File: control

package info (click to toggle)
kernel-patch-2.4-grsecurity 1.9.15-2
  • links: PTS
  • area: main
  • in suites: sarge
  • size: 4,372 kB
  • sloc: makefile: 35; sh: 4
file content (28 lines) | stat: -rw-r--r-- 1,316 bytes parent folder | download
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
Source: kernel-patch-2.4-grsecurity
Section: devel
Priority: extra
Maintainer: László Böszörményi (GCS) <gcs@lsc.hu>
Standards-Version: 3.6.1
Build-Depends-Indep: debhelper (>> 4.0.0), dh-kpatches

Package: kernel-patch-2.4-grsecurity
Architecture: all
Depends: ${kpatch:Depends}, ${misc:Depends}
Suggests: kernel-source-2.4, kernel-package, gradm
Description: grsecurity kernel patch - 2.4.x security patch
 This patch provides enhanced security to the Linux kernel. It includes a
 robust MAC based ACL system, extensive auditing capabilities and measures
 to stop the most common methods of exploiting a system. These include limited
 chroot(), fork() rate limiting, various network limiting and randomizing
 options, memory page protection on i386, sparc, sparc64, alpha, parisc,
 amd64, ia64, and ppc, restricting mprotect(), random PIDs, and much more.
 .
 This patch conflicts with the LSM patch, they both change the same things
 so the patches can't both apply.
 .
 Furthermore, this patch will not apply to Debian kernels 2.4.20 and above.
 You will have to use vanilla kernel sources to apply this patch. Reasons
 are documented in README.2.4.2x contained within the package.
 .
 Please note, that this patch is DEPRECATED upstream, and migrate as soon
 as possible to one of the grsecurity2 patches.