Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Tue, 19 Mar 2002 14:14:55 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Tue, 19 Mar 2002 14:14:45 -0500 Received: from ns.suse.de ([213.95.15.193]:19726 "HELO Cantor.suse.de") by vger.kernel.org with SMTP id ; Tue, 19 Mar 2002 14:14:28 -0500 Date: Tue, 19 Mar 2002 20:14:27 +0100 From: Dave Jones To: "H. Peter Anvin" Cc: linux-kernel@vger.kernel.org Subject: Re: [PATCH] zlib double-free bug Message-ID: <20020319201427.K19346@suse.de> Mail-Followup-To: Dave Jones , "H. Peter Anvin" , linux-kernel@vger.kernel.org In-Reply-To: <15510.25987.233438.112897@argo.ozlabs.ibm.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.3.22.1i Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org > > For the record - it's not worth bothering with fs/jffs2/zlib.c; if they > > can corrupt your file system on the medium, why bother with cracking zlib? > Removable media? If attacker has physical access to the media, there are far simpler ways of corrupting it than zlib exploitation. 8-) -- | Dave Jones. http://www.codemonkey.org.uk | SuSE Labs - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/