lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
From: demidov at gleg.net (Evgeny Demidov) Subject: NetBSD kernel local vulnerabilities Name: NetBSD kernel local vulnerabilities Date: Dec 18, 2004 Author: Evgeny Demidov Description: There exists multiple vulnerabilities in NetBSD binary compatibility code. They can be approximately divided into two parts: 1) signal number validation problems in xxx_sys_kill(),xxx_sys_sigaction() and similar syscalls These are limited to local DoS only. By passing large signal numbers to certain syscalls in compat code local attacker can crash the kernel. 2) buffer overflows At least one of them can be exploited to gain full super-user privilegies. Fix: NetBSD has issued advisory - ftp://ftp.NetBSD.org/pub/NetBSD/security/advisories/NetBSD-SA2004-010.txt.asc History: Oct 12, 2004 - initial vendor notification Oct 20, 2004 - NetBSD team performed extensive audit of compat code! Dec 18, 2004 - public release of this advisory
Powered by blists - more mailing lists