Date: Wed, 28 Jun 2017 22:40:13 +0800 From: Jov <amutu@amutu.com> To: Dan Mack <mack@macktronics.com> Cc: freebsd-current <freebsd-current@freebsd.org> Subject: Re: fixes for stack clash vulnerability Message-ID: <CADyrUxPtqNi9f846D9qGu-jsnTNa7hGUJ81_T7nAZH3OBJiRXw@mail.gmail.com> In-Reply-To: <alpine.GSO.2.11.1706280856320.28006@localhost.local> References: <alpine.GSO.2.11.1706280856320.28006@localhost.local>
next in thread | previous in thread | raw e-mail | index | archive | help
There is a commit fix this: https://svnweb.freebsd.org/changeset/base/32031= 7 Jov 2017=E5=B9=B46=E6=9C=8828=E6=97=A5 10:27 PM=EF=BC=8C"Dan Mack" <mack@macktr= onics.com>=E5=86=99=E9=81=93=EF=BC=9A > FreeBSD is mentioned as being vulnerable to this and Qualsys has working > exploits which might be released soon: > > https://blog.qualys.com/securitylabs/2017/06/19/the-stack-clash > > I don't remember seeing an advisory or seeing any fixes on the svn commit > stream so just curious. > > Dan > _______________________________________________ > freebsd-current@freebsd.org mailing list > https://lists.freebsd.org/mailman/listinfo/freebsd-current > To unsubscribe, send any mail to "freebsd-current-unsubscribe@freebsd.org= " >
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CADyrUxPtqNi9f846D9qGu-jsnTNa7hGUJ81_T7nAZH3OBJiRXw>