Hi Dann,
Op vrijdag 26 september 2014 22:02:35 schreef dann frazier:
> hey,
> I've been unable to find time to work on kernel security updates for
> some time now and - since I don't see that changing - it is time I
> officially retire from the team. DSA, please remove me from the
> appropriate g
t yet been
backported. Would it make sense to do that?
--
Thijs Kinkhorst – LIS Unix
Universiteit van Tilburg – Library and IT Services • Postbus 90153, 5000 LE
Bezoekadres > Warandelaan 2 • Tel. 013 466 3035 • G 236 • http://www.uvt.nl
signature.asc
Description: This is a digitally s
Hi,
> > the module was actually completely broken in 2.6.32 if
> > CONFIG_CRYPTO_FIPS=y (which it is in Debian packages). However, it
> > also looks like this was fixed in 2.6.32.19, which is incorporated in
> > the source for the current package.
> fyi, 2.6.32-12 & 2.6.32-29 w/ CONFIG_CRYPTO_AE
On tiisdei 9 Juny 2009, Ben Hutchings wrote:
> Package: linux-2.6
> Version: 2.6.29-5
> Severity: critical
> Tags: security patch
>
> Some or all NICs supported by r8169 seem to ignore the buffer sizes in
> RX descriptors, and will write up to the global maximum frame size.
> This means a remote at
reassign 420241 quota
found 3.14-7
closed 3.15-4
thanks
> Edquota segfaults, quota command results:
>
> # quota -u 1500
> quota: error while getting quota from /dev/sda7 for #1500 (id 1500):
> Success
Bastian Blank wrote:
> Fixed in 2.6.20, not fixed in 2.6.18.
I'm afraid this is not right. I g
5 matches
Mail list logo