First published: Wed May 15 2019(Updated: )
In FreeBSD 11.3-PRERELEASE and 12.0-STABLE before r347591, 11.2-RELEASE before 11.2-RELEASE-p10, and 12.0-RELEASE before 12.0-RELEASE-p4, a bug in the pf IPv6 fragment reassembly logic incorrectly uses the last extension header offset from the last received packet instead of the first packet allowing maliciously crafted IPv6 packets to cause a crash or potentially bypass the packet filter.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD Kernel | =11.2 | |
FreeBSD Kernel | =11.2-p2 | |
FreeBSD Kernel | =11.2-p3 | |
FreeBSD Kernel | =11.2-p4 | |
FreeBSD Kernel | =11.2-p5 | |
FreeBSD Kernel | =11.2-p6 | |
FreeBSD Kernel | =11.2-p7 | |
FreeBSD Kernel | =11.2-p9 | |
FreeBSD Kernel | =12.0 | |
FreeBSD Kernel | =12.0-p1 | |
FreeBSD Kernel | =12.0-p3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5597 has been classified as a medium severity vulnerability due to its potential impact on processing IPv6 packets.
To fix CVE-2019-5597, update your FreeBSD installation to version 11.2-RELEASE-p10, 12.0-RELEASE-p4, or later versions.
CVE-2019-5597 affects FreeBSD versions 11.2-RELEASE before 11.2-RELEASE-p10 and 12.0-RELEASE before 12.0-RELEASE-p4.
CVE-2019-5597 is a bug in the pf IPv6 fragment reassembly logic that can lead to improper handling of network packets.
There are no known effective workarounds for CVE-2019-5597, so applying the appropriate software update is recommended.