Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 7 Jan 2002 22:29:51 +0100
From:      Krzysztof Zaraska <kzaraska@student.uci.agh.edu.pl>
To:        hawkeyd@visi.com
Cc:        freebsd-security@freebsd.org
Subject:   Re: GCC stack-smashing extension
Message-ID:  <20020107222951.6fcaea7c.kzaraska@student.uci.agh.edu.pl>
In-Reply-To: <200201071902.g07J2ix05040@sheol.localdomain>
References:  <20020107091948.A4096_sheol.localdomain@ns.sol.net> <20020108030952.A91323_raven.robbins.dropbear.id.au@ns.sol.net> <200201071902.g07J2ix05040@sheol.localdomain>

next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, 7 Jan 2002 13:02:44 -0600 (CST) D J Hawkey Jr wrote:

> > It's claimed that people have used versions of FreeBSD compiled with
> > the ssp patch, and the ideas and descriptions sure look nice.
> > It didn't work for me, though.
> 
> If Kris K. is one of 'em, and his boxen are running fine with sources
> built with the patch, that's pretty compelling evidence that it does
> no harm, to say the least.
See his mail on this list, 01/10/29, Re: BUFFER OVERFLOW EXPLOITS. 
Please read the whole thread, it is informative.

Best regards,
Krzysztof

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020107222951.6fcaea7c.kzaraska>