Date: Thu, 08 Nov 2001 18:06:44 +0900 From: Hiroaki Etoh <etoh@trl.ibm.co.jp> To: kris@obsecurity.org Cc: luc@2113.ch, freebsd-security@freebsd.org, kzaraska@student.uci.agh.edu.pl Subject: Re: BUFFER OVERFLOW EXPLOITS Message-ID: <20011108180644Y.etoh@trl.ibm.com> In-Reply-To: <20011029132504.A98067@xor.obsecurity.org> References: <Pine.BSF.4.21.0110281500030.6086-100000@lhotse.zaraska.dhs.org> <3BDD11C8.4746A7BD@2113.ch> <20011029132504.A98067@xor.obsecurity.org>
next in thread | previous in thread | raw e-mail | index | archive | help
At Mon, 29 Oct 2001 13:25:04 -0800, Kris Kennaway <kris@obsecurity.org> wrote: > Because it can cause problems for certain things. The main one I've > found is XFree86, which will fail to run if you build it with > -fstack-protector. I think it's overriding CFLAGS in parts of the > build, which means that certain things aren't being compiled with > -fstack-protector and fail to link at runtime as a result. > > I also found a spurious failure in another application which would > cause it to hit the overflow trap even though nothing was apparently > overflowing. Could you send any bug report to me? I'll fix the problem. Hiroaki Etoh To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20011108180644Y.etoh>