lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-Id: <166010821595.18792.3808704425767973984.git-patchwork-notify@kernel.org> Date: Wed, 10 Aug 2022 05:10:15 +0000 From: patchwork-bot+netdevbpf@...nel.org To: Pablo Neira Ayuso <pablo@...filter.org> Cc: netfilter-devel@...r.kernel.org, davem@...emloft.net, netdev@...r.kernel.org, kuba@...nel.org, pabeni@...hat.com, edumazet@...gle.com Subject: Re: [PATCH net 1/8] netfilter: nf_tables: validate variable length element extension Hello: This series was applied to netdev/net.git (master) by Pablo Neira Ayuso <pablo@...filter.org>: On Wed, 10 Aug 2022 00:05:25 +0200 you wrote: > Update template to validate variable length extensions. This patch adds > a new .ext_len[id] field to the template to store the expected extension > length. This is used to sanity check the initialization of the variable > length extension. > > Use PTR_ERR() in nft_set_elem_init() to report errors since, after this > update, there are two reason why this might fail, either because of > ENOMEM or insufficient room in the extension field (EINVAL). > > [...] Here is the summary with links: - [net,1/8] netfilter: nf_tables: validate variable length element extension https://git.kernel.org/netdev/net/c/34aae2c2fb1e - [net,2/8] netfilter: nf_tables: do not allow SET_ID to refer to another table https://git.kernel.org/netdev/net/c/470ee20e069a - [net,3/8] netfilter: nf_tables: do not allow CHAIN_ID to refer to another table https://git.kernel.org/netdev/net/c/95f466d22364 - [net,4/8] netfilter: nf_tables: do not allow RULE_ID to refer to another chain https://git.kernel.org/netdev/net/c/36d5b2913219 - [net,5/8] netfilter: ip6t_LOG: Fix a typo in a comment https://git.kernel.org/netdev/net/c/134941683b89 - [net,6/8] netfilter: nf_tables: upfront validation of data via nft_data_init() https://git.kernel.org/netdev/net/c/341b69416087 - [net,7/8] netfilter: nf_tables: disallow jump to implicit chain from set element https://git.kernel.org/netdev/net/c/f323ef3a0d49 - [net,8/8] netfilter: nf_tables: fix null deref due to zeroed list head https://git.kernel.org/netdev/net/c/580077855a40 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists