GNU bug report logs -
#63063
CVE-2021-36699 report
Previous Next
Full log
View this message in rfc822 format
Eli Zaretskii <eliz <at> gnu.org> writes:
> I think this depends on the OS, not only the CPU?
That too.
>> > I don't think this is relevant. But based on what the code does, I
>> > don't see why this should be considered a security issue.
>>
>> It's not, indeed.
>>
>> The glaringly obvious reason being that only the site administrator, or
>> the user himself, can replace the dump file with something else.
>
> I'm not sure I agree (there's the symlink attack, for example), but I
> don't think it changes the nature of the issue.
How would such a ``symlink attack'' work?
And in any case:
1. How will such a malicious .pdmp file be installed on the user's
system?
2. How will such a malicious .pdmp file end up loaded by the user's
Emacs?
3. What privileges will the user's Emacs have, that whoever installed
the malicious .pdmp file did not?
The answers to questions 1 and 2 can only be ``by user action'', or ``by
administrative action''. The answer to question 3 naturally follows.
This bug report was last modified 2 years and 56 days ago.
Previous Next
GNU bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson.