1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28
|
Source: kernel-patch-2.4-grsecurity
Section: devel
Priority: extra
Maintainer: László Böszörményi (GCS) <gcs@lsc.hu>
Standards-Version: 3.6.1
Build-Depends-Indep: debhelper (>> 4.0.0), dh-kpatches
Package: kernel-patch-2.4-grsecurity
Architecture: all
Depends: ${kpatch:Depends}, ${misc:Depends}
Suggests: kernel-source-2.4, kernel-package, gradm
Description: grsecurity kernel patch - 2.4.x security patch
This patch provides enhanced security to the Linux kernel. It includes a
robust MAC based ACL system, extensive auditing capabilities and measures
to stop the most common methods of exploiting a system. These include limited
chroot(), fork() rate limiting, various network limiting and randomizing
options, memory page protection on i386, sparc, sparc64, alpha, parisc,
amd64, ia64, and ppc, restricting mprotect(), random PIDs, and much more.
.
This patch conflicts with the LSM patch, they both change the same things
so the patches can't both apply.
.
Furthermore, this patch will not apply to Debian kernels 2.4.20 and above.
You will have to use vanilla kernel sources to apply this patch. Reasons
are documented in README.2.4.2x contained within the package.
.
Please note, that this patch is DEPRECATED upstream, and migrate as soon
as possible to one of the grsecurity2 patches.
|