* Moritz Muehlenhoff:
glibc 2.3.4 introduced more secure heap management, which renders several
code injection attacks moot.
I think these additional checks have already been bypassed. Shall I
dig up a reference?
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe.
Steve Langasek [EMAIL PROTECTED] writes:
So if there's no evidence of arbitrary code execution, I think
it's appropriate here to downgrade the bug -- but the security
team should also be apprised.
Fine with me.
--
,''`.
: :' :Romain Francoise [EMAIL PROTECTED]
`. `'
severity 408929 important
thanks
On Sun, Feb 04, 2007 at 01:56:40PM +0100, Jérôme Marant wrote:
I'll ask that we tag this bug as etch-ignore: there are tons of bugs like
this one in Emacs and there are multiple chances to expose such bugs
by using many different packages.
Futhermore, emacs21
Steve Langasek wrote:
So if there's no evidence of arbitrary code execution, I think it's
appropriate here to downgrade the bug -- but the security team should also
be apprised.
glibc 2.3.4 introduced more secure heap management, which renders several
code injection attacks moot. (most notably
4 matches
Mail list logo