forked from slimm609/checksec
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathChangeLog
172 lines (133 loc) · 6.72 KB
/
ChangeLog
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
Rev-2018012401 Brian Davis <slimm609@gmail.com>
* checksec.sh: Updated to 1.8.0
* checksec.sh: resolved issue with eu-readelf debug
* checksec.sh: shellcheck cleanup
Rev-2017080801 Brian Davis <slimm609@gmail.com>
* checksec.sh: Cleaned up if statements for proper bash expressions
Rev-2016102701 Brian Davis <slimm609@gmail.com>
* checksec.sh: updated to 1.7.5
* checksec.sh: added OSX support
Thanks Ben Actis
* checksec.sh: added space and underscore support
Thanks brianmwaters
* checksec.sh: cleaned up code formatting
Rev-2016022002 Brian Davis <slimm609@gmail.com>
* checksec.sh: updated to 1.7.4
* checksec.sh: fixed man page
* checksec.sh: added pkg_release option to disable updates for packaged releases
* checksec.sh: cleanup up proc-libs
Rev-2016021501 Brian Davis <slimm609@gmail.com>
* checksec.sh: merged in zsh completion
Thanks Vaeth
* checksec.sh: added man page for checksec
* checksec.sh: updated readme to reflect output in place of format option
Rev-2016021501 Brian Davis <slimm609@gmail.com>
* checksec.sh: updated to 1.7.3
* checksec.sh: added xml and json validation tests
* checksec.sh: fixed xml and json errors from validation tests
* checksec.sh: expanded grsecurity checks and cleaned up formatting
Rev-2016010502 Brian Davis <slimm609@gmail.com>
* checksec.sh: Added some extra debug output and started cleanup.
Rev-2016010501 Brian Davis <slimm609@gmail.com>
* checksec.sh: Fixed sysctl path issue #20
Thanks hartwork
Rev-2015122201 Brian Davis <slimm609@gmail.com>
* checksec.sh: Merged in json fixes.
Thanks jpouellet
Rev-2015122101 Brian Davis <slimm609@gmail.com>
* checksec.sh: Merged in passing in command line kernel config, x86 fix and optional tools.
Thanks philippedeswert
* checksec.sh: split off mandatory tool from optional tools.
* checksec.sh: Updated to 1.7.1
* checksec.sh: Added Seccomp tests from olivierlemoal.
Rev-2015102001 Brian Davis <slimm609@gmail.com>
* checksec.sh: Set static LC_ALL to resolve LANG errors. Resolves Ticket #13
* checksec.sh: Merged in additional kernel options and arch specfic options. Ticket #14
Thanks philippedeswert
* checksec.sh: Updated to 1.7.0 to support revision releases.
* checksec.sh: put in checks to not display checks that are for different architectures.
Rev-2015091505 Brian Davis <slimm609@gmail.com>
* checksec.sh: added additional debug output for troubleshooting purposes
Rev-2015091401 Brian Davis <slimm609@gmail.com>
* checksec.sh: added debug option for troubleshooting purposes
Rev-2015091301 Brian Davis <slimm609@gmail.com>
* checksec.sh: merged in changes for fedora/epel compilance
Thanks Besser82
* checksec.sh: updated check binaries on run
Thanks Roberto Martelloni
Rev-2015060201 Brian Davis <slimm609@gmail.com>
* checksec.sh: merged in fortified/fortify-able stats on --file output changed
Thanks Roberto Martelloni
Rev-2015011201 Brian Davis <slimm609@gmail.com>
* checksec.sh: moved checksec.sh to checksec
Rev-2014021802 Brian Davis <slimm609@gmail.com>
* checksec.sh: merged in RODATA and STRICT_USER_COPY changes
Thanks N8Fear
Rev-2014021801 Brian Davis <slimm609@gmail.com>
* checksec.sh: merged in JIT and MODHARDEN changes
Thanks N8Fear
Rev-2014021605 Brian Davis <slimm609@gmail.com>
* checksec.sh: Changed --update to verify signature of updates.
* checksec.sig: file added
Rev-2014021601 Brian Davis <slimm609@gmail.com>
* checksec.sh: Removed deprecated Kern Heap section
Thanks Unspawn
2014-02-14 Brian Davis <slimm609@gmail.com>
* checksec.sh: Updated to version 1.6
* checksec.sh: Implemented rev numbers and --update option
* checksec.sh: Added SELinux checks as additional checks for kernel security.
* checksec.sh: Added update option to pull the latest release
* checksec.sh: Added foritfy_source to proc-all output.
* checksec.sh: Added Json, strict XML and updated Grsecurity section.
* checksec.sh: Carried over Robin David's changes with XML and CSV.
2013-10-06 Robin David <dev.robin.david@gmail.com>
* add machine-readable outputs like CSV and XML
2011-11-17 Tobias Klein <tk@trapkit.de>
* 1.5
* New checks for rpath and runpath elements in the dynamic sections.
Thanks to Ollie Whitehouse.
* Other bugfixes and improvements
- checksec.sh now takes account of the KBUILD_OUTPUT
environment variable when checking the Linux kernel
protection mechanisms (--kernel).
Thanks to Martin Vaeth for the hint.
- Some minor changes and clean-ups. Thanks to Brian Davis.
- Ubuntu 11.10 support for --fortify-file and --fortify-proc.
2011-01-14 Tobias Klein <tk@trapkit.de>
* 1.4
* Support for FORTIFY_SOURCE (--fortify-file, --fortify-proc)
* Lots of other bugfixes and improvements
- Check if the readelf command is available
- readelf support for 64-bit ELF files
- Check if the requested files and directories do exist
- '--dir' is now case-sensitive and correctly deals with
trailing slashes
- Check user permissions
- Etc.
2010-06-15 Tobias Klein <tk@trapkit.de>
* 1.3.1
* New BSD License
(http://www.opensource.org/licenses/bsd-license.php)
2010-05-04 Tobias Klein <tk@trapkit.de>
* 1.3
* Additional checks for a number of Linux kernel
protection mechanisms.
Thanks to Jon Oberheide (jon.oberheide.org).
2010-01-02 Tobias Klein <tk@trapkit.de>
* 1.2
* Additional PaX (http://pax.grsecurity.net/) checks.
Thanks to Brad Spengler (grsecurity.net) for the PaX
support.
* Some minor fixes (coloring adjusted, 'pidof' replacement)
2009-12-27 Tobias Klein <tk@trapkit.de>
* 1.1
* New '--proc-libs' option. This option instructs
checksec.sh to test the loaded libraries of a process.
* Additional information on ASLR results (--proc,
-proc-all, --proc-libs)
Thanks to Anthony G. Basile of the Tin Hat project
for the hint.
* Additional CPU NX check (--proc, --proc-all, --proc-libs)
2009-01-28 Tobias Klein <tk@trapkit.de>
* 1.0
* Initial release