3 captures
15 Nov 2014 - 20 Jan 2024
Oct NOV Dec
15
2013 2014 2015
success
fail

About this capture

COLLECTED BY

Organization: Internet Archive

The Internet Archive discovers and captures web pages through many different web crawls. At any given time several distinct crawls are running, some for months, and some every day or longer. View the web archive through the Wayback Machine.

Collection: Wide Crawl started June 2014

Web wide crawl with initial seedlist and crawler configuration from June 2014.
TIMESTAMPS

The Wayback Machine - http://web.archive.org/web/20141115155654/http://lwn.net/Articles/552061/
 
LWN.net Logo

Log in now

Create an account

Subscribe to LWN

LWN.net Weekly Edition for November 13, 2014

High-DPI displays and Linux

LWN.net Weekly Edition for November 6, 2014

A control group manager

Kdbus meets linux-kernel

Pondering the X client vulnerabilities

Pondering the X client vulnerabilities

Posted May 28, 2013 21:14 UTC (Tue) by viro (subscriber, #7872)
In reply to: Pondering the X client vulnerabilities by acoopersmith
Parent article: Pondering the X client vulnerabilities

"Latest advances"? Like, say, "grep for strncpy and see if the code assumes that result will be NUL-terminated (usually under a couple of minutes per hit)"? Or "look for <alloc-style function>(<something> {*,<<} <something>); it's likely to be allocating an array and constitutes a potential overflow, unless the array size is constrained by something"? Something that recent?


(Log in to post comments)


Copyright © 2014, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds