]> git.pld-linux.org Git - packages/checksec.git/blame - checksec.spec
new, version 1.5
[packages/checksec.git] / checksec.spec
CommitLineData
a52bee30
ER
1Summary: Tool to check system for binary-hardening
2Name: checksec
3Version: 1.5
4Release: 1
5License: BSD
6Group: Development/Tools
7Source0: http://www.trapkit.de/tools/%{name}.sh
8# Source0-md5: 075996be339ab16ad7b94d6de3ee07bd
9Source1: http://www.trapkit.de/tools/%{name}_changes.txt
10# Source1-md5: 03a45df6ac588603c6191dc0a4883531
11URL: http://www.trapkit.de/tools/checksec.html
12Requires: binutils
13BuildArch: noarch
14BuildRoot: %{tmpdir}/%{name}-%{version}-root-%(id -u -n)
15
16%description
17Modern Linux distributions offer some mitigation techniques to make it
18harder to exploit software vulnerabilities reliably. Mitigations such
19as RELRO, NoExecute (NX), Stack Canaries, Address Space Layout
20Randomization (ASLR) and Position Independent Executables (PIE) have
21made reliably exploiting any vulnerabilities that do exist far more
22challenging.
23
24The checksec script is designed to test what *standard* Linux OS and
25PaX <http://pax.grsecurity.net/> security features are being used.
26
27As of version 1.3 the script also lists the status of various Linux
28kernel protection mechanisms.
29
30checksec can check binary-files and running processes for hardening
31features.
32
33%prep
34cp -p %{SOURCE1} ChangeLog
35
36%install
37rm -rf $RPM_BUILD_ROOT
38install -d $RPM_BUILD_ROOT%{_bindir}
39install -p %{SOURCE0} $RPM_BUILD_ROOT%{_bindir}/%{name}
40
41%clean
42rm -rf $RPM_BUILD_ROOT
43
44%files
45%defattr(644,root,root,755)
46%doc ChangeLog
47%attr(755,root,root) %{_bindir}/%{name}
This page took 0.071999 seconds and 4 git commands to generate.