Re: Buffer Over-runs, was Open source firewalls

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Arjan van de Ven wrote:

On Fri, 2005-07-15 at 13:56 +0530, RVK wrote:
except this is no longer true really ;)

randomisation for example makes this a lot harder to do.
gcc level tricks to prevent buffer overflows are widely in use nowadays
too (FORTIFY_SOURCE and -fstack-protector). The combination of this all
makes it a LOT harder to actually exploit a buffer overflow on, say, a
distribution like Fedora Core 4.




Still is very new....not every one can immediately start using gcc 4.

it;s also available for gcc 3.4 as patch (and included in FC3 and RHEL4
for example)

so it's new? so what? doesn't make it less true that it nowadays is a
lot harder to exploit such bugs on recent distros.
Can I get more details on this patch for 3.4. Where can I find it ?

rvk

.


-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

[Index of Archives]     [Kernel Newbies]     [Netfilter]     [Bugtraq]     [Photo]     [Gimp]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Video 4 Linux]     [Linux for the blind]
  Powered by Linux