xfrm_input.c | 2 +-
net/xfrm/xfrm_policy.c | 30 +++++++++++++-------
tools/testing/selftests/net/xfrm_policy.sh | 45 +++++++++++++++++++++++++++++-
4 files changed, 68 insertions(+), 15 deletions(-)
Powered by blists - more mailing lists