Hello community,

here is the log from the commit of package hardening-check for openSUSE:Factory 
checked in at 2017-10-13 14:19:01
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/hardening-check (Old)
 and      /work/SRC/openSUSE:Factory/.hardening-check.new (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "hardening-check"

Fri Oct 13 14:19:01 2017 rev:3 rq:533587 version:2.6

Changes:
--------
--- /work/SRC/openSUSE:Factory/hardening-check/hardening-check.changes  
2017-10-11 23:03:59.957946816 +0200
+++ /work/SRC/openSUSE:Factory/.hardening-check.new/hardening-check.changes     
2017-10-13 14:19:03.660384503 +0200
@@ -1,0 +2,5 @@
+Wed Oct 11 16:09:28 UTC 2017 - [email protected]
+
+- Repair grammar and neutrality in the description.
+
+-------------------------------------------------------------------

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ hardening-check.spec ++++++
--- /var/tmp/diff_new_pack.0LswU7/_old  2017-10-13 14:19:04.724337723 +0200
+++ /var/tmp/diff_new_pack.0LswU7/_new  2017-10-13 14:19:04.728337547 +0200
@@ -32,7 +32,7 @@
 Version:        2.6
 Release:        0
 Requires:       perl
-Summary:        A tool for inspecting low level hardening characteristics of 
ELF binaries
+Summary:        A tool for inspecting low-level hardening characteristics of 
ELF binaries
 License:        GPL-2.0+
 Url:            http://packages.debian.org/%{upstream_pkg}
 Source0:        
http://ftp.debian.org/debian/pool/main/h/%{upstream_pkg}/%{upstream_pkg}_%{version}.tar.xz
@@ -42,10 +42,10 @@
 Patch0:         perl_regex.patch
 
 %description
-This package contains a perl script that allows for quick and simple checking
-of a number of hardening characteristics of ELF binaries.
+This package contains a Perl script that allows checking
+a number of hardening characteristics of ELF binaries.
 
-This includes check for PIE executables, stack protection, source
+This includes checks for PIE executables, stack protection, source
 fortification, read-only relocations and immediate binding.
 
 %prep


Reply via email to