One issue that should be considered when deciding if fink 10.7 will support
some form of an upgrade installation option is the reduction in security from
that approach. By requiring a clean bootstrap of fink on Lion, we insure that
almost all packages are built with the default linker behavior of -pie. This
creation of position independent executables will provide fink users with
the added security of the full Address Space Layout Randomization in Lion.

http://en.wikipedia.org/wiki/Address_space_layout_randomization

The functionality of ASLR in Lion can be seen from the unique failure of
the gcc.dg/darwin-segaddr.c execution test in FSF gcc. That test case is
supposed to verify that a segment can be placed at the same address
each time. However if you add a printf to the testcase to output the
observed segaddr, you will find that when linked with the default -pie,
each execution of the resulting executable places the segment at a
different random address.
   The utility of such protection is on exhibit from Microsoft's recent
issues with rootkits that attack via the MBR...

http://www.f-secure.com/weblog/archives/00001393.html

using a system call at a known location. The breakage occured when MS fixed
a 17 year old bug that moved the system call leveraged by the rootkit.
Had MS used full ASLR this attack would have never been possible in the
first place since the system call would have moved randomly in memory.
                 Jack

------------------------------------------------------------------------------
Got Input?   Slashdot Needs You.
Take our quick survey online.  Come on, we don't ask for help often.
Plus, you'll get a chance to win $100 to spend on ThinkGeek.
http://p.sf.net/sfu/slashdot-survey
_______________________________________________
Fink-devel mailing list
Fink-devel@lists.sourceforge.net
List archive:
http://news.gmane.org/gmane.os.apple.fink.devel
Subscription management:
https://lists.sourceforge.net/lists/listinfo/fink-devel

Reply via email to