[maemo-developers] [maemo-developers] X.Org security advisory: Buffer overflow in the Xrender extension
From: Daniel Stone daniel.stone at nokia.comDate: Fri Nov 3 19:19:50 EET 2006
- Previous message: [maemo-developers] X.Org security advisory: Buffer overflow in the Xrender extension
- Next message: [maemo-developers] please use #!/usr/bin/perl instead of #!/scratchbox/tools/bin/perl
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]
On Fri, Nov 03, 2006 at 05:23:56PM +0100, ext Antonio Orlando wrote: > Is the 770 affected by the X security issue [1]? Yes. > If yes, does the new firmware update fix it? No. > If not, will it be fixed? No plans at present, but it may (I hadn't thought about this, to be honest). > If not, can it be a real problem for 770 users? Not particularly; it's a local root exploit. You can get local root by enabling R&D mode and running 'sudo gainroot', too. Cheers, Daniel -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: Digital signature Url : http://lists.maemo.org/pipermail/maemo-developers/attachments/20061103/4d970912/attachment.pgp
- Previous message: [maemo-developers] X.Org security advisory: Buffer overflow in the Xrender extension
- Next message: [maemo-developers] please use #!/usr/bin/perl instead of #!/scratchbox/tools/bin/perl
- Messages sorted by: [ date ] [ thread ] [ subject ] [ author ]