First published: Tue Feb 18 2020(Updated: )
In FreeBSD 12.0-RELEASE before 12.0-RELEASE-p13, a missing check in the ipsec packet processor allows reinjection of an old packet to be accepted by the ipsec endpoint. Depending on the higher-level protocol in use over ipsec, this could allow an action to be repeated.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
FreeBSD FreeBSD | =12.0 | |
FreeBSD FreeBSD | =12.0-p1 | |
FreeBSD FreeBSD | =12.0-p10 | |
FreeBSD FreeBSD | =12.0-p11 | |
FreeBSD FreeBSD | =12.0-p12 | |
FreeBSD FreeBSD | =12.0-p2 | |
FreeBSD FreeBSD | =12.0-p3 | |
FreeBSD FreeBSD | =12.0-p4 | |
FreeBSD FreeBSD | =12.0-p6 | |
FreeBSD FreeBSD | =12.0-p7 | |
FreeBSD FreeBSD | =12.0-p8 | |
FreeBSD FreeBSD | =12.0-p9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.