Re: Buffer Over-runs, was Open source firewalls

From: RVK
Date: Fri Jul 15 2005 - 04:36:23 EST


Arjan van de Ven wrote:

On Fri, 2005-07-15 at 13:56 +0530, RVK wrote:


except this is no longer true really ;)

randomisation for example makes this a lot harder to do.
gcc level tricks to prevent buffer overflows are widely in use nowadays
too (FORTIFY_SOURCE and -fstack-protector). The combination of this all
makes it a LOT harder to actually exploit a buffer overflow on, say, a
distribution like Fedora Core 4.






Still is very new....not every one can immediately start using gcc 4.



it;s also available for gcc 3.4 as patch (and included in FC3 and RHEL4
for example)

so it's new? so what? doesn't make it less true that it nowadays is a
lot harder to exploit such bugs on recent distros.


Can I get more details on this patch for 3.4. Where can I find it ?

rvk

.




-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/