Processing commands for cont...@bugs.debian.org:

> forwarded 712664 
> http://security.freebsd.org/advisories/FreeBSD-SA-13:06.mmap.asc
Bug #712664 [src:kfreebsd-9] kfreebsd-9: CVE-2013-2171: Privilege escalation 
via mmap
Set Bug forwarded-to-address to 
'http://security.freebsd.org/advisories/FreeBSD-SA-13:06.mmap.asc'.
> clone 712664 -1
Bug #712664 [src:kfreebsd-9] kfreebsd-9: CVE-2013-2171: Privilege escalation 
via mmap
Bug 712664 cloned as bug 712892
> reassign -1 src:kfreebsd-10
Bug #712892 [src:kfreebsd-9] kfreebsd-9: CVE-2013-2171: Privilege escalation 
via mmap
Bug reassigned from package 'src:kfreebsd-9' to 'src:kfreebsd-10'.
No longer marked as found in versions kfreebsd-9/9.0-11 and 
kfreebsd-9/9.0~svn223109-0.1.
Ignoring request to alter fixed versions of bug #712892 to the same values 
previously set
> retitle -1 kfreebsd-10: CVE-2013-2171: Privilege escalation via mmap
Bug #712892 [src:kfreebsd-10] kfreebsd-9: CVE-2013-2171: Privilege escalation 
via mmap
Changed Bug title to 'kfreebsd-10: CVE-2013-2171: Privilege escalation via 
mmap' from 'kfreebsd-9: CVE-2013-2171: Privilege escalation via mmap'
> # not a real package version, but it or any later version will fix this
> fixed -1 kfreebsd-10/10.0~svn251901-1
Bug #712892 [src:kfreebsd-10] kfreebsd-10: CVE-2013-2171: Privilege escalation 
via mmap
The source kfreebsd-10 and version 10.0~svn251901-1 do not appear to match any 
binary packages
Marked as fixed in versions kfreebsd-10/10.0~svn251901-1.
> thanks
Stopping processing here.

Please contact me if you need assistance.
-- 
712664: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=712664
712892: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=712892
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems


--
To UNSUBSCRIBE, email to debian-bsd-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: 
http://lists.debian.org/handler.s.c.13717424906963.transcr...@bugs.debian.org

Reply via email to