Re: Protecting against kernel NULL-pointer derefs

看板FB_security作者時間16年前 (2009/09/15 21:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串4/22 (看更多)
Pieter de Boer <pieter@thedarkside.nl> writes: > Dag-Erling Sm=C3=B8rgrav <des@des.no> writes: > > Pieter de Boer <pieter@thedarkside.nl> writes: > > > Given the amount of NULL-pointer dereference vulnerabilities in > > > the FreeBSD kernel that have been discovered of late, > > Specify "amount" and define "of late". > 'amount' =3D> 2, 'of late' is more figure of speech than anything > else. For me, amount was high enough to get interested and 'of late' > may be because I've not been looking long enough. A search of FreeBSD security advisories shows two in the last four years, plus the current unreleased issue. I agree that there is no reason to allow applications to mmap() at address 0, but surely there must be a better way to make your case than to sow FUD? DES --=20 Dag-Erling Sm=C3=B8rgrav - des@des.no _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #1Ahv0FqZ (FB_security)
討論串 (同標題文章)
文章代碼(AID): #1Ahv0FqZ (FB_security)