21.04.2020 23:55, FreeBSD Security Advisories wrote:
> =============================================================================
> FreeBSD-SA-20:10.ipfw                                       Security Advisory
>                                                           The FreeBSD Project
> 
> Topic:          ipfw invalid mbuf handling

[skip]

> IV.  Workaround
> 
> No workaround is available.  Systems not using the ipfw firewall are
> not vulnerable.

This is not true. The problem affects only seldom used rules matching TCP 
packets
by list of TCP options (rules with "tcpoptions" keyword) and/or by TCP MSS size
(rules with matching "tcpmss" keyword, don't mix with "tcp-setmss" action 
keyword).

Systems not using "tcpoptions" nor "tcpmss" keywords to match TCP packets are 
not affected.
For example, system using any of default templates 
(open/client/simple/closed/workstation) are not affected.

Please consider re-checking this and adjusting the Advisory.
_______________________________________________
freebsd-security@freebsd.org mailing list
https://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Reply via email to