We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message
78,780 News Articles

Firefox flaws found by open-source system

Next version under scrutiny

A software system for hunting down security flaws in open-source software is being used to iron out flaws in Mozilla's Firefox.

Earlier this year Coverity, Symantec and Stanford University were awarded a $1.24m (about £654,000) grant by the US Department of Homeland Security to fund the creation of a tool that could automatically scan for bugs in open-source code, including ones related to security.

Now a report on Internetnews.com, claims that the Vulnerability Discovery and Remediation, Open-Source Hardening Project has been extended to include programs such as the Firefox browser among its list of open-source projects to analyse.

The purpose of the project is to increase the stability of open-source software for use in the US government. It appears that Mozilla has jumped on the opportunity.

Other open-source projects believed to be under scrutiny by the project include Apache, Bind, Ethereal, KDE, Linux, Firefox, FreeBSD, OpenBSD, OpenSSL and MySQL.

"Firefox is the first open-source project to put Coverity's software directly in the hands of its developers, allowing them to run customised analyses at will and ensure the quality of their codebase as it evolves," Coverity was quoted as saying in a statement.

Mozilla is currently in the process of beta-testing the next major release of the software, version 2.0.


IDG UK Sites

Top 5 Android tips and tricks for smartphones and tablets

IDG UK Sites

How to join Apple's OS X Beta Seed Program: Get OS X Yosemite on your Mac before public release

IDG UK Sites

Why the BBC iPlayer outage was caused by a DDoS attack: Topsy and Tim isn't *that* popular

IDG UK Sites

BBC using Glasgow 2014 Commonwealth Games to trial 4K/UHD, pan-around video, augmented video and...