From owner-freebsd-security Tue Jul 10 12:54: 3 2001 Delivered-To: freebsd-security@freebsd.org Received: from ns1.arch.bellsouth.net (ns1.arch.bellsouth.net [205.152.173.2]) by hub.freebsd.org (Postfix) with ESMTP id 3858B37B401 for ; Tue, 10 Jul 2001 12:54:00 -0700 (PDT) (envelope-from ck@ns1.arch.bellsouth.net) Received: (from ck@localhost) by ns1.arch.bellsouth.net (goaway/goaway) id f6AJrob07380 for security@freebsd.org; Tue, 10 Jul 2001 15:53:50 -0400 (EDT) Date: Tue, 10 Jul 2001 15:53:50 -0400 From: Christian Kuhtz To: security@freebsd.org Subject: buffer overflows Message-ID: <20010710155350.Y19184@ns1.arch.bellsouth.net> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Mailer: Mutt 0.95i Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.org Does anyone have a pointer to a FAQ or other document which I can rub into a developers nose to help him/her find the code prone to buffer overflows and how to fix them? The question keeps coming up more frequently than I have time to answer it ;-) -- Christian Kuhtz -wk, -hm Sr. Architect, Engineering & Architecture, BellSouth.net, Atlanta, GA, U.S. "I speak for myself only."" To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message