hardening-wrapper 1.36ubuntu1.1 source package in Ubuntu
Changelog
hardening-wrapper (1.36ubuntu1.1) precise-security; urgency=medium * hardened-cc: don't set -Wformat options if they are already set (LP: #1347257) -- Chris Coulson <email address hidden> Thu, 30 Apr 2015 18:49:28 +0100
Upload details
- Uploaded by:
- Chris Coulson
- Uploaded to:
- Precise
- Original maintainer:
- Ubuntu Developers
- Architectures:
- any all
- Section:
- devel
- Urgency:
- Medium Urgency
See full publishing history Publishing
Series | Published | Component | Section | |
---|---|---|---|---|
Precise | updates | main | devel | |
Precise | security | main | devel |
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
hardening-wrapper_1.36ubuntu1.1.tar.xz | 17.4 KiB | 8a1c1e4f2df9ac91ea34d99d26efa95d0e59eef4f543418888ced9a47f50d2e5 |
hardening-wrapper_1.36ubuntu1.1.dsc | 1.5 KiB | a8826adb673adfb87c4bc16127e5a6da7b976af0ad9023dc9e6c734fa8449988 |
Available diffs
Binary packages built by this source
- hardening-includes: Makefile for enabling compiler flags for security hardening
Makefile to be included in Debian rules files. CFLAGS and LDFLAGS
can be extended to include the respective HARDENING_* variables which
contain architecture-validated security hardening compiler options.
.
Also includes the "hardening-check" script to help evaluate the hardening
status of already compiled binaries.
- hardening-wrapper: Compiler wrapper to enable security hardening flags
Replaces gcc, g++, and ld with wrapper scripts that set security hardening
compilation flags, as an alternative to changing gcc specs. Enabled when
DEB_BUILD_HARDENING= 1 is set.