hardening-wrapper 1.35 source package in Ubuntu
Changelog
hardening-wrapper (1.35) unstable; urgency=low * debian/control: switch to "optional" priority so lintian can depend on hardening-includes. * hardening-check: rewrite in Perl, add "--lintian" mode, to support fixing bug 650536. -- Ubuntu Archive Auto-Sync <email address hidden> Mon, 12 Dec 2011 11:58:11 +0000
Upload details
- Uploaded by:
- Ubuntu Archive Auto-Sync
- Uploaded to:
- Precise
- Original maintainer:
- Package Hardening
- Architectures:
- any all
- Section:
- devel
- Urgency:
- Low Urgency
See full publishing history Publishing
Series | Published | Component | Section |
---|
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
hardening-wrapper_1.35.tar.gz | 18.6 KiB | 52c3a9b8963981acbdfb2bf9db970b149e213fb93a5eaf6d9e38b2d6090c74f8 |
hardening-wrapper_1.35.dsc | 1.8 KiB | cd2a2e70d9114351eb7b708d33f57edd68e3ae89258df9cafb7d20d0f65c2f99 |
Available diffs
- diff from 1.34 to 1.35 (6.9 KiB)
Binary packages built by this source
- hardening-includes: Makefile for enabling compiler flags for security hardening
Makefile to be included in Debian rules files. CFLAGS and LDFLAGS
can be extended to include the respective HARDENING_* variables which
contain architecture-validated security hardening compiler options.
.
Also includes the "hardening-check" script to help evaluate the hardening
status of already compiled binaries.
- hardening-wrapper: Compiler wrapper to enable security hardening flags
Replaces gcc, g++, and ld with wrapper scripts that set security hardening
compilation flags, as an alternative to changing gcc specs. Enabled when
DEB_BUILD_HARDENING= 1 is set.