Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 19 Feb 2016 09:26:44 +0000
From:      bugzilla-noreply@freebsd.org
To:        freebsd-bugs@FreeBSD.org
Subject:   [Bug 207312] Useless check in netipsec/key.c
Message-ID:  <bug-207312-8-IXHkvQ4GA3@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-207312-8@https.bugs.freebsd.org/bugzilla/>
References:  <bug-207312-8@https.bugs.freebsd.org/bugzilla/>

next in thread | previous in thread | raw e-mail | index | archive | help

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=207312

--- Comment #1 from Andrey V. Elsukov <ae@FreeBSD.org> ---
(In reply to Mikhail Teterin from comment #0)
> @@ -7245,9 +7245,8 @@ key_parse(struct mbuf *m, struct socket
>         orglen = PFKEY_UNUNIT64(msg->sadb_msg_len);
>         target = KEY_SENDUP_ONE;
> 
> -       if ((m->m_flags & M_PKTHDR) == 0 ||
> -           m->m_pkthdr.len != m->m_pkthdr.len) {
> -               ipseclog((LOG_DEBUG, "%s: invalid message
> length.\n",__func__));

The log message says about invalid length, probably, comparison should be done
with orglen. I need some time to create the testing environment for this, can
you test this by self?

-- 
You are receiving this mail because:
You are the assignee for the bug.


Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-207312-8-IXHkvQ4GA3>