Andrew Reid <[EMAIL PROTECTED]> writes:

>   I actually did this twice, since it's not possible, using the
> syslog, to distinguish between a randomly-located segfault
> (due to pointer-mishandling, for instance) and differences due
> to relocation or other invocation-dependent differences.  I got
> the same backtrace both times.

I'm unable to reproduce this on x86, so it may be a 64-bit-specific
issue.

>   The fact that the segfault was triggered also means that the bug is
> still present in the current etch security-fix package,
> krb5-admin-server-1.4.4-7etch2, which is now installed on this server.
> It was ...-7etch1 which first showed the bug.

Yes, I wouldn't expect anything in that security update to address this.

-- 
Russ Allbery ([EMAIL PROTECTED])               <http://www.eyrie.org/~eagle/>


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to