Hi Romain,
On Mon, Sep 7, 2015 at 6:52 AM, Romain Francoise wrote:
> libpcap is special because it's very close to the kernel; once it gets
> used in the d-i environment the burden of keeping it working there will
> fall on me.
It's fortunate that the udeb design is so simple then. Each
effectiv
On Sun, Sep 6, 2015 at 3:01 PM, Romain Francoise wrote:
> On Sun, Sep 06, 2015 at 09:04:58AM +0200, Michael Gilbert wrote:
>> I've uploaded an nmu to delayed/10 applying these changes. See
>> attached patch. Please let me know if I should delay longer.
>
> Please cancel
package: src:kfreebsd-10
version: 10.1~svn274115-4
severity: wishlist
It would be nice if the kfreebsd installer were to include a rescue
mode grub boot option.
In the meantime manually adding "set kFreeBSD.rescue/enable=true"
according to the kfreebsd FAQ is possible:
https://wiki.debian.org/Deb
package: rescue-mode
version: 1.51
severity: important
x-debbugs-cc: debian-bsd@lists.debian.org
Adding the line "set kFreeBSD.rescue/enable=true" in a grub entry and
booting the kfreebsd installer fails when executing rescue-mode. The
error is:
mkdir: can't create directory '/dev/md': Operation
package: src:util-linux
version: 2.26.2-1
severity: important
x-debbugs-cc: debian-bsd@lists.debian.org
The recent util-linux uploads fail to build on kfreebsd archs:
https://buildd.debian.org/status/logs.php?pkg=util-linux&arch=kfreebsd-amd64
This is having a ripple effect on a lot of reverse de
control: reopen -1
This was closed with the removal of src:freebsd-9, but there hasn't
been any actual upstream activity and no real details to be found
anywhere, so it is still likely unfixed in kfreebsd-10.
Best wishes,
Mike
--
To UNSUBSCRIBE, email to debian-bsd-requ...@lists.debian.org
wit
package: src:kfreebsd-10
severity: important
tags: security
Hi,
the following vulnerability was published for kfreebsd-10.
CVE-2014-7250[0]:
| The TCP stack in 4.3BSD Net/2, as used in FreeBSD 5.4, NetBSD possibly
| 2.0, and OpenBSD possibly 3.6, does not properly implement the session
| timer,
package: src:kfreebsd-10
version: 10.1~svn274115-1
severity: important
The kfreebsd-amd64 installer currently fails for low memory systems.
$ kvm -m 128 -cdrom debian-jessie-DI-rc1-kfreebsd-amd64-netinst.iso jessie.img
[...]
pid 32 (devd), uid 0, was killed: out of swap
Killed
Something wicked ha
On Sun, Oct 5, 2014 at 9:59 PM, Cyril Brulebois wrote:
> I'm not going to go through building this on a kfreebsd porterbox to try
> and figure out how isc-dhcp would look if rebuilt against such packages,
> but that looks a saner base for porters to build upon.
>
> That doesn't make the timing issu
On Sun, Oct 5, 2014 at 7:02 PM, Cyril Brulebois wrote:
> Michael Gilbert (2014-10-05):
>> Dear hurd and kfreebsd porters. I plan to upload the attached patch,
>> which along with the previous upload introduces a bind udeb, which
>> will be dynamically linked by the dhcp udeb
urgency=low
+
+ * Non-maintainer upload.
+ * Disable parallel build. Closes: #762766
+ * Set -fno-delete-null-pointer-checks. Closes: #750760
+ * Fix dependencies for libbind-export-udeb. Closes: #762762
+ * Don't install configuration files to /usr. Closes: #762948
+
+ -- Michael Gilbert
On Fri, Sep 26, 2014 at 7:59 AM, Steven Chamberlain wrote:
> Perhaps kfreebsd-image-10 needs to 'Provide' a newer kfreebsd-image-9
> version (and adjust the Breaks to << that version), or something ugly
> like that?
That seems like it would make since. That's how normal package
transitions are do
Wouldn't this be fixed somewhat simply if freebsd-net-tools had a
depends: kfreebsd-image-10? So even though freebsd-image-9 gets
removed due the breaks, the user will at least have the newer kernel
and a bootable system.
This does differ from linux dist-upgrades where it is expected that
the cur
On Tue, Aug 19, 2014 at 8:10 PM, Cyril Brulebois wrote:
> Steven Chamberlain (2014-08-20):
>> On 14/08/14 18:32, Cyril Brulebois wrote:
>> > Now, I think there are several questions to answer:
>> > 1. What were the reasons for having arch-dependent dhcp clients?
>>
>> I'd speculate because udhcpc
On Tue, Dec 24, 2013 at 8:15 AM, Christoph Egger
> Are you both running stable kernels for the build? are you using chroots
> or not?
I was using a chroot and the unstable 9.2 kernel. I can try a
non-chroot build if that may be somehow helpful?
Best wishes,
Mike
--
To UNSUBSCRIBE, email to de
package: kfreebsd-8
severity: serious
version: 9.0-8
Hi, a security advisory was issued for freebsd, and kfreebsd-9 is affected:
http://lists.freebsd.org/pipermail/freebsd-announce/2012-November/001440.html
--
To UNSUBSCRIBE, email to debian-bsd-requ...@lists.debian.org
with a subject of "unsub
package: kfreebsd-8
severity: serious
version: 8.1+dfsg-8
Hi, a security advisory was issued for freebsd, and kfreebsd-8 is affected:
http://lists.freebsd.org/pipermail/freebsd-announce/2012-November/001440.html
--
To UNSUBSCRIBE, email to debian-bsd-requ...@lists.debian.org
with a subject of "
package: kfreebsd-10
version: 10.0~svn234760-1
severity: grave
tag: security
A security advisory for freebsd has been issued, cve-2012-0217. All
of the debian kfreebsd packages are affected. Please see:
http://security.freebsd.org/advisories/FreeBSD-SA-12:04.sysret.asc
--
To UNSUBSCRIBE, ema
package: kfreebsd-9
version: 9.0-3
severity: grave
tag: security
A security advisory for freebsd has been issued, cve-2012-0217. All
of the debian kfreebsd packages are affected. Please see:
http://security.freebsd.org/advisories/FreeBSD-SA-12:04.sysret.asc
--
To UNSUBSCRIBE, email to debian
package: kfreebsd-8
version: 8.1+dfsg-8+squeeze2
severity: grave
tag: security
A security advisory for freebsd has been issued, cve-2012-0217. All
of the debian kfreebsd packages are affected. Please see:
http://security.freebsd.org/advisories/FreeBSD-SA-12:04.sysret.asc
--
To UNSUBSCRIBE, e
package: kfreebsd-8
version: 8.1
severity: serious
tag: security , patch
A buffer overflow issue in kfreebsd has been disclosed [0] along with a
poc [1]. patch is available [2].
I've only checked the kfreebsd-8 source, but the description says -7 is
affected, and 9- and higher may be as well; I h
Robert Millan wrote:
> 2011/6/20 Michael Gilbert :
> > http://openwall.com/lists/oss-security/2011/06/16/1
>
> "The issue only affects certain non-x86 architectures,
> such as SPARC."
looking at the commit itself [0], i find Dan's conclusion rather
surprising. t
package: kfreebsd-8
version: 8.1
severity: important
tags: security
a vulnerability has been disclosed for freebsd. the affected code is
present in the kfreebsd-8 package:
http://openwall.com/lists/oss-security/2011/06/16/1
--
To UNSUBSCRIBE, email to debian-bsd-requ...@lists.debian.org
with
package: kfreebsd-8
version: 8.1+dfsg-7.1
severity: important
tags: security
a denial-of-service has been posted for freebsd [0]. i don't have time
to verify whether any of the claims actually affect debian. please
check the kfreebsd package.
thanks,
mike
[0] http://www.exploit-db.com/exploits/
package: kfreebsd-8
version: 8.1+dfsg-7.1
severity: important
tags: security
an exploit has been posted for freebsd using a kernel leak and their
ftpd [0]. it's against an ancient version of freebsd (5.3), so it may
not affect newer versions. i don't have time to verify whether any of
the claims
package: kfreebsd-7
version: 7.3-7
severity: serious
tags: security
another freebsd privilege escalation has been disclosed:
http://www.exploit-db.com/exploits/15206/
this seems different than the recent CVE advisories. i haven't
checked any of this, but they claim 7.0-7.2 are affected and don't
retitle 572811 kfreebsd: CVE-2009-2649 denial-of-service
thanks
oops, that should have been:
CVE-2009-2649[0]:
| The IATA (ata) driver in FreeBSD 6.0 and 8.0, when read access to /dev
| is available, allows local users to cause a denial of service (kernel
| panic) via a certain IOCTL request with
Package: kfreebsd-8
Version: 8.0-4
Severity: important
Tags: security
Hi, a null ptr dereference was discovered in freebsd. It is
questionable whether this is exploitable. See [0] for more info.
[0] http://seclists.org/fulldisclosure/2010/Mar/117
--
To UNSUBSCRIBE, email to debian-bsd-requ.
Package: kfreebsd-8
Version: 8.0-4
Severity: important
Tags: security
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for kfreebsd-8.
CVE-2009-2650[0]:
| Heap-based buffer overflow in Sorcerer Software MultiMedia Jukebox 4.0
| Build 020124 allows remote attackers to ca
29 matches
Mail list logo