Displaying 20 results from an estimated 7000 matches similar to: "FreeBSD Security Advisory: FreeBSD-SA-00:77.procfs"
2004 Dec 01
0
FreeBSD Security Advisory FreeBSD-SA-04:17.procfs
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-04:17.procfs Security Advisory
The FreeBSD Project
Topic: Kernel memory disclosure in procfs and linprocfs
Category: core
Module: sys
Announced:
2003 Oct 03
0
FreeBSD Security Advisory FreeBSD-SA-03:17.procfs
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-03:17.procfs Security Advisory
The FreeBSD Project
Topic: kernel memory disclosure via procfs
Category: core
Module: sys
Announced:
2003 Oct 03
0
FreeBSD Security Advisory FreeBSD-SA-03:17.procfs
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-03:17.procfs Security Advisory
The FreeBSD Project
Topic: kernel memory disclosure via procfs
Category: core
Module: sys
Announced:
2004 Dec 01
1
FreeBSD Security Advisory FreeBSD-SA-04:17.procfs
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-04:17.procfs Security Advisory
The FreeBSD Project
Topic: Kernel memory disclosure in procfs and linprocfs
Category: core
Module: sys
Announced:
1998 Mar 12
2
FreeBSD Security Advisory: FreeBSD-SA-98:02.mmap
-----BEGIN PGP SIGNED MESSAGE-----
=============================================================================
FreeBSD-SA-98:02 Security Advisory
FreeBSD, Inc.
Topic: security compromise via mmap
Category: core
Module: kernel
Announced: 1998-03-12
Affects:
2004 Sep 29
5
Kernel-loadable Root Kits
Thanks for the module, I think its a good idea to commit it to FreeBSD
for a few reasons:
1) Some folks just prefer more static kernels.
2) Securelevel is a great thing, but can be a pain to do upgrades around
remotely. [A lot of folks use FreeBSD simply because its a breeze to run
remotely].
3) Until someone writes code to add modules to a kernel via /dev/mem and
releases it to the script
2007 Jan 11
0
FreeBSD Security Advisory FreeBSD-SA-07:01.jail
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-07:01.jail Security Advisory
The FreeBSD Project
Topic: Jail rc.d script privilege escalation
Category: core
Module: etc_rc.d
Announced:
2004 Feb 27
0
FreeBSD Security Advisory FreeBSD-SA-04:03.jail
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-04:03.jail Security Advisory
The FreeBSD Project
Topic: Jailed processes can attach to other jails
Category: core
Module: kernel
Announced:
2004 Feb 27
0
FreeBSD Security Advisory FreeBSD-SA-04:03.jail
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-04:03.jail Security Advisory
The FreeBSD Project
Topic: Jailed processes can attach to other jails
Category: core
Module: kernel
Announced:
2007 Aug 01
0
FreeBSD Security Advisory FreeBSD-SA-07:01.jail [REVISED]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-07:01.jail Security Advisory
The FreeBSD Project
Topic: Jail rc.d script privilege escalation
Category: core
Module: etc_rc.d
Announced:
2007 Aug 01
0
FreeBSD Security Advisory FreeBSD-SA-07:01.jail [REVISED]
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-07:01.jail Security Advisory
The FreeBSD Project
Topic: Jail rc.d script privilege escalation
Category: core
Module: etc_rc.d
Announced:
2005 Jul 20
0
FreeBSD Security Advisory FreeBSD-SA-05:17.devfs
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-05:17.devfs Security Advisory
The FreeBSD Project
Topic: devfs ruleset bypass
Category: core
Module: devfs
Announced: 2005-07-20
Credits:
2005 Jul 20
0
FreeBSD Security Advisory FreeBSD-SA-05:17.devfs
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-05:17.devfs Security Advisory
The FreeBSD Project
Topic: devfs ruleset bypass
Category: core
Module: devfs
Announced: 2005-07-20
Credits:
2005 Jul 20
0
FreeBSD Security Advisory FreeBSD-SA-05:17.devfs
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-05:17.devfs Security Advisory
The FreeBSD Project
Topic: devfs ruleset bypass
Category: core
Module: devfs
Announced: 2005-07-20
Credits:
2004 Jun 07
0
FreeBSD Security Advisory FreeBSD-SA-04:12.jailroute
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-04:12.jailroute Security Advisory
The FreeBSD Project
Topic: Jailed processes can manipulate host routing tables
Category: core
Module: kernel
2004 Jun 07
1
FreeBSD Security Advisory FreeBSD-SA-04:12.jailroute
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
=============================================================================
FreeBSD-SA-04:12.jailroute Security Advisory
The FreeBSD Project
Topic: Jailed processes can manipulate host routing tables
Category: core
Module: kernel
2000 Nov 01
0
FreeBSD Security Advisory: FreeBSD-SA-00:62.top
-----BEGIN PGP SIGNED MESSAGE-----
=============================================================================
FreeBSD-SA-00:62 Security Advisory
FreeBSD, Inc.
Topic: top allows reading of kernel memory
Category: core
Module: top
Announced: 2000-11-01
Credits:
2004 Feb 29
2
procfs + chmod = no go
Hello,
I was wondering if it was possible to limit user access on /proc
without having to use securelevels.
For some reason chmod 751 /proc (or 750) does nothing.
Is this possible on FreeBSD 4.9 ? Can't find anything about it in the
manual pages. Just want to prevent lusers from running:
for file in /proc/*/cmdline; do cat $file; echo; done
Greetz,
Jimmy Scott
2003 Aug 14
1
/usr: create/symlink failed, no inodes free
hi sirs,
i try to install galeon2 for my machine but get an error messages that i really do not understand while making mozilla.
that errors appear at the very beginning of a make command.
i attache my uname, df both before and after make, and errors message with this mail.
in wchich case that inodes are not sufficient ? and also how to get rid of this kind of error.
thank you in advance for
2003 May 21
1
netstat/ipcs inside jail
Hi, i've got this problem with my jail and i'm abolutly lost as in the why
of it.
I previously posted this on comp.unix.bsd.freebsd.misc but i was advised to
send here
I was unable to find help on google :(
To resume quick, when i'm in a jail, netstat doesn't work properly.
Hopefully i have provided sufficient information for anyone willing to help
me :p
First of all, my system :