hardening-wrapper 1.34 source package in Ubuntu
Changelog
hardening-wrapper (1.34) unstable; urgency=low * debian/control: update VCS tags for bzr. * hardening{-check,.make}: correct documentation from -O2 to -O1. * hardened-{cc,ld}, hardening.make, debian/rules: use DEB_HOST_ARCH instead of of DEB_HOST_ARCH_CPU for behavioral defaults (Closes: 635642). -- Ubuntu Archive Auto-Sync <email address hidden> Mon, 17 Oct 2011 10:57:17 +0000
Upload details
- Uploaded by:
- Ubuntu Archive Auto-Sync
- Uploaded to:
- Precise
- Original maintainer:
- Package Hardening
- Architectures:
- any
- Section:
- devel
- Urgency:
- Low Urgency
See full publishing history Publishing
Series | Published | Component | Section |
---|
Downloads
File | Size | SHA-256 Checksum |
---|---|---|
hardening-wrapper_1.34.tar.gz | 16.3 KiB | 0cb3ee4b3b65ca31f76a4789531347c7fc16ef9e15bc35650085851348ab6235 |
hardening-wrapper_1.34.dsc | 1.7 KiB | 991b7716481ffc4deadef7bec1a56f8c3e55e6e8f0a4bbafde9c9f8de51795b1 |
Available diffs
- diff from 1.33 (in Debian) to 1.34 (1.9 KiB)
Binary packages built by this source
- hardening-includes: Makefile for enabling compiler flags for security hardening
Makefile to be included in Debian rules files. CFLAGS and LDFLAGS
can be extended to include the respective HARDENING_* variables which
contain architecture-validated security hardening compiler options.
.
Also includes the "hardening-check" script to help evaluate the hardening
status of already compiled binaries.
- hardening-wrapper: Compiler wrapper to enable security hardening flags
Replaces gcc, g++, and ld with wrapper scripts that set security hardening
compilation flags, as an alternative to changing gcc specs. Enabled when
DEB_BUILD_HARDENING= 1 is set.