On 10/04/11 20:15, FreeBSD Security Advisories wrote:
> =============================================================================
>
> 
FreeBSD-SA-11:05.unix                                       Security
Advisory
> The FreeBSD Project
> 
> Topic:          Buffer overflow in handling of UNIX socket
> addresses
> 
> Category:       core Module:         kern Announced:
> 2011-09-28 Credits:        Mateusz Guzik Affects:        All
> supported versions of FreeBSD.
<snip>
> IV.  Workaround
> 
> No workaround is available, but systems without untrusted local
> users are not vulnerable.

Does this affect a default FreeBSD install? I believe linux emulation
support is disabled by default?

Mark
_______________________________________________
freebsd-security@freebsd.org mailing list
http://lists.freebsd.org/mailman/listinfo/freebsd-security
To unsubscribe, send any mail to "freebsd-security-unsubscr...@freebsd.org"

Reply via email to