Quoting "Roman Vesely" <email@example.com>:
>> Subject: More Kernels for Debian
>> From: firstname.lastname@example.org
>> Date: Mon, 01 Jun 2009 15:01:59 +0100
>> Hi all,
>> Having had a look at the access logs for kernels.bristolwireless.net
>> I have noticed that half the downloads of the kernels I've put there
>> are coming from the mail archive. So I'm announcing the latest
>> release here too. If anyone objects to me announcing these releases
>> here do let me know. I may well stop announcing here anyway, in which
>> case I should still be dropping kernels for Debian Lenny in to
>> kernels.bristolwireless.net in any case. I'll do it as soon as I
>> notice a new patch. Here are the latest:
> Hi Ben,
> I thank you for creating packages debian-vserver.
> We use it without problem on several production servers.
> Planning the basic security support?
> Specifically, I mean this bug:
> and this patch:
> (sorry for my bad English)
Yes I'll patch it. In general though, I'll just be maintaining this
kernel for the purposes of testing Linux-Vserver, and will probably
only make security related patches for problems I am directly affected
by. This is a special case as it affects pretty much everyone it
seems, and it would be foolish to continue providing kernels that
weren't patched for this vulnerability.
Please remember that source packages are also provided, so it's very
easy to roll your own.
The latest in the series of kernels is 126.96.36.199, so they are the ones
I'll apply the patch to when I re-roll.
The kernels are now kept in a repository, see
http://kernels.bristolwireless.net for details. The package is
currently at version 0.1, and will be bumped to 0.2 when I re-roll
sometime over the next day or two. I'll let the list know if I decide
to version this differently. Many thanks for the links.
From Ben Green
Received on Mon Aug 17 17:50:20 2009