[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

hardening-wrapper_1.28~bpo50+1_amd64.changes is NEW



(new) hardening-includes_1.28~bpo50+1_all.deb extra devel
Makefile for enabling compiler flags for security hardening
 Makefile to be included in Debian rules files.  CFLAGS and LDFLAGS
 can be extended to include the respective HARDENING_* variables which
 contain architecture-validated security hardening compiler options.
(new) hardening-wrapper_1.28~bpo50+1.dsc extra devel
(new) hardening-wrapper_1.28~bpo50+1.tar.gz extra devel
(new) hardening-wrapper_1.28~bpo50+1_amd64.deb extra devel
Compiler wrapper to enable security hardening flags
 Replaces gcc, g++, and ld with wrapper scripts that set security hardening
 compilation flags, as an alternative to changing gcc specs.  Enabled when
 DEB_BUILD_HARDENING=1 is set.
Changes: hardening-wrapper (1.28~bpo50+1) lenny-backports; urgency=low
 .
  * Non-maintaner upload for backports.org
  * Backport for Lenny Archive.


Override entries for your package:

Announcing to backports-changes@lists.backports.org


Your package contains new components which requires manual editing of
the override file.  It is ok otherwise, so please be patient.  New
packages are usually added to the override file about once a week.

You may have gotten the distribution wrong.  You'll get warnings above
if files already exist in other distributions.
st in other distributions.

Reply to: