lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri, 04 Feb 2022 17:40:09 +0000 From: patchwork-bot+netdevbpf@...nel.org To: Pablo Neira Ayuso <pablo@...filter.org> Cc: netfilter-devel@...r.kernel.org, davem@...emloft.net, netdev@...r.kernel.org, kuba@...nel.org Subject: Re: [PATCH net 1/6] netfilter: conntrack: don't refresh sctp entries in closed state Hello: This series was applied to netdev/net.git (master) by Pablo Neira Ayuso <pablo@...filter.org>: On Fri, 4 Feb 2022 16:18:57 +0100 you wrote: > From: Florian Westphal <fw@...len.de> > > Vivek Thrivikraman reported: > An SCTP server application which is accessed continuously by client > application. > When the session disconnects the client retries to establish a connection. > After restart of SCTP server application the session is not established > because of stale conntrack entry with connection state CLOSED as below. > > [...] Here is the summary with links: - [net,1/6] netfilter: conntrack: don't refresh sctp entries in closed state https://git.kernel.org/netdev/net/c/77b337196a9d - [net,2/6] netfilter: nft_payload: don't allow th access for fragments https://git.kernel.org/netdev/net/c/a9e8503def0f - [net,3/6] netfilter: conntrack: move synack init code to helper https://git.kernel.org/netdev/net/c/cc4f9d62037e - [net,4/6] netfilter: conntrack: re-init state for retransmitted syn-ack https://git.kernel.org/netdev/net/c/82b72cb94666 - [net,5/6] MAINTAINERS: netfilter: update git links https://git.kernel.org/netdev/net/c/1f6339e034d5 - [net,6/6] netfilter: ctnetlink: disable helper autoassign https://git.kernel.org/netdev/net/c/d1ca60efc53d You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists