* Enable CONFIG_TULIP_MMIO on hppa. (closes: #332962)
svn path=/dists/etch/linux-2.6/; revision=8387
This commit is contained in:
parent
a06bf84ce1
commit
b905d5d061
|
@ -309,7 +309,7 @@ CONFIG_NET_TULIP=y
|
||||||
# CONFIG_DE2104X is not set
|
# CONFIG_DE2104X is not set
|
||||||
CONFIG_TULIP=m
|
CONFIG_TULIP=m
|
||||||
# CONFIG_TULIP_MWI is not set
|
# CONFIG_TULIP_MWI is not set
|
||||||
# CONFIG_TULIP_MMIO is not set
|
CONFIG_TULIP_MMIO=y
|
||||||
# CONFIG_DE4X5 is not set
|
# CONFIG_DE4X5 is not set
|
||||||
# CONFIG_WINBOND_840 is not set
|
# CONFIG_WINBOND_840 is not set
|
||||||
# CONFIG_DM9102 is not set
|
# CONFIG_DM9102 is not set
|
||||||
|
|
|
@ -40,8 +40,9 @@ linux-2.6 (2.6.18.dfsg.1-12) UNRELEASED; urgency=low
|
||||||
[SECURITY] Fix kernel memory leak vulnerability in
|
[SECURITY] Fix kernel memory leak vulnerability in
|
||||||
ipv6_getsockopt_sticky() which can be triggered by passing a len < 0.
|
ipv6_getsockopt_sticky() which can be triggered by passing a len < 0.
|
||||||
See CVE-2007-1000
|
See CVE-2007-1000
|
||||||
|
* Enable CONFIG_TULIP_MMIO on hppa. (closes: #332962)
|
||||||
|
|
||||||
-- dann frazier <dannf@debian.org> Thu, 22 Mar 2007 10:31:41 -0600
|
-- dann frazier <dannf@debian.org> Thu, 22 Mar 2007 13:03:16 -0600
|
||||||
|
|
||||||
linux-2.6 (2.6.18.dfsg.1-11) unstable; urgency=low
|
linux-2.6 (2.6.18.dfsg.1-11) unstable; urgency=low
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue