[kernel-sec-discuss] r2751 - active

Moritz Muehlenhoff jmm at alioth.debian.org
Wed Sep 19 06:03:48 UTC 2012


Author: jmm
Date: 2012-09-19 06:03:27 +0000 (Wed, 19 Sep 2012)
New Revision: 2751

Modified:
   active/CVE-2012-3412
   active/CVE-2012-3430
   active/CVE-2012-3520
Log:
record sid fixes


Modified: active/CVE-2012-3412
===================================================================
--- active/CVE-2012-3412	2012-09-16 02:56:19 UTC (rev 2750)
+++ active/CVE-2012-3412	2012-09-19 06:03:27 UTC (rev 2751)
@@ -13,6 +13,6 @@
 Bugs:
 upstream: released (3.6-rc2) [30b678d844af3305cda5953467005cebb5d7b687, 7e6d06f0de3f74ca929441add094518ae332257c, 7e6d06f0de3f74ca929441add094518ae332257c]
 2.6.32-upstream-stable:
-sid: pending [bugfix/all/net-allow-driver-to-limit-number-of-gso-segments-per-skb.patch, bugfix/all/sfc-fix-maximum-number-of-tso-segments-and-minimum-tx-queue-size.patch, bugfix/all/tcp-apply-device-tso-segment-limit-earlier.patch]
+sid: released (3.2.29-1) [bugfix/all/net-allow-driver-to-limit-number-of-gso-segments-per-skb.patch, bugfix/all/sfc-fix-maximum-number-of-tso-segments-and-minimum-tx-queue-size.patch, bugfix/all/tcp-apply-device-tso-segment-limit-earlier.patch]
 2.6.32-squeeze-security: pending [bugfix/all/sfc-Fix-maximum-number-of-TSO-segments-and-minimum-T.patch]
 3.2-upstream-stable: pending [net-allow-driver-to-limit-number-of-gso-segments-per-skb.patch, sfc-fix-maximum-number-of-tso-segments-and-minimum-tx-queue-size.patch, tcp-apply-device-tso-segment-limit-earlier.patch]

Modified: active/CVE-2012-3430
===================================================================
--- active/CVE-2012-3430	2012-09-16 02:56:19 UTC (rev 2750)
+++ active/CVE-2012-3430	2012-09-19 06:03:27 UTC (rev 2751)
@@ -4,6 +4,6 @@
 Bugs:
 upstream: released (3.6-rc1) [06b6a1cf6e776426766298d055bb3991957d90a7]
 2.6.32-upstream-stable: needed
-sid: pending [bugfix/all/rds-set-correct-msg_namelen.patch]
+sid: released (3.2.29-1) [bugfix/all/rds-set-correct-msg_namelen.patch]
 2.6.32-squeeze-security: needed
 3.2-upstream-stable: needed

Modified: active/CVE-2012-3520
===================================================================
--- active/CVE-2012-3520	2012-09-16 02:56:19 UTC (rev 2750)
+++ active/CVE-2012-3520	2012-09-19 06:03:27 UTC (rev 2751)
@@ -4,6 +4,6 @@
 Bugs:
 upstream: released (3.6-rc3) [e0e3cea46d31d23dc40df0a49a7a2c04fe8edfea]
 2.6.32-upstream-stable: N/A "Introduced in 16e5726269611b71c930054ffe9b858c1cea88eb"
-sid: pending [bugfix/all/af_netlink-force-credentials-passing.patch]
+sid: released (3.2.29-1) [bugfix/all/af_netlink-force-credentials-passing.patch]
 2.6.32-squeeze-security: N/A "Introduced in 16e5726269611b71c930054ffe9b858c1cea88eb"
 3.2-upstream-stable: pending [af_netlink-force-credentials-passing.patch]




More information about the kernel-sec-discuss mailing list