Package: gnupg
Version: 1.4.9-4
Severity: normal
Tags: patch, security
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu karmic ubuntu-patch

Hello!

gnupg is built with an executable stack, which is not needed and can lead
to security problems if a flaw is found that allows an attacker to fill
stack memory with executable code on ia32.

Attached patch adds the configure option to enable this protection.  This
is also being tracked in Ubuntu as:
https://bugs.edge.launchpad.net/bugs/49323

Thanks,

-Kees

-- 
Kees Cook                                            @debian.org
diff -uNrp gnupg-1.4.9~/debian/rules gnupg-1.4.9/debian/rules
--- gnupg-1.4.9~/debian/rules	2009-05-08 08:28:10.000000000 -0700
+++ gnupg-1.4.9/debian/rules	2009-05-08 08:34:42.000000000 -0700
@@ -19,7 +19,7 @@ DEB_BUILD_GNU_TYPE = $(shell dpkg-archit
 DEB_HOST_GNU_TYPE  = $(shell dpkg-architecture -qDEB_HOST_GNU_TYPE)
 DEB_BUILD_ARCH    := $(shell dpkg-architecture -qDEB_BUILD_ARCH)
 
-CONFARGS  = --prefix=/usr --libexecdir=/usr/lib/ --enable-mailto --with-mailprog=/usr/sbin/sendmail
+CONFARGS  = --prefix=/usr --libexecdir=/usr/lib/ --enable-mailto --with-mailprog=/usr/sbin/sendmail --enable-noexecstack
 
 ifneq ($(DEB_BUILD_GNU_TYPE),$(DEB_HOST_GNU_TYPE))
 CONFARGS += --host=$(DEB_HOST_GNU_TYPE)

Reply via email to