Re: Note about missing security support for kfreebsd-5

2006-10-10 Thread Moritz Muehlenhoff
Aurelien Jarno wrote: > > I noticed that kfreebsd-5 is in testing now. There won't be security > > support for the FreeBSD kernel until Debian-KFreeBSD is a fully > > functional, official port. Yet users may run into this error if > > it's included in the stable release. Please either > > a) have i

Bug#391289: kfreebsd-5: several security issues in freebsd

2006-10-10 Thread Aurelien Jarno
severity 391289 normal thanks On Thu, Oct 05, 2006 at 10:07:33PM +0200, Stefan Fritsch wrote: > CVE-2006-4304: > > Buffer overflow in the sppp driver in FreeBSD 4.11 through 6.1, NetBSD > 2.0 through 4.0 beta before 20060823, and OpenBSD 3.8 and 3.9 before > 20060902 allows remote attackers to ca

Processed: Re: Bug#391289: kfreebsd-5: several security issues in freebsd

2006-10-10 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]: > severity 391289 normal Bug#391289: kfreebsd-5: several security issues in freebsd Severity set to `normal' from `important' > thanks Stopping processing here. Please contact me if you need assistance. Debian bug tracking system administrator (adminis

Re: Note about missing security support for kfreebsd-5

2006-10-10 Thread Aurelien Jarno
On Mon, Oct 09, 2006 at 07:33:06PM +0200, Moritz Muehlenhoff wrote: > Hi, > I noticed that kfreebsd-5 is in testing now. There won't be security > support for the FreeBSD kernel until Debian-KFreeBSD is a fully > functional, official port. Yet users may run into this error if > it's included in the

kfreebsd-5_5.4-19_amd64.changes ACCEPTED

2006-10-10 Thread Debian Installer
Accepted: kfreebsd-5_5.4-19.diff.gz to pool/main/k/kfreebsd-5/kfreebsd-5_5.4-19.diff.gz kfreebsd-5_5.4-19.dsc to pool/main/k/kfreebsd-5/kfreebsd-5_5.4-19.dsc kfreebsd-source-5.4_5.4-19_all.deb to pool/main/k/kfreebsd-5/kfreebsd-source-5.4_5.4-19_all.deb Override entries for your package: k

Processing of kfreebsd-5_5.4-19_amd64.changes

2006-10-10 Thread Archive Administrator
kfreebsd-5_5.4-19_amd64.changes uploaded successfully to localhost along with the files: kfreebsd-5_5.4-19.dsc kfreebsd-5_5.4-19.diff.gz kfreebsd-source-5.4_5.4-19_all.deb Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubsc

kfreebsd-5_5.4-18_amd64.changes ACCEPTED

2006-10-10 Thread Debian Installer
Accepted: kfreebsd-5_5.4-18.diff.gz to pool/main/k/kfreebsd-5/kfreebsd-5_5.4-18.diff.gz kfreebsd-5_5.4-18.dsc to pool/main/k/kfreebsd-5/kfreebsd-5_5.4-18.dsc kfreebsd-source-5.4_5.4-18_all.deb to pool/main/k/kfreebsd-5/kfreebsd-source-5.4_5.4-18_all.deb Override entries for your package: k

Processing of kfreebsd-5_5.4-18_amd64.changes

2006-10-10 Thread Archive Administrator
kfreebsd-5_5.4-18_amd64.changes uploaded successfully to localhost along with the files: kfreebsd-5_5.4-18.dsc kfreebsd-5_5.4-18.diff.gz kfreebsd-source-5.4_5.4-18_all.deb Greetings, Your Debian queue daemon -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubsc

Bug#391289: kfreebsd-5: several security issues in freebsd

2006-10-10 Thread Aurelien Jarno
On Thu, Oct 05, 2006 at 10:07:33PM +0200, Stefan Fritsch wrote: > CVE-2006-4178: > > Integer signedness error in the i386_set_ldt call in FreeBSD 5.5, and > possibly earlier versions down to 5.2, allows local users to cause a > denial of service (crash) via unspecified arguments that use negative