Gentoo: 201101-03: libvpx: User-assisted execution of arbitrary code


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) Gentoo: 201101-03: libvpx: User-assisted execution of arbitrary code
# 1  
Old 01-15-2011
Gentoo: 201101-03: libvpx: User-assisted execution of arbitrary code

LinuxSecurity.com: Timothy B. Terriberry discovered that libvpx contains an integeroverflow vulnerability in the processing of video streams that mayallow user-assisted execution of arbitrary code.

More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
sleep(3C)																 sleep(3C)

NAME
sleep() - suspend execution for interval SYNOPSIS
DESCRIPTION
suspends the current process from execution for the number of seconds specified by the argument. Actual suspension time can be less than that requested for two reasons: o Scheduled wakeups occur at fixed 1 second intervals (on the second, according to an internal clock), and o Any caught signal terminates the sleep following execution of that signal's catching routine. Suspension time can be an arbitrary amount longer than requested due to the scheduling of other activity in the system. The value returned by is the "unslept" amount (the requested time minus the time actually slept) in case the caller had an alarm set to go off earlier than the end of the requested time, or premature arousal due to another caught signal. seconds must be less than 2^31. APPLICATION USAGE
If a is generated for a multithreaded process, it may not be delivered to a thread currently in See the sigwait(2) manpage for details. SEE ALSO
sigwait(2), signal(5), thread_safety(5). STANDARDS CONFORMANCE
sleep(3C)