Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 08 Nov 2001 18:06:44 +0900
From:      Hiroaki Etoh <etoh@trl.ibm.co.jp>
To:        kris@obsecurity.org
Cc:        luc@2113.ch, freebsd-security@freebsd.org, kzaraska@student.uci.agh.edu.pl
Subject:   Re: BUFFER OVERFLOW EXPLOITS
Message-ID:  <20011108180644Y.etoh@trl.ibm.com>
In-Reply-To: <20011029132504.A98067@xor.obsecurity.org>
References:  <Pine.BSF.4.21.0110281500030.6086-100000@lhotse.zaraska.dhs.org> <3BDD11C8.4746A7BD@2113.ch> <20011029132504.A98067@xor.obsecurity.org>

next in thread | previous in thread | raw e-mail | index | archive | help
At Mon, 29 Oct 2001 13:25:04 -0800,
 Kris Kennaway <kris@obsecurity.org> wrote:
> Because it can cause problems for certain things.  The main one I've
> found is XFree86, which will fail to run if you build it with
> -fstack-protector.  I think it's overriding CFLAGS in parts of the
> build, which means that certain things aren't being compiled with
> -fstack-protector and fail to link at runtime as a result.
> 
> I also found a spurious failure in another application which would
> cause it to hit the overflow trap even though nothing was apparently
> overflowing.

Could you send any bug report to me?
I'll fix the problem.

Hiroaki Etoh

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20011108180644Y.etoh>