Total vulnerabilities in the database
In versions of FreeBSD 14.0-RELEASE before 14-RELEASE-p2, FreeBSD 13.2-RELEASE before 13.2-RELEASE-p7 and FreeBSD 12.4-RELEASE before 12.4-RELEASE-p9, the pf(4) packet filter incorrectly validates TCP sequence numbers. This could allow a malicious actor to execute a denial-of-service attack against hosts behind the firewall.
Software | From | Fixed in |
---|---|---|
freebsd / freebsd | 12.4-rc2-p2 | 12.4-rc2-p2.x |
freebsd / freebsd | 12.4-rc2-p1 | 12.4-rc2-p1.x |
freebsd / freebsd | 12.4 | 12.4.x |
freebsd / freebsd | 12.4-p1 | 12.4-p1.x |
freebsd / freebsd | 12.4-p2 | 12.4-p2.x |
freebsd / freebsd | 13.2 | 13.2.x |
freebsd / freebsd | 12.4-p3 | 12.4-p3.x |
freebsd / freebsd | 13.2-p1 | 13.2-p1.x |
freebsd / freebsd | 12.4-p4 | 12.4-p4.x |
freebsd / freebsd | 13.2-p2 | 13.2-p2.x |
freebsd / freebsd | 13.2-p3 | 13.2-p3.x |
freebsd / freebsd | 12.4-p5 | 12.4-p5.x |
freebsd / freebsd | 13.2-p4 | 13.2-p4.x |
freebsd / freebsd | 12.4-p6 | 12.4-p6.x |
freebsd / freebsd | 14.0 | 14.0.x |
freebsd / freebsd | 14.0-beta5 | 14.0-beta5.x |
freebsd / freebsd | 14.0-rc3 | 14.0-rc3.x |
freebsd / freebsd | 14.0-rc4-p1 | 14.0-rc4-p1.x |
freebsd / freebsd | 14.0-p1 | 14.0-p1.x |
freebsd / freebsd | 13.2-p6 | 13.2-p6.x |
freebsd / freebsd | 12.4-p8 | 12.4-p8.x |
freebsd / freebsd | 12.4-p7 | 12.4-p7.x |
freebsd / freebsd | 13.2-p5 | 13.2-p5.x |