Date: Thu, 8 Aug 1996 22:00:19 -0400 (EDT) From: "Charles C. Figueiredo" <marxx@doomsday.org> To: Ollivier Robert <roberto@keltia.freenix.fr> Cc: FreeBSD-current users <freebsd-current@freebsd.org> Subject: Re: exploitable security risk Message-ID: <Pine.BSF.3.91.960808215807.234C-100000@apocalypse.superlink.net> In-Reply-To: <199608090454.GAA00939@keltia.freenix.fr>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 9 Aug 1996, Ollivier Robert wrote: > According to Warner Losh: > > You might want to look at the OpenBSD CVS tree. They have been fixing > > a whole boatload of "oflow" cases in the BSD sources. I don't know if > > all of them are exploitable security holes or not, but they are likely > > bugs and should likely be looked at. > > It is a pity Theo doesn't want to talk about precisely what he fixed. ONe > has to go digging in the CVS tree to find the fixes... > -- > Ollivier ROBERT -=- The daemon is FREE! -=- roberto@keltia.freenix.fr > FreeBSD keltia.freenix.fr 2.2-CURRENT #17: Fri Aug 2 20:40:17 MET DST 1996 > To my knowledge, Theo hasn't been the one mainly doing a lot of security patches, a few others I know have. As for finding assorted bugs like these and other types, I have scripts that run through the source tree and produce 50MB and bigger files of stuff that needs to be cleaned up. :) Charles ------------------------------------------------------------------------------ Charles C. Figueiredo CCF13 marxx@doomsday.org ------------------------------------------------------------------------------
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.91.960808215807.234C-100000>
