bsd

FreeBSD Security Advisory - FreeBSD-SA-19:23.midi

FreeBSD Security Advisory - The kernel driver for /dev/midistat implements a handler for read(2). This handler is not thread-safe, and a multi-threaded program can exploit races in the handler to cause it to copy out kernel memory outside the boundaries of midistat's data buffer. The races allow a program to read kernel memory within a 4GB window centered at midistat's data buffer. The buffer is allocated each time the device is opened, so an attacker is not limited to a static 4GB region of memory. On 32-bit platforms, an attempt to trigger the race may cause a page fault in kernel mode, leading to a panic.




bsd

FreeBSD Security Advisory - FreeBSD-SA-19:26.mcu

FreeBSD Security Advisory - From time to time Intel releases new CPU microcode to address functional issues and security vulnerabilities. Such a release is also known as a Micro Code Update (MCU), and is a component of a broader Intel Platform Update (IPU). FreeBSD distributes CPU microcode via the devcpu-data port and package.




bsd

FreeBSD Security Advisory - FreeBSD-SA-19:25.mcepsc

FreeBSD Security Advisory - Intel discovered a previously published erratum on some Intel platforms can be exploited by malicious software to potentially cause a denial of service by triggering a machine check that will crash or hang the system. Malicious guest operating systems may be able to crash the host.




bsd

FreeBSD mqueuefs Privilege Escalation

Local root exploit for the FreeBSD mqueuefs vulnerability as disclosed in FreeBSD-SA-19:15.mqueuefs.




bsd

FreeBSD fd Privilege Escalation

Local root exploit for the FreeBSD fd vulnerability as disclosed in FreeBSD-SA-19:02.fd.




bsd

FreeBSD Security Advisory - FreeBSD-SA-20:01.libfetch

FreeBSD Security Advisory - A programming error allows an attacker who can specify a URL with a username and/or password components to overflow libfetch(3) buffers. An attacker in control of the URL to be fetched (possibly via HTTP redirect) may cause a heap buffer overflow, resulting in program misbehavior or malicious code execution.




bsd

FreeBSD Security Advisory - FreeBSD-SA-20:02.ipsec

FreeBSD Security Advisory - A missing check means that an attacker can reinject an old packet and it will be accepted and processed by the IPsec endpoint. The impact depends on the higher-level protocols in use over IPsec. For example, an attacker who can capture and inject packets could cause an action that was intentionally performed once to be repeated.




bsd

FreeBSD Security Advisory - FreeBSD-SA-20:03.thrmisc

FreeBSD Security Advisory - The kernel can create a core dump file when a process crashes that contains process state, for debugging. Due to incorrect initialization of a stack data structure, up to 20 bytes of kernel data stored previously stored on the stack will be exposed to a crashing user process. Sensitive kernel data may be disclosed.




bsd

NetBSD mail.local(8) Local Root

NetBSD mail.local(8) local root exploit that leverages a race condition as noted in NetBSD-SA2016-006.




bsd

NetBSD mail.local Privilege Escalation

This Metasploit module attempts to exploit a race condition in mail.local with the SUID bit set on: NetBSD 7.0 - 7.0.1 (verified on 7.0.1), NetBSD 6.1 - 6.1.5, and NetBSD 6.0 - 6.0.6. Successful exploitation relies on a crontab job with root privilege, which may take up to 10min to execute.




bsd

NetBSD Stack Clash Proof Of Concept

NetBSD stack clash proof of concept exploit.




bsd

NetBSD Security Advisory 2004.10

NetBSD Security Advisory 2004-010 - Some of the functions in /usr/src/sys/compat/ which implement execution of foreign binaries (such as Linux, FreeBSD, IRIX, OSF1, SVR4, HPUX, and ULTRIX) use argument data in unsafe ways prior to calling the kernel syscall.




bsd

FreeBSD Security Advisory - FreeBSD-SA-19:13.pts

FreeBSD Security Advisory - The code which handles a close(2) of a descriptor created by posix_openpt(2) fails to undo the configuration which causes SIGIO to be raised. This bug can lead to a write-after-free of kernel memory. The bug permits malicious code to trigger a write-after-free, which may be used to gain root privileges or escape a jail.




bsd

bsd.patch

Firewire patch for BSD kernels that fixes an improper length check.




bsd

FreeBSD RTLD Patch

This is a quick patch released by FreeBSD to help mitigate the Run-Time Link-Editor (rtld) local root vulnerability discovered in FreeBSD versions 7.x and 8.x.




bsd

NetBSD-SA1999-012.vax.ptrace

NetBSD uses the ptrace(2) system call to trace and debug other processes. The debugging process can also modify the internal registers, including the status (PSL) register, for the process being debugged. Besides the normal user-accessible flags, the VAX hardware also stores information about privilege levels and used stacks in the PSL. Those flags are only altered via the instruction REI (return from interrupt) or LDPCTX (load process context) and cannot be modified while running in "user" mode. NetBSD security page here.




bsd

OpenBSD 2.8 Announced




bsd

FreeBSD 4.3-RELEASE Released




bsd

OpenBSD 2.9 Released




bsd

FreeBSD 4.4 Released




bsd

OpenBSD 3.0 Released




bsd

FreeBSD 4.5 Released




bsd

OpenBSD 3.1 Released




bsd

FreeBSD 4.6 Released




bsd

Random Number Bug Blights FreeBSD




bsd

OpenBSD - Call For Donations




bsd

FreeBSD Bug Grants Local Root Access




bsd

FreeBSD Bug Gives Untrusted Root Access









bsd

Critical FreeBSD Bug Squashed




bsd

NetBSD, OpenBSD Improve Kernel Security, Randomly





bsd

X.org Bug Bites OpenBSD And Other Big Operating Systems




bsd

OpenBSD Patches Auth Bypass, Privilege Escalation Vulns






bsd

Adani Enterprises incorporates wholly owned subsdiairy - Nanasa Pidgaon Road

On 08 May 2020




bsd

Data Analysis and Reduction for Big Scientific Data (DRBSD-5), IEEE/ACM International Workshop on [electronic journal].

IEEE / Institute of Electrical and Electronics Engineers Incorporated




bsd

2019 IEEE/ACM 5th International Workshop on Data Analysis and Reduction for Big Scientific Data (DRBSD-5) [electronic journal].

IEEE / Institute of Electrical and Electronics Engineers Incorporated




bsd

2019 IEEE/ACM 5th International Workshop on Data Analysis and Reduction for Big Scientific Data (DRBSD-5) [electronic journal].

IEEE / Institute of Electrical and Electronics Engineers Incorporated




bsd

Beautiful Dubsdread Country Club, Orlando, Fla




bsd

Dubsdread Golf Club