During the 39C3 (Chaos Communication Congress) conference, a report was presented regarding the security analysis of the FreeBSD jail mechanism. The study revealed that the authors were able to bypass Jail and compromise the host system, assuming the attacker had root privileges within the Jail environment. The code of 5 prototypes of exploits, exploiting vulnerabilities in Jail to escape ipfilter, dummynet, carp, and ipfw in FreeBSD 14.3-RELEASE, was published on GitHub.
In total, the study identified approximately 50 security issues in the FreeBSD kernel, for which patches with fixes were prepared for some of them. The report highlighted the complexity of modern operating systems, stating that errors are inevitable due to the intricate nature of the systems. Most of the analyzed code dated back to the 1990s and had not undergone recent audits. The vulnerabilities detected were primarily linked to errors in low-level memory management, suggesting that utilizing modern languages like Rust could help prevent such issues.