universe changes?

Brian Puccio brian at brianpuccio.net
Sat Nov 26 00:08:37 UTC 2005


On Thu, 2005-11-24 at 16:17 +0000, Dick Davies wrote:
> On 24/11/05, Brian Puccio <brian at brianpuccio.net> wrote:
> > On Tue, 2005-11-22 at 20:16 +0000, Dick Davies wrote:
> 
> > > I found the RSS feed at
> > >
> > >       http://www.ubuntulinux.nl/files/breezy.xml
> > >
> > > but that hasn't been updated for a month or so...
> >
> > There's also a RSS feed for security:
> >
> > http://www.ubuntulinux.nl/files/usn.xml
> 
> Hasn't updated since October either...

That's odd, maybe your ISP is caching it because viewing it in my
browser and scrolling down, I can see:

> <item>
> <title>[USN-219-1] Linux kernel vulnerabilities</title>
> -
> 	<guid>
> http://www.ubuntu.com/support/documentation/usn/usn-219-1
> </guid>
> -
> 	<link>
> http://www.ubuntu.com/support/documentation/usn/usn-219-1
> </link>
> -
> 	<description>
> 
>         <hr/>
>           Ubuntu Security Notice USN-219-1	  November 22, 2005<br />
>           linux-source-2.6.8.1/-2.6.10/-2.6.12 vulnerabilities<br />
>           CVE-2005-2709, CVE-2005-2973, CVE-2005-3055, CVE-2005-3180,<br />
>           CVE-2005-3271, CVE-2005-3272, CVE-2005-3273, CVE-2005-3274,<br />
>           CVE-2005-3275, CVE-2005-3276<br />
>         <hr/>
>         <p>
>             A security issue affects the following Ubuntu releases:
>         </p>
>         <p>
>             Ubuntu 4.10 (Warty Warthog)
>             Ubuntu 5.04 (Hoary Hedgehog)
>             Ubuntu 5.10 (Breezy Badger)
>         </p>
>         <p>
>             The following Ubuntu 4.10 packages are affected:
>         </p>
>         <p>
>           linux-image-2.6.8.1-6-386<br />
>           linux-image-2.6.8.1-6-686<br />
>           linux-image-2.6.8.1-6-686-smp<br />
>           linux-image-2.6.8.1-6-k7<br />
>           linux-image-2.6.8.1-6-k7-smp<br />
>           linux-image-2.6.8.1-6-amd64-generic<br />
>           linux-image-2.6.8.1-6-amd64-k8<br />
>           linux-image-2.6.8.1-6-amd64-k8-smp<br />
>           linux-image-2.6.8.1-6-amd64-xeon<br />
>           linux-image-2.6.8.1-6-power3<br />
>           linux-image-2.6.8.1-6-power3-smp<br />
>           linux-image-2.6.8.1-6-power4<br />
>           linux-image-2.6.8.1-6-power4-smp<br />
>           linux-image-2.6.8.1-6-powerpc<br />
>           linux-image-2.6.8.1-6-powerpc-smp<br />
>           linux-patch-debian-2.6.8.1
>         </p>
>         <p>
>             The following Ubuntu 5.04 packages are affected:
>         </p>
>         <p>
>           linux-image-2.6.10-6-386<br />
>           linux-image-2.6.10-6-686<br />
>           linux-image-2.6.10-6-686-smp<br />
>           linux-image-2.6.10-6-k7<br />
>           linux-image-2.6.10-6-k7-smp<br />
>           linux-image-2.6.10-6-amd64-generic<br />
>           linux-image-2.6.10-6-amd64-k8<br />
>           linux-image-2.6.10-6-amd64-k8-smp<br />
>           linux-image-2.6.10-6-amd64-xeon<br />
>           linux-image-2.6.10-6-power3<br />
>           linux-image-2.6.10-6-power3-smp<br />
>           linux-image-2.6.10-6-power4<br />
>           linux-image-2.6.10-6-power4-smp<br />
>           linux-image-2.6.10-6-powerpc<br />
>           linux-image-2.6.10-6-powerpc-smp<br />
>           linux-patch-ubuntu-2.6.10
>         </p>
>         <p>
>             The following Ubuntu 5.10 packages are affected:
>         </p>
>         <p>
>           linux-image-2.6.12-10-386<br />
>           linux-image-2.6.12-10-686<br />
>           linux-image-2.6.12-10-686-smp<br />
>           linux-image-2.6.12-10-k7<br />
>           linux-image-2.6.12-10-k7-smp<br />
>           linux-image-2.6.12-10-amd64-generic<br />
>           linux-image-2.6.12-10-amd64-k8<br />
>           linux-image-2.6.12-10-amd64-k8-smp<br />
>           linux-image-2.6.12-10-amd64-xeon<br />
>           linux-image-2.6.12-10-powerpc<br />
>           linux-image-2.6.12-10-powerpc-smp<br />
>           linux-image-2.6.12-10-powerpc64-smp<br />
>           linux-patch-ubuntu-2.6.12
>         </p>
>         <p>
>             The problem can be corrected by installing the affected package, which
>             provides a new kernel. Unless you manually uninstalled the standard
>             kernel metapackages (linux-image-386, linux-image-powerpc, or
>             linux-image-amd64-generic), this will happen automatically with a
>             standard system upgrade.
>         </p>
>         <p>
>             ATTENTION: Due to an unavoidable ABI change this kernel has been given
>             a new version number, which requires you to recompile and reinstall
>             all third party kernel modules you might have installed. If you use
>             linux-restricted-modules, you have to update that package as well to
>             get modules which work with the new kernel version. Unless you
>             manually uninstalled the standard kernel metapackages (linux-386,
>             linux-powerpc, linux-amd64-generic), a standard system upgrade will
>             automatically perform this as well.
>         </p>
> 
>       
> </description>
> <pubDate>Tue, 22 Nov 2005 12:34:21 +0000</pubDate>
> <dc:creator>Martin Pitt</dc:creator>
> <author>Martin Pitt</author>
> </item>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 189 bytes
Desc: This is a digitally signed message part
URL: <https://lists.ubuntu.com/archives/ubuntu-users/attachments/20051125/5dd669d2/attachment.sig>


More information about the ubuntu-users mailing list