[kernel-sec-discuss] r2751 - active
Moritz Muehlenhoff
jmm at alioth.debian.org
Wed Sep 19 06:03:48 UTC 2012
Author: jmm
Date: 2012-09-19 06:03:27 +0000 (Wed, 19 Sep 2012)
New Revision: 2751
Modified:
active/CVE-2012-3412
active/CVE-2012-3430
active/CVE-2012-3520
Log:
record sid fixes
Modified: active/CVE-2012-3412
===================================================================
--- active/CVE-2012-3412 2012-09-16 02:56:19 UTC (rev 2750)
+++ active/CVE-2012-3412 2012-09-19 06:03:27 UTC (rev 2751)
@@ -13,6 +13,6 @@
Bugs:
upstream: released (3.6-rc2) [30b678d844af3305cda5953467005cebb5d7b687, 7e6d06f0de3f74ca929441add094518ae332257c, 7e6d06f0de3f74ca929441add094518ae332257c]
2.6.32-upstream-stable:
-sid: pending [bugfix/all/net-allow-driver-to-limit-number-of-gso-segments-per-skb.patch, bugfix/all/sfc-fix-maximum-number-of-tso-segments-and-minimum-tx-queue-size.patch, bugfix/all/tcp-apply-device-tso-segment-limit-earlier.patch]
+sid: released (3.2.29-1) [bugfix/all/net-allow-driver-to-limit-number-of-gso-segments-per-skb.patch, bugfix/all/sfc-fix-maximum-number-of-tso-segments-and-minimum-tx-queue-size.patch, bugfix/all/tcp-apply-device-tso-segment-limit-earlier.patch]
2.6.32-squeeze-security: pending [bugfix/all/sfc-Fix-maximum-number-of-TSO-segments-and-minimum-T.patch]
3.2-upstream-stable: pending [net-allow-driver-to-limit-number-of-gso-segments-per-skb.patch, sfc-fix-maximum-number-of-tso-segments-and-minimum-tx-queue-size.patch, tcp-apply-device-tso-segment-limit-earlier.patch]
Modified: active/CVE-2012-3430
===================================================================
--- active/CVE-2012-3430 2012-09-16 02:56:19 UTC (rev 2750)
+++ active/CVE-2012-3430 2012-09-19 06:03:27 UTC (rev 2751)
@@ -4,6 +4,6 @@
Bugs:
upstream: released (3.6-rc1) [06b6a1cf6e776426766298d055bb3991957d90a7]
2.6.32-upstream-stable: needed
-sid: pending [bugfix/all/rds-set-correct-msg_namelen.patch]
+sid: released (3.2.29-1) [bugfix/all/rds-set-correct-msg_namelen.patch]
2.6.32-squeeze-security: needed
3.2-upstream-stable: needed
Modified: active/CVE-2012-3520
===================================================================
--- active/CVE-2012-3520 2012-09-16 02:56:19 UTC (rev 2750)
+++ active/CVE-2012-3520 2012-09-19 06:03:27 UTC (rev 2751)
@@ -4,6 +4,6 @@
Bugs:
upstream: released (3.6-rc3) [e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea]
2.6.32-upstream-stable: N/A "Introduced in 16e5726269611b71c930054ffe9b858c1cea88eb"
-sid: pending [bugfix/all/af_netlink-force-credentials-passing.patch]
+sid: released (3.2.29-1) [bugfix/all/af_netlink-force-credentials-passing.patch]
2.6.32-squeeze-security: N/A "Introduced in 16e5726269611b71c930054ffe9b858c1cea88eb"
3.2-upstream-stable: pending [af_netlink-force-credentials-passing.patch]
More information about the kernel-sec-discuss
mailing list