Package: spek
Version: 0.8.0-1
Severity: normal
Tags: patch

Dear Maintainer,

All hardening flags were lost in the 0.8.0-1 update because the
package was switched to dh without raising the compat level to 9.
CDBS automatically enabled them, but with dh compat=9 is required
for hardening flags. For more hardening information please have a
look at [1], [2] and [3].

The following patch fixes the issue, it also enables verbose
builds to allow tools to detect missing hardening flags
automatically:

diff -Nru spek-0.8.0/debian/compat spek-0.8.0/debian/compat
--- spek-0.8.0/debian/compat    2011-03-15 12:53:20.000000000 +0100
+++ spek-0.8.0/debian/compat    2012-09-29 13:40:57.000000000 +0200
@@ -1 +1 @@
-7
+9
diff -Nru spek-0.8.0/debian/rules spek-0.8.0/debian/rules
--- spek-0.8.0/debian/rules     2012-09-25 19:00:52.000000000 +0200
+++ spek-0.8.0/debian/rules     2012-09-29 13:37:12.000000000 +0200
@@ -1,4 +1,6 @@
 #!/usr/bin/make -f
 
+export V=1
+
 %:
        dh  $@

To check if all flags were correctly enabled you can use
`hardening-check` from the hardening-includes package and check
the build log with `blhc` (hardening-check doesn't catch
everything):

    $ hardening-check /usr/bin/spek
    /usr/bin/spek:
     Position Independent Executable: no, normal executable!
     Stack protected: no, not found!
     Fortify Source functions: no, only unprotected functions found!
     Read-only relocations: yes
     Immediate binding: no not found!

(Position Independent Executable and Immediate binding is not
enabled by default.)

Use find -type f \( -executable -o -name \*.so\* \) -exec
hardening-check {} + on the build result to check all files.

Regards,
Simon

[1]: https://wiki.debian.org/ReleaseGoals/SecurityHardeningBuildFlags
[2]: https://wiki.debian.org/HardeningWalkthrough
[3]: https://wiki.debian.org/Hardening
-- 
+ privacy is necessary
+ using gnupg http://gnupg.org
+ public key id: 0x92FEFDB7E44C32F9

Attachment: signature.asc
Description: Digital signature

Reply via email to