Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 8 Aug 1996 22:00:19 -0400 (EDT)
From:      "Charles C. Figueiredo" <marxx@doomsday.org>
To:        Ollivier Robert <roberto@keltia.freenix.fr>
Cc:        FreeBSD-current users <freebsd-current@freebsd.org>
Subject:   Re: exploitable security risk
Message-ID:  <Pine.BSF.3.91.960808215807.234C-100000@apocalypse.superlink.net>
In-Reply-To: <199608090454.GAA00939@keltia.freenix.fr>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 9 Aug 1996, Ollivier Robert wrote:

> According to Warner Losh:
> > You might want to look at the OpenBSD CVS tree.  They have been fixing
> > a whole boatload of "oflow" cases in the BSD sources.  I don't know if
> > all of them are exploitable security holes or not, but they are likely
> > bugs and should likely be looked at.
> 
> It is a pity Theo  doesn't want to talk  about precisely what he fixed. ONe
> has to go digging in the CVS tree to find the fixes...
> -- 
> Ollivier ROBERT    -=- The daemon is FREE! -=-    roberto@keltia.freenix.fr
> FreeBSD keltia.freenix.fr 2.2-CURRENT #17: Fri Aug  2 20:40:17 MET DST 1996
> 

	To my knowledge, Theo hasn't been the one mainly doing a lot of 
security patches, a few others I know have. As for finding assorted bugs 
like these and other types, I have scripts that run through the source 
tree and produce 50MB and bigger files of stuff that needs to be cleaned 
up. :)

Charles


------------------------------------------------------------------------------
Charles C. Figueiredo              CCF13                   marxx@doomsday.org
------------------------------------------------------------------------------




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.91.960808215807.234C-100000>