Arjan van de Ven wrote:
On Fri, 2005-07-15 at 13:56 +0530, RVK wrote:
except this is no longer true really ;)
randomisation for example makes this a lot harder to do.
gcc level tricks to prevent buffer overflows are widely in use nowadays
too (FORTIFY_SOURCE and -fstack-protector). The combination of this all
makes it a LOT harder to actually exploit a buffer overflow on, say, a
distribution like Fedora Core 4.
Still is very new....not every one can immediately start using gcc 4.
it;s also available for gcc 3.4 as patch (and included in FC3 and RHEL4
for example)
so it's new? so what? doesn't make it less true that it nowadays is a
lot harder to exploit such bugs on recent distros.
Can I get more details on this patch for 3.4. Where can I find it ?
rvk
.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/