Bug#342044: security.debian.org: Systemically making Debian GNU/Linux less suseptible to buffer overflow attacks

2005-12-07 Thread Bill Wohler
Steve Kemp <[EMAIL PROTECTED]> wrote: > On Sun, Dec 04, 2005 at 02:25:07PM -0800, Bill Wohler wrote: > > Package: security.debian.org > > Severity: wishlist > > This is an inappropriate package to report this bug against, > I'd suggest at least using GCC. Since I have no idea which packages w

Bug#342044: security.debian.org: Systemically making Debian GNU/Linux less suseptible to buffer overflow attacks

2005-12-06 Thread Steve Kemp
On Sun, Dec 04, 2005 at 02:25:07PM -0800, Bill Wohler wrote: > Package: security.debian.org > Severity: wishlist This is an inappropriate package to report this bug against, I'd suggest at least using GCC. > They mentioned StackGuard, ProPolice, StackShield, and RAD (Return > Address Defender)

Bug#342044: security.debian.org: Systemically making Debian GNU/Linux less suseptible to buffer overflow attacks

2005-12-04 Thread Bill Wohler
Package: security.debian.org Severity: wishlist I just read an article that talked about several ways to reduce the chance of a hacker taking advantage of a system due to buffer overflow attacks. Besides using Java, of course. They mentioned StackGuard, ProPolice, StackShield, and RAD (Return Add