1 Summary: Tool to check system for binary-hardening
6 Group: Development/Tools
7 Source0: https://github.com/slimm609/checksec.sh/archive/%{version}/%{name}-%{version}.tar.gz
8 # Source0-md5: 8e963bc27f58d14c9b3657600a5c298e
9 URL: https://github.com/slimm609/checksec.sh
12 BuildRoot: %{tmpdir}/%{name}-%{version}-root-%(id -u -n)
15 Modern Linux distributions offer some mitigation techniques to make it
16 harder to exploit software vulnerabilities reliably. Mitigations such
17 as RELRO, NoExecute (NX), Stack Canaries, Address Space Layout
18 Randomization (ASLR) and Position Independent Executables (PIE) have
19 made reliably exploiting any vulnerabilities that do exist far more
22 The checksec script is designed to test what *standard* Linux OS and
23 PaX <http://pax.grsecurity.net/> security features are being used.
25 As of version 1.3 the script also lists the status of various Linux
26 kernel protection mechanisms.
28 checksec can check binary-files and running processes for hardening
32 %setup -qn %{name}.sh-%{version}
35 rm -rf $RPM_BUILD_ROOT
36 install -d $RPM_BUILD_ROOT{%{_bindir},%{_mandir}/man7}
37 install -p %{SOURCE0} $RPM_BUILD_ROOT%{_bindir}/%{name}
38 install -p extras/man/checksec.7* $RPM_BUILD_ROOT%{_mandir}/man7
41 rm -rf $RPM_BUILD_ROOT
44 %defattr(644,root,root,755)
45 %doc README.md LICENSE.txt ChangeLog
46 %attr(755,root,root) %{_bindir}/%{name}
47 %{_mandir}/man7/checksec.7*