From mboxrd@z Thu Jan 1 00:00:00 1970 From: Steffen Klassert Subject: pull request (net): ipsec 2018-07-27 Date: Fri, 27 Jul 2018 08:51:49 +0200 Message-ID: <20180727065154.28557-1-steffen.klassert@secunet.com> Mime-Version: 1.0 Content-Type: text/plain Cc: Herbert Xu , Steffen Klassert , To: David Miller Return-path: Received: from a.mx.secunet.com ([62.96.220.36]:55982 "EHLO a.mx.secunet.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729488AbeG0IM0 (ORCPT ); Fri, 27 Jul 2018 04:12:26 -0400 Sender: netdev-owner@vger.kernel.org List-ID: 1) Fix PMTU handling of vti6. We update the PMTU on the xfrm dst_entry which is not cached anymore after the flowchache removal. So update the PMTU of the original dst_entry instead. From Eyal Birger. 2) Fix a leak of kernel memory to userspace. From Eric Dumazet. 3) Fix a possible dst_entry memleak in xfrm_lookup_route. From Tommi Rantala. 4) Fix a skb leak in case we can't call nlmsg_multicast from xfrm_nlmsg_multicast. From Florian Westphal. 5) Fix a leak of a temporary buffer in the error path of esp6_input. From Zhen Lei. Please pull or let me know if there are problems. Thanks! The following changes since commit 1c8c5a9d38f607c0b6fd12c91cbe1a4418762a21: Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next (2018-06-06 18:39:49 -0700) are available in the git repository at: git://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec.git master for you to fetch changes up to 7284fdf39a912322ce97de2d30def3c6068a418c: esp6: fix memleak on error path in esp6_input (2018-06-27 17:32:11 +0200) ---------------------------------------------------------------- Eric Dumazet (1): xfrm_user: prevent leaking 2 bytes of kernel memory Eyal Birger (1): vti6: fix PMTU caching and reporting on xmit Florian Westphal (1): xfrm: free skb if nlsk pointer is NULL Tommi Rantala (1): xfrm: fix missing dst_release() after policy blocking lbcast and multicast Zhen Lei (1): esp6: fix memleak on error path in esp6_input net/ipv6/esp6.c | 4 +++- net/ipv6/ip6_vti.c | 11 ++++++----- net/xfrm/xfrm_policy.c | 3 +++ net/xfrm/xfrm_user.c | 18 +++++++++++------- 4 files changed, 23 insertions(+), 13 deletions(-)