/srv/irclogs.ubuntu.com/2022/08/03/#ubuntu-security.txt

ahasenackhi #security, I'm doing an SRU for nfs-utils, and was wondering if I should include this fix in it: https://bugs.launchpad.net/ubuntu/+source/nfs-utils/+bug/198009514:39
ubottuLaunchpad bug 1980095 in nfs-utils (Ubuntu) "libnfsidmap built without hardening flags" [Undecided, Fix Released]14:39
ahasenackI *think* you would say yes, and the only reason I can think of to not include it is some fear of regression that would be difficult to catch in testing without a wider audience using the package14:39
ahasenackbut in a sense, it regressed in jammy, by being built without the hardening flags14:40
mdeslaurhrm, that's a good question14:44
mdeslaursbeattie: ^14:44
ahasenackI do have other srus planned for nfs-utils later on, we could include it in one of those, to give the current package in kinetic more "cooking time" (it has the hardening fix)14:49
ahasenackpoint is, I think, it on its own probably does not warrant an SRU14:49
mdeslaurI'm not sure what the impact is of turning those on for libraries, which is why I asked sbeattie 15:00
sbeattieahasenack: yes, please include a fix for that, if you can. I verified that not just the hardening config was there in the libnfsidmap rules but that the actual shared objects had them applied.16:40
sbeattieand thanks!16:40
ahasenackok, will do16:42
ahasenacksbeattie: do you happen do have a quick way to check at runtime, analyzing the binary file, if hardening flags were applied?17:15
ahasenacksome objdump-foo17:15
ahasenackmaybe what lintian does, but that is perl code, not my cup of tea ;)17:16
ahasenackmaybe https://git.launchpad.net/qa-regression-testing/tree/scripts/test-built-binaries.py ?17:22
ahasenackthat's a large script17:23
sarnoldahasenack: devscripts: /usr/bin/hardening-check17:36
sarnoldoh hah that big pile of python calls that :)17:36
ahasenackTIL hardening-check17:36
sarnoldI'd forgotten we had stackclash stuff in there17:37
ahasenackI look at those qa scripts, and at the top see ubuntu release names like hardy, or lucid :)17:37
sarnoldreliable releases, releases that you know are running something *important* somewhere..17:42
sbeattieahasenack: yeah, I have a low level todo to remove some of the logic around releases that have been out of support for 7+ years now...17:53
ahasenackso I ran hardening-check on the libs from libnfsidmap1, and looks like FORTIFY_SOURCE was enabled already, even without any hardening flags in d/rules17:53
ahasenackbut "immediate binding" is definitely flipped to on in the new builds17:53
ahasenackand compared to focal, we got some new ones17:55
ahasenack"control flow integrity: yes"17:55
ahasenackah, the "no fortify source" lintian warning I got when I filed the bug was from another source package, src:libnfsidmap-regex17:57

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!