Date: Wed, 9 Dec 2020 06:58:49 +0100 From: "Hartmann, O." <ohartmann@walstatt.org> To: freebsd-security@freebsd.org Cc: freebsd-current@freebsd.org Subject: AMNESIA:33 and FreeBSD TCP/IP stack involvement Message-ID: <20201209065849.47a51561@hermann.fritz.box>
next in thread | raw e-mail | index | archive | help
--Sig_/p4UgV9VdW26edeMGse4Ev0Y Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: quoted-printable Hello, I've got a question about recently discovered serious vulnerabilities in certain TCP stack implementations, designated as AMNESIA:33 (as far as I could follow the recently made announcements and statements, please see, for instance, https://www.zdnet.com/article/amnesia33-vulnerabilities-impact-millions-of-= smart-and-industrial-devices/). All mentioned open-source TCP stacks seem not to be related in any way with freeBSD or any derivative of the FreeBSD project, but I do not dare to make a statement about that. My question is very simple and aimes towards calming down my employees requests: is FreeBSD potentially vulnerable to this newly discovered flaw (we use mainly 12.1-RELENG, 12.2-RELENG, 12-STABLE and 13-CURRENT, latest incarnations, of course, should be least vulnerable ...). Thanks in advance, O. Hartmann --Sig_/p4UgV9VdW26edeMGse4Ev0Y Content-Type: application/pgp-signature Content-Description: OpenPGP digital signature -----BEGIN PGP SIGNATURE----- iHUEARYIAB0WIQSy8IBxAPDkqVBaTJ44N1ZZPba5RwUCX9BnmQAKCRA4N1ZZPba5 R3D0AQCdbA0rXdbl2ORRPPhicxy/ZVaVyRrQllLEY0/tyK/hFQEAp1+2NdHltrb3 E+XslRg3/arN9Azw6ntUdwhmHu1v9QQ= =4xpe -----END PGP SIGNATURE----- --Sig_/p4UgV9VdW26edeMGse4Ev0Y--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20201209065849.47a51561>