lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20230420120044.288741-1-pabeni@redhat.com>
Date:   Thu, 20 Apr 2023 14:00:44 +0200
From:   Paolo Abeni <pabeni@...hat.com>
To:     torvalds@...ux-foundation.org
Cc:     kuba@...nel.org, davem@...emloft.net, netdev@...r.kernel.org,
        linux-kernel@...r.kernel.org
Subject: [GIT PULL] Networking for 6.3-rc8

Hi Linus!

There are a few fixes for new code bugs, including the Mellanox one
noted in the last net PR. No known regressions outstanding.

The following changes since commit 829cca4d1783088e43bace57a555044cc937c554:

  Merge tag 'net-6.3-rc7' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net (2023-04-13 15:33:04 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git tags/net-6.3-rc8

for you to fetch changes up to 927cdea5d2095287ddd5246e5aa68eb5d68db2be:

  net: bridge: switchdev: don't notify FDB entries with "master dynamic" (2023-04-20 09:20:14 +0200)

----------------------------------------------------------------
Networking fixes for 6.3-rc8, including fixes from netfilter and bpf

Current release - regressions:

  - sched: clear actions pointer in miss cookie init fail

  - mptcp: fix accept vs worker race

  - bpf: fix bpf_arch_text_poke() with new_addr == NULL on s390

  - eth: bnxt_en: fix a possible NULL pointer dereference in unload path

  - eth: veth: take into account peer device for NETDEV_XDP_ACT_NDO_XMIT xdp_features flag

Current release - new code bugs:

  - eth: revert "net/mlx5: Enable management PF initialization"

Previous releases - regressions:

  - netfilter: fix recent physdev match breakage

  - bpf: fix incorrect verifier pruning due to missing register precision taints

  - eth: virtio_net: fix overflow inside xdp_linearize_page()

  - eth: cxgb4: fix use after free bugs caused by circular dependency problem

  - eth: mlxsw: pci: fix possible crash during initialization

Previous releases - always broken:

  - sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg

  - netfilter: validate catch-all set elements

  - bridge: don't notify FDB entries with "master dynamic"

  - eth: bonding: fix memory leak when changing bond type to ethernet

  - eth: i40e: fix accessing vsi->active_filters without holding lock

Misc:

  - Mat is back as MPTCP co-maintainer

Signed-off-by: Paolo Abeni <pabeni@...hat.com>

----------------------------------------------------------------
Aleksandr Loktionov (2):
      i40e: fix accessing vsi->active_filters without holding lock
      i40e: fix i40e_setup_misc_vector() error handling

Alexander Aring (1):
      net: rpl: fix rpl header size calculation

Arnd Bergmann (1):
      hamradio: drop ISA_DMA_API dependency

Chen Aotian (1):
      netfilter: nf_tables: Modify nla_memdup's flag to GFP_KERNEL_ACCOUNT

Christophe JAILLET (1):
      net: dsa: microchip: ksz8795: Correctly handle huge frame configuration

Daniel Borkmann (1):
      bpf: Fix incorrect verifier pruning due to missing register precision taints

David S. Miller (1):
      Merge branch 'mptcp-fixes'

Ding Hui (1):
      sfc: Fix use-after-free due to selftest_work

Duoming Zhou (1):
      cxgb4: fix use after free bugs caused by circular dependency problem

Florian Westphal (2):
      netfilter: br_netfilter: fix recent physdev match breakage
      netfilter: nf_tables: fix ifdef to also consider nf_tables=m

Gwangun Jung (1):
      net: sched: sch_qfq: prevent slab-out-of-bounds in qfq_activate_agg

Ido Schimmel (2):
      bonding: Fix memory leak when changing bond type to Ethernet
      mlxsw: pci: Fix possible crash during initialization

Ilya Leoshkevich (1):
      s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL

Jacob Keller (1):
      ice: document RDMA devlink parameters

Jakub Kicinski (4):
      Merge git://git.kernel.org/pub/scm/linux/kernel/git/netfilter/nf
      Merge branch '40GbE' of git://git.kernel.org/pub/scm/linux/kernel/git/tnguy/net-queue
      Merge tag 'for-netdev' of https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf
      Revert "net/mlx5: Enable management PF initialization"

Kalesh AP (1):
      bnxt_en: Fix a possible NULL pointer dereference in unload path

Lorenzo Bianconi (1):
      veth: take into account peer device for NETDEV_XDP_ACT_NDO_XMIT xdp_features flag

Mat Martineau (1):
      MAINTAINERS: Resume MPTCP co-maintainer role

Matthieu Baerts (1):
      mailmap: add entries for Mat Martineau

Michael Chan (1):
      bnxt_en: Do not initialize PTP on older P3/P4 chips

Nikita Zhandarovich (1):
      mlxfw: fix null-ptr-deref in mlxfw_mfa2_tlv_next()

Pablo Neira Ayuso (2):
      netfilter: nf_tables: validate catch-all set elements
      netfilter: nf_tables: tighten netlink attribute requirements for catch-all elements

Paolo Abeni (3):
      Merge branch 'bnxt_en-bug-fixes'
      mptcp: stops worker on unaccepted sockets at listener close
      mptcp: fix accept vs worker race

Pedro Tammela (1):
      net/sched: clear actions pointer in miss cookie init fail

Sebastian Basierski (1):
      e1000e: Disable TSO on i219-LM card to increase speed

Seiji Nishikawa (1):
      net: vmxnet3: Fix NULL pointer dereference in vmxnet3_rq_rx_complete()

Vadim Fedorenko (1):
      bnxt_en: fix free-runnig PHC mode

Vladimir Oltean (1):
      net: bridge: switchdev: don't notify FDB entries with "master dynamic"

Xuan Zhuo (1):
      virtio_net: bugfix overflow inside xdp_linearize_page()

 .mailmap                                           |  2 +
 Documentation/networking/devlink/ice.rst           | 15 ++++
 MAINTAINERS                                        |  1 +
 arch/s390/net/bpf_jit_comp.c                       | 11 ++-
 drivers/net/bonding/bond_main.c                    |  7 +-
 drivers/net/dsa/microchip/ksz8795.c                |  2 +-
 drivers/net/ethernet/broadcom/bnxt/bnxt.c          |  4 +-
 drivers/net/ethernet/broadcom/bnxt/bnxt_ulp.c      | 19 ++---
 .../net/ethernet/chelsio/cxgb4/cxgb4_tc_flower.c   |  2 +-
 drivers/net/ethernet/intel/e1000e/netdev.c         | 51 +++++++-------
 drivers/net/ethernet/intel/i40e/i40e_main.c        |  9 ++-
 drivers/net/ethernet/mellanox/mlx5/core/dev.c      |  6 --
 drivers/net/ethernet/mellanox/mlx5/core/ecpf.c     |  8 ---
 drivers/net/ethernet/mellanox/mlx5/core/eswitch.c  |  2 +-
 .../ethernet/mellanox/mlxfw/mlxfw_mfa2_tlv_multi.c |  2 +
 drivers/net/ethernet/mellanox/mlxsw/pci_hw.h       |  2 +-
 drivers/net/ethernet/sfc/efx.c                     |  1 -
 drivers/net/ethernet/sfc/efx_common.c              |  2 +
 drivers/net/hamradio/Kconfig                       |  2 +-
 drivers/net/veth.c                                 | 17 +++--
 drivers/net/virtio_net.c                           |  8 ++-
 drivers/net/vmxnet3/vmxnet3_drv.c                  |  2 +-
 include/linux/mlx5/driver.h                        |  5 --
 include/linux/skbuff.h                             |  5 +-
 include/net/netfilter/nf_tables.h                  |  4 ++
 kernel/bpf/verifier.c                              | 15 ++++
 net/bridge/br_netfilter_hooks.c                    | 17 +++--
 net/bridge/br_switchdev.c                          | 11 +++
 net/ipv6/rpl.c                                     |  3 +-
 net/mptcp/protocol.c                               | 74 +++++++++++++-------
 net/mptcp/protocol.h                               |  2 +
 net/mptcp/subflow.c                                | 80 +++++++++++++++++++++-
 net/netfilter/nf_tables_api.c                      | 69 ++++++++++++++++---
 net/netfilter/nft_lookup.c                         | 36 ++--------
 net/sched/cls_api.c                                |  3 +
 net/sched/sch_qfq.c                                | 13 ++--
 36 files changed, 351 insertions(+), 161 deletions(-)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ