Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 11 Jul 2001 12:25:32 -0700
From:      Kris Kennaway <kris@obsecurity.org>
To:        Christian Kuhtz <ck@arch.bellsouth.net>
Cc:        security@freebsd.org
Subject:   Re: buffer overflows
Message-ID:  <20010711122529.D87389@xor.obsecurity.org>
In-Reply-To: <20010710155350.Y19184@ns1.arch.bellsouth.net>; from ck@arch.bellsouth.net on Tue, Jul 10, 2001 at 03:53:50PM -0400
References:  <20010710155350.Y19184@ns1.arch.bellsouth.net>

next in thread | previous in thread | raw e-mail | index | archive | help

--Qrgsu6vtpU/OV/zm
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

On Tue, Jul 10, 2001 at 03:53:50PM -0400, Christian Kuhtz wrote:
>=20
> Does anyone have a pointer to a FAQ or other document which I can rub int=
o a
> developers nose to help him/her find the code prone to buffer overflows a=
nd
> how to fix them?
>=20
> The question keeps coming up more frequently than I have time to answer i=
t ;-)

We have some information and pointers on www.freebsd.org/security, but
this page could certainly stand to be improved.  If anyone wants to
submit some more links or extra information it would be very much
appreciated.

Kris

--Qrgsu6vtpU/OV/zm
Content-Type: application/pgp-signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (FreeBSD)
Comment: For info see http://www.gnupg.org

iD8DBQE7TKgoWry0BWjoQKURAhmNAKCY0U+oMzcEPdeYYMt9GAJ4clbKUQCg2VQU
pMfAv/G7XqQmmEbQMQFqkzg=
=KSzu
-----END PGP SIGNATURE-----

--Qrgsu6vtpU/OV/zm--

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010711122529.D87389>