On Fri, 2005-07-15 at 13:56 +0530, RVK wrote: > >except this is no longer true really ;) > > > >randomisation for example makes this a lot harder to do. > >gcc level tricks to prevent buffer overflows are widely in use nowadays > >too (FORTIFY_SOURCE and -fstack-protector). The combination of this all > >makes it a LOT harder to actually exploit a buffer overflow on, say, a > >distribution like Fedora Core 4. > > > > > > > > > Still is very new....not every one can immediately start using gcc 4.
it;s also available for gcc 3.4 as patch (and included in FC3 and RHEL4 for example) so it's new? so what? doesn't make it less true that it nowadays is a lot harder to exploit such bugs on recent distros. - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [EMAIL PROTECTED] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/