From owner-freebsd-security@FreeBSD.ORG Tue Oct 4 21:11:07 2011 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 34072106566B for ; Tue, 4 Oct 2011 21:11:07 +0000 (UTC) (envelope-from mark.duller@oucs.ox.ac.uk) Received: from fallback1.mail.ox.ac.uk (fallback1.mail.ox.ac.uk [163.1.2.175]) by mx1.freebsd.org (Postfix) with ESMTP id EB1E78FC21 for ; Tue, 4 Oct 2011 21:11:06 +0000 (UTC) Received: from relay3.mail.ox.ac.uk ([163.1.2.165]) by fallback1.mail.ox.ac.uk with esmtp (Exim 4.69) (envelope-from ) id 1RBBkv-0004UA-5p for freebsd-security@freebsd.org; Tue, 04 Oct 2011 21:38:25 +0100 Received: from smtp0.mail.ox.ac.uk ([129.67.1.205]) by relay3.mail.ox.ac.uk with esmtp (Exim 4.75) (envelope-from ) id 1RBBku-0006iP-AN for freebsd-security@freebsd.org; Tue, 04 Oct 2011 21:38:24 +0100 Received: from gilliam.oucs.ox.ac.uk ([129.67.102.47]) by smtp0.mail.ox.ac.uk with esmtps (TLSv1:AES256-SHA:256) (Exim 4.69) (envelope-from ) id 1RBBkt-0001fE-2y for freebsd-security@freebsd.org; Tue, 04 Oct 2011 21:38:24 +0100 Message-ID: <4E8B6EBF.4060308@oucs.ox.ac.uk> Date: Tue, 04 Oct 2011 21:38:23 +0100 From: Mark Duller MIME-Version: 1.0 To: freebsd-security@freebsd.org References: <201110041915.p94JFgpT092868@freefall.freebsd.org> In-Reply-To: <201110041915.p94JFgpT092868@freefall.freebsd.org> X-Enigmail-Version: undefined Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Subject: Re: FreeBSD Security Advisory FreeBSD-SA-11:05.unix [REVISED] X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 04 Oct 2011 21:11:07 -0000 On 10/04/11 20:15, FreeBSD Security Advisories wrote: > ============================================================================= > > FreeBSD-SA-11:05.unix Security Advisory > The FreeBSD Project > > Topic: Buffer overflow in handling of UNIX socket > addresses > > Category: core Module: kern Announced: > 2011-09-28 Credits: Mateusz Guzik Affects: All > supported versions of FreeBSD. > IV. Workaround > > No workaround is available, but systems without untrusted local > users are not vulnerable. Does this affect a default FreeBSD install? I believe linux emulation support is disabled by default? Mark