cvs commit: src/contrib/gcc protector.c protector.h Makefile.in calls.c combine.c cse.c explow.c expr.c flags.h function.c gcse.c integrate.c libgcc2.c loop.c optabs.c reload1.c toplev.c src/gnu/usr.bin/cc/cc_int Makefile
Jeroen Ruigrok/asmodai
asmodai at wxs.nl
Wed Dec 10 23:30:21 PST 2003
-On [20031210 23:42], Matthew Dillon (dillon at xxxxxxxxxxxxxxxxxxxxxxx) wrote:
> Add -fstack-protector and -fno-stack-protector support to GCC. Note
> that the default is set to no protection (what it was before). See:
>
> http://www.trl.ibm.com/projects/security/ssp/
>
> Submitted-by: Ryan Dooley <dooleyr at xxxxxxxxxxxx>
Just wondering, wouldn't this allow someone to get hold of something
like SEIP, put shellcode on the heap and run that?
This is why they went the W^X way for all I know.
--
Jeroen Ruigrok van der Werven <asmodai(at)wxs.nl> / asmodai / kita no mono
PGP fingerprint: 2D92 980E 45FE 2C28 9DB7 9D88 97E6 839B 2EAC 625B
http://www.tendra.org/ | http://diary.in-nomine.org/
Be wiser than other people if you can; but do not tell them so...
More information about the Commits
mailing list