Processing commands for cont...@bugs.debian.org: > forwarded 712664 > http://security.freebsd.org/advisories/FreeBSD-SA-13:06.mmap.asc Bug #712664 [src:kfreebsd-9] kfreebsd-9: CVE-2013-2171: Privilege escalation via mmap Set Bug forwarded-to-address to 'http://security.freebsd.org/advisories/FreeBSD-SA-13:06.mmap.asc'. > clone 712664 -1 Bug #712664 [src:kfreebsd-9] kfreebsd-9: CVE-2013-2171: Privilege escalation via mmap Bug 712664 cloned as bug 712892 > reassign -1 src:kfreebsd-10 Bug #712892 [src:kfreebsd-9] kfreebsd-9: CVE-2013-2171: Privilege escalation via mmap Bug reassigned from package 'src:kfreebsd-9' to 'src:kfreebsd-10'. No longer marked as found in versions kfreebsd-9/9.0-11 and kfreebsd-9/9.0~svn223109-0.1. Ignoring request to alter fixed versions of bug #712892 to the same values previously set > retitle -1 kfreebsd-10: CVE-2013-2171: Privilege escalation via mmap Bug #712892 [src:kfreebsd-10] kfreebsd-9: CVE-2013-2171: Privilege escalation via mmap Changed Bug title to 'kfreebsd-10: CVE-2013-2171: Privilege escalation via mmap' from 'kfreebsd-9: CVE-2013-2171: Privilege escalation via mmap' > # not a real package version, but it or any later version will fix this > fixed -1 kfreebsd-10/10.0~svn251901-1 Bug #712892 [src:kfreebsd-10] kfreebsd-10: CVE-2013-2171: Privilege escalation via mmap The source kfreebsd-10 and version 10.0~svn251901-1 do not appear to match any binary packages Marked as fixed in versions kfreebsd-10/10.0~svn251901-1. > thanks Stopping processing here.
Please contact me if you need assistance. -- 712664: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=712664 712892: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=712892 Debian Bug Tracking System Contact ow...@bugs.debian.org with problems -- To UNSUBSCRIBE, email to debian-bsd-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/handler.s.c.13717424906963.transcr...@bugs.debian.org