Date: Tue, 15 Sep 2009 10:56:50 +0800 From: Giorgos Keramidas <keramida@freebsd.org> To: dgoodin@theregister.com Cc: media@freebsd.org, freebsd-questions@freebsd.org, press@freebsd.org Subject: Re: reporter on deadline seeks comment about reported security bug in FreeBSD Message-ID: <87fxaokj9p.fsf@kobe.laptop> In-Reply-To: <4AAE95B2.5050409@sitpub.com> (Dan Goodin's message of "Mon, 14 Sep 2009 12:12:50 -0700") References: <4AAE95B2.5050409@sitpub.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Hi Dan, The right place to report security problems with FreeBSD is to the Security Officer team. A PGP signed email to the email address of the security team at <security-officer@freebsd.org> is enough to get the attention of the FreeBSD Project. Przemyslaw should email security-officer with any details he thinks are relevant. Then the security team will make sure to fix the bug for all affected releases of FreeBSD, release a patch with the fix, issue an advisory through the usual channels, and post the details online at our security information web pages at <http://www.FreeBSD.org/security/>. Regards, Giorgos On Mon, 14 Sep 2009 12:12:50 -0700, Dan Goodin <dgoodin@sitpub.com> wrote: > Hello, > > Dan Goodin, a reporter at technology news website The Register. Security > researcher Przemyslaw Frasunek says versions 6.x through 6.4 of FreeBSD > has a security bug. He says he notified the FreeBSD Foundation on August > 29 and never got a response. We'll be writing a brief article about > this. Please let me know ASAP if someone cares to comment. > > Kind regards, > > Dan Goodin > 415-495-5411 > > -------- Original Message -------- > Subject: Re: [Full-disclosure] FreeBSD <= 6.1 kqueue() NULL pointer > dereference > Date: Sun, 13 Sep 2009 10:49:33 +0200 > From: Przemyslaw Frasunek <venglin@freebsd.lublin.pl> > Organization: frasunek.com > To: full-disclosure@lists.grok.org.uk, bugtraq@securityfocus.com > References: <4A9028AC.9080902@freebsd.lublin.pl> > > Przemyslaw Frasunek pisze: >> FreeBSD <= 6.1 suffers from classical check/use race condition on SMP > > There is yet another kqueue related vulnerability. It affects 6.x, up to > 6.4-STABLE. FreeBSD security team was notified on 29th Aug, but there is no > response until now, so I won't publish any details. > > Sucessful exploitation yields local root and allows to exit from jail. > For now, > you can see demo on: > > http://www.vimeo.com/6554787
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?87fxaokj9p.fsf>