Debian Bug report logs -
#188172
O: kernel-patch-2.2.18-openwall -- patch to add extra security-related features to the linux kernel.
Reported by: Martin Michlmayr <tbm@cyrius.com>
Date: Tue, 8 Apr 2003 11:33:16 UTC
Severity: normal
Done: Morgon Kanter <morgon@surgo.net>
Bug is archived. No further changes may be made.
Toggle useless messages
Report forwarded to debian-bugs-dist@lists.debian.org, wnpp@debian.org, wnpp@packages.qa.debian.org:
Bug#188172; Package wnpp.
(full text, mbox, link).
Acknowledgement sent to Martin Michlmayr <tbm@cyrius.com>:
New Bug report received and forwarded. Copy sent to wnpp@debian.org, wnpp@packages.qa.debian.org.
(full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
Package: wnpp
Severity: normal
The current maintainer of kernel-patch-2.2.18-openwall, Robert van der
Meulen <rvdm@debian.org>, has orphaned this package. If you want to
be the new maintainer, please take it -- see
http://www.debian.org/devel/wnpp/index.html#howto-o for detailed
instructions how to adopt a package properly.
Some information about this package:
Package: kernel-patch-2.2.18-openwall
Binary: kernel-patch-2.2.18-openwall
Version: 1.1
Priority: extra
Section: devel
Maintainer: Robert van der Meulen <rvdm@debian.org>
Architecture: all
Standards-Version: 3.0.1
Format: 1.0
Directory: pool/main/k/kernel-patch-2.2.18-openwall
Files: 3e925d8db8f2d1ce115834fa690eab11 647 kernel-patch-2.2.18-openwall_1.1.dsc
b1cac7e8b6cbb3c44ef20beac6038858 24241 kernel-patch-2.2.18-openwall_1.1.orig.tar.gz
4035e126ebc5c317bd694a747c6a88ba 2253 kernel-patch-2.2.18-openwall_1.1.diff.gz
Package: kernel-patch-2.2.18-openwall
Priority: extra
Section: devel
Installed-Size: 66
Maintainer: Robert van der Meulen <rvdm@debian.org>
Architecture: all
Version: 1.1
Recommends: kernel-package
Suggests: kernel-source-2.2.18
Filename: pool/main/k/kernel-patch-2.2.18-openwall/kernel-patch-2.2.18-openwall_1.1_all.deb
Size: 16848
MD5sum: 73a0854da38c491339996f17b09b9584
Description: patch to add extra security-related features to the linux kernel.
This patch is a collection of security-related features for the Linux
kernel, all configurable via the new 'Security options' configuration
section. In addition to the new features, some versions of the patch
contain various security fixes.
Extra features:
- Non-executable user stack area
- Restricted links in /tmp
- Restricted FIFOs in /tmp
- Restricted /proc
- Special handling of fd 0, 1, and 2
- Enforce RLIMIT_NPROC on execve(2)
- Destroy shared memory segments not in use
- Privileged IP aliases
--
Martin Michlmayr
tbm@cyrius.com
Reply sent to Morgon Kanter <morgon@surgo.net>:
You have taken responsibility.
(full text, mbox, link).
Notification sent to Martin Michlmayr <tbm@cyrius.com>:
Bug acknowledged by developer.
(full text, mbox, link).
Message #10 received at 188172-done@bugs.debian.org (full text, mbox, reply):
kernel-patch-int, kernel-patch-2.2.18-openwall, and
kernel-image-2.2.20-udma100-ext3-i386 even in the archive anymore
(198449), so the O: bugs against them should be closed.
Morgon
--
"Man is the only creature capable of hating itself" -- Governor of Japan
in The End of Evangelion
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Sat Apr 15 19:20:34 2023;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.