diff options
author | dann frazier <dannf@debian.org> | 2006-09-25 19:13:15 +0000 |
---|---|---|
committer | dann frazier <dannf@debian.org> | 2006-09-25 19:13:15 +0000 |
commit | d097008cdc5578ed8420b87e6b419e97252bedd8 (patch) | |
tree | fbdfd73c44db913a1fda474143cd699b2fba553b /active | |
parent | 1879cf5f760463ca036f3f415f6efce933fa4191 (diff) |
2.6.17 is in etch now, stop tracking 2.6.16
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@597 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'active')
43 files changed, 0 insertions, 43 deletions
diff --git a/active/00boilerplate b/active/00boilerplate index 7df9f9aa..55a4773f 100644 --- a/active/00boilerplate +++ b/active/00boilerplate @@ -5,7 +5,6 @@ Ubuntu-Description: Notes: Bugs: upstream: -linux-2.6.16: linux-2.6: 2.6.8-sarge-security: 2.4.27-sarge-security: diff --git a/active/CVE-2002-0704 b/active/CVE-2002-0704 index bc5374e0..f9e58a26 100644 --- a/active/CVE-2002-0704 +++ b/active/CVE-2002-0704 @@ -41,7 +41,6 @@ Notes: horms> problem on allong with upstream's 2.4 (~2.4.33-pre1) Bugs: upstream: released (2.6.11) -linux-2.6.16: N/A linux-2.6: N/A 2.6.8-sarge-security: ignored (2.6.8-16sarge5) 2.4.27-sarge-security: ignored (2.4.27-10sarge5) diff --git a/active/CVE-2004-0813 b/active/CVE-2004-0813 index 6409c575..3ae19f15 100644 --- a/active/CVE-2004-0813 +++ b/active/CVE-2004-0813 @@ -21,7 +21,6 @@ Notes: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=133098 Bugs: upstream: fixed (2.6.10) -linux-2.6.16: N/A linux-2.6: N/A 2.6.8-sarge-security: released (2.6.8-14) 2.4.27-sarge-security: ignored (2.4.27-10sarge3) diff --git a/active/CVE-2004-1190 b/active/CVE-2004-1190 index ec15150c..185fe2f9 100644 --- a/active/CVE-2004-1190 +++ b/active/CVE-2004-1190 @@ -13,7 +13,6 @@ Description: Notes: Bugs: 300162 upstream: released (2.6.10) -linux-2.6.16: N/A linux-2.6: N/A 2.6.8-sarge-security: released (2.6.8-14) [scsi-ioctl-cmd-warned.dpatch, scsi-ioctl-remove-dup.dpatch, scsi-ioctl-permit.dpatch, SG_IO-cap.dpatch, SG_IO-safe-commands-2.dpatch, SG_IO-safe-commands-3.dpatch, SG_IO-safe-commands-5.dpatch] 2.4.27-sarge-security: ignored (2.4.27-10sarge3) diff --git a/active/CVE-2004-2135 b/active/CVE-2004-2135 index 31e2ff33..c922844b 100644 --- a/active/CVE-2004-2135 +++ b/active/CVE-2004-2135 @@ -17,7 +17,6 @@ Notes: jmm> I'm marking all these N/A Bugs: upstream: -linux-2.6.16: ignored (2.6.16-18) linux-2.6: 2.6.8-sarge-security: ignored (2.6.8-16sarge5) 2.4.27-sarge-security: N/A diff --git a/active/CVE-2004-2136 b/active/CVE-2004-2136 index ce29d88b..de2c8476 100644 --- a/active/CVE-2004-2136 +++ b/active/CVE-2004-2136 @@ -13,7 +13,6 @@ Notes: jmm> 2.4 doesn't have dm-crypt, though Bugs: upstream: -linux-2.6.16: ignored (2.6.16-18) linux-2.6: 2.6.8-sarge-security: ignored (2.6.8-16sarge5) 2.4.27-sarge-security: N/A diff --git a/active/CVE-2004-2660 b/active/CVE-2004-2660 index ce902436..c6e6b140 100644 --- a/active/CVE-2004-2660 +++ b/active/CVE-2004-2660 @@ -11,7 +11,6 @@ Notes: jmm> Vulnerable code not present in 2.4 Bugs: upstream: released (2.6.10) -linux-2.6.16: N/A linux-2.6: N/A 2.6.8-sarge-security: pending (2.6.8-16sarge5) [direct-io-write-mem-leak.dpatch] 2.4.27-sarge-security: N/A diff --git a/active/CVE-2005-0109 b/active/CVE-2005-0109 index 58ec95d9..87b79d60 100644 --- a/active/CVE-2005-0109 +++ b/active/CVE-2005-0109 @@ -44,7 +44,6 @@ Notes: jmm> What did other distributions like Red Hat, SuSE or OWL do? Bugs: upstream: -linux-2.6.16: ignored (2.6.16-18) linux-2.6: 2.6.8-sarge-security: ignored (2.6.8-16sarge5) 2.4.27-sarge-security: ignored (2.4.27-10sarge5) diff --git a/active/CVE-2005-0504 b/active/CVE-2005-0504 index a83d6349..5432f88f 100644 --- a/active/CVE-2005-0504 +++ b/active/CVE-2005-0504 @@ -8,7 +8,6 @@ Notes: dannf> still not upstream as of 2.6.18-rc4, i've poked upstream about it Bugs: upstream: -linux-2.6.16: linux-2.6: 2.6.8-sarge-security: released (2.6.8-12) [030-moxa_user_copy_checking.dpatch] 2.4.27-sarge-security: released (2.4.27-8) [125_moxa_bound_checking.diff] diff --git a/active/CVE-2005-0977 b/active/CVE-2005-0977 index 9afd613c..c4122a70 100644 --- a/active/CVE-2005-0977 +++ b/active/CVE-2005-0977 @@ -14,7 +14,6 @@ Notes: aren't in 2.4, so the port isn't trivial for me. Bugs: 303177 upstream: released (2.6.11) -linux-2.6.16: N/A linux-2.6: N/A 2.6.8-sarge-security: released (2.6.8-16) [mm-shmem-truncate.dpatch] 2.4.27-sarge-security: ignored (2.4.27-10sarge3) diff --git a/active/CVE-2005-1264 b/active/CVE-2005-1264 index 775006c9..0f1843c6 100644 --- a/active/CVE-2005-1264 +++ b/active/CVE-2005-1264 @@ -18,7 +18,6 @@ Notes: dannf> Code is very different in 2.4, don't know if its vulnerable Bugs: upstream: released (2.6.11.10) -linux-2.6.16: linux-2.6: N/A 2.6.8-sarge-security: released (2.6.8-16) [drivers-block-raw-ioctl.dpatch] 2.4.27-sarge-security: ignored (2.4.27-10sarge3) diff --git a/active/CVE-2005-1265 b/active/CVE-2005-1265 index 3528cd38..9f227b51 100644 --- a/active/CVE-2005-1265 +++ b/active/CVE-2005-1265 @@ -9,7 +9,6 @@ Notes: dannf> Code is very different in 2.4; dunno if its vulnerable Bugs: upstream: released (2.6.12) -linux-2.6.16: N/A linux-2.6: N/A 2.6.8-sarge-security: released (2.6.8-16sarge1) [mm-mmap-range-test.dpatch] 2.4.27-sarge-security: ignored (2.4.27-10sarge4) diff --git a/active/CVE-2005-2873 b/active/CVE-2005-2873 index b05a2e0d..58005bbe 100644 --- a/active/CVE-2005-2873 +++ b/active/CVE-2005-2873 @@ -20,7 +20,6 @@ Notes: jmm> There's now a complete rewrite by Patrick McHardy in 2.6.18 upstream: released (2.6.18) Bugs: 332381, 332231, 332228 -linux-2.6.16: ignored (2.6.16-18) linux-2.6: needed 2.6.8-sarge-security: ignored (2.6.8-16sarge5) 2.4.27-sarge-security: ignored (2.4.27-10sarge4) diff --git a/active/CVE-2005-3044 b/active/CVE-2005-3044 index a9b812dd..08adeab9 100644 --- a/active/CVE-2005-3044 +++ b/active/CVE-2005-3044 @@ -23,7 +23,6 @@ Notes: micah> have two patches... if you look at them they look REALLY similar, but they aren't micah> dont be fooled upstream: released (2.6.13.2) -linux-2.6.16: N/A linux-2.6: released (2.6.12-7, 2.6.13-1) [lost-fput-in-32bit-ioctl-on-x86-64.patch, linux-2.6.13.2.patch] 2.6.8-sarge-security: released (2.6.8-16sarge2) [lost-fput-in-32bit-ioctl-on-x86-64.dpatch, lost-sockfd_put-in-32bit-compat-routing_ioctl.patch] 2.4.27-sarge-security: ignored (2.4.27-10sarge4) diff --git a/active/CVE-2005-3105 b/active/CVE-2005-3105 index ec97405d..24ada934 100644 --- a/active/CVE-2005-3105 +++ b/active/CVE-2005-3105 @@ -28,5 +28,4 @@ Bugs: 332569 upstream: 2.6.12 2.6.8-sarge-security: released (2.6.8-16sarge1) [mckinley_icache.dpatch] 2.4.27-sarge-security: ignored (2.4.27-10sarge3) -linux-2.6.16: N/A linux-2.6: N/A diff --git a/active/CVE-2005-3527 b/active/CVE-2005-3527 index 5f3f574f..73b09695 100644 --- a/active/CVE-2005-3527 +++ b/active/CVE-2005-3527 @@ -27,7 +27,6 @@ Notes: backporting is too hard for the same reasons as 2.6.8. Bugs: upstream: released (2.6.14) -linux-2.6.16: N/A linux-2.6: N/A 2.6.8-sarge-security: ignored (2.6.8-16sarge5) 2.4.27-sarge-security: ignored (2.4.27-10sarge5) diff --git a/active/CVE-2005-3660 b/active/CVE-2005-3660 index 82c12870..d6ce355e 100644 --- a/active/CVE-2005-3660 +++ b/active/CVE-2005-3660 @@ -14,7 +14,6 @@ Notes: dannf> to struct file. No such thing has gone upstream yet, however. Bugs: upstream: -linux-2.6.16: ignored (2.6.16-18) linux-2.6: 2.6.8-sarge-security: ignored (2.6.8-16sarge5) 2.4.27-sarge-security: ignored (2.4.27-10sarge4) diff --git a/active/CVE-2005-4440 b/active/CVE-2005-4440 index ccbe26b8..510f9fa9 100644 --- a/active/CVE-2005-4440 +++ b/active/CVE-2005-4440 @@ -34,7 +34,6 @@ Notes: dannf> series of kernels & follow what upstream does. Bugs: upstream: -linux-2.6.16: ignored (2.6.16-18) linux-2.6: 2.6.8-sarge-security: ignored (2.6.8-16sarge5) 2.4.27-sarge-security: ignored (2.4.27-10sarge4) diff --git a/active/CVE-2005-4441 b/active/CVE-2005-4441 index 79e66a29..eda7c45a 100644 --- a/active/CVE-2005-4441 +++ b/active/CVE-2005-4441 @@ -38,7 +38,6 @@ Notes: dannf> series of kernels & follow what upstream does. Bugs: upstream: -linux-2.6.16: ignored (2.6.16-18) linux-2.6: 2.6.8-sarge-security: ignored (2.6.8-16sarge5) 2.4.27-sarge-security: ignored (2.4.27-10sarge4) diff --git a/active/CVE-2005-4798 b/active/CVE-2005-4798 index 3d441009..212b2085 100644 --- a/active/CVE-2005-4798 +++ b/active/CVE-2005-4798 @@ -14,7 +14,6 @@ Notes: dannf> 2.6.8 looks affected to me - including my shot at a fix... Bugs: upstream: -linux-2.6.16: N/A linux-2.6: N/A 2.6.8-sarge-security: pending (2.6.8-16sarge5) [nfs-handle-long-symlinks.dpatch] 2.4.27-sarge-security: pending (2.4.27-10sarge4) [223_nfs-handle-long-symlinks.diff] diff --git a/active/CVE-2006-1052 b/active/CVE-2006-1052 index 8ed98423..4f50403d 100644 --- a/active/CVE-2006-1052 +++ b/active/CVE-2006-1052 @@ -10,7 +10,6 @@ Description: Notes: Bugs: upstream: released (2.6.16) -linux-2.6.16: released (2.6.16-1) linux-2.6: released (2.6.16-1) 2.6.8-sarge-security: pending (2.6.8-16sarge5) [selinux-tracer-SID-fix.dpatch] 2.4.27-sarge-security: N/A diff --git a/active/CVE-2006-1343 b/active/CVE-2006-1343 index e3d417e1..609fabdf 100644 --- a/active/CVE-2006-1343 +++ b/active/CVE-2006-1343 @@ -13,7 +13,6 @@ Notes: jmm> It's now fixed upstream in 2.6 as well, let's include it in sarge4 Bugs: upstream: released (2.4.33-pre3), released (2.6.16.19) -linux-2.6.16: released (2.6.16-15) linux-2.6: released (2.6.16-15) 2.6.8-sarge-security: pending (2.6.8-16sarge5) [netfilter-SO_ORIGINAL_DST-leak.dpatch] 2.4.27-sarge-security: released (2.4.27-10sarge3) [212_ipv4-sin_zero_clear.diff] diff --git a/active/CVE-2006-1528 b/active/CVE-2006-1528 index d37f164b..bdeb2c52 100644 --- a/active/CVE-2006-1528 +++ b/active/CVE-2006-1528 @@ -9,7 +9,6 @@ Description: Notes: Bugs: upstream: released (2.6.13), released (2.4.33.1) -linux-2.6.16: N/A linux-2.6: released (2.6.13-1) 2.6.8-sarge-security: pending (2.6.8-16sarge5) 2.4.27-sarge-security: pending (2.4.27-10sarge4) diff --git a/active/CVE-2006-1855 b/active/CVE-2006-1855 index 5d65625d..2e41f2f2 100644 --- a/active/CVE-2006-1855 +++ b/active/CVE-2006-1855 @@ -11,7 +11,6 @@ Notes: jmm> Vulnerable code not present in 2.4.27 Bugs: upstream: released (2.6.11.12) -linux-2.6.16: N/A linux-2.6: N/A 2.6.8-sarge-security: pending (2.6.8-16sarge5) 2.4.27-sarge-security: N/A diff --git a/active/CVE-2006-1856 b/active/CVE-2006-1856 index db4a75c1..8ce68c0f 100644 --- a/active/CVE-2006-1856 +++ b/active/CVE-2006-1856 @@ -11,7 +11,6 @@ Description: Notes: Bugs: upstream: released (2.6.17) -linux-2.6.16: needed linux-2.6: released (2.6.17-1) 2.6.8-sarge-security: pending (2.6.8-16sarge5) 2.4.27-sarge-security: N/A diff --git a/active/CVE-2006-1862 b/active/CVE-2006-1862 index f17cb8f2..0820dbc6 100644 --- a/active/CVE-2006-1862 +++ b/active/CVE-2006-1862 @@ -12,7 +12,6 @@ Notes: dannf> https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=189031 Bugs: upstream: -linux-2.6.16: N/A linux-2.6: N/A 2.6.8-sarge-security: N/A 2.4.27-sarge-security: N/A diff --git a/active/CVE-2006-2275 b/active/CVE-2006-2275 index 0deb9ce9..4fb30aee 100644 --- a/active/CVE-2006-2275 +++ b/active/CVE-2006-2275 @@ -12,7 +12,6 @@ Notes: jmm> be postponed for now Bugs: upstream: released (2.6.16.15) -linux-2.6.16: released (2.6.16-13) linux-2.6: released (2.6.16-13) 2.6.8-sarge-security: ignored (2.6.8-16sarge4) 2.4.27-sarge-security: ignored (2.4.27-10sarge4) diff --git a/active/CVE-2006-2444 b/active/CVE-2006-2444 index 5ac7af2f..24524810 100644 --- a/active/CVE-2006-2444 +++ b/active/CVE-2006-2444 @@ -12,7 +12,6 @@ Description: Notes: Bugs: upstream: released (2.6.16.18) -linux-2.6.16: released (2.6.16-15) linux-2.6: released (2.6.16-15) 2.6.8-sarge-security: pending (2.6.8-16sarge5) [snmp-nat-mem-corruption-fix.dpatch] 2.4.27-sarge-security: pending (2.4.27-10sarge4) [226_snmp-nat-mem-corruption-fix.diff] diff --git a/active/CVE-2006-2445 b/active/CVE-2006-2445 index 90d6871c..4116085a 100644 --- a/active/CVE-2006-2445 +++ b/active/CVE-2006-2445 @@ -16,7 +16,6 @@ Notes: mpitt> 2.6.10-hoary does not need 4th GIT patch, function does not exist Bugs: upstream: released (2.6.16.21) -linux-2.6.16: released (2.6.16-15) linux-2.6: released (2.6.16-15) 2.6.8-sarge-security: N/A 2.4.27-sarge-security: N/A diff --git a/active/CVE-2006-2446 b/active/CVE-2006-2446 index 5e965b8b..d6d67ef3 100644 --- a/active/CVE-2006-2446 +++ b/active/CVE-2006-2446 @@ -15,7 +15,6 @@ Ubuntu-Description: Notes: Bugs: upstream: -linux-2.6.16: linux-2.6: 2.6.8-sarge-security: pending (2.6.8-16sarge5) [kfree_skb-race.dpatch] 2.4.27-sarge-security: pending (2.4.27-10sarge4) [227_kfree_skb.diff] diff --git a/active/CVE-2006-2448 b/active/CVE-2006-2448 index d976bb03..e3b4ee58 100644 --- a/active/CVE-2006-2448 +++ b/active/CVE-2006-2448 @@ -12,7 +12,6 @@ Notes: if this fix is needed or how to apply it. Bugs: upstream: released (2.6.16.21) -linux-2.6.16: released (2.6.16-15) linux-2.6: released (2.6.16-15) 2.6.8-sarge-security: ignored (2.6.8-16sarge5) 2.4.27-sarge-security: ignored (2.4.27-10sarge4) diff --git a/active/CVE-2006-2629 b/active/CVE-2006-2629 index 8bdc59b6..3e88739f 100644 --- a/active/CVE-2006-2629 +++ b/active/CVE-2006-2629 @@ -12,7 +12,6 @@ Notes: dannf> marking sarge kernels N/A because they are < 2.6.15 Bugs: upstream: -linux-2.6.16: linux-2.6: 2.6.8-sarge-security: N/A 2.4.27-sarge-security: N/A diff --git a/active/CVE-2006-2934 b/active/CVE-2006-2934 index 9a57f379..16adb8df 100644 --- a/active/CVE-2006-2934 +++ b/active/CVE-2006-2934 @@ -15,7 +15,6 @@ Notes: netfilter/sctp didn't exist in 2.6.8/2.4.27 Bugs: upstream: released (2.6.16.23, 2.6.17.3) -linux-2.6.16: released (2.6.16-17) linux-2.6: released (2.6.17-3) 2.6.8-sarge-security: N/A 2.4.27-sarge-security: N/A diff --git a/active/CVE-2006-2935 b/active/CVE-2006-2935 index 9d135dce..872c9717 100644 --- a/active/CVE-2006-2935 +++ b/active/CVE-2006-2935 @@ -16,7 +16,6 @@ Notes: dannf> Submitted to Adrian Bunk for inclusion in 2.6.16.y Bugs: upstream: released (2.6.17.7) -linux-2.6.16: pending (2.6.16-18) [cdrom-bad-cgc.buflen-assign.patch] linux-2.6: released (2.6.17-5) 2.6.8-sarge-security: pending (2.6.8-16sarge5) [cdrom-bad-cgc.buflen-assign.dpatch] 2.4.27-sarge-security: pending (2.4.27-10sarge4) [224_cdrom-bad-cgc.buflen-assign.diff] diff --git a/active/CVE-2006-2936 b/active/CVE-2006-2936 index 2792608d..7207499b 100644 --- a/active/CVE-2006-2936 +++ b/active/CVE-2006-2936 @@ -15,7 +15,6 @@ Notes: jmm> 2.4 not affected due to different memory allocation Bugs: upstream: released (2.6.16.26, 2.6.17.7) -linux-2.6.16: pending (2.6.16-18) linux-2.6: released (2.6.17-5) 2.6.8-sarge-security: pending (2.6.8-16sarge5) 2.4.27-sarge-security: N/A diff --git a/active/CVE-2006-3468 b/active/CVE-2006-3468 index 368a160d..c9002cdc 100644 --- a/active/CVE-2006-3468 +++ b/active/CVE-2006-3468 @@ -20,7 +20,6 @@ Notes: Bugs: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=199172 upstream: released (2.6.17.8, 2.6.18-rc4) -linux-2.6.16: pending (2.6.16-18) [fs-ext3-bad-nfs-handle.patch] linux-2.6: needed 2.6.8-sarge-security: pending (2.6.8-16sarge5) [fs-ext3-bad-nfs-handle.dpatch] 2.4.27-sarge-security: ignored (2.4.27-10sarge4) diff --git a/active/CVE-2006-3634 b/active/CVE-2006-3634 index ec45d959..6038ddbe 100644 --- a/active/CVE-2006-3634 +++ b/active/CVE-2006-3634 @@ -12,7 +12,6 @@ Notes: dannf> s390 didn't have a futex.h until after 2.6.16 Bugs: upstream: released (2.6.18-rc2) -linux-2.6.16: N/A linux-2.6: released (2.6.17-1) 2.6.8-sarge-security: N/A 2.4.27-sarge-security: N/A diff --git a/active/CVE-2006-3745 b/active/CVE-2006-3745 index 9ca74c4d..33db41c7 100644 --- a/active/CVE-2006-3745 +++ b/active/CVE-2006-3745 @@ -11,7 +11,6 @@ Ubuntu-Description: Notes: Bugs: upstream: released (2.6.18-rc5) -linux-2.6.16: needed linux-2.6: released (2.6.17-7) 2.6.8-sarge-security: pending (2.6.8-16sarge5) [sctp-priv-elevation.dpatch, sctp-priv-elevation-2.dpatch] 2.4.27-sarge-security: pending (2.4.27-10sarge4) [228_sctp-priv-elevation.diff, 228_sctp-priv-elevation-2.diff] diff --git a/active/CVE-2006-4093 b/active/CVE-2006-4093 index 472324ed..b29060d1 100644 --- a/active/CVE-2006-4093 +++ b/active/CVE-2006-4093 @@ -10,7 +10,6 @@ Ubuntu-Description: Notes: Bugs: upstream: released (2.4.33.1), released (2.6.17.9), released (2.6.18-rc5) -linux-2.6.16: needed linux-2.6: needed 2.6.8-sarge-security: pending (2.6.8-16sarge5) [ppc-hid0-dos.dpatch] 2.4.27-sarge-security: needed diff --git a/active/CVE-2006-4145 b/active/CVE-2006-4145 index 83294056..d2a7ecfc 100644 --- a/active/CVE-2006-4145 +++ b/active/CVE-2006-4145 @@ -11,7 +11,6 @@ Notes: dannf> Submitted upstream on 2006.08.27 Bugs: upstream: released (2.6.17.10), released (2.6.18-rc5) -linux-2.6.16: needed linux-2.6: released (2.6.17-7) 2.6.8-sarge-security: pending (2.6.8-16sarge5) 2.4.27-sarge-security: pending (2.4.27-10sarge4) diff --git a/active/CVE-2006-4535 b/active/CVE-2006-4535 index fb2c0ba3..7381886a 100644 --- a/active/CVE-2006-4535 +++ b/active/CVE-2006-4535 @@ -11,7 +11,6 @@ Ubuntu-Description: Notes: Bugs: upstream: released (2.6.18-rc6) -linux-2.6.16: needed linux-2.6: released (2.6.18-1) 2.6.8-sarge-security: pending (2.6.8-16sarge5) 2.4.27-sarge-security: pending (2.4.27-10sarge4) diff --git a/active/CVE-2006-4538 b/active/CVE-2006-4538 index 9dde14db..0ec3b902 100644 --- a/active/CVE-2006-4538 +++ b/active/CVE-2006-4538 @@ -15,7 +15,6 @@ Ubuntu-Description: Notes: Bugs: upstream: -linux-2.6.16: linux-2.6: 2.6.8-sarge-security: 2.4.27-sarge-security: diff --git a/active/block-all-signals-race b/active/block-all-signals-race index cef99ae2..a70c1646 100644 --- a/active/block-all-signals-race +++ b/active/block-all-signals-race @@ -10,7 +10,6 @@ Description: Notes: Bugs: upstream: -linux-2.6.16: linux-2.6: pending (2.6.15.5) 2.6.8-sarge-security: 2.4.27-sarge-security: |