Hi, this is some critical bug fix here and I don't know how do deal with that now. I don't know if you can "get root" by this security issue. But the socket interface can be simple loaded by user via module-autoloading while using the address family. Maybe there is no security issue and the buffers are cutted off. I don't know, but there is definitely something wrong here. In my opinion af_ieee802154 should go to stable (bluetooth), but this will break the complete userspace interface for every application. I think there are no many users so I will simple send Patch 1/2 "af_ieee802154: fix struct ieee802154_addr_sa size" to bluetooth. This is a RFC to talk about this issue and if somebody knows a better way please tell that here. Note also all userspace applications need to be updated after this patch. I really don't know how to deal with such issue and CC here a lot of well known linux hackers and would be glad if I get any suggestions about that. Or maybe I should go to the netdev mailinglist with this issue. - Alex Cc: Marcel Holtmann <marcel@xxxxxxxxxxxx> Cc: Werner Almesberger <werner@xxxxxxxxxxxxxxx> Cc: Marc Kleine-Budde <mkl@xxxxxxxxxxxxxx> Alexander Aring (2): af_ieee802154: fix struct ieee802154_addr_sa size ieee802154: socket: add BUILD_BUG_ON for cast check include/net/af_ieee802154.h | 2 +- net/ieee802154/socket.c | 3 +++ 2 files changed, 4 insertions(+), 1 deletion(-) -- 2.2.1 -- To unsubscribe from this list: send the line "unsubscribe linux-wpan" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html