Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 28 Jun 2017 22:40:13 +0800
From:      Jov <amutu@amutu.com>
To:        Dan Mack <mack@macktronics.com>
Cc:        freebsd-current <freebsd-current@freebsd.org>
Subject:   Re: fixes for stack clash vulnerability
Message-ID:  <CADyrUxPtqNi9f846D9qGu-jsnTNa7hGUJ81_T7nAZH3OBJiRXw@mail.gmail.com>
In-Reply-To: <alpine.GSO.2.11.1706280856320.28006@localhost.local>
References:  <alpine.GSO.2.11.1706280856320.28006@localhost.local>

next in thread | previous in thread | raw e-mail | index | archive | help
There is a commit fix this: https://svnweb.freebsd.org/changeset/base/32031=
7

Jov

2017=E5=B9=B46=E6=9C=8828=E6=97=A5 10:27 PM=EF=BC=8C"Dan Mack" <mack@macktr=
onics.com>=E5=86=99=E9=81=93=EF=BC=9A

> FreeBSD is mentioned as being vulnerable to this and Qualsys has working
> exploits which might be released soon:
>
>   https://blog.qualys.com/securitylabs/2017/06/19/the-stack-clash
>
> I don't remember seeing an advisory or seeing any fixes on the svn commit
> stream so just curious.
>
> Dan
> _______________________________________________
> freebsd-current@freebsd.org mailing list
> https://lists.freebsd.org/mailman/listinfo/freebsd-current
> To unsubscribe, send any mail to "freebsd-current-unsubscribe@freebsd.org=
"
>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CADyrUxPtqNi9f846D9qGu-jsnTNa7hGUJ81_T7nAZH3OBJiRXw>