[Pkg-kde-extras] Bug#667925: bluedevil: CPPFLAGS hardening flags missing
Simon Ruderich
simon at ruderich.org
Sat Apr 7 15:02:13 UTC 2012
Package: bluedevil
Version: 1.2.2-1
Severity: important
Tags: patch
Dear Maintainer,
The CPPFLAGS hardening flags are missing because CMake ignores
them by default.
The following patch fixes the issue by adding them to
CFLAGS/CXXFLAGS. For more hardening information please have a
look at [1], [2] and [3].
diff -Nru bluedevil-1.2.2/debian/rules bluedevil-1.2.2/debian/rules
--- bluedevil-1.2.2/debian/rules 2012-03-30 20:36:51.000000000 +0200
+++ bluedevil-1.2.2/debian/rules 2012-04-07 16:49:43.000000000 +0200
@@ -2,5 +2,10 @@
export DEB_LDFLAGS_MAINT_APPEND := -Wl,--as-needed
+# CMake doesn't use CPPFLAGS, pass them to CFLAGS/CXXFLAGS to enable the
+# missing (hardening) flags.
+export DEB_CFLAGS_MAINT_APPEND := $(shell dpkg-buildflags --get CPPFLAGS)
+export DEB_CXXFLAGS_MAINT_APPEND := $(shell dpkg-buildflags --get CPPFLAGS)
+
%:
dh $@ --parallel --with kde
To check if all flags were correctly enabled you can use
`hardening-check` from the hardening-includes package and check
the build log (hardening-check doesn't catch everything):
$ hardening-check /usr/lib/kde4/bluetoothfiletiemaction.so /usr/lib/kde4/kio_obexftp.so /usr/lib/kde4/kio_bluetooth.so ...
/usr/lib/kde4/bluetoothfiletiemaction.so:
Position Independent Executable: no, regular shared library (ignored)
Stack protected: no, not found!
Fortify Source functions: no, only unprotected functions found!
Read-only relocations: yes
Immediate binding: no not found!
/usr/lib/kde4/kio_obexftp.so:
Position Independent Executable: no, regular shared library (ignored)
Stack protected: no, not found!
Fortify Source functions: yes
Read-only relocations: yes
Immediate binding: no not found!
/usr/lib/kde4/kio_bluetooth.so:
Position Independent Executable: no, regular shared library (ignored)
Stack protected: no, not found!
Fortify Source functions: yes
Read-only relocations: yes
Immediate binding: no not found!
...
(Position Independent Executable and Immediate binding is not
enabled by default.)
Use find -type f \( -executable -o -name \*.so\* \) -exec
hardening-check {} + on the build result to check all files.
Regards,
Simon
[1]: https://wiki.debian.org/ReleaseGoals/SecurityHardeningBuildFlags
[2]: https://wiki.debian.org/HardeningWalkthrough
[3]: https://wiki.debian.org/Hardening
--
+ privacy is necessary
+ using gnupg http://gnupg.org
+ public key id: 0x92FEFDB7E44C32F9
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: Digital signature
URL: <http://lists.alioth.debian.org/pipermail/pkg-kde-extras/attachments/20120407/8145c167/attachment.pgp>
More information about the pkg-kde-extras
mailing list