1 Summary: Tool to check system for binary-hardening
6 Group: Development/Tools
7 Source0: https://raw.githubusercontent.com/slimm609/checksec.sh/master/%{name}
8 # Source0-md5: 075996be339ab16ad7b94d6de3ee07bd
9 Source1: https://raw.githubusercontent.com/slimm609/checksec.sh/master/ChangeLog
10 # Source1-md5: 03a45df6ac588603c6191dc0a4883531
11 URL: https://github.com/slimm609/checksec.sh
14 BuildRoot: %{tmpdir}/%{name}-%{version}-root-%(id -u -n)
17 Modern Linux distributions offer some mitigation techniques to make it
18 harder to exploit software vulnerabilities reliably. Mitigations such
19 as RELRO, NoExecute (NX), Stack Canaries, Address Space Layout
20 Randomization (ASLR) and Position Independent Executables (PIE) have
21 made reliably exploiting any vulnerabilities that do exist far more
24 The checksec script is designed to test what *standard* Linux OS and
25 PaX <http://pax.grsecurity.net/> security features are being used.
27 As of version 1.3 the script also lists the status of various Linux
28 kernel protection mechanisms.
30 checksec can check binary-files and running processes for hardening
34 cp -p %{SOURCE1} ChangeLog
37 rm -rf $RPM_BUILD_ROOT
38 install -d $RPM_BUILD_ROOT%{_bindir}
39 install -p %{SOURCE0} $RPM_BUILD_ROOT%{_bindir}/%{name}
42 rm -rf $RPM_BUILD_ROOT
45 %defattr(644,root,root,755)
47 %attr(755,root,root) %{_bindir}/%{name}