On Mon, Aug 12, 2013 at 10:32:17AM -0400, CERT(R) Coordination Center wrote:
> Antonios Atlasis ([email protected]) reported that he sent this 
> issue to a contact at OpenBSD previously. 
> Have you addressed this issue as of this time? If so is there a public 
> reference to any available fixes?

Hi Todd,

I have fixed this issue at July 23rd in the current OpenBSD development
branch.  It will be shipped with our next release OpenBSD 5.4 at
Nov 1, 2013.  There was no public announcement or backport as we
do not consider it a serious security bug.

The commit message has been archived on a public mailing list.
http://marc.info/?l=openbsd-cvs&m=137461965626758&w=2
Antonios Atlasis has been credited as the reporter of the bug.

If you are interrested in source code, you can have a look at the
diff in our public repository.
http://www.openbsd.org/cgi-bin/cvsweb/src/sys/net/pf_norm.c.diff?r1=1.159;r2=1.160
http://www.openbsd.org/cgi-bin/cvsweb/src/sys/net/pfvar.h.diff?r1=1.388;r2=1.389
The problematic code was in pf, the packet filter firewall of
OpenBSD.  It is enabled by default, so its behavior was seen.

Best Regards,
Alexander Bluhm

Reply via email to