Date: Sat, 24 Jun 2017 08:17:20 +0000 From: bugzilla-noreply@freebsd.org To: freebsd-ports-bugs@FreeBSD.org Subject: [Bug 220245] [NEW PORT] security/hardening-check: Check binaries for security hardening features Message-ID: <bug-220245-13@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D220245 Bug ID: 220245 Summary: [NEW PORT] security/hardening-check: Check binaries for security hardening features Product: Ports & Packages Version: Latest Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: Individual Port(s) Assignee: freebsd-ports-bugs@FreeBSD.org Reporter: amutu@amutu.com Created attachment 183757 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D183757&action= =3Dedit hardening-check.shar Hardening-check is a perl script to verify that the resulting binary does, = in fact, have hardening features enabled, you can use it to test each ELF bina= ry and the output will show if the binary has position independent executable, stack protected, fortify source functions(not supported on FreeBSD now), re= ad only relocations or immediate binding supported. WWW: https://wiki.debian.org/Hardening QA: portlint -AC WARN: Makefile: [16]: possible direct use of command "perl" found. use ${PE= RL} instead. WARN: Makefile: using hyphen in PORTNAME. consider using PKGNAMEPREFIX and/= or PKGNAMESUFFIX. 0 fatal errors and 2 warnings found. poudriere testport pass on 11.0R-amd64 --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-220245-13>