Announcement

Collapse
No announcement yet.

Fedora 31 Plans To Use GCC Security Hardening Flags By Default

Collapse
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • #21
    Does Fedora also patch gcc manual to reflect changes in defaults?

    Comment


    • #22
      Originally posted by hreindl View Post
      and you dumb fuck are running complete different flags due development and then wonder why it in productiin behaves differently?

      yeah, and because humans write always perfect code we have that much security updates for every peice of software day for day....
      Of course not, since you use software made by idiots, just like flies stick to shit.

      Guess what though? Those vulnerabilities do get fixed when discovered.

      What's the point of fixing them at all if you let this stack protector shit still exist? It will do nothing but add an extra check that's useless because the stack is already checked and will STILL be checked no matter how innocent the function is or how fixed it is.

      Note that this protects the stack, not the other vulnerabilities that are harder to track down. i.e. usually solves only code from trash developers.

      Originally posted by hreindl View Post
      if you don't want security options use CFLAGS / CXXFLAGS moron
      Actually no you retard because CFLAGS/CXXFLAGS are for non-standard compiler options to customize it. Having to do -fno-stack-protector when that's not the default is pure retardation.

      Comment


      • #23
        Originally posted by hreindl View Post
        so you say because we can't protect against everything 100% we should stop protection at all?
        take your meds
        No I'm saying that most vulnerabilities that involve the stack are usually written by trash in the first place.

        Comment


        • #24
          Originally posted by hreindl View Post
          no, you are saying that you believe your code is always error free while history proves that nothing bigger than "hello world" in doubt is and so there are protections for free and only very rare workloads where the introduce any relevant performance issue
          Are you stupid or something or do you think all exploits are magic and all of the same kind? I don't know how I can rephrase what I said better in English considering it was perfectly clear already.

          Some vulnerabilities are written by newbies, other by trash programmers, and some even by skilled programmers. This doesn't mean a skilled programmer will write just any sort of vulnerability, even those that are usually written by newbies.

          Look at this important part: that involve the stack. It has a purpose there.

          Probably you think that hacking also happens by typing stuff fast at a screen full of numbers, because that's what you see in movies.
          Last edited by Weasel; 15 March 2019, 11:08 AM.

          Comment


          • #25
            Originally posted by hreindl View Post
            god damend mistakes happen, it's that easy
            the point of hardening is to mitigate them
            Mistakes happen but some mistakes are laughable while others are understandable. At least, assuming you have at least some actual expertise under your belt and aren't just a trash "programmer" as I said. Not to mention if those mistakes pass even code review...

            Originally posted by hreindl View Post
            only idiots discuss about such things and google developers are for sure smarter than you
            That's fairly laughable actually. You're claiming developers who had to put guidelines like "always use signed, because some people are total incompetents to understand basic integer promotion rules, so make it easier on their tiny brain" are smarter well ok.

            If you define smart by being unable to understand basic stuff or getting confused by it then ok, you have a point. In fact, Google actually write even more trash code than Microsoft and you know the meme about Microsoft's code. You'd know this if you actually looked through their open code, can only imagine what's in their closed code.

            But what do you expect from a company hiring based on gender, ethnicity, race, etc... instead of actual skill?

            Comment

            Working...
            X