Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 22 Aug 2013 22:47:02 +0200
Source: kfreebsd-9
Binary: kfreebsd-source-9.2 kfreebsd-headers-9.2-1 kfreebsd-image-9-686-smp
kfreebsd-headers-9-686-smp kfreebsd-image-9.2-1-amd64 kfreebsd-image-9-amd64
kfreebsd-header
kfreebsd-9_9.2~svn254368-2_kfreebsd-amd64.changes uploaded successfully to
localhost
along with the files:
kfreebsd-9_9.2~svn254368-2.dsc
kfreebsd-9_9.2~svn254368-2.debian.tar.gz
kfreebsd-source-9.2_9.2~svn254368-2_all.deb
kfreebsd-headers-9.2-1_9.2~svn254368-2_kfreebsd-amd64.deb
kfreebs
Your message dated Thu, 22 Aug 2013 22:34:22 +
with message-id
and subject line Bug#720468: fixed in kfreebsd-9 9.2~svn254368-2
has caused the Debian Bug report #720468,
regarding kfreebsd-9: CVE-2013-3077: local ip_multicast buffer overflow
to be marked as done.
This means that you claim tha
Your message dated Thu, 22 Aug 2013 22:34:22 +
with message-id
and subject line Bug#720475: fixed in kfreebsd-9 9.2~svn254368-2
has caused the Debian Bug report #720475,
regarding kfreebsd-9: CVE-2013-5209: sctp kernel memory disclosure
to be marked as done.
This means that you claim that the
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 22 Aug 2013 18:50:23 +0200
Source: kfreebsd-10
Binary: kfreebsd-source-10.0 kfreebsd-headers-10.0-0
kfreebsd-image-10.0-0-686-smp kfreebsd-image-10-686-smp
kfreebsd-headers-10.0-0-686-smp kfreebsd-headers-10-686-sm
Your message dated Thu, 22 Aug 2013 21:05:53 +
with message-id
and subject line Bug#720478: fixed in kfreebsd-10 10.0~svn254663-1
has caused the Debian Bug report #720478,
regarding kfreebsd-10: CVE-2013-5209: sctp kernel memory disclosure
to be marked as done.
This means that you claim that
Your message dated Thu, 22 Aug 2013 21:05:53 +
with message-id
and subject line Bug#706736: fixed in kfreebsd-10 10.0~svn254663-1
has caused the Debian Bug report #706736,
regarding kFreeBSD users cannot know all options of running kernel
to be marked as done.
This means that you claim that t
Your message dated Thu, 22 Aug 2013 21:05:53 +
with message-id
and subject line Bug#720471: fixed in kfreebsd-10 10.0~svn254663-1
has caused the Debian Bug report #720471,
regarding kfreebsd-10: CVE-2013-3077: local ip_multicast buffer overflow
to be marked as done.
This means that you claim
kfreebsd-10_10.0~svn254663-1_kfreebsd-amd64.changes uploaded successfully to
localhost
along with the files:
kfreebsd-10_10.0~svn254663-1.dsc
kfreebsd-10_10.0~svn254663.orig.tar.xz
kfreebsd-10_10.0~svn254663-1.debian.tar.gz
kfreebsd-source-10.0_10.0~svn254663-1_all.deb
kfreebsd-headers-1
Am 17.08.2013 16:21, schrieb Christoph Egger:
> Moin!
>
> Steven Chamberlain writes:
>> On 16/08/13 13:15, Christoph Egger wrote:
>>> I talked to rene here at DebConf. The problems did show up in the past
>>> when running the testsuite (hangs). Rene tried with current OpenJDK on
>>> falla -- in
On 22/08/2013 22:32, Robert Millan wrote:
> but kfreebsd-9 in sid is tracking releng/9.0
Eh, never mind. Please ignore what I said.
--
Robert Millan
--
To UNSUBSCRIBE, email to debian-bsd-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Ar
On 22/08/2013 13:41, Steven Chamberlain wrote:
> kfreebsd-9 in jessie/sid will need updating to r254630 or later
> [...]
> kfreebsd-9 in jessie/sid will need updating to r254355 or later
These commits are in stable/9, but kfreebsd-9 in sid is tracking
releng/9.0, which doesn't have the fix AFAICS.
Is there any point in keeping kfreebsd-8 in sid?
Just wondering if it's worth the extra work.
--
Robert Millan
--
To UNSUBSCRIBE, email to debian-bsd-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: http://lists.debian.org/521674
On 22/08/2013 13:43, Steven Chamberlain wrote:
>
> kfreebsd-8 and kfreebsd-9 in wheezy will need the patch from r254629
>
> kfreebsd-9 in jessie/sid will need updating to r254630 or later
>
> kfreebsd-10 in experimental will need updating to r254629 or later
>
> kfreebsd-8 8.1 in oldstable look
Processing commands for cont...@bugs.debian.org:
> fixed 720475 kfreebsd-9/9.2~svn254368-1
Bug #720475 [src:kfreebsd-9] kfreebsd-9: CVE-2013-5209: sctp kernel memory
disclosure
Marked as fixed in versions kfreebsd-9/9.2~svn254368-1.
> thanks
Stopping processing here.
Please contact me if you nee
Your message dated Thu, 22 Aug 2013 13:12:41 +0100
with message-id <52160039.7000...@pyro.eu.org>
and subject line Re: Bug#720480: kfreebsd-9: EN-13:03: mfi driver may corrupt
large disks
has caused the Debian Bug report #720480,
regarding kfreebsd-9: EN-13:03: mfi driver may corrupt large disks
t
Processing commands for cont...@bugs.debian.org:
> found 720478 kfreebsd-10/10.0~svn225709-1
Bug #720478 [src:kfreebsd-10] kfreebsd-10: CVE-2013-5209: sctp kernel memory
disclosure
Marked as found in versions kfreebsd-10/10.0~svn225709-1.
> thanks
Stopping processing here.
Please contact me if y
Package: src:kfreebsd-9
Version: 9.1-4
Severity: important
Tags: upstream
This affects only the 9.1 package in jessie which will soon be gone.
http://www.freebsd.org/security/advisories/FreeBSD-EN-13:03.mfi.asc
> The mfi(4) driver supports LSI's next generation PCI Express SAS RAID
> controllers
Processing commands for cont...@bugs.debian.org:
> found 720468 kfreebsd-9/9.0~svn223109-0.1
Bug #720468 [src:kfreebsd-9] kfreebsd-9: CVE-2013-3077: local ip_multicast
buffer overflow
Marked as found in versions kfreebsd-9/9.0~svn223109-0.1.
> thanks
Stopping processing here.
Please contact me i
Package: src:kfreebsd-10
Version: 10.0~svn253832-1
Severity: grave
Tags: security upstream
Control: kfreebsd-10/10.0~svn225709-1
http://security.FreeBSD.org/advisories/FreeBSD-SA-13:10.sctp.asc
> When initializing the SCTP state cookie being sent in INIT-ACK chunks,
> a buffer allocated from the
Package: src:kfreebsd-8
Version: 8.3-7
Severity: grave
Tags: security upstream
Control: found -1 kfreebsd-8/8.0-1
http://security.FreeBSD.org/advisories/FreeBSD-SA-13:10.sctp.asc
> When initializing the SCTP state cookie being sent in INIT-ACK chunks,
> a buffer allocated from the kernel stack is
Processing control commands:
> found -1 kfreebsd-8/8.0-1
Bug #720476 [src:kfreebsd-8] kfreebsd-8: CVE-2013-5209: sctp kernel memory
disclosure
Marked as found in versions kfreebsd-8/8.0-1.
--
720476: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=720476
Debian Bug Tracking System
Contact ow..
Package: src:kfreebsd-9
Version: 9.0-10+deb70.2
Severity: grave
Tags: security upstream
Control: found -1 kfreebsd-9/9.0~svn223109-0.1
http://security.FreeBSD.org/advisories/FreeBSD-SA-13:10.sctp.asc
> When initializing the SCTP state cookie being sent in INIT-ACK chunks,
> a buffer allocated fro
Processing control commands:
> found -1 kfreebsd-9/9.0~svn223109-0.1
Bug #720475 [src:kfreebsd-9] kfreebsd-9: CVE-2013-5209: sctp kernel memory
disclosure
Marked as found in versions kfreebsd-9/9.0~svn223109-0.1.
--
720475: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=720475
Debian Bug Trac
Processing control commands:
> found -1 kfreebsd-8/8.0-1
Bug #720470 [src:kfreebsd-8] kfreebsd-8: CVE-2013-3077: local ip_multicast
buffer overflow
Marked as found in versions kfreebsd-8/8.0-1.
--
720470: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=720470
Debian Bug Tracking System
Contact
Package: src:kfreebsd-9
Version: 9.0-10+deb70.2
Severity: grave
Tags: security upstream
http://security.FreeBSD.org/advisories/FreeBSD-SA-13:09.ip_multicast.asc
> integer overflow in IP_MSFILTER
> An integer overflow in computing the size of a temporary buffer can
> result in a buffer which is t
Processing control commands:
> found -1 kfreebsd-10/10.0~svn225709-1
Bug #720471 [src:kfreebsd-10] kfreebsd-10: CVE-2013-3077: local ip_multicast
buffer overflow
Marked as found in versions kfreebsd-10/10.0~svn225709-1.
--
720471: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=720471
Debian B
Package: src:kfreebsd-8
Version: 8.3-7
Severity: grave
Tags: security upstream
Control: found -1 kfreebsd-8/8.0-1
http://security.FreeBSD.org/advisories/FreeBSD-SA-13:09.ip_multicast.asc
> integer overflow in IP_MSFILTER
> An integer overflow in computing the size of a temporary buffer can
> res
Package: src:kfreebsd-10
Version: 10.0~svn253832-1
Severity: grave
Tags: security upstream
Control: found -1 kfreebsd-10/10.0~svn225709-1
http://security.FreeBSD.org/advisories/FreeBSD-SA-13:09.ip_multicast.asc
> integer overflow in IP_MSFILTER
> An integer overflow in computing the size of a te
Hi,
On Thu, Aug 22, 2013 at 12:14:21PM +0200, Julien Cristau wrote:
> I have no idea what the implications of the switch are for us.
I didn't realy understand completely either why but I think they want a
OK from the RT because stuff assuming gcj on kfreebsd might break if that
is changed to open
On 22/08/13 11:14, Julien Cristau wrote:
> On Thu, Aug 22, 2013 at 10:50:23 +0100, Steven Chamberlain wrote:
>> If we could please get final approval from the release team we could
>> begin today the plan suggested in <87txiojt4d@mitoraj.siccegge.de>
>>
> It's not clear to me how/why the releas
On Thu, Aug 22, 2013 at 10:50:23 +0100, Steven Chamberlain wrote:
> Hi Rene,
>
> Thanks for testing with openjdk-7 already.
>
> On 22/08/13 10:41, Rene Engelhard wrote:
> > Is there a ETA for the switch?
>
> If we could please get final approval from the release team we could
> begin today the
Hi Rene,
Thanks for testing with openjdk-7 already.
On 22/08/13 10:41, Rene Engelhard wrote:
> Is there a ETA for the switch?
If we could please get final approval from the release team we could
begin today the plan suggested in <87txiojt4d@mitoraj.siccegge.de>
Thanks,
Regards,
--
Steven C
Hi,
On Sat, Aug 17, 2013 at 08:38:09PM +0200, Damien Raude-Morvan wrote:
> Le samedi 17 août 2013 16:21:06 Christoph Egger a écrit :
> > I've been talking with Julien from the release team and Damien, the
> > openjdk maintainer here at DebConf.
> >
> > Switching could -- as far as I understand --
Your message dated Thu, 22 Aug 2013 09:03:50 +
with message-id
and subject line Bug#720442: fixed in partman-zfs 27
has caused the Debian Bug report #720442,
regarding installation-report: Partman does not start in expert install
to be marked as done.
This means that you claim that the proble
Your message dated Thu, 22 Aug 2013 09:03:50 +
with message-id
and subject line Bug#720442: fixed in partman-zfs 27
has caused the Debian Bug report #720442,
regarding Partitioning fails due to ZFS
to be marked as done.
This means that you claim that the problem has been dealt with.
If this i
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Format: 1.8
Date: Thu, 22 Aug 2013 10:15:08 +0200
Source: partman-zfs
Binary: partman-zfs
Architecture: source i386
Version: 27
Distribution: unstable
Urgency: low
Maintainer: Debian Install System Team
Changed-By: Christian Perrier
Description:
pa
Quoting Aron Xu (happyaron...@gmail.com):
> Package: src:partman-zfs
> Severity: wishlist
> Tags: patch
>
> Previously we only cared about kfreebsd so only kfreebsd-sparc is
> checked, this patch adds sparc for ZoL.
I committed and uploaded this...without really checking.
And there was a missin
38 matches
Mail list logo