Re: Bug#776346: libpcap: build udeb for use in debian-installer

2015-09-13 Thread Michael Gilbert
Hi Romain, On Mon, Sep 7, 2015 at 6:52 AM, Romain Francoise wrote: > libpcap is special because it's very close to the kernel; once it gets > used in the d-i environment the burden of keeping it working there will > fall on me. It's fortunate that the udeb design is so simple then. Each effectiv

Re: Bug#776346: libpcap: build udeb for use in debian-installer

2015-09-06 Thread Michael Gilbert
On Sun, Sep 6, 2015 at 3:01 PM, Romain Francoise wrote: > On Sun, Sep 06, 2015 at 09:04:58AM +0200, Michael Gilbert wrote: >> I've uploaded an nmu to delayed/10 applying these changes. See >> attached patch. Please let me know if I should delay longer. > > Please cancel

Bug#788174: kfreebsd-10: installer rescue mode grub entry

2015-06-08 Thread Michael Gilbert
package: src:kfreebsd-10 version: 10.1~svn274115-4 severity: wishlist It would be nice if the kfreebsd installer were to include a rescue mode grub boot option. In the meantime manually adding "set kFreeBSD.rescue/enable=true" according to the kfreebsd FAQ is possible: https://wiki.debian.org/Deb

Bug#788173: rescue-mode: kfreebsd rescue fails with can't create /dev/md

2015-06-08 Thread Michael Gilbert
package: rescue-mode version: 1.51 severity: important x-debbugs-cc: debian-bsd@lists.debian.org Adding the line "set kFreeBSD.rescue/enable=true" in a grub entry and booting the kfreebsd installer fails when executing rescue-mode. The error is: mkdir: can't create directory '/dev/md': Operation

Bug#787287: util-linux: fails to build on kfreebsd

2015-05-30 Thread Michael Gilbert
package: src:util-linux version: 2.26.2-1 severity: important x-debbugs-cc: debian-bsd@lists.debian.org The recent util-linux uploads fail to build on kfreebsd archs: https://buildd.debian.org/status/logs.php?pkg=util-linux&arch=kfreebsd-amd64 This is having a ripple effect on a lot of reverse de

Bug#684072: CVE-2011-2393

2015-02-13 Thread Michael Gilbert
control: reopen -1 This was closed with the removal of src:freebsd-9, but there hasn't been any actual upstream activity and no real details to be found anywhere, so it is still likely unfixed in kfreebsd-10. Best wishes, Mike -- To UNSUBSCRIBE, email to debian-bsd-requ...@lists.debian.org wit

Bug#778367: kfreebsd-10: CVE-2014-7250 resource consumption issue

2015-02-13 Thread Michael Gilbert
package: src:kfreebsd-10 severity: important tags: security Hi, the following vulnerability was published for kfreebsd-10. CVE-2014-7250[0]: | The TCP stack in 4.3BSD Net/2, as used in FreeBSD 5.4, NetBSD possibly | 2.0, and OpenBSD possibly 3.6, does not properly implement the session | timer,

Bug#776332: kfreebsd-10: installer fails for 128 MB install

2015-01-26 Thread Michael Gilbert
package: src:kfreebsd-10 version: 10.1~svn274115-1 severity: important The kfreebsd-amd64 installer currently fails for low memory systems. $ kvm -m 128 -cdrom debian-jessie-DI-rc1-kfreebsd-amd64-netinst.iso jessie.img [...] pid 32 (devd), uid 0, was killed: out of swap Killed Something wicked ha

Re: Bug#762762: Updating isc-dhcp udeb to dynamically link bind (was: Bug#762762: nmu fixing bind issues)

2014-10-05 Thread Michael Gilbert
On Sun, Oct 5, 2014 at 9:59 PM, Cyril Brulebois wrote: > I'm not going to go through building this on a kfreebsd porterbox to try > and figure out how isc-dhcp would look if rebuilt against such packages, > but that looks a saner base for porters to build upon. > > That doesn't make the timing issu

Re: Updating isc-dhcp udeb to dynamically link bind (was: Bug#762762: nmu fixing bind issues)

2014-10-05 Thread Michael Gilbert
On Sun, Oct 5, 2014 at 7:02 PM, Cyril Brulebois wrote: > Michael Gilbert (2014-10-05): >> Dear hurd and kfreebsd porters. I plan to upload the attached patch, >> which along with the previous upload introduces a bind udeb, which >> will be dynamically linked by the dhcp udeb

Re: Updating isc-dhcp udeb to dynamically link bind (was: Bug#762762: nmu fixing bind issues)

2014-10-05 Thread Michael Gilbert
urgency=low + + * Non-maintainer upload. + * Disable parallel build. Closes: #762766 + * Set -fno-delete-null-pointer-checks. Closes: #750760 + * Fix dependencies for libbind-export-udeb. Closes: #762762 + * Don't install configuration files to /usr. Closes: #762948 + + -- Michael Gilbert

Bug#756464: upgrade-reports: [kfreebsd] dist-upgrade to jessie removes the kernel

2014-09-28 Thread Michael Gilbert
On Fri, Sep 26, 2014 at 7:59 AM, Steven Chamberlain wrote: > Perhaps kfreebsd-image-10 needs to 'Provide' a newer kfreebsd-image-9 > version (and adjust the Breaks to << that version), or something ugly > like that? That seems like it would make since. That's how normal package transitions are do

Bug#756464: upgrade-reports: [kfreebsd] dist-upgrade to jessie removes the kernel

2014-09-25 Thread Michael Gilbert
Wouldn't this be fixed somewhat simply if freebsd-net-tools had a depends: kfreebsd-image-10? So even though freebsd-image-9 gets removed due the breaks, the user will at least have the newer kernel and a bootable system. This does differ from linux dist-upgrades where it is expected that the cur

Re: Bug#757711: Bug#757988: kfreebsd: troubles with dhcp (configuration going away)

2014-08-19 Thread Michael Gilbert
On Tue, Aug 19, 2014 at 8:10 PM, Cyril Brulebois wrote: > Steven Chamberlain (2014-08-20): >> On 14/08/14 18:32, Cyril Brulebois wrote: >> > Now, I think there are several questions to answer: >> > 1. What were the reasons for having arch-dependent dhcp clients? >> >> I'd speculate because udhcpc

Re: Bug#731074: lighttpd: indeterminate test on kfreebsd buildds

2013-12-25 Thread Michael Gilbert
On Tue, Dec 24, 2013 at 8:15 AM, Christoph Egger > Are you both running stable kernels for the build? are you using chroots > or not? I was using a chroot and the unstable 9.2 kernel. I can try a non-chroot build if that may be somehow helpful? Best wishes, Mike -- To UNSUBSCRIBE, email to de

Bug#694097: kfreebsd-9: CVE-2012-4576

2012-11-23 Thread Michael Gilbert
package: kfreebsd-8 severity: serious version: 9.0-8 Hi, a security advisory was issued for freebsd, and kfreebsd-9 is affected: http://lists.freebsd.org/pipermail/freebsd-announce/2012-November/001440.html -- To UNSUBSCRIBE, email to debian-bsd-requ...@lists.debian.org with a subject of "unsub

Bug#694096: kfreebsd-8: CVE-2012-4576

2012-11-23 Thread Michael Gilbert
package: kfreebsd-8 severity: serious version: 8.1+dfsg-8 Hi, a security advisory was issued for freebsd, and kfreebsd-8 is affected: http://lists.freebsd.org/pipermail/freebsd-announce/2012-November/001440.html -- To UNSUBSCRIBE, email to debian-bsd-requ...@lists.debian.org with a subject of "

Bug#677299: kfreebsd-10: cve-2012-0217

2012-06-12 Thread Michael Gilbert
package: kfreebsd-10 version: 10.0~svn234760-1 severity: grave tag: security A security advisory for freebsd has been issued, cve-2012-0217. All of the debian kfreebsd packages are affected. Please see: http://security.freebsd.org/advisories/FreeBSD-SA-12:04.sysret.asc -- To UNSUBSCRIBE, ema

Bug#677298: kfreebsd-9: cve-2012-0217

2012-06-12 Thread Michael Gilbert
package: kfreebsd-9 version: 9.0-3 severity: grave tag: security A security advisory for freebsd has been issued, cve-2012-0217. All of the debian kfreebsd packages are affected. Please see: http://security.freebsd.org/advisories/FreeBSD-SA-12:04.sysret.asc -- To UNSUBSCRIBE, email to debian

Bug#677297: kfreebsd-8: cve-2012-0217

2012-06-12 Thread Michael Gilbert
package: kfreebsd-8 version: 8.1+dfsg-8+squeeze2 severity: grave tag: security A security advisory for freebsd has been issued, cve-2012-0217. All of the debian kfreebsd packages are affected. Please see: http://security.freebsd.org/advisories/FreeBSD-SA-12:04.sysret.asc -- To UNSUBSCRIBE, e

Bug#645377: kfreebsd-8: Buffer overflow in handling of UNIX socket addresses

2011-10-14 Thread Michael Gilbert
package: kfreebsd-8 version: 8.1 severity: serious tag: security , patch A buffer overflow issue in kfreebsd has been disclosed [0] along with a poc [1]. patch is available [2]. I've only checked the kfreebsd-8 source, but the description says -7 is affected, and 9- and higher may be as well; I h

Bug#631161: kfreebsd-8: cve-2011-2480 info disclosure

2011-06-20 Thread Michael Gilbert
Robert Millan wrote: > 2011/6/20 Michael Gilbert : > > http://openwall.com/lists/oss-security/2011/06/16/1 > > "The issue only affects certain non-x86 architectures, > such as SPARC." looking at the commit itself [0], i find Dan's conclusion rather surprising. t

Bug#631161: kfreebsd-8: cve-2011-2480 info disclosure

2011-06-20 Thread Michael Gilbert
package: kfreebsd-8 version: 8.1 severity: important tags: security a vulnerability has been disclosed for freebsd. the affected code is present in the kfreebsd-8 package: http://openwall.com/lists/oss-security/2011/06/16/1 -- To UNSUBSCRIBE, email to debian-bsd-requ...@lists.debian.org with

Bug#613312: kfreebsd: denial-of-service

2011-02-13 Thread Michael Gilbert
package: kfreebsd-8 version: 8.1+dfsg-7.1 severity: important tags: security a denial-of-service has been posted for freebsd [0]. i don't have time to verify whether any of the claims actually affect debian. please check the kfreebsd package. thanks, mike [0] http://www.exploit-db.com/exploits/

Bug#613311: kfreebsd: kernel leak

2011-02-13 Thread Michael Gilbert
package: kfreebsd-8 version: 8.1+dfsg-7.1 severity: important tags: security an exploit has been posted for freebsd using a kernel leak and their ftpd [0]. it's against an ancient version of freebsd (5.3), so it may not affect newer versions. i don't have time to verify whether any of the claims

Bug#601305: kfreebsd-8: pseudofs null ptr dereference exploit

2010-10-24 Thread Michael Gilbert
package: kfreebsd-7 version: 7.3-7 severity: serious tags: security another freebsd privilege escalation has been disclosed: http://www.exploit-db.com/exploits/15206/ this seems different than the recent CVE advisories. i haven't checked any of this, but they claim 7.0-7.2 are affected and don't

Bug#572811: 572811

2010-03-06 Thread Michael Gilbert
retitle 572811 kfreebsd: CVE-2009-2649 denial-of-service thanks oops, that should have been: CVE-2009-2649[0]: | The IATA (ata) driver in FreeBSD 6.0 and 8.0, when read access to /dev | is available, allows local users to cause a denial of service (kernel | panic) via a certain IOCTL request with

Bug#572813: kfreebsd: null ptr dereference

2010-03-06 Thread Michael Gilbert
Package: kfreebsd-8 Version: 8.0-4 Severity: important Tags: security Hi, a null ptr dereference was discovered in freebsd. It is questionable whether this is exploitable. See [0] for more info. [0] http://seclists.org/fulldisclosure/2010/Mar/117 -- To UNSUBSCRIBE, email to debian-bsd-requ.

Bug#572811: kfreebsd: CVE-2009-2650 potential code execution

2010-03-06 Thread Michael Gilbert
Package: kfreebsd-8 Version: 8.0-4 Severity: important Tags: security Hi, the following CVE (Common Vulnerabilities & Exposures) id was published for kfreebsd-8. CVE-2009-2650[0]: | Heap-based buffer overflow in Sorcerer Software MultiMedia Jukebox 4.0 | Build 020124 allows remote attackers to ca