Processing commands for cont...@bugs.debian.org:
> tags 768108 + pending
Bug #768108 [src:kfreebsd-10] kfreebsd-10: CVE-2014-8476: getlogin kernel
memory disclosure
Added tag(s) pending.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
768108: http://bugs.debian.o
Processing commands for cont...@bugs.debian.org:
> tags 767583 + pending
Bug #767583 [src:kfreebsd-10] kfreebsd-10: ar9300_devid.h license restricts
modification
Added tag(s) pending.
> thanks
Stopping processing here.
Please contact me if you need assistance.
--
767583: http://bugs.debian.org/
Mapping stable-security to proposed-updates.
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Wed, 05 Nov 2014 01:17:16 +
Source: kfreebsd-9
Binary: kfreebsd-source-9.0 kfreebsd-headers-9.0-2 kfreebsd-image-9.0-2-686-smp
kfreebsd-image-9-686-smp kfreebsd-headers-9
kfreebsd-9_9.0-10+deb70.8_kfreebsd-amd64.changes uploaded successfully to
localhost
along with the files:
kfreebsd-9_9.0-10+deb70.8.dsc
kfreebsd-9_9.0-10+deb70.8.debian.tar.gz
kfreebsd-source-9.0_9.0-10+deb70.8_all.deb
kfreebsd-headers-9.0-2_9.0-10+deb70.8_kfreebsd-amd64.deb
kfreebsd-ima
Steven Chamberlain wrote:
> For FreeBSD I came up with the attached, hackish workaround
> using SO_TYPE (widely available), and out of the available
> protocols in PF_LOCAL (= AF_UNIX), assume that only
> SOCK_{DGRAM,SEQPACKET,STREAM} are candidates for fd passing.
Actually it didn't work:
| $ ./
intrig...@debian.org wrote:
> The fix for #766306 makes torsocks FTBFS on kfreebsd-*:
> https://buildd.debian.org/status/package.php?p=torsocks
Hi,
SO_DOMAIN was only accepted into POSIX earlier this year:
http://austingroupbugs.net/view.php?id=840
it seems to be only available yet on Linux and
Processing commands for cont...@bugs.debian.org:
> # bts housekeeping:
> # fixup versioning of fixed bugs that the bts considers to be not fixed
> # reassign+affects bugs fixed in other packages
> # unreproducible-or-not-a-bug must not be closed with a version, especially
> not the reported one (
Christoph Egger wrote:
> Moritz Mühlenhoff writes:
> > Please upload to security-master, I'll take care of it.
Thanks, Moritz!
> Steven, you need a sponsor for that right? I can do the upload in a
> minute if you haven't set up anything yet.
Yes, please go ahead whenever you're ready. Thanks.
Hi!
Christoph Egger wrote:
> How is the release doing? Which channels do you actually use to get the
> RC and Release revisions before I can find them anywhere on the net?
Oh, I have this hourly cron script email me when a new release is tagged
in upstream SVN:
| REVISION="10.1"
| BRANCH=$(wget
Moritz Mühlenhoff writes:
> On Fri, Nov 07, 2014 at 01:07:34AM +, Steven Chamberlain wrote:
>> Dear Security Team,
>>
>> Please could we upload to wheezy-security with the attached debdiff to
>> fix issues in kfreebsd-9 (kernel).
>>
>> This disables support for SCTP as previously discussed:
Hi!
Steven Chamberlain writes:
> I don't see any downside to it being in sid: I think the changes are
> careful enough to not get in the way of a future unblock, so isn't
> likely to force some future fix to go through t-p-u instead.
How is the release doing? Which channels do you actually use
On Fri, Nov 07, 2014 at 01:07:34AM +, Steven Chamberlain wrote:
> Dear Security Team,
>
> Please could we upload to wheezy-security with the attached debdiff to
> fix issues in kfreebsd-9 (kernel).
>
> This disables support for SCTP as previously discussed:
> https://lists.debian.org/debian-b
12 matches
Mail list logo