Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 21 Apr 2020 18:15:29 -0400
From:      Ed Maste <emaste@freebsd.org>
To:        Eugene Grosbein <eugen@grosbein.net>, "Andrey V. Elsukov" <ae@freebsd.org>
Cc:        freebsd-security@freebsd.org
Subject:   Re: [FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-20:10.ipfw
Message-ID:  <CAPyFy2Bx6hM0FdF2xHPrpzfCDo%2B5JRtetxQs2_S9zy=V2FEmew@mail.gmail.com>
In-Reply-To: <54bfc0f6-be4c-349d-df87-8ba507803a04@grosbein.net>
References:  <20200421165514.C676C1CB78@freefall.freebsd.org> <54bfc0f6-be4c-349d-df87-8ba507803a04@grosbein.net>

index | next in thread | previous in thread | raw e-mail

On Tue, 21 Apr 2020 at 15:29, Eugene Grosbein <eugen@grosbein.net> wrote:
>
> 21.04.2020 23:55, FreeBSD Security Advisories wrote:
> > =============================================================================
> > FreeBSD-SA-20:10.ipfw                                       Security Advisory
> >                                                           The FreeBSD Project
> >
> > Topic:          ipfw invalid mbuf handling
>
> [skip]
>
> > IV.  Workaround
> >
> > No workaround is available.  Systems not using the ipfw firewall are
> > not vulnerable.
>
> This is not true. The problem affects only seldom used rules matching TCP packets
> by list of TCP options (rules with "tcpoptions" keyword) and/or by TCP MSS size
> (rules with matching "tcpmss" keyword, don't mix with "tcp-setmss" action keyword).

I believe this is correct; what about this statement:

No workaround is available.  Systems not using the ipfw firewall, and
systems that use the ipfw firewall but without any rules using "tcpoptions"
or "tcpmss" keywords, are not affected.


help

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAPyFy2Bx6hM0FdF2xHPrpzfCDo%2B5JRtetxQs2_S9zy=V2FEmew>