Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ FreeBSD's Close Call: How Flawed Code Almost Made It Into the Kernel

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š FreeBSD's Close Call: How Flawed Code Almost Made It Into the Kernel


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: bsd.slashdot.org

"40,000 lines of flawed code almost made it into FreeBSD's kernel," writes Ars Technica, reporting on what happened when the CEO of Netgate, which makes FreeBSD-powered routers, decided it was time for FreeBSD to enjoy the same level of in-kernel WireGuard support that Linux does. The issue arose after Netgate offered a burned-out developer a contract to port WireGuard into the FreeBSD kernel (where Netgate could then use it in the company's popular pfSense router distribution): [The developer] committed his port โ€” largely unreviewed and inadequately tested โ€” directly into the HEAD section of FreeBSD's code repository, where it was scheduled for incorporation into FreeBSD 13.0-RELEASE. This unexpected commit raised the stakes for WireGuard founding developer Jason Donenfeld, whose project would ultimately be judged on the quality of any production release under the WireGuard name. Donenfeld identified numerous problems...but rather than object to the port's release, Donenfeld decided to fix the issues. He collaborated with FreeBSD developer Kyle Evans and with Matt Dunwoodie, an OpenBSD developer who had worked on WireGuard for that operating system... How did so much sub-par code make it so far into a major open source operating system? Where was the code review which should have stopped it? And why did both the FreeBSD core team and Netgate seem more focused on the fact that the code was being disparaged than its actual quality? There's more to the story, but ultimately Ars Technica confirmed the presences of multiple buffer overflows, printf statements that are still being triggered in production, and even empty validation function which always "return true" rather than actually validating the data. The original developer argued the real issue is an absence of quality reviewers, but Ars Technica sees a larger problem. "There seems to be an absence of process to ensure quality code review." Several FreeBSD community members would only speak off the record. In essence, most seem to agree, you either have a commit bit (enabling you to commit code to FreeBSD's repositories) or you don't. It's hard to find code reviews, and there generally isn't a fixed process ensuring that vitally important code gets reviewed prior to inclusion. This system thus relies heavily on the ability and collegiality of individual code creators. Ars Technica published this statement from the FreeBSD Core Team: Core unconditionally values the work of all contributors, and seeks a culture of cooperation, respect, and collaboration. The public discourse over WireGuard in the past week does not meet these standards and is damaging to our community if not checked. As such, WireGuard development for FreeBSD will now proceed outside of the base system. For those who wish to evaluate, test, or experiment with WireGuard, snapshots will be available via the ports and package systems. As a project, we remain committed to continually improving our development process. We'll also continue to refine our tooling to make code reviews and continuous integration easier and more effective. The Core Team asks that the community use these tools and work together to improve FreeBSD. Ars Technica applauds the efforts โ€” while remaining concerned about the need for them. "FreeBSD is an important project that deserves to be taken seriously. Its downstream consumers include industry giants such as Cisco, Juniper, NetApp, Netflix, Sony, Sophos, and more. The difference in licensing between FreeBSD and Linux gives FreeBSD a reach into many projects and spaces where the Linux kernel would be a difficult or impossible fit."

Read more of this story at Slashdot.

...



๐Ÿ“Œ FreeBSD's Close Call: How Flawed Code Almost Made It Into the Kernel


๐Ÿ“ˆ 82.52 Punkte

๐Ÿ“Œ <self-close /> or <not-to-self-close></not-to-self-close>


๐Ÿ“ˆ 36.7 Punkte

๐Ÿ“Œ Chrome: Flash is almost, almost, almost dead


๐Ÿ“ˆ 34.17 Punkte

๐Ÿ“Œ Buffer overruns, license violations, and bad code: FreeBSD 13โ€™s close call (ars techica)


๐Ÿ“ˆ 33.68 Punkte

๐Ÿ“Œ [dos] FreeBSD Kernel (FreeBSD 10.2 x64) - 'sendmsg' Kernel Heap Overflow (PoC)


๐Ÿ“ˆ 30.73 Punkte

๐Ÿ“Œ #0daytoday #FreeBSD Kernel (FreeBSD 10.2 x64) - sendmsg Kernel Heap Overflow (PoC) Exploit [#0day #Exploit]


๐Ÿ“ˆ 30.73 Punkte

๐Ÿ“Œ This backdoor almost infected Linux everywhere: The XZ Utils close call


๐Ÿ“ˆ 30.16 Punkte

๐Ÿ“Œ [dos] FreeBSD Kernel (FreeBSD 10.2 < 10.3 x64) - 'SETFKEY' (PoC)


๐Ÿ“ˆ 26.39 Punkte

๐Ÿ“Œ #0daytoday #FreeBSD Kernel (FreeBSD 10.2 &amp;lt; 10.3 x64) - SETFKEY (PoC) Exploit [#0day #Exploit]


๐Ÿ“ˆ 26.39 Punkte

๐Ÿ“Œ [local] Sony Playstation 4 (PS4) < 7.02 / FreeBSD 9 / FreeBSD 12 - 'ip6_setpktopt' Kernel Local Privilege Escalation (PoC)


๐Ÿ“ˆ 26.39 Punkte

๐Ÿ“Œ Reminder: DEF CON 24ย Call for Papers and Call for Workshops close MAY 2!


๐Ÿ“ˆ 25.31 Punkte

๐Ÿ“Œ Oracle Hyperion Financial Close Management 11.1.2.4 Close Manager unknown vulnerability


๐Ÿ“ˆ 24.46 Punkte

๐Ÿ“Œ Oracle Hyperion Financial Close Management 11.1.2.4 Close Manager unknown vulnerability


๐Ÿ“ˆ 24.46 Punkte

๐Ÿ“Œ Google Contemplating Removing Chrome 'Close Other Tabs' and 'Close Tabs to the Right' Options


๐Ÿ“ˆ 24.46 Punkte

๐Ÿ“Œ Chrome May Soon Lose "Close Other Tabs" and "Close Tabs to the Right" Options


๐Ÿ“ˆ 24.46 Punkte

๐Ÿ“Œ Close to the Sun Xbox One review: It doesn't fly close enough


๐Ÿ“ˆ 24.46 Punkte

๐Ÿ“Œ Reddit's Shares Plummet Almost 25% in Two Days, Dropping Below Its First Day's Close


๐Ÿ“ˆ 23.62 Punkte

๐Ÿ“Œ Bugtraq: FreeBSD Security Advisory FreeBSD-SA-16:06.bsnmpd


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Bugtraq: FreeBSD Security Advisory FreeBSD-SA-16:07.openssh


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Bugtraq: FreeBSD Security Advisory FreeBSD-SA-16:10.linux


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Bugtraq: FreeBSD Security Advisory FreeBSD-SA-16:09.ntp


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Bugtraq: FreeBSD Security Advisory FreeBSD-SA-16:08.bind


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Bugtraq: FreeBSD Security Advisory FreeBSD-SA-16:11.openssl


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Bugtraq: FreeBSD Security Advisory FreeBSD-SA-16:15.sysarch


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Bugtraq: FreeBSD Security Advisory FreeBSD-SA-16:14.openssh


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Bugtraq: FreeBSD Security Advisory FreeBSD-SA-16:17.openssl


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Bugtraq: FreeBSD Security Advisory FreeBSD-SA-16:19.sendmsg


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Bugtraq: FreeBSD Security Advisory FreeBSD-SA-16:18.atkbd


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Bugtraq: FreeBSD Security Advisory FreeBSD-SA-16:23.libarchive


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Bugtraq: FreeBSD Security Advisory FreeBSD-SA-16:21.43bsd


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Bugtraq: FreeBSD Security Advisory FreeBSD-SA-16:22.libarchive


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Bugtraq: FreeBSD Security Advisory FreeBSD-SA-16:20.linux


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Bugtraq: FreeBSD Security Advisory FreeBSD-SA-16:24.ntp


๐Ÿ“ˆ 22.05 Punkte

๐Ÿ“Œ Bugtraq: FreeBSD Security Advisory FreeBSD-SA-16:25.bspatch


๐Ÿ“ˆ 22.05 Punkte











matomo