Date: Fri, 7 Jan 2005 15:09:08 -0800 From: Kris Kennaway <kris@obsecurity.org> To: Sean Whalen <sean@node99.org> Cc: freebsd-bugs@freebsd.org Subject: Re: Potential user/kernel pointer bugs identified in FreeBSD 5.3 Message-ID: <20050107230908.GA32344@xor.obsecurity.org> In-Reply-To: <41DF11EC.1070003@node99.org> References: <41DF11EC.1070003@node99.org>
next in thread | previous in thread | raw e-mail | index | archive | help
[-- Attachment #1 --] On Fri, Jan 07, 2005 at 02:49:16PM -0800, Sean Whalen wrote: > Hello, > > We recently analyzed the FreeBSD 5.3 kernel source for user/kernel > pointer bugs using the Cqual tool (http://cqual.sourcefornet.net). > Previous work has done the same with the Linux kernel. > > The paper is available here: http://www.node99.org/projects/bsduk/ > On page 10 is an example trace of one such potential bug. If there is > interest, we have traces for the others as well. > > Our analysis was limited by RAM, and could be potentially improved by > using a machine with around 10 gigs of RAM for inter-file analysis of > the entire kernel. > > Hopefully this is the right list for such a discussion. Best, freebsd-hackers would be better. Kris [-- Attachment #2 --] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.6 (FreeBSD) iD8DBQFB3xaUWry0BWjoQKURArgBAJ44FIBhOkApWezUe3dSCy5Bp/4RTwCg2Dm9 Wys8NwBhbXE0k0dkx/w2Z54= =gRy1 -----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20050107230908.GA32344>
