WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-users

[Xen-users] xen-3.0-testing kernel?

To: xen-users@xxxxxxxxxxxxxxxxxxx
Subject: [Xen-users] xen-3.0-testing kernel?
From: "Shaun" <mailinglists@xxxxxxxxxxxxxxxx>
Date: Mon, 11 Sep 2006 14:35:14 -0700
Delivery-date: Mon, 11 Sep 2006 14:38:22 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
List-help: <mailto:xen-users-request@lists.xensource.com?subject=help>
List-id: Xen user discussion <xen-users.lists.xensource.com>
List-post: <mailto:xen-users@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-users>, <mailto:xen-users-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-users-bounces@xxxxxxxxxxxxxxxxxxx
I noticed that xen-3.0-testing was using kernel 2.6.16.13.  Does 
the -testing tree apply patches to patch against vulnerabilitys found in 
this kernel version?

List of Kernel Advisores: 
http://secunia.com/product/2719/?task=advisories_2006

Privilege escalation fixed in 2.6.17.10 http://secunia.com/advisories/21515/
Privilege escalation fixed in 2.6.17.5 http://secunia.com/advisories/21041/
Privilege escalation fixed in 2.6.17.4 http://secunia.com/advisories/20953/
Exposure of sensitive information fixed in 2.6.17.1 
http://secunia.com/advisories/20703/



-- 

~Shaun 




_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users

<Prev in Thread] Current Thread [Next in Thread>