From mboxrd@z Thu Jan 1 00:00:00 1970 From: Peter =?utf-8?q?M=C3=BCller?= To: development@lists.ipfire.org Subject: Re: [PATCH] prevent kernel address space leak via dmesg or /proc files Date: Mon, 07 Jan 2019 18:04:56 +0100 Message-ID: <040e814d-58ea-b456-b4c3-0667c5882601@link38.eu> In-Reply-To: MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============2361341201070059861==" List-Id: --===============2361341201070059861== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Hello Michael, > Hello, >=20 > I merged this and edited the release number of the setup package. thank you - I am not very sure with handling the release numbers. Glad you fixed this for me. :-) >=20 > For pakfire to recognise changes, the release number (or version number) ha= s to be increased. Since this package does not follow an upstream one, it wou= ld have been only the release. I did that for you. >=20 > Why did we say again this should live in the setup package and not the kern= el? As far as I can recall, we did not. However, this patch contains sysctl parameters, so I guess it makes sens to include them in the sysctl package. Kernel flags, for example, will be patched in the kernel package. Thanks, and best regards, Peter M=C3=BCller >=20 > -Michael > --=20 Microsoft DNS service terminates abnormally when it recieves a response to a DNS query that was never made. Fix Information: Run your DNS service on a different platform. -- bugtraq --===============2361341201070059861==--