Package: dpkg
Version: 1.15.8

While refactoring code, it happened twice that we introduced
buffer overflows that went unnoticed... we should really avoid this
by building dpkg with hardening options like -fstack-protector.

http://wiki.debian.org/Hardening and the sources of hardening-wrapper
suggest that this option should not be used on
ia64 alpha mips mipsel hppa arm.

On arm it's blacklisted because it generates incorrect code apparently
(it's ok on armel) but on the other it could be catched by a configure
test since gcc outputs: "warning: -fstack-protector not supported for this 
target"

Maybe we should use -D_FORTIFY_SOURCE=2 too.

(This is just a reminder for us, we discussed it on IRC and it should go
in 1.15.9)

Cheers,
-- 
Raphaël Hertzog ◈ Debian Developer ◈ [Flattr=20693]

Follow my Debian News ▶ http://RaphaelHertzog.com (English)
                      ▶ http://RaphaelHertzog.fr (Français)



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to