On Mon, Aug 12, 2013 at 10:32:17AM -0400, CERT(R) Coordination Center wrote: > Antonios Atlasis ([email protected]) reported that he sent this > issue to a contact at OpenBSD previously. > Have you addressed this issue as of this time? If so is there a public > reference to any available fixes?
Hi Todd, I have fixed this issue at July 23rd in the current OpenBSD development branch. It will be shipped with our next release OpenBSD 5.4 at Nov 1, 2013. There was no public announcement or backport as we do not consider it a serious security bug. The commit message has been archived on a public mailing list. http://marc.info/?l=openbsd-cvs&m=137461965626758&w=2 Antonios Atlasis has been credited as the reporter of the bug. If you are interrested in source code, you can have a look at the diff in our public repository. http://www.openbsd.org/cgi-bin/cvsweb/src/sys/net/pf_norm.c.diff?r1=1.159;r2=1.160 http://www.openbsd.org/cgi-bin/cvsweb/src/sys/net/pfvar.h.diff?r1=1.388;r2=1.389 The problematic code was in pf, the packet filter firewall of OpenBSD. It is enabled by default, so its behavior was seen. Best Regards, Alexander Bluhm
