From owner-freebsd-security@FreeBSD.ORG Fri Sep 25 13:05:20 2009 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 4C782106566C for ; Fri, 25 Sep 2009 13:05:20 +0000 (UTC) (envelope-from mike@sentex.net) Received: from lava.sentex.ca (pyroxene.sentex.ca [199.212.134.18]) by mx1.freebsd.org (Postfix) with ESMTP id 197FF8FC25 for ; Fri, 25 Sep 2009 13:05:19 +0000 (UTC) Received: from mdt-xp.sentex.net (simeon.sentex.ca [192.168.43.27]) by lava.sentex.ca (8.14.3/8.14.3) with ESMTP id n8PCmJPY011925; Fri, 25 Sep 2009 08:48:19 -0400 (EDT) (envelope-from mike@sentex.net) Message-Id: <200909251248.n8PCmJPY011925@lava.sentex.ca> X-Mailer: QUALCOMM Windows Eudora Version 7.1.0.9 Date: Fri, 25 Sep 2009 08:52:25 -0400 To: d@delphij.net From: Mike Tancsa In-Reply-To: <4AAF5999.7020501@delphij.net> References: <4AAF45B4.60307@isafeelin.org> <4AAF5999.7020501@delphij.net> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii"; format=flowed Cc: freebsd-security@freebsd.org Subject: Re: FreeBSD bug grants local root access (FreeBSD 6.x) X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 25 Sep 2009 13:05:20 -0000 At 05:08 AM 9/15/2009, Xin LI wrote: >-----BEGIN PGP SIGNED MESSAGE----- >Hash: SHA1 > >Hi, > >Frederique Rijsdijk wrote: > > Hi, > > > > Any info on this subject on > > > > http://www.theregister.co.uk/2009/09/14/freebsd_security_bug/ > >Currently we (secteam@) are testing the correction patch and do >peer-review on the security advisory draft, the bug was found and fixed >on -HEAD and 7-STABLE before 7.1-RELEASE during some stress test but was >not recognized as a security vulnerability at that time. The exploit >code has to be executed locally, i.e. either by an untrusted local user, >or be exploited in conjunction with some remote vulnerability on >applications that allow the attacker to inject their own code. > >We can not release further details about the problem at this time, >though, but I think we will likely to publish the advisory and >correction patch this patch Wednesday. Hi, Just wondering if there is any update on this issue ? ---Mike -------------------------------------------------------------------- Mike Tancsa, tel +1 519 651 3400 Sentex Communications, mike@sentex.net Providing Internet since 1994 www.sentex.net Cambridge, Ontario Canada www.sentex.net/mike