First published: Wed Dec 13 2023(Updated: )
In versions of FreeBSD 14.0-RELEASE before 14-RELEASE-p2, FreeBSD 13.2-RELEASE before 13.2-RELEASE-p7 and FreeBSD 12.4-RELEASE before 12.4-RELEASE-p9, the pf(4) packet filter incorrectly validates TCP sequence numbers. This could allow a malicious actor to execute a denial-of-service attack against hosts behind the firewall.
Credit: secteam@freebsd.org
Affected Software | Affected Version | How to fix |
---|---|---|
=12.4 | ||
=12.4-p1 | ||
=12.4-p2 | ||
=12.4-p3 | ||
=12.4-p4 | ||
=12.4-p5 | ||
=12.4-p6 | ||
=12.4-p7 | ||
=12.4-p8 | ||
=12.4-rc2-p1 | ||
=12.4-rc2-p2 | ||
=13.2 | ||
=13.2-p1 | ||
=13.2-p2 | ||
=13.2-p3 | ||
=13.2-p4 | ||
=13.2-p5 | ||
=13.2-p6 | ||
=14.0 | ||
=14.0-beta5 | ||
=14.0-p1 | ||
=14.0-rc3 | ||
=14.0-rc4-p1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.