1. 22 Jul, 2020 1 commit
    • Mark Salyzyn's avatar
      af_key: pfkey_dump needs parameter validation · 37bd2242
      Mark Salyzyn authored
      In pfkey_dump() dplen and splen can both be specified to access the
      xfrm_address_t structure out of bounds in__xfrm_state_filter_match()
      when it calls addr_match() with the indexes.  Return EINVAL if either
      are out of range.
      Signed-off-by: default avatarMark Salyzyn <salyzyn@android.com>
      Cc: netdev@vger.kernel.org
      Cc: linux-kernel@vger.kernel.org
      Cc: kernel-team@android.com
      Cc: Steffen Klassert <steffen.klassert@secunet.com>
      Cc: Herbert Xu <herbert@gondor.apana.org.au>
      Cc: "David S. Miller" <davem@davemloft.net>
      Cc: Jakub Kicinski <kuba@kernel.org>
      Fixes: 1da177e4 ("Linux-2.6.12-rc2")
      Signed-off-by: default avatarSteffen Klassert <steffen.klassert@secunet.com>
      37bd2242
  2. 21 Jul, 2020 2 commits
    • Steffen Klassert's avatar
      xfrm: Fix crash when the hold queue is used. · 101dde42
      Steffen Klassert authored
      The commits "xfrm: Move dst->path into struct xfrm_dst"
      and "net: Create and use new helper xfrm_dst_child()."
      changed xfrm bundle handling under the assumption
      that xdst->path and dst->child are not a NULL pointer
      only if dst->xfrm is not a NULL pointer. That is true
      with one exception. If the xfrm hold queue is used
      to wait until a SA is installed by the key manager,
      we create a dummy bundle without a valid dst->xfrm
      pointer. The current xfrm bundle handling crashes
      in that case. Fix this by extending the NULL check
      of dst->xfrm with a test of the DST_XFRM_QUEUE flag.
      
      Fixes: 0f6c480f ("xfrm: Move dst->path into struct xfrm_dst")
      Fixes: b92cf4aa ("net: Create and use new helper xfrm_dst_child().")
      Signed-off-by: default avatarSteffen Klassert <steffen.klassert@secunet.com>
      101dde42
    • Steffen Klassert's avatar
      Merge remote-tracking branch 'origin/testing' · 0a266f89
      Steffen Klassert authored
      Sabrina Dubroca says:
      
      ====================
      xfrm: a few fixes for espintc
      
      Andrew Cagney reported some issues when trying to use async operations
      on the encapsulation socket. Patches 1 and 2 take care of these bugs.
      
      In addition, I missed a spot when adding IPv6 support and converting
      to the common config option.
      ====================
      Signed-off-by: default avatarSteffen Klassert <steffen.klassert@secunet.com>
      0a266f89
  3. 17 Jul, 2020 3 commits
  4. 07 Jul, 2020 1 commit
  5. 24 Jun, 2020 11 commits
  6. 23 Jun, 2020 22 commits