[ubuntu/vivid-proposed] hardening-wrapper 2.7ubuntu1 (Accepted)
Matthias Klose
doko at ubuntu.com
Wed Mar 18 12:19:12 UTC 2015
hardening-wrapper (2.7ubuntu1) vivid; urgency=medium
* Merge with Debian; remaining changes:
- Stop installing links for GCC 4.2, 4.3, 4.5.
* Install links for GCC 5.
hardening-wrapper (2.7) unstable; urgency=medium
* hardening.make: drop mips restriction on building PIE.
* hardened-cc: fix comment typo, thanks to Steven Honeyman.
* hardened-cc: disable format-security when related arguments
are already present, thanks to Steve Beattie (Closes: 767269).
* tests/Makefile.common: include tests for new format-security
disabling abilities.
hardening-wrapper (2.6) unstable; urgency=medium
* Acknowledge NMU, thanks Aurelien Jarno!
* debian/rules: add clarifying comment about dpkg-buildflags.
* hardening.make, debian/README.Debian:
- switch to -fstack-protector-strong, thanks to Romain Francoise
(Closes: 762662).
- enable stack protector on mips*, arm64.
* hardened-cc: use -fstack-protector-strong when old GCC not found.
* tests/
- Makefile: add -fstack-protector-strong to logs
- Makefile.common, ssp-buffer-type-protect.c: check for -strong behavior
Date: Wed, 18 Mar 2015 13:09:18 +0100
Changed-By: Matthias Klose <doko at ubuntu.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
https://launchpad.net/ubuntu/+source/hardening-wrapper/2.7ubuntu1
-------------- next part --------------
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Wed, 18 Mar 2015 13:09:18 +0100
Source: hardening-wrapper
Binary: hardening-wrapper hardening-includes
Architecture: source
Version: 2.7ubuntu1
Distribution: vivid
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Matthias Klose <doko at ubuntu.com>
Description:
hardening-includes - Makefile for enabling compiler flags for security hardening
hardening-wrapper - Compiler wrapper to enable security hardening flags
Closes: 762662 767269
Changes:
hardening-wrapper (2.7ubuntu1) vivid; urgency=medium
.
* Merge with Debian; remaining changes:
- Stop installing links for GCC 4.2, 4.3, 4.5.
* Install links for GCC 5.
.
hardening-wrapper (2.7) unstable; urgency=medium
.
* hardening.make: drop mips restriction on building PIE.
* hardened-cc: fix comment typo, thanks to Steven Honeyman.
* hardened-cc: disable format-security when related arguments
are already present, thanks to Steve Beattie (Closes: 767269).
* tests/Makefile.common: include tests for new format-security
disabling abilities.
.
hardening-wrapper (2.6) unstable; urgency=medium
.
* Acknowledge NMU, thanks Aurelien Jarno!
* debian/rules: add clarifying comment about dpkg-buildflags.
* hardening.make, debian/README.Debian:
- switch to -fstack-protector-strong, thanks to Romain Francoise
(Closes: 762662).
- enable stack protector on mips*, arm64.
* hardened-cc: use -fstack-protector-strong when old GCC not found.
* tests/
- Makefile: add -fstack-protector-strong to logs
- Makefile.common, ssp-buffer-type-protect.c: check for -strong behavior
Checksums-Sha1:
be74fced757d0a7bbc967d5a3a3a59e801fee715 1926 hardening-wrapper_2.7ubuntu1.dsc
93ec68a9ce13b7188195ddc33ac77548c264add8 20084 hardening-wrapper_2.7ubuntu1.tar.xz
Checksums-Sha256:
3ebaccaa1a464b823edca730a9d148fc269128b7d75ea96c877f8f5cebd0c62a 1926 hardening-wrapper_2.7ubuntu1.dsc
914694dfd1c4245b0b6fbdacf6232521544314188b14a0a9283ad7dd2a2136af 20084 hardening-wrapper_2.7ubuntu1.tar.xz
Files:
d20ea50000920f928891c1782231ec9d 1926 devel optional hardening-wrapper_2.7ubuntu1.dsc
8b3ee0de7d9c8bcbf698314fd4f398bd 20084 devel optional hardening-wrapper_2.7ubuntu1.tar.xz
Original-Maintainer: Package Hardening <hardening-discuss at lists.alioth.debian.org>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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=3ZKS
-----END PGP SIGNATURE-----
More information about the Vivid-changes
mailing list