Date: Tue, 15 Sep 2009 17:36:05 +0200 From: Przemyslaw Frasunek <przemyslaw@frasunek.com> To: =?UTF-8?B?RGFnLUVybGluZyBTbcO4cmdyYXY=?= <des@des.no> Cc: freebsd-security@freebsd.org, Pieter de Boer <pieter@thedarkside.nl> Subject: Re: Protecting against kernel NULL-pointer derefs Message-ID: <4AAFB465.4010901@frasunek.com> In-Reply-To: <8663bk2xcb.fsf@ds4.des.no> References: <4AAF4A64.3080906@thedarkside.nl> <86ab0w2z05.fsf@ds4.des.no> <4AAF8775.7000002@thedarkside.nl> <8663bk2xcb.fsf@ds4.des.no>
next in thread | previous in thread | raw e-mail | index | archive | help
Dag-Erling Smørgrav: > A search of FreeBSD security advisories shows two in the last four > years, plus the current unreleased issue. There are three NULL pointer dereference issues, that I found in last month, but probably more to come, so implementing some kind of zero page protection should be considered. The first one affects 6.1 and it was made public in August: http://www.frasunek.com/kqueue.txt Another one affects 6.4 and is currently handled by secteam. Advisory will be released on Wednesday. The last one, as demonstrated on http://www.vimeo.com/6580991 affects 7.x up to 7.2 and 6.x up to 6.4. I'm not going to disclose any details before official security advisory.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4AAFB465.4010901>