Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <b086760e0907220930j7da01917nc3556c63a4a67a2f@mail.gmail.com>
Date: Wed, 22 Jul 2009 18:30:39 +0200
From: yersinia <yersinia.spiros@...il.com>
To: oss-security@...ts.openwall.com
Cc: Brad Spengler <spender@...ecurity.net>, Marcus Meissner <meissner@...e.de>, 
	dailydave <dailydave@...ts.immunitysec.com>
Subject: Re: Re: [Dailydave] Linux 
	2.6.30+/SELinux/RHEL5 test kernel 0day, exploiting the unexploitable

On Wed, Jul 22, 2009 at 5:04 PM, Todd Sabin<tsabin@...online.net> wrote:
> spender@...ecurity.net (Brad Spengler) writes:
>
>> (Really there should have been a CVE for the lack of
>> -fno-delete-null-pointer-checks instead of pretending the only problem
>> was /dev/net/tun....
>
> Just as a side note, it seems like gcc is missing an option, to me.
> Okay, it can figure out that some NULL pointer checks seem to be
> useless, and either optimize them away or leave them in.  What about
> issuing a warning?
>
> Where's -Wuseless-null-pointer-check?
>

Coverity opinion on this specific issue

http://blog.coverity.com/posts/general/would-you-like-to-know-about-0day-defects-months-in-advance

Regards

>
> Todd
>
> --
> Todd Sabin                                          <tsabin@...online.net>
>

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.