Release Notes: This revision adds a fix for the "parent process death signal" vulnerability in the Linux kernel. It also adds two security hardening features, both enabled by default: restricted access to VM86 mode (specific to 32-bit x86) and restricted zero page mappings (generic).
Release Notes: This release was updated to Linux 2.4.35.
Release Notes: This release was updated to Linux 2.4.34. Minor documentation updates have been made.
Release Notes: This release was updated to Linux 2.4.30.
Release Notes: This release was updated to Linux 2.4.28, which fixed a number of security-related bugs with the ELF loader, Unix domain sockets, and smbfs support. While the confirmed impact of these is limited to reading +s-r binaries and crashing systems, there is a potential for a root compromise by a local user or by a malicious/compromised smbfs server.
Release Notes: This update fixes multiple security-related bugs in the Linux kernel: Al Viro's "Sparse" bugs, fsave/frstor local DoS on x86, infoleak in the e1000 driver, and some others. It also fixes two non-security bugs in the patch itself.
Release Notes: Fixes for two recently discovered Linux kernel vulnerabilities have been added. One of the vulnerabilities allows for dumping the contents of unreadable SUID/SGID programs, the other gives users read access to the environment of SUID/SGID programs they run.
Release Notes: This version improves the "lcall" DoS fix for NT (Nested Task) flag attack.
Release Notes: This release has been updated to use with Linux 2.2.21. Certain permissions on /proc entries have been changed to be consistent with Linux 2.4.18-ow0, and the getcwd(2) instance of the d_path() truncation problem and the fsuid/fsgid handling inconsistency have been fixed.
Release Notes: This version of the patch fixes an x86-specific Linux kernel vulnerability where local users could abuse a binary compatibility interface (lcall) to kill processes not belonging to them (including system processes).