From nobody Tue Dec 5 23:04:18 2023 X-Original-To: dev-commits-ports-all@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4SlGLq1L4nz53bdD; Tue, 5 Dec 2023 23:04:19 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4SlGLq0m3Pz4GrZ; Tue, 5 Dec 2023 23:04:19 +0000 (UTC) (envelope-from git@FreeBSD.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1701817459; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=K0f47GjcM7ZAuilKkBpvEGjK1XyCnFhtbNR3F7lB5Iw=; b=e1IF+HeyMfCEeYHmIBUEDX++DiVC5DOWQfP6yBnHDaHpLMnr1IdzAepJX7jqXFjZDqjBVh 27N1mG5iR8PDbBjGvpXyyowrAuTnkkKCCSHehapDHVXhk7sJmKElcJrRFunLGL8jkUarve OE5mOVzjJZtpFtD2eVxvUpuk3L/0pEKN3M6d40/7yBjh6pFXVTuEvS8cLWMwrMuSs3AVD1 ciF5DsB40mq4F3swP68NqzsEFioD9u0Uojbn8qyliVYt5UH+Md/hgzNQ8intS8uErfvTaI QaJsDLyrbc2K5y9XAltstmFov616Ots4b9eZLrRJ968Mu01j/9hAnVp4lWDRyg== ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1701817459; a=rsa-sha256; cv=none; b=kB9siBAGtIM+LXrObEMKAoLQVKgkfsaYbPRP2062LXt7OTxt/VH8FmIQgU1kq7fxacqfKl 1naPs7W6DMGGv50XQjSEAkTollRE+V0Qg4DkBC5L3PrBn4OkxTHmnJBICFHrfpbpzF/yC0 cPu12dX6d4iUweLcv0vpzUUO8cHhrR6wxqllQCSw3ivWHd7vbKP+q8sL48DMo7Sy8VfLyt OlLaKIM4J5Ke1w040+4LWUqs1g+kn4XxFiTZzxfLnvPXB/9rJZs1n05BQDI/PwzVaWYub5 Ycxtuq/M7cYZdsQxvWbsTynoOgOgA6jlPLrDFWA1tdU2JcqNmEBfipWL9tB/6A== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1701817459; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=K0f47GjcM7ZAuilKkBpvEGjK1XyCnFhtbNR3F7lB5Iw=; b=mWNx8Qhn+1RHZy0cUDaDk4DvKhOzP4O0nNZJ/leTV/XhXltuWnZ2D/aHP4SzRiFHAl82ay LO2AoeaInNP4rPCyAh+oA+87N0mAyYcYh8iAI/mPzQct5SmVm3LgBzBUiBEvhMBN4EiOTz lXbM6zaw0T6ZsaAs3qkEmSSYSPOuQcDQOkK0qpxtSR+z7q2yQFylAcx2IkQDPR5wlhJ/Bw zyzhjLIjukEdxHxnLO+UFKwJxPKW4bUn+K7EVY4Cfg5DmOxaUjULUkw3H7e/gbSfwQqw4j 9TTRDG9mektQlazV/K835e9LPDrvntQQwXeXBu6hLb5RNWEfas1daKum6Ykapw== Received: from gitrepo.freebsd.org (gitrepo.freebsd.org [IPv6:2610:1c1:1:6068::e6a:5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4SlGLp6vshzVBx; Tue, 5 Dec 2023 23:04:18 +0000 (UTC) (envelope-from git@FreeBSD.org) Received: from gitrepo.freebsd.org ([127.0.1.44]) by gitrepo.freebsd.org (8.17.1/8.17.1) with ESMTP id 3B5N4IuS078865; Tue, 5 Dec 2023 23:04:18 GMT (envelope-from git@gitrepo.freebsd.org) Received: (from git@localhost) by gitrepo.freebsd.org (8.17.1/8.17.1/Submit) id 3B5N4IOf078862; Tue, 5 Dec 2023 23:04:18 GMT (envelope-from git) Date: Tue, 5 Dec 2023 23:04:18 GMT Message-Id: <202312052304.3B5N4IOf078862@gitrepo.freebsd.org> To: ports-committers@FreeBSD.org, dev-commits-ports-all@FreeBSD.org, dev-commits-ports-main@FreeBSD.org From: Philip Paeps Subject: git: a580d36be4c7 - main - security/vuxml: add FreeBSD SA released on 2023-12-05 List-Id: Commit messages for all branches of the ports repository List-Archive: https://lists.freebsd.org/archives/dev-commits-ports-all List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-dev-commits-ports-all@freebsd.org X-BeenThere: dev-commits-ports-all@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: 8bit X-Git-Committer: philip X-Git-Repository: ports X-Git-Refname: refs/heads/main X-Git-Reftype: branch X-Git-Commit: a580d36be4c7a18862a6a110e8bc2ba14e695125 Auto-Submitted: auto-generated The branch main has been updated by philip: URL: https://cgit.FreeBSD.org/ports/commit/?id=a580d36be4c7a18862a6a110e8bc2ba14e695125 commit a580d36be4c7a18862a6a110e8bc2ba14e695125 Author: Philip Paeps AuthorDate: 2023-12-05 23:01:20 +0000 Commit: Philip Paeps CommitDate: 2023-12-05 23:01:20 +0000 security/vuxml: add FreeBSD SA released on 2023-12-05 FreeBSD-SA-23:17.pf affects all supported releases (12.4, 13.2, 14.0). --- security/vuxml/vuln/2023.xml | 41 +++++++++++++++++++++++++++++++++++++++++ 1 file changed, 41 insertions(+) diff --git a/security/vuxml/vuln/2023.xml b/security/vuxml/vuln/2023.xml index c484528898f7..6516a6a58f8a 100644 --- a/security/vuxml/vuln/2023.xml +++ b/security/vuxml/vuln/2023.xml @@ -1,3 +1,44 @@ + + FreeBSD -- TCP spoofing vulnerability in pf(4) + + + FreeBSD-kernel + 14.014.0_2 + 13.213.2_7 + 12.412.4_9 + + + + +

Problem Description:

+

As part of its stateful TCP connection tracking implementation, + pf performs sequence number validation on inbound packets. This + makes it difficult for a would-be attacker to spoof the sender and + inject packets into a TCP stream, since crafted packets must contain + sequence numbers which match the current connection state to avoid + being rejected by the firewall.

+

A bug in the implementation of sequence number validation means + that the sequence number is not in fact validated, allowing an + attacker who is able to impersonate the remote host and guess the + connection's port numbers to inject packets into the TCP stream.

+

Impact:

+

An attacker can, with relatively little effort, inject packets + into a TCP stream destined to a host behind a pf firewall. This + could be used to implement a denial-of-service attack for hosts + behind the firewall, for example by sending TCP RST packets to the + host.

+ +
+ + CVE-2023-6534 + SA-23:17.pf + + + 2023-12-05 + 2023-12-05 + +
+ varnish -- HTTP/2 Rapid Reset Attack