untrusted comment: signature from openbsd 6.2 base secret key RWRVWzAMgtyg7nkjfnAPRwyFx09o2p4+LauwncXnLq0YVgz+FmD3OdXAPyseWeBJKQOD1iq2H3rR/0J/1D4gHK/v6SBPWVDq9Qs= OpenBSD 6.2 errata 010, March 20, 2018: The IPsec AH header could be longer than the network packet. This may cause a kernel crash. Apply by doing: signify -Vep /etc/signify/openbsd-62-base.pub -x 010_ahauth.patch.sig \ -m - | (cd /usr/src && patch -p0) And then rebuild and install a new kernel: KK=`sysctl -n kern.osversion | cut -d# -f1` cd /usr/src/sys/arch/`machine`/compile/$KK make obj make config make make install Index: sys/netinet/ip_ah.c =================================================================== RCS file: /cvs/src/sys/netinet/ip_ah.c,v retrieving revision 1.131.4.1 diff -u -p -r1.131.4.1 ip_ah.c --- sys/netinet/ip_ah.c 1 Feb 2018 21:58:25 -0000 1.131.4.1 +++ sys/netinet/ip_ah.c 14 Mar 2018 23:23:17 -0000 @@ -583,7 +583,16 @@ ah_input(struct mbuf *m, struct tdb *tdb "in SA %s/%08x\n", hl * sizeof(u_int32_t), ipsp_address(&tdb->tdb_dst, buf, sizeof(buf)), ntohl(tdb->tdb_spi))); - + ahstat.ahs_badauthl++; + m_freem(m); + return EACCES; + } + if (skip + ahx->authsize + rplen > m->m_pkthdr.len) { + DPRINTF(("%s: bad mbuf length %d (expecting %d) " + "for packet in SA %s/%08x\n", __func__, + m->m_pkthdr.len, skip + ahx->authsize + rplen, + ipsp_address(&tdb->tdb_dst, buf, sizeof(buf)), + ntohl(tdb->tdb_spi))); ahstat.ahs_badauthl++; m_freem(m); return EACCES;