Skip to content

[action] [PR:139] Fix security vulnerability in caclmgrd (#139)#141

Merged
mssonicbld merged 1 commit intosonic-net:202405from
mssonicbld:cherry/202405/139
Jul 29, 2024
Merged

[action] [PR:139] Fix security vulnerability in caclmgrd (#139)#141
mssonicbld merged 1 commit intosonic-net:202405from
mssonicbld:cherry/202405/139

Conversation

@mssonicbld
Copy link

  • description:

After installation, a default iptables rule allows an attacker to bypass all others rules protecting the switch management & control-plane.

  • Mitigation:

Accept only ttl-lt 2 for ICMP packets, or possibly dst-port > 1024.
Traceroute may be based on ICMP or UDP or TCP.
For ICMP: accept all icmp protocol TTL < 2 packets
For UDP: accept UDP protocol TTL < 2 and UDP dest port > 1024 packets
For TCP: accept TCP protocol TTL < 2 and TCP dest port > 1024 packets
For other mismatched packets, default action is drop

  • work item:

28662516

- description:

After installation, a default iptables rule allows an attacker to bypass all others rules protecting the switch management & control-plane.

- Mitigation:

Accept only ttl-lt 2 for ICMP packets, or possibly dst-port > 1024.
Traceroute may be based on ICMP or UDP or TCP.
For ICMP: accept all icmp protocol TTL < 2 packets
For UDP: accept UDP protocol TTL < 2 and UDP dest port > 1024 packets
For TCP: accept TCP protocol TTL < 2 and TCP dest port > 1024 packets
For other mismatched packets, default action is drop

- work item:

28662516
@mssonicbld
Copy link
Author

Original PR: #139

@mssonicbld mssonicbld merged commit 81a4ee8 into sonic-net:202405 Jul 29, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants