Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S261885AbVEPVBN (ORCPT ); Mon, 16 May 2005 17:01:13 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S261876AbVEPU7z (ORCPT ); Mon, 16 May 2005 16:59:55 -0400 Received: from mail.enyo.de ([212.9.189.167]:58783 "EHLO mail.enyo.de") by vger.kernel.org with ESMTP id S261884AbVEPU6R (ORCPT ); Mon, 16 May 2005 16:58:17 -0400 From: Florian Weimer To: Greg KH Cc: linux-kernel@vger.kernel.org Subject: Re: Linux 2.6.11.10 References: <20050516182544.GA9960@kroah.com> Date: Mon, 16 May 2005 22:58:09 +0200 In-Reply-To: <20050516182544.GA9960@kroah.com> (Greg KH's message of "Mon, 16 May 2005 11:25:45 -0700") Message-ID: <87sm0mx50e.fsf@deneb.enyo.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 507 Lines: 12 * Greg KH: > Due to a recently announced security issue with the current kernel, we > (the -stable team) are announcing the release of the 2.6.11.10 kernel. Would it be possible to cross-reference the vulnerabilities in a precise manner, maybe using CVE names? - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/