kp c674ede188 pf: IPv6 fragments with malformed extension headers could be erroneously passed by pf or cause a panic
We mistakenly used the extoff value from the last packet to patch the
next_header field. If a malicious host sends a chain of fragmented packets
where the first packet and the final packet have different lengths or number of
extension headers we'd patch the next_header at the wrong offset.
This can potentially lead to panics or rule bypasses.

Security:       CVE-2019-5597
Obtained from:  OpenBSD
Reported by:    Corentin Bayet, Nicolas Collignon, Luca Moro at Synacktiv
2019-03-01 07:37:45 +00:00
..
2019-02-28 14:40:43 +00:00
2019-02-23 20:56:41 +00:00
2019-02-26 19:55:03 +00:00
2019-02-04 21:28:25 +00:00
2019-02-26 19:55:03 +00:00
2019-02-23 21:14:00 +00:00
2019-02-21 01:30:37 +00:00
2019-02-26 19:55:03 +00:00
2019-03-01 04:17:43 +00:00
2019-02-04 21:28:25 +00:00