Please do not reply to this email- if you want to comment on the bug, go to the
URL shown below and enter your comments there.

Changed by [EMAIL PROTECTED]

http://bugzilla.ximian.com/show_bug.cgi?id=81685

--- shadow/81685        2007-07-31 12:20:30.000000000 -0400
+++ shadow/81685.tmp.25713      2007-08-01 06:18:04.000000000 -0400
@@ -241,6 +241,9 @@
 overflows from happening by doing some stack peeking in the
 managed->unmanaged wrappers or restoring the soft guard protection
 when returning from those same wrappers (this would be done only when
 needed using the already existing mechanism fro thread.abort)
 1) is harder to solve but corrently only needed when wanting to run
 untrusted code in a safe way
+
+------- Additional Comments From [EMAIL PROTECTED]  2007-08-01 06:18 -------
+*** Bug 47689 has been marked as a duplicate of this bug. ***
_______________________________________________
mono-bugs maillist  -  [email protected]
http://lists.ximian.com/mailman/listinfo/mono-bugs

Reply via email to