WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] xen-3.0-testing

To: xen-devel@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-devel] xen-3.0-testing
From: "Shaun" <mailinglists@xxxxxxxxxxxxxxxx>
Date: Mon, 11 Sep 2006 23:47:20 -0700
Delivery-date: Tue, 12 Sep 2006 01:20:02 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
I Posted this to xen.user but nobody responded, figured it's better to ask 
this in the devel section...

I noticed that xen-3.0-testing was using kernel 2.6.16.13.  Does
the -testing tree apply patches to patch against vulnerabilitys found in
this kernel version?

List of Kernel Advisores:
http://secunia.com/product/2719/?task=advisories_2006

Privilege escalation fixed in 2.6.17.10 http://secunia.com/advisories/21515/
Privilege escalation fixed in 2.6.17.5 http://secunia.com/advisories/21041/
Privilege escalation fixed in 2.6.17.4 http://secunia.com/advisories/20953/
Exposure of sensitive information fixed in 2.6.17.1
http://secunia.com/advisories/20703/

-- 

~Shaun 




_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

<Prev in Thread] Current Thread [Next in Thread>