This data corruption can be exploited by an local attacker to escalate their privilege by carefully controlling the corruption of system files. It should be noted that the attacker can corrupt any file they have read access to.
NOTE: While systems without untrusted local users are not affected by the security aspects of this issue, the potential for data corruption implies that this should still be treated as a critical erratum. 0176ちきちーた ★2010/07/13(火) 16:17:48ID:???0 山行ってくる 0177動け動けウゴウゴ2ちゃんねる2010/07/13(火) 16:23:38ID:FBvQEgijP 何処の山逝くのかな・・・気を付けて行ってらっしゃいませ。 んで、お早いお帰りを。 0178動け動けウゴウゴ2ちゃんねる2010/07/13(火) 16:27:03ID:Fx6wvr400>>176 山だと 0179動け動けウゴウゴ2ちゃんねる2010/07/13(火) 16:28:28ID:ySR+yjkq0 柴刈りですかね 0180動け動けウゴウゴ2ちゃんねる2010/07/13(火) 17:10:17ID:rt7edQ7O0 なんかそう言って帰ってこなかったまんが家さんがいましたね;ω; 0181動け動けウゴウゴ2ちゃんねる2010/07/13(火) 18:13:34ID:h8QHC7L10 パ…パンパカの予感? 0182動け動けウゴウゴ2ちゃんねる2010/07/13(火) 18:25:01ID:45RG3dKg0>>174 IV. Workaround
No workaround is available.
V. Solution
Perform one of the following:
1) Upgrade your vulnerable system to 7-STABLE or 8-STABLE, or to the RELENG_8_1, RELENG_8_0, RELENG_7_3, or RELENG_7_1 security branch dated after the correction date.
2) To update your vulnerable system via a source code patch:
The following patches have been verified to apply to FreeBSD 7.1, 7.3, 8.0 and 8.1 systems.
a) Download the relevant patch from the location below, and verify the detached PGP signature using your PGP utility.
r209309 | jfv | 2010-06-19 02:22:08 +0900 (Sat, 19 Jun 2010) | 9 lines Changed paths: M /stable/8/sys/dev/e1000/if_em.c M /stable/8/sys/dev/e1000/if_igb.c M /stable/8/sys/dev/e1000/if_igb.h M /stable/8/sys/dev/e1000/if_lem.c
MFC of E1000 drivers: Stability fixes from M.Tuexen Cool stats changes from gnn Changes for POLL friendliness from John Baldwin
Thanks everyone!
MFC to RELENG8.1 asap 0196動け動けウゴウゴ2ちゃんねる2010/07/14(水) 14:37:26ID:U6Ukesly0 今晩のガッテンは「山登り疲労回復法」だってな。 (山登りの疲労を回復するのでは無くて、山登りによってそれまでの疲労を回復するらしい)