|
|
Message-ID: <510BD2E5.1020604@linux.vnet.ibm.com>
Date: Fri, 01 Feb 2013 09:36:21 -0500
From: Corey Bryant <coreyb@...ux.vnet.ibm.com>
To: Peter Huewe <PeterHuewe@....de>
CC: kernel-hardening@...ts.openwall.com, Kees Cook <keescook@...omium.org>,
Anthony Liguori <aliguori@...ibm.com>, Frank Novak <fnovak@...ibm.com>,
George Wilson <gcwilson@...ibm.com>,
Joel Schopp <jschopp@...ux.vnet.ibm.com>,
Kevin Wolf <kwolf@...hat.com>,
Warren Grunbok II <wgrunbok@...t.ibm.com>
Subject: Re: Secure Open Source Project Guide
On 01/31/2013 06:18 PM, Peter Huewe wrote:
> Hi,
>> We should probably start by gathering a list of ideas to include in the
>> guide. Some initial ideas that come to mind are:
>>
>> * Secure programming practices (Secure "Programming for Linux
>> and Unix HOWTO" is a good reference for Linux though probably
>> out of date)
>> * Performing secure code reviews and detecting common
>> vulnerabilities
>> * Ensuring code is reviewed by trusted parties and proper patch
>> tagging is used
>> * Signing of releases, pull requests, patches, commits, etc by
>> trusted parties
>> * Removing vulnerabilities with automated tooling (Static/Dynamic
>> analysis, Fuzzing)
>>
>> Any thoughts?
>
> I'd definitely add
> * creating semantic patches out of the secure coding reviews / common
> vulnerabilities with coccinelle/spatch.
> (Usually the same bugs happen over and over again - see e.g. the CWE list ;)
>
> I know this goes into the direction of your last point, but is not that
> trivial to use like e.g. spatch but on the other hand provides "automatic"
> fixing.
>
> Just my two cents.
>
> PeterH
>
>
Thanks for the input. Automated patching with Coccinelle and the like,
and pointers to get folks started with these tools would be a great
addition.
--
Regards,
Corey Bryant
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.