<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/net, branch v2.6.16</title>
<subtitle>Mirror of https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/
</subtitle>
<id>https://git.shady.money/linux/atom?h=v2.6.16</id>
<link rel='self' href='https://git.shady.money/linux/atom?h=v2.6.16'/>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/'/>
<updated>2006-03-19T21:20:06Z</updated>
<entry>
<title>[AX.25]: Fix potencial memory hole.</title>
<updated>2006-03-19T21:20:06Z</updated>
<author>
<name>Ralf Baechle DL5RB</name>
<email>ralf@linux-mips.org</email>
</author>
<published>2006-03-19T21:20:06Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=c7c694d196a39af6e644e24279953d04f30362db'/>
<id>urn:sha1:c7c694d196a39af6e644e24279953d04f30362db</id>
<content type='text'>
If the AX.25 dialect chosen by the sysadmin is set to DAMA master / 3
(or DAMA slave / 2, if CONFIG_AX25_DAMA_SLAVE=n) ax25_kick() will fall
through the switch statement without calling ax25_send_iframe() or any
other function that would eventually free skbn thus leaking the packet.

Fix by restricting the sysctl inferface to allow only actually supported
AX.25 dialects.

The system administration mistake needed for this to happen is rather
unlikely, so this is an uncritical hole.

Coverity #651.

Signed-off-by: Ralf Baechle DL5RB &lt;ralf@linux-mips.org&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[PATCH] ieee80211: Fix QoS is not active problem</title>
<updated>2006-03-15T21:16:07Z</updated>
<author>
<name>Hong Liu</name>
<email>hong.liu@intel.com</email>
</author>
<published>2006-03-08T02:50:20Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=72df16f109b73be37977a26d342e9103e8851cb6'/>
<id>urn:sha1:72df16f109b73be37977a26d342e9103e8851cb6</id>
<content type='text'>
Fix QoS is not active even the network and the card is QOS enabled.
The problem is we pass the wrong ieee80211_network address to
ipw_handle_beacon/ipw_handle_probe_response, thus the
ieee80211_network-&gt;qos_data.active will not be set, causing the driver
not sending QoS frames at all.

Signed-off-by: Hong Liu &lt;hong.liu@intel.com&gt;
Signed-off-by: Zhu Yi &lt;yi.zhu@intel.com&gt;
Signed-off-by: John W. Linville &lt;linville@tuxdriver.com&gt;
</content>
</entry>
<entry>
<title>[PATCH] ieee80211: Fix CCMP decryption problem when QoS is enabled</title>
<updated>2006-03-15T21:11:55Z</updated>
<author>
<name>Zhu Yi</name>
<email>yi.zhu@intel.com</email>
</author>
<published>2006-02-28T07:10:36Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=0df7861240b3484dea52d1f5782c69fd95b6cf23'/>
<id>urn:sha1:0df7861240b3484dea52d1f5782c69fd95b6cf23</id>
<content type='text'>
Use the correct STYPE for Qos data.

Signed-off-by: Zhu Yi &lt;yi.zhu@intel.com&gt;
Signed-off-by: John W. Linville &lt;linville@tuxdriver.com&gt;
</content>
</entry>
<entry>
<title>[PATCH] SUNRPC: Fix potential deadlock in RPC code</title>
<updated>2006-03-14T15:57:18Z</updated>
<author>
<name>Trond Myklebust</name>
<email>Trond.Myklebust@netapp.com</email>
</author>
<published>2006-03-14T05:20:48Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=e6d83d55698b73b4d5d55d3d7715a4c26030d577'/>
<id>urn:sha1:e6d83d55698b73b4d5d55d3d7715a4c26030d577</id>
<content type='text'>
In rpc_wake_up() and rpc_wake_up_status(), it is possible for the call to
__rpc_wake_up_task() to fail if another thread happens to be calling
rpc_wake_up_task() on the same rpc_task.

Problem noticed by Bruno Faccini.

Signed-off-by: Trond Myklebust &lt;Trond.Myklebust@netapp.com&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] SUNRPC: fix a NULL pointer dereference in net/sunrpc/clnt.c</title>
<updated>2006-03-14T15:57:17Z</updated>
<author>
<name>Adrian Bunk</name>
<email>bunk@stusta.de</email>
</author>
<published>2006-03-14T05:20:47Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=712917d1c002f820b177683f4fd491289bde3c32'/>
<id>urn:sha1:712917d1c002f820b177683f4fd491289bde3c32</id>
<content type='text'>
The Coverity checker spotted this possible NULL pointer dereference in
rpc_new_client().

Signed-off-by: Adrian Bunk &lt;bunk@stusta.de&gt;
Signed-off-by: Trond Myklebust &lt;Trond.Myklebust@netapp.com&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[TCP]: Fix zero port problem in IPv6</title>
<updated>2006-03-13T22:26:12Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2006-03-13T22:26:12Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=3759fa9c55923f719ae944a3f8fbb029b36f759d'/>
<id>urn:sha1:3759fa9c55923f719ae944a3f8fbb029b36f759d</id>
<content type='text'>
When we link a socket into the hash table, we need to make sure that we
set the num/port fields so that it shows us with a non-zero port value
in proc/netlink and on the wire.  This code and comment is copied over
from the IPv4 stack as is.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: arp_tables: fix NULL pointer dereference</title>
<updated>2006-03-13T04:40:43Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2006-03-13T04:40:43Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=31fe4d331729e9687db84521c3ceb8e43390efcf'/>
<id>urn:sha1:31fe4d331729e9687db84521c3ceb8e43390efcf</id>
<content type='text'>
The check is wrong and lets NULL-ptrs slip through since !IS_ERR(NULL)
is true.

Coverity #190

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[IPV4/6]: Fix UFO error propagation</title>
<updated>2006-03-13T04:39:40Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2006-03-13T04:35:12Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=baa829d8926f02ab04be6ec37780810d221c5b4b'/>
<id>urn:sha1:baa829d8926f02ab04be6ec37780810d221c5b4b</id>
<content type='text'>
When ufo_append_data fails err is uninitialized, but returned back.
Strangely gcc doesn't notice it.

Coverity #901 and #902

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[TCP]: tcp_highspeed: fix AIMD table out-of-bounds access</title>
<updated>2006-03-13T04:39:39Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2006-03-13T04:34:53Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=4a1ff6e2bde56cdf176bd54d557b2e15e819f810'/>
<id>urn:sha1:4a1ff6e2bde56cdf176bd54d557b2e15e819f810</id>
<content type='text'>
Covertiy #547

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETLINK]: Fix use-after-free in netlink_recvmsg</title>
<updated>2006-03-13T04:39:38Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2006-03-13T04:34:27Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=cc9a06cd8d6fbb69b4d3c46760c132cfe312fb85'/>
<id>urn:sha1:cc9a06cd8d6fbb69b4d3c46760c132cfe312fb85</id>
<content type='text'>
The skb given to netlink_cmsg_recv_pktinfo is already freed, move it up
a few lines.

Coverity #948

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
</feed>
