From a0386f504645c937b28cfc0273d8bbd3bd5bba6d Mon Sep 17 00:00:00 2001 From: gordon Date: Wed, 7 Mar 2018 17:16:41 +0000 Subject: [PATCH] Correct patch for ipsec vulnerability. Approved by: so Security: FreeBSD-SA-18:01.netipsec git-svn-id: svn://svn.freebsd.org/base/releng/10.3@330611 ccf9f872-aa2e-dd11-9fc8-001c23d0bc1f --- sys/netipsec/xform_ah.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/sys/netipsec/xform_ah.c b/sys/netipsec/xform_ah.c index 3f678414c..559376884 100644 --- a/sys/netipsec/xform_ah.c +++ b/sys/netipsec/xform_ah.c @@ -619,11 +619,11 @@ ah_input(struct mbuf *m, struct secasvar *sav, int skip, int protoff) DPRINTF(("%s: bad mbuf length %u (expecting %lu)" " for packet in SA %s/%08lx\n", __func__, m->m_pkthdr.len, (u_long) (skip + authsize + rplen), - ipsec_address(&sav->sah->saidx.dst, buf, sizeof(buf)), + ipsec_address(&sav->sah->saidx.dst), (u_long) ntohl(sav->spi))); AHSTAT_INC(ahs_badauthl); - error = EACCES; - goto bad; + m_freem(m); + return EACCES; } AHSTAT_ADD(ahs_ibytes, m->m_pkthdr.len - skip - hl); -- 2.42.0