![]()
From: Oguz ARDUC (oguz.arduc@marconi-selenia.com.tr)
Date: Wed 01 Oct 2003 - 02:42:45 EDT
ibm research'in gcc stack-smashing protector'ini kullanan var mi?
http://www.research.ibm.com/trl/projects/security/ssp/
----- Original Message -----
From: "Mustafa Akgul" <akgul@Bilkent.EDU.TR>
To: <linux-guvenlik@liste.linux.org.tr>; <linux-sohbet@liste.linux.org.tr>
Cc: <k12@listweb.bilkent.edu.tr>
Sent: Tuesday, September 30, 2003 9:40 PM
Subject: [linux-guvenlik] SECUR> SECURITY: Linux fights off worms (fwd)
**************************************************************
Net Happenings - From Educational CyberPlayGround
**************************************************************
Red Hat has taken steps to thwart worms and hackers in its soon to be
released Enterprise Linux 3 operating system. A feature called Position
Independent Executables (PIE) will make if significantly more difficult for
worms and other buffer overflow attacks to succeed. PIE causes the kernel
to put other open-source programs into different memory locations each time
they are loaded. Experts say that hackers need to know the relative
locations of programs and libraries in order to exploit buffer overflows.
"There will always be bugs in software," said Mark Cox of Red Hat's
security response team, "but buffer overflows should not be exploitable by
hackers."
http://www.vnunet.com/News/1143925
![]()