pkgsrc-Changes-HG archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

[pkgsrc/trunk]: pkgsrc/mk/defaults mk: Bump default hardening options.



details:   https://anonhg.NetBSD.org/pkgsrc/rev/2f560f5bce8d
branches:  trunk
changeset: 458955:2f560f5bce8d
user:      nia <nia%pkgsrc.org@localhost>
date:      Mon Sep 27 14:31:55 2021 +0000

description:
mk: Bump default hardening options.

diffstat:

 mk/defaults/mk.conf |  8 ++++----
 1 files changed, 4 insertions(+), 4 deletions(-)

diffs (36 lines):

diff -r 33f30421924a -r 2f560f5bce8d mk/defaults/mk.conf
--- a/mk/defaults/mk.conf       Mon Sep 27 14:30:47 2021 +0000
+++ b/mk/defaults/mk.conf       Mon Sep 27 14:31:55 2021 +0000
@@ -1,4 +1,4 @@
-# $NetBSD: mk.conf,v 1.318 2021/05/30 23:41:05 khorben Exp $
+# $NetBSD: mk.conf,v 1.319 2021/09/27 14:31:55 nia Exp $
 #
 
 # This file provides default values for variables that may be overridden
@@ -234,7 +234,7 @@
 # Possible: yes, no
 # Default: no
 
-PKGSRC_MKPIE?= no
+PKGSRC_MKPIE?= yes
 # If no, create regular executables. Otherwise create PIE (Position Independent
 # Executables, on supported platforms). This option is necessary to fully
 # leverage ASLR as a mitigation for security vulnerabilities.
@@ -271,7 +271,7 @@
 #
 # Keywords: fortify FORTIFY_SOURCE
 
-PKGSRC_USE_RELRO?= no
+PKGSRC_USE_RELRO?= full
 # Link with RELRO by default (on supported platforms). This makes the
 # exploitation of some security vulnerabilities more difficult in some cases.
 # Possible values:
@@ -281,7 +281,7 @@
 #
 # Keywords: relro
 
-PKGSRC_USE_SSP?= yes
+PKGSRC_USE_SSP?= strong
 # Configure this to enable stack smashing protection (on supported platforms).
 # Possible values:
 #      no:     Do not pass any stack protection flags



Home | Main Index | Thread Index | Old Index