Date: Wed, 28 Jun 2017 22:40:13 +0800 From: Jov <amutu@amutu.com> To: Dan Mack <mack@macktronics.com> Cc: freebsd-current <freebsd-current@freebsd.org> Subject: Re: fixes for stack clash vulnerability Message-ID: <CADyrUxPtqNi9f846D9qGu-jsnTNa7hGUJ81_T7nAZH3OBJiRXw@mail.gmail.com> In-Reply-To: <alpine.GSO.2.11.1706280856320.28006@localhost.local> References: <alpine.GSO.2.11.1706280856320.28006@localhost.local>
index | next in thread | previous in thread | raw e-mail
There is a commit fix this: https://svnweb.freebsd.org/changeset/base/320317 Jov 2017年6月28日 10:27 PM,"Dan Mack" <mack@macktronics.com>写道: > FreeBSD is mentioned as being vulnerable to this and Qualsys has working > exploits which might be released soon: > > https://blog.qualys.com/securitylabs/2017/06/19/the-stack-clash > > I don't remember seeing an advisory or seeing any fixes on the svn commit > stream so just curious. > > Dan > _______________________________________________ > freebsd-current@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-current > To unsubscribe, send any mail to "freebsd-current-unsubscribe@freebsd.org" >help
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CADyrUxPtqNi9f846D9qGu-jsnTNa7hGUJ81_T7nAZH3OBJiRXw>
