From: Tomasz Duszynski Date: Fri, 13 Oct 2017 12:50:09 +0000 (+0200) Subject: examples/ipsec-secgw: fix IP version check X-Git-Tag: spdx-start~1208 X-Git-Url: http://git.droids-corp.org/?a=commitdiff_plain;h=3417350e7f1726d6495e0d85e2212f6d4f959e4e;p=dpdk.git examples/ipsec-secgw: fix IP version check Since new_ip and ip4 are overlapping buffers copying ip4 over new_ip using memmove() might overwrite memory at ip4. This could happen if following condition holds: ip_hdr_len > sizeof(struct esp_hdr) + sa->iv_len Thus using ip4 to check ip version is wrong as it might not contain proper value. Fixes: f159e70b0922 ("examples/ipsec-secgw: support transport mode") Cc: stable@dpdk.org Signed-off-by: Tomasz Duszynski Acked-by: Sergio Gonzalez Monroy Reviewed-by: Aviad Yehezkel --- diff --git a/examples/ipsec-secgw/esp.c b/examples/ipsec-secgw/esp.c index 70bb81f75a..56ad7a010d 100644 --- a/examples/ipsec-secgw/esp.c +++ b/examples/ipsec-secgw/esp.c @@ -306,8 +306,8 @@ esp_outbound(struct rte_mbuf *m, struct ipsec_sa *sa, sizeof(struct esp_hdr) + sa->iv_len); memmove(new_ip, ip4, ip_hdr_len); esp = (struct esp_hdr *)(new_ip + ip_hdr_len); + ip4 = (struct ip *)new_ip; if (likely(ip4->ip_v == IPVERSION)) { - ip4 = (struct ip *)new_ip; ip4->ip_p = IPPROTO_ESP; ip4->ip_len = htons(rte_pktmbuf_data_len(m)); } else {