Date: Mon, 14 May 2007 11:18:37 +0200 From: Ivan Voras <ivoras@fer.hr> To: =?UTF-8?B?RGFnLUVybGluZyBTbcO4cmdyYXY=?= <des@des.no> Cc: freebsd-arch@freebsd.org Subject: Re: HEADS DOWN Message-ID: <4648296D.5070708@fer.hr> In-Reply-To: <86sl9zyjr1.fsf@dwp.des.no> References: <20070512153532.GQ21795@elvis.mu.org> <63984.1178992555@critter.freebsd.dk> <f25m78$ik$2@sea.gmane.org> <20070513215442.GZ21795@elvis.mu.org> <46478C9A.9050807@fer.hr> <86sl9zyjr1.fsf@dwp.des.no>
next in thread | previous in thread | raw e-mail | index | archive | help
[-- Attachment #1 --] Dag-Erling Smørgrav wrote: > So you think remote exploitable root vulnerabilities are OK? You think varying malloc() behaviour based on uid is ok? [-- Attachment #2 --] -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.5 (GNU/Linux) Comment: Using GnuPG with SUSE - http://enigmail.mozdev.org iD8DBQFGSCltldnAQVacBcgRAm3xAJ9T7aTqswqwjTN25XJXP24oNQ0GDwCgx9Zh gISl3f9558n2aa+oQ0F3tb0= =7Cud -----END PGP SIGNATURE-----
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4648296D.5070708>
