<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/net, branch v2.6.20.13</title>
<subtitle>Linux kernel source tree</subtitle>
<id>https://git.amat.us/linux/atom/net?h=v2.6.20.13</id>
<link rel='self' href='https://git.amat.us/linux/atom/net?h=v2.6.20.13'/>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/'/>
<updated>2007-06-07T21:23:05Z</updated>
<entry>
<title>[PATCH] NETFILTER: {ip, nf}_conntrack_sctp: fix remotely triggerable NULL ptr dereference (CVE-2007-2876)</title>
<updated>2007-06-07T21:23:05Z</updated>
<author>
<name>Patrick McHardy</name>
<email>kaber@trash.net</email>
</author>
<published>2007-06-05T12:14:22Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=13ad357c616a85828fa224c0876a393d1dd6f59f'/>
<id>urn:sha1:13ad357c616a85828fa224c0876a393d1dd6f59f</id>
<content type='text'>
When creating a new connection by sending an unknown chunk type, we
don't transition to a valid state, causing a NULL pointer dereference in
sctp_packet when accessing sctp_timeouts[SCTP_CONNTRACK_NONE].

Fix by don't creating new conntrack entry if initial state is invalid.

Noticed by Vilmos Nebehaj &lt;vilmos.nebehaj@ramsys.hu&gt;

CC: Kiran Kumar Immidi &lt;immidi_kiran@yahoo.com&gt;
Cc: David Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Patrick McHardy &lt;kaber@trash.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
Signed-off-by: Chris Wright &lt;chrisw@sous-sol.org&gt;
</content>
</entry>
<entry>
<title>Fix IRDA oops'er</title>
<updated>2007-05-02T00:05:59Z</updated>
<author>
<name>Olaf Kirch</name>
<email>olaf.kirch@oracle.com</email>
</author>
<published>2007-04-18T22:14:14Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=1ee88fb696591eedd34ee9bbcc0c001609ec7901'/>
<id>urn:sha1:1ee88fb696591eedd34ee9bbcc0c001609ec7901</id>
<content type='text'>
This fixes and OOPS due to incorrect socket orpahning in the
IRDA stack.

[IrDA]: Correctly handling socket error

This patch fixes an oops first reported in mid 2006 - see
http://lkml.org/lkml/2006/8/29/358 The cause of this bug report is that
when an error is signalled on the socket, irda_recvmsg_stream returns
without removing a local wait_queue variable from the socket's sk_sleep
queue. This causes havoc further down the road.

In response to this problem, a patch was made that invoked sock_orphan on
the socket when receiving a disconnect indication. This is not a good fix,
as this sets sk_sleep to NULL, causing applications sleeping in recvmsg
(and other places) to oops.

This is against the latest net-2.6 and should be considered for -stable
inclusion.

Signed-off-by: Olaf Kirch &lt;olaf.kirch@oracle.com&gt;
Signed-off-by: Samuel Ortiz &lt;samuel@sortiz.org&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>Fix netpoll UDP input path</title>
<updated>2007-05-02T00:05:58Z</updated>
<author>
<name>Aubrey.Li</name>
<email>aubreylee@gmail.com</email>
</author>
<published>2007-04-17T21:46:33Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=100f4756d42036cca5968ef82542ecf6bccbc8a1'/>
<id>urn:sha1:100f4756d42036cca5968ef82542ecf6bccbc8a1</id>
<content type='text'>
Netpoll UDP input handler needs to pull up the UDP headers
and handle receive checksum offloading properly just like
the normal UDP input path does else we get corrupted
checksums.

[NET]: Fix UDP checksum issue in net poll mode.

In net poll mode, the current checksum function doesn't consider the
kind of packet which is padded to reach a specific minimum length. I
believe that's the problem causing my test case failed. The following
patch fixed this issue.

Signed-off-by: Aubrey.Li &lt;aubreylee@gmail.com&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>Fix errors in tcp_mem[] calculations.</title>
<updated>2007-05-02T00:05:58Z</updated>
<author>
<name>John Heffner</name>
<email>jheffner@psc.edu</email>
</author>
<published>2007-04-17T21:44:06Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=3300bb14330a902331bcdfd0f69d9b0945585c51'/>
<id>urn:sha1:3300bb14330a902331bcdfd0f69d9b0945585c51</id>
<content type='text'>
In 2.6.18 a change was made to the tcp_mem[] calculations,
but this causes regressions for some folks up to 2.6.20

The following fix to smooth out the calculation from the
pending 2.6.21 tree by John Heffner fixes the problem for
these folks.

[TCP]: Fix tcp_mem[] initialization.

Change tcp_mem initialization function.  The fraction of total memory
is now a continuous function of memory size, and independent of page
size.

Signed-off-by: John Heffner &lt;jheffner@psc.edu&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>knfsd: Use a spinlock to protect sk_info_authunix</title>
<updated>2007-05-02T00:05:53Z</updated>
<author>
<name>NeilBrown</name>
<email>neilb@suse.de</email>
</author>
<published>2007-04-17T02:01:41Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=bd8622520f56b6a0d453ab895ca3272328bf66d0'/>
<id>urn:sha1:bd8622520f56b6a0d453ab895ca3272328bf66d0</id>
<content type='text'>
sk_info_authunix is not being protected properly so the object that
it points to can be cache_put twice, leading to corruption.

We borrow svsk-&gt;sk_defer_lock to provide the protection.  We should probably
rename that lock to have a more generic name - later.

Thanks to Gabriel for reporting this.

Cc: Greg Banks &lt;gnb@melbourne.sgi.com&gt;
Cc: Gabriel Barazer &lt;gabriel@oxeva.fr&gt;
Signed-off-by: Neil Brown &lt;neilb@suse.de&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>IPV6: Fix for RT0 header ipv6 change.</title>
<updated>2007-04-27T21:26:22Z</updated>
<author>
<name>YOSHIFUJI Hideaki</name>
<email>yoshfuji@linux-ipv6.org</email>
</author>
<published>2007-04-27T09:13:02Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=9d08f139275450f9366d85ba09b9a2e09bb33766'/>
<id>urn:sha1:9d08f139275450f9366d85ba09b9a2e09bb33766</id>
<content type='text'>
[IPV6]: Fix thinko in ipv6_rthdr_rcv() changes.

Signed-off-by: YOSHIFUJI Hideaki &lt;yoshfuji@linux-ipv6.org&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>IPV4: Fix OOPS'er added to netlink fib.</title>
<updated>2007-04-27T21:26:22Z</updated>
<author>
<name>Sergey Vlasov</name>
<email>vsu@altlinux.ru</email>
</author>
<published>2007-04-27T09:18:35Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=6af3412cff50b9a7b12b7b9cf6f01b34fbae4624'/>
<id>urn:sha1:6af3412cff50b9a7b12b7b9cf6f01b34fbae4624</id>
<content type='text'>
[IPV4] nl_fib_lookup: Initialise res.r before fib_res_put(&amp;res)

When CONFIG_IP_MULTIPLE_TABLES is enabled, the code in nl_fib_lookup()
needs to initialize the res.r field before fib_res_put(&amp;res) - unlike
fib_lookup(), a direct call to -&gt;tb_lookup does not set this field.

Signed-off-by: Sergey Vlasov &lt;vsu@altlinux.ru&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
<entry>
<title>[PATCH] IPV6: Disallow RH0 by default.</title>
<updated>2007-04-26T05:06:33Z</updated>
<author>
<name>YOSHIFUJI Hideaki</name>
<email>yoshfuji@linux-ipv6.org</email>
</author>
<published>2007-04-26T04:56:57Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=010831ab8436dfd9304b203467566fb6b135c24f'/>
<id>urn:sha1:010831ab8436dfd9304b203467566fb6b135c24f</id>
<content type='text'>
[IPV6]: Disallow RH0 by default.

A security issue is emerging.  Disallow Routing Header Type 0 by default
as we have been doing for IPv4.
Note: We allow RH2 by default because it is harmless.

Signed-off-by: YOSHIFUJI Hideaki &lt;yoshfuji@linux-ipv6.org&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
</content>
</entry>
<entry>
<title>[PATCH] NETLINK: Infinite recursion in netlink.</title>
<updated>2007-04-25T21:12:21Z</updated>
<author>
<name>Alexey Kuznetsov</name>
<email>kuznet@ms2.inr.ac.ru</email>
</author>
<published>2007-04-25T20:59:03Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=9bc1779885f4ce1a4257c5640c70b75d2ae124ad'/>
<id>urn:sha1:9bc1779885f4ce1a4257c5640c70b75d2ae124ad</id>
<content type='text'>
[NETLINK]: Infinite recursion in netlink.

Reply to NETLINK_FIB_LOOKUP messages were misrouted back to kernel,
which resulted in infinite recursion and stack overflow.

The bug is present in all kernel versions since the feature appeared.

The patch also makes some minimal cleanup:

1. Return something consistent (-ENOENT) when fib table is missing
2. Do not crash when queue is empty (does not happen, but yet)
3. Put result of lookup

Signed-off-by: Alexey Kuznetsov &lt;kuznet@ms2.inr.ac.ru&gt;
Signed-off-by: David S. Miller &lt;davem@davemloft.net&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;
</content>
</entry>
<entry>
<title>softmac: avoid assert in ieee80211softmac_wx_get_rate</title>
<updated>2007-04-13T20:47:17Z</updated>
<author>
<name>John W. Linville</name>
<email>linville@tuxdriver.com</email>
</author>
<published>2007-04-04T19:30:35Z</published>
<link rel='alternate' type='text/html' href='https://git.amat.us/linux/commit/?id=3c163bc0b44d31618fa8f08a5e149335f6c8cbc4'/>
<id>urn:sha1:3c163bc0b44d31618fa8f08a5e149335f6c8cbc4</id>
<content type='text'>
[PATCH] softmac: avoid assert in ieee80211softmac_wx_get_rate

Unconfigured bcm43xx device can hit an assert() during wx_get_rate
queries.  This is because bcm43xx calls ieee80211softmac_start late
(i.e. during open instead of probe).

   bcm43xx_net_open -&gt;
      bcm43xx_init_board -&gt;
         bcm43xx_select_wireless_core -&gt;
            ieee80211softmac_start

Fix is to check that device is running before completing
ieee80211softmac_wx_get_rate.

Signed-off-by: John W. Linville &lt;linville@tuxdriver.com&gt;
Cc: Chuck Ebbert &lt;cebbert@redhat.com&gt;
Signed-off-by: Greg Kroah-Hartman &lt;gregkh@suse.de&gt;

</content>
</entry>
</feed>
