lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Sat, 15 Dec 2007 10:08:20 -0800
From:	Greg KH <gregkh@...e.de>
To:	Jan Evert van Grootheest <j.e.van.grootheest@...way.nl>
Cc:	linux-kernel@...r.kernel.org, stable@...nel.org
Subject: Re: [patch 00/60] 2.6.23-stable review

On Sat, Dec 15, 2007 at 05:09:48PM +0100, Jan Evert van Grootheest wrote:
> Greg KH wrote:
>> This is the start of the stable review cycle for the 2.6.23.10 release.
>> There are 60 patches in this series, all will be posted as a response to
>> this one.  If anyone has any issues with these being applied, please let
>> us know.  If anyone is a maintainer of the proper subsystem, and wants
>> to add a Signed-off-by: line to the patch, please respond with it.
>>
>>   
> Hi Greg,
>
> Do you think it might be possible to add the subjects of the patches
> next time in the announcement? This would give people an easy way
> (besides the diffstat) to check what is getting fixed.

The subject of the individual patches are in the email thread that is
attached to this announcement, so it should be quite simple to get this
information by just looking in your mail reader :)

Also, it would be hard to do this, unless someone has a patch to quilt
to provide this kind of information?

thanks,

greg k-h
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ