Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 17 Nov 2014 14:10:40 +0100
From: Hanno Böck <>
Subject: Re: Fuzzing findings (and maybe CVE requests) -
 Image/GraphicsMagick, elfutils, GIMP, gdk-pixbuf, file, ndisasm, less

Am Mon, 17 Nov 2014 13:48:39 +0100
schrieb Raphael Geissert <>:

> > c) fuzz all the tools in there and report at least the
> > low-hanging-fruit-bugs? (and then maybe try to replace the
> > "they-don't-fix-bugs-or-don't-have-a-dev-any-more"-tools with more
> > secure ones)
> d) acknowledge the fact that most tools were not "designed for
> security" and that we should talk about mitigation. It's about risk
> analysis.

Fair point, however it doesn't exclude doing c) as well. (however it
was my understanding that all widely deployed memory corruption
mitigation methods are mostly incomplete and can usually be circumvented
by tricky enough exploits - but I'm no expert on this)

Hanno Böck


Download attachment "signature.asc" of type "application/pgp-signature" (820 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.