The bug is Redhat specific. It was introduced by a patch they apply to less.
This is a comment taken from
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=145527
Additional Comment #15 From Josh Bressers (Security Response Team) on
2005-01-25 09:27 ---
I've done some investigating on
Thomas Schoepf wrote:
The bug is Redhat specific. It was introduced by a patch they apply to
less.
This is a comment taken from
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=145527
Additional Comment #15 From Josh Bressers (Security Response Team) on
2005-01-25 09:27 ---
Package: less
Version: 382-2
Severity: grave
Tags: security patch
less is vulnerable to a head-based buffer overflow that can be triggered
by viewing certian binary files. This is theoretically exploitable by
providing a user with such a file and waiting for him to run less on it.
The problem
3 matches
Mail list logo