[kernel-sec-discuss] r3062 - active retired

Moritz Muehlenhoff jmm at alioth.debian.org
Tue Sep 3 11:20:43 UTC 2013


Author: jmm
Date: 2013-09-03 11:20:21 +0000 (Tue, 03 Sep 2013)
New Revision: 3062

Added:
   retired/CVE-2012-3412
Removed:
   active/CVE-2012-3412
Log:
retire


Deleted: active/CVE-2012-3412
===================================================================
--- active/CVE-2012-3412	2013-09-03 11:01:09 UTC (rev 3061)
+++ active/CVE-2012-3412	2013-09-03 11:20:21 UTC (rev 3062)
@@ -1,19 +0,0 @@
-Description: sfc: potential remote denial of service through TCP MSS option
-References:
- http://www.spinics.net/lists/netdev/msg206292.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3412
-Notes:
- bwh> Critical changes are commit 30b678d844af3305cda5953467005cebb5d7b687
- bwh> and 7e6d06f0de3f74ca929441add094518ae332257c.  The following commit
- bwh> 7e6d06f0de3f74ca929441add094518ae332257c reduces the performance hit
- bwh> for sfc in the extreme case that causes DoS, but it's higher risk and
- bwh> I'm not aware of any customer hitting this.  There is an alternate
- bwh> fix available that only touches the sfc driver, but with a greater
- bwh> performance hit again.
-Bugs:
-upstream: released (3.6-rc2) [30b678d844af3305cda5953467005cebb5d7b687, 7e6d06f0de3f74ca929441add094518ae332257c, 7e6d06f0de3f74ca929441add094518ae332257c]
-2.6.32-upstream-stable: ignored
-sid: released (3.2.29-1) [bugfix/all/net-allow-driver-to-limit-number-of-gso-segments-per-skb.patch, bugfix/all/sfc-fix-maximum-number-of-tso-segments-and-minimum-tx-queue-size.patch, bugfix/all/tcp-apply-device-tso-segment-limit-earlier.patch]
-2.6.32-squeeze-security: released (2.6.32-46) [bugfix/all/sfc-Fix-maximum-number-of-TSO-segments-and-minimum-T.patch]
-3.2-wheezy-security: released (3.2.29-1)
-3.2-upstream-stable: released (3.2.30) [net-allow-driver-to-limit-number-of-gso-segments-per-skb.patch, sfc-fix-maximum-number-of-tso-segments-and-minimum-tx-queue-size.patch, tcp-apply-device-tso-segment-limit-earlier.patch]

Copied: retired/CVE-2012-3412 (from rev 3055, active/CVE-2012-3412)
===================================================================
--- retired/CVE-2012-3412	                        (rev 0)
+++ retired/CVE-2012-3412	2013-09-03 11:20:21 UTC (rev 3062)
@@ -0,0 +1,19 @@
+Description: sfc: potential remote denial of service through TCP MSS option
+References:
+ http://www.spinics.net/lists/netdev/msg206292.html
+ https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3412
+Notes:
+ bwh> Critical changes are commit 30b678d844af3305cda5953467005cebb5d7b687
+ bwh> and 7e6d06f0de3f74ca929441add094518ae332257c.  The following commit
+ bwh> 7e6d06f0de3f74ca929441add094518ae332257c reduces the performance hit
+ bwh> for sfc in the extreme case that causes DoS, but it's higher risk and
+ bwh> I'm not aware of any customer hitting this.  There is an alternate
+ bwh> fix available that only touches the sfc driver, but with a greater
+ bwh> performance hit again.
+Bugs:
+upstream: released (3.6-rc2) [30b678d844af3305cda5953467005cebb5d7b687, 7e6d06f0de3f74ca929441add094518ae332257c, 7e6d06f0de3f74ca929441add094518ae332257c]
+2.6.32-upstream-stable: ignored
+sid: released (3.2.29-1) [bugfix/all/net-allow-driver-to-limit-number-of-gso-segments-per-skb.patch, bugfix/all/sfc-fix-maximum-number-of-tso-segments-and-minimum-tx-queue-size.patch, bugfix/all/tcp-apply-device-tso-segment-limit-earlier.patch]
+2.6.32-squeeze-security: released (2.6.32-46) [bugfix/all/sfc-Fix-maximum-number-of-TSO-segments-and-minimum-T.patch]
+3.2-wheezy-security: released (3.2.29-1)
+3.2-upstream-stable: released (3.2.30) [net-allow-driver-to-limit-number-of-gso-segments-per-skb.patch, sfc-fix-maximum-number-of-tso-segments-and-minimum-tx-queue-size.patch, tcp-apply-device-tso-segment-limit-earlier.patch]


Property changes on: retired/CVE-2012-3412
___________________________________________________________________
Added: svn:mergeinfo
   + 




More information about the kernel-sec-discuss mailing list