diff options
author | Kees Cook <kees@debian.org> | 2008-11-17 19:51:38 +0000 |
---|---|---|
committer | Kees Cook <kees@debian.org> | 2008-11-17 19:51:38 +0000 |
commit | 213ccdce13dc4c33d2d63383360aa2da3ae72645 (patch) | |
tree | 0f7b9adcae49d043998bc9f0b57a7861c0935e88 | |
parent | 705508933748602f044a883babe7597e7d244cf5 (diff) |
ubuntu updates
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1264 e094ebfe-e918-0410-adfb-c712417f3574
52 files changed, 229 insertions, 194 deletions
diff --git a/active/00boilerplate b/active/00boilerplate index 2c940489..0aa14288 100644 --- a/active/00boilerplate +++ b/active/00boilerplate @@ -10,6 +10,6 @@ linux-2.6: 2.6.24-etch-security: 2.6.26-lenny-security: 2.6.15-dapper-security: -2.6.20-feisty-security: 2.6.22-gutsy-security: 2.6.24-hardy-security: +2.6.27-intrepid-security: diff --git a/active/CVE-2007-5907 b/active/CVE-2007-5907 index 42676aa3..3a6081c2 100644 --- a/active/CVE-2007-5907 +++ b/active/CVE-2007-5907 @@ -3,13 +3,14 @@ Description: References: Ubuntu-Description: Notes: + kees> this is a hypervisor-only issue, and doesn't touch the kernel, AFAICT Bugs: upstream: linux-2.6: 2.6.18-etch-security: needed 2.6.24-etch-security: N/A 2.6.26-lenny-security: N/A -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: N/A +2.6.22-gutsy-security: N/A +2.6.24-hardy-security: N/A +2.6.27-intrepid-security: N/A diff --git a/active/CVE-2007-6282 b/active/CVE-2007-6282 index 9bae0a05..e7129f60 100644 --- a/active/CVE-2007-6282 +++ b/active/CVE-2007-6282 @@ -13,7 +13,7 @@ linux-2.6: 2.6.18-etch-security: released (2.6.18.dfsg.1-22etch1) [bugfix/esp-iv-in-linear-part-of-skb.patch] 2.6.24-etch-security: released (2.6.24-6~etchnhalf.4) [bugfix/esp-iv-in-linear-part-of-skb.patch] 2.6.26-lenny-security: N/A -2.6.15-dapper-security: pending -2.6.20-feisty-security: pending -2.6.22-gutsy-security: pending -2.6.24-hardy-security: pending +2.6.15-dapper-security: released (2.6.15-52.69) +2.6.20-feisty-security: released (2.6.20-17.37) +2.6.22-gutsy-security: released (2.6.22-15.56) +2.6.24-hardy-security: released (2.6.24-19.36) diff --git a/active/CVE-2007-6514 b/active/CVE-2007-6514 index b0677296..4f3fced7 100644 --- a/active/CVE-2007-6514 +++ b/active/CVE-2007-6514 @@ -10,8 +10,8 @@ linux-2.6: 2.6.18-etch-security: ignored "no upstream fix" 2.6.24-etch-security: ignored "no upstream fix" 2.6.26-lenny-security: ignored "no upstream fix" -2.6.15-dapper-security: +2.6.15-dapper-security: ignored "no upstream fix" 2.6.17-edgy-security: ignored (EOL) -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.20-feisty-security: ignored (EOL) +2.6.22-gutsy-security: ignored "no upstream fix" +2.6.24-hardy-security: ignored "no upstream fix" diff --git a/active/CVE-2007-6716 b/active/CVE-2007-6716 index 6c22ea27..bbb28939 100644 --- a/active/CVE-2007-6716 +++ b/active/CVE-2007-6716 @@ -18,7 +18,7 @@ linux-2.6: released (2.6.23-1) 2.6.18-etch-security: released (2.6.18.dfsg.1-22etch3) [bugfix/dio-zero-struct-dio-with-kzalloc-instead-of-manually.patch] 2.6.24-etch-security: N/A 2.6.26-lenny-security: N/A -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: released (2.6.15-52.73) +2.6.20-feisty-security: ignored (EOL) +2.6.22-gutsy-security: released (2.6.22-15.59) +2.6.24-hardy-security: N/A diff --git a/active/CVE-2008-0598 b/active/CVE-2008-0598 index c17cb43c..8793afc6 100644 --- a/active/CVE-2008-0598 +++ b/active/CVE-2008-0598 @@ -12,7 +12,7 @@ linux-2.6: released (2.6.26-4) [bugfix/x86-add-copy_user_handle_tail.patch, bugf 2.6.18-etch-security: released (2.6.18.dfsg.1-22etch2) [bugfix/x86-add-copy_user_handle_tail.patch, bugfix/x86-fix-copy_user.patch, bugfix/x86-wrong-register-was-used-in-align-macro.patch] 2.6.24-etch-security: released (2.6.24-6~etchnhalf.5) [bugfix/x86-add-copy_user_handle_tail.patch, bugfix/x86-fix-copy_user.patch, bugfix/x86-wrong-register-was-used-in-align-macro.patch] 2.6.26-lenny-security: released (2.6.26-4) [bugfix/x86-add-copy_user_handle_tail.patch, bugfix/x86-fix-copy_user.patch] -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: released (2.6.15-52.69) +2.6.20-feisty-security: N/A +2.6.22-gutsy-security: N/A +2.6.24-hardy-security: N/A diff --git a/active/CVE-2008-1514 b/active/CVE-2008-1514 index 7e30e4a7..8bf5ea58 100644 --- a/active/CVE-2008-1514 +++ b/active/CVE-2008-1514 @@ -13,7 +13,7 @@ linux-2.6: released (2.6.26-8) [bugfix/s390/prevent-ptrace-padding-area-read-wri 2.6.18-etch-security: released (2.6.18.dfsg.1-22etch3) [bugfix/prevent-ptrace-padding-area-readwrite-in-32bit-mode.patch] 2.6.24-etch-security: released (2.6.24-6~etchnhalf.6) [bugfix/prevent-ptrace-padding-area-readwrite-in-32bit-mode.patch] 2.6.26-lenny-security: released (2.6.26-8) [bugfix/s390/prevent-ptrace-padding-area-read-write-in-31-bit-mode.patch] -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: ignored (s390 only) +2.6.20-feisty-security: ignored (s390 only) +2.6.22-gutsy-security: ignored (s390 only) +2.6.24-hardy-security: ignored (s390 only) diff --git a/active/CVE-2008-1673 b/active/CVE-2008-1673 index c1a507cc..7018c964 100644 --- a/active/CVE-2008-1673 +++ b/active/CVE-2008-1673 @@ -18,7 +18,7 @@ linux-2.6: 2.6.18-etch-security: released (2.6.18.dfsg.1-22etch2) [bugfix/asn1-ber-decoding-checks.patch, bugfix/cifs-fix-compiler-warning.patch, bugfix/netfilter-nf_nat_snmp_basic-fix-range-check.patch] 2.6.24-etch-security: released (2.6.24-6~etchnhalf.5) [bugfix/asn1-ber-decoding-checks.patch, bugfix/cifs-fix-compiler-warning.patch, bugfix/netfilter-nf_nat_snmp_basic-fix-range-check.patch] 2.6.26-lenny-security: N/A -2.6.15-dapper-security: pending -2.6.20-feisty-security: pending -2.6.22-gutsy-security: pending -2.6.24-hardy-security: pending +2.6.15-dapper-security: released (2.6.15-52.69) +2.6.20-feisty-security: released (2.6.20-17.37) +2.6.22-gutsy-security: released (2.6.22-15.56) +2.6.24-hardy-security: released (2.6.24-19.36) diff --git a/active/CVE-2008-2136 b/active/CVE-2008-2136 index 51946f10..6639aef8 100644 --- a/active/CVE-2008-2136 +++ b/active/CVE-2008-2136 @@ -10,7 +10,7 @@ linux-2.6: 2.6.18-etch-security: released (2.6.18.dfsg.1-18etch5) [bugfix/sit-missing-kfree_skb-on-pskb_may_pull.patch] 2.6.24-etch-security: released (2.6.24-6~etchnhalf.3) [bugfix/sit-missing-kfree_skb-on-pskb_may_pull.patch] 2.6.26-lenny-security: N/A -2.6.15-dapper-security: pending -2.6.20-feisty-security: pending -2.6.22-gutsy-security: pending -2.6.24-hardy-security: pending +2.6.15-dapper-security: released (2.6.15-52.69) +2.6.20-feisty-security: released (2.6.20-17.37) +2.6.22-gutsy-security: released (2.6.22-15.56) +2.6.24-hardy-security: released (2.6.24-19.36) diff --git a/active/CVE-2008-2137 b/active/CVE-2008-2137 index efda341b..aaa18fde 100644 --- a/active/CVE-2008-2137 +++ b/active/CVE-2008-2137 @@ -9,7 +9,7 @@ linux-2.6: 2.6.18-etch-security: released (2.6.18.dfsg.1-18etch5) [bugfix/sparc-fix-mmap-va-span-checking.patch, bugfix/sparc-fix-mremap-addr-range-validation.patch] 2.6.24-etch-security: released (2.6.24-6~etchnhalf.3) [bugfix/sparc-fix-mmap-va-span-checking.patch, bugfix/sparc-fix-mremap-addr-range-validation.patch] 2.6.26-lenny-security: N/A -2.6.15-dapper-security: pending -2.6.20-feisty-security: pending -2.6.22-gutsy-security: pending -2.6.24-hardy-security: pending +2.6.15-dapper-security: released (2.6.15-52.69) +2.6.20-feisty-security: released (2.6.20-17.37) +2.6.22-gutsy-security: released (2.6.22-15.56) +2.6.24-hardy-security: released (2.6.24-19.36) diff --git a/active/CVE-2008-2148 b/active/CVE-2008-2148 index 0e1b2294..2524c7da 100644 --- a/active/CVE-2008-2148 +++ b/active/CVE-2008-2148 @@ -12,5 +12,5 @@ linux-2.6: 2.6.26-lenny-security: N/A 2.6.15-dapper-security: N/A 2.6.20-feisty-security: N/A -2.6.22-gutsy-security: pending -2.6.24-hardy-security: pending +2.6.22-gutsy-security: released (2.6.22-15.56) +2.6.24-hardy-security: released (2.6.24-19.36) diff --git a/active/CVE-2008-2358 b/active/CVE-2008-2358 index 8c040569..d1a6ad09 100644 --- a/active/CVE-2008-2358 +++ b/active/CVE-2008-2358 @@ -15,6 +15,6 @@ linux-2.6: 2.6.24-etch-security: N/A 2.6.26-lenny-security: N/A 2.6.15-dapper-security: N/A -2.6.20-feisty-security: pending -2.6.22-gutsy-security: pending -2.6.24-hardy-security: pending +2.6.20-feisty-security: released (2.6.20-17.37) +2.6.22-gutsy-security: released (2.6.22-15.56) +2.6.24-hardy-security: released (2.6.24-19.36) diff --git a/active/CVE-2008-2365 b/active/CVE-2008-2365 index 832175c9..540cb161 100644 --- a/active/CVE-2008-2365 +++ b/active/CVE-2008-2365 @@ -14,7 +14,7 @@ linux-2.6: N/A 2.6.18-etch-security: N/A 2.6.24-etch-security: N/A 2.6.26-lenny-security: N/A -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: released (2.6.15-52.69) +2.6.20-feisty-security: N/A +2.6.22-gutsy-security: N/A +2.6.24-hardy-security: N/A diff --git a/active/CVE-2008-2372 b/active/CVE-2008-2372 index 001e1e0b..86f2853b 100644 --- a/active/CVE-2008-2372 +++ b/active/CVE-2008-2372 @@ -10,7 +10,7 @@ linux-2.6: 2.6.18-etch-security: needed "Maybe... 2.6.18 is before zero page was removed" 2.6.24-etch-security: released (2.6.24-6~etchnhalf.4) [bugfix/reinstate-zero_page-optimization-in-get_user_pages-and-fix-xip.patch] 2.6.26-lenny-security: N/A -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: N/A +2.6.20-feisty-security: N/A +2.6.22-gutsy-security: N/A +2.6.24-hardy-security: released (2.6.24-21.43) diff --git a/active/CVE-2008-2729 b/active/CVE-2008-2729 index 27280ac5..d9d9e2a1 100644 --- a/active/CVE-2008-2729 +++ b/active/CVE-2008-2729 @@ -10,7 +10,7 @@ linux-2.6: N/A 2.6.18-etch-security: released (2.6.18.dfsg.1-22etch1) [bugfix/amd64-fix-zeroing-on-exception-in-copy_user.patch] 2.6.24-etch-security: N/A "Fixed upstream before 2.6.24" 2.6.26-lenny-security: N/A -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: released (2.6.15-52.69) +2.6.20-feisty-security: N/A +2.6.22-gutsy-security: N/A +2.6.24-hardy-security: N/A diff --git a/active/CVE-2008-2750 b/active/CVE-2008-2750 index 7e4febb5..a89e59e1 100644 --- a/active/CVE-2008-2750 +++ b/active/CVE-2008-2750 @@ -18,4 +18,4 @@ linux-2.6: released (2.6.26-1) 2.6.15-dapper-security: N/A 2.6.20-feisty-security: N/A 2.6.22-gutsy-security: N/A -2.6.24-hardy-security: pending +2.6.24-hardy-security: released (2.6.24-19.36) diff --git a/active/CVE-2008-2812 b/active/CVE-2008-2812 index f1f91464..299fc6b5 100644 --- a/active/CVE-2008-2812 +++ b/active/CVE-2008-2812 @@ -9,7 +9,8 @@ linux-2.6: released (2.6.25-7) [bugfix/all/stable/2.6.25.10.patch] 2.6.18-etch-security: released (2.6.18.dfsg.1-22etch1) [bugfix/tty-fix-for-tty-operations-bugs.patch] 2.6.24-etch-security: released (2.6.24-6~etchnhalf.4) [bugfix/tty-fix-for-tty-operations-bugs.patch] 2.6.26-lenny-security: N/A -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: released (2.6.15-52.71) +2.6.20-feisty-security: released (2.6.20-17.39) +2.6.22-gutsy-security: released (2.6.22-15.58) +2.6.24-hardy-security: released (2.6.24-19.41) +2.6.27-intrepid-security: needed diff --git a/active/CVE-2008-2826 b/active/CVE-2008-2826 index 1f054922..e76f89bd 100644 --- a/active/CVE-2008-2826 +++ b/active/CVE-2008-2826 @@ -10,7 +10,8 @@ linux-2.6: 2.6.18-etch-security: released (2.6.18.dfsg.1-22etch1) [bugfix/sctp-make-sure-n-sizeof-does-not-overflow.patch] 2.6.24-etch-security: released (2.6.24-6~etchnhalf.4) [bugfix/sctp-make-sure-n-sizeof-does-not-overflow.patch] 2.6.26-lenny-security: N/A -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: released (2.6.15-52.69) +2.6.20-feisty-security: released (2.6.20-17.37) +2.6.22-gutsy-security: released (2.6.22-15.56) +2.6.24-hardy-security: released (2.6.24-19.36) +2.6.27-intrepid-security: N/A diff --git a/active/CVE-2008-2931 b/active/CVE-2008-2931 index 2514148c..4c74abf7 100644 --- a/active/CVE-2008-2931 +++ b/active/CVE-2008-2931 @@ -11,7 +11,8 @@ linux-2.6: N/A 2.6.18-etch-security: released (2.6.18.dfsg.1-22etch1) [bugfix/check-privileges-before-setting-mount-propagation.patch] 2.6.24-etch-security: N/A 2.6.26-lenny-security: N/A -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: released (2.6.15-52.71) +2.6.20-feisty-security: released (2.6.20-17.39) +2.6.22-gutsy-security: N/A +2.6.24-hardy-security: N/A +2.6.27-intrepid-security: N/A diff --git a/active/CVE-2008-2944 b/active/CVE-2008-2944 index 8d1532b5..9fa6deb9 100644 --- a/active/CVE-2008-2944 +++ b/active/CVE-2008-2944 @@ -16,7 +16,8 @@ linux-2.6: 2.6.18-etch-security: N/A "no utrace" 2.6.24-etch-security: N/A "no utrace" 2.6.26-lenny-security: N/A "no utrace" -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: N/A "no utrace" +2.6.20-feisty-security: N/A "no utrace" +2.6.22-gutsy-security: N/A "no utrace" +2.6.24-hardy-security: N/A "no utrace" +2.6.27-intrepid-security: N/A "no utrace" diff --git a/active/CVE-2008-3077 b/active/CVE-2008-3077 index 499c2d0a..ffb748b5 100644 --- a/active/CVE-2008-3077 +++ b/active/CVE-2008-3077 @@ -11,7 +11,8 @@ linux-2.6: N/A 2.6.18-etch-security: N/A 2.6.24-etch-security: N/A 2.6.26-lenny-security: N/A -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: N/A +2.6.20-feisty-security: N/A +2.6.22-gutsy-security: N/A +2.6.24-hardy-security: N/A +2.6.27-intrepid-security: N/A diff --git a/active/CVE-2008-3247 b/active/CVE-2008-3247 index e40be3bf..192e04c9 100644 --- a/active/CVE-2008-3247 +++ b/active/CVE-2008-3247 @@ -3,13 +3,15 @@ Description: References: Ubuntu-Description: Notes: + kees> 2.6.25 only Bugs: upstream: released (2.6.25.11, 2.6.26) linux-2.6: released (2.6.25-7) 2.6.18-etch-security: N/A 2.6.24-etch-security: N/A 2.6.26-lenny-security: N/A -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: N/A +2.6.20-feisty-security: N/A +2.6.22-gutsy-security: N/A +2.6.24-hardy-security: N/A +2.6.27-intrepid-security: N/A diff --git a/active/CVE-2008-3272 b/active/CVE-2008-3272 index cf99c42b..cb8ed113 100644 --- a/active/CVE-2008-3272 +++ b/active/CVE-2008-3272 @@ -9,7 +9,8 @@ linux-2.6: released (2.6.26-2) [bugfix/all/stable/2.6.26.2.patch] 2.6.18-etch-security: released (2.6.18.dfsg.1-22etch2) [bugfix/sound-ensure-device-number-is-valid-in-snd_seq_oss_synth_make_info.patch] 2.6.24-etch-security: released (2.6.24-6~etchnhalf.5) [bugfix/sound-ensure-device-number-is-valid-in-snd_seq_oss_synth_make_info.patch] 2.6.26-lenny-security: released (2.6.26-2) [bugfix/all/stable/2.6.26.2.patch] -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: released (2.6.15-52.71) +2.6.20-feisty-security: released (2.6.20-17.39) +2.6.22-gutsy-security: released (2.6.22-15.58) +2.6.24-hardy-security: released (2.6.24-19.41) +2.6.27-intrepid-security: released (2.6.27-2.3) diff --git a/active/CVE-2008-3275 b/active/CVE-2008-3275 index 202eb40d..3ea36c5e 100644 --- a/active/CVE-2008-3275 +++ b/active/CVE-2008-3275 @@ -9,7 +9,8 @@ linux-2.6: 2.6.18-etch-security: released (2.6.18.dfsg.1-22etch2) [bugfix/vfs-fix-lookup-on-deleted-directory.patch] 2.6.24-etch-security: released (2.6.24-6~etchnhalf.5) [bugfix/vfs-fix-lookup-on-deleted-directory.patch] 2.6.26-lenny-security: released (2.6.26-2) [bugfix/all/stable/2.6.26.2.patch] -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: released (2.6.15-52.71) +2.6.20-feisty-security: released (2.6.20-17.39) +2.6.22-gutsy-security: released (2.6.22-15.58) +2.6.24-hardy-security: released (2.6.24-19.41) +2.6.27-intrepid-security: released (2.6.27-2.3) diff --git a/active/CVE-2008-3276 b/active/CVE-2008-3276 index 6a5830b3..27b17271 100644 --- a/active/CVE-2008-3276 +++ b/active/CVE-2008-3276 @@ -10,7 +10,8 @@ linux-2.6: released (2.6.26-4) 2.6.18-etch-security: released (2.6.18.dfsg.1-22etch3) [bugfix/dccp-change-l-r-must-have-at-least-one-byte-in-the-dccpsf_val-field.patch] 2.6.24-etch-security: released (2.6.24-6~etchnhalf.5) [bugfix/dccp-change-l-r-must-have-at-least-one-byte-in-the-dccpsf_val-field.patch] 2.6.26-lenny-security: released (2.6.26-4) [bugfix/all/stable/2.6.26.3.patch] -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: N/A +2.6.20-feisty-security: N/A +2.6.22-gutsy-security: released (2.6.22-15.59) +2.6.24-hardy-security: released (2.6.24-21.43) +2.6.27-intrepid-security: N/A diff --git a/active/CVE-2008-3496 b/active/CVE-2008-3496 index 204ba922..b7ce208a 100644 --- a/active/CVE-2008-3496 +++ b/active/CVE-2008-3496 @@ -9,7 +9,8 @@ linux-2.6: released (2.6.26.1) 2.6.18-etch-security: N/A 2.6.24-etch-security: N/A 2.6.26-lenny-security: released (2.6.26-2) -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: N/A +2.6.20-feisty-security: N/A +2.6.22-gutsy-security: N/A +2.6.24-hardy-security: N/A +2.6.27-intrepid-security: N/A diff --git a/active/CVE-2008-3525 b/active/CVE-2008-3525 index fe3f1ea5..925f3b09 100644 --- a/active/CVE-2008-3525 +++ b/active/CVE-2008-3525 @@ -10,7 +10,8 @@ linux-2.6: released (2.6.26-7) [bugfix/wan-sbni_ioctl-cap-checks.patch] 2.6.18-etch-security: released (2.6.18.dfsg.1-22etch3) [bugfix/wan-sbni_ioctl-cap-checks.patch] 2.6.24-etch-security: released (2.6.24-6~etchnhalf.6) [bugfix/wan-sbni_ioctl-cap-checks.patch] 2.6.26-lenny-security: released (2.6.26-7) [bugfix/wan-sbni_ioctl-cap-checks.patch] -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: released (2.6.15-52.73) +2.6.20-feisty-security: ignored (EOL) +2.6.22-gutsy-security: released (2.6.22-15.59) +2.6.24-hardy-security: released (2.6.24-21.43) +2.6.27-intrepid-security: N/A diff --git a/active/CVE-2008-3526 b/active/CVE-2008-3526 index a7226b13..136fcdff 100644 --- a/active/CVE-2008-3526 +++ b/active/CVE-2008-3526 @@ -10,7 +10,8 @@ linux-2.6: released (2.6.26-4) [bugfix/sctp-auth-key-length-check.patch] 2.6.18-etch-security: N/A "code not present" 2.6.24-etch-security: released (2.6.24-6~etchnhalf.5) [bugfix/sctp-auth-key-length-check.patch] 2.6.26-lenny-security: released (2.6.26-4) [bugfix/sctp-auth-key-length-check.patch] -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: N/A +2.6.20-feisty-security: N/A +2.6.22-gutsy-security: N/A +2.6.24-hardy-security: released (2.6.24-21.43) +2.6.27-intrepid-security: N/A diff --git a/active/CVE-2008-3527 b/active/CVE-2008-3527 index 7dffb007..b4642e80 100644 --- a/active/CVE-2008-3527 +++ b/active/CVE-2008-3527 @@ -11,7 +11,8 @@ linux-2.6: N/A 2.6.18-etch-security: pending (2.6.18.dfsg.1-23etch1) [bugfix/add-install_special_mapping.patch, bugfix/i386-vdso-use_install_special_mapping.patch, bugfix/x86_64-ia32-vDSO-use-install_special_mapping.patch, features/all/xen/vdso-use_install_special_mapping.patch] 2.6.24-etch-security: N/A 2.6.26-lenny-security: N/A -2.6.15-dapper-security: -2.6.20-feisty-security: +2.6.15-dapper-security: needed +2.6.20-feisty-security: ignored (EOL) 2.6.22-gutsy-security: 2.6.24-hardy-security: +2.6.27-intrepid-security: diff --git a/active/CVE-2008-3528 b/active/CVE-2008-3528 index 9ac0ca13..fe94599e 100644 --- a/active/CVE-2008-3528 +++ b/active/CVE-2008-3528 @@ -17,7 +17,8 @@ linux-2.6: pending (2.6.26-11) [bugfix/all/stable/2.6.26.8.patch] 2.6.18-etch-security: pending (2.6.18.dfsg.1-23etch1) [bugfix/ext2-avoid-corrupted-directory-printk-floods.patch, bugfix/ext3-avoid-corrupted-directory-printk-floods.patch] 2.6.24-etch-security: pending (2.6.24-6~etchnhalf.7) [bugfix/ext2-avoid-corrupted-directory-printk-floods.patch, bugfix/ext3-avoid-corrupted-directory-printk-floods.patch] 2.6.26-lenny-security: pending (2.6.26-11) [bugfix/all/stable/2.6.26.8.patch] -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: ignored (negligible) +2.6.20-feisty-security: ignored (EOL) +2.6.22-gutsy-security: ignored (negligible) +2.6.24-hardy-security: ignored (negligible) +2.6.27-intrepid-security: N/A diff --git a/active/CVE-2008-3534 b/active/CVE-2008-3534 index c9a857ea..d73dc2d8 100644 --- a/active/CVE-2008-3534 +++ b/active/CVE-2008-3534 @@ -9,7 +9,8 @@ linux-2.6: released (2.6.26-2) 2.6.18-etch-security: N/A 2.6.24-etch-security: released (2.6.24-6~etchnhalf.5) [bugfix/tmpfs-fix-kernel-bug-in-shmem_delete_inode.patch] 2.6.26-lenny-security: released (2.6.26-2) [bugfix/all/stable/2.6.26.2.patch] -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: released (2.6.15-52.73) +2.6.20-feisty-security: ignored (EOL) +2.6.22-gutsy-security: released (2.6.22-15.59) +2.6.24-hardy-security: released (2.6.24-21.43) +2.6.27-intrepid-security: N/A diff --git a/active/CVE-2008-3535 b/active/CVE-2008-3535 index 9bad4180..69baaab7 100644 --- a/active/CVE-2008-3535 +++ b/active/CVE-2008-3535 @@ -9,7 +9,8 @@ linux-2.6: released (2.6.26-2) [bugfix/all/stable/2.6.26.1.patch] 2.6.18-etch-security: N/A "code not present" 2.6.24-etch-security: released (2.6.24-6~etchnhalf.5) [bugfix/iov_iter_advance-off-by-one.patch] 2.6.26-lenny-security: released (2.6.26-2) [bugfix/all/stable/2.6.26.1.patch] -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: N/A +2.6.20-feisty-security: N/A +2.6.22-gutsy-security: N/A +2.6.24-hardy-security: released (2.6.24-21.43) +2.6.27-intrepid-security: N/A diff --git a/active/CVE-2008-3686 b/active/CVE-2008-3686 index 37494cea..df8f60b7 100644 --- a/active/CVE-2008-3686 +++ b/active/CVE-2008-3686 @@ -10,7 +10,8 @@ linux-2.6: released (2.6.26-5) [bugfix/all/stable/2.6.26.4.patch] 2.6.18-etch-security: N/A 2.6.24-etch-security: N/A 2.6.26-lenny-security: released (2.6.26-5) [bugfix/all/stable/2.6.26.4.patch] -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: N/A +2.6.20-feisty-security: N/A +2.6.22-gutsy-security: N/A +2.6.24-hardy-security: N/A +2.6.27-intrepid-security: N/A diff --git a/active/CVE-2008-3792 b/active/CVE-2008-3792 index 1d10d003..2fb5955b 100644 --- a/active/CVE-2008-3792 +++ b/active/CVE-2008-3792 @@ -10,7 +10,8 @@ linux-2.6: released (2.6.26-4) [bugfix/sctp-auth-panics.patch] 2.6.18-etch-security: N/A 2.6.24-etch-security: released (2.6.24-6~etchhalf.5) [bugfix/sctp-fix-length-in-AUTH_CHUNKS-option.patch, bugfix/sctp-auth-panics.patch] 2.6.26-lenny-security: released (2.6.26-4) [bugfix/sctp-auth-panics.patch] -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: N/A +2.6.20-feisty-security: N/A +2.6.22-gutsy-security: N/A +2.6.24-hardy-security: released (2.6.24-21.43) +2.6.27-intrepid-security: N/A diff --git a/active/CVE-2008-3831 b/active/CVE-2008-3831 index e4793082..b909390d 100644 --- a/active/CVE-2008-3831 +++ b/active/CVE-2008-3831 @@ -9,7 +9,8 @@ linux-2.6: released (2.6.26-9) [bugfix/x86/i915-restrict-DRM_I915_HWS_ADDR.patch 2.6.18-etch-security: N/A "Vulnerable code not present" 2.6.24-etch-security: released (2.6.24-6~etchnhalf.6) [bugfix/i915-restrict-DRM_I915_HWS_ADDR.patch] 2.6.26-lenny-security: released (2.6.26-9) [bugfix/x86/i915-restrict-DRM_I915_HWS_ADDR.patch] -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: N/A +2.6.20-feisty-security: ignored (EOL) +2.6.22-gutsy-security: released (2.6.22-15.59) +2.6.24-hardy-security: released (2.6.24-21.43) +2.6.27-intrepid-security: needed diff --git a/active/CVE-2008-3832 b/active/CVE-2008-3832 index 8cc6c3bb..179018f2 100644 --- a/active/CVE-2008-3832 +++ b/active/CVE-2008-3832 @@ -11,7 +11,8 @@ linux-2.6: N/A 2.6.18-etch-security: N/A 2.6.24-etch-security: N/A 2.6.26-lenny-security: N/A -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: N/A +2.6.20-feisty-security: N/A +2.6.22-gutsy-security: N/A +2.6.24-hardy-security: N/A +2.6.27-intrepid-security: N/A diff --git a/active/CVE-2008-3833 b/active/CVE-2008-3833 index acbbd89d..c363e874 100644 --- a/active/CVE-2008-3833 +++ b/active/CVE-2008-3833 @@ -11,7 +11,8 @@ linux-2.6: released (2.6.19-1) 2.6.18-etch-security: released (2.6.18.dfsg.1-22etch3) [bugfix/remove-SUID-when-splicing-into-an-inode.patch] 2.6.24-etch-security: N/A 2.6.26-lenny-security: N/A -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: N/A +2.6.20-feisty-security: N/A +2.6.22-gutsy-security: N/A +2.6.24-hardy-security: N/A +2.6.27-intrepid-security: N/A diff --git a/active/CVE-2008-3911 b/active/CVE-2008-3911 index 735a4e37..e21ff0e4 100644 --- a/active/CVE-2008-3911 +++ b/active/CVE-2008-3911 @@ -18,7 +18,8 @@ linux-2.6: released (2.6.26-5) [bugfix/all/stable/2.6.26.4.patch] 2.6.18-etch-security: N/A 2.6.24-etch-security: N/A 2.6.26-lenny-security: released (2.6.26-5) [bugfix/all/stable/2.6.26.4.patch] -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: N/A +2.6.20-feisty-security: N/A +2.6.22-gutsy-security: N/A +2.6.24-hardy-security: N/A +2.6.27-intrepid-security: N/A diff --git a/active/CVE-2008-3915 b/active/CVE-2008-3915 index b41783c7..e946ad73 100644 --- a/active/CVE-2008-3915 +++ b/active/CVE-2008-3915 @@ -10,7 +10,8 @@ linux-2.6: released (2.6.26-5) [bugfix/all/stable/2.6.26.4.patch] 2.6.18-etch-security: N/A 2.6.24-etch-security: released (2.6.24-6~etchnhalf.5) [bugfix/nfsd-fix-buffer-overrun-decoding-nfsv4-acl.patch] 2.6.26-lenny-security: released (2.6.26-5) [bugfix/all/stable/2.6.26.4.patch] -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: N/A +2.6.20-feisty-security: N/A +2.6.22-gutsy-security: released (2.6.22-15.59) +2.6.24-hardy-security: released (2.6.24-21.43) +2.6.27-intrepid-security: N/A diff --git a/active/CVE-2008-4113 b/active/CVE-2008-4113 index 6ae0a506..3b3a90ee 100644 --- a/active/CVE-2008-4113 +++ b/active/CVE-2008-4113 @@ -11,7 +11,8 @@ linux-2.6: released (2.6.26-5) [bugfix/all/stable/2.6.26.4.patch] 2.6.18-etch-security: N/A 2.6.24-etch-security: released (2.6.24-6~etchnhalf.6) [bugfix/sctp-fix-random-memory-dereference-with-SCTP_HMAC_I.patch] 2.6.26-lenny-security: released (2.6.26-5) [bugfix/all/stable/2.6.26.4.patch] -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: N/A +2.6.20-feisty-security: N/A +2.6.22-gutsy-security: N/A +2.6.24-hardy-security: released (2.6.24-21.43) +2.6.27-intrepid-security: N/A diff --git a/active/CVE-2008-4210 b/active/CVE-2008-4210 index f832c891..73418edd 100644 --- a/active/CVE-2008-4210 +++ b/active/CVE-2008-4210 @@ -12,7 +12,8 @@ linux-2.6: N/A 2.6.18-etch-security: released (2.6.18.dfsg.1-22etch3) [bugfix/lockless-helpers-for-remove_suid.patch, bugfix/open-allows-sgid-in-sgid-directory.patch] 2.6.24-etch-security: N/A 2.6.26-lenny-security: N/A -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: needed +2.6.20-feisty-security: ignored (EOL) +2.6.22-gutsy-security: N/A +2.6.24-hardy-security: N/A +2.6.27-intrepid-security: N/A diff --git a/active/CVE-2008-4302 b/active/CVE-2008-4302 index 0a30eb2b..23349c3b 100644 --- a/active/CVE-2008-4302 +++ b/active/CVE-2008-4302 @@ -9,7 +9,8 @@ linux-2.6: released (2.6.23-1) 2.6.18-etch-security: released (2.6.18.dfsg.1-22etch3) [bugfix/splice-fix-bad-unlock_page-in-error-case.patch] 2.6.24-etch-security: N/A 2.6.26-lenny-security: N/A -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: needed +2.6.20-feisty-security: ignored (EOL) +2.6.22-gutsy-security: N/A +2.6.24-hardy-security: N/A +2.6.27-intrepid-security: N/A diff --git a/active/CVE-2008-4410 b/active/CVE-2008-4410 index d20a07da..78becceb 100644 --- a/active/CVE-2008-4410 +++ b/active/CVE-2008-4410 @@ -11,7 +11,8 @@ linux-2.6: released (2.6.26-8) [bugfix/x86-fix-broken-LDT-access-in-VMI.patch] 2.6.18-etch-security: N/A 2.6.24-etch-security: N/A 2.6.26-lenny-security: released (2.6.26-8) [bugfix/x86-fix-broken-LDT-access-in-VMI.patch] -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: N/A +2.6.20-feisty-security: N/A +2.6.22-gutsy-security: N/A +2.6.24-hardy-security: N/A +2.6.27-intrepid-security: N/A diff --git a/active/CVE-2008-4445 b/active/CVE-2008-4445 index 48fe425c..5696db44 100644 --- a/active/CVE-2008-4445 +++ b/active/CVE-2008-4445 @@ -10,7 +10,8 @@ linux-2.6: released (2.6.26-5) [bugfix/all/stable/2.6.26.4.patch] 2.6.18-etch-security: N/A 2.6.24-etch-security: released (2.6.24-6~etchnhalf.6) [bugfix/sctp-fix-random-memory-dereference-with-SCTP_HMAC_I.patch] 2.6.26-lenny-security: released (2.6.26-5) [bugfix/all/stable/2.6.26.4.patch] -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: N/A +2.6.20-feisty-security: N/A +2.6.22-gutsy-security: N/A +2.6.24-hardy-security: released (2.6.24-21.43) +2.6.27-intrepid-security: N/A diff --git a/active/CVE-2008-4554 b/active/CVE-2008-4554 index 4165a30b..4d005e8c 100644 --- a/active/CVE-2008-4554 +++ b/active/CVE-2008-4554 @@ -11,7 +11,8 @@ linux-2.6: released (2.6.26-9) [bugfix/all/dont-allow-splice-to-files-opened-wit 2.6.18-etch-security: pending (2.6.18.dfsg.1-23etch1) [bugfix/dont-allow-splice-to-files-opened-with-O_APPEND.patch] 2.6.24-etch-security: pending (2.6.24-6~etchnhalf.7) [bugfix/all/dont-allow-splice-to-files-opened-with-O_APPEND.patch] 2.6.26-lenny-security: released (2.6.26-9) [bugfix/all/dont-allow-splice-to-files-opened-with-O_APPEND.patch] -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: N/A +2.6.20-feisty-security: ignored (EOL) +2.6.22-gutsy-security: needed +2.6.24-hardy-security: N/A +2.6.27-intrepid-security: N/A diff --git a/active/CVE-2008-4576 b/active/CVE-2008-4576 index e5f57dd6..7abad6d7 100644 --- a/active/CVE-2008-4576 +++ b/active/CVE-2008-4576 @@ -11,7 +11,8 @@ linux-2.6: released (2.6.26-9) [bugfix/all/stable/2.6.26.6.patch] 2.6.18-etch-security: pending (2.6.18.dfsg.1-23etch1) [bugfix/sctp-fix-oops-when-INIT-ACK-indicates-that-peer-doesnt-support-AUTH.patch] 2.6.24-etch-security: pending (2.6.24-6~etchnhalf.7) [bugfix/sctp-fix-oops-when-INIT-ACK-indicates-that-peer-doesnt-support-AUTH.patch] 2.6.26-lenny-security: released (2.6.26-9) [bugfix/all/stable/2.6.26.6.patch] -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: needed +2.6.20-feisty-security: ignored (EOL) +2.6.22-gutsy-security: needed +2.6.24-hardy-security: needed +2.6.27-intrepid-security: N/A diff --git a/active/CVE-2008-4618 b/active/CVE-2008-4618 index e86f54bc..0bd6cdb5 100644 --- a/active/CVE-2008-4618 +++ b/active/CVE-2008-4618 @@ -10,7 +10,8 @@ linux-2.6: pending (2.6.26-10) [bugfix/all/sctp-fix-kernel-panic-while-process-p 2.6.18-etch-security: 2.6.24-etch-security: pending (2.6.24-6~etchnhalf.7) [bugfix/all/sctp-fix-kernel-panic-while-process-protocol-violation-parameter.patch] 2.6.26-lenny-security: pending (2.6.26-10) [bugfix/all/sctp-fix-kernel-panic-while-process-protocol-violation-parameter.patch] -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: needed +2.6.20-feisty-security: ignored (EOL) +2.6.22-gutsy-security: needed +2.6.24-hardy-security: needed +2.6.27-intrepid-security: N/A diff --git a/active/CVE-2008-4933 b/active/CVE-2008-4933 index cb39fe1a..14a7e3c2 100644 --- a/active/CVE-2008-4933 +++ b/active/CVE-2008-4933 @@ -11,7 +11,8 @@ linux-2.6: pending (2.6.26-11) [bugfix/all/hfsplus-fix-Buffer-overflow-with-a-co 2.6.18-etch-security: pending (2.6.18.dfsg.1-23etch1) [bugfix/hfsplus-fix-Buffer-overflow-with-a-corrupted-image.patch] 2.6.24-etch-security: pending (2.6.24-6~etchnhalf.7) [bugfix/hfsplus-fix-Buffer-overflow-with-a-corrupted-image.patch] 2.6.26-lenny-security: pending (2.6.26-11) [bugfix/all/hfsplus-fix-Buffer-overflow-with-a-corrupted-image.patch] -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: needed +2.6.20-feisty-security: ignored (EOL) +2.6.22-gutsy-security: needed +2.6.24-hardy-security: needed +2.6.27-intrepid-security: needed diff --git a/active/CVE-2008-4934 b/active/CVE-2008-4934 index 5fe0d450..7bf8c533 100644 --- a/active/CVE-2008-4934 +++ b/active/CVE-2008-4934 @@ -11,7 +11,8 @@ linux-2.6: pending (2.6.26-11) [bugfix/all/hfsplus-check_read_mapping_page-retur 2.6.18-etch-security: pending (2.6.18.dfsg.1-23etch1) [bugfix/hfsplus-check_read_mapping_page-return-value.patch] 2.6.24-etch-security: pending (2.6.24-6~etchnhalf.7) [bugfix/hfsplus-check_read_mapping_page-return-value.patch] 2.6.26-lenny-security: pending (2.6.26-11) [bugfix/all/hfsplus-check_read_mapping_page-return-value.patch] -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: needed +2.6.20-feisty-security: ignored (EOL) +2.6.22-gutsy-security: needed +2.6.24-hardy-security: needed +2.6.27-intrepid-security: needed diff --git a/active/CVE-2008-5025 b/active/CVE-2008-5025 index 8f6c0b61..198cdc42 100644 --- a/active/CVE-2008-5025 +++ b/active/CVE-2008-5025 @@ -11,7 +11,7 @@ linux-2.6: pending (2.6.26-11) [bugfix/all/hfs-fix-namelength-memory-corruption. 2.6.18-etch-security: pending (2.6.18.dfsg.1-23etch1) [bugfix/hfs-fix-namelength-memory-corruption.patch] 2.6.24-etch-security: pending (2.6.24-6~etchnhalf.7) [bugfix/hfs-fix-namelength-memory-corruption.patch] 2.6.26-lenny-security: pending (2.6.26-11) [bugfix/all/hfs-fix-namelength-memory-corruption.patch] -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: needed +2.6.22-gutsy-security: needed +2.6.24-hardy-security: needed +2.6.27-intrepid-security: needed diff --git a/active/CVE-2008-5029 b/active/CVE-2008-5029 index 350904dd..ffbba796 100644 --- a/active/CVE-2008-5029 +++ b/active/CVE-2008-5029 @@ -18,7 +18,7 @@ linux-2.6: pending (2.6.26-11) [bugfix/all/stable/2.6.26.8.patch] 2.6.18-etch-security: 2.6.24-etch-security: pending (2.6.24-6~etchnhalf.7) [bugfix/unix-domain-counting-gc.patch, bugfix/unix-domain-recursive-descent.patch, bugfix/unix-domain-recursive-descent-abi-ignore.patch] 2.6.26-lenny-security: pending (2.6.26-11) [bugfix/all/stable/2.6.26.8.patch] -2.6.15-dapper-security: -2.6.20-feisty-security: -2.6.22-gutsy-security: -2.6.24-hardy-security: +2.6.15-dapper-security: needed +2.6.22-gutsy-security: needed +2.6.24-hardy-security: needed +2.6.27-intrepid-security: needed diff --git a/scripts/ubuntu-table b/scripts/ubuntu-table index a4d83ccc..5dd3ca98 100755 --- a/scripts/ubuntu-table +++ b/scripts/ubuntu-table @@ -1,7 +1,7 @@ #!/usr/bin/env python import os, re, sys -releases = ['2.6.15-dapper-security', '2.6.20-feisty-security', '2.6.22-gutsy-security', '2.6.24-hardy-security'] +releases = ['2.6.15-dapper-security', '2.6.22-gutsy-security', '2.6.24-hardy-security', '2.6.27-intrepid-security'] table = dict() cves = [elem for elem in os.listdir('.') if re.match('^CVE-\d+-\d+$',elem)] |