summaryrefslogtreecommitdiffstats
path: root/net
Commit message (Expand)AuthorAgeFilesLines
* rfkill: gpio: fix memory leak in probe error pathJohan Hovold2018-05-161-1/+6
* tcp: fix TCP_REPAIR_QUEUE bound checkingEric Dumazet2018-05-161-1/+1
* soreuseport: initialise timewait reuseport fieldEric Dumazet2018-05-161-0/+1
* net: fix uninit-value in __hw_addr_add_ex()Eric Dumazet2018-05-161-2/+2
* net: initialize skb->peeked when cloningEric Dumazet2018-05-161-0/+1
* netlink: fix uninit-value in netlink_sendmsgEric Dumazet2018-05-161-0/+2
* libceph: validate con->state at the top of try_write()Ilya Dryomov2018-05-021-0/+7
* ipv6: add RTA_TABLE and RTA_PREFSRC to rtm_ipv6_policyEric Dumazet2018-04-291-0/+2
* llc: delete timers synchronously in llc_sk_free()Cong Wang2018-04-292-9/+22
* net: af_packet: fix race in PACKET_{R|T}X_RINGEric Dumazet2018-04-291-10/+18
* tcp: md5: reject TCP_MD5SIG or TCP_MD5SIG_EXT on established socketsEric Dumazet2018-04-291-2/+4
* packet: fix bitfield update raceWillem de Bruijn2018-04-292-21/+49
* llc: fix NULL pointer deref for SOCK_ZAPPEDCong Wang2018-04-291-9/+12
* llc: hold llc_sap before release_sock()Cong Wang2018-04-291-0/+7
* tcp: don't read out-of-bounds opsizeJann Horn2018-04-291-5/+2
* l2tp: check sockaddr length in pppol2tp_connect()Guillaume Nault2018-04-291-0/+7
* KEYS: DNS: limit the length of option stringsEric Biggers2018-04-291-7/+6
* rpc_pipefs: fix double-dput()Al Viro2018-04-241-0/+1
* ipv6: the entire IPv6 header chain must fit the first fragmentPaolo Abeni2018-04-131-4/+9
* net sched actions: fix dumping which requires several messages to user spaceCraig Dillabaugh2018-04-131-1/+3
* ip6_tunnel: better validate user provided tunnel namesEric Dumazet2018-04-131-2/+5
* vti6: better validate user provided tunnel namesEric Dumazet2018-04-131-2/+5
* ip6_gre: better validate user provided tunnel namesEric Dumazet2018-04-131-3/+5
* ipv6: sit: better validate user provided tunnel namesEric Dumazet2018-04-131-3/+5
* ip_tunnel: better validate user provided tunnel namesEric Dumazet2018-04-131-5/+6
* net: fool proof dev_valid_name()Eric Dumazet2018-04-131-1/+1
* sctp: sctp_sockaddr_af must check minimal addr length for AF_INET6Eric Dumazet2018-04-131-5/+8
* sctp: do not leak kernel memory to user spaceEric Dumazet2018-04-131-1/+3
* netlink: make sure nladdr has correct size in netlink_connect()Alexander Potapenko2018-04-131-0/+3
* net: fix possible out-of-bound read in skb_network_protocol()Eric Dumazet2018-04-131-1/+1
* rxrpc: check return value of skb_to_sgvec alwaysJason A. Donenfeld2018-04-131-6/+15
* ipsec: check return value of skb_to_sgvec alwaysJason A. Donenfeld2018-04-134-12/+28
* Bluetooth: Send HCI Set Event Mask Page 2 command only when neededMarcel Holtmann2018-04-131-2/+15
* sctp: fix recursive locking warning in sctp_do_peeloffXin Long2018-04-131-2/+2
* skbuff: return -EMSGSIZE in skb_to_sgvec to prevent overflowJason A. Donenfeld2018-04-131-23/+42
* l2tp: fix missing print session offset infoHangbin Liu2018-04-131-0/+2
* net: llc: add lock_sock in llc_ui_bind to avoid a race conditionlinzhang2018-04-131-0/+3
* net: move somaxconn init from sysctl codeRoman Kapl2018-04-132-2/+19
* netfilter: ctnetlink: fix incorrect nf_ct_put during hash resizeLiping Zhang2018-04-131-1/+6
* libceph: NULL deref on crush_decode() error pathDan Carpenter2018-04-131-0/+1
* xfrm: fix state migration copy replay sequence numbersAntony Antony2018-04-131-0/+2
* net: x25: fix one potential use-after-free issuelinzhang2018-04-132-9/+20
* neighbour: update neigh timestamps iff update is effectiveIhar Hrachyshka2018-04-131-4/+10
* ipv6: avoid dad-failures for addresses with NODADMahesh Bandewar2018-04-131-1/+4
* mac80211: bail out from prep_connection() if a reconfig is ongoingLuca Coelho2018-04-131-0/+4
* af_key: Fix slab-out-of-bounds in pfkey_compile_policy.Steffen Klassert2018-04-131-1/+1
* Bluetooth: Fix missing encryption refresh on Security RequestSzymon Janc2018-04-081-1/+7
* netfilter: x_tables: add and use xt_check_proc_nameFlorian Westphal2018-04-083-5/+36
* netfilter: bridge: ebt_among: add more missing match size checksFlorian Westphal2018-04-081-0/+34
* xfrm: Refuse to insert 32 bit userspace socket policies on 64 bit systemsSteffen Klassert2018-04-081-0/+5