Published Title Version Author Status
2025-10-27 02:34 UTC xfrm: Remove redundant state inner mode check 2 jianbol@nvidia.com in progress
2025-10-24 16:13 UTC net: cxgb4/ch_ipsec: fix potential use-after-free in ch_ipsec_xfrm_add_state() callback 4 pavel.zhigulin@kaspersky.com finished in 1h1m0s
2025-10-24 02:31 UTC xfrm: Correct inner packet family determination 1 jianbol@nvidia.com finished in 3h42m0s
2025-10-23 12:24 UTC net: key: Fix potential integer overflow in set_ipsecrequest 1 clf700383@gmail.com finished in 3h43m0s
2025-10-22 06:10 UTC pfkey: Deprecate pfkey 1 steffen.klassert@secunet.com finished in 3h41m0s
2025-10-22 06:03 UTC esp: Consolidate esp4 and esp6. 1 steffen.klassert@secunet.com finished in 31m0s
[1 findings]
2025-10-21 10:09 UTC fix poll behaviour for TCP-based tunnel protocols 3 ralf@mandelbit.com finished in 4h1m0s
2025-10-21 03:00 UTC fix integer overflow in set_ipsecrequest 1 clf700383@gmail.com finished in 3h44m0s
2025-10-21 01:35 UTC xfrm: IPsec hardware offload performance improvements 1 jianbol@nvidia.com finished in 3h39m0s
2025-10-20 11:20 UTC Re: [syzbot] [net?] WARNING in xfrm6_tunnel_net_exit (4) 1 wangliang74@huawei.com finished in 5m0s
2025-10-20 11:05 UTC Re: [syzbot] [net?] WARNING in xfrm_state_fini (4) 1 wangliang74@huawei.com finished in 3h44m0s
2025-10-20 07:37 UTC fix poll behaviour for TCP-based tunnel protocols 2 ralf@mandelbit.com finished in 4h11m0s
2025-10-20 02:49 UTC net: key: Validate address family in set_ipsecrequest() 1 ssrane_b23@ee.vjti.ac.in skipped
2025-10-19 18:14 UTC net: key: Validate address family in set_ipsecrequest() 1 ssrane_b23@ee.vjti.ac.in finished in 3h41m0s
2025-10-19 02:34 UTC key: No support for family zero 1 eadavis@qq.com finished in 3h39m0s
2025-10-16 10:39 UTC xfrm: misc fixes 1 sd@queasysnail.net finished in 4h20m0s
2025-10-13 09:58 UTC net: cxgb4/ch_ipsec: fix potential use-after-free in ch_ipsec_xfrm_add_state() callback 3 pavel.zhigulin@kaspersky.com finished in 52m0s
2025-10-06 13:47 UTC net: cxgb4/ch_ipsec: fix potential use-after-free in ch_ipsec_xfrm_add_state() callback 2 pavel.zhigulin@kaspersky.com finished in 45m0s
2025-10-01 11:16 UTC net: fix potential use-after-free in ch_ipsec_xfrm_add_state() callback 1 pavel.zhigulin@kaspersky.com finished in 40m0s
2025-09-26 05:30 UTC pull request (net-next): ipsec-next 2025-09-26 1 steffen.klassert@secunet.com finished in 3h39m0s
2025-09-22 07:34 UTC pull request (net): ipsec 2025-09-22 1 steffen.klassert@secunet.com finished in 3h42m0s
2025-09-21 02:27 UTC net/xfrm: Refuse to allocate xfrm_state with SPI value 0 1 zlatistiv@gmail.com finished in 3h40m0s
2025-09-18 07:19 UTC net/mlx5e: Support RSS for IPSec offload 1 tariqt@nvidia.com finished in 43m0s
2025-09-10 15:22 UTC xfrm: fix offloading of cross-family tunnels 2 sd@queasysnail.net finished in 3h44m0s
2025-09-05 16:58 UTC ipv6: snmp: avoid performance issue with RATELIMITHOST 2 edumazet@google.com finished in 4h9m0s
2025-08-29 08:54 UTC xfrm: xfrm_alloc_spi shouldn't use 0 as SPI 1 sd@queasysnail.net finished in 3h40m0s
2025-08-26 16:25 UTC Reference Counting Vulnerability in Linux XFRM PolicyManagement 1 qianjiaru77@gmail.com finished in 49m0s
2025-08-25 13:37 UTC ipv4: Convert ->flowi4_tos to dscp_t. 2 gnault@redhat.com finished in 3h52m0s
2025-08-25 12:50 UTC xfrm: fix offloading of cross-family tunnels 1 sd@queasysnail.net finished in 3h42m0s
2025-08-20 23:32 UTC ipv4: Convert ->flowi4_tos to dscp_t. 1 gnault@redhat.com finished in 3h42m0s
2025-08-18 15:40 UTC net: Convert to skb_dstref_steal and skb_dstref_restore 2 sdf@fomichev.me finished in 3h50m0s
[1 findings]
2025-08-14 19:32 UTC xfrm: xfrm_user: use strscpy() for alg_name 1 miguelgarciaroman8@gmail.com finished in 3h49m0s
2025-08-12 15:52 UTC net: Convert to skb_dst_reset and skb_dst_restore 1 sdf@fomichev.me finished in 3h46m0s
[1 findings]
2025-08-12 15:51 UTC net: ipv6: fix field-spanning memcpy warning in AH output 3 charmitro@posteo.net finished in 3h50m0s
2025-08-11 09:19 UTC pull request (net): ipsec 2025-08-11 1 steffen.klassert@secunet.com finished in 3h51m0s
2025-08-04 09:26 UTC xfrm: some fixes for GSO with SW crypto 2 sd@queasysnail.net finished in 4h37m0s
2025-08-04 09:05 UTC xfrm: flush all states in xfrm_state_fini 1 sd@queasysnail.net finished in 4h34m0s
2025-07-28 15:17 UTC xfrm: some fixes for GSO with SW crypto 1 sd@queasysnail.net finished in 3h48m0s
2025-07-27 21:51 UTC net: ipv6: fix buffer overflow in AH output 2 charmitro@posteo.net finished in 3h42m0s
2025-07-27 21:48 UTC net: ipv6: fix buffer overflow in AH output 1 charmitro@posteo.net finished in 3h44m0s
2025-07-23 08:03 UTC pull request (net-next): ipsec-next 2025-07-23 1 steffen.klassert@secunet.com finished in 3h49m0s
2025-07-23 07:53 UTC pull request (net): ipsec 2025-07-23 1 steffen.klassert@secunet.com finished in 3h49m0s
2025-07-07 16:05 UTC af_key: Add check for the return value of pfkey_sadb2xfrm_user_sec_ctx() 2 haoxiang_li2024@163.com finished in 3h38m0s
2025-07-06 14:58 UTC xfrm: bonding: Add XFRM packet-offload for active-backup 2 mrarmonius@gmail.com skipped
2025-07-04 14:54 UTC ipsec: fix splat due to ipcomp fallback tunnel 1 sd@queasysnail.net finished in 6h7m0s
2025-07-04 06:55 UTC pfkey: Deprecate pfkey 1 steffen.klassert@secunet.com finished in 3h34m0s
2025-07-03 09:16 UTC af_key: Add check for the return value of pfkey_sadb2xfrm_user_sec_ctx() 1 haoxiang_li2024@163.com finished in 3h52m0s
2025-07-03 08:45 UTC xfrm: Skip redundant statistics update for crypto offload 1 jianbol@nvidia.com finished in 3h38m0s
2025-06-30 12:38 UTC xfrm: Duplicate SPI Handling 1 saakashkumar@marvell.com finished in 3h43m0s
2025-06-29 21:06 UTC [PATH xfrm offload] xfrm: bonding: Add xfrm packet offload for active-backup mode 1 mrarmonius@gmail.com finished in 4h6m0s