hardening-wrapper_1.28~bpo50+1_amd64.changes is NEW
(new) hardening-includes_1.28~bpo50+1_all.deb extra devel
Makefile for enabling compiler flags for security hardening
Makefile to be included in Debian rules files. CFLAGS and LDFLAGS
can be extended to include the respective HARDENING_* variables which
contain architecture-validated security hardening compiler options.
(new) hardening-wrapper_1.28~bpo50+1.dsc extra devel
(new) hardening-wrapper_1.28~bpo50+1.tar.gz extra devel
(new) hardening-wrapper_1.28~bpo50+1_amd64.deb extra devel
Compiler wrapper to enable security hardening flags
Replaces gcc, g++, and ld with wrapper scripts that set security hardening
compilation flags, as an alternative to changing gcc specs. Enabled when
DEB_BUILD_HARDENING=1 is set.
Changes: hardening-wrapper (1.28~bpo50+1) lenny-backports; urgency=low
.
* Non-maintaner upload for backports.org
* Backport for Lenny Archive.
Override entries for your package:
Announcing to backports-changes@lists.backports.org
Your package contains new components which requires manual editing of
the override file. It is ok otherwise, so please be patient. New
packages are usually added to the override file about once a week.
You may have gotten the distribution wrong. You'll get warnings above
if files already exist in other distributions.
st in other distributions.
Reply to: