#
277808 |
|
27-Jan-2015 |
delphij |
Fix SCTP SCTP_SS_VALUE kernel memory corruption and disclosure vulnerability and SCTP stream reset vulnerability.
Security: FreeBSD-SA-15:02.kmem Security: CVE-2014-8612 Security: FreeBSD-SA-15:03.sctp Security: CVE-2014-8613 Approved by: so
|
#
267806 |
|
23-Jun-2014 |
tuexen |
MFC r267781: Fix a bug in the setsockopt()-handling of the SCTP specific option SCTP_PEER_ADDR_THLDS: Use the provided address as intended.
MFC r267781: Fix a bug which incorrectly allowed two listening SCTP sockets on the same port bound to the wildcard address.
Approved by: re (gjb@)
|
#
267799 |
|
23-Jun-2014 |
tuexen |
MFC r267780:
Honor jails for unbound SCTP sockets when selecting source addresses, reporting IP-addresses to the peer during the handshake, adding addresses to the host, reporting the addresses via the sysctl interface (used by netstat, for example) and reporting the addresses to the application via socket options. This issue was reported by Bernd Walter.
Approved by: re (glebius@)
|
#
277808 |
|
27-Jan-2015 |
delphij |
Fix SCTP SCTP_SS_VALUE kernel memory corruption and disclosure vulnerability and SCTP stream reset vulnerability.
Security: FreeBSD-SA-15:02.kmem Security: CVE-2014-8612 Security: FreeBSD-SA-15:03.sctp Security: CVE-2014-8613 Approved by: so
|
#
267806 |
|
23-Jun-2014 |
tuexen |
MFC r267781: Fix a bug in the setsockopt()-handling of the SCTP specific option SCTP_PEER_ADDR_THLDS: Use the provided address as intended.
MFC r267781: Fix a bug which incorrectly allowed two listening SCTP sockets on the same port bound to the wildcard address.
Approved by: re (gjb@)
|
#
267799 |
|
23-Jun-2014 |
tuexen |
MFC r267780:
Honor jails for unbound SCTP sockets when selecting source addresses, reporting IP-addresses to the peer during the handshake, adding addresses to the host, reporting the addresses via the sysctl interface (used by netstat, for example) and reporting the addresses to the application via socket options. This issue was reported by Bernd Walter.
Approved by: re (glebius@)
|