Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751468AbVLEVF1 (ORCPT ); Mon, 5 Dec 2005 16:05:27 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1751470AbVLEVF1 (ORCPT ); Mon, 5 Dec 2005 16:05:27 -0500 Received: from mail.enyo.de ([212.9.189.167]:12697 "EHLO mail.enyo.de") by vger.kernel.org with ESMTP id S1751468AbVLEVF0 (ORCPT ); Mon, 5 Dec 2005 16:05:26 -0500 From: Florian Weimer To: Lee Revell Cc: Matthias Andree , linux-kernel@vger.kernel.org Subject: Re: RFC: Starting a stable kernel series off the 2.6 kernel References: <20051203135608.GJ31395@stusta.de> <1133620264.2171.14.camel@localhost.localdomain> <20051203193538.GM31395@stusta.de> <1133639835.16836.24.camel@mindpipe> <20051203225815.GH25722@merlin.emma.line.org> <1133653782.19768.1.camel@mindpipe> Date: Mon, 05 Dec 2005 22:05:21 +0100 In-Reply-To: <1133653782.19768.1.camel@mindpipe> (Lee Revell's message of "Sat, 03 Dec 2005 18:49:41 -0500") Message-ID: <87u0dn5k6m.fsf@mid.deneb.enyo.de> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 783 Lines: 18 * Lee Revell: >> The point that just escaped you as the motivation for this thread was >> the availability of security (or other critical) fixes for older >> kernels. It would all be fine if, say, the fix for CVE-2004-2492 were >> available for those who find 2.6.8 works for them (the fix went into >> 2.6.14 BTW), and the concern is the development model isn't fit to >> accomodate needs like this. >> > > If you want security fixes backported then you can get a distro kernel. And these distro kernels appear magically from nowhere? - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/