--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2016-94940dd2d3
2016-10-05 20:39:04.629268
--------------------------------------------------------------------------------
Name : checksec
Product : Fedora 24
Version : 1.7.4
Release : 2.fc24
URL :
http://www.trapkit.de/tools/checksec.html
Summary : Tool to check system for binary-hardening
Description :
Modern Linux distributions offer some mitigation techniques to make it harder
to exploit software vulnerabilities reliably. Mitigations such as RELRO,
NoExecute (NX), Stack Canaries, Address Space Layout Randomization (ASLR) and
Position Independent Executables (PIE) have made reliably exploiting any
vulnerabilities that do exist far more challenging. The checksec script is
designed to test what *standard* Linux OS and PaX (
http://pax.grsecurity.net/)
security features are being used.
As of version 1.3 the script also lists the status of various Linux kernel
protection mechanisms.
checksec can check binary-files and running processes for hardening features.
--------------------------------------------------------------------------------
Update Information:
###Update to 1.7.4 - Update to forked version - Add missing runtime-dependencies
- Add manpage
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1240391 - None
https://bugzilla.redhat.com/show_bug.cgi?id=1240391
[ 2 ] Bug #1380950 - None
https://bugzilla.redhat.com/show_bug.cgi?id=1380950
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update checksec' at the command line.
For more information, refer to "Managing Software with yum",
available at
https://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------