Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 15 Mar 2007 12:02:24 +0100 (BST)
From:      Robert Watson <rwatson@FreeBSD.org>
To:        Eygene Ryabinkin <rea-fbsd@codelabs.ru>
Cc:        freebsd-security@freebsd.org
Subject:   Re: OpenBSD IPv6 remote kernel buffer overflow. FreeBSD has this too?
Message-ID:  <20070315120009.A60010@fledge.watson.org>
In-Reply-To: <20070314074510.GH99047@codelabs.ru>
References:  <20070314074510.GH99047@codelabs.ru>

next in thread | previous in thread | raw e-mail | index | archive | help

On Wed, 14 Mar 2007, Eygene Ryabinkin wrote:

> Just spotted the new advisory from CORE:
> 	http://www.securityfocus.com/archive/1/462728/30/0/threaded Not an 
> expert, but FreeBSD's src/sys/kern/uipc_mbuf2.c has the very simular code.
>
> Robert, anyone, could you please check?

Eygene,

Sorry for the delayed response on this -- I've only just returned from Tokyo 
in the last day and am significantly behind in e-mail from the trip.

According to a source analysis by Jinmei, we are not vulnerable, but I will 
continue tracking the thread.  Apparently this vulnerability involved an issue 
in the handling of M_EXT, and our implementation of clusters differs 
significantly from OpenBSD, so it seems likely we are not affected.  If we 
discover any information to the contrary, you can be sure that we will get it 
fixed and release an advisory!

Robert N M Watson
Computer Laboratory
University of Cambridge



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20070315120009.A60010>