Hi, there > we have detected that your project may be vulnerable to ILoop with > Unreachable Exit Condition ('Infinite Loop') in the function of ` ppp_hdlc ` > in the file of ` contrib/tcpdump/print-ppp.c ` . It shares similarities to a > recent CVE disclosure [CVE-2024-2397](> > https://nvd.nist.gov/vuln/detail/CVE-2024-2397> ) in the > > https://github.com/the-tcpdump-group/tcpdump > > **The source vulnerability information is as follows:** > > > Vulnerability Detail: > > CVE Identifier: CVE-2024-2397 > > Description: Due to a bug in packet data buffers management, the PPP > > printer in tcpdump can enter an infinite loop when reading a crafted > > DLT_PPP_SERIAL .pcap savefile. This problem does not affect any tcpdump > > release, but it affected the git master branch from 2023-06-05 to > > 2024-03-21. > > Reference: > https://nvd.nist.gov/vuln/detail/CVE-2024-2397 > > Patch: > > > https://github.com/the-tcpdump-group/tcpdump/commit/b9811ef5bb1b7d45a90e042f81f3aaf233c8bcb2 > > > Would you help to check if this bug is true? If it's true, I'd like to open a > PR for that if necessary. Thank you for your effort and patience! > > Best regards, > James > >
Hi James, I can't speak authoritatively here at all. Not a committer to src or anything like that, nor a FreeBSD security expert. I do appreciate your concern for FreeBSD, though! And I think this was merged in already: https://cgit.freebsd.org/src/commit/contrib/tcpdump/print-ppp.c?id=f8860353d4f4c25bacdae5bc1cfb7a95edc9bfe0 <https://cgit.freebsd.org/src/commit/contrib/tcpdump/print-ppp.c?id=f8860353d4f4c25bacdae5bc1cfb7a95edc9bfe0> Might be worth having another glance over it. I don't see an advisory published, but I'm not sure if that was pushed into a release or not. https://www.freebsd.org/security/advisories/ Thanks! -Henrich