Date: Mon, 7 Jan 2002 22:29:51 +0100 From: Krzysztof Zaraska <kzaraska@student.uci.agh.edu.pl> To: hawkeyd@visi.com Cc: freebsd-security@freebsd.org Subject: Re: GCC stack-smashing extension Message-ID: <20020107222951.6fcaea7c.kzaraska@student.uci.agh.edu.pl> In-Reply-To: <200201071902.g07J2ix05040@sheol.localdomain> References: <20020107091948.A4096_sheol.localdomain@ns.sol.net> <20020108030952.A91323_raven.robbins.dropbear.id.au@ns.sol.net> <200201071902.g07J2ix05040@sheol.localdomain>
next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, 7 Jan 2002 13:02:44 -0600 (CST) D J Hawkey Jr wrote: > > It's claimed that people have used versions of FreeBSD compiled with > > the ssp patch, and the ideas and descriptions sure look nice. > > It didn't work for me, though. > > If Kris K. is one of 'em, and his boxen are running fine with sources > built with the patch, that's pretty compelling evidence that it does > no harm, to say the least. See his mail on this list, 01/10/29, Re: BUFFER OVERFLOW EXPLOITS. Please read the whole thread, it is informative. Best regards, Krzysztof To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020107222951.6fcaea7c.kzaraska>