1
0

initial import from Debian

version: 14.3.0-5
commit: bee30ab0fff2fd6af94c62376c8aa4221bb831e0
This commit is contained in:
2025-08-11 15:00:09 +03:00
commit c2c1923c7b
274 changed files with 101988 additions and 0 deletions

28
debian/README.ssp vendored Normal file
View File

@@ -0,0 +1,28 @@
Stack smashing protection is a feature of GCC that enables a program to
detect buffer overflows and immediately terminate execution, rather than
continuing execution with corrupt internal data structures. It uses
"canaries" and local variable reordering to reduce the likelihood of
stack corruption through buffer overflows.
Options that affect stack smashing protection:
-fstack-protector
Enables protection for functions that are vulnerable to stack
smashing, such as those that call alloca() or use pointers.
-fstack-protector-all
Enables protection for all functions.
-Wstack-protector
Warns about functions that will not be protected. Only active when
-fstack-protector has been used.
Applications built with stack smashing protection should link with the
ssp library by using the option "-lssp" for systems with glibc-2.3.x or
older; glibc-2.4 and newer versions provide this functionality in libc.
The Debian architectures alpha, hppa, ia64, m68k, mips, mipsel do not
have support for stack smashing protection.
More documentation can be found at the project's website:
http://researchweb.watson.ibm.com/trl/projects/security/ssp/