From db2d7b7448b9b8d832119b1f6e9e06955a8bb853 Mon Sep 17 00:00:00 2001 From: Sergey Matveev Date: Mon, 12 Dec 2022 23:05:17 +0300 Subject: [PATCH] =?utf8?q?=D0=94=D1=8B=D1=80=D1=8F=D0=B2=D1=8B=D0=B9=20pin?= =?utf8?q?g=20=D0=B2=20FreeBSD?= MIME-Version: 1.0 Content-Type: text/plain; charset=utf8 Content-Transfer-Encoding: 8bit https://www.opennet.ru/opennews/art.shtml?num=58232 https://www.opennet.ru/opennews/art.shtml?num=58299 Везде эта новость, тупые комментарии (впрочем, тупее могут быть только комментарии про IPv6, ценные как источник мифов и легенд). Даже в рассылке FreeBSD отправили короткое письмо поясняющее (хотя это как бы и так ясно вроде) масштаб проблемы: - This issue affects only /sbin/ping, not kernel ICMP handling. - The issue relies on receipt of malicious packet(s) while the ping utility is running (i.e., while pinging a host). - ping(8) is setuid root, but drops privilege (to that of the user executing it) after opening sockets but before sending or receiving data. - ping(8) runs in a Capsicum capability sandbox, such that even in the event of a compromise the attacker is quite limited (has no access to global namespaces, such as the filesystem). - It is believed that exploitation is not possible due to the stack layout on affected platforms. -- 2.50.0