From noreply at github.com Tue Nov 29 23:18:25 2022 From: noreply at github.com (Lucas Holt) Date: Tue, 29 Nov 2022 20:18:25 -0800 Subject: [Midnightbsd-cvs] [MidnightBSD/src] b8084f: ping reads raw IP packets from the network to proc... Message-ID: <MidnightBSD/src/push/refs/heads/master/a694c7-b8084f@github.com> Branch: refs/heads/master Home: https://github.com/MidnightBSD/src Commit: b8084ffeccac92bd02461611a4c577eec918a3aa https://github.com/MidnightBSD/src/commit/b8084ffeccac92bd02461611a4c577eec918a3aa Author: Lucas Holt <luke at foolishgames.com> Date: 2022-11-29 (Tue, 29 Nov 2022) Changed paths: M sbin/ping/ping.c Log Message: ----------- ping reads raw IP packets from the network to process responses in the pr_pack() function. As part of processing a response ping has to reconstruct the IP header, the ICMP header and if present a "quoted packet," which represents the packet that generated an ICMP error. The quoted packet again has an IP header and an ICMP header. The pr_pack() copies received IP and ICMP headers into stack buffers for further processing. In so doing, it fails to take into account the possible presence of IP option headers following the IP header in either the response or the quoted packet. When IP options are present, pr_pack() overflows the destination buffer by up to 40 bytes. Obtained from: FreeBSD From noreply at github.com Tue Nov 29 23:20:34 2022 From: noreply at github.com (Lucas Holt) Date: Tue, 29 Nov 2022 20:20:34 -0800 Subject: [Midnightbsd-cvs] [MidnightBSD/src] f467f7: ping reads raw IP packets from the network to proc... Message-ID: <MidnightBSD/src/push/refs/heads/stable/3.0/61be66-e231e9@github.com> Branch: refs/heads/stable/3.0 Home: https://github.com/MidnightBSD/src Commit: f467f7bc9a9dd288fc19350ea88ce47d0f0ca4c6 https://github.com/MidnightBSD/src/commit/f467f7bc9a9dd288fc19350ea88ce47d0f0ca4c6 Author: Lucas Holt <luke at foolishgames.com> Date: 2022-11-29 (Tue, 29 Nov 2022) Changed paths: M sbin/ping/ping.c Log Message: ----------- ping reads raw IP packets from the network to process responses in the pr_pack() function. As part of processing a response ping has to reconstruct the IP header, the ICMP header and if present a "quoted packet," which represents the packet that generated an ICMP error. The quoted packet again has an IP header and an ICMP header. The pr_pack() copies received IP and ICMP headers into stack buffers for further processing. In so doing, it fails to take into account the possible presence of IP option headers following the IP header in either the response or the quoted packet. When IP options are present, pr_pack() overflows the destination buffer by up to 40 bytes. Obtained from: FreeBSD Commit: e231e90b48119a8f5bfaa09e0b070e85570bc038 https://github.com/MidnightBSD/src/commit/e231e90b48119a8f5bfaa09e0b070e85570bc038 Author: Lucas Holt <luke at foolishgames.com> Date: 2022-11-29 (Tue, 29 Nov 2022) Changed paths: M crypto/heimdal/lib/asn1/gen_free.c Log Message: ----------- fix defective security patch Compare: https://github.com/MidnightBSD/src/compare/61be66d25d39...e231e90b4811 From noreply at github.com Tue Nov 29 23:24:44 2022 From: noreply at github.com (Lucas Holt) Date: Tue, 29 Nov 2022 20:24:44 -0800 Subject: [Midnightbsd-cvs] [MidnightBSD/src] 87a030: fix defective security patch Message-ID: <MidnightBSD/src/push/refs/heads/stable/2.2/73e3d6-87a030@github.com> Branch: refs/heads/stable/2.2 Home: https://github.com/MidnightBSD/src Commit: 87a03043405568539e3507892148a5c80a3b4fd4 https://github.com/MidnightBSD/src/commit/87a03043405568539e3507892148a5c80a3b4fd4 Author: Lucas Holt <luke at foolishgames.com> Date: 2022-11-29 (Tue, 29 Nov 2022) Changed paths: M crypto/heimdal/lib/asn1/gen_free.c Log Message: ----------- fix defective security patch