Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 7 Jan 2005 15:09:08 -0800
From:      Kris Kennaway <kris@obsecurity.org>
To:        Sean Whalen <sean@node99.org>
Cc:        freebsd-bugs@freebsd.org
Subject:   Re: Potential user/kernel pointer bugs identified in FreeBSD 5.3
Message-ID:  <20050107230908.GA32344@xor.obsecurity.org>
In-Reply-To: <41DF11EC.1070003@node99.org>
References:  <41DF11EC.1070003@node99.org>

next in thread | previous in thread | raw e-mail | index | archive | help

--zhXaljGHf11kAtnf
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Fri, Jan 07, 2005 at 02:49:16PM -0800, Sean Whalen wrote:
> Hello,
>=20
> We recently analyzed the FreeBSD 5.3 kernel source for user/kernel=20
> pointer bugs using the Cqual tool (http://cqual.sourcefornet.net).
> Previous work has done the same with the Linux kernel.
>=20
> The paper is available here: http://www.node99.org/projects/bsduk/
> On page 10 is an example trace of one such potential bug.  If there is=20
> interest, we have traces for the others as well.
>=20
> Our analysis was limited by RAM, and could be potentially improved by=20
> using a machine with around 10 gigs of RAM for inter-file analysis of=20
> the entire kernel.
>=20
> Hopefully this is the right list for such a discussion.  Best,

freebsd-hackers would be better.

Kris

--zhXaljGHf11kAtnf
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (FreeBSD)

iD8DBQFB3xaUWry0BWjoQKURArgBAJ44FIBhOkApWezUe3dSCy5Bp/4RTwCg2Dm9
Wys8NwBhbXE0k0dkx/w2Z54=
=gRy1
-----END PGP SIGNATURE-----

--zhXaljGHf11kAtnf--



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20050107230908.GA32344>