Processing commands for cont...@bugs.debian.org:

> # fixed in 10.3 branch since r293897
> fixed 811278 kfreebsd-10/10.3~svn296373-1
Bug #811278 {Done: Steven Chamberlain <ste...@pyro.eu.org>} [src:kfreebsd-10] 
kfreebsd-10: CVE-2016-1880: Linux compatibility layer incorrect futex handling 
[SA-16:03]
Marked as fixed in versions kfreebsd-10/10.3~svn296373-1.
> fixed 811279 kfreebsd-10/10.3~svn296373-1
Bug #811279 {Done: Steven Chamberlain <ste...@pyro.eu.org>} [src:kfreebsd-10] 
kfreebsd-10: CVE-2016-1881: Linux compatibility layer setgroups(2) system call 
vulnerability [SA-16:04]
Marked as fixed in versions kfreebsd-10/10.3~svn296373-1.
> fixed 811280 kfreebsd-10/10.3~svn296373-1
Bug #811280 {Done: Steven Chamberlain <ste...@pyro.eu.org>} [src:kfreebsd-10] 
kfreebsd-10: CVE-2016-1882: TCP MD5 signature denial of service [SA-16:05]
Marked as fixed in versions kfreebsd-10/10.3~svn296373-1.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
811278: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=811278
811279: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=811279
811280: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=811280
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems

Reply via email to