From mboxrd@z Thu Jan 1 00:00:00 1970 From: "Shaun" Subject: xen-3.0-testing Date: Mon, 11 Sep 2006 23:47:20 -0700 Message-ID: Return-path: List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xensource.com Errors-To: xen-devel-bounces@lists.xensource.com To: xen-devel@lists.xensource.com List-Id: xen-devel@lists.xenproject.org I Posted this to xen.user but nobody responded, figured it's better to ask this in the devel section... I noticed that xen-3.0-testing was using kernel 2.6.16.13. Does the -testing tree apply patches to patch against vulnerabilitys found in this kernel version? List of Kernel Advisores: http://secunia.com/product/2719/?task=advisories_2006 Privilege escalation fixed in 2.6.17.10 http://secunia.com/advisories/21515/ Privilege escalation fixed in 2.6.17.5 http://secunia.com/advisories/21041/ Privilege escalation fixed in 2.6.17.4 http://secunia.com/advisories/20953/ Exposure of sensitive information fixed in 2.6.17.1 http://secunia.com/advisories/20703/ -- ~Shaun