diff options
author | Herbert Xu <herbert@gondor.apana.org.au> | 2007-12-12 21:54:16 -0500 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2008-01-28 17:57:43 -0500 |
commit | aebcf82c1fe9231be5cb4f9c1362d5db39e7d7b2 (patch) | |
tree | f164bead26b172ee82d6eaa81a0148d980985bce | |
parent | bb72845e699d3c84e5f861b51db686107a51dea5 (diff) |
[IPSEC]: Do not let packets pass when ICMP flag is off
This fixes a logical error in ICMP policy checks which lets
packets through if the state ICMP flag is off.
Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: David S. Miller <davem@davemloft.net>
-rw-r--r-- | net/ipv4/icmp.c | 7 | ||||
-rw-r--r-- | net/ipv6/icmp.c | 7 |
2 files changed, 10 insertions, 4 deletions
diff --git a/net/ipv4/icmp.c b/net/ipv4/icmp.c index c41f3cc4fba8..ce5b4be559aa 100644 --- a/net/ipv4/icmp.c +++ b/net/ipv4/icmp.c | |||
@@ -977,10 +977,13 @@ int icmp_rcv(struct sk_buff *skb) | |||
977 | struct icmphdr *icmph; | 977 | struct icmphdr *icmph; |
978 | struct rtable *rt = (struct rtable *)skb->dst; | 978 | struct rtable *rt = (struct rtable *)skb->dst; |
979 | 979 | ||
980 | if (!xfrm4_policy_check(NULL, XFRM_POLICY_IN, skb) && skb->sp && | 980 | if (!xfrm4_policy_check(NULL, XFRM_POLICY_IN, skb)) { |
981 | skb->sp->xvec[skb->sp->len - 1]->props.flags & XFRM_STATE_ICMP) { | ||
982 | int nh; | 981 | int nh; |
983 | 982 | ||
983 | if (!(skb->sp && skb->sp->xvec[skb->sp->len - 1]->props.flags & | ||
984 | XFRM_STATE_ICMP)) | ||
985 | goto drop; | ||
986 | |||
984 | if (!pskb_may_pull(skb, sizeof(*icmph) + sizeof(struct iphdr))) | 987 | if (!pskb_may_pull(skb, sizeof(*icmph) + sizeof(struct iphdr))) |
985 | goto drop; | 988 | goto drop; |
986 | 989 | ||
diff --git a/net/ipv6/icmp.c b/net/ipv6/icmp.c index 1659d2fb01fe..c3bbd8687307 100644 --- a/net/ipv6/icmp.c +++ b/net/ipv6/icmp.c | |||
@@ -644,10 +644,13 @@ static int icmpv6_rcv(struct sk_buff *skb) | |||
644 | struct icmp6hdr *hdr; | 644 | struct icmp6hdr *hdr; |
645 | int type; | 645 | int type; |
646 | 646 | ||
647 | if (!xfrm6_policy_check(NULL, XFRM_POLICY_IN, skb) && skb->sp && | 647 | if (!xfrm6_policy_check(NULL, XFRM_POLICY_IN, skb)) { |
648 | skb->sp->xvec[skb->sp->len - 1]->props.flags & XFRM_STATE_ICMP) { | ||
649 | int nh; | 648 | int nh; |
650 | 649 | ||
650 | if (!(skb->sp && skb->sp->xvec[skb->sp->len - 1]->props.flags & | ||
651 | XFRM_STATE_ICMP)) | ||
652 | goto drop_no_count; | ||
653 | |||
651 | if (!pskb_may_pull(skb, sizeof(*hdr) + sizeof(*orig_hdr))) | 654 | if (!pskb_may_pull(skb, sizeof(*hdr) + sizeof(*orig_hdr))) |
652 | goto drop_no_count; | 655 | goto drop_no_count; |
653 | 656 | ||