How to Install and Uninstall checksec.noarch Package on Fedora 38
Last updated: January 10,2025
1. Install "checksec.noarch" package
Please follow the step by step instructions below to install checksec.noarch on Fedora 38
$
sudo dnf update
Copied
$
sudo dnf install
checksec.noarch
Copied
2. Uninstall "checksec.noarch" package
Learn how to uninstall checksec.noarch on Fedora 38:
$
sudo dnf remove
checksec.noarch
Copied
$
sudo dnf autoremove
Copied
3. Information about the checksec.noarch package on Fedora 38
Last metadata expiration check: 2:41:22 ago on Sat Mar 16 22:59:57 2024.
Available Packages
Name : checksec
Version : 2.6.0
Release : 3.fc38
Architecture : noarch
Size : 29 k
Source : checksec-2.6.0-3.fc38.src.rpm
Repository : fedora
Summary : Tool to check system for binary-hardening
URL : https://github.com/slimm609/checksec.sh
License : BSD
Description : Modern Linux distributions offer some mitigation techniques to make it harder
: to exploit software vulnerabilities reliably. Mitigations such as RELRO,
: NoExecute (NX), Stack Canaries, Address Space Layout Randomization (ASLR) and
: Position Independent Executables (PIE) have made reliably exploiting any
: vulnerabilities that do exist far more challenging. The checksec script is
: designed to test what *standard* Linux OS and PaX (http://pax.grsecurity.net/)
: security features are being used.
:
: As of version 1.3 the script also lists the status of various Linux kernel
: protection mechanisms.
:
: checksec can check binary-files and running processes for hardening features.
Available Packages
Name : checksec
Version : 2.6.0
Release : 3.fc38
Architecture : noarch
Size : 29 k
Source : checksec-2.6.0-3.fc38.src.rpm
Repository : fedora
Summary : Tool to check system for binary-hardening
URL : https://github.com/slimm609/checksec.sh
License : BSD
Description : Modern Linux distributions offer some mitigation techniques to make it harder
: to exploit software vulnerabilities reliably. Mitigations such as RELRO,
: NoExecute (NX), Stack Canaries, Address Space Layout Randomization (ASLR) and
: Position Independent Executables (PIE) have made reliably exploiting any
: vulnerabilities that do exist far more challenging. The checksec script is
: designed to test what *standard* Linux OS and PaX (http://pax.grsecurity.net/)
: security features are being used.
:
: As of version 1.3 the script also lists the status of various Linux kernel
: protection mechanisms.
:
: checksec can check binary-files and running processes for hardening features.