Package: wnpp Severity: normal The current maintainer of kernel-patch-2.2.18-openwall, Robert van der Meulen <[EMAIL PROTECTED]>, has orphaned this package. If you want to be the new maintainer, please take it -- see http://www.debian.org/devel/wnpp/index.html#howto-o for detailed instructions how to adopt a package properly.
Some information about this package: Package: kernel-patch-2.2.18-openwall Binary: kernel-patch-2.2.18-openwall Version: 1.1 Priority: extra Section: devel Maintainer: Robert van der Meulen <[EMAIL PROTECTED]> Architecture: all Standards-Version: 3.0.1 Format: 1.0 Directory: pool/main/k/kernel-patch-2.2.18-openwall Files: 3e925d8db8f2d1ce115834fa690eab11 647 kernel-patch-2.2.18-openwall_1.1.dsc b1cac7e8b6cbb3c44ef20beac6038858 24241 kernel-patch-2.2.18-openwall_1.1.orig.tar.gz 4035e126ebc5c317bd694a747c6a88ba 2253 kernel-patch-2.2.18-openwall_1.1.diff.gz Package: kernel-patch-2.2.18-openwall Priority: extra Section: devel Installed-Size: 66 Maintainer: Robert van der Meulen <[EMAIL PROTECTED]> Architecture: all Version: 1.1 Recommends: kernel-package Suggests: kernel-source-2.2.18 Filename: pool/main/k/kernel-patch-2.2.18-openwall/kernel-patch-2.2.18-openwall_1.1_all.deb Size: 16848 MD5sum: 73a0854da38c491339996f17b09b9584 Description: patch to add extra security-related features to the linux kernel. This patch is a collection of security-related features for the Linux kernel, all configurable via the new 'Security options' configuration section. In addition to the new features, some versions of the patch contain various security fixes. Extra features: - Non-executable user stack area - Restricted links in /tmp - Restricted FIFOs in /tmp - Restricted /proc - Special handling of fd 0, 1, and 2 - Enforce RLIMIT_NPROC on execve(2) - Destroy shared memory segments not in use - Privileged IP aliases -- Martin Michlmayr [EMAIL PROTECTED]