Key | Value |
---|---|
FileName | ./usr/src/kernel-patches/diffs/grsecurity2/grsecurity-3.0-3.14.22-201410250026.patch.gz |
FileSize | 1017221 |
MD5 | 35453F0C68CB36B15DFD428D25B1ADDE |
SHA-1 | C967A187DF427535A969AE2735AF81C9F9B28B3B |
SHA-256 | 06953A8258233B82F18144571DC883A8DE0C8BECA416FC9DC694C1D2390C22F6 |
SSDEEP | 24576:nYd3w13BP7R2ItsJ7LFS5zfWBktrfyixTTNVgWMvpjBQ:o3wlBP7RiLFSFfW85rgWQjQ |
TLSH | T1802533B60894CF214501EF7DD9E0F72DFADDA99BE86308C7BD09E003E88DE5149E19A5 |
hashlookup:parent-total | 1 |
hashlookup:trust | 55 |
The searched file hash is included in 1 parent files which include package known and seen by metalookup. A sample is included below:
Key | Value |
---|---|
FileSize | 3098538 |
MD5 | 9F20CF0FEA1F15B20611FE6F63672E2C |
PackageDescription | grsecurity kernel patch This patch provides enhanced security to the Linux kernel. It includes a robust ACL system, extensive auditing capabilities and measures to stop the most common methods of exploiting a system. These include limited chroot(), fork() rate limiting, various network limiting and randomizing options, memory page protection on i386, sparc, sparc64, alpha, parisc, amd64, ia64, and ppc, restricting mprotect(), random PIDs, and much more. . This patch conflicts with the LSM patch, they both change the same things so the patches can't both apply. . Furthermore, this patch will NOT apply to Debian kernels. You will have to use vanilla kernel sources to apply this patch. Reasons are documented in README contained within the package. |
PackageMaintainer | Laszlo Boszormenyi (GCS) <gcs@debian.org> |
PackageName | linux-patch-grsecurity2 |
PackageSection | kernel |
PackageVersion | 3.0+3.14.22-201410250026-1 |
SHA-1 | A44AE101A1D249661A8C528A348035467F7BB735 |
SHA-256 | 9A3B8C6F676B3D749E31782266BF1A36866BD161C8C7E73C7769A3828AE69FB4 |