pkgsrc-Changes archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
CVS commit: pkgsrc/mk/defaults
Module Name: pkgsrc
Committed By: nia
Date: Mon Sep 27 14:31:55 UTC 2021
Modified Files:
pkgsrc/mk/defaults: mk.conf
Log Message:
mk: Bump default hardening options.
To generate a diff of this commit:
cvs rdiff -u -r1.318 -r1.319 pkgsrc/mk/defaults/mk.conf
Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.
Modified files:
Index: pkgsrc/mk/defaults/mk.conf
diff -u pkgsrc/mk/defaults/mk.conf:1.318 pkgsrc/mk/defaults/mk.conf:1.319
--- pkgsrc/mk/defaults/mk.conf:1.318 Sun May 30 23:41:05 2021
+++ pkgsrc/mk/defaults/mk.conf Mon Sep 27 14:31:55 2021
@@ -1,4 +1,4 @@
-# $NetBSD: mk.conf,v 1.318 2021/05/30 23:41:05 khorben Exp $
+# $NetBSD: mk.conf,v 1.319 2021/09/27 14:31:55 nia Exp $
#
# This file provides default values for variables that may be overridden
@@ -234,7 +234,7 @@ PKGSRC_RUN_TEST?= no
# Possible: yes, no
# Default: no
-PKGSRC_MKPIE?= no
+PKGSRC_MKPIE?= yes
# If no, create regular executables. Otherwise create PIE (Position Independent
# Executables, on supported platforms). This option is necessary to fully
# leverage ASLR as a mitigation for security vulnerabilities.
@@ -271,7 +271,7 @@ PKGSRC_USE_FORTIFY?= strong
#
# Keywords: fortify FORTIFY_SOURCE
-PKGSRC_USE_RELRO?= no
+PKGSRC_USE_RELRO?= full
# Link with RELRO by default (on supported platforms). This makes the
# exploitation of some security vulnerabilities more difficult in some cases.
# Possible values:
@@ -281,7 +281,7 @@ PKGSRC_USE_RELRO?= no
#
# Keywords: relro
-PKGSRC_USE_SSP?= yes
+PKGSRC_USE_SSP?= strong
# Configure this to enable stack smashing protection (on supported platforms).
# Possible values:
# no: Do not pass any stack protection flags
Home |
Main Index |
Thread Index |
Old Index