[kernel-sec-discuss] r2750 - active

Ben Hutchings benh at alioth.debian.org
Sun Sep 16 02:56:41 UTC 2012


Author: benh
Date: 2012-09-16 02:56:19 +0000 (Sun, 16 Sep 2012)
New Revision: 2750

Modified:
   active/CVE-2012-3412
   active/CVE-2012-3430
   active/CVE-2012-3520
Log:
Mark pending/released fixes

Modified: active/CVE-2012-3412
===================================================================
--- active/CVE-2012-3412	2012-09-04 13:28:29 UTC (rev 2749)
+++ active/CVE-2012-3412	2012-09-16 02:56:19 UTC (rev 2750)
@@ -11,8 +11,8 @@
  bwh> fix available that only touches the sfc driver, but with a greater
  bwh> performance hit again.
 Bugs:
-upstream:
+upstream: released (3.6-rc2) [30b678d844af3305cda5953467005cebb5d7b687, 7e6d06f0de3f74ca929441add094518ae332257c, 7e6d06f0de3f74ca929441add094518ae332257c]
 2.6.32-upstream-stable:
-sid:
-2.6.32-squeeze-security:
-3.2-upstream-stable:
+sid: pending [bugfix/all/net-allow-driver-to-limit-number-of-gso-segments-per-skb.patch, bugfix/all/sfc-fix-maximum-number-of-tso-segments-and-minimum-tx-queue-size.patch, bugfix/all/tcp-apply-device-tso-segment-limit-earlier.patch]
+2.6.32-squeeze-security: pending [bugfix/all/sfc-Fix-maximum-number-of-TSO-segments-and-minimum-T.patch]
+3.2-upstream-stable: pending [net-allow-driver-to-limit-number-of-gso-segments-per-skb.patch, sfc-fix-maximum-number-of-tso-segments-and-minimum-tx-queue-size.patch, tcp-apply-device-tso-segment-limit-earlier.patch]

Modified: active/CVE-2012-3430
===================================================================
--- active/CVE-2012-3430	2012-09-04 13:28:29 UTC (rev 2749)
+++ active/CVE-2012-3430	2012-09-16 02:56:19 UTC (rev 2750)
@@ -4,6 +4,6 @@
 Bugs:
 upstream: released (3.6-rc1) [06b6a1cf6e776426766298d055bb3991957d90a7]
 2.6.32-upstream-stable: needed
-sid: needed
+sid: pending [bugfix/all/rds-set-correct-msg_namelen.patch]
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: needed

Modified: active/CVE-2012-3520
===================================================================
--- active/CVE-2012-3520	2012-09-04 13:28:29 UTC (rev 2749)
+++ active/CVE-2012-3520	2012-09-16 02:56:19 UTC (rev 2750)
@@ -2,8 +2,8 @@
 References:
 Notes:
 Bugs:
-upstream: pending [e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea]
+upstream: released (3.6-rc3) [e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea]
 2.6.32-upstream-stable: N/A "Introduced in 16e5726269611b71c930054ffe9b858c1cea88eb"
-sid: needed
+sid: pending [bugfix/all/af_netlink-force-credentials-passing.patch]
 2.6.32-squeeze-security: N/A "Introduced in 16e5726269611b71c930054ffe9b858c1cea88eb"
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending [af_netlink-force-credentials-passing.patch]




More information about the kernel-sec-discuss mailing list