Re: FreeBSD Security Advisory FreeBSD-SA-25:09.netinet
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Wed, 22 Oct 2025 17:22:53 UTC
On 10/22/2025 1:03 PM, FreeBSD Security Advisories wrote:
> III. Impact
>
> Software which sets SO_REUSEPORT_LB on a socket and then connects it
> to a host
> will not observe any problems. However, due to its membership in a
> load-balancing group, that socket will receive packets originating
> from any
> host. This breaks the contract of the connect(2) and implied connect via
> sendto(2), and may leave the application vulnerable to spoofing attacks.
>
Trying to better understand the impact of this bug. Am I right to read
that an attacker needs local access first ? What would the common apps
be that would be at issue ? Looks like unbound is one. I dont see
apache24 reference SO_REUSEPORT_LB.
eg.
1{r-14mfitest}# pwd
/usr/ports/www/apache24
0{r-14mfitest}# make extract
0{r-14mfitest}# find . -type f | xargs grep SO_REUSEPORT_LB
1{r-14mfitest}#
would it be vulnerable in a dependent lib perhaps ?
---Mike