Displaying 20 results from an estimated 10000 matches similar to: "Projects for new developers"
2013 Jun 05
0
Issues that could benefit from a bounty reward?
Hey all,
I’m the founder of Bountysource.com. We ran a newsletter contest a few
weeks ago where we asked our users to pick their 3 favorite Open Source
projects. The winning projects would get bounties placed on a few top
issues, and Ruby on Rails came in first place, earning a $300 bounty reward!
So, my question to you guys... Where should the money go? If you reply with
an issue you really
2012 Jan 16
2
bounties for exploits against CentOS?
With companies like Facebook and Google offering cash prizes for people
who can find security holes in their products, has there ever been any
consideration given to offering cash rewards to people finding security
exploits in CentOS or in commonly bundled services like Apache?
(Provided of course they follow "responsible disclosure" and report the
exploit to the software authors
2018 Feb 09
0
[Release-testers] [6.0.0 Release] Release Candidate 2 tagged
> On 9 Feb 2018, at 10:20, Hans Wennborg <hans at chromium.org> wrote:
>
> On Thu, Feb 8, 2018 at 10:43 PM, Dimitry Andric <dimitry at andric.com> wrote:
>> On 7 Feb 2018, at 21:51, Hans Wennborg via Release-testers <release-testers at lists.llvm.org> wrote:
>>>
>>> There's been a lot of merges since rc1, and hopefully the tests are in
2013 Oct 09
0
Want to hack on OpenSSH? Want to get paid for it?
Hi,
Google has just announced that they will pay up to $3113.70 for
proactive security patches to OpenSSH.
https://www.google.com/about/appsecurity/patch-rewards/
For a patch to be eligible, it has to 1) improve OpenSSH's security and
2) actually ship in a release.
If you want to work on a patch to improve some aspect of OpenSSH's
security then please contact us first on this list, our
2016 Mar 01
2
[Release-testers] [3.8 Release] RC3 has been tagged
On Mon, Feb 29, 2016 at 2:20 AM, Daniel Sanders
<Daniel.Sanders at imgtec.com> wrote:
> clang+llvm-3.8.0-rc3-x86_64-linux-gnu-debian8.tar.xz (sha1sum: 2dedc6136d7cfbac8348652c543887964d92393c)
> Native: All ok
> Cross compiling to MIPS: All ok
>
> clang+llvm-3.8.0-rc3-mips-linux-gnu.tar.xz (sha1sum: f286149dbb2ea7e194c5c3719b6cded476f6e65f)
> All ok
2016 Feb 29
0
[Release-testers] [3.8 Release] RC3 has been tagged
clang+llvm-3.8.0-rc3-x86_64-linux-gnu-debian8.tar.xz (sha1sum: 2dedc6136d7cfbac8348652c543887964d92393c)
Native: All ok
Cross compiling to MIPS: All ok
clang+llvm-3.8.0-rc3-mips-linux-gnu.tar.xz (sha1sum: f286149dbb2ea7e194c5c3719b6cded476f6e65f)
All ok (aside from non-regression failures in check-all).
There were two kinds of check-all failure:
* mips64 sanitizers. Not a regression since
2015 Nov 19
0
statistician opening at Merck Research Labs in NJ, USA
If you are interested in the following position, please contact Vladimir Svetnik at Vladimir_svetnik at merck.com.
Date: Nov 18, 2015
Location: Rahway, NJ, US
Associate Principal Scientist, Biostatistics-BIO004396
Description
Merck & Co., Inc. Kenilworth, N.J., U.S.A. known as Merck in the United States and Canada, is a global health care leader with a diversified portfolio of prescription
2005 Jul 29
0
Feature requests :: For now, not in the bug tracker - please!
Dear Asterisk community,
We are now working hard to complete Asterisk 1.2, testing and finalizing
the existing patches and work that is going on in the developer team.
Now is too late to file feature requests for 1.2 in the bug tracker.
Unless you have a solid, working and tested patch, we will not consider
the feature request on behalf of the developer team. A bug marshal will
propably close
2011 Jun 16
0
[LLVMdev] LLVM-based address sanity checker
On Jun 16, 2011, at 1:27 AM, Kostya Serebryany wrote:
> Hello again,
>
> The tool we announced 1.5 months ago has matured quite a bit.
> In addition to heap out-of-bound and use-after-free bugs it also finds stack overruns/underruns.
> AddressSanitizer is being actively used by the Chromium developers and already found over 20 bugs:
2017 Oct 06
1
SIGSEGV during startup
Hi,
This problem started as of r73472 ("Merged in the rest of the basic
ALTREP framework."); I tested r73471 and it did not exist.
I'm building R devel on Ubuntu 16.04.3 LTS (64-bit), with the following flags:
CC="gcc -std=gnu99 -fsanitize=address -fno-omit-frame-pointer"
CFLAGS="-fno-omit-frame-pointer -g -O2 -Wall -pedantic -mtune=native"
and using
2011 Jun 16
2
[LLVMdev] LLVM-based address sanity checker
On Thu, Jun 16, 2011 at 11:00 PM, Chris Lattner <clattner at apple.com> wrote:
>
> On Jun 16, 2011, at 1:27 AM, Kostya Serebryany wrote:
>
> Hello again,
>
> The tool we announced 1.5 months ago has matured quite a bit.
> In addition to heap out-of-bound and use-after-free bugs it also finds
> stack overruns/underruns.
> AddressSanitizer is being actively used by
2004 Apr 10
0
Nothing to do? Go bounty-hunting!
Being bored to death by these long weekends with nothing to do?
**** Why not go bounty-hunting? ****
There are some feature requests in the bug tracker with monetary bounties attached.
* Windows manager
* FreeBSD Zaptel drivers
http://bugs.digium.com/bug_view_page.php?bug_id=0000847
* IAX incoming/outgoing limit
* 2B channel transfer on PRI
* MGCP media gateway support
All of these have
2018 Sep 05
2
AddressSanitizer on SPECCPU2006
Hi
I am using SanitizerCoverage feature supported by clang to get the
basicblock coverage.
my tested binaries are spec cpu2006. I compiled the binary with the option
COPTIMIZE = -O0 -fsanitize=address -fsanitize-coverage=bb -flto
-fno-strict-aliasing -std=gnu89 -gdwarf-3
After the compiling process is end. I run the 400.perlbench. with the
command
ASAN_OPTIONS=coverage=1 ./perlbench.
2018 Sep 05
2
AddressSanitizer on SPECCPU2006
Hi
If so, is it able to disable this check. All I need is just to get the BB
coverage information
Regards
Muhui
Alexander Potapenko <glider at google.com>于2018年9月5日 周三下午6:57写道:
> This is a known problem in SPECCPU2006, see
> https://github.com/google/sanitizers/wiki/AddressSanitizerFoundBugs
> On Wed, Sep 5, 2018 at 7:36 AM Muhui Jiang via llvm-dev
> <llvm-dev at
2011 Jun 16
2
[LLVMdev] LLVM-based address sanity checker
Hello again,
The tool we announced 1.5 months ago has matured quite a bit.
In addition to heap out-of-bound and use-after-free bugs it also finds stack
overruns/underruns.
AddressSanitizer is being actively used by the Chromium developers and
already found over 20 bugs:
http://blog.chromium.org/2011/06/testing-chromium-addresssanitizer-fast.html
Question to the LLVM developers: would you
2012 May 13
0
[LLVMdev] [3.1 Release] Release Notes and External Projects
On 11.05.2012, at 22:55, Bill Wendling wrote:
> Hi all!
>
> Please remember to update the release notes! We're getting close to the release date, and we need the notes to be up-to-date.
I added some bigger picture notes to http://llvm.org/docs/ReleaseNotes.html this morning, but we're still missing a lot of text, specifically:
- clang:
clang has it's own release notes
2018 Sep 05
2
AddressSanitizer on SPECCPU2006
Hi Alex
Thanks for your email. But it seems not work. I removed the
-fsanitize=address flag.
The global buffer overflow message doesn't show. However, no *.sancov file
is created after I run perlbench. Thus, I could not get the BB coverage. Do
you have any ideas? Many Thanks
Regards
Muhui
Alexander Potapenko <glider at google.com> 于2018年9月5日周三 下午7:14写道:
> Hi Muhui,
>
> If
2006 Apr 20
5
Noobie problems with helper
I have the following helper method in application_helper.rb:
def format_date(date)
day = to_s(date.day)
month = to_s(date.month)
time = to_s(date.time)
date = day + "/" + month + " - " + time
return date
end
I am trying to call this method in a view like this:
<%= format_date(bounty.created_on) %>
create_on is a timestamp in mysql. I am
2015 Jul 22
3
[LLVMdev] [cfe-dev] [3.7 Release] RC1 has been tagged, Testing Phase I begins
> Ben reports that he didn't get a tarball even after the rpath fix and
> had to disable -o pipefail to get one. Still not sure what caused
> this.
'make check' failures can cause this. I had to revert r241599 to get a package.
> Appendix: compiler-rt test failures
> ===================================
>
Just to add Mips to this: On big-endian Mips32r2:
2017 May 23
0
NHW Project - paid development
Hello,
As I said in my previous post, I would like now to accelerate to NHW Codec
development.I started in January 2007, more than 10 years ago, and I would
like now to see it finished after all the time I gave to it (especially the
3 first years).For now I can only give 2-3 hours in the week-end to the
codec development, and furthermore I don't have all the skills to improve
it, notably in