Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 18 Nov 2014 09:52:26 +0100
From: Raphael Geissert <geissert@...ian.org>
To: Open Source Security <oss-security@...ts.openwall.com>
Subject: Re: Fuzzing findings (and maybe CVE requests) -
 Image/GraphicsMagick, elfutils, GIMP, gdk-pixbuf, file, ndisasm, less

On 17 November 2014 17:49, Raphael Geissert <geissert@...ian.org> wrote:
[...]
> Just to give an example of an in-browser crash, the other day I opened
> a 4-years old pdf of a random company and it made chromium's pdf
> plugin crash.
> No problem opening it with pdf.js under firefox or poppler.

Apparently it wasn't clear enough to some people the intention of the
example I gave (which is obviously flawed as a comparative argument).

It was a way to say: bugs do exist on an code base, even on scenarios
that were not specifically setup to try to identify them, such as when
fuzzing.

Cheers,
-- 
Raphael Geissert - Debian Developer
www.debian.org - get.debian.net

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.