Comment 2 for bug 1340488

Revision history for this message
Sergey "Shnatsel" Davidoff (shnatsel) wrote :

Thanks for your report!

I'm currently working on migrating all in-house packages to debhelper compatibility level 9 that enforces many of these security features. I have also fixed the hardening flags not being passed in some cases.

Unfortunately we do not directly control most of the packages in elementary OS, they come from Ubuntu repositories. So for most of these packages you'd have to contact people from Ubuntu; that may include either the Ubuntu Security team, or the maintainers for packages found vulnerable, or both.

It would help if you could provide more detailed information on which processes exactly are not protected. We could pick the processes that we directly control and fix them.

Also, please tell us which tools you're using to detect this, since false positives are common in such analyzers.