Summary: | Spurious "TCP spoofing vulnerability in pf" warning from 405.pkg-base-audit after updating to 12.4-RELEASE-p9 | ||||||
---|---|---|---|---|---|---|---|
Product: | Base System | Reporter: | martin | ||||
Component: | misc | Assignee: | Philip Paeps <philip> | ||||
Status: | Closed FIXED | ||||||
Severity: | Affects Only Me | CC: | philip | ||||
Priority: | --- | Keywords: | regression | ||||
Version: | 12.4-RELEASE | ||||||
Hardware: | i386 | ||||||
OS: | Any | ||||||
Attachments: |
|
Description
martin
2023-12-13 12:24:48 UTC
I'll change the vuxml entry so the warning goes away. Since this issue only affects pf.ko, there's no 100% good way to document this in vuxml. See also the discussion in this thread: https://lists.freebsd.org/archives/dev-commits-ports-all/2023-December/091108.html A commit in branch main references this bug: URL: https://cgit.FreeBSD.org/ports/commit/?id=6c7887d34c00a0930b380f4ed487c592f2fb4569 commit 6c7887d34c00a0930b380f4ed487c592f2fb4569 Author: Philip Paeps <philip@FreeBSD.org> AuthorDate: 2023-12-14 02:10:36 +0000 Commit: Philip Paeps <philip@FreeBSD.org> CommitDate: 2023-12-14 02:10:59 +0000 security/vuxml: adjust 12.4 range of FreeBSD SA-23:17.pf Similar to what I did in 4826396e5d1555b9eebf58cac290490b24bf1243, adjust the 12.4 releases affected by FreeBSD SA-23:17.pf. There is no 100% correct way to encode this issue in vuxml. Since the issue only affects pf.ko, freebsd-update does not rebuild the kernel. PR: 275743 Reported by: martin@lispworks.com security/vuxml/vuln/2023.xml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) |