Top FOSS security vulnerabilities

 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements UNIX and Linux RSS News Top FOSS security vulnerabilities
# 1  
Old 12-13-2007
Top FOSS security vulnerabilities

Thu, 13 Dec 2007 16:00:00 GMT
Palamida, the San Francisco company that helps companies to audit their use of open source software, has released a list of what it calls "the top five most overlooked open source vulnerabilities." To this list, Palamida has added an additional five vulnerabilities exclusively for Linux.com.


Source...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
AUDIT_EVENT(5)						      BSD File Formats Manual						    AUDIT_EVENT(5)

NAME
audit_event -- audit event descriptions DESCRIPTION
The audit_event file contains descriptions of the auditable events on the system. Each line maps an audit event number to a name, a descrip- tion, and a class. Entries are of the form: eventnum:eventname:description:eventclass Each eventclass should have a corresponding entry in the audit_class(5) file. Example entries in this file are: 0:AUE_NULL:indir system call:no 1:AUE_EXIT:exit(2):pc 2:AUE_FORK:fork(2):pc 3:AUE_OPEN:open(2):fa FILES
/etc/security/audit_event SEE ALSO
audit(4), audit_class(5), audit_control(5), audit_user(5) HISTORY
The OpenBSM implementation was created by McAfee Research, the security division of McAfee Inc., under contract to Apple Computer Inc. in 2004. It was subsequently adopted by the TrustedBSD Project as the foundation for the OpenBSM distribution. AUTHORS
This software was created by McAfee Research, the security research division of McAfee, Inc., under contract to Apple Computer Inc. Addi- tional authors include Wayne Salamon, Robert Watson, and SPARTA Inc. The Basic Security Module (BSM) interface to audit records and audit event stream format were defined by Sun Microsystems. BSD
January 24, 2004 BSD