-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
=============================================================================
FreeBSD-SA-26:06.tcp Security Advisory
The FreeBSD Project
Topic: TCP: remotely exploitable DoS vector (mbuf leak)
Category: core
Module: tcp
Announced: 2026-03-26
Credits: Michael Tuexen (Netflix)
Affects: FreeBSD 14.x and FreeBSD 15.0
Corrected: 2026-03-26 01:25:22 UTC (stable/15, 15.0-STABLE)
2026-03-26 01:11:18 UTC (releng/15.0, 15.0-RELEASE-p5)
2026-03-26 01:28:46 UTC (stable/14, 14.4-STABLE)
2026-03-26 01:14:54 UTC (releng/14.4, 14.4-RELEASE-p1)
2026-03-26 01:16:00 UTC (releng/14.3, 14.3-RELEASE-p10)
CVE Name: CVE-2026-4247
For general information regarding FreeBSD Security Advisories,
including descriptions of the fields above, security branches, and the
following sections, please visit <URL:https://security.FreeBSD.org/>.
I. Background
The Transmission Control Protocol (TCP) is a connection oriented transport
protocol, which can be used as an upper layer of IP.
When unexpected TCP segments are received for an established TCP connection,
so called "challenge ACK" segments may be sent back in response if certain
criteria are met.
Challenge ACKs are rate limited to ensure the remote peer does not waste too
many CPU cycles or outbound bandwidth on the local peer if large numbers of
unexpected TCP segments are received.
The rate limiting is controlled by the net.inet.tcp.ack_war_timewindow and
net.inet.tcp.ack_war_cnt sysctls which default to 1000 (milliseconds) and 5
respectively i.e. challenge ACKs will be sent for the first 5 qualifying TCP
segments received within a 1s time period and the rest will be ignored.
The handling of challenge ACKs is common code in tcp_subr.c shared among the
different TCP stacks available in the system. This includes the FreeBSD
default, RACK and BBR stacks. There are differences in the behaviour of the
different stacks; e.g. the base FreeBSD stack sends challenge ACKs to a larger
set of unexpected packets.
II. Problem Description
When a challenge ACK is to be sent tcp_respond() constructs and sends the
challenge ACK and consumes the mbuf that is passed in. When no challenge ACK
should be sent the function returns and leaks the mbuf.
III. Impact
If an attacker is either on path with an established TCP connection, or can
themselves establish a TCP connection, to an affected FreeBSD machine, they
can easily craft and send packets which meet the challenge ACK criteria and
cause the FreeBSD host to leak an mbuf for each crafted packet in excess of
the configured rate limit settings i.e. with default settings, crafted packets
in excess of the first 5 sent within a 1s period will leak an mbuf.
Technically, off-path attackers can also exploit this problem by guessing the
IP addresses, TCP port numbers and in some cases the sequence numbers of
established connections and spoofing packets towards a FreeBSD machine, but
this is harder to do effectively.
IV. Workaround
The mbuf leak can be mitigated by not rate limiting the sending of challenge
ACKs. This can be achieved with immediate effect by setting the
net.inet.tcp.ack_war_timewindow sysctl to 0:
sysctl net.inet.tcp.ack_war_timewindow=0
This mitigation does trade off the leaking of mbufs against additional
CPU/resource cost associated with responding to all challenge ACK eligible
packets received for established TCP connections.
To make this change persistent across reboots, add it to /etc/sysctl.conf.
V. Solution
Upgrade your vulnerable system to a supported FreeBSD stable or release /
security branch (releng) dated after the correction date and reboot.
Perform one of the following:
1) To update your vulnerable system installed from base system packages:
Systems running a 15.0-RELEASE version of FreeBSD on the amd64 or arm64
platforms, which were installed using base system packages, can be updated
via the pkg(8) utility:
# pkg upgrade -r FreeBSD-base
# shutdown -r +10min "Rebooting for a security update"
2) To update your vulnerable system installed from binary distribution sets:
Systems running a RELEASE version of FreeBSD on the amd64 or arm64 platforms,
which were not installed using base system packages, can be updated via the
freebsd-update(8) utility:
# freebsd-update fetch
# freebsd-update install
# shutdown -r +10min "Rebooting for a security update"
3) To update your vulnerable system via a source code patch:
The following patches have been verified to apply to the applicable
FreeBSD release branches.
a) Download the relevant patch from the location below, and verify the
detached PGP signature using your PGP utility.
# fetch https://security.FreeBSD.org/patches/SA-26:06/tcp.patch
# fetch https://security.FreeBSD.org/patches/SA-26:06/tcp.patch.asc
# gpg --verify tcp.patch.asc
b) Apply the patch. Execute the following commands as root:
# cd /usr/src
# patch < /path/to/patch
c) Recompile your kernel as described in
<URL:https://www.FreeBSD.org/handbook/kernelconfig.html> and reboot the
system.
VI. Correction details
This issue is corrected as of the corresponding Git commit hash in the
following stable and release branches:
Branch/path Hash Revision
- -------------------------------------------------------------------------
stable/15/ 1fddb5435315 stable/15-n282699
releng/15.0/ de9e5d82581e releng/15.0-n281011
stable/14/ b45e7530ffb9 stable/14-n273839
releng/14.4/ 44dd8b58394b releng/14.4-n273676
releng/14.3/ a9cba5321021 releng/14.3-n271476
- -------------------------------------------------------------------------
Run the following command to see which files were modified by a
particular commit:
# git show --stat <commit hash>
Or visit the following URL, replacing NNNNNN with the hash:
<URL:https://cgit.freebsd.org/src/commit/?id=NNNNNN>
To determine the commit count in a working tree (for comparison against
nNNNNNN in the table above), run:
# git rev-list --count --first-parent HEAD
VII. References
<URL:https://www.cve.org/CVERecord?id=CVE-2026-4247>
The latest revision of this advisory is available at
<URL:https://security.FreeBSD.org/advisories/FreeBSD-SA-26:06.tcp.asc>
-----BEGIN PGP SIGNATURE-----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=a5LJ
-----END PGP SIGNATURE-----
No comments:
Post a Comment