| Published | Title | Version | Author | Status |
|---|---|---|---|---|
| 2025-10-27 02:34 UTC | xfrm: Remove redundant state inner mode check | 2 | jianbol@nvidia.com | in progress |
| 2025-10-24 16:13 UTC | net: cxgb4/ch_ipsec: fix potential use-after-free in ch_ipsec_xfrm_add_state() callback | 4 | pavel.zhigulin@kaspersky.com | finished in 1h1m0s |
| 2025-10-24 02:31 UTC | xfrm: Correct inner packet family determination | 1 | jianbol@nvidia.com | finished in 3h42m0s |
| 2025-10-23 12:24 UTC | net: key: Fix potential integer overflow in set_ipsecrequest | 1 | clf700383@gmail.com | finished in 3h43m0s |
| 2025-10-22 06:10 UTC | pfkey: Deprecate pfkey | 1 | steffen.klassert@secunet.com | finished in 3h41m0s |
| 2025-10-22 06:03 UTC | esp: Consolidate esp4 and esp6. | 1 | steffen.klassert@secunet.com |
finished
in 31m0s
[1 findings] |
| 2025-10-21 10:09 UTC | fix poll behaviour for TCP-based tunnel protocols | 3 | ralf@mandelbit.com | finished in 4h1m0s |
| 2025-10-21 03:00 UTC | fix integer overflow in set_ipsecrequest | 1 | clf700383@gmail.com | finished in 3h44m0s |
| 2025-10-21 01:35 UTC | xfrm: IPsec hardware offload performance improvements | 1 | jianbol@nvidia.com | finished in 3h39m0s |
| 2025-10-20 11:20 UTC | Re: [syzbot] [net?] WARNING in xfrm6_tunnel_net_exit (4) | 1 | wangliang74@huawei.com | finished in 5m0s |
| 2025-10-20 11:05 UTC | Re: [syzbot] [net?] WARNING in xfrm_state_fini (4) | 1 | wangliang74@huawei.com | finished in 3h44m0s |
| 2025-10-20 07:37 UTC | fix poll behaviour for TCP-based tunnel protocols | 2 | ralf@mandelbit.com | finished in 4h11m0s |
| 2025-10-20 02:49 UTC | net: key: Validate address family in set_ipsecrequest() | 1 | ssrane_b23@ee.vjti.ac.in | skipped |
| 2025-10-19 18:14 UTC | net: key: Validate address family in set_ipsecrequest() | 1 | ssrane_b23@ee.vjti.ac.in | finished in 3h41m0s |
| 2025-10-19 02:34 UTC | key: No support for family zero | 1 | eadavis@qq.com | finished in 3h39m0s |
| 2025-10-16 10:39 UTC | xfrm: misc fixes | 1 | sd@queasysnail.net | finished in 4h20m0s |
| 2025-10-13 09:58 UTC | net: cxgb4/ch_ipsec: fix potential use-after-free in ch_ipsec_xfrm_add_state() callback | 3 | pavel.zhigulin@kaspersky.com | finished in 52m0s |
| 2025-10-06 13:47 UTC | net: cxgb4/ch_ipsec: fix potential use-after-free in ch_ipsec_xfrm_add_state() callback | 2 | pavel.zhigulin@kaspersky.com | finished in 45m0s |
| 2025-10-01 11:16 UTC | net: fix potential use-after-free in ch_ipsec_xfrm_add_state() callback | 1 | pavel.zhigulin@kaspersky.com | finished in 40m0s |
| 2025-09-26 05:30 UTC | pull request (net-next): ipsec-next 2025-09-26 | 1 | steffen.klassert@secunet.com | finished in 3h39m0s |
| 2025-09-22 07:34 UTC | pull request (net): ipsec 2025-09-22 | 1 | steffen.klassert@secunet.com | finished in 3h42m0s |
| 2025-09-21 02:27 UTC | net/xfrm: Refuse to allocate xfrm_state with SPI value 0 | 1 | zlatistiv@gmail.com | finished in 3h40m0s |
| 2025-09-18 07:19 UTC | net/mlx5e: Support RSS for IPSec offload | 1 | tariqt@nvidia.com | finished in 43m0s |
| 2025-09-10 15:22 UTC | xfrm: fix offloading of cross-family tunnels | 2 | sd@queasysnail.net | finished in 3h44m0s |
| 2025-09-05 16:58 UTC | ipv6: snmp: avoid performance issue with RATELIMITHOST | 2 | edumazet@google.com | finished in 4h9m0s |
| 2025-08-29 08:54 UTC | xfrm: xfrm_alloc_spi shouldn't use 0 as SPI | 1 | sd@queasysnail.net | finished in 3h40m0s |
| 2025-08-26 16:25 UTC | Reference Counting Vulnerability in Linux XFRM PolicyManagement | 1 | qianjiaru77@gmail.com | finished in 49m0s |
| 2025-08-25 13:37 UTC | ipv4: Convert ->flowi4_tos to dscp_t. | 2 | gnault@redhat.com | finished in 3h52m0s |
| 2025-08-25 12:50 UTC | xfrm: fix offloading of cross-family tunnels | 1 | sd@queasysnail.net | finished in 3h42m0s |
| 2025-08-20 23:32 UTC | ipv4: Convert ->flowi4_tos to dscp_t. | 1 | gnault@redhat.com | finished in 3h42m0s |
| 2025-08-18 15:40 UTC | net: Convert to skb_dstref_steal and skb_dstref_restore | 2 | sdf@fomichev.me |
finished
in 3h50m0s
[1 findings] |
| 2025-08-14 19:32 UTC | xfrm: xfrm_user: use strscpy() for alg_name | 1 | miguelgarciaroman8@gmail.com | finished in 3h49m0s |
| 2025-08-12 15:52 UTC | net: Convert to skb_dst_reset and skb_dst_restore | 1 | sdf@fomichev.me |
finished
in 3h46m0s
[1 findings] |
| 2025-08-12 15:51 UTC | net: ipv6: fix field-spanning memcpy warning in AH output | 3 | charmitro@posteo.net | finished in 3h50m0s |
| 2025-08-11 09:19 UTC | pull request (net): ipsec 2025-08-11 | 1 | steffen.klassert@secunet.com | finished in 3h51m0s |
| 2025-08-04 09:26 UTC | xfrm: some fixes for GSO with SW crypto | 2 | sd@queasysnail.net | finished in 4h37m0s |
| 2025-08-04 09:05 UTC | xfrm: flush all states in xfrm_state_fini | 1 | sd@queasysnail.net | finished in 4h34m0s |
| 2025-07-28 15:17 UTC | xfrm: some fixes for GSO with SW crypto | 1 | sd@queasysnail.net | finished in 3h48m0s |
| 2025-07-27 21:51 UTC | net: ipv6: fix buffer overflow in AH output | 2 | charmitro@posteo.net | finished in 3h42m0s |
| 2025-07-27 21:48 UTC | net: ipv6: fix buffer overflow in AH output | 1 | charmitro@posteo.net | finished in 3h44m0s |
| 2025-07-23 08:03 UTC | pull request (net-next): ipsec-next 2025-07-23 | 1 | steffen.klassert@secunet.com | finished in 3h49m0s |
| 2025-07-23 07:53 UTC | pull request (net): ipsec 2025-07-23 | 1 | steffen.klassert@secunet.com | finished in 3h49m0s |
| 2025-07-07 16:05 UTC | af_key: Add check for the return value of pfkey_sadb2xfrm_user_sec_ctx() | 2 | haoxiang_li2024@163.com | finished in 3h38m0s |
| 2025-07-06 14:58 UTC | xfrm: bonding: Add XFRM packet-offload for active-backup | 2 | mrarmonius@gmail.com | skipped |
| 2025-07-04 14:54 UTC | ipsec: fix splat due to ipcomp fallback tunnel | 1 | sd@queasysnail.net | finished in 6h7m0s |
| 2025-07-04 06:55 UTC | pfkey: Deprecate pfkey | 1 | steffen.klassert@secunet.com | finished in 3h34m0s |
| 2025-07-03 09:16 UTC | af_key: Add check for the return value of pfkey_sadb2xfrm_user_sec_ctx() | 1 | haoxiang_li2024@163.com | finished in 3h52m0s |
| 2025-07-03 08:45 UTC | xfrm: Skip redundant statistics update for crypto offload | 1 | jianbol@nvidia.com | finished in 3h38m0s |
| 2025-06-30 12:38 UTC | xfrm: Duplicate SPI Handling | 1 | saakashkumar@marvell.com | finished in 3h43m0s |
| 2025-06-29 21:06 UTC | [PATH xfrm offload] xfrm: bonding: Add xfrm packet offload for active-backup mode | 1 | mrarmonius@gmail.com | finished in 4h6m0s |