<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/net, branch v2.6.19</title>
<subtitle>Mirror of https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/
</subtitle>
<id>https://git.shady.money/linux/atom?h=v2.6.19</id>
<link rel='self' href='https://git.shady.money/linux/atom?h=v2.6.19'/>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/'/>
<updated>2006-11-29T04:59:38Z</updated>
<entry>
<title>[NETFILTER]: ipt_REJECT: fix memory corruption</title>
<updated>2006-11-29T04:59:38Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2006-11-29T04:10:21Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=af443b6d90de17f7630621269cf0610d9d772670'/>
<id>urn:sha1:af443b6d90de17f7630621269cf0610d9d772670</id>
<content type='text'>
On devices with hard_header_len &gt; LL_MAX_HEADER ip_route_me_harder()
reallocates the skb, leading to memory corruption when using the stale
tcph pointer to update the checksum.

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: conntrack: fix refcount leak when finding expectation</title>
<updated>2006-11-29T04:59:37Z</updated>
<author>
<name>Yasuyuki Kozakai</name>
<email>yasuyuki.kozakai@toshiba.co.jp</email>
</author>
<published>2006-11-27T18:26:46Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=2e47c264a2e6ea24c27b4987607222202818c1f4'/>
<id>urn:sha1:2e47c264a2e6ea24c27b4987607222202818c1f4</id>
<content type='text'>
All users of __{ip,nf}_conntrack_expect_find() don't expect that
it increments the reference count of expectation.

Signed-off-by: Yasuyuki Kozakai &lt;yasuyuki.kozakai@toshiba.co.jp&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: ctnetlink: fix reference count leak</title>
<updated>2006-11-29T04:59:36Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2006-11-27T18:26:25Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=c537b75a3ba9f5d2569f313742cd379dff6ceb70'/>
<id>urn:sha1:c537b75a3ba9f5d2569f313742cd379dff6ceb70</id>
<content type='text'>
When NFA_NEST exceeds the skb size the protocol reference is leaked.

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: nf_conntrack: fix the race on assign helper to new conntrack</title>
<updated>2006-11-29T04:59:35Z</updated>
<author>
<name>Yasuyuki Kozakai</name>
<email>yasuyuki.kozakai@toshiba.co.jp</email>
</author>
<published>2006-11-27T18:25:59Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=22e7410b760b9c1777839fdd10382c60df8cbda2'/>
<id>urn:sha1:22e7410b760b9c1777839fdd10382c60df8cbda2</id>
<content type='text'>
The found helper cannot be assigned to conntrack after unlocking
nf_conntrack_lock. This tries to find helper to assign again.

Signed-off-by: Yasuyuki Kozakai &lt;yasuyuki.kozakai@toshiba.co.jp&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: nfctnetlink: assign helper to newly created conntrack</title>
<updated>2006-11-29T04:59:34Z</updated>
<author>
<name>Yasuyuki Kozakai</name>
<email>yasuyuki.kozakai@toshiba.co.jp</email>
</author>
<published>2006-11-27T18:25:32Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=dafc741cf23351a6f43895579a72ab8818ba00ae'/>
<id>urn:sha1:dafc741cf23351a6f43895579a72ab8818ba00ae</id>
<content type='text'>
This fixes the bug which doesn't assign helper to newly created
conntrack via nf_conntrack_netlink.

Signed-off-by: Yasuyuki Kozakai &lt;yasuyuki.kozakai@toshiba.co.jp&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[PATCH] bridge: fix possible overflow in get_fdb_entries</title>
<updated>2006-11-29T01:26:50Z</updated>
<author>
<name>Chris Wright</name>
<email>chrisw@sous-sol.org</email>
</author>
<published>2006-11-20T23:02:49Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=ba8379b220509e9448c00a77cf6c15ac2a559cc7'/>
<id>urn:sha1:ba8379b220509e9448c00a77cf6c15ac2a559cc7</id>
<content type='text'>
Make sure to properly clamp maxnum to avoid overflow

Signed-off-by: Chris Wright &lt;chrisw@sous-sol.org&gt;
Acked-by: Eugene Teo &lt;eteo@redhat.com&gt;
Acked-by: Marcel Holtmann &lt;marcel@holtmann.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[XFRM] STATE: Fix to respond error to get operation if no matching entry exists.</title>
<updated>2006-11-25T23:16:52Z</updated>
<author>
<name>Masahide NAKAMURA</name>
<email>nakam@linux-ipv6.org</email>
</author>
<published>2006-11-25T04:34:51Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=9abbffee861c6c56fce27e4eda96a10cf0de0f84'/>
<id>urn:sha1:9abbffee861c6c56fce27e4eda96a10cf0de0f84</id>
<content type='text'>
When application uses XFRM_MSG_GETSA to get state entry through
netlink socket and kernel has no matching one, the application expects
reply message with error status by kernel.

Kernel doesn't send the message back in the case of Mobile IPv6 route
optimization protocols (i.e. routing header or destination options
header). This is caused by incorrect return code "0" from
net/xfrm/xfrm_user.c(xfrm_user_state_lookup) and it makes kernel skip
to acknowledge at net/netlink/af_netlink.c(netlink_rcv_skb).

This patch fix to reply ESRCH to application.

Signed-off-by: Masahide NAKAMURA &lt;nakam@linux-ipv6.org&gt;
Signed-off-by: TAKAMIYA Noriaki &lt;takamiya@po.ntts.co.jp&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NET]: Fix kfifo_alloc() error check.</title>
<updated>2006-11-25T23:16:49Z</updated>
<author>
<name>Akinobu Mita</name>
<email>akinobu.mita@gmail.com</email>
</author>
<published>2006-11-23T04:26:11Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=ac16ca6412d9feb5b2f8fc76a4ed938b5d107f94'/>
<id>urn:sha1:ac16ca6412d9feb5b2f8fc76a4ed938b5d107f94</id>
<content type='text'>
The return value of kfifo_alloc() should be checked by IS_ERR().

Signed-off-by: Akinobu Mita &lt;akinobu.mita@gmail.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[UDP]: Make udp_encap_rcv use pskb_may_pull</title>
<updated>2006-11-25T23:16:48Z</updated>
<author>
<name>Olaf Kirch</name>
<email>okir@suse.de</email>
</author>
<published>2006-11-23T04:11:42Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=753eab76a3337863a0d86ce045fa4eb6c3cbeef9'/>
<id>urn:sha1:753eab76a3337863a0d86ce045fa4eb6c3cbeef9</id>
<content type='text'>
Make udp_encap_rcv use pskb_may_pull

IPsec with NAT-T breaks on some notebooks using the latest e1000 chipset,
when header split is enabled. When receiving sufficiently large packets, the
driver puts everything up to and including the UDP header into the header
portion of the skb, and the rest goes into the paged part. udp_encap_rcv
forgets to use pskb_may_pull, and fails to decapsulate it. Instead, it
passes it up it to the IKE daemon.

Signed-off-by: Olaf Kirch &lt;okir@suse.de&gt;
Signed-off-by: Jean Delvare &lt;jdelvare@suse.de&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: H.323 conntrack: fix crash with CONFIG_IP_NF_CT_ACCT</title>
<updated>2006-11-25T23:16:47Z</updated>
<author>
<name>Faidon Liambotis</name>
<email>paravoid@debian.org</email>
</author>
<published>2006-11-22T05:46:02Z</published>
<link rel='alternate' type='text/html' href='https://git.shady.money/linux/commit/?id=38f7efd52c4f3f0b22c460eadbfe7c42f9ebff82'/>
<id>urn:sha1:38f7efd52c4f3f0b22c460eadbfe7c42f9ebff82</id>
<content type='text'>
H.323 connection tracking code calls ip_ct_refresh_acct() when
processing RCFs and URQs but passes NULL as the skb.
When CONFIG_IP_NF_CT_ACCT is enabled, the connection tracking core tries
to derefence the skb, which results in an obvious panic.
A similar fix was applied on the SIP connection tracking code some time
ago.

Signed-off-by: Faidon Liambotis &lt;paravoid@debian.org&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
</feed>
