Displaying 3 results from an estimated 3 matches for "frasunek".
2003 Dec 27
1
Heads up: Does this affect FreeBSD's tcpdump?
...critical
>Priority: high
>Responsible: bugs
>State: open
>Quarter:
>Keywords:
>Date-Required:
>Class: sw-bug
>Submitter-Id: net
>Arrival-Date: Sat Dec 20 15:50:02 GMT 2003
>Closed-Date:
>Last-Modified:
>Originator: Przemyslaw Frasunek
>Release: 3.3-RELEASE
>Organization:
net
>Environment:
System : OpenBSD 3.3
Architecture: OpenBSD.i386
Machine : i386
>Description:
Sending a packet containg 0xff,0x02 bytes to port 1701/udp causes
a L2TP protocol parser in tcpdump to enter an infinite loop, eating...
1999 Sep 13
0
[RHSA-1999:037-01] Buffer overflow in mars_nwe
...ription:
Buffer overflows are present in the mars_nwe package. Since
the code that contains these overflows is run as root, a
local root compromise is possible if users create carefully
designed directories and/or bindery objects.
A sample exploit has been made available.
Thanks go to Przemyslaw Frasunek (secure@freebsdf.lublin.pl)
and Babcia Padlina Ltd. for noting the problem and providing
a patch.
8. Solution:
For each RPM for your particular architecture, run:
rpm -Uvh <filename>
where filename is the name of the RPM.
9. Verification:
MD5 sum Package Name...
2009 Sep 15
4
Protecting against kernel NULL-pointer derefs
All,
Given the amount of NULL-pointer dereference vulnerabilities in the
FreeBSD kernel that have been discovered of late, I've started looking
at a way to generically protect against the code execution possibilities
of such bugs.
By disallowing userland to map pages at address 0x0 (and a bit beyond),
it is possible to make such NULL-pointer deref bugs mere DoS'es instead
of code