Skip to content

Commit

Permalink
Fix the handling of invalid parameters in ASCONF chunks.
Browse files Browse the repository at this point in the history
Thanks to Mark Wodrich from Google for reproting the issue in
sctplab/usrsctp#376
for the userland stack.

MFC after:		3 days
  • Loading branch information
tuexen authored and brooksdavis committed Oct 22, 2019
2 parents 4105d94 + f8c515c commit 6192117
Showing 1 changed file with 1 addition and 0 deletions.
1 change: 1 addition & 0 deletions sys/netinet/sctp_asconf.c
Original file line number Diff line number Diff line change
Expand Up @@ -703,6 +703,7 @@ sctp_handle_asconf(struct mbuf *m, unsigned int offset,
if (param_length <= sizeof(struct sctp_paramhdr)) {
SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: param length (%u) too short\n", param_length);
sctp_m_freem(m_ack);
return;
}
/* get the entire parameter */
aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(m, offset, param_length, aparam_buf);
Expand Down

0 comments on commit 6192117

Please sign in to comment.