Date: Tue, 12 Aug 2003 11:02:16 +0200 From: "Devon H. O'Dell" <dodell@sitetronics.com> To: <security@freebsd.org> Subject: RE: realpath(3) et al Message-ID: <003501c360b0$6dad9970$9f8d2ed5@internal> In-Reply-To: <20030812085617.GA407@FreeBSD.org>
index | next in thread | previous in thread | raw e-mail
Is there a list of these bugs available anywhere? If not, what software is recommended to import, keep track of, and document these bugs? Features such as a protected stack should, IMO, be implemented as soon as possible to keep FreeBSD heads-afloat right now in the security sense.... OpenBSD has implemented this already and there are many patches for Linux to do the same... why don't we go ahead and shove some of this code into CVS? Should I go ahead and start this up? If so, what are some ideas of things I might like to put on it? Kind regards, Devon H. O'Dell Systems and Network Engineer Simpli, Inc. Web Hosting http://www.simpli.biz > -----Oorspronkelijk bericht----- > Van: owner-freebsd-security@freebsd.org [mailto:owner-freebsd- > security@freebsd.org] Namens Simon L. Nielsen > Verzonden: Tuesday, August 12, 2003 10:56 AM > Aan: Mike Hoskins > CC: security@freebsd.org > Onderwerp: Re: realpath(3) et al > > On 2003.08.11 16:34:40 -0700, Mike Hoskins wrote: > > > Wasn't there a page (maybe there still is...) showing sections of the > base > > system as 'assigned' to certain individuals, with contact info listed? > I > > think it was pretty stale for awhile, but maybe something similar could > be > > revived and maintained. If it already is, great! > > There is http://www.freebsd.org/auditors.html but it hasn't been updated > for > a very long time. > > BTW, if anybody really wants to start up the audit project again, I > think somebody should take a look at integrating some of the changes > OpenBSD has made. No reason to spend time finding the bugs OpenBSD has > already fixed. > > -- > Simon L. Nielsen > FreeBSD Documentation Teamhelp
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?003501c360b0$6dad9970$9f8d2ed5>
