On Thu, Oct 11, 2012 at 12:17:38PM +0200, pablo@xxxxxxxxxxxxx wrote: > From: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx> > > The patch "127f559 netfilter: ipset: fix timeout value overflow bug" > broke the SET target when no timeout was specified. > > Reported-by: Jean-Philippe Menil <jean-philippe.menil@xxxxxxxxxxxxxx> > Signed-off-by: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx> > Signed-off-by: Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx> > --- > > This patch requires: > > commit 127f559127f5175e4bec3dab725a34845d956591 > Author: Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxxxxxx> > Date: Mon May 7 02:35:44 2012 +0000 > > netfilter: ipset: fix timeout value overflow bug > > Large timeout parameters could result wrong timeout values due to > an overflow at msec to jiffies conversion (reported by Andreas Herz) This patch doesn't apply to the 3.0.y series, care to provide a backport, and a backported version of the original patch above that needs it? thanks, greg k-h -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html