* Patrick Chevalley ([EMAIL PROTECTED]) chamullaba: > Hi Luis, > > Thank's to report this problem I was not aware because I use a kernel 2.6.3 > myself. > > A new security feature is enabled in the 2.6.8 kernel to better protect again > buffer overflow exploit. This unfortunately rise a hiden bug in the Kylix > compiler. > Those interested by technical details can take a look here > http://crosskylix.untergrund.net/execshield.html
Nice article. I searched the internet and wasn't able to find the solution. In particular, in that page there is an application (patchelf) that fixes the bug in a compiled Kylix program, without having to recompile it. I run it on a program I made some time ago, and it fixed it nicely. > There is a workaround for this bug I try to apply, > can you try this new build and tell me if it work: > http://www.ap-i.net/tmp/cdc_clx.zip Worked perfectly! Just for curiosity, I applied patchelf to the old cdc_clx and it also fixed the problem. > There is no other change to the program, so only > Linux Fedora Core 2 user need to try that. In the link you sent above, it says that probably other distributions will soon have this problem, too. Thanks again, Luis. ------------------------ Yahoo! Groups Sponsor --------------------~--> $9.95 domain names from Yahoo!. Register anything. http://us.click.yahoo.com/J8kdrA/y20IAA/yQLSAA/1.XolB/TM --------------------------------------------------------------------~-> To Post a message, send it to: [email protected] To Unsubscribe, send a blank message to: [EMAIL PROTECTED] Yahoo! Groups Links <*> To visit your group on the web, go to: http://groups.yahoo.com/group/skychart-discussion/ <*> To unsubscribe from this group, send an email to: [EMAIL PROTECTED] <*> Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/
