F22 System Wide Change: Harden all packages with position-independent code
Jaroslav Reznik
jreznik at redhat.com
Wed Jan 7 11:41:32 UTC 2015
= Proposed System Wide Change: Harden all packages with position-independent
code =
https://fedoraproject.org/wiki/Changes/Harden_all_packages_with_position-independent_code
Change owner(s): Till Maas <opensource at till.name>, Moez Roy
<moez.roy at gmail.com>
Harden all packages with position-independent code to limit the damage from
certain security vulnerabilities.
== Detailed Description ==
Currently, the Packaging Guidelines allow maintainers to decide whether their
packages use position-independent code (PIC). There are rules that say that a
lot of packages should use PIC, but in reality a lot of packages do not use
PIC even if they must. Also since a lot of packages if not all potentially
process untrusted input, it makes sense for these packages to use PIC to
enhance the security of Fedora. Therefore I propose to build all packages with
PIC by changing RPM to use the appropriate flags by default.
References:
* https://fedorahosted.org/rel-eng/ticket/6049
* There should be several mails about this on the devel list
== Scope ==
* Proposal owners:
Help writing the new packaging guidelines.
* Other developers:
Change the rpm macros to build packages by default with PIC/PIE flags (i.e. set
_hardened_package to 1 by default).
* Release engineering:
Do a mass rebuild for all arch packages
* Policies and guidelines:
Adjust the Packaging Guidelines to allow non-PIC packages only if the package
is not working otherwise and require a tracker bug similar to packages not
working on certain archs. Update the Guidelines to reflect the new defaults.
_______________________________________________
devel-announce mailing list
devel-announce at lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/devel-announce
More information about the devel
mailing list