summaryrefslogtreecommitdiff
path: root/net/xfrm/xfrm_policy.c
diff options
context:
space:
mode:
authorSabrina Dubroca <sd@queasysnail.net>2019-03-25 16:30:00 +0300
committerSteffen Klassert <steffen.klassert@secunet.com>2019-03-26 10:39:30 +0300
commit8dfb4eba4100e7cdd161a8baef2d8d61b7a7e62e (patch)
tree47012e3eeefbbbaf24cd5908f2e55b7335e52327 /net/xfrm/xfrm_policy.c
parentdbb2483b2a46fbaf833cfb5deb5ed9cace9c7399 (diff)
downloadlinux-8dfb4eba4100e7cdd161a8baef2d8d61b7a7e62e.tar.xz
esp4: add length check for UDP encapsulation
esp_output_udp_encap can produce a length that doesn't fit in the 16 bits of a UDP header's length field. In that case, we'll send a fragmented packet whose length is larger than IP_MAX_MTU (resulting in "Oversized IP packet" warnings on receive) and with a bogus UDP length. To prevent this, add a length check to esp_output_udp_encap and return -EMSGSIZE on failure. This seems to be older than git history. Signed-off-by: Sabrina Dubroca <sd@queasysnail.net> Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
Diffstat (limited to 'net/xfrm/xfrm_policy.c')
0 files changed, 0 insertions, 0 deletions