Date: Tue, 15 Sep 2009 10:17:42 -0700 From: Chris Palmer <chris@noncombatant.org> To: Pieter de Boer <pieter@thedarkside.nl>, freebsd-security@freebsd.org Subject: Re: Protecting against kernel NULL-pointer derefs Message-ID: <20090915171742.GB24361@noncombatant.org> In-Reply-To: <4AAF4A64.3080906@thedarkside.nl> References: <4AAF4A64.3080906@thedarkside.nl>
next in thread | previous in thread | raw e-mail | index | archive | help
Pieter's approach to the problem seems reasonable. If it provides some safety without breaking any/too many applications, why not adopt it? I wonder how many of these kinds of issues could also be caught with unit tests/regression tests. See also: the CanSecWest 2009 FreeBSD bugs by Christer Oberg and Neil Kettle. -- http://www.noncombatant.org/ http://hemiolesque.blogspot.com/
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20090915171742.GB24361>