Still pissed at Broadcom for not issuing a security advisory for that kernel vulnerability I found a decade ago that affected the Raspberry Pi. They silently refactored the code instead.

The offending code is still in FreeBSD, even after I told them to update it, since I never got around to providing a PoC. I should write that PoC I guess, since afaik FreeBSD (and possibly NetBSD) on Raspberry Pi is still vulnerable.

It is "out of bounds memory write from userspace" level bad fwiw. Though control of where it's written to is basically nil.
Current "fuck you, Broadcom" status: I've managed to wedge a Pi 1 running FreeBSD so hard I had to pull the cable out to get it to reboot. Still not a panic.
kernel panic from userspace obtained
you need permissions to a specific dev node which are restricted to root by default though

Looks like the entire Linux side was cleaned up a decade ago...possibly by someone RPi-affiliated, not BCM-affiliated.

RPi also silently swept another kernel vulnerability I discovered under the rug around the same time. Anyway here's the patch for that userspace-triggerable OOB memory write that I reported that never got an advisory: https://github.com/raspberrypi/linux/commit/fef324cd632a3421140205754b8089b102b03f8f

fbmem: Ensure that parameters are properly checked within fb_copyarea… · raspberrypi/linux@fef324c

…_user

GitHub
and I reported the still-present-in-FreeBSD vulnerability to the secteam with an actual PoC this time.
Literally just replied to a 6-year old email where I gave them more details that they'd asked for and then they never followed up further :|
anyway e8275dd9e24f05428d4dc955d98f59b165cdf89469bfebe9aa976dbaa35c7641
No reply from secteam yet. Hey @dexter what do I do if secteam never replies? I'd rather not just drop the PoC (which this is the hash for) publicly.
@dexter it's only been 5 days since my last email, but uh, my previous email on the matter (which never got a reply) was 6 years ago.
@endrift :-( that sucks @dexter

@dch they’re probably waiting for a report from Claude…

Cc: @endrift @dexter

@endrift I was going to say, let’s see what @dch has to say but they chimed in. Thank you for pursuing this.
@endrift for a second I thought this was a keysmash
@endrift oh fuck people are still using fb
@Lunaphied idk but this has been patched for nearly a decade so I wouldn't worry about this one.
@endrift any amount of control of the address, or is it just random or fixed? that's one hell of a bug to get swept under the rug
@astraleureka I actually found that you might be able to read out arbitrary kernel memory if you have access to the dev node while investigating this, but I haven't looked hard enough at the patched version yet. I'm too busy emailing the FreeBSD secteam