Arjan van de Ven wrote:
On Fri, 2005-07-15 at 13:56 +0530, RVK wrote:
except this is no longer true really ;)
randomisation for example makes this a lot harder to do.
gcc level tricks to prevent buffer overflows are widely in use nowadays
too (FORTIFY_SOURCE and -fstack-protector). The combination of this all
makes it a LOT harder to actually exploit a buffer overflow on, say, a
distribution like Fedora Core 4.
Still is very new....not every one can immediately start using gcc 4.
it;s also available for gcc 3.4 as patch (and included in FC3 and RHEL4
for example)
so it's new? so what? doesn't make it less true that it nowadays is a
lot harder to exploit such bugs on recent distros.
How about using ProPolice etc ?
rvk
.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
[Index of Archives]
[Kernel Newbies]
[Netfilter]
[Bugtraq]
[Photo]
[Gimp]
[Yosemite News]
[MIPS Linux]
[ARM Linux]
[Linux Security]
[Linux RAID]
[Video 4 Linux]
[Linux for the blind]
|
|