Subject: Debian kernel - security update?
From: Roman Vesely <roman@liten.cz>
Date: Mon, 17 Aug 2009 09:36:35 +0200

> Subject: More Kernels for Debian 
> From: ben@bristolwireless.net 
> Date: Mon, 01 Jun 2009 15:01:59 +0100 
> Hi all,
> 
> Having had a look at the access logs for kernels.bristolwireless.net
> I have noticed that half the downloads of the kernels I've put there
> are coming from the mail archive. So I'm announcing the latest
> release here too. If anyone objects to me announcing these releases
> here do let me know. I may well stop announcing here anyway, in which
> case  I should still be dropping kernels for Debian Lenny in to  
> kernels.bristolwireless.net in any case. I'll do it as soon as I  
> notice a new patch. Here are the latest:
> 
> http://kernels.bristolwireless.net/i386/linux-image-2.6.29.4-vs2.3.0.36.14-beng_0.1_i386.deb
> http://kernels.bristolwireless.net/amd64/linux-image-2.6.29.4-vs2.3.0.36.14-beng_0.1_amd64.deb


Hi Ben,

I thank you for creating packages debian-vserver.
We use it without problem on several production servers.
Planning the basic security support?

Specifically, I mean this bug:
http://blog.cr0.org/2009/08/linux-null-pointer-dereference-due-to.html
and this patch:
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=e694958388c50148389b0e9b9e9e8945cf0f1b98

Thanks,

Roman

(sorry for my bad English)