How to Install and Uninstall checksec Package on openSuSE Tumbleweed
Last updated: November 22,2024
1. Install "checksec" package
This guide covers the steps necessary to install checksec on openSuSE Tumbleweed
$
sudo zypper refresh
Copied
$
sudo zypper install
checksec
Copied
2. Uninstall "checksec" package
Please follow the guidance below to uninstall checksec on openSuSE Tumbleweed:
$
sudo zypper remove
checksec
Copied
3. Information about the checksec package on openSuSE Tumbleweed
Information for package checksec:
---------------------------------
Repository : openSUSE-Tumbleweed-Oss
Name : checksec
Version : 2.6.0-1.3
Arch : noarch
Vendor : openSUSE
Installed Size : 92.1 KiB
Installed : No
Status : not installed
Source package : checksec-2.6.0-1.3.src
Upstream URL : https://github.com/slimm609/checksec.sh
Summary : Utility to check binaries for system hardening
Description :
Checksec is a bash script to check the properties of executables (like PIE,
RELRO, PaX, Canaries, ASLR, Fortify Source). It has been originally written by
Tobias Klein and the original source is available here:
http://www.trapkit.de/tools/checksec.html
Modern Linux distributions offer some mitigation techniques to make it harder
to exploit software vulnerabilities reliably. Mitigations such as RELRO,
NoExecute (NX), Stack Canaries, Address Space Layout Randomization (ASLR) and
Position Independent Executables (PIE) have made reliably exploiting any
vulnerabilities that do exist far more challenging. The checksec script is
designed to test what *standard* Linux OS and PaX (http://pax.grsecurity.net/)
security features are being used.
---------------------------------
Repository : openSUSE-Tumbleweed-Oss
Name : checksec
Version : 2.6.0-1.3
Arch : noarch
Vendor : openSUSE
Installed Size : 92.1 KiB
Installed : No
Status : not installed
Source package : checksec-2.6.0-1.3.src
Upstream URL : https://github.com/slimm609/checksec.sh
Summary : Utility to check binaries for system hardening
Description :
Checksec is a bash script to check the properties of executables (like PIE,
RELRO, PaX, Canaries, ASLR, Fortify Source). It has been originally written by
Tobias Klein and the original source is available here:
http://www.trapkit.de/tools/checksec.html
Modern Linux distributions offer some mitigation techniques to make it harder
to exploit software vulnerabilities reliably. Mitigations such as RELRO,
NoExecute (NX), Stack Canaries, Address Space Layout Randomization (ASLR) and
Position Independent Executables (PIE) have made reliably exploiting any
vulnerabilities that do exist far more challenging. The checksec script is
designed to test what *standard* Linux OS and PaX (http://pax.grsecurity.net/)
security features are being used.