* Patrick Chevalley ([EMAIL PROTECTED]) chamullaba:

> Hi Luis,
> 
> Thank's to report this problem I was not aware because I use a kernel 2.6.3 
> myself.
> 
> A new security feature is enabled in the 2.6.8 kernel to better protect again 
> buffer overflow exploit. This unfortunately rise a hiden bug in the Kylix 
> compiler.
> Those interested by technical details can take a look here 
> http://crosskylix.untergrund.net/execshield.html

Nice article. I searched the internet and wasn't able to find the solution.

In particular, in that page there is an application (patchelf)
that fixes the bug in a compiled Kylix program, without having
to recompile it. I run it on a program I made some time ago,
and it fixed it nicely.
 
> There is a workaround for this bug I try to apply,
> can you try this new build and tell me if it work:
> http://www.ap-i.net/tmp/cdc_clx.zip 

Worked perfectly! 
Just for curiosity, I applied patchelf to the old cdc_clx
and it also fixed the problem.

> There is no other change to the program, so only
> Linux Fedora Core 2 user need to try that.
 
In the link you sent above, it says that probably other
distributions will soon have this problem, too.

        Thanks again,

                Luis.



------------------------ Yahoo! Groups Sponsor --------------------~--> 
$9.95 domain names from Yahoo!. Register anything.
http://us.click.yahoo.com/J8kdrA/y20IAA/yQLSAA/1.XolB/TM
--------------------------------------------------------------------~-> 

To Post a message, send it to:   [email protected]

To Unsubscribe, send a blank message to: 
[EMAIL PROTECTED] 
Yahoo! Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/skychart-discussion/

<*> To unsubscribe from this group, send an email to:
    [EMAIL PROTECTED]

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/
 



Reply via email to