From owner-freebsd-hackers@FreeBSD.ORG Fri Nov 26 10:26:42 2010 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id C3277106564A for ; Fri, 26 Nov 2010 10:26:42 +0000 (UTC) (envelope-from fidaj@ukr.net) Received: from fsm1.ukr.net (fsm1.ukr.net [195.214.192.23]) by mx1.freebsd.org (Postfix) with ESMTP id 82E238FC17 for ; Fri, 26 Nov 2010 10:26:42 +0000 (UTC) Received: from 231-73-132-95.pool.ukrtel.net ([95.132.73.231] helo=localhost) by fsm1.ukr.net with esmtps ID 1PLvVo-0006SF-Gq for freebsd-hackers@freebsd.org; Fri, 26 Nov 2010 12:26:40 +0200 Date: Fri, 26 Nov 2010 12:26:39 +0200 From: Ivan Klymenko To: freebsd-hackers@freebsd.org Message-ID: <20101126122639.4fd47cba@ukr.net> X-Mailer: Claws Mail 3.7.6 (GTK+ 2.20.1; amd64-portbld-freebsd9.0) Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Subject: Simple kernel attack using socketpair. X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 26 Nov 2010 10:26:42 -0000 Hello! Rumor has it that this vulnerability applies to FreeBSD too, with the replacement SOCK_SEQPACKET on SOCK_DGRAM... http://lkml.org/lkml/2010/11/25/8 What do you think about this? Thank you!