Date: Thu, 13 Mar 2025 10:23:41 +0000 From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 241010] netipsec: key_dup_keymsg bcopy too much bytes Message-ID: <bug-241010-7501-PMxnCwYiG3@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-241010-7501@https.bugs.freebsd.org/bugzilla/> References: <bug-241010-7501@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=241010 --- Comment #8 from commit-hook@FreeBSD.org --- A commit in branch stable/14 references this bug: URL: https://cgit.FreeBSD.org/src/commit/?id=72e2ebf642125efb74479fd038f45f49a3e846e4 commit 72e2ebf642125efb74479fd038f45f49a3e846e4 Author: Andrey V. Elsukov <ae@FreeBSD.org> AuthorDate: 2025-03-06 12:18:59 +0000 Commit: Andrey V. Elsukov <ae@FreeBSD.org> CommitDate: 2025-03-13 10:21:30 +0000 pfkey2: use correct value for a key length The length of key data is specified via sadb_key_bits field. Use specified size for buffer allocation and key copying. Also add a check that the value of sadb_key_bits is not zero, as explicitly required in RFC 2367. PR: 241010 Submitted by: jean-francois.hren at stormshield eu (cherry picked from commit 04207850a9b988d3c04e904cb5783f33da7fe184) sys/netipsec/key.c | 19 ++++++++++++++----- 1 file changed, 14 insertions(+), 5 deletions(-) -- You are receiving this mail because: You are the assignee for the bug.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-241010-7501-PMxnCwYiG3>
