Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 178676 - gcc-4.2.0 has been released. requesting new ebuild for portage
Summary: gcc-4.2.0 has been released. requesting new ebuild for portage
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: [OLD] Core system (show other bugs)
Hardware: All Linux
: High enhancement (vote)
Assignee: Gentoo Toolchain Maintainers
URL: http://gcc.gnu.org/gcc-4.2/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2007-05-15 19:28 UTC by Sebastian Mikulec
Modified: 2007-05-19 05:11 UTC (History)
22 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sebastian Mikulec 2007-05-15 19:28:02 UTC
gcc-4.2.0 was (finally) released 5/13/07.  I've renamed a 4.2.0 snapshot ebuild and am giving this a try.

Reproducible: Always
Comment 1 Bugs Bunny 2007-05-18 13:10:23 UTC
this is more then an enhancement as it currently blocks full functionality options avaliable in the kernel.
Comment 2 Peter Read 2007-05-18 20:01:50 UTC
Care to elaborate Bugs?  I haven't seen any mention on the gcc mailing list....
Comment 3 Bugs Bunny 2007-05-19 03:08:10 UTC
(In reply to comment #2)
> Care to elaborate Bugs?  I haven't seen any mention on the gcc mailing list....
> 

┌─── Enable -fstack-protector buffer overflow detection (EXPERIMENTAL) ───┐
  │ CONFIG_CC_STACKPROTECTOR:                                               │  
  │                                                                         │  
  │ This option turns on the -fstack-protector GCC feature. This            │  
  │  feature puts, at the beginning of critical functions, a canary         │  
  │  value on the stack just before the return address, and validates       │  
  │  the value just before actually returning.  Stack based buffer          │  
  │  overflows (that need to overwrite this return address) now also        │  
  │  overwrite the canary, which gets detected and the attack is then       │  
  │  neutralized via a kernel panic.                                        │  
  │                                                                         │  
  │  This feature requires gcc version 4.2 or above, or a distribution      │  
  │  gcc with the feature backported. Older versions are automatically      │  
  │  detected and for those versions, this configuration option is ignored.

As 2.6.20 is stable for most archs, we are missing support for such a great feature in the kernel.
Comment 4 SpanKY gentoo-dev 2007-05-19 03:21:27 UTC
incorrect, our gcc has had SSP support for quite a long time
Comment 5 Kevin Bowling 2007-05-19 03:27:19 UTC
Hi Vapier,

The bug should remain open since the original purpose was a 4.2.0 ebuild tracker, should it not?
Comment 6 SpanKY gentoo-dev 2007-05-19 04:10:47 UTC
your tree is out of date, there is a gcc-4.2.0 ebuild
Comment 7 Avuton Olrich 2007-05-19 04:18:31 UTC
Which tree would that be, don't see it in cvs: http://sources.gentoo.org/viewcvs.py/gentoo-x86/sys-devel/gcc/
Comment 8 SpanKY gentoo-dev 2007-05-19 05:11:30 UTC
then look again ... the webnodes arent updated instantaneously