Date: Wed, 15 Aug 2018 18:41:12 +0200 From: "Terrence Koeman" <terrence@darkness-reigns.com> To: <freebsd-security@freebsd.org> Subject: RE: FreeBSD Security Advisory FreeBSD-SA-18:08.tcp Message-ID: <080501d434b6$c7a9c030$56fd4090$@darkness-reigns.com> In-Reply-To: <306fd368-1093-ace2-7075-a9c6d2bf6860@shurik.kiev.ua> References: <20180815054732.9D8C61C2C8@freefall.freebsd.org> <306fd368-1093-ace2-7075-a9c6d2bf6860@shurik.kiev.ua>
next in thread | previous in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 > From: owner-freebsd-security@freebsd.org <owner-freebsd- > security@freebsd.org> On Behalf Of Alexandr Krivulya > Sent: Wednesday, August 15, 2018 4:26 PM > > Hi, freebsd-security > > Can CVE-2018-6922 be addressed by pf's fragment reassemble and > reassemble tcp options or can it potentially lead to memory overflow > (set limit frags?) when this options enabled? And, the same question, but for ipfw2's "reass"? Thanks! - -- Regards, Terrence Koeman, PhD/MTh/BPsy Darkness Reigns (Holding) B.V. Please quote relevant replies. -----BEGIN PGP SIGNATURE----- iQIyBAEBCAAdFiEEaUo4+yP241VvS+bXJQVB6quqOE8FAlt0V6AACgkQJQVB6quq OE/Avw/4vc+nRUcgUWbsiCgJqbr1rEM9+eGZ99zWc8Lq2yJZ+j2axL5Z2mW4zrQY 0XajJX5eQBSUTkzhIi40Srfq/LQP/5b4tVKMR76wusGfrlQcgTnDy7Q5VfwqnC1q XpMM3FXBmLV5u36U/gyO/PyKUasc/JNz9WYnG193OcStsyq2B7MjYxMEjcdVjmYJ OXqm/IgBXatCKsCdZI8BXjTDK5yhcNTfFcyBzCj8RqCdOROOPc2Z8cdjnqDWqlcO hl9nDIBt2GfYC29IZDcakq3u1scgea7Gwah1yQEdXT/F78NSDSfUs/I17eOsSyul yJsPofenuUD1rVJ1uPB2/ngOPGNu8vVx3vkESFAkTFBBQs+TPyMm9aZNwo/Bei7n O/MOI8C35GzOHiONvmWJbuPn7z7Z9F2Qiog3HhgyNGvcSG2LCwg36CLY+Y1l9NTu xOxY0HMWB49lHwLvcv3YVQgaSGjuaqifZxQ9KGXUhBaim9/DKnNDkP3rl21fbzhx 0lIKKnFhGte0n7K03tlVf2BetQEB+vFyFGuqOFGT8J6qqCSfvucKF/WddEM6ffUl /iuY1BVAHU0PoSYovTfWUK4+b+cfpC6fIkDAAjDKS2i6SKq5JNU+lQTy1riCPmQP ivG2EmmidQvVaqd9FuljVl2oDRICDkR55dd8kYTp6+wjE84snw== =krDy -----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?080501d434b6$c7a9c030$56fd4090$>