From mboxrd@z Thu Jan 1 00:00:00 1970 From: David Miller Subject: Re: pull request (net): ipsec 2018-05-31 Date: Fri, 01 Jun 2018 13:26:24 -0400 (EDT) Message-ID: <20180601.132624.1112113043537294329.davem@davemloft.net> References: <20180531102326.5728-1-steffen.klassert@secunet.com> Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Cc: herbert@gondor.apana.org.au, netdev@vger.kernel.org To: steffen.klassert@secunet.com Return-path: Received: from shards.monkeyblade.net ([184.105.139.130]:49284 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751502AbeFAR00 (ORCPT ); Fri, 1 Jun 2018 13:26:26 -0400 In-Reply-To: <20180531102326.5728-1-steffen.klassert@secunet.com> Sender: netdev-owner@vger.kernel.org List-ID: From: Steffen Klassert Date: Thu, 31 May 2018 12:23:24 +0200 > 1) Avoid possible overflow of the offset variable > in _decode_session6(), this fixes an infinite > lookp there. From Eric Dumazet. > > 2) We may use an error pointer in the error path of > xfrm_bundle_create(). Fix this by returning this > pointer directly to the caller. > > Please pull or let me know if there are problems. Pulled, thanks Steffen.