On Sun, 2009-08-16 at 16:30 +0200, Vianney Lejeune wrote:
> >
> >> Hello,
> >>
> >> I have a custom linux-source-2.6.18-2.6.18.dfsg.1-23etch1 (just
> >> patched for hardware support etc). I'm concerned with the lastest
> >> CVE-2009-2692 so I would like to update my kernel. As it was a lot of
> >> work to apply the hardware patches to the initial Etch's linux-
> >> source,
> >> I wonder if it's possible to update my already-patched-for-hardware-
> >> support-2.6.18-linux-source by applying the diff file from the
> >> lastest
> >> linux-image-2.6.18 package available for Etch ?
> >
> > Linux 2.6.18 in etch has not yet been updated to fix this. There is a
> > proposed patch at <http://bugs.debian.org/541403#10> but I don't know
> > whether it is correct.
>
> Thank you for your reply. But technically, let's suppose that a new
> linux 2.6.18's Debian package is released. Can I directly apply the
> whole linux-2.6.18's diff file available from the Debian package
> webpage (http://packages.debian.org/etch/linux-image-2.6.18-6-486) to
> my custom linux-source-2.6.18-2.6.18.dfsg.1-23etch1 to update my
> kernel with all the fixes from my kernel's version to the lastest ?
No, the diff also contains all previous bug fixes. You would need to
unpack the source package and look in debian/patches/bugfix to get a
specific fix patch.
Ben.
--
Ben Hutchings
Power corrupts. Absolute power is kind of neat.
- John Lehman, Secretary of the US Navy 1981-1987
Attachment:
signature.asc
Description: This is a digitally signed message part