From: patchwork-bot+netdevbpf@kernel.org
To: Michael Bommarito <michael.bommarito@gmail.com>
Cc: steffen.klassert@secunet.com, herbert@gondor.apana.org.au,
edumazet@google.com, netdev@vger.kernel.org, davem@davemloft.net,
kuba@kernel.org, pabeni@redhat.com, kuniyu@google.com,
maze@google.com, kees@kernel.org, jlayton@kernel.org,
gustavoars@kernel.org, pablo@netfilter.org, fw@strlen.de,
netfilter-devel@vger.kernel.org, coreteam@netfilter.org,
linux-kernel@vger.kernel.org
Subject: Re: [PATCH net 0/2] ipv4: harden against ihl < 5 IP_HDRINCL packets
Date: Fri, 15 May 2026 23:00:05 +0000 [thread overview]
Message-ID: <177888600564.188709.2225332951271422634.git-patchwork-notify@kernel.org> (raw)
In-Reply-To: <cover.1778614451.git.michael.bommarito@gmail.com>
Hello:
This series was applied to netdev/net.git (main)
by Jakub Kicinski <kuba@kernel.org>:
On Tue, 12 May 2026 16:51:13 -0400 you wrote:
> This series fixes a size_t underflow in net/ipv4/ah4.c:ah_output()
> reachable when a raw IP_HDRINCL socket sends a packet with ihl < 5
> through an xfrm AH policy. Originally triaged on security@kernel.org;
> moving to netdev at Herbert's suggestion so nftables / netfilter
> maintainers can weigh in on a related question (see "Open question"
> below). Herbert also asked for the malformed packet to be rejected
> upstream of AH rather than guarded at the AH consumer; that is
> patch 1/2. v1's AH-side guard is kept here as 2/2 defense-in-depth.
>
> [...]
Here is the summary with links:
- [net,1/2] ipv4: raw: reject IP_HDRINCL packets with ihl < 5
https://git.kernel.org/netdev/net/c/915fab69823a
- [net,2/2] ipv4: ah: harden ah_output options-copy guard against ihl < 5
(no matching commit)
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
prev parent reply other threads:[~2026-05-15 22:59 UTC|newest]
Thread overview: 9+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-05-12 20:51 [PATCH net 0/2] ipv4: harden against ihl < 5 IP_HDRINCL packets Michael Bommarito
2026-05-12 20:51 ` [PATCH net 1/2] ipv4: raw: reject IP_HDRINCL packets with ihl < 5 Michael Bommarito
2026-05-12 20:51 ` [PATCH net 2/2] ipv4: ah: harden ah_output options-copy guard against " Michael Bommarito
2026-05-15 4:20 ` Herbert Xu
2026-05-12 22:34 ` [PATCH net 0/2] ipv4: harden against ihl < 5 IP_HDRINCL packets Pablo Neira Ayuso
2026-05-12 23:05 ` Michael Bommarito
2026-05-15 4:22 ` Herbert Xu
2026-05-15 22:59 ` Jakub Kicinski
2026-05-15 23:00 ` patchwork-bot+netdevbpf [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=177888600564.188709.2225332951271422634.git-patchwork-notify@kernel.org \
--to=patchwork-bot+netdevbpf@kernel.org \
--cc=coreteam@netfilter.org \
--cc=davem@davemloft.net \
--cc=edumazet@google.com \
--cc=fw@strlen.de \
--cc=gustavoars@kernel.org \
--cc=herbert@gondor.apana.org.au \
--cc=jlayton@kernel.org \
--cc=kees@kernel.org \
--cc=kuba@kernel.org \
--cc=kuniyu@google.com \
--cc=linux-kernel@vger.kernel.org \
--cc=maze@google.com \
--cc=michael.bommarito@gmail.com \
--cc=netdev@vger.kernel.org \
--cc=netfilter-devel@vger.kernel.org \
--cc=pabeni@redhat.com \
--cc=pablo@netfilter.org \
--cc=steffen.klassert@secunet.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.