[gentoo-commits] proj/gentoo-news:master commit in: 2014/2014-06-15-gcc48_ssp/

2014-09-02 Thread Ryan Hill
commit: f44319297631e06f1b23cb3f065207b0ba1d4572
Author: Ryan Hill rhill AT gentoo DOT org
AuthorDate: Wed Sep  3 00:25:38 2014 +
Commit: Ryan Hill rhill AT gentoo DOT org
CommitDate: Wed Sep  3 00:25:38 2014 +
URL:
http://sources.gentoo.org/gitweb/?p=proj/gentoo-news.git;a=commit;h=f4431929

Add FreeBSD keywords as requested in bug #511698.

---
 2014/2014-06-15-gcc48_ssp/2014-06-15-gcc48_ssp.en.txt |  4 +++-
 2014/2014-06-15-gcc48_ssp/2014-06-15-gcc48_ssp.en.txt.asc | 14 +++---
 2 files changed, 10 insertions(+), 8 deletions(-)

diff --git a/2014/2014-06-15-gcc48_ssp/2014-06-15-gcc48_ssp.en.txt 
b/2014/2014-06-15-gcc48_ssp/2014-06-15-gcc48_ssp.en.txt
index a0d1deb..926f6ff 100644
--- a/2014/2014-06-15-gcc48_ssp/2014-06-15-gcc48_ssp.en.txt
+++ b/2014/2014-06-15-gcc48_ssp/2014-06-15-gcc48_ssp.en.txt
@@ -2,7 +2,7 @@ Title: GCC 4.8.3 defaults to -fstack-protector
 Author: Ryan Hill rh...@gentoo.org
 Content-Type: text/plain
 Posted: 2014-06-15
-Revision: 1
+Revision: 2
 News-Item-Format: 1.0
 Display-If-Installed: =sys-devel/gcc-4.8.3
 Display-If-Keyword: amd64
@@ -11,6 +11,8 @@ Display-If-Keyword: mips
 Display-If-Keyword: ppc
 Display-If-Keyword: ppc64
 Display-If-Keyword: x86
+Display-If-Keyword: amd64-fbsd
+Display-If-Keyword: x86-fbsd
 
 Beginning with GCC 4.8.3, Stack Smashing Protection (SSP) will be
 enabled by default.  The 4.8 series will enable -fstack-protector

diff --git a/2014/2014-06-15-gcc48_ssp/2014-06-15-gcc48_ssp.en.txt.asc 
b/2014/2014-06-15-gcc48_ssp/2014-06-15-gcc48_ssp.en.txt.asc
index ef32608..bed3050 100644
--- a/2014/2014-06-15-gcc48_ssp/2014-06-15-gcc48_ssp.en.txt.asc
+++ b/2014/2014-06-15-gcc48_ssp/2014-06-15-gcc48_ssp.en.txt.asc
@@ -1,11 +1,11 @@
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v2.0
 
-iQEcBAABCgAGBQJTnk9/AAoJEO04vUmVeoRj+AQIAKw0ZEJj6MFBw8lPSenkspGX
-XmlijZKVvV0i+LpCV6/XA+AUfV8j8DvzYiamtD1NmmZp7iT8gbsqGZxN5UiBBUtG
-4BDi7nmC/kJsR+7az/Ey6w2kUbijCfJu1fmx7wjoTWBcHQyLJEUakMG6mfc50BOg
-dUSuZl+K/FMfyB6Y4SuPPtCtFyWGru8Pol0HsQQ1rS76QHZN4cdHrwFQzEovQChw
-S2OPaqgHRs+HjIs55P7PceXARYsM7ppgjxOa//cCZA9HepOPmqk6wMYFs3yafkK7
-cssCq6aLVlsaiBVMXth60MN7GEtkI6aVBpnuU8Fe5Uzehr3W99zDc//dOBrrfMY=
-=JuHk
+iQEcBAABCgAGBQJUBl+UAAoJEO04vUmVeoRj6hkIAI0Tv7xCf50nQFaNjYn0eRFd
+kQcvU6P3Xg/uHREyZLH2L6TbVTvcBQZxZWq0sn73444sPisXVzdK6pYft4KoLm6j
+X2Gmo6Ca9LA7KIdZ/agyjE6HqEz1X49glr0b76OUe9JieTymFnUXW11fz8dzK8T9
+7954uLelZ31snP1hIFHO/1hpQpXXJRjM1SQi1gJYJjOCHsFuz+wy4zpllY9mt8xx
+lgExVHtslUOQxY22+TScbvPSWAu0u28ItXd8/XsQwmQJYCGZAl5Cqq7NcI1dZmM9
+ho8n/qGrT0VLITDyk4Rn4gynogA1VfnuqLk9QZqZzG5COi4FCZZ/9s7z5q20EiM=
+=7Pue
 -END PGP SIGNATURE-



[gentoo-commits] proj/gentoo-news:master commit in: 2014/2014-06-15-gcc48_ssp/

2014-06-15 Thread Ryan Hill
commit: 553b96bad5e649776b9a20397e6abcfea38f4133
Author: Ryan Hill rhill AT gentoo DOT org
AuthorDate: Mon Jun 16 01:59:59 2014 +
Commit: Ryan Hill dirtyepic AT gentoo DOT org
CommitDate: Mon Jun 16 01:59:59 2014 +
URL:
http://sources.gentoo.org/gitweb/?p=proj/gentoo-news.git;a=commit;h=553b96ba

News item for GCC 4.8.3.

---
 .../2014-06-15-gcc48_ssp.en.txt| 34 ++
 .../2014-06-15-gcc48_ssp.en.txt.asc| 11 +++
 2 files changed, 45 insertions(+)

diff --git a/2014/2014-06-15-gcc48_ssp/2014-06-15-gcc48_ssp.en.txt 
b/2014/2014-06-15-gcc48_ssp/2014-06-15-gcc48_ssp.en.txt
new file mode 100644
index 000..a0d1deb
--- /dev/null
+++ b/2014/2014-06-15-gcc48_ssp/2014-06-15-gcc48_ssp.en.txt
@@ -0,0 +1,34 @@
+Title: GCC 4.8.3 defaults to -fstack-protector
+Author: Ryan Hill rh...@gentoo.org
+Content-Type: text/plain
+Posted: 2014-06-15
+Revision: 1
+News-Item-Format: 1.0
+Display-If-Installed: =sys-devel/gcc-4.8.3
+Display-If-Keyword: amd64
+Display-If-Keyword: arm
+Display-If-Keyword: mips
+Display-If-Keyword: ppc
+Display-If-Keyword: ppc64
+Display-If-Keyword: x86
+
+Beginning with GCC 4.8.3, Stack Smashing Protection (SSP) will be
+enabled by default.  The 4.8 series will enable -fstack-protector
+while 4.9 and later enable -fstack-protector-strong.
+
+SSP is a security feature that attempts to mitigate stack-based buffer
+overflows by placing a canary value on the stack after the function
+return pointer and checking for that value before the function returns.
+If a buffer overflow occurs and the canary value is overwritten, the
+program aborts.
+
+There is a small performance cost to these features.  They can be
+disabled with -fno-stack-protector.
+
+For more information these options, refer to the GCC Manual, or the
+following articles.
+
+http://en.wikipedia.org/wiki/Buffer_overflow_protection
+http://en.wikipedia.org/wiki/Stack_buffer_overflow
+https://securityblog.redhat.com/tag/stack-protector
+http://www.outflux.net/blog/archives/2014/01/27/fstack-protector-strong

diff --git a/2014/2014-06-15-gcc48_ssp/2014-06-15-gcc48_ssp.en.txt.asc 
b/2014/2014-06-15-gcc48_ssp/2014-06-15-gcc48_ssp.en.txt.asc
new file mode 100644
index 000..ef32608
--- /dev/null
+++ b/2014/2014-06-15-gcc48_ssp/2014-06-15-gcc48_ssp.en.txt.asc
@@ -0,0 +1,11 @@
+-BEGIN PGP SIGNATURE-
+Version: GnuPG v2.0
+
+iQEcBAABCgAGBQJTnk9/AAoJEO04vUmVeoRj+AQIAKw0ZEJj6MFBw8lPSenkspGX
+XmlijZKVvV0i+LpCV6/XA+AUfV8j8DvzYiamtD1NmmZp7iT8gbsqGZxN5UiBBUtG
+4BDi7nmC/kJsR+7az/Ey6w2kUbijCfJu1fmx7wjoTWBcHQyLJEUakMG6mfc50BOg
+dUSuZl+K/FMfyB6Y4SuPPtCtFyWGru8Pol0HsQQ1rS76QHZN4cdHrwFQzEovQChw
+S2OPaqgHRs+HjIs55P7PceXARYsM7ppgjxOa//cCZA9HepOPmqk6wMYFs3yafkK7
+cssCq6aLVlsaiBVMXth60MN7GEtkI6aVBpnuU8Fe5Uzehr3W99zDc//dOBrrfMY=
+=JuHk
+-END PGP SIGNATURE-