Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 04 Oct 2011 21:38:23 +0100
From:      Mark Duller <mark.duller@oucs.ox.ac.uk>
To:        freebsd-security@freebsd.org
Subject:   Re: FreeBSD Security Advisory FreeBSD-SA-11:05.unix [REVISED]
Message-ID:  <4E8B6EBF.4060308@oucs.ox.ac.uk>
In-Reply-To: <201110041915.p94JFgpT092868@freefall.freebsd.org>
References:  <201110041915.p94JFgpT092868@freefall.freebsd.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On 10/04/11 20:15, FreeBSD Security Advisories wrote:
> =============================================================================
>
> 
FreeBSD-SA-11:05.unix                                       Security
Advisory
> The FreeBSD Project
> 
> Topic:          Buffer overflow in handling of UNIX socket
> addresses
> 
> Category:       core Module:         kern Announced:
> 2011-09-28 Credits:        Mateusz Guzik Affects:        All
> supported versions of FreeBSD.
<snip>
> IV.  Workaround
> 
> No workaround is available, but systems without untrusted local
> users are not vulnerable.

Does this affect a default FreeBSD install? I believe linux emulation
support is disabled by default?

Mark



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4E8B6EBF.4060308>