From owner-freebsd-security@freebsd.org Tue Jun 20 08:29:01 2017 Return-Path: Delivered-To: freebsd-security@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 05315D92944 for ; Tue, 20 Jun 2017 08:29:01 +0000 (UTC) (envelope-from vterziev@gvcgroup.com) Received: from mgate03.itsfogo.com (mgate03.itsfogo.com [195.72.134.149]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (Client CN "*.itsfogo.com", Issuer "thawte SSL CA - G2" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 8FD4F78BE7 for ; Tue, 20 Jun 2017 08:29:00 +0000 (UTC) (envelope-from vterziev@gvcgroup.com) From: Vladimir Terziev To: "freebsd-security@freebsd.org" Subject: The Stack Clash vulnerability Thread-Topic: The Stack Clash vulnerability Thread-Index: AQHS6Z0jz/DDK+TE1km4g5qTF2EboQ== Date: Tue, 20 Jun 2017 08:13:46 +0000 Message-ID: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-mailer: Apple Mail (2.3273) x-ms-exchange-messagesentrepresentingtype: 1 x-originating-ip: [10.138.239.254] MIME-Version: 1.0 X-Mailman-Approved-At: Tue, 20 Jun 2017 11:22:42 +0000 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.23 X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 20 Jun 2017 08:29:01 -0000 Hi, I assume FreeBSD security team is already aware about the Stack Clash vulne= rability, that is stated to affect FreeBSD amongst other Unix-like OS. Just in case here is the analyses document of Qualys: https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt Regards, Vladimir