Closed
Bug 725941
Opened 13 years ago
Closed 6 years ago
Allow to enable a set of hardening flags
Categories
(NSPR :: NSPR, defect)
Tracking
(Not tracked)
RESOLVED
INVALID
People
(Reporter: glandium, Unassigned)
References
(Blocks 1 open bug)
Details
Attachments
(1 obsolete file)
Reporter | ||
Comment 1•13 years ago
|
||
Attachment #595989 -
Flags: review?(wtc)
Is there any progress on this?
Many distributions have hardening flags enabled by default for all packages or just for firefox, e.g. https://git.archlinux.org/svntogit/packages.git/tree/trunk/PKGBUILD?h=packages/firefox&id=16277db3aa6776d34ce691bd2cc87b76dbfc6336#n94
This is the arch firefox:
$ hardening-check /usr/bin/firefox
/usr/bin/firefox:
Position Independent Executable: yes
Stack protected: yes
Fortify Source functions: yes (some protected functions found)
Read-only relocations: yes
Immediate binding: yes
This is firefox-nightly from Mozilla:
$ hardening-check /usr/bin/firefox-nightly
/usr/bin/firefox-nightly:
Position Independent Executable: no, normal executable!
Stack protected: no, not found!
Fortify Source functions: no, only unprotected functions found!
Read-only relocations: no, not found!
Immediate binding: no, not found!
Updated•7 years ago
|
Assignee: wtc → nobody
Updated•7 years ago
|
Attachment #595989 -
Attachment is obsolete: true
Attachment #595989 -
Flags: review?(wtc)
Updated•6 years ago
|
Status: NEW → RESOLVED
Closed: 6 years ago
Resolution: --- → INVALID
You need to log in
before you can comment on or make changes to this bug.
Description
•