kfreebsd-9_9.2~svn254368-2_kfreebsd-amd64.changes ACCEPTED into unstable

2013-08-22 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 22 Aug 2013 22:47:02 +0200 Source: kfreebsd-9 Binary: kfreebsd-source-9.2 kfreebsd-headers-9.2-1 kfreebsd-image-9-686-smp kfreebsd-headers-9-686-smp kfreebsd-image-9.2-1-amd64 kfreebsd-image-9-amd64 kfreebsd-header

Processing of kfreebsd-9_9.2~svn254368-2_kfreebsd-amd64.changes

2013-08-22 Thread Debian FTP Masters
kfreebsd-9_9.2~svn254368-2_kfreebsd-amd64.changes uploaded successfully to localhost along with the files: kfreebsd-9_9.2~svn254368-2.dsc kfreebsd-9_9.2~svn254368-2.debian.tar.gz kfreebsd-source-9.2_9.2~svn254368-2_all.deb kfreebsd-headers-9.2-1_9.2~svn254368-2_kfreebsd-amd64.deb kfreebs

Bug#720468: marked as done (kfreebsd-9: CVE-2013-3077: local ip_multicast buffer overflow)

2013-08-22 Thread Debian Bug Tracking System
Your message dated Thu, 22 Aug 2013 22:34:22 + with message-id and subject line Bug#720468: fixed in kfreebsd-9 9.2~svn254368-2 has caused the Debian Bug report #720468, regarding kfreebsd-9: CVE-2013-3077: local ip_multicast buffer overflow to be marked as done. This means that you claim tha

Bug#720475: marked as done (kfreebsd-9: CVE-2013-5209: sctp kernel memory disclosure)

2013-08-22 Thread Debian Bug Tracking System
Your message dated Thu, 22 Aug 2013 22:34:22 + with message-id and subject line Bug#720475: fixed in kfreebsd-9 9.2~svn254368-2 has caused the Debian Bug report #720475, regarding kfreebsd-9: CVE-2013-5209: sctp kernel memory disclosure to be marked as done. This means that you claim that the

kfreebsd-10_10.0~svn254663-1_kfreebsd-amd64.changes ACCEPTED into experimental

2013-08-22 Thread Debian FTP Masters
Accepted: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 22 Aug 2013 18:50:23 +0200 Source: kfreebsd-10 Binary: kfreebsd-source-10.0 kfreebsd-headers-10.0-0 kfreebsd-image-10.0-0-686-smp kfreebsd-image-10-686-smp kfreebsd-headers-10.0-0-686-smp kfreebsd-headers-10-686-sm

Bug#720478: marked as done (kfreebsd-10: CVE-2013-5209: sctp kernel memory disclosure)

2013-08-22 Thread Debian Bug Tracking System
Your message dated Thu, 22 Aug 2013 21:05:53 + with message-id and subject line Bug#720478: fixed in kfreebsd-10 10.0~svn254663-1 has caused the Debian Bug report #720478, regarding kfreebsd-10: CVE-2013-5209: sctp kernel memory disclosure to be marked as done. This means that you claim that

Bug#706736: marked as done (kFreeBSD users cannot know all options of running kernel)

2013-08-22 Thread Debian Bug Tracking System
Your message dated Thu, 22 Aug 2013 21:05:53 + with message-id and subject line Bug#706736: fixed in kfreebsd-10 10.0~svn254663-1 has caused the Debian Bug report #706736, regarding kFreeBSD users cannot know all options of running kernel to be marked as done. This means that you claim that t

Bug#720471: marked as done (kfreebsd-10: CVE-2013-3077: local ip_multicast buffer overflow)

2013-08-22 Thread Debian Bug Tracking System
Your message dated Thu, 22 Aug 2013 21:05:53 + with message-id and subject line Bug#720471: fixed in kfreebsd-10 10.0~svn254663-1 has caused the Debian Bug report #720471, regarding kfreebsd-10: CVE-2013-3077: local ip_multicast buffer overflow to be marked as done. This means that you claim

Processing of kfreebsd-10_10.0~svn254663-1_kfreebsd-amd64.changes

2013-08-22 Thread Debian FTP Masters
kfreebsd-10_10.0~svn254663-1_kfreebsd-amd64.changes uploaded successfully to localhost along with the files: kfreebsd-10_10.0~svn254663-1.dsc kfreebsd-10_10.0~svn254663.orig.tar.xz kfreebsd-10_10.0~svn254663-1.debian.tar.gz kfreebsd-source-10.0_10.0~svn254663-1_all.deb kfreebsd-headers-1

Re: default-jdk change on kfreebsd

2013-08-22 Thread Matthias Klose
Am 17.08.2013 16:21, schrieb Christoph Egger: > Moin! > > Steven Chamberlain writes: >> On 16/08/13 13:15, Christoph Egger wrote: >>> I talked to rene here at DebConf. The problems did show up in the past >>> when running the testsuite (hangs). Rene tried with current OpenJDK on >>> falla -- in

Bug#720468: kfreebsd-9: CVE-2013-3077: local ip_multicast buffer overflow

2013-08-22 Thread Robert Millan
On 22/08/2013 22:32, Robert Millan wrote: > but kfreebsd-9 in sid is tracking releng/9.0 Eh, never mind. Please ignore what I said. -- Robert Millan -- To UNSUBSCRIBE, email to debian-bsd-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Ar

Bug#720468: kfreebsd-9: CVE-2013-3077: local ip_multicast buffer overflow

2013-08-22 Thread Robert Millan
On 22/08/2013 13:41, Steven Chamberlain wrote: > kfreebsd-9 in jessie/sid will need updating to r254630 or later > [...] > kfreebsd-9 in jessie/sid will need updating to r254355 or later These commits are in stable/9, but kfreebsd-9 in sid is tracking releng/9.0, which doesn't have the fix AFAICS.

kfreebsd-8

2013-08-22 Thread Robert Millan
Is there any point in keeping kfreebsd-8 in sid? Just wondering if it's worth the extra work. -- Robert Millan -- To UNSUBSCRIBE, email to debian-bsd-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org Archive: http://lists.debian.org/521674

Bug#720471: kfreebsd-10: CVE-2013-3077: local ip_multicast buffer overflow

2013-08-22 Thread Robert Millan
On 22/08/2013 13:43, Steven Chamberlain wrote: > > kfreebsd-8 and kfreebsd-9 in wheezy will need the patch from r254629 > > kfreebsd-9 in jessie/sid will need updating to r254630 or later > > kfreebsd-10 in experimental will need updating to r254629 or later > > kfreebsd-8 8.1 in oldstable look

Processed: Re: Bug#720475: kfreebsd-9: CVE-2013-5209: sctp kernel memory disclosure

2013-08-22 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > fixed 720475 kfreebsd-9/9.2~svn254368-1 Bug #720475 [src:kfreebsd-9] kfreebsd-9: CVE-2013-5209: sctp kernel memory disclosure Marked as fixed in versions kfreebsd-9/9.2~svn254368-1. > thanks Stopping processing here. Please contact me if you nee

Bug#720480: marked as done (kfreebsd-9: EN-13:03: mfi driver may corrupt large disks)

2013-08-22 Thread Debian Bug Tracking System
Your message dated Thu, 22 Aug 2013 13:12:41 +0100 with message-id <52160039.7000...@pyro.eu.org> and subject line Re: Bug#720480: kfreebsd-9: EN-13:03: mfi driver may corrupt large disks has caused the Debian Bug report #720480, regarding kfreebsd-9: EN-13:03: mfi driver may corrupt large disks t

Processed: Re: Bug#720478: kfreebsd-10: CVE-2013-5209: sctp kernel memory disclosure

2013-08-22 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > found 720478 kfreebsd-10/10.0~svn225709-1 Bug #720478 [src:kfreebsd-10] kfreebsd-10: CVE-2013-5209: sctp kernel memory disclosure Marked as found in versions kfreebsd-10/10.0~svn225709-1. > thanks Stopping processing here. Please contact me if y

Bug#720480: kfreebsd-9: EN-13:03: mfi driver may corrupt large disks

2013-08-22 Thread Steven Chamberlain
Package: src:kfreebsd-9 Version: 9.1-4 Severity: important Tags: upstream This affects only the 9.1 package in jessie which will soon be gone. http://www.freebsd.org/security/advisories/FreeBSD-EN-13:03.mfi.asc > The mfi(4) driver supports LSI's next generation PCI Express SAS RAID > controllers

Processed: Re: Bug#720468: kfreebsd-9: CVE-2013-3077: local ip_multicast buffer overflow

2013-08-22 Thread Debian Bug Tracking System
Processing commands for cont...@bugs.debian.org: > found 720468 kfreebsd-9/9.0~svn223109-0.1 Bug #720468 [src:kfreebsd-9] kfreebsd-9: CVE-2013-3077: local ip_multicast buffer overflow Marked as found in versions kfreebsd-9/9.0~svn223109-0.1. > thanks Stopping processing here. Please contact me i

Bug#720478: kfreebsd-10: CVE-2013-5209: sctp kernel memory disclosure

2013-08-22 Thread Steven Chamberlain
Package: src:kfreebsd-10 Version: 10.0~svn253832-1 Severity: grave Tags: security upstream Control: kfreebsd-10/10.0~svn225709-1 http://security.FreeBSD.org/advisories/FreeBSD-SA-13:10.sctp.asc > When initializing the SCTP state cookie being sent in INIT-ACK chunks, > a buffer allocated from the

Bug#720476: kfreebsd-8: CVE-2013-5209: sctp kernel memory disclosure

2013-08-22 Thread Steven Chamberlain
Package: src:kfreebsd-8 Version: 8.3-7 Severity: grave Tags: security upstream Control: found -1 kfreebsd-8/8.0-1 http://security.FreeBSD.org/advisories/FreeBSD-SA-13:10.sctp.asc > When initializing the SCTP state cookie being sent in INIT-ACK chunks, > a buffer allocated from the kernel stack is

Processed: kfreebsd-8: CVE-2013-5209: sctp kernel memory disclosure

2013-08-22 Thread Debian Bug Tracking System
Processing control commands: > found -1 kfreebsd-8/8.0-1 Bug #720476 [src:kfreebsd-8] kfreebsd-8: CVE-2013-5209: sctp kernel memory disclosure Marked as found in versions kfreebsd-8/8.0-1. -- 720476: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=720476 Debian Bug Tracking System Contact ow..

Bug#720475: kfreebsd-9: CVE-2013-5209: sctp kernel memory disclosure

2013-08-22 Thread Steven Chamberlain
Package: src:kfreebsd-9 Version: 9.0-10+deb70.2 Severity: grave Tags: security upstream Control: found -1 kfreebsd-9/9.0~svn223109-0.1 http://security.FreeBSD.org/advisories/FreeBSD-SA-13:10.sctp.asc > When initializing the SCTP state cookie being sent in INIT-ACK chunks, > a buffer allocated fro

Processed: kfreebsd-9: CVE-2013-5209: sctp kernel memory disclosure

2013-08-22 Thread Debian Bug Tracking System
Processing control commands: > found -1 kfreebsd-9/9.0~svn223109-0.1 Bug #720475 [src:kfreebsd-9] kfreebsd-9: CVE-2013-5209: sctp kernel memory disclosure Marked as found in versions kfreebsd-9/9.0~svn223109-0.1. -- 720475: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=720475 Debian Bug Trac

Processed: kfreebsd-8: CVE-2013-3077: local ip_multicast buffer overflow

2013-08-22 Thread Debian Bug Tracking System
Processing control commands: > found -1 kfreebsd-8/8.0-1 Bug #720470 [src:kfreebsd-8] kfreebsd-8: CVE-2013-3077: local ip_multicast buffer overflow Marked as found in versions kfreebsd-8/8.0-1. -- 720470: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=720470 Debian Bug Tracking System Contact

Bug#720468: kfreebsd-9: CVE-2013-3077: local ip_multicast buffer overflow

2013-08-22 Thread Steven Chamberlain
Package: src:kfreebsd-9 Version: 9.0-10+deb70.2 Severity: grave Tags: security upstream http://security.FreeBSD.org/advisories/FreeBSD-SA-13:09.ip_multicast.asc > integer overflow in IP_MSFILTER > An integer overflow in computing the size of a temporary buffer can > result in a buffer which is t

Processed: kfreebsd-10: CVE-2013-3077: local ip_multicast buffer overflow

2013-08-22 Thread Debian Bug Tracking System
Processing control commands: > found -1 kfreebsd-10/10.0~svn225709-1 Bug #720471 [src:kfreebsd-10] kfreebsd-10: CVE-2013-3077: local ip_multicast buffer overflow Marked as found in versions kfreebsd-10/10.0~svn225709-1. -- 720471: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=720471 Debian B

Bug#720470: kfreebsd-8: CVE-2013-3077: local ip_multicast buffer overflow

2013-08-22 Thread Steven Chamberlain
Package: src:kfreebsd-8 Version: 8.3-7 Severity: grave Tags: security upstream Control: found -1 kfreebsd-8/8.0-1 http://security.FreeBSD.org/advisories/FreeBSD-SA-13:09.ip_multicast.asc > integer overflow in IP_MSFILTER > An integer overflow in computing the size of a temporary buffer can > res

Bug#720471: kfreebsd-10: CVE-2013-3077: local ip_multicast buffer overflow

2013-08-22 Thread Steven Chamberlain
Package: src:kfreebsd-10 Version: 10.0~svn253832-1 Severity: grave Tags: security upstream Control: found -1 kfreebsd-10/10.0~svn225709-1 http://security.FreeBSD.org/advisories/FreeBSD-SA-13:09.ip_multicast.asc > integer overflow in IP_MSFILTER > An integer overflow in computing the size of a te

Re: [Openjdk] default-jdk change on kfreebsd

2013-08-22 Thread Rene Engelhard
Hi, On Thu, Aug 22, 2013 at 12:14:21PM +0200, Julien Cristau wrote: > I have no idea what the implications of the switch are for us. I didn't realy understand completely either why but I think they want a OK from the RT because stuff assuming gcj on kfreebsd might break if that is changed to open

Re: [Openjdk] default-jdk change on kfreebsd

2013-08-22 Thread Steven Chamberlain
On 22/08/13 11:14, Julien Cristau wrote: > On Thu, Aug 22, 2013 at 10:50:23 +0100, Steven Chamberlain wrote: >> If we could please get final approval from the release team we could >> begin today the plan suggested in <87txiojt4d@mitoraj.siccegge.de> >> > It's not clear to me how/why the releas

Re: [Openjdk] default-jdk change on kfreebsd

2013-08-22 Thread Julien Cristau
On Thu, Aug 22, 2013 at 10:50:23 +0100, Steven Chamberlain wrote: > Hi Rene, > > Thanks for testing with openjdk-7 already. > > On 22/08/13 10:41, Rene Engelhard wrote: > > Is there a ETA for the switch? > > If we could please get final approval from the release team we could > begin today the

Re: [Openjdk] default-jdk change on kfreebsd

2013-08-22 Thread Steven Chamberlain
Hi Rene, Thanks for testing with openjdk-7 already. On 22/08/13 10:41, Rene Engelhard wrote: > Is there a ETA for the switch? If we could please get final approval from the release team we could begin today the plan suggested in <87txiojt4d@mitoraj.siccegge.de> Thanks, Regards, -- Steven C

Re: [Openjdk] default-jdk change on kfreebsd

2013-08-22 Thread Rene Engelhard
Hi, On Sat, Aug 17, 2013 at 08:38:09PM +0200, Damien Raude-Morvan wrote: > Le samedi 17 août 2013 16:21:06 Christoph Egger a écrit : > > I've been talking with Julien from the release team and Damien, the > > openjdk maintainer here at DebConf. > > > > Switching could -- as far as I understand --

Bug#720442: marked as done (installation-report: Partman does not start in expert install)

2013-08-22 Thread Debian Bug Tracking System
Your message dated Thu, 22 Aug 2013 09:03:50 + with message-id and subject line Bug#720442: fixed in partman-zfs 27 has caused the Debian Bug report #720442, regarding installation-report: Partman does not start in expert install to be marked as done. This means that you claim that the proble

Bug#720450: marked as done (Partitioning fails due to ZFS)

2013-08-22 Thread Debian Bug Tracking System
Your message dated Thu, 22 Aug 2013 09:03:50 + with message-id and subject line Bug#720442: fixed in partman-zfs 27 has caused the Debian Bug report #720442, regarding Partitioning fails due to ZFS to be marked as done. This means that you claim that the problem has been dealt with. If this i

Accepted partman-zfs 27 (source i386)

2013-08-22 Thread Christian Perrier
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Format: 1.8 Date: Thu, 22 Aug 2013 10:15:08 +0200 Source: partman-zfs Binary: partman-zfs Architecture: source i386 Version: 27 Distribution: unstable Urgency: low Maintainer: Debian Install System Team Changed-By: Christian Perrier Description: pa

Bug#720064: partman-zfs: Add check for sparc as well

2013-08-22 Thread Christian PERRIER
Quoting Aron Xu (happyaron...@gmail.com): > Package: src:partman-zfs > Severity: wishlist > Tags: patch > > Previously we only cared about kfreebsd so only kfreebsd-sparc is > checked, this patch adds sparc for ZoL. I committed and uploaded this...without really checking. And there was a missin