Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 07 Jan 2005 15:24:36 -0800
From:      Colin Percival <colin.percival@wadham.ox.ac.uk>
To:        Sean Whalen <sean@node99.org>
Cc:        freebsd-hackers@freebsd.org
Subject:   Re: Potential user/kernel pointer bugs in FreeBSD 5.3
Message-ID:  <41DF1A34.9060704@wadham.ox.ac.uk>
In-Reply-To: <41DF17C2.9060801@node99.org>
References:  <41DF17C2.9060801@node99.org>

next in thread | previous in thread | raw e-mail | index | archive | help
Sean Whalen wrote:
> We recently did work with the Cqual type inference tool to identify 
> potential user/kernel pointer bugs in FreeBSD 5.3.  Our paper is 
> available here: http://www.node99.org/projects/bsduk/
> 
> We identified 5 potential bugs which we are looking to confirm with the 
> community.  Page 10 contains an example of one such candidate.  More 
> true positives may be identified by using a machine with 10 or more gigs 
> of RAM for inter-file analysis of the entire kernel.  If interested, 
> please email me.

Sean,
   Coverity got to that particular bug first -- it was fixed as part of the
FreeBSD-SA-04:17.procfs security advisory.
   Could you send the rest of these to secteam@freebsd.org?  We'd like to
look at them and fix any security issues before they are publicly disclosed.

Thanks,
Colin Percival



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?41DF1A34.9060704>