jtl
55789af7ee
Drop 0-byte IPv6 fragments.
...
Currently, we process IPv6 fragments with 0 bytes of payload, add them
to the reassembly queue, and do not recognize them as duplicating or
overlapping with adjacent 0-byte fragments. An attacker can exploit this
to create long fragment queues.
There is no legitimate reason for a fragment with no payload. However,
because IPv6 packets with an empty payload are acceptable, allow an
"atomic" fragment with no payload.
Reviewed by: jhb
Security: FreeBSD-SA-18:10.ip
Security: CVE-2018-6923
2018-08-14 17:29:22 +00:00
..
2018-03-24 12:43:34 +00:00
2018-08-14 17:29:22 +00:00
2018-07-24 16:35:52 +00:00
2017-11-20 19:43:44 +00:00
2018-06-16 08:26:23 +00:00
2017-02-28 23:42:47 +00:00
2018-07-24 16:35:52 +00:00
2018-06-14 09:29:39 +00:00
2017-11-20 19:43:44 +00:00
2018-04-06 17:35:35 +00:00
2018-08-09 14:04:51 +00:00
2018-07-01 01:01:59 +00:00
2017-11-20 19:43:44 +00:00
2017-11-27 15:23:17 +00:00
2018-08-14 17:27:41 +00:00
2018-07-24 16:35:52 +00:00
2018-07-24 16:35:52 +00:00
2018-05-24 23:21:23 +00:00
2018-07-17 11:33:23 +00:00
2018-08-14 17:27:41 +00:00
2017-11-20 19:43:44 +00:00
2018-05-02 22:11:16 +00:00
2018-03-23 16:56:44 +00:00
2018-07-24 16:35:52 +00:00
2017-12-28 20:40:56 +00:00
2018-08-14 07:54:14 +00:00
2018-07-24 16:35:52 +00:00
2017-11-20 19:43:44 +00:00
2018-07-15 00:47:06 +00:00
2018-08-14 17:27:41 +00:00
2017-11-20 19:43:44 +00:00
2016-08-13 16:09:49 +00:00
2016-07-18 19:46:31 +00:00
2018-05-02 19:36:29 +00:00
2018-07-24 16:35:52 +00:00
2017-11-27 15:23:17 +00:00
2018-07-24 16:35:52 +00:00
2018-07-24 16:35:52 +00:00
2018-07-24 16:35:52 +00:00
2017-12-25 04:48:39 +00:00
2018-06-05 20:51:01 +00:00
2017-11-20 19:43:44 +00:00
2018-07-04 02:47:16 +00:00
2017-11-20 19:43:44 +00:00
2017-11-20 19:43:44 +00:00
2018-06-05 20:54:29 +00:00
2018-07-24 16:35:52 +00:00
2018-08-14 08:33:47 +00:00
2018-07-19 20:16:33 +00:00
2018-07-24 16:35:52 +00:00
2017-11-27 15:23:17 +00:00
2017-11-20 19:43:44 +00:00
2018-07-31 22:56:03 +00:00
2017-11-20 19:43:44 +00:00