From owner-freebsd-amd64@FreeBSD.ORG Wed Apr 6 01:33:31 2005 Return-Path: Delivered-To: freebsd-amd64@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 3F6CB16A4CE for ; Wed, 6 Apr 2005 01:33:31 +0000 (GMT) Received: from daintree.corp.yahoo.com (daintree.corp.yahoo.com [216.145.52.172]) by mx1.FreeBSD.org (Postfix) with ESMTP id 2415343D41 for ; Wed, 6 Apr 2005 01:33:31 +0000 (GMT) (envelope-from peter@wemm.org) Received: by daintree.corp.yahoo.com (Postfix, from userid 2154) id 2903A19774; Tue, 5 Apr 2005 18:33:31 -0700 (PDT) From: Peter Wemm To: amd64@freebsd.org Date: Tue, 5 Apr 2005 18:33:30 -0700 User-Agent: KMail/1.7.2 MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: <200504051833.30708.peter@wemm.org> Subject: HEADS UP: FreeBSD-SA-05:03.amd64 X-BeenThere: freebsd-amd64@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Porting FreeBSD to the AMD64 platform List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 06 Apr 2005 01:33:31 -0000 In case anybody is not paying attention to -announce, there is a security fix that has just gone into HEAD, 5.3 and 5.4. If you have public or untrusted users or code on your machines, you want to get this patched ASAP... Note that the upcoming 5.4-RC1 *is* vulnerable and will need to be patched. As an aside, the patch also should fix double faults. I'd botched the layout of the tss structure definition too. -- Peter Wemm - peter@wemm.org; peter@FreeBSD.org; peter@yahoo-inc.com "All of this is for nothing if we don't go to the stars" - JMS/B5