Download
| Alert*
oval:org.secpod.oval:def:600853
Rafal Wojtczuk from Bromium discovered that FreeBSD wasn"t handling correctly uncanonical return addresses on Intel amd64 CPUs, allowing privilege escalation to kernel for local users. oval:org.secpod.oval:def:600675 Buffer overflow in the "linux emulation" support in FreeBSD kernel allows local users to cause a denial of service and possibly execute arbitrary code by calling the bind system call with a long path for a UNIX-domain socket, which is not properly handled when the address is used by other ... oval:org.secpod.oval:def:601382 kfreebsd-8 is installed |