what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 51 - 75 of 121 RSS Feed

Files

patch-2.4.19-fnk4.patch.gz
Posted Aug 21, 2002
Authored by Paul Drain | Site cipherfunk.org

The cipherfunk Patched Linux Kernels provide patch sets that focus on security enhancements, optimizations, and bugfixes to the current stable Linux Kernel. They are suitable for workstation or high-end server use in both production and development environments.

Changes: IDE CDROM fallback patch present in -fnk3 has been reverted for a generic solution for all CD devices, a workaround for UDMA5 drives has been added, various drivers have been updated, and a GCC 3.2 specific compile workaround has been added.
tags | kernel, patch
systems | linux, unix
SHA-256 | 085c5ffdbdbd89012634e6937626af473b29c40dee5510fa36ef855acb0d73a5
pspa-2.2.21-14.tar.gz
Posted Jun 4, 2002
Site original.killa.net

The Linux Port/Socket Pseudo ACLs project is a patch to the Linux kernel which allows the admin to delegate privileges for some protected network resources to non-root users. The ACLs are generally used to run untrusted or insecure applications as an unprivileged process, thereby lessening the impact of some undiscovered denial of service or root compromise. The ACLs can cover protected ports, raw sockets, and packet sockets.

Changes: Updated for kernel v2.2.21.
tags | denial of service, kernel, root, patch
systems | linux, unix
SHA-256 | d61bf6e3dbf719b509f1f7f95548c9046c1ea67c123e9d83a01d182c414a25d0
hap-linux-2.2.21-1.diff.gz
Posted Jun 3, 2002
Authored by Hank Leininger | Site TheAIMSGroup.com

HAP-Linux is a collection of security related patches which are designed to be applied after Solar Designers Openwall patches are installed. Changes include some extra information in the printks, and the ability to allow hard links to files you don't own which are in your group, and the ability to follow links & pipes in +t directories if they are not world-writable. This is useful for getting various daemons to run chrooted as a non-root user, and some secure drop- directory stuff.

Changes: This release has been synchronized with kernel 2.2.21 and Openwall 2.2.21-1.
tags | root, patch
systems | linux, unix
SHA-256 | 58508fba90c8d918ac8566e635b8f317ad02aacbff916ed80bef5c55e066a163
ppp-2.4.1+bf.patch
Posted May 5, 2002
Authored by Jfs

This is a patch which adds PPP authentication brute force password guessing support to Linux pppd. Supports both PAP and CHAP.

tags | patch
systems | linux, unix
SHA-256 | d3b741551a81e939de8c8f114bda47c191f9c7d327004f78e6eec0cf013d6a34
nmap-freak-freebsd4.4-patch
Posted May 5, 2002
Authored by jaguar

Nmap freak patch for FreeBSD 4.4 - Prevents OS fingerprinting, NULL scan, FIN scan, Xmas scan, Connect scan, and Stealth scan.

tags | patch
systems | unix, freebsd
SHA-256 | 828f2070c9d8ae7cff691c13f071e967a44f0cd9f2304f977e178197a2a22cc0
hap-linux-2.2.20-5.diff.gz
Posted Apr 6, 2002
Authored by Hank Leininger | Site TheAIMSGroup.com

HAP-Linux is a collection of security related patches which are designed to be applied after Solar Designers Openwall patches are installed. Changes include some extra information in the printks, and the ability to allow hard links to files you don't own which are in your group, and the ability to follow links & pipes in +t directories if they are not world-writable. This is useful for getting various daemons to run chrooted as a non-root user, and some secure drop- directory stuff.

Changes: Now has logging of open directory FDs by chrooting processes, and various chroot capability dropping changes and fixes. Split fatal-signal logging into two buckets, so an attacker could not trigger log-throttling by causing an unprivileged segfault right before attacking privileged processes.
tags | root, patch
systems | linux, unix
SHA-256 | 72a636d794218b50756bf9ced5a90949b231d390c0a66b853ffa0b54f479e248
ggsniff-1.0-dsniff-2.3-patch
Posted Apr 6, 2002
Authored by Ryba

Patch for dsniff-2.3 that allows you to record gadu-gadu messages, a popular communicator in Poland.

tags | patch
systems | unix
SHA-256 | a52b6be58632020e2cb35476a0aefd69de95deb40b8238b8e1815274c1ab4b98
hap-linux-2.2.20-3.diff
Posted Mar 8, 2002
Authored by Hank Leininger | Site TheAIMSGroup.com

HAP-Linux is a collection of security related patches which are designed to be applied after Solar Designers Openwall patches are installed. Changes include some extra information in the printks, and the ability to allow hard links to files you don't own which are in your group, and the ability to follow links & pipes in +t directories if they are not world-writable. This is useful for getting various daemons to run chrooted as a non-root user, and some secure drop- directory stuff.

Changes: Includes Solar Designer's Openwall 2.2.20-ow2, fixing a Linux kernel vulnerability that allows users to kill any process. There are also fixes to the capabilities dropping of chroot(2). The cap_to_mask stuff was biffed, and now actually works.
tags | root, patch
systems | linux, unix
SHA-256 | 552dd35b52705c6f4314d2fbacd357c66afb6fdeeaacea6b3e9985d2b2b25b81
pspa-2.4.18-14.tar.gz
Posted Mar 4, 2002
Site original.killa.net

The Linux Port/Socket Pseudo ACLs project is a patch to the Linux kernel which allows the admin to delegate privileges for some protected network resources to non-root users. The ACLs are generally used to run untrusted or insecure applications as an unprivileged process, thereby lessening the impact of some undiscovered denial of service or root compromise. The ACLs can cover protected ports, raw sockets, and packet sockets.

Changes: Updated for kernel v2.4.18.
tags | denial of service, kernel, root, patch
systems | linux, unix
SHA-256 | c604733b221cf15992fc4be7277bbce44eb1dc57d8a1b87d3db28fe0d44d3d40
samba-2.2.2-peche.diff
Posted Feb 19, 2002

Patch against samba 2.2.2 which allows mounting of unpatched win 9x+me machines without knowing the password. There is an option to retrieve the password very quickly too, and another to switch between the two password if both read only and read-write ones are presents.

tags | patch
systems | unix
SHA-256 | abb2ee0f8ddd2bad2811f283572a75c9f79c45d05546be94f9919f5d6ec132ae
nmap-freak-patch
Posted Feb 19, 2002
Authored by jaguar

This is a kernel patch to prevent stealth, fin, and rst scans. Also slows down the tcp connect scan. Tested on debian potato running 2.4.16. Tested with nmap and queso - Changes OS fingerprint.

tags | kernel, tcp, patch
systems | linux, unix, debian
SHA-256 | 34dc5fef83c2a347dc0f9e61a28b304f44dd7ead8a44a36b2bf875b32880c4a0
pspa-2.4.17-14.tar.gz
Posted Jan 1, 2002
Site original.killa.net

The Linux Port/Socket Pseudo ACLs project is a patch to the Linux kernel which allows the admin to delegate privileges for some protected network resources to non-root users. The ACLs are generally used to run untrusted or insecure applications as an unprivileged process, thereby lessening the impact of some undiscovered denial of service or root compromise. The ACLs can cover protected ports, raw sockets, and packet sockets.

Changes: Updated for kernel v2.4.17.
tags | denial of service, kernel, root, patch
systems | linux, unix
SHA-256 | f3044650b989aa1622fafd25fa767ae735ae483fc9ca789e7def51b67bbbaae1
pspa-2.4.16-13.gz
Posted Dec 9, 2001
Site original.killa.net

The Linux Port/Socket Pseudo ACLs project is a patch to the Linux kernel which allows the admin to delegate privileges for some protected network resources to non-root users. The ACLs are generally used to run untrusted or insecure applications as an unprivileged process, thereby lessening the impact of some undiscovered denial of service or root compromise. The ACLs can cover protected ports, raw sockets, and packet sockets.

Changes: Updated for kernel v2.4.16.
tags | denial of service, kernel, root, patch
systems | linux, unix
SHA-256 | 950455aeab7a3af1e443d3eb59ad11313f0c8ea6f0e1697d331be54a85c40605
pspa-2.4.15-12.tar.gz
Posted Nov 24, 2001
Site original.killa.net

The Linux Port/Socket Pseudo ACLs project is a patch to the Linux kernel which allows the admin to delegate privileges for some protected network resources to non-root users. The ACLs are generally used to run untrusted or insecure applications as an unprivileged process, thereby lessening the impact of some undiscovered denial of service or root compromise. The ACLs can cover protected ports, raw sockets, and packet sockets.

Changes: Updated for kernel v2.4.15.
tags | denial of service, kernel, root, patch
systems | linux, unix
SHA-256 | fa1ad43fadf54a769b2370a50d8d29243ac7c710c4d53a67279b3fca599d425a
pspa-2.2.20-14.tar.gz
Posted Nov 6, 2001
Site original.killa.net

The Linux Port/Socket Pseudo ACLs project is a patch to the Linux kernel which allows the admin to delegate privileges for some protected network resources to non-root users. The ACLs are generally used to run untrusted or insecure applications as an unprivileged process, thereby lessening the impact of some undiscovered denial of service or root compromise. The ACLs can cover protected ports, raw sockets, and packet sockets.

Changes: Updated for kernel v2.2.20.
tags | denial of service, kernel, root, patch
systems | linux, unix
SHA-256 | 74f541ebcfbcbfb32968d1b03e66685c04d902f786a780492eb07f47cdd69604
pspa-2.4.13-10.tar.gz
Posted Oct 26, 2001
Site original.killa.net

The Linux Port/Socket Pseudo ACLs project is a patch to Linux kernel v2.4 which allows the admin to delegate privileges for some protected network resources to non-root users. The ACLs are generally used to run untrusted or insecure applications as an unprivileged process, thereby lessening the impact of some undiscovered denial of service or root compromise. The ACLs can cover protected ports, raw sockets, and packet sockets.

Changes: Ported to kernel v2.4.13.
tags | denial of service, kernel, root, patch
systems | linux, unix
SHA-256 | 1605e648558e2e30d762b0fc7cb12304dfe3c9d95b5720e51d6f33615c99cf17
hap-linux-2.2.19-4.diff
Posted Oct 20, 2001
Site doutlets.com

HAP-Linux is a collection of security related patches which are designed to be applied after Solar Designers Openwall patches are installed. Changes include some extra information in the printks, and the ability to allow hard links to files you don't own which are in your group, and the ability to follow links & pipes in +t directories if they are not world-writable. This is useful for getting various daemons to run chrooted as a non-root user, and some secure drop- directory stuff.

Changes: Based on hap-linux-2.2.19-3.diff.gz which fixes the possible local root vulnerability discovered recently in kernel v2.2.19.
tags | root, patch
systems | linux, unix
SHA-256 | 0606ce0041917ab33a0b71bce0ad1540aa2deb46952477f11f0692d76c5afc46
pspa-2.4.10-9.tar.gz
Posted Sep 27, 2001
Site original.killa.net

The Linux Port/Socket Pseudo ACLs project is a patch to Linux kernel v2.4 which allows the admin to delegate privileges for some protected network resources to non-root users. The ACLs are generally used to run untrusted or insecure applications as an unprivileged process, thereby lessening the impact of some undiscovered denial of service or root compromise. The ACLs can cover protected ports, raw sockets, and packet sockets.

Changes: Ported to kernel v2.4.10, some bugs were fixed, and a "make config" warning when packet socket is modular has been added.
tags | denial of service, kernel, root, patch
systems | linux, unix
SHA-256 | a73ebf143d0739e1eb292453bf559c1f9cdec32058f30c2394eb8715caa2e556
pspa-2.4.9-6.tar.gz
Posted Aug 17, 2001
Site original.killa.net

The Linux Port/Socket Pseudo ACLs project is a patch to Linux kernel v2.4 which allows the admin to delegate privileges for some protected network resources to non-root users. The ACLs are generally used to run untrusted or insecure applications as an unprivileged process, thereby lessening the impact of some undiscovered denial of service or root compromise. The ACLs can cover protected ports, raw sockets, and packet sockets.

Changes: Kernel 2.4.9 is supported.
tags | denial of service, kernel, root, patch
systems | linux, unix
SHA-256 | ed2f336ad923cb7fcd422234d333896b85061056cacad39281932db7bbbd3801
tcsh-bofh-6.10-0.0.1.tar.gz
Posted May 30, 2001
Authored by EF | Site ccitt5.net

Tcsh-bofh is a patch to provide true BOFH log functions to tcsh 6.10. Features the ability to log all commands to syslog.

Changes: Loglevel and logfacility configurable through --with-bofh-loglevel and --with-bofh-logfacility. split-userlog utility included to split the generated logfile into $USERNAME.log files for each user.
tags | overflow, patch
systems | unix
SHA-256 | 9a430fbdd06f07dddf076ade9186d519ba356273ad7bdb3d82ea6e4f6ab4ff3d
bash-bofh-2.05-0.0.1.tar.gz
Posted May 30, 2001
Authored by EF | Site ccitt5.net

Bash-bofh is a patch to provide true BOFH log functions to bash 2.05. Features the ability to log all commands to syslog.

Changes: Loglevel and logfacility configurable through --with-bofh-loglevel and --with-bofh-logfacility. split-userlog utility included to split the generated logfile into $USERNAME.log files for each user.
tags | overflow, patch, bash
systems | unix
SHA-256 | 88fadfee33ae4d400518edde9f3e7d4ecc31a9e24905944ada156fc4cfdf76d4
hap-linux-2.2.19-3.diff.gz
Posted May 8, 2001
Site doutlets.com

HAP-Linux is a collection of security related patches which are designed to be applied after Solar Designers Openwall patches are installed. Changes include some extra information in the printks, and the ability to allow hard links to files you don't own which are in your group, and the ability to follow links & pipes in +t directories iff they are not world-writable. This is useful for getting various daemons to run chrooted as a non-root user, and some secure drop- directory stuff.

Changes: A fix for a compile bug on non-x86 platforms, and a fix for weakening hardlink restrictions when CONFIG_SECURE_NOTSOMUCH is enabled.
tags | root, patch
systems | linux, unix
SHA-256 | 8afc8f239df57d7e59887fc1c7a662a5e5cd9b87c22db29ea11bae50881dc1ce
openssh-2.5.2p2+SecurID_v1.patch.gz
Posted Apr 25, 2001
Site omniti.com

This patch integrates SecurID authentication services directly into the OpenSSH daemon, allowing users to use SecurID tokens directly as their passwords instead of relying on the clunky sdshell.

Changes: This release includes fixes for next token handling code. The patch is for OpenSSH 2.5.2p2.
tags | patch
systems | unix
SHA-256 | 8c85de6b8d937a46c60b6fad37711f51d73f43cd096bed407e03d37ddd76ffe9
MSEC.single-user.patch.pkg.sit
Posted Apr 25, 2001
Authored by Marukka Der Inhaber | Site msec.net

The MSEC single-user patch disables the ability to boot into single-user mode under OS X. If this patch is not applied then anyone with physical access to the Mac OS X machine can gain root access easily by holding down the command and s keys at startup. The patch disables this by installing a modified version of /sbin/mach_init. The patch does NOT backup the insecure version of /sbin/mach_init so if for some strange reason you want to revert to the insecure copy of mach_init you must restore that file from your own backups. If you have any questions check our website at http://www.msec.net or email support@msec.net.

tags | web, root, patch
systems | unix, apple, osx
SHA-256 | 608ab66a3bdace92d180a2bce3e621367db4fbed4a386c2c3d85293c863151af
linux-2.2.19-sf1.tar.gz
Posted Apr 17, 2001
Authored by Andi | Site segfault.net

Linux Kernel Patch from the segfault.net project - This patch for kernel v2.2.19 allows you to specify GID's which are allowed to bind to each interface. This patch could be very useful for shell providers or admins who wants to restrict the using of more interfaces.

tags | shell, kernel, patch
systems | linux, unix
SHA-256 | 0ab604f42e9c8656bf07b1286bd56f0d7f1d756a9d7ffda62764507085a0e115
Page 3 of 5
Back12345Next

Top Authors In Last 30 Days

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close