Bug 188428

Summary: MITM attacks against portsnap(8)
Product: Base System Reporter: David <david.i.noel>
Component: binAssignee: Colin Percival <cperciva>
Status: Closed Overcome By Events    
Severity: Affects Many People CC: david.i.noel
Priority: Normal    
Version: Unspecified   
Hardware: Any   
OS: Any   

Description David 2014-04-10 17:20:00 UTC
Portsnap extracts fetched data prior to its SHA256 verification. The extraction libraries used have a long history of bugs so its reasonable to assume there might be more. Portsnap runs as root. Using a vulnerability in the decompression libraries an attacker who was MITM-capable could compromise any FreeBSD system running portsnap.

Fix: 

Solution summary: a re-working of the snapshot hashing and hash verification process.

The functions of concern in portsnap.sh are fetch_snapshot(), fetch_update(), and fetch_snapshot_verify().
Comment 1 Mark Linimon freebsd_committer freebsd_triage 2014-04-14 00:37:33 UTC
Responsible Changed
From-To: freebsd-bugs->cperciva

Over to maintainer.
Comment 2 Eitan Adler freebsd_committer freebsd_triage 2018-05-28 19:50:29 UTC
batch change:

For bugs that match the following
-  Status Is In progress 
AND
- Untouched since 2018-01-01.
AND
- Affects Base System OR Documentation

DO:

Reset to open status.


Note:
I did a quick pass but if you are getting this email it might be worthwhile to double check to see if this bug ought to be closed.
Comment 3 Mark Linimon freebsd_committer freebsd_triage 2025-01-21 16:28:37 UTC
^Triage: portsnap was disconnected from the build 20230420.