Hi Sebastian,

On Thu, Feb 17, 2011 at 09:09:21AM +0100, Sebastian Dröge wrote:
> On Wed, 2011-02-16 at 17:15 -0800, Kees Cook wrote:
> > Since totem deals with media files, it should be hardened against potential
> > malicious attacks. This patch enables the hardening features in the 
> > toolchain.
> 
> Not sure how useful this is when applied to totem only. Totem uses other
> libraries to handle with media files and playlists.

Right, so to avoid the totem binaries having their .text regions being
usable as a ROP target, it's best to fully PIE the build so that every
aspect of the binary has been ASLRed.

(Talk about acronym soup, sorry about that; links below if anyone needs
pointers.)

Each library can certainly gain hardening options as well. This bug is
specifically about totem binaries themselves.

-Kees

http://en.wikipedia.org/wiki/Return-oriented_programming
http://en.wikipedia.org/wiki/Position-independent_code#Position-independent_executables
http://en.wikipedia.org/wiki/ASLR

-- 
Kees Cook                                            @debian.org



--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to