Portsnap extracts fetched data prior to its SHA256 verification. The extraction libraries used have a long history of bugs so its reasonable to assume there might be more. Portsnap runs as root. Using a vulnerability in the decompression libraries an attacker who was MITM-capable could compromise any FreeBSD system running portsnap. Fix: Solution summary: a re-working of the snapshot hashing and hash verification process. The functions of concern in portsnap.sh are fetch_snapshot(), fetch_update(), and fetch_snapshot_verify().
Responsible Changed From-To: freebsd-bugs->cperciva Over to maintainer.
batch change: For bugs that match the following - Status Is In progress AND - Untouched since 2018-01-01. AND - Affects Base System OR Documentation DO: Reset to open status. Note: I did a quick pass but if you are getting this email it might be worthwhile to double check to see if this bug ought to be closed.
^Triage: portsnap was disconnected from the build 20230420.