Date: Fri, 7 Jan 2005 15:09:08 -0800 From: Kris Kennaway <kris@obsecurity.org> To: Sean Whalen <sean@node99.org> Cc: freebsd-bugs@freebsd.org Subject: Re: Potential user/kernel pointer bugs identified in FreeBSD 5.3 Message-ID: <20050107230908.GA32344@xor.obsecurity.org> In-Reply-To: <41DF11EC.1070003@node99.org> References: <41DF11EC.1070003@node99.org>
next in thread | previous in thread | raw e-mail | index | archive | help
--zhXaljGHf11kAtnf Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Fri, Jan 07, 2005 at 02:49:16PM -0800, Sean Whalen wrote: > Hello, >=20 > We recently analyzed the FreeBSD 5.3 kernel source for user/kernel=20 > pointer bugs using the Cqual tool (http://cqual.sourcefornet.net). > Previous work has done the same with the Linux kernel. >=20 > The paper is available here: http://www.node99.org/projects/bsduk/ > On page 10 is an example trace of one such potential bug. If there is=20 > interest, we have traces for the others as well. >=20 > Our analysis was limited by RAM, and could be potentially improved by=20 > using a machine with around 10 gigs of RAM for inter-file analysis of=20 > the entire kernel. >=20 > Hopefully this is the right list for such a discussion. Best, freebsd-hackers would be better. Kris --zhXaljGHf11kAtnf Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.6 (FreeBSD) iD8DBQFB3xaUWry0BWjoQKURArgBAJ44FIBhOkApWezUe3dSCy5Bp/4RTwCg2Dm9 Wys8NwBhbXE0k0dkx/w2Z54= =gRy1 -----END PGP SIGNATURE----- --zhXaljGHf11kAtnf--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20050107230908.GA32344>