[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Unable to compile Xen-2.0
> SSP is Stack Smashing Protection - formerly ProPolice (see > http://www.trl.ibm.com/projects/security/ssp/ for more info) and PIE is > Position Independent Executable i.e. PIC for binaries. SSP modifies the > C compiler to insert initialization code into functions that create a > buffer in memory. At run time, when a buffer is created, SSP adds a > secret random value, the canary, to the end of the buffer. When the > function returns, SSP makes sure that the canary is still intact. If an > attacker were to perform a buffer overflow, he would overwrite this > value and trigger that stack smashing handler. Currently this kills the > target process. (Descriptions borrowed from Gentoo Hardened Project > http://www.gentoo.org/proj/en/hardened/) They provide an extra layer of > security from attack on a server open to the world. Does stock Linux work when compiled with SSP enabled? Sounds pretty scary to me... Ian ------------------------------------------------------- This SF.Net email is sponsored by: Sybase ASE Linux Express Edition - download now for FREE LinuxWorld Reader's Choice Award Winner for best database on Linux. http://ads.osdn.com/?ad_id=5588&alloc_id=12065&op=click _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxxx https://lists.sourceforge.net/lists/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |