Your message dated Wed, 11 Jan 2006 22:46:23 +0100
with message-id <[EMAIL PROTECTED]>
has caused the Debian Bug report #336138,
regarding liblzo1: liblzo.so.1.0.0 is mistakenly listed as requiring an 
executable stack.
to be marked as having been forwarded to the upstream software
author(s) Markus F.X.J. Oberhumer <[EMAIL PROTECTED]>.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

---------------------------------------
Received: (at 336138-forwarded) by bugs.debian.org; 11 Jan 2006 21:46:57 +0000
>From [EMAIL PROTECTED] Wed Jan 11 13:46:57 2006
Return-path: <[EMAIL PROTECTED]>
Received: from mail.gmx.net ([213.165.64.21])
        by spohr.debian.org with smtp (Exim 4.50)
        id 1Ewno0-0004fy-QI
        for [EMAIL PROTECTED]; Wed, 11 Jan 2006 13:46:57 -0800
Received: (qmail invoked by alias); 11 Jan 2006 21:46:25 -0000
Received: from dslb-084-063-060-221.pools.arcor-ip.net (EHLO colt.pezone.net) 
[84.63.60.221]
  by mail.gmx.net (mp001) with SMTP; 11 Jan 2006 22:46:25 +0100
X-Authenticated: #495269
From: Peter Eisentraut <[EMAIL PROTECTED]>
To: Markus F.X.J. Oberhumer <[EMAIL PROTECTED]>
Subject: Re: Bug#336138: liblzo1: liblzo.so.1.0.0 is mistakenly listed as 
requiring an executable stack.
Date: Wed, 11 Jan 2006 22:46:23 +0100
User-Agent: KMail/1.8.3
References: <[EMAIL PROTECTED]>
In-Reply-To: <[EMAIL PROTECTED]>
Cc: [EMAIL PROTECTED]
MIME-Version: 1.0
Content-Type: text/plain;
  charset="iso-8859-1"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Message-Id: <[EMAIL PROTECTED]>
X-Y-GMX-Trusted: 0
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

The following issue (which also exists in lzo 2.02) has been reported
to the Debian bug tracking system.  Please check whether you can fix the
assembly code to avoid this, because this apparently hinders certain
security features.

Russell Coker wrote:
> Package: liblzo1
> Version: 1.08-2
> Severity: normal
> 
> "readelf -l /usr/lib/liblzo.so.1.0.0 | grep STACK" shows that the shared 
> object
> is listed as requiring an executable stack.  I believe that this is a mistake,
> probably due to including assembler without specifying the appropriate data to
> list is as not requiring an executable stack.
> 
> Please see http://people.redhat.com/drepper/nonselsec.pdf for more 
> information.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to