Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 15 Sep 2009 10:17:42 -0700
From:      Chris Palmer <chris@noncombatant.org>
To:        Pieter de Boer <pieter@thedarkside.nl>, freebsd-security@freebsd.org
Subject:   Re: Protecting against kernel NULL-pointer derefs
Message-ID:  <20090915171742.GB24361@noncombatant.org>
In-Reply-To: <4AAF4A64.3080906@thedarkside.nl>
References:  <4AAF4A64.3080906@thedarkside.nl>

next in thread | previous in thread | raw e-mail | index | archive | help
Pieter's approach to the problem seems reasonable. If it provides some safety
without breaking any/too many applications, why not adopt it?

I wonder how many of these kinds of issues could also be caught with unit
tests/regression tests. See also: the CanSecWest 2009 FreeBSD bugs by
Christer Oberg and Neil Kettle.


-- 
http://www.noncombatant.org/
http://hemiolesque.blogspot.com/




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20090915171742.GB24361>