Date: Thu, 15 Mar 2007 12:02:24 +0100 (BST) From: Robert Watson <rwatson@FreeBSD.org> To: Eygene Ryabinkin <rea-fbsd@codelabs.ru> Cc: freebsd-security@freebsd.org Subject: Re: OpenBSD IPv6 remote kernel buffer overflow. FreeBSD has this too? Message-ID: <20070315120009.A60010@fledge.watson.org> In-Reply-To: <20070314074510.GH99047@codelabs.ru> References: <20070314074510.GH99047@codelabs.ru>
next in thread | previous in thread | raw e-mail | index | archive | help
On Wed, 14 Mar 2007, Eygene Ryabinkin wrote: > Just spotted the new advisory from CORE: > http://www.securityfocus.com/archive/1/462728/30/0/threaded Not an > expert, but FreeBSD's src/sys/kern/uipc_mbuf2.c has the very simular code. > > Robert, anyone, could you please check? Eygene, Sorry for the delayed response on this -- I've only just returned from Tokyo in the last day and am significantly behind in e-mail from the trip. According to a source analysis by Jinmei, we are not vulnerable, but I will continue tracking the thread. Apparently this vulnerability involved an issue in the handling of M_EXT, and our implementation of clusters differs significantly from OpenBSD, so it seems likely we are not affected. If we discover any information to the contrary, you can be sure that we will get it fixed and release an advisory! Robert N M Watson Computer Laboratory University of Cambridge
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20070315120009.A60010>