Re: Low Latency Patch

From: Yoann Vandoorselaere (yoann@mandrakesoft.com)
Date: Sun Jul 02 2000 - 07:36:28 EST


Robert Dinse <nanook@eskimo.com> writes:

> On Sat, 1 Jul 2000, Horst von Brand wrote:
> >
> > Which give _no_ additional security (some script kiddies are now using
> > exploits that work even with them applied, just think what will happen if
> > all kernels are "securized": Esploits will work around that, and the cost
> > in the kernel stays forever).
>
> If you believe this, you are must be unfamiliar with all the Solar
> Designer patch does

Non executable stack doesn't help preventing stack overflow,
that was said thousand of time.

please stop being an asshole.

People here are trying to explain you why you are wrong,
and you make them lost their time because you always give the
same wrong argument.

-- 
		-- Yoann http://www.mandrakesoft.com/~yoann/
 It is well known that M$ product don't make a free() after a malloc(),
the unix community wish them good luck for their future development.

- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.rutgers.edu Please read the FAQ at http://www.tux.org/lkml/



This archive was generated by hypermail 2b29 : Fri Jul 07 2000 - 21:00:10 EST