Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 28 Jun 2017 22:40:13 +0800
From:      Jov <amutu@amutu.com>
To:        Dan Mack <mack@macktronics.com>
Cc:        freebsd-current <freebsd-current@freebsd.org>
Subject:   Re: fixes for stack clash vulnerability
Message-ID:  <CADyrUxPtqNi9f846D9qGu-jsnTNa7hGUJ81_T7nAZH3OBJiRXw@mail.gmail.com>
In-Reply-To: <alpine.GSO.2.11.1706280856320.28006@localhost.local>
References:  <alpine.GSO.2.11.1706280856320.28006@localhost.local>

index | next in thread | previous in thread | raw e-mail

There is a commit fix this: https://svnweb.freebsd.org/changeset/base/320317

Jov

2017年6月28日 10:27 PM,"Dan Mack" <mack@macktronics.com>写道:

> FreeBSD is mentioned as being vulnerable to this and Qualsys has working
> exploits which might be released soon:
>
>   https://blog.qualys.com/securitylabs/2017/06/19/the-stack-clash
>
> I don't remember seeing an advisory or seeing any fixes on the svn commit
> stream so just curious.
>
> Dan
> _______________________________________________
> freebsd-current@freebsd.org mailing list
> https://lists.freebsd.org/mailman/listinfo/freebsd-current
> To unsubscribe, send any mail to "freebsd-current-unsubscribe@freebsd.org"
>


help

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CADyrUxPtqNi9f846D9qGu-jsnTNa7hGUJ81_T7nAZH3OBJiRXw>