Date: Fri, 28 Feb 2025 14:52:39 +0000 From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 283702] Out-of-bounds read in Netgraph parsing of binary Netgraph packets Message-ID: <bug-283702-7501-Wc7rbpDZLr@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-283702-7501@https.bugs.freebsd.org/bugzilla/> References: <bug-283702-7501@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=283702 Mark Johnston <markj@FreeBSD.org> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |markj@FreeBSD.org --- Comment #4 from Mark Johnston <markj@FreeBSD.org> --- Hrm, many of these unparse routines are buggy. The size of the source buffer is not passed to them, and most of the blindly assume that the input is well-formed. It is possible to get the input buffer length by moving the data pointer backwards, like ng_unparse_composite() does, but that's kind of iffy. Probably it'd be nicer to pass a pointer to the ng_mesg structure instead, even though that requires some churn. -- You are receiving this mail because: You are the assignee for the bug.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-283702-7501-Wc7rbpDZLr>
