Date: Tue, 16 Sep 2014 21:46:50 +0800 From: Xin Li <delphij@delphij.net> To: Andriy Gapon <avg@FreeBSD.org>, freebsd-security@FreeBSD.org Subject: Re: [FreeBSD-Announce] FreeBSD Security Advisory FreeBSD-SA-14:19.tcp Message-ID: <54183F4A.10802@delphij.net> In-Reply-To: <541831A3.7010700@FreeBSD.org> References: <201409161014.s8GAE7jY070664@freefall.freebsd.org> <541831A3.7010700@FreeBSD.org>
next in thread | previous in thread | raw e-mail | index | archive | help
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 On 9/16/14 8:48 PM, Andriy Gapon wrote: > On 16/09/2014 13:14, FreeBSD Security Advisories wrote: >> ============================================================================= >> >> FreeBSD-SA-14:19.tcp Security Advisory >> The FreeBSD Project >> >> Topic: Denial of Service in TCP packet processing >> >> Category: core Module: inet Announced: >> 2014-09-16 Credits: Jonathan Looney (Juniper SIRT) >> Affects: All supported versions of FreeBSD. > > Does the issue affect head aka CURRENT as well? It does. Note that CURRENT is not considered as 'supported' in the security advisory context, though. Cheers, -----BEGIN PGP SIGNATURE----- iQIcBAEBCgAGBQJUGD9KAAoJEJW2GBstM+nsi3cQAKzL4RINOVU2FkZsLyN4RYGH golAhWQ2L07GYc1AfahyH/KNpGsYVT/bXuW+2qsm+Rl+UZbbYsN9Jza8RNSDCxPa 5MfQZXQEYAUfUcHMskqgf2vV5sNIzGp9F8ouxUZX0URAndv67Y5+bF4jIX+SlFcP f0kzwTFObDSYrYoGniZMzT17YAPB8cS1l/NkSH2Rnu7mbY7h0ybRngODZKnfFvoM fcPD/23cFqsxAK7jEo7i5a0lvx9dTm2Ahtesj7CyzJgTjB2/MhsJbNnp4rCOYx1f 4X3vePUoTUmkDqIT6SoFdO2aVAH1JDzM/e6swWQFLCYMZPI6x4Zw22vaARQSiECw aeHu2nkG/m4HVXrOiRUuy9Wk7rGq/IfzCMiTGdwU/mV3A952J/sDBjl211XKBDZq A6fKdBaXi9V5P7ykUt3HonEoVjbt71KmiMKI1pqE63q+QCw8sZCwqd7uwoiaE71B 7H1UYBNlEgxisP6WolzCPpBOMAEVQiqesYHlQHgW/kzq4aTVa7EumhBuciQ1QfDq fFERPnHHwwUiwF+D/OiJQtPCqVhpJSP48nJsyVTJKZWpUI8NU1ePDVmLUWLPbtv/ 5VKwwjtT9jJEC2sl4dSRNFT0xcMH2g0n3mdVxJTiF/RinWuk9Qf14l+43A/gzwps srLDGfcN70zXV0C0NXNT =yDa7 -----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?54183F4A.10802>