<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/net, branch v2.6.16.1</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/net?h=v2.6.16.1</id>
<link rel='self' href='https://git.amat.us/linux/atom/net?h=v2.6.16.1'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2006-03-28T06:47:30Z</updated>
<entry>
<title>[PATCH] NET: Ensure device name passed to SO_BINDTODEVICE is NULL terminated.</title>
<updated>2006-03-28T06:47:30Z</updated>
<author>
<name>David S. Miller</name>
<email>davem@davemloft.net</email>
</author>
<published>2006-03-24T06:54:18Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=d4852ff21818a906e603815c5951d0ef382cd851'/>
<id>urn:sha1:d4852ff21818a906e603815c5951d0ef382cd851</id>
<content type='text'>
The user can pass us arbitrary garbage so we should ensure the
string they give us is null terminated before we pass it on
to dev_get_by_index() et al.

Found by Solar Designer.

Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Chris Wright &lt;chrisw@sous-sol.org&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
</content>
</entry>
<entry>
<title>[PATCH] TCP: Do not use inet-&gt;id of global tcp_socket when sending RST (CVE-2006-1242)</title>
<updated>2006-03-28T06:47:30Z</updated>
<author>
<name>Alexey Kuznetsov</name>
<email>kuznet@ms2.inr.ac.ru</email>
</author>
<published>2006-03-22T22:34:42Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=6f78133bf7a06845afee5bcdff7c276bbceaaf55'/>
<id>urn:sha1:6f78133bf7a06845afee5bcdff7c276bbceaaf55</id>
<content type='text'>
The problem is in ip_push_pending_frames(), which uses:

        if (!df) {
                __ip_select_ident(iph, &amp;rt-&gt;u.dst, 0);
        } else {
                iph-&gt;id = htons(inet-&gt;id++);
        }

instead of ip_select_ident().

Right now I think the code is a nonsense. Most likely, I copied it from
old ip_build_xmit(), where it was really special, we had to decide
whether to generate unique ID when generating the first (well, the last)
fragment.

In ip_push_pending_frames() it does not make sense, it should use plain
ip_select_ident() instead.

Signed-off-by: Alexey Kuznetsov &lt;kuznet@ms2.inr.ac.ru&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Chris Wright &lt;chrisw@sous-sol.org&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
</content>
</entry>
<entry>
<title>[AX.25]: Fix potencial memory hole.</title>
<updated>2006-03-19T21:20:06Z</updated>
<author>
<name>Ralf Baechle DL5RB</name>
<email>ralf@linux-mips.org</email>
</author>
<published>2006-03-19T21:20:06Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=c7c694d196a39af6e644e24279953d04f30362db'/>
<id>urn:sha1:c7c694d196a39af6e644e24279953d04f30362db</id>
<content type='text'>
If the AX.25 dialect chosen by the sysadmin is set to DAMA master / 3
(or DAMA slave / 2, if CONFIG_AX25_DAMA_SLAVE=n) ax25_kick() will fall
through the switch statement without calling ax25_send_iframe() or any
other function that would eventually free skbn thus leaking the packet.

Fix by restricting the sysctl inferface to allow only actually supported
AX.25 dialects.

The system administration mistake needed for this to happen is rather
unlikely, so this is an uncritical hole.

Coverity #651.

Signed-off-by: Ralf Baechle DL5RB &lt;ralf@linux-mips.org&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[PATCH] ieee80211: Fix QoS is not active problem</title>
<updated>2006-03-15T21:16:07Z</updated>
<author>
<name>Hong Liu</name>
<email>hong.liu@intel.com</email>
</author>
<published>2006-03-08T02:50:20Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=72df16f109b73be37977a26d342e9103e8851cb6'/>
<id>urn:sha1:72df16f109b73be37977a26d342e9103e8851cb6</id>
<content type='text'>
Fix QoS is not active even the network and the card is QOS enabled.
The problem is we pass the wrong ieee80211_network address to
ipw_handle_beacon/ipw_handle_probe_response, thus the
ieee80211_network-&gt;qos_data.active will not be set, causing the driver
not sending QoS frames at all.

Signed-off-by: Hong Liu &lt;hong.liu@intel.com&gt;
Signed-off-by: Zhu Yi &lt;yi.zhu@intel.com&gt;
Signed-off-by: John W. Linville &lt;linville@tuxdriver.com&gt;
</content>
</entry>
<entry>
<title>[PATCH] ieee80211: Fix CCMP decryption problem when QoS is enabled</title>
<updated>2006-03-15T21:11:55Z</updated>
<author>
<name>Zhu Yi</name>
<email>yi.zhu@intel.com</email>
</author>
<published>2006-02-28T07:10:36Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=0df7861240b3484dea52d1f5782c69fd95b6cf23'/>
<id>urn:sha1:0df7861240b3484dea52d1f5782c69fd95b6cf23</id>
<content type='text'>
Use the correct STYPE for Qos data.

Signed-off-by: Zhu Yi &lt;yi.zhu@intel.com&gt;
Signed-off-by: John W. Linville &lt;linville@tuxdriver.com&gt;
</content>
</entry>
<entry>
<title>[PATCH] SUNRPC: Fix potential deadlock in RPC code</title>
<updated>2006-03-14T15:57:18Z</updated>
<author>
<name>Trond Myklebust</name>
<email>Trond.Myklebust@netapp.com</email>
</author>
<published>2006-03-14T05:20:48Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=e6d83d55698b73b4d5d55d3d7715a4c26030d577'/>
<id>urn:sha1:e6d83d55698b73b4d5d55d3d7715a4c26030d577</id>
<content type='text'>
In rpc_wake_up() and rpc_wake_up_status(), it is possible for the call to
__rpc_wake_up_task() to fail if another thread happens to be calling
rpc_wake_up_task() on the same rpc_task.

Problem noticed by Bruno Faccini.

Signed-off-by: Trond Myklebust &lt;Trond.Myklebust@netapp.com&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[PATCH] SUNRPC: fix a NULL pointer dereference in net/sunrpc/clnt.c</title>
<updated>2006-03-14T15:57:17Z</updated>
<author>
<name>Adrian Bunk</name>
<email>bunk@stusta.de</email>
</author>
<published>2006-03-14T05:20:47Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=712917d1c002f820b177683f4fd491289bde3c32'/>
<id>urn:sha1:712917d1c002f820b177683f4fd491289bde3c32</id>
<content type='text'>
The Coverity checker spotted this possible NULL pointer dereference in
rpc_new_client().

Signed-off-by: Adrian Bunk &lt;bunk@stusta.de&gt;
Signed-off-by: Trond Myklebust &lt;Trond.Myklebust@netapp.com&gt;
Signed-off-by: Andrew Morton &lt;akpm@osdl.org&gt;
Signed-off-by: Linus Torvalds &lt;torvalds@osdl.org&gt;
</content>
</entry>
<entry>
<title>[TCP]: Fix zero port problem in IPv6</title>
<updated>2006-03-13T22:26:12Z</updated>
<author>
<name>Herbert Xu</name>
<email>herbert@gondor.apana.org.au</email>
</author>
<published>2006-03-13T22:26:12Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=3759fa9c55923f719ae944a3f8fbb029b36f759d'/>
<id>urn:sha1:3759fa9c55923f719ae944a3f8fbb029b36f759d</id>
<content type='text'>
When we link a socket into the hash table, we need to make sure that we
set the num/port fields so that it shows us with a non-zero port value
in proc/netlink and on the wire.  This code and comment is copied over
from the IPv4 stack as is.

Signed-off-by: Herbert Xu &lt;herbert@gondor.apana.org.au&gt;
</content>
</entry>
<entry>
<title>[NETFILTER]: arp_tables: fix NULL pointer dereference</title>
<updated>2006-03-13T04:40:43Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2006-03-13T04:40:43Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=31fe4d331729e9687db84521c3ceb8e43390efcf'/>
<id>urn:sha1:31fe4d331729e9687db84521c3ceb8e43390efcf</id>
<content type='text'>
The check is wrong and lets NULL-ptrs slip through since !IS_ERR(NULL)
is true.

Coverity #190

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
<entry>
<title>[IPV4/6]: Fix UFO error propagation</title>
<updated>2006-03-13T04:39:40Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2006-03-13T04:35:12Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=baa829d8926f02ab04be6ec37780810d221c5b4b'/>
<id>urn:sha1:baa829d8926f02ab04be6ec37780810d221c5b4b</id>
<content type='text'>
When ufo_append_data fails err is uninitialized, but returned back.
Strangely gcc doesn't notice it.

Coverity #901 and #902

Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
</content>
</entry>
</feed>
