UFS Bug: FreeBSD 6.1/6.2/7.0: MOKB-08-11-2006, CVE-2006-5824, MOKB-03-11-2006, CVE-2006-5679

Kevin Oberman oberman at es.net
Fri Nov 24 17:38:03 PST 2006


> Date: Fri, 24 Nov 2006 15:58:39 -0700
> From: Scott Long <scottl at samsco.org>
> Sender: owner-freebsd-stable at freebsd.org
> 
> David Malone wrote:
> 
> >>These two bugs are shown for FreeBSD only and I guess, Solaris and other 
> >>BSDs  still use UFS. Are they more robust against this exploit or type 
> >>of exploit?
> > 
> > 
> > I don't know of a concerted effort by anyone to improve UFS in this
> > way. I would guess that the odd bug would have been resolved, but
> > no large scale work.
> > 
> > 	David.
> 
> Another thing to keep in mind is that filesystem mounting is only 
> available to the super-user.  If a feature came along such as 
> automatically mounting USB drives, these bugs would indeed be critical.
> But for now, they are not.

Not on the base system, but Gnome 2.16 with hald running will mount a
removable device automatically. The standard configuration of Gnome runs
hald. Allowing user mounts of removable media is even formalized by the
addition of /media to hier(7). I'm not sure this should simply be
treated as not being significant.
-- 
R. Kevin Oberman, Network Engineer
Energy Sciences Network (ESnet)
Ernest O. Lawrence Berkeley National Laboratory (Berkeley Lab)
E-mail: oberman at es.net			Phone: +1 510 486-8634
Key fingerprint:059B 2DDF 031C 9BA3 14A4  EADA 927D EBB3 987B 3751
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 224 bytes
Desc: not available
Url : http://lists.freebsd.org/pipermail/freebsd-stable/attachments/20061125/8ab07211/attachment.pgp


More information about the freebsd-stable mailing list