Details
-
Task
-
Status: Closed (View Workflow)
-
Major
-
Resolution: Fixed
-
None
-
None
Description
gcc/ld have different options that can make resulting binaries more secure against buffer/stack overflow exploits. RedHat uses most of them for distribution binaries. We need to analyze these options, understand the benefits and drawbacks, and possibly use them too in our builds.
The (incomplete) list is
-pie
|
-Wp,-D_FORTIFY_SOURCE=2
|
-fstack-protector --param=ssp-buffer-size=4
|
-Wl,-z,relro,-z,now
|
Attachments
Issue Links
- relates to
-
MDEV-6479 stack traces in 10.1
-
- Closed
-
- links to
Activity
Transition | Time In Source Status | Execution Times |
---|
|
66d 21h 46m | 1 |
|
42d 9h 7m | 2 |
|
10d 21h 48m | 3 |
|
18h 48m | 1 |