A local overflow exists in FreeBSD. The linux compatibility module fails to valid input resulting in a buffer overflow. With a specially crafted request, an attacker can cause cause values on the stack to be overwritten to gain root privileges resulting in a loss of integrity.
Upgrade to version 3.5-STABLE, 4.1-STABLE or 5.0-CURRENT after the respective correction dates, as it has been reported to fix this vulnerability. It is also possible to correct the flaw by implementing the following workaround(s): unload the "linux" module by executing the following
command as root:
For safety, remove the /modules/linux.ko file to prevent it being
reloaded accidentally, and add or change the following line in
linux_enable="NO" # Linux binary compatibility loaded at startup (or NO).
If the module is not loaded, to determine whether the functionality
has been statically compiled into the kernel, check the kernel
configuration file for the following line:
If present, remove and recompile the kernel as described in
http://www.freebsd.org/handbook/kernelconfig.html and reboot the