Result for A67711050DD14A9DC4B78B8BE87B0B306D2B04A6

Query result

Key Value
FileName./usr/share/doc/linux-patch-grsecurity2/features.txt.gz
FileSize2335
MD5B48C70AFE5744C7828506CDE92B17F7D
SHA-1A67711050DD14A9DC4B78B8BE87B0B306D2B04A6
SHA-2569D90CDB7C80A63CE948C4415F5C827AD9FD4739726046C73FBAAC520E036F04C
SSDEEP48:XbPIUwzIZk9EMDgTgq0YsEHLdPx/wQic+mKfM3QA2DQKrK0fxTLY:LPIzIWDDgpP4jjfM3QDDQKK0ZY
TLSHT1C5414B9FBF0CA6ECC5AEB352382F97D958098B0CE5C080B8F03C216D5C73524A0368CA
hashlookup:parent-total1
hashlookup:trust55

Network graph view

Parents (Total: 1)

The searched file hash is included in 1 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
FileSize3098538
MD59F20CF0FEA1F15B20611FE6F63672E2C
PackageDescriptiongrsecurity kernel patch This patch provides enhanced security to the Linux kernel. It includes a robust ACL system, extensive auditing capabilities and measures to stop the most common methods of exploiting a system. These include limited chroot(), fork() rate limiting, various network limiting and randomizing options, memory page protection on i386, sparc, sparc64, alpha, parisc, amd64, ia64, and ppc, restricting mprotect(), random PIDs, and much more. . This patch conflicts with the LSM patch, they both change the same things so the patches can't both apply. . Furthermore, this patch will NOT apply to Debian kernels. You will have to use vanilla kernel sources to apply this patch. Reasons are documented in README contained within the package.
PackageMaintainerLaszlo Boszormenyi (GCS) <gcs@debian.org>
PackageNamelinux-patch-grsecurity2
PackageSectionkernel
PackageVersion3.0+3.14.22-201410250026-1
SHA-1A44AE101A1D249661A8C528A348035467F7BB735
SHA-2569A3B8C6F676B3D749E31782266BF1A36866BD161C8C7E73C7769A3828AE69FB4