Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S262261AbTERXCS (ORCPT ); Sun, 18 May 2003 19:02:18 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S262262AbTERXCS (ORCPT ); Sun, 18 May 2003 19:02:18 -0400 Received: from 205-158-62-136.outblaze.com ([205.158.62.136]:23733 "HELO fs5-4.us4.outblaze.com") by vger.kernel.org with SMTP id S262261AbTERXCR (ORCPT ); Sun, 18 May 2003 19:02:17 -0400 Subject: Re: about buffer overflow. From: Felipe Alfaro Solana To: Halil Demirezen Cc: LKML In-Reply-To: <20030518222742.GA20916@bilmuh.ege.edu.tr> References: <20030518222742.GA20916@bilmuh.ege.edu.tr> Content-Type: text/plain Message-Id: <1053299705.587.0.camel@teapot.felipe-alfaro.com> Mime-Version: 1.0 X-Mailer: Ximian Evolution 1.3.3 (Preview Release) Date: 19 May 2003 01:15:05 +0200 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 516 Lines: 13 On Mon, 2003-05-19 at 00:27, Halil Demirezen wrote: > Maybe it is silly to ask but, > is there a default protection for buffer overflows in kernels versioned above 2.4.20 ?? I think this link will be of your interest: http://linuxtoday.com/security/2003050501026OSKNDV - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/