[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
bug#19565: Emacs vulnerable to endless-data attack (minor)
From: |
Eli Zaretskii |
Subject: |
bug#19565: Emacs vulnerable to endless-data attack (minor) |
Date: |
Tue, 08 Oct 2019 19:47:54 +0300 |
> From: Lars Ingebrigtsen <larsi@gnus.org>
> Cc: stefan@marxist.se, 19565@debbugs.gnu.org
> Date: Tue, 08 Oct 2019 18:27:15 +0200
>
> So bytes/sec, as you suggest, may be the best heuristic. But it should
> only kick in after having received a large number of bytes, probably.
Yes, I agree. So maybe make it kick in once the process buffer is
large enough? And even here we will need to consider, say, shell and
term.el buffers, which could grow quite large.
- bug#19565: Emacs vulnerable to endless-data attack (minor), Stefan Kangas, 2019/10/05
- bug#19565: Emacs vulnerable to endless-data attack (minor), Eli Zaretskii, 2019/10/06
- bug#19565: Emacs vulnerable to endless-data attack (minor), Lars Ingebrigtsen, 2019/10/06
- bug#19565: Emacs vulnerable to endless-data attack (minor), Stefan Kangas, 2019/10/07
- bug#19565: Emacs vulnerable to endless-data attack (minor), Eli Zaretskii, 2019/10/07
- bug#19565: Emacs vulnerable to endless-data attack (minor), Lars Ingebrigtsen, 2019/10/08
- bug#19565: Emacs vulnerable to endless-data attack (minor),
Eli Zaretskii <=
- bug#19565: Emacs vulnerable to endless-data attack (minor), Stefan Kangas, 2019/10/08
- bug#19565: Emacs vulnerable to endless-data attack (minor), Eli Zaretskii, 2019/10/08
- bug#19565: Emacs vulnerable to endless-data attack (minor), Stefan Kangas, 2019/10/08
- bug#19565: Emacs vulnerable to endless-data attack (minor), Eli Zaretskii, 2019/10/08