Re: [PATCH 1/2] Build all binaries with PIE

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 04/03/2013 05:41 AM, Daniel P. Berrange wrote:
> From: "Daniel P. Berrange" <berrange@xxxxxxxxxx>
> 
> PIE (position independent executable) adds security to executables
> by composing them entirely of position-independent code (PIC. The
> .so libraries already build with -fPIC. This adds -fPIE which is
> the equivalent to -fPIC, but for executables. This for allows Exec
> Shield to use address space layout randomization to prevent attackers
> from knowing where existing executable code is during a security
> attack using exploits that rely on knowing the offset of the
> executable code in the binary, such as return-to-libc attacks.
> 
> Signed-off-by: Daniel P. Berrange <berrange@xxxxxxxxxx>
> ---

> +++ b/m4/virt-compile-pie.m4
> @@ -0,0 +1,13 @@
> +dnl
> +dnl Check for support for position independent executables

This new file is currently small enough to get away with no copyright
notice, but adding one now would be easier than scratching our heads
during a later audit on whether it is needed.

ACK, whether or not you add a copyright blurb to the new .m4 file.

-- 
Eric Blake   eblake redhat com    +1-919-301-3266
Libvirt virtualization library http://libvirt.org

Attachment: signature.asc
Description: OpenPGP digital signature

--
libvir-list mailing list
libvir-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/libvir-list

[Index of Archives]     [Virt Tools]     [Libvirt Users]     [Lib OS Info]     [Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Big List of Linux Books]     [Yosemite News]     [KDE Users]     [Fedora Tools]