How to Install and Uninstall checksec.noarch Package on Amazon Linux 2
Last updated: February 06,2025
1. Install "checksec.noarch" package
Please follow the instructions below to install checksec.noarch on Amazon Linux 2
$
sudo yum makecache
Copied
$
sudo yum install
checksec.noarch
Copied
2. Uninstall "checksec.noarch" package
This is a short guide on how to uninstall checksec.noarch on Amazon Linux 2:
$
sudo yum remove
checksec.noarch
Copied
$
sudo yum autoremove
Copied
3. Information about the checksec.noarch package on Amazon Linux 2
Loaded plugins: ovl, priorities
Available Packages
Name : checksec
Arch : noarch
Version : 2.4.0
Release : 2.amzn2.0.1
Size : 31 k
Repo : amzn2-core/2/x86_64
Summary : Tool to check system for binary-hardening
URL : https://github.com/slimm609/checksec.sh
License : BSD
Description : Modern Linux distributions offer some mitigation techniques to
: make it harder to exploit software vulnerabilities reliably.
: Mitigations such as RELRO, NoExecute (NX), Stack Canaries, Address
: Space Layout Randomization (ASLR) and Position Independent
: Executables (PIE) have made reliably exploiting any
: vulnerabilities that do exist far more challenging. The checksec
: script is designed to test what *standard* Linux OS and PaX
: (http://pax.grsecurity.net/) security features are being used.
:
: As of version 1.3 the script also lists the status of various
: Linux kernel protection mechanisms.
:
: checksec can check binary-files and running processes for
: hardening features.
Available Packages
Name : checksec
Arch : noarch
Version : 2.4.0
Release : 2.amzn2.0.1
Size : 31 k
Repo : amzn2-core/2/x86_64
Summary : Tool to check system for binary-hardening
URL : https://github.com/slimm609/checksec.sh
License : BSD
Description : Modern Linux distributions offer some mitigation techniques to
: make it harder to exploit software vulnerabilities reliably.
: Mitigations such as RELRO, NoExecute (NX), Stack Canaries, Address
: Space Layout Randomization (ASLR) and Position Independent
: Executables (PIE) have made reliably exploiting any
: vulnerabilities that do exist far more challenging. The checksec
: script is designed to test what *standard* Linux OS and PaX
: (http://pax.grsecurity.net/) security features are being used.
:
: As of version 1.3 the script also lists the status of various
: Linux kernel protection mechanisms.
:
: checksec can check binary-files and running processes for
: hardening features.