summaryrefslogtreecommitdiff
path: root/net
AgeCommit message (Expand)AuthorFilesLines
2019-01-31can: bcm: check timer values before ktime conversionOliver Hartkopp1-0/+27
2019-01-31ipfrag: really prevent allocation on netns exitPaolo Abeni1-1/+1
2019-01-31net_sched: refetch skb protocol for each filterCong Wang1-2/+1
2019-01-31net: ipv4: Fix memory leak in network namespace dismantleIdo Schimmel2-4/+14
2019-01-31openvswitch: Avoid OOB read when parsing flow nlattrsRoss Lagerwall1-1/+1
2019-01-31net: Fix usage of pskb_trim_rcsumRoss Lagerwall3-0/+3
2019-01-31net: bridge: Fix ethernet header pointer before check skb forwardableYunjian Wang1-5/+4
2019-01-26net: call sk_dst_reset when set SO_DONTROUTEyupeng1-0/+1
2019-01-26ipv6: Take rcu_read_lock in __inet6_bind for mapped addressesDavid Ahern1-1/+4
2019-01-26ipv6: Consider sk_bound_dev_if when binding a socket to a v4 mapped addressDavid Ahern1-1/+10
2019-01-23tipc: fix uninit-value in tipc_nl_compat_doitYing Xue1-1/+1
2019-01-23tipc: fix uninit-value in tipc_nl_compat_name_table_dumpYing Xue1-0/+2
2019-01-23tipc: fix uninit-value in tipc_nl_compat_link_setYing Xue1-0/+5
2019-01-23tipc: fix uninit-value in tipc_nl_compat_bearer_enableYing Xue1-0/+26
2019-01-23tipc: fix uninit-value in tipc_nl_compat_link_reset_statsYing Xue1-0/+15
2019-01-23sctp: allocate sctp_sockaddr_entry with kzallocXin Long2-7/+2
2019-01-23netfilter: ebtables: account ebt_table_info to kmemcgShakeel Butt1-2/+4
2019-01-23sunrpc: handle ENOMEM in rpcb_getport_asyncJ. Bruce Fields1-0/+8
2019-01-23ip: on queued skb use skb_header_pointer instead of pskb_may_pullWillem de Bruijn2-13/+9
2019-01-23packet: Do not leak dev refcounts on error exitJason Gunthorpe1-2/+2
2019-01-23net: bridge: fix a bug on using a neighbour cache entry without checking its ...JianJhen Chen1-1/+1
2019-01-23ipv6: fix kernel-infoleak in ipv6_local_error()Eric Dumazet1-0/+1
2019-01-23can: gw: ensure DLC boundaries after CAN frame modificationOliver Hartkopp1-3/+27
2019-01-16sunrpc: use-after-free in svc_process_common()Vasily Averin3-6/+10
2019-01-139p/net: put a lower bound on msizeDominique Martinet1-0/+21
2019-01-13sunrpc: use SVC_NET() in svcauth_gss_* functionsVasily Averin1-4/+4
2019-01-13sunrpc: fix cache_head leak due to queued requestVasily Averin1-1/+9
2019-01-13libceph: fix CEPH_FEATURE_CEPHX_V2 check in calc_signature()Ilya Dryomov1-1/+1
2019-01-13SUNRPC: Fix a race with XPRT_CONNECTINGTrond Myklebust1-2/+2
2019-01-13netfilter: ipset: do not call ipset_nest_end after nla_nest_cancelPan Bian1-1/+1
2019-01-13netfilter: seqadj: re-load tcp header pointer after possible head reallocationFlorian Westphal1-3/+4
2019-01-13xfrm: Fix bucket count reported to userspaceBenjamin Poirier1-1/+1
2019-01-09sock: Make sock->sk_stamp thread-safeDeepa Dinamani3-7/+13
2019-01-09tipc: compare remote and local protocols in tipc_udp_enable()Cong Wang1-0/+5
2019-01-09tipc: use lock_sock() in tipc_sk_reinit()Cong Wang1-2/+6
2019-01-09VSOCK: Send reset control packet when socket is partially boundJorgen Hansen1-17/+50
2019-01-09tipc: fix a double kfree_skb()Cong Wang1-3/+1
2019-01-09sctp: initialize sin6_flowinfo for ipv6 addrs in sctp_inet6addr_eventXin Long1-0/+1
2019-01-09packet: validate address length if non-zeroWillem de Bruijn1-2/+2
2019-01-09packet: validate address lengthWillem de Bruijn1-0/+4
2019-01-09netrom: fix locking in nr_find_socket()Cong Wang1-5/+10
2019-01-09net: ipv4: do not handle duplicate fragments as overlappingMichal Kubecek1-6/+12
2019-01-09ipv6: tunnels: fix two use-after-freeEric Dumazet2-0/+2
2019-01-09ipv6: explicitly initialize udp6_addr in udp_sock_create6()Cong Wang1-1/+2
2019-01-09ieee802154: lowpan_header_create check must check daddrWillem de Bruijn1-0/+3
2019-01-09ax25: fix a use-after-free in ax25_fillin_cb()Cong Wang2-2/+11
2019-01-09ipv4: Fix potential Spectre v1 vulnerabilityGustavo A. R. Silva1-0/+3
2019-01-09ip6mr: Fix potential Spectre v1 vulnerabilityGustavo A. R. Silva1-0/+4
2018-12-21SUNRPC: Fix a potential race in xprt_connect()Trond Myklebust1-2/+9
2018-12-21mac80211: Fix condition validating WMM IEIlan Peer1-1/+1