Thomas Schoepf wrote:
> The bug is Redhat specific. It was introduced by a patch they apply to
> less.
> This is a comment taken from
> https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=145527
>
>
> Additional Comment #15 From Josh Bressers (Security Response Team) on
> 2005-01-25 09:27 --
The bug is Redhat specific. It was introduced by a patch they apply to less.
This is a comment taken from
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=145527
Additional Comment #15 From Josh Bressers (Security Response Team) on
2005-01-25 09:27 ---
I've done some investigating on t
Package: less
Version: 382-2
Severity: grave
Tags: security patch
less is vulnerable to a head-based buffer overflow that can be triggered
by viewing certian binary files. This is theoretically exploitable by
providing a user with such a file and waiting for him to run less on it.
The problem was
3 matches
Mail list logo