https://bugzilla.redhat.com/show_bug.cgi?id=973349 Bug ID: 973349 Summary: Review Request: checksec - Tool to check system for binary-hardening Product: Fedora Version: rawhide Component: Package Review Severity: medium Priority: medium Assignee: nobody@xxxxxxxxxxxxxxxxx Reporter: bjoern.esser@xxxxxxxxx QA Contact: extras-qa@xxxxxxxxxxxxxxxxx CC: notting@xxxxxxxxxx, package-review@xxxxxxxxxxxxxxxxxxxxxxx Spec URL: http://besser82.fedorapeople.org/review/checksec/checksec.spec SRPM URL: http://besser82.fedorapeople.org/review/checksec/checksec-1.5-1.fc19.src.rpm Description: Modern Linux distributions offer some mitigation techniques to make it harder to exploit software vulnerabilities reliably. Mitigations such as RELRO, NoExecute (NX), Stack Canaries, Address Space Layout Randomization (ASLR) and Position Independent Executables (PIE) have made reliably exploiting any vulnerabilities that do exist far more challenging. The checksec script is designed to test what *standard* Linux OS and PaX (http://pax.grsecurity.net/) security features are being used. As of version 1.3 the script also lists the status of various Linux kernel protection mechanisms. checksec can check binary-files and running processes for hardening features. Fedora Account System Username: besser82 rpmlint: checksec.src: W: spelling-error %description -l en_US Mitigations -> Mitigation, Mitigation's, Mitigation s checksec.noarch: W: spelling-error %description -l en_US Mitigations -> Mitigation, Mitigation's, Mitigation s checksec.noarch: W: no-manual-page-for-binary checksec 2 packages and 1 specfiles checked; 0 errors, 3 warnings. koji-build: http://koji.fedoraproject.org/koji/taskinfo?taskID=5493248 -- You are receiving this mail because: You are on the CC list for the bug. Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=OghqAFwvJ5&a=cc_unsubscribe _______________________________________________ package-review mailing list package-review@xxxxxxxxxxxxxxxxxxxxxxx https://admin.fedoraproject.org/mailman/listinfo/package-review