mirror of
git://slackware.nl/current.git
synced 2024-12-28 09:59:53 +01:00
2d09b7457a
a/kernel-generic-5.4.6-x86_64-2.txz: Rebuilt. a/kernel-huge-5.4.6-x86_64-2.txz: Rebuilt. a/kernel-modules-5.4.6-x86_64-2.txz: Rebuilt. ap/vim-8.2.0050-x86_64-1.txz: Upgraded. d/kernel-headers-5.4.6-x86-2.txz: Rebuilt. k/kernel-source-5.4.6-noarch-2.txz: Rebuilt. Apparently MODULE_SIG was enabled by SECURITY_LOCKDOWN_LSM. We'll turn both of those off to avoid needlessly tainting the kernel. -LOCK_DOWN_KERNEL_FORCE_CONFIDENTIALITY n -LOCK_DOWN_KERNEL_FORCE_INTEGRITY n -LOCK_DOWN_KERNEL_FORCE_NONE y -MODULE_SIG_ALL n -MODULE_SIG_FORCE n -MODULE_SIG_FORMAT y -MODULE_SIG_HASH "sha256" -MODULE_SIG_KEY "certs/signing_key.pem" -MODULE_SIG_SHA1 n -MODULE_SIG_SHA224 n -MODULE_SIG_SHA256 y -MODULE_SIG_SHA384 n -MODULE_SIG_SHA512 n -SECURITY_LOCKDOWN_LSM_EARLY y MODULE_SIG y -> n SECURITY_LOCKDOWN_LSM y -> n l/imagemagick-7.0.9_12-x86_64-1.txz: Upgraded. l/libcap-2.29-x86_64-1.txz: Upgraded. xap/vim-gvim-8.2.0050-x86_64-1.txz: Upgraded. isolinux/initrd.img: Rebuilt. kernels/*: Rebuilt. usb-and-pxe-installers/usbboot.img: Rebuilt. |
||
---|---|---|
.. | ||
capfaq-0.2.txt | ||
libcap-2.25.tar.sign | ||
libcap.golang.install.source.path.diff | ||
libcap.SlackBuild | ||
libcap.url | ||
README.SLACKWARE | ||
slack-desc |
This file contains some links to additional sources of documentation available on libcap usage. POSIX 1e and 2c drafts: http://wt.xpilot.org/publications/posix.1e/download.html Olaf Kirch's article: http://www.lst.de/~okir/blackhats/node125.html Serge E. Hallyn' article: POSIX file capabilities: Parceling the power of root http://www.ibm.com/developerworks/linux/library/l-posixcap.html?ca=dgr-lnxw06LinuxPOSIX Active development of libcap v2 is in filesystem capabilities, see: http://www.kernel.org/pub/linux/libs/security/linux-privs/README