summaryrefslogtreecommitdiff
path: root/net
AgeCommit message (Expand)AuthorFilesLines
2018-03-03net: sched: fix use-after-free in tcf_block_put_extJiri Pirko1-6/+7
2018-03-03net_sched: get rid of rcu_barrier() in tcf_block_put_ext()Cong Wang1-20/+9
2018-03-03net: sched: crash on blocks with goto chain actionRoman Kapl1-5/+12
2018-03-03net: sched: fix crash when deleting secondary chainsRoman Kapl1-3/+4
2018-03-03sctp: make use of pre-calculated lenMarcelo Ricardo Leitner1-6/+10
2018-03-03sctp: add a ceiling to optlen in some sockoptsMarcelo Ricardo Leitner1-0/+10
2018-03-03mac80211: mesh: drop frames appearing to be from usJohannes Berg1-0/+2
2018-03-03nl80211: Check for the required netlink attribute presenceHao Chen1-1/+2
2018-03-03ip6_tunnel: allow ip6gre dev mtu to be set below 1280Xin Long1-3/+3
2018-03-03tipc: fix tipc_mon_delete() oops in tipc_enable_bearer() error pathTommi Rantala1-1/+5
2018-03-03tipc: error path leak fixes in tipc_enable_bearer()Tommi Rantala1-1/+4
2018-03-03netfilter: nf_tables: fix potential NULL-ptr deref in nf_tables_dump_obj_done()Hangbin Liu1-2/+4
2018-03-03netfilter: nf_tables: fix chain filter in nf_tables_dump_rules()Pablo Neira Ayuso1-1/+1
2018-03-03ip6_tunnel: get the min mtu properly in ip6_tnl_xmitXin Long1-2/+7
2018-03-03ip6_gre: remove the incorrect mtu limit for ipgre tapXin Long1-0/+1
2018-03-03ip_gre: remove the incorrect mtu limit for ipgre tapXin Long1-0/+1
2018-03-03xfrm: Reinject transport-mode packets through taskletHerbert Xu3-2/+77
2018-03-03sctp: fix the issue that a __u16 variable may overflow in sctp_ulpq_renegeXin Long1-16/+8
2018-03-03ipv6: icmp6: Allow icmp messages to be looped backBrendan McGrath1-0/+1
2018-02-28cfg80211: fix cfg80211_beacon_dupArnd Bergmann1-1/+1
2018-02-28netfilter: drop outermost socket lock in getsockopt()Paolo Abeni2-14/+3
2018-02-25xfrm: Fix stack-out-of-bounds with misconfigured transport mode policies.Steffen Klassert1-0/+9
2018-02-25netfilter: xt_bpf: add overflow checksJann Horn1-0/+6
2018-02-25xfrm: Fix xfrm_input() to verify state is valid when (encap_type < 0)Aviv Heller1-1/+11
2018-02-25VSOCK: fix outdated sk_state value in hvs_release()Stefan Hajnoczi1-1/+1
2018-02-25net_sched: red: Avoid illegal valuesNogah Frankel4-0/+11
2018-02-25sctp: only update outstanding_bytes for transmitted queue when doing prsctp_p...Xin Long1-2/+4
2018-02-25dn_getsockoptdecnet: move nf_{get/set}sockopt outside sock lockPaolo Abeni1-29/+33
2018-02-25net_sched: gen_estimator: fix lockdep splatEric Dumazet1-0/+4
2018-02-25net: avoid skb_warn_bad_offload on IS_ERRWillem de Bruijn1-1/+1
2018-02-25rds: tcp: atomically purge entries from rds_tcp_conn_list during netns deleteSowmini Varadhan2-2/+8
2018-02-25rds: tcp: correctly sequence cleanup on netns deletion.Sowmini Varadhan3-6/+7
2018-02-25netfilter: xt_RATEEST: acquire xt_rateest_mutex for hash insertCong Wang1-5/+17
2018-02-25netfilter: xt_cgroup: initialize info->priv in cgroup_mt_check_v1()Cong Wang1-0/+1
2018-02-25netfilter: on sockopt() acquire sock lock only in the required scopePaolo Abeni4-29/+26
2018-02-25netfilter: ipt_CLUSTERIP: fix out-of-bounds accesses in clusterip_tg_check()Dmitry Vyukov1-3/+13
2018-02-25netfilter: x_tables: avoid out-of-bounds reads in xt_request_find_{match|target}Eric Dumazet1-0/+6
2018-02-25netfilter: x_tables: fix int overflow in xt_alloc_table_info()Dmitry Vyukov1-2/+1
2018-02-25sctp: set frag_point in sctp_setsockopt_maxseg correctlyXin Long1-10/+19
2018-02-25xfrm: check id proto in validate_tmpl()Cong Wang1-0/+15
2018-02-25xfrm: Fix stack-out-of-bounds read on socket policy lookup.Steffen Klassert1-1/+7
2018-02-25xfrm: skip policies marked as dead while rehashingFlorian Westphal1-1/+2
2018-02-25xfrm: fix rcu usage in xfrm_get_type_offloadSabrina Dubroca1-1/+2
2018-02-25xfrm: don't call xfrm_policy_cache_flush while holding spinlockFlorian Westphal1-2/+2
2018-02-25esp: Fix GRO when the headers not fully in the linear part of the skb.Steffen Klassert2-2/+4
2018-02-25mac80211_hwsim: validate number of different channelsJohannes Berg1-2/+0
2018-02-25cfg80211: check dev_set_name() return valueJohannes Berg1-1/+7
2018-02-25kcm: Only allow TCP sockets to be attached to a KCM muxTom Herbert1-2/+7
2018-02-25kcm: Check if sk_user_data already set in kcm_attachTom Herbert1-2/+14
2018-02-229p/trans_virtio: discard zero-length replyGreg Kurz1-1/+2