[kernel-sec-discuss] r2750 - active
Ben Hutchings
benh at alioth.debian.org
Sun Sep 16 02:56:41 UTC 2012
Author: benh
Date: 2012-09-16 02:56:19 +0000 (Sun, 16 Sep 2012)
New Revision: 2750
Modified:
active/CVE-2012-3412
active/CVE-2012-3430
active/CVE-2012-3520
Log:
Mark pending/released fixes
Modified: active/CVE-2012-3412
===================================================================
--- active/CVE-2012-3412 2012-09-04 13:28:29 UTC (rev 2749)
+++ active/CVE-2012-3412 2012-09-16 02:56:19 UTC (rev 2750)
@@ -11,8 +11,8 @@
bwh> fix available that only touches the sfc driver, but with a greater
bwh> performance hit again.
Bugs:
-upstream:
+upstream: released (3.6-rc2) [30b678d844af3305cda5953467005cebb5d7b687, 7e6d06f0de3f74ca929441add094518ae332257c, 7e6d06f0de3f74ca929441add094518ae332257c]
2.6.32-upstream-stable:
-sid:
-2.6.32-squeeze-security:
-3.2-upstream-stable:
+sid: pending [bugfix/all/net-allow-driver-to-limit-number-of-gso-segments-per-skb.patch, bugfix/all/sfc-fix-maximum-number-of-tso-segments-and-minimum-tx-queue-size.patch, bugfix/all/tcp-apply-device-tso-segment-limit-earlier.patch]
+2.6.32-squeeze-security: pending [bugfix/all/sfc-Fix-maximum-number-of-TSO-segments-and-minimum-T.patch]
+3.2-upstream-stable: pending [net-allow-driver-to-limit-number-of-gso-segments-per-skb.patch, sfc-fix-maximum-number-of-tso-segments-and-minimum-tx-queue-size.patch, tcp-apply-device-tso-segment-limit-earlier.patch]
Modified: active/CVE-2012-3430
===================================================================
--- active/CVE-2012-3430 2012-09-04 13:28:29 UTC (rev 2749)
+++ active/CVE-2012-3430 2012-09-16 02:56:19 UTC (rev 2750)
@@ -4,6 +4,6 @@
Bugs:
upstream: released (3.6-rc1) [06b6a1cf6e776426766298d055bb3991957d90a7]
2.6.32-upstream-stable: needed
-sid: needed
+sid: pending [bugfix/all/rds-set-correct-msg_namelen.patch]
2.6.32-squeeze-security: needed
3.2-upstream-stable: needed
Modified: active/CVE-2012-3520
===================================================================
--- active/CVE-2012-3520 2012-09-04 13:28:29 UTC (rev 2749)
+++ active/CVE-2012-3520 2012-09-16 02:56:19 UTC (rev 2750)
@@ -2,8 +2,8 @@
References:
Notes:
Bugs:
-upstream: pending [e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea]
+upstream: released (3.6-rc3) [e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea]
2.6.32-upstream-stable: N/A "Introduced in 16e5726269611b71c930054ffe9b858c1cea88eb"
-sid: needed
+sid: pending [bugfix/all/af_netlink-force-credentials-passing.patch]
2.6.32-squeeze-security: N/A "Introduced in 16e5726269611b71c930054ffe9b858c1cea88eb"
-3.2-upstream-stable: needed
+3.2-upstream-stable: pending [af_netlink-force-credentials-passing.patch]
More information about the kernel-sec-discuss
mailing list