Re: @(#) Mordred Labs advisory 0x0001: Buffer overflow in
От | Justin Clift |
---|---|
Тема | Re: @(#) Mordred Labs advisory 0x0001: Buffer overflow in |
Дата | |
Msg-id | 3D61A0A7.54539102@postgresql.org обсуждение исходный текст |
Ответ на | Re: @(#) Mordred Labs advisory 0x0001: Buffer overflow in ("Christopher Kings-Lynne" <chriskl@familyhealth.com.au>) |
Ответы |
Re: @(#) Mordred Labs advisory 0x0001: Buffer overflow in
Re: @(#) Mordred Labs advisory 0x0001: Buffer overflow in |
Список | pgsql-hackers |
Christopher Kings-Lynne wrote: > > > On Tue, 20 Aug 2002, Justin Clift wrote: > > > > > Vince, > > > > > > Do you reckon it's worth you responding to "Sir Mordred" and pointing > > > out that he overstated the vulnerability? > > > > Not me. Tom (pref) or Marc would be the proper respondent. > > Has it actually been fixed? The TODO list only mentions the cash_out(2) problem, whilst the email archives mention them both. From the info still around, this looks to mean that the cash_words() problem was fixed, but the cash_out() problem was harder to fix. Tom/Bruce, is that correct? + Justin > Chris -- "My grandfather once told me that there are two kinds of people: those who work and those who take the credit. He told me to try to be in the first group; there was less competition there." - Indira Gandhi
В списке pgsql-hackers по дате отправления: