[Midnightbsd-cvs] [MidnightBSD/src] fee655: initialize vars in ipfw

Lucas Holt noreply at github.com
Tue Dec 1 16:07:53 EST 2020


  Branch: refs/heads/master
  Home:   https://github.com/MidnightBSD/src
  Commit: fee6552ec9d7b5526a21cdba46e81c131955258d
      https://github.com/MidnightBSD/src/commit/fee6552ec9d7b5526a21cdba46e81c131955258d
  Author: Lucas Holt <luke at foolishgames.com>
  Date:   2020-12-01 (Tue, 01 Dec 2020)

  Changed paths:
    M sbin/ipfw/dummynet.c
    M sbin/ipfw/ipfw2.c
    M sbin/ipfw/nat64lsn.c
    M sbin/ipfw/tables.c

  Log Message:
  -----------
  initialize vars in ipfw


  Commit: a25bbc3d6c9a79a64356da04516a5dce9e4cd555
      https://github.com/MidnightBSD/src/commit/a25bbc3d6c9a79a64356da04516a5dce9e4cd555
  Author: Lucas Holt <luke at foolishgames.com>
  Date:   2020-12-01 (Tue, 01 Dec 2020)

  Changed paths:
    M sys/netinet6/icmp6.c

  Log Message:
  -----------
  When an ICMPv6 error message is received, the BSD ICMPv6 stack may
extract information from the message to hand to upper-layer protocols.  As a
part of this operation, it may parse IPv6 header options from a packet
embedded in the ICMPv6 message.

The handler for a routing option caches a pointer into the packet buffer
holding the ICMPv6 message.  However, when processing subsequent options the
packet buffer may be freed, rendering the cached pointer invalid.  The
network stack may later dereference the pointer, potentially triggering a
use-after-free.

Obtained from: FreeBSD


  Commit: 364d2fc7dd0bddea9719d114cee3f1de2eea6565
      https://github.com/MidnightBSD/src/commit/364d2fc7dd0bddea9719d114cee3f1de2eea6565
  Author: Lucas Holt <luke at foolishgames.com>
  Date:   2020-12-01 (Tue, 01 Dec 2020)

  Changed paths:
    M usr.sbin/rtsold/rtsol.c

  Log Message:
  -----------
  Two bugs exist in rtsold(8)'s RDNSS and DNSSL option handling.  First,
rtsold(8) failed to perform sufficient bounds checking on the extent of the
option.  In particular, it does not verify that the option does not extend
past the end of the received packet before processing its contents.  The
kernel currently ignores such malformed packets but still passes them to
userspace programs.

Second, when processing a DNSSL option, rtsold(8) decodes domain name labels
per an encoding specified in RFC 1035 in which the first octet of each label
contains the label's length.  rtsold(8) did not validate label lengths
correctly and could overflow the destination buffer.

Obtained from: FreeBSD


Compare: https://github.com/MidnightBSD/src/compare/54a3741785ab...364d2fc7dd0b


More information about the Midnightbsd-cvs mailing list