All,

if you are relying on IPFW2's new IPv6 capabilities as your IPv6 packet 
filter, it's time to update.  The commit below fixes a problem with in the 
code that would match random IPv6 packets to IPv4 rules.

-- 
/"\  Best regards,                      | [EMAIL PROTECTED]
\ /  Max Laier                          | ICQ #67774661
 X   http://pf4freebsd.love2party.net/  | [EMAIL PROTECTED]
/ \  ASCII Ribbon Campaign              | Against HTML Mail and News
--- Begin Message ---
mlaier      2005-06-12 16:27:10 UTC

  FreeBSD src repository

  Modified files:
    sys/netinet          ip_fw2.c 
  Log:
  When doing matching based on dst_ip/src_ip make sure we are really looking
  on an IPv4 packet as these variables are uninitialized if not.  This used to
  allow arbitrary IPv6 packets depending on the value in the uninitialized
  variables.
  
  Some opcodes (most noteably O_REJECT) do not support IPv6 at all right now.
  
  Reviewed by:    brooks, glebius
  Security:       IPFW might pass IPv6 packets depending on stack contents.
  Approved by:    re (blanket)
  
  Revision  Changes    Path
  1.102     +13 -10    src/sys/netinet/ip_fw2.c

--- End Message ---

Attachment: pgpzxbV9WSJUa.pgp
Description: PGP signature

Reply via email to