Date: Tue, 04 Oct 2011 21:38:23 +0100 From: Mark Duller <mark.duller@oucs.ox.ac.uk> To: freebsd-security@freebsd.org Subject: Re: FreeBSD Security Advisory FreeBSD-SA-11:05.unix [REVISED] Message-ID: <4E8B6EBF.4060308@oucs.ox.ac.uk> In-Reply-To: <201110041915.p94JFgpT092868@freefall.freebsd.org> References: <201110041915.p94JFgpT092868@freefall.freebsd.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On 10/04/11 20:15, FreeBSD Security Advisories wrote: > ============================================================================= > > FreeBSD-SA-11:05.unix Security Advisory > The FreeBSD Project > > Topic: Buffer overflow in handling of UNIX socket > addresses > > Category: core Module: kern Announced: > 2011-09-28 Credits: Mateusz Guzik Affects: All > supported versions of FreeBSD. <snip> > IV. Workaround > > No workaround is available, but systems without untrusted local > users are not vulnerable. Does this affect a default FreeBSD install? I believe linux emulation support is disabled by default? Mark
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4E8B6EBF.4060308>