CVE-2019-5613

NameCVE-2019-5613
DescriptionIn FreeBSD 12.0-RELEASE before 12.0-RELEASE-p13, a missing check in the ipsec packet processor allows reinjection of an old packet to be accepted by the ipsec endpoint. Depending on the higher-level protocol in use over ipsec, this could allow an action to be repeated.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
kfreebsd-10 (PTS)jessie10.1~svn274115-4fixed
stretch10.3~svn300087-3fixed
buster10.3~svn300087-5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
kfreebsd-10source(unstable)(not affected)

Notes

- kfreebsd-10 <not-affected> (Only affects kfreebsd 12)
https://www.freebsd.org/security/advisories/FreeBSD-SA-20:02.ipsec.asc

Search for package or bug name: Reporting problems