[Dwn-trans-commit] CVS public_html/src/Writing/DWN

CVS User joey joey at infodrom.org
Tue Jul 3 18:30:27 UTC 2007


Update of /var/cvs/infodrom.org/public_html/src/Writing/DWN
In directory finlandia:/home/users/joey/Projects/Web/public_html/src/Writing/DWN

Modified Files:
	dwn-2007-06.wml 
Log Message:
Polishing

--- /var/cvs/infodrom.org/public_html/src/Writing/DWN/dwn-2007-06.wml	2007/07/03 18:10:50	1.19
+++ /var/cvs/infodrom.org/public_html/src/Writing/DWN/dwn-2007-06.wml	2007/07/03 18:30:26	1.20
@@ -109,14 +109,15 @@
 
 # From: Y Giridhar Appaji Nag <giridhar at appaji.net>
 
-[1] Large-Scale Analysis of Format String Vulnerabilities in Debian
-Linux.  Karl Chen and David Wagner. ACM SIGPLAN Workshop on Programming
-Languages and Analysis for Security (PLAS 2007), June 14, 2007
-
-Though this was for 3.1, I did not check if they files bugs in the BTS
-for any of the bugs found (See section 6, Experimental results).
-
-[1] http://www.cs.berkeley.edu/~daw/papers/fmtstr-plas07.pdf
+<p><strong>Format String Vulnerabilities in Debian.</strong> Karl Chen and
+David Wagner will present an <a
+href="http://www.cs.berkeley.edu/~daw/papers/fmtstr-plas07.pdf">analysis</a>
+on format string vulnerabilities in the <a href="$(HOME)/releases/sarge/">\
+sarge</a> distribution for the ACM SIGPLAN Workshop on <a
+href="http://www.cs.umd.edu/~mwh/PLAS07/">Programming Languages and Analysis
+for Security</a> that takes place on June 14th in San Diego, U.S.A.  Tools
+have marked more than 1,500 packages potentially insecure of which 87 were
+determined with true format string bugs.</p>
 
 <p><strong>Want to continue reading DWN?</strong> Please help us create this
 newsletter.  We still need more volunteer writers who watch the Debian



More information about the Dwn-trans-commit mailing list