Ar an chéad lá is fiche de mí Eanair, scríobh Nico Golde: 
 Hi,
 during the analysis of CVE-2007-6109 and if this affects 
 xemacs Florian Weimer and me recognized a problem in the 
 xemacs code:
 
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=457764#10 
[whence]
 It turned out that this is actually no bug in the quoted 
 code because the precision is taken into account when 
 reserving memory for the buffer. Unfortunately this is the 
 problem because:
 #define alloca_array(type, len) ((type *) alloca ((len) * sizeof (type)))
 
 this does not do any checks and also includes an integer 
 overflow and thus it is still possible to reproduce this 
 problem. So the obvious thing is to fix this macro which 
 should be quite important because alloca_array is used at a 
 bunch of different places in the code. 
(format "%.*d" -1 25)
=> "25"
I don’t see any bug here. The particular use of alloca_array you’re talking
about has its length argument checked; it’s zero at a minimum. The function
#'gtk-pixmap-get in ui-byhand.c doesn’t check that the argument to
alloca_array is non-negative, but anyone who can call #'gtk-pixmap-get
mailiciously can call #'make-vector maliciously too, where allocating memory
is the documented and intentional behaviour of the API.
-- 
¿Dónde estará ahora mi sobrino Yoghurtu Nghé, que tuvo que huir
precipitadamente de la aldea por culpa de la escasez de rinocerontes?
_______________________________________________
XEmacs-Beta mailing list
XEmacs-Beta(a)xemacs.org
http://calypso.tux.org/cgi-bin/mailman/listinfo/xemacs-beta